#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Chinese hacker targeting Indian government and Tibetan activists Sites

Chinese hacker targeting Indian government and Tibetan activists Sites

Apr 01, 2012
Chinese hacker targeting Indian government and Tibetan activists Sites Websites of Indian government and Tibetan activists in the country are under attack in a cyber attack campaign engineered by a Chinese hacker, working with one of the world's largest e-tailers Tencent. The cyber criminal in question is Gu Kaiyuan, once a graduate student at a Chinese university that receives government financial support for its computer security program and currently an employee at Chinese portal Tencent. Before Kaiyuan initiated the exploits, collectively called the Luckycat campaign , he was involved in recruiting students for his school's computer security and defense research. The Luckycat cyber campaign, has been linked to 90 attacks in recent past against targets in India and Japan, as well as against Tibetan activists, said the report released by the Japanese network security firm. 'Luckycat' has been able to compromise about 233 computers many of which are in India. A report...
Android Malware as Beware of Chinese called "The Roar of the Pharaoh"

Android Malware as Beware of Chinese called "The Roar of the Pharaoh"

Apr 01, 2012
Android Malware as Chinese game " The Roar of the Pharaoh " Security researchers have spotted a bogus Chinese game, that's actually a trojan horse gathering sensitive information from infected devices, next to sending premium-rate SMS messages. It is Chinese game that is original with its rights but on Android it is a fake application that inherits malware Trojan to steal important information from your cell phone. The malware works after an unknowing Android handset owner installs the app, allowing the malware to collect data, such as phone number, IMEI number, phone model, screen size and platform, and recording the OS version and platform used for sending via SMS to the Trojan's authors. But it also noted the new Trojan is unusual as it does not ask for any specific permissions during installation, which is often an indicator an application is up to no good.It added the malware masquerades as a service called " GameUpdateService " a very plausible name for a ...
U.S. Ambassador claim to be hacked by Russians

U.S. Ambassador claim to be hacked by Russians

Apr 01, 2012
U.S. Ambassador claim to be hacked by Russians Michael McFaul, the U.S. ambassador to Russia, took to Twitter Thursday night to accuse Russian media organization NTV of hacking his cell phone and email account. " I respect the right of the press to go anywhere & ask any question. But do they have a right to read my email and listen to my phone? " he tweeted this afternoon. when McFaul arrived for a meeting with the group For Human Rights today, reporters from state-owned NTV began peppering him with questions that kept him on the freezing street without a coat." Everywhere I go NTV is there. Wonder who gives them my calendar? They wouldn't tell me. Wonder what the laws are here for such things? " McFaul tweeted. Russian news agencies said NTV dismissed McFaul's complaint, and officials at the station, which is owned by Gazprom, the state-controlled monopoly, said they have a network of informants who provide them with information. Mr McFaul suggested the television reporters ...
cyber security

Blue Report 2025: 46% of Environments Had Cracked Passwords

websitePicus SecurityThreat Exposure Management
Credential cracking increased 2X in 2025. See exactly how attackers breach passwords and stop them early.
cyber security

Reduce Your Missing Controls by 89%

websitePreludeExposure Management / Endpoint security
Monitor and alert on misconfigurations and missing controls like EDR and MFA during your free trial of Prelude.
DKFBootKit - First Android BootKit Malware

DKFBootKit - First Android BootKit Malware

Mar 30, 2012
DKFBootKit - First Android BootKit Malware NQ Mobile Security Research Center has recently uncovered a new malware DKFBootKit. This malware is identified when monitoring and analyzing the evolution of earlier DroidKungFu variants. What sets DKFBootKit apart from malware like DroidDream, is that DKFBootKit replaces certain boot processes and can begin running even before the system is completely booted up. DKFBootKit repackages legitimate apps by enclosing its own malicious payloads in them. However, the victim apps it chooses to infect are utility apps which require the root privilege to work properly. NQ says the malicious code has already infected 1,657 Android devices in the past two weeks and has appeared on at least 50 different mobile apps. These apps seem to have legitimate reasons to request root privilege for their own functionality. It is also reasonable to believe that users will likely grant the root privilege to these apps. DKFBootKit makes use of the grant...
Twitter Takes Tweetdeck Offline due to Vulnerability

Twitter Takes Tweetdeck Offline due to Vulnerability

Mar 30, 2012
Twitter Takes Tweetdeck Offline due to Vulnerability Twitter has taken its Tweetdeck app offline after an apparent bug has possibly given some Tweetdeck users access to others' accounts. The web version of Tweetdeck is currently down , although older desktop editions of the software appear to continue to receive and send Tweets at the moment, and can still log out and back in. A Sydney, Australia-based Tweetdeck user named Geoff Evason says he discovered today he was somehow able to access hundreds of other accounts through Tweetdeck . " I'm a tweetdeck user. A bug has given me access to hundreds of twitter and facebooks account through tweetdeck. I didn't do anything special to make this happen. I just logged in one day, the account was was slower than normal, and I could post from many more accounts. " And demonstrated that he could access another account by sending Tweet . Other accounts may well be affected, as Twitter quickly shut off access to Tweetdeck entirel...
Your Xbox 360 credit card details Vulnerable to Hack

Your Xbox 360 credit card details Vulnerable to Hack

Mar 30, 2012
Your Xbox 360 credit card details Vulnerable to Hack It has been discovered by researchers at Philadelphia's Drexel University, that credit card data on older Xbox 360 systems that have been traded in or sold on. Hackers can now retrieve personal information from refurbished Xbox consoles, suggesting consumers exercise more caution with their electronic devices. " Anyone can freely download a lot of this software, essentially pick up a discarded game console, and have someone's identity ," said researcher Ashley Podhradsky. The team has discovered that even restoring your console to factory settings won't remove some of the data stored on the Xbox 360. " Xbox is not designed to store credit card data locally on the console, and as such seems unlikely credit card data was recovered by the method described. Additionally, when Microsoft refurbishes used consoles we have processes in place to wipe the local hard drives of any other user data. We can assure Xbox own...
#GlobalRevolution : Chinese Government sites defaced by Anonymous China

#GlobalRevolution : Chinese Government sites defaced by Anonymous China

Mar 30, 2012
Chinese Government sites defaced by Anonymous China @AnonymousChina Hackers taking down and defacing various Chinese government web sites. Hack is the part of operation #GlobalRevolution by Anonymous. The page is like other defacements with ASCII text, a message to the government in question and other Anonymous trademarks. This defacement is far more entertaining than past hacks, however, because they autoplay The Who's classic song Baba O'Riley. Also it have one Chinese phrase, "患难见真情." According to Google Translate, it means " A friend in need is a friend indeed ." Deface sites include :  https://www.qnwqdj.gov.cn/ https://www.dzwqb.gov.cn/ https://www.bbdj.gov.cn/ https://tygtzy.gov.cn/index.php And with this, Hackers also leak the database info of https://www.wnpop.gov.cn/ and https://www.meda.gov.cn. Leaks are posted on Pastebin 1 and 2 .
Expert Insights Articles Videos
Cybersecurity Resources
//]]>