article thumbnail

Mastering Communication in Cyber Intelligence Activities: A Concise User Guide

Security Affairs

Communication is key in intelligence activities. Watchful intelligence operators have been long communicating – in strategic documents – the possible outbreak of a pandemic. There is not always a follow-up to strategic communications, as priority is usually given to tactical communications. Cassandra’s curse.

article thumbnail

Oracle privately notifies Cloud data breach to customers

Security Affairs

rose87168 initially attempted to extort Oracle for $20 million, but later pivoted, offering the stolen data for sale or in exchange for zero-day exploits. Researcher Kevin Beaumont said that Oracle has only issued verbal breach notifications to cloud customers, with no written communication provided. “Oracle Corp.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Trojan Shield, the biggest ever police operation against encrypted communications

Security Affairs

Trojan Shield operation: The FBI and Australian Federal Police ran an encrypted chat platform that was used by crime gangs and intercepted their communications. The FBI and Australian Federal Police (AFP) ran an encrypted chat platform that was used by crime gangs and intercepted their communications.

article thumbnail

New Miori botnet has a unique protocol for C2 communication

Security Affairs

A new variant of the implements a unique protocol to communicate with Command and Control infrastructure. A new variant of the Miori botnet uses a unique protocol to communicate with C&C infrastructure, it implements a protection mechanism to access the login panel. The authors are offering for sale the source code for US$110.

article thumbnail

Database of the FBI’s InfraGard US Critical Infrastructure Intelligence portal available for sale

Security Affairs

The portal of the FBI’s InfraGard US Critical Infrastructure Intelligence was hacked, and data is available for sale on a cybercrime forum. USDoD said that the sale of the database is covered by the escrow service offered by the Breached administrator Pompompurin. Critical Infrastructure. ” reported KrebOnSecurity.

Sales 246
article thumbnail

Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies

Security Affairs

The threat actors used a lure document (“DIPLOMATIC-CAR-FOR-SALE-BMW.pdf”) containing images of a BMW car available for sale to diplomatic entities. “In the context of this particular attack, a script is executed, generating a PDF file featuring the lure theme of a BMW car for sale.

Sales 327
article thumbnail

Threat actor offers Clubhouse secret database containing 3.8B phone numbers

Security Affairs

A threat actor is offering for sale on hacking forums the secret database Clubhouse containing 3.8B Clubhouse is a social audio app for iOS and Android where users can communicate in voice chat rooms that accommodate groups of thousands of people. phone numbers. Billion phone numbers. The seller claims the secret database contains 3.8

Sales 358