Skip to main content

Tell me how did this happen? AND win a 32 GB persistent boo-table KALI LINUX OS.


How did this happen? Frame a plot/solution via a story (A video/Write-up). The winner would win a 32 GB persistent bootable KALI LINUX OS.
Submit the You-tube video link/ Write-up @ hackin2minutes@gmail.com

Winner will be announced LIVE on my you-tube channel CYBER WIZARD                                                     
Subscribe my Youtube channelCYBER WIZARD

                                                            Story
Professional, coordinated attackers with a plan, breached a server maintained by Anonym University and walked off with nearly 800,000 records, and have used the information to commit at least 30 acts of identity theft.
Anonym officials reported on 19/06/2018, that between June and December of this year, a server containing records on some 3,500 employees was breached. Notification using all campus email was initiated, and the staffers were told to watch for unusual patterns on their credit card statements.
The investigation is ongoing, with both an external expert consultant and a cyber-crime investigators from Cyber team.
“The integrity of the Anonym’s system has been restored and there is no indication of any additional instances of compromise of personal information,” said Dr. Praveen, university president.
The lack of further incident is good news to be certain, Dr. Praveen’s memo to the university staff on the incident is both disturbing and eye opening from an Information Security perspective. If anything, it can serve as a nightmare scenario for organizations on data protection.
According to the investigation details till now, between June and December of this year, the attackers targeted a single folder on the main Anonym’s server. The folder housed several files on it with personal information, but no single file had a complete set of information.
“However, by working between files, the hacker(s) have been able to piece together enough information to be able to engage in the theft of identity of at least 100 employees...by working between files, data regarding Name, Adhar number,Pan number, Date of Birth, and Deposit Account numbers were accessed. Additional directory information such as address, phone numbers, college email address, etc. was also likely compromised.”
In addition, the stolen data has been used to apply for SBI credit cards under the employee’s name.  
“The access pathway used to invade our main server has been sealed. We hope to know, by the end of this week precisely who had their information compromised,” Dr. Praveen added.

Story by SAWAN BHAN
Subscribe CYBER WIZARD

Last Date of Submission : 29/06/2018

Comments

Popular posts from this blog

Backdoorme - BACKDOOR EXPLOIT FOR HACKERS Tools like metasploit are great for exploiting computers, but what happens after you've gained access to a computer? Backdoorme answers that question by unleashing a slew of backdoors to establish persistence over long periods of time. Once an SSH connection has been established with the target, Backdoorme's strengths can come to fruition. Unfortunately, Backdoorme is not a tool to gain root access - only keep that access once it has been gained. Please only use Backdoorme with explicit permission - please don't hack without asking. Usage Backdoorme is split into two parts: backdoors and modules. Backdoors are small snippets of code which listen on a port and redirect to an interpreter, like bash. There are many backdoors written in various languages to give variety. Modules make the backdoors more potent by running them more often, for example, every few minutes or whenever the computer boots. This ...

Treat your online privacy as you would treat your Money"

         "Treat your online privacy as you would treat your Money" Data breaches are common occurrences these days, with personal information routinely stolen or misused from social media, banks, retail outlets and other online sites. I shall give you a mantra!! Even if you are not an information security enthusiast.                                "The Mantra is to treat our online privacy as we would treat our money" By Sawan Bhan As an InfoSec guy i would always recommend the highest level of security to ensure our information  does not fall into the wrong hands. I am going to share some tips to strengthen the safety and security of our online accounts to avoid being the victim of a data breaches. #NOTHING IS EVER TRULY DELETED# Every time when we are online, we are leaving a trail of an activity. From websites to online shoppi...