Hackmanac Cyber News


Kanal geosi va tili: Butun dunyo, Inglizcha


Official Hackmanac.com cyber attack news feed for:
🚨 Critical cyber attacks news
⚠️ Real time alerts
🌐 Latest cyber threats and trends info
💡 Exclusive insights

Связанные каналы  |  Похожие каналы

Kanal geosi va tili
Butun dunyo, Inglizcha
Statistika
Postlar filtri


🚨🚨Cyberattack Alert ‼️

🇸🇬Singapore - Maxeon Solar Technologies

Medusa ransomware group claims to have breached Maxeon Solar Technologies.

Ransom demand: $1,000,000.
Ransom deadline: 27th Nov 24.


🚨Cyberattack Alert ‼️

🇺🇸USA - Pinger

Hellcat hacking group claims to have breached Pinger, a US Telecom provider for free texts, pictures, calls, and voicemails

Allegedly, 111 GB of data were exfiltrated, including 9 million user records, private messages, voice messages, internal tools (such as phone number lookup and notification sender), backend systems, and source codes. Ransom demand: $150,000.


🚨Cyberattack Alert ‼️

🇩🇪Germany - Hager Group

Akira ransomware group claims to have breached Hager Group, a manufacturer of electrical installations in residential, commercial and industrial buildings based in Blieskastel, Germany.

Allegedly, internal corporate information, including logins, passwords, and employees' data, has been fully leaked.


🚨Data Breach Alert 🚨

🇯🇵Japan - Muroran Institute of Technology (室蘭工業大学)

Muroran Institute of Technology announced that a laboratory server was subjected to unauthorized access, potentially resulting in the leakage of personal information for 159 individuals.

The incident, discovered on October 27, 2024, involved the compromise of a faculty member's account, which was used for unauthorized logins.

The affected data includes names, addresses, and phone numbers of current and former students affiliated with the lab.

Source:
https://muroran-it.ac.jp/guidance/info/post-56249/


🚨Cyberattack Alert ‼️

🇻🇳Vietnam - Dragon Capital

Kill Security hacking group claims to have breached Dragon Capital.

Allegedly, exfiltrated data includes passport details (names, dates of birth, and passport numbers), contact details (phone numbers and email addresses), residential addresses, financial account information, confidential forms with signatures, and investor account information with personal and financial data.

Ransom deadline: 25th Nov 24.


🚨New Ransomware Group Detected: Termite

The cybercriminal group lists 5 victims on its data leak site:

🇺🇸 USA - Nifast Corporation
🇫🇷 France - CULLIGAN FRANCE
🇴🇲 Oman - OQ
🇩🇪 Germany - Lebenshilfe Heinsberg
🇨🇦 Canada - Conseil scolaire Viamonde

Note: Termite claims to have attacked Conseil scolaire Viamonde on October 14. According to our database, Conseil scolaire Viamonde confirmed that a cyber incident on October 17, 2024, caused disruptions to its IT systems.


🚨Cyberattack Alert ‼️

🇮🇹Italy - SUSTA S.R.L.

DragonForce hacking group claims to have breached SUSTA S.R.L. Allegedly, 331.87 GB of data were exfiltrated.

Ransom deadline: 19th Nov 24.


🚨Data Breach Alert - Ford

A potential data breach at Ford has been detected on a hacking forum: 44K customer records are reportedly affected.

The confirmation or denial of these claims has not yet been verified.


🚨Cyberattack Alert ‼️

🇱🇹Lithuania - MANTINGA

Hunters International ransomware group claims to have breached MANTINGA, a frozen bakery and convenience food company.


🚨Data Leak Alert 🚨

🇪🇬Egypt - Mansour Group

A potential data breach involving Mansour Group has been detected on a hacking forum, reportedly affecting 12,150 users.

According to the post, the exposed information includes data such as ID, Name, Email Address, Mobile Number, Joined At, VIN Number, Owner Name, City, Year, Chassis Number, License, Brand, Model, and Kilometers.

The confirmation or denial of these claims has yet to be verified.


🚨Cyberattack Alert 🚨

🇯🇵Japan - Otsuka Shokai (大塚商会)

Otsuka Shokai has reported a security breach impacting some users of the Microsoft 365 service.
https://mypage.otsuka-shokai.co.jp/news/detail?urlparam1=yrGys1alLsgWJKexRUWirg%3D%3D

Malicious third-party actors gained unauthorized access to accounts with administrator privileges. The breach has resulted in potential risks, including data deletion or exfiltration within Microsoft 365, the deletion of configured accounts in tenant environments, and the use of compromised accounts to send spam emails, potentially impacting business partners. The exact method of compromise remains unclear.

Otsuka Shokai has advised enabling multi-factor authentication (MFA) for administrator accounts as a preventive measure and recommends strong password policies and MFA for all users.


🚨🚨Cyberattack Alert ‼️

🇪🇬Egypt - Egyptian Tax Authority

Money Message hacking group claims to have breached the Egyptian Tax Authority.

Allegedly, 500 GB of data were exfiltrated.




🔒 Is Your Manufacturing Business Cyber-Ready? 🔒

🚨 Cybercriminals are targeting the manufacturing sector at an alarming rate, exploiting vulnerabilities like:
✅ Ransomware & Cyber Extortion
✅ Intellectual Property Theft
✅ Supply Chain Attacks
✅ Employee Negligence

💡 In our latest article, we explore:
🔍 The key threats to manufacturing.
🛡 Effective strategies to strengthen cyber defenses.
📈 Why proactive risk management is the key to staying ahead.

🌐 Read the full article here: https://hackmanac.com/news/strengthening-manufacturing-key-risks-ans-effective-defense-strategies

Let’s make the manufacturing sector cyber-resilient! ⚙️✨

#CyberSecurity #Manufacturing #Ransomware #SupplyChain #CyberResilience #ExpertInsights #hackmanac #StayCyberSafe


🚀Kyrrex AMA Starts TODAY!🚀

"Is MiCA that bad? What is the Future of Crypto in Europe?"

🕒 When?
12 PM CET

📍 Where?
Join us here:
https://x.com/i/spaces/1YqxovmQLNgJv/peek


‼️ShrinkLocker Ransomware Decryptor Released‼️

Bitdefender has released a free decryptor for ShrinkLocker ransomware, a variant that leverages BitLocker to lock files and can compromise entire networks in under 10 minutes.

https://www.bitdefender.com/en-us/blog/businessinsights/shrinklocker-decryptor-from-friend-to-foe-and-back-again


🚨Cyberattack - Credential Stuffing 🚨

🇯🇵Japan - Yonex (ヨネックス株式会社)

The official Yonex online shop experienced unauthorized login attempts from November 7 to November 8, 2024, affecting 223 accounts through a credential stuffing attack. Out of these, personal information for 53 accounts may have been accessed, including names, addresses, phone numbers, gender, birth dates, purchase history, and partial credit card details.

The attack was detected after a customer reported a suspicious order confirmation. Yonex has since blocked IP addresses involved in the attack, invalidated all member passwords, and implemented password change requirements for future logins.

Source:
https://yonexshop.jp/news/207


🚨Cyberattack Alert ‼️

🇧🇩Bangladesh - Popular Life Insurance

Sarcoma hacking group claims to have breached Popular Life Insurance.

Allegedly, 36 GB of data were exfiltrated, with a sample showing miscellaneous personal data, including PII.

Ransom deadline: 24th Nov 24.


🚨Cyberattack

🇯🇵Japan - Teletama (株式会社テレビ埼玉)

Teletama's website (teletama.​jp​) suffered a cyberattack on November 11, 2024, at around 10 PM, continuing until midnight on November 12.

Unauthorized access to the company’s server was detected, and personal information submitted by viewers through forms on the site, including names, addresses, phone numbers, emails, nicknames, ages, genders, and comments, was potentially exposed. Approximately 39,000 entries were affected.

Source:
https://www.teletama.jp/teletama/notice202411.html


🚨Cyberattack 🚨

🇦🇷Argentina - Cooperativa Telefónica de El Calafate (COTECAL)

The "Brain Cipher" ransomware group has officially claimed responsibility for the cyberattack on the Cooperativa Telefónica de El Calafate (COTECAL), through a post on its data leak site.

On October 24, the group threatened COTECAL, demanding a ransom of $80,000 in cryptocurrency with a 48-hour deadline. The attack disrupted internet and TV services, with connectivity gradually being restored for most users, although the cooperative’s management system remains affected.

In today’s post, the group stated that 150 GB of data was exfiltrated and that the company has until November 30 to pay the requested ransom.

20 ta oxirgi post ko‘rsatilgan.