Category Archives: Hacking

Here we deal with all current topics related to piracy. You will be informed of the latest news on COMPUTER security and we will give each time a solution or advice to protect yourself.

How Fleury Michon almost got seen by a ransomware

after have escaped due to a computer attack that targeted his French company Fleury Michon returned to the details of the this cyberattack during the workshop at the security bases in Monaco.

It should be noted that last April, did the company see these computer systems paralyzed by malware, a ransomware. The malware had damaged the operation of several servers that were useful for running applications that were essential to the business.

This article will also interest you: 5 measures to fight ransonware

It was at midnight that the attack started and unfortunately no ransom demand could trace back to the culprit. "We were really in the dark at this level, so we quickly convened a crisis cell and stopped the group's activities (…) Management is quickly informed, as well as partners and insurance companies. explains Anne Michel, one of the head of the deli company.

The company is not an OIV (Vital Importance Operator), so it was the insurance company that had to intervene by asking a cybersecurity company called "Intrinsec" to help. The specialists of the state preferred not to melee. Nevertheless the deli company to mention having informed ANSSI. "They still supported us, and it was quite reassuring for us," explained Anne Michelle. "One of our first things was to inform all the plant managers to explain why we were blocking production and what we were putting in place with the help of Intrinsec."

On the other hand, the transparency shown by French society is nevertheless to be welcomed. All the partners were able to be informed in real time of what happened and they did not hesitate to give more information when things were wrong: "We chose to be very transparent with them, so much so that some spontaneously offered us help.

the the real question arose at the time of the resumption of operations. "To rebuild safely, we have put in place a clean room, from two healthy workstations, and we have reconstructs logistics applications from these two stations. the factory managers had to go through these two posts to register their deliveries. It is this device that has allowed us to resume production Monday, April 15. »

that which led outside the world that everything had gone well and that the crisis had ended. But in reality the facts told quite another story: "From from a trades perspective, it is estimated that they have emerged from the crisis as of 30 April. For the first time, it was more complicated and we estimated that it had returned to normal operation at the beginning of July. »

In the days that followed, an in-depth analysis revealed that a total of 220 servers were corrupted by a malware whose strain is still unknown. On the pirate side, no information collected. They did not make any ransom demands perhaps because they did not have time. And so they're vanished. But in total, let's say the balance sheet is not that bad.

"The incident and the way it was handled also showed that the company's IT department had very competent people, ready to provide 24-hour 14-day access to this type of incident. And that could make it easier for us in the future: for the cybersecurity budget 2020, I think I can ask what I want," said Anne Michel.

Now access an unlimited number of passwords:

Check out our hacking software



The 5 biggest data leak scandals of recent years

1. The Facebook-Cambridge Analytica scandal

The facts take place in March 2018, the social network Facebook is recognized at the center of a who had exploded in the case of mismanagement of its users' data. Indeed it has been publicized that society British so-called Cambridge analytica collected data more than 50 million Facebook users without any prior consent, the purpose of which is to was to build a computer program. The purpose of this program was to predict and even influence the choice of voters in U.S. elections, and even in other countries. the Facebook's complicity having been laid bare in this CEO Mark Zuckerberg has since decided to initiate a policy aimed at the security of users' data. In the wake of several fixes were brought to the social network for the make it safer. But that's not all, the American firm has been sanctioned to the tune of 5 billion U.S. dollars payable in U.S. fine April 2019. The fine followed a violation of Facebook's convention dating back to 2011 which literally stipulated: " respect for personal data and transparency about its use advertising purposes."

2. Equifax, the computer security breach that has affected more than 143 million people worldwide

The figure is indeed correct, 143 million customers were affected by an attack computer science that affected the U.S. credit bureau, Equifax in September 2017. As a result of this hacking, the culprits were able to obtain the names social security numbers the numbers the date of birth geographical addresses, etc. They have also succeeded in access the credit document 182,000 people. In addition, the agency added that 209,000 U.S. customers got the credit card hacked.

For the Canadian authorities, as much of it Equifax's customers was Canadian, "Given the large amount of extremely sensitive personal information held by Equifax and its critical role in the financial sector as an assessment agency for the credit, it was totally unacceptable to see gaps in the important in the company's privacy practices. privacy and security." The immediate consequence of this data leak was the fall in the index company's stock exchange.

3. Uber and the data theft of 57 million people

Just like the previous one, the American giant, Uber was also the victim of a massive hack in October 2016. During this hacking, the personal data of more than 57 millions of people, including drivers as customers were robbed. It is known that the American company had previously attempted to stifle the case since it was another agency called Bloomberg that he revealed to the general public in November 2017 or one year later. It is then known that the company paid the hackers US$100,000 to destroy the stolen data and that it would not not publicize the case. But in the end, uber had to lay off many employees in charge of IT security.

4. The Ashley Madison and rubiCorp case

Ashley Madison, known as a extramarital affair had also suffered a cyberattack that unfortunately, the result is the disclosure of information about millions of its customers. This happens summer 2015. Ashley Madison's parent company, Ruby Corp, announced that it had lost about a quarter of its income. Unfortunately, as a punishment, it had to pay about 1.6 million U.S. Trade Commission, a federal structure that was responsible for settle the matter. This agreement, however, demonstrated an admission of guilt, the U.S. authorities have simply respondent order to Ruby to adopt best practices to secure the data of its Customers.

5 – Yahoo! and that's 1.5 billion accounts hacked

From 2014 to 2016, the Yahoo Group suffered a total of two thefts of personal data. To globalize the two attacks it seems that more than 1.5 billion information related to users of the site has been stolen. Most of this information was taken from user accounts provided by users and consisted of login credentials, names, first names, date of birth and addresses.

Now access an unlimited number of passwords:

Check out our hacking software



Attacks on ATMs in Europe

In recent times, several attacks on ATMs across Europe using malware and jackpotting techniques have failed.

In all, only 1000 euros were stolen by the offenders for all the attacks that were carried out.

This article will also interest you: Why should you never post your bank card photo on social networks?

In a report published by an organisation that monitors fraud in the financial sector and across the European Union at the banking level, the European Association for Secure Transactions (EAST) stated that it has found 35 cases of attacks by distributors using malware involving ATM vending machines accompanied by two methods of black box attack called "Jackpotting". But the big surprise following this report is that the losses that were previously associated with this kind of attacks generally and which could amount to almost 0.25 million euros fell this quarter to 1000 euros in total.

A very large gap. The report also noted that it has been exactly 2 consecutive years since cybercriminals were able to steal money from distributors through the malware they usually design and use. Unfortunately for them in Europe, these software have never had any real success on some ATM-type distributors. It was in 2017 that it was first detected an ATM attack by a malicious program. Just as it was abrupt, it is in the same way that subsequently attacks became rarer and always ended in failure.

This is how European banks can be quite proud of their very high security standards which surpass many others outside the European continent. Indeed, to be able to run the malware on an ATM, there would have to be a USB port available or a CD or DVD player through which they could use it on the spot. However, a very large part of the European banks have attached to their ATMs two security systems, one of which is physical, allowing to detect immediately any type of malicious intrusion, which has stopped the evolution of attacks by malware.

"This drop in logical and malicious attacks is very good news and reflects the work that has been done to prevent such attacks by industry and law enforcement," said EAST's Executive Director, Lachlan Gun. In addition, to signify that jackpotting type attacks have also lost ground. This is particularly good for banking institutions. Because as we know, this kind of attack permanently destroys the ATM which requires expensive actions for repair. Indeed, the 'Jackpoting' is a physical attack in which criminals destroy the ATM to extract cash from it. A brutal and destructive technique.

Now access an unlimited number of passwords:

Check out our hacking software

The backdoors were discovered on Huawei equipment supplied to Vodafone

According to the Bloomberg report, there are backdoors in equipment supplied to Vodafone by the Chinese giant Huawei.

Vodafone's report on this situation has been written since 2009. It was published last week on the Bloomberg website, which states that the Chinese technology solutions provider, after being called by Vodafone which was facing technical problems identified on these equipment, provided them with a somewhat corrupt set of hardware.

This article will also interest you: Chinese giant Huawei is allegedly involved in a hacking case in Africa

These same materials caused some problems for users who were among millions of individuals and hundreds of companies. According to information published on the website, the Chinese giant could have had access to the fixed network of the country in question which is none other than Italy, thanks to the programs hidden in the equipment they had provided to the British telephone operator.

Even if, in a sense, these assertions are not supported by concrete and material evidence, they will nevertheless increase the regime of suspicion which had been set up against the Chinese technology company. in as we all know, Huawei is accused by the U.S. government of industrial espionage for the benefit of Chinese state. These allegations so far have not yet been proved However, there has been a the impression that, increasingly, everything is inclined to make us believe that this is true. This prevents us from easily detecting the true of the fake.

Several denials have been published by the Chinese giant which remains firmly on its position. It totally rejects the content of Vodafone's report, which seems to have come a little too late or, say, at the right time.

Huawei's response is in a fairly general tension, especially when we know that the context is very tense today, with the leaks of information about former Prime Minister Theresa May and her relationship with the Chinese company under the deployment of 5G in her country. An agreement that had been reached against numerous protests from members of the British government and also from international society.

Huawei wanted to stress that the problems encountered by the devices are purely and simply technical failures and are not any side effect of espionage: "These were technical problems and these were then identified and corrected", had wanted to notify the officials of the Chinese company to the press.

For all intents and purposes, it should be noted that a backdoor called a backdoor and a security flaw that was knowingly installed in a computer system in order to be useful when the publisher of this flaw would want to access the same system illegally of course. This is a fairly common practice among technology providers.

One wonders what approach Huawei will use this time to clear its name. Other questions remain. Why are the institutions of Western states trying so much to discredit Huawei? Is there really a truth in all this? For the future, the future will tell us. In addition, there is one very important thing to mention. no investigation has been carried out by the Italian police authorities into this possible to evade. That was the most spontaneous thing in this case.

Now access an unlimited number of passwords:

Check out our hacking software



3 hospitals refuse patients because of attack on ransomware

Last week, three hospitals were forced to refuse some patients because they had been attacked by ransomware-type malware.

October starts very badly for hospitals. More than 10 hospitals have been the target of an attack that has paralyzed their system for quite some time. The case is taking place in the United States and Australia, highly publicized we learned that three hospitals in Alabama and 7 in Australia, have seen their computer systems fall prey to software that has taken them hostage. This severely limited their ability to receive new patients.

This article will also interest you: Hospitals are in turn the target of cyberattacks in North America

Speaking in a statement on Tuesday, the heads of the three hospitals the health care system of the DCH group in Alabama, whose "Centre DCH Regional Medical Centre in Tuscaloosa, Northport Medical Center and the Fayette Medical Center, "said that their health centres could no longer receive new patients in the except those in critical condition.

Ambulances were asked to local authorities, in order of responsible for driving patients in other hospitals if possible. And even patients who were received had to be evacuated to other hospitals as soon as their situation had stabilized. "As far as appointments for tests or other procedures, if you have not been contacted by the DCH, please call before you show up. for at the moment, we will continue to reroute to other institutions new admissions, other than those that are urgent." However, interventions that had been planned when even though they are not urgent were going to be carried out as planned. In this regard, the Administration notified "Our staff is looking after patients who are currently in hospital, and we do not intend to transfer current patients."

The administrators voted on the attack computer science. The press release said: "A criminal limits our ability to use our computer systems in exchange for a further payment unknown (…) Our hospitals have emergency procedures in place to ensure the safety and effectiveness of operations in the event of unavailability of computer technology."

On the Australian side, the government has also a press release on the issue of computer hacking affecting 7 hospitals across the country: "The computer incident, which was discovered on Monday, blocked access to multiple systems by the infiltration of ransom software, including financial management (…) Hospitals have isolated and disconnected a a number of systems to quarantine the infection (…) this isolation has led to the closure of some file systems, reservation and patient management, which can have an impact on the contact with patients and the setting of the program. To the extent that possible, hospitals use manual systems to maintain their services"

According to an Australian government official, it would take weeks to secure and restore all the data that was corrupted in the attack. The Americans and Australians are both on their own as the investigation is still ongoing. At the moment, those responsible have not yet been identified and there is little to suggest that this will be possible.

Now access an unlimited number of passwords:

Check out our hacking software