Category: Criminal

June 9th, 2017 by John

Full data enrichment profiles for more than 200 million people have been placed up for sale on the Darknet. The person offering the files claims the data is from Experian, and is looking to get $600 for everything.

Details of this incident came to Salted Hash via the secure drop at Peerlyst, where someone uploaded details surrounding the sale and the data. The data were first vetted by the technical review board at Peerlyst, who confirmed its legitimacy. Once it was cleared by the technical team, a sample of the data was passed over to Salted Hash for additional verification and disclosure… Read More

Posted in Criminal, Infosec, Privacy

April 19th, 2017 by John

In an interesting turn, Hajime is a vigilante-style project intended to disrupt Mirai and similar IoT botnets.

Posted in Criminal, Exploits & Attacks, IoT

April 19th, 2017 by John

The Shadow Brokers Leaked Exploits Explained | Rapid7 Community and Blog

The Shadow Brokers released nation-state NSA exploits and Rapid7 researchers explain what this means in a concise article, worth a read.

Posted in Criminal, Exploits & Attacks

April 19th, 2017 by John

Posted in Criminal, Exploits & Attacks

April 14th, 2017 by John

U.S. charges DuPont employee with trade secrets theft | April 11, 2017 Issue – Vol. 95 Issue 16 | Chemical & Engineering News

This is an interesting case where a DuPont employee stole trade secrets prior to retirement. It is often the young, brash employee who is the scapegoat. I speak from personal experience, that in the Midwest, large, old corporations distrust vendors, contractors and new employees, and tend to overlook the risk that comes from the long-time “trusted and loyal” employee. There is even a stigma if you have been at a company a long time, and leave before retirement. However, until recently, many companies continued to provide email and corporate services, and even let retirees keep their laptop, because of their retiree status. Shows that good feelings don’t amount to much, when competitors are willing to pay big bucks for your secrets. Everyone is a potential leak. Read More

Posted in Blog, Criminal, Infosec