Breaking News »

Latest Hacking News

$50 million of digital money stolen

A hacker has stolen more than $50 million of digital money  from an experimental virtual currency project, known as the Decentralized Autonomous Organization.

It had been the most successful crowdfunding venture ever. According to the reports, it took one-third of the venture's money but also the hopes and dreams of thousands of participants who wanted to prove the safety and security of digital currency.

After all, this it is likely an end of the project, which had raised $160 million in the form of Ether, an alternative to the digital currency Bitcoin.

However,  the computer scientists involved in the project are aiming to tweak the code that underpins Ether in a way that will recover the money.

"This is one of the nightmare scenarios everyone was worried about: someone exploited a weakness in the code of the DAO to empty out a large sum," Emin Gün Sirer, a computer science professor at Cornell who co-wrote a paper pointing out problems with the project, said.

This incident has reminded everyone of how the code can be just as vulnerable to human greed and mistakes as paper bills.

The project was funded by investors from around the world using Ether, which has become popular over the last year. But in May, computer scientists pointed out several vulnerabilities in its codes.

"The DAO is being attacked," Griff Green, a community organiser with the company that wrote the project's software,, wrote on a chat channel for the project. "This is not a drill."

The money that the hacker moved appeared to be frozen on Friday as a result of a safeguard previously built into the code. Coders working on the Ethereum network, which hosts Ether, were debating on whether to make a one-time change to the code to recover the frozen money.

"The strength of blockchain tech is that it is a ledger, a statement of truth," Bruce Fenton, a board member with the Bitcoin Foundation, wrote on Friday. "That ledger is only as good as its resistance to censorship, change, demands or attack."

Lone Hacker Guccifer 2.0 Takes Responsibilty For DNC Cyber Attack

(pc-google images)
A lone hacker known as Guccifer 2.0 has claimed the sole responsibility for the for a cyber attack on the U.S. Democratic National Committee, revealing a series of documents allegedly extracted from DNC servers. This contradicts the initial DNC reports that Russia was behind the attack.

Guccifer 2.0 posted several confidential files on a Wordpress blog as well as claimed to have sent "thousands of files and mails" to Wikileaks which he says will "publish them soon."After an evident opposition file containing research on Donald Trump leaked earlier this week, Guccifer 2.0 has followed it up with alleged financial information on the Democratic Party and its donors.

The hack was initially reported to be the work of the Russian government agencies on Tuesday by CrowdStrike, the cybersecurity firm hired by the DNC to investigate the data breach.

In the post, Guccifer 2 has mocked the cybersecurity firm saying that, "CrowdStrike announced that the Democratic National Committee (DNC) servers had been hacked by 'sophisticated' hacker groups. I'm very pleased the company appreciated my skills so highly))) But in fact, it was easy, very easy."

CrowdStrike is standing by its analysis that it was Russian government hackers. It had posted earlier stating: "On June 15, 2016 a blog post to a WordPress site authored by an individual using the moniker Guccifer 2.0 claiming credit for breaching the Democratic National Committee. This blog post presents documents alleged to have originated from the DNC.”

"Whether or not this posting is part of a Russian Intelligence disinformation campaign, we are exploring the documents' authenticity and origin. Regardless, these claims do nothing to lessen our findings relating to the Russian government's involvement, portions of which we have documented for the public and the greater security community."

Russian hackers attack DNC, steal Trump’s files

Russian government hackers broke into the servers of the Democratic National Committee and stole a massive trove of data, including all opposition research into GOP presidential candidate Donald Trump and almost a year's worth of private e-mail and chat messages, according to committee officials and security experts who responded to the breach on Tuesday (June 14).

Researchers with Crowdstrike, the security firm DNC officials hired to investigate and contain the breach, determined the intrusions were carried out by two separate hacker groups that both worked for the Russian military intelligence organization. One, dubbed Cozy Bear, gained access last summer and has been monitoring committee members' e-mail and chat communications. The other is known as Fancy Bear and is believed to have broken into the network in late April. It was the latter intrusion that obtained the entire database of Trump opposition and later tipped off IT team members the network may have been breached.

The U.S. government, however, has not yet determined that the hackers who breached the server are connected to the Russian government.

According to Crowdstrike, Cozy Bear was the same group that in 2014 successfully infiltrated unclassified networks used by the White House, the State Department, and the Joint Chiefs of Staff. They reportedly have also hacked numerous corporations and businesses in the defense, energy, manufacturing and other industries. Fancy Bear has been in operation since 2000.

The networks of presidential candidate Hillary Clinton was also targeted by Russian spies, as were the computers of some Republican political action committees. But details on those cases were not available.

The hackers who penetrated the DNC network were expelled last weekend in a major computer cleanup campaign. No financial, donor or personal information appears to have been taken, leaving analysts to suspect the breach was a case of traditional espionage and not the work of criminal hackers.

CrowdStrike said analysts still aren't sure how the intruders gained access. Suspicions are being raised that they targeted DNC employees with spearphishing e-mails that appeared to come from known and trusted people that contained malicious links or attachments.Researchers with security firm Palo Alto Networks said that a Russian hacking group it calls Sofacy sent an unnamed US government agency spearphishing e-mails that appeared to come directly from the compromised account belonging to the Ministry of Foreign Affairs of another government.

The government is usually hesitant to publicly blame another government for a cyberattack and opts to usually remain silent, concerned of the geopolitical consequences and waiting for strong enough evidence that it might hold up in court.

It's not the first time that hackers have targeted major figures in a US presidential election. In 2008, both computer systems for both the Obama and McCain campaigns were reportedly victims of a sophisticated attack by a then unknown foreign entity. The two hacking groups identified by CrowdStrike didn't appear to work together or to coordinate their attacks.

Any U.S. election is of intense interest to overseas governments, and Trump's candidacy has especially raised his relationship with Russia throughout the campaign. He has at times spoken admiringly of Russian President Vladimir Putin, and some of his foreign policies have drawn praise in Moscow, despite the country's chilly relationship with the U.S.

The intrusions are an example of Russia’s interest in the U.S. political system and its desire to understand the policies, strengths and weaknesses of a potential future president.

Wendy's POS breach 'much bigger' than first reported

American fast food chain Wendy’s has admitted that the data breach affecting the company reported last month was a lot bigger than what was said.

(pc-google images)
The Wendy’s breach came into light last month after the company began investigating unusual activity involving customer credit cards in January this year.

“Based on the preliminary findings of the previously-disclosed investigation, the Company reported on May 11 that malware had been discovered on the point of sale (POS) system at fewer than 300 franchised North America Wendy’s restaurants,” Wendy’s stated.  "An additional 50 franchise restaurants were also suspected of experiencing, or had been found to have, other cybersecurity issues."

Wendy's has described the breach as “extremely difficult to detect,” uploaded via a remote access tool to a second POS system that was not previously known to be infected.

The Company believes this series of cybersecurity attacks resulted from certain service providers’ remote access credentials being compromised, allowing access to the POS system in certain franchise restaurants serviced by those providers.

After detecting the malware, the Company has already disabled it in all franchise restaurants where it has been discovered, and continues to work aggressively with its experts and federal law enforcement to continue its investigation.

Vulnerability »

Malware Report »

Defacements »

Spam Report »