article thumbnail

Red Cross Hack Linked to Iranian Influence Operation?

Krebs on Security

The ICRC said the hacked servers contained data relating to the organization’s Restoring Family Links services, which works to reconnect people separated by war, violence, migration and other causes. .” In their online statement about the hack (updated on Feb. Image: Ke-la.com. com, sachtimes[.]com, com, and whatsupic[.]com.

Hacking 251
article thumbnail

Estonian National charged with helping Russia acquire U.S. hacking tools and electronics

Security Affairs

The Estonian man is accused of having helped the Russian government and military to purchase US-made electronics and hacking tools. “Shevlyakov also attempted to acquire computer hacking tools.” In May 2020, Shevlyakov used one of his front companies to buy a licensed copy of the penetration testing platform Metasploit Pro.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Google provides rules to detect tens of cracked versions of Cobalt Strike

Security Affairs

Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild. Cobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named ‘Beacon’ on the victim machine. SecurityAffairs – hacking, cybersecurity). Pierluigi Paganini.

article thumbnail

SHARED INTEL: How ransomware evolved from consumer trickery to deep enterprise hacks

The Last Watchdog

FBI spoofs 2012 – 2013. It surfaced in November 2012 and was making thousands of victims a day. In many cases, the crooks hack managed service providers (MSPs) first and then use this access to compromise the partnering organizations. None of these early threats went pro.

article thumbnail

A Cobalt Strike flaw exposed attackers’ infrastructure

Security Affairs

According to security experts at Fox-IT, a recently addressed flaw in the Cobalt Strike penetration testing platform could be exploited to identify attacker servers. SecurityAffairs – Cobalt Strike, hacking). Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Pierluigi Paganini.

article thumbnail

Analyzing the APT34’s Jason project

Security Affairs

Security expert Marco Ramilli has analyzed the recently leaked APT34 hacking tool tracked as Jason – Exchange Mail BF. which according to Microsoft documentation dates back to 2012. I am a computer security scientist with an intensive hacking background. WebService.dll assemply version.

article thumbnail

How to Prevent SQL Injection Attacks

eSecurity Planet

Because many powerful SQL injection tools are available open-source , your organization must test your applications before strangers do. . Also Read: Best Penetration Testing Software for 2021. . Also Read: Apple White Hat Hack Shows Value of Pen Testers . Perform Regular Auditing and Penetration Testing.