hackers

  1. Carding Forum

    Hackers found a way to bypass SmartScreen protection

    The eliminated vulnerability became a channel for penetration into systems. Cybercriminals report that hackers have found a way to bypass Microsoft's SmartScreen protection to spread malware to users ' devices. A vulnerability in SmartScreen allows you to enter the system through Windows...
  2. Carding Forum

    CloudSorcerer: Hackers spy on Russian officials via Microsoft Graph, Yandex Cloud and Dropbox

    Government agencies are facing a sophisticated cloud attack. In May 2024, Russian government organizations faced a new, particularly complex cyberattack, which experts dubbed CloudSorcerer. This powerful cyber espionage tool is designed to discreetly monitor, collect, and display data through...
  3. Carding Forum

    Brute Ratel hacked: Hackers gained access to a powerful cyberwar tool

    Specialized software is now available to everyone without an activation key. An activator for the current version of the Brute Ratel C4 (BRC4) post-exploitation tool has surfaced in the cybercrime community. This was announced on the second of July in his account on the social network X* by a...
  4. Carding Forum

    Ghost code: how hackers use the V8 engine to bypass detection

    Check Point reveals the multi-level tactics of cybercriminals. Check Point has conducted a detailed investigation into the use of the V8 compiled JavaScript engine by attackers. A method exploited by hackers allows you to compile JavaScript into low-level bytecode. This technique helps to hide...
  5. Carding Forum

    Hackers Pink Drainer suffered from "poisoning" of the address

    A group of "drainers" of Pink Drainer wallets has become a victim of fraud with "poisoning" of the address. The incident, which occurred on June 27, drew the attention of analysts of the MistTrack platform. According to them, the hackers sent 10 ETH worth about $30,000 to a fake address that...
  6. Carding Forum

    Hackers Hack Ticketmaster, Now Selling 560 Million Customers Data

    The hacker group ShinyHunters has put the customer database of the American ticketing service Ticketmaster up for sale. Its volume is 560 million records, including names, addresses and partial payment details. Ticketmaster itself has not yet confirmed the fact that its systems were hacked...
  7. Carding Forum

    440,000 Taylor Swift concert tickets stolen by hackers

    The damage from the compromise is estimated at an insane $ 22 billion. At the end of May, we wrote about the hacking of Ticketmaster, in which hackers managed to steal 1.3 TB of company data. As it turned out later, the intermediary company that worked with sensitive information, Snowflake, was...
  8. Carding Forum

    Ctrl+Alt+Cancer: Hackers robbed patient of breast

    How the cyberattack changed the course of the operation. In May 2024, Synnovis, a company that provides pathology services to London hospitals, was attacked by ransomware. This led to the cancellation of about 1,500 medical procedures in the largest medical institutions in the British capital...
  9. Carding Forum

    Cryptographic keys were powerless before the savvy hackers

    Recently, many online services, such as banks, online stores, social networks, and software development platforms, have started using Passkey technology to protect their accounts instead of traditional passwords. Passkey is an authentication technology based on cryptographic keys stored on the...
  10. Tomcat

    Velvet Ant: Chinese hackers have been living on someone else's network for 3 years

    Outdated F5 BIG-IP devices helped cyber-vampires secretly suck out corporate data. The cyberattack, which lasted about three years, was recorded in the networks of one of the organizations in East Asia. Presumably, a Chinese cyber espionage group is behind it, which used outdated F5 BIG-IP...
  11. Tomcat

    Rapid Reset: hackers found a way to make the most powerful DDoS attacks

    The ease of operation of CVE-2023-44487 makes it a high-priority target for cybercriminals. In August 2023, a critical vulnerability in the HTTP/2 protocol, known as CVE-2023-44487 or Rapid Reset, was identified. This vulnerability, which can cause denial-of-service (DoS) attacks, has become a...
  12. Tomcat

    Windows Error Reporting: A Useful Feature or a Hidden Hole for Hackers

    Experts believe that CVE-2024-26169 could have been exploited for a long time as a 0day vulnerability. Symantec researchers have found that attackers associated with the Black Basta ransomware were likely exploiting a newly discovered vulnerability in the Windows Error Reporting (WER) service...
  13. Tomcat

    Cyber police have exposed an attacker who helped Russian hackers attack businesses in the Netherlands and Belgium

    Cyber police and National Police investigators have identified a resident of Kiev who, at the request of members of a Russian hacker group, disguised an encryption virus under the guise of secure files. Russian hackers used a hidden program to interfere with the operation of computer networks of...
  14. Tomcat

    Hackers are actively "digging" in the brains of the Mali graphics chip

    Smartphones under the gun, representatives of ARM recommend not to delay the update. The British company Arm reported a security vulnerability in the core driver of the Mali graphics chip, which is already actively used by attackers. The issue, identified as CVE-2024-4610, is related to memory...
  15. Tomcat

    Hackers attacked Cleveland: important city facilities, including the city Hall, were disabled

    The investigation is underway, and citizens are waiting for the systems to be restored. The American city of Cleveland, Ohio, this week faced a cyberattack that forced the shutdown of a number of important public services, including government offices and institutions in the Erieview * complex...
  16. Tomcat

    In the US, they decided to troll hackers hiding in Russia

    Psychological pressure has become one of the cornerstones in the prosecution of Russian cybercriminals. According to Wired, the US security forces and special services are forced to resort to remote trolling due to the fact that otherwise they simply cannot influence hackers hidden in Russia...
  17. Tomcat

    "We know where your director lives": ransomware hackers use harsh methods of terror

    Sites of Shame and the Countdown: How cybercriminals put pressure on victims. More and more often, people who go on their usual daily tasks - to school, hospital or pharmacy-are faced with non-working computer systems. Criminal groups from different parts of the world are often behind these...
  18. Tomcat

    Niconico offline: hackers broke into Japan's largest video hosting service

    Millions of users of the country were left without their favorite service. Niconico, one of the largest video hosting companies in Japan, has temporarily suspended its services due to a large-scale cyberattack. The incident occurred on Saturday, which forced the company to take measures to...
  19. Tomcat

    The French talked about how carders break bank chip-and-pin cards

    French researchers from the École Normale Supérieure (Ecole Normale Supérieure) have published details of their investigation into the 2011 incident. Then a group of hackers managed to steal more than $680,000 from users of French banks by deceiving the security system of EMV bank cards...
  20. Tomcat

    A future without hackers: AI hackers are becoming a new threat

    The AI team found 87% of critical vulnerabilities using CVE lists. Researchers were able to successfully hack more than half of the tested websites using autonomous GPT-4-based bot commands. These bots coordinated their actions and created new bots as needed, exploiting previously unknown...
Top