GeekCode
797 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Do you guys interested in CryptoCurrency?
Anonymous Poll
68%
Yes
32%
No
This media is not supported in your browser
VIEW IN TELEGRAM
Why Do You Need A VPN?

Think about all the times you’ve been on the go, reading emails while in line at the coffee shop, or checking your bank account while waiting at the doctor’s office. Unless you were logged into a private Wi-Fi network that required a password, any data transmitted during your online session was likely vulnerable to eavesdropping by strangers using the same network.

The encryption and anonymity that a VPN provides protects all of your online activities: sending emails, shopping online, or paying bills. VPNs also help keep your Web browsing anonymous.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is WEB 3.0?

The web 3.0 definition varies depending on who you ask, but in general, it’s considered the third generation of the internet. Web 3.0 is also called the semantic web or the spatial web. If you break the evolution of the internet into segments with the first being simple web pages and the second being apps, social media, and mass adoption, the emerging blockchain-based web would be internet 3.0. Essentially, it’s a user-friendly, more secure, more private and better connected internet.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Google started searching the Cloud for cryptocurrency mining malware

Google Cloud began using VMTD — Virtual Machine Threat Detection.
Users' cloud storage will now be scanned for malware, including cryptocurrency mining, Google said in a blog post.

The post notes that VMTD is "the first detection capability from a major cloud provider on the market," which agentless memory scans and helps detect threats running in the Cloud.

In November, Google discovered that 86% of compromised Cloud accounts were being used to mine cryptocurrencies, which motivated the company to beef up protection.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
Feb 7- Feb 27 Ukraine – Russia the silent cyber conflict

This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective.


Below is the timeline of Russia – Ukraine cyber dispute

February 27 – Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.

February 26 – Russia restricts Twitter in the country amid conflict with Ukraine

Global internet monitor working group NetBlocks reported that Twitter has been restricted in Russia amid conflict with Ukraine.

February 25 – Ukraine calls on independent hackers to defend against Russia, Russian underground responds

While Ukraine calls for hacker underground to defend against Russia, ransomware gangs make their moves.

February 25 – Ukraine: Belarusian APT group UNC1151 targets military personnel with spear phishing

The CERT of Ukraine (CERT-UA) warned of a spear-phishing campaign targeting Ukrainian armed forces personnel.

February 25 – Anonymous launched its offensive on Russia in response to the invasion of Ukraine

The popular collective Anonymous declared war on Russia for the illegitimate invasion of Ukraine and announced a series of cyber attacks calling to action its members

February 24 – Data wiper attacks on Ukraine were planned at least in November and used ransomware as decoy

Experts reported that the wiper attacks that yesterday hit hundreds of systems in Ukraine used a GoLang-based ransomware decoy.

February 19 – White House and UK Gov attribute DDoS attacks on Ukraine to Russia’s GRU

The White House has linked the recent DDoS attacks against Ukraine ‘s banks and defense agencies to Russia’s GRU.

@cyberagents
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective.


March 5 – Thousands of satellite users offline in Europe following a cyberattack, is it a conflict spillover?

Thousands of satellite internet users across Europe were disconnected from the internet by a cyber-event, experts suspect a cyber attack.

March 4 – Russian watchdog Roskomnadzor also blocked Facebook in Russia

State communications watchdog Roskomnadzor has ordered to block access to Facebook in Russia amid the ongoing invasion of Ukraine.

March 4 – These are the sources of DDoS attacks against Russia, local NCCC warns

Russian government released a list containing IP addresses and domains behind DDoS attacks that hit Russian infrastructure after the invasion.

March 4 – Russia-Ukraine, who are the soldiers that crowd cyberspace?

While Russia is invading Ukraine, multiple forces are joining in the conflict, especially in the cyber space, let’s analyze them.

March 3 – Avast released a free decryptor for the HermeticRansom that hit Ukraine

Avast released a decryptor for the HermeticRansom ransomware used in recent targeted attacks against Ukrainian entities.

March 3 – Ukrainian WordPress sites under massive complex attacks

Researchers observed a spike in the attacks against Ukrainian WordPress sites since the beginning of the military invasion of the country.

March 2 – A cyberattack on Russian satellites is an act of war, the invasion of Ukraine no

Russia considers it legitimate to invade another country but warns it will consider cyberattacks on its satellites an act of war.

March 2 – Asylum Ambuscade spear-phishing campaign targets EU countries aiding Ukrainian refugees

A spear-phishing campaign, tracked as Asylum Ambuscade, targets European government personnel aiding Ukrainian refugees.

March 2 – Anonymous and its affiliates continue to cause damage to Russia

The massive operation launched by the Anonymous collective against Russia for its illegitimate invasion continues.

March 2 – Ukrainian researcher leaked the source code of Conti Ransomware

A Ukrainian researcher leaked the source for the Conti ransomware and components for the control panels.

March 1 – IsaacWiper, the third wiper spotted since the beginning of the Russian invasion

IsaacWiper, a new data wiper was used against an unnamed Ukrainian government network after Russia’s invasion of Ukraine.

March 1 – CISA and FBI warn of potential data wiping attacks spillover

US CISA and the FBI warned US organizations that data wiping attacks targeting Ukraine entities could spill over to targets worldwide.

March 1 – FoxBlade malware targeted Ukrainian networks hours before Russia’s invasion

Microsoft revealed that Ukrainian entities were targeted with a previous undetected malware, dubbed FoxBlade, several hours before the invasion.

February 28 – Anonymous hit Russian Nuclear Institute and leak stolen data

Anonymous and other hacker groups that responded to the call to war against Russia continue to launch cyberattacks on gov organizations and businesses.

February 28 – Researcher leaked Conti’s internal chat messages in response to its support to Russia

A Ukrainian researcher leaked tens of thousands of internal chat messages belonging to the Conti ransomware operation.

February 27 – Ukraine: Volunteer IT Army is going to hit tens of Russian targets from this list

Ukraine is recruiting a volunteer IT army composed of white hat hackers to launch attacks on a list of Russian entities.

February 27 – Anonymous breached the internal network of Belarusian railways

The Anonymous hacker collective claims to have breached the Belarusian Railway’s data-processing network.

@cyberagents

Share ❤️