NEW CARDING CHAT IN TELEGRAM

hackers

  1. Carding Forum

    Brute Ratel hacked: Hackers gained access to a powerful cyberwar tool

    Specialized software is now available to everyone without an activation key. An activator for the current version of the Brute Ratel C4 (BRC4) post-exploitation tool has surfaced in the cybercrime community. This was announced on the second of July in his account on the social network X* by a...
  2. Carding Forum

    Ghost code: how hackers use the V8 engine to bypass detection

    Check Point reveals the multi-level tactics of cybercriminals. Check Point has conducted a detailed investigation into the use of the V8 compiled JavaScript engine by attackers. A method exploited by hackers allows you to compile JavaScript into low-level bytecode. This technique helps to hide...
  3. Carding Forum

    Hackers Pink Drainer suffered from "poisoning" of the address

    A group of "drainers" of Pink Drainer wallets has become a victim of fraud with "poisoning" of the address. The incident, which occurred on June 27, drew the attention of analysts of the MistTrack platform. According to them, the hackers sent 10 ETH worth about $30,000 to a fake address that...
  4. Carding Forum

    Hackers Hack Ticketmaster, Now Selling 560 Million Customers Data

    The hacker group ShinyHunters has put the customer database of the American ticketing service Ticketmaster up for sale. Its volume is 560 million records, including names, addresses and partial payment details. Ticketmaster itself has not yet confirmed the fact that its systems were hacked...
  5. Carding Forum

    440,000 Taylor Swift concert tickets stolen by hackers

    The damage from the compromise is estimated at an insane $ 22 billion. At the end of May, we wrote about the hacking of Ticketmaster, in which hackers managed to steal 1.3 TB of company data. As it turned out later, the intermediary company that worked with sensitive information, Snowflake, was...
  6. Carding Forum

    Ctrl+Alt+Cancer: Hackers robbed patient of breast

    How the cyberattack changed the course of the operation. In May 2024, Synnovis, a company that provides pathology services to London hospitals, was attacked by ransomware. This led to the cancellation of about 1,500 medical procedures in the largest medical institutions in the British capital...
  7. Carding Forum

    Cryptographic keys were powerless before the savvy hackers

    Recently, many online services, such as banks, online stores, social networks, and software development platforms, have started using Passkey technology to protect their accounts instead of traditional passwords. Passkey is an authentication technology based on cryptographic keys stored on the...
  8. Tomcat

    Velvet Ant: Chinese hackers have been living on someone else's network for 3 years

    Outdated F5 BIG-IP devices helped cyber-vampires secretly suck out corporate data. The cyberattack, which lasted about three years, was recorded in the networks of one of the organizations in East Asia. Presumably, a Chinese cyber espionage group is behind it, which used outdated F5 BIG-IP...
  9. Tomcat

    Rapid Reset: hackers found a way to make the most powerful DDoS attacks

    The ease of operation of CVE-2023-44487 makes it a high-priority target for cybercriminals. In August 2023, a critical vulnerability in the HTTP/2 protocol, known as CVE-2023-44487 or Rapid Reset, was identified. This vulnerability, which can cause denial-of-service (DoS) attacks, has become a...
  10. Tomcat

    Windows Error Reporting: A Useful Feature or a Hidden Hole for Hackers

    Experts believe that CVE-2024-26169 could have been exploited for a long time as a 0day vulnerability. Symantec researchers have found that attackers associated with the Black Basta ransomware were likely exploiting a newly discovered vulnerability in the Windows Error Reporting (WER) service...
  11. Tomcat

    Cyber police have exposed an attacker who helped Russian hackers attack businesses in the Netherlands and Belgium

    Cyber police and National Police investigators have identified a resident of Kiev who, at the request of members of a Russian hacker group, disguised an encryption virus under the guise of secure files. Russian hackers used a hidden program to interfere with the operation of computer networks of...
  12. Tomcat

    Hackers are actively "digging" in the brains of the Mali graphics chip

    Smartphones under the gun, representatives of ARM recommend not to delay the update. The British company Arm reported a security vulnerability in the core driver of the Mali graphics chip, which is already actively used by attackers. The issue, identified as CVE-2024-4610, is related to memory...
  13. Tomcat

    Hackers attacked Cleveland: important city facilities, including the city Hall, were disabled

    The investigation is underway, and citizens are waiting for the systems to be restored. The American city of Cleveland, Ohio, this week faced a cyberattack that forced the shutdown of a number of important public services, including government offices and institutions in the Erieview * complex...
  14. Tomcat

    In the US, they decided to troll hackers hiding in Russia

    Psychological pressure has become one of the cornerstones in the prosecution of Russian cybercriminals. According to Wired, the US security forces and special services are forced to resort to remote trolling due to the fact that otherwise they simply cannot influence hackers hidden in Russia...
  15. Tomcat

    "We know where your director lives": ransomware hackers use harsh methods of terror

    Sites of Shame and the Countdown: How cybercriminals put pressure on victims. More and more often, people who go on their usual daily tasks - to school, hospital or pharmacy-are faced with non-working computer systems. Criminal groups from different parts of the world are often behind these...
  16. Tomcat

    Niconico offline: hackers broke into Japan's largest video hosting service

    Millions of users of the country were left without their favorite service. Niconico, one of the largest video hosting companies in Japan, has temporarily suspended its services due to a large-scale cyberattack. The incident occurred on Saturday, which forced the company to take measures to...
  17. Tomcat

    The French talked about how carders break bank chip-and-pin cards

    French researchers from the École Normale Supérieure (Ecole Normale Supérieure) have published details of their investigation into the 2011 incident. Then a group of hackers managed to steal more than $680,000 from users of French banks by deceiving the security system of EMV bank cards...
  18. Tomcat

    A future without hackers: AI hackers are becoming a new threat

    The AI team found 87% of critical vulnerabilities using CVE lists. Researchers were able to successfully hack more than half of the tested websites using autonomous GPT-4-based bot commands. These bots coordinated their actions and created new bots as needed, exploiting previously unknown...
  19. Tomcat

    Ransom didn't help: hackers again sell data stolen from Pandabuy

    Why did cyber villains not keep their word and decided to get rich again on the popular E-commerce site? Chinese e-commerce platform Pandabuy has once again been hit by cybercriminals. History has shown that paying ransom to ransomware does not guarantee security. In this article, we will...
  20. Tomcat

    Price issue - hackers hack their own

    Reports of hacking of shadow forums began to appear this year with enviable regularity. The question arises: why do hackers hack their own? Everyone's motives are different: eliminating competitors, revenge, financial gain. And if with the first two reasons everything is relatively simple (no...
Top