Posts

Showing posts from June, 2018

Malware that hijacks clipboard monitoring over 2.3 million bitcoin addresses

Image
Bleeping Computer today revealed that they discovered a type of “clipboard hijacker” malware that monitors over 2.3 million bitcoin addresses. A clipboard hijacker malware works by tricking users by switching the bitcoin address from their clipboard to another address that the attacker control. Since bitcoin addresses are long and hard to remember, this method works easily for hackers since users simply copy paste addresses from one application to another when sending cryptocoins. The malware reportedly comes as a part of the All-Radio 4.27 Portable malware affecting Windows computers and monitors the Windows clipboard for a bitcoin address. Unless the user double-checks the address after pasting it, the bitcoin will go to the attackers’ address. “While we have covered cryptocurrency clipboard hijackers in the past and they are not new, most of the previous samples monitored for 400-600 thousand cryptocurrency addresses,” their report on the malware read. They also posted a vi...

Gentoo’s GitHub account gets compromised

  Gentoo Linux’s GitHub account was reportedly hacked by an unknown group potentially having its repositories compromised to spread malicious Gentoo’s GitHub account gets compromised on Latest Hacking News . from Latest Hacking News https://ift.tt/2KnpKqc

Facebook Quiz App Leaks Data of 120 Million Users Publicly

We have got another report about a Facebook related fail, as its popular application NameTests leaked data of over 120 Facebook Quiz App Leaks Data of 120 Million Users Publicly on Latest Hacking News . from Latest Hacking News https://ift.tt/2tP9Jyf

More vulnerability hovering around cyberworld

Image
Yet another stunning fact on MS17-010 vulnerability surfaces forcing the cyber security experts to concentrate on the ways and means to counter the threat that deepens on every passing day. Top researchers claimed to have found out that NSA Cyber weapon DoublePulsar has every possible chance to exploit the Windows embedded devices. After the Shadow Brokers stood exposed last year, it has come to light that the hackers or attackers used the windows system when the NSA Tool, known as DoublePulsar---provided an exclusive and backdoor entry into it. That was what the conclusive findings of the research which involved a team of top cyber experts. During the research, the experts minutely examined DoublePulsar functioning on an Embedded Windows device. Only then, they got to know all about the DoublePulsar authors who never supported to an embedded device and instead the exploit was meant for Windows OS. The cyber security experts checked target here to ascertain the vulnerability and fin...

Say bye to remembering passwords

Image
While the smartphone has made many of our work easier, there is also a concern about security. Where, when a hacker breaks into our smartphone and stole our most important information, this fear remains often. To overcome this, the scientists continue to develop a better security system. Many smartphones include facial recognition, fingerprint scans and other biometric systems. However, the trouble with these easy-to-use tools is that once compromised they cannot be reset. But now, American scientists have developed a security system that will use the smartphone's password as the brain of the user after it's been in the market. Smartphones will be unlocked only by recognizing the brainwaves in response to a series of pictures - an advance that could better protect devices from hackers. According to the scientists at Buffalo University, electroencephalography (EEG) is currently a very easy system, through which the waves of the brain can be recorded. "You can't g...

Every Android device is vulnerable to RAMpage attack since 2012

Image
We have consistently seen various vectors of attack rear their head when it comes to Android smartphones. We’ve seen Shattered Trust, Cloak and Dagger, and Rowhammer, just to name a few. RAMpage is the latest one on the block, and while it is a hardware vulnerability, it doesn’t necessarily need physical access to your device to exploit. How it works is relatively simple. A group of university researchers have discovered that this vulnerability could theoretically work on any device with LPDDR memory, which includes virtually every smartphone released since 2012, including some Apple devices. When a CPU reads or writes a row of bits in the RAM module present on the device, the neighbouring rows are slightly affected due to a tiny electric discharge. This isn’t usually a problem as we know RAM does this and that’s why it’s periodically refreshed to make sure nothing goes wrong. But what if we start “hammering” the same “row”? What if we continuously read or write to the same row i...

Facebook introduces “keyword snoozing” to block specific stories on News Feed

Image
Facebook rolled out a new feature called “Keyword Snooze” on Thursday that allows users to “snooze” certain words on their news feed for 30 days. This feature has only been introduced to a small percentage of users for now and will be gradually released to the mass if the test is successful. The feature allows people to mute posts from people, pages, and groups that contain a specific keyword in the text. If you’re one of the users with the access to the feature, you can snooze specific keywords by going to a post that contains the word you want to mute, clicking on the drop-down menu to reveal the window to “snooze keywords”. The window will show you a selection of words that you can mute, such as “Spoilers”, “World Cup” or “Wedding”, and you can choose the one you’d like to pause. Image by techcrunch The feature, however, does not allow users to block ads. So if an ad contains any of your chosen keywords, you can still see it on your news feed. “Even though we w...

Marketing Firm Exposed Database With 340 Million records

Image
A little known Florida-based marketing and data aggregation firm Exactis has exposed data of millions of American adults, as well as millions of businesses in an alleged massive data leak. The firm uploaded a database containing 340 million files  to a publicly accessible server, Wired reported.  Earlier this month, security researcher Vinny Troia had exposed that nearly 2 terabytes of database was easily available publicly accessible server. While the number of individuals who are victim of this massive breach is still unknown.  "It seems like this is a database with pretty much every US citizen in it," Troia told Wired.  The database include extremely personal information such as phone numbers, home addresses, email address,  hobbies, age and gender of their children, number of children.  The big relief is that the leak doesn't seem to contain credit card information or Social Security numbers. "I don’t know where the data is coming from, ...

Free decryption tool released for Thanatos ransomware

Image
The Thanatos ransomware first appeared in the threat landscape in February when it was discovered by researchers at the MalwareHunterTeam. This ransomware started as moneymaking operation and evolved into a campaign of pure destruction - but now victims can retrieve their files, for free. Thanatos ransomware is a malware which encrypts files it appends the.THANATOS extension to them. Once the encryption is completed, the malware connects to a specific URL to report the infection. It locks data with AES cryptography to demand a ransom. Even though users whose computers are infected with this malicious program are unable to get back the access to the encrypted information without paying the ransom, now experts have released a free decryption software. Thanatos is distinct from many other forms of ransomware in that it doesn't demand a payment in bitcoin, but is known instead to request ransoms paid in other cryptocurrencies including Bitcoin Cash, Zcash and Ethereum. The expe...

Exactis Data Leaked – 340 Million Records Exposed Online

While the chaos for the infamous Equifax data breach hasn’t ended, here we have another news story about another massive Exactis Data Leaked – 340 Million Records Exposed Online on Latest Hacking News . from Latest Hacking News https://ift.tt/2tPU69v

Ticketmaster Data Breach – Customer’s Payment Details May Have Been Leaked

Another hacking incident has put the masses at risk. The recent Ticketmaster data breach affected almost 5% of all its Ticketmaster Data Breach – Customer’s Payment Details May Have Been Leaked on Latest Hacking News . from Latest Hacking News https://ift.tt/2N6pRUK

Phishing 101 using SocialFish Tool

Phishing is a classic favorite attack of hackers. Not only that it provides easy access to victims’ accounts by merely Phishing 101 using SocialFish Tool on Latest Hacking News . from Latest Hacking News https://ift.tt/2KjZIE2

Latest Hacking News Podcast #66

Here we have episode 66 of our daily podcast. For daily updates you can subscribe: via iTunes here  Alternatively, if Latest Hacking News Podcast #66 on Latest Hacking News . from Latest Hacking News https://ift.tt/2tNtiXG

Complete Guide on Installation of MongoDB in AWS Linux by Tejaswini UL

Image
In this blog, will have a brief on steps for installing MongoDB in AWS Linux. You can get up to speed with MongoDB if you are new or rusty! To begin with, consider you have an EC2 instance running and you have root access to this EC2 instance , then you can install MongoDB with authentication on EC2 AMI Linux. MongoDB: An open source NoSQL DB that utilizes an document-based data model. MongoDB architecture is built on documents and collections, whereas MySQL stores data in tables and rows and MongoDB uses JSON schemas. Key features of MongoDB: High performance Aggregation Framework Rich query language MongoDB Sharding Highly available Horizontal scalability MongoDB is Schema – Less Supports geospatial indexes Support for multiple pluggable storage engines Supported MongodB Packages: Here are the MongoDB packages that are supported officially with their own repository. MongodB Package Name Synopsis mongodb-org Its a metapackage th...

Cisco patches critical vulnerabilities

Cisco released patches for 34 vulnerabilities that include 5 critical, 20 high and 9 medium vulnerabilities. The 5 critical vulnerabilities are in FXOS and NX-OS and NX-API software and could allow an attacker to execute remote arbitrary code that could cause a buffer overflow or in other cases may lead to a DoS attack. You'll need to wade through Cisco's advisories to work out if the software you're running is vulnerable or already fixed. All of the critical flaws have a CVSS score of 9.8 out of 10 and four of them affect the FXOS and NX-OS Cisco Fabric Services because FXOS/NX-OS "insufficiently validates header values in Cisco Fabric Services packets," according to the security notice. The last critical flaw affects the NX-API feature of NX-OS. The critical Smart Install flaw has affected 8.5 million devices till now. The Cisco patch will fix the issues CVE-2018-0308, CVE-2018-0304, CVE-2018-0314 and CVE-2018-0312.  ▬ MDS 9000 Series Multilayer Switc...

This surveillance van can hack your iPhone or Android device from 500 meters away

Image
A Cyprus-based surveillance startup WiSpear, founded by Israel's surveillance market players Tal Dilian, has built a spy car that is full of 'next-generation snooping' tools which can hack Apple and Android devices from 500 meters  (547 yards) away. The new vehicle is named SpearHead 360,  and was displayed for the first time at ISS World and Eurosatory trade show.  The car is for sale between  $3.5 million and $5 million. The SpearHead 360 vehicle has 24 antennas to help it reach out to nearby devices. Once a device has been chosen to be targeted, the automobile has four different kinds of methods to force a device to connect to its Wi-Fi-based interceptors to gather intel from the device.  It also has four different kinds of malware for various operating systems,  including Apple’s iOS or Google’s Android devices, that could be installed remotely. According to Dilian,  the van is capable of hacking multiple devices running on the same o...

Attackers Utilize UPnP Features to Make DDoS Attacks Harder To Be Recognized

UK Public School IT Manager Sentenced To Prison For Hacking And Fraud

Donald Bart-Williams, who was fired last year from St John’s School in Leatherhead, Surrey UK for hacking into computer systems UK Public School IT Manager Sentenced To Prison For Hacking And Fraud on Latest Hacking News . from Latest Hacking News https://ift.tt/2yPgk1e

Vulnerability threat to WordPress core

Image
Top cyber security experts have talked of an impending vulnerability that could put WordPress in a fix and unless the renowned content management system releases a patch to counter it a serious consequences is in the offing.  In a recent disclosure, the experts claimed to have got wind of the vulnerability in November last year forcing them to write to the WordPress authority and suggested a patch to negate the possibility of a mess in the system.  But the things refused to progress. Those doing research on it claimed to have found out the bug in question in PHP where images uploaded on the WordPress site is deleted.  Thus, the attackers could takes the rein of the content management system of the WordPress.  According to what they say, the cyber criminals can attack the system deploying a malicious code in a WordPress owned site and as a result, the WordPress core containing crucial data and files would be deleted.  Only the bug could be exploited by...

Android battery-saver app installs adware, steals data

Image
Installing battery saving apps helps to improve the battery life of smartphones. But, what if that app hacks you? A malicious battery-saver app, that installs ad click malware into hacked Android devices to make money and extracts device information, has been identified. Apps from unknown sources can be infected with data-stealing malware hidden behind a genuine looking app. The malicious app has infected at least 60,000 devices so far. Researchers at RiskIQ explained about this scam in their blog post last week. According to them, the attack begins after displaying a pop-up ad on the device, saying that the device needs cleanup, otherwise it would slow down and consume more battery. The ad compels the user to trust it by displaying customized content. The source code first detects the device language for specialization. If it finds no specific language, then the ad displays content in English. Next, it scans the device further to trace the model number. The pop-up has two ...

Malicious Android Battery-Saver App Installs Adware And Steals Data

Installing battery saving apps helps to improve the battery life of smartphones. But, what if that app hacks you?  A Malicious Android Battery-Saver App Installs Adware And Steals Data on Latest Hacking News . from Latest Hacking News https://ift.tt/2tuK26A

Drupal vulnerability strikes cryptojacking fear

Image
More worries have bubbled up in Drupal vulnerability. The worse has yet to come. Within a short spell of three months, the malicious malware has turned into a huge tool for the cybercriminals to mint condition cryptocurrencies.  Experts say the even after the presence of a slew of measures, the criminals have made the entire system a malicious one to extract undue profit. What they deploy here is Drupalgeddon 2, the combination of Drupal software and the vulnerability arising thereof to keep minting profit.  The cryptojacking malware in question is deployed here by the attackers to exploit the advantage of the Drupal device that mints Montero to be rushed to their purses without the notice of the real account holders. The affected account holder might get to know once he notices the slow pace of his system.  An attacker keeps exploiting the vulnerability of the CVE-2018-7602 remote code of Drupal and with this malicious mechanism, then they manipulate the D...

PDQ data breach exposes customers’ credit card information

Image
Continuing with the trail of cyber attacks, this time, the hackers attacked a popular restaurant chain in North Carolina. Reportedly, the PDQ data breach exposed sensitive credit card information of the customers who have made a purchase warned the company on Friday (June 21). The attackers also managed to sustain their access for about 11 months. PDQ (People Dedicated to Quality – as they call it) is a fast-casual chicken restaurant chain spread in 11 states, including, Raleigh, Durham, Wake Forest, Cary, Fayetteville, among others. It has about 70 restaurants in total. The duration of the data breach expands from May 19, 2017, to April 20, 2018; during this time consumer payment data was exposed. PDQ learned of the data breach on June 8, 2018. Any PDQ restaurant locations that were operating during the breach time frame has been affected. PDQ said some non-traditional locations, such as those at the Tampa International Airport and several sports arenas were not affected. ...

5.1 Million UK Taxpayers Voice Profiles Collected

Privacy campaigners ‘Big Brother Watch’ have recently brought to light an issue whereby voice profile data of over 5.1 million 5.1 Million UK Taxpayers Voice Profiles Collected on Latest Hacking News . from Latest Hacking News https://ift.tt/2KpeBV1

PDQ Data Breach Left Customer’s Credit Card Details Exposed To Hackers

Continuing with the trail of cyber attacks, this time, the hackers attacked a restaurant in North Carolina. Reportedly, the PDQ PDQ Data Breach Left Customer’s Credit Card Details Exposed To Hackers on Latest Hacking News . from Latest Hacking News https://ift.tt/2luKYDA

XFLTReaT- A Python Based Tunneling Framework

Image
XFLTReaT A Python Based Tunneling Framework This is just one thing of many things that was missing from the Internet. If you got tired of trying several tunneling tools for each protocols, this must be your tool framework. Introduction This project is an open-source Python based tunneling framework that helps you to create a tunnel between two (or more) computers on different channels/protocols. Although the name of the project correlates with the word "ex-filtrate", the framework is more about tunneling than ex-filtration. The main use-case for it is to create a full Internet Protocol v4 (IPv4) based tunnel between the end points, that can be used as a communication channel to send IP packets back and forth. The tool is built on the client-server architecture, so at least two computers are needed to set up the environment. The server side can offer different protocols that can be used for tunneling. The client chooses a protocol that is offered by the server and a...

Apple Researcher’s iPhone Passcode Hack Findings Were Incorrect

Yesterday, we reported something that troubled Apple users. However, we now have good news for them. The supposed iPhone passcode Apple Researcher’s iPhone Passcode Hack Findings Were Incorrect on Latest Hacking News . from Latest Hacking News https://ift.tt/2IoBx1F

Intel Deems Newly Discovered TLBleed Vulnerability Unimportant

A security researcher has discovered a new flaw in Intel processors that might require a lot of work by Intel Intel Deems Newly Discovered TLBleed Vulnerability Unimportant on Latest Hacking News . from Latest Hacking News https://ift.tt/2MotR1x

Android Users To Surf The Web Without A Constant Internet Connection.

Mylobot malware targets windows PC for DDoS, Trojan and Keylogger attacks

Image
A new botnet was recently detected in a live environment for an unnamed client of Deep Instinct, a security firm. Newly uncovered complex MyloBot Botnet incorporates different malicious techniques and ability to shut down the Windows Defender and Windows Updates. It displays a never-before-seen level of complexity in terms of the sheer breadth of its various tools, especially evasion techniques that use three different layers. Malware is a huge problem for computer users today as the threat posed by malicious software continues to increase. Basically, botnet does many things such as DDoS attacks, steal data, and even installation ransomware based on the payload. Malware authors employed various advanced techniques to evade detection and prevent itself from Antivirus software. According to an analysis posted on Tuesday by Tom Nipravsky, a security researcher for Deep Instinct, Mylobot’s bag of tricks is bursting at the seams. These include anti-VM, anti-sandbox and anti-debuggin...

DRM May Be Added to All Android Apps

Google has quietly rolled out a feature earlier this week that is adding a string of metadata to all the DRM May Be Added to All Android Apps on Latest Hacking News . from Latest Hacking News https://ift.tt/2Kl7lpM

Med Associates Suffer Data Breach: 270,000 Records Left Exposed

Cyber attacks on the health care sector have continued into this week too. The latest attack resulted in the compromise Med Associates Suffer Data Breach: 270,000 Records Left Exposed on Latest Hacking News . from Latest Hacking News https://ift.tt/2MfgHE0

Apps under scanner after data exposed

Image
Millions of sensitive user data in mobile applications are believed to have leaked forcing the mobile security firms to scan the apps that keep functioning in the Firebase system. In its recent report, Appthority, a mobile security firm identified iOS and Android mobile applications as 113 GB data lost privacy when over 2,271 Firebase databases misconfigured in the entire episode. Stunned by the disturbing revelations, the premier mobile security firm was quick to scan nearly 3 million apps within a short spell of five months. The apps being scanned, mostly, stored the sensitive data in the Firebase system which virtually proved unsafe and unsecured. The experts deployed in the task identified 28,502 apps where users’ data were stored before being leaked. Of these, 1,275 apps are iOS while the remaining 27,227 others are Android. The mobile security firm experts jumped into the revelations of sensitive data leakage during the investigation as they examined the Firebase conne...

Trump Administration Insider Tried To Sell Surveillance Tools To Oppressive Governments

It has been reported that Elliott Broidy, who is currently known for his state bribery conviction and also his role Trump Administration Insider Tried To Sell Surveillance Tools To Oppressive Governments on Latest Hacking News . from Latest Hacking News https://ift.tt/2MW5dGD

Newly Discovered “GZipDe” Malware Installs Metasploit Backdoor

Security researchers from AlienVault have discovered a new malware named “GZipDe” which currently seems to be active within a new Newly Discovered “GZipDe” Malware Installs Metasploit Backdoor on Latest Hacking News . from Latest Hacking News https://ift.tt/2lwyUSt

Amazon Employees Protest Against Facial Recognition Software Sold to US Governments

Employees at Amazon have complained to halt the sale of the facial recognition software and other services to the government Amazon Employees Protest Against Facial Recognition Software Sold to US Governments on Latest Hacking News . from Latest Hacking News https://ift.tt/2tvI9pv

New Method to Crack iPhone Passcode Discovered By Researcher

Do you think you are safe if you have an iPhone locked with a passcode?. A researcher has discovered a New Method to Crack iPhone Passcode Discovered By Researcher on Latest Hacking News . from Latest Hacking News https://ift.tt/2yAAR9D

Facebook Leaked App Analytics Reports ‘Mistakenly’ To App Testers

We are not sure whether Facebook actively tries to stay in the news through ‘mistakes’, or whether it is truly Facebook Leaked App Analytics Reports ‘Mistakenly’ To App Testers on Latest Hacking News . from Latest Hacking News https://ift.tt/2KbufA4

Cisco Release Patches for Multiple Critical Vulnerabilities

Patches for 34 vulnerabilities have been released that include 5 critical, 20 high and 9 medium vulnerabilities. The 5 critical Cisco Release Patches for Multiple Critical Vulnerabilities on Latest Hacking News . from Latest Hacking News https://ift.tt/2MgTqBG

SleuthQ- A Tool To Find SQL Injection Vulnerability

Image
SleuthQ- A Tool To Find SQL Injection Vulnerability Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap. SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified. Supported Request Types SleuthQL requires an export of Burp's Proxy History. To gain this export, simply navigate to your proxy history tab, highlight every item and click "Save Items". Ensure that each request is saved using base64 encoding. When SleuthQL scans the proxy history file, outside of the regular URL parameters, it will be able to identify vulnerable parameters from the following request content-types: application/json application/x-www-form-urlencoded multipart/form-data There are cases where this tool will break down. Namely, if there is nested content-types...

Mylobot Turns your PC into a Zombie system

Image
Tom Nipravsky, a security researcher at Deep Instinct, discovered another 'never seen before' malware that could transform a Windows PC into a botnet. Named as 'Mylobot', this malware has developed from the 'Dark Web'. It was finished up in the wake of following its server that was additionally utilized by other malware from the dark web. The powerful botnet is said to consolidate various noxious systems, generally including: ·       Anti-VM techniques ·       Anti-sandbox techniques ·       Anti-debugging techniques ·       Wrapping internal parts with an encrypted resource file ·       Code injection ·       Process hollowing (a technique where an attacker creates a new process in a suspended state and replaces its image with the one that is to be hidden) ·       Reflective EXE (executing EXE files directly from memory, without havin...

Microsoft Edge Vulnerability Could Allow for Email and Facebook Data Scraping

We all know Microsoft has recently launched a massive ‘bug fix bundle’ where it released patches for around 50 vulnerabilities Microsoft Edge Vulnerability Could Allow for Email and Facebook Data Scraping on Latest Hacking News . from Latest Hacking News https://ift.tt/2yz1YSF

Hackers hijacking your WhatsApp messages, images

Image
We barely worried about our Whatsapp's cybersecurity as the popular chat app is end-to-end encrypted, but hackers can easily get access to the personal data in various ways.  Here are ways how hackers could hack your WhatsApp accounts and how you can safeguard it.  Although the same number cannot be used twice on two different mobile devices at the same time, Whatsapp has a web for desktops and it just requires your WhatsApp Web QR code. Once a hacker got a hold on your QR code, then your personal messages, videos, images could be easily leaked out and spied upon.  Other than this, there is Whatsapp hack tool available which have a good compatible with Android and jailbroken iPhones. But, there is an app mSpy, which works perfectly with a normal, non-jailbroken iPhone as well.   The notable features of mSpy app includes call monitoring, restricting incoming calls, track  the sent and received SMS, reading emails remotely, tracking the location using G...

Mylobot Malware A Highly Sophisticated Botnet

While the Zacinlo malware has already threatened Windows users, here comes one more threat. Researchers have discovered another Windows malware Mylobot Malware A Highly Sophisticated Botnet on Latest Hacking News . from Latest Hacking News https://ift.tt/2yy935R

Flightradar24 Hacked – User Password Hashes and Emails Compromised

The recent data breach confirms no one in the corporate sector is safe from hacking attempts and data breaches. According Flightradar24 Hacked – User Password Hashes and Emails Compromised on Latest Hacking News . from Latest Hacking News https://ift.tt/2Iksbno

Inside the bunkers and war rooms where major banks wage nightly battle on the frontline of cyber war

Image
Institute For Ethical Hacking Course  and  Ethical Hacking Training in Pune – India Extreme Hacking  |  Sadik Shaikh  |  Cyber Suraksha Abhiyan Credits: ABC News On Tuesday night, the Westpac Bank was under threat from a cyber attack. It was all hands on deck in the bank’s Coordination Centre. “These are all malicious activities, they’re all attacks,” Westpac’s chief information security officer Richard Johnson said. While most of us are sleeping at night, a sinister cyber war is raging in the country’s big cities. Westpac has revealed it can often come under cyber attack as many as three times in a 24-hour period. The war room To combat the hidden enemy, the ABC has learned banks are now fitted with bunkers and war rooms, while tech staff are engaged in daily cyber war games. Mr Johnson happens to be a former military man — a lieutenant in the Army Reserve. So he is right at home in this environment. He is in command of the Coordination Centre...