Texas man charged with planning to blow up Amazon data center in Virginia
The Wichita Falls man was arrested Thursday after receiving a fake bomb from an FBI undercover employee.
The FBI arrested a Texas man Thursday on charges of hatching a plan to blow up an Amazon data center in Virginia.
Seth Aaron Pendley, 28, of Wichita Falls was taken into custody Thursday after receiving what he thought was a bomb from a like-minded person, but it was actually a dud provided by an FBI undercover employee.
Court documents say Pendley came to the FBIโs attention after agents received a tip that he was posting alarming statements on a forum popular with militia groups, mymilitia.com. He began communicating through an encrypted messaging app with another person, who told the FBI that Pendley planned to use plastic explosives to attack the tech companyโs data centers โto kill about 70% of the internet.โ
https://www.nbcnews.com/politics/justice-department/texas-man-charged-planning-blow-amazon-data-center-virginia-n1263663
https://telegra.ph/Texas-Man-Charged-With-Intent-to-Attack-Data-Centers-04-09
via www.justice.gov
#usa #virginia #amazon #DeleteAmazon #datacenter #attack #fbi
๐ก @nogoolag ๐ก @blackbox_archiv
The Wichita Falls man was arrested Thursday after receiving a fake bomb from an FBI undercover employee.
The FBI arrested a Texas man Thursday on charges of hatching a plan to blow up an Amazon data center in Virginia.
Seth Aaron Pendley, 28, of Wichita Falls was taken into custody Thursday after receiving what he thought was a bomb from a like-minded person, but it was actually a dud provided by an FBI undercover employee.
Court documents say Pendley came to the FBIโs attention after agents received a tip that he was posting alarming statements on a forum popular with militia groups, mymilitia.com. He began communicating through an encrypted messaging app with another person, who told the FBI that Pendley planned to use plastic explosives to attack the tech companyโs data centers โto kill about 70% of the internet.โ
https://www.nbcnews.com/politics/justice-department/texas-man-charged-planning-blow-amazon-data-center-virginia-n1263663
https://telegra.ph/Texas-Man-Charged-With-Intent-to-Attack-Data-Centers-04-09
via www.justice.gov
#usa #virginia #amazon #DeleteAmazon #datacenter #attack #fbi
๐ก @nogoolag ๐ก @blackbox_archiv
NBC News
Texas man charged with planning to blow up Amazon data center in Virginia
The Wichita Falls man was arrested Thursday after receiving a fake bomb from an FBI undercover employee.
Domino's India database likely hacked, 1 million credit card details leaked along with mail IDs, cell numbers
An Israeli cyber-crime expert alleges that data of Domino's India customers, including over 1 million credit card details, is on sale in the dark web.
Hackers reportedly have access to Dominoโs India 13TB of internal data. Employee details, order, and credit card details of customers have likely been compromised. The hackers are aiming to sell the entire database for $550,000.
Popular pizza outlet Dominoโs India seems to have fallen victim to a cyber attack. According to Alon Gal co-founder of an Israeli cybercrime intelligence, the hackers have access to Dominoโs India 13TB of internal data which includes employee details of over 250 employees across verticals such as IT, Legal, Finance, Marketing, Operations, etc.
The hackers claim to have got all customer details and 18 crore order details which include customer's names, phone numbers, email IDs, delivery address, payment details including more than 10 lakh credit card details used to purchase on Dominoโs India app.
Further, the hackers are aiming to sell the entire data to a single buyer. According to Alon Gal, the hackers are looking for $550,000 (around Rs 4 crores) for the entire database. The hackers also have plans to build a search portal to enable querying the data.
The sale is apparently happening in the dark web and likely on a website frequented by cyber scammers. For now, Domino's India has neither confirmed nor denied that data of its consumers has been stolen or leaked from its servers.
https://www.indiatoday.in/technology/news/story/domino-s-india-database-likely-hacked-1-million-credit-card-details-leaked-along-with-mail-ids-cell-numbers-1792305-2021-04-18
#dominos #india #hacker #attack #hacked #database #leak #breach
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
An Israeli cyber-crime expert alleges that data of Domino's India customers, including over 1 million credit card details, is on sale in the dark web.
Hackers reportedly have access to Dominoโs India 13TB of internal data. Employee details, order, and credit card details of customers have likely been compromised. The hackers are aiming to sell the entire database for $550,000.
Popular pizza outlet Dominoโs India seems to have fallen victim to a cyber attack. According to Alon Gal co-founder of an Israeli cybercrime intelligence, the hackers have access to Dominoโs India 13TB of internal data which includes employee details of over 250 employees across verticals such as IT, Legal, Finance, Marketing, Operations, etc.
The hackers claim to have got all customer details and 18 crore order details which include customer's names, phone numbers, email IDs, delivery address, payment details including more than 10 lakh credit card details used to purchase on Dominoโs India app.
Further, the hackers are aiming to sell the entire data to a single buyer. According to Alon Gal, the hackers are looking for $550,000 (around Rs 4 crores) for the entire database. The hackers also have plans to build a search portal to enable querying the data.
The sale is apparently happening in the dark web and likely on a website frequented by cyber scammers. For now, Domino's India has neither confirmed nor denied that data of its consumers has been stolen or leaked from its servers.
https://www.indiatoday.in/technology/news/story/domino-s-india-database-likely-hacked-1-million-credit-card-details-leaked-along-with-mail-ids-cell-numbers-1792305-2021-04-18
#dominos #india #hacker #attack #hacked #database #leak #breach
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
India Today
Domino's India database likely hacked, 1 million credit card details leaked along with mail IDs, cell numbers
An Israeli cyber-crime expert alleges that data of Domino's India customers, including over 1 million credit card details, is on sale in the dark web.
DDoS attack trends for 2021 Q1
Last week was Developer Week at Cloudflare. During that week, our teams released a bunch of cool new products, including a bunch of improvements to Workers. And it's not just our customers that love deploying apps with Workers, but also our engineering teams. Workers is also what powers our Internet traffic and attack trends on Cloudflare Radar. Today, along with this deep-dive analysis blog, weโre excited to announce the new Radar DDoS Report page, our first fully automated data notebook built on top of Jupyter, Clickhouse, and Workers.
Last month, we introduced our autonomous edge DDoS (Distributed Denial of Service) protection system and explained how it is able to drop attacks at wire speed without impacting performance. It runs in our networksโ edge, analyzes traffic asynchronously to avoid impacting performance, and pushes mitigation rules in-line immediately once attacks are detected. All of this is done autonomously, i.e., without requiring centralized consensus.
Today, weโd like to share the latest DDoS insights and trends that are based on attacks that our system mitigated during the first quarter of 2021. When we analyze attacks, we calculate the โDDoS activityโ rate, which is the percent of attack traffic out of the total traffic (attack + clean). This allows us to normalize the data points and avoid biases towards, for example, a data center that sees more traffic and therefore also more attacks.
https://blog.cloudflare.com/ddos-attack-trends-for-2021-q1/
#ddos #attack #trends #cloudflare
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Last week was Developer Week at Cloudflare. During that week, our teams released a bunch of cool new products, including a bunch of improvements to Workers. And it's not just our customers that love deploying apps with Workers, but also our engineering teams. Workers is also what powers our Internet traffic and attack trends on Cloudflare Radar. Today, along with this deep-dive analysis blog, weโre excited to announce the new Radar DDoS Report page, our first fully automated data notebook built on top of Jupyter, Clickhouse, and Workers.
Last month, we introduced our autonomous edge DDoS (Distributed Denial of Service) protection system and explained how it is able to drop attacks at wire speed without impacting performance. It runs in our networksโ edge, analyzes traffic asynchronously to avoid impacting performance, and pushes mitigation rules in-line immediately once attacks are detected. All of this is done autonomously, i.e., without requiring centralized consensus.
Today, weโd like to share the latest DDoS insights and trends that are based on attacks that our system mitigated during the first quarter of 2021. When we analyze attacks, we calculate the โDDoS activityโ rate, which is the percent of attack traffic out of the total traffic (attack + clean). This allows us to normalize the data points and avoid biases towards, for example, a data center that sees more traffic and therefore also more attacks.
https://blog.cloudflare.com/ddos-attack-trends-for-2021-q1/
#ddos #attack #trends #cloudflare
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
The Cloudflare Blog
DDoS attack trends for 2021 Q1
Today, along with this deep-dive analysis blog, weโre excited to announce the new Radar DDoS Report page, our first fully automated data notebook built on top of Jupyter, Clickhouse, and Workers.
Reproducing Spectre Attack with gem5, How To Do It Right?
๐กTable of Contents:
1. Introduction
2. HowTo
2.1. How to Setup the Native ARM System
2.2. How to Perform the Spectre Attack
2.3. How to Setup gem5 for a Full-System Simulation
2.4. How to Simulate Spectre with gem5
2.5. How to Visualize the Pipeline of a gem5 Processor with Konata
3. Implementations
3.1. Spectre
3.2. gem5
4. Appendices
https://pierreay.github.io/reproduce-spectre-gem5/
#attack #spectre #gem5
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
๐กTable of Contents:
1. Introduction
2. HowTo
2.1. How to Setup the Native ARM System
2.2. How to Perform the Spectre Attack
2.3. How to Setup gem5 for a Full-System Simulation
2.4. How to Simulate Spectre with gem5
2.5. How to Visualize the Pipeline of a gem5 Processor with Konata
3. Implementations
3.1. Spectre
3.2. gem5
4. Appendices
https://pierreay.github.io/reproduce-spectre-gem5/
#attack #spectre #gem5
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
pierreay.github.io
Reproducing Spectre Attack with gem5, How To Do It Right?
Media is too big
VIEW IN TELEGRAM
Hack Across America - USB drop attack in the Death Valley
This time on Hack Across America, we don't go to Death Valley for a very special USB drop attack and your Q&A!
https://www.youtube.com/watch?v=tvRRR71HZ60
#hak5 #usb #drop #attack #video
๐ฅ@cRyPtHoN_INFOSEC_FR
๐ฅ@cRyPtHoN_INFOSEC_EN
๐ฅ@cRyPtHoN_INFOSEC_DE
๐ฅ@BlackBox_Archiv
๐ฅ@NoGoolag
This time on Hack Across America, we don't go to Death Valley for a very special USB drop attack and your Q&A!
https://www.youtube.com/watch?v=tvRRR71HZ60
#hak5 #usb #drop #attack #video
๐ฅ@cRyPtHoN_INFOSEC_FR
๐ฅ@cRyPtHoN_INFOSEC_EN
๐ฅ@cRyPtHoN_INFOSEC_DE
๐ฅ@BlackBox_Archiv
๐ฅ@NoGoolag
This massive DDoS attack took large sections of a country's internet offline
More than 200 organisations across Belgium including the government and parliament were affected by a DDoS attack that overwhelmed them with bad traffic.
A massive distributed denial of service (DDoS) attack took down the websites of more than 200 organisations across Belgium, including government, parliament, universities and research institutes.
The DDoS attack started at 11am on Tuesday 4 May and overwhelmed the web sites with traffic, rendering their public-facing sites unusable for visitors, while the attack overwhelmed internal systems, cutting them off from the internet.
The attack targeted Belnet, the government-funded ISP provider for the county's educational institutions, research centres, scientific institutes and government services โ including government ministries and the Belgian parliament. Some debates and committee meetings had to be postponed as users couldn't access the virtual services required to take part.
https://www.zdnet.com/article/this-massive-ddos-attack-took-large-sections-of-a-countrys-internet-offline/
#ddos #attack #belgium
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
More than 200 organisations across Belgium including the government and parliament were affected by a DDoS attack that overwhelmed them with bad traffic.
A massive distributed denial of service (DDoS) attack took down the websites of more than 200 organisations across Belgium, including government, parliament, universities and research institutes.
The DDoS attack started at 11am on Tuesday 4 May and overwhelmed the web sites with traffic, rendering their public-facing sites unusable for visitors, while the attack overwhelmed internal systems, cutting them off from the internet.
The attack targeted Belnet, the government-funded ISP provider for the county's educational institutions, research centres, scientific institutes and government services โ including government ministries and the Belgian parliament. Some debates and committee meetings had to be postponed as users couldn't access the virtual services required to take part.
https://www.zdnet.com/article/this-massive-ddos-attack-took-large-sections-of-a-countrys-internet-offline/
#ddos #attack #belgium
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
ZDNet
This massive DDoS attack took large sections of a country's internet offline | ZDNet
More than 200 organisations across Belgium including the government and parliament were affected by a DDoS attack that overwhelmed them with bad traffic.
Media is too big
VIEW IN TELEGRAM
Active BGP-based Traceback for Amplification DDoS Attacks
This is talk about reflective DDoS which lets attackers hide behind IP spoofing and explore how BGP poisoning can help to trace back these attacks.
Errata: Contrary to the statement on slide 30, the resulting graphs are only rooted and directed, but not necessarily acyclical. Yet they still provide all required properties.
https://media.ccc.de/v/vnog-11-bgpeek-a-boo-active-bgp-based-tr
#ccc #vnog #bgp #traceback #ddos #attack #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
๐ฝ@NoGoolag
This is talk about reflective DDoS which lets attackers hide behind IP spoofing and explore how BGP poisoning can help to trace back these attacks.
Errata: Contrary to the statement on slide 30, the resulting graphs are only rooted and directed, but not necessarily acyclical. Yet they still provide all required properties.
https://media.ccc.de/v/vnog-11-bgpeek-a-boo-active-bgp-based-tr
#ccc #vnog #bgp #traceback #ddos #attack #video
๐ฝ@cRyPtHoN_INFOSEC_FR
๐ฝ@cRyPtHoN_INFOSEC_EN
๐ฝ@cRyPtHoN_INFOSEC_DE
๐ฝ@BlackBox_Archiv
๐ฝ@NoGoolag
Building a supply chain attack with .NET, NuGet, DNS, source generators, and more!
For a couple of months now, Iโve been pondering about what tools are at your disposal in .NET to help build and execute a supply chain attack. My goal was to see what is available out there, and what we, as .NET developers, should be aware of. Prepare for a long read!
Now, forget that short introduction, and letโs start anewโฆ
โผ๏ธ For educational purposes only
https://blog.maartenballiauw.be/post/2021/05/05/building-a-supply-chain-attack-with-dotnet-nuget-dns-source-generators-and-more.html
#supply #chain #attack #dotnet #nuget #dns #educational
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
For a couple of months now, Iโve been pondering about what tools are at your disposal in .NET to help build and execute a supply chain attack. My goal was to see what is available out there, and what we, as .NET developers, should be aware of. Prepare for a long read!
Now, forget that short introduction, and letโs start anewโฆ
โผ๏ธ For educational purposes only
https://blog.maartenballiauw.be/post/2021/05/05/building-a-supply-chain-attack-with-dotnet-nuget-dns-source-generators-and-more.html
#supply #chain #attack #dotnet #nuget #dns #educational
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
๐ก@NoGoolag
Maarten Balliauw {blog}
Building a supply chain attack with .NET, NuGet, DNS, source generators, and more!
For a couple of months now, Iโve been pondering about what tools are at your disposal in .NET to help build and execute a supply chain attack.My goal was to see what is available out there, and what we, as .NET developers, should be aware of.Prepare for aโฆ
Irish healthcare service targeted by "significant ransomware attack"
Ireland's health care service (HSE) announced on Friday that it has shut down its IT systems due to a "significant ransomware attack."
"There is a significant ransomware attack on HSE IT systems. We have taken the precaution of shutting down all our IT systems in order to protect them from this attack and to allow us to fully assess the situation with our own security partners, HSE said on Twitter.
It added that the attack and decision to shut down its IT infrastructure had no impact on COVID-19 vaccinations or the dispatch of ambulances nationally.
Ransomware is a form of malware โ malicious software โ that encrypts a victim's files with the attacker demanding payment to unlock the data.
But some medical appointments were being cancelled on Friday morning with Dublin's Rotunda Hospital โ which provides maternal care โ announcing on Twitter that "due to a serious IT issue all outpatient visits are cancelled today โ unless you are at 36 weeks pregnant or later." Paediatrics appointments were not affected.
https://www.euronews.com/2021/05/14/irish-healthcare-service-targeted-by-significant-ransomware-attack
#irland #ransomware #attack #healthcare
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Ireland's health care service (HSE) announced on Friday that it has shut down its IT systems due to a "significant ransomware attack."
"There is a significant ransomware attack on HSE IT systems. We have taken the precaution of shutting down all our IT systems in order to protect them from this attack and to allow us to fully assess the situation with our own security partners, HSE said on Twitter.
It added that the attack and decision to shut down its IT infrastructure had no impact on COVID-19 vaccinations or the dispatch of ambulances nationally.
Ransomware is a form of malware โ malicious software โ that encrypts a victim's files with the attacker demanding payment to unlock the data.
But some medical appointments were being cancelled on Friday morning with Dublin's Rotunda Hospital โ which provides maternal care โ announcing on Twitter that "due to a serious IT issue all outpatient visits are cancelled today โ unless you are at 36 weeks pregnant or later." Paediatrics appointments were not affected.
https://www.euronews.com/2021/05/14/irish-healthcare-service-targeted-by-significant-ransomware-attack
#irland #ransomware #attack #healthcare
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
euronews
Irish healthcare service targeted by 'significant ransomware attack'
Ireland's Health Service Executive said on Friday that it has shut down its IT systems as a precaution.
Japanese government agencies suffer data breaches after Fujitsu hack
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool.
Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
It is not yet clear if this breach occurred because of a vulnerability exploit, or a targeted supply-chain attack, and an investigation is ongoing.
Attackers accessed at least 76,000 email addresses
Yesterday, the Ministry of Land, Infrastructure, Transport and Tourism and the National Cyber โโSecurity Center (NISC) of Japan announced that attackers were able to obtain inside information via Fujitsu's information-sharing tool.
Fujitsu also said that attackers had gained unauthorized access to projects that used ProjectWEB, and stolen proprietary data.
Fujitsu's ProjectWEB enables companies and organizations to exchange information internally, with project managers and stakeholders, for example.
https://www.bleepingcomputer.com/news/security/japanese-government-agencies-suffer-data-breaches-after-fujitsu-hack/
#japanese #gov #data #breach #fujitsu #attack
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool.
Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.
It is not yet clear if this breach occurred because of a vulnerability exploit, or a targeted supply-chain attack, and an investigation is ongoing.
Attackers accessed at least 76,000 email addresses
Yesterday, the Ministry of Land, Infrastructure, Transport and Tourism and the National Cyber โโSecurity Center (NISC) of Japan announced that attackers were able to obtain inside information via Fujitsu's information-sharing tool.
Fujitsu also said that attackers had gained unauthorized access to projects that used ProjectWEB, and stolen proprietary data.
Fujitsu's ProjectWEB enables companies and organizations to exchange information internally, with project managers and stakeholders, for example.
https://www.bleepingcomputer.com/news/security/japanese-government-agencies-suffer-data-breaches-after-fujitsu-hack/
#japanese #gov #data #breach #fujitsu #attack
๐ก@cRyPtHoN_INFOSEC_FR
๐ก@cRyPtHoN_INFOSEC_EN
๐ก@cRyPtHoN_INFOSEC_DE
๐ก@BlackBox_Archiv
BleepingComputer
Japanese government agencies suffer data breaches after Fujitsu hack
Offices of multiple Japanese agencies were breached via Fujitsu's "ProjectWEB" information sharing tool. Fujitsu states that attackers gained unauthorized access to projects that used ProjectWEB, and stole some customer data.