article thumbnail

From Cybercrime Saul Goodman to the Russian GRU

Krebs on Security

A review of this user’s hacker identities shows that during his time on the forums he served as an officer in the special forces of the GRU , the foreign military intelligence agency of the Russian Federation. From the forum’s inception until around 2008, Djamix was one of its most active and eloquent contributors.

Military 260
article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

md , a website launched in 2008 that chronicled the history of a 1990 armed conflict in Moldova known as the Transnistria War and the Moldo-Russian war. Cyber intelligence firm Intel 471 shows this email address is tied to the username “ dfyz ” on more than a half-dozen Russian language cybercrime forums since 2008.

Cloud 273
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Apple AirTag Bug Enables ‘Good Samaritan’ Attack

Krebs on Security

In 2008, a cyber attack described at the time as “the worst breach of U.S. military computers in history” was traced back to a USB flash drive left in the parking lot of a U.S. A USB stick with malware is very likely how U.S. Department of Defense facility. ” Apple has not responded to requests for comment.

Phishing 327
article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Icamis and Sal were in daily communications with these botmasters, via the Spamdot forum and private messages. Also, it was common for Icamis to reply when Spamdot members communicated a request or complaint to Sal, and vice versa. 2008, wherein he addresses forum members with the salutation, “Hello Gentlemen Scammers.”

article thumbnail

New Turla ComRAT backdoor uses Gmail for Command and Control

Security Affairs

Earlier versions of Agent.BTZ were used to compromise US military networks in the Middle East in 2008. a communication module (a DLL), which is injected into the default browser by the orchestrator. It communicates with the orchestrator using a named pipe.

article thumbnail

The Pushmi-Pullyu Impact of Technology Innovation on Information Preservation

AIIM

In 1995, if I was going to find this Civil War fellow, it meant a personal trip to the National Archives through the microfilmed military records. I recently found an initial communication dated May 12, 1995 to this news group. It also meant some posts to alt.war.civil news groups. Why didn’t I just do a web search? Ancestry.co.uk

article thumbnail

IoT - Haven’t we been here before?

CGI

Arguably, machine to machine (M2M) communication started in the 1950s in military projects , where IBM developed the real time operating system concepts required to handle a number of complex applications, including the first missile tracking systems. M2M – back to the beginning.

IoT 40