Monday, January 20, 2025
Home Blog Page 43

Ukraine is Building an “IT army of volunteers”, Something That’s Never Been Tried Before

0

Ukraine has created what is described as an “IT army” to defend against Russian hackers and to launch counter operations against cyber threats.

Russia’s invasion of Ukraine has been accompanied by cyberattacks targeting the country’s services and infrastructure, including DDoS attacks and destructive wiper malware campaigns – leading to the Ukrainian government calling for volunteers to aid with cybersecurity. But it has also asked for support in conducting offensive cyber operations back towards Russia.

“We are creating an IT army,” Mykhailo Fedorov, vice prime minister of Ukraine said in a tweet at the weekend. “There will be tasks for everyone. We continue to fight on the cyber front. The first task is on the channel for cyber specialists,” he added, alongside a Telegram link to join the ‘IT Army of Ukraine’, which now has tens of thousands of subscribers.

In addition to helping to protect Ukrainian critical infrastructure and services from attacks, supporters were provided with a list of websites of 31 Russian targets.

They include organisations in both the state-backed and private sectors, including government agencies, banks, critical infrastructure and energy providers, including Gazprom and Lukoil, as well Russian email provider and search engine, Yandex. The list of targets is also being circulated in some underground forums.

This IT army is just one of the online efforts taking place during the conflict; hacktivist collective Anonymous has said it is taking action in support of Ukraine and against Russia, while Russia-based cyber-criminal groups have also indicated that they’ll take offensive action in support of Vladimir Putin’s invasion.

This includes the ransomware group Conti, which announced “full support of Russian government” and the intention to “strike back at the critical infrastructure of an enemy” in response to cyberattacks against Russia. A later statement by Conti claimed it doesn’t support any government, but it will strike back against the West and “American cyber aggression”. Conti has since seen many of its internal documents leaked in what appears to be another act of retaliation. Meanwhile, the BBC has also reported how Russian hackers – without direct orders from the state – are also attempting to hack Ukrainian websites and services.

According to analysis by Check Point, there’s a 196% increase in cyberattacks targeting Ukraine’s government and military since Russia sent troops in last week. It’s likely that cyberattacks will continue in both directions, particularly as more and more people join Ukraine’s cyber army.

“We’re now witnessing a concentrated attack to take down major websites and services in Russia and other surrounding countries, much like a community-driven effort. They have to deal with waves of DDoS attacks that are likely to worsen as time goes by,” says Silviu Stahie, a security analyst at Bitdefender.

It’s much too early to understand the impact of any of these developments. Something on the scale of Ukraine’s IT army has never been tried before, so it’s hard to know what kind of impact it will have, although it may play an important part simply in rallying support in broader terms. 

There’s also the concern that civilians launching their own hacking attempts could have unexpected consequences. And the rise of offensive cyberattacks carried out by civilians raises a whole host of new questions – particularly as, in many countries, engaging in hacking is illegal.

“Conducting or participating in cyberattacks, even in what could be considered a noble effort to support Ukraine against the Russian aggression and invasion, could be subject to how different countries interpret hacking laws,” says Jens Monrad, head of threat intelligence, EMEA, at Mandiant.

“Another risk associated with this operation is how well each individual can protect themselves and how Russia might perceive it if they identify a foreign person suddenly hacking Russian targets,” says Monrad.

There’s also the risk that cyberattacks, intentionally or not, could cause disruption outside Ukraine and Russia. 

As UK National Cyber Security Centre (NCSC) CEO Lindy Cameron commented recently: “Cyberattacks do not respect geographic boundaries”. International consensus also suggests the Russian military was behind the widespread and disruptive NotPetya malware attack of June 2017. The malware attack was designed to disrupt financial, energy and government sectors in Ukraine, but the malware spread to organisations around the world, costing an estimated billions of dollars in damages.

“As a combat veteran, I’m in total awe of the courage of the Ukrainian people. While there are no specific threats to the US, we must be prepared for spillover effects of Russian cyber ops or an uptick in ransomware,” Jen Easterly, director of the Cybersecurity and Infrastructure Security Agency (CISA), said on Twitter.

CISA, along with the UK’s NCSC, are among those cybersecurity agencies that have published advice on defending against cyber threats. In this environment, organisations around the world would be wise to examine their cybersecurity defences – because what comes next could be unpredictable. 

source

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Beware of Charity Scams Exploiting War In Ukraine

0

Times of crisis may bring out the best in you, but they also have a way of bringing out the worst in scammers. They, too, follow the headlines and will go into overdrive in their attempts to part people from their money. We’ve seen this time and again during the COVID-19 pandemic, and just a few days into it the war in Ukraine is no different.

If the crisis has you worried and you’re looking to support humanitarian work on the ground through a donation, make sure your money goes to the right cause.

ESET researchers have spotted a bevy of websites that solicit money under the guise of charitable purposes. They tend to riff on a similar theme, making emotional but nonetheless fake appeals for solidarity with the people of Ukraine or urging the public to help fund the country’s defense efforts.

Samples Of Scam Websites

Scam Website
Scam Website

The websites make very vague claims about how the ‘aid’ will be used. It should also be obvious – upon closer inspection, anyway – that none of them represents a legitimate organization.

Some domains to be wary of include:

  • help-for-ukraine[.]eu
  • tokenukraine[.]com
  • supportukraine[.]today
  • ukrainecharity[.]gives
  • ukrainesolidarity[.]org
  • ukraine-solidarity[.]com
  • saveukraine[.]today

Found a suspicious domain? Submit it to us for further analysis.

Also, stay alert for emotional pleas for help that may land in your email. A Reddit user has shared one such fake tug at the heartstrings (see below). Other similar ploys that aim to get the victims to cough up some Bitcoin are floating around on Twitter and other social media. Generally speaking, in the age of common account takeovers and ongoing cyberattacks against Ukrainian targets, it may be difficult to verify ‘solely digital’ information. While social media sites often play a major role in getting the word out about a charitable cause in a time of crisis, they are also fertile ground for fraud.

How to avoid charity fraud

If you’re looking to pour out support through a donation, here’re a few tips for how to do it safely:

  • Check carefully before giving – you’re best off sticking to well-known organizations that have a history of work in the field and have some presence or partners in Ukraine.
  • Donate your money via the organization’s website or approach the charity directly for guidance.
  • Be wary of requests to wire money or send gift cards. Charities don’t normally request this kind of ‘donation’.
  • Avoid clicking on links or downloading attachments in unsolicited emails or social media messages, particularly from unknown sources and those that add to the sense of alarm. They may attempt to lure you into unwittingly downloading malware onto your device.
  • In fact, be wary of messages even from trusted sources unless you verify that the message is authentic. To do this, contact said source by other means than the one by which you received it, e.g., by phone if you got it by email, etc.
  • Be skeptical of social media posts that promote a charity unless you verify that the organization is legitimate. The friend recommending it may not have done their research and the number of likes for a social media post doesn’t say much about its legitimacy, either.
  • Don’t give in to undue pressure – fraudsters will attempt to use the urgency of the situation to rush you into donating.

Legitimate ways to support the efforts in Ukraine

Here’s a non-exhaustive list of major international organizations that provide emergency assistance in Ukraine:

As the crisis remains front-page news all over the world, scammers will continue to look for ways to exploit the misery of the people affected by the war for their own gain. Perhaps the worst thing is that falling for a charity scam doesn’t just affect you – it also means the intended recipients are losing out on the assistance, which makes this sort of fraud all the more deplorable.

You may also enjoy reading, Q4/21: Sees More DDoS Attacks Than Ever Before

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Russia vs Ukraine – The War in Cyberspace

0

Russian troops have launched a major assault on Ukraine and while their forces battle in the physical world for control over various cities and regions, a battle is also taking place in cyberspace.

Just before Russia launched an invasion of Ukraine on February 24, Ukrainian government websites were disrupted by distributed denial-of-service (DDoS) attacks, and cybersecurity firms reported seeing a new piece of destructive malware on hundreds of devices in the country.

The malware used in this attack has been named HermeticWiper and it has been described by experts as a wiper malware disguised as ransomware. This attack wave came just weeks after Ukrainian government websites were disrupted as part of a campaign that involved WhisperGate, a completely different wiper malware that was also disguised as ransomware.

Due to the timing of the attacks, the main suspects are Russian state-sponsored threat actors. Russian hackers have often been accused of targeting Ukraine over the past decade, including in attacks that caused significant disruption to critical infrastructure.

However, the BBC reported that at least some of the latest DDoS attacks against Ukrainian government websites were launched by “patriotic” Russian hackers, including some who work at a “respectable Russian cyber-security company.” One of the individuals claiming to work at the unnamed firm admitted that they would be terminated if their employer found out about their after-hours activities.

These patriotic hackers also claim to have obtained access to Ukrainian government email accounts — which they plan on using for phishing attacks — and they claim to have stolen data.

The Conti ransomware gang, which has thrived in recent months amid crackdowns on other ransomware groups, has pledged its support for the Russian government, warning that it will use its “full capacity to deliver retaliatory measures in case the Western warmongers attempt to target critical infrastructure in Russia or any Russian-speaking region of the world.” The cybercrime group has threatened to “strike back at the critical infrastructures of any enemy.”

Russia-linked ransomware groups demonstrated in the past that they are capable of causing significant disruption to critical infrastructure organizations.

The Ukrainian government has issued a warning to the population regarding an email attack campaign whose goal appears to be the delivery of malware.

The country’s Computer Emergency Response Team (CERT) has also reported seeing email attacks that have been linked to UNC1151, a threat actor previously tied to Belarus and possibly Russia, and which specializes in disinformation campaigns.

Several cybersecurity companies and industry professionals have offered free tools and services to organizations and individuals in Ukraine after Russia launched its invasion. Curated Intelligence has compiled a list of threat reports, access brokers, data brokers, and other resources that could be useful to Ukraine.

Ukraine’s activities in cyberspace have not been purely defensive. Mykhailo Fedorov, the country’s minister of digital transformation, over the weekend announced the creation of an “IT Army” and urged cyber specialists to join the new unit. A Telegram channel created for the IT Army urged members — instructions have been provided in both English and Ukrainian — to target major Russian businesses and government websites, with DDoS and other types of attacks.

The IT Army was created shortly after the Ukrainian government called for cyber volunteers to help defend the country’s critical infrastructure.

Several major Russian government and media websites have been intermittently offline since the conflict started, with many attributing the outages to DDoS attacks.

Some of these attacks were conducted by members of the Anonymous hacktivist movement, which has declared cyberwar against Russia. Hackers operating under the Anonymous banner have defaced Russian websites and leaked data allegedly stolen from high-profile organizations, including the Russian Ministry of Defense. However, these data leak claims have not been verified and hacktivists have been known to publish data that later turned out to be fake or obtained in older breaches.

Russia’s National Coordination Center for Computer Incidents warned last week that cyberattacks on Russian critical information infrastructure and other information resources could increase. The agency also said there could be misinformation operations whose goal was to damage Russia’s image.

The Russian government has also issued an alert to the media regarding the circulation of false information, and the country’s Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor) has lashed out at Facebook and YouTube after they suspended the accounts of several Russian media organizations.

Nato Secretary General

NATO Secretary General Jens Stoltenberg warned that cyberattacks could trigger NATO’s Article 5, which considers an attack on any NATO ally an attack on all.

NBC reported last week that U.S. President Joe Biden had been presented with options for “massive cyberattacks” against Russia, but the White House called NBC’s report “off base” and claimed it did “not reflect what is actually being discussed in any shape or form.”

Users around the world have also been warned about scams exploiting the war in Ukraine. ESET has spotted several cyber fraud operations whose goal is to steal money and information from people using fake charity campaigns as a lure.

source

You may also enjoy reading, Q4/21: Sees More DDoS Attacks Than Ever Before

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Microsoft Warning: Some files might not be deleted when you reset a Windows PC

0

Watch out when handing an old Windows PC to a new owner after resetting it. Some of your files could still be on there.

Microsoft has warned Windows 10 and Windows 11 users that files might not be deleted after resetting the device using the “Remove everything” option. 

The issue stems from Microsoft’s OneDrive cloud file service and could mean files that were synced locally remain on a computer after a local or remote reset, which admins might do before handing the device to a new owner.

This issue can occur when attempting a manual reset from Windows or a remote reset from Intune or other mobile device management platforms, Microsoft warns.

“When attempting to reset a Windows device with apps which have folders with reparse data, such as OneDrive or OneDrive for Business, files which have been downloaded or synced locally from OneDrive might not be deleted when selecting the “Remove everything” option,” Microsoft says in an update to its known issues for Windows 11 21H2.  

“OneDrive files which are “cloud only” or have not been downloaded or opened on the device are not affected and will not persist, as the files are not downloaded or synced locally.”

Microsoft notes that some device manufacturers and some documentation might call the feature to reset a device, “Push Button Reset”, “PBR”, “Reset This PC”, “Reset PC”, or “Fresh Start”.

Via BleepingComputer, the issue was discovered by Microsoft MVP Rudy Ooms, who found that user data was still readable in the “Windows.old” folder after completing a remote or local wipe of a Windows 10 device. Ooms details his findings in a blog post, including that data encrypted with Bitlocker is moved in clear form to the Windows.old folder after a Windows reset.

Windows.old is a folder containing the previous version of Windows on a device. 

The issue affects Windows 11, version 21H2; Windows 10, version 21H2; Windows 10, version 21H1; and Windows 10, version 20H2, according to Microsoft.  

The company is working on a fix for an upcoming release but in the mean time it does have a workaround for the file-persisting issue.  

Admins can prevent the issue by by signing out or unlinking OneDrive before resetting a Windows device. Microsoft provides instructions to do this in the “Unlink OneDrive” section in the support page, Turn off, disable, or uninstall OneDrive.

Users can also mitigate the issue on devices that have been reset by using the Windows feature Storage Sense in the Settings app. Storage Sense can be used to delete the Windows.old folder. Microsoft provides instructions for doing that in the support page KB5012334

You may also enjoy reading, Q4/21: Sees More DDoS Attacks Than Ever Before

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Chinese Researchers Say They’ve Spotted an NSA Hacking Tool

0

A Chinese security firm released a detailed report about what it says is malware created by Equation Group, a hacking group widely believed to be the NSA

Researchers Say They’ve Spotted an NSA Hacking Tool

Security researchers from Pangu Labs say they’ve pieced together the origins of a nearly decade-old hacking tool, and that it traces back to the Equation Group, which is widely thought to be the US National Security Agency.

They say they were able to make the link thanks in part to a leak by the Shadow Brokers, a mysterious group that released a trove of apparent NSA secrets in 2016. More interesting than the tool itself, though, is the public attribution to the NSA—which, while not unprecedented, is extremely rare. Or at least, it has been. 

NSA Hacking Tool

A Chinese cybersecurity company accused the NSA of being behind a hacking tool used for ten years in a report published on Wednesday

The report from Pangu Lab delves into malware that its researchers first encountered in 2013 during an investigation into a hack against “a key domestic department.” At the time, the researchers couldn’t figure out who was behind the hack, but then, thanks to leaked NSA data about the hacking group Equation Group—widely believed to be the NSA—released by the mysterious group Shadow Brokers and by the German magazine Der Spiegel, they connected the dots and realized it was made by the NSA, according to the report. 

“The Equation Group is the world’s leading cyber-attack group and is generally believed to be affiliated with the National Security Agency of the United States. Judging from the attack tools related to the organization, including Bvp47, Equation group is indeed a first-class hacking group,” the report read, referring to the name of the tool the researchers found. “The tool is well-designed, powerful, and widely adapted. Its network attack capability equipped by 0day vulnerabilities was unstoppable, and its data acquisition under covert control was with little effort. The Equation Group is in a dominant position in national-level cyberspace confrontation.” 

Pangu Lab could not be reached for comment. 

This is not the first time a Chinese cybersecurity company published research on an alleged American intelligence hacking operation. But it’s “pretty rare,” as Adam Segal, an expert in China’s cybersecurity at the Council on Foreign Relations, put it in an email to Motherboard.

“I don’t know who Pangu’s customers are, but it might also be something their customers want to hear right now, just like lots of Western cybersecurity companies post about Russian malware because everyone in the West wants to hear about it right now,” Martijn Grooten, a veteran of the cybersecurity industry, told Motherboard in an online chat. “It also sounds like something the NSA would have the capabilities of doing. And something China would love to make public, especially now.”

This report may be a sign that Chinese cybersecurity companies are starting to follow the example of their Western counterparts and do more attribution. It could be “a shifting strategy to become more name and shame as the US government has employed,” Robert Lee, a former NSA analyst and founder of cybersecurity company Dragos, told Motherboard in an online chat. 

 For Richard Bejtlich, another veteran of the cybersecurity industry and author in residence at security firm Corelight, it’s a good thing that Chinese companies, and presumably China’s government, are improving their attribution capabilities, as “it will increase overall geopolitical stability,” as he tweeted.

“It is an inherently unstable situation to have parties lacking visibility into adversary activity. It breeds paranoia and in many cases an incentive to strike first. When you have insights into your adversary you can make more informed decisions,” Bejtlich told Motherboard in an online chat. “ When you lack them you are constantly worrying about being attacked, or already attacked, etc., and you can’t be sure who is responsible. It’s a classic intelligence situation. That’s why spies on both sides are counterintuitively important.”

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

An angry Putin threatens the world in a bizarre, irrational, and disturbing speech

0

WHEN RUSSIAN PRESIDENT Vladimir Putin launched an unprovoked war against Ukraine this week, he did so with a warning that any interference from the West would be met with a response “never seen” in history. The implied nuclear threat has little if any precedent over the last several decades, and while the Kremlin is far more likely to unleash cyberattacks, it was a chilling indication of how far Putin may be willing to escalate.

But first, let’s talk about Zelensky’s recent speech. In a speech earlier Friday, as Russian troops were entering Kyiv from the north, Ukraine’s President Volodymyr Zelensky urged citizens to resist the invasion and told the military to “stand strong.” 

Zelensky also told EU leaders that “this might be the last time you see me alive” as he requested more help, per Axios, putting down rumors that he had fled the country. “We are here. We are in Kyiv. We are defending Ukraine,” Zelensky said.

While Ukraine’s president was urging his European and Western allies to do more and to “act without delay,” reports the BBC, Vladimir Putin was giving one of the most bizarre speeches of his 22 years as Russia’s leader.

The Guardian reports that the Russian leader was “visibly angry” during a televised address in which he described the country’s leaders as a “gang of drug addicts and neo-Nazis” who have “taken hostage the entire Ukrainian people.” 

Putin Threatens The World

The speech seemed to be more like one from the Second World War, where Putin appears to be spending more of his time lately, as he launches the kind of broad military offensive not seen in Europe for nearly 70 years.

Putin also spoke of his ultimate goals in the invasion, meaning a regime change in Kyiv, toppling the government of Volodymyr Zelenskiy, and replacing it with one of his own choosing.

Putin has also accused Ukraine of installing missiles and other heavy weaponry in civilian buildings and using residents as human shields, which he said was based on advice from foreign – particularly US – advisers, according to the BBC.

However, global human rights group Amnesty International said it was Russia, not Ukraine, that was showing “a blatant disregard for civilian lives”.

The charity said that Putin’s claim of precise strikes on military targets was false, and Russia was “using ballistic missiles and other explosive weapons with wide area effects in densely populated areas, inluding hospitals,” and this  “can constitute war crimes.”

It is believed that the bizarre, and sometimes irrational way Putin is talking is a sign that he is living in the past – back when Russia as we knoiw it today, was the Soviet Union. And from the number of Russians protesting the Ukraine invasion, it appears likely that they don’t want to return to that period any more than Ukraine wants to be under Putin’s control.

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Doxing Attacks: From Hacker Tool to Societal Problem

0
Cybersecurity

The malicious attack known as doxing has gone far beyond hacker tools, with the threat now extending to most social media platforms and making nearly anyone a target.

Today, doxing continues to be an intimidating prospect for digital users and is a mainstream data security problem. Online users can have a great deal of anonymity, but the growth of digital platforms makes obtaining information more accessible than ever. With any public-facing or dormant digital presence, threat actors can weaponize personal information to humiliate the victim, extort them, or conduct further malware attacks.

This article looks at doxing, how it works, types, best defensive practices, and what to know about the mainstream digital attack.

What is Doxing?

Doxing – abbreviated from “dropping documents” – is a form of Open Source Intelligence (OSINT) where an actor publicly shares online information or data about a specific individual or group of individuals. Doxing often reveals identifying information about an adversary and is almost always a malicious attack to hurt the victim.

A Brief History Of Doxing

Doxing is a term that first originated alongside the boom of the internet and black hat culture. Within the hacking community, doxing is an intimidation tactic to unmask the otherwise anonymous details of another user. With user interactions expanding to entire communities and remote connections, doxing is easier than ever and present across today’s social media platforms.

What Documents Are Getting Dropped?

  • Personal Details: home address, phone number, workplace, criminal history
  • Financial Information: social security number, banking, credit report, digital wallet
  • Other Personal: private communications, personal data, embarrassing details

How Does Doxing Work?

Finding Documents

The list of tactics, techniques, and procedures (TTP) used by threat actors to gain another user’s data is extensive. Common searches include scanning public records, phone records, social media, and WHOIS domain information. Meanwhile, more advanced threat actors will utilize IP addresses, packet sniffing, and dark web data brokers to obtain personal details. Another widely used tactic for information gathering is phishing or the engagement and manipulation of another user’s trust.

Publishing Documents

Upon obtaining the documents in question, threat actors can dispose of the information as they please. Hackers can publish their findings under an anonymous account on a popular social media platform or another public-facing channel. In either circumstance, the hacker makes the personal details more accessible to other users by collecting and sharing the information.

Types of Doxing Attacks

DeanonymizingRevealing personal identifiable information of an anonymous individual
TargetingPrivate or obfuscated personal information revealing circumstances
DelegitimizingThe disclosure of intimate details to damage an individual’s credibility

More niche examples of doxing include:

  • Breach Doxing: the unintentional dropping of documents via a data breach or leak.
  • Revenge Doxing: targeting individuals as a form of revenge.
  • Swatting: targeting individuals via emergency tip to public authorities.
  • Criminal Doxing: targeting individuals with harmful intent.
  • Faulty Doxing: targeting of an unintended individual.
  • Corporate Doxing: targeting a specific business and personnel.
  • Celebrity Doxing: targeting a celebrity’s personal information.
  • Intellectual Property Doxing: targeting a company’s proprietary data.

Defending Against Doxing

Keeping a low profile online can be difficult in an era where a brand is everything. Personal details about users – whether inadvertently available on social media or through a data breach on a long inactive account – are everywhere, giving persistent threat actors plenty to utilize.

  • Practice cybersecurity hygiene, including strong passwords and MFA
  • Scrub data from data broker sites or obsolete profiles and accounts
  • Differentiate usernames and passwords between accounts
  • Separate email accounts for distinct purposes
  • Evaluate privacy settings and public info for social accounts
  • Hide domain registration and protect IP with VPN
  • Tread lightly with app permissions and minimize disclosure of personal information
  • Avoid malicious interactions and stay vigilant with trust online

Proposal for Action: Dox Yourself

Don’t believe you have anything to hide? Industry analysts offer a simple challenge: check how easy it is to dox yourself. Data owners can evaluate their current risk posture regarding a doxing attack and take steps for remediation.

Evaluate Doxing Risks

From Google to Twitter and LinkedIn, searching for a first and last name can reveal a lot about an individual or company.

The pedestrian user may not know or care about their privacy settings. Still, threat actors are well aware of publicly visible information on social media, personal websites, and other digital platforms. Individuals and organizations with a longstanding digital presence have even more content for threat actors to parse through in search of a humiliating tweet or picture.

In addition to popular websites, users must also consider data breaches and existing digital accounts. Disasters and attacks for web service providers can result in emails, passwords, and more being published and exposing account user information.

Users can check if their email or phone was compromised in a data breach on Have I Been Pwned? Hopefully, no pwnage is found!

Remediate And Continually Audit

Though personal details like a mobile phone number, email accounts, or home address on an online CV may seem harmless, this information is vulnerable to misuse. Creating phone and email accounts specific to public-facing purposes is a popular preventative measure.

Across digital platforms and accounts, users should ensure all settings meet their privacy and cybersecurity expectations. In evaluating doxing risks, users with compromised credentials must act with haste to change any other accounts carrying the same username and password. In the same vein, users should consider deleting dormant accounts to avoid additional exposure.

If the user isn’t going off the grid entirely, preventing doxing or other attacks against one’s privacy means proactive monitoring. Users should conduct regular audits of publicly available data about themselves. Keeping up with current events is also an invaluable part of securing data as a user can act quickly to remediate the potential exposure.

The Unintended Victims of Doxing

Never mind the real threat doxing can bring to the intended individuals – a disturbing number of instances show the original documents published to be inaccurate and the recipient of post-doxing reactions misidentified. These examples often lead to digital or in-person harassment and reputational damage of individuals unbeknownst to any identifiable reason for the attack.

Notable Doxing Attacks

WhenAttack Details
August 2017After the “Unite the Right” rally in Charlottesville, Virginia, online users misidentified an attending protester as University of Arkansas assistant professor Kyle Quinn. Quinn was met with a barrage of harassment before online users learned it was not the same individual.
August 2014Known as “Gamergate,” several notable women in the video game industry were targeted in an online harassment campaign and doxing. Noted as a backlash to increasing feminism in gaming, victims received extensive attacks at the time and for years after.
August 2014Known as “The Fappening,” a threat actor published 500 private pictures of celebrities to 4chan before their broader circulation. Apple stated the threat actor executed spear-phishing attacks to access the vendor’s cloud services suite, iCloud. In 2018, George Garofano pleaded guilty to the attack.
March 2013Multiple celebrities and political figures, including Kim Kardashian, Ashton Kutcher, Jay-Z, Joe Biden, and Hillary Clinton, were the victims of doxing their financial details. In 2015, Mir Islam pleaded guilty to the attack. The US DOJ detailed the string of attacks in 2013 against dozens of victims.

Is Doxing Illegal?

Doxing can ruin lives, as it can expose targeted individuals and their families to both online and real-world harassment. But is it illegal?

The answer is usually no: doxing tends not to be illegal, if the information exposed lies within the public domain, and it was obtained using legal methods. That said, depending on your jurisdiction, doxing may fall foul of laws designed to fight stalking, harassment, and threats.

It also depends on the specific information revealed. For example, disclosing someone’s real name is not as serious as revealing their home address or telephone number. However, in the US, doxing a government employee falls under federal conspiracy laws and is seen as a federal offense. Because doxing is a relatively recent phenomenon, the laws around it are constantly evolving and are not always clear cut.

Regardless of the law, doxing violates many websites’ terms of service and, therefore, may result in a ban. This is because doxing is usually seen as unethical and is mostly carried out with malicious intent to intimidate, blackmail, and control others. Exposing them to potential harassment, identity theft, humiliation, loss of jobs, and rejection from family and friends.

Doxing Protection and What to do if I’ve been doxed?

Read more on protection here

What to do if i’ve been doxed, including How to Respond

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Ukraine Military Shoots Down Russian Transport Plane 20km from Kyiv

0

This is a developing story and updates will follow:

Ukrainian forces claim to have shot down a Russian Il-76 Candid airlifter flying near the country’s capital Kyiv tonight, although there is no independent confirmation of this so far. Il-76s are generally used for heavy transport and paratrooper operations, though there are derivatives of the design that also serve as aerial refueling tankers and early warning aircraft. This comes as Russia’s invasion of Ukraine is now entering its third day. 

General Staff of the Armed Forces of Ukraine: — “Our Air Defense Forces shot down 1L-76 with an enemy landing near Vasilkov (20 km South from Kyiv/Kiev) This is revenge for Luhansk 2014! Death to the Enemies !”

Related Reading

Got to World Affairs

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Anonymous Declares Cyber War against Russia, disables state news website

0

The popular collective Anonymous declared war on Russia for the illegitimate invasion of Ukraine and announced a series of cyber attacks calling to action its members

The Anonymous collective is calling to action against Russia following the illegitimate invasion of Ukraine. The famous groups of hacktivists are also calling for action Russian citizens inviting them to express their dissent to Putin.

Anonymous Declares Cyber War against Russia

“The Anonymous collective is officially in” cyber war “against the Russian government.” This was announced directly by the international network of hackers through their twitter account.

The collective has already started a campaign aimed at Russian Federation and warned that private organizations will be more impacted.

The first attacks carried by the group hit news sites used by Moscow for its propaganda, including Russia Today, which was taken offline by the offensive.

“We, as a collective want only peace in the world. We want a future for all of humanity. So, while people around the globe smash your internet providers to bits, understand that it’s entirely directed at the actions of the Russian government and Putin.” continues the group on Twitter. “Put yourself in the shoes of the Ukrainians being bombed right now. Together we can change the world, we can resist anything. It is time for the Russian people to unite and say no to Vladimir Putin’s war. We are Anonymous. We are a legion. Wait for us.” reads the Anounymous’s announcement.”

RT.com, a Russia-owned media outlet confirmed that it was hit by a massive denial-of-service (DDoS) attack. 

Experts also reported that the attacks hit the website of the Kremlin and State Duma lower house of parliament causing intermittent interruptions.

The call to action will likely attract Ucraine and foreign cybersecurity experts that could join in different way in the cyber dispute.

“Yegor Aushev, the co-founder of a cybersecurity company in Kyiv, told the news outlet that offensive volunteers will conduct digital espionage against Russian forces, while defensive volunteers will help protect the country’s infrastructure.” reported FoxNews.

UPDATE:

Several Twitter accounts associated with the group claimed to have taken down numerous websites connected to the Russian government, including state sponsored news website Russia Today. The news agency confirmed that it had been targeted by a “strong DDoS cyberattack“ on Thursday. 

The hacks are a part of a cyber war that Anonymous declared against Moscow in retaliation against Russia’s brutal invasion of Ukraine. 

“Anonymous is currently involved in operations against the Russian Federation,” the group wrote on their main Twitter account. “Our operations are targeting the Russian government. There is an inevitability that the private sector will most likely be affected too.”

They go on to say that they only want peace in the region and a “future for all humanity,” adding that “while people around the globe smash your internet providers to bits, understand that it’s entirely directed at the actions of the Russian government and Putin.”

Expect Us

In the past, the group’s been known to make a lot of threats that turned out to be nothing more than toothless chest thumping. Just last year they threatened Elon Musk, and that didn’t result in much of anything. 

But if Anonymous was behind the recent hacks, it looks like they might have actually disrupted Putin’s schemes, if only for a little bit — which, honestly, is kinda cool. With other cyberpunk hacktivism underway, it’s nice to know that even people sitting at home on their computers can do their part to fight an imperialist invasion. 

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose

Ransomware gangs, hackers pick sides over Russia invading Ukraine

0

Hacker crews are picking sides as the Russian invasion into Ukraine continues, issuing bans and threats for supporters of the opposite side.

This week, an administrator of the database sharing and marketplace Raidforums announced that it would close its door on users connecting from Russia, clearly expressing their position against Kremlin’s actions.

Earlier today, the Conti ransomware group stated their “full support of Russian government” and threatened with cyberattacks against anyone launching attacks against Russia.

Hackers react

Hackers, state-backed or not, have already launched cyberattacks, most of them against Ukrainian targets [123], with some targets in Russia also being hit [1].

With the Russian aggression continuing, the hacker community started to get more involved and express their stance in the conflict.

Following the political model of the U.S. and the EU, Raidforums published a notification yesterday saying that it would impose its own sanctions by banning any user connecting from Russia.

One member of the Raidforums community published a more abrasive message as a warning to “Russians.” The user posted a database with emails and hashed passwords for the FSB.ru domain of Russia’s main security agency, the Federal Security Service (FSB).

In the sample data shared on the forum as proof of provenance there are email addresses for FSB offices (directorates) in various regions.

The same user has previously posted similar databases for .mil domains in the United States.

Ransomware gangs get involved

Today, the Conti ransomware gang issued a warning that they would respond to cyber activity against Russia using all their resources “to strike back at the critical infrastructures of an enemy.”

Conti ransomware threatens to retaliate for action against Russia

The gang changed their message about an hour later, saying that they “do not ally with any government and we condemn the ongoing war” but will respond to Western cyber aggression on Russian critical infrastructure.

Conti ransomware promises retaliation if Western cyberattacks target Russian critical infrastructure

Conti is one of the most active ransomware actors in the industrial sector, being responsible last year for breaching 63 companies operating industrial control systems (ICS), most of the in the manufacturing sector.

Conti also took control of BazarBackdoor, the stealthy malware developed by the TrickBot gang for compromising high-value targets.

CoomingProject, another, less known, ransomware group also announced their support for the Russian government if cyberattacks are aimed at the country.

CoomingProject pledging support for Russian government

Ukraine asks hacker community for help

It appears that the Ukrainian side is also trying to engage its hacker force to defend critical infrastructure from coordinated cyberattacks and to carry out cyberespionage operations on Russian activity.

Reuters details that a message for the Ukrainian underground hacker community posted at the request of the Defense Ministry called the cybercommunity to enroll in a mission to defend the country.

The call to action was published through Yegor Aushev, the founder of Cyber Unit Technologies, who yesterday shared an application form for volunteer hackers to sign up declaring their skills for a better organization of tasks.

In one post, Aushev claims that even hackers around the world, including from Russia, have responded to his call, who will be grouped into teams for offensive and defensive action.

Yegor Aushev calling for volunteer hackers

It is clear that modern warfare has entered a new age as physical armed forces are now openly supported by cyber activity carried not just by individuals with formal training but also self-taught hackers on both sides of the law.

Got to Cybersecurity News

Go to Homepage

Go to Cybersecurity Academy

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmarkClose