Showing posts with label HACKING. Show all posts
Showing posts with label HACKING. Show all posts

28 Sept 2016

Pengine umeshasikia taarifa kuwa akaunti zaidi ya milioni 500 za Yahoo zimedukuliwa (hacked). Yawezekana kabisa kuwa akaunti yako ni miongoni mwa hizo milioni 500 (nusu bilioni). Makala hii inakuelekeza hatua za kuchukua.

Kama una muda wa kutosha basi nenda kwenye tovuti HII kisha fuata maelekezo ya kufahamu iwapo akaunti yako ipo salama au la. Ushauri wangu ni kwamba usipoteze muda wako kuhakikisha kama akaunti yako imedukuliwa au la bali nenda moja kwa moja kwenye akaunti yako na kubadili password.

Lakini sio kubadili password ya Yahoo pekee. Yawezekana umejisajili Facebook au Instagram au Twitter kwa kutumia akaunti ya Yahoo. Basi pengine sio vibaya ukabadili passowrds na huko pia, hasa kwa wale wanaotumia passowrd moja kwa akaunti zote.

Pamoja na kubadili password yako ya Yahoo, unaweza kuongeza ngazi moja zaidi ya ulinzi kwa akaunti yako, kwa kutumia kitu kiitwacho two-step verification. Kitu hicho kinalazimisha kuwa kila unapo-log onto akaunti yako basi lazima uthibitishe kuwa wewe ndo mhusika. Maelezo ya jinsi ya kuwezesha two-step verification yapo HAPA

KAMA UTAKWAMA KATIKA HATUA YOYOTE BASI USISITE KUWASILIANA NAMI KWA MSAADA/MAELEKEZO. 





22 Jun 2011


Police in Essex arrest teenage 'mastermind' behind worldwide hacking gang after attacks on CIA
19-year-old man is suspected of leading the notorious Lulz Security hacking group

LulzSec tweeted it did NOT hack into Britain's census information as one website claimed

By Rebecca Camber, Colin Fernandez and Lucy Collins

Last updated at 12:30 AM on 22nd June 2011

A British teenager is suspected of masterminding computer hacking attacks on the CIA, the U.S. Senate and Sony from his bedroom.

Ryan Cleary, 19, was arrested at his family's home in Essex in a dramatic swoop following a joint inquiry by Scotland Yard and the FBI.

He was held hours after the UK's serious crime unit came under online siege from the hacking group known as LulzSec.

Latest victim: Hacker group Lulz Security has brought down the website of the Serious Organised Crime Agency. The FBI and Scotland Yard yesterday arrested a 19-year-old man in Wickford, Essex, on suspicion of being the group's ringleader

Ryan Cleary, 19, who lives in this house in Wickford, Essex, is accused of being a 'major player' within LulzSec

LulzSec wasted no time in claiming responsibility for Monday's Soca attack on its Twitter page

The self-styled 'pirate ninjas' recently declared on Twitter their intention to break into government websites and banks and leak confidential documents.
On Monday the Serious and Organised Crime Agency - dubbed 'Britain's FBI' - was forced to temporarily take its website off-line after hackers bombarded it.

Ryan, a loner whose family says 'lives his life online', faces the prospect of extradition to the U.S where he could face 60 years' behind bars for allegedly hacking into the CIA and Senate websites.
Detectives believe he is a 'major player' with LulzSec, which has been linked to recent attacks on games firm Sony in which details and passwords of millions of users were accessed.

LulzSec has claimed its other victims include the NHS and Nintendo.

Ryan's mother Rita, 44, said her son suffers from agoraphobia and attention deficit disorder and had not left his bedroom for four years.
Earlier this year, the mother of two was fined £100 for allowing her older son to grow cannabis at their home after plants worth £4,300 were seized.

Mrs Cleary, who is on incapacity benefit, claimed her son needed the drugs to ease his epilepsy symptoms.
Speaking at the family's home in Wickford, she said Ryan was an introverted boy who 'lives his life online'.

She added: 'He has a history of mental problems. 'He left school at 15.

'He has stayed in his room for the last four years in front of his computer.

'He is bright, but does not have any social skills.'

The teenager attended Heath School, in Stanway, Colchester, a school for children with special needs, and is said to have constantly spoken in 'computer jargon'.

Police arrived at the house on Monday night and are said to have spent five hours talking to Ryan.

In his bedroom they found two computers with huge screens and an air conditioning unit to regulate the heat they generated.
Apart from a mass of computer data, his bedroom was like that of many teenage boys with photographs of scantily-clad women on the walls.

Ryan's brother Mitchell, 22, said: 'He is not the sort of person to do anything mad.

'He stays in his room - you will be lucky if he opens the blinds. I barely see him. I am more of a football person - he is more of an inside person.’

Another family member, who did not want to be identified, said: ‘He is a recluse and he never leaves the house.’

Neighbours said his father Neil is a musician who had played the tuba at the Royal Albert Hall, worked with names such as Andrew Lloyd Webber and played at a private function for Princess Diana.

Ryan was first 'outed' online as a member of LulzSec in May by members of the rival hacker group Anonymous.

Yesterday neighbours told of their shock at his arrest. One, James Rounce, said he presumed Ryan had been at university as he had not seen him for so long.

He said: ‘You could tell he was very bright just from the way he spoke and presented himself.

‘I knew he was into computers because we would often take in parcels for him and when I asked about them his mother said he was working from home and it was something to do with IT.’

Last night Ryan, who uses the online name ViraL, was being questioned in a police station in central London under the Computer Misuse Act and Fraud Act.

A Scotland Yard spokesman said it was liaising closely with the FBI, adding: 'The arrest follows an investigation into network intrusions against international business and intelligence agencies by what is believed to be the same hacking group.

'Searches at an address in Wickford, Essex, following the arrest last night have led to the examination of a significant amount of material.'

The arrest of a Briton in relation to hacking attempts in the U.S. will prompt comparisons with Gary McKinnon.

McKinnon, 45, who is battling extradition to the U.S., faces 60 years behind bars for hacking into Pentagon and Nasa computers between February 2001 and March 2002 while searching for evidence of ‘little green men’.

Last night the LulzSec group sought to distance itself from Ryan.

On Twitter, the group said: 'Ryan Cleary is not part of LulzSec. We house one of our many legitimate chatrooms on his server, but that’s it.'
On the offensive: Lulz Security announced its operation to bring down high-profile websites on Twitter

WHO ARE LULZ SECURITY?

Lulz Security's rise to prominence has been extraordinarily fast.

The hacking group first emerged in May and in the past few weeks has attacked the websites of some of the world's leading corporations and governments.

It is regularly abbreviated to LulzSec, which breaks down into two parts - Lulz refers to 'LOL' (laugh out loud), while Sec is short for security.

The group specialises in locating websites with poor security and then stealing information from them and posting it online.

The attacks do not appear to be financially motivated - instead, LulzSec seems content to receive international recognition for embarrassing some of the world's largest companies.

Not all the attention has been negative, either, as some cyber experts have praised LulzSec for exposing the inadequacy of online defences without maliciously exploiting these weaknesses.

The first LulzSec attack on record took place against the Fox.com website in late April - the hackers gained access to emails and passwords of hundreds of employees.

In a matter of weeks, the group has claimed responsibility for breaching the security of conglomerates including Nintendo, Sony, the NHS, the CIA and Soca.

SOURCE: Daily Mail

14 Mar 2010


COMPUTER hackers linked to the Russian mafia robbed Royal Bank of Scotland customers of £6million in 12 hours.The crooks pulled off the massive sting by dispatching an army of thieves using cloned debit cards to blitz more than 2000 cash machines in 280 cities worldwide.

Stunned bosses at the Edinburgh bank were helpless to stop £6million of cash being plundered from the ATMs in Scotland's biggest bank heist.. But, we can reveal gang leader Viktor Pleshchuk, 28, has been snared in the Russian city of St Petersburg following a massive FBI investigation.

Acting US Attorney Sally Quillian Yates described the heist as "perhaps the most sophisticated and organised computer fraud attack ever conducted".The plot was hatched by Oleg Covelin, 28, in Moldova, who discovered a flaw in the bank's computer system.He contacted Sergei Tsurikov, 25, in Tallin, Estonia, who joined forces with Pleshchuk to orchestrate the electronic heist.

The gang hacked into the bank's system to clone 44 debit cards and discover their PIN numbers.They electronically hiked the available balances and deleted withdrawal limits on each card before distributing them to a network of foot soldiers, known as "cashers".At the stroke of midnight US time, the cashers drained ATMs using the cloned cards.

They struck at machines in Britain, the US, Russia, Ukraine, Estonia, Italy, Hong Kong, Japan and Canada.
During the 12-hour robbery, Pleshchuk and Tsurikov hacked back into the bank's system to see the transactions taking place on their computer screens.They obtained just under $9.5million - around £6.3million - between midnight and noon.FBI Agent Ross Rice said: "We've seen similar attempts to defraud a bank through ATM machines but not anywhere near the scale we have here."

The hackers then deactivated the cards and attempted to destroy electronic records of their crime within the bank's system.The cashers were allowed to keep 30 to 50 per cent of the cash with the rest being sent electronically back to the hackers.The three suspects have all been extradited to the US where they are to stand trial accused of the attack on the RBS WorldPay division in Atlanta.

Former hacker Kevin Mitnick, who now works as a computer security consultant, said: "It was so well co-ordinated. These guys hacked into RBS WorldPay, they took control of their servers and reverse engineered the encryption so they could get the debit card PINs.

"They then distributed the account numbers and PINs to a network of cashers - criminals who will withdraw funds from ATMs.

"They co-ordinated this attack so the cashers would cash out in a 12-hour period and stole $9.5million. That's an incredibly sophisticated attack."

The gang targeted the bank at the height of the global financial crisis in November 2008, striking just three weeks after shamed RBS chief Sir Fred Goodwin was forced to quit.

At that time, the bank was only saved from collapse by an emergency £20billion injection of public cash and is now 84 per cent owned by British taxpayers.

Angry US customers whose cards were cloned by the gang are suing RBS in a $5million class action lawsuit.
The action by Keith Irwin, of Pennsylvania, accuses the bank of negligence and breach of contract.

Michael McCoy, of the Identity Theft Institute, received a warning letter from RBS telling him that his personal details may have been stolen by the gang.

But he hit out as the bank only offered a 12-month free credit rating - while warning customers to be vigilant for 24 months.

He said: "It's an insult to me and any other consumer.

"Come on, a one-year subscription, what's that going to do?

"Any intelligent thief understands these letters are going out so why won't they use it in the 13th month?"

"On the back of this letter they encourage you to remain vigilant for 12 to 24 months but they're only going to offer me a product for 12 months. It boggles my mind."

Customers are also angry at the fact the bank "identified the breach" on November 10, 2008, but kept it secret for 43 days.

They eventually issued a press release in the US about the fraud two days before Christmas in what furious victims claim was a deliberate ruse to avoid publicity.

The press release said fraud had only been committed on 100 cards - giving no hint of the financial scale of the attack.

A fourth unnamed hacker is also facing criminal charges. He is believed to have fully co-operated with the FBI.

In the dock with the four hackers are four other Estonians. Tsurikov is accused of distributing cards and PINs to Igor Grudjev in Estonia.

Grudjev then distributed them to Ronald Tsoi, Evelin Tsoi and Mihhail Jegenvov, who withdrew £191,000 from ATMs in Tallin during the 12-hour period.

The cloned cards belonged to US workers whose wages are paid directly into their bank accounts.
The RBS WorldPay website states: "From face-to-face transactions to online and phone transactions, we provide an effective, secure service."

At the time, Ben Barone, president and CEO of RBS WorldPay, said: "We have taken important, immediate steps to mitigate risk and none of the affected cardholders will be responsible for unauthorised activity on their account resulting from this situation."

RBS declined to comment because of the ongoing legal proceedings.

Raid was planned like terror operation

Experts claim preparation for the worldwide bank scam was on a similar scale to an al-Qaeda terrorist operation.

Uri Rivner, of RSA Identity Protection & Verification, said: "The technical aspects in this case were not that impressive but the level of co-ordination was staggering.

"Managing time zone issues and co-ordinating cashers in nine nations - all required to hit as many ATMs as possible within 12 hours - makes me think of an al-Qaeda type of strategy of multiple attacks in a single day.
"A lot of planning and a very high degree of international co-operation went into this."

The four hackers in the dock are all in their 20s, from Russia and other former Soviet states. The FBI are in no doubt that they worked for the Russian mafia. Once they had identified a way into the RBS internal network, they spent months plotting on private internet forums.

They began looking for "jackpot servers" using free scanning software to locate valuable, protected data.
Experts reckon they stumbled on the details of the 44 cards before artificially hiking the balances and abolishing the daily withdrawal limits.

SOURCE:The Daily Record.

5 Jan 2009

22 Sept 2008

Baada ya Billy  O'Reilly kuwashikia bango hackers walioingia kwenye  e-mails  za  Sarah Palin,hacker mmoja amedai kwamba amemfanyia kweli mwanahabari huyo kimbelembele.Stori zaidi soma HAPA

18 Sept 2008

Watundu flani (au wahalifu?) wamefanikiwa ku-hack e-mails za Sarah Palin.Habari kamili na picha BONYEZA HAPA

Categories

Blog Archive

© Evarist Chahali 2006-2022

Search Engine Optimization SEO

Powered by Blogger.