Remove Accountability Remove Internet Remove System Administration
article thumbnail

Yandex security team caught admin selling access to users’ inboxes

Security Affairs

Russian internet and search company Yandex discloses a data breach, a system administrator was selling access to thousands of user mailboxes. The employee was one of three system administrators with the necessary access rights to provide technical support for the service.

article thumbnail

Yandex Email Admin Sold His Inbox Access and Compromised Almost 5,000 Accounts

Hot for Security

Yandex is an Internet company that provides users with a suite of products like Internet browsers for all major platforms, a search engine, an ad platform and an email service. It turns out that one of the three people working support for the email service, with access to people’s email accounts, used that power for profit.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

DDoS Mitigation Firm Founder Admits to DDoS

Krebs on Security

DDoS attacks involve flooding a target Web site with so much junk Internet traffic that it can no longer accommodate legitimate visitors.

DDOS 315
article thumbnail

REvil Ransom Arrest, $6M Seizure, and $10M Reward

Krebs on Security

If it sounds unlikely that a normal Internet user could make millions of dollars unmasking the identities of REvil gang members, take heart and consider that the two men indicted as part this law enforcement action do not appear to have done much to separate their cybercriminal identities from their real-life selves. 3 was Lublin, Poland.

article thumbnail

A Closer Look at the Snatch Data Ransom Group

Krebs on Security

“The command requires Windows system administrators,” Truniger’s ads explained. Semen-7907 registered at Tunngle from the Internet address 31.192.175[.]63 was also used to register an account at the online game stalker[.]so ru account and posted as him. ru account was used without his permission.

article thumbnail

How Did Authorities Identify the Alleged Lockbit Boss?

Krebs on Security

According to Constella, this email address was used in 2010 to register an account for a Dmitry Yurievich Khoroshev from Voronezh, Russia at the hosting provider firstvds.ru. 2011 said he was a system administrator and C++ coder. NeroWolfe seems to have abandoned all of his forum accounts sometime in 2016. “P.S.

article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

Log4J, aka Log4Shell, refers to a gaping vulnerability that exists in an open-source logging library that’s deeply embedded within servers and applications all across the public Internet. Its function is to record events in a log for a system administrator to review and act upon. Implementing SBOM.

Software 255