NEW CARDING CHAT IN TELEGRAM

hacker

  1. Carding Forum

    Barrett Brown's Glorious Defeats: The Story of a Hacker Who Defied the World

    The former Anonymous member talks about prison, politics, and art. Barrett Brown, a well-known activist and former member of the hacker group Anonymous, presented his new book "My Glorious defeats: hacktivist, narcissist, Anonymous" to the world. The work challenges traditional ideas about the...
  2. Carding Forum

    In Mari El, a hacker who hacked into the servers of foreign countries was convicted

    In Mari El, based on the materials of the regional FSB, a hacker was convicted who used malicious software to hack servers in foreign countries. As it turned out, the attacker hacked information systems from March 2021 to November 2023. As a result, the local resident was found guilty, and the...
  3. Carding Forum

    From DJ to hacker ringleader: JabberZeus leader convicted in US

    10 years of evasion from the law ended with a relatively lenient term. The US Department of Justice has sentenced Vyacheslav Penchukov to prison and ordered him to pay $73 million in damages for participating in two major malware distribution schemes. The court's decision is reported by Wired...
  4. Carding Forum

    The United States announced a $10 million reward for the capture of a Russian hacker

    US authorities have accused 22-year-old Russian citizen Amin Stigal of carrying out cyber attacks on computer networks of Ukraine and other countries for the purposes of the GRU. According to the case file, in January 2022, Stigal distributed the WhisperGate pseudo-ransomware in the systems of...
  5. Carding Forum

    The hacker sold a "virus" for phones, which allowed to interfere with online banking and monitor correspondence

    Under the procedural guidance of the Prosecutor General's Office, a citizen was notified of suspicion on the fact of selling malicious software for mobile phones for the purpose of unauthorized interference in the operation of automated information systems (Part 2 of Article 361-1 of the...
  6. Carding Forum

    The police detained the hacker "Emil Kyulev", who hacked the databases of state institutions, banks and legal entities

    Hacker "Emil Kyulev", who hacked databases of state institutions, banks and legal entities, was caught The Sofia prosecutor's office has detained for up to 72 hours and brought in as a defendant a hacker who introduced himself online under the pseudonym " Emil Kyulev — - a former banker and one...
  7. Carding Forum

    Krebs reveals identity of x999xx hacker

    Most experienced cybercriminals often hide their real identity by using pseudonyms. However, some hackers don't really care about their anonymity. One such example is hacker x999xx, which provides access to corporate networks for various ransomware groups. Details about the hacker's life were...
  8. Tomcat

    FBI detains British hacker in Spain for stealing $ 27 Million in Bitcoin

    A 22-year-old Briton was arrested in Palma de Mallorca in a joint effort between Spanish police and the FBI on suspicion of being the ringleader of a hacking group that targeted 45 companies and individuals in the United States. The man was arrested at Palma Airport as he was preparing to board...
  9. Tomcat

    Critical vulnerability in MSMQ: server under hacker's control in one click

    The latest Patch Tuesday addresses 51 vulnerabilities in Microsoft branded products. Microsoft released a monthly security update as part of its June Patch Tuesday, fixing 51 vulnerabilities at once. One of them was classified as "Critical" (CVSS above 9 points), and the remaining 50 were...
  10. Tomcat

    Experts flashed "hacker" Nokia 1100 phones

    A few weeks ago, information emerged from the Dutch police, who uncovered a gang of hackers who bought up for tens of thousands of dollars old models of the Nokia 1100 phone, produced at the long-closed factory in Bochum in 2003. It was reported that in these models there is some undocumented...
  11. Tomcat

    Hacker removed $19 million worth of assets from the UwU Lend protocol

    On June 10, Arkham Intelligence analysts warned about a possible hacking of the UwU Lend DeFi liquidity protocol. Preliminary damage was estimated at $19.3 million. According to researchers at Cyvers Alerts, the hacker withdrew funds in three transactions and has already started converting...
  12. Tomcat

    Code removal and ransom: Gitloker hacker came up with a new extortion method on GitHub

    How the tandem of two services became a tool of blackmail. CronUp specialists have discovered a series of attacks on GitHub repositories, during which attackers erase the contents of repositories and ask them to contact them via Telegram for further instructions. The new method of cyberattack...
  13. Tomcat

    American hacker tried to create cyber troops of the Islamic State

    A hacker from Detroit, America, swore allegiance to the terrorist organization Islamic State and approached them with a proposal to create a cyber unit for the group. In fact, as 404 Media was able to find out, all this time he was communicating with undercover FBI officers. In February 2023...
  14. Tomcat

    CryptoChameleon: a dangerous information hacker targeted users of crypto platforms

    A powerful tool wreaks havoc on the web by stealing gigabytes of sensitive data. In February 2024, researchers from SilentPush identified a dangerous phishing tool CryptoChameleon, which is actively used by attackers to collect personal data, such as usernames and passwords. This tool...
  15. Tomcat

    How a hacker's mother entered a prison and infected the boss's computer

    What are you willing to do to successfully complete the project? Don't sleep at night, send your family on vacation so they don't distract you, drink gallons of coffee and energy drinks? There are better options. Cloud4Y tells the amazing story of a cybersecurity analyst. John Strand, who had...
  16. Father

    The FBI is not asleep: the hacker shelter BreachForums again hacked by law enforcement officers

    How soon will the attackers migrate the infrastructure and continue their illegal activities? The FBI, together with international law enforcement agencies, took control of the BreachForums website and Telegram channel. The operation took place on Wednesday, May 15, a few days after the...
  17. Father

    Hacker attacked users of the decentralized exchange Equalizer

    On May 14, the attacker began to "siphon" funds from traders of the decentralized exchange (DEX) Equalizer. The criminal stole 2353 EQUAL (~$20,000) and several other tokens. The project team recommended that you do not interact with the site's front-end until the investigation is completed...
  18. Father

    Double deception. How the FBI used Ukrainian hacker Maxim Popov.

    On a cold day on January 18, 2001, Maxim Igorevich Popov, a 20-year-old Ukrainian boy, nervously pushed open the doors of the American Embassy in London. He could have been mistaken for a student exchange program participant who came to get a visa, but in reality Maxim was a hacker, a member of...
  19. Father

    Hacker services on the dark web

    Introduction In recent years, the role of hackers has changed; in the past, these professionals were seen as dangerous criminals who needed to be kept at arm's length; meanwhile, today they are in high demand by private companies, intelligence agencies and criminal groups. Hacking " services...
  20. Father

    Hackbat: a new device for finding vulnerabilities – the white hacker's dream

    Enthusiasts have created a multifunctional platform for pentesting based on the Raspberry Pi. Ethical hacking, or pentesting, is a fascinating field that requires deep knowledge and skills. Enthusiasts and professionals in the field of cybersecurity have acquired an interesting novelty-a...
Top