Category Archives: Hacking

We give you valuable advice to avoid getting hacked.

5 computer attacks that have marked the history of cybercrime

If today's cyberattacks have become fairly common things from hearing about them, we should still raise the fact that they are not as well known as we think.

Indeed, there are some that in a rather exceptional way have marked the history of cybercrime.

1- NotPetya

It's a computer attack that occurred a month after another rather catastrophic "WannaCry". NotPetya is a ransom program like its predecessor. He used virtually the same process as WannaCry. Although the latter has affected more terminals than NotPetya, it does not prevent it from its fame, it derives its source from the fact that it specifically targeted companies. And of course it paid off as the hackers imagined. Indeed, companies are committed to protecting some of their rather sensitive data. Some did not hesitate to pay the ransom demanded. A ransom that rose to 300 dollars payable in bitcoin. If the sum seems small, the estimated gain has been collected by hackers amounts to about 10 billion U.S. dollars 8.3 billion euros. "The spread was less widespread than WannaCry, which self-replicated and spread itself. NotPetya infected computers with malware that had been downloaded without the user's knowledge by visiting a hacked web page," explains cybersecurity expert Corinne Henin. "Moreover, he erased the data more than he encrypted it, so even if we paid the ransom, it didn't do much good… ».

2- Dark Hotel

Here we are talking about the use of an online spying program. The malicious program known as Dark Hotel was the spy who was used to have a clever eye on the American and Asian business world. He used WiFi networks in luxury hotels. Internet connection system that are generally less protected than they should. This made it easy for cyber criminals to install the Trojan horse on time on their target's terminals. Once the malware is installed, they use it to steal information such as passwords or other content that could be used for unhealthy purposes or hacking. If the malware was discovered in 2014 by the Russian computer security company Kaspersky, it means that this Trojan horse could have been in circulation since 2007. According to the same company, 90% of those affected by this wave of cybercrime are in Taiwan, China, Japan and South Korea, not to mention Russia.

3- Mirai

Mirai and a network of zombies that used security vulnerabilities in small devices such as connected objects. Originally, it targeted computers that ran under IBM's operating system, Linux. Eventually this zombie network began to search for ip object addresses connected objects. "Connected objects are not protected and are sold with boat passwords. In fact, they can be hacked to become sources for deploying malware," notes Laura Peytavin, Expert. On October 21, 2016, the hackers behind Mirai managed to saturate the DNS Dyn server, creating a denial-of-service attack. The attack has resulted in making it inaccessible for almost one of the updates but some major sites such as Netflix, Twitter, eBay,… "Ultimately, billions of connected objects will represent opportunities for hackers to implant malware. This gives them a multiplied attacking power," notes Laura Peytavin. "Until Internet of Things publishers realize the vulnerability of their products, the risk is that this will happen again in the future," warn Corinne Henin.

4- Meow

This cyberattack took place precisely during the month of July 2020. In particular, she surprised by the effectiveness of cyber criminals in their procedure and the execution of their tactics.Yet, until now, no specialist, no observer would be able to say exactly what the motives were for this cyberattack. The cyberattack was simply the removal of the contents of a computer terminal as soon as the virus entered it. "Some of the hackers act primarily like activists and want to communicate. Erasing everything where a part of a site can be understood as a way to communicate an opinion in the public square," stresses Laura Peytavin. However, there was no message of claim that followed the days of the computer attack. The signature this unusual action is even more unusual: a meowing hence the name. It was counted nearly 4,000 databases that were not adequately protected suffer. "Some hackers also say it is their duty to show them that their data is poorly secured," says Corinne Henin. "Because there are no claims, you can understand this kind of attack more like 'I could do it, so I did it'.

5- Solarwinds

It is the most significant computer attack of the last 20 years. Experts consider it to be the most serious ever performed.

In truth, the attack was not discovered until December 8, 2020. It is the result of a large-scale espionage operation that according to several analyses has begun since March 2020. The assumption that the pirates were financed by a nation-state is the main one supported by the US authorities. Simply put, the Solarwinds attack has impacted thousands of companies around the world, 18,000 by some estimates and many government institutions, namely the U.S. Treasury and the U.S. National Nuclear Agency. Some big tech sizes some Microsoft or FireEye were also victims of this computer attack. In short, no cyberattack has had such a large impact. Until then the hackers could not be identified. The information they could have stolen during this time could not be fully determined.

Now access an unlimited number of passwords:

Check out our hacking software

A network of U.S. clinics targeted by computer attacks

Ransomware attacks keep getting people talking about them.

Recently a group of clinics specializing in fertility actions was allegedly attacked directly by ransomware. According to reports, several health data were stolen by hackers.

"While it contains a lot of health data, a U.S. network of 55 fertility clinics has been the victim of a ransomware attack. Confidential information was stolen by the hackers. Techcrunch online media.

This article will also interest you: Data leak: Cybercriminals steal health data in Finland and expose it

The attacked structure is known as US Fertility, one of the largest networks of fertility clinics in the United States. The US group confirmed last week that it had been hit by a ransom software attack. The amount demanded by the hackers was not specified by the latter. As a reminder, U.S. Fertility has nearly 55 U.S. clinics under its management. The U.S. company claims that cybercriminals had been able to infiltrate their system for more than a month. The ransom demand had been sent since September 14. That is, more than three months before the declaration

As far as the tactics used by cybercriminals are concerned, this is a pure classic. As we have seen this year and last year, hackers simply infiltrate their victim's computer system, steal important data, and demand a ransom payment. In short, a classic in this field. Presumably, given the status of the American group, the ransom demanded can be as high as millions of dollars.

In addition, the group confirmed that cyber malice have managed to steal some files. While he claims that the number of files stolen by hackers is less in terms of numbers and quantities, the fact remains that several important information has escaped the group's vigilance. These include social security numbers, the postal addresses of the victims and their first and last names. And that's not all, according to US Fertility, information being framed by medical secrecy was also stolen by hackers. Beyond that the company refuses to give further details.

When asked why she had waited more than two months before publicly admitting that she had been the victim of a computer attack, the American group simply confined itself in silence. Knowing full well that the safety of his patients was endangered in the light of all the problems that the leak of so much data could create. For its part, the company claims that the competent authorities had been notified of the attack at the time it was noticed by their service. The conclusion of such a situation is quite clear. The company will certainly be punished if it is admitted as a result of the investigation that it has not deployed sufficient means to protect the data of its patients.

The case of US Fertility shows how health institutions since the beginning of this year have been targeted preferentially by hackers. Last September, the same month of the attack on the US Fertility, Universal Health Services, the largest hospital system in the United States, was also hit by a similar computer attack. This time the malware used was Ryuk, a celebrity in the ransomware industry.

During the first half of 2020, French hospital groups and health institutions were also hit by computer attacks, including the AP-HP. In Germany, an attack on ransomware resulted in the death of a patient he could not receive his care in time.

"It is clear that health care facilities need to significantly strengthen their computer security to avoid terrible consequences on patient care. For the first time, ransomware led to the death of a patient in a hospital in Germany because she could not be operated on in a timely manner. Alice Vitard said.

Now access an unlimited number of passwords:

Check out our hacking software

Hackers and online scams

Today, cyber threats are increasingly present.

It takes a simple inattention to wipe out great damage. There are several types of computer attacks and two practices used by hackers to trick you. These methods are mostly known but so sophisticated and simplistic that they always manage to deceive the vigilance of Internet users.

1- Phishing

Still called phishing, this method is classic in the field of cybercrime. Thierry Berthier, a researcher at the Chair of Cybersecurity – Cyber Defence Saint-Cyr – Thales-Sogeti, who is also Senior Lecturer in Mathematics at the University of Limoges, points out: "The spectrum of cyber attacks and cyber threats is particularly wide, as is the scope of targets. Individuals are mainly affected by phishing campaigns with the receipt of malicious messages containing a toxic link. The unwary user clicks on the link thinking he is dealing with a legitimate page while he triggers the execution of malware that will install on his machine, without his knowledge. This modus operandi is extremely widespread. ».

In other words, phishing is a practice that exposes all Internet users without exception.

2- Ransomware

In 2019, the use of ransomware is literally exploding. Indeed, experts have called it the year of Ransomwares. Today, this threat has become literally commonplace. It simply infects a target's computer system or terminal in order to prevent it from freely accessing it. As the content of the terminal is encrypted by the cybercriminal, the cybercriminal will demand payment of a ransom to allow the victim to access the contents of his terminal. "The Internet user may choose to pay the ransom if he believes that the value of his lost data exceeds that ransom or agree to lose it permanently. The attacker can then attempt other blackmail mechanisms if he believes that the disk contains sensitive or embarrassing data for the target. We must be aware that all means of pressure will be used, even the most "disgusting" because the victim is dealing with cyber delinquency. our expert notes. However, it is generally recommended not to pay the ransoms demanded by cyber criminals in this context.

3 – Cyber espionage

Cyber criminals can use malware to spy on you. This can be to listen to your conversations, to have access to the content of your emails, your messages or download documents from your terminals. There is also the possibility of spying on you via webcam. Generally, this policy is used to prepare another computer attack.

4- Fraud

Generally the user may be exposed to several online frauds. So that we can talk about:

– Frauds on forged transfers

– False invoices

– False media

– False refunds

– False transfer orders

– Frauds to the President

The scope of the possibilities for the cybercriminal is so vast that it is almost impossible to determine the meaning of action in the area of fraud. Generally, the Internet user is exposed online during the period that is shaken by a current phenomenon such as the coronavirus pandemic or a natural disaster.

It should also be noted that businesses, local authorities, governments and government organizations are generally the preferred targets of cyber criminals. The reasons are clear. Not only do they have sufficient resources, but also the information that could be collected during a cyberattack is more valuable and can be easily monetized on the black market. "The attacker can hope to collect sensitive data (secrets and industrial processes, customer base, products, services, subcontractors, etc. This data still has a resale value in the specialized darknet markets. Thierry Berthier. In addition, some cyber criminals manage to extract millions of dollars from companies after a ransomware attack. Even though they often refuse to pay the ransom demanded by hackers, companies cannot deny that the attacks are making financial losses on them in that they have to spend a lot of money to restore their system after each computer attack.

Now access an unlimited number of passwords:

Check out our hacking software

Some tips for not being hacked when you're a small business

The recent health crisis has shown that SMEs are as exposed as large companies to cyber threats.

That's why it's essential that they start developing protocols to secure their computer systems. In this case article we will give some usual advice you will get back enough SMEs to increase the security of their computer networks.

This article will also interest you: Cyberattacks, SMEs on the front line

Before anything, we have to explain the importance of protecting ourselves. The majority of small and medium-sized enterprises are not concerned about this aspect of their internal development. Having a reliable security system within the company not only protects the company's business, but also protects certain assets that will essentially have to be covered by intellectual protection. The reasons for these small businesses neglecting IT security are both culture and financing. Indeed, the majority of leaders of small and medium-sized enterprises are generally untrained on the issue of cybersecurity and persistent threats in full development. Moreover, it considers that it has limited resources for this, they do not devote enough, or even to their computer security. However, when computer incidents occur, the impact is so great that some are forced to close the doors.

Cybercrime is becoming increasingly interested in SMEs because they know that it is no longer easy to attack large companies investing much more time to strengthen the security of their systems.

In practice there are several techniques to protect against computer attacks. This may then involve certain behaviours, a good culture in the field of cybersecurity, as well as some predisposition and anticipation in the organization of SMEs

1- Raising awareness and training of its team on cyber threats

Computer security experts are all unanimous on a fact. The main security flaw and human being. In a company usually refers to employees, employees and even the manager. We should raise awareness around ourselves about the various threats that remain in the IT field is to train our staff on how to avoid them. For example, we know that good digital hygiene of staff significantly reduces the risk of computer attacks on business systems. The training could then focus on the most commonly used and even the most unrecognized hacking techniques. To do this, it is recommended to call on specialists in the sector.

2- Putting protection systems in place

Every company has to protect its system. To do this, there are several security solutions on the market. The first obstacle that more cybercriminal encounters when it tries to illegally break into your system is of course on the firewall. In large companies for example, almost all computers see all computers are equipped with a security firewall that filters inflows and exits. There are different types and you will be very satisfied in this growing market.

3- Externally backing up data

Safeguards in several interests. Indeed, they will make it easier to recover important information when you are still under a computer attack. Because it has to be meant no matter what you do, no one is completely safe from a cyberattack. In this context, backups can be useful. In addition, in case of loss of computer equipment. The need for a being easily fulfilled. To do this, it is recommended to use cloud backup services. The backup would have to be automatic and regular.

4- Securing messaging apps

Applications used to exchange within the company must be secure. Because it is a privileged gateway for cyber criminals. This too is a danger to the confidentiality of trade as well as to the protection of certain intellectual rights. Solutions do exist for safe exchanges. However, updating messaging services can only be safe if users take the trouble to comply with certain security measures.

Now access an unlimited number of passwords:

Check out our hacking software

Security cameras: protecting yourself effectively from cyber attacks?

Today, cameras are much more used for different types of use.

But as we know, the field of security has made a very special general use of it but also very important in the organization of this sector of activity.

This article will also interest you: It is advisable to hide the camera from connected TVs

The use of security cameras has become widespread in recent years. What was the prerogative of security agencies and public administrations has become something that even the average citizen uses. Speaking of monitoring homes during vacation periods, monitoring children, or even controlling an owner over certain areas of his private domain. There is something for all uses for all prices and for possible people.

However, the problems remain. These cameras are internet connected objects. This makes it easier to use it remotely with modern and easy-to-use tools such as smartphones or tablets. The problem with this connection is that it doesn't just make it easier to use. It also exposes the user to computer attacks. And this is the case for all connected objects.

However, the use of security cameras highlights a very important aspect of life. Privacy. Because people will not hesitate to take every opportunity to spy on users, no matter why they are motivated. So to preserve your privacy and prevent intruders from gaining access to your camera's contents, you'll need to follow certain security rules.

1- The choice of camera brand.

To begin with you will need to be very careful about the camera brand you buy. Why? simply because some brands do not have a very good reputation for the safety of their hardware. That's why you'll need to find out which models are not publicly recognized as vulnerable. Because, as a previous study reveals, about 3 million security cameras installed in offices and homes specifically in Asia and Europe are affected by security vulnerabilities that expose their owners greatly to make them easily accessible to hackers. They can then steal a lot of personal information that they can use in potential computer attacks initiated later. The British Consumer Rights Organization, Which?, Recently warned about this problem. "Brands with potentially vulnerable cameras are Alptop, Besdersec, COOAU, CPVAN, Ctronics, Dericam, Jennov, LEFTEK, Luowice, QZT and Tenvis," the organization Which said. She added, separately, that all cameras that use the wireless network, and that are paired with the CamHi application and "have a certain type of unique identification number (UID)" are potentially vulnerable to a computer attack.

2- The configuration of the security camera.

Like most connected tools, cameras typically come with default passwords. Passwords that are defined by the manufacturer that are easily recognizable as the famous 00000 or admin. It is clear that the user needs to make a better configuration of these kinds of identification elements. Cyber criminals know very well that this kind of aspect is often overlooked by them, so they never hesitate to try on this point. Yet if they manage to gain access to your security camera thanks in particular to a default password, the consequences to be terrible for you for your privacy to the same professional.

When you decide to change the password, make sure you use combinations that are quite difficult to guess. Combinations that can explain both numbers and letters and capital letters. Clearly avoid birthdays, dog names etc. Also, make sure your camera always has the latest security updates. If possible, don't hesitate to activate the feature that allows you to install it automatically. Not only will security be improved, but you may have new features after an update. When using your cameras, turn off all the features you don't need at the moment. This reduces the risk of hacking.

In addition, the National Commission for Information Technology and Freedoms, with regard to the use of cameras, requires certain measures. For example, an owner is prohibited from using his camera to film the surroundings of his home. The authorized perimeter is the one limited to its property. Beyond these restrictions, the user will be able to see his liability incurred. There is, however, an exception in the matter. It is possible to use the cameras outside the perimeter of the property as long as the persons who might be affected by this surveillance are informed of the existence of these surveillance cameras. This can be done by posting a warning message, contract or official information. In addition, "when you use a surveillance company, for example for raising doubts in your absence or for recording the images from your cameras, take the time to read the contract proposed to you and check the commitments made by the company, including on the shelf life of the images and its security obligations. ».

Now access an unlimited number of passwords:

Check out our hacking software