article thumbnail

From Cybercrime Saul Goodman to the Russian GRU

Krebs on Security

A review of this user’s hacker identities shows that during his time on the forums he served as an officer in the special forces of the GRU , the foreign military intelligence agency of the Russian Federation. From the forum’s inception until around 2008, Djamix was one of its most active and eloquent contributors.

Military 289
article thumbnail

CIA Hacking unit APT-C-39 hit China since 2008

Security Affairs

” The US-linked hackers targeted the Chinese organizations between September 2008 and June 2019. Get important figures‘ travel itinerary, and then pose political threats, or military suppression?” The post CIA Hacking unit APT-C-39 hit China since 2008 appeared first on Security Affairs. Pierluigi Paganini.

Military 145
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

When Your Smart ID Card Reader Comes With Malware

Krebs on Security

” The card reader Mark bought was sold by a company called Saicoo , whose sponsored Amazon listing advertises a “DOD Military USB Common Access Card (CAC) Reader” and has more than 11,700 mostly positive ratings. His site has even been officially recommended by the Army (PDF).

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

md , a website launched in 2008 that chronicled the history of a 1990 armed conflict in Moldova known as the Transnistria War and the Moldo-Russian war. Cyber intelligence firm Intel 471 shows this email address is tied to the username “ dfyz ” on more than a half-dozen Russian language cybercrime forums since 2008.

Cloud 304
article thumbnail

Apple AirTag Bug Enables ‘Good Samaritan’ Attack

Krebs on Security

In 2008, a cyber attack described at the time as “the worst breach of U.S. military computers in history” was traced back to a USB flash drive left in the parking lot of a U.S. A USB stick with malware is very likely how U.S. Department of Defense facility.

Phishing 351
article thumbnail

Government By Numbers: Some Interesting Insights

John Battelle's Searchblog

Examples include identity (from driver’s licenses and SSNs to Visa, MasterCard, Amex, and Facebook), delivery of important information and items (from the Post Office to Telcos, Internet, and FedEx and UPS), and protection (outsourcing both prisons and military jobs to private companies). No wonder 2008 was such a (continuing) disaster.

article thumbnail

New Turla ComRAT backdoor uses Gmail for Command and Control

Security Affairs

Earlier versions of Agent.BTZ were used to compromise US military networks in the Middle East in 2008. Cybersecurity researchers discovered a new version of the ComRAT backdoor, also known as Agent.BTZ , which is a malware that was employed in past campaigns attributed to the Turla APT group.