Ask me anything

TechDesk,
@TechDesk@flipboard.social avatar

A hacker group has claimed responsibility for a cyberattack that targeted auction house Christie’s earlier this month.

The attack took place just before the start of its high-profile spring sales event involving more than $850 million worth of art. Online bidding was suspended, but the group claims it has accessed sensitive information about wealthy art collectors around the world, and is threatening to release it unless “an agreement” is reached. Digital Trends has more.

https://flip.it/at-MY2

paul_denton, French
@paul_denton@mastodon.social avatar

Si vous êtes comme moi déjà un peu énervé ne lisez pas cette enquête de France Info sur le piratage de nos données à Pôle Emploi pardon France Travail (et patrie). Je suis en train de bouillir... https://www.francetvinfo.fr/replay-radio/le-choix-franceinfo/piratage-de-france-travail-la-direction-avait-ete-alertee-sur-une-faille-de-securite_6536786.html

Thierry31,
@Thierry31@piaille.fr avatar

@paul_denton

Promis, je ne vais pas la lire
Suis déjà assez enervé/révolté.

TreseBrothers,
@TreseBrothers@mastodon.social avatar

While we're still working on an in-game tutorial for Matrix hacking, here's a quick YouTube guide we put together: https://youtube.com/watch?v=HXn6OSRzvIQ

Learn to hack to drop the alarm level, control security devices, get valuable paydata, and complete CPU spike missions.

Cupropituvanso, German
@Cupropituvanso@chaos.social avatar

Hack Mas Castle Trailer zum österreichischen Hackerevent in Ottenschlag
https://youtu.be/gb7-UcMu_lo @hackmas

realhackhistory,
@realhackhistory@chaos.social avatar

Please RT for reach: I’m trying to records on computer intrusions into DOD systems during first Gulf War (1990), I have a GAO report which gives a high level summary but am looking for more.

Does anyone know what DOD department might have investigated back then?

realhackhistory,
@realhackhistory@chaos.social avatar

My next question is for (), does anyone know if clips from this news show still exist?

amsterdam,
@amsterdam@typo.social avatar

@realhackhistory This presumably refers to the item Computerkrakers (Computer hackers) in the television program Achter het nieuws (Behind the news) that was broadcast on 2 February 1991. The digitized footage can be requested from the media archive of Beeld & Geluid (Image & Sound): https://zoeken.beeldengeluid.nl/program/urn:vme:default:program:2101608060047283231

Bit_form,
@Bit_form@corteximplant.com avatar
realhackhistory,
@realhackhistory@chaos.social avatar

US government GAO report on Dutch accessing US defense systems during the first gulf war (Desert Storm).

https://archive.org/details/vt-imtec-92-5_202405

realhackhistory,
@realhackhistory@chaos.social avatar

@mxy, got it uploaded ⤴️

hyde,
@hyde@lazybear.social avatar

Will I buy the magazine full back issue plus the lifetime subscription?

[23/100]

[ 12 / 31 ]

https://lazybear.io/posts/2600-magazine

hyde,
@hyde@lazybear.social avatar

@adamsdesk No, they did, before the end, one issue with a cd (dvd ?) of all the years. There was also all the Perl articles if I remember correctly

adamsdesk,
@adamsdesk@fosstodon.org avatar

@hyde Oh right I completely forgot about that. I wish I could have gotten my hands on one.

hackeriet,
@hackeriet@chaos.social avatar
Naich,
@Naich@fosstodon.org avatar

I've knocked up a quick hack for those in the UK who want to know if it's worth going outside to try and see the aurora.

https://qop.pm/aurora.html

Just bung in your postcode and leave it running to keep updated with the probability of it being visible.

dcz,
@dcz@fosstodon.org avatar

Hey Fediversians, is anyone going to https://gulas.ch ? I'm looking for roommates today.

realhackhistory,
@realhackhistory@chaos.social avatar

Uploaded some court documents from an appeal by Electra, a phone phreak who was caught up in Operation Sun Devil for hacking voicemail systems and sharing calling card codes.

https://archive.org/details/com.-v.-gerulis

liaizon,
@liaizon@wake.st avatar

@realhackhistory fascinating! thank you for uploading these

realhackhistory,
@realhackhistory@chaos.social avatar

@liaizon no problem! I am always on the lookout for stories relating to female hackers and phone phreaks as their stories are seriously under-represented in any of the mainstream hacker history timelines.

realhackhistory,
@realhackhistory@chaos.social avatar

Stumbled across this 1984 episode of the comedy series Night Court called "The Computer Kid" about a precocious boy who winds up in trouble for his school and I love it.

"He's plugged his computer into the phone!"

video/mp4

tness16, French
@tness16@mastodon.social avatar

violence et coup de pression, qui a tenté d’empêcher la diffusion ?

La fait elle la police en ?
Hacking violence et coup de pression, qui a tenté d’empêcher la diffusion ?

Alerté en amont, Envoyé Spécial a pu suivre et filmer une opération clandestine de la à . Une à peine croyable racontée dans un exceptionnel qui dérange la Chine.

https://invidious.fdn.fr/watch?v=-oOuo6fDcIY

jsrailton, (edited )
@jsrailton@mastodon.social avatar

BREAKING: private investigator arrested for cyberespionage on behalf of American PR firm.

Caught by UK under from 🇺🇸US while boarding a flight.

BIG TWIST in a wild case that began w/our @citizenlab investigation into indian hack-for-hire group

Sound familiar?

Because Amit Forlit is the second PI from arrested in similar way for this case.

First = convicted.

https://www.reuters.com/world/israeli-private-eye-arrested-uk-over-alleged-hacking-us-pr-firm-2024-05-02/

jsrailton, (edited )
@jsrailton@mastodon.social avatar

There's a disgraceful ecosystem of public relations & lobbying firms using hackers for hire.

Sometimes they are used to silence critics & advocacy groups.

Like US nonprofits doing climate advocacy.

Our investigation into a group we christened uncovered a sprawling -based hack-for-hire operation.

They enabled US corporations to outsource lawbreaking.

https://citizenlab.ca/2020/06/dark-basin-uncovering-a-massive-hack-for-hire-operation/

jsrailton, (edited )
@jsrailton@mastodon.social avatar

I'd bet my bottom dollar that this "unnamed...PR and lobbying firm" knows exactly who they are...

...and are no doubt experiencing an afternoon of the purest panic.

Using the offshore hack-for-hire ecosystem has been largely consequence-free for the middlemen & the ultimate beneficiaries of stolen information.

The tide may be turning & this latest arrest suggests that more consequences may be inbound.

#hacking #infosec #spyware #malware #cybersecurity #phishing #India

realhackhistory,
@realhackhistory@chaos.social avatar

An article by David E. Sanger
via the New York Times News Service which was published in the Pittsburgh Post-Gazette on the 24th of November, 1988.

This reminds me of Russian news headlines about Russian hackers:

"Envious of computer virus
Well-behaved Japanese programmers have not developed the creative of U.S. competitors"

realhackhistory,
@realhackhistory@chaos.social avatar

"A computer virus is the product of a creative mind- a different type of creativity than Japan usually produces," said Yuichi Murano, an
executive of Nihon Sun Microsystems.
"Those are the kinds of talents we need more of." Nihon Sun is the Japanese subsidiary of a Silicon Valley company, Sun Microsystems, whose machines are both the favorite tools and the favorite targets of many hackers.

realhackhistory,
@realhackhistory@chaos.social avatar

Japan hardly lacks software talent. By some estimates, there are more than a half-million programmers, but they seem remarkably well behaved.

Last year, the national police recorded only 15 instances of computer crime, most of them trivial. But this year may be a different story.

realhackhistory,
@realhackhistory@chaos.social avatar

Been reading about the case of Edward Austin Singh in the UK, a who was caught physically trespassing in a Teesside Polytechnic college computer lab, while connected to various computers, by UK police in 1988.

realhackhistory,
@realhackhistory@chaos.social avatar

Apparently the US Secret Service had become aware of Singh's hacking activities that touched on US government, military and corporate systems and there was some attempt to lure him to the US for arrest before the UK authorities eventually stepped in.

ukscone,
@ukscone@fosstodon.org avatar

@realhackhistory I used to hang out with Edward quite a lot for a couple of years. Nearly went into business with him after we developed some secure file transfer software. After the Surrey stuff he did a nice "prank" hack on a video store chain.

Last I heard about him were rumours he was working for microsoft. never verified

There is a great book about him called "Beating the System" by Owen Bowcott

https://www.amazon.com/Beating-System-Hackers-Phreakers-Electronic/dp/0747505136

realhackhistory,
@realhackhistory@chaos.social avatar

Can anyone help me find references, videos or news reports relating to this, as seen in The Sydney Morning Herald, 7th November 1988?

It concerns a incident and Belgian Prime Minister Wilfried Martens in, I think, October of 1988.

miah,
@miah@hachyderm.io avatar
realhackhistory,
@realhackhistory@chaos.social avatar

I had never heard of any of this.

From The Spokesman-Review, 13th May, 1989.

"In October, a computer hacker revealed how he entered the Belgian government's computer system and for several months read the electronic mail of about 10 Cabinet ministers, including Prime Minister Wilfried Martens.
The hacker said he even met other "burglars" in the system, which had confidential information such as details on terrorist killings and the agenda of weekly Cabinet meetings."

realhackhistory,
@realhackhistory@chaos.social avatar

The story of the first person convicted of planting a destructive computer virus, Donald Gene Burleson, from the March 1989 issue of Texas Monthly. This is a great write up of the story behind an incident that had taken place in 1985 and the resulting court case.

https://www.texasmonthly.com/true-crime/search-and-destroy/

realhackhistory,
@realhackhistory@chaos.social avatar

Fantastic illustration too.

realhackhistory,
@realhackhistory@chaos.social avatar

Still combing through stories in news archives from 1987 & what the hell is this.

As reported in The Albany Herald in April of 1987, this cop had his conviction reversed, he'd managed to cyberstalk women in 1984! Unbelievable this was already a thing back then.

realhackhistory,
@realhackhistory@chaos.social avatar

Olson, according to the investigating officers, admitted his uses of the computer "were not part of any official inquiry. but were solely for his own use for some sort of collection he called his 'Rogues' Gallery'"

realhackhistory,
@realhackhistory@chaos.social avatar

Love that this story isn't framed as "creeper corrupt cop wins appeal" but "hacker wins appeal".

bobby,
@bobby@mastodon.sexypokemon.xyz avatar

There is a new PHP vulnerability out. It is being tracked as CVE-2024-2961. Here’s a video explaining the vulnerability https://youtu.be/u8jLUjpCWrs?si=Fm1JSBdAW9VBzuhj

heiglandreas,
@heiglandreas@phpc.social avatar

@bobby

😱 ALL PHP-Applications are vulnerable!!!!111!!!!! 😱

Even the ones that don't use iconv!!!11!!1!!!1!! 😱

A great time to differentiate who is talking and who has something to say...

realhackhistory,
@realhackhistory@chaos.social avatar

Another release, this time on the 2004 'MyDoom' worm. This is 22 pages that had already been processed, I've asked for further records to be processed for later release.

https://archive.org/details/MyDoom-FBI-FOIA

realhackhistory,
@realhackhistory@chaos.social avatar
realhackhistory,
@realhackhistory@chaos.social avatar
cdarwin,
@cdarwin@c.im avatar

FBI chief says Chinese have infiltrated critical US infrastructure

Chinese government-linked hackers have burrowed into US critical infrastructure and are waiting “for just the right moment to deal a devastating blow”, the director of the FBI, Christopher Wray, has warned.

An ongoing Chinese hacking campaign known as has successfully gained access to numerous American companies in telecommunications, energy, water and other critical sectors, with 23 pipeline operators targeted, Wray said.
China is developing the “ability to physically wreak havoc on our at a time of its choosing”, Wray said at the 2024 Vanderbilt summit on modern conflict and emerging threats.

He added: “Its plan is to land low blows against civilian infrastructure to try to induce .”
Wray said it was difficult to determine the intent of this cyber pre-positioning, which was aligned with China’s broader intent to deter the US from defending Taiwan.
China claims democratically governed Taiwan as its own territory and has never renounced the use of force to bring the island under its control. Taiwan strongly objects to China’s sovereignty claims and says only the island’s people can decide their future.
Earlier this week, a Chinese ministry of foreign affairs (MFA) spokesperson said Volt Typhoon was in fact unrelated to China’s government, but was part of a criminal group.

https://www.theguardian.com/world/2024/apr/19/fbi-china-hack-infrastructure?CMP=Share_iOSApp_Other

dougiec3,
@dougiec3@libretooth.gr avatar

Money talks and justice walks.
“My lawyers tell me that that is exactly what would most likely happen here. Rupert Murdoch’s lawyers are very expensive. So even if every allegation is proven in court, I would still be liable for something approaching £10m in costs. I’m afraid I am shying at that fence.”
https://www.theguardian.com/media/2024/apr/17/hugh-grant-settles-high-court-claim-against-sun-publisher

eribosot,
@eribosot@mastodon.social avatar

@dougiec3 I can understand why Grant wouldn't take that deal.

realhackhistory,
@realhackhistory@chaos.social avatar

Proof that people caught up in related investigations back in the day were not all young guys.

kaia,
@kaia@brotka.st avatar

@realhackhistory what decade was that? 1980s? when did one still write teen-ager? :akko_mmh:

realhackhistory,
@realhackhistory@chaos.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • hacking
  • kavyap
  • khanakhh
  • osvaldo12
  • Durango
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • magazineikmin
  • thenastyranch
  • cisconetworking
  • Youngstown
  • slotface
  • rosin
  • cubers
  • megavids
  • anitta
  • GTA5RPClips
  • tester
  • ethstaker
  • modclub
  • InstantRegret
  • everett
  • provamag3
  • Leos
  • normalnudes
  • tacticalgear
  • JUstTest
  • lostlight
  • All magazines