Archive for February 2015

Critical Vulnerability discovered in the Ultra Secure BlackPhone

A critical vulnerability discovered in the ultra secure BlackPhone has given attackers the ability to decrypt and read messages, read contacts, monitor geographic locations of the phone, write code or text to the phone's external storage, and enumerate the accounts stored on the device.
The vulnerability existed in SilentText which is the secure text messaging application bundled with the BlackPhone, the app can also be found in the Google play store as a free download. A component known as libscimp contained a type of memory corruption flaw known as a type confusion vulnerability.
Mark Dowd, a principal consultant with Australia-based Azimuth Security said "the vulnerability allows an attacker to directly overwrite a pointer in memory (either partially or in full), which when successfully exploited can be used to gain remote, unauthenticated access to the vulnerable device".
SGP Technologies (a joint venture between the makers of GeeksPhone and Silent Circle) has since issued a patch for a newly-discovered vulnerability

Friday, 27 February 2015
Posted by Anonymous

Cyber Crime Hacker

Now a days, any mention of malware and Macs in the same setting generally conjures up images of WireLurker. It was notable as a new family of malware specifically targeting iOS devices via USB and is able to penetrate the iPhone's strict software controls.
WireLurker has been in action in China for the past six months, first infecting Macs by inserting Trojan software through repackaged OS X apps, then moving on to iOS devices. The firm claims that it is the first to automate generation of malicious iOS apps by implementing a binary file replacement attack.
Security experts at Palo Alto Networks traced WireLurker in a research paper saying "It is the biggest in scale we have ever seen! “. WireLurker can jump from a Mac onto an iPhone running a vanilla version of Apple's operating system by leveraging Apple's enterprise provisioning assets.
The WireLurker attackers "probably aren't people who do this often," says Ryan Olson, intelligence director of Palo Alto Networks' Unit 42. They are "clearly very skilled MacOS or iOS developers," but they definitely are not very experienced in writing malware.
With Apple's global smart phone market share continues to rise, so do the number of attempts to surreptitiously harvest data from unsuspecting consumers. As for who created WireLurker, Palo Alto's best guess is that this is one individual or a small group of individuals operating within China, independently of any nation-state. They could be a startup malware house in the new financially motivated, politically independent cybercrime underground growing behind the Great Wall.
Taking advantage of an app provisioning vulnerability, WireLurker lays dormant on a user's computer in an infected OS X app. The malware monitors for new iOS devices and installs malicious apps downloaded from an off-site server or generated autonomously on-device. From there, the program can access user information like contacts, read iMessages and perform other functions determined by the command-and-control server.
So far, 467 OS X apps have been infected and distributed through China's third-party Maiyadi App Store, with downloads totaling over 356,104 possibly impacting "hundreds of thousands of users."
While many publications have dubbed WireLurker “a new brand of threat,” it seems that the majority of users have nothing to worry about. It’s relies on a USB connection for delivery—a practice that has gone by the wayside for most folks in recent years.
On November 14, the Beijing Municipal Public Security Bureau announced it had arrested three people in connection with the WireLurker malware which brought a sense of relief among Apple users of China.
The police received a tip from the Chinese technology company Qihoo 360 and subsequently arrested three individuals, respectively surnamed Chen, Li, and Wang.
The third-party app store that had been serving WireLurker, Maiyadi, was also shut down. Apple has already taken steps to block infected programs but the rest of the work rests on users.

Wednesday, 25 February 2015
Posted by Anonymous

Google’s Project Zero gets tough on companies with lax security patch policies

Google Inc. has a elite team of hackers and programmers called Project Zero so named after the “zero day” security flaws that are exploited before developers learn of them.
Project Zero scrubs their own and competitors’ software for security flaws, giving companies a deadline, more specifically a 90 day ultimatum to patch their software vulnerabilities or they will make them public knowledge.
In an effort to “motivate” competitors like Microsoft Corp. and Apple Inc. to fix their buggy software before the real cyber criminals take advantage of the flaws in their unpatched code. Of course, both Microsoft and Apple are not keen on this.
Opponents of Google’s Project Zero’s practice say it puts online security at risk by revealing gaps before they can be plugged. Of course, hackers in the know work fast to purposefully exploit software flaws when they become known.
Consider when the Chinese-backed intruders exploited a Web-security flaw known asHeartbleed to attack Community Health Systems Inc. after only a week after the software flaw was publicized.
Even, Apple pleaded with Google to wait before going public so it could fix their flaws in the Mac OS X operating system. Google knew the fix was coming and had possession of the updated source software because they also served as a developer for Apple at the time. Google refused and released any details to the public of the flaws. Microsoft, also, requested additional time to fix a flaw in their Windows OS. Google, again, refused and publicized the bug.
Google supporters say the Project Zero’s 90 day hard-line approach may motivate the software industry to focus on better security patching practices in which companies can take months or years to patch their bugs.
To date, Google’s Project Zero has identified 39 vulnerabilities in Apple products and 20 in Microsoft products. The team also has found 37 flaws in Adobe Systems Inc. software and 22 in the FreeType software development library for rendering fonts..
It is a good thing for consumers that Google’s Project Zero has taken the role of patch it or we’ll report it task master as many of these companies products can leave users vulnerable to hacks that can create more grief and deeper problems if they are not put in check.
Project Zero just drew the line in the sand, how the effected companies react to this will determine what products you can really trust with your data in the future.

Monday, 23 February 2015
Posted by Redback India

Live Map Shows Thousands of Cyber Attacks as They Happen

Sony got nuked, said one security expert. But it’s hardly the only attack aimed at a major corporation. Tens of thousands of cyber-attacks are launched every second – a majority of which are directed at the United States – but few have the impact that can force a Hollywood studio to cancel a film.

“There’s really no other word for it,” said Kurt Stammberger, a security expert and vice president for marketing at Norse, a cyber-security firm specializing in live attack intelligence. “What’s happening at Sony is really the nightmare scenario for every organization.”

The Northern California-based company, which provides live intelligence data to companies such as HP, has an interactive map of cyber-attacks on its website where users can watch the action as its happening.
“It’s a little bit like the weather – it comes and goes in storms and bursts,” said Stammberger.

Except, unlike the weather, the attacks, represented by streaks of colored lines, is only one tenth of one percent of all cyber-attacks. The whole map would be covered if it were to show every attack, so a random sample is all that’s shown.

Norse is able to come up with this data by placing more than eight million bait computers, or what they call “honeypots,” in 167 different data centers and 47 different countries where they’re attacked by hackers who think the bait machines hold credit card numbers or other sensitive information.

While the continuous barrage of cyber-attacks makes for an engaging map that looks more like a hacker version of the board game Risk, it highlights how pervasive cybercrime and cyber-attacks are in this day and age when megabytes if not gigabytes of our own personal information and financial records are stored and collected in servers where we can’t attest to its level of protection.

Thankfully, it’s not just defense for the good guys. See the mysterious node object on the map in the ocean just southwest of Africa? It’s not a ship or even an island full of hackers unleashing attacks. The node represents attacks launched on the offensive by the U.S. government, placed in the ocean to shield the location of where the attack is originating. 
Posted by Unknown

Trojans, Viruses and Worms

Introduction: Computers have become mandatory to run a successful businesses. It is not enough to have isolated computers systems; they need to be networked to facilitate communication with external businesses. This exposes them to the outside world and cybercrime. Cybercrime is using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data etc. Cybercrimes cost many organizations millions of dollars every year. Businesses need to protect themselves against such attacks.

How can they protect themselves?
In this article, we will introduce you to ethical hacking.

Topics covered:

·         Common hacking terminologies
·         What is cybercrime?
·         Types of cybercrime
·         What is ethical hacking?
·         Why ethical hacking?
·         Legality of ethical hacking
·         Summary

What is hacking?
There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security. Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.

Types of Hackers
Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.

What is Cybercrime?
Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc. Most cybercrimes are committed through the internet. Some cyber crimes can also be carried out using mobile phones via SMS and online chatting applications.

Type of Cybercrime:
The following list presents the common types of cyber crimes:

Computer fraud: Intentional deception for personal gain via the use of computer systems.
Privacy violation: Exposing personal information such as email addresses, phone number, account details etc. on social media, websites etc.
Identity Theft: Stealing personal information from somebody and impersonating that person.
Sharing copyrighted files/information: This involves distributing copyright protected files such as eBooks and computer programs etc.
Electronic funds transfer: This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.
Electronic money laundering: This involves the use of computer to launder money.
ATM Fraud: This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.
Denial of Service Attacks: This involves the use of computers in multiple locations to attack servers with a view of shutting them down.
Spam: Sending unauthorized emails. These emails usually contain advertisements.

What is ethical hacking?
Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules. Get written permission from the owner of the computer system and/or computer network before hacking. Protect the privacy of the organization been hacked. Transparently report all the identified weaknesses in the computer system to the organization. Inform hardware and software vendors of the identified weaknesses.
Why ethical hacking?
Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money. Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.
Legality of ethical hacking
Ethical hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are supposed to be renewed after some time.

Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks. Cybercrime is committing crime with the aid of computers and information technology infrastructure. Ethical hacking is about improving the security of computer systems and/or computer networks. Ethical hacking is legal.
Tuesday, 3 February 2015
Posted by Unknown

Follow by Email

Total Pageviews

- Copyright © REDBACK COUNCIL - RISC -- Powered by Redback - Designed by Redback Council -