IP Spoofing Attack Tried to Disrupt Tor Network

November 12, 2024 at 05:07AM A coordinated IP spoofing attack targeted the Tor network by conducting port scans to get relays added to blocklists, aiming to disrupt its functionality. This incident highlights ongoing security threats faced by the network. **Meeting Takeaways:** 1. **Incident Overview**: There was a coordinated IP spoofing attack aimed at disrupting the … Read more

HUMINT: Diving Deep into the Dark Web

July 9, 2024 at 07:07AM The internet is divided into Clear Web, Deep Web, and Dark Web. Clear Web is publicly accessible, while Deep Web requires credentials and Dark Web involves anonymous and encrypted sources. Tor, a network for anonymous communication, facilitates illegal activities. Criminal services, forums, and network attacks operate within the Dark Web’s … Read more

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

February 26, 2024 at 12:15AM LockBit ransomware group resurfaces on the dark web, moving their data leak portal to a new address and acknowledging PHP flaw exploitation. They claim the FBI hacked their infrastructure and seek to discredit law enforcement agencies. In a separate incident, Russian authorities arrest three individuals tied to the SugarLocker ransomware … Read more

How the FBI seized BlackCat (ALPHV) ransomware’s servers

December 19, 2023 at 12:33PM The US Department of Justice seized the ALPHV/BlackCat ransomware operation’s websites and created a decryptor to assist around 500 affected companies in recovering their data for free. By utilizing a confidential human source, the FBI accessed the ransomware gang’s affiliate panel to obtain private decryption keys. This operation is the … Read more

Advanced ‘StripedFly’ Malware With 1 Million Infections Shows Similarities to NSA-Linked Tools

October 27, 2023 at 10:43AM Cybersecurity firm Kaspersky has warned about a highly advanced piece of malware named StripedFly that has been infecting over one million devices for the past five years. The threat is designed as a modular framework and can target both Windows and Linux systems. It utilizes a Tor network tunnel for … Read more