Category Archives: Hacking

Here we deal with all current topics related to piracy. You will be informed of the latest news on COMPUTER security and we will give each time a solution or advice to protect yourself.

Australian parliament victim of Chinese cyberattack, agency says

According to the international news agency Reuters, informed by the findings of the Australian Signals Directorate (ASD), there is a strong chance that China's State Security Ministry is responsible for the recent computer attacks on the Australian parliament and several political parties in the country. The international news agency supports this information on the basis of the revelations made by 5 of its sources, which it is keen to keep anonymous.

This article will also interest you: APT41, a group of Chinese pirates discovered

For its part, the Chinese state asserts that these are not only rumors. He totally denies any involvement in this case. He says that the report issued by the Australian Computer Security Agency contains old information since March. That's a few months before the hack. The results of this report were reportedly obscured in order to maintain good relationship between Australia and China.

Moreover, if the extent of these computer attacks had been discovered since long it then looks like it's just lately that the sponsor has been unveiled.

The Prime Minister contacted on the matter refused to give his point of view sight. He did not even want to order the debate on how Australia and China would have had exchanges about of this hacking.

The Ministry of Foreign Affairs of the State Chinese has returned to the issue several times and has tried to always exonerate his country. In a statement received by international press, the Minister of Foreign Affairs Chinese foreign states claimed that Information on the Internet is not always verifiable. It also means this: "When investigation and the nature of online incidents is determined, it is there must be evidence, otherwise it is only rumours and defamation, sticking labels on people for no reason. We would like to highlight that China too is the victim of online attacks."

The question of the culprit is still pending and the Chinese state is still being singled out by unknown sources at Reuters. Indeed, one of them asserts that "China could most likely harm the Australian economy." As Australia's main economic partner, what will be the truth in such an assertion. Doesn't some people allow themselves to be led to the elucidations of U.S. President Trump?. Because this hacking happened strangely during elections that saw 151 parliamentarians get elected. Another accusatory trip to China's main suspect.

Let's not forget that in this same vein, the messaging app Telegram was hacked by the Chinese state during the opposition of protesters in Hong Kong. That has yet to be proven, but Telegram says it has the evidence. This will therefore be one more accusation on the back of the Chinese state which is increasingly pointing the finger at Westerners as a rogue state. But isn't China somehow a victim too?

Now access an unlimited number of passwords:

Check out our hacking software



Hacker group arrested in Europe, end of large-scale hacking odyssey

Earlier this week, it was shut down, hackers for illegal resale activity of IPTV offer in some European countries including Italy.

About 20 people had been arrested by Italian police for hacking.

This article will also interest you: Illegal audiovisual content providers arrested in the United States

It must be admitted that this is a pride for the Italian law enforcement, especially customs. It claims to have dismantled one of IPTV's largest hacking networks on Wednesday. The investigation was carried out under the direction of the Naples Public Prosecutor's Office. It was reported that a total of 23 people were arrested and charged. This was followed by the deactivation of "the most common illegal IPTV platform among hackers."

The illegal pay-TV platform was referred to as "xtream codes." It has only more than 5 million users in Italy. Its turnover is estimated at around 60 million euros. According to the Italian customs authorities, this platform was set up by two pirates of Greek origin.

the illegal website offered an online television service, under different formats that can be accessed "to hotels, businesses and enthusiasts ».

the offers were priced in two well-defined formulas. First the formula which cost 59 euros per month is the minimum formula that cost €15 a month. According to information gathered by the officers in charge of survey, the site had about 5000 subscribers for about 18,000 liquidated server for a total of 50 million users.

the subscription or any other levies provision emanating from this illegal site were made "on current accounts or via PayPal equivalent to 100,000 euros per month" had notified the Naples Public Prosecutor's Office. The platform with specialty converted signal flows into audiovisual productions that were protected by copyright or reproduction. If 23 have been arrested, it should be noted that these 25 members who have been identified implies that two are still on the run. These pirates managed their installation from a foreign country. However, it is there was a network of shops throughout Italy that from Lombardy to Sicily via the Veneto Company Puglia and Calabria.

Moreover, our hackers, thanks to the platform made available to its customers the contents of certain bouquets at an average price of 12 euros. And according to the European Judicial Cooperation Agency, the illegal site supplied several countries in the European Union. The investigation is still ongoing and we are trying to find out the final word of the story. it seems that this pirate platform, collaborates with other European companies. The Naples Public Prosecutor's Office has requested 8 investigations to be conducted in different countries such as the Netherlands, France, Bulgaria, Germany and Greece. In collaboration with Eurojust. More than 800 websites and about 183 servers are involved in this story. Note that those responsible for this large-scale hacking have been charged and will be prosecuted for criminal association, infringement of the right to reproduction and of course computer hacking.


Now access an unlimited number of passwords:

Check out our hacking software



Computer crime, practices that pay big money

Cybercrime in 2017 has earned the world economy more than US$600 billion, according to a study.

The last 5 years have been one of the richest in cybercrime.

This article will also interest you: Millions stolen from businesses thanks to deepfakes used by online scammers

According to a study by RisklQ, an expert agency for phishing detection and computer fraud, cyber crime activities could be worth US$1.5 trillion in early 2018. Amount that will have to be revised upwards in early 2019. The different situations experienced by companies and IT systems around the world may well confirm the figures.

We remember in 2017 the Wannacry attack or NotPetya, which are perceived by the majority of cyber security experts as the most powerful attacks that the computer world has ever known. The most striking thing about all this is that computer attacks are intensifying by the day and seem to no longer show weaknesses. This further penalizes companies and governments that spend money, a lot of money, to build their defense or to repair their damaged systems after the passage of too powerful malware.

The structures that are generally not Cyberattacks not only lose data, they waste time, resources, customers and leads. His actions can result in years of research and impact a state's growth or tarnish the reputation of a group of people rightly or wrongly.

In this context, governments and structures continue to inject more and more of a bottom, into the development of defence solutions that each time, which fairly ineffective. Some cybersecurity firms (Cyentia Institute), according to their research has shown that repairing the damage caused by computer attacks is becoming more and more more difficult. Indeed, it had taken 26 days to find a fix to a quarter of the faults, 100 days for half and almost a year for 75% of its security breaches. This is the same with maintenance and control of access aimed at preventing data theft or intrusions.

According to a Report by Check Point, 42% of vulnerabilities are due to unauthorized actions in cloud servers, 42% are related to interfaces that are not secure enough, 40% for error-related problems during configurations, and 39% account misappropriations.

The development of cyber crime spares no more no area. That this either in terms of the health of finances or even digital tools, any the reasons are good for being able to infiltrate an information system and steal the information they contain.

The French firm Saint-Gobain has notified that the June 2017 computer attack by the notPetya ransom software resulted in the financial consequence of about 250 million euros on its sales activities and 80 million euros on the profit of these operations.

Now access an unlimited number of passwords:

Check out our hacking software



Watching almost anyone via their SIM card is the Simjacker

Conspiracy theorists will finally have plenty to get their hands on.

Indeed, recently discovered by computer security researchers, there is a flaw in our SIM cards that would allow connoisseurs to use it in order to spy on us.

This article will also be of interest to you: SIM Swapping, a new form of it security hazard

Apparently in our SIM cards, there would be built-in software that would allow a hacker to send information to it, as well as collect it. In this way, pirate determine our right position with our number of computers. telephone. It seems that the SIM card is starting to take more and more value in the world of cybercrime. Indeed, it is remembered that the twitter CEO had been hacked by a SIM card-based technique "SIM swapping." Today we discover another vulnerability on these small components that have now become almost inevitable.

The researchers behind this discovery are the company's experts in cybersecurity, particularly the mobile " Adaptive Mobile Security." They were able to report the danger before it be a new mode of hacking at the fashion. The integrated program that would be the cause of this vulnerability is the software " S@T Browser," which is mainly integrated into the majority of chips in one of the features was to automatically launch browsers. however this app hasn't been updated for quite some time. Indeed, it is from 2009 that dates back to its last fix. From this it now has a vulnerability that researchers have dubbed " Simjacker." Thanks to this critical flaw, Security researchers computer scientists managed to harvest data on a remotely connected chip. They ensure that this method is one of the most discreet.

What does that mean? It's pretty simple. It would not be enough to send a specific enough SMS to start the process. This SMS will not trigger the notification and the user will not know. Once the message is received, the phone's system will respond with another SMS. In this SMS, you will be able to get certain information such as the IMEI of the phone, the base station to which the mobile is connected. In this way we can locate the user even if this location will not be extremely accurate. In addition, according to the researchers, it is possible to initiate other activities via the Simjacker fault. Indeed it would be possible to make outgoing calls, and send messages, without the knowledge or without the request of the main user. In addition it would be possible to install another malware for other purposes if there are any.

This flaw is already being used to monitor many people around the world. It has been detected in several countries, 30, according to the latest figures. Mainly in some regions such as the Middle East, North Africa, Asia or Eastern Europe. And it was discovered that the flaw could allow to hack iPhones or even android phones.

Now access an unlimited number of passwords:

Check out our hacking software



Hospitals are also the target of cyberattacks in North America

The last 3 months have been quite intense and prolix in data leakage of all kinds and in cyber attack.

According to various analyses, the next structures that are likely to be targeted by cyberattacks in Canada in the United States would be hospital institutions. It is a question of safety but also of health at this level. "I think the next big news is going to be a hospital that's going to have the lights closed, and we're not going to be able to serve people," said a cybersecurity expert from the health network, who spoke on condition of anonymity.

This article will also interest you: Hackers against French health facilities

For Steve Waterhouse, CEO of the specialty structure Cybersecurity, Cytelligence: "The danger is real."

The various data leaks that have hit several institutions Canadian or American companies directly affecting Canadians (we are talking about Quebec, Desjardins and Capital One) suggests that other cyber attacks of the same kind are to be expected. Also the field of health seems to be the one that offers the more potential for that. Some people in the field of cybersecurity call for more security brought to the network as a whole.

As a source close to the medical institutions: "The most sensitive issue you don't want to share with no one, it's your medical record (…) We are not immune to that. If a nurse or doctor (…) who has expanded access decides to go and get patient records and sell them on the dark web, he'll be able to do what." Notice fully in line with that of Daniel Bouffard, Vice-Director services at the Integrated University Health and Social Services Centre Estrie.

In any case, this will not be a first because in recent years, several health structures have been victims of cyber attacks. we even remember the case of the French institution last May.

And even in 2017 because of the virus attack wannacry, which has affected the world health facilities, health tests had stopped and even resumed again for more security regarding the tests already Made. It is known that the interest of computer hacking on espionage in to find out what scientific breakthrough the institutions would have made. Then the aim could also be to falsify medical tests in the goal of harming particular patient patients or even discredit the institutions involved.

One of the most relevant attacks that could be health institutions, particularly hospitals or hospitals, specialized services is, of course, the ransoming. Indeed, hackers often take the clever pleasure of taking control of IT services, hospitals knowing that this is very delicate. In this way, taking into account the pressure and the concern of patients people are forced to pay to be able to release their system.

To guide. Guy beguin, professor of computer science, hospitals are not sufficiently secure and the protection of computer systems are not really one of the priorities of health authorities. "We hear so many priorities… that you have to take care of the people first, the waiting rooms… It is certain that information security goes far, far into priorities (…) It will be enough of an attack to bring us to this reflection. »

Now access an unlimited number of passwords:

Check out our hacking software