add

Top 7 Dangerous Hacking New's of OCTOBER 2019.

Top 7 Dangerous Hacking News of 2019.

Hello, Guys Welcome Back To My Website.


Today I'm going to tell you Top Most DANGEROUS HACKING NEW'S OF HACKER'S DID IN 2019.

Top 7 Dangerous Hacker's New's of 2019.



No:1. CHINA HACKER'S COMPROMISE THE  TELECOM SERVER'S TO SPY ON THE PUBLIC SMS MESSAGES.

Top 7 Dangerous Hacking New's of 2019.
A group of hackers in China has designed a new piece of spy malware it has used to spy on the sent and received messages (SMS) of highly targeted individuals they have created a Message Tap backdoor malware they have been installed it in SMSC  unnamed telecommunication company.

How Does Message Tap Malware Works? 

It uses the libpcap library to monitor all the SMS traffic and determine IMSI and the phone number's of the sender and the receiver.

According to the hackers, they have developed the Message Tap Malware to separate the saved messages of the individual or public, like:

✴Sent or received by a specific phone number.
✴It containing certain keywords.
✴Or with a specific IMSI number.

⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒

No:2. NORTH KOREAN HACKER'S HAS BEEN TARGETED INDIAN NUCLEAR POWER PLANT.

Top 7 Dangerous Hacking New's of 2019.
A story which is very making a very sound on the internet is about the cyber attack on the Indian nuclear power plant. The attack which has taken place oct 30 at Kudan Kulam Nuclear power which plant in Tamil Nadu.


The North Korean hackers used a malware called Dtrack malware.

HOW DOES DTRACK MALWARE WORKS?

Dtrack malware is Remote Access Trojan (RAT), the main work of this malware is to spy on the victim's system and is used  to install various types malicious things on the Targeted Computer, and it includes:

✴Key Logger's
✴It used to steal all the browser history and cookies.
✴And collecting all the Host Ip Addresses gathering all the information of available network and active connections of the system.
✴It's used to list all the running programs and list of all files of available disk volumes on pc and many more features.  

⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒


No:3.FINALLY, FACEBOOK USES NSO SPYWARE FIRM TO HACK ALL THE WHAT'S APP USER'S.


Top 7 Dangerous Hacking New's of 2019.
An Encrypted messaging service provider is taking legal action against private entries that carried out malicious attacks against the whats app users.  Facebook filed a legal case against the Israeli NSO group on Tuesday, and they found the company involved in the hacking of what's app users.

Have we know in the early year, they discovered that what's app had a very dangerous vulnerability using those attackers were installing spyware called Pegasus on the targeted Android or Iso devices remotely

And they used to steal all the credentials of the users like, their Text Messages, Email's, Contact Details, location, call records, camera, microphone, what's app chats Taking the complete ownership of you are Android or Iso devices. 

⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒

NO:4. A MALICIOUS AND MYSTERIOUS MALWARE THAT RE-INSTALL ITSELF AND INFECTED OVER 50,000 ANDROID PHONES.

Top 7 Dangerous Hacking New's of 2019.
As a past few month's thousands of android users filed a complaint online stating that a new type of mysterious malware hides on the android devices and infecting on the device.

It can reportedly reinstall itself even after the user uninstalls, delete it or factor reset the hole device also.

HOW  DOES XHELPER MALWARE WORKS?
If once the xhelper malware installed in your device it doesn't provide a regular interface to the user, and it will automatically install application components that don't show the installed application to the user on the launcher instead it will hide the application from the user.

If the xhelper is installed in you are device it will work automatically like connecting or disconnecting to internet or wifi, it will infect the device from the power supply socket, it reboots you are device automatically, install or uninstall an app.

It will connect to the encrypted channel and it will download payloads such as spyware, droppers, clickers, rootkits and many more.

⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒

NO:5.WHY PIRATE BAY WAS RECENTLY DOWN FOR OVER A WEEK.

A major technical difficulty which was faced by THE PIRATE BAY from the past over several week's site was down due to the attack of Distributed Denial Of Service (DDOS) attack against the world popular torrent site was an attack by a malicious hacker's.

For this reason, The Pirate Bay site was down for more than a weak's, and for the most of the visitors it displayed a message called Cloud flare error or bad gateway, for some visitors got the message called site is under maintenance, for some users please check back the site in 10 min later.

The DDoS attacker used to flood the pirate bay with the overload of searches that breaks the sphinx search daemon which effectively crashed the torrent downloading site.

It made the visitors unable to download the magnet links or torrent file's from the site.
⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒

NO:6. SIM CARD'S WERE BECAME VULNERABLE IN 29 COUNTRIES DUE TO THE REMOTE SIM JACKER ATTACK'S.

A sim jacker attack. I'm sure that you all might have heard about the Sim Jacker attack vulnerability which was disclosed exactly a few months ago which was affected a wide range of sim cards, and the attacker can remotely exploit to hack any mobile phone by just sending a specially created binary SMS.

LIST OF AFFECTED COUNTRIES BY SIM JACKER ATTACK.

✴NORTH AMERICA: Republic, Costa Rice, Mexico, Guatemala, Honduras, Dominican, panama, Belize, El salvador and Nicaragua.

✴ASIA: Iraq, Palestine, Saudi Arabia and Lebanon.  


✴AFRICA: Coast, Benin, Ivory, Ghana, Nigeria, and Cameroon.

✴EUROPE: Bulgaria, Cyprus, and Italy.

✴SOUTH AMERICA: Uruguay, Chile, Brazil, Paraguay, Colombia, Peru, Ecuador and Argentina.

⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒

NO:7.HACKERS USE PHORPIEX BOTNET TO SEND MILLIONS OF SEXTORTION EMAIL'S USING THE HACKED COMPUTER'S.

A decade-old botnet-malware that currently controls above 450,000 computers all over the world but now they have shifted its operation to infecting machines with all the ransomware or crypto miners they abused it to send out sextortion emails to millions of innocent peoples all over the world.

HOW DOES PHORPIEX SPAM BOT WORK'S? 

The spambot which phorpiex download's the full list of targets/receipts email addresses from a remote control server, attacker uses a simple implementation method of the SMTP protocol that used to send sextortion emails to people's.

MESSAGE WILL BE SIMILAR TO THIS.
In that they will send a blackmail message stating that I have hacked your device, I collected all your personal data (Information) including all your private video calls and you're conversation, I got full access to your computer, I'm always watching you from your webcam you cannot run or hide from me, no one can get you out from this.

If you don't pay me in ransom of amount I will publish your details on the web or social media sites.

It has another name called "SAVE YOUR SELF" malware attack.

⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒⇒

NOTE: SO BEE SAFE IN INTERNET WORLD GUY'S DON'T GET CAUGHT TO ANY BAD GUY'S IN INTERNET WORLD...

IS AN OCEAN ONCE YOU LOST IN THERE YOU CANNOT GET OUT FROM THERE SO EASILY SO GUYS PLEASE BEE SAFE AND CREATE A AWARENESS TO EVERY ONE...

AND GUY'S DON'T FORGET TO SHARE IS ARTICLE TO HELP YOUR FRIENDS AND FAMILY WHO ARE IN COMPUTER AND TECHNOLOGY  FIELD.


AND SHARE TO THEM ALSO WHO ARE NOT IN COMPUTER FIELD TO CREATE A AWARENESS MOST USE FULL ARTICLE TO EVERYONE I THINK SO IT MAYBE  ...

GUYS, I HOPE THE ARTICLE WAS USE FULL TO YOU...


THANK YOU SOOO MUCH GUY'S FOR VISITING MY WEBSITE ......



Post a Comment

0 Comments