Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Serbian Bank website hacked by Sepo


A Hacker known as SEPO(‏@anon_4freedom) hacked the Serbian Bank website(www.srpskabanka.rs) and compromised the database belong to.

Serbian bank s.c. has been present at domestic financial market for several decades and, as such, is considered to be one of the most important institutions in corporate and retail business. Developed from the Military Department of the National Bank of Yugoslavia, which has provided services to the entire Yugoslav military industry, the Bank has conducted its operations under the name of Yu Garant Banka for short period of time and since 2003 operates under the present name.

He dumped the database in his own website. The leak contains confidential data including username, hashed passswords and the database details.


AT&T Hacked by Team Digi7al ‏

The Hacker collective known as 'TeamDigi7al' claims that they got unauthorized access to the AT&T website and compromised the database.

Hacker leaked the part of stolen data in the text format. The leak contains personal details including name, address, mobile number and email address. Also they leaked the details about the vulnerability and database details.

"Well it just goes to show you, anything is vulnerable. You just have to know where to look." Hacker said.

"The information in this dump isn't even 1% of whats in here, I just didn't feel like dumping tens of thousands of names, emails, addresses, mobile numbers (you get my point)."

LinkedIn confirms some passwords have been compromised

LinkedIn confirmed that the passwords belonging to "some" of its members have been compromised.
"We can confirm that some of the passwords that were compromised correspond to LinkedIn accounts. We are continuing to investigate this situation"LinkedIn blog post reads.

Affected members will receive an email with instructions on how to reset their passwords; current passwords will not work. They will also receive an email that provides a bit more context on this situation and why they are being asked to change their passwords.

The company did not confirm how many passwords were involved, though it reportedly affected about 6 million of LinkedIn's 161 million users.

8 more Pakistan sites hacked by Nyro Hacker

A Hacker called as 'Nyro Hacker' hacked eight more Pakistan websites and defaced them.

list of hacked sites:
http://diy-home-decor.com/
http://healthadvise.net/
http://www.hiblarious.com/
http://iphonenipad.com/
http://www.futurelinkspk.com/
http://jobsinterviewguide.com/
http://www.sigmasem.com/
http://fashionworldsource.com/

Mirrors

http://arab-zone.net/mirror/101350/sigmasem.com/
http://arab-zone.net/mirror/101351/fashionworldsource.com/
http://arab-zone.net/mirror/101349/jobsinterviewguide.com/
http://arab-zone.net/mirror/101347/iphonenipad.com/
http://arab-zone.net/mirror/101348/futurelinkspk.com/
http://arab-zone.net/mirror/101346/healthadvise.net/

At the time of writing , visiting the above mentioned sites asks for password.  

Orissa's [India] Biggest Entertainment Site HACKED By rEd X


A Hacker known as "rEd X" , from Bangladeshi 3xp1r3 Cyber Army, defaced the Oribuzz website, considered to be one of the most important entertainment portals in the Indian state of Orrisa (Odisha).

The hackers defaced not only the main site, but also 29 other subdomains hosted on oribuzz.com.

“Darkness is my life! 3xp1r3 is my group! Hacking is my heart! Defacement is my hobby,” the hackers wrote.

However, if in the past they hacked websites to protest against the Indian Border Security Force, this time they’ve also left a “friendly” message for the site’s administrators, advising them to patch it up.

At the time of writing, all the sites were still defaced.

Linkedin Hacked and six Million Passwords leaked



Security experts warns that the business-focused social network LinkedIn has suffered a major breach of its password database. Recently, Recently, a file containing 6.5 million unique SHA-1 unsalted hashed passwords appeared in an online forum based in Russia.

 More than 200,000 of these passwords have reportedly been cracked so far.

The hack is not yet confirmed by the LinkedIn. " Our team continues to investigate, but at this time, we're still unable to confirm that any security breach has occurred. Stay tuned here."

After further investigation, Sophos security researchers have confirmed that the file does contain, at least in part, LinkedIn passwords.

Researcher suggest to all LinkedIn users that they change their passwords as soon as possible as a precautionary step. Of course, make sure that the password you use is unique (in other words, not used on any other websites), and hard to crack.

If you use the same password some where else, don't forget to change their also ..!

South Africa Police website hacked by ‘Moroccan Ghosts’ hackers

A Hacker group called as ‘Moroccan Ghosts’ hacked into the official website of the Civilian Secretariat for Police of South Africa (policesecretariat.gov.za) and defaced the homepage.

According to the local news report, the group attacked sites in Egypt, Morocco, Spain and Israel.This shows that they’re one of those hacktivist collectives that don’t focus their operations on specific countries.

In a week, This hackers group have hijacked more than 143 sites of South Africans Americans.Few days ago, they hacked the site of the largest electronic Golf in South Africa .

"Long Live The Moroccan Sahara, Morocco and Long Live Long Live The King" is written by the author (s) of this piracy. Hacker said in the defacement.

Experts Bypass Google's automated malware scanner (Android Bouncer)



Security researchers Jon Oberheide and Charlie Miller have identified security flaw in the Google’s automated malware detection system(Android Bouncer).

Android Bouncer is an automated application scanning service that analyzes apps by running them on Google’s cloud infrastructure and simulating how they will run on an Android device.

Researchers preparing a presentation for this week’s SummerCon conference and demonstrating how Bouncer can be bypassed to slip malicious apps into the Android Market.

"we’re going to submit an application to the Android Market and get a connect-back shell on the Bouncer instance when it attempts its runtime dynamic analysis of our mobile application. This allows us to explore the Bouncer environment with an interactive remote shell." Research said.

After they upload their “malicious” APK to Google Play, they await the connect-back. Once the callback is received, they are able to run a remote interactive shell on an emulated Android device.

Apparently, this allows them to obtain the Bouncer environment’s kernel version, filesystem contents, and other data.

"So this is just one technique to fingerprint the Bouncer environment, allowing a malicious app to appear benign when run within Bouncer, and yet still perform malicious activities when run on a real user’s device."

Six more Carberp scammers arrested by Russian Authorities

Russian Authorities arrest six more individuals on suspicion of being involved in the 'Carberp' scam.

The gang used Carberp and Hodprot malware to commit online banking fraud. It is believed that the gang stole more than 110 million rubles (2.5 million EUR or $3.2 million) from the clients of Sberbank and other banks.

The arrest follows the similar crack down by Russian Authorities in March , arrested 8 members.

Authorities have detained the cybercriminals with the aid of Group-IB, a Russian security firm that specializes in computer crimeinvestigations and computer forensics.

University of Iowa hacked by Zer0Pwn


The Hacker named as "Zer0Pwn" have breached the official website belong to University of Iowa.

Hackers leaked admin username and password details in pastebin.  Hacker claimed that the site is vulnerable to Integer Based SQL Injection.

In order to prove the vulnerability , the hacker also include the link to the vulnerable page.  As it contains high risk data, we are not including the pastebin link here.


State of California Hacked by Mr. Security

A Hacker known as "Mr.Security", from The Unknown Hacker collective, claims that he hacked into the official website of State of California(www.ca.gov).

As usual , hackers posted a message that asks admin to improve their security "That was easy and simple, please protect your website, it's for your own good. If you need any kind of help just contact us, The Unknowns, at: the_unknowns@live.com"

Hacker leaked the database details in AnonPaste . The leak contains username , password and email address details. Also they leak contains database details including table and column name. The site encrypts only admin password , they left users password as plain text.