Hacked! ouvidoria.apiai.sp.gov.br

Notified by: Ramil Feyziyev Date: Wed, 09 Oct 2024 16:14:27 +0000 URL: https://ouvidoria.apiai.sp.gov.br/avareler.htm Country: Brazil Sector: Government – This sector encompasses various governmental services and functions, providing essential information and support to the public.

Check It ! | source:zone-h

Web Defacement?

“There will be a delay in taking screenshots, there is a possibility that the defacement page has been removed.”…

Read More
Hacked! oscp.tacloban.gov.ph

Notified by: M@rAz Ali Date: Fri, 11 Oct 2024 02:13:16 +0000 URL: http://oscp.tacloban.gov.ph/mrz.html Country: Philippines Sector: Government – This sector encompasses various governmental departments and agencies responsible for public administration and services.

Check It ! | source:zone-h

Web Defacement?

“There will be a delay in taking screenshots, there is a possibility that the defacement page has been removed.”…

Read More
Hacked! selumakab.go.id

Notified by: ./Kal6666h05t Date: Thu, 17 Oct 2024 14:46:43 +0000 URL: https://selumakab.go.id/duar.txt Country: Indonesia Sector: Government – This sector encompasses various governmental departments and services that manage public administration and community welfare.

Check It ! | source:zone-h

Web Defacement?

“There will be a delay in taking screenshots, there are a possibility of the defacement page has been removed.”…

Read More

Victim: HiCare.net Country : IN Actor: ransomhub Source: http://ransomxifxwc5eteopdobynonjctkxxvap77yqifu2emfbecgbqdw6qd.onion/4021e8bd-04f8-4df3-88a2-e262f139fe35/ Discovered: 2024-10-17 13:45:22.665393 Published: 2024-10-17 07:45:56.000000 Description : HiCare.net is a company specializing in pest control and hygiene solutions. It offers a range of services aimed at residential and commercial clients, focusing on eliminating pests like termites, cockroaches, and rodents.…

Read More

Summary: Hackers have targeted Ukraine’s draft-aged men using MeduzaStealer malware, distributed via a Telegram account posing as customer support for the government app Reserve+. This malware aims to steal sensitive personal data from users, highlighting the ongoing cyber threats faced by Ukraine amidst the conflict.

Threat Actor: UAC-0050 | UAC-0050 Victim: Ukrainian draft-aged men | Ukrainian draft-aged men

Key Point :

MeduzaStealer malware was spread through a Telegram account disguised as a technical support bot for the Reserve+ app.…
Read More
Hacked! cminhapim.mg.gov.br

Notified by: M@rAz Ali Date: Sun, 13 Oct 2024 09:35:30 +0000 URL: https://cminhapim.mg.gov.br/mrz.php Country: Brazil Sector: Government – This sector encompasses various governmental services and information provided to the public, including administrative functions and public service announcements.

Check It ! | source:zone-h

Web Defacement?

“There will be a delay in taking screenshots; there is a possibility that the defacement page has been removed.”…

Read More
Hacked! sco.gov.et

Notified by: Team_CC Date: Wed, 16 Oct 2024 03:06:04 +0000 URL: https://sco.gov.et/back.txt Country: Ethiopia Sector: Government – This sector encompasses various governmental functions and services aimed at managing public administration and providing services to citizens.

Check It ! | source:zone-h

Web Defacement?

“There will be a delay in taking screenshots, there are a possibility of the defacement page has been removed.”…

Read More
Hacked! camarariqueza.sc.gov.br

Notified by: omgsmok Date: Tue, 15 Oct 2024 23:32:13 +0000 URL: https://camarariqueza.sc.gov.br Country: Brazil Sector: Government – This sector encompasses the various administrative functions and services provided by the local government to its citizens.

Check It ! | source:zone-h

Web Defacement?

“There will be a delay in taking screenshots, there is a possibility that the defacement page has been removed.”…

Read More

Summary: The India-based APT group SideWinder has expanded its cyber-espionage activities, targeting high-profile entities across multiple regions, using a sophisticated malware toolkit called “StealerBot.” Recent attacks have revealed new post-exploitation tactics and a broader geographic focus, affecting various sectors including government, military, and telecommunications.

Threat Actor: SideWinder | SideWinder Victim: Various high-profile entities | high-profile entities

Key Point :

SideWinder has targeted entities in countries such as Bangladesh, Djibouti, and Turkey, demonstrating a significant geographic expansion.…
Read More
Hacked! sis.gov.eg

Notified by: chinafans Date: Thu, 17 Oct 2024 09:43:51 +0000 URL: https://sis.gov.eg/0x.txt Country: Egypt Sector: Government – This sector encompasses various governmental departments and services that manage public administration and governance in Egypt.

Check It ! | source:zone-h

Web Defacement?

“There will be a delay in taking screenshots; there is a possibility that the defacement page has been removed.”…

Read More

Victim: W?l?????n Country : CA Actor: play Source: http://k7kg3jqxang3wh7hnmaiokchk7qoebupfgoik6rha6mjpzwupwtj25yd.onion/topic.php?id=xn8WJxSboO0M2 Discovered: 2024-10-17 00:15:05.354542 Published: 2024-10-17 00:13:04.310670 Description : Canada

Ransomware Victims – ALL Other Victims by play

Victim: W?l?????n – A prominent organization in Canada, potentially in the healthcare or financial sector, targeted by ransomware gangs. Actor: Play – A notorious ransomware group known for sophisticated attacks, often exploiting vulnerabilities in systems to gain access and encrypt sensitive data.…
Read More

Short Summary:

Cisco Talos has reported a new wave of attacks by a Russian-speaking group known as UAT-5647, targeting Ukrainian government entities and Polish organizations. The group has deployed an updated version of the RomCom malware called “SingleCamper,” along with several other malware families. Their tactics include using sophisticated techniques for lateral movement, reconnaissance, and data exfiltration, indicating a dual strategy of espionage and potential ransomware deployment.…

Read More
Short Summary

This article discusses the newly discovered China-nexus APT group named “IcePeony,” which has been active since at least 2023. They primarily target government agencies, academic institutions, and political organizations in Asia, employing techniques like SQL Injection and using custom malware such as “IceCache.” The group operates under harsh conditions, possibly reflecting the “996” work culture prevalent in China’s IT industry.…

Read More
Short Summary: The FBI, CISA, NSA, CSE, AFP, and ASD’s ACSC have issued a Cybersecurity Advisory regarding Iranian cyber actors employing brute force techniques to compromise critical infrastructure sectors. These actors aim to obtain credentials and network information for sale to cybercriminals, utilizing methods such as password spraying and MFA push bombing since October 2023.…
Read More