According to Hackeread.com, a user by the name of “nclay” claimed to have hacked Zomato and was willing to sell data pertaining to 17 million registered users on a popular Dark Web marketplace.
This included emails and password hashes of registered Zomato users with the price set for the whole package at $1,001.43 (BTC 0.5587) – BTC here stands for Bitcoins. Hackeread adds the vendor also published data and evidence to prove it was genuine.
Payment related information on Zomato is stored separately from this (stolen) data in a highly secure PCI Data Security Standard (DSS) compliant vault. No payment information or credit card data has been stolen/leaked.
Zomato, in a blog post
A group that calls itself “Legion” promises more, and bigger, data dumps.
According to the interaction by Washington Post’s Max Bearak, the hacking group was not after these specific high-profile targets with a hitlist, instead it was the other way around. The group reportedly got hold of several terabytes of raw data categorised by “interests” within which they got hold of gigabytes of data pertaining to Indian public figures. In short, it was the available data that helped them choose whom to target first.
The current objective was to was to dump classified data into public domain. The data which instigated the Legion to these hacks apparently came from what remains to be an unknown source. And it was quite a big dump with access to over 40k+ servers in India. It was so immense that the hacker group even built a tool to sift through them.
Source: The man hacking India’s rich and powerful talks motives, music, drugs and next targets – The Washington Post
Check Point reported at least 86 apps have been found to have traces of Gooligan, most of which appear legitimate and have been given artificially high ratings in the app store.
Once one of the infected apps is installed onto a user’s device, either from an app store or by clicking a malicious link, it begins collecting data about the device and reporting it to a command and control server—a centralized computer that issues commands to and receives reports from devices.
How to check / know if your account is hacked?
Check Point recommended in a blog post that people who suspect their devices may have been compromised (seen unusual pop-up ads on your phone lately?) should check to see whether their account has been breached by entering their email addresses at the following website: https://gooligan.checkpoint.com/.
The official Twitter account of Indian National Congress was found to be hacked on Thursday, hours after party vice-president Rahul Gandhi’s verified twitter account was hacked.
Twitter explodes with jokes
On the off chance that you have a record with web explicit entertainment system Brazzers, you might need to consider changing your secret key and any others which were connected with that record, as its subtle elements may well have been spilled.
Almost 800,000 messages, passwords and usernames credited to accounts on the Brazzers porn site gathering have been spilled.
Initially answered to Motherboard by vigilante.pw, a rupture checking guard dog, the hack contained more than 900,000 individual records. Beside inert or copy accounts, that implied around 790,724 one of a kind email addresses, usernames and plaintext passwords are presently out in the ether.
In spite of the fact that the information originated from the site’s different gathering, different clients of the site were reporting their information had been incorporated into the rupture as records were shared between the two destinations for accommodation.
Recent search terms:
Subsequent to get ready for a tariff war, India’s top telecom company Bharti Airtel is equipping to connect with new participant Reliance Jio Infocomm on another front: Data speed.
The organization said on Wednesday it has conveyed innovation known as “transporter accumulation” in Mumbai and Kerala to join diverse groups of range and make bigger squares of wireless transmissions to offer quicker and more steady 4G information administrations for portable clients. The upgraded administration empowers crest download rates of as much as 135 mbps, which is quicker than what clients get on an ordinary 4G system.
How hundreds of journalists revealed the secrets of some of the world’s most powerful people
About the Panama Papers
By Frederik Obermaier, Bastian Obermayer, Vanessa Wormer and Wolfgang Jaschensky
Over a year ago, an anonymous source contacted the Süddeutsche Zeitung (SZ) and submitted encrypted internal documents from Mossack Fonseca, a Panamanian law firm that sells anonymous offshore companies around the world. These shell companies enable their owners to cover up their business dealings, no matter how shady.
In the months that followed, the number of documents continued to grow far beyond the original leak. Ultimately, SZ acquired about 2.6 terabytes of data, making the leak the biggest that journalists had ever worked with. The source wanted neither financial compensation nor anything else in return, apart from a few security measures.
“The data provides rare insights into a world that can only exist in the shadows. It proves how a global industry led by major banks, legal firms, and asset management companies secretly manages the estates of the world’s rich and famous: from politicians, FIFA officials, fraudsters and drug smugglers, to celebrities and professional athletes,” according to Süddeutsche Zeitung.
The cache of 11.5 million files includes names of very popular and prominent figures. Some of the names on the list are: Alaa Mubarak (Son of Former Egyptian President), Kojo Annan (Son of former United Nations Secretary General), Ayad Allawi (Ex-Prime minister of Iraq), King Salman bin Abdulaziz bin Abdulrahman Al Saud (King of Saudi Arabia), Li Xiaolin (daughter of former Chinese Premier Li Peng),
Indians in Panama Papers list: Amitabh Bachchan, Aishwarya Rai, KP Singh, Iqbal Mirchi, Adani elder brother
“Targeting Anonymous and hacktivists amounts to targeting citizens for expressing their political beliefs.”
“Anyone here have access to a website with at least 10,000+ unique traffic per day?” asks one hacktivist in a transcript taken from a conversation that began in an Operation Payback chat room. An agent responds and claims to have access to a porn website with 27,000 users per day. “Love it,” answers the hacktivist. The hackers ask for access to sites with traffic so they can identify users of the site, secretly take over their computers with malware and then use those computers to mount a DDOS attack against a government or commercial website.
Full Story – http://www.nbcnews.com/news/investigations/war-anonymous-british-spies-attacked-hackers-snowden-docs-show-n21361
Bahnhof selling out Wikileaks
In 2010 Wikileaks turned into a household name. The organization released almost 400,000 documents about the U.S. war in Iraq. Later the feat was repeated with 250,000 diplomatic cables.
The releases took place via a server hosted by Bahnhof in Sweden. The notorious physical server that changed the world is now auctioned off by Bahnhof for the benefit of Reporters Without Borders.
The server, which hosted WikiLeaks during its release of classified US State Department documents, is now on sale on eBay for a price of 25,200 dollars, as of Monday.
The server belongs to the Swedish Internet service provider Bahnhof, which was rented out to WikiLeaks in 2010.
Wikileaks used that hardware to serve the so-called ‘Collateral Murder’ video, 2007 footage of US helicopter crew gunning down a group of men in Baghdad, including two Reuters journalists, apart from the Guantanamo Files, CNN reports.