Tag Archives | Ransomware




South Korean Webhost Nayana Pays USD1 Million Ransom

So far this Nayana payout is the biggest ransomware payment I’ve seen reported, there’s probably some bigger ones been paid but kept undercover. Certainly a good deal for the bad actors in this play, and well using an outdated Kernel along with PHP and Apache versions from 2006 you can’t feel too sorry for Nayana. […]

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware | Add a Comment

WannaCry Ransomware Foiled By Domain Killswitch

Whilst I was away on a tropical island enjoying myself the Infosec Internet was on fire with news of the global WannaCry ransomware threat which showed up in the UK NHS and was spreading across 74 different countries. The Ransomware seems to be the first that is P2P using an SMB exploit from the NSA […]

Tags: , , , , , , , , ,

Posted in: Cryptography, Exploits/Vulnerabilities, Malware | Add a Comment

MongoDB Ransack – Over 33,000 Databases Hacked

Ah our favourite database in the news again, being hailed as the MongoDB Ransack a whole bunch of people have turned the insecure MongoDB default configuration into a ransom opportunity. They are deleting/stealing databases and soliciting bitcoin payments to return the data. With multiple actors doing the same stuff though it’s hard to know who […]

Tags: , , , , , , , , ,

Posted in: Database Hacking, Privacy | Add a Comment

Mac OS X Ransomware KeRanger Is Linux Encoder Trojan

So there’s been a fair bit of noise this past week about the Mac OS X Ransomware, the first of its’ kind called KeRanger. It also happens to be the first popular Mac malware of any form for some time. It’s also a lesson to all the Apple fanbois that their OS is not impervious […]

Tags: , , , , , , , , , ,

Posted in: Apple, Malware | Add a Comment

FBI Recommends Crypto Ransomware Victims Just Pay

Crypto ransomware is a type of malware that holds you ransom by encrypting your files and has been around for a while, but the FBI recently said at a cyber security summit that they advise companies that fall victim just to pay. Such malware tends to use pretty strong encryption algorithms like RSA-2048, which you […]

Tags: , , , , , , , ,

Posted in: Malware | Add a Comment

Hacking Your Fridge – Internet of Things Security

So one of the latest fads is IoT or the Internet of things phenomena which has been talked about for a while (especially since the discussion of IPv6 started), IoT is connecting physical items to the Internet and giving them some kind of IP (be in NAT or a proper IPv6 address). This enabled you […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

Malicious Cryptography – Cryptology & Cryptovirology

I know this maybe old news for some of you, however, I just got the chance of reading this great article on Security Focus (it’s been 2 weeks since I add it to my Favorites) This two part article discusses some good points of Cryptology, more precisely in the field of Cryptovirology. Writing a virus […]

Tags: , , , , , , ,

Posted in: Cryptography, Malware | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · pen-testing · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·