It took a hacker two and a half hours to steal thousands of personal data from Endesa customers. Endesa took a week to notify

Endesa Energy has confirmed a cyberattack on its trading platform that has exposed critical information of millions of customers. The breach includes identity documents, bank accounts and data from electricity and gas contracts, which places those affected at risk of fraud and identity theft. What exactly happened. A cybercriminal has managed to circumvent the security measures of Endesa’s commercial platform and access sensitive customer information related to their energy contracts. According to has recognized the company in communications sent to those affected, during the security breach contact information, ID and IBAN numbers from bank accounts would have been extracted. The company ensures that the access passwords have not been compromised. The magnitude of the incident. The hacker responsible, who identifies himself as “Spain,” posted on January 4 on BreachForums, a popular forum in the dark webdetails of the attack claiming to have obtained more than 1 TB of information corresponding to more than 20 million people, according to reported the Digital Shield medium. The cybercriminal assured this medium that he had gained access in less than two and a half hours, and has gone so far as to leak data samples from a thousand clients to demonstrate the authenticity of the stolen information. What type of data is at stake. The hacker claims to have obtained basic personal data (names, surnames, postal addresses and contact information), financial information (IBAN, billing data and account history), energy data (CUPS, active electricity and gas contracts, supply point information) and regulatory data. The risks for clients. Although Endesa considers it “unlikely” that the theft will result in “a high-risk impact on the rights and freedoms of users,” the company warns of several real dangers in its official statement. Cybercriminals could try to impersonate customers, post the data on digital forums, or use it for phishing and spam campaigns. Josep Albors, Director of Research and Awareness at ESET Spain, explains that “the risk does not end with the notification of the breach” and that the exposed information can be reused for months or years to launch targeted fraud. Endesa’s response. The energy company has taken almost a week to publicly acknowledge the incident since the leak became known. The company claims to have immediately activated security protocols, blocked compromised access and notified the competent authorities of the case. In addition, it has enabled telephone lines to resolve doubts: 800 760 366 for Endesa Energía customers and 800 760 250 for those of Energía XXI, its distributor in the regulated market. We have contacted the company to find out more information about it, so we will update the article in case of news. What should those affected do? The problem with this security breach is that the data is surely used for advertising campaigns. phishing and targeted spam. As explained by ESET, the first thing we should keep in mind as affected parties is to distrust any communication that appears to come from Endesa and that includes links, attachments or urgent requests, always contacting the company through official channels. This has not been the case, but it never hurts to frequently review bank accounts to detect unauthorized movements and change passwords, even if the company claims that they have not been compromised, activating security protocols whenever possible. two factor authentication. Free and useful websites like ‘Have I Been Pwned‘ allow us to check if the data has appeared in other known breaches by entering our email. The extortion attempt. According to account According to Escudo Digital, the hacker has tried to negotiate directly with Endesa through emails, although at the moment he has not set a specific ransom figure. The cybercriminal, who says he is not affiliated with any group of ransomware known, has received offers from third parties of up to $250,000 for half of the database, although he claims to have not sold anything yet. “I prefer to wait for Endesa to decide,” he told the media. A worrying trend. Just like they count From the media Expansión, this attack places Endesa on the growing list of large Ibex 35 companies that have suffered cyberattacks in recent months. Companies such as Iberdrola, Iberia, Repsol and Banco Santander have been victims of similar incidents that have compromised customer data. And they have not been the only ones, since cyberattacks and data leaks They are now much more common. In the case of Endesa it seems that we will have to wait for the company to offer more information on the matter. Cover image | Endesa In Xataka | OpenAI just assumed an uncomfortable truth about AI browsers: there is one type of attack that is impossible to block

The countries of northern Europe are full of offshore wind. So they’ve started to steal the wind from each other

The world has thrown itself into the arms of renewables to meet the goals of decarbonization. Each country is developing its strategy And, if in some the photovoltaic takes the lead, in others it is the wind that splits the cod. The problem is the commitments: fill the plate field implies that crops receive less sunlight. And fill the world with wind turbines – apart from visual impact, for fishing and for the birds-, is causing something as curious as it is problematic. Countries that are stealing the wind from their neighbors. Wake effect. When the wind hits the wind turbine bladesthese rotate, generating kinetic energy and electricity. The wind continues its path, but after passing through a wind turbine, it does so with less force. Multiply that by fields full of these mills and we have what is known as the ‘wake effect‘ or ‘wake effect’. This air that has already passed through a wind turbine station does so with a lower speed and greater turbulence. And if this is important, it is because the wind takes time to recover: the wakes can extend more than 100 kilometers after crossing a field of windmills. wind thieves. These facilities are usually far from each other to better take advantage of the currents, but if under certain circumstances they extend tens of kilometers, and up to the aforementioned hundred, imagine the consequences for the wind turbines that remain behind that installation that receives the first “hit” of wind. It is not an assumption: there is measurements by SAR satellite that confirm that, if a wind farm is built upwind of another, the wind speed it receives is 9% lower, causing it to have a reduction between 10% and 20% compared to that first installation. This is what is known as “wind theft,” a colloquial term for something that is easy to understand, but not so easy to fix. This GIF of The Telegraph illustrates it perfectly: Princess Elisabeth. As we read in BBCthe lawyer Eirik Finseras, specialized in offshore wind energy, “is a somewhat misleading term because you cannot steal something that you cannot own. Nobody owns the wind” – del Sol, yes, a Galician -. But of course, the fact that no one owns the wind does not exempt that park on the windward side from suffering the effects of the park built on the leeward side. In the North Sea, this is already becoming a problembecause the denser and larger the wind farm, the more intense the wake effect will be. Belgium is building Princess Elisabeth, a huge park that will add a whopping 3.5 GW of offshore wind capacity to the country’s accounts. It is a really huge offshore facilitybut although it will allow the addition of those 3.5 GW, it will also affect the existing Belgian parks due to a wake that will extend 55 kilometers beyond the installation. According to the accounts of the University of Leuven, the oldest Belgian facilities located to the east will experience: An 8.5% reduction in annual electricity production. Losses of up to 15% on very windy days. Impact. That in Belgian parks, but of course, it is also an international problem because the wind does not understand borders. By 2030, it is estimated that the current capacity of offshore wind energy in the North Sea will triple. This implies that thousands of turbines will be erected in a very short time with Belgium, Germany, Denmark and the Netherlands willing to obtain, in total, 65 GW of offshore wind energy. The problem is knowing what will happen to these trails, since it is estimated that the 1,400 MW installation in the Dutch area of Borssele will cause a reduction of 2.7% on average in some Belgian wind farms. It is a very clear case of how the Netherlands is “stealing” the wind from Belgium. It is logical to understand the interest in offshore wind Bigger blades. In a report by BBCPablo Ouro, a civil engineering researcher at the University of Manchester, points out that they have been seeing wake effects for years, but that “the problem is that, to achieve emissions neutrality, we will need to triple offshore wind capacity and some of these new turbines will operate very close to those already in operation. There will be more and more crowds and the wake effects will have a greater impact.” And it is no longer a question of the number of mills, but of their dimensions. In the North Sea we are seeing efforts to achieve both greater heights for the mills themselves (to take advantage of other currents that are not being taken advantage of right now, such as larger blades that receive even more force from the wind. They are imposing mega-constructions that will also affect this wake effect, aggravating the problem. Solutions? Different countries are doing calculations. For example, in the United States, esteem that the planned offshore wind farms will produce a devastating wake effect: losses in the annual electricity production of other farms by up to 48.5 TWh per year. And there are already accusations: the Netherlands says that Belgium takes advantage of its wind, Germany says that the Netherlands is harming them… and the United Kingdom’s offshore parks stealing wind each other. The solution? Nothing simple, especially when many of these parks have either already been built or are under construction, but even so, research is being carried out to optimize the facilities. For example, adjusting turbine angles and optimizing the space between them, manufacturing higher power turbines to produce more with less or creating buffer zones between parks And, perhaps, the most difficult thing: that countries cooperate to carry out joint studies to place their facilities in the most efficient way for everyone. Images | ESMAP, G B_NZ In Xataka | In the great battle for wind turbines, Spain goes against Europe: it wants them further away than ever

“Steal everything from grandmothers”

GoogleXcoder is the alias from the 25-year-old Brazilian arrested in Cantabria a couple of weeks agoaccused of directing the largest operation of phishing banking that Spain has suffered. His group, ‘Team GXC’, cloned 35 financial institutions and emptied the accounts of thousands of clients. The Civil Guard arrested him along with six other members of the network after more than a year of monitoring. Why is it important. This case marks a turning point in Spanish cybercrime. The GXC did not only steal: according to a report by The Worldthey also rented their tools to other criminals for up to 900 euros a day. The multiplier effect turned each day into dozens of banks supplanted and millions stolen. His name on Telegram sums up the philosophy: “Steal everything from grandmothers.” The method. They combined phishing traditional with malware for Android, a double scam that nullified any security barrier: First, they captured bank details through fake websites. The malware then collected additional documents, digital signatures, and passwords. With that arsenal, they emptied accounts without leaving any apparent trace. The investigation. Group-IB, a cybersecurity firm that collaborates with Interpol, detected the threat in 2023. Anton Ushakovhis head of investigations in Europe, alerted the UCO of the Civil Guard when he confirmed that Spain was the epicenter. For months they tracked IP addresses bouncing around global servers until they located the mastermind: a digital nomad who changed provinces every few weeks. GoogleXcoder used stolen identities for its phone lines and cards. He lived with his family, constantly moving between provinces, believing himself to be invulnerable. The agents followed him while they gathered enough evidence. They hunted him in San Vicente de la Barquera, a town with less than 4,000 inhabitants, with their devices full of evidence as well as wads of cash. The UCO has published both the moment of his arrest and a recording of the tool used: The scope. The network operated from Spain but its tentacles reached Slovakia, the United Kingdom, the United States and South America. Six people directly linked fell in simultaneous operations in Valladolid, Zaragoza, Barcelona, ​​Palma, San Fernando and La Línea. The forensic analysis of their cryptocurrencies took more than a year due to the complexity of the network. The collaboration between Group-IB and the UCO sets a precedent: Until now, private cybersecurity companies mainly worked with Europol or Interpol. This time, identifying a specific threat against Spain, they shared findings directly with national forces. The result: one of the largest operations against cybercrime in our country, as recognized by the UCO itself. In Xataka | They seemed like useful tools for WhatsApp Web, but they were part of a large spam campaign Featured image | UCO

Thus it is possible to steal information from companies without anyone knowing

Notion’s new 3.0 version is updated with quite interesting changesalso introducing the fashionable now, Artificial Intelligence Agents that can execute complex tasks autonomously. However, it also opens the door to a critical vulnerability. And it is that those who come with not very good intentions can take advantage of a simpler technique than it seems to extract and send confidential data to external servers with the help of those same AI agents. The background problem. As they point out from Codeintegritymodern AI agents combine three elements that make them a potential threat: ability to use tools on their own, autonomous planning of actions and access to sensitive corporate information. In this way, when an attacker manages to manipulate the agent’s instructions, he can execute chains of complex actions that can end up dodging traditional security controls of companies. Image: Codeintegrity How the attack works. Through article Published by Codeintegrity, its researchers have shown that the process can end up being very simple. First, the attacker creates an apparently harmless PDF document. However, within the archive hide a text with malicious instructions that deceive the agent of the “important routine task” of the internal system. An invisible trap. The malicious text uses psychological manipulation techniques, presenting itself as a critical task that must be completed to avoid “consequences” in the company, also using technical terminology to seem legitimate and implying that the action is “pre -authorized” by safety. When the user asks the notion agent to summarize the document, he reads the hidden instructions and interprets them as genuine orders of the system. Data leakage. Once activated, the agent seeks confidential information in the user’s notion pages, as the Prompt had sent it, and concatena in a malicious URL previously described. Then use the system web search tool to send a query that contains all that sensitive information to a server controlled by the attacker, where the data is recorded. Scope of the problem. The most worrying thing is that this vulnerability It is not limited to PDF files Uploaded manually. Notion 3.0 integrates connectors with multiple business services such as Github, Gmail or Gira, any of which could be used to inject malicious instructions without the user suspect. Even advanced AI models such as Claude Sonnet 4considered among the safest in the market, have proven to be susceptible to this type of attack. What does it mean for companies. The techniques of ‘Prompt Injection‘They can question the security of any company that manipulates or manages diverse AI agents, since they can execute and plan actions autonomously. Therefore, companies that embrace AI, must also rethink their security protocols and establish new specific controls to tackle these types of problems. Cover image | Zan Lazarevic and generated by AI with Gemini In Xataka | Mark Zuckerberg doesn’t care to lose $ 200,000 million in AI. The real risk would not be betting on it, ensures

how it works and how to avoid this scam to steal money by earning your trust

Let’s explain What is the Like Scama new type of online deception that already Police and Civil Guard have warned. It is a scam that is being given in instantaneous messaging applications such as Telegram and social networks, and that will lead you to steal money after earning your trust. We are going to start the article explaining the mechanics and the procedure of this deception with which thieves earn your trust before Timing you. Then we will give you A series of tips To avoid falling into the trap. How is this scam First, scammers are going to contact you through different platforms, from Telegram to social networks. There, they will propose to you perform simple online tasks in exchange for moneysomething apparently easy that will not take you long. These tasks are things like Give and receive likes on social networksfollow profiles, etc. In exchange for this, they promise you small economic amounts for your time. With this they will feed both your trust and your greed. The tempting of all this is that At first they may pay you In exchange for what you are doing, they will give you small amounts of money. That is when your trust will be gained. When they have already convinced that they can help you earn money with little effort, they will rise to “higher groups”, where they will propose make investments in exchange for a lot of money. When you make these investments, cybercounts will simply disappear keeping your money. In addition, they will also stop paying for any task. And what is worse, the personal data you have given them to make the first payments are also possible to use them to Open bank accounts in your name and get more money at your expense. In addition, there are times when they can ask for money in exchange for continuing with these methods of winning, money that will also take. How to avoid falling this scam The first thing you should always do is distrust any method to earn fast moneysince everyone is usually deception online. It is sweet to be able to win some euros with simple tasks such as giving likes in accounts, but it is also a very common deception. Besides, suspect you who are asking for money or perform major actions. It doesn’t matter if you have been paid something, they are still people who do not know, so if you easily ascend in their ranges to be able to do greater actions, you have to suspect. Another important thing is Never give bank or personal dataand if they ask you right away you must be alert. Finally, no one with good intentions will ask you for money to continue working, even if it is an alleged “bargain” job. You must also suspect est. In Xataka Basics | Scam of the false winner on Facebook: how this scam works when you participate in competitions and how to avoid it

Having an AI browser that does things for you sounds good. Until a hacker uses it to steal all your money

Ask the AI ​​to make a summary of that article that you just saw in Reddit can be very expensive. It is what They just revealed Those responsible for Brave, who have discovered a surprisingly simple way to hack the browser of the perplexity comet to do not only what the user asks, but what an attacker has managed to convince him to do. The danger of leaving everything in the hands of AI is evident. What happened. Brave’s experts, a browser that competes with Chrome or Firefox and also has AI functions, wanted to analyze the risk of using an agetic browser like the one It offers perplexity right now with Comet. And what if they have done it. The browsers with ia promise a lot. Thanks to tools like Comet – Openai too has its chatgpt agentheir of Operator-, It is possible that the browser becomes a kind of digital butler and do things for us autonomously when visiting websites. Thus, you can summarize a news, tell you which song appears in that YouTube video, look for offers, answer emails or complete purchase processes. A priori the advantages are huge, but be careful, because there are also important risks. But be careful to let go of the steering wheel. However, delegating everything in the browser can raise a real threat to the safety and privacy of our data. If we trust them too much, these browsers may have access to all our data, since theoretically they will benefit from access to our email, but also to banking and financial data and even health. What happens if the amazing model or makes mistakes? Or worse: What happens if someone modifies the content in a malicious and invisible way for ia agents to follow malicious instructions? Having the AI. That is just what They discovered in Brave When trying a simple technique. They published a malicious comment on a Reddit thread, and then asked Comet to summarize the article. When they went to do it they verified how Comet did not know whether the content of that thread could or not contain malicious instructions: he simply met them and followed them. And in thread, as can be seen in the video, there were some simple instructions that stole the credentials of their perplexity account and even intercepted the verification code that the platform sent to the user to log in the service. Result: Automatic account by the attacker thanks to the AI. How the attack works. As Brave experts explain, the problem is that the way of hacking this type of browse is not hacking the browsers, but hacking the content, something that is very, very simple. The steps are the following: Configuration: An attack writes Malicious instructions in some content on the web. If you control that site, you can hide instructions using blank text if the background is also white, or in comments or other invisible elements. They can also do it directly “injecting” those instructions through comments in publications on social networks such as Reddit or Facebook. Activation: A user sails to that website and uses the browser with AI. If you do something simple as “Summarize this page“Or ask that certain information be extracted, these malicious instructions are activated. Injection: As the AI ​​processes the information on the page, see those malicious instructions and follow them. It is not able to distinguish whether the content has a malicious purpose or not, and considers everything as part of what you should do at the request of the user. Exploitation: these malicious commands and instructions indicate to the navigator’s tools to perform various actions, such as navigating the user’s bank account, Extract stored passwords In the browser or collect information to a remote server controlled by the attacker. Possible solutions. Those responsible for the study indicate that to protect themselves from these types of problems, agricultural browsers must first differentiate between what the user has asked for and what the user content is. The content of a website “should always be treated as non -reliable.” In addition, the browser with AI should necessarily ask for the user’s interaction to perform certain actions, how to access passwords or perhaps send an email. Restrict permissions to the agetic browser and make good use of Two -step verification systems “With mobile applications such as Google Authenticator, for example,” are also adequate ways to mitigate a problem that can put in many problems the deployment of these tools. Outstanding image | Perplexity, Xataka with mockuuups studio In Xataka | I have tried day, the browser that replaces ARC and bets everything to AI. It hasn’t come out as expected

How it works and how to avoid this method to steal mobiles in summer

Summer arrives, and with the new baking of methods that criminals use to steal. In this case Let’s explain the trap of the false tourist and google mapsa type of thymus that is being seen in cities like Benidorm, and for which it is convenient to be prevented. We are going to start the article explaining the mechanics and the procedure of this deception with which thieves can try to steal your mobile phone. Then we will give you A series of tips To prevent this robbery and to avoid that if they manage to steal your mobile, you can make many misdeeds. How this scam The way of proceeding of thieves is so simple that it is difficult not to fall into the trap. To begin with, a stranger for the street getting through a disoriented tourist That is looking for your hotel. Here, it is normal for us to stop helping. This supposed tourist Ask you to look for your hotel on Google Maps in order to know how to get to him. Then you take out the mobile, unlock it and start looking on Google Maps. That is, just when you unlock the mobile the thief takes ittake it from the hands of a pull and run with the device. The biggest problem of this trick is that The thief takes your mobile already unlockedso you can access your photos, your conversations at WhatsApp or your documents. You can access sensitive information and even impersonate you in WhatsApp chats to ask for things or money from your acquaintances. How to avoid falling into the trap Unfortunately, these types of traps and tricks to steal mobile They are difficult to detectsince they play with our mood to encourage others. The most important thing is be aware that you don’t know the other person and take a series of precautions. The first thing is try verbally Any unknown person instead of quickly getting the mobile. And if there is no choice but to do it, then have well subject the device While you proceed. Pay attention to the movements of the other person, and always try to have two hands on him and have him grabbed hard. Do not trust yourself. There are also A series of precautions to take when you are travelingsince in a tourist city there are more possibilities that there are attempts to rob. For example, Activate additional block for sensitive appsputting an extra layer as a trace block, recognition or even Pin to apps such as the bank, your photos or whatsapp and social networks. Come on, in addition to screen blocking, you activate a specific blockade for apps, something you can do on both Android and iOS. It can be annoying when using them daily, but will save your data if someone steals your mobile already unlocked. Have active mobile location systems to know where you are stealing, and try the mechanisms to block it remote or turn it off so that thieves cannot use it. For this, access from another device will be needed, so you have the family systems configured to be able to block it from the mobile of a spouse or family. In Xataka Basics | Broken rearview scam: how it works and how to avoid the scam in which they hit your car and leave you a note to cheat and steal

They are the players who steal their iconic towels. And with impudence

Wimbledon is tradition. The British tournament that started in 1877 has become one of the great events of world sport and this year introduced a technological novelty: replace line judges for an AI. It is a change that has already brought controversybut there is something that does not change is that players love to steal Wimbledon towels. So much that it has gone from being a headache for the tournament with simple resignation. And the funniest thing is that players have no qualms about detailing their ‘tricks’ to get the coveted loot. Specials? We might think that a towel is nothing with the more than 53 million pounds that are They will distribute This year during the competition, with three million only for the individual and female individual winners. But the towels, protagonists of fights in the stands, are also part of that loot that players want. The two designs this year They are “normal” towels. Manufactured by the British company Christy for 38 years, they measure 133 x 70 centimeters, weigh 500 grams and are made completely cotton. The male towels are always the same, with the “butter” letters and a purple and green design. The female were changing every season (although recently That is over and everyone receives the same) and a cult has been aroused around these towels, which even They announce His designs before tournaments. Bite in towels. As each element of a sport, especially if used by the star you have gone to see, a towel can become a Collection objectlike a ball or a doll. However, we are not talking about the towels being popular only among fans: the real problem of the tournament is with the players. How far? As we read in The Timesthe tournament had about 7,000 towels in stock this year with a single purpose: that they were a tool for players. Until last Thursday, when only the first rounds of the competition had been played, they had already distributed 2,799 towels. The players know that they must return them (not mandatory, but they will be asked for) before going to the locker room at the end of the game, and the All England Club – those responsible for the event – usually do it, but of those 2,799 distributed, only 828 returned to where they should. Modus operandi. The question is how they do it with all the cameras pointing and knowing that the theft of towels is A controversy Internal that the tournament has been dragging for years. The short answer is that the big stars, directly, do not care that the cameras point them. In fact, some tell how several dozens of towels get during their career. At the beginning of the game, each player receives two towels and, if the games lengthen and sweat more, or if it begins to rain, they can ask for an additional chair judge. They are extremely conservative numbers of the tournament because reality is very different. As we read in BBCDjokovic is one of those proper names. He says that, as soon as the game begins, one gets into the racket bag. And, in the middle of the meeting, ask for another due to sweat. Another way is that of Tracy Austin, who said he takes advantage of the rain stops to get some extra and that he usually ends four at the end of the game. So that? For what you are thinking: give it away To friends and family because, as Austin said, it is not enough to buy one of the memories store (they sell the same for 60 euros and that also sells your own Christy Online), it must be the authentic players. And there is no request for requests because it depends on the chair judge and it would be rare for him to refuse. In the end, the one that they use most is that towel with ice inside The big blow. Here are those who have more or less great collections. Djokovic has a good trousseau to give away and Serena Williams also commented on BBC that has towels since 1997 of both women and men. Rafa Nadal is another of the players that each game can end a good booty of towels. The amount of sweat depends on each person and there are times when even We have seen Nadal loading with a garbage bag full of these objects. According to the Official numbersare returned between 15% and 20% of the towels each championship and, although Wimbledon not short of funds, it is estimated that this habit of the players generates losses of $ 160,000. With the greats it is a “joke.” With the “little” no. It seems that the All England Club does not put too much effort to recover the towels of the stars, but in Wimbledon there are also minors who are emerging and there they have taken measures. If you have seen a Wimbledon game in which a white towel is distributed, it is because it is one of the destined to the Junior tournaments and the tennis players invited by the championship. They are given a Wimbledon officer of that year, but the second is white, without any distinctive and, of course, much less glamorous because if you give it to Wimbledon or anywhere else. Resignation. What All England Club is clear is that they will not be chasing anyone. They already ask for the towels back educated, but in this year’s edition, Winston Sedgwick, of the logistics team of the event, said in The Times that players know perfectly that they give towels and that there is no limit. “We used to expect them to return them, that’s why we asked them to try to recover them, but that will no longer be done.” “It’s like when you’re going on vacation and you bring back a souvenir home,” says Sedgwick with resignation. And what I am clear is that I am going to look much … Read more

Israel is not only attacking Iran with missiles. He also just steal 90 million dollars in cryptocurrencies

It is not much less cryptocurrency theft more large in historybut those 90 million dollars are especially significant for whom they are involved and why. Those involved They are Israel and Iran. And why, unfortunately, The war that they maintain both nations. Israel hacking to Iran. The war between Israel and Iran is intensified, and does not only New and striking tactics On the battlefield. It also does it through cyber warmen. A group called Gonjeshke Darande, (predatory sparrow, in a translation from the Persian) Hackeo has been attributed of the Iranian market of Cryptodivisas Nobitex. Possible link to Israel. There is no definitive evidence of a direct link between the Government of Israel and this grip hacker, Sophos experts indicate. Rafe Pilling, Director of Intelligence of Threats in that firm, explained that the cyber attack had all the characteristics of an attack supported by a government. 90? Millions of dollars. The Hacker Group has achieved according to The Guardian steal 90 million dollars, although the page of the Wikipedia Persian edition It indicates that the robbery amounted to 3.76 billion rials, about 47 million dollars, although that money may be stolen from one of the two troonscan wallets destination From Gonjeshke Darende they have also threatened to publish both the company’s internea information and the source code of its cryptodivsis purchase platform. The final amount is not entirely clear, and According to Cointegraph It is exceeding 81.7 million dollars. Cold purses, safe. The attack, They support Nobitexhas allowed to steal the cryptocurrencies of the “hot” purses of the platform, used to facilitate daily transactions. He has not affected cold, safer purses. Nubitex blocked access to the platform as soon as they and those responsible say that “all damages will be compensated through the insurance fund.” In a later message They have revealed that the impact of the attack is “more complex than it was initially estimated.” And above, Internet cuts. From Nobitex they explain that their capacity to respond to cyber attack has also been affected by the cuts in the country’s internet infrastructure, “together with limited access to the facilities due to the current national crisis.” They hope to recover and restore their services in the next 4 or 5 days, but in the meantime the platform is still unable to be accessed. A hacking with political motivation.Yehor Rudytsia, security researcher at the Hacken firm, said in Cintelegraph how this cyber attack is more “a political statement than a robbery with economic motivation.” In fact, according to The Guardian the hackers have “burned” those funds storing them in custom addresses (“Vanity Addresses“) that they do not have a known private password or possibility of recovering. For example, a purse such as” 0x0000000000000000000000000000000000000000000000 Transferring cryptocurrencies to this type of addresses is actually destroying them voluntarily by leaving them blocked forever. The hackers have used directions with variations of the term “Jo *** Osterrorists”. Image | Wikipedia | Art Rachen In Xataka | Iran and Israel are starting another war in the background: that of the false images created with AI

The Supreme Court has just resolved who is responsible when you steal all your money for Phishing: the bank

The Supreme Court has just failed in favor of users and against banking in one of the most recurrent issues in recent years: Scams through the Internet. He declares that banking is the main responsible in these cases of fraud, being forced to immediately replenish all money stolen from the client. It is not a user thing. The Supreme Court has confirmed A sentence issued on April 9in which the Civil Chamber rejected the appeal filed by Ibercaja against a resolution issued by the Provincial Court of Zaragoza in November 2022. In this sentence 571/2025 it is underlined that good banking practices require the activation of systems capable of detecting suspicious activities, as well as blocking or verifying high -risk operations. Almost 60,000 euros, back to pocket. Unless it can be demonstrated that the client acted negligently, the bank is obliged to assume responsibility and return the money immediately. In this case, Ibercaja Banco SA must reintegrate a client 56,474.63 euros stolen from his account through Sim Swappinga system to supplant our identity stealing the telephone number. Judge Manuel Almenar Belenguer uses the European Directive before payment servicesas well as the Spanish regulations, concluding that if there is no negligence, the user’s only obligation is to notify the bank about any type of unauthorized operation. The new jurisprudence. This case feels a fundamental precedent since it establishes that, from now on, the banking entities will be the main responsible in cases of Phishing banking. Consequently, they must respond for user -unauthorized operations, thus marking a significant change in customer protection against electronic fraud. “The advances of current technology make relatively easy to design ideal computer systems or applications to detect certain anomalies in the provision of payment services. Operations that, in the case of companies or companies with a concrete corporate purpose, can be described as ordinary, must immediately raise suspicions and give rise to an answer when they affect natural persons outside of such activity.” Banks will no longer have an excuse. Based on Judisprudence, it is stated that contractual clauses that exempt the banking entities of their responsibility with users regarding unauthorized operations must be declared knots. Until now, banks could hide in alleged bad practices carried out by the user, such as having introduced their data on websites or malicious links. After this sentence, they are responsible for any unauthorized operation. A plague with which the government tries to end. Scams per call and SMS are a plague. So much, that the Ministry of Digital Transformation It has been trying to put a brake over a year. He End of commercial calls It arrived in February 2025 under ministerial order, but this is just a tiny part in the cybethaf cake. False calls, Scams by WhatsApp, malware in stores like Google Play, Identity Supplant by SMS… tactics change and evolve to continue having an affectation and result. Recently, The Civil Guard dismantled a network of cybers allegedly led by a 19 -year -old student. User’s responsibility. Despite the additional protection that the clients of the entities will enjoy in case of cybetafa, it falls on the roof of the user not to fall into practices that can end up being considered as negligence. These have not established themselves, but it is worth not introducing our phone, personal email on the websites whose origin we are not clear. In case of using Android, we are also responsible for what we download and where we download it, as well as the permits that we give to the applications. Protecting goes beyond possible money subtractions: it is especially easy to end up giving all our data to cybers. In Xataka | Cybethafa with Word documents as a Trojan horse: how it works and how to protect your personal and financial data

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.