Tag: recovery

  • Hacker News: North Korea Launders Billions in Stolen Crypto

    Source URL: https://www.coindesk.com/policy/2025/03/07/here-s-how-north-korea-launders-billions-of-stolen-crypto Source: Hacker News Title: North Korea Launders Billions in Stolen Crypto Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses the complex methods used by North Korea to launder cryptocurrency stolen through hacks, particularly focusing on their reliance on over-the-counter brokers and other methods due to compliance checks implemented…

  • Hacker News: Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours

    Source URL: https://www.tomshardware.com/tech-industry/cyber-security/akira-ransomware-cracked-with-rtx-4090-new-exploit-to-brute-force-encryption-attack Source: Hacker News Title: Akira ransomware can be cracked with sixteen RTX 4090 GPUs in around ten hours Feedly Summary: Comments AI Summary and Description: Yes Summary: The discovery of a GPU-based brute-force method to decrypt files affected by the Akira ransomware attack represents a significant breakthrough in cybersecurity. This method enables…

  • Hacker News: Tj-actions/changed-files GitHub Action Compromised – used by over 23K repos

    Source URL: https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised Source: Hacker News Title: Tj-actions/changed-files GitHub Action Compromised – used by over 23K repos Feedly Summary: Comments AI Summary and Description: Yes Summary: A critical security incident has been identified involving the tj-actions/changed-files GitHub Action, which has been compromised to leak sensitive CI/CD secrets. This incident underscores the urgency for security and…

  • Rekt: 1Inch – Rekt

    Source URL: https://www.rekt.news/1inch-rekt Source: Rekt Title: 1Inch – Rekt Feedly Summary: One hacker transformed 1inch resolver contracts into a $5 million ATM through an integer underflow exploit – all with a negative 512 value. Attacker pocketed $450K as a “bounty" for exposing two years of an undetected vulnerability. AI Summary and Description: Yes Summary: This…

  • The Register: Like whitebox servers, rent-a-crew crime ‘affiliates’ have commoditized ransomware

    Source URL: https://www.theregister.com/2025/03/07/commoditization_ransomware/ Source: The Register Title: Like whitebox servers, rent-a-crew crime ‘affiliates’ have commoditized ransomware Feedly Summary: Which is why taking down chiefs and infra behind big name brand operations isn’t working Interview There’s a handful of cybercriminal gangs that Jason Baker, a ransomware negotiator with GuidePoint Security, regularly gets called in to respond…

  • Cloud Blog: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/gostringungarbler-deobfuscating-strings-in-garbled-binaries/ Source: Cloud Blog Title: GoStringUngarbler: Deobfuscating Strings in Garbled Binaries Feedly Summary: Written by: Chuong Dong Overview In our day-to-day work, the FLARE team often encounters malware written in Go that is protected using garble. While recent advancements in Go analysis from tools like IDA Pro have simplified the analysis process, garble…