A hacker claims to have breached and backdoored security and antivirus software firm Trend Micro due to 'pseudo-security' as well as SYKES which runs support services for Trend Micro. According to Pastebin and a dump for 'proof' of the breach, the hacker claims to still be in control of a backdoor into the security firm. Antivirus and security firm Trend Micro was the latest victim in what seems like never-ending hacks, dumps and hacker wars. Also named was SYKES, a company that allegedly runs support services for Trend Micro. The SYKES site states that it is “a global leader in providing customer contact management solutions and services in the business process outsourcing (BPO) arena.”@OfficialComrade tweeted a Pastebin link that claims Trend Micro now has a backdoor that the hacker controls and the companies were targeted due to their “pseudo-security.” It also linked to a 156MB dump that when unzipped is about 492MB and contains 28 DBX files.The Pastebin states:Trendmicro & Sykes is a Global Business and Antivirus suite, we’ve targeted them due to their constant lash of pseudo-security. We’ve even got a homebox backdoored. It wasn’t necessarily a matter of priorities, Trendmicro & Sykes are both successful companies and depending on how you look at it, the service does benefit the head of the Internet. Owning Trendmicro & Sykes wasn’t a priority of ours. However, if it was, they would have dug their burial site sometime ago. Sliding towards more recent events, today is June 30th, 2012 and absurdly, I’m monotonous. Why? Because Nowadays, it seems as if everybody is widely concerned with notoriety. New ‘groups’ are emerging, more ‘pigments’ are being infiltrated by demented teenagers so they could feel better about themselves, etc. My demands are written on the palm of my hands; stop. You’re a nuisance. Sliding back to the whole Trendmicro & Sykes testament, we don’t want to be compete pr*cks, so for the companies’ sake, we’ll take baby steps on this one. We’ll release every inch of their Email Database; Inbox, Drafts, Sent Items, Deleted Items, Attachments, and all content in all folders. You’ll need a .dbx file viewer to see the content.While sending winks to the feds via Twitter and Pastebin, @OfficialComrade also released what he calls “proof” of exploiting Bangkok cell towers. The dump references the hacking group and individuals in UGNazi, the hacktivist group who admitted attacking 4chan, CloudFlare, even tossed in the Wounded Warrior Project simply because they disliked The Jester. That, as well as other high profile hacks for profit, snapped a trap around alleged hacker/cybercrook, “Mir Islam, known online as ‘JoshTheGod,’ who law enforcement said admitted to helping UGNazi. In turn, Softpedia reported The Jester took credit for UGNazi’s leader being arrested for suspected credit card fraud. Last week, the FBI arrested “24 suspected hackers in a sting operation spanning four continents that targeted online financial fraud of stolen credit card and bank information.” Reuters reported that Islam “was charged with trafficking in 50,000 stolen credit card numbers. Authorities said Islam had admitted to helping emerging hacker outfit UgNazi, which said it had launched a cyberattack against the microblogging platform Twitter.”Like this? Here’s more posts:The more you encrypt, the more the government breaks into your cloudStudy Finds 1 in 2 Americans are ‘Clueless’ about Webcam HackingTrack the trackers with Collusion: Interview with Mozilla’s Ryan MerkleyMicrosoft ‘sorry’ for raunchy Windows Azure video with dancing girls, bad sexual lyricsSanitize Microsoft Office: How to remove personal metadataThe Future of Drone Surveillance: Swarms of Cyborg Insect DronesMale or female, who’s the better social engineer? Battle of the SExes!Newest Creepy Way to Frame Your Boss on Facebook?Is Microsoft right and W3C wrong about Do Not Track being turned on by default?NSA claims it would violate Americans’ privacy to say how many of us it spied onBill proposes to protect Americans’ privacy from warrantless drone surveillanceFeds investigate who leaked classified Stuxnet cyberattack details to NYTLinkedIn lawsuit, stealing your password via LinkedIn phishing, password reuseGoing Dark in the Golden Age of Cyber-Surveillance?FBI Creates Surveillance Unit to Build Backdoors into the Web Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe