Hacker – techtrendfeed.com https://techtrendfeed.com Thu, 26 Jun 2025 03:40:02 +0000 en-US hourly 1 https://wordpress.org/?v=6.7.2 Hacker Who Stole Lawmaker Knowledge From Insurance coverage Market Charged https://techtrendfeed.com/?p=3919 https://techtrendfeed.com/?p=3919#respond Thu, 26 Jun 2025 03:40:02 +0000 https://techtrendfeed.com/?p=3919

Cybercrime
,
Fraud Administration & Cybercrime

‘IntelBroker’ Faces 4-Depend Indictment in Manhattan Federal Court docket

Hacker Who Stole Lawmaker Data From Insurance Market Charged
The U.S. District Court docket of the District of Southern New York, the place Kai West faces 4 costs associated to a years-long hacking spree. (Picture: Bumble Dee/Shutterstock)

A hacker recognized on-line as “IntelBroker” and who has a historical past of spilling delicate data faces a four-count felony indictment in the US after French police arrested him in February.

See Additionally: Why Cyberattackers Love ‘Residing Off the Land’

IntelBroker’s true id is British nationwide Kai West, U.S. federal Manhattan prosecutors stated Wednesday. They’re in search of his extradition to the US for conspiracy to hacking, wire fraud and conspiracy.

The announcement of West’s indictment comes after information broke in France that authorities rounded up suspected directors of once-notorious, now-defunct stolen information market BreachForums (see: French Police Reportedly Bust 5 BreachForums Directors).

IntelBroker was a high-profile presence on BreachForums, which recognized him from final August by January as the positioning’s proprietor. IntelBroker introduced his retirement on social media in January. West has additionally led a hacking group generally known as “CyberN******.”

IntelBroker claimed accountability in March 2023 for hacking into the web medical health insurance market utilized by members of Congress and residents of Washington, D.C. (see: Hackers Promote US Lawmaker Knowledge Stolen From Insurance coverage Market).

In a hacking spree that started in January 2023 and lasted by to his arrest, West and his co-conspirators prompted $25 million in losses, a grievance in opposition to him states.

Amongst IntelBroker’s hacks is the January 2023 theft of U.S. wi-fi telecom UScellular buyer information stolen from a 3rd get together. In April 2024, he claimed to have hacked right into a U.S. federal authorities contractor (see: US State Division Investigating Hacking Claims).

He additionally focused a nationwide grocery supply service and a division of Common Electrical that works on collaborative initiatives with the Protection Superior Analysis Tasks Company.

Investigators stated they caught West by shopping for $250 price of stolen information from him by Bitcoin. Tracing the transaction led them to the Ramp crypto buying and selling platform – the place West registered utilizing his driver’s license. Investigators obtained an electronic mail tackle and located that West apparently accessed it from the identical IP tackle used to hold out penetrations. West additionally used the identical electronic mail tackle to register his X social media account as he did to enroll in a VPN.

West additionally apparently loved studying about himself, in line with YouTube historical past information included within the federal grievance in opposition to him. He watched a video in April 2024 about one in all his information leaks, and in January 2024 he repeat watched a 16 minute video purportedly with IntelBroker that claimed the hacker spoke Serbian and Russian however not English. About 3 times between January 2024 and Could 2024, he watched a video containing information clips about his exploits set to digital music.

West is not going to be the one alleged hacker to face prosecution in New York federal court docket. The grievance in opposition to him states that a minimum of one different suspected co-conspirator “is predicted to be first introduced and arrested within the Southern District of New York.”



]]>
https://techtrendfeed.com/?feed=rss2&p=3919 0
Hacker Claims Breach of Examine Level Cybersecurity Agency, Sells Entry https://techtrendfeed.com/?p=890 https://techtrendfeed.com/?p=890#respond Tue, 01 Apr 2025 01:50:40 +0000 https://techtrendfeed.com/?p=890

A hacker working beneath the alias “CoreInjection” is claiming accountability for the breach of Israeli cybersecurity firm Examine Level, alleging entry to delicate inner knowledge and community methods.

The hacker printed their claims on Breach Boards on Sunday, March 30, 2025, and introduced the sale of the stolen content material for a value of 5 Bitcoin ($434,570). The hacker emphasised that the value is “agency and non-negotiable,” with cryptocurrency being the one accepted type of fee. events have been directed to make contact by way of the TOX messaging platform.

Within the discussion board itemizing, CoreInjection stated the info on the market contains:

  • Inside challenge documentation
  • Consumer credentials, each hashed and in plaintext
  • Inside community maps and structure diagrams
  • Supply code and compiled binaries of proprietary software program
  • Worker contact particulars, together with telephone numbers and e mail addresses
Hacker Claims Breach of Check Point Cybersecurity Firm, Sells Access
The screenshot exhibits what the hacker (CoreInjection) is providing. (Screenshot credit score: Hackread.com)

Examine Level Responds

Shortly after the publish gained consideration, Examine Level issued an announcement denying any latest breach of this scale. In accordance with the corporate, the declare pertains to an “previous, recognized and really pinpointed occasion” that affected a restricted variety of organizations and didn’t contact any core methods.

“This was dealt with months in the past and didn’t embody the outline detailed on the darkish discussion board message,” Examine Level stated in an announcement. “These organisations have been up to date and dealt with at the moment, and this isn’t greater than the common recycling of previous info.”

The corporate insists there was no safety menace to its clients, infrastructure, or inner operations. They clarified that the affected portal didn’t contain manufacturing environments or methods containing delicate structure.

Hacker Claims Breach of Check Point Cybersecurity Firm, Sells Access
Screenshots shared by the hacker present what they’re providing and what could be accessed (Screenshot credit score: Hackread.com)

Who’s CoreInjection?

CoreInjection is a comparatively new participant in cybercrime however has shortly made a reputation for itself by concentrating on essential infrastructure and high-profile networks, notably in Israel. The hacker’s first look on Breach Boards was on March 15, 2025, and since then, they’ve posted 5 listings providing community entry to numerous firms.

Their earliest publish was for entry to an industrial equipment and tools admin panel for a U.S.-based firm, priced at $100,000. However the sample that emerged shortly after factors to a particular geographic focus: Israel.

On March 16, CoreInjection claimed to be promoting entry to the community and administration emails of an Israel-based worldwide automotive firm. In accordance with the itemizing, the entry contains “full management over the corporate’s Israeli community infrastructure,” with a price ticket of $50,000.

Two days later, on March 18, one other itemizing surfaced, this time providing “Full System Entry to a Outstanding Digital Display Firm” based mostly in Israel. Priced at $100,000, the itemizing described entry to a central server answerable for managing a big stock of digital shows throughout procuring malls. The publish highlighted that the entry allowed “instantaneous content material and propagation,” successfully enabling real-time management over public show methods.

That element alone raises flags for cybersecurity consultants. Teams linked to Iran, Hezbollah, and Palestinian hacktivists have a historical past of concentrating on CCTV cameras, tv feeds and public-facing screens, usually defacing them with political messages. If CoreInjection’s declare is correct, the sale of such entry may open the door to related high-visibility assaults.

On March 20, one other itemizing adopted; this time for an Israeli firm within the electrical merchandise sector. CoreInjection claimed to have an “unique and up-to-date buyer and order database” from the agency, with the asking value set at $30,000.

Hacker Claims Breach of Check Point Cybersecurity Firm, Sells Access
Different posts from the hacker present what they’re providing to events.
(Screenshot credit score: Hackread.com)

Altogether, CoreInjection’s listings recommend a targeted marketing campaign with a transparent sample: high-value entry, essential methods, and a robust curiosity in Israeli infrastructure. Whether or not working independently or as a part of a broader effort, the hacker’s actions have drawn consideration in each underground boards and the cybersecurity neighborhood.

Questions Stay

Regardless of the corporate’s reassurance, the hacker’s detailed description of the alleged stolen supplies has raised considerations. The point out of inner community diagrams, plaintext credentials, and proprietary software program may level to deeper entry than Examine Level admits if the info is real.

A number of questions are nonetheless unanswered. If that is certainly an previous occasion, why was it by no means publicly disclosed on the time it occurred? Transparency is anticipated, particularly from a cybersecurity vendor of Examine Level’s dimension. The shortage of particulars about how the incident occurred additionally leaves a spot in understanding the character of the breach. Was it a misconfigured portal, a credential compromise, an insider menace, or one thing else fully?

Moreover, Examine Level hasn’t addressed whether or not they’ve recognized the strategy of breach or if they’ve any suspects linked to the occasion. With out that info, it’s tough to evaluate whether or not the menace has been totally contained or if there’s an ongoing menace.

This incident comes at a time when cybercriminals are more and more concentrating on cybersecurity distributors themselves, usually exploiting smaller missteps to escalate into larger breaches. Whether or not CoreInjection’s claims maintain weight or not, the state of affairs exhibits that even companies specializing in protection aren’t protected from menace actors.



]]>
https://techtrendfeed.com/?feed=rss2&p=890 0