Anonymous ID: b674f0 April 17, 2019, 5:42 p.m. No.6216832   🗄️.is 🔗kun

https://www.indiewire.com/2019/04/the-good-fight-cbs-clarifies-image-assassinate-trump-1202059152/

 

“The tweet showed a screengrab from the show’s fictional NSA office, including a list of standalone ‘target words’ the series’ NSA characters should look out for while conducting anonymous wire taps in an effort to protect the President and the public. However, the tweet was regrettably posted without that context, in an effort to direct fans to find an ‘Easter Egg’ clue, in reference to a past character on ‘The Good Wife,’ Kalinda, listed in the second column of the list, and the fact that the NSA is still monitoring her in the fictional world of the show.”

“The post was perceived very differently than the intended result and has since been removed.”

Anonymous ID: b674f0 April 17, 2019, 5:48 p.m. No.6216893   🗄️.is 🔗kun

https://www.zdnet.com/article/source-code-of-iranian-cyber-espionage-tools-leaked-on-telegram/

In an incident reminiscent of the Shadow Brokers leak that exposed the NSA's hacking tools, someone has now published similar hacking tools belonging to one of Iran's elite cyber-espionage units, known as APT34, Oilrig, or HelixKitten.

The hacking tools are nowhere near as sophisticated as the NSA tools leaked in 2017, but they are dangerous nevertheless.

Victim data also dumped online

The tools have been leaked since mid-March on a Telegram channel by an individual using the Lab Dookhtegan pseudonym.

Besides hacking tools, Dookhtegan also published what appears to be data from some of APT34's hacked victims, mostly comprising of username and password combos that appear to have been collected through phishing pages.

Hacking tools:

  • Glimpse (newer version of a PowerShell-based trojan that Palo Alto Networks names BondUpdater)

  • PoisonFrog (older version of BondUpdater)

  • HyperShell (web shell that Palo Alto Networks calls TwoFace)

  • HighShell (another web shell)

  • Fox Panel (phishing kit)

  • Webmask (DNS tunneling, main tool behind DNSpionage)