唔想再有手足被黑警自殺?用呢4個apps!
唔好再喺網上裸跑 2020-2-9 11:48:09
終共被揭發佢hack咗來自三十幾個國家、幾十間 global telecoms for 至少七年,竊取了大量 metadata


Hackers believed to be linked to the Chinese government have broken into the systems of more than a dozen global telecommunications carriers and stolen huge amounts of data over a period going back at least seven years, according to a new report today from security researchers at Cybereason.

The hackers also used tools linked to other attacks attributed to Beijing by the United States and its Western allies, said Lior Div, chief executive of Cybereason. “For this level of sophistication it’s not a criminal group. It is a government that has capabilities that can do this kind of attack,” he told Reuters.

The hacking campaign, dubbed Operation Soft Cell, targeted “call detail records” that contained metadata on every call made on a targeted network, including times, dates and the location of the device.

In addition, the same group attempted to steal all data stored by their targets, including usernames and password in the organization, billing data, email servers and other related information.

The tools used by hackers were those commonly associated with the APT10 group, a hacking group that works on behalf of the Chinese Ministry of State Security’s Tianjin State Security Bureau. Members of the group were indicted by the U.S. Department of Justice in December 2018.

Giving credence to the idea that it was a state-sponsored campaign, the researchers noted that “the threat actor mainly sought to obtain CDR data (call logs, cell tower locations, etc.) belonging to specific individuals from various countries. This type of targeted cyber espionage is usually the work of nation-state threat actors.

https://web.archive.org/web/20191215181157/https://siliconangle.com/2019/06/25/data-stolen-global-telcos-suspected-chinese-hacking-campaign/

Ads

當撈J.侵 2020-2-9 12:12:04 S
helloworld012 2020-2-9 13:12:35
入錯引擎 2020-2-9 13:19:32 Push
jjjj1999jjjj 2020-2-9 13:33:00 此回覆已被刪除
最佳男朋友 2020-2-9 13:34:33 Push
創意轟炸機 2020-2-9 13:37:11
:^(
:^(
黑腳妙姑 2020-2-9 13:38:21 此回覆已被刪除
香討註連登大使 2020-2-9 13:55:41 此回覆已被刪除
陌生女子 2020-2-9 14:24:14 Push
當喪失是得著 2020-2-9 20:40:55 推!

Ads

唔好再喺網上裸跑 2020-2-9 20:46:36 要使用 DDG, 去 https://duck.comhttps://3g2upl4pq6kufc4m.onion (Tor Hidden Services, 註 1) 就可以搜尋。 我自己就鍾意 https://startpage.com 多啲, 佢使用 Google 嘅搜尋引擎但係更加 privacy-respecting, 因為佢唔會insert persistent tracking cookies 落你嘅 browser 度, 暴露你嘅位置同埋唔會操縱搜尋結果。

註 1: Tor Hidden Services 只能透過 Tor Browser access 到. 喺 Hidden Services 嘅網站不會離開 Tor Network, 所以對針對 HTTPS 同 TLS/SSL 嘅攻擊免疫。

無論你有冇用 VPN, Google, Facebook 同 CCP 都可以 track 到你, 所以我建議你使用 Tor Browser 而唔好用 VPN, 因為 VPN 唔能夠保護你 from browser fingerprinting。
(https://matt.traudt.xyz/posts/you-want-tor-24tFBCJV.html)
Jamfanfan 2020-2-9 20:53:36
香討註連登大使 2020-2-9 21:17:19 此回覆已被刪除
唔好再喺網上裸跑 2020-2-9 22:08:45 請大家幫手正評,幫推,避免沉底,P牌推唔郁
用心看世界 2020-2-9 23:08:27 好technical
:^(
追風箏的傻子 2020-2-9 23:12:37
不Gay的瘋 2020-2-9 23:16:29 push
不Gay的瘋 2020-2-9 23:22:22 push
男兒當打交 2020-2-9 23:23:34 lm
燃狗小菜 2020-2-9 23:27:04

Ads

藍星武士 2020-2-9 23:43:55 Push
52.5 2020-2-10 00:14:57 Push
平靜的海岸線 2020-2-10 00:34:27
:^(
秋葉園丁 2020-2-10 00:39:46