Remove Hacking Remove Malware Remove Telecommunications
article thumbnail

Video: Salt Typhoon Hacks Major Telecom Giants Using Malware

eSecurity Planet

In this video, we delve into the world of cybercrime with our feature on the Salt Typhoon incident, where hackers successfully breached major telecommunications companies. The post Video: Salt Typhoon Hacks Major Telecom Giants Using Malware appeared first on eSecurity Planet.

Hacking 105
article thumbnail

U.S. agency cautions employees to limit phone use due to Salt Typhoon hack of telco providers

Security Affairs

US CFPB warns employees to avoid work-related mobile calls and texts following China-linked Salt Typhoon hack over security concerns. Do NOT conduct CFPB work using mobile voice calls or text messages,” reads the email sent to the employees referencing a recent government statement acknowledging the telecommunications infrastructure attack.

Hacking 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ukrainian telecommunications operators hit by DarkCrystal RAT malware

Security Affairs

The Ukrainian CERT-UA warns of attacks against Ukrainian telecommunications operators involving the DarkCrystal RAT. The Governmental Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a malware campaign targeting Ukrainian telecommunications operators with the DarkCrystal RAT. SecurityAffairs – hacking, RAT).

article thumbnail

Hacked by Police

Schneier on Security

French police hacked EncroChat secure phones, which are widely used by criminals: Encrochat's phones are essentially modified Android devices, with some models using the "BQ Aquaris X2," an Android handset released in 2018 by a Spanish electronics company, according to the leaked documents. Lots of details about the hack in the article.

Hacking 279
article thumbnail

Cell Networks Hacked by (Probable) Nation-State Attackers

Schneier on Security

Their goal, the researchers believe, is to obtain and download rolling records on the target from the cell provider's database without having to deploy malware on each target's device. [.]. The attack was aiming to obtain CDR records of a large telecommunications provider.

Hacking 277
article thumbnail

RansomHub gang claims the hack of the telecommunications giant Frontier Communications

Security Affairs

The RansomHub ransomware group added the American telecommunications company Frontier Comunications to the list of victims on its Tor leak site. The RansomHub ransomware group claimed to have stolen the information of over 2 million customers from the American telecommunications company Frontier Communications.

article thumbnail

Technical Report of the Bezos Phone Hack

Schneier on Security

Motherboard obtained and published the technical report on the hack of Jeff Bezos's phone, which is being attributed to Saudi Arabia, specifically to Crown Prince Mohammed bin Salman.investigators set up a secure lab to examine the phone and its artifacts and spent two days poring over the device but were unable to find any malware on it.

Hacking 273