Hacker v cracker
I know the old argument is pretty much moot this days but I really, really don't think the work "hacker" is appropriate here. What's wrong with "scum"?
Unscrupulous virus writers have inevitably latched onto the Chinese earthquake disaster, which killed more than 50,000, to punt malware. The Trojan-laced email attacks follow earlier phishing scams themed around the Sichuan province disaster. Emails with infected Word attachments contaminated by MalDoc-Fam Trojan are being …
It is not that hard to use cracker instead of hacker. Whenever I see hacker and something bad in headlines, I immediately think some bit of clever code went awry.
Inevitably it turns out to be someone cracking, though.
Yes, it is just takes a bit of effort to use the word cracker, and I think we can take the word hacker back. To get hacker back we use the word cracker more, until it seeps in.
The word cracker is more descriptive of the activity as well, we should also track down the first person who screwed it up publicly and give them a roasting, ironically it is probably going to turn out to be some hack :).
And, for a little payback we could take one of their interests and start to place a negative meaning around that word, use it to describe all manner of nefarious activities.
It is annoying not being able to convey that a hack is bit of clever code, that is not perhaps orthodox without someone thinking you are accusing them of unauthorized access.
The term hacker really is the wrong term to apply. Hackers have morals. Hackers break into systems and steal information, or post viral software to gather information, but true hackers would never dream of leaching off the back of other peoples misery caused by a global disaster.
Whoever started this scam is not a hacker by any stretch of the imagination. They are scum who does hackers a disservice and I would urge all real hackers to target the person who started this and take them down. They are a disgrace to humanity and in my eyes even the shit that I scrape off my size 11 new rock boots has more decency!!!
To all who have suffered and continue to suffer as a result of this disaster, my deepest sympathies go out to you.
To the scum who try to make money off the backs of other peoples suffering:
I HOPE YOU ROT IN HELL!!!
Threat researcher Joey Chen of Sentinel Labs says he's spotted a decade worth of cyber attacks he's happy to attribute to a single Chinese gang.
Chen has named the group Aoqin Dragon, says its goal is espionage, and that it prefers targets in Australia, Cambodia, Hong Kong, Singapore, and Vietnam.
The gang is fond of attacks that start by inducing users to open poisoned Word documents that install a backdoor – often a threat named Mongall or a modified version of the open source Heyoka project.
China should seize Taiwan to gain control of TSMC if the United States and its allies impose sanctions against the Middle Kingdom like those now in place against Russia, according to a prominent Chinese economist.
The move follows the suggestion last year out of the US that Taiwan should be prepared to destroy its semiconductor factories if China were to invade.
This latest development comes in a speech by Chen Wenling, chief economist for the China Center for International Economic Exchanges, delivered at the China-US Forum hosted by the Chongyang Institute for Financial Studies at Renmin University of China at the end of May. The text of the speech was posted to the Guancha (Observer) online news site.
The criminals behind the Emotet botnet – which rose to fame as a banking trojan before evolving into spamming and malware delivery – are now using it to target credit card information stored in the Chrome web browser.
Once the data – including the user's name, the card's numbers and expiration information – is exfiltrated, the malware will send it to command-and-control (C2) servers that are different than the one that the card stealer module uses, according to researchers with cybersecurity vendor Proofpoint's Threat Insight team.
The new card information module is the latest illustration of Emotet's Lazarus-like return. It's been more than a year since Europol and law enforcement from countries including the United States, the UK and Ukraine tore down the Emotet actors' infrastructure in January 2021 and – they hoped – put the malware threat to rest.
The botnet malware EnemyBot has added exploits to its arsenal, allowing it to infect and spread from enterprise-grade gear.
What's worse, EnemyBot's core source code, minus its exploits, can be found on GitHub, so any miscreant can use the malware to start crafting their own outbreaks of this software nasty.
The group behind EnemyBot is Keksec, a collection of experienced developers, also known as Nero and Freakout, that have been around since 2016 and have launched a number of Linux- and Windows-based bots capable of launching distributed denial-of-service (DDoS) attacks and possibly mining cryptocurrency. Securonix first wrote about EnemyBot in March.
A crew using malware that performs cryptomining and clipboard-hacking operations have made off with at least $1.7 million in stolen cryptocurrency.
The malware, dubbed Trojan.Clipminer, leverages the compute power of compromised systems to mine for cryptocurrency as well as identify crypto-wallet addresses in clipboard text and replace it to redirect transactions, according to researchers with Symantec's Threat Intelligence Team.
The first samples of the Windows malware appeared in January 2021 and began to accelerate in their spread the following month, the Symantec researchers wrote in a blog post this week. They also observed that there are several design similarities between Clipminer and KryptoCibule – another cryptomining trojan that, a few months before Clipminer hit the scene, was detected and written about by ESET analysts.
State-sponsored Chinese attackers are actively exploiting old vulnerabilities to "establish a broad network of compromised infrastructure" then using it to attack telcos and network services providers.
So say the United States National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI), which took the unusual step of issuing a joint advisory that warns allied governments, critical infrastructure operators, and private industry organizations to hurry up and fix their IT estates.
The advisory states that network devices are the target of this campaign and lists 16 flaws – some dating back to 2017 and none more recent than April 2021 – that the three agencies rate as the most frequently exploited.
Intezer security researcher Joakim Kennedy and the BlackBerry Threat Research and Intelligence Team have analyzed an unusual piece of Linux malware they say is unlike most seen before - it isn't a standalone executable file.
Dubbed Symbiote, the badware instead hijacks the environment variable (LD_PRELOAD) the dynamic linker uses to load a shared object library and soon infects every single running process.
The Intezer/BlackBerry team discovered Symbiote in November 2021, and said it appeared to have been written to target financial institutions in Latin America. Analysis of the Symbiote malware and its behavior suggest it may have been developed in Brazil.
Amazon.com has decided to end its Kindle digital book business in China.
A statement posted to the Kindle China WeChat account states that Amazon has already stopped sending new Kindle devices to resellers and will cease operations of the Kindle China e-bookstore on June 30, 2023. The Kindle app will last another year, allowing users to download previously purchased e-books. But after June 30, 2024, Kindle devices in China won’t be able to access content.
An accompanying FAQ doesn’t offer a reason for the decision, but an Amazon spokesperson told Reuters “We periodically evaluate our offerings and make adjustments, wherever we operate.”
Miscreants are reportedly exploiting the recently disclosed critical Windows Follina zero-day flaw to infect PCs with Qbot, thus aggressively expanding their reach.
The bot's operators are also working with the Black Basta gang to spread ransomware in yet another partnership in the underground world of cyber-crime, it is claimed.
This combination of Follina exploitation and its use to extort organizations makes the malware an even larger threat for enterprises. Qbot started off as a software nasty that raided people's online bank accounts, and evolved to snoop on user keystrokes and steal sensitive information from machines. It can also deliver other malware payloads, such as backdoors and ransomware, onto infected Windows systems, and forms a remote-controllable botnet.
Windows and Linux systems are coming under attack by new variants of the HelloXD ransomware that includes stronger encryption, improved obfuscation and an additional payload that enables threat groups to modify compromised systems, exfiltrate files and execute commands.
The new capabilities make the ransomware, first detected in November 2021 - and the developer behind it even more dangerous - according to researchers with Palo Alto Networks' Unit 42 threat intelligence group. Unit 42 said the HelloXD ransomware family is in its initial stages but it's working to track down the author.
"While the ransomware functionality is nothing new, during our research, following the lines, we found out the ransomware is most likely developed by a threat actor named x4k," the researchers wrote in a blog post.
Biting the hand that feeds IT © 1998–2022