Tag Archive for: raid

Claiming a ‘computer crime’ shouldn’t give police a free pass to raid newspapers


This month, police officers in Marion, Kan., crashed into the newsroom of the Marion County Record, a weekly newspaper, and the home of its publisher to seize computers, cellphones and documents. After several days of public outcry, the county attorney ordered the material returned.

Newsroom searches are rare today because a 1980 federal law makes them almost always illegal. But the outcry goes back to colonial days, when British-loyalist redcoats raided revolutionary American pamphleteers. Such searches were seen as the ultimate attack on the free press. In the infamous 1971 search of the Stanford Daily, for example, Palo Alto police were seeking photographs to tie Vietnam War protesters to a violent clash on campus. After the Supreme Court refused to offer protection from such raids, Congress passed the 1980 statute, making newsroom searches far less of a threat.

Read more: Editorial: Raid on Kansas newspaper was possibly illegal — and definitely troubling

Instead, the Marion case highlights a separate, systemic threat to press freedom: vague and sweeping computer crime laws, which exist in all 50 states. These laws can be readily used to intimidate reporters and suppress reporting without raiding their offices.

The Marion raid appears to be the first time public officials have searched a newspaper under the claim of enforcing a computer crime law. The search warrant in that case listed violations of statutes covering identity theft and “unlawful acts concerning computers.”

Read more: Opinion: We’ve defended Trump’s 1st Amendment rights. But his latest claims about the Jan. 6 indictment are nonsense

The state computer crime statute applies when someone breaks into a computer network with malware or uses another person’s information to steal money from their bank account. But these laws are so vague that they can be deployed to penalize reporters for using computers to find information online as part of routine journalism.

In Missouri, for instance, a reporter for the St. Louis Post-Dispatch discovered a serious flaw in a state website that put the security of thousands of Social Security numbers at risk. He alerted the state agency so it could fix the issue before he published…

Source…

German Police Raid DDoS-Friendly Host ‘FlyHosting’


Authorities in Germany this week seized Internet servers that powered FlyHosting, a dark web offering that catered to cybercriminals operating DDoS-for-hire services, KrebsOnSecurity has learned. FlyHosting first advertised on cybercrime forums in November 2022, saying it was a Germany-based hosting firm that was open for business to anyone looking for a reliable place to host malware, botnet controllers, or DDoS-for-hire infrastructure.

A seizure notice left on the FlyHosting domains.

A statement released today by the German Federal Criminal Police Office says they served eight search warrants on March 30, and identified five individuals aged 16-24 suspected of operating “an internet service” since mid-2021. The German authorities did not name the suspects or the Internet service in question.

“Previously unknown perpetrators used the Internet service provided by the suspects in particular for so-called ‘DDoS attacks’, i.e. the simultaneous sending of a large number of data packets via the Internet for the purpose of disrupting other data processing systems,” the statement reads.

News of a raid on FlyHosting first surfaced Thursday in a Telegram chat channel that is frequented by people interested or involved in the DDoS-for-hire industry, where a user by the name Dstatcc broke the news to Fly Hosting customers:

“So Flyhosting made a ‘migration’ with it[s] systems to new rooms of the police ;),” the warning read. “Police says: They support ddos attacks, C&C/C2 and stresser a bit too much. We expect the police will take a deeper look into the files, payment logs and IP’s. If you had a server from them and they could find ‘bad things’ connected with you (payed with private paypal) you may ask a lawyer.”

An ad for FlyHosting posted by the the user “bnt” on the now-defunct cybercrime forum BreachForums. Image: Ke-la.com.

The German authorities said that as a result of the DDoS attacks facilitated by the defendants, the websites of various companies as well as those of the Hesse police have been overloaded in several cases since mid-2021, “so that they could only be operated to a limited extent or no longer at times.”

The statement says police…

Source…

Recovering from a Ransomware Attack on Your RAID System


Did you know in the first half of 2022, there were 236.1 million ransomware attacks worldwide? The attacks are increasing everywhere as hackers adopt highly deceiving methods to attack systems.

The highly protective data storage RAID systems are also prone to this attack. So, if you encounter such a situation, it’s important to ensure recovery from ransomware attack proactively. The article narrows down all these steps you can take as soon as your RAID system encounters ransomware attacks.

Recovering from a Ransomware Attack on Your RAID System

Recovering from a Ransomware Attack

Here are all the steps from identifying to recovering from a ransomware attack on your RAID system.

Identifying Ransomware Attacks

The ransomware generators and hackers send malicious files or links to the systems. Although these links and files look normal, they contain ransomware. When a user clicks on these malicious sources, it blocks access to files or encrypts files until the user pays the asked ransom; that is money.

Initially, these attacks were popular among businesses, companies, and organizations. But new techniques target individuals, and your highly protected RAID systems can be its target. Therefore, you must know the cybersecurity threats users should prepare for in 2023 to stay updated.

Initiating RAID Recovery

The RAID (redundant array of independent disks) stores a single data in different places on multiple hard disks or solid-state drives (SSDs). It helps you to retrieve the data in case the drive fails. There are various levels of RAID used for different purposes. However, this system can be attacked by ransomware.

A malware infection like ransomware attacks the RAID system and the sensitive information it holds. To retrieve your data, a user must reconstruct or rebuild the RAID configuration. But it’s tough for non-technical people to do so. As a result, to recover RAID data quickly, you can opt for professional services.

How to Recover from a Ransomware Attack on Your RAID System

Here are a few steps you can take as soon as you identify a ransomware attack:

Scan the RAID: The first step is to scan the RAID drive. Then, you can scan the drive and find the lost data and restore it.

Search the Files: You can search…

Source…

Google will send air raid alerts to Android phones in Ukraine


Android users in Ukraine will get air raid alerts directly on their phones before expected attacks happen near them, Google announced today. In an updated blog post, the company said it’s working with the Ukrainian government to roll out an alert system for Android phones in the country. The feature was first spotted by XDA-Developers.

“Tragically, millions of people in Ukraine now rely on air strike alerts to try to get to safety,” Google says in the announcement. The Android pings will be based on the alerts already being sent by the Ukrainian government, and it’s adapted from a system built for quickly sending warnings about earthquakes, according to Dave Burke, vice president of engineering for Android.

Google has already been highlighting the Ukrainian Alarm app on the Google Play Store, which sends air raid notifications to Ukrainians in regions with active alerts. The new alerts system begins rolling out today and will ramp up to all Android phones in Ukraine in the coming days, Burke says.

Since Russia’s invasion of Ukraine, Google has scaled back its presence in Russia, including pausing all ad sales and removing Russian state-funded media apps from Google Play in Europe.

“The Russian invasion of Ukraine is both a tragedy and a humanitarian disaster in the making,” Google wrote on March 1st. The company said it was working to “support people in Ukraine through our products, defend against cybersecurity threats, surface high-quality, reliable information and ensure the safety and security of our colleagues and their families in the region.”

Source…