article thumbnail

A Basic Timeline of the Exchange Mass-Hack

Krebs on Security

Here’s a brief timeline of what we know leading up to last week’s mass-hack, when hundreds of thousands of Microsoft Exchange Server systems got compromised and seeded with a powerful backdoor Trojan horse program. When did Microsoft find out about attacks on previously unknown vulnerabilities in Exchange?

Hacking 362
article thumbnail

Hacking Pickleball

Schneier on Security

Sports are filled with hacks, as players look for every possible advantage that doesn’t explicitly break the rules. My latest book, A Hacker’s Mind , has a lot of sports stories. I don’t understand pickleball at all, so that explanation doesn’t make a lot of sense to me. (I But it looks like an excellent example.

Hacking 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How China Uses Stolen US Personnel Data

Schneier on Security

Interesting analysis of China’s efforts to identify US spies: By about 2010, two former CIA officials recalled, the Chinese security services had instituted a sophisticated travel intelligence program, developing databases that tracked flights and passenger lists for espionage purposes. The capability was there and was being utilized.”

Hacking 361
article thumbnail

WeLeakInfo Leaked Customer Payment Info

Krebs on Security

com , a wildly popular service that sold access to more than 12 billion usernames and passwords stolen from thousands of hacked websites. For several years, WeLeakInfo was the largest of several services selling access to hacked passwords. That’s about when AOL sold the platform in 2010 to Russian investor DST for $187.5

Passwords 328
article thumbnail

U.S., U.K. Sanction 7 Men Tied to Trickbot Hacking Group

Krebs on Security

” Only one of the men sanctioned today is known to have been criminally charged in connection with hacking activity. Secret Service determined that he ran a massive “money mule” scheme, which used phony job offers to trick people into laundering money stolen from hacked small to mid-sized businesses in the United States.

Hacking 208
article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

Which brings us back to Aadhaar and some rather unpleasant headlines of late, particularly the likes of The World's Largest Biometric ID System Keeps Getting Hacked. They claim that they're hack-proof. But claiming the service is "hack-proof", that's something I definitely have an issue with. Can you prove otherwise?

Hacking 278
article thumbnail

RSAC insights: SolarWinds hack illustrates why software builds need scrutiny — at deployment

The Last Watchdog

By patiently slipping past the best cybersecurity systems money can buy and evading detection for 16 months, the perpetrators of the SolarWinds hack reminded us just how much heavy lifting still needs to get done to make digital commerce as secure as it needs to be. Related: DHS launches 60-day cybersecurity sprints.

Software 202