Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images

WOROK: Powerful Malware Hidden in .PNG Images

 

“Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security conscious, you probably also know that PDF files, Excel spreadsheets, and Word documents can also contain malicious code. But how many times have you considered the possibility of malware hidden inside an image file? A sophisticated hacking group known as Worok has developed a new type of malware that can be concealed in innocuous-looking PNG images, and they’ve been using it to target governments and large corporations around the world.”

 

The Surveillance State: The Simple Reason Why you should STOP🤚 🛑 using Gmail

The Simple Reason why you should Stop using Gmail

 

Would also highly recommend 7 Simple Steps to Online Privacy.

I dumped everything associated with Google (including Chrome) a long while ago.

Think OPSEC All The Time.

 

 

VISUALIZED: Map of Ransomware Attacks Since 2018

VISUALIZED: Map of Ransomware Attacks Since 2018

 

Each dot represents the location of a ransomware attack, with the size of the dot depicting the number of records impacted. 

This map updates weekly and pinpoints the locations of each ransomware attack in the US, from 2018 to present day. Where available, it includes the ransom amount, whether or not the ransom was paid, the entity and industry that was targeted, and the strain of ransomware used. Our researchers search through state reports, industry news, and cybersecurity databases to find the latest ransomware attacks on US businesses, healthcare organizations, educational institutions, and government agencies.

In our industry-specific reports, we found:

The Invisible Drug Lord: Hunting the Ghost

The Invisible Drug Lord: Hunting the Ghost

For over a decade now I have been researching and studying how 21st century drug cartels and organized crime syndicates operate.

I do this mainly for two reasons:

  1. Research for my writing

  2. Considering freedom loving guerillas/partisans have always (and are currently) seen as criminals (ie domestic terrorist) anyway, observing the TTP of ‘successful’ criminal groups, both past and present is a no-brainer.

If you take one thing away from this study it should be this:

“Your best protection in the 21st century is not a private army but ANONYMITY.”

*I recommend downloading the full report to a flash drive for reference.

Stay Alert, Armed and Dangerous!

 

4GW Cyber Warfare: U.S. Treasury Hacked in Far Reaching Espionage Campaign

Sen. Wyden: ‘Dozens of Email Accounts’ Were Hacked at Treasury

 

It appears Russia and China have been busy lately.

4GW never sleeps folks. It rages everyday.

Take a look at all the companies under the Solar Winds umbrella and then ask yourself if you think your personal data is SAFE?

Stay Alert, Armed and Dangerous!