• Home
  • About Us
  • Anti Spam Policy
  • Contact
  • Cookie Policy
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile
No Result
View All Result
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile
No Result
View All Result
My Blog Wire
No Result
View All Result

Hacker destroys Iranian cyber-espionage information

George Duncan by George Duncan
December 22, 2021
Home Data Security
Share on FacebookShare on Twitter

On Wednesday, ZDNet mentioned that a hacker with the net called Lab Dookhtegan leaked a fix of hacking tools belonging to Iran’s espionage agencies, often diagnosed because of the APT34, Oilrig, or HelixKitten, on Telegram. The leaks began someplace inside the mid-March and blanketed touchy records, mostly such as usernames and passwords. ZDNet was made aware of this hack while a Twitter consumer DMed them several identical files leaked on Telegram. Though this Twitter person claimed to have labored on the institution’s espionage marketing campaign, ZDNet believes that it’s also viable that he is a member of a foreign intelligence business enterprise seeking to cover their actual identity. ZDNet’s assumption is that the Twitter user may be the Telegram Lab Dookhtegan character.

The hacker leaked the supply code of six hacking tools: Glimpse, PoisonFrog, HyperShell, HighShell, Fox Panel, and Web mask. Many cyber-protection specialists, along with Chronicle, Alphabet’s cyber-protection department, showed the authenticity of this equipment. Along with this equipment, the hacker also leaked the content from numerous active backend panels, where sufferer information had been collected.

Chronicle, Alphabet’s cyber-protection department, showed to ZDNet that the hacker had leaked data of 66 sufferers, particularly from countries within the Middle East. These statistics become accrued from each authorities companies and private businesses. The hacker leaked facts from APT34’s beyond operations, sharing the IP addresses and domain names where the group hosted web shells and other operational facts.

Hacker

The hacker admitted at the Telegram channel that he had destroyed the manipulate panels of APT34’s hacking equipment and wiped their servers smooth. Besides leaking the facts and supply code of the hacking tools, the hacker additionally made public personal data of the Iranian Ministry of Intelligence officials who had been involved with APT34 operations such as phone numbers, pics, and names. dSo, now the Iranian espionage institution has no desire other than to start over.

Going by the leaked documents, it seems that Dookhtegan additionally had some grudge in opposition to the Iranian Ministry of Intelligence, which he knew as “merciless,” “ruthless,” and “criminal”. Now, numerous cyber-protection companies are reading the leaked records. In an email to ZDNet, Brandon Levene, Head of Applied Intelligence at Chronicle, stated, “It’s in all likelihood this organization will regulate their toolset that allows you to preserve operational fame. There may be a few copycat activities derived from the leaked gear. However, it’s miles unlikely to look full-size use.”

George Duncan

George Duncan

Thinker. Infuriatingly humble zombie expert. Alcohol buff. Extreme social mediaholic. Friendly beer maven. Coffee ninja. Proud music fan. Spent 2001-2007 promoting childrens books in Orlando, FL. Garnered an industry award while lecturing about methane in Mexico. Gifted in working with corncob pipes in Phoenix, AZ. Managed a small team developing junk bonds in Gainesville, FL. Spent 2002-2008 getting my feet wet with psoriasis in Miami, FL. In 2008 I was buying and selling barbie dolls worldwide.

Next Post
How Not to Acknowledge a Data Breach

How Not to Acknowledge a Data Breach

No Result
View All Result

Latest Updates

Protect Your Car from the Heat This Summer with the Ultimate Car Shield

Protect Your Car from the Heat This Summer with the Ultimate Car Shield

May 25, 2022
Ifovd – The Ultimate List of Top Social Media Trends

Ifovd – The Ultimate List of Top Social Media Trends

May 24, 2022
Try Out The New Crypto Currency Exchange Software Now!

Try Out The New Crypto Currency Exchange Software Now!

May 19, 2022
Get Ahead In Your Career! Learn The Basics of Networking Now

Get Ahead In Your Career! Learn The Basics of Networking Now

May 15, 2022
Get Your Camping Themed Paper Tent Kid Craft Idea Now!

Get Your Camping Themed Paper Tent Kid Craft Idea Now!

May 10, 2022

Popular Today

  • Ifovd – The Ultimate List of Top Social Media Trends

    Ifovd – The Ultimate List of Top Social Media Trends

    0 shares
    Share 0 Tweet 0
  • Protect Your Car from the Heat This Summer with the Ultimate Car Shield

    0 shares
    Share 0 Tweet 0
  • Free Download Latest Version of Windows 7 Pro OA ISO

    0 shares
    Share 0 Tweet 0
  • Airtel Xstream Box Gets Software Update, UI Changes and More

    0 shares
    Share 0 Tweet 0
  • Try Out The New Crypto Currency Exchange Software Now!

    0 shares
    Share 0 Tweet 0
  • Home
  • About Us
  • Anti Spam Policy
  • Contact
  • Cookie Policy
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions

© 2022 MYBLOGWIRE - All Rights Reserved to Us!

No Result
View All Result
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile

© 2022 MYBLOGWIRE - All Rights Reserved to Us!