<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News - MySpyBot</title>
	<atom:link href="https://myspybot.com/news/feed/" rel="self" type="application/rss+xml" />
	<link>https://myspybot.com/news/</link>
	<description>Keep an eye on the important computer security stuff</description>
	<lastBuildDate>Sun, 30 Nov 2025 11:49:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.2</generator>

<image>
	<url>https://myspybot.com/wp-content/uploads/2018/06/favicon.png</url>
	<title>News - MySpyBot</title>
	<link>https://myspybot.com/news/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Chinese hackers are attacking critical infrastructure in the US and Guam</title>
		<link>https://myspybot.com/chinese-hackers-attacking-critical-infrastructure-in-us-guam/</link>
					<comments>https://myspybot.com/chinese-hackers-attacking-critical-infrastructure-in-us-guam/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Tue, 30 May 2023 10:04:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=4791</guid>

					<description><![CDATA[<p>Recent investigations conducted by Microsoft, alongside the US government and four other nations, have shed light on the activities of a cybercrime group known as Volt Typhoon. According to the available data, Volt Typhoon has been operating stealthily for a minimum of two years, engaging in extensive espionage and gathering sensitive information on behalf of …</p>
<p>The post <a href="https://myspybot.com/chinese-hackers-attacking-critical-infrastructure-in-us-guam/">Chinese hackers are attacking critical infrastructure in the US and Guam</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote class="bdaia-blockquotes bdaia-bqpo-right">According to the findings of Microsoft, as well as the US government and four other countries, the cyberattacks are attributed to the Volt Typhoon group.</blockquote>
<p>Recent investigations conducted by <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/" rel="noopener" target="_blank">Microsoft</a>, alongside the US government and four other nations, have shed light on the activities of a cybercrime group known as <strong>Volt Typhoon</strong>. According to the available data, Volt Typhoon has been operating stealthily for a minimum of two years, engaging in extensive espionage and gathering sensitive information on behalf of the People&#8217;s Republic of China.</p>
<p>To ensure their actions go unnoticed, these cybercriminals employ pre-existing tools and exploit compromised devices, manually controlling their operations to evade detection by automated security measures. A notable tactic employed by the group involves utilizing home and small office routers as intermediaries, establishing a covert infrastructure that allows them to communicate with infected systems through local internet service providers. By exploiting the compromised Small Office/Home Office (SOHO) networking peripherals, including routers from prominent manufacturers such as <strong>ASUS</strong>, <strong>Cisco</strong>, <strong>D-Link</strong>, <strong>NETGEAR</strong>, and <strong>Zyxel</strong>, Volt Typhoon redirects its network traffic to its designated targets. Alarming discoveries have revealed that many of these devices have exposed their HTTP or SSH management interfaces, which further facilitates the illicit activities. Hackers target various industries, including government, manufacturing, communication, transportation, maritime and IT. This diverse array of targets suggests a comprehensive strategy aimed at acquiring valuable data and disrupting critical systems across various sectors.</p>
<p>Researchers and analysts strongly suspect that the primary objective of Volt Typhoon is to undermine communication channels between the United States and the Pacific region. The increasing tensions between the US and China have created an environment where these cybercriminals focus their efforts on Guam, a strategic location that houses a significant US military base. By compromising networks and systems in Guam, they seek to disrupt vital communication links, potentially hampering military operations and causing significant disruption in the region.</p>
<p>The activities of Volt Typhoon underscore the growing importance of robust cybersecurity measures to safeguard sensitive information, critical infrastructure, and international communication channels. The ongoing efforts to counter these cyber threats require enhanced collaboration between governments, organizations, and technology providers to mitigate the risks posed by sophisticated cybercriminals operating on behalf of nation-states.</p>
<p>The post <a href="https://myspybot.com/chinese-hackers-attacking-critical-infrastructure-in-us-guam/">Chinese hackers are attacking critical infrastructure in the US and Guam</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/chinese-hackers-attacking-critical-infrastructure-in-us-guam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Facebook warns that hackers are disguising malware as ChatGPT</title>
		<link>https://myspybot.com/hackers-disguising-malware-as-chatgpt/</link>
					<comments>https://myspybot.com/hackers-disguising-malware-as-chatgpt/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Tue, 09 May 2023 14:42:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=4787</guid>

					<description><![CDATA[<p>Facebook has issued a warning about new malware that disguises itself as a program from OpenAI, specifically the popular artificial intelligence chatbot tool, ChatGPT. The social media giant’s security team has discovered that these new viruses use the interface or functionality of ChatGPT and other AI-related tools to hack user accounts. According to a new …</p>
<p>The post <a href="https://myspybot.com/hackers-disguising-malware-as-chatgpt/">Facebook warns that hackers are disguising malware as ChatGPT</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote class="bdaia-blockquotes bdaia-bqpo-right">Malware distributors have been exploiting people&#8217;s interest in ChatGPT by pushing malicious browser extensions that offer chatbot functionality.</blockquote>
<p>Facebook has issued a warning about new malware that disguises itself as a program from OpenAI, specifically the popular artificial intelligence chatbot tool, ChatGPT. The social media giant&#8217;s security team has discovered that these new viruses use the interface or functionality of ChatGPT and other AI-related tools to hack user accounts.</p>
<p>According to a new report from Facebook Meta, its parent company, the security team has been tracking new malware threats for the past few months. They have taken action against strains of malware that exploit people&#8217;s interest in ChatGPT to deceive them into installing malicious software that pretends to provide AI functionality.</p>
<p>The security team has identified about ten new families of malicious programs that use AI chatbot tools like ChatGPT to compromise user accounts. One prevalent scheme involves distributing malicious browser extensions that claim to deliver ChatGPT features. Users download these extensions for browsers like Chrome or Firefox to use the headline-grabbing AI chatbot functions. While some of these extensions work as advertised, they also contain malicious software that can gain access to the user&#8217;s device.</p>
<p>Meta reports that over 1,000 unique URLs offering malware disguised as ChatGPT or other AI-related tools have been detected and blocked from spreading on Facebook, Instagram, and WhatsApp.</p>
<p>Facebook Meta advises users to be cautious when downloading browser extensions or other software that offers AI chatbot features. Users should only download software from reputable sources and regularly update their devices&#8217; antivirus software to detect and block malware. Additionally, if a user notices any suspicious activity on their account, they should immediately change their password and enable two-factor authentication.</p>
<p>The post <a href="https://myspybot.com/hackers-disguising-malware-as-chatgpt/">Facebook warns that hackers are disguising malware as ChatGPT</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/hackers-disguising-malware-as-chatgpt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Kaspersky Lab has developed Kaspersky Antidrone Portable</title>
		<link>https://myspybot.com/kaspersky-lab-developed-kaspersky-antidrone-portable/</link>
					<comments>https://myspybot.com/kaspersky-lab-developed-kaspersky-antidrone-portable/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Wed, 26 Apr 2023 17:22:58 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=4784</guid>

					<description><![CDATA[<p>Researchers at Kaspersky Lab have created Kaspersky Antidrone Portable, a device that detects mobile radio frequencies to spot drones. The device is designed for use at mass events, protecting private property, and transport infrastructure. The main target audience is government organizations and businesses that require timely and accurate detection of drones in a specific location …</p>
<p>The post <a href="https://myspybot.com/kaspersky-lab-developed-kaspersky-antidrone-portable/">Kaspersky Lab has developed Kaspersky Antidrone Portable</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Researchers at Kaspersky Lab have created <strong>Kaspersky Antidrone Portable</strong>, a device that detects mobile radio frequencies to spot drones. The device is designed for use at mass events, protecting private property, and transport infrastructure. The main target audience is government organizations and businesses that require timely and accurate detection of drones in a specific location and within a specified timeframe.</p>
<p>&#8220;Back in 2019, we introduced the Kaspersky Antidrone software and hardware complex to the market. Its main purpose is to protect critical infrastructure, industrial facilities, as well as transport infrastructure and mass events from illegal drone use. Today, the new Kaspersky Antidrone Portable hardware sensor has been released, and this is yet another confirmation that we have long ceased to be just an antivirus company,&#8221; said Eugene Kaspersky, CEO of Kaspersky Lab.</p>
<p>The Kaspersky Antidrone Portable detector is a hardware device for detecting commercial drones by radio signal. The solution can determine the precise location of the most common drone models within a radius of up to one kilometer, as well as the position of the operator controlling it. The detector comes with a waterproof tablet based on Kaspersky Antidrone software, which receives notifications about detected drones through a graphical interface.</p>
<p>Kaspersky Antidrone Portable is more compact and mobile compared to standard radio frequency detectors. It weighs less than 5 kg and fits in a case the size of a carry-on suitcase. The device can operate autonomously for up to two hours, and the operator can independently expand the search radius while freely moving around the perimeter of the protected area.</p>
<p>Kaspersky Antidrone Portable can be used as a standalone installation or integrated into larger systems, including stationary ones. For example, the detector can work in conjunction with other types of detectors in the Kaspersky Antidrone lineup, including optical and radar systems. The solution can also be used in combination with a mobile drone jammer.</p>
<p>&#8220;Drone technologies are developing, and the risks associated with their use are increasing. Detecting drones is one of the most challenging tasks for any automated drone protection system. The smaller the drone, the harder it is to detect. A large drone (e.g. 438x451x301 mm) can be noticed by a person even without special devices. However, if a small drone (around 160x290x55 mm) moves in a crowd of people, dense urban infrastructure, or under complex weather conditions, it is almost impossible to detect it without a special device,&#8221; comments Vladimir Turov, head of Kaspersky Antidrone. &#8220;We constantly test existing hardware modules for integration into the Kaspersky Antidrone ecosystem. Based on this experience, we decided to create our own range of hardware devices. The first one was the Kaspersky Antidrone Portable for drone detection.&#8221;</p>
<p><script type="text/javascript">
amzn_assoc_placement = "adunit0";
amzn_assoc_search_bar = "true";
amzn_assoc_tracking_id = "promocode0c-20";
amzn_assoc_ad_mode = "manual";
amzn_assoc_ad_type = "smart";
amzn_assoc_marketplace = "amazon";
amzn_assoc_region = "US";
amzn_assoc_title = "My Amazon Picks";
amzn_assoc_linkid = "e52884f7414a7469394b6b51082880e7";
amzn_assoc_asins = "B00CX2INCA,B0831QLFRS,B0831QMS6S,B0831QL47Q";
</script><br />
<script src="//z-na.amazon-adsystem.com/widgets/onejs?MarketPlace=US"></script></p>
<p>The post <a href="https://myspybot.com/kaspersky-lab-developed-kaspersky-antidrone-portable/">Kaspersky Lab has developed Kaspersky Antidrone Portable</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/kaspersky-lab-developed-kaspersky-antidrone-portable/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Russia staged a new phishing campaign targeting Western diplomatic institutions</title>
		<link>https://myspybot.com/russia-staged-new-phishing-campaign/</link>
					<comments>https://myspybot.com/russia-staged-new-phishing-campaign/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Fri, 21 Apr 2023 21:00:39 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=4781</guid>

					<description><![CDATA[<p>Polish military counterintelligence and cybersecurity experts have detected a massive spying cyber campaign aimed at gathering data from diplomatic institutions in various countries around the world. The relevant statement was posted on the Polish government portal. Counterintelligence and cybersecurity experts at CERT.PL associate the campaign with Russia’s main intelligence agency (GRU). The attack targets diplomatic …</p>
<p>The post <a href="https://myspybot.com/russia-staged-new-phishing-campaign/">Russia staged a new phishing campaign targeting Western diplomatic institutions</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Polish military counterintelligence and cybersecurity experts have detected a massive spying cyber campaign aimed at gathering data from diplomatic institutions in various countries around the world. The relevant statement was posted on the <a href="https://www.gov.pl/web/baza-wiedzy/espionage-campaign-linked-to-russian-intelligence-services" rel="noopener" target="_blank">Polish government portal</a>. Counterintelligence and cybersecurity experts at CERT.PL associate the campaign with Russia’s main intelligence agency (GRU). The attack targets diplomatic institutions in EU and NATO member countries and, in some episodes, in Africa.</p>
<p>As noted, many elements of this campaign fully or partially echo the activity that Microsoft documented as Nobelium and that Mandiant (a subsidiary of Google) called APT29. Those behind it are likely also associated with the SolarWinds campaign and tools such as Sunburst, EnvyScout, BoomBox, as well as a number of other spy campaigns. However, there are differences &#8211; the software used this time was not previously publicly described. This includes modified versions of SNOWYAMBER, HALFRIG, and QUATERRIG. The new tools likely replaced older ones whose effectiveness has decreased.<br />
In all cases identified, typical phishing techniques were used for the campaign: diplomatic institution employees receive emails supposedly from the embassies of another European country, inviting them to a meeting or referring to specific documents.</p>
<figure id="attachment_4782" aria-describedby="caption-attachment-4782" style="width: 780px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2023/04/phishing-email.png"><img fetchpriority="high" decoding="async" src="https://myspybot.com/wp-content/uploads/2023/04/phishing-email.png" alt="Phishing email" width="780" height="380" class="size-full wp-image-4782" srcset="https://myspybot.com/wp-content/uploads/2023/04/phishing-email.png 780w, https://myspybot.com/wp-content/uploads/2023/04/phishing-email-300x146.png 300w, https://myspybot.com/wp-content/uploads/2023/04/phishing-email-620x302.png 620w, https://myspybot.com/wp-content/uploads/2023/04/phishing-email-768x374.png 768w" sizes="(max-width: 780px) 100vw, 780px" /></a><figcaption id="caption-attachment-4782" class="wp-caption-text">Phishing email</figcaption></figure>
<p>The body of the email or attached PDF contains a link that redirects to either the ambassador&#8217;s calendar or a file that needs to be downloaded. In reality, the link leads to a compromised website with the EnvyScout script, which decodes the malicious file from the page via JavaScript and gets onto the user&#8217;s device. Cybersecurity experts have noticed three different versions of EnvyScout used for this campaign. The campaign is ongoing and institutions that may be of interest to attackers should take additional steps to ensure cybersecurity.</p>
<p>It is also noted that the disclosure of this information was made to throw a spanner in the works of the criminal gang.</p>
<p>The post <a href="https://myspybot.com/russia-staged-new-phishing-campaign/">Russia staged a new phishing campaign targeting Western diplomatic institutions</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/russia-staged-new-phishing-campaign/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HermeticWiper malware: hands-on details of the Ukraine cyberattack</title>
		<link>https://myspybot.com/hermeticwiper-malware-details-of-the-ukraine-cyberattack/</link>
					<comments>https://myspybot.com/hermeticwiper-malware-details-of-the-ukraine-cyberattack/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Wed, 08 Feb 2023 13:45:25 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=4752</guid>

					<description><![CDATA[<p>Today we’ll be talking about the HermeticWiper malware that has been used by the Russians against Ukraine. Now, a piece of malware may seem like a relatively trivial matter when we’re talking about a real war with troops on the ground, rockets raining from above, but it’s actually not. Now, I do have a sample …</p>
<p>The post <a href="https://myspybot.com/hermeticwiper-malware-details-of-the-ukraine-cyberattack/">HermeticWiper malware: hands-on details of the Ukraine cyberattack</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote class="bdaia-blockquotes bdaia-bqpo-right">Gain insights into the notorious state-sponsored HermeticWiper cyberattack that hit Ukraine right before the unprovoked Russian invasion.</blockquote>
<p>Today we&#8217;ll be talking about the HermeticWiper malware that has been used by the Russians against Ukraine. Now, a piece of malware may seem like a relatively trivial matter when we&#8217;re talking about a real war with troops on the ground, rockets raining from above, but it&#8217;s actually not. Now, I do have a sample of this malware on the desktop and we&#8217;re just going to run it while we talk about some of the things it does.</p>
<p>So first of all, this is a wiper malware, meaning its main purpose is to disable or render inactive systems that it&#8217;s run on. The way it does that, of course, in traditional ransomware fashion is it&#8217;s going to destroy your MBR, your master boot record, and disable services. So if this was a system that was hosting a website, say, of the Ukrainian government, a bank, then it would just go down. And it does take a while to activate. They also kind of tried to hide this by using ransomware as a decoy.</p>
<p>So they had this little ransom note, which was actually fake, of course, to mislead people into thinking they were hit by ransomware when actually they were hit by this Russian wiper malware.</p>
<figure id="attachment_4753" aria-describedby="caption-attachment-4753" style="width: 820px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2023/02/ransom-note-dropped-by-pseudo-ransomware.jpg"><img decoding="async" src="https://myspybot.com/wp-content/uploads/2023/02/ransom-note-dropped-by-pseudo-ransomware.jpg" alt="Ransom note dropped by pseudo-ransomware to smokescreen HermeticWiper attack" width="820" height="498" class="size-full wp-image-4753" srcset="https://myspybot.com/wp-content/uploads/2023/02/ransom-note-dropped-by-pseudo-ransomware.jpg 820w, https://myspybot.com/wp-content/uploads/2023/02/ransom-note-dropped-by-pseudo-ransomware-300x182.jpg 300w, https://myspybot.com/wp-content/uploads/2023/02/ransom-note-dropped-by-pseudo-ransomware-620x377.jpg 620w, https://myspybot.com/wp-content/uploads/2023/02/ransom-note-dropped-by-pseudo-ransomware-768x466.jpg 768w" sizes="(max-width: 820px) 100vw, 820px" /></a><figcaption id="caption-attachment-4753" class="wp-caption-text">Ransom note dropped by pseudo-ransomware to smokescreen HermeticWiper attack</figcaption></figure>
<p>Given the prevalence of ransomware attacks, I can see how this would be an effective way of cloaking the intentions of the Russian cyberattacks. Now, as the sample is executing, we&#8217;re going to look at some of its capabilities. But before that, we also should consider the impact that cyber threats like this can have.</p>
<p>Here&#8217;s the thing, when we talk about something as broad as a country&#8217;s military, we reduce it down to numbers for simplicity. But it doesn&#8217;t mean that the military is a resource. A lot of things determine how the military is going to fare, including things like troops’ morale, the ability to communicate, the military command, different hierarchies being able to talk to each other and organize. And if a cyberattack takes out all of those communication capabilities, or even misleads them, it can quickly lead to the military command breaking down and individuals fleeing or giving up their positions just because there&#8217;s no clear mission for them to do. And such a tool can be highly effective.</p>
<p>But we&#8217;ll take a look at some of the things that this file does. So we&#8217;ve got some bootkit behavior and the ability to impair defenses, disable or modify tools. We can see that some of the registry activity is actually similar to the dark side, not a surprise. Got some file activity as well. We&#8217;ve got some drivers being written and there&#8217;s quite a lot of modifications happening in the registry. If we go back to the original file and take a deeper look at the capabilities of the wiper itself, it&#8217;s got abilities in execution, persistence, privilege escalation, and discovery. It does take a while to activate though.</p>
<p>So our virtual machine is still oblivious to the sample that&#8217;s running in the background. If we open the Task Manager, it&#8217;s going to be visible.</p>
<figure id="attachment_4754" aria-describedby="caption-attachment-4754" style="width: 664px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2023/02/not-much-process-activity-noticeable.jpg"><img decoding="async" src="https://myspybot.com/wp-content/uploads/2023/02/not-much-process-activity-noticeable.jpg" alt="Not much process activity noticeable" width="664" height="591" class="size-full wp-image-4754" srcset="https://myspybot.com/wp-content/uploads/2023/02/not-much-process-activity-noticeable.jpg 664w, https://myspybot.com/wp-content/uploads/2023/02/not-much-process-activity-noticeable-300x267.jpg 300w, https://myspybot.com/wp-content/uploads/2023/02/not-much-process-activity-noticeable-620x552.jpg 620w" sizes="(max-width: 664px) 100vw, 664px" /></a><figcaption id="caption-attachment-4754" class="wp-caption-text">Not much process activity noticeable</figcaption></figure>
<p>I like how it&#8217;s got this nice gift icon. It&#8217;s like it&#8217;s a gift from Russia. It&#8217;s just sitting in memory and you don&#8217;t notice a lot happening. So it&#8217;s very easy to ignore. Unlike ransomware, it does not ramp up your CPU activity to 80 or 90% that if you&#8217;re monitoring a server, you&#8217;d notice it. Now another interesting thing to note while this malware is running is that it&#8217;s incredibly hard to detect wiper malware. Some of these have very low detections on VirusTotal. When this came out, I think it had 14 out of 70 detections.</p>
<p>I have noticed in the past as well with wiper malware that a lot of the behavioral defenses that will pick up threats like ransomware will totally be ineffective against wipers. It&#8217;s also worth noting that these sorts of attacks are usually also accompanied with distributed denial of service (DDoS). And in combination, it can just render a lot of the services that are critical to a country&#8217;s functioning disabled.</p>
<p>Now, the good news is in this specific case, this cyberattack against Ukraine wasn&#8217;t particularly successful. I think most of the websites recovered fairly quickly. But it&#8217;s not hard to imagine the kind of impact this would have if it totally disrupted communication systems at a crucial point in time. Alright, so the sample has been running in the background for a while and it may seem like the system is normal, nothing has happened, but if we open one of our files, as you will see, the data inside is gone already. This is what the data looks like now. It has all been wiped.</p>
<figure id="attachment_4755" aria-describedby="caption-attachment-4755" style="width: 949px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2023/02/file-structure-irrevocably-modified.jpg"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2023/02/file-structure-irrevocably-modified.jpg" alt="File structure irrevocably modified" width="949" height="500" class="size-full wp-image-4755" srcset="https://myspybot.com/wp-content/uploads/2023/02/file-structure-irrevocably-modified.jpg 949w, https://myspybot.com/wp-content/uploads/2023/02/file-structure-irrevocably-modified-300x158.jpg 300w, https://myspybot.com/wp-content/uploads/2023/02/file-structure-irrevocably-modified-620x327.jpg 620w, https://myspybot.com/wp-content/uploads/2023/02/file-structure-irrevocably-modified-768x405.jpg 768w, https://myspybot.com/wp-content/uploads/2023/02/file-structure-irrevocably-modified-850x448.jpg 850w" sizes="(max-width: 949px) 100vw, 949px" /></a><figcaption id="caption-attachment-4755" class="wp-caption-text">File structure irrevocably modified</figcaption></figure>
<p>So it&#8217;s been several minutes since and we&#8217;ve just had a BSOD, and now the system is no longer going to work. This malware is particularly devastating because it doesn&#8217;t care about getting some sort of ransom or a bargaining position with the victim. It just seeks to destroy your system outright. And if something like this were to hit major businesses, government organizations, it would be disaster territory very quickly if you don&#8217;t have backup systems that are isolated and not hit. It could take down services and cause mass confusion, especially as we begin to rely more and more on digital technologies for things we do in everyday life, for our money, for our food, for our communications.</p>
<p>This could be the future of warfare. So for those of you who are still not convinced about the importance of cybersecurity, I think this is a reminder that that&#8217;s the world we live in. It&#8217;s only going to get more important from here. Defending yourself from such attacks is increasingly crucial because there might be a spillover of such incidents as there was with the NotPetya attacks. We could see the sample being used against businesses or accidentally hitting businesses. It&#8217;s really important to understand the repercussions of cyberattacks in a time like this. And as always, stay informed, stay secure, and stay safe Ukraine.</p>
<p>The post <a href="https://myspybot.com/hermeticwiper-malware-details-of-the-ukraine-cyberattack/">HermeticWiper malware: hands-on details of the Ukraine cyberattack</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/hermeticwiper-malware-details-of-the-ukraine-cyberattack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>GandCrab ransomware free decryption tool (up to version 5.1)</title>
		<link>https://myspybot.com/free-gandcrab-decryption-tool/</link>
					<comments>https://myspybot.com/free-gandcrab-decryption-tool/#comments</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Thu, 21 Feb 2019 07:29:44 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=3520</guid>

					<description><![CDATA[<p>[February 2019 update] On October 25, Romanian security software vendor Bitdefender sensationally spread the word about their breakthrough in combatting GandCrab, one of the nastiest and most competently designed blackmail viruses to date. This e-extortion epidemic has been running rampant since early 2018, making hundreds of thousands of victims throughout the world. The antivirus lab’s …</p>
<p>The post <a href="https://myspybot.com/free-gandcrab-decryption-tool/">GandCrab ransomware free decryption tool (up to version 5.1)</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote class="bdaia-blockquotes bdaia-bqpo-right">In light of the recent victorious move of security analysts, learn how to decrypt files locked by GandCrab v1, v4 and v5 ransomware without paying the ransom.</blockquote>
<p><strong>[February 2019 update]</strong></p>
<p>On October 25, Romanian security software vendor Bitdefender sensationally spread the word about their breakthrough in combatting GandCrab, one of the nastiest and most competently designed blackmail viruses to date. This e-extortion epidemic has been running rampant since early 2018, making hundreds of thousands of victims throughout the world.</p>
<p>The antivirus lab’s researchers were able to come up with a decryption tool that restores files encrypted by versions 1, 4 and 5 of said ransomware. This way, not only can the numerous infected users heave a sigh of relief over returning the most valuable data, but they can also do it for free. Compared to ransoms demanded by the GandCrab crew, which range from about $600 to $6,000 worth of Bitcoin or Dash cryptocurrency, this initiative is certainly a godsend.</p>
<figure id="attachment_3360" aria-describedby="caption-attachment-3360" style="width: 860px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2018/10/gandcrab-5-0-3-replaces-wallpaper-with-a-warning-message.png"><img loading="lazy" decoding="async" class="size-full wp-image-3360" title="One of the supported GandCrab versions in action" src="https://myspybot.com/wp-content/uploads/2018/10/gandcrab-5-0-3-replaces-wallpaper-with-a-warning-message.png" alt="One of the supported GandCrab versions in action" width="860" height="450" srcset="https://myspybot.com/wp-content/uploads/2018/10/gandcrab-5-0-3-replaces-wallpaper-with-a-warning-message.png 860w, https://myspybot.com/wp-content/uploads/2018/10/gandcrab-5-0-3-replaces-wallpaper-with-a-warning-message-300x157.png 300w, https://myspybot.com/wp-content/uploads/2018/10/gandcrab-5-0-3-replaces-wallpaper-with-a-warning-message-768x402.png 768w, https://myspybot.com/wp-content/uploads/2018/10/gandcrab-5-0-3-replaces-wallpaper-with-a-warning-message-620x324.png 620w, https://myspybot.com/wp-content/uploads/2018/10/gandcrab-5-0-3-replaces-wallpaper-with-a-warning-message-850x445.png 850w" sizes="(max-width: 860px) 100vw, 860px" /></a><figcaption id="caption-attachment-3360" class="wp-caption-text">One of the supported GandCrab versions in action</figcaption></figure>
<p>Zooming in, the tool called Bitdefender GandCrab Decryptor supports 3 editions of the ransomware in question, namely the ones that append victims’ personal files with the following extensions: <a href="https://myspybot.com/gandcrab-gdcb-files-ransomware/" target="_blank" rel="noopener">GDCB (version 1)</a>, <a href="https://myspybot.com/krab-file-virus-gandcrab-v4/" target="_blank" rel="noopener">KRAB (version 4)</a>, or random character string, such as <a href="https://myspybot.com/gandcrab-v-5-0/" target="_blank" rel="noopener">“yhtsfctld” (version 5)</a>. Note that the recovery works for all sub-variants of the above-mentioned iterations, so those hit by, say, <a href="https://myspybot.com/gandcrab-v5-0-3/" target="_blank" rel="noopener">GandCrab v5.0.3</a> are among the lucky ones as well.</p>
<p>According to the AV company’s <a href="https://labs.bitdefender.com/2018/10/bitdefender-law-enforcement-solve-for-multiple-versions-of-gandcrab-with-new-decryptor/" target="_blank" rel="noopener">press release</a>, the decryptor was masterminded in close collaboration with the Romanian Police, Europol, the FBI and other law enforcement agencies from the UK, the Netherlands, France, Poland, Bulgaria, Italy, and Hungary.</p>
<p>For the record, iterations 4 and 5 of the malicious program reportedly account for the majority of the infection cases. Regarding those contaminated with GandCrab versions 2 and 4, the analysts recommend them to refrain from redeeming their files via the ransom at this point. Although the decryptor in its current state doesn’t crack these mods, the white hats working on the vendor’s research team have instilled some hope by saying, “We’re still on it”. So the victims should stay tuned for good news, which is hopefully a matter of near future. Overall, the security firm’s telemetry states that about 500,000 users across the globe have fallen victim to GandCrab this year.</p>
<p>There are currently no official details if the decryptor is an outcome of seizing the malicious command &amp; control (C&amp;C) servers, or whether it takes advantage of a crypto implementation flaw in the offending code. The latter is more likely, though. Anyway, let’s move on to the decryption routine proper.</p>
<div class="bdaia-separator se-dotted" style="margin-top:15px !important;margin-bottom:30px !important;"></div>
<h3>How to decrypt GandCrab v1, v2, v5.0-5.0.3</h3>
<p>The main prerequisite to successful data recovery in this scenario is the availability of a ransom note dropped by the infection. That’s because it contains a unique user-specific key that will be used by the decryptor to restore your files. This key is a long string of hexadecimal characters that identifies each victim.</p>
<p>So, as soon as you ascertain that the ransom note is on your computer, go head and <a href="https://labs.bitdefender.com/2018/10/bitdefender-law-enforcement-solve-for-multiple-versions-of-gandcrab-with-new-decryptor/" target="_blank" rel="noopener"><strong>download the decryptor</strong></a>. Run the app and accept the End-User License Agreement. When done, you will see the main GUI. Before you proceed, be sure to insert a specific scanning path or enable the “<strong>Scan entire system</strong>” option. Also, consider putting a checkmark for the self-explanatory “<strong>Backup files</strong>” feature. Then, click “<strong>Scan</strong>”.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-3526" title="Bitdefender GandCrab Decryptor GUI" src="https://myspybot.com/wp-content/uploads/2018/11/bitdefender-gandcrab-decryptor-gui.png" alt="Bitdefender GandCrab Decryptor GUI" width="500" height="345" srcset="https://myspybot.com/wp-content/uploads/2018/11/bitdefender-gandcrab-decryptor-gui.png 500w, https://myspybot.com/wp-content/uploads/2018/11/bitdefender-gandcrab-decryptor-gui-300x207.png 300w, https://myspybot.com/wp-content/uploads/2018/11/bitdefender-gandcrab-decryptor-gui-320x220.png 320w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>The tool will start traversing your computer for the crypto key data and decrypt all files locked by a supported GandCrab edition.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-3528" title="GandCrab decryption underway" src="https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-underway.png" alt="GandCrab decryption underway" width="500" height="345" srcset="https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-underway.png 500w, https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-underway-300x207.png 300w, https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-underway-320x220.png 320w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>Be advised the utility first tries to recover 5 files in the defined scanning path and will not continue if the decryption fails for some reason. Otherwise, it will decrypt the hostage files and then display the scan status notification. If something went wrong and some data couldn’t be restored, the app will let you know by saying “<strong>Some files could not be decrypted!</strong>”</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-3530" title="Decryption report" src="https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-report.png" alt="Decryption report" width="500" height="345" srcset="https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-report.png 500w, https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-report-300x207.png 300w, https://myspybot.com/wp-content/uploads/2018/11/gandcrab-decryption-report-320x220.png 320w" sizes="(max-width: 500px) 100vw, 500px" /></p>
<p>In order to find out which files haven’t been reinstated, you can peruse the tool’s logs generated inside the <strong>BDRansomDecryptor</strong> folder under the <strong>%Temp%</strong> directory. However, if the decryptor succeeds in locating all the bits and pieces of the required cryptographic information in the system, the chances that something goes wrong are quite low and it should be able to get all your files out of captivity.</p>
<div class="bdaia-separator se-dotted" style="margin-top:15px !important;margin-bottom:30px !important;"></div>
<h3>February 2019 update: support added for GandCrab variants up to v5.1</h3>
<p>Almost 4 months after the above-mentioned version of the revolutionary decryptor was out, the same security firm cooked up a new mod that’s capable of restoring files mutilated by more editions of the ransomware. Its recovery power now additionally spans GandCrab iterations up to version 5.1 inclusive. This tool is particularly game-changing in the context of the <a href="https://myspybot.com/gandcrab-5-0-4/" target="_blank" rel="noopener">GandCrab 5.0.4</a> sub-campaign, which has made the most victims over the past few months.</p>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-3697" title="New Bitdefender decryptor version supporting more GandCrab variants" src="https://myspybot.com/wp-content/uploads/2018/11/new-gandcrab-decryptor.png" alt="New Bitdefender decryptor version supporting more GandCrab variants" width="768" height="512" srcset="https://myspybot.com/wp-content/uploads/2018/11/new-gandcrab-decryptor.png 768w, https://myspybot.com/wp-content/uploads/2018/11/new-gandcrab-decryptor-300x200.png 300w, https://myspybot.com/wp-content/uploads/2018/11/new-gandcrab-decryptor-620x413.png 620w" sizes="(max-width: 768px) 100vw, 768px" /></p>
<p>Not only has the most recent build of rescue app gotten an enhanced cipher cracking functionality, but it also underwent an overhaul on the outside. It’s now called <a href="https://labs.bitdefender.com/2019/02/new-gandcrab-v5-1-decryptor-available-now/" target="_blank" rel="noopener"><strong>Bitdefender Decryption Utility for GandCrab V1, V4, V5</strong></a>.</p>
<p style="text-align: center;"><span class='bdaia-btns bdaia-btn-large' style="background:#81d742 !important;color:#ffffff !important;"><a href="https://labs.bitdefender.com/wp-content/uploads/downloads/gandcrab-removal-tool-v1-1/" target="_blank" rel="nofollow noreferrer noopener" style="color:#ffffff !important;"><span class="btn-io fa fa fa-arrow-circle-down"></span>Download GandCrab v1-v5.1 ransomware decryptor</a></span></p>
<p>The new light-colored GUI supersedes the dark user console of the previous variant. Other than that, the features are the same. The user is offered to select a specific encrypted folder or opt for a scan of the entire system. The “Backup files” option is still there, and it’s worthwhile just to make sure data stays in its current form if something goes wrong along the way.</p>
<p>Predictably enough, heaving a sigh of relief is a premature reaction when it comes to ransomware families as potent as this one. Mere days elapsed after the vendor announced the revamped decryptor – and the cybercriminals came up with <a href="https://myspybot.com/gandcrab-5-2/">GandCrab 5.2</a> variant that cannot be cracked. The bad guys must have “patched” the crypto flaw discovered by the security analysts, so the undecryptable menace is back and it’s out there looking for new victims. While the researchers’ efforts are more than commendable, the crooks continue to be one step ahead.</p>
<div class="bdaia-separator se-dotted" style="margin-top:15px !important;margin-bottom:30px !important;"></div>
<h3>The bottom line</h3>
<p>GandCrab ransomware devs have architected a smooth extortion model where they get a 30% cut from all the ransoms while outsourcing the distribution job to unscrupulous affiliates. This tactic is known as RaaS (Ransomware-as-a-Service), and it’s the basis for long-lasting worldwide propagation of the culprit. This strain boasts frequent updates featuring code improvements and permanently refined AV evasion mechanisms.</p>
<p>Again, the build currently in rotation is GandCrab v5.2, and it’s uncrackable thus far. The malware operators have made a few tweaks of their infection to get around the free decryption trap. In the meantime, if you have been attacked by this virtual predator and the stars align in terms of the ransomware variant, don’t fail to give the free recovery tool a shot right away.</p>
<p>The post <a href="https://myspybot.com/free-gandcrab-decryption-tool/">GandCrab ransomware free decryption tool (up to version 5.1)</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/free-gandcrab-decryption-tool/feed/</wfw:commentRss>
			<slash:comments>8</slash:comments>
		
		
			</item>
		<item>
		<title>“Hello! My nickname in darknet is des53” – dissecting the extortion</title>
		<link>https://myspybot.com/nickname-in-darknet-email-scam/</link>
					<comments>https://myspybot.com/nickname-in-darknet-email-scam/#comments</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Fri, 02 Nov 2018 15:59:34 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=3521</guid>

					<description><![CDATA[<p>Darknet, dark web, deep web – all of these concepts have come to designate the enigmatic and elusive cybercriminal underground. The aura of secrecy, heated up by the numerous science fiction movie plots, instills fear when people encounter one of these terms in real life. The crooks out there couldn’t possibly walk by this apprehension, …</p>
<p>The post <a href="https://myspybot.com/nickname-in-darknet-email-scam/">“Hello! My nickname in darknet is des53” – dissecting the extortion</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote class="bdaia-blockquotes bdaia-bqpo-right">Online scammers have recently launched an extortion campaign through “Hello! My nickname in darknet is des53” emails – here’s what you need to know about it.</blockquote>
<p>Darknet, dark web, deep web – all of these concepts have come to designate the enigmatic and elusive cybercriminal underground. The aura of secrecy, heated up by the numerous science fiction movie plots, instills fear when people encounter one of these terms in real life. The crooks out there couldn’t possibly walk by this apprehension, coining and firing up email scams that revolve around the hacker theme and thus pressure users into following their demands. The latest large-scale fraud wave from this category involves email messages that start with the spooky phrase “<strong>Hello! My nickname in darknet is des53</strong>”. The subject of such a spoof email will state that the recipient’s account is hacked, just to scare the person further.</p>
<figure id="attachment_3522" aria-describedby="caption-attachment-3522" style="width: 850px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-des53-email-scam.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-des53-email-scam.png" alt="Hello My nickname in darknet is des53 email scam – the message body" title="Hello My nickname in darknet is des53 email scam – the message body" width="850" height="540" class="size-full wp-image-3522" srcset="https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-des53-email-scam.png 850w, https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-des53-email-scam-300x191.png 300w, https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-des53-email-scam-768x488.png 768w, https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-des53-email-scam-620x394.png 620w" sizes="(max-width: 850px) 100vw, 850px" /></a><figcaption id="caption-attachment-3522" class="wp-caption-text">“Hello! My nickname in darknet is des53” email scam – the message body</figcaption></figure>
<p>The most unsettling part about the whole scheme is that the sender appears to know the victim’s real email password, a currently used one or – more likely – valid old credentials that have already been changed. This stems from the fact that the “From” field in the message header matches the receiving address. In some variations of this scam, the message body will actually include the victim’s password. One way or another, the fact of someone knowing your sensitive credentials is an element of persuasiveness, and the felons try to take advantage of it to the fullest. Below is the full text of this hoax – note that the wording may vary slightly in different sub-campaigns, but the core idea is basically the same.</p>
<blockquote class="bdaia-blockquotes bdaia-bqpo-center">Hello!</p>
<p>My nickname in darknet is des53.<br />
I hacked this mailbox more than six months ago. Through it I infected your operating system with a virus (trojan) created by me and have been monitoring you for a long time.</p>
<p>Even if you changed the password after that – it does not matter, my virus intercepted all the caching data on your computer<br />
and automatically saved access for me.</p>
<p>I have access to all your accounts, social networks, email, browsing history.<br />
Accordingly, I have the data of all your contacts, files from your computer, photos and videos.</p>
<p>I was most struck by the adult sites that you occasionally visit.<br />
You have a very wild imagination, I tell you!</p>
<p>During your pastime and entertainment there, I took screenshot through the camera of your device, synchronizing with what you are watching.<br />
Oh my god! You were so funny and excited!</p>
<p>I think that you do not want all your contacts to get these files, right?<br />
If you are of the same opinion, then I think that $880 is quite a fair price to destroy the dirt I created.</p>
<p>Send the above amount to my Bitcoin wallet: [Redacted]
<p>As soon as the above amount is received, I guarantee that the data will be deleted, I do not need it.</p>
<p>Otherwise, these files and history of visiting sites will get all your contacts from your device.<br />
Also, I’ll send to everyone your contact access to your email and access logs, which I have carefully saved.</p>
<p>Since reading this letter you have 48 hours!<br />
After your reading this message, I’ll receive an automatic notification that you have seen the letter.</p>
<p>I hope I taught you a good lesson.<br />
Visit safe websites only, and don’t enter your passwords anywhere!</p>
<p>Good luck!</blockquote>
<p>Let’s now dissect the tactic of blackmail proper. The self-proclaimed “hacker” says he has dropped a virus (trojan) onto the target computer, and it has allegedly intercepted all caching data and saved the user’s contacts, personal files, photos and videos. Furthermore, the malicious code has presumably taken a picture of the user as they were watching adult content online, and the attacker claims to have synchronized this image with the screenshot of what exactly they were watching. Then, the swindler threatens to send these “incriminating” materials to all of the user’s contacts. In order to avoid the embarrassment, the recipient is coerced to pay a ransom in Bitcoin. Its size is $800-$900 worth of cryptocurrency, which des53 – whoever he may be – thinks is a “fair price to destroy the dirt” he has compiled.</p>
<p>By the way, there are other nicknames that can also be mentioned in these deceptive emails. The frequently reported ones include: <strong>artie71</strong>, <strong>josephus63</strong>, <strong>brion40</strong>, <strong>hort17</strong>, <strong>saunderson53</strong>, <strong>nickola53</strong>, <strong>demetre97</strong>, <strong>hansiain16</strong>, <strong>bartlet56</strong>, <strong>fransisco73</strong>, <strong>fitzgerald59</strong>, <strong>alexandr88</strong>, <strong>gray24</strong>, <strong>fred26</strong>, <strong>rockwell79</strong>, <strong>zacherie99</strong>, <strong>rafaelle76</strong>, <strong>weston87</strong>, and <strong>gordie49</strong>.</p>
<figure id="attachment_3523" aria-describedby="caption-attachment-3523" style="width: 850px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-artie71-email-scam.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-artie71-email-scam.png" alt="A slightly different variant of the Hello! My nickname in darknet is des53 scam" title="A slightly different variant of the Hello! My nickname in darknet is des53 scam" width="850" height="970" class="size-full wp-image-3523" srcset="https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-artie71-email-scam.png 850w, https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-artie71-email-scam-263x300.png 263w, https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-artie71-email-scam-768x876.png 768w, https://myspybot.com/wp-content/uploads/2018/11/hello-my-nickname-in-darknet-is-artie71-email-scam-620x708.png 620w" sizes="(max-width: 850px) 100vw, 850px" /></a><figcaption id="caption-attachment-3523" class="wp-caption-text">A slightly different variant of the “Hello! My nickname in darknet is des53” scam</figcaption></figure>
<p>To top it off, the malefactor sets a deadline for payment. Unless the victim coughs up the money in 48 hours, the sensitive stuff will supposedly go to their family, friends and colleagues. All in all, this form of hoax is commonly referred to as sextortion (sex + extortion), but in this particular scenario the term is only partially relevant because the crook doesn’t actually have any ignominious information at their disposal. This is nothing but bluff – keep it in mind. The fraud in question bears a close resemblance to other recent blackmail waves, including the <strong>“<a href="https://myspybot.com/hacker-who-cracked-your-email/" target="_blank" rel="noopener noreferrer">Hacker who cracked your email</a>”</strong> and <strong>“<a href="https://myspybot.com/programmer-who-cracked-your-email/" target="_blank" rel="noopener noreferrer">I’m a programmer who cracked your email</a>”</strong> scams currently in rotation.</p>
<p>Now, at this point, it makes sense to dot the i’s and cross the t’s. The allegation about the wannabe hacker having your password is controversial. He may have actually obtained it from one of the past compromises of major Internet services. In this case, the credentials are probably old and have already been changed. Sometimes, though, the culprits employ a technique called email spoofing, which allows them to mimic one’s real email address so that it looks as if the message had been sent from the victim’s account. You can differentiate between these two scenarios by scrutinizing the message body. If it includes a password, then you’re dealing with someone who has access to a credentials dump stemming from a service breach. Otherwise, you are being manipulated by means of email spoofing. What both of these variants have in common is that the fraudster doesn’t actually have any embarrassing photos of you or screenshots of sites you have visited. This is simply a method to get you on the hook and add some intimidation to the mix.</p>
<p>So, what’s the verdict? If you have received the “<strong>Hello! My nickname in darknet is des53</strong>” email (again, the nickname may vary), refrain from submitting any funds to the sender’s BTC wallet. You can safely delete this message. However, just to make sure you’re on the safe side, consider changing your email password and have your system scanned for spyware with a trustworthy security solution.</p>
<div align="center"></div>
<p>The post <a href="https://myspybot.com/nickname-in-darknet-email-scam/">“Hello! My nickname in darknet is des53” – dissecting the extortion</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/nickname-in-darknet-email-scam/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Netflix hack: attacker unleashes his rage over failed extortion</title>
		<link>https://myspybot.com/netflix-hack/</link>
					<comments>https://myspybot.com/netflix-hack/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Tue, 09 May 2017 09:50:13 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=2050</guid>

					<description><![CDATA[<p>A newsmaking hack incident as of late April 2017 involving Netflix and a related media company became a serious wakeup call for proprietors of popular streaming video services. A threat actor identifying himself as The Dark Overlord (TDO) ended up carrying out copyrighted materials leakage threats after the compromised organization refused to submit a ransom …</p>
<p>The post <a href="https://myspybot.com/netflix-hack/">Netflix hack: attacker unleashes his rage over failed extortion</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote class="bdaia-blockquotes bdaia-bqpo-right">Recently leaked 10 episodes of the “Orange Is the New Black” show’s season 5 have demonstrated how vulnerable entertainment companies are in face of hacking.</blockquote>
<p>A newsmaking hack incident as of late April 2017 involving Netflix and a related media company became a serious wakeup call for proprietors of popular streaming video services. A threat actor identifying himself as The Dark Overlord (TDO) ended up carrying out copyrighted materials leakage threats after the compromised organization refused to submit a ransom in exchange for not releasing the content. The worst part of the whole story is that the unsanctioned release occurred more than a month before the show was scheduled for official airing.</p>
<p>By the way, this particular cybercrook had gained notoriety last year for hacking healthcare institutions, most of which are U.S. based, and holding their software source code and patients’ records for ransom. Following a fairly lengthy hiatus, said ill-minded individual, or group of criminals, made quite a reappearance with the latest Netflix breach story.</p>
<figure id="attachment_2054" aria-describedby="caption-attachment-2054" style="width: 580px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2017/05/dark-overlords-tweets-regarding-episodes-leak.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2017/05/dark-overlords-tweets-regarding-episodes-leak.png" alt="The Dark Overlord’s tweets regarding episodes leak" title="The Dark Overlord’s tweets regarding episodes leak" width="580" height="600" class="size-full wp-image-2054" srcset="https://myspybot.com/wp-content/uploads/2017/05/dark-overlords-tweets-regarding-episodes-leak.png 580w, https://myspybot.com/wp-content/uploads/2017/05/dark-overlords-tweets-regarding-episodes-leak-290x300.png 290w" sizes="(max-width: 580px) 100vw, 580px" /></a><figcaption id="caption-attachment-2054" class="wp-caption-text">The Dark Overlord’s tweets regarding episodes leak</figcaption></figure>
<p>Before dwelling on the details, it makes sense to first address some significant misperceptions, though. The incident in question isn’t about <a href="https://myspybot.com/wallet-file-virus/" target="_blank" rel="noopener">ransomware proper</a> in the sense that no crypto-backed malicious code was ever involved. Instead, it’s a classic doxing attack, where felons get hold of sensitive content and blackmail the owner by threatening to make it public unless a ransom is paid up. Another important fact is that it’s not Netflix that was actually breached. The original target was a partnering post-production company called Larson Studios, Inc.</p>
<p>The timeline of this defiant blackmail dates back to January 2017. The attackers most likely spotted a security flaw in the systems of the above-mentioned Larson Studios. By breaching its IT infrastructure, The Dark Overlord accessed and pilfered unreleased episodes of “Orange Is the New Black” series, possibly along with several dozens of other shows. According to information TDO provided to DataBreaches.net, the post-production company first opted for the ransom route to sort things out by the end of January. The amount was 50 Bitcoin, which is worth about $80,000 at the time of this writing. However, the target never submitted the cryptocurrency requested by the crooks, neither till the deadline nor afterwards. This turn of events made the attackers switch to negotiating with Netflix.</p>
<figure id="attachment_2052" aria-describedby="caption-attachment-2052" style="width: 680px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2017/05/orange-is-the-new-black-on-thepiratebay.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2017/05/orange-is-the-new-black-on-thepiratebay.png" alt="‘Orange Is the New Black’ 10 out of 13 episodes on ThePirateBay" title="‘Orange Is the New Black’ 10 out of 13 episodes on ThePirateBay" width="680" height="470" class="size-full wp-image-2052" srcset="https://myspybot.com/wp-content/uploads/2017/05/orange-is-the-new-black-on-thepiratebay.png 680w, https://myspybot.com/wp-content/uploads/2017/05/orange-is-the-new-black-on-thepiratebay-300x207.png 300w, https://myspybot.com/wp-content/uploads/2017/05/orange-is-the-new-black-on-thepiratebay-620x429.png 620w" sizes="(max-width: 680px) 100vw, 680px" /></a><figcaption id="caption-attachment-2052" class="wp-caption-text">‘Orange Is the New Black’ 10 out of 13 episodes on ThePirateBay</figcaption></figure>
<p>Later on, having realized that the extortion attempts were futile, The Dark Overlord decided to act. On April 28, he wrote the following on his Twitter page @tdohack3r: “Let’s try to be a bit more direct, Netflix,” also posting links to Pastebin and ThePirateBay pages hosting 10 downloadable episodes from season 5 of the ransomed “Orange Is the New Black” show. Although the episodes are in 720p and have quality issues, the leak is still a big problem for the streaming service.</p>
<p>In another tweet the same day, TDO wrote: “Who is next on the list? FOX, IFC, NAT GEO, and ABC. Oh, what fun we’re all going to have. We’re not playing any games anymore.” A particularly disconcerting thing is the hacker reportedly also stole unaired content for 36 more TV series and films. Incidents like this one should provide food for thought to these types of services. One of the nontrivial nuances is that even though the company’s networks were never breached, the bad guys were still able to find a weak link along the production chain. So partnering organizations should, obviously, do a better job hardening their security.</p>
<p>Perhaps Netflix did the right thing ignoring the hackers’ demands and refusing to fuel the darknet business with thousands of dollars. But, again, the moral of the story for such companies is to safeguard all facets of their activity rather than focus on their own security posture only.</p>
<p>The post <a href="https://myspybot.com/netflix-hack/">Netflix hack: attacker unleashes his rage over failed extortion</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/netflix-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin</title>
		<link>https://myspybot.com/rensenware-new-crypto-threat/</link>
					<comments>https://myspybot.com/rensenware-new-crypto-threat/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Tue, 18 Apr 2017 08:40:53 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=1858</guid>

					<description><![CDATA[<p>In a move that hardly anyone in the security community could possibly anticipate, a questionably judicious individual going by Twitter nickname Tvple Eraser has made quite an appearance on the e-extortion arena. He ventured into cooking up a malicious program dubbed Rensenware, which encrypts data and then instructs the victim to score more than 0.2 …</p>
<p>The post <a href="https://myspybot.com/rensenware-new-crypto-threat/">Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<blockquote class="bdaia-blockquotes bdaia-bqpo-right">A new crypto threat called Rensenware is breaking new ground with its unique tactic, where it encourages victims to play a game rather than cough up money.</blockquote>
<p>In a move that hardly anyone in the security community could possibly anticipate, a questionably judicious individual going by Twitter nickname Tvple Eraser has made quite an appearance on the e-extortion arena. He ventured into cooking up a malicious program dubbed Rensenware, which encrypts data and then instructs the victim to score more than 0.2 billion in TH12 ~ Undefined Fantastic Object game. While some of those infected might heave a sigh of relief after learning that the attacker’s demands are not about money, that’s a premature impression. Scoring that much in Lunatic level of the aforementioned anime shooter game, which is also referred to as Touhou Seirensen, is an extremely tough objective.</p>
<figure id="attachment_1863" aria-describedby="caption-attachment-1863" style="width: 550px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2017/04/rensenware-warning-screen.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2017/04/rensenware-warning-screen.png" alt="Rensenware warning screen" title="Rensenware warning screen" width="550" height="685" class="size-full wp-image-1863" srcset="https://myspybot.com/wp-content/uploads/2017/04/rensenware-warning-screen.png 550w, https://myspybot.com/wp-content/uploads/2017/04/rensenware-warning-screen-241x300.png 241w" sizes="(max-width: 550px) 100vw, 550px" /></a><figcaption id="caption-attachment-1863" class="wp-caption-text">Rensenware warning screen</figcaption></figure>
<p>Rensenware author, possibly a Korean resident judging from some of his posts on Twitter, has already apologized to everyone affected and made a statement that this project was intended to be nothing but a joke. He has since also <a href="https://github.com/0x00000FF/rensenware_force/releases" target="_blank" rel="nofollow noopener"><strong>released a tool</strong></a> called Enhanced Forcer for Rensenware, which meddles with the memory of TH12 ~ Undefined Fantastic Object so that the decryption can be approved and started without the user having to actually play the game. These efforts to correct such a defiant mistake are probably commendable, but the infection is still causing tangible problems for plagued users who are at their wit’s end trying to restore their valuable data. Finding and using the above fix takes time, moreover, the efficiency of the tool has not been officially vetted as of now.</p>
<figure id="attachment_1865" aria-describedby="caption-attachment-1865" style="width: 600px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2017/04/rensenware-authors-tweets.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2017/04/rensenware-authors-tweets.png" alt="Rensenware author’s tweets regarding the outcome of his controversial work" title="Rensenware author’s tweets regarding the outcome of his controversial work" width="600" height="230" class="size-full wp-image-1865" srcset="https://myspybot.com/wp-content/uploads/2017/04/rensenware-authors-tweets.png 600w, https://myspybot.com/wp-content/uploads/2017/04/rensenware-authors-tweets-300x115.png 300w" sizes="(max-width: 600px) 100vw, 600px" /></a><figcaption id="caption-attachment-1865" class="wp-caption-text">Rensenware author’s tweets regarding the outcome of his controversial work</figcaption></figure>
<p>The Rensenware program itself is pretty crude in terms of the compromise workflow. It is configured to encrypt information stored both on fixed drives and ones that aren’t fixed. Consequently, it may crash multiple times while trying to scramble data on CD drive even though there is no optical disk in it. This nuance set aside, the malware scans an infected machine for about 30 file types, including Microsoft Office documents, images, audio files and archives. Then, it encrypts every matching item with AES-256 algorithm. A predictable byproduct of this activity is concatenation of the .RENSEWARE extension to locked files. As opposed to almost <a href="https://myspybot.com/how-to-decrypt-ransomware/" target="_blank" rel="noopener">all in-the-wild ransomware samples</a>, this one does not erase Shadow Copies of one’s data entries, so it’s technically possible to restore the information via forensic mechanisms. As soon as the crypto part of the breach has been completed, Rensenware displays a warning window explaining the prerequisites for decryption.</p>
<p>Despite the fact that the wannabe hacker behind this story has admitted he was wrong and it was all just for fun, victims do suffer real-world consequences and have to waste their time and efforts to sort things out. This incident is kind of reminiscent of the open-source Hidden Tear and EDA2 projects, where crooks weaponized the originally benign educational code to create real threats. No matter how talented malware researchers are, they should definitely think twice before blowing their own trumpet just for show.</p>
<p>The post <a href="https://myspybot.com/rensenware-new-crypto-threat/">Eccentric “Rensenware” infection demands Touhou game score instead of Bitcoin</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/rensenware-new-crypto-threat/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Fancy Bear tracking Ukrainian artillery units</title>
		<link>https://myspybot.com/fancy-bear-tracking-ukrainian-artillery-units/</link>
					<comments>https://myspybot.com/fancy-bear-tracking-ukrainian-artillery-units/#respond</comments>
		
		<dc:creator><![CDATA[Will Wisser]]></dc:creator>
		<pubDate>Thu, 23 Feb 2017 15:45:15 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">https://myspybot.com/?p=1253</guid>

					<description><![CDATA[<p>The blood-shedding military conflict in the East Ukrainian Donbas region is assuming new hybrid characteristics. The Ukrainian army has been confronted with a deadly tandem of Russia-backed rebels and Russian regular military forces since 2014. According to a recent investigation by CrowdStrike, the theater of war here turns out to be an explosive mix of …</p>
<p>The post <a href="https://myspybot.com/fancy-bear-tracking-ukrainian-artillery-units/">Fancy Bear tracking Ukrainian artillery units</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The blood-shedding military conflict in the East Ukrainian Donbas region is assuming new hybrid characteristics. The Ukrainian army has been confronted with a deadly tandem of Russia-backed rebels and Russian regular military forces since 2014. According to a <a href="https://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/" target="_blank" rel="nofollow noopener">recent investigation</a> by CrowdStrike, the theater of war here turns out to be an explosive mix of a real-world battlefield and cyber warfare. A group of threat actors referred to as Fancy Bear, which is likely affiliated with Russia’s Main Intelligence Agency (GRU), has reportedly created a trojanized Android application, subsequently contaminating Ukrainian soldiers’ smartphones with it to accurately determine the location of Ukrainian field artillery units.</p>
<figure id="attachment_1256" aria-describedby="caption-attachment-1256" style="width: 680px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2016/12/d-30-howitzer.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2016/12/d-30-howitzer.png" alt="122 mm D-30 howitzer" title="122 mm D-30 howitzer" width="680" height="450" class="size-full wp-image-1256" srcset="https://myspybot.com/wp-content/uploads/2016/12/d-30-howitzer.png 680w, https://myspybot.com/wp-content/uploads/2016/12/d-30-howitzer-300x199.png 300w, https://myspybot.com/wp-content/uploads/2016/12/d-30-howitzer-620x410.png 620w" sizes="(max-width: 680px) 100vw, 680px" /></a><figcaption id="caption-attachment-1256" class="wp-caption-text">122 mm D-30 howitzer</figcaption></figure>
<p>The Fancy Bear group has also operated under such aliases as Sofacy, Strontium, Sednit, and APT28. As per investigative reports, the cybercrime ring in question is the one that pulled off a series of attacks against the U.S. Democratic National Committee in June 2016. The breaches were carried out through the use of a cross-platform remote access toolkit called X-Agent. Originally, the X-Agent RAT could be deployed on different editions of the Windows operating system, as well as Mac OS X and iOS. However, details of the recent evidence of its engagement in the war conflict in Eastern Ukraine proves that the use cases have expanded to Android. The source code of X-Agent hasn’t been circulating beyond the campaigns of Fancy Bear, which proves the attribution of these attacks exclusively to the Russian intelligence and the associated cybercrime group.</p>
<figure id="attachment_1258" aria-describedby="caption-attachment-1258" style="width: 640px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2016/12/fancy-bear-group-ties-russian-intelligence.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2016/12/fancy-bear-group-ties-russian-intelligence.png" alt="The Fancy Bear group has ties to Russian intelligence" title="The Fancy Bear group has ties to Russian intelligence" width="640" height="340" class="size-full wp-image-1258" srcset="https://myspybot.com/wp-content/uploads/2016/12/fancy-bear-group-ties-russian-intelligence.png 640w, https://myspybot.com/wp-content/uploads/2016/12/fancy-bear-group-ties-russian-intelligence-300x159.png 300w, https://myspybot.com/wp-content/uploads/2016/12/fancy-bear-group-ties-russian-intelligence-620x329.png 620w" sizes="(max-width: 640px) 100vw, 640px" /></a><figcaption id="caption-attachment-1258" class="wp-caption-text">The Fancy Bear group has ties to Russian intelligence</figcaption></figure>
<p>The legitimate prototype of the malware was originally developed in 2014 by Yaroslav Sherstuk, an officer of the 55th Artillery Brigade of the Ukrainian Armed Forces. Called “Попр-Д30.apk”, this Android application was intended to facilitate the process of calibrating the 122 mm D-30 towed howitzer. According to Mr. Sherstuk, the app reduced the howitzer targeting time from minutes to less than 15 seconds. This, obviously, gave Ukrainian artillerists a significant advantage over the adversary. The application was never distributed in the open – instead, it was exchanged between officers or could be downloaded from Ukrainian military forums. The user base reached about 9,000 over the 2014-2016 time span.</p>
<p>In a stealthy move, Fancy Bear crooks were able to get a copy of Попр-Д30 and rebuild it. They injected the Android variant of X-Agent into the app and posted the booby-trapped installer on dedicated Ukrainian military forums. As some unsuspecting Ukrainian officers ended up installing the rogue application on their Android devices, Russian threat actors could obtain their geolocation data and intercept communications. It’s within the realms of possibility that this cyber espionage caused the Ukrainian Army to lose 80% of its D-30 howitzers since 2014, which significantly exceeds the number of other artillery units destroyed over the last two years of conflict.</p>
<figure id="attachment_1260" aria-describedby="caption-attachment-1260" style="width: 405px" class="wp-caption aligncenter"><a href="https://myspybot.com/wp-content/uploads/2016/12/popr-d-30-android-app.png"><img loading="lazy" decoding="async" src="https://myspybot.com/wp-content/uploads/2016/12/popr-d-30-android-app.png" alt="The original 'Попр-Д30' app for Android" title="The original 'Попр-Д30' app for Android" width="405" height="420" class="size-full wp-image-1260" srcset="https://myspybot.com/wp-content/uploads/2016/12/popr-d-30-android-app.png 405w, https://myspybot.com/wp-content/uploads/2016/12/popr-d-30-android-app-289x300.png 289w" sizes="(max-width: 405px) 100vw, 405px" /></a><figcaption id="caption-attachment-1260" class="wp-caption-text">The original &#8216;Попр-Д30&#8217; app for Android</figcaption></figure>
<p>These disconcerting statistics, however, appear to be far-fetched. Crowdstike’s Adam Meyers, the author of the report under consideration, may have used a questionably trustworthy resource to obtain information on the whopping 80% losses of the Ukrainian artillery units over Fancy Bear’s interference. The website being referenced is run by a pro-Russian investigative reporter who goes by the handle “Colonel Cassad”.</p>
<p>The quantitative facet of the research is based on data provided in The Military Balance annual reports for 2013 and 2016 released by the International Institute for Strategic Studies (IISS). Although the figures on Ukrainian 122 mm D-30 towed howitzers for 2013 and 2016 are accurate (369 and 75, respectively), the decrease by 80% can be attributed to an inventory as of 2014 that discovered out-of-order artillery units.</p>
<p>Furthermore, we at MySpybot were unable to spot any Ukrainian military forums distributing the malicious .apk of the Попр-Д30 app. We sent an official inquiry to Mr. Meyers for commentary on this discrepancy. In particular, we asked him to provide the specific online resource hosting the rogue .apk file. Unfortunately, we never received anything in response. So it makes sense to conclude that the above-mentioned stats are ungrounded and blown out of proportion.</p>
<p>This reconnaissance operation by the Fancy Bear group demonstrates how digital code can have real-life consequences. Obviously, the tactics of hybrid war have no limits, covering the military, political and cyber facets of warfare. Crypto ransomware poses another noteworthy aspect of Russian misdemeanor on the international cyber threats arena. For instance, one of the recent ransomware strains appends victims’ encrypted files with the “<strong>.VOZMEZD IE_ZA_DNR</strong>” suffix. This string is a transliterated Russian phrase meaning “Revenge for DPR”, where DPR stands for the self-proclaimed Donetsk People’s Republic, a butcherly terrorist organization operating in East Ukraine. This indicator of compromise suggests that the threat actors behind these attacks are either Russians or tech-savvy Russia-backed terrorists. This online extortion campaign certainly doesn’t affect people’s lives as badly as Fancy Bear’s felonies. But it explicitly <a href="https://myspybot.com/how-to-decrypt-ransomware/" target="_blank" rel="noopener">demonstrates</a> the hostility of one particular country toward the rest of the world.</p>
<p>The post <a href="https://myspybot.com/fancy-bear-tracking-ukrainian-artillery-units/">Fancy Bear tracking Ukrainian artillery units</a> appeared first on <a href="https://myspybot.com">MySpyBot</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://myspybot.com/fancy-bear-tracking-ukrainian-artillery-units/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
