If you are an ethical hacker trainer or have done a some kind of certifications in ethical hacking, you know how simple is to do phishing. Stronger is your social engineering knowledge, the more sophisticated phishing attacks you can launch. There are lots of tools available in the market which can help you set up your own phishing campaigns and spread your reign. Security researchers in tech giants like Google, Microsoft and AV companies work day and night to detect new phishing campaigns run by these malware operators and thus immediately update their databases to protect common unaware people about those campaigns. There is an always race among researchers and…
-
-
THE TRANSPARENT BLOCKCHAIN: CATCHING CYBERCRIMINALS FROM THEIR ANONYMOUS WORLD
We all know that cryptocurrencies are the only way to do anonymous transaction. Either it is FBI or NIA, they find it impossible to track the record of transaction made through cryptocurrency. Every technology geek in today’s time have tried to understand the concept of cryptocurrency due to its growing popularity. In many countries, the cryptocurrency is banned but still it a trending currency in the cyber criminal underground world. But do you wonder what makes it trending in the underground? Well the answer for this question is straightforward. As said above, the cryptocurrency provides a way to cyber criminals to make their transactions absolutely anonymous. What this means is…
-
MUHSTIK BOTNET STRIKES AGAIN, EXPLOITING SERVERS WITH WEAK PASSWORDS
In the 21st century, we all know the importance of privacy due to growth of digital era in all sectors. Either a person is educated or not, he/she knows the fact that they have to give utmost importance to their privacy. But the word privacy sometimes have double meaning. If we take the case of tech giants or organization, they are sometimes caught up tracking your personal data which they are not authorized to do so in the name of privacy, whereas on the other hand we all know hackers steal our data to exploit our privacy. As a privileged user, you can revoke the company or organization in first…
-
SMAUG RaaS IS HERE TO HELP CYBER CRIMINALS
In this pandemic, the startups have excessively grown across the world due to millions of people losing their jobs across the world. Individuals having small amount of investment with them have put it all in their new startups thinking that they can make something big. There are no doubts that future of a startup is totally dependent upon the type of idea. Every idea is not big but sometimes resources provided to that idea make it a super hit. Tech giants like Google, Microsoft, Alibaba support many startups financially but their investment to startups totally depend upon what idea does an individual have? How much knowledge does he/she have about…
-
ONE RANSOMWARE, TWO FAMILIES
Every organization, corporate or company invest a large amount of their revenue in protecting network infrastructure from cyber attacks. Though cyber criminals sometimes have strategical target, they can unconditionally attack any organization . For the organizations which got attacked, it becomes very difficult to recover data and revenue which it lost while recovering from attacks. The most damaging tool for cyber criminal is to infect the victim’s computer with a ransomware. The simple reason behind this is the hard encryption which is almost impossible to decrypt. But some security experts with much experience and exceptional knowledge are able to do so. These ransomware operators generally encrypt the victim’s file using…