Oct 20, 2018

APT report for 2018-10-19

TRANSNATIONAL / UNKNOWN

Nil

CHINA

  1. Secret Comment Crew Code Spotted in New Attack
  2. #GroupIB is a platinum sponsor @Gartner_inc Security & Risk Management Summit (Dubai, UAE, 22-23 October 2018) Visit us at Stand
  3. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  4. Latest Hacking News Podcast
  5. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands
  6. Authorities seize properties of creators of “Infamous” cheat code, for GTA V

INDIA

Nil

NORTH KOREA

  1. "World-renowned cybersecurity unit #GroupIB is prepping to release its annual report on trends in hi-tech cybercrime...Group-IB expects the number of

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. GreyEnergy
  2. GreyEnergy threat group detected attacking high-value targets
  3. .@ESET researchers claim the #GreyEnergy group has taken up the mantle of ICS-targeting #BlackEnergy, but @MalwareJake said the evidence wasn't
  4. .@ESET researchers claim a new threat group called #GreyEnergy is the successor to #BlackEnergy, but experts are unsure if the
  5. Week in security with Tony Anscombe

SERBIA

Nil

UKRAINE

Nil

Platform report for 2018-10-19

WINDOWS

  1. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  2. SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload
  3. Inside Safari Extensions | Malware’s Golden Key to User Data

LINUX

  1. VestaCP users warned about possible server compromise

UNIX

Nil

ANDROID

  1. Authorities seize properties of creators of “Infamous” cheat code, for GTA V

IOS

Nil

MACOS

  1. Inside Safari Extensions | Malware’s Golden Key to User Data

Threat report for 2018-10-19

DATA BREACH & DATA LOSS

  1. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  2. Campaign 2018: Artificial intelligence is automating attacks on political campaigns
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. A Pentagon #DataBreach exposed data on at least 30,000 individuals, but other details about the incident are still scarce. By
  5. Campaign 2018: Artificial Intelligence Is Automating Attacks On Political Campaigns
  6. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  7. Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
  8. US Voter Leak Hits Tea Party Organization
  9. VestaCP users warned about possible server compromise
  10. jQuery File Upload Plugin Vulnerable for 8 Years and Only Hackers Knew
  11. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  12. Campaign launched to protect ethical hackers in the Americas
  13. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  14. Facepunch 2016 breach exposed 343,000 users
  15. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  16. ADHA's non-process for releasing My Health Record data revealed
  17. MikroTik routers targeted by cryptomining campaign | Avast
  18. Vulnerability in Tumblr could have compromise users’ account data
  19. Poor security practices and access to hacking services are making it easy for #cybercriminals to compromise business email, research reveals:

DENIAL-OF-SERVICE

  1. New DDoS Malware Infects Open-Source Web Hosting Software
  2. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'
  3. DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

MALVERTISING

Nil

PHISHING

  1. Password and credit card-stealing Azorult malware adds new tricks
  2. AISA 2018: Hunting for phishing kits
  3. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  4. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  5. #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.

WEB DEFACEMENT

Nil

BOTNET

  1. Ok now, which one of you is running this Twitter botnet of fake infosec professionals?

RANSOMWARE

  1. City Pays $2,000 in Computer Ransomware Attack
  2. Water Utility ONWASA Hit by Ransomware Attack
  3. Madison County Computer Systems Face a Ransomware Attack
  4. The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
  5. Top 4 tips to avoid getting hit by ransomware
  6. Onslow County Utility Hit with Ransomware Attack

CRYPTOMINING & CRYPTOCURRENCIES

  1. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
  2. MikroTik routers targeted by cryptomining campaign | Avast
  3. Fraudster Targets Cryptocurrency Wallets with a Variety of Info Stealers

MALWARE

  1. Small or Big Business, Malware Hits Everyone
  2. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. Password and credit card-stealing Azorult malware adds new tricks
  5. SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload
  6. New DDoS Malware Infects Open-Source Web Hosting Software
  7. America’s First: US Leads in Global Malware C2 Distribution
  8. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  9. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  10. The Golden Age of Malware
  11. LuminosityLink RAT author sentenced to 30 years in prison
  12. Inside Safari Extensions | Malware’s Golden Key to User Data
  13. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  14. ADHA's non-process for releasing My Health Record data revealed
  15. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands
  16. Canberra competence shines in day of PM domain lapses and tortured analogies

EXPLOIT

  1. NSA-Linked 'DarkPulsar' Exploit Tool Detailed

VULNERABILITY

  1. libssh Vulnerability: Is WatchGuard Affected?
  2. 0-Day in jQuery Plugin Impacts Thousands of Applications
  3. Fixing a CSRF Vulnerability
  4. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  5. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  6. Drupal dev team fixed Remote Code Execution flaws in the popular CMS
  7. Flaw in Libssh Grants Admin Control to Servers
  8. FreeRTOS Vulnerabilities Expose Many Systems to Attacks
  9. Linksys E Series Vulnerabilities
  10. Google warns Apple: Missing bugs in your security bulletins are 'disincentive to patch'
  11. jQuery Zero-Day Was Exploited For At Least Three Years
  12. A Serious Security Flaw Found in LibSSH
  13. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  14. Splunk addressed several vulnerabilities in Enterprise and Light products
  15. Serious D-Link router security flaws may never be patched
  16. Scams and flaws: Why we get duped
  17. Remote Code Execution Flaws Patched in Drupal
  18. Tumblr bug bounty program detects flaw, no user info lost
  19. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  20. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  21. Critical Flaw Found in Streaming Library Used by VLC and Other Media Players
  22. Drupal Remote Code Execution Vulnerability Alert
  23. Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
  24. Splunk Patches Several Flaws in Enterprise, Light Products
  25. Vulnerability in Tumblr could have compromise users’ account data
  26. Three critical vulnerabilities can be chained to take full control of D-Link routers
  27. Zero-day in popular jQuery plugin actively exploited for at least three years
  28. Tumblr serious vulnerability can reveal everyone information
  29. Critical Flaws Found in Amazon FreeRTOS IoT Operating System

Region brief for 2018-10-19

ASIA

  1. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  2. The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  5. Secret Comment Crew Code Spotted in New Attack
  6. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  7. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands

OCEANIA

  1. AISA 2018: Hunting for phishing kits
  2. ADHA's non-process for releasing My Health Record data revealed
  3. Authorities seize properties of creators of “Infamous” cheat code, for GTA V
  4. Canberra competence shines in day of PM domain lapses and tortured analogies

NORTH AMERICA

  1. Small or Big Business, Malware Hits Everyone
  2. America’s First: US Leads in Global Malware C2 Distribution
  3. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  4. US Voter Leak Hits Tea Party Organization
  5. Secret Comment Crew Code Spotted in New Attack
  6. #GroupIB is a platinum sponsor @Gartner_inc Security & Risk Management Summit (Dubai, UAE, 22-23 October 2018) Visit us at Stand
  7. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  8. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  9. Inside Safari Extensions | Malware’s Golden Key to User Data
  10. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'

SOUTH AMERICA

Nil

EUROPE

  1. Small or Big Business, Malware Hits Everyone
  2. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  3. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  4. GreyEnergy
  5. Onslow County Utility Hit with Ransomware Attack
  6. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
  7. Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
  8. Three critical vulnerabilities can be chained to take full control of D-Link routers
  9. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'

AFRICA

  1. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'

Sector brief for 2018-10-19

HEALTHCARE

  1. Small or Big Business, Malware Hits Everyone
  2. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  3. Secret Comment Crew Code Spotted in New Attack

TRANSPORT

  1. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware

BANKING & FINANCE

  1. Small or Big Business, Malware Hits Everyone
  2. City Pays $2,000 in Computer Ransomware Attack
  3. Madison County Computer Systems Face a Ransomware Attack
  4. Password and credit card-stealing Azorult malware adds new tricks
  5. SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload
  6. AISA 2018: Hunting for phishing kits
  7. US Voter Leak Hits Tea Party Organization
  8. Secret Comment Crew Code Spotted in New Attack
  9. Inside Safari Extensions | Malware’s Golden Key to User Data
  10. Critical Flaws Found in Amazon FreeRTOS IoT Operating System

INFORMATION & TELECOMMUNICATION

  1. Fixing a CSRF Vulnerability
  2. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  3. Flaw in Libssh Grants Admin Control to Servers
  4. Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
  5. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  6. #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.
  7. Tumblr bug bounty program detects flaw, no user info lost
  8. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  9. #GroupIB is a platinum sponsor @Gartner_inc Security & Risk Management Summit (Dubai, UAE, 22-23 October 2018) Visit us at Stand
  10. Ok now, which one of you is running this Twitter botnet of fake infosec professionals?
  11. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  12. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  13. Inside Safari Extensions | Malware’s Golden Key to User Data
  14. Vulnerability in Tumblr could have compromise users’ account data
  15. Tumblr serious vulnerability can reveal everyone information
  16. Poor security practices and access to hacking services are making it easy for #cybercriminals to compromise business email, research reveals:

FOOD

Nil

WATER

  1. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'

ENERGY

  1. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  2. GreyEnergy
  3. Onslow County Utility Hit with Ransomware Attack

GOVERNMENT & PUBLIC SERVICE

  1. Small or Big Business, Malware Hits Everyone
  2. Madison County Computer Systems Face a Ransomware Attack
  3. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  4. US Voter Leak Hits Tea Party Organization
  5. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  6. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  7. Authorities seize properties of creators of “Infamous” cheat code, for GTA V

Daily brief for 2018-10-19

ASIA

  1. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  2. The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  5. Secret Comment Crew Code Spotted in New Attack
  6. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  7. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands

WORLD

  1. Small or Big Business, Malware Hits Everyone
  2. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  3. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  4. GreyEnergy
  5. Onslow County Utility Hit with Ransomware Attack
  6. America’s First: US Leads in Global Malware C2 Distribution
  7. AISA 2018: Hunting for phishing kits
  8. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  9. US Voter Leak Hits Tea Party Organization
  10. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
  11. Secret Comment Crew Code Spotted in New Attack
  12. #GroupIB is a platinum sponsor @Gartner_inc Security & Risk Management Summit (Dubai, UAE, 22-23 October 2018) Visit us at Stand
  13. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  14. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  15. Inside Safari Extensions | Malware’s Golden Key to User Data
  16. Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
  17. ADHA's non-process for releasing My Health Record data revealed
  18. Three critical vulnerabilities can be chained to take full control of D-Link routers
  19. Authorities seize properties of creators of “Infamous” cheat code, for GTA V
  20. Canberra competence shines in day of PM domain lapses and tortured analogies
  21. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'

ATTACKS

  1. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  2. Campaign 2018: Artificial intelligence is automating attacks on political campaigns
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. A Pentagon #DataBreach exposed data on at least 30,000 individuals, but other details about the incident are still scarce. By
  5. Password and credit card-stealing Azorult malware adds new tricks
  6. Campaign 2018: Artificial Intelligence Is Automating Attacks On Political Campaigns
  7. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  8. AISA 2018: Hunting for phishing kits
  9. Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
  10. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  11. US Voter Leak Hits Tea Party Organization
  12. VestaCP users warned about possible server compromise
  13. jQuery File Upload Plugin Vulnerable for 8 Years and Only Hackers Knew
  14. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  15. Campaign launched to protect ethical hackers in the Americas
  16. #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.
  17. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  18. Facepunch 2016 breach exposed 343,000 users
  19. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  20. ADHA's non-process for releasing My Health Record data revealed
  21. MikroTik routers targeted by cryptomining campaign | Avast
  22. Vulnerability in Tumblr could have compromise users’ account data
  23. Poor security practices and access to hacking services are making it easy for #cybercriminals to compromise business email, research reveals:

THREATS

  1. libssh Vulnerability: Is WatchGuard Affected?
  2. 0-Day in jQuery Plugin Impacts Thousands of Applications
  3. Small or Big Business, Malware Hits Everyone
  4. Fixing a CSRF Vulnerability
  5. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  6. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  7. City Pays $2,000 in Computer Ransomware Attack
  8. Drupal dev team fixed Remote Code Execution flaws in the popular CMS
  9. Water Utility ONWASA Hit by Ransomware Attack
  10. Madison County Computer Systems Face a Ransomware Attack
  11. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  12. The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
  13. Top 4 tips to avoid getting hit by ransomware
  14. Flaw in Libssh Grants Admin Control to Servers
  15. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  16. FreeRTOS Vulnerabilities Expose Many Systems to Attacks
  17. Linksys E Series Vulnerabilities
  18. Password and credit card-stealing Azorult malware adds new tricks
  19. SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload
  20. Google warns Apple: Missing bugs in your security bulletins are 'disincentive to patch'
  21. Onslow County Utility Hit with Ransomware Attack
  22. jQuery Zero-Day Was Exploited For At Least Three Years
  23. New DDoS Malware Infects Open-Source Web Hosting Software
  24. A Serious Security Flaw Found in LibSSH
  25. America’s First: US Leads in Global Malware C2 Distribution
  26. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  27. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  28. Splunk addressed several vulnerabilities in Enterprise and Light products
  29. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  30. Serious D-Link router security flaws may never be patched
  31. Scams and flaws: Why we get duped
  32. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
  33. Remote Code Execution Flaws Patched in Drupal
  34. The Golden Age of Malware
  35. Tumblr bug bounty program detects flaw, no user info lost
  36. LuminosityLink RAT author sentenced to 30 years in prison
  37. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  38. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  39. Critical Flaw Found in Streaming Library Used by VLC and Other Media Players
  40. Drupal Remote Code Execution Vulnerability Alert
  41. Inside Safari Extensions | Malware’s Golden Key to User Data
  42. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  43. Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
  44. Splunk Patches Several Flaws in Enterprise, Light Products
  45. ADHA's non-process for releasing My Health Record data revealed
  46. MikroTik routers targeted by cryptomining campaign | Avast
  47. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands
  48. Fraudster Targets Cryptocurrency Wallets with a Variety of Info Stealers
  49. Vulnerability in Tumblr could have compromise users’ account data
  50. Three critical vulnerabilities can be chained to take full control of D-Link routers
  51. Zero-day in popular jQuery plugin actively exploited for at least three years
  52. Tumblr serious vulnerability can reveal everyone information
  53. Critical Flaws Found in Amazon FreeRTOS IoT Operating System
  54. Canberra competence shines in day of PM domain lapses and tortured analogies

CRIME

  1. NSA-Linked 'DarkPulsar' Exploit Tool Detailed
  2. Small or Big Business, Malware Hits Everyone
  3. Madison County Computer Systems Face a Ransomware Attack
  4. America’s First: US Leads in Global Malware C2 Distribution
  5. Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
  6. Scams and flaws: Why we get duped
  7. #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.
  8. Secret Comment Crew Code Spotted in New Attack
  9. LuminosityLink RAT author sentenced to 30 years in prison
  10. #GroupIB is a platinum sponsor @Gartner_inc Security & Risk Management Summit (Dubai, UAE, 22-23 October 2018) Visit us at Stand
  11. "World-renowned cybersecurity unit #GroupIB is prepping to release its annual report on trends in hi-tech cybercrime...Group-IB expects the number of
  12. Authorities seize properties of creators of “Infamous” cheat code, for GTA V

POLITICS

  1. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  2. GreyEnergy
  3. US Voter Leak Hits Tea Party Organization
  4. Secret Comment Crew Code Spotted in New Attack
  5. LuminosityLink RAT author sentenced to 30 years in prison
  6. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  7. Latest Hacking News Podcast