Dox hackers ICE, DHS, DOJ, and FBI officials


Its amazing A new study, researchers at the University of California, San Diego and the University of Maryland, revealed this week that The satellites leak a large amount of sensitive data that is completely unencryptedfrom calls and texts on T-Mobile to in-flight Wi-Fi browsing sessions, to military and police communications. And they did it with just $800 worth of off-the-shelf equipment.

Facial recognition systems seem to be everywhere. But what happens when this surveillance and identification technology is used It does not recognize your face as a face? WIRED spoke with six people with facial differences who say flaws in these systems prevent them from accessing basic services.

Authorities in the US and UK announced this week Nearly 130,000 Bitcoins were confiscated From the alleged Cambodian fraud empire. At the time of the seizure, the value of cryptocurrency wealth was $15 billion, the largest amount of any type of money ever seized in the United States.

Controlling much of the US election infrastructure Now in the hands of one former Republican operativeScott Leyendecker, who just bought voting machine company Dominion Voting Systems and owns Knowink, an electronic poll book company. Election security experts are currently more confused about the ramifications than concerned about any possibility of crime.

While a new type of attack can Allowing hackers to steal two-factor authentication codes from Android phoneswas the biggest cybersecurity development of the week Security company F5 hacked. The attack, carried out by a “sophisticated” threat actor said to be linked to China, poses an “imminent threat” of breaches against government agencies and Fortune 500 companies. Finally, we examined the chaos caused by VPNs for iPhones and I found the only three worth using.

But that’s not all! Every week we round up security and privacy news that we haven’t covered in depth ourselves. Click on the titles to read the full stories. And stay safe out there.

In recent years, perhaps no group of hackers has caused more mayhem than “Com”, a loose collection of mostly cybercrime gangs whose subgroups include such as $sheets and Scattered spider It carried out cyber attacks and ransomware extortion operations targeting victims from MGM casinos to Marks & Spencer grocery stores. Now they have turned their sites over to US federal law enforcement authorities.

On Thursday, a member of the Com loose group began posting a batch of profile documents for federal officials on Telegram. One spreadsheet, according to 404 Media, contains what appears to be personal information for 680 Department of Homeland Security officials, while another includes personal information for 170 FBI officials, and another 190 Justice Department officials. The data in some cases included names, email addresses, phone numbers, addresses, and, in some cases, the home addresses of officials but not their work locations. The user who issued the data mentioned in his messages a statement From the Department of Homeland Security that Mexican cartels offered thousands of dollars to locate information on agents, an apparent mockery of this unverified claim.

“Mexican cartels, we’re shooting down all the goblins, where’s my million,” the user who posted the files wrote, using shorthand for “hit me” and appearing to demand $1 million. “I want my money in Mexico.”

For the past year — at least — the FBI has operated a “secret” task force that may have worked to disrupt Russian ransomware gangs, according to reports published this week in the Journal French Le Monde and German newspaper Die Zeit. The publications claim that at the end of last year, the mysterious Group of 78 presented its strategy to two different meetings of European officials, including law enforcement officials and those working in the judicial services. Little is known about the group. However, its controversial tactics appear to have prompted normally silent European officials to speak out about the G78’s existence and tactics.

At the end of last year, according to reports, Group 78 was focusing on Russian speakers Black rug The ransomware gang identified two approaches: running operations inside Russia to disable gang members and try to get them to leave the country; And also “manipulating” Russian authorities into prosecuting Black Pasta members. Over the past few years, Western law enforcement officials have taken increasingly devastating measures against Russian ransomware gangs, including Hacking their technical infrastructureyou try Destroy their reputationAnd version A A wave of sanctions and arrest ordersBut covert action inside Russia against ransomware gangs would be unprecedented (at least given public knowledge). The Black Pasta group has risen in recent months He went into hibernation after 200,000 of his internal messages It was leaked and its alleged leader identified.

Over the past few years, AI-powered license plate recognition cameras– which are placed on the side of the road or in police cars – have collected billions of images People’s vehicles and their specific locations. This technology is a powerful surveillance tool and, unsurprisingly, has been adopted by law enforcement officials across the United States, raising questions about how officials are abusing access to cameras and data.

This week, A Message from Senator Ron Wyden It revealed that one division of Immigration and Customs Enforcement, the Secret Service, and Navy criminal investigators all had access to data from Flock Safety cameras. “I now believe that abuse of your product is not only likely, but inevitable, and that Fluke is unable and uninterested in preventing it,” Wyden’s letter to Fluke says. Wyden’s letter comes in the wake of mounting reports that government agencies, including Customs and Border Protection, were aware Access to Flock’s 80,000 cameras. “In my view, local elected officials can best protect their constituents from the inevitable abuses of Fluke cameras by removing Fluke from their communities,” Wyden wrote.

Leave a Reply

Your email address will not be published. Required fields are marked *