Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Jordan's PM's website hacked by Anonymous hacktivist


Anonymous hacktivists have hacked into official website of Jordan's Prime ministry in a protest against raising taxes and prices.  The website was defaced with a message in Arabic to Prime Minister Abdullah Nsur.

"Hi uncle, how are you? We are sorry, we hacked your website. Are you upset? We feel much worse when you raise prices. The people know this feeling but you do not," the defacement message reads.

According to Voice of Russia report, the website has been restored after it was hacked for several hours.  The official claimed to have identified the attackers.

At the time of writing, the website(pmo.gov.jo) is offline.  You can still view the defacement in Google cache: http://webcache.googleusercontent.com/search?q=cache:http://pmo.gov.jo/PMO_Images/635159460595068250.htm

Hacker hijacked webcams to capture naked images of women

A 19 year old Hacker, Jared James Abrahams from Temecula charged with hacking webcams to capture nude photos of Miss teen USA Cassidy Wolf and several other women and then blackmailed them for more.

The hacker used 30 to 40 computers to carry out his crimes. He allegedly forced an Irish girl and a Canadian woman to strip,according to Los Angeles Times report.

He is accused of contacting the victims from two hacked AOL accounts and attempting to blackmail them by threatening to expose their nude photos across the internet.

The report says one of the victims is a minor who responded to his blackmail saying "Please remember I’m 17. Have a heart".

But, Abrahams allegedly responded saying " I'll tell you this right now! I do NOT have a heart. However, I do stick to my deals. Also age doesn’t mean a thing to me!!!"

Unique Vintage infected with customer-info stealing malware since Jan 2012

"Unique Vintage" website recently started to notifying their customers that some of their personal information have been compromised in a sophisticated security breach.

In the notification letters sent out to the customers, it is mentioned that a malware was stealing customer info from Unique Vintage's website from approximately January 2012.

The breach came to light on September 14, 2013. The information accessed includes customer names, email addresses , telephone numbers and credit card numbers.

All affected customers are asked to contact their credit card issuers and close their accounts to prevent identity theft.

Four men charged over Santander Bank Cyber Heist

Four men have been charged out of twelve suspects over cyber plot to steal money in Santander bank of London.

Eight men have been released on bail until mid-November pending further inquiries.  The charged suspects are Lanre Mullins-Abudu, 25, Dean Outram, 34, Akash Vaghela, 27, and Asad Ali Qureshi, 35, the Mirror reports.

Scotland Yard representative have reported that this was one of the most sophisticated case ever.

Police found a device fitted to a computer in a branch of the bank in Surrey Quays in London's Canary Wharf financial district.  They have reported that the device might have allowed them to download or access data from the computer.

Santander representative have affirmed that none of their employees are involved in the case.  The bank has also reported that the plot failed and that “no money was ever at risk.”

RedHack leaked documents exposing police officers who allegedly killed Turkish Protester

As Turkish Protesters continue to be killed during the anti-government protest, the famous Turkish hackticist group, "RedHack" appear to be on a mission to expose those officers who responsible for their deaths.

Abdullah Comert ,a Turkish protester who was killed by police in early June at the beginning of the Gezi protests.

Red Hack has leaked a screenshots of documents that expose police officers who allegedly killed the Abdullah.

"Abdullah Cömert'in Katilleri:
1-http://m1309.hizliresim.com/1f/b/sjdx4.jpg  (EÄŸitim Alan) 2-http://t1309.hizliresim.com/1f/b/sjf8v.jpg  (Görevli)
3-http://u1309.hizliresim.com/1f/b/sjjxu.jpg  (Üç Katil)" RedHack tweet reads.
 

Microsoft SharePoint vulnerable to Exception Handling Web Vulnerability

The Vulnerability Laboratory Research Team discovered a persistent web vulnerability in the official Microsoft Sharepoint Online (cloud-based) application.

The vulnerability allows remote attackers to inject own malicious script code to a vulnerable module on application-side (persistent).

The vulnerability is located in the `Sharepoint Online Cloud 2013 Service` section when processing to request the `Berechtigungen für
den Metadatenspeicher festlegen` module with manipulated ms-descriptionText > ctl00_PlaceHolderDialogBodySection_
PlaceHolderDialogBodyMainSection_ValSummary parameters. The persistent injected script code execution occurs in the main
`invalid BDC Übereinstimmung` web application exception-handling

The vulnerability can be exploited with a low (restricted) privileged application user account and low or medium required user interaction.
Successful exploitation of the vulnerability result in persistent session hijacking, persistent phishing, stable external redirect, stable
external malware loads and persistent vulnerable module context manipulation.

The vulnerability is fixed .

Hijacked websites serve Fake AV and PRISM-themed Ransomware

Now a days when in every walk of life there is danger, one cannot expect anything good in cyber world.

Some attackers are reported to use PRISM to scare unsophisticated users into installing ransomware. Zscaler researchers report to identify 20 affected websites that are used to spread fakeAV.

Zscaler reports-'These websites seem to have been hijacked. They are all hosting the malicious content over port 972 and use similar URL patterns. Here are a couple examples:

  • kringpad.websiteanddomainauctions.com:972/lesser-assess_away-van.txt?e=20
  • miesurheilijaaantidiabetic.conferencesiq.com:972/realism_relinquish-umbrella-gasp.txt?e=21
  • squamipi.worldcupbasketball.net:972/duty_therefore.txt?e=21'

Not only this but they reported that the files seem to be changing from FakeAV to fake PRISM warning. But the common thing is that in both the cases it is used to frighten the target and ask them for money to 'fix' the computer. Thus making a lot of money.

Fake AV were mostly used to lock the desktop of the user and asked for money to unlock it or it used to run a fake computer scan in the browser and the victim had to pay to remove the threats.

Well PRISM was used to fool the user and said that the victim's computer has been blocked because it contained some illegal pornographic content. The victim has to pay $300 through MoneyPak, a prepaid card service.

It has been reported that:-"Both malware connect to the same couple of IP addresses over ports 80 and 443 that include:

37.139.53.199

64.120.167.162

64.191.122.10"

The attackers are clever and shrewd and can use any trick to fool you for their benefit, so beware the next time.

Hacker claimed to have found a bug in Facebook that can delete any account

*Update: Security Engineer from Facebook told computerworld that this claim is fake one.

"This is simply a hoax. The html source shown in the video clearly says 'No test user was deleted'. We've verified in our logs that the victim account was manually deactivated by visiting https://www.facebook.com/deactivate.php. "

----
Speaking to E Hacking News, a Security researcher and Bug Hunter Ehraz Ahmed claimed to have found a security vulnerability that allows him to delete any Facebook account.

The researcher tried to report bug to Facebook. However , the Facebook team rejected the finding saying that it is not valid one.

     Even though researcher sent a demo video, they denied his request.


video Demo:






I am just wondering how Facebook team rejected such a critical bug.  However, this is not the first time Facebook team rejected the critical vulnerabilities.  Most of times facebook team failed to understand the impact of the bug and later when the realize the severity , they fix the bug without acknowledging the researcher.

Recently , a hacker named "Khalil" posted the vulnerability report in mark zuckerberg wall after Facebook security team rejected the bug.

The Secunia CSI 7.0 , the next generation of Complete Patch Management

Copenhagen, September 4, 2013 –Secunia, a leading provider of IT security solutions that enable businesses and private individuals to manage and control vulnerability threats, today announced the release of the new version of the company’s flagship solution: the Secunia Corporate Software Inspector, version 7.0, which introduces new features and improvements for vulnerability and patch management to organizations worldwide.

Cybercrime costs organizations millions of dollars(1) and to protect businesses from the consequences of security breaches, vulnerability intelligence and patch management are basic necessities in the toolbox of any IT team, as emphasized by organizations like the SANS Institute(2) and the National Institute of Standards and Technology under the US Department of Commerce (NIST)(2).

The [Secunia CSI 7.0] is the Total Package: Vulnerability Intelligence, Vulnerability Scanning with Patch Creation and Patch Deployment Integration

To help IT teams counter the threat, vulnerability research company Secunia merges their in-house vulnerability expertise with a sophisticated patch management solution into the Secunia Corporate Software Inspector (CSI 7.0). The foundation of the Secunia CSI is a unique combination of vulnerability intelligence and vulnerability scanning, with patch creation and patch deployment integration. The Secunia CSI integrates with Microsoft WSUS and System Center 2012 and third-party configuration management tools for easy deployment of third-party updates, making patching a simple and straight-forward process for all IT departments.

To make the solution flexible and suited to the processes of organizations of all sizes the new version, the Secunia CSI 7.0, comes with these new and improved features:

· Smart Groups 2.0: Create Smart Groups designed to prioritize remediation efforts by filtering and segmenting data based on hosts, products or impact, and to receive alerts when a threat is detected.

· User Management: Create user accounts with different roles and permissions.

· Patch Configuration: Get configurable patches out-of-the-box that can be easily customized to support your environment, for example to avoid desktop shortcuts or to disable auto-update for a program.

· Web Console (SaaS): Log in to the Secunia CSI from an internet browser for instant access to your data and reports - anywhere, at any time.

· Password Policy Configuration: Determine and enforce the global password policy for your organization to comply with internal and external policies, as well as to meet best-practice standards in your industry.

· Live updates: Get an immediate overview of how a new vulnerability affects your infrastructure as soon as the advisory has been released by Secunia Research, based on your latest scan results.

· PSI for Android: Scan Android devices for vulnerabilities with the Secunia PSI for Android, and integrate it with the Secunia CSI to support your BYOD policy.

· Secunia SC2012 Plugin 2.0: For CSI integration with Microsoft System Center 2012. This add-on makes it possible to deploy all third-party updates directly in Microsoft System Center 2012.

· Zero-Day Vulnerability Support: This add-on includes SMS or email alerts whenever a new zero-day vulnerability is discovered that affects the particular IT infrastructure. It is designed for organizations that have a sufficiently sophisticated security apparatus to enable them to act on the zero-day threat intelligence.

Why vulnerability intelligence is a crucial aspect of patch management

In 2012, Secunia recorded a total of nearly 10,000(3) discovered vulnerabilities in software programs, and more than 1,000 vulnerabilities in the 50 most popular programs alone(3). Most of these (86%) were discovered in third-party (non-Microsoft) programs(3), presenting IT teams with the huge challenge of how to retain control over increasingly complex infrastructures and user device autonomy and identify, acquire, install and verify patches for all applications in all systems.

As vulnerabilities are the root cause of security issues, understanding how to deal with them is a critical component of protecting any organization from security breaches. IT teams must know when a vulnerability is threatening the infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.

These aspects of risk assessment fall to IT Security and IT Operations respectively, and the two departments require different sets of tools to take strategic, pre-emptive action against vulnerabilities.

“The new Secunia CSI bridges the gap between the two sets of requirements. Security teams need vulnerability intelligence and scanning to assess risk in a constantly changing threat landscape, and IT operations need a patch management solution that is sufficiently agile to maintain security levels without impairing daily performance,” explains Morten R. Stengaard, Secunia CTO.

“The core of our solution is the vulnerability intelligence delivered by Secunia’s renowned in-house Research Team, who test, verify and validate public vulnerability reports, as well as conduct independent vulnerability research on a variety of products. No other patch management solution out there can provide this expertise. To deliver the intelligence to our customers we have created a patch management solution which is constantly evolving, to meet the changing requirements of our users,” says Morten R. Stengaard.



Flexibility is the driving force behind the Secunia CSI 7.0

To ensure that the Secunia CSI 7.0 is primed to work as a conduit to Secunia’s powerful vulnerability intelligence, scanning and patch management solution, flexibility has been the driving force behind the development of the Secunia CSI 7.0.

“Each organization is unique, with its own processes, regulatory standards and security procedures, and the improvements to the Secunia CSI 7.0 enables IT teams to adapt and scale the solution to match the requirements of virtually any organization,” says Morten R. Stengaard.

Bangladesh Meghna Petroleum Limited website hacked and defaced


"Raghupati Raghav Raja Raaam Patit Pawan Sita Ram....".  Yes an Indian hacker who calls himself 'Yamraaj' has hacked bangladesh petroleum subsidiary website(official website of Meghna Petroleum Limited) and this is the tune you will hear after entering the site.

Meghna Petroleum Limited is a subsidiary of Bangladesh petroleum corporation under the Ministry of Energy & Mineral Resources Division. It is engaged in storage, distribution and marketing of petroleum products across the national terrains of Bangladesh, under the Ministry of Energy & Mineral Resources Division.

Mr. Yamraaj left a deface page which contains a message "|YAMRAAJ WAS HERE| |LOVE TO ALL INDIAN HACKER OUT THERE|"


If you try to do anything on the site it will display a dialogue box telling -"Namaskar! Ek minite" and then he writes "YAMRAAJ says :: Dont do any thing stupid....just enjoy the show :) !!!"

Mr. Yamraaj seems to be a great Indian lover since the audio which has been embedded in the page contains "Bharat Mata ki Jai" a lot of times.

Link of targeted website along with its Zone-h mirror is available below: mpl.gov.bd/i.html ,  http://zone-h.org/mirror/id/20682771

Social Media accounts, SMS service of Tahrir News hacked


Hackers break into the official twitter and facebook accounts of Tahrir News, the popular Egyptian newspaper and published false information, according to Softpedia report.

The organization has confirmed the security breach and informed their subscribers about the security breach in their website.

"The media company believes the Muslim Brotherhood has launched this attack in an effort to 'spread chaos and cause confusion among Egyptians.' "The softpedia report says.

The security breach forced the organization to temporarily shut down the SMS service which was also reportedly hijacked by the hackers.

At the time of writing, Twitter and Facebok accounts appears to be recovered and back to normal.