This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.” How did GhostShell avoid arrest for so many years? Was his OpSec that good, or is Romanian law enforcement a bit uninterested? We asked him how it is that he was never identified or arrested. On one…
Search Results for: Ukraine
Operation Wrath takes aim at Russia (updated)
Seen on haveibeenpwned.com: 1,476,783 accounts dumped: In February 2016, the Russian portal and email service KM.RU was the target of an attack which was consequently detailed on Reddit. Allegedly protesting “the foreign policy of Russia in regards to Ukraine”, KM.RU was one of several Russian sites in the breach and impacted almost 1.5M accounts including sensitive personal information….
Congress Looking at Potential Energy-Sector Cybersecurity and Privacy Reform
C. Kyle Simpson and Jared Bomberg write: Energy-sector cybersecurity and privacy is generating significant attention of late. Last month, the Federal Energy Regulatory Commission issued a final rule creating new standards for the cybersecurity of the electric grid. FERC followed this issuance with a report on electrical grid recovery and restoration planning that makes a number of recommendations for…
Mystery Remains of Who Had Fingers on Keyboard in JPMorgan Hack
Michael Riley and Chris Strohm report: A key figure is missing in the court documents outlining the biggest computer attack ever of the U.S. financial system: the actual hacker. The Israeli mastermind of the crime syndicate with global operations — computer servers in Egypt, online casinos in Ukraine and Hungary, Azerbaijan payment processors and a…
Russia ‘tried to hack MH17 inquiry system’
Phys.org reports: Russian spies likely tried to hack into the Dutch Safety Board’s computer systems to access a sensitive final report into the shooting down of flight MH17 over Ukraine, experts said Friday. The cyberattacks were revealed by security experts Trend Micro which blamed a shadowy group dubbed Operation Pawn Storm, “an active economic and…
Bugat Botnet Administrator Arrested and Malware Disabled
A sophisticated malware package designed to steal banking and other credentials from infected computers has been disrupted, and charges have been filed in the Western District of Pennsylvania against a Moldovan administrator of the botnet known as “Bugat,” “Cridex” or “Dridex.” Actions taken by the U.K. and the U.S. substantially disrupted the botnet. Andrey Ghinkul, aka Andrei Ghincul and Smilex, 30, of…