(PYONGYANG, N.K.) Chainalysis Hacking Report: N.K. hackers stole almost $400m (£291m) worth of digital assets in at least seven attacks on cryptocurrency platforms last year, a report claims #AceNewsDesk report

#AceNewsReport – Jan.16: The attacks mainly targeted investment firms and centralised exchanges: North Korea has routinely denied being involved in hack attacks attributed to them.

#AceDailyNews says according to BBC Business News Report: North Korea hackers stole $400-million of cryptocurrency in 2021, report says from 2020 to 2021, the number of North Korean-linked hacks jumped from four to seven, and the value extracted from these hacks grew by 40%,” Chainalysis said in a report.

Stock image of hands typing on a laptop keyboard

Blockchain analysis company Chainalysis said it was one of most successful years on record for cyber-criminals in the closed east Asian state.

The hackers used a number of techniques, including phishing lures, code exploits and malware to siphon funds from the organisations’ “hot” wallets and then moved them into North Korea-controlled addresses, the company said.

Cryptocurrency hot wallets are connected to the internet and cryptocurrency network and so are vulnerable to hacking. They are used to send and receive cryptocurrency, and allow users to view how many tokens they have.

Many experts recommend moving large amounts of cryptocurrency not needed day-to-day to “cold” wallets, which are disconnected from the wider internet.

Chainalysis said it is likely that many of last year’s attacks were conducted by the so-called Lazarus Group, a hacking group which the US has applied sanctions against. 

The group is believed to be controlled by North Korea’s primary intelligence bureau, the Reconnaissance General Bureau.

The Lazarus Group has previously been accused of involvement in the “WannaCry” ransomware attacks, the hacking of international banks and customer accounts and cyber-attacks on Sony Pictures in 2014:

“Once North Korea gained custody of the funds, they began a careful laundering process to cover up and cash out,” the report on last year’s cyber attacks added.

A United Nations panel that monitors sanctions on North Korea has accused Pyongyang of using stolen funds to support its nuclear and ballistic missile programmes as a way to avoid international sanctions.

Separately, in February last year, the US charged three North Korean computer programmers with a massive hacking spree aimed at stealing more than $1.3bn in money and cryptocurrency.

The cyber attacks affected companies from banks to Hollywood movie studios, the Department of Justice said.

#AceNewsDesk report …………Published: Jan.16: 2022:

Editor says …Sterling Publishing & Media Service Agency is not responsible for the content of external site or from any reports, posts or links, and can also be found here on Telegram: https://t.me/acenewsdaily all of our posts fromTwitter can be found here: https://acetwitternews.wordpress.com/ and all wordpress and live posts and links here: https://acenewsroom.wordpress.com/and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com

#cryptocurrency, #cyber, #hackers, #north-korea, #pyongyang

(MASSACHUSETTS) SEC REPORT: Announces fraud charges against five Russian nationals for engaging in a multi-year scheme to profit from stolen corporate earnings announcements obtained by hacking into the systems of two U.S.-based filing agent companies before the announcements were made public #AceNewsDesk report

#AceNewsReport – Dec.23: The filing agents assist publicly traded companies with the preparation and filing of periodic reports with the SEC, including quarterly reports containing earnings information.

#AceDailyNews SEC Report: Charges Five Russians in $80 Million Hacking Scheme: The SEC’s complaint, filed in federal district court in Massachusetts, alleges that defendant Ivan Yermakov used deceptive hacking techniques to access the filing agents’ systems and directly or indirectly provided not-yet-public corporate earnings announcements stolen from those systems to his co-defendants Vladislav Kliushin, Nikolai Rumiantcev, Mikhail Irzak, and Igor Sladkov.

According to the complaint, from 2018 through 2020, the traders used 20 different brokerage accounts located in Denmark, the United Kingdom, Cyprus and Portugal to generate profits of at least $82 million using the stolen information to make trades before over 500 corporate earnings announcements. The defendants allegedly shared a portion of their enormous profits by funneling them through a Russian information technology company founded by Kliushin and for which Yermakov and Rumiantcev serve as directors.

“With this action, the SEC, using its powerful analytical tools, has exposed a highly sophisticated and deceptive scheme to steal and monetize non-public corporate information,” said Gurbir S. Grewal, Director of the SEC’s Division of Enforcement. “While we remain steadfast in our commitment to protect the integrity of our securities markets against bad actors no matter where they are located or what sophisticated tactics they use, we strongly encourage companies to shore up their safeguards against, and remain vigilant for cyber breaches that compromise their non-public information.”

The U.S. Attorney’s Office for the District of Massachusetts today announced criminal charges against the five defendants named in the SEC’s action and that defendant Vladislav Kliushin was extradited from Switzerland.

The SEC’s complaint charges each of the defendants with violating the antifraud provisions of the federal securities laws and related SEC antifraud rules and seeks a final judgment ordering the defendants to pay penalties, return their ill-gotten gains with prejudgment interest, and enjoining them from committing future violations of the antifraud laws. 

The SEC’s investigation, which is ongoing, was conducted by Megan Bergstrom, David Bennett, and Diana Tani of the SEC’s Market Abuse Unit with assistance from Darren Boerner of the Market Abuse Unit and IT Forensics staff Ken Zavos. Joseph Sansone, Chief of the Market Abuse Unit, supervised the investigation. The Division of Economic and Risk Analysis provided substantial assistance. David Mendel and James Connor are leading the SEC’s litigation, under the supervision of David Gottesman. The SEC appreciates the assistance of the U.S. Attorney’s Office for the District of Massachusetts, the Federal Bureau of Investigation, the Danish Financial Supervisory Authority, and the Cyprus Securities and Exchange Commission.

#AceNewsDesk report ………Published: Dec.23: 2021:

Editor says …Sterling Publishing & Media Service Agency is not responsible for the content of external site or from any reports, posts or links, and can also be found here on Telegram: https://t.me/acenewsdaily all of our posts fromTwitter can be found here: https://acetwitternews.wordpress.com/ and all wordpress and live posts and links here: https://acenewsroom.wordpress.com/and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com

#hackers, #massachusetts, #russian, #sec

(PAKISTAN/AFGHANISTAN) EXCLUSIVE: Hackers from Pakistan used Facebook now (META) to target people in Afghanistan with connections to the previous government during the Taliban’s takeover of the country, the company’s threat investigators said in an interview with Reuters #AceNewsDesk report

#AceNewsReport – Nov.17: Facebook said the group, known in the security industry as SideCopy, shared links to websites hosting malware which could surveil people’s devices. Targets included people connected to the government, military and law enforcement in Kabul, it said. Facebook said it removed SideCopy from its platform in August.

#AceDailyNews EXCLUSIVE Report: Facebook says hackers in Pakistan targeted Afghan users amid government collapse: The social media company, which recently changed its name to Meta, said the group created fictitious personas of young women as “romantic lures” to build trust and trick targets into clicking phishing links or downloading malicious chat apps. It also compromised legitimate websites to manipulate people into giving up their Facebook credentials according to November 16, 20212:12 PM GMT:

“It’s always difficult for us to speculate as to the end goal of the threat actor,” Facebook’s head of cyber espionage investigations, Mike Dvilyanski, said. “We don’t know exactly who was compromised or what the end result of that was.”

Major online platforms and email providers including Facebook, Twitter Inc (TWTR.N), Alphabet Inc’s (GOOGL.O) Google and Microsoft Corp’s (MSFT.O) LinkedIn have said they took steps to lock down Afghan users’ accounts during the Taliban’s swift takeover of the country this past summer. read more 

Facebook said it had not previously disclosed the hacking campaign, which it said ramped up between April and August, due to safety concerns about its employees in the country and the need for more work to investigate the network. It said it shared information with the U.S. State Department at the time it took down the operation.

Investigators also said Facebook had last month disabled the accounts of two hacking groups which it linked to Syria’s Air Force Intelligence.

Facebook said one group, known as the Syrian Electronic Army, targeted human rights activists, journalists and others opposing the ruling regime, while the other targeted people linked to the Free Syrian Army and former military personnel who had joined opposition forces.

Facebook’s head of global threat disruption, David Agranovich, said the Syria and Afghanistan cases showed cyber espionage groups leveraging periods of uncertainty during conflicts when people might be more susceptible to manipulation.

The company said a third hacking network in Syria, which it linked to the Syrian government and removed in October, targeted minority groups, activists and members of the People’s Protection Units (YPG) and Syria Civil Defense, or White Helmets.

Reuters: Reporting by Elizabeth Culliford in New York Editing by Matthew Lewis

#AceNewsDesk report ………..Published: Nov.17: 2021:

Editor says …Sterling Publishing & Media Service Agency is not responsible for the content of external site or from any reports, posts or links, and can also be found here on Telegram: https://t.me/acenewsdaily all of our posts fromTwitter can be found here: https://acetwitternews.wordpress.com/ and all wordpress and live posts and links here: https://acenewsroom.wordpress.com/and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com

#afghanistan, #facebook, #hackers, #meta, #pakistan, #taliban

(LONDON) Ransomeware Cyber Attack Report: A group of cybercriminals broke into the servers of luxury jewel-maker Graff, stealing client information on Donald Trump, Hollywood stars, and other celebrities, a UK newspaper said #AceNewsDesk report

#AceNewsReport – Nov.01: Hackers from the Conti group leaked 69,000 documents they stole from Graff, a London-based jewelry giant, to the dark web, the Mail on Sunday reported.

#AceDailyNews says according to RT News on Sunday as reported in Mail Online Ransomware hackers, presumably Russian-linked, steal personal data on Trump, Oprah & others in online jewelry firm heist – media

31 Oct, 2021 11:40  / Updated 21 hours ago

Ransomware hackers, presumably Russian-linked, steal personal data on Trump, Oprah & others in online jewelry firm heist – media

The group, described by various Western media outlets as a Russian-speaking gang based near St. Petersburg, was said to have threatened more leaks unless they are paid tens of millions of pounds in ransom money. The hackers reportedly claimed they got their hands on the personal data of around 11,000 wealthy clients of Graff.

The Mail on Sunday cited cyber experts as saying the hackers most likely sent a fake email, tricking Graff employees into opening a file with a ransomware virus. This method would have allowed the criminals to bypass the company’s security and download a large amount of data.

According to the paper, the stolen documents include client lists, invoices, receipts, and credit notes. Among the 600 or so UK customers are football star David Beckham and his wife Victoria, football manager and former player Frank Lampard, and socialite Tamara Ecclestone, the daughter of former Formula One boss Bernie Ecclestone.

The US celebrities mentioned in the leak are Hollywood A-listers Tom Hanks, Samuel L. Jackson, and Alec Baldwin. The documents contain seven addresses for former US President Donald Trump and his wife Melania, and two for talk show host Oprah Winfrey, the paper said. Bahrain’s crown prince and prime minister, Salman bin Hamad Al Khalifa, was also said to have been mentioned.Hackers leak ‘IDF soldiers’ private info & Israeli defense minister’s PHOTOS,’ claim to have more classified docs

The documents reportedly include the personal information of socialite Ghislaine Maxwell, who is awaiting trial in the US on charges of trafficking underage girls to the late financier Jeffrey Epstein. 

In a statement cited by the paper, Graff admitted to falling victim to a “sophisticated” but “limited” attack. “We were alerted to their intrusive activity by our security systems, allowing us to react swiftly and shut down our network,” the company’s spokesperson said, adding that Graff has alerted the clients whose data was compromised.

A spokesperson for the UK’s Information Commissioner’s Office (ICO) told the paper that Graff notified it about the crime. The ICO plans to request further information from the company for an investigation.

Ransomware attacks on large companies are becoming increasingly prevalent, with teams of hackers using advanced software to disrupt their victims’ work and to steal large troves of data.

This year, the Colonial Pipeline Company, the operator of the largest oil pipeline system in the US, was forced to pay nearly $5 million in ransom to hackers who paralyzed the company’s operations. Most of the ransom was later recovered.

#AceNewsDesk report ………….Published: Nov.01: 2021:

Editor says …Sterling Publishing & Media Service Agency is not responsible for the content of external site or from any reports, posts or links, and can also be found here on Telegram: https://t.me/acenewsdaily all of our posts fromTwitter can be found here: https://acetwitternews.wordpress.com/ and all wordpress and live posts and links here: https://acenewsroom.wordpress.com/and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com

#cyberattack, #hackers, #london, #ransomeware

(USA) T-Moblile Hack Report: Data breach has revealed that hackers accessed personal information of an additional 5.3-million customers #AceNewsDesk report

#AceNewsReport – Aug.22: T-Mobile US Inc (TMUS.O) said on Friday an ongoing investigation into a data breach revealed that hackers accessed personal information of an additional 5.3 million customers, bringing the total number of people affected to more than 53 million….

#AceDailyNews says that T-Mobile probe into breach finds more customers hit than original figure of of more than 40-million but figure is closer to over 53-million read more here ….

The third-largest U.S. wireless carrier said earlier this week that personal data of more than 40 million former and prospective customers was stolen along with data from 7.8 million existing T-Mobile wireless customers.

In its latest update, which comes days after the U.S. Federal Communications Commission (FCC) opened an investigation into the breach, T-Mobile revealed it had identified 5.3 million additional current wireless subscribers who were impacted by the breach as well as 667,000 more accounts of former customers.

The data includes addresses, dates of birth and phone numbers of customers, the company said, adding that it had no indication that the accessed data contained financial information such as credit card or other payment data.

The wireless carrier is the latest victim of a series of cyberattacks on large corporations in the United States as hackers exploit weakened user system privacy and security due to work-from-home policies instituted since the onset of the coronavirus pandemic.

#AceNewsDesk report ……….Published: Aug.22: 2021:

Editor says …Sterling Publishing & Media Service Agency is not responsible for the content of external site or from any reports, posts or links, and can also be found here on Telegram: https://t.me/acenewsdaily all of our posts fromTwitter can be found here: https://acetwitternews.wordpress.com/ and all wordpress and live posts and links here: https://acenewsroom.wordpress.com/and thanks for following as always appreciate every like, reblog or retweet and free help and guidance tips on your PC software or need help & guidance from our experts AcePCHelp.WordPress.Com

#data-breach, #hackers, #t-mobile, #usa

The American War Machine

Just chatting with a few American friends about War and why you ALL in America are not being told this is aimed at YOU! In the USA! http://shaunynews.com/2014/06/03/two-weeks-to-prepare-for-cyber-attack-as-word-cyber-wars-begin/ America is a war country, your existence is to pay for war, you Government make you scared about this “Axis of Evil” that you own! Why if I am wrong is this below possible? Do you ACTUALLY UNDERSTAND what these US Marines are telling you here below? How can they be fighting WITH Al Qaeda? The “Axis of Evil who did 9/11” Check, wake up guys!!! Please!

WHO IS HE TELLING TO WAKE UP? SWEDISH PEOPLE?

A SENIOR MEMBER OF THE US MILITARY IS TELLING YOU Al Qaeda are American Paid!!! Can’t or Don’t want to see it?

WHY IS THIS AMERICAN SOLDIER SAYING HE WON’T FIGHT ‘FOR’ THE PEOPLE WHO DID 9/11? We are told..


THIS IS FROM RUSSIA, TO THE PEOPLE OF THE USA AND NO MEDIA REPORTING? SHITTING ME!? These 2 viruses GOZeuS and CryptoLocker are LETHAL yet your Government don’t tell you, and it was ALL OVER European news, TV, Radio, Newspapers…Why? Really, Think, what do you think America?

2 Sites, 2 of the biggest in Europe, both from the UK 2 out of 100 that covered this HUGE Cyber War!

  1. http://news.sky.com/story/1273922/two-weeks-to-prepare-for-cyber-attack
  2. http://www.bbc.co.uk/news/technology-27668260

This video is from someone I class as a very smart American person! Y’all should watch and listen..
https://www.youtube.com/watch?v=wRB4dVk4kK0

#al-qaeda, #american-war-machine, #cyber-alert-for-the-usa, #cyber-war-on-usa, #gozeus-and-cryptolocker-viruses, #hackers, #lies, #media-blackout, #russian-hackers-to-hack-the-usa, #us-military-begging-usa-to-wake-up, #usa-funded-al-qaeda, #wake-up, #wwiii

” Hacker Attack on German Governments Computers last year traced to China”

#AceWorldNews says Hackers attempted to take control of senior German government officials’ computers last year and the source has been traced to China, the news magazine Der Spiegel said Sunday.

#china, #computers, #der-spiegel, #german, #government, #hackers

Syrian hackers broke into the correspondence between Mrs…

Syrian hackers broke into the correspondence between Mrs. Mary Shapir, the former head of the US commission on stock exchanges and securities, with Mrs. MacDonald, the wife of Colonel MacDonald. They discovered that the photo of children who died as a result of a gas attack was a fake document. The photo was posted in the Internet and brought up public rage. Mrs. MacDonald writes quoting her husband that all the children are alive and have received pay for participating in the filming. What’s your opinion of this leak?
http://voiceofrussia.com/2013_09_05/It-is-good-that-Russia-keeps-its-unshakeable-consistency-in-solving-the-Syrian-problem-Thierry-Mariani-497

#acenewsservices, #hackers, #peace, #syria, #voiceofrussia