<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:yandex="http://news.yandex.ru" xmlns:media="http://search.yahoo.com/mrss/" xmlns:turbo="http://turbo.yandex.ru" version="2.0">
	<channel>
		<title>IT</title>
		<link>https://14.stf365.com</link>
		<language>ru</language>
		<item turbo="true">
			<title>Unauthorized access to domain infrastructure management system</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/tt0po2e131-unauthorized-access-to-domain-infrastruc</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/tt0po2e131-unauthorized-access-to-domain-infrastruc?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:03:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Unauthorized access to domain infrastructure management system</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">Something odd is happening in STFware's infrastructure today: users can't access their usual services, and software updates are being installed during work hours. Company employees can't work and are off to grab a coffee while the admins try to figure out what's up. Looks like one of the Windows infrastructure management tools has been hacked. Now, the company's software deployment, virtualization, and monitoring processes are all disrupted, and the security department is checking to see if employees' computers have been infected.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Redirection of website visitors to malicious web server</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/h72ccbi4b1-redirection-of-website-visitors-to-malic</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/h72ccbi4b1-redirection-of-website-visitors-to-malic?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:03:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Redirection of website visitors to malicious web server</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">Security specialists at STFware, a leading tech company, recently detected a cyberattack on their infrastructure, where the hackers managed to access the public domain DNS zone. The incident is currently being investigated. There are suspicions that the Open City portal, which citizens use to access government and commercial services, has also been compromised: the attackers began redirecting all the website visitors to their own web server. As of now, it is unclear if any of the website users have been affected; still, STFware's reputation took a major hit.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Takeover of company&#039;s domain infrastructure</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/0dxy0afp41-takeover-of-companys-domain-infrastructu</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/0dxy0afp41-takeover-of-companys-domain-infrastructu?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:04:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Takeover of company's domain infrastructure</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">This past Monday, news broke of a cyberattack on STFware, one of the leading tech companies in State F. The incident was discovered during a routine audit, when the cybersecurity experts detected suspicious network activity. It turned out that unknown intruders gained access to the backup copies of STFware's most critical servers. The company managed to regain control of its infrastructure and now focuses on mitigating the consequences, but the story had already been leaked online. While STFware's clients are confused, the investigation is ongoing, and the true extent of the damage will only become clear in the coming weeks or months. But it is obvious even now that the company has lost some critically important information.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Leak of information on internal infrastructure of client companies</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/bxyb0v7tf1-leak-of-information-on-internal-infrastr</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/bxyb0v7tf1-leak-of-information-on-internal-infrastr?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:05:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Leak of information on internal infrastructure of client companies</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">News that shocked the tech world: highly sensitive information on the internal infrastructure of numerous STFware clients (including VPN configurations, passwords, and network architecture details) is currently up for sale on the dark web. An investigation revealed that STFware had recently been targeted in a massive hacker attack. The intruders struck gold when they managed to access information on the systems of the top corporations. As expected, the response from the clients was immediate and extremely negative. Many companies have already cut ties with STFware and initiated emergency audits of their systems.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Corporate loyalty program misuse</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/h65hsaimv1-corporate-loyalty-program-misuse</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/h65hsaimv1-corporate-loyalty-program-misuse?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:05:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Corporate loyalty program misuse</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">In a recent cyberattack, a hacker group broke into the corporate portal of STFware. Their target? The information intended for new employees, including loyalty programs and corporate bonuses. One might wonder what hackers could be after on this portal—the corporate training schedule? The corporate dress code? Nope, you guessed it, they were after something much more valuable—around 100 promo codes for delicious hot pizza from the CyberPepperoni Express pizzeria chain. After the incident, the loyalty program was suspended. The employees are very frustrated, and the security service is working on patching up the vulnerabilities in the system.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Compromise of user files</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/es9x0klgs1-compromise-of-user-files</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/es9x0klgs1-compromise-of-user-files?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:06:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Compromise of user files</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">Today, many residents of the City woke up to discover that their work-related files, personal photos, and other important documents were gone. That's because the public cloud service used by 80 percent of the City's dwellers was hacked. According to one resident who wanted to download her wedding photos, she clicked the link but only found a few pictures of capybaras instead. It's even more frustrating for those who've stored their passwords in the cloud as their credentials are now in the hands of the perpetrators. "The main downside of storing data on a remote cloud server is that it's hard to keep it confidential," an STFware administrator says. For now, the affected residents can only hope that their data will be of no interest to the hackers.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Disruption to API for interacting with virtual servers</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/2pfumg8jv1-disruption-to-api-for-interacting-with-v</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/2pfumg8jv1-disruption-to-api-for-interacting-with-v?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:07:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Disruption to API for interacting with virtual servers</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">The largest tech company in State F fell victim to a cyberattack. Unidentified intruders breached the internal service used for communication by STFware administrators and tech support specialists, compromising its key component—the API, which is essential for connecting the company's clients to its virtual servers. As a result, access to crucial resources was denied. The issue persisted until the consequences of the attack were fully resolved, causing prolonged downtimes for clients. Many customers have already decided to part ways with STFware.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Web application source code leakage</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/ergmgocjg1-web-application-source-code-leakage</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/ergmgocjg1-web-application-source-code-leakage?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:07:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Web application source code leakage</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">Another scandal in the cybersecurity world: STFware, a leading tech company, was targeted by attackers. Reliable sources claim that a hacker group infiltrated the company infrastructure and extracted the source code of EnterpriseConnect, a flagship video conferencing app. Developed from scratch by STFware, this app was considered one of the most secure solutions on the market and was widely used by a number of companies in State F. Now that user security has been compromised, STFware's clients are seriously concerned about the situation. Hackers might find vulnerabilities in the code and exploit them in future attacks, which may lead to colossal reputational and financial damage for the company.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Takeover of secure development platform</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/ur8ypcjjg1-takeover-of-secure-development-platform</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/ur8ypcjjg1-takeover-of-secure-development-platform?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:08:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Takeover of secure development platform</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">STFware, a leading tech company in State F, has recently announced the launch of its brand-new product. Now users can deploy their applications (regardless of the programming language used in development) in STFware's cloud infrastructure. In the announcement, the company's tech experts assured everyone that their platform is a true gem for developers because it's not only fast but also secure, and code execution generally requires an isolated protected environment. But in the very first week of active use, the platform fell victim to a cyberattack. The investigation revealed that the service had been breached by experienced hackers, who escalated their privileges and went beyond the isolated environment. This gave them complete control over the platform, which other users immediately noticed. STFware's reputation is in serious trouble. Customer trust is shattered, and many are already refusing to use the company's services and turning to competitors.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Access to saved user data on platform</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/xao71d3881-access-to-saved-user-data-on-platform</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/xao71d3881-access-to-saved-user-data-on-platform?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:09:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Access to saved user data on platform</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">Another controversy in the tech community: after a massive hacker attack on STFware, thousands of developers found that their code was leaked to the public. It turned out that all the victims were using STFware's cloud environment to launch their applications. Prior to this, the company had assured its clients of the absolute security of their data, but in reality, all of the developers who signed up for its services ended up losing their intellectual property. STFware is facing legal action. Many of its partners and major clients have decided to terminate their cooperation for good.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Deposit of illegal tokens to account</title>
			<link>https://14.stf365.com/wiki/it/office/en/tpost/y55mvyxr01-deposit-of-illegal-tokens-to-account</link>
			<amplink>https://14.stf365.com/wiki/it/office/en/tpost/y55mvyxr01-deposit-of-illegal-tokens-to-account?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:09:00 +0300</pubDate>
			<category>IT company office</category>
			<turbo:content>
<![CDATA[<header><h1>Deposit of illegal tokens to account</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">A platform by STFware that allows users to run applications in the cloud was exploited by a scammer. To access the computing resources, the clients must purchase special tokens. While monitoring user activity, STFware discovered that someone had been using a lot more resources than normal over the course of a month. It was later revealed that this user had not actually purchased any tokens and just exploited a vulnerability in the platform to increase their balance without spending any money. As of now, it's still unclear how many users may have done the same. While the investigation is in progress, one thing is for sure: the platform has already cost the company a lot of money in damages.</span></div>]]>
			</turbo:content>
		</item>
		<item turbo="true">
			<title>Injection of malicious code into application source code</title>
			<link>https://14.stf365.com/wiki/it/mfc/en/tpost/3eijmng861-injection-of-malicious-code-into-applica</link>
			<amplink>https://14.stf365.com/wiki/it/mfc/en/tpost/3eijmng861-injection-of-malicious-code-into-applica?amp=true</amplink>
			<pubDate>Mon, 25 Nov 2024 00:10:00 +0300</pubDate>
			<category>Multifunctional Center</category>
			<turbo:content>
<![CDATA[<header><h1>Injection of malicious code into application source code</h1></header><div class="t-redactor__text"><strong style="color: rgb(81, 153, 255);">Event description</strong></div><div class="t-redactor__text"><span style="color: rgb(255, 255, 255);">The cybersecurity department at STFware detected an unauthorized access to the Security Scanner application code. This new application runs on all internal network hosts, scans the installed programs, and reports vulnerabilities to the security department. The perpetrators inserted their own code into the application, which enabled them to execute commands on any computer in the company's network and read any files. Moreover, the hackers altered vulnerability reports delivered to the security department so that staff members were unaware of the threat. STFware will now have to inspect all of its infrastructure as no one knows how much of it has been compromised.</span></div>]]>
			</turbo:content>
		</item>
		</channel>
</rss>