Wikileaks merilis dokumen Malware dan Tehnik Hacking CIA

teknik hacking komputer milik badan intelijen Amerika ,CIA. Rilis ini sangat  mengejutkan mengingat informasinya  merupakan informasi rahasia yang menunjukkan upaya pemerintah Amerika untuk diversifikasi perangkat pemantauan dijitalnya dan untuk mengatasi persoalan informasi yang tersan

Jumat, 05 May 2017
Recent MNKit Exploit Activity Reveals Some Common Threads

Unit 42 recently identified a variant of MNKit-weaponized documents
being used to deliver LURK0 Gh0st, NetTraveler, and Saker payloads. The
documents were delivered to targets involved with universities, NGOs,
and political/human rights groups concerning Islam and South Asia. Re

Senin, 01 Aug 2016
APT Group ‘Patchwork’ Cuts-and-Pastes a Potent Attack

An advanced persistent threat tied to Southeast Asia and the South
China Sea is targeting governments and entities around the world
including the U.S.
Cymmetria Research, which discovered the APT and today released a report
on the attacks, calls those responsible

Senin, 01 Aug 2016
NetTraveler APT Targets Russian, European Interests

Throughout 2016, Proofpoint researchers tracked a cyber-espionage
campaign targeting victims in Russia and neighboring countries. The
actor utilizes spear phishing campaigns to deliver NetTraveler, also
known as TravNet. First observed as early as 2004, NetTraveler is a

Senin, 01 Aug 2016
Using a Colleague's Willingly Shared Password Considered "Hacking" in the US

The California 9th Circuit Court of Appeals ruled yesterday that if a
person uses a password willingly shared by someone else, it still
constitutes a "hacking" offense in certain circumstances, according to
the ancient CFAA (Computer Fraud and Abuse Act) law.


Senin, 01 Aug 2016
WikiLeaks knocked offline in ongoing feud between OurMine hacking gang and Anonymous

You would be wrong to think that all the hackers, hacktivists, internet
anarchists and members of the computer underground out there get along
fine. Many of them cannot stand each other, and it’s not uncommon to
stumble across any number of spats and turf wars taking place

Senin, 01 Aug 2016
Complex Bitcoin Phishing Scheme Leads Back to Rogue Web Hosting Firm

Researchers from Cisco's OpenDNS security team have uncovered a complex
phishing scheme aimed at collecting user credentials from various
Bitcoin-related services, which, under a closer scrutiny, led back to a
known bulletproof hosting firm.
The crooks behind

Kamis, 14 Jul 2016
Online backup firm Carbonite tells users to change their passwords now

Online backup company Carbonite is the latest firm to have issued a
warning that hackers are attempting to break into its users accounts,
and are prompting all users to change their passwords as a result.

An email has been sent to Carbonite users explaining that the attackers<

Kamis, 14 Jul 2016
New Ransomware called CryptoRoger that appends .crptrgr to Encrypted Files

A new ransomware called CryptoRoger has been discovered today by
MalwareBytes security researcher S!Ri. This ransomware will encrypt a
victim's files using AES encryption and then appends the .crptrgr
extension to encrypted filenames.  The malware dev then demands a ran

Kamis, 14 Jul 2016
The Curious Case of an Unknown Trojan Targeting German-Speaking Users

Last week, an unidentified malware (with SHA-256
171693ab13668c6004a1e08b83c9877a55f150aaa6d8a624c3f8ffc712b22f0b) was
discovered and circulated on Twitter by researcher @JAMES_MHT. Many
researchers - including us - were unable to identify the malware so we
decided to dig

Kamis, 14 Jul 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: