Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Chinese man pleads guilty to stealing Source Code from NY Fed Reserve

A 33 year-old Chinese man pleaded guilty to stealing software code from Federal Reserve Bank of New York.

Bo Zhang, was accused of illegally copying the software code to an external hard drive, according to a criminal complaint filed in U.S. District Court in Manhattan.

The software, which cost the government around $9.5million to develop,is used to give Federal agencies a running blanace of their accounts.

"I knowingly stole and converted to my use an item owned by the United States government valued at more than $1,000," Zhang told U.S. Magistrate Judge Michael Dolinger on Tuesday.


According to Reuters, Zhang also pleaded guilty to one charge of immigration fraud. He is currently free on $200,000 bail and is due to be sentenced on Oct. 1.

Cyber Criminals use Google Docs for phishing attack

Usually, cyber criminals uses fake domains for phishing attack. Recently,  Sophos researchers come across a phishing attack in which the Google Docs page is used for the attack.

In one of the spam mails, the email asks the recipient to confirm their email account details or risk having it shut down.

Confirm your e-mail account please enter your Mailbox Details by clicking the link below:
[LINK]
Failure to provide details correctly will result to immediate closure of your mailbox account from our database.

The link points to a page on Google Docs (docs.google.com). That gives the link a false aura of legitimacy. Once users visit the link,  the page falsely claims that your email account will be shut down in three days and the only way it claims you can resolve the situation is by entering your username and password.

UGNazi Hacker Cosmo Arrested After WHMCS Breach

Cosmo, one of the members of the UGNazi hacktivist group, has been arrested in connection to the breach that affected the website of the client management and billing solutions WHMCS.

On May 21, UGNazi gained unauthorized access to the systems of WHMCS and leaked around 1.7 gigabytes of data. At the time, Matt Pugh, the founder and main developer of the website, alerted the Federal Bureau of Investigations.

A few hours ago, other members of the collective found out that the FBI apprehended Cosmo.

“Last time was just questioning, but this time he’s actually being held. No other word from him,” one hacker told us.

“Well I’m sure he'll be out soon and back to work. He’s been arrested before so it’s nothing new to him. Basically WHMCS called in the feds and now it’s been 9 days into the investigation and they got one of us. But we left no tracks which is why I’m sure he will be out soon,” he added.

Also, he revealed that another member of the group, called Josh, hasn’t been online for the past couple of days.

Apparently, Cosmo was actually the one who social engineered Hostgator employees in order to get the access information to WHMCS systems.

In the meantime, law enforcement also seized the hacktivists’ website (ugnazi.com) and Cosmo’s Twitter account.

Ironically, one day before his arrest, Cosmo posted a picture with a message that read “Arrest one of us; two more appear. you can't arrest an idea.”

It will remain to be seen if he can get off the hook for a second time. However, the hackers seem to be determined to carry on their regular activities, a “huge release” being planned for the upcoming period.

[source]

Anonymous Hackers threatens Canadian F1 Grand Prix

Anonymous has threatened to take down the websites linked to the upcoming F1 Grand Prix in Canada between June 7 and June 10. This is not just an operation against the race organizers, but also against Canadian authorities, which have been named as “human rights violators.”

"As we did in Bahrain - Anonymous intends to wreck Mr Eccelstone's little party," explained an Anonymous spokesperson.


"We would like to remind anyone considering attending this abominable race, that last time Anonymous found all the spectators personal data, including credit card numbers - un-encrypted on F1 servers."


According to Tech Radar, the main reason for which Anonymous threatens to attack Formula 1 sites is connected to Quebec’s Special Law 78, which is seen as a limitation of human rights.


"We highly suggest that you join the boycott of the F1 in Montreal and we certainly recommend that you NOT purchase any tickets or F1 merchandise online."Hackers said

Anonymous hackers breached American Pharmacist Association Site(Pharmacist.com)

Anonymous hacktivists break into the American Pharmacist Association Site(Pharmacist.com) as a form of protest against the United States government.

Anonymous claims to have gained root access to the organization’s systems, removing all the data they could find on their servers.

They also leaked 65 MB compressed file, which contains approximately 163 MB of source code, server logs, and transaction logs belonging to pharmacist.com.


"In an effort to make a mockery off of our friends inside of the US government we are releasing personal information and credit card details from government officials." Hackers said in the leak.

"We strongly advice you to make your website more secure, because if we didn’t find this information, black hats would have…"

Before the website was taken offline by the organization, the hackers defaced it and even set up a drive-by attack. It’s uncertain at this time what was served to the visitors of the site during the time it was compromised. However, it would have been really strange if the hacktivists had used the site to push malware.

#OpIndia: Anonymous Defaces 'All India Trinamool Congress' website


Anonymous hacktivist continue their protest against Internet censorship.  Today , they hacked into official site of All India Trinamool Congress(aitmc.org) and defaced it.

"It is time you wake up to the nightmare that is your government! It is time you stand up for what is right. Do not let your government censor you! It is time for you to take charge. It is time you say 'Enough is enough'. It is time we end this cycle of corruption. Expect revolution, Expect Us." Hackers said.

For the past few days Anonymous have been protesting internet censorship in India by taking down India government websites and any site that supports the blocking of file sharing websites.

The site has been restored. The mirror of the defacement is available here:
http://www.arab-zone.net/mirror/98229/aitmc.org/

Facebook Timeline remover scams is still alive


Not everyone is a fan of Facebook's Timeline feature. And that's a fact of which spammers and scammers are happy to take advantage.

One of the Sophos reader received a mail that claims recipient can get rid of Facebook Timeline. The link in the spam mail leads to a website created just a couple of days ago, whose domain is registered in Turkey.



In that page, users are asked to install the add-on. In the terms of use, cyber criminals stated that "If you are not living in Turkey don't use this plugin, this is for only users who living in Turkey."

Usually these kind of add-on leads victims to some survey pages or ask you to like their pages but it never help you to remove the Timeline.  So Users are advised to stay away from these kind of scams.

Orozco Strikes Again! Habbo.com.br Hacked!

Orozco got into LockBoxSwap last week and leaked over 1200+ unencrypted Credit Card Data. That's not it though. Sources reveal that Orozco has successfully gotten into Habbo.com.br (Brazil) .

He provided some information on an underground hacking site .

"I'm not one to get in the way of another man's business, I'm all for making money, always have been, actually. But, I personally think it's a nail on the coffin if you leave customer data completely unexposed."Hacker said

"I don't want to ruin Habbo's success, because the owners have family to feed and Habbo's success nurtures that. I'm going to release a short, but sweet list of accounts. Note: some have been cleared from the db since the breach:"

Romanian Police take 12 Anonymous Romania hackers into custody


12 alleged Anonymous Romania Hackers has been arrested by Romanian Police. DIICOT, the Romanian Organized Crime Unit, raided the house of 12 people in Bucharest, Iaşi, Alba Iulia, Piatra Neamţ, Cluj Napoca, Drobeta Turnu Severin, Arad, Craiova, Reşiţa and Târgu Mureş.

According to Press release, 24-year-old Gabriel Bălăneasa from Piatra Neam, was the leader of the group. His name online nicknames are "lulzcart," "anonsboat," "anonsweb" and "carman."

The group hacked 29 websites by exploiting the SQL injection vulnerability and defaced them. According to the police, hackers used tools such as Havij, SQLMap for the attack.


Flame worm - Iran uncovers Stuxnet-style malware


The Iranian Computer Emergency Response Team (MAHER) claims to have discovered a new targeted malware attack attacking the country, which has been dubbed Flame (also known as Flamer or Skywiper),following on from the Stuxnet and Duqu attacks dating back to 2010.

"The name 'Flamer' comes from one of the attack modules, located at various places in the decrypted malware code. In fact this malware is a platform which is capable of receiving and installing various modules for different goals," Researcher said in the statement.

MAHER claimed that Flame is not detected by any of 43 anti-virus products it tested against, but that detection was issued to select Iranian organisations and companies at the beginning of May.

"A detector was created by Maher centre and delivered to selected organisations and companies in [the] first days of May. And now a removal tool is ready to be delivered."

Maher said the malware was able to carry out several high-profile functions, including network monitoring, disk scanning, screen capturing, recording sound from in-built microphones and infiltrating various Windows systems. It added that Flame can be passed on via devices such as USB sticks.

References:
Kaspersky: The Flame: Questions and Answers
Symantec: Highly Sophisticated and Discreet Threat Targets the Middle East

Direct TV Hacked & Data Leaked by DigitalCorrupt

@digitalcorrupt has taken sights to servers owned by Direct TV (directv.com) an American direct broadcast satellite service provider and broadcaster based in El Segundo, California.

As a result of this the direct tv servers have been hacked and now a dump of information has made its way to pastebin.

The hack happened early today and appears to be via a wordpress installation, which for such a large company to be using a open source free blogging software is just pathetic to say the least.

The leaked data contains a brief message a dump of administration accounts which contain usernames, emails and encrypted passwords as well as a list of IP’s that are said to belong to the direct TV servers.

Leak message:

Welcome to our first release, we would like to give you some juicy information; let’s take a look at it! say(“LOL at Direct tv, thanks for the access!”);

say(“Direct TV, Would you like to give us some wordpress information? Yes! Why thank you!”);

list(“Direct TV wordpress”);

http://ozdc.net/archives.php?aid=1852

http://pastebin.com/nR6nHBre

source: CyberWarNews