article thumbnail

Who Stole 3.6M Tax Records from South Carolina?

Krebs on Security

For nearly a dozen years, residents of South Carolina have been kept in the dark by state and federal investigators over who was responsible for hacking into the state’s revenue department in 2012 and stealing tax and bank account information for 3.6 13, 2012, after a state IT contractor clicked a malicious link in an email.

Sales 217
article thumbnail

Who’s Behind the NetWire Remote Access Trojan?

Krebs on Security

A Croatian national has been arrested for allegedly operating NetWire , a Remote Access Trojan (RAT) marketed on cybercrime forums since 2012 as a stealthy way to spy on infected systems and siphon passwords. NetWire has been sold openly on the same website since 2012: worldwiredlabs[.]com. org , also registered in 2012.

Access 234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Giving a Face to the Malware Proxy Service ‘Faceless’

Krebs on Security

In January 2023, the Faceless service website said it was willing to pay for information about previously undocumented security vulnerabilities in IoT devices. Recently, Faceless has shown ambitions beyond just selling access to poorly-secured IoT devices. 2012, from an Internet address in Magnitogorsk, RU.

Passwords 221
article thumbnail

Facebook links cyberespionage group APT32 to Vietnamese IT firm

Security Affairs

The APT32 group has been active since at least 2012, it has targeted organizations across multiple industries and foreign governments, dissidents, and journalists. The APT32 also targeted peripheral network security and technology infrastructure corporations, and security firms that may have connections with foreign investors.

article thumbnail

The Risks In Using Third-Party Code

ForAllSecure

BlackDuck Software uncovered that 67% of the applications they analyzed contained open source security vulnerabilities. Security is a top risk of using third-party code. Nefarious actors stole customer data, including names, social security numbers, birthdates, and home addresses. In September 2017, Equifax faced a data breach.

Risk 52
article thumbnail

The Risks In Using Third-Party Code

ForAllSecure

BlackDuck Software uncovered that 67% of the applications they analyzed contained open source security vulnerabilities. Security is a top risk of using third-party code. Nefarious actors stole customer data, including names, social security numbers, birthdates, and home addresses. In September 2017, Equifax faced a data breach.

Risk 52
article thumbnail

DoJ announced to have shut down Slilpp marketplace in international operation

Security Affairs

The marketplace had been active since 2012, it was allowing sellers to offer stolen login credentials, including usernames and passwords for bank accounts, online payment accounts, mobile phone accounts, retailer accounts, and other online accounts. Pierluigi Paganini. SecurityAffairs – hacking, SlilPP marketplace).

Retail 111