Search results

  1. Teacher

    Как лить трафик с GitHub?

    Всем привет. В этой статье я максимально понятно, и кратко опишу как лить трафик с GitHub-a. Начнем с подготовки аккаунта под пролив. 1) Для начала - нам нужно купить прокси. Я использую faceless, но думаю подойдут и простые, аля пиашки 2) После этого, переходим к созданию почтового ящика...
  2. Teacher

    New members of the Eurasian Mafia

    The fact that in addition to the notorious "Russian mafia" in the United States, represented mainly by former Soviet Jews, there are other ethnic organized criminal groups (OPGs) has long been known. After the collapse of the Soviet Union, the "Russian mafia" was renamed the "Eurasian" mafia...
  3. Teacher

    LockBit does not consider the consequences of hacking the infrastructure by groups of employees of the US FBI to be critical

    This was stated by the head of the LockBitSupp community in an interview with The Click Here podcast, which is hosted by The Record journalists. "I knew that sooner or later the FBI would hack me, and they did. At first, I felt fear and panic, but as soon as I understood how they did it, I...
  4. Teacher

    Немецкая полиция захватила "Рынок Немезиды" в ходе крупного международного рейда в Даркнете

    Власти Германии объявили о закрытии незаконного подпольного рынка под названием Рынок Немезис, на котором продавались наркотики, украденные данные и различные услуги по борьбе с киберпреступностью. Федеральное управление уголовной полиции (также известное как Bundeskriminalamt или BKA) заявило...
  5. Teacher

    Связанный с Северной Кореей Kimsuky переходит на скомпилированные файлы справки HTML при текущих кибератаках

    Было замечено, что связанный с Северной Кореей субъект угрозы, известный как Kimsuky (он же Black Banshee, Emerald Sleet или Springtail), меняет свою тактику, используя скомпилированные файлы справки HTML (CHM) в качестве векторов для доставки вредоносного ПО для сбора конфиденциальных данных...
  6. Teacher

    Apple vs. US Department of Justice: who will win the battle for the free market?

    In the United States, a lawsuit was filed against Apple that looks more like an 88-page press release intended to be read on cable news programs. Lawsuits are usually specialized communications from lawyers to a judge and can be very technical and full of jargon, especially in highly...
  7. Teacher

    WINELOADER: from the cellar of hackers directly to the computers of foreign deputies

    The range of interests of cyber spies from APT29 turned out to be wider than previously thought. Experts of the information security company Mandiant linked recent cyber attacks using the WINELOADER backdoor with the activities of the hacker group Midnight Blizzard (also known as APT29...
  8. Teacher

    Помогите ответить на пару вопросов

    На форуме куча СС магазинов, в которых предлагаются к продаже СС Европы и СС Азии. Почти в каждом магазине. Регистрируйтесь и увидите сами. А вот какой валид будет - это уже другой вопрос.
  9. Teacher

    Illegally distributed bank card details and authentication data

    The Minsk city Prosecutor's Office has filed a criminal case against a 21-year – old resident of the capital-he is charged with illegal distribution of bank payment card details and authentication data, through which it is possible to gain access to accounts. According to the materials of the...
  10. Teacher

    Through the illegal transfer of authentication data, he received more than 198 thousand rubles of income

    The Prosecutor's office of the Vileika district supported in the Molodechno district court the state prosecution in the criminal case against a 41-year – old resident of Vileika-he was charged with illegally distributing authentication data for personal gain, through which it is possible to gain...
  11. Teacher

    Hackers robbed HTX crypto exchange and HECO network for $110 million

    Hackers who hacked the Heco Bridge cross-chain in 2023 laundered ~$40,392 ETH through the Tornado Cash mixing service. This was noticed by PeckShield experts. The value of the cryptocurrency transferred over the past eight days at current market prices was $145.7 million. The bridge allows...
  12. Teacher

    Vulnerabilities that allow unlocking Saflok electronic locks

    Published information about a vulnerability in Saflok electronic locks that can be unlocked with a card with an RFID tag. Vulnerable lock models are most widely used in hotels and are used in approximately 13,000 hotels worldwide that use the System 6000, Ambiance, or Community platforms to...
  13. Teacher

    куда бить карты если везде просит 3дс подтверждение (я новичек не судите строго лучше помогите советом)

    Здравствуйте. Вы можете найти на форуме магазины и конторы, которые работают по технологии 2-D Secure. Они не отправляют подтверждение ОТР по смс. Начните с них. Подойдут любые карты - лишь бы баланса хватило. Ещё лучше если вы найдёте свои 2-D Secure и начнёте работать с ними.
  14. Teacher

    Российские хакеры используют вредоносное ПО "WINELOADER" для атак на немецкие политические партии

    Бэкдор WINELOADER, использовавшийся в недавних кибератаках на дипломатические учреждения с фишинговыми приманками для дегустации вин, был приписан хакерской группе, имеющей связи со Службой внешней разведки России (SVR), которая была ответственна за взлом SolarWinds и Microsoft. Выводы получены...
  15. Teacher

    Major media companies managed to block Telegram in Spain

    The messenger is accused of illegal use of content. A Spanish court has decided to suspend the operation of the popular Telegram messenger in the country as a security measure for a lawsuit filed by major media companies. The decision was made by the judge of the National Judicial Board...
  16. Teacher

    AcidPour – a new enemy for Linux

    SentinelLabs experts have discovered a new destructive malware called AcidPour, which destroys data and targets IoT and network devices based on Linux x86. Researchers believe that AcidPour is a variant of another well — known viper-AcidRain. AcidRain is a malware designed to destroy data on...
  17. Teacher

    Former employees decided that stealing trade secrets is a good way to make money

    Federal prosecutors in New York have charged Canadian Klaus Pflugbijl, 58, and Chinese Yilong Shao, 47, with conspiring to pass on trade secrets to Tesla. Pflugbijl was arrested Tuesday morning on Long Island. The man was sure that he was going to a meeting with buyers to discuss the deal, but...
  18. Teacher

    FSB officers in Tyumen region detain cyber fraudster

    FSB officers detained a hacker who illegally obtained information about login and password pairs from electronic payment instruments for the subsequent theft of large amounts of money, the press service of the Russian Federal Security Service for the Tyumen region reports. "As a result of...
  19. Teacher

    A resident of Grodno transferred more than Br50 thousand to cybercriminals

    A resident of Grodno transferred more than Br50 thousand to fraudsters. BelTA learned this from Inna Poznyak, official representative of the USC for the Grodno region. "Since the beginning of the year, more than 30 criminal cases have been initiated in the Grodno region, in which the victims...
  20. Teacher

    Two Russians and a Ukrainian woman who deceived people on the Internet will be tried

    Prosecutors of the Volyn regional and Lutsk district Prosecutor's Offices sent to the court an indictment in criminal proceedings on the commission of fraud by two citizens of the Russian Federation and a resident of Zhytomyr as part of an organized group (Part 5 of Article 190 of the Criminal...
Top