Home

Feb 4, 2018

BEWARE: Cyber Criminals Using Malware to Hack Data


A secret hacking group, which was said to have carried out a worldwide mobile espionage campaign, has been recently uncovered because of an exposed server on the internet.

The Lebanese General Directorate of General Security, GDGS, is being suspected by researchers to have supported this act of cybercrime.

Category:IT 

A secret hacking group, which was said to have carried out a worldwide mobile espionage campaign, has been recently uncovered because of an exposed server on the internet.

The Lebanese General Directorate of General Security, GDGS, is being suspected by researchers to have supported this act of cybercrime.

According to reports, the hackers collected ‘hundreds of gigabytes’ of information and data, including intellectual property and personally identifiable information.

The espionage campaign was in operation from 2012 and it is being claimed that thousands of people became the victims of this cybercrime in more than 21 countries.

The hacker group named Dark Caracal were able to target military personnel, journalists, medical professionals, activists, lawyers and many people from other significant professions.

The stolen data included documents, call records, browsing history, secure messaging client content, photos, contact information, and location data – all of this enough to spy on and identify an individual and monitor their personal life closely.

The hackers utilized basic techniques such as sending posts on different Facebook groups or WhatsApp messages, encouraging users to click on the links and access sites.

This installs a malware on the system that forces users to install a fake app, which seems to be from Google Play Store.

Such hacking is common, and one needs to be cautious.

Some Precautionary Tips

If your gut tells you something isn’t right with an app or it seems fishy keep away from it to secure your privacy. Cyber criminals are getting smart, you should up your game, too.

image: 

keywords: Cyber, criminal, Malware, Hac, Data

Previous Article
Next Article
Discord

Page 1 of 480  >  >>

Microsoft offers workaround to mitigate the IE Scripting Engine Memory Corruption Vulnerability

ie_11_logo.jpg

Jan 19, 2020 | Category: Microsoft | Comments

Clément Lecigne of Google’s Threat Analysis Group reported about an IE vulnerability that allowed remote execution of code via Internet Explorer.

read more…

Steam on the way to Chromebooks, but is there any point?

chrome_os_steam_hero_more_like.png

Jan 18, 2020 | Category: General | Comments

Google works with Valve.

read more…

Emotet Malware Targeted United Nations Via Phishing Attack

Cloudmark_Takes_Aim_at_Spear_Phishing_with_‘Trident’_Security_Solution_1132x670_800x445.jpg

Jan 17, 2020 | Category: General | Comments

As reported, a phishing attack targeted United Nations with Emotet malware. The dedicated email phishing campaign targeted 600 UN email addresses.

read more…

Page 1 of 480  >  >>