The case of Hacker group "Humpty Dumpty" will be considered on July 31

The Moscow metropolis court docket on July 31 will think about legal case in opposition to 2 members of hacker group “Humpty Dumpty” (or Shaltai-Boltai).

The lawyer of hackers Natalia Zemskova mentioned that the case is marked “labeled”. So, the case might be thought of with out the participation of the viewers.

“Our place didn’t change, my shoppers Filinov and Teplyakov didn’t plead responsible,” mentioned Zemskova.

Teplyakov and Filinov are accused of unlawful entry to pc data in an organized group for remuneration (Legal Code, p. three, artwork. 272).

As a reminder, in 2013-2016 hacker group carried out unlawful entry to protected pc data of residents of the Russian Federation and offered it by Web. The chief of the hacker group Vladimir Anikeev pleaded responsible and took a plea deal. The Moscow metropolis court docket given him two years in a Common regime colony.

In the meantime, three different hackers, alleged members of the “Humpty Dumpty” are wished by the regulation.

– Christina

from E Hacking Information – Newest Hacker Information and IT Safety Information
by way of IFTTT

قالب وردپرس

Hackers steal $8 Million of Ethereum

(pc-Google Photos)

Hackers struck the Ethereum platform stealing greater than $eight million value of cryptocurrency within the second Preliminary Coin Providing (ICO) heist.

An ICO is an unregulated technique of crowdfunding wherein cryptocoins – or future cryptocurrencies – are issued in change for bitcoin or different present cryptocurrencies.

Final week, $32 million value of Ether cryptocurrency was stolen when hackers gained entry to the Ethereum community and attacked three separate firm accounts.

The agency’s founder, Reggie Middleton stated, “We had been hacked, presumably by a bunch. The hack gave the impression to be very refined, however there’s a minimum of one company companion which will have dropped the ball and be liable.”

“On the finish of the day, the quantity stolen was minuscule (lower than 00.07 %), though the greenback quantity was fairly materials,” he added. “There are 100 million tokens issued, the hackers stole about 37,00zero. As I stated, it’s fairly disconcerting, however it’s not the tip of the world.”

from E Hacking Information – Newest Hacker Information and IT Safety Information
by way of IFTTT

قالب وردپرس

Over 6 million computers in Moscow are infected with Cryptocurrency Mining Virus

In Moscow about 30 % of all computer systems are contaminated with a virus, which permits covertly mining bitcoins.

Herman Klimenko, adviser of the Russian President on Web growth, stated that these days that is the most typical and most harmful virus. There are about 20 million computer systems in Moscow, of these, 20-30 % are contaminated.

Klimenko famous that the organizers of such schema earn cash by “rental” capability of contaminated computer systems for processing Cryptocurrency funds.

As a reminder, on July 21, researchers found commercial botnet Stantinko, which had so many victims from Russia and Ukraine. To start with of the month the specialists of “Kaspersky Lab” noticed the huge unfold of the virus Xafekopy, which despatched subscription request on paid companies from sufferer’s telephone.

“We do not need details about all computer systems in Moscow and Russia, we are able to solely speak about our customers, 6% of them had been attacked in 2017 with the purpose of putting in” miners “(Cryptocurrency), which makes it fairly frequent kind of malicious packages,” Antonov Ivanov, an antivirus skilled at Kaspersky Lab, quotes the native press.

– Chrisitna

قالب وردپرس

New CowerSnail Windows Backdoor linked to SHELLBIND SambaCry Linux Malware

Safety specialists at Kaspersky Lab have noticed a brand new Home windows Backdoor dubbed CowerSnail linked to the lately found SHELLBIND SambaCry Linux malware.
SHELLBIND has contaminated most network-attached storage (NAS) home equipment, it exploits the Samba vulnerability (often known as SambaCry and EternalRed) to add a shared library to a writable share, after which trigger the server to load that library.
This trick permits a distant attacker to execute arbitrary code on the focused system.
SHELLBIND and the Backdoor.Win32.CowerSnail shares the command and management (C&C) server (
“We lately reported about SambaCry, a brand new household of Linux Trojans exploiting a vulnerability within the Samba protocol. Every week later, Kaspersky Lab analysts managed to detect a trojan horse for Home windows that was apparently created by the identical group liable for SambaCry.” states Kaspersky.  “It was the widespread C&C server that each packages used – – that instructed a relationship between them.”
The CowerSnail backdoor was developed utilizing the cross-platform improvement framework Qt, a design selection to permit speedy migration of the malicious code developed for Unix platform to a Home windows setting.
SambaCry was designed for *nix-based programs, in the meantime, CowerSnail was written utilizing Qt as a result of the writer didn’t need to go into the small print of WinAPI and migrated the code the *nix code “as is”.
Alternatively, whereas it does make it simpler to switch code between platforms, Qt considerably will increase the dimensions of the ensuing file.
The downside in utilizing Qt is the growing of the dimensions of the ensuing file.
“This framework offers advantages equivalent to cross-platform functionality and transferability of the supply code between totally different working programs. This, nonetheless, has an impact on the ensuing file measurement: the consumer code finally ends up as a small proportion of a giant three MB file.” continues Kaspersky.
CowerSnail first escalates the method precedence and the present thread’s precedence, then it begins speaking with its Command & Management server by way of the IRC protocol.
CowerSnail implements basic backdoor options, it will possibly accumulate details about the contaminated system (Timestamp, Put in OS sort (e.g. Home windows), OS nameHost title, Details about community interfaces, ABI Core processor structure
Details about bodily reminiscence), it will possibly execute instructions, set up or uninstall itself as a service, and obtain updates.
The specialists imagine that the identical menace actor has developed the 2 Trojans, every designed for a selected goal.
“After creating two separate Trojans, every designed for a selected platform and every with its personal peculiarities, it’s extremely possible that this group will produce extra malware sooner or later,” concluded Kaspersky Lab.

قالب وردپرس