Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 3
53 résultats taggé FBI  ✕
Arizona woman sentenced to 8.5 years for running North Korean laptop farm https://therecord.media/arizona-woman-sentenced-north-korean-laptop-farm
28/07/2025 20:58:11
QRCode
archive.org
thumbnail

therecord.media - Prosecutors said Chapman helped the North Korean IT workers obtain jobs at 309 companies, including a major television network, a car maker, a media company, a Silicon Valley technology company and more.
A U.S. District Court judge sentenced an Arizona woman to eight and a half years in prison for running a laptop farm used by North Korea’s government to perpetrate its IT worker scheme.

Christina Chapman pleaded guilty in February to wire fraud, money laundering and identity theft after the FBI discovered she was an instrumental cog in a wider campaign to get North Koreans hired in six-figure IT roles at prominent companies.

Prosecutors said Chapman helped the North Korean IT workers obtain jobs at 309 companies, including a major television network, a car maker, a media company, a Silicon Valley technology company and more. Members of the same group unsuccessfully tried to get employed at two different U.S. government agencies.

After North Korean officials obtained employment using fake identities, work laptops were sent to a home owned by Chapman, where she enabled the workers to connect remotely to the U.S. companies’ IT networks on a daily basis.

The FBI seized more than 90 laptops from Chapman’s home during an October 2023 raid. In addition to hosting the laptops and installing software that allowed the North Koreans to access them remotely, she also shipped 49 laptops to locations overseas, including multiple shipments to a Chinese city on the North Korean border.

In total, Chapman’s operation helped generate $17 million for the North Korean government. Security companies and law enforcement have not said how many laptop farms they estimate are scattered across North America and Europe but the DOJ called Chapman’s case “one of the largest North Korean IT worker fraud schemes charged by the Department of Justice.”

Her part of the operation involved 68 stolen identities and she reported millions in income to the IRS under the names of the people who had their identity stolen.

She forged payroll checks with the fake identities and typically managed the wages received from U.S. companies through direct deposit. She would then transfer the earnings to people overseas.

District Court Judge Randolph Moss ordered the 50-year-old Chapman to serve a 102-month prison term and three years of supervised release. She will have to forfeit nearly $300,000 that she planned to send to North Korea before her arrest and will pay a fine of more than $175,000.

Chapman was arrested last May as part of a wider takedown of North Korea’s scheme to have hundreds of their citizens hired at unwitting U.S. companies in IT positions.

Chapman was initially charged alongside a 27-year-old Ukrainian, Oleksandr Didenko, for helping at least three workers who operated under the aliases Jiho Han, Chunji Jin and Haoran Xu. The three were hired as software and applications developers with companies in a range of sectors and industries.

U.S. State Department officials said the three North Koreans assisted by Chapman and Didenko “are linked to the DPRK’s Munitions Industry Department, which oversees the development of the DPRK’s ballistic missiles, weapons production, and research and development programs.”

Didenko was arrested in Poland last year and the U.S. is seeking his extradition.

therecord.media EN 2025 North-Korea workers US FBI guilty sentenced
FBI Warning on IoT Devices: How to Tell If You Are Impacted https://www.eff.org/deeplinks/2025/06/fbi-warning-iot-devices-how-tell-if-you-are-impacted
02/07/2025 11:13:39
QRCode
archive.org
thumbnail

On June 5th, the FBI released a PSA titled “Home Internet Connected Devices Facilitate Criminal Activity.” This PSA largely references devices impacted by the latest generation of BADBOX malware (as named by HUMAN’s Satori Threat Intelligence and Research team) that EFF researchers also encountered primarily on Android TV set-top boxes. However, the malware has impacted tablets, digital projectors, aftermarket vehicle infotainment units, picture frames, and other types of IoT devices.

One goal of this malware is to create a network proxy on the devices of unsuspecting buyers, potentially making them hubs for various potential criminal activities, putting the owners of these devices at risk from authorities. This malware is particularly insidious, coming pre-installed out of the box from major online retailers such as Amazon and AliExpress. If you search “Android TV Box” on Amazon right now, many of the same models that have been impacted are still up being sold by sellers of opaque origins. Facilitating the sale of these devices even led us to write an open letter to the FTC, urging them to take action on resellers.

The FBI listed some indicators of compromise (IoCs) in the PSA for consumers to tell if they were impacted. But the average person isn’t running network detection infrastructure in their homes, and cannot hope to understand what IoCs can be used to determine if their devices generate “unexplained or suspicious Internet traffic.” Here, we will attempt to help give more comprehensive background information about these IoCs. If you find any of these on devices you own, then we encourage you to follow through by contacting the FBI's Internet Crime Complaint Center (IC3) at www.ic3.gov.

The FBI lists these IoC:

The presence of suspicious marketplaces where apps are downloaded.
Requiring Google Play Protect settings to be disabled.
Generic TV streaming devices advertised as unlocked or capable of accessing free content.
IoT devices advertised from unrecognizable brands.
Android devices that are not Play Protect certified.
Unexplained or suspicious Internet traffic.
The following adds context to above, as well as some added IoCs we have seen from our research.

eff EN 2025 guide IoCs FBI BADBOX
Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report https://cyberscoop.com/hacker-helped-kill-fbi-sources-witnesses-in-el-chapo-case-according-to-watchdog-report/
30/06/2025 12:03:58
QRCode
archive.org
thumbnail

A cartel affiliate notified an FBI agent about a hacker who infiltrated cameras and phones to track an FBI official’s meetings, the DOJ inspector general said.
A hacker working on behalf of the Sinaloa drug cartel infiltrated cameras and phones to track an FBI official in Mexico investigating the drug lord El Chapo, then used data from that surveillance to kill and intimidate potential sources and witnesses the agent was meeting with, a Justice Department watchdog report revealed.

An FBI case agent learned about the hacker from someone affiliated with the cartel in 2018, according to the inspector general report released Friday.

“That individual said the cartel had hired a ‘hacker’ who offered a menu of services related to exploiting mobile phones and other electronic devices,” the report states. “According to the individual, the hacker had observed people going in and out of the United States Embassy in Mexico City and identified ‘people of interest’ for the cartel, including the FBI Assistant Legal Attache (ALA T), and then was able to use the ALA T’s mobile phone number to obtain calls made and received, as well as geolocation data, associated with the ALAT’s phone.

cyberscoop EN 2025 Sinaloa cartel hacker FBI US El-Chapo hired
FBI Releases Annual Internet Crime Report https://www.fbi.gov/news/press-releases/fbi-releases-annual-internet-crime-report
27/04/2025 12:01:40
QRCode
archive.org

April 23, 2025

The Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) has released its latest annual report. The 2024 Internet Crime Report combines information from 859,532 complaints of suspected internet crime and details reported losses exceeding $16 billion—a 33% increase in losses from 2023.

The top three cyber crimes, by number of complaints reported by victims in 2024, were phishing/spoofing, extortion, and personal data breaches. Victims of investment fraud, specifically those involving cryptocurrency, reported the most losses—totaling over $6.5 billion.

According to the 2024 report, the most complaints were received from California, Texas, and Florida. As a group, people over the age of 60 suffered the most losses at nearly $5 billion and submitted the greatest number of complaints.

“Reporting is one of the first and most important steps in fighting crime so law enforcement can use this information to combat a variety of frauds and scams,” said FBI Director, Kash Patel. “The IC3, which is celebrating its 25th anniversary this year, is only as successful as the reports it receives; that’s why it’s imperative that the public immediately report suspected cyber-enabled criminal activity to the FBI.”

To promote public awareness, the IC3 produces an annual report to aggregate and highlight the data provided by the general public. The quality of the data is a direct reflection of the information the public provides through the IC3 website. The IC3 standardizes the data by categorizing each complaint and analyzes the data to identify and forecast trends in internet crime. The annual report helps the FBI develop effective relationships with industry partners and share information for investigative and intelligence purposes for law enforcement and public awareness.

The IC3, which was established in May 2000, houses nine million complaints from the public in its database and continues to encourage anyone who thinks they’ve been the victim of a cyber-enabled crime, regardless of dollar loss, to file a complaint through the IC3 website. The more comprehensive complaints the FBI receives, the more effective it will be in helping law enforcement gain a more accurate picture of the extent and nature of internet-facilitated crimes.

The FBI recommends that everyone frequently review consumer and industry alerts published by the IC3. If you or your business are a victim of an internet crime, immediately notify all financial institutions involved in the relevant transactions, submit a complaint to www.ic3.gov, contact your nearest FBI field office, and contact local law enforcement.

Learn more about the history of IC3 by listening to this previously released FBI podcast episode: Inside the FBI: IC3 Turns 20.

fbi US 2025 EN Annual Internet Crime Report
Internet Crime Complaint Center (IC3) | FBI Warns of Scammers Impersonating the IC3 https://www.ic3.gov/PSA/2025/PSA250418
23/04/2025 08:18:55
QRCode
archive.org

The Federal Bureau of Investigation (FBI) warns the public about an ongoing fraud scheme where criminal scammers are impersonating FBI Internet Crime Complaint Center (IC3) employees to deceive and defraud individuals. Between December 2023 and February 2025, the FBI received more than 100 reports of IC3 impersonation scams.

ic3.gov EN 2025 US scam FBI warning scam IC3 impersonation
BreachForums taken down by the FBI? Dark Storm hackers say they did it “for fun” https://cybernews.com/news/breachforums-dark-storm-ddos-cyberattack-fbi-hackers/
16/04/2025 13:15:33
QRCode
archive.org

The notorious BreachForums online hacker marketplace appears to have been seized yet again. This time, it has been claimed by fellow hacktivst gang the Dark Storm Team – the same group believed responsible for last month’s massive outage of Elon Musk’s X.

It all coincides with rumors swirling on social media Tuesday about the arrest of “IntelBroker,” one of BreachForums’ major players.

The pro-Palestinian hacktivist group posted about the Breached takeover on its Dark Storm Team telegram channel early Tuesday morning (ET), claiming to have carried out the distributed denial-of-service (DDoS) attack “for fun.”

cybernews EN 2025 FBI BreachForums taken-down IntelBroker DarkStorm-Team
CISA and FBI: Ghost ransomware breached orgs in 70 countries https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/
21/02/2025 07:23:21
QRCode
archive.org
thumbnail

CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over 70 countries, including critical infrastructure organizations.
#CISA #Computer #Cring #Critical #FBI #Ghost #InfoSec #Infrastructure #Ransomware #Security

bleepingcomputer EN 2025 Ghost Ransomware Critical-Infrastructure Cring CISA FBI
Hacker forums Cracked, Nulled and others, seized under FBI's 'Operation Talent' https://cybernews.com/cybercrime/hacker-forums-cracked-nulled-mysellix-starkrdp-siezed-fbi-operation-talent/
30/01/2025 08:52:17
QRCode
archive.org

Hacker forums Cracked[.]io, Nulled[.]to, MySellIX[.]io, and StarkRDP[.]io on Wednesday are seized by the FBI, Europol, and international law enforcement as part of ‘Operation Talent.’

A large ‘‘Operation Talent’ seizure poster was splashed across most of the shady websites by Wednesday afternoon.

cybernews EN 2025 Cracked Nulled MySellIX forum seized Operation-Talent FBI Europol
8 US telcos compromised, FBI advises Americans to use encrypted communications - Help Net Security https://www.helpnetsecurity.com/2024/12/05/us-telcos-compromised-fbi-advises-use-of-encrypted-communications/
09/12/2024 10:54:13
QRCode
archive.org
thumbnail

FBI and CISA officials have advised Americans to use encrypted call and messaging apps to protect their communications from threat actors.

helpnetsecurity EN 2024 telcos US encrypted call advise FBI CISA
FBI, CISA urge Americans to use secure messaging apps in wake of massive cyberattack https://www.zdnet.com/article/fbi-cisa-urge-americans-to-use-secure-messaging-apps-in-wake-of-massive-cyberattack/
07/12/2024 09:48:34
QRCode
archive.org
thumbnail
zdnet EN 2024 advse CISA FBI US telcos cyberattack secure messaging encrypted
U.S., Microsoft seize over 100 websites allegedly used by Russian spies https://www.nbcnews.com/tech/security/us-microsoft-seize-100-websites-allegedly-used-russian-spies-rcna173784
10/10/2024 22:27:09
QRCode
archive.org
thumbnail

The FBI and Microsoft have seized more than 100 web domains they say Russian intelligence used for cyber-espionage, according to court documents unsealed Thursday.

nbcnews EN 2024 FBI domains US Russia spies FSB espionnage
How the FBI and Mandiant caught a 'serial hacker' who tried to fake his own death https://techcrunch.com/2024/10/01/how-the-fbi-and-mandiant-caught-a-serial-hacker-who-tried-to-fake-his-own-death/
06/10/2024 23:10:23
QRCode
archive.org
thumbnail

Jesse Kipf was a prolific hacker who sold access to systems he hacked, had contacts with a notorious cybercrime gang, and tried to use his hacking skills to get off the grid for good.

techcrunch EN 2024 hacker FBI Mandiant Jesse-Kipf busted GhostMarket09 FreeRadical
A Member of SiegedSec Group Arrested by FBI https://dailydarkweb.net/member-of-siegedsec-group-arrested-by-fbi/
28/09/2024 10:23:30
QRCode
archive.org

A key member of the notorious hacker group SiegedSec was arrested today by federal authorities. The arrest came just hours after the hacker published a provocative manifesto titled “The Conscience of a Catgirl.” The document offers sharp criticisms of governments, corporations, and the state of modern surveillance, right before the hacker was taken into custody.

dailydarkweb EN 2024 busted SiegedSec FBI judische
Russian Military Cyber Actors Target US and Global Critical Infrastructure https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-249a
05/09/2024 21:44:51
QRCode
archive.org

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and National Security Agency (NSA) assess that cyber actors affiliated with the Russian General Staff Main Intelligence Directorate (GRU) 161st Specialist Training Center (Unit 29155) are responsible for computer network operations against global targets for the purposes of espionage, sabotage, and reputational harm since at least 2020. GRU Unit 29155 cyber actors began deploying the destructive WhisperGate malware against multiple Ukrainian victim organizations as early as January 13, 2022. These cyber actors are separate from other known and more established GRU-affiliated cyber groups, such as Unit 26165 and Unit 74455.

cisa EN 2024 FBI CISA GRU Global Critical Infrastructure Unit29155 GRU-affiliated
Inside the FBI's Dashboard for Wiretapping the World https://www.404media.co/inside-the-fbis-dashboard-for-wiretapping-the-world/?ref=daily-stories-newsletter
14/08/2024 18:15:09
QRCode
archive.org
thumbnail

Never-before-published screenshots of an internal FBI tool show how the agency monitored millions of messages from the secretly backdoored messaging app Anom.

404media EN 2024 Anom images dahsboard FBI
Feds seize Radar/Dispossessor ransomware gang servers in US and Europe https://therecord.media/fbi-seizes-ransomware-servers-radar
13/08/2024 09:04:59
QRCode
archive.org
thumbnail

The agency said at least 43 companies have been attacked by the group in the U.S., South America, India, Europe, the United Arab Emirates, and elsewhere.

therecord.media EN 2024 Radar Dispossessor lockbit seized FBI
Moscow’s Spies Were Stealing US Tech — Until the FBI Started a Sabotage Campaign https://www.politico.com/news/magazine/2024/08/04/us-spies-soviet-technology-00164126?
05/08/2024 21:41:28
QRCode
archive.org

One day at the dawn of the 1980s, an FBI agent in his 30s named Rick Smith walked into the Balboa Café, an ornate, historic watering hole in San Francisco’s leafy Cow Hollow neighborhood. Smith, who was single at the time, lived nearby and regularly frequented the spot.

As he approached the oak wood bar to order a drink he suddenly spotted a familiar face — someone Smith had met about a year before, after the man had walked into the Soviet Consulate in San Francisco. He was Austrian by birth, but a denizen of Silicon Valley, an entrepreneur who operated as a middleman between American tech companies and European countries hungry for the latest hi-tech goods. 

politico EN 2024 sabotage operation history US URSS SiliconValley FBI
FBI Gains Access to Suspected Trump Shooter’s Password Locked Phone https://www.404media.co/fbi-gains-access-to-suspected-trump-shooters-password-locked-phone/
17/07/2024 09:02:49
QRCode
archive.org
thumbnail

The FBI announced on Monday it had successfully gained access to the phone used by Thomas Matthew Crooks, the suspected shooter in the attempted assassination of former President Donald Trump.

404media EN 2024 cracked phone FBI US Password-Locked
US Disrupts Russian Bots Spreading Propaganda on Twitter https://uk.pcmag.com/security/153183/us-disrupts-russian-bots-spreading-propaganda-on-twitter
10/07/2024 06:46:56
QRCode
archive.org
thumbnail

Russian media outlet RT ran the bot farm to pump out disinformation via 968 Twitter accounts, the US Justice Department says.

pcmag EN 2024 Russia bot RT disinformation Twitter FBI US Propaganda disrupted
FBI obtained 7,000 LockBit decryption keys, victims should contact feds to get support https://securityaffairs.com/164207/security/fbi-obtained-7000-lockbit-decryption-keys.html
07/06/2024 12:36:27
QRCode
archive.org
thumbnail

The FBI is informing victims of LockBit ransomware it has obtained over 7K decryption keys that could allow some of them to decrypt their data

securityaffairs FBI LockBit decryption keys
page 1 / 3
4630 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio