Ecuador's legislature says hackers attempted to access confidential information | The Record from Recorded Future News

Ecuador's legislature, the National Assembly, reported that it suffered two cyberattacks on Monday aimed at disrupting its systems and accessing sensitive data. In 2023, Ecuador’s national election agency reported that cyberattacks originating from seven different countries disrupted online voting for citizens living abroad. In January, Ecuador’s national civil registry, which manages vital records including birth, marriage, and death certificates, reported a cyberattack on its computer systems and website. The attack on Ecuador's legislature occurred just a week after the Latin American country held its general election, in which right-wing President Daniel Noboa failed to secure an outright majority. Earlier this week, Ecuador’s Radio Pichincha reported that its systems were attacked by the hacker group Cyber Hunters, temporarily disrupting the main page of its website. In 2021, Ecuador's largest private bank, Banco Pichincha, suffered a cyberattack that disrupted operations and took ATMs and the online banking portal offline. “Despite constant harassment and attacks, we remain standing—firm and unwavering in our commitment to our audience—which has positioned us as one of the most widely reaching media outlets nationwide and a benchmark in electoral coverage,” the statement said. The agency said in a statement that it “will not give in to mafias” and remains committed to securing its systems and protecting citizens’ rights. The assembly said in a statement that it was able to quickly “identify and counteract the situation” but did not provide further details about the impact of the incident or the threat actor behind it. In a statement, the broadcaster urged international organizations that defend press freedom to take note of the “multiple attacks” it has faced over the past six years. The attack disrupted online services, primarily affecting the appointment scheduling system for identity cards and passports.

This Cyber News was published on therecord.media. Publication date: Tue, 18 Feb 2025 18:00:26 +0000


Cyber News related to Ecuador's legislature says hackers attempted to access confidential information | The Record from Recorded Future News

Ecuador's legislature says hackers attempted to access confidential information | The Record from Recorded Future News - Ecuador's legislature, the National Assembly, reported that it suffered two cyberattacks on Monday aimed at disrupting its systems and accessing sensitive data. In 2023, Ecuador’s national election agency reported that cyberattacks originating ...
3 weeks ago Therecord.media Hunters
Fortifying confidential computing in Microsoft Azure - I wrote about how Microsoft used Intel's secure extensions to its processor instruction sets to provide a foundation for confidential computing in Azure a few years ago. In the years since, the confidential computing market has taken a few steps ...
1 year ago Infoworld.com
North Korea's Kimsuky Attacks Rivals' Trusted Platforms - North Korea-linked threat groups are increasingly using living-off-the-land (LotL) techniques and trusted services to evade detection, with a recent Kimsuky campaign showcasing the use of PowerShell scripts and storing data in Dropbox folders, along ...
3 weeks ago Darkreading.com Andariel Kimsuky
Dragos Expands ICS Platform with New Acquisition - "We grew pretty fast to become the de facto solution in the electric industry as the OT network visibility and segmentation analysis solution, which is extremely important in the case of compliance for the regulation in this industry," ...
5 months ago Darkreading.com
UAE, Saudi Arabia Become Plum Cyberattack Targets - Hacktivism-related DDoS attacks have risen 70% in the region, most often targeting the public sector, while stolen data and access offers dominate the Dark Web. With the UAE and Saudi Arabia increasingly invested in digitization, AI development, and ...
5 months ago Darkreading.com
How This Security Firm's 'Bias' Is Also Its Superpower - "We are helping our clients simplify their strategies and align them to their actual business objectives so that they have a much easier and more efficient approach to developing not just minimum viable security for whatever their product is, ...
1 month ago Darkreading.com Equation
How Public & Private Sectors Can Better Align Cyber Defense - Over the past 25 years, organizations like the FBI's Internet Crime Complaint Center (IC3), the National Cyber Investigative Joint Task Force (NCIJTF), and the Cybersecurity and Infrastructure Security Agency (CISA) have been created. Uncovering ...
1 month ago Darkreading.com
'Sex life data' stolen from UK government among record number of ransomware attacks - Data on the sex lives of up to 10,000 people was stolen from a British government department in one of the record number of ransomware attacks to have hit Westminster in the first half of this year. It is not known which department the information ...
1 year ago Therecord.media
Why We Need to Cultivate a Confidential Computing Ecosystem - Researchers have been working on solutions for runtime security for years now. Computing data and deriving value from it - while also preserving its privacy - is no small challenge. The industry is tackling runtime security on all fronts - we've seen ...
1 year ago Securityboulevard.com
Russian Groups Target Signal Messenger in Spy Campaign - But the tactics the threat actors are using in the campaign could well serve as a blueprint for other groups to follow in broader attacks on Signal, WhatsApp, Telegram, and other popular messaging apps, GTIG warned in a blog post this week. The other ...
3 weeks ago Darkreading.com Turla
CEO of Ukraine's largest telecom operator describes Russian cyberattack that wiped thousands of computers - In the two months since Russia-linked hackers attacked Ukraine's largest telecom operator, many questions have emerged about how they gained access to the company's systems and lingered there, likely for months, undetected. During a cybersecurity ...
1 year ago Therecord.media
Malware Takedowns Show Progress, But Fight Against Cybercrime Not Over - Takedown of malware infrastructure by law enforcement has proven to have an impact, albeit limited, on cybercriminal activity, according to threat intelligence provider Recorded Future. The Emotet takedown, led by Europol and Eurojust in 2021. The ...
1 year ago Infosecurity-magazine.com
DOGE access to Social Security, IRS data could create privacy and security risks, experts say | The Record from Recorded Future News - Concerns about DOGE’s activities at the IRS are being amplified by the lack of transparency about what exactly is being accessed and why, especially since the executive order creating DOGE indicated the group would be attempting to modernize IT and ...
3 weeks ago Therecord.media
Ukraine-Russia Cyber Battles Have Real-World Impact - "The evolution of cyberattacks and malware, particularly those that have an intersection with the use of generative AI, have lowered the barrier for entry for threat actors, leading to more threats and a greater volume of attacks," he says. ...
5 months ago Darkreading.com
Australian IVF provider Genea confirms hackers accessed patients' healthcare data | The Record from Recorded Future News - One of Australia's largest fertility services providers, Genea, said on Wednesday that data stolen during a recent cyberattack on its systems had been published online by hackers. According to local media reports, people struggled to reach the ...
2 weeks ago Therecord.media
Xerox Printer Vulnerabilities Enable Credential Capture - "Since LDAP and SMB settings on MFP devices typically contain Windows Active Directory credentials, a successful attack would give a malicious actor access to Windows file services, domain information, email accounts, and database systems," ...
3 weeks ago Darkreading.com CVE-2024-12510 CVE-2024-12511
Ukraine security services involved in hack of Russia's largest private bank - Ukrainian hackers collaborated with the country's security services, the SBU, to breach Russia's largest private bank, a source within the department confirmed to Recorded Future News. Last week, two groups of pro-Ukrainian hackers, KibOrg and NLB, ...
1 year ago Therecord.media
The Future of AI Safety: What California's Vetoed Bill Means - Although the veto was a setback for the bill, it highlights key debates in the emerging field of AI governance and the potential for California to shape the future of AI regulation. With the rapid advancement of AI technology, California's ...
5 months ago Darkreading.com
An Italian journalist speaks about being targeted with Paragon spyware | The Record from Recorded Future News - In an interview with Recorded Future News, Cancellato said he is not sure if Prime Minister Giorgia Meloni’s government is tied to the incident, though Paragon has reportedly ended its contract with Italy. [We found] a lot of antisemitic and racist ...
1 month ago Therecord.media
12 Software Dev Predictions for Future - Predicting the future of software development trends is always a tough call. Such trends will also rule the future of the software development industry. Analyzing these future software development trends will put enthusiasts ahead of the competition. ...
1 year ago Feeds.dzone.com
Open Source AI Models: Big Risks for Malicious Code, Vulns - Companies pursing internal AI development using models from Hugging Face and other open source repositories need to focus on supply chain security and checking for vulnerabilities. While the attacks appeared to be proofs-of-concept, their success in ...
1 month ago Darkreading.com
North Korea Profits as 'Stonefly' APT Swarms US Co's. - Researchers at Symantec's Threat Hunter Team said this week that the state-sponsored group it tracks as "Stonefly" (aka Andariel, APT45, Silent Chollima, and Onyx Sleet) is flaunting an indictment and a $10 million bounty from the US ...
5 months ago Darkreading.com Andariel
CVE-2025-21706 - In the Linux kernel, the following vulnerability has been resolved: mptcp: pm: only set fullmesh for subflow endp With the in-kernel path-manager, it is possible to change the 'fullmesh' flag. The code in mptcp_pm_nl_fullmesh() expects to ...
55 years ago Tenable.com
Reachability Analysis Pares Down Vulnerability Reports - Because only 10% to 20% of imported code is typically used by a specific application, determining whether the code is reachable by an attacker — and thus likely exploitable — can dramatically reduce the number of vulnerabilities that need to be ...
5 months ago Darkreading.com
Hackers pose as e-sports gamers online to steal cryptocurrency from Counter-Strike fans | The Record from Recorded Future News - According to a new report by cybersecurity firm Bitdefender, scammers are hijacking YouTube accounts to impersonate professional CS2 players, including Oleksandr 's1mple' Kostyliev, Nikola 'NiKo' Kovač and Danil "donk" ...
2 weeks ago Therecord.media

Latest Cyber News


Cyber Trends (last 7 days)