NEW CARDING CHAT IN TELEGRAM

hackers

  1. Friend

    Ajina attacks Central Asia

    Researchers at Singapore-based Group-IB report the discovery of a new Android malware called Ajina.Banker, which is capable of stealing financial data while bypassing 2FA via Telegram. Group-IB identified the threat in May 2024 by tracking distribution channels in Telegram under the guise of...
  2. Friend

    MoU: UK forms alliance against hackers

    Cooperation between law enforcement agencies and regulators sets an example of global counteraction to cyberattacks. The British ICO regulator and the NCA intelligence agency have entered into a Memorandum of Understanding (MoU) aimed at strengthening the cyber resilience of organizations...
  3. Friend

    GAZEploit: When a Single Glance Reveals All Your Hiding Places and Passwords to Hackers

    Apple Vision Pro owners didn't even think they were so easy to hack. A vulnerability was recently discovered in the Apple Vision Pro mixed reality headset that allows attackers to read data from a virtual keyboard. The attack, dubbed GAZEploit, has been registered as CVE-2024-40865, and its...
  4. Friend

    Android.Vo1d: Hackers Infiltrate Homes Through TV Set-Top Boxes

    The mass infection of 1.3 million devices around the world has forced us to take a closer look at the danger. Dr.Web specialists have discovered a new case of mass infection of Android-based set-top boxes. Dubbed Android.Vo1d, the malware has infected around 1.3 million devices in 197...
  5. Friend

    DragonRank: How Hackers Take Control of Search Algorithms

    The scale of the attacks has already covered several countries and many areas of business. Security researchers have uncovered a new cyberattack aimed at manipulating search engine results (SEO). The campaign, dubbed DragonRank, has affected several countries in Asia and Europe, including...
  6. Friend

    Quad7: When Your Home Wi-Fi Becomes a Hacker's Weapon

    The combination of old vulnerabilities and new methods affects thousands of devices. Researchers from Sekoia reported on the evolution of the Quad7 botnet, which began to attack new devices, including Axentra media servers, Ruckus wireless routers, and Zyxel VPN devices. Attackers are actively...
  7. Friend

    How to refuel an electric car for free? Prompted by hackers from Pwn2Own.

    The vulnerability in the Autel MaxiCharger does not require any special skills or equipment from the attacker. At the Pwn2Own Automotive 2024 competition, which took place in January this year in Tokyo, a team of researchers demonstrated vulnerabilities in three different EV chargers: Autel...
  8. Friend

    Photons against hackers: a quantum labyrinth unfolded under the asphalt of New York

    GothamQ platform - 34km of wires and data protection at the speed of light. Last December, a unique quantum experiment unfolded under the streets of New York. For 15 days, photons of light traveled through an underground network stretching from the Brooklyn Navy Yard to the Crown district of...
  9. Friend

    From NBTscan to Yasso: How Chinese Hackers Stealthily Attack Their Victims

    Open source is becoming a powerful weapon in the hands of skilled strategists. At the end of May, specialists from the Natto Team investigated the reconnaissance methods and tools of the APT41 hacker group associated with Chinese threats. Continuing their investigation, experts published a...
  10. Friend

    Operation TIDRONE: Hackers take control of global drone shipments

    Attackers bypass antiviruses and quietly gain top-secret access. An unknown cyber group, which probably has ties to Chinese-speaking hacker groups, began actively attacking Taiwanese drone manufacturers in 2024. According to Trend Micro, the threat is tracked under the name TIDRONE, and its...
  11. Friend

    Hackers Steal Cryptocurrency Using Optical Character Recognition Technology

    The use of OCR made it possible to automate the process of collecting confidential data. Researchers from McAfee have discovered more than 280 malicious Android apps that use optical character recognition (OCR) technology to steal cryptocurrency data. Collectively known as SpyAgent, these apps...
  12. Friend

    Tropic Trooper: Hackers are now wreaking havoc in the Middle East

    Kaspersky experts have identified a new campaign of the group. Kaspersky GReAT experts have discovered that the APT Tropic Trooper group has stepped up its attacks in 2024, targeting government entities in the Middle East. Tropic Trooper, also known as KeyBoy and Pirate Panda, has been active...
  13. Friend

    Iran's Secret Deal: Millions for Hackers Silence

    The extortionists dealt a devastating blow to the country's banking system. In August, a large-scale cyberattack was carried out on Iran, which threatened the stability of the country's banking system. Sources familiar with the situation report that as a result of the incident, the government...
  14. Friend

    Penpie's Black Day: Hackers Stole $27 Million in One Attack

    Why do DeFi projects remain a prime target for digital criminals? In 2024, the number of hacker attacks on cryptocurrency projects continues to grow — the total amount of stolen funds has already exceeded $1.2 billion, which is 15.5% more than in 2023. One of the latest victims was the Penpie...
  15. Friend

    From Defense to Attack: MacroPack Defects to Hackers

    The tool for Red Team has become a powerful tool for stealthy attacks around the world. Cisco Talos has discovered that the MacroPack red command framework is being actively used by threat actors to distribute the Havoc malware, Brute Ratel, and the PhantomCore RAT Trojan. During the analysis...
  16. Friend

    Naked and Funny: OnlyFans Hunters Have Fallen Into The Trap Of Hackers

    In the world of cybercrime, predators may face the betrayal of their own colleagues. Veriti has discovered that cybercriminals have started using a fake OnlyFans account hacking tool that, instead of performing the promised functions, infects the attackers with the Lumma Stealer malware...
  17. Friend

    FBI: DPRK hackers destroy DeFi companies

    Crypto projects are losing millions due to North Korea's social engineering. In its new warning, the FBI states that employees of DeFi companies and cryptocurrency projects have recently been attacked by North Korea. Hackers from the DPRK use sophisticated social engineering techniques to...
  18. Friend

    MuddyWater is rampant: Legitimate RMM software in the service of Iranian hackers

    Virtuoso disguise leaves companies no chance to detect attacks. Security researchers from the 360 Advanced Threat Research Institute recently discovered that the Iranian hacker group MuddyWater is actively using legitimate remote monitoring and control (RMM) software in its attacks. This group...
  19. Friend

    EUCLEAK: Hackers Can Steal Your YubiKey Right From Under Your Nose

    Researchers have discovered a serious vulnerability in Infineon chips. Researchers have discovered a serious vulnerability in the popular YubiKey 5 two-factor authentication devices. This finding could jeopardize the security of many users who rely on these tokens to protect their accounts...
  20. Friend

    Spamouflage: How Hackers Influence Americans Political Views

    The pro-China manipulative campaign gained momentum in the run-up to the elections. Chinese influence operation Spamouflage has stepped up its efforts ahead of the 2024 US presidential election. According to a study by Graphika, behind this malicious activity are structures associated with the...
Top