Morrissey Technology

Loading

Hackers Break into Pentagon's IT Service Provider

Hackers Break into Pentagon’s IT Service Provider, Sensitive Data Leaked?

Morrissey Technology – Hacking groups or hackers broke into and leaked information technology (IT) service providers from a number of government agencies in the United States, including the Pentagon to NASA. The hackers leaked stolen internal documents from Leidos Holdings Inc, one of the largest providers of IT services to the US government.

The company recently became aware of the issue and believes the documents were taken during a previously reported Diligent Corp systems leak. Leidos is currently investigating the data leak incident.

The Bloomberg report, citing archives from June 2023, said that the Virginia-based company used the Diligent system to store information collected in internal investigations. Leidos confirmed this issue stems from a previous incident affecting a third-party vendor. They have also announced this in 2023.

“This incident did not impact our network or sensitive customer data,” the company said.

A Diligent spokesperson said that this issue is likely related to an incident from 2022, which affected its subsidiary, Steele Compliance Solutions. The company has notified affected customers and has taken corrective action to address the incident in November 2022.

Previously, not long ago, around 1.4 GB of data belonging to the National Security Agency (NSA) was also reportedly leaked and posted on a dark forum. The leaked data included a number of sensitive and confidential information.

This NSA data leak was first revealed by Cyber ​​Press researchers. The leaked data reportedly contained sensitive information, including internal communications, classified documents, and personal data of NSA employees.

“The threat actor claims the data was allegedly obtained from a data breach of Acuity Inc, a company that collaborates with the United States government and its allies,”.

This leak raises serious national security concerns and highlights vulnerabilities in government contractors’ cybersecurity measures.

https://doae.ong.br/port/for4d/

https://bluegreens.in/-/togelonline/

Spyware

Malicious Spyware Threatens iPhone Users in 98 Countries

Morrissey Technology – iPhone users are once again the target of a terrifying spyware attack. Apple has issued a warning to iPhone users in 98 countries. In its latest alert, Apple did not reveal the bad actors involved in this latest attack or the list of countries where users received the alert. Since 2021, Apple has sent similar warnings to iPhone users in more than 150 countries.

“Apple detected that you were the target of a paid spyware attack that attempted to remotely compromise the iPhone associated with your Apple ID -xxx-,” Apple said in a warning received by affected users, as quoted by TechCrunch.

“This attack may target you specifically based on who you are or what you do for a living,” he continued.

Apple says it’s difficult to get complete certainty about detections like this. However, they are very confident about the warnings issued and ask users to take them seriously. iPhone users in India were among the group that received the warning. Last October, a number of journalists and politicians in India also received the same warning.

Not long after, they reported the discovery of Pegasus spyware on an iPhone belonging to a well-known journalist in India. This spyware made by the Israeli company NSO Group is considered vicious because it can infect and access all personal data on an iPhone via a zero-click attack. Just by receiving a special SMS, without even opening or clicking any link, this spyware infiltrates the iPhone without the user’s knowledge.

In its warning, Apple emphasized the highly sensitive nature of its threat detection methods. Therefore they cannot provide too detailed information for fear that it will be exploited by cybercriminals to avoid detection in the future.

Apple will of course immediately try to patch the security gaps that have been found. To avoid further attacks, iPhone users who have sensitive jobs such as journalists and politicians are asked to activate Lockdown mode.

https://perikananindonesia.com/

Cellphones Hackers

Beware of the Various Ways Hackers Hack Cell Phones, Check Out the List

Morrissey TechnologyCybercriminals are starting to become adept at using various methods to hack the cellphones of their potential victims. They can even hack phones remotely. Hacking a cellphone requires a combination of sophisticated techniques and exploiting vulnerabilities in the device’s operating system (OS) or applications.

Even now, many hackers have created spyware applications to secretly steal users’ personal data. Usually hackers exploit security vulnerabilities in the user’s OS or device applications, with the aim of harming the user. According to cyber security company AVG Technology, the following are common techniques usually used by hackers to hack smartphone security.

1. Phishing

This technique involves the use of social engineering tactics to deceive users with the aim of getting users to reveal their personal information. Phishing can look simple, like just an e-mail saying “FREE” which then redirects the user to a malicious site if clicked. Or it could be a more complex scheme, such as an online quiz format where the answers tell the hacker information about the date of birth, birth mother’s maiden name, or even the name of the user’s first pet. Phishing also usually has its own victims, such as spear phishing which is a type of phishing attack that focuses on tricking one particular individual into revealing their personal information.

2. Spy apps

One way to infect a cell phone with malicious software (malware) is to convince users to download applications that have hidden tracking features. Apps like these can masquerade as games, productivity apps, or even promising security apps. In fact, the application is a spyware application that tracks online activities and personal data from users. Some spyware on Android can even spy on smartphones that are turned off. Another type of dangerous software for users is stalkerware, which can track a user’s movements, browsing, messages and calls. This stalkerware is usually installed by someone close to the user.

3. SIM swap

Two-Factor Authentication (2FA), which confirms login with a text message sent to the cellphone, is a technique used by hackers to hack telephone numbers by swapping them to another SIM card (owned by the hacker).

4. Unauthorized access

Hackers can use phishing or other techniques to access users’ iCloud or Google accounts. This is apparently caused by the large number of users who link their accounts to social media, so that hackers can easily exploit accounts with unauthorized (illegal) access. With unauthorized access to a user’s account, hackers can see personal information such as the user’s location, email, messages, and passwords.

5. Bluetooth

Apart from being able to easily connect a user’s device to other devices, Bluetooth connections can also make cellphones more vulnerable to hacking. Hackers can use software to intercept Bluetooth signals and gain access to users’ phones. Therefore, do not pair your cellphone with an unfamiliar, untrusted device or in an unsafe location.

These SIM swapping scams typically start with phishing attempts designed to provide hackers with information to impersonate users at the service provider. Once there is enough information, the hacker can use the phone number to initiate a SIM swap.

6. Wi-Fi

Similar to Bluetooth, hackers can also use Wi-Fi connections to gain access to iPhone and Android devices belonging to potential victims. Using a public Wi-Fi network is very risky, as there is a possibility that the network has been previously set up to connect. Apart from that, users can also set up a mobile VPN on iPhone or Android. VPN or virtual private network encrypts user connections to prevent hackers from accessing the phone.

7. Charging station

This fraud is called juice jacking, the technique is carried out by infecting stations using malware. The target is users whose batteries are running low, which will not only provide a power boost, but malware connected to the cellphone will be able to monitor what the user does, collect and transmit personal data, and even make withdrawals from the user’s bank account.

8. Trojans

Trojans are malware that disguise themselves as harmless applications or files to trick users into opening them. Hackers can spy on users, use users’ cellphones in botnets (Robot Network), or even send malicious SMS messages.

9. Crypto piracy

Cryptopjacking FOR4D is the unauthorized use of a device to mine cryptocurrency without the knowledge or consent of the user. Hackers infect users’ phones and secretly install crypto mining malware that is used to mine cryptocurrency and send it directly to the hacker’s digital crypto wallet.