Rockstar Games reportedly faces a new security issue, with the source code of Grand Theft Auto 5 and various other sensitive materials potentially compromised and leaked online. Reports are circulating that the entire source code of the popular video game Grand Theft Auto 5 has been leaked. Additionally, there are show more ...
indications that this leak may include material related to Grand Theft Auto 6 and files from a potential sequel to the 2006 game Bully. This news comes on the heels of the sentencing of a hacker involved in a previous GTA 6 gameplay leak to an indefinite term in a hospital prison. Due to multiple security lapses that have disrupted its business, Rockstar Games has had a turbulent year. A network attack that shook the corporation last year resulted in the unapproved publication of almost an hour of gameplay from the highly anticipated Grand Theft Auto 6. The issue deteriorated lately when the developers were forced to release the video ahead of schedule after another leak upset their preparations for a big trailer premiere. With the most recent GTA 5 source code leak, it seems that Rockstar Games is up against an even bigger obstacle. Decoding the GTA 5 Source Code Leak The GTA 5 source code has allegedly been made public on the dark web after an earlier exchange between individuals, according to a recent tweet from GTA Focal. It has been stated that the 4GB file that was leaked on Tuesday, which mostly contained codes. This large source file, which contains 3D models and assets, would probably make it possible to build and run the game. The whole source appears to be more difficult to release due to its size—it is estimated to be roughly 200GB. Also, the GTA 5 source code leak has purportedly exposed the confidential employee data of around 1158 of Rockstar Games’ staff containing email addresses. The Problem Persists Even though the initial link has been taken down, the source code is already doing the rounds on Telegram channels. Screenshot of a Telegram Group, Credit: GTA Focal on “X” Take-Two Interactive is allegedly working hard to take down online links that lead to the Grand Theft Auto 5 source code in the meantime. Despite this, there are rumors circulating that hackers are discussing whether or not to make this massive 200GB source file public. The significant difference is that the files have only recently been made public, but otherwise, the incident is thought to be related to the same security breach that happened a year ago. The problem worsens with the revelation that the leak contains parts of the code from GTA 6 and files from the much anticipated Bully 2. The GTA 5 data leak also exposes several unpublished DLCs, such as the GTA 5 Trevor expansion, which was also mentioned in earlier leaks. Consequence The consequences of the GTA 5 leak are particularly bad since it gives hackers the ability to find and take advantage of security loopholes in the source code, which might allow them to remotely run code on players’ computers. This puts players’ safety at grave danger because GTA Online may quickly turn into a dangerous place to be. Fans have also pointed out that the time falls during the holidays, when a lot of developers are probably on vacation, which might make things worse for Rockstar Games and its production staff. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
Rhysida, a notorious hacking group, has reportedly breached critical infrastructure once again, this time targeting Abdali Hospital in Amman, Jordan. The alleged Abdali Hospital data breach, revealed through a message posted by the hackers, has sent shockwaves through the healthcare community. Abdali Hospital Data show more ...
Breach: A Cryptic Countdown The hackers, who go by the name Rhysida, posted a cryptic message that read, “6 days 23:46:53.” This ominous countdown suggests a looming threat, possibly indicating the time remaining for potential buyers to bid on exclusive and sensitive data. The hackers, known for their brazen tactics, are offering the data for sale at a price of 10 BTC (Bitcoin). The message also explicitly states that the data will be sold to only one buyer, prohibiting any reselling and ensuring exclusivity. Details regarding the nature of the compromised data, the extent of the breach, and the motive behind the attack remain undisclosed by the hackers. The Cyber Express Team has reached out to hospital officials to verify the legitimacy of the Abdali Hospital data breach claim. However, as of now, there has been no official response from the hospital authorities. Source: Twitter Adding a layer of complexity to Abdali Hospital data breach claim, a preliminary assessment of Abdali Hospital’s official website reveals that it is fully functional. This raises questions about the authenticity of the hackers’ claim of Abdali Hospital data breach. It remains uncertain whether the Abdali Hospital data breach announcement is a tactic to gain attention or if there is a deeper motive behind the cyber intrusion. In the absence of an official statement from hospital officials on the Abdali Hospital data breach, the healthcare community and the public are left in suspense. The potential compromise of sensitive patient data is a serious concern, and the urgency of the situation is underscored by the hackers’ countdown. Cyber Intrigues Amid Israel-Hamas Conflict In a broader context, the ongoing conflict between Israel and Hamas continues to spill over into the digital realm. In the first week of December, the Cyber Toufan Team, a notorious hacking group, asserted responsibility for a cyberattack on Israel. Targets included Soda Stream, a well-known home carbonation product company, the Back2School Project, and Israel’s Ministry of Health. The Cyber Toufan Team’s dark web post revealed a breach of Soda Stream’s customer database, exposing personal details of over 100,000 Israeli customers. Adding to the complexity of the situation, a hacktivist collective known as “Predatory Sparrow” claimed to have subverted most gas stations in Iran, citing a “software problem” as the cause. The collective’s warning against rushing to the remaining stations raises concerns about the evolving landscape of cybersecurity in the region. To Wrap Up Abdali Hospital, a reputable 200-bed multi-specialty facility, has a mission dedicated to providing best-practice patient-centered care and promoting research and education. However, the hospital now finds itself at the center of a cybersecurity storm. Abdali Hospital’s response to these allegations will undoubtedly shed light on the true extent and nature of Abdali Hospital data breach claim. The Cyber Express Team continues to monitor the situation closely as the deadline approaches and awaits an official response from the targeted hospital. As nations grapple with the physical and virtual dimensions of conflicts, the need for robust cybersecurity measures becomes increasingly evident. The interconnectedness of critical infrastructure highlights the urgency of addressing cyber threats on a global scale. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
Political and economic motivations impel nation-state and independent hackers, while the European Union strives to keep its members secure and prepared.
Unreasonable requirements, low salaries, and a lack of commitment to training leaves businesses unable to hire their perfect cybersecurity pros. So, is there really a workforce "shortage"?
The Nim-based backdoor communicates with command and control servers, evades analysis tools, and establishes persistence on the compromised machine through startup folders and scheduled tasks.
The phishing emails trick victims into interacting with malicious PDF files that drop Rust-based payloads or PowerShell scripts, enabling the collection of confidential documents and system information.
The "Angel Drainer" phishing group is notorious for draining cryptocurrency wallets through sophisticated schemes, charging a percentage of the stolen amount from hackers.
The Xamalicious backdoor, implemented with Xamarin, targets Android devices by gaining accessibility privileges and communicating with a C2 server to download a second-stage payload, potentially enabling fraudulent actions without user consent.
The breach exposed customers' names, phone numbers, email addresses, SIM serial numbers, IMEI numbers, and service plan information. Importantly, financial data and passwords were not exposed in the breach.
The integration of Atom Security's technology into Mend.io's product line is expected to enhance coverage and reduce the number of irrelevant findings in code vulnerabilities.
On December 20, an unknown threat actor had access to Ubisoft's infrastructure for 48 hours. The attackers attempted to steal user data from the game R6 Siege but were unsuccessful.
The source code for Grand Theft Auto 5 (GTA 5) has reportedly been leaked. This comes over a year after the Lapsus$ hacking group hacked Rockstar Games and stole company data.
The banking malware Carbanak has been observed in ransomware attacks with updated tactics. It has adapted to incorporate new attack vendors and techniques, making it more effective.
The vulnerabilities range from denial of service risks to arbitrary code execution possibilities. It emphasizes the importance of regularly updating Vim and applying security patches to mitigate these risks.
When handling DTLS-SRTP for media setup, FreeSWITCH version 1.10.10 is susceptible to denial of service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack.
Debian Linux Security Advisory 5588-1 - Fabian Baeumer, Marcus Brinkmann and Joerg Schwenk discovered that the SSH protocol is prone to a prefix truncation attack, known as the "Terrapin attack". This attack allows a MITM attacker to effect a limited break of the integrity of the early encrypted SSH transport show more ...
protocol by sending extra messages prior to the commencement of encryption, and deleting an equal number of consecutive messages immediately after encryption starts.
Debian Linux Security Advisory 5587-1 - Two security issues were discovered in Curl: Cookies were incorrectly validated against the public suffix list of domains and in same cases HSTS data could fail to save to disk.
Gentoo Linux Security Advisory 202312-14 - Multiple vulnerabilities have been discovered in FFmpeg, the worst of which could lead to code execution. Versions greater than or equal to 6.0 are affected.
Gentoo Linux Security Advisory 202312-13 - Multiple vulnerabilities have been discovered in Gitea, the worst of which could result in information leakage. Versions greater than or equal to 1.20.6 are affected.
Gentoo Linux Security Advisory 202312-12 - Several vulnerabilities have been found in Flatpack, the worst of which lead to privilege escalation and sandbox escape. Versions greater than or equal to 1.14.4 are affected.
Gentoo Linux Security Advisory 202312-11 - A vulnerability has been found in SABnzbd which allows for remote code execution. Versions greater than or equal to 4.0.2 are affected.
Gentoo Linux Security Advisory 202312-10 - A vulnerability has been found in Ceph which can lead to root privilege escalation. Versions greater than or equal to 17.2.6 are affected.
The banking malware known as Carbanak has been observed being used in ransomware attacks with updated tactics. "The malware has adapted to incorporate attack vendors and techniques to diversify its effectiveness," cybersecurity firm NCC Group said in an analysis of ransomware attacks that took place in November 2023. "Carbanak returned last month through new
Source: securityaffairs.com – Author: Pierluigi Paganini APT group UAC-0099 targets Ukraine exploiting a WinRAR flaw Pierluigi Paganini December 25, 2023 The threat actor UAC-0099 is exploiting a flaw in the WinRAR to deliver LONEPAGE malware in attacks against Ukraine. A threat actor, tracked as UAC-0099, show more ...
continues to target Ukraine. In some attacks, the APT group exploited a […] La entrada APT group UAC-0099 targets Ukraine exploiting a WinRAR flaw – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityaffairs.com – Author: Pierluigi Paganini Iran-linked APT33 targets Defense Industrial Base sector with FalseFont backdoor Pierluigi Paganini December 25, 2023 Microsoft reports that the Iran-linked APT33 group is targeting defense contractors worldwide with FalseFont backdoor. Microsoft show more ...
says the APT33 (aka Peach Sandstorm, Holmium, Elfin, and Magic Hound) Iranian cyber-espionage group is using recently discovered FalseFont backdoor malware to […] La entrada Iran-linked APT33 targets Defense Industrial Base sector with FalseFont backdoor – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.bleepingcomputer.com – Author: Lawrence Abrams The source code for Grand Theft Auto 5 was reportedly leaked on Christmas Eve, a little over a year after the Lapsus$ threat actors hacked Rockstar games and stole corporate data. Links to download the source code were shared on numerous channels, show more ...
including Discord, a dark web website, and a […] La entrada GTA 5 source code reportedly leaked online a year after RockStar hack – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.bleepingcomputer.com – Author: Sergiu Gatlan Google says the Chrome Safety Check feature will work in the background to check if passwords saved in the web browser have been compromised. Chrome will also alert desktop users if they’re using extensions flagged as dangerous (taken down from the show more ...
Chrome Web Store), the latest Chrome version, or […] La entrada Google Chrome now scans for compromised passwords in the background – Source: www.bleepingcomputer.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Matthew Rosenquist I have been an active volunteer as part of corporate medical response teams for more than 20 years of my career. It has never been my primary job, but I like having the skills to help when really bad things happen in life. Such corporate teams bring show more ...
like minded […] La entrada Medical Emergency Assistance – Thank You – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Michael Toback Understanding the Basic Concept of VLANs Virtual Local Area Networks, or VLANs, serve as a critical computing technology designed for effective network traffic management. These are subsets within a Local Area Network (LAN) that partition the network into show more ...
multiple distinct segments or domains. Why use a VLAN? Utilizing VLANs […] La entrada Why Use a VLAN? Unveiling the Benefits of Virtual LANs in Network Security – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Michelle Ofir Geveye Understanding Zero Trust Traditionally, cybersecurity operated on a simple principle: trust what’s inside, be wary of what’s outside. This model assumed that once someone or something gained access to your network, they could be trusted as long as show more ...
they were within the walls of your digital fortress. However, […] La entrada Why a Zero Trust Security Policy Matters and Steps to Implementation – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Ahona Rudra Developers at Yahoo have been busy formulating guidelines for bulk senders and the DMARC RUA tag has been mentioned as a strong recommendation – so here’s all you need to know about it! Yahoo in their bulk sender guidelines for 2024 focuses on the show more ...
importance of email authentication and […] La entrada Yahoo “Strongly” Recommends DMARC RUA Tag for Bulk Senders – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: Rohan Timalsina Vim, a powerful and widely used text editor, has recently come under scrutiny due to several vulnerabilities that could potentially compromise system security. In this article, we will delve into the intricacies of these vulnerabilities, exploring their show more ...
impact and the affected versions of Ubuntu. Understanding these issues is crucial […] La entrada Ubuntu Security Updates Fixed Vim Vulnerabilities – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: securityboulevard.com – Author: TuxCare Team Sophisticated Internet of Things (IoT) technologies transformed the cybersecurity systems in financial services. They’re continuously evolving and improving. Take credit cards as an example—commercial banks significantly cut the risk of skimming by show more ...
replacing magstripe cards with chip-and-PIN cards. But despite these advancements, fraudsters remain at large. They still find […] La entrada The Intersection of IoT and Financial Security: Expert Tips for Protection – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.infosecurity-magazine.com – Author: 1 Cybercriminals unleashed an average of 411,000 malicious files every day in 2023, representing a 3% increase from the previous year, according to Kaspersky. The firm’s Security Bulletin: Statistics of the Year Report, published on December 14, 2023, showed show more ...
that particular types of threats also escalated. One example is the use […] La entrada Daily Malicious Files Soar 3% in 2023, Kaspersky Finds – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: thehackernews.com – Author: . Dec 26, 2023NewsroomMalware / Cybercrime The banking malware known as Carbanak has been observed being used in ransomware attacks with updated tactics. “The malware has adapted to incorporate attack vendors and techniques to diversify its effectiveness,” show more ...
cybersecurity firm NCC Group said in an analysis of ransomware attacks that took place […] La entrada Carbanak Banking Malware Resurfaces with New Ransomware Tactics – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.theguardian.com – Author: Jasper Jolly Europe’s largest parking app operator has reported itself to information regulators in the EU and UK after hackers stole customer data. EasyPark Group, the owner of brands including RingGo and ParkMobile, said customer names, phone numbers, addresses, email show more ...
addresses and parts of credit card numbers had been taken but […] La entrada Hackers steal customer data from Europe’s largest parking app operator – Source: www.theguardian.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
In an increasingly digital world, the protection of sensitive payment card data has become more critical than ever. PCI DSS v4.0, the latest iteration of the Payment Card Industry Data Security Standard is designed to address the evolving challenges and emerging threats in the payment card industry. PCI Data Security show more ...
Standard Requirements La entrada Riding the Waves of Compliance Navigating PCI DSS v4.0 se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
The CAF- A Tool For Assessing Cyber Resilience The Cyber Assessment Framework (CAF) provides a systematic and comprehensive approach to assessing the extent to which cyber risks to essential functions are being managed by the organisation responsible. It is intended to be used either by the responsible organisation show more ...
itself (selfassessment) or by an independent external […] La entrada Cyber Assessment Framework V3.1 se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.