Researchers Dive Into Activities of Indian Hack-for-Hire Firm Appin

Researchers uncover the activities of Appin, a hack-for-hire Indian firm involved in espionage, surveillance, and disruptive attacks.
The post Researchers Dive Into Activities of Indian Hack-for-Hire Firm Appin appeared first on SecurityWeek.
Continue reading Researchers Dive Into Activities of Indian Hack-for-Hire Firm Appin

Have you accidentally hired a North Korean IT worker who’s spying on your company?

South Korea and the United States’s FBI are warning organisations that they might have inadvertently recruited a North Korean spy to work in their IT department. Continue reading Have you accidentally hired a North Korean IT worker who’s spying on your company?

Smashing Security podcast #343: Four-legged girlfriends, LoveGPT, and a military intelligence failure

Dream girlfriends, AI love scams, and an alleged spy who is said to have made a series of blunders.

All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole … Continue reading Smashing Security podcast #343: Four-legged girlfriends, LoveGPT, and a military intelligence failure

Fake Signal and Telegram Apps in the Google Play Store

Google removed fake Signal and Telegram apps from its Play store.

An app with the name Signal Plus Messenger was available on Play for nine months and had been downloaded from Play roughly 100 times before Google took it down last April after being tipped off by security firm ESET. It was also available in the Samsung app store and on signalplus[.]org, a dedicated website mimicking the official Signal.org. An app calling itself FlyGram, meanwhile, was created by the same threat actor and was available through the same three channels. Google removed it from Play in 2021. Both apps remain available in the Samsung store…

Continue reading Fake Signal and Telegram Apps in the Google Play Store

‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors

Earth Estries, a cyberspy group possibly linked to China, has targeted governments and tech firms in the US, Germany, South Africa and Asia. 
The post ‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors appeared first on S… Continue reading ‘Earth Estries’ Cyberespionage Group Targets Government, Tech Sectors

Data center flaws spurred disruptions, espionage and malware attacks

By Waqas
Trellix’s researchers uncovered a series of vulnerabilities in two prominent data center equipment vendors: CyberPower and Dataprobe.
This is a post from HackRead.com Read the original post: Data center flaws spurred disruptions, espionage and… Continue reading Data center flaws spurred disruptions, espionage and malware attacks

China Hacked Japan’s Military Networks

The NSA discovered the intrusion in 2020—we don’t know how—and alerted the Japanese. The Washington Post has the story:

The hackers had deep, persistent access and appeared to be after anything they could get their hands on—plans, capabilities, assessments of military shortcomings, according to three former senior U.S. officials, who were among a dozen current and former U.S. and Japanese officials interviewed, who spoke on the condition of anonymity because of the matter’s sensitivity.

[…]

The 2020 penetration was so disturbing that Gen. Paul Nakasone, the head of the NSA and U.S. Cyber Command, and Matthew Pottinger, who was White House deputy national security adviser at the time, raced to Tokyo. They briefed the defense minister, who was so concerned that he arranged for them to alert the prime minister himself…

Continue reading China Hacked Japan’s Military Networks