Tag Archive for: Traced

IP address of Mumbai passport hacker traced to Noida | Mumbai News


MUMBAI: The Azad Maidan police, probing a case of hacking where an unidentified person illegally accessed the system of the city police passport verification branch, found that the accused had used an internet protocol (IP) address allotted to a device in Noida.The accused had cleared three passport application files pending for inquiry and forwarded them to the passport office.
The police had booked an unidentified accused for forgery, forgery of valuable security, will, etc, identity theft, punishment for cheating by using computer resources and a protected system under various sections of the IPC and IT Act.
The police inquiry for three passports belonging to women from Antop Hill, Chembur and Tilak Nagar in Mumbai were cleared by the accused. “We called the three applicants and their statements have been recorded. We have not found any common link between them so far,” said a police officer. Investigators are collecting call details records (CDR) and subscriber details records (SDR) of the persons concerned in this case.
Investigators are now waiting for details from the internet service provider (ISP) about the person the IP address was allotted. “We are also probing if the accused used a free virtual private network (VPN). However, the possibility of free VPN is low since its duration is for 15 minutes only and then the IP changes. In this case, a single IP was used for one and a half hours,” said an officer. A VPN hides a user’s identity. An ISP can find who was allotted an IP at that time or if it was a paid VPN used by the accused.A special branch-II officer who works in the passport branch had lodged an FIR in the case.

Source…

Report: Majority of malware downloads in 2021 were traced to cloud apps


Did you miss a session from the Future of Work Summit? Head over to our Future of Work Summit on-demand library to stream.


According to a new report by Netskope, more than two-thirds of malware downloads came from cloud apps in 2021.

Examining changes in the malware landscape in 2021, the report highlights that attackers are enjoying more success abusing cloud apps to deliver malware payloads to their victims. For example, in Q2 2020, Netskope saw a sudden spike in malicious Office documents driven primarily by Emotet, which launched a large-scale and highly effective mal-spam campaign that delivered malicious Office documents using popular cloud apps. Since then, copycat groups have continued to abuse Office documents to deliver malware, and the quantity of malicious documents remains high above pre-Emotet levels.

Credential attacks against managed cloud apps continue at the same rate as 2020, but with a shift in the sources of the attacks. The top source of credential attacks in 2020 were a few heavy hitters responsible for numerous login attempts. In 2021, however, credential attacks came from a much larger number of sources, each responsible for fewer login attempts.

Title: Top credential attack source countries 2021. United States is 19%, China is 11%, Vietnam is 9%, Brazil s 6%, Pakistan is 4%, Thailand is 3%, Russia is 3%, India is 3%, and others are 41%.

Finally, Netskope analyzed a different type of data risk — insider threats. In 2021, Netskope observed users leaving their jobs at twice the rate of 2020. Users leaving the organization pose a serious data security risk, with more than one out of every seven people using personal cloud storage apps to take data with them when they leave. The report examines how cloud storage apps’ overall popularity among users is a primary driver for their appearance at the top of the malware download and insider threat leaderboards.

Read the full report by Netskope.

VentureBeat

VentureBeat’s mission is to be a digital town square for technical decision-makers to gain knowledge about transformative technology and transact.

Our site delivers essential information on data technologies and strategies to guide you as you lead your organizations. We invite you to become a member of our community, to access:

  • up-to-date information on the subjects of interest to you
  • our newsletters
  • gated thought-leader content and…

Source…

Marriott breach traced to Chinese hackers; U.S. plans response – The Seattle Times

  1. Marriott breach traced to Chinese hackers; U.S. plans response  The Seattle Times
  2. Marriott Data Breach Is Traced to Chinese Hackers as U.S. Readies Crackdown on Beijing  The New York Times
  3. Chinese Hackers Reportedly Behind Marriott Cyberattack  TheStreet Tech
  4. Chinese Hackers Are Likely Responsible For Marriott Data Breach, Reports Say  NPR
  5. New York Times: Chinese hackers behind massive Marriott breach  CNN
  6. View full coverage on read more

“chinese hackers” – read more

Dark Caracal: Hacking group tied to Android spyware traced to Lebanon

  1. Dark Caracal: Hacking group tied to Android spyware traced to Lebanon  CSO Online
  2. Dark Caracal: Government spyware targets Android users worldwide  The INQUIRER
  3. Dark Caracal Targets Android Devices in Global Cyber-Espionage Campaign  eWeek
  4. EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World  EFF
  5. 500 Hacks From Beirut Show Any Government Can Spy On Google’s Androids  Forbes
  6. Full coverage

android security news – read more