Exclusive: Details of 10.6 Million MGM Hotel Guests Posted on a Hacking Forum
According to Irina Nesterovsky, Head of Research at threat intel firm KELA, the data of MGM Resorts hotel guests had been shared in some closed-circle hacking forums since at least July, last year. The hacker who released this information is believed to have an association, or be a member of GnosticPlayers, a hacking group that has dumped more than one billion user records throughout 2019.
Did You Stay At An MGM Hotel? Data Of 10.6 Million Guests Hacked
Irina Nesterovsky, who heads research at threat intel firm KELA, told ZDNet the hack was believed conducted by an individual associated with GnosticPlayers, a hacking group that has provided more than 1 billion hacked user records.
MGM Resorts Breach Opens Door for California Privacy Penalties
Posts in hacking forums allegedly by NSFW, were found bydarknet threat specialists KELA, according to an emailed statement to CIO Dive from Irina Nesterovsky, head of research at KELA. The firm found the posts, dating back to July 2019 using its proprietary data. According to KELA, NSFW is a “close associate of the Gnosticplayers.”
MGM Customer Data Has Been on Dark Web for Six Months
Irina Nesterovsky, head of research at cyber intelligence firm KELA, claimed that the most recent upload of breached data on nearly 10.7 million hotel customers was simply a repackaged bundle — as often happens on the dark web.
Tokyo 2020: The Dark Web is Hacker Gold
What treasures can hackers find on the dark web, how have these been used in the past, and what might threat actors be planning for Tokyo this summer? Here are the top four threats that KELA’s research team has been monitoring recently on the dark web
Outing Cyber-Criminals Puts a Face on Cyber-Crime
Online threat actors are just plain criminals – like 36-year-old Aleksandr Alekseyevich Korostin from Sigayevo, Sarapul District, Udmurtiya Republic, Russia – hiding behind anonymity as SaNX. – OPINION by KELA Cyber Intelligence Center.
「対米報復はサイバー」 イラン、銀行狙い準備か イスラエル軍元高官が警告
Cyber Gangsters Publish Staff Passwords Following ‘Sodinokibi’ Attack on Car Parts Group Gedia
The threat marks a disturbing change in tactics by the crime groups behind the Sodinikobi ransomware, said Irina Nestrovosky, head of research for Israeli security company and specialist in darknet threat intelligence, KELA, which monitors hacking groups.
Travelex Hackers Shut Down German Car Parts Company Gedia in Massive ‘Cyber Attack’
Maya Steiner, threat intelligence team leader at Kela, said: “This is a continuation of the recent ‘attack and brag’ streak of the group. This is the second time they have released ‘proof’ documents, and the first where they announce that they are starting to release full data from a company that has failed to pay.”
Will This Be the Year of the Branded Cybercriminal?
All businesses evolve and adapt to their environments. Businesses in the Dark Web are no exception. In the burgeoning and nearly unpoliceable business climate that is the Dark Web, it’s only natural that businesses should become more “professional” — both in their revenue models and in their practices. We saw this happen in 2019 and expect even greater movement in this direction in 2020.
Travelex Begins to Restore Foreign Exchange Services Two Weeks After ‘Sodinokibi’ Attack
Irina Nesterovsky, head of research for Israeli security company and specialist in darknet threat intelligence, Kela, which identified the post, said it marked a significant change of tactic for the crime group, which first appeared in April 2019.
“This is the first time that the group behind Sodinokibi published alleged proof of their attack,” she said. “While not mentioning explicitly Travelex – this is definitely a nod towards them and any other company that would be attacked by the operators of the ransomware, and refuses to pay.”
Travelex Hackers Threaten to Sell Credit Card Data on Web
Irina Nesterovsky, head of research for Israeli security company and specialist in darknet threat intelligence, Kela, which discovered the post, said evidence from underground forums strongly linked UNKN to Sodinokibi.
“There is a discrepancy between what Travelex is saying and what these guys claim. You can’t always rely on the predator of the criminal, but there is a high probability they are correct,” she said.
Cybersecurity Predictions For 2020
“Cybercriminals will continue to heavily invest in their businesses as new monetization channels emerge. During the past 3 years, the underground economy has experienced a shift in how cybercriminals are monetizing their end products, from concentrating efforts on manual transactions and listings in markets, to focusing on sales of credentials, network access and sophisticated fraud methods…”
Disney Responds to Disney Plus Hacked Accounts: ‘No Evidence of a Security Breach’
Currently, there are nearly 80,000 compromised Netflix accounts for sale from one single market, on offer for an average one-time payment of $6 per account, according to KELA, an Israeli threat-intelligence provider.
Japan's Quest For Smart Automation Brings It To Israel
Executives from Israeli cyber intelligence firm, KELA Group, which monitors hacking threats in the dark recesses of the Dark Net –recently met with a large Japanese carmaker with news that it was wide open to a particularly vicious hacking attack called WannaCry.
KELA Targeted Cyber Intelligence Announces New Products
KELA Targeted Cyber Intelligence announces a new version of its cyber threat intelligence platform, RADARK, and launches the all-new DARKBEAST search engine.
KELA Group Receives $50M Investment from Vector Capital
The KELA Group (KELA), a rapidly growing, Israel-based provider of advanced cyber intelligence software and solutions, today announced a $50M equity investment from San Francisco-based Vector Capital.
Japan Taking Cues From Israel on Cyber Security
With the internet playing an ever-growing role in society, it is impossible for humans to protect networks and devices alone. The Kela Group has developed a system to automatically detect signs of an attack.