• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking Computer security Cyber Security data security Device security Intruders Latest Cybersecurity News Windows security

US-based entity trains hackers to crash Russian Servers

William Marshal Posted On March 6, 2022
0



US-based entity trains hackers

Hackers across the world are working together to crash (DoS) Russian servers with the Bluekeep Vulnerability flaw that was reported a few years back. Also, a Ukraine-based cybersecurity firm called Cyber Unit Technologies is rewarding hackers with $100,000 to crash Russian websites.

There are several sites online that is training and helping fellow hackers to understand certain skills and how to breach Russian infrastructure. Here is the the site called Hackers Arise, that goes by the title ‘Become a CyberWarrior’ and shows how to crash Russian servers by exploiting the known Bluekeep vulnerability.

US-based entity trains hackers to exploit Bluekeep vulnerability

Here’s how they are motivating and training hackers to exploit Russian flawed infrastructure,

“Putin’s brutal invasion of Ukraine must be stopped. While the Ukrainian people are having bombs dropped on their heads and are living without heat and electricity, those of us with the skills and knowledge are obligated to do what we can from our warm, cozy offices and homes. Remember, Putin will not stop with Ukraine!” said Perfect Privacy.

‘Perfect privacy’ is owning hackers-arise.com and is located in Jacksonville, Florida as per Who.is search. This Bluekeep was reported to be critical then as it enables attackers to perform remote code execution on the systems. Also, it can be also used to cause Blue Screen of Death (BSOD) on the targeted devices thus resulting in Denial of Service (DoS).

They ask and train the hackers to find these vulnerabilities in the Russian infrastructure using the Shodan and Metasploit application. When you search for the same you will find the following,

US-based entity trains hackers
Source: Hackers Arise

The above image shows two modules with the bluekeep vulnerability when searching via the Metasploit. In this the hacker-arise asks the trainees to choose the auxiliary module to crash the server.

msf5> use auxiliary/scanner/rdp/cve_2019_0708_bluekeep

US-based entity trains hackers
Source: Hackers Arise

Then they need to find the vulnerable bluekeep module and crash the server.

msf> set RHOSTS 192.168.1.101 (replace this with IP of the Russian server)

msf> run

There are some minor steps in between to detect the vulnerable devices/modules and act upon them to crash the systems. You can find the entire step to exploit bluekeep vulnerability in the Hackers Arise site.

msf5 > set ACTION Crash

msf5 > run

After executing the above command, the Metasploit reports that the target has been crashed.

This is just one training piece from Hackers Arise, there are several other articles training the amateurs, intermediates, and others to hack into Russian infrastructure. After the final step, the BSOD can be confirmed as show below,

We at The Cybersecurity Times wanted to share this information, as we believe in communicating everything that’s happening in the cyber world and we do not endorse or appreciate Hackers Arise or their actions.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, and Twitter.

You can reach out to us via Twitter/ Facebook or mail us at admin@thecybersecuritytimes.com for advertising requests.

Share the article with your friends


Cybersecuritydata securityHackers Arise BlueKeep vulnerabilityhackingUS-based entity trains hackers


Author

William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

You may also like
Recast Software: Advanced Endpoint Management and Security Tools for IT Teams
November 16, 2024
Patch My PC: Streamlined Software Management for ConfigMgr and Intune
November 9, 2024
Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
November 4, 2024
Leave A Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Recast Software: Advanced Endpoint Management and Security...
      November 16, 2024
    • Patch My PC: Streamlined Software Management for ConfigMgr...
      November 9, 2024
    • Best Microsoft Intune Alternatives: Top 5 MDMs to Consider
      November 4, 2024
    • Top 11 Log Management Tools for Efficient System Management
      September 20, 2024
    • Top 5 Threat Intelligence Tools For 2024
      September 19, 2024


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search