☑️ S2W DDW Weekly Highlights in October W4
🔍 U.S. New York States Military Documents Leaked on Dark Web
• Confidential documents from New York’s Military Department, covering Army, Navy, and Air Force operations, have been listed on BreachForums.
• On October 22, threat actor "303" from the CyberNiggers group disclosed the breach, targeting the agency overseeing New York’s armed forces and National Guard.
• The threat actor claims responsibility for the October 2022 breach, sharing document samples with screenshots of internal records.
🔍 South Korean Automotive Supplier’s Groupware Access Listed for Sale
• An access listing for the groupware of a South Korean automotive supplier has surfaced on BreachForums, offering entry to the company’s integrated work platform.
• On October 21, threat actor "svidetelstvo" claimed this network access pertains to a key supplier for Hyundai, Kia, General Motors, and Nissan, with annual revenues reportedly reaching KRW 100 billion.
• The seller asserts that the access enables viewing of internal databases, email accounts, and decryption capabilities for encrypted files.
• No sample data or pricing was provided, and transactions are being conducted exclusively in Monero, with potential buyers expressing interest.
🔍 Pro-Russian Hactivists Target Japan Over US-Japan Military Drills
• A pro-Russian hacktivist group recently launched cyberattacks on Japanese government and corporate websites, reportedly in retaliation for U.S.-Japan joint military exercises.
• NoName057(16) executed DDoS attacks on approximately 60 Japanese sites between October 14-20, citing opposition to the “Keen Sword 25” drills conducted by the U.S. Marines and Japan’s Maritime Self-Defense Force.
• Attack participants are reported to be verified affiliates loyal to Russian interests.
If you want to read more, follow the newsletter as below and visit S2W Inc. website to contact us.