HackDig : Dig high-quality web security articles for hackers

New Toolset Linked to Wiper Malware in Sony Hack, Finds Researchers

Researchers have discovered two new utilities that are closely associated with the wiper malware used to disrupt the computer networks of Sony Pictures Entertainment last year.After phishing for employees’ login information, the attackers responsible for the breach used a strain of wiper malware known as “Destover” to wipe the files off of
Publish At:2015-11-26 09:41 | Read:4318 | Comments:0 | Tags:Latest Security News Damballa destover hack malware Sony tim

Damballa revealed the secrets behind the Destover malware that infected the Sony Pictures

Security researchers at Damballa Willis McDonald and Loucif Kharouni have conducted a deep analysis of the Destover malware used in the Sony Pictures attack. Security researchers at Damballa Willis McDonald and Loucif Kharouni have conducted a deep analysis of the wiper used by threat actors in the Sony Pictures hack. The expe
Publish At:2015-11-23 11:10 | Read:5283 | Comments:0 | Tags:Breaking News Malware Cybercrime Damballa Destover malware S

North Korea Internet Restored Amid ‘Proportional Response’ Speculation

Ten hours after North Korea’s fragile and limited Internet connectivity disappeared on Monday, the isolated country was back online last night.While that much is certain, it’s still unknown who was behind the outage and why.Related PostsDHS Releases Destover Wiper Malware Indicators of CompromiseDecember 22, 2014 , 12:43 pmWhite House to Blame So
Publish At:2014-12-23 22:40 | Read:4774 | Comments:0 | Tags:Critical Infrastructure Hacks Arbor Networks China Unicom Cl

White House to Blame Sony Hack on North Korea

The United States government is expected to attribute the damaging and embarrassing hack of Sony Pictures Entertainment to the government of North Korea. Various mainstream media outlets quoting anonymous government sources said North Korea is “centrally involved” in the attack, which NBC News said was carried out by hackers outside the isolated
Publish At:2014-12-18 21:10 | Read:3994 | Comments:0 | Tags:Critical Infrastructure Government Hacks Cisco Talos DarkSeo

Hackers leak scripts, celebrity phones and aliases at Sony Pictures Entertainment

GOP released a new archive of Sony Pictures Entertainment confidential data including private information of employees, celebrity phone numbers, film scripts and many more. The Sony Pictures data breach is becoming a never ending history, the GOP is leaking company data and much more since the attack while security firms are p
Publish At:2014-12-11 00:45 | Read:4657 | Comments:0 | Tags:Cyber Crime Security Cybercrime data breach data leakage Des

Sony Digital Certs Being Used To Sign Malware

So at the end of November, Sony got owned, owned REAL bad – we wrote about it here: Sony Pictures Hacked – Employee Details & Movies Leaked. It seems in as a part of the massive haul of documents, the digital certificates used to sign software were also stolen.Which is bad, as you can imagine. Not SSL certs, but software crypto-certs that verify t
Publish At:2014-12-10 16:40 | Read:3373 | Comments:0 | Tags:Cryptography Malware cert revoked destover signed malware so

Stolen Sony certificates used to digitally sign Destover Malware

Security experts at Kaspersky Lab have detected a strain of Destover Malware that has been digitally signed with the certificates stolen during Sony attack. Security experts have detected a new strain of the Destover malware that was used in the recent Sony Pictures Entertainment breaches characterized by a singular feature, t
Publish At:2014-12-10 11:15 | Read:4097 | Comments:0 | Tags:Cyber Crime Malware Cybercrime Destover Digital Certificate

New Version of Destover Malware Signed by Stolen Sony Certificate

Researchers have discovered a new version of the Destover malware that was used in the recent Sony Pictures Entertainment breaches, and in an ironic twist, the sample is signed by a legitimate certificate stolen from Sony.The new sample is essentially identical to an earlier version of Destover that was not signed. Destover has been used in a variety of atta
Publish At:2014-12-09 21:05 | Read:9045 | Comments:0 | Tags:Cryptography Malware Web Security data breach Destover malwa


Tag Cloud