GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Kim Zetter (kimzetter@infosec.exchange)

  1. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Saturday, 25-Apr-2026 23:30:07 JST Kim Zetter Kim Zetter

    The mystery around a cyberattack against Venezuela's state-run oil company last December deepens with the discovery this week of a "highly destructive" wiper that may have been used in the attack. Previous reports had indicated that the December attack was a ransomware incident. But the wipr found this week was compiled last September, and hard-coded into it is the domain for Petróleos de Venezuela (PDVSA) , the state-run oil company. The hard-coded domain means the attackers had designed their precision weapon to only destroy data on the oil company's systems, not on any other system outside the company's domain. My story is below. Please consider becoming a paid subscriber if you like my work.

    https://www.zetter-zeroday.com/hwiper-targeting-venezuelas-state-oil-company-discovered/

    In conversation about 12 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: storage.ghost.io
      Mystery Around Venezuelan Cyberattack Deepens, with New Discovery of "Highly Destructive" Wiper
      from @KimZetter
      The mystery around a cyberattack that struck Venezuela's state-owned oil company in December is growing, following an announcement by researchers this week that they had discovered a "highly destructive" wiper program that appears to have been designed to target the oil company and may have been used in the December
  2. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Saturday, 25-Apr-2026 22:56:17 JST Kim Zetter Kim Zetter

    Iranian hacktivists hit US medical device maker Stryker with a "severe" attack that wiped systems and shut down global operations for the company. The hacktivist group, Handala, claim they hit the company in retaliation for the US bombing of a girls' school in Iran and that they struck more than 200,000 of Stryker's servers, systems and devices and remotely wiped many of them. https://www.zetter-zeroday.com/iranian-hacktivists-strike-medical-device-maker-stryker-in-severe-attack-that-wiped-systems/

    In conversation about 12 days ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: storage.ghost.io
      Iranian Hacktivists Strike Medical Device Maker Stryker in "Severe" Attack that Wiped Systems
      from @KimZetter
      Stryker, a leading maker of medical devices, was hit early this morning with a cyberattack that has reportedly caused the company's systems to shut down globally. The company has acknowledged the attack and called it "severe" in communication with employees. A known Iranian hacktivist group named Handala posted messages on
  3. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Wednesday, 18-Feb-2026 07:08:20 JST Kim Zetter Kim Zetter

    When a hacker who goes by the names "Waifu" and "Judische" began posting death threats against security researcher Allison Nixon, she had no idea why he targeted her. So she set out to unmask him. The quest led her to uncover the identity of Connor Riley Moucka, a 25-yr-old Canadian who was ringleader of the infamous Snowflake/AT&T hacks as well as Cameron John Wagenius (aka Kiberphant0m
    online), an active-duty US Army soldier, who both were arrested. Here's my story, as well as a free link below that.

    https://www.technologyreview.com/2026/02/16/1132526/allison-nixon-hackers-security-researcher

    https://archive.is/20260216131016/https://www.technologyreview.com/2026/02/16/1132526/allison-nixon-hackers-security-researcher

    In conversation about 3 months ago from infosec.exchange permalink
  4. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Tuesday, 27-Jan-2026 23:36:23 JST Kim Zetter Kim Zetter

    The Booz Allen tech contractor behind Treasury Department's unprecedented decision yesterday to cancel all 31 of its contracts with the consulting firm, took the job with Booz Allen - much like Edward Snowden before him - specifically to get access to IRS tax records of President Trump and leak them. And not only Trump's records, he stole the tax records of more than 400,000 other individual and corporate taxpayers -- leaking some of these to the media as well. All of this contributed to the Treasury decision yesterday. https://www.zetter-zeroday.com/booz-allen-tech-contractor-took-irs-job-specifically-to-leak-trumps-tax-records/

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.zetter-zeroday.com
      Booz Allen Tech Contractor Took IRS Job Specifically to Leak Trump's Tax Records
      from @KimZetter
      The US Treasury Department announced yesterday that it was canceling all contracts it holds with consulting firm Booz Allen Hamilton because the company failed to prevent one of its contractors from stealing and leaking tax records years ago when he was working on behalf of the firm for the Internal
  5. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Saturday, 24-Jan-2026 13:22:32 JST Kim Zetter Kim Zetter
    • ESET

    Exclusive: A cyberattack targeting Poland's energy infrastructure in December used wiper malware that would have erased grid computers and rendered them inoperable had it not been thwarted, a researcher at @ESET told me. The researcher calls the attack "unprecedented" for Poland and "substantial."

    https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper/

    In conversation about 3 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.zetter-zeroday.com
      Cyberattack Targeting Poland’s Energy Grid Used a Wiper
      from @KimZetter
      A cyberattack that targeted power plants and other energy producers in Poland at the end of December used malware known as a “wiper” that was intended to erase computers and in an operation that was intended to cause a power outage and other disruption to services, says European security firm
  6. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Tuesday, 30-Sep-2025 05:17:13 JST Kim Zetter Kim Zetter

    Tile device-finding tags, unlike Apple/Google tags, broadcast their MAC address and unique ID unencrypted, letting stalkers, Tile or law enforcement track people/items, per new study done by security researchers. Tile stores all of this location information in a database on its servers. The tag's anti-theft mode also undoes its anti-stalking protection - making any tag put in anti-theft mode invisible to someone doing a scan to detect rogue tags being used to stalk them. My story for Wired:

    https://www.wired.com/story/tile-tracking-tags-can-be-exploited-by-tech-savvy-stalkers-researchers-say/

    In conversation about 7 months ago from infosec.exchange permalink
  7. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Tuesday, 09-Sep-2025 07:09:20 JST Kim Zetter Kim Zetter

    Posting this because the email address is so ridiculous (and yet people probably clicked on it anyway). WSJ published a story yesterday about hackers from China posing as House committee chair Rep. John Moolenaar to send a phishing email to trade groups, law firms and U.S. government agencies. I got hold of the email and the sender address is: johnmoolenaar.mail.house.gov@zohomail.com

    https://www.wsj.com/politics/national-security/china-trade-talks-spy-5c4801ca

    In conversation about 8 months ago from infosec.exchange permalink

    Attachments


  8. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Friday, 08-Aug-2025 04:00:10 JST Kim Zetter Kim Zetter

    Two years ago when researchers found and publicly exposed an intentional backdoor in a TETRA encryption algorithm used to secure radio communications for police/military/intel agencies around the world -- the algorithm involved a key advertised as one strength but secretly reduced to 32 bits -- the European organization that produced the algorithm told users that to secure their communications they could deploy an end-to-end encryption solution on top of the backdoor'd algorithm. Now the same researchers say they found a security problem with the end-to-end solution as well -- another reduced key. Here's my story for Wired:

    https://www.wired.com/story/encryption-made-for-police-and-military-radios-may-be-easily-cracked-researchers-find/

    In conversation about 9 months ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.wired.com
      Encryption Made for Police and Military Radios May Be Easily Cracked
      from Kim Zetter
      Researchers found that an encryption algorithm likely used by law enforcement and special forces can have weaknesses that could allow an attacker to listen in.
  9. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Wednesday, 21-May-2025 13:49:32 JST Kim Zetter Kim Zetter

    The UAE has been trying to recruit Pentagon workers displaced by DOGE to move to Abu Dhabi to work on AI for the UAE's military. A UAE brigadier general met last month with two former staffers of the Defense Digital Service who have worked on US classified projects and tried to recruit them and their entire DDS team to move to Abu Dhabi. The general was apparently given permission by the Pentagon to recruit the members of Defense Digital Service -- who resigned enmasse from their jobs last month due to DOGE --- despite warnings last year from US spy agencies and federal lawmakers that the UAE could share AI tech with China and despite the UAE's disturbing history of recruitment of US workers. Remember Dark Matter when the UAE recruited former NSA operators/analysts to work on cybersecurity jobs only to have them help UAE spy agencies hack other nations, members of the royal family and dissidents and journalists? One of the people from the UAE who assisted with the recruiting of DDS workers has ties to Dark Matter. Here's my story:

    https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.zetter-zeroday.com
      UAE Recruiting US Personnel Displaced by DOGE to Work on AI for its Military
      from @KimZetter
      A UAE brigadier general received permission from the Pentagon to recruit former members of the Defense Digital Service to work on artificial intelligence for the UAE military — despite past warnings from US spy agencies and federal lawmakers that UAE could share AI technologies with China
  10. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Thursday, 17-Apr-2025 12:55:22 JST Kim Zetter Kim Zetter

    Chris Krebs has quit his job at SentinalOne to launch a legal and public relations fight against Trump and the presidential memo Trump he signed against Krebs last week. "Krebs said he understood why some have kept a low profile and tried not to further anger the president. But he said he disagreed with that approach. "I don’t think this lay-low-and-hope-this-blows-over approach is the right one for the moment we’re in."

    Miles Taylor who was also targeted by Trump said "the memos targeting him and Krebs were 'punishment for dissent' and that he too planned to fight back.... 'How we respond will set the tone inevitably for how others targeted by these EOs decide to respond.”

    https://www.wsj.com/politics/policy/chris-krebs-trump-cybersecurity-executive-action-31cb99cb

    In conversation about a year ago from infosec.exchange permalink
  11. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Wednesday, 05-Mar-2025 00:49:01 JST Kim Zetter Kim Zetter

    Two seemingly blockbuster stories published on Friday that reported that the Trump admin had ordered US Cyber Command and CISA to "stand down" on their work to detect and counter Russian cyber threats. But new info has come out to contradict the stories or qualify them. I dug into what we know and don't know. As always, if anyone has any additional information related to these stories, please contact me on Signal at KimZ.42.

    https://www.zetter-zeroday.com/did-trump-admin-order-u-s-cyber-command-and-cisa-to-stand-down-on-russia/

    In conversation about a year ago from infosec.exchange permalink
  12. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Wednesday, 19-Feb-2025 03:40:30 JST Kim Zetter Kim Zetter

    The National Science Foundation fired nearly 170 workers this morning in Zoom call. This included workers who had already cleared their one-year probationary period only to have it changed to two years earlier this month, putting them in line for termination. It also included at-will permanent workers -- the latter were not among those designated for firing by the Trump administration; instead NSF decided on its own to eliminate them. Here's my story:
    https://www.wired.com/story/national-science-foundation-february-2025-firings/

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: media.wired.com
      National Science Foundation Fires 168 Workers as Federal Purge Continues
      from Kim Zetter
      Firings at the NSF included permanent employees who had already completed their one-year probationary period, as well as at-will workers.
  13. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Saturday, 15-Feb-2025 18:13:48 JST Kim Zetter Kim Zetter

    DHS fired more than 400 employees today, including 130 people from CISA. If you work or worked for CISA or have information about what's going on there, you can reach me on Signal at KimZ.42

    https://abcnews.go.com/Politics/dhs-cuts-405-employees-workforce/story?id=118847047

    In conversation about a year ago from infosec.exchange permalink
  14. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Friday, 07-Feb-2025 05:35:47 JST Kim Zetter Kim Zetter

    Have tips? Story ideas? Something you think I should know about?

    Reach me on Signal at KimZ.42

    I cover cybersecurity and national security, writing about: nation-state hacking, espionage, cyber warfare, cybercrime, and policy. I don't write about companies - unless they've done something wrong.

    In conversation about a year ago from infosec.exchange permalink
  15. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Thursday, 06-Feb-2025 23:59:08 JST Kim Zetter Kim Zetter

    In a first-ever report from the intelligence community, the US government has revealed that it disclosed 39 zero day vulnerabilities to vendors/public to be patched rather than keep them for NSA/CIA/FBI to exploit in hacking operations. The report, however, doesn't say how many zero days the gov discovered in 2023 that it kept to exploit. And ten of the 39 it did disclose that year, it had already kept secret for an unknown number of years to exploit before deciding to disclose them in 2023. Here's my story: https://www.zetter-zeroday.com/u-s-government-disclosed-39-zero-day-vulnerabilities-in-2023-per-first-ever-report/

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.zetter-zeroday.com
      U.S. Government Disclosed 39 Zero-Day Vulnerabilities in 2023, Per First-Ever Report
      from @KimZetter
      What the government didn't reveal is how many zero days it discovered in 2023 that it kept to exploit rather than disclose. Whatever that number, it likely will increase under the Trump administration, which has vowed to ramp up government hacking operations. In a first-of-its-kind report, the US government has
  16. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Thursday, 09-Jan-2025 05:52:16 JST Kim Zetter Kim Zetter

    Last month as drones over NY/NJ made headlines, a radiation-monitoring site reported spikes in radiation in NY, seemingly supporting a theory that the drones were tracking a dirty bomb on the loose there. Only the spikes were fake. I wrote about how the fake info got reported and how it spread on social media

    https://www.zetter-zeroday.com/anatomy-of-a-nuclear-scare/

    In conversation Thursday, 09-Jan-2025 05:52:16 JST from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: www.zetter-zeroday.com
      Anatomy of a Nuclear Scare
      from @KimZetter
      How fake radiation readings in New York and New Jersey, coupled with a mysterious drone swarm, fueled a nuclear scare and became a harbinger for things to come The ongoing mystery around a New Jersey drone swarm ignited a number of theories last month about who owned the drones and
  17. Embed this notice
    Kim Zetter (kimzetter@infosec.exchange)'s status on Thursday, 16-Feb-2023 20:26:44 JST Kim Zetter Kim Zetter

    New law in Belgium allows "ethical" hackers to hack Belgian companies without their permission. The law requires hackers to report any vulnerabilities they find within 72 hours of discovering them. "You can't just test the security of a system and then say nothing about it afterwards."

    Hackers also are prohibited from asking for a bounty "otherwise it is the same principle as asking for a ransom."

    "There are more than 3,000 ethical hackers in Belgium. They will be able to see whether the data of an average citizen is properly secured. If the government comes up with a corona app, ethical hackers can now legally test it."

    https://www-vrt-be.translate.goog/vrtnws/nl/2023/02/14/ethische-hackers-mogen-meer-door-nieuwe-wet/?_x_tr_sl=fr&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp

    In conversation Thursday, 16-Feb-2023 20:26:44 JST from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: images.vrt.be
      Ethische hackers mogen dankzij nieuwe wet Belgische bedrijven hacken zonder toestemming: "Kijk hier al 10 jaar naar uit" 
      from https://www.facebook.com/vrtnws/
      Ethische hacker Inti De Ceukelaire vertelt in "VRT NWS laat" wat er precies verandert.

User actions

    Kim Zetter

    Kim Zetter

    Journalist - cybersecurity/national security. Author COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World's First Digital Weapon. Speaker/Signal. Newsletter is called Zero Day. Find it here: https://www.zetter-zeroday.com/. Become a paid subscriber to help support my independent journalism.

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          99022
          Member since
          16 Feb 2023
          Notices
          17
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.