Hacktivists Leak 1.7TB of Cellebrite, 103GB of MSAB Data

By Waqas
The data is now available for download on DDoSecrets and the official website Enlace Hacktivista.
This is a post from HackRead.com Read the original post: Hacktivists Leak 1.7TB of Cellebrite, 103GB of MSAB Data

GitHub Disables Pages of Pro-Russia DDoS Group NoName057(16)

By Deeba Ahmed
NoName057(16) is a group that has been targeting NATO and Czech presidential election candidates’ websites recently.
This is a post from HackRead.com Read the original post: GitHub Disables Pages of Pro-Russia DDoS Group NoName057(16)

Hidden Email Addresses in Phishing Kits

Ready-to-go phishing kits make it quick and easy for novice criminals to deploy new phishing sites and receive stolen credentials.

Phishing kits are typically ZIP files containing web pages, PHP scripts and images that convincingly impersonate genuine websites. Coupled with simple configuration files that make it easy to choose where stolen credentials are sent, criminals can upload and install a phishing site with relatively little technical knowledge. In most cases, the credentials stolen by these phishing sites are automatically emailed directly to the criminals who deploy the kits.

However, the criminals who originally authored these kits often include extra code that surreptitiously emails a copy of the stolen credentials to them. This allows a kit’s author to receive huge amounts of stolen credentials while other criminals are effectively deploying the kit on their behalf. This undesirable functionality is often hidden by obfuscating the kit’s source code, or by cleverly disguising the nefarious code to look benign. Some kits even hide code inside image files, where it is very unlikely to be noticed by any of the criminals who deploy the kits.

Netcraft has analysed thousands of phishing kits in detail and identified the most common techniques phishing kit authors use to ensure that they also receive a copy of any stolen credentials via email.

The Motivation Behind Creating Deceptive Phishing Kits

When a phishing kit is deployed, the resultant phishing site will convincingly impersonate a financial institution or other target in order to coax victims into submitting passwords, credit card numbers, addresses, or other credentials. These details will occasionally be logged on the server, but more often than not, are emailed directly to the criminals who install these phishing kits.

A Amazon phishing kit

Directory structure of an Amazon phishing kit contained in a ZIP file archive.

T95 Android TV Box sold on Amazon hides sophisticated malware

Expert discovered that the T95 Android TV box, available for sale on Amazon and AliExpress, came with sophisticated pre-installed malware. Security researcher, Daniel Milisic, discovered that the T95 Android TV box he purchased on Amazon was infected with sophisticated pre-installed malware. This Android TV box model is available on Amazon and AliExpress for as low […]

The post T95 Android TV Box sold on Amazon hides sophisticated malware appeared first on Security Affairs.

Android TV Box Sold on Amazon Contain Malware

By Deeba Ahmed
The affected device was a T95 Android TV box that came with sophisticated, persistent, and pre-installed malware embedded in its firmware.
This is a post from HackRead.com Read the original post: Android TV Box Sold on Amazon Contain Mal…

Interview – Laura Sjoberg

Laura Sjoberg discusses the ways gender hierarchies and queer theory can help us understand international security and IR more broadly.