• Advertise
  • SS7 Hacking
Tuesday, January 31, 2023
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
  • Home
  • Exploits

    Broadcast Signal Intrusion – Hacking Radio Stations

    PHPJabbers Car Park Booking System 2.0 Cross Site Scripting

    Zstore 6.6.0 Cross Site Scripting

    PHPJabbers Event Ticketing System Script 1.0 Cross Site Scripting

    PHPJabbers Travel Tours Script 1.0 SQL Injection

    PHPJabbers Travel Tours Script 1.0 Cross Site Scripting

    PHPJabbers Property Listing Script 3.1 SQL Injection

    PHPJabbers Property Listing Script 3.1 Cross Site Scripting

    Razer Synapse 3.7.0731.072516 Local Privilege Escalation

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

  • Hacking Tools

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

  • Kali Linux
    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

    Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

    U.S. No Fly List Leaked on Hacker Forum

    U.S. No Fly List Leaked on Hacker Forum

    Hackers Exploiting Unpatched Exchange Servers in The Wild

    Hackers Exploiting Unpatched Exchange Servers in The Wild

    Critical Realtek Vulnerability Impacting IoT Devices Worldwide

    Critical Realtek Vulnerability Impacting IoT Devices Worldwide

    New Research Uncovers Threat Actor Behind Infamous Golden Chickens Malware-as-a-Service

    New Research Uncovers Threat Actor Behind Infamous Golden Chickens Malware-as-a-Service

    Doctor Paid $60k in Bitcoin to Hire Dark Web Hitmen

    Doctor Paid $60k in Bitcoin to Hire Dark Web Hitmen

    What is Word Unscrambler In Gaming?

    What is Word Unscrambler In Gaming?

    Yandex Source Code Online Leaked, Company Denies Hack

    Yandex Source Code Online Leaked, Company Denies Hack

    Extradited Alleged ShinyHunters Hacker Pleads Not Guilty in US Court

    Extradited Alleged ShinyHunters Hacker Pleads Not Guilty in US Court

  • Advertise
  • Home
  • Exploits

    Broadcast Signal Intrusion – Hacking Radio Stations

    PHPJabbers Car Park Booking System 2.0 Cross Site Scripting

    Zstore 6.6.0 Cross Site Scripting

    PHPJabbers Event Ticketing System Script 1.0 Cross Site Scripting

    PHPJabbers Travel Tours Script 1.0 SQL Injection

    PHPJabbers Travel Tours Script 1.0 Cross Site Scripting

    PHPJabbers Property Listing Script 3.1 SQL Injection

    PHPJabbers Property Listing Script 3.1 Cross Site Scripting

    Razer Synapse 3.7.0731.072516 Local Privilege Escalation

    Trending Tags

    • sms exploit
    • ss7 software
    • simswap software
    • jpg exploit
    • kali linux
  • Hacking News
    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Serious 2FA Bypass Vulnerability Affected Facebook And Instagram

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    Multiple Vulnerabilities In Yellowfin BI Could Allow RCE Attacks

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    LearnPress Plugin Vulnerabilities Risk Numerous WordPress Sites

    TROJANPUZZLE Attack Forces AI Assistants to Suggest Rogue Coding

    Multiple Vulnerabilities Found In Samsung Galaxy App Store App

    Researchers Find Class Pollution-A Prototype Pollution Variant That Affects Python

    Be on the lookout for this AnyDesk Phishing campaign that delivers Vidar info stealer

    Brave Browser turns your device into a proxy for others via “Snowflake” Feature

    This tool, “telerwaf”, protects go apps from web-based attacks

  • Hacking Tools

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

    Trending Tags

    • hacking tools
    • hacking software
    • hacking tips
    • ss7 attacks
    • simswap software
    • sms exploit
  • Hacking Tutorials

    Test3213

    Test 2

    Test 2

    test

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

    Here are some tips for students to help protect their data privacy

    Client-Side Exploitation [FREE COURSE VIDEO]

    What Common Security Problems Are Cloud-Based Networks?

    Penetration testing OWASP Top 10 Vulnerabilities [FREE COURSE CONTENT]

    OSINT Fundamentals [FREE COURSE CONTENT]

  • Kali Linux
    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    Villain : Windows And Linux Backdoor Generator And Multi-Session Handler

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    PXEThief : Extract Passwords From The Operating System Deployment Functionality

    The Terminal Application Cypherhound contains 260+ Neo4j Cyphers for BloodHound DataSets

    Subparse: Modular Malware Analysis Artifact Collection And Correlation Framework

    AzureHound : Azure Data Exporter For BloodHound

    Xerror is an automated penetration testing tool with GUI

    Mongoaudit is an audit and pentesting tool for MongoDB databases

    ADFSRelay – Proof of Concept Utilities Developed For Researching NTLM Relaying Attacks Targeting ADFS

    Azure Sentinel protects Kubernetes deployments

    Trending Tags

    • kali linux
    • kali tools
    • hacking tools kali
    • kali hacking
    • pentesting
  • Security
    Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

    Facebook & Instagram Flaw Let Anyone Bypass Two-factor Authentication

    U.S. No Fly List Leaked on Hacker Forum

    U.S. No Fly List Leaked on Hacker Forum

    Hackers Exploiting Unpatched Exchange Servers in The Wild

    Hackers Exploiting Unpatched Exchange Servers in The Wild

    Critical Realtek Vulnerability Impacting IoT Devices Worldwide

    Critical Realtek Vulnerability Impacting IoT Devices Worldwide

    New Research Uncovers Threat Actor Behind Infamous Golden Chickens Malware-as-a-Service

    New Research Uncovers Threat Actor Behind Infamous Golden Chickens Malware-as-a-Service

    Doctor Paid $60k in Bitcoin to Hire Dark Web Hitmen

    Doctor Paid $60k in Bitcoin to Hire Dark Web Hitmen

    What is Word Unscrambler In Gaming?

    What is Word Unscrambler In Gaming?

    Yandex Source Code Online Leaked, Company Denies Hack

    Yandex Source Code Online Leaked, Company Denies Hack

    Extradited Alleged ShinyHunters Hacker Pleads Not Guilty in US Court

    Extradited Alleged ShinyHunters Hacker Pleads Not Guilty in US Court

  • Advertise
No Result
View All Result
I Need Hack - Hacking Tutorials, News, Tips
SS7 SMS Intercept SS7 SMS Intercept SS7 SMS Intercept
Home Security

Cyber Security firm CloudSEK points fingers at rival over breach

by Ineedhack
December 9, 2022
in Security
0
79
SHARES
493
VIEWS
Share on FacebookShare on Twitter
Kripkey Spy Phone Kripkey Spy Phone Kripkey Spy Phone

CloudSEK was an Indian cybersecurity firm that fell prey to a by an unidentified threat actor.

CloudSEK’s post about the incident states that Rahul Sasi, the founder and CEO of CloudSEK, claimed the hacker stole credentials from one CloudSEK employee’s Jira accounts. Rahul also stated that the threat actor(s) had accessed the Confluence pages of the company by stealing the Jira password.

The hacker also accessed internal data, including and product dashboard screenshots. Schema Diagrams were also obtained from Confluence.

Hackread.com image credit

CloudSEK confirmed, as well that no server access or database access was compromised. The incident quickly became the subject of an investigation. Sasi suggested that another cyber security company with a track record for dark web activity could have been responsible.

We suspect that Dark Web monitoring is being carried out by a cyber security company. Both the attack and indicators point to an attacker who has a history of similar tactics that we’ve seen in the past.


Rahul Sasi

Hacker’s Claims

CloudSEK was alerted to the threat by Cyble Research & Intelligence Labs, (CRIL), on Tuesday 6th December. On Tuesday, cyber security specialists noticed a person using the nick “sedut” who claimed that he had breached CloudSEK Info Security Pvt Ltd. On multiple cybercrime forums, the actor claimed to have hacked into an Indian company.

Researchers at Cyble suspect that it was an attack on CloudSEK. The attacker was trying to damage the company’s image within the cyber threat intelligence community. The attacker claimed that Cyble researchers had access to multiple files and offered the data openly for purchase in the .

Data on sale:

  1. Pre-sales info.
  2. VPN credentials
  3. Orders
  4. Credentials for the company
  5. Extensive clientele data.
  6. Project-related databases.
  7. Source codes confidential
  8. Sensitive infrastructure details.
  9. Data related to engineering products

The threat actor also claimed that he had been able to access CloudSEK’s ecosystem over several months. This claim was supported by multiple videos and screenshots that he shared, proving they were able to access the company’s servers.

Credit to Cyble

The first image shows that the hacker leaked additional images, including usernames and passwords for accounts used to scrape the XSS hacking forums and directions on how to use different website crawlers.

This database can be purchased for 10,000 dollars, with the $8000 per file engineering/employee product data.

What was the Cause?

Sasi disclosed that the hacker had used Jira account credentials for access to internal documents, training files, and open-source automation scripts. Confluence pages were also accessed by the hacker.

CloudSEK confirmed that Jira’s user did not use SSO, but a password; his email was protected with 0_. The Jira password was not compromised, nor was the email account.

The company instead believes that the attacker compromised Jira’s session cookies, which allowed them to take control of the account. The attacker is still being investigated on how they obtained the session cookies.


Related News

Tags: android hackingemail hackingfacebook hackshack newshacking newshacking softwarehacking tipshacking toolsinstagram hackiphone hackingjpg exploitsim swapsimswap attackssimswap hacksmartphone hackingsms exploitss7 softwaretik tok hacktwitter hack
Ineedhack

Ineedhack

Next Post

Dark Web Hackers add Malware to Legit Apps - Zombinder

Sim Swap Software Sim Swap Software Sim Swap Software

Recommended

CVE-2022-3602 and CVE-2022-3786: OpenSSL 3.0.7 patches Critical Vulnerability

Microsoft Exchange AutoDiscover Design Flaw: The Great Leak

1 year ago

Inout Jobs Portal 2.2.2 SQL Injection

6 days ago

Popular News

    • Advertise
    • SS7 Hacking

    ©2017- 2022 Hacking Tutorials

    No Result
    View All Result
    • Home
    • Exploits
    • Hacking News
    • Hacking Tools
    • Hacking Tutorials
    • Kali Linux
    • Security
    • Advertise