The recent breach at Okta gave hackers the opportunity to try and infiltrate password manager 1Password and internet infrastructure provider Cloudflare.
05.10.2023 - 12:27 / pcgamer.com
In a series of events that future historians will point to as emblematic of our age, NATO— y'know, the North Atlantic Treaty Organisation, established in 1949 to wage Cold War against the Soviet Union—is «actively addressing incidents affecting some unclassified NATO websites» following an alleged intrusion by a group of «gay furry hackers».
That's what the alliance tells The Register, anyway, in the wake of a September 30 claim from a hacker group called SiegedSec that it has obtained «over 3 thousand files totaling to over 9GB of uncompressed Data!» after gaining access to six NATO web portals.
Siegedsec has leaked NATO again!This time releasing over 9GB of data uncompressed!Siegedsec:2Nato:0 pic.twitter.com/5nvuL1D6LdSeptember 30, 2023
None of those, mind you, are liable to put the codes for the nukes in the hands of anyone untoward (or more untoward than the people who are meant to have them, anyway). We're talking about sites like the NATO Investment Division Portal, the NATO Standardization Office, and—ironically, given that this is the second time SiegedSec has claimed to have gotten its hands on internal NATO docs—the NATO Lessons Learned Portal.
«NATO: 0 Siegedsec: 2,» wrote the hackers on their Telegram post claiming the breach, boasting that «The astonishing siegedsec hackers have struck NATO once more!!1!!!»
«We tend to have fun breaching intergovernmental alliances between large nations :p,» continued the post, before getting into the details of the sites SiegedSec claims to have hacked and posting a link to a download page for the data the group says it's purloined.
The SiegedSec Telegram page doesn't go into much detail about the group's motivations, but it does proudly say the group is made of «gay furry hackers,» and makes ample use of the ":3" emoji as if to drive that point home.
The group's claim to have gotten into NATO's web portals is just one of many on its page. In other posts, the group says it's gotten into the government web portal for the South African OR Tambo district and «the government servers» from the «Pemalang region of Indonesia.» The group says it «doesn't really like any government entity,» which might go some way to explaining the motivation for targeting NATO, too.
But NATO is mostly keeping schtum about it, and didn't tell The Register anything about the validity of SiegedSec's claim beyond saying it was «actively addressing» unspecified incidents affecting some unclassified websites.
I've reached out to NATO, which is not something I often have to do in my job, and I'll update if I hear back.
The organisation did say that «Additional cyber security measures have been put in place» and that there hasn't been any «impact on NATO missions, operations, and
The recent breach at Okta gave hackers the opportunity to try and infiltrate password manager 1Password and internet infrastructure provider Cloudflare.
A known vulnerability in the file-archiving tool WinRAR continues to proliferate because not enough users are installing the patch, according to Google.
The FBI is warning about an extortion scheme involving hackers targeting plastic surgery offices to steal data on patients.
If you ever wished that Into the Breach was less giant robots and more Fire Emblem, I’ve got a treat for you. Tyrant’s Blessing provides exactly that, and it’s out right now on Android.
Pokemon Go is always packed with limited-time events and Research Tasks. Some are free to join, while others require you to purchase a ticket to participate. Greavard Wig Partner Research is now available in Pokemon Go and here’s how you can get involved.
A critical flaw in Cisco’s software has paved the way for mass exploitation of the company’s network devices.
By Jay Peters, a news editor who writes about technology, video games, and virtual worlds. He’s submitted several accepted emoji proposals to the Unicode Consortium.
Cloud gaming provider Shadow PC has suffered a data breach after a company employee accidentally downloaded malware to play a game.
When it comes to PC gaming, there is a wide assortment of digital marketplaces where you can obtain the latest title releases. However, easily the biggest out of the bunch is Steam. So, that’s an easy target for hackers who are seeking files to compromise. A new report has revealed that Steam was recently compromised, and developer accounts were the targets. These attacks were used to insert malware into game update files to infect countless players when the targeted game finished updating. Fortunately, the attack was stopped rather quickly, and fewer than a hundred Steam users were compromised.
Give me an elegant roguelike with an interesting premise and I’ll go missing for days, repeating runs ad infinitum. The upcoming Cobalt Core almost had me under that trance with its interstellar take on Slay The Spire’s deck-building, but the Steam Next Fest demo ended just before I got trapped in its moreish loop.
French technology company Shadow has confirmed a data breach involving customers’ personal information.
Valve has added extra security measures for developer accounts on Steam after hackers updated several games with malware.