Remove 2012 Remove Computer and Electronics Remove Security
article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

made electronics on behalf of the Russian government and military. The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “Shevlyakov also attempted to acquire computer hacking tools.” ” reads a press release published by DoJ.

article thumbnail

Mitsubishi Electric discloses data breach, media blame China-linked APT

Security Affairs

Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate information. Mitsubishi Electric disclosed a security breach that might have exposed personal and confidential corporate data. According to the company, attackers did not obtain sensitive information about defense contracts.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Security expert Marco Ramilli has analyzed the recently leaked APT34 hacking tool tracked as Jason – Exchange Mail BF. which according to Microsoft documentation dates back to 2012. Analyzing the reversed byte-code a real eye catcher (at least in my persona point of view) is in the “exception securities” that have been placed.

article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. 2012 story, ID Theft Service Tied to Payday Loan Sites.

article thumbnail

The evolutions of APT28 attacks

Security Affairs

According to the many analyses made by Unit42 (available HERE ), FireEye ( HERE , HERE ) and TALOS ( HERE , HERE ) we might agree that APT28 has been very active (or at least very “spotted”) during the time frame between 2012 to 2019. I am a computer security scientist with an intensive hacking background. Pierluigi Paganini.

article thumbnail

RedTorch Formed from Ashes of Norse Corp.

Krebs on Security

Norse’s attack map was everywhere for several years, and even became a common sight in the “brains” of corporate security operations centers worldwide. Flushed with venture capital funding in 2012, Norse’s founders started hiring dozens of talented cybersecurity professionals.

article thumbnail

Feds Charge Three in Mass Seizure of Attack-for-hire Services

Krebs on Security

Purveyors of stressers and booters claim they are not responsible for how customers use their services, and that they aren’t breaking the law because — like most security tools — stresser services can be used for good or bad purposes.