Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Bitcoin Payment Solutions (BIPS) hacked, $1 million stolen


Danish bitcoin exchange Bitcoin Payment Solutions (BIPS) is the latest victim of Bitcoin website hacks.

The BIPS has temporarily shut down the consumer its consumer wallet initiative after hackers reportedly steal Bitcoins worth more than $1 million(1200+ BTC).

The company says it will consider reintroducing the wallet with a re-architected security model in order to prevent future cyber attacks.

"All existing users will be asked to transfer bitcoins to other wallet solutions, and users affected by the security breach will be contacted" says the company in their official press release.

This is third Bitcoin website's security breach that we are covering in this month.  Earlier this month, we reported that hackers attacked Bitcash.cz and Inputs.io and steal more than $1 in Bitcoins.

14 alleged RedHack and Anonymous hackers referred to court


A total of 14 alleged members of Turkish hacktivist RedHack and Anonymous hacktivists have been detained.

The Word Bulletin reports that suspects were referred to the Ankara Courthouse on Monday.  The operation is against the RedHack group which is being labeled as a criminal organization by Turkish Government.

The Ankara Police Department's Cyber Crime Units arrested alleged hackers from various locations including Ankara, KahramanmaraÅŸ, Bursa, Mersin.

The suspects are accused of being part of hacking attacks against Government and individuals and disclosing confidential information.

However, the RedHack group says none of the arrested people are part of their group.

"All those arrested are not known to us. Every single one in our team is safe. Fascist gov't of Turkey continues it's scaremongering to + "The tweets posted by the hacker group reads.

"they are trying new tactics to cut the support to RedHack. But what they don't realise is that #RedHack have become the RedPeople Now"

*UPDATE: The suspects released by court 
14 Turkish people including one actor "Barış Atay" who are accused of being member of Redhack hacker group have been released by the Ankara Court, according to the Turkish local news report.

AutoCAD malware opens gateway for cybercriminals

Security Researchers at Trend Micro have discovered a new and rare type of malware which is disguised as a legitimate Autocad component with '.FAS' extension.

The malware opens up infected machines to exploits. It first creates user account with admin privileges and then creates network shares for all drives in the victim's machine.

It also opens the ports 137 to 139 (ports known for NetBIOS service) and 445 is used for Microsoft-DS SMB file sharing service that provides access to files, printers, serial ports .

The open ports can be abused by cybercriminals for exploiting old SMB based vulnerabilities.

It appears the attacker created admin account for the sake of making his "access" to the system is easy so that he doesn't need to crack password for existing accounts or remotely create one.  

The attacker can now easily steal all files from the infected machines.  He can also infect the target machine with any other data stealing malware.

Encrypted Chat service website "Cryptocat" blocked in Iran

Cryptocat, a website that provides secure and encrypted messaging service has been blocked in the Iran. 


Despite the Iranian officials claims to offer more internet freedom, the top social networks like Facebook, twitter have been blocked in Iran, reports Mashable. Now, they have also blocked the Cryptocat service.

The cryptocat official website reports that cryptocat is appeared to be the first and only encrypted chat application to be censored in Iran.

Though the main website and service page is redirected to censorship page, their blog is accessible for Iranian users.  The app is still available in Chrome web store and Firefox add on.

In the blog post, cryptocat explained how to access their cryptocat service in Iran -  Users can still access the website using the TOR browser, a software that enables online anonymity and helps users to bypass internet censorship.

Digital Sleeper Cell: NSA infected 50,000 computer network with data stealing malware

The NSA has infected more than 50,000 computer networks across globe with a malware which is capable of stealing sensitive data from the victim's machine.

According to the NRC.nl report which is based on documents provided by US whistleblower Edward Snowden, the practice called as Computer Network Exploitation (CNE)".

The malware is being referred as "digital Sleeper cell" , it is being controlled by NSA and they can remotely turn it on or off.

The number of infected networks in 2008 is reportedly over 20,000.  By mid of the 2012, the number of infected network is increased to 50k.

CryptoLocker ransomware reduce the price for decrypting files

As a bitcoin value continuous its climb, now it is more than $800, the criminals behind cryptolocker ransomware have also come with up an idea to reduce the price for decrypting files to 0.5 Bitcoins.

Initially, the ransomware were asking victims to pay 2 Bitcoins as ransom in order to decrypt their files.

The victims who failed to pay the ransom within a particular time will be asked to use their decryption service if they want to get back their encrypted files.  However, victims need to pay more than before.


The new variant of CryptoLocker ransomware spotted by F-Secure security team on November 20 is asking users to pay 0.5 Bitcoins instead.

Arul Kumar discovered Open URL Redirection Bugs in facebook worth $1500

Arul Kumar, a bug hunter from TamilNadu,India who recently got $12,500 as bounty from Facebook, has today shared how he managed to identify multiple open url redirection vulnerabilities in Facebook.

He identified three open url redirection vulnerabilities in the facebook's dialogs, it could be exploitable to all users who are signed into facebook.

At first, facebook team rejected his finding because it needs some user interaction- users should click ok button in order to redirect the target website.

 

However, Arul managed to bypass it and redirect to the target website without user interaction. The facebook team accepted the vulnerability after bypassing the user interaction and offered $1500 bounty.

The list of vulnerable URL:
  • https://m.facebook.com/dialog/send?next=htp://google.com&error_ok=arul 
  • https://m.facebook.com/dialog/pagetab?next=htp://google.com&error_ok=arul 
  • https://m.facebook.com/dialog/apprequests?next=htp://google.com  &error_ok=arul

E! Online website hacked by Tesla Team


TeslaTeam, one of the infamous hacker group from Serbia, claimed to have hacked into one of the most famous celebrity fashion sites E!NEWS.

E! News is one of the high profile website that has alexa rank around 600, provides entertainment news, celebrities, celeb news, and celebrity gossip.

The group has discovered a SQL injection vulnerability in one of the subdomain of E News(br.eonline.com), the poc for this vulnerability has been provided along with the database dump(pastebin.com/2c28RJDe)

The database dump contains the list of tables, username and password phone of admin and other users.

The same group recently hacked into the Vevo website and leaked the database.

Sun TV website hacked by Pakistan Hacker


Pakistani hacker known with online handle "Hasnain Haxor" who is recently being featured in news for his hacking attacks targeting TV Network has once again breached another top Tamilnadu TV channel network.

Sun Network is the latest victim of the hack.  The following Sun Network websites have been defaced in recent attack: Official Sun Network (sunnetwork.in), Fm websites(redfm.in,suryanfm.in), sun.in and sunpictures.in.

We aware of the recent incident where an Indian hacker has been arrested for Jaya TV website hack. 

However, the hacker who behind the Jaya TV website hack is from Pakistan defacing all other TV channel network and left a defacement message saying:

"We Are PHC ( PAKISTAN HAXORS CREW ) We Just Want Justice & Peace
I Hack AIADMAK website & jaya Tv So Kick Out That Innocent Kid From The Jail"
The same hacker recently hacked into Puthiya Thalamurai website and left the same defacement message.

In case, you are not able to see the defacement, you can check the defacement mirror here:  1.http://zone-hc.com/archive/mirror/b3f36ce_sunnetwork.in_mirror_.html
2. http://zone-h.com/mirror/id/21209662
3. http://zone-h.com/mirror/id/21209519
4. http://zone-h.com/mirror/id/21209514
5. http://zone-h.com/mirror/id/21209511

All other hacking attempts done by the hacker has been mirrored here: http://zone-h.com/archive/notifier=hasnain%20haxor

Puthiyathalaimurai Website Hacked by same hacker as JavaTV and AIADMAK site .

A pakistani hacker by name "H4$N4!N H4XOR" belonging  to "Pakistan Haxors Crew" who hacked the JayaTV website and AIADMAK site before has now hacked the Puthiyathalaimurai website again and left the following message.




" Security Breach!
Hello Admin, I Hack AIADMAK website & jaya Tv So Kick Out That Innocent Kid From The Jail.
Your Site Security Is 0% And Easy To F***k,
PATCH YOUR SECURITY! "

He was talking about the recent arrest of  P. Eswaran by Central Crime Branch whom they arrested on suspicion of hacking the AIADMAK site. Eswaran said that he was only trying to fix the vulnerability and this hack seems to also  suggest that also. The pakistani hacker who initially posted  about the defaces is still active.

Though Eswaran was only trying to protect the website what he did is still illegal under section 66 of the IT Act . It would be very interesting to see how this case would play in court since it is the first of its kind.

Privilege escalation vulnerability in VMware Workstatation and Player fixed

VMware, one of the popular virtual machine software, has issued security update for VMware Workstation and VMware Player patches a vulnerability(CVE-2013-5972) that could result in an escalation of privilege on Linux-based host machines.

"VMware Workstation and VMware Player contain a vulnerability in the handling of shared libraries. " the Security advisory reads.

The vulnerability allows a local attacker to escalate the privilege to root in the host OS.  The security flaw doesn't allow an attacker for privilege escalation from the Guest Operating System to the host or vice-versa.

VMware workstation 9.x versions and VMPlayer 6.x versions on Linux host machines are affected by this vulnerability.

Users are recommended to apply the patch.  Download the latest versions from here: 1https://www.vmware.com/go/downloadworkstation , 2.https://www.vmware.com/go/downloadplayer