www.securitynewspaper.com
Open in
urlscan Pro
173.255.249.236
Public Scan
URL:
https://www.securitynewspaper.com/2021/12/07/how-microsoft-counter-attacked-the-infrastructure-used-by-chinese-military-hackers/
Submission: On December 13 via api from US — Scanned from DE
Submission: On December 13 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMGET https://www.securitynewspaper.com/
<form method="get" class="searchform" action="https://www.securitynewspaper.com/"><label for="s" class="screen-reader-text">Search</label><i class="fas fa-search"></i><input type="text" class="searchtext" name="s" placeholder="Type Search Term …"
value=""><input type="submit" class="submit forcehide" name="submit" value="Search"><span class="js-search-placeholder"></span></form>
Text Content
Click Here How to Clone Voice via WhatsApp Voice Message Skip to content Search Secondary Navigation Menu Menu * Home * Data Security * Mobile Security * Technology * Important * Vulnerabilities * Tutorials * Network Tools * DNSMap * DNSENUM * URLCRAZY * DNSRECON * DNSTRACER * TWOFI * ONIOFF * EXITMAP * PROXYCHAINS * DIG * NSLOOKUP * john the ripper * P0f * Sparta * arpSpoof * Photon * Justsniffer * Trevorc2 * Vemon * GoScan * Masscan * OSNIT-Search * nbtstat * Web Scanners * NIKTO * HTTRACK * WAPITI * Fierce * GoBuster * w3af * DIRBUSTER * WPSCAN * Joomscan * WHATWEB * MassBleed * CRUNCH * Android * TheFatRat * EvilDroid * ANDROID DEBUG BRIDGE(ADB) – Part I * ANDROID DEBUG BRIDGE(ADB) – Part II * OSINT Tools * THEHARVESTER * DATASPLOIT * recon-ng * Babysploit * Shodan * Trape * Infoga * Metagoofil * Zoomeye * Devploit * Tinfoleak * BadMod * H8mail * Stardox * CTF Tools * CTF Challenges * Mr. Robot 1, walk through * DDoS Tools * Defense Evasion Tools * Getwin * Forensics * Steghide LSBstege * knock * Hash Cracking Hacking Tools * twofi * John the Ripper * Crunch * Linux Utilities * Terminator * Procdump * Termshark * Malware Analysis * AUTOMATER * Shed * Reverse Engineering Tools * Anonymity Tools * onioff * Proxychains * Exitmap * Deep Explorer * Hosting your own .onion domain * Send Anonymous Emails * OnionShare – startup in dark web * Vulnerability Scanners * Pocsuite * Mercury * Jok3r * FreeVulnsearch * Pompem * Phantom Evasion * Web Exploitation * XSS Shell * Wafw00f * Remote3d * Web Scanners * Windows Utilities * ENUM4LINUX * NETBIOS ENUMERATOR * Medusa * Wireless Hacking * Wigle * WiFiBroot * Hashcat * Aircrack-ng * Social Engineering Tools * blackeye * Seeker * BYOB * QRLJacker * phemail * Cuteit * Spooftel * Incidents * Malware * News Videos * * * * HOW MICROSOFT COUNTER ATTACKED THE INFRASTRUCTURE USED BY CHINESE MILITARY HACKERS Share this... Facebook Twitter Linkedin Pinterest Reddit As part of an ambitious security effort, Microsoft took control of dozens of malicious sites allegedly operated by Nickel, a China-based hacking group. Apparently, these platforms were used to direct attacks against critical infrastructure in the United States and at least 28 other countries, mainly in Latin America and Europe. Tom Burt, Vice President of Customer Security and Trust at Microsoft, said, “Nickel has focused its efforts on public and private organizations, including diplomatic entities and foreign ministries in North America, Central America, South America, the Caribbean, Europe and Africa.” The tech giant was able to take down the hackers’ infrastructure after a U.S. court issued an order stemming from the group’s actions. This order mentions that malicious websites were to be switched to secure servers, changing authorized name servers to NS104a.microsoftintemetsafety.net and NS104b.microsoftintemetsafety.net. SOURCE: Microsoft Microsoft’s security teams first detected the malicious behavior in 2016, while security firms such as Mandiant say Nickel’s existence is set back to 2010. In addition, for a couple of years the presence of this group was detected in attacks against European and Latin American countries, mainly operating malware delivery campaigns for network monitoring and data theft. Nickel’s operations are funded by Chinese government and use previously compromised third-party VPN platforms, stolen credentials in phishing campaigns, and exploits targeting undated Exchange Server and SharePoint servers. Since the investigation began, 24 criminal cases have been drawn up against these hackers and five against their sponsors, in addition to the removal of nearly 10,000 malicious websites and more than 500,000 online platforms potentially associated with this operation have been blocked. Microsoft has made considerable efforts in the fight against cybercrime; A few months ago, the company seized the computing infrastructure of the Necurs botnet, used by threat actors for the distribution of malware payloads, which put millions of devices around the world at risk. According to Microsoft, at its highest point of activity Necurs was able to reach more than 40 million targets in less than two months. To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites. Previous HOW TO DO AUTOMATIC VULNERABILITY ANALYSIS AND ASSESSMENT OF YOUR APPLICATIONS & NETWORK FREE OF COST? HOW TO DO DIGITAL FORENSICS AND REVERSE ENGINEERING ON WINDOWS REGISTRIES WITH FREE REGRIPPER TOOL HOW TO EASILY COPY FACEBOOK, INSTAGRAM, TWITTER GMAIL COOKIES AND BROWSER STORED PASSWORDS TO A USB PENDRIVE, ALL WITH JUST 15 COMMANDS HOW TO PERFORM DIGITAL FORENSICS OF MALICIOUS PDF FILES? EASILY CHECKING IF A PDF DOCUMENT HAS MALWARE OR BACKDOORS TOP 6 TOOLS USED BY HACKERS FOR STEALING WINDOWS DOMAIN CACHE CREDENTIALS. 5 ALTERNATIVES OF MIMIKATZ HOW TO DO PENETRATION TESTING OF IOT DEVICES EASILY HOW TO DO DIGITAL FORENSICS OF A HACKED NETWORK WITH TCPDUMP HOW TO HACK INTO WAF (WEB APPLICATION FIREWALL) USING XSS ATTACKS? HOW TO DO AUTOMATIC VULNERABILITY ANALYSIS AND ASSESSMENT OF YOUR APPLICATIONS & NETWORK FREE OF COST? HOW TO DO DIGITAL FORENSICS AND REVERSE ENGINEERING ON WINDOWS REGISTRIES WITH FREE REGRIPPER TOOL HOW TO EASILY COPY FACEBOOK, INSTAGRAM, TWITTER GMAIL COOKIES AND BROWSER STORED PASSWORDS TO A USB PENDRIVE, ALL WITH JUST 15 COMMANDS HOW TO PERFORM DIGITAL FORENSICS OF MALICIOUS PDF FILES? EASILY CHECKING IF A PDF DOCUMENT HAS MALWARE OR BACKDOORS TOP 6 TOOLS USED BY HACKERS FOR STEALING WINDOWS DOMAIN CACHE CREDENTIALS. 5 ALTERNATIVES OF MIMIKATZ HOW TO DO PENETRATION TESTING OF IOT DEVICES EASILY Next Octavio Mares He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities. Share this... Facebook Twitter Linkedin Pinterest Reddit 2021-12-07 On: December 7, 2021 In: Technology Tagged: advanced persistent threat (APT), botnet, China, Cyberattack, cybersecurity, Hacking, Hacking Tools, incidents, Information Security, malware, Microsoft, Nickel, technology, threat actors, United States, virtual private network (VPN) LATEST VIDEOS HOW CHINESE APT HACKERS STOLE LOCKHEED MARTIN F-35 FIGHTER PLANE TO DEVELOP ITS OWN J-20 STEALTH FIGHTER AIRCRAFT [VIDEO] NIGERIA SPENDS MORE THAN ANY OTHER AFRICAN COUNTRY IN SPYING ITS CITIZENS HOW TO HACK BANK’S VOICE RECOGNITION SYSTEM – VOICE BIOMETRICS WITH DEEPFAKE VOICE CLONING STEP BY STEP PROCESS OF HACKING ATMS USING BLACK BOX. ATM JACKPOTTING HOW TO ORGANIZE A PROTEST ANONYMOUSLY: RAISE YOUR VOICE AGAINST GOVERNMENT AND PROTEST WITHOUT BEING ARRESTED View All POPULAR POSTS: * How to fake your phone number: Make it look like… * Create phishing page of 29 websites in minutes. * Hack Whatsapp account of your friend * How to intercept mobile communications (calls and… * Fake any website in seconds Facebook, Snapchat, Instagram :- * CREATE YOUR OWN WORDLIST WITH CRUNCH * Fake text message attack. How Prank or hack your… * List of all Open FTP Servers in the World * Crack Windows password with john the ripper * Hack WhatsApp of your Friend by sending a Single Link * How to Check if your Mobile phone is hacked or not? * How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using… * Anyone Can Hack Mobile Whatsapp Using These Top 5 Tricks * How to exploit new Facebook feature to access… * Hack any website with All in One Tool * Hack Windows, Android, Mac using TheFatRat (Step by… * Create your own BotNet (Step By Step tutorial) * FireEye confirms that APT41 Group hacked TeamViewer;… * How to hack Instagram accounts from a smartphone… * See how to Search username, passwords, configuration… * TOP 6 Hacking mobile Apps – must have * Do Hacking with Simple Python Script * How to scan whole Internet 3.7 billion IP addresses… * Generate Android App in 2 mins and hack any android mobile * List of credit cards, proxies on Deep Web VULNERABILITIES ZERO-DAY VULNERABILITY IN LOG4J AFFECTS MILLIONS OF APACHE, MINECRAFT AND OTHER APPLICATIONS USERS; EXPLOIT CODE PUBLISHED IN 2021 MAXIMUM SECURITY VULNERABILITIES WERE REPORTED AS COMPARED TO PAST ACCORDING TO NIST INFORMATION DISCLOSURE VULNERABILITY IN FORTISANDBOX, FORTIWEB AND FORTIADC: PATCH IMMEDIATELY IMPORTANT PRIVILEGE ESCALATION FLAW IN SONICWALL GLOBAL VPN CLIENT: PATCH IMMEDIATELY RCE, CSRF AND OTHER CRITICAL VULNERABILITIES IN FORTIOS AND FORTIPROXY AFFECT VARIOUS FORTINET PRODUCTS View All TUTORIALS HOW TO PERFORM DIGITAL FORENSICS OF MALICIOUS PDF FILES? EASILY CHECKING IF A PDF DOCUMENT HAS MALWARE OR BACKDOORS TOP 6 TOOLS USED BY HACKERS FOR STEALING WINDOWS DOMAIN CACHE CREDENTIALS. 5 ALTERNATIVES OF MIMIKATZ HOW TO DO PENETRATION TESTING OF IOT DEVICES EASILY HOW TO DO DIGITAL FORENSICS OF A HACKED NETWORK WITH TCPDUMP HOW TO HACK INTO WAF (WEB APPLICATION FIREWALL) USING XSS ATTACKS? HOW TO DO AUTOMATIC VULNERABILITY ANALYSIS AND ASSESSMENT OF YOUR APPLICATIONS & NETWORK FREE OF COST? HOW TO DO DIGITAL FORENSICS AND REVERSE ENGINEERING ON WINDOWS REGISTRIES WITH FREE REGRIPPER TOOL HOW TO EASILY COPY FACEBOOK, INSTAGRAM, TWITTER GMAIL COOKIES AND BROWSER STORED PASSWORDS TO A USB PENDRIVE, ALL WITH JUST 15 COMMANDS HOW TO HACK WPA2-PSK WIFI PASSWORDS EASILY WITH JUST 10 COMMANDS USING THIS TOOL 8 TECHNIQUES TO PROTECT YOUR WINDOWS NETWORK DOMAINS AGAINST MIMIKATZ CREDENTIAL STEALING TOOL View All MALWARE 17 MALICIOUS PACKAGES IN THE NODE.JS PACKAGE MANAGER (NPM) CODE REPOSITORY WERE LOOKING TO HARVEST DISCORD TOKENS YOUTUBE SEARCH OF FREE GAMES SHOW TROJAN LINKS. BE CAREFUL WHEN TRYING OUT THE GAMES TARDIGRADE: THE NEW MALWARE THAT ONLY TARGETS MEDICINE AND VACCINE MANUFACTURING PLANTS NEW RESEARCH: MILLIONS OF HUAWEI SMARTPHONES ARE INFLECTED WITH MALWARE LARGEST BOTNET WITH CONTROL OF MILLIONS OF DEVICES DISCOVERED. THE PINK BOTNET View All CYBER SECURITY CHANNEL HOW TO HACK BANK’S VOICE RECOGNITION SYSTEM – VOICE BIOMETRICS WITH DEEPFAKE VOICE CLONING STEP BY STEP PROCESS OF HACKING ATMS USING BLACK BOX. ATM JACKPOTTING HOW TO ORGANIZE A PROTEST ANONYMOUSLY: RAISE YOUR VOICE AGAINST GOVERNMENT AND PROTEST WITHOUT BEING ARRESTED * * * * * info@securitynewspaper.com Privacy Policy Posting.... We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok