Hacker News

hackinfo delivers the latest news updates related to Security breach, Cyber Crime, vulnerability, Cyber Security and Penetration testing tools and more.

  • Home
  • Beauty
  • Health
  • General
  • About

Recent Post

Total Pageviews

Blog Archive

  • ►  2015 (5)
    • ►  January (5)
  • ▼  2014 (41)
    • ►  December (10)
    • ►  November (1)
    • ►  October (9)
    • ►  September (3)
    • ▼  May (12)
      • Kali Linux website hacked by The GreaT Team
      • New variant of Java RAT can use your Android devic...
      • European Cyber Army leaks 60k credentials compromi...
      • RedHack claimed to have hacked ISP TTNET, Vodafone...
      • Phishing pages trick Steam users to Upload SSFN file
      • Report: Social Security numbers of Nearly 30,000 ...
      • BJP website blocked for Pakistan over repeated hac...
      • How researchers hack Google using XXE vulnerability !
      • Black Hat hacker Farid Essebar arrested in Thailand
      • Power Locker - Cybercriminals attempt to sell New ...
      • 17 year old suspected to be creator of BlackPOS ma...
      • Russian Hacker Rinat Shabayev admits to be creator...
    • ►  April (6)
Design by HunterDevil Copyright © 2014. Powered by Blogger.

Search This Blog

Pages

  • Home

Author

  • hi
  • hotnews.com

Infolinks in Text Ads

Hacker News

Followers

Home » Archives for May 2014

Thursday, May 1, 2014

Kali Linux website hacked by The GreaT Team

Report: When it comes to Security, No ONE is 100% Secure.  Even the world most popular Security-related Linux provider Kali is no exception to this fact.

Earlier Today, a Libyan Hackers group "The GreaT Team(TGT)" have breached the mailing list subdomain of Kali website(lists.kali.org).

The hacker managed to change the descriptions of two lists which was being shown in the front page of the subdomain. One of the description is "Hacked By The GreaT TeAm -TGT ", other one is "Libyan Hackers".

After became aware of the breach, Kali Team immediately take down the entire sub-domain to offline.  The team said it is an inactive sub-domain.

"Looks like our inactive, 3rd party, 0 volume mailing list was hacked. DNS entry removed - back to sleep, problem solved." Kali Team's response to the breach.

It is worth to note that Kali Team has already have a bug bounty program- Researchers who report security bugs in their website will get reward.  But, Security researcher Rafay Baloch who discovered few security bugs in kali website highlighted the fact the "Bug Bounty" didn't help much.

The mirror of the defacement is here: http://www.zone-h.org/mirror/id/22278878

New variant of Java RAT can use your Android device to mine Litecoin

Report: A new variant of old Java RAT "UNRECOM" is being distributed via spam emails, detected by TrendMicro.

One such spam mail is pretending to be from American Express, informs recipients that their account have been suspended due to suspicious activity.

"Attached to this mail is your statement with the irregular activities highlighted. Please fill in the required information in the form also attached, this is required for us to continue to offer you service in a safe and risk free environment" The spam mail reads.

The attachment is none other than the Java Remote Access Trojan.


So, What is New ?
We aware this Java RAT can run on multiple platforms.  Now, it is capable of running on Android Devices. It has also Litecoin-mining plugin.  Other than that, it can capture screenshots and display messages.

In addition, the malware has also APK binder component, means it can be used to take legitimate android apps and turn them into malware.

European Cyber Army leaks 60k credentials compromised from Syrian sites

Report: More than 60,000 accounts details have been leaked by a hacker from European cyber army(ECA) going by handle "Zer0Pwn".


The database dump is said to be compromised from two syrian websites : job.sy and realestate.sy.

Hacker posted a sample data in a paste(http://pastebin.com/7Y13ULux) entitled "ECA vs. Assad" along with a link to full database dump.  The dump contains names, email ids, passwords, phone number and other details.

While the passwords compromised from job.sy are encrypted, the passwords from realestate.sy are in plain text format.

Lee J from Cyber War News analyzed the full database dump and reported that database dumps from realestate.sy contain more than 4000 unique login credentials and database dumps from jobs.sy contains more than 50,000 login credentials.

Some other members from ECA has attacked syrianmonster.com and compromised admin's login credential.

RedHack claimed to have hacked ISP TTNET, Vodafone and Turkcell

Report: The Turkish hacktivist collective RedHack claims to have breached systems of Turkish ISP TTNet(www.ttnet.com.tr), vodafone and leading Turkish mobile operator TurckCell(turkcell.com.tr).


"Customer data of ISP TTNET, mobile operator Vodafone and Turkcell infiltrated and vast amount of data collected from the systems. +"  Hackers announced the hack earlier today.

Hackers claimed to have compromised millions of records from the servers.

"If we are able to reach these info on their systems with our limited resources imagine what can foreign intelligence agency do. These companies have 90% of the population's data on their systems and they can't protect them." Hackers said.

The have dumped(http://justpaste.it/eaml) some of data compromised from TTNet.  The dump only contains the membership details of Ministries, National Intelligence Agency(MIT),and Security Directorate.  Hackers didn't publish the data belong to general public, "as a matter of principle".

The leak contains information such as names, phone numbers, addresses, email IDs and other information.

Hackers said the reason for these breaches is to prove the fact that no one and no system is 100% secure.

"In the coming days we'll continue with those exploiting the country. No public information will be shared. Our people can be at ease." The group said that they will continue the operation

Phishing pages trick Steam users to Upload SSFN file

Report: Is Steam login page asking you to upload SSFN file? Think twice before uploading, because the legitimate steam site never asks you to upload SSFN file.


Steam Guard is extra layer of security.  It will ask you to enter a verification code sent to your email, whenever you try to log in from a computer you haven't used before.

This feature will prevent attackers from taking control of your steam account, even if they know your login id and password.

However, there is new Phishing scam uncovered by MalwareBytes that bypasses the Steam Guard protection.  It tricks users into handing over their login credentials and the SSFN file.

What is SSFN File?
SSFN is the file that avoids you from having to verify your identity through Steam Guard every time you login to Steam on your computer.  If an user deletes this file, he will be asked to verify again and new SSFN file will be generated and stored in your pc.

If you upload your SSFN file to a phishing page, attackers can use this file with username &password to take control of your account.

In a reddit thread, several users have reported that they got fooled by this phishing scam.

"Steam will never ask you to provide any Steam Guard files. If you upload or give a user your Steam Guard .SSFN file, they can gain access to your account without accessing your email account. However, they must know your Steam account password and username to use this file" Valve article about Steam Guard reads.

Report: Social Security numbers of Nearly 30,000 students who enrolled between 1995 and 2012 are at risk following the breach of Iowa State University's network server.


University says they found no evidence that any of the financial information of students or any others files were accessed by the intruders.

Officials at Iowa State University believe the attackers who breached the five departmental servers were trying to use the computing power of the servers to generate virtual currency Bitcoins.

Even though the personal information was not the intended target, the University urges affected students to monitor their financial reports.

Another 18,949 students whose University ID numbers were on compromised servers are being notified about the breach.  However, this data have no use beyond their campus.

The breach occurred on Feb 3rd. On Feb 28th, the University came to know two of their servers were infected. On March 28th, they came to know third server having the personal information were also compromised in the breach.

Law enforcement officials have been notified of the security breach.

BJP website blocked for Pakistan over repeated hacking attacks

Report: The repeated hacking attacks against Bharatiya Janata Party(BJP) websites have forced the authorities to block the access to its official website in Pakistan.


"The owner of this website (bjp.org) has banned your IP address on the country or region you are accessing it from." This is error which is currently being displayed whenever someone tries to access the bjp.org from Pakistan.

At the time of writing, even the BJP's PM candidate Narendra Modi's website(narendramodi.in) has also been blocked for Pakistan and showing some error message.

This move comes after Pakistan hackers targeted BJP related website and defaced BJP's Leader LK Advani's website and Bihar BJP websites in last two days.

The website can be still accessed by users from Pakistan by using proxies to mask their IP addresses.  If the website is secure against all attacks, then there will be need for such wide range of IP blocks except in cases of DDOS attacks. Even then, only individual IPs usually need to be blocked.

Arvind Gupta, BJP IT Cell Heaad, told NewsWeek that the site had been blocked in Pakistan "automatically" as a security measure and they had request CERT-India to unblock the sites.

How researchers hack Google using XXE vulnerability !

Report: What is most secure website? NOTHING.  Even Google is vulnerable to all sort of attacks!

Security researchers and Co-Founders of  Detectify have discovered a critical security vulnerability in Google that allowed them to access Internal servers.

The vulnerability exists in the Google Toolbar button gallery.  The page allows users to customize their toolbar with buttons. It also allows users to create their own buttons by uploading XML file containing various meta data.

Researchers identified this function is vulnerable to XML External Entity vulnerability.

By sending a crafted XML file, researchers are able to gain access to internal files stored in one of Google's product server.  They have managed to read the 'etc/passwd' and 'etc/hosts' files of the server.

By exploiting this vulnerability, researchers could have accessed any files on the Google's server, also they could have done SSRF Exploitation to access internal systems.

Google has rewarded the researchers with $10,000 for finding and reporting this vulnerability.

Black Hat hacker Farid Essebar arrested in Thailand

Report: An infamous international computer hacker Farid Essebar has been arrested on Tuesday in Thailand, at the request of Swiss authorities.

Essebar, also known as Diabl0, 27 year old, who has dual Morocco-Russia nationality, was detained in Bangkok, according to the local news report.

He has been arrested on suspicion of taking part in a cyber crime which involves cracking banking systems and hacking online banking websites.  The breach was resulted in damage of $4 billion to customers in Europe in 2011.

Thailand will send the suspect to Switzerland within next 90 days.  Police are reportedly searching for two other gang members who involved in the breach.

This is not the first time he is being arrested.  In 2006, he was sentenced to two years in prison.  He was accused of spreading Zotob computer worm.  CNN, ABC News, United Parcel service, NY Times and US Depart. of Homeland Security were among those affected by this worm

Power Locker - Cybercriminals attempt to sell New Ransomware called Prison Locker

MalwareMustDie(MMD) Team came across an advertisement in an underground forum where an Individual is trying to sell his new Ransomware, called Power Locker also known as Prison Locker.

The Cybercriminal goes by online moniker "gyx" coded the malware in C/C++ and advertizing the ransomware in various underground forums.

The ransomware in question is said to have many features such as "detecting the Debugger and Virtual Machines in order to avoid being analyzed by security researchers", "Displaying warning window in a new desktop".

At the starting, "gyx" asked others to help him to code the GUI part of the malware and promised to pay them.  Member of MalwareMustDie Team disguised himself as malware coder and had an IRC chat with him. He also managed to get the source code of the malware.  You can find the full conversation here.

MMD Team has doxed the Gyx and collected some interesting info about the identity of the malware author.  The dox leads to a person claimed to be a security researcher who is blogging about security  ("wenhsl.blogspot.in/").  They also identified the twitter account of him(@wenhsl).
The fun fact is that he was also trying to communicate with MalwareMustdie from his twitter account.

17 year old suspected to be creator of BlackPOS malware used in Target data breach

Report: Security firm IntelCrawler has been analyzing the recent massive data breaches of Target and Neiman Marcus.  The company said that it has identified the creator of the malware used in these attacks.

According its report, Sergey Taraspov, a 17-year-old boy from Russia, with Online handle 'ree[4]', allegedly first created the sample of the BlackPos malware in March 2013.

Initially the malware is referred as "Kaptoxa"("potatoe" - in russian slang) which was later referred as "Dump memory grabber" in underground forums by the creator.  "BlackPOS" name came from the title used in C&C communications.

BlackPOS is a RAM scrapping malware totally written on VBScript which is designed to be installed on POS devices and steals all data from cards swiped through the infected system.


Based on its own sources, the organization determined that the first victim of the malware is Point of Sale(PoS) systems in Canada, US and Australia.

He has sold more than 40 builds of his creation to cyber criminals from Eastern Europe and other countries, for $2,000.

The hacker has created several hacking tools including a brute force attack and other malicious tools.  He has also made some money with the training for DDOS attacks and Social network accounts hacking.

However,  the organization said that the real cybercriminals behind the Target data breach were just customers of him.

Update:
After further investigation, IntelCrawler determined that the original BlackPOS malware is Rinat Shibaev.  Sergey Taraspov is actually one of the technical support members.

Russian Hacker Rinat Shabayev admits to be creator of BlackPOS Malware

Report: Last week, cyber security firm IntelCrawler named the 17-year-old Russian "Sergey Taraspov" as creator of the BlackPOS Malware which was used in the Target data breach.

After further investigation, the company update its report saying that 23-year-old Russian hacker named "Rinat Shibaev" is the original author of this malware and Sergey is member of technical support team.


In an interview with Russian news channel LifeNews, Shibaev has admitted that he had developed the BlackPOS(also referred as Kaptoxa) malware.

The hacker says he just took readily available program and developed it with additional features.

He allegedly got help in developing the malware from an unknown person whom he had met online.  However, he said that he doesn't even know in which country the person lives.

The hacker also said that he created it for selling it to others, not to use the application by himself.

Popular Posts

  • popular Image board 4chan hacked
    The next day after Bihar BJP's official website get hacked by hacker claimed to be from Pakistan, the official website of Senior B...
  • NASA and the ESA confirm that the lost Beagle-2 orbiter has been found on Mars
    Back in 2003, a full month before NASA’s Opportunity landed on Mars, the British probe Beagle-2 entered orbit as part of the Mars Expres...
  • NASA’s New Horizons space probe: Powered by PlayStation
    Today is a milestone for the New Horizons probe. The spacecraft, which launched nearly nine years ago, has just begun its official six...
  • NVIDIA DEMOS A CAR COMPUTER TRAINED WITH “DEEP LEARNING”
    Many cars now include cameras or other sensors that record the passing world and trigger intelligent behavior, such as automatic braking o...
  • Chemical-Sensing Displays and Other Surprising Uses of Glass
    An inside look at Corning’s labs suggests what’s next for the inventor of Gorilla Glass. Someday your smartphone might be able to help...
  • Toyota Recalls 20,000 Vehicles For Possible Fuel Leak
    Chevy Motor Corp said it’s remembering about 20,000 automobiles globally over possible energy leaking, Reuters revealed on Friday. Most o...
  • Desalination out of Desperation
    Even in drought-stricken California, San Diego stands out. It gets less rain than parched Los Angeles or Fresno. The region has less groundw...
  • South Korea nuclear plant hit by hacker
    The hacking comes in the wake of increased tension and trouble from North Korea, though the source has not been confirmed. Computers a...
  • News Details of 5 of the best hackers in the world
    There are many hackers around the world. Hackers are famous for their many, many infamous and distinguished or None. Today's top 5 in...
  • INTEL’S BROADWELL IS COMING TO MAINSTREAM LAPTOPS
    Intel’s Broadwell is coming to mainstream laptops — here’s what you need to know CES has always been a major launch window for Intel a...

 
Hacker News © 2014. All Right Reserved
DMCA | Privacy Policy
  • Facebook
  • twitter
  • googleplus
  • youtube