article thumbnail

An Interview With the Target & Home Depot Hacker

Krebs on Security

In December 2023, KrebsOnSecurity revealed the real-life identity of Rescator , the nickname used by a Russian cybercriminal who sold more than 100 million payment cards stolen from Target and Home Depot between 2013 and 2014. “Helkern was my friend, I [set up a] meeting with Golubov and him in 2013,” Shefel said.

Retail 254
article thumbnail

This Service Helps Malware Authors Fix Flaws in their Code

Krebs on Security

Almost daily now there is news about flaws in commercial software that lead to computers getting hacked and seeded with malware. Here’s a look at one long-lived malware vulnerability testing service that is used and run by some of the Dark Web’s top cybercriminals. RedBear’s profile on the Russian-language xss[.]is

Malware 350
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

U.S. Offered $10M for Hacker Just Arrested by Russia

Krebs on Security

Last week, the Russian government reportedly arrested Matveev and charged him with creating malware used to extort companies. government indicted Matveev as a top ransomware purveyor a year later, offering $10 million for information leading to his arrest. An FBI wanted poster for Matveev. Matveev, a.k.a. prosecutors allege.

article thumbnail

U.S. Govt. Apps Bundled Russian Code With Ties to Mobile Malware Developer

Krebs on Security

But that story omitted an important historical detail about Pushwoosh: In 2013, one of its developers admitted to authoring the Pincer Trojan , malware designed to surreptitiously intercept and forward text messages from Android mobile devices. ” wherein Shmakov acknowledged writing the malware as a freelance project.

Mobile 286
article thumbnail

What Program, Released In 2013, Is an Example of Ransomware?

Hacker Combat

What Program, Released In 2013, Is an Example of Ransomware? When you introduce malware on your PC, it will scramble your documents very quickly, thus you will not have a lot of time to respond. The vast majority of the top anti-malware programming can rapidly identify and eliminate malware from a PC without erasing your documents.

article thumbnail

Giving a Face to the Malware Proxy Service ‘Faceless’

Krebs on Security

For the past seven years, a malware-based proxy service known as “ Faceless ” has sold anonymity to countless cybercriminals. The proxy lookup page inside the malware-based anonymity service Faceless. In 2013, U.S. Image: spur.us. as a media sharing device on a local network that was somehow exposed to the Internet.

Malware 292
article thumbnail

6 cyber-espionage campaigns since 2013 attributed to PKPLUG China-linked group

Security Affairs

“For three years, Unit 42 has tracked a set of cyber espionage attack campaigns across Asia, which used a mix of publicly available and custom malware. The China-linked APT group has been active for at least six years, it used both custom-made and publicly available malware. Hackers targeted primarily the Uyghurs minority.

Malware 109