Skip to main content

The Fallout From The Monster Hack

The massive hack at Monster.com which took the details of several hundred thousand people, appears to have happened a few weeks ago, and now the dust is beginning to clear.   Many of those whose details were stolen received an e-mail, purporting to be from Monster, inviting them to download the Monster Job Seeker Tool. Those who did found they’d fallen victim to a ransomware Trojan that encrypted the files on their computer and stole personal data.   Shortly after that, the person would receive an e-mail from the hackers, calling themselves the Glamorous Team, including an attachment called read_me.txt that read:   “Hello, your files are encrypted with RSA-4096 algorithm. You will need at least few years to decrypt these files without our software. All your private information for last 3 months were collected and sent to us. To decrypt your files you need to buy our software. The price is $300. To buy our software please contact us at: [email address] and provide us your personal code [personal code]. After successful purchase we will send your decrypting tool, and your private information will be deleted from our system. If you will not contact us until 07/15/2007 your private information will be shared and you will lost all your data.”   According to Jacques Erasmus, director of malware research at UK-based security company Prevx, it was the worst attack he’d seen.   “It took us about six hours to reverse-engineer the [encryption] algorithm including testing,” said Erasmus. “We made two tools, one to decrypt the stolen data and one to decrypt the files for users.”   He was helped by the fact that he was able to access the dump site where the Glamorous Team had sent their data. That enabled him to learn that about 1,000 computers had been infected. But it wasn’t just home-based individuals who’d been victims. Others included US government departments and multinationals including Hewlett-Packard – total of  257MB of stolen data. Erasmus contacted the FBI and some of the seriously affected companies.   There was plenty of personal data, including an online passport application. The data was logged, even though users had been on a secure browser connections.   “There was an entire biometric profile of a government contractor in the stolen data – details such as eye colour, hair colour, exact measurements and weight,” said Erasmus. “What worried us more was the level of data that was compromised from large US corporations and government contractors. Logins to critical systems, databases and intranet logins were captured. This could be devastating.”   Prevx believes the hackers are based in Russia and are part of a bigger criminal network.  

Digital Trends Staff
Digital Trends has a simple mission: to help readers easily understand how tech affects the way they live. We are your…
TP-Link routers could get banned from the U.S. as early as next year
The TP-Link Archer AXE7800 tri-band Wi-Fi 6E router in a room.

According to the Wall Street Journal, Washington is investigating the most popular home internet router brand due to its possible links to China-backed cyberattacks. The Justice and Defense, and Commerce departments are investigating the router brand, and the Commerce Department is subpoenaing the company.

As the report indicates, the investigation could lead to a potential ban on the popular router brand as early as next year, as the attacks targeted Defense Department suppliers, government organizations, non-government organizations, and think tanks. The ban could be a massive hit for the router brand, which holds about 65% of the U.S. market and, as mentioned in the report, is even a router used by the Department of Defense and NASA.

Read more
The massive LastPass hack from 2022 is still haunting us
LastPass website on a laptop.

Just when you thought the LastPass breach of 2022 was over, we're still learning just how detrimental the hack was. According to blockchain expert ZachXBT and spotted by The Block, $5.36 million was stolen from 40 users in a string of attacks. This is on top of the $4.4 million stolen in October 2023 and $6.2 million earlier this year in February 2024.

The original hack goes back to 2022 when hackers claimed to have accessed LastPass' data, which contained API tokens, customer keys, multifactor authentication seeds (MFA), and encrypted password vaults. Although no official information explains how the breach happened, it's possible that the hacker responsible gained access to information that aided the breach. Hackers forced their way in despite the password vaults being encrypted because users reused weak or previously leaked combinations. This access, combined with the users' weak or reused passwords, led to the various accounts being compromised.

Read more
A game-changing desktop chip may be coming from an unlikely company
AIO tubes on the HP Omen 45L.

Qualcomm planted its flag in the Windows laptop world this year with the Snapdragon X chips, powering some of the best laptops you can buy right now. But could the company do the same in the desktop world? It might sound absurd, but a new leak claims that a Snapdragon X Elite Gen 2 chip is being tested alongside some components that only belong in a tried-and-true gaming desktop.

The leak comes from Roland Quandt, who posted over on Bluesky about an upcoming Qualcomm development referred to internally as "Project Glymur."

Read more