• Home
  • About Us
  • Anti Spam Policy
  • Contact
  • Cookie Policy
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile
No Result
View All Result
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile
No Result
View All Result
My Blog Wire
No Result
View All Result

Hacker destroys Iranian cyber-espionage information

George Duncan by George Duncan
April 22, 2019
Home Data Security
Share on FacebookShare on Twitter

On Wednesday, ZDNet mentioned that hacker with the net call Lab Dookhtegan leaked a fixed of hacking tools belonging to Iran’s espionage agencies, often diagnosed because of the APT34, Oilrig, or HelixKitten, on Telegram. The leaks began someplace inside the mid-March and blanketed touchy records, mostly such as usernames and passwords.

ZDNet was given aware about this hack while a Twitter consumer DMed them a number of the identical files that have been leaked on Telegram. Though this Twitter person claimed to have labored on the institution’s espionage marketing campaign, ZDNet believes that it’s also viable that he is a member of a foreign intelligence business enterprise seeking to cover their actual identity. ZDNet’s assumption is that the Twitter user may be the Telegram Lab Dookhtegan character.

 

The hacker leaked the supply code of six hacking tools: Glimpse, PoisonFrog, HyperShell, HighShell, Fox Panel, and Webmask. Many cyber-protection specialists along with Chronicle, Alphabet’s cyber-protection department, showed the authenticity of this equipment.

Along with this equipment, the hacker also leaked the content from numerous active backend panels, where sufferer information had been collected. Chronicle, Alphabet’s cyber-protection department, showed to ZDNet that the hacker has leaked data of 66 sufferers, particularly from countries within the Middle East. These statistics become accrued from each authorities companies and private businesses. The hacker additionally leaked facts from APT34’s beyond operations, sharing the IP addresses and domain names where the group hosted web shells and other operational facts.

Besides leaking the facts and supply code of the hacking tools, the hacker additionally made public personal data of the Iranian Ministry of Intelligence officials who had been involved with APT34 operations such as phone numbers, pics, and names.

The hacker admitted at the Telegram channel that he has destroyed the manipulate panels of APT34’s hacking equipment and wiped their servers smooth. So, now the Iranian espionage institution has no desire other than starting over. Going by the leaked documents, it seems that Dookhtegan additionally had some grudge in opposition to the Iranian Ministry of Intelligence, which he knew as “merciless,” “ruthless” and “criminal”.

Now, numerous cyber-protection companies are reading the leaked records. In an email to ZDNet, Brandon Levene, Head of Applied Intelligence at Chronicle, stated, “It’s in all likelihood this organization will regulate their toolset that allows you to preserve operational fame. There may be a few copycat activities derived from the leaked gear, however, it’s miles unlikely to look full-size use.”

George Duncan

George Duncan

Thinker. Infuriatingly humble zombie expert. Alcohol buff. Extreme social mediaholic. Friendly beer maven. Coffee ninja. Proud music fan. Spent 2001-2007 promoting childrens books in Orlando, FL. Garnered an industry award while lecturing about methane in Mexico. Gifted in working with corncob pipes in Phoenix, AZ. Managed a small team developing junk bonds in Gainesville, FL. Spent 2002-2008 getting my feet wet with psoriasis in Miami, FL. In 2008 I was buying and selling barbie dolls worldwide.

Next Post
How Not to Acknowledge a Data Breach

How Not to Acknowledge a Data Breach

No Result
View All Result

Latest Updates

VPN Master Pro Mod Review – An Honest VPN Review of the Most Popular VPN Server

VPN Master Pro Mod Review – An Honest VPN Review of the Most Popular VPN Server

April 3, 2021
AI in software improvement places testing to the take a look at

AI in software improvement places testing to the take a look at

February 21, 2021
Cognizant buys monetary software program firm Meritsoft

Cognizant buys monetary software program firm Meritsoft

February 21, 2021
Explained: What is an Open Source Software?

Explained: What is an Open Source Software?

February 21, 2021
Global Automobile Fan Couplings Market 2019

Global Automobile Fan Couplings Market 2019

February 21, 2021

Popular Today

  • VPN Master Pro Mod Review – An Honest VPN Review of the Most Popular VPN Server

    VPN Master Pro Mod Review – An Honest VPN Review of the Most Popular VPN Server

    0 shares
    Share 0 Tweet 0
  • No cut-off date for automobile groups to adopt electric motors: Nitin Gadkari

    0 shares
    Share 0 Tweet 0
  • Alienware Area-51m vs. Origin PC Eon-17X

    0 shares
    Share 0 Tweet 0
  • IRS spent $1.2 million on unused statistics protection software

    0 shares
    Share 0 Tweet 0
  • 4 Best States for Your Startup

    0 shares
    Share 0 Tweet 0
  • Home
  • About Us
  • Anti Spam Policy
  • Contact
  • Cookie Policy
  • DMCA
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions

© 2020 MYBLOGWIRE - All Rights Reserved to Us!

No Result
View All Result
  • Home
  • Digital Marketing
    • E-Commerce
    • IT Blog
  • Networking
  • Latest Technology
    • Cell Phone
    • Data Security
    • Laptop
    • Software
  • Auto Mobile

© 2020 MYBLOGWIRE - All Rights Reserved to Us!