Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Kapilsibalmp.com: site of India's Minister of Communications and IT hacked by Anonymous India



Anonymous India Hackers managed to break into the personal website of Kapil Sibal (kapilsibalmp.com), India’s Minister of Human Resource Development and Minister of Communications and Information Technology.

This time hackers did not deface the website; They have just published a number of screenshots on the social media website Facebook to demonstrate that they gained access to the site’s backend.

"we just wanna try this once without defacing and see the public's reaction :) .. dont worry I know that 'they' watch this page all the time" Hackers said in the Facebook comment.

"Your Federal Tax Payment rejected" spam mail leads to Malware

MX Lab has intercepted a new spam emails with subject “Your Federal Tax Payment ID: 2636335 is failed”, the ID number will change with each email.

The email is send from spoofed addresses and has the following body:
Your Federal Tax Payment ID: 901757127 has been rejected.
Return Reason Code R21 – The identification number used in the Company Identification Field is not valid. Please, check the information and refer to Code R21 to get details about your company payment in transaction contacts section:
report_177329.pdf.exe (self-extracting archive, Adobe PDF)
In other way forward information to your accountant adviser.
EFTPS: The Electronic Federal Tax Payment System
PLEASE NOTE: Your tax payment is due regardless of EFTPS online availability. In case of an emergency, you can always make your tax payment by calling the EFTPS
The trojan is masked for the reader as a self extracting archive that will contains a PDF file. The embedded URL “report_177329.pdf.exe” leads to hxxp://corporate12banking.firm.in/report.pdf.exe and a 200 kB large file report.pdf.exe is downloaded.

At the time of writing, only 2 of the 41 AV engines did detect the trojan at Virus Total.

Reuters Twitter account hacked and false tweets were posted


Reuters has suffered a second Security breach in two days after hackers take control of one of its Twitter accounts.

"Earlier today @ReutersTech was hacked and changed to @ReutersME," said a spokesperson for Reuters, which is owned by Thomson Reuters CorpTO>. "The account has been suspended and is currently under investigation."

The Hack comes after two days after hackers broke into Reuters blogging platform on Friday and posted a false story about an alleged interview with a Syrian rebel leader.

In the latest incident a series of 22 false tweets were sent purporting to be from Reuters News. Some of the tweets also carried false reports about Syrian rebel losses suffered in battles with Syrian government forces.

Thomson Reuters had no immediate information on who was behind the hacking. As far as we know, no hacker group has claimed responsibility for either of the two attacks.

Hackers hijack Gizmodo Reporter's iCloud account via Social Engineering attack


Yesterday, we report that Gizmodo's twitter account hijacked after hackers compromised the iCloud account of Mat Honan, a former Gizmodo employee. At the time it was assumed that the hackers had used bruteforcing attack ,  but it turns out that Apple gave the hackers access to his iCloud account.

"I know how it was done now. Confirmed with both the hacker and Apple. It wasn’t password related. They got in via Apple tech support and some clever social engineering that let them bypass security questions."Mat Honan said in the blog post.

"Apple has my Macbook and is trying to recover the data. I’m back in all my accounts that I know I was locked out of. Still trying to figure out where else they were. "

Social engineering” is a fancy word for tricking the person on the other end to do what you want by making them believe that they are you.

Even if you have Strong passwords , hackers can convince the tech support person that they are you, they can walk past all that security. Nothing can protect you from this kind of targeted attack. 

Alleged Hong Kong Anonymous hacker arrested over Facebook Threat


A man believed to be a member of the international hacker group Anonymous was reportedly arrested by Hong Kong police after he claimed on Facebook that he would hack several government websites.

Police said the man, who was later released on bail, was held on suspicion of "access to a computer with criminal or dishonest intent" after he allegedly threatened to hack seven government websites between June and August this year.

“The Internet is not a virtual world of lawlessness,” a police spokesman said, adding that the man was required to report back to the police in October.

He would face up to five years in jail, if found guilty.

The man is a member of the global hacker group Anonymous, the South China Morning Post said. The group is said to have 20 members in the semi-autonomous Chinese territory, which guarantees civil liberties not seen on the mainland, including freedom of speech.

The police spokesman declined to confirm his link to Anonymous. The last posting on the "Anonymous HK" Facebook page on July 22 urged authorities to show "respect" to citizens.

Microsoft released Attack Surface Analyzer 1.0


Microsoft has released Attack Surface Analyzer 1.0 which determines the security of an application by examining how it affects the computer it is installed on.

The tools was originally released on January 2011 during the Blackhat DC security conference as Beta version.

According to the press release, the new release includes performance enhancements and bug fixes to improve the user experience. Through improvements in the code, Microsoft reduces the number of false positives and improve Graphic User Interface performance. This release also includes in-depth documentation and guidance to improve ease of use.

"The Attack Surface Analyzer tool is designed to assist independent software vendors (ISVs) and other software developers during the verification phase of the Microsoft Security Development Lifecycle (SDL) as they evaluate the changes their software makes to the attack surface of a computer. " Microsoft explains.

"Because Attack Surface Analyzer does not require source code or symbol access, IT professionals and security auditors can also use the tool to gain a better understanding of the aggregate attack surface change that may result from the introduction of line-of-business (LOB) applications to the Windows platform. "


Gizmodo's Twitter account hacked by Clan VV3




The hacker group called as "Clan VV3" managed to gain access to the Gizmodo's Twitter account. Apparently, it all started when the hackers compromised the iCloud account of Mat Honan, a former Gizmodo employee. According to Honan, that allowed them to take over his Google and Twitter accounts.

Hackers posted the following Tweet after taking control of the account:
Clanvv3 dot Com HIT US UP, CLAN VV3, Clan VV3 (dot) com
This twitter got a train ran over it by Clan VV3, Clan VV3 (dot) com
Follow @Fend YouTube.com/Fend I HATE N*****S LOL
Go to Youtube.com/Fend @Fend
Follow @vip you stupid coons
We all hate n*****s! http://Ihaten*****sbecausetheylooklikeapes.com

Gizmodo quickly regained control of the account and apologized for the tweets having appeared at all.

"The weak link in the security chain turned out to be the seven digit alphanumeric password to our good buddy and former contributor Mat Honan's iCloud account."Gizmodo post reads. " After presumably brute-forcing his way into iCloud, the nefarious hacker was able change the password and gain access to Mat's Google account, remote wipe his Macbook Air, iPhone, and iPad, get into his Twitter, and then use that to access ours.

"While we managed to snatch our Twitter account back from the claws of evil, Mat's been having a bit more trouble. You can read more about his harrowing tale on his blog."

According to Hackers website, Clan VV3 have compromised lot of high profile accounts including Tami Roman (664,000 followers) Whitney Cummings (659,000 followers), Booker Huffman (300,000 followers) , YouTube accounts of MabeInAmerica ,Yonas and more.

Telephone denial-of-service (TDOS) attacks -Hackers offer for 20$ per day


Hackers are now offering DDoS attack against Telecom Systems,with prices starting at just $20 per day.

DDoS against websites have been going on for many years. Attacks that swamped telecoms services are a much more recent innovation, first starting around 2010.

While DDoS attacks on websites are typically launched from botnets, attacks on telecom lines are launched using attack scripts on compromised Asterisk (software PBX) server.

Curt Wilson, research analyst at Arbor Networks said that cybercriminals are advertising “professional services” to anyone who’s willing to pay between $20 per day and $30 per hour to make sure that a certain phone is flooded with phone calls.

“Often, SIP flooding attacks take place because attackers are running brute-force password guessing scripts that overwhelm the processing capabilities of the SIP device, but we have also seen pure flooding attacks on SIP servers,” Curt Wilson said.

“Once the attackers obtain credentials into a VoIP or other PBX system, that system can become a pawn in their money-making scheme to perform DoS, Vishing, or other types of attacks.”

The expert reveals that the VoIP and the PBX systems are usually easy to penetrate because the access credentials are weak, being easy to crack with a brute force attack.

Telephone systems connected to the Internet can be brought down even by something as simple as a port scan, researcher explains.

"In such cases, an attacker could bring down an organisations' phone system quickly if they were able to reach the controller. "

Fake AT&T emails lead to BlackHole Exploit kit site



Websense has detected a massive phishing campaign targeting AT&T customers. More than 200,000 fake emails are masquerading as billing information from the giant American communication services provider. Each message claims that there is a bill of a few hundreds US dollars.


Clicking on the link in the bogus message sends the user to a compromised Web server that redirects the browser to a Blackhole exploit kit.

After successfully exploiting the vulnerability in the visitors' computer ,it serves malware that is currently detected by only a third of the antivirus products used by VirusTotal.

ThreatScope analysis, part of our CSI service, shows that the malware is part of the Cridex family. It drops files into the Application Data and Temp folders, and then injects code into other processes running on the computer, for example Internet Explorer and Adobe Reader. After this, it accesses a Bot network where the attacker can instruct the malware to take further actions.

Hackers break into Reuters blogging platform and post fake news



Thomson Reuters has confirmed the blogging platform of the Reuters News website was compromised on Friday and a false posting purporting to carry an interview with a Syrian rebel leader was illegally posted on a Reuters' journalist's blog.

"Reuters.com was a target of a hack on Friday," the company said in a statement. "Our blogging platform was compromised and fabricated blog posts were falsely attributed to several Reuters journalists."

One of the false posts purported to be an interview with Riad al-Asaad, the head of the Free Syrian Army.

"Reuters did not carry out such an interview and the posting has been deleted," the Reuters statement said.

In the purported interview, the FSA leader was alleged to have said his forces were pulling back from the northern province of Aleppo after clashes with the Syrian army.

The Free Syrian Army issued a statement denying that any such interview had taken place, and blamed President Bashar al-Assad's government for the false posting.

The report "was fabricated by the regime, as it seems the news agency was hacked", it said in a statement.

Thomson Reuters had no immediate information on who was behind the hacking.

Reuters journalists in Aleppo have reported Free Syrian Army fighters are still present in the city and outlying province.

The Reuters.com blogging platform was taken offline on Friday while the company works to address the problem.

Olympic malware poses as US Women's Gymnastics scandal video

SophosLabs has intercepted a malware campaign that has been spammed out, exploiting interest in the London Olympics which are currently making headlines and filling TV schedules around the world.

The emails, which have been spammed out so far in limited numbers, all have a subject line designed to entice sports fans into opening the messages:

Huge scandal with the USA Women's Gymnastics Team on the 2012 London Olympics

The intercepted email reads:

Recent Olympic gold medal winner, USA Women's Gymnastics winner Gabrielle Douglas, faces a lifetime ban after reportedly testing positive to banned diuretic furosemide. With details of the case still emerging, British Olympics Committee has ordered a suspension of the athlete until final results arrive.

View the video on youtube now

However, clicking on the link takes you not to the real YouTube website, but a lookalike webpage that runs various pieces of JavaScript code, and asks uses to download an Adobe Flash plugin to view the content.

Sophos products detect the malware as Troj/Agent-XIK and Troj/JSRedir-IA.