menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Hacking News

Hacking News

source image

TechCrunch

1w

read

204

img
dot

Image Credit: TechCrunch

FBI and Dutch police seize and shut down botnet of hacked routers

  • FBI and Dutch police have seized and shut down botnet services involving hacked internet-connected devices, including routers.
  • U.S. prosecutors indicted four individuals, including three Russians and one Kazakhstan national, for hacking into routers and running the botnet under the guise of legitimate proxy services.
  • The accused individuals targeted vulnerable internet-connected devices to build a botnet, offering access through services like Anyproxy and 5Socks and making over $46 million from selling botnet access.
  • Black Lotus Labs assisted in tracking the proxy networks used for malicious activities, with the botnet offering anonymity for cybercriminals and having about 1,000 weekly active proxies in over 80 countries.

Read Full Article

like

12 Likes

source image

Kitploit

1w

read

375

img
dot

Image Credit: Kitploit

Witcher - Managing GitHub Advanced Security (GHAS) Controls At Scale

  • Witcher is a tool for managing GitHub Advanced Security (GHAS) controls at scale.
  • It requires NodeJS 20.13 and has been tested on Mac and Ubuntu.
  • Installation involves cloning the GitHub repository, running npm install, and building a Docker image.
  • Users can enable, disable, check status, receive alerts, deploy, or delete security controls using Witcher.

Read Full Article

like

22 Likes

source image

Securityaffairs

1w

read

145

img
dot

Image Credit: Securityaffairs

Russia-linked ColdRiver used LostKeys malware in recent attacks

  • Russia-linked ColdRiver, also known as APT COLDRIVER, has been using LostKeys malware in recent espionage attacks on Western governments and organizations since early 2025.
  • The ColdRiver APT group primarily targets NATO countries, along with the Baltics, Nordics, and Eastern Europe, including Ukraine, focusing on government officials, military personnel, journalists, and think tanks.
  • LostKeys malware is deployed through a multi-step chain, starting with a fake CAPTCHA to trick users into running PowerShell scripts. It is capable of stealing files, sending system information to the attacker, and running processes.
  • Google’s Threat Intelligence Group discovered LostKeys malware in selective ClickFix attacks, with victims being tricked into running malicious PowerShell scripts that led to data theft via VBS payloads. Two additional samples were found dating back to December 2023, leading to uncertainty about their relation to COLDRIVER.

Read Full Article

like

8 Likes

source image

Securityaffairs

1w

read

285

img
dot

Image Credit: Securityaffairs

SonicWall fixed SMA 100 flaws that could be chained to execute arbitrary code

  • SonicWall addressed three SMA 100 vulnerabilities, including a potential zero-day, that could allow remote code execution if chained.
  • The vulnerabilities (CVE-2025-32819, CVE-2025-32820, and CVE-2025-32821) involve file deletion, path traversal, and command injection.
  • Rapid7 researchers discovered the flaws in April 2025 and demonstrated a full exploit chain leading to root-level remote code execution.
  • The vulnerabilities have been fixed in version 10.2.1.15-81sv, and it is believed that they may have been exploited in real-world attacks.

Read Full Article

like

17 Likes

source image

Coinpedia

1w

read

89

img
dot

Image Credit: Coinpedia

German Authorities Seize €34 Million from Crypto Laundering Hub eXch: ZachXBT

  • German authorities shut down eXch crypto swapping service and seized €34 million along with 8TB of data in a crackdown on illicit crypto activity.
  • eXch was a central node in global cybercrime, with ties to high-profile crypto hacks, operating without oversight, KYC, and anonymity.
  • The takedown of eXch marks a new era of proactive crypto enforcement, targeting cybercriminals before they act, and emphasizing the traceability of blockchain transactions.
  • This action sets a precedent for data-driven measures against crypto laundering and highlights the increasing focus of governments on strengthening crypto regulations in response to rising crypto crime.

Read Full Article

like

5 Likes

source image

Medium

1w

read

264

img
dot

Image Credit: Medium

Incognito Mode Myths Busted: Secure Your Online Life Now!

  • Using incognito mode does not make you completely invisible online as it does not hide your IP address, still allowing tracking by ISPs, websites, and others.
  • Incognito mode does not stop all tracking, as techniques like browser fingerprinting and some trackers can still follow your online activities.
  • Contrary to popular belief, incognito mode does not protect you from hackers or shield you from malware, phishing scams, or sketchy downloads.
  • Pairing incognito mode with additional tools like VPNs, privacy browsers, and ad blockers can enhance online privacy and security by keeping you less vulnerable to tracking and data leaks.

Read Full Article

like

15 Likes

source image

Hackers-Arise

1w

read

0

img
dot

Image Credit: Hackers-Arise

SDR (Signals Intelligence) for Hackers: Building a Low- Cost, Private 4G LTE Network

  • New advancements enable the construction of cost-effective private cellular networks, beneficial for organizations valuing privacy like R&D firms and law offices.
  • The article discusses building a private 4G LTE network using Software Defined Radio (SDR) technology.
  • Popular open-source software srsRAN facilitates the setup of a 4G LTE network, offering efficient configuration and deployment.
  • Components of LTE networks include EPC (Evolved Packet Core), eNBs (base stations), and UEs (User Equipment) like phones and modems.
  • To create your LTE network, specific hardware like full duplex SDR, sim card reader, programmable LTE USIM cards, and an Android smartphone are required.
  • Configuration processes involve setting parameters like MCC, MNC, ICCID, IMSI, KI, and OPC to authenticate devices on the network.
  • srsRAN supports internet connectivity but not calls and SMS by default. VoLTE for calls necessitates additional components like IMS.
  • Launching the network involves running srsepc followed by srsenb, leading to the establishment of a private 4G LTE network.
  • Creating a private LTE network with minimal expense and technical know-how can safeguard privacy in scenarios where competitors or adversaries infiltrate conventional networks.
  • For those interested in SDR and building private networks, exploring training programs like SDR for Hackers can enhance understanding and skills.

Read Full Article

like

Like

source image

Securityaffairs

1w

read

367

img
dot

Image Credit: Securityaffairs

The LockBit ransomware site was breached, database dump was leaked online

  • The LockBit ransomware group's dark web site was compromised, leading to the leak of data from the backend infrastructure.
  • Hackers defaced the dark web site and posted a message along with a link to a dump of the MySQL database containing various data, including victim chat logs and user data.
  • BleepingComputer analyzed the leaked database, revealing 20 tables with information such as BTC addresses, victim chat logs, and user data with plaintext passwords.
  • Italian cybersecurity expert Emanuele De Lucia extracted over 60k addresses from the dump, indicating the potential presence of critical data for developing decryption tools. The chat logs showed ransom amounts ranging from $50,000 to $1,500,000.

Read Full Article

like

22 Likes

source image

Securityaffairs

1w

read

154

img
dot

Image Credit: Securityaffairs

Cisco fixed a critical flaw in its IOS XE Wireless Controller

  • Cisco addressed a critical flaw in its IOS XE Wireless Controller that could allow an unauthenticated, remote attacker to upload arbitrary files.
  • The vulnerability, tracked as CVE-2025-20188 with a CVSS score of 10, can be exploited by sending crafted HTTPS requests to the AP image download interface.
  • Exploiting the flaw could lead to gaining root access and executing arbitrary commands on the vulnerable system.
  • To mitigate the vulnerability, Cisco recommends disabling the Out-of-Band AP Image Download feature until software updates are applied.

Read Full Article

like

9 Likes

source image

Kitploit

1w

read

376

img
dot

Image Credit: Kitploit

ByeDPIAndroid - App To Bypass Censorship On Android

  • ByeDPIAndroid is an Android application that bypasses DPI and censorship by running a local VPN service.
  • The app utilizes a SOCKS5 proxy ByeDPI to redirect all traffic through it, allowing users to access blocked content.
  • It does not require root access and does not send any data to a remote server, ensuring user privacy.
  • Users can configure settings and integrate ByeDPI with other tools like AdGuard for enhanced functionality.

Read Full Article

like

22 Likes

source image

TheNewsCrypto

1w

read

402

img
dot

LockBit Breach Exposes 60,000 Bitcoin Addresses in Major Leak

  • A breach of Lockbit’s infrastructure led to the exposure of a database containing around 60,000 Bitcoin addresses.
  • Hackers breached Lockbit’s ransomware infrastructure, resulting in the leak of the addresses allowing blockchain analysts to trace illegal financial flows.
  • The leaked database included 60,000 Bitcoin wallets but did not include private keys; it also contained negotiation messages between victims and the ransomware organization.
  • The breach highlighted the importance of cryptocurrency in the ransomware economy, allowing law enforcement and blockchain investigators to track patterns and link past ransom payments to known wallets.

Read Full Article

like

24 Likes

source image

Hackernoon

1w

read

265

img
dot

Image Credit: Hackernoon

The Ethical Hacker's Guide to Hacking WiFi with Termux

  • WiFi safety is crucial, and tools like Wipwn in Termux help test and enhance security.
  • Ethical hacking involves using tools responsibly to identify and fix vulnerabilities.
  • Requirements include a rooted Android device, Termux installation, and specific tools.
  • For non-rooted devices, Kali NetHunter provides a solution for running Wipwn.
  • To install Wipwn on Termux, update packages, install necessary tools, and clone the repository.
  • Commands like Pixie Dust attacks and WPS brute force tests can be used for WiFi testing.
  • Troubleshooting tips include resolving interface busy errors and finding interfaces.
  • Wipwn offers advanced options for custom scripts and network filtering based on various criteria.
  • Remember, only ethical hacking with permission should be conducted to ensure network security.
  • Explore the GitHub repository for Wipwn to discover additional features and documentation.

Read Full Article

like

15 Likes

source image

Securityaffairs

1w

read

402

img
dot

Image Credit: Securityaffairs

U.S. CISA adds GoVision device flaws to its Known Exploited Vulnerabilities catalog

  • U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Qualitia Active! Mail, Broadcom Brocade Fabric OS, and Commvault Web Server flaws to its Known Exploited Vulnerabilities catalog.
  • Two CVEs related to GeoVision Devices OS Command Injection Vulnerability with high CVSS scores (9.8) have been exploited by attackers, impacting certain EOL GeoVision devices.
  • The vulnerabilities have been used by a botnet for DDoS or cryptomining attacks, with around 17,000 Internet-facing GeoVision devices vulnerable to one of the CVEs.
  • CISA issued a directive for federal agencies to address the vulnerabilities by May 28, 2025, and experts advise private organizations to review and fix vulnerabilities in their infrastructure.

Read Full Article

like

24 Likes

source image

Securityaffairs

1w

read

47

img
dot

Image Credit: Securityaffairs

Polish authorities arrested 4 people behind DDoS-for-hire platforms

  • Polish authorities arrested 4 people linked to 6 DDoS-for-hire platforms used in global attacks, offering takedowns for as little as €10.
  • The platforms facilitated thousands of cyberattacks on schools, government services, businesses, and gaming platforms between 2022 and 2025.
  • International collaboration helped in the arrests, with Europol, U.S., Germany, and the Netherlands supporting the operation.
  • The arrests are part of Operation PowerOFF, an ongoing international initiative to combat booter platforms for DDoS attacks.

Read Full Article

like

2 Likes

source image

Medium

2w

read

351

img
dot

Image Credit: Medium

The Luddites Guide To Love… Or Operational Security For Online Dating.

  • The article 'The Luddites Guide To Love… Or Operational Security For Online Dating' explores the risks associated with online dating and provides insights into mitigating data risks.
  • Online dating exposes individuals to threats like personal data being sold to third parties, hackers targeting sites for information, stalkers using personal data to harass victims, and government agencies leveraging social media data for prosecution.
  • Various sources and real-life cases highlight the dangers of data leakage and exploitation in online dating platforms.
  • The article suggests anonymous offline methods like meeting at events or using dating agencies for privacy-conscious individuals.
  • It also covers anonymous online dating options such as Craigslists personals and Doublelist.
  • Guidelines for responding to matches via anonymous online dating are provided, emphasizing caution and privacy.
  • Mainstream online dating platforms are critiqued for their privacy and security shortcomings.
  • A detailed guide for using a popular dating site, Bumble, is presented with steps to enhance privacy and mitigate information security risks.
  • Recommendations include using a privacy-focused phone, prepaid burner credit card, and scrubbing metadata from photos to maintain anonymity.
  • Facial recognition protection tools like Fawkes are suggested to safeguard against potential surveillance or data misuse.
  • The article concludes with a call to embrace the 'Luddite way' of dating to find love while prioritizing privacy and security.

Read Full Article

like

21 Likes

For uninterrupted reading, download the app