logo
#

Latest news with #DarkWeb

The likes of BHP, FMG, Rio and Woodside listed as clients of hacked Bibra Lake contractor Pressure Dynamics
The likes of BHP, FMG, Rio and Woodside listed as clients of hacked Bibra Lake contractor Pressure Dynamics

West Australian

time5 days ago

  • Business
  • West Australian

The likes of BHP, FMG, Rio and Woodside listed as clients of hacked Bibra Lake contractor Pressure Dynamics

Some of the largest mining and energy companies in Western Australia are likely caught up in a cyber hack that allegedly saw huge amounts of data pilfered from a Bibra Lake business. Cyber-criminal syndicate DragonForce claims to have stolen more than 100 gigabytes of Pressure Dynamics International's employee and client data. This data reportedly includes technical drawings of equipment, sensitive operational documents, and medical reports of staff. 'Pressure Dynamics can confirm that it has recently identified a cyber security incident that had affected certain systems within our network,' a company spokesman said. 'Upon detection, our cyber security team immediately initiated our incident response protocols and locked down our systems. 'Pressure Dynamics has engaged cyber security experts to investigate the nature and scope of the incident and implement additional cyber security measures. We have also notified relevant authorities.' Businesses in Australia only have to report a cyber breach to the Office of Australian Information Commissioner if data has been compromised, or reasonably suspected to have been compromised, and these reports rarely become public. The spokesman also said the company had 'significantly increased' its cyber security measures as a result of the incident. A document published by the State Government dated November 2023 lists Alcoa, BHP, Fortescue, Glencore, Newmont, Rio Tinto, South32, Woodside and Chevron as clients of Pressure Dynamics. All of these companies were contacted by The West, but the vast majority did not respond with a comment. Some companies, like South32, were aware of the incident, while others, like Chevron, were not. Pressure Dynamics specialises in building and maintaining a wide array of hydraulic systems used in mining, oil and gas extraction, and military equipment. On mine sites, Pressure Dynamics touts its work on bucket-wheel stacker reclaimers, which are essentially large pickers that retrieve mined ore from stockpiles. And in the oil and gas industry the company appears to mainly work on offshore platforms. It also does work for defence heavyweights, including the Australian arm of US-based missile and radar systems manufacturer Raytheon. Pressure Dynamics is owned by Snjezan Mackic, Esteban and Alessandro Cesan, Thomas Brennan and David Houston, according to documents filed with the Australian Securities and Investments Commission. It is understood the Bibra Lake-based company has about 200 employees on its books. Pressure Dynamics' cyber attacker — DragonForce — is a prolific and anonymous cyber-criminal syndicate that is thought to be based in Russia, given the group reportedly advertises its services on Russian-language Dark Web sites. Curtin University Associate Professor of computing Mihai Lazarescu told The West last year that Russian cyber gangs were among the world's best at stealing troves of valuable data. 'If you define success in in terms of how many systems you manage to breach, the Chinese will be way ahead,' he said. 'But the Russians are better at getting the crown jewels.' DragonForce typically demands a ransom paid in cryptocurrency from its victims in exchange for the impacted business to regain access to its stolen information and for that data to not be published on the Dark Web. It is believed to have successfully penetrated the firewall defences of nearly 200 companies globally, including the Australian division of milk beverage maker Yakult and local lottery broker TheLotter. Last year, the Office of the Australian Information Commissioner was notified of 1113 data breaches, which was a 25 per cent increase from 893 notifications in 2023.

Chennai woman sent bomb threats to avenge 'one-sided love', arrested
Chennai woman sent bomb threats to avenge 'one-sided love', arrested

Business Standard

time23-06-2025

  • Business Standard

Chennai woman sent bomb threats to avenge 'one-sided love', arrested

A senior consultant at Deloitte has been arrested by the cyber crime unit in Ahmedabad for allegedly sending hoax bomb threats across multiple Indian states via the dark web, in an attempt to frame a man she was romantically interested in. The accused, identified as Reni Joshilda, is a Chennai resident with a background in robotics. Her arrest followed a large-scale investigation involving coordination between cyber units from across the country. Revenge over unrequited love, say police Joint Commissioner of Police (Crime Branch) Sharad Singhal confirmed that Joshilda had a one-sided affair with Divij Prabhakar, who married another woman in February 2025. 'The main accused in the case is Reni Joshilda from Chennai. She is qualified in robotics and currently employed as a senior consultant at Deloitte. She had a one-sided affair with one Divij Prabhakar, whom she wanted to marry,' Singhal stated. Digital trail leads police to Chennai Singhal said, 'Due to this, she wanted to frame Divij Prabhakar by creating many email IDs in his name. She used to operate using the Dark Web to send threats and never revealed her digital trail.' However, one digital misstep enabled authorities to trace her back to Chennai. 'One mistake from her helped us track her to Chennai. We have recovered many digital and paper evidence. With this, we have busted a big module,' he added. Investigation still underway Police are currently examining whether others were involved in the conspiracy or if Joshilda was responsible for similar threats in other regions. Further investigation is ongoing, with law enforcement officials from 11 states continuing to coordinate efforts.

Jail, caning for man who had over 300 videos, photos of child pornography, Singapore News
Jail, caning for man who had over 300 videos, photos of child pornography, Singapore News

AsiaOne

time19-06-2025

  • AsiaOne

Jail, caning for man who had over 300 videos, photos of child pornography, Singapore News

SINGAPORE — A man who was found with 178 videos and 153 still images of child pornography in his possession was sentenced to a year and nine months' jail, and two strokes of the cane on Thursday (June 19). Gan Qi Xuan, 26, had earlier downloaded such content from the Dark Web before categorising his collection on his personal electronic devices and online platforms. Court documents did not disclose how his offence came to light, but he was nabbed in a raid at his home in August 2023. On Aug 19, 2024, he pleaded guilty to one count of being in possession of child pornography. In earlier proceedings, Deputy Public Prosecutor Koh Yi Wen told the court that Gan got to know about the Dark Web around 2015 and found a forum on child pornography on it. Initially, he did not download anything during his first visit as he was wary of viruses. But curiosity got the better of him about three months later, and he downloaded such videos and images from the Dark Web, including child abuse material. Soon after, Gan began to access the Dark Web regularly to download pornographic material, including those involving children. He would view the videos and images he downloaded before sorting them into different folders on his laptop. When the device ran out of storage space, he transferred all the material to his Google Drive account. His laptop broke down in mid-2021, and he replaced it with a central processing unit later that year. During this time, Gan also created a cloud storage account to store his pornographic material as the platform provided more free storage space than Google Drive. Without revealing details, defence lawyer Teo Choo Kee told the court on June 19 that Gan has lost his place in a university. Mr Teo also said his client has stopped viewing such child abuse material by 2021 but still had files containing them in his possession when he was caught. Gan is also extremely remorseful for what he had done, the court heard. [[nid:719251]] This article was first published in The Straits Times . Permission required for reproduction.

Counterfeit Bitdefender Website Snares Victims
Counterfeit Bitdefender Website Snares Victims

Forbes

time15-06-2025

  • Business
  • Forbes

Counterfeit Bitdefender Website Snares Victims

CHINA - 2023/11/03: In this photo illustration, the Romanian cybersecurity and anti-virus software ... More company Bitdefender logo seen displayed on a smartphone with an Artificial intelligence (AI) chip and symbol in the background. (Photo Illustration by Budrul Chukrut/SOPA Images/LightRocket via Getty Images) Bitdefender is a trusted cybersecurity and anti-virus software company that provides a variety of products to protect your computer and digital devices from malware and other online threats which is why it is particularly disturbing when scammers were recently discovered to have set up a counterfeit Bitdefender website where if you go to download what you think is protective security software from the website, you actually are downloading malware that can steal your passwords and sensitive personal information from your computer or cell phone that will result in your becoming a victim of identity theft and your accounts, such as online bank accounts hacked. Making this story even more disturbing is that the malware used as a part of this scam is readily available for sale on the Dark Web, that part of the internet where criminals buy and sell goods and services. The internet has three distinct layers. The first is the Surface Web, where most people do searches using their standard browsers, such as Google Chrome. The second is the Deep Web, which is not indexed in standard search engines and is accessed by logging in directly to a site; it often requires authentication for access. Online banking and accessing your medical records are two examples of the use of the Deep Web. Finally, there is the Dark Web, which is only accessible through specific browsers, most commonly Tor, which encrypts all traffic and allows users to remain anonymous. Cybercrime-as-a-service (CaaS) is the business model for cybercriminal geniuses who create and provide services for creating phony or counterfeit websites, malware and delivery systems on Dark Web sites It is on these criminal Dark Web sites where criminals sell or lease all kinds of malware, including ransomware. Other things sold on the Dark Web include login credentials to bank accounts and personal information stolen through data breaches. These Dark Web sites look amazingly like regular retail websites. They have ratings and reviews, tech support, software updates, sales and loyalty programs. Many also offer money laundering services as well. Thus even relatively unsophisticated cybercriminals can access the latest tools to commit their crimes. Creating a counterfeit, but legitimate appearing website such as occurred with the counterfeit Bitdefender site is only the first step to accomplishing the criminal's goal. Next, victims must be steered to the website. The sophisticated cybercriminals who design these counterfeit websites are also adept at manipulating the algorithms that determine a high position in a search engine search. They do this in several ways including stuffing their sites with keywords making the site appear more relevant to the algorithms the search engines use to determine placement in a search engine search. In other instances, the criminals merely pay the search engine to have their counterfeit website appear high in a search engine search. Payment for a high position in a search engine search is a profitable advertising tactic for search engines. So how do you protect yourself from these phony and counterfeit websites that, particularly in the era of AI, appear to be so legitimate? First of all, this scam points out the importance of having dual factor authentication on all of your important accounts so that even if someone managed to steal your username and password, when you provided it to the counterfeit website they would be unable to access your account with the real company. Trust me, you can't trust anyone. It is more important than ever when you go online to make sure that you are on the legitimate websites you seek rather than a criminal's counterfeit website. If you know the URL of a website, make sure you type the URL in carefully to avoid going to a criminals' website. You can also confirm a website's legitimacy by going to to see who actually owns the website and how long it has been in existence. The Google Transparency Report will also help indicate whether a website is legitimate or not. Another very good tool is which is a free online service where you provide the URL of the website you are checking on and virustotal will send the file to dozens of antivirus companies including Bitdefender to see if it is legitimate. . Also Google Chrome has its AI powered Enhanced Safe Browsing feature which will allow you to check on the legitimacy of a particular URL and will warn you if it is a scam.

Gardaí engaged in ‘controlled delivery' of arms and ammo to supermarket shooter, committee hears
Gardaí engaged in ‘controlled delivery' of arms and ammo to supermarket shooter, committee hears

Sunday World

time10-06-2025

  • Politics
  • Sunday World

Gardaí engaged in ‘controlled delivery' of arms and ammo to supermarket shooter, committee hears

Garda Commissioner Drew Harris faces questions from TDs Evan Fitzgerald, from Kiltegan in Co Wicklow, who died in a shooting incident at the Fairgreen Shopping Centre in Carlow. Photo: PA Gardaí engaged in a 'controlled delivery' of arms and ammunition to Carlow shopping centre shooter Evan Fitzgerald, a Dáil committee has been told. Fitzgerald (22) who died in the shooting incident at the Fairgreen centre, was arrested by Gardaí last year for possession of firearms and explosives. TDs today heard a suggestion that undercover officers had met Mr Fitzgerald before the two weapons and a quantity of ammunition were delivered. In other jurisdictions, "controlled delivery" can mean that weapons are supplied to suspects by undercover officers. Fitzgerald had been out on bail when he staged his Carlow attack. It is understood that a sum of €3,000 may have been involved in the acquisition of the guns and ammunition on the Dark Web. Former Labour Party leader Alan Kelly asked outgoing Garda Commissioner Drew Harris about the lead-up to the Carlow shooting incident during his appearance before the Justice Committee. Mr Kelly asked the provenance of the guns that the "deceased young man" bought off the Dark web. He added: "Was this a controlled delivery of guns and ammunition?" He also asked: "Did undercover Gardai engage face-to-face with this young man prior to this delivery of guns and ammunition?" Commissioner Harris said: "I would say that controlled delivery is very sensitive police methodology." He added: "We use it for both organised crime and for our terrorist defence." Mr Kelly returned to the issue later, saying that Evan Fitzgerald was "engaged with by An Garda Síochána', and "was met by An Garda Síochána undercover, guns and ammunition were taken from headquarters, they were delivered to him, and he was arrested. "An Garda Síochána agreed to his bail, and subsequently he killed himself. I have serious concern in relation to all of that." Mr Harris did not comment on this additional statement. The Commissioner said he was aware of Sunday newspaper allegations published last month, which he had then referred to Fiosú, the Office of the Police Ombudsman. "They have since examined the investigation file that was submitted by the Drugs and Organised Crime Bureau to the DPP, and they've responded that they have no further action that they wish to take in pursuance." The decision of the Ombudsman came in recent days, on Friday 6 June last. Evan Fitzgerald, from Kiltegan in Co Wicklow, who died in a shooting incident at the Fairgreen Shopping Centre in Carlow. Photo: PA News in 90 Seconds - Tuesday June 10 Mr Kelly said: "I find that amazing. It's the quickest thing that's ever been turned around by them or their predecessors. "There are investigations in relation to a whole range of things that have run on seven years, six years, five years. "It's amazing that something can be turned around so fast." He asked to see what had been referred to them. Commissioner Harris offered to forward to the committee a description of what was asked for and what was supplied. Mr Kelly asked again whether the Commissioner was in a position to say whether Gardaí "engaged with this individual [Fitzgerald] prior to this controlled delivery, that was organised by An Garda Síochana in relation to these guns and ammunition." He also asked again about where the guns had actually come from, appearing to question whether there had been any actual importation. The Commissioner said: "Well, again, I'm not going to speak to the provenance of the firearms because that touches upon sensitive methodology.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store