Search This Blog

Powered by Blogger.

Blog Archive

Labels

Footer About

Footer About

Labels

Misconfigured Ai.Type Virtual Keyboard Database Exposes 31 Million Users' Personal Data

Researchers have discovered a mis-configured MongoDB database purportedly belonging to Ai.Type, a startup that designs and develops iOS and Android personalized keyboards, leaked information for more 31 million users.

The companies entire 577GB database was accidentally exposed to the public which allows anyone to browse through data, download information and delete stored data.

After looking into the leaked data, researchers saw data which seemed to be information such as full name, client phone number, location details, phone IMEI number, SMS number, user languages enabled, android version, emails, links associated with social media profiles, photos, country of residence, IP address and ISMI number.

Upon further research, over 373 million records were taken from user’s phones and over 750,000 records were obtained from a folder named “old databases.” The text entered on the keyboard was recorded and stored on an unprotected server.

Iranian Hacking Group Creates Fake News Agency

An Iranian hacking group named "Charming Kitten" is reportedly using the fake media site "The British News Agency" to target academics, activists, reporters, and political advisors involved with Iranian foreign policy in the United States and various European and Middle Eastern countries.

Charming Kitten is using the site, which has high-quality production value, to infect victims with unspecified malware. As of this alert, there are no details available on the nature of the malicious code.

The campaign also uses spear-phishing emails, false identities, and direct messages on social media platforms. The methods of delivery reportedly involve spear-phishing emails and direct messages on social media platforms, though few details were provided about how these messages deliver the malware.

Targets of this campaign include researchers, activists, media outlets, and political professionals focusing on Iranian issues.

Young hacker stolen personal database of Telecom subscribers and sold it

Eighteen-year-old hacker was able to compromise a secure database of a large Telecom operator from his home computer. The criminal case of illegal access to legally protected computer information was opened.

It turned out that a student of the Technology College developed a special program which you can use for downloading other people's accounts. Hacker learned how to do such program in his College.

So, student decided to test this program on the website of Telecom Operator.

The accused copied the personal database of 7325 subscribers of the telecommunication company.

And then the student decided to earn some money. He had time to sell stolen accounts to several customers, 15 to 18 thousand rubles per account.

- Christina

New Alternate Reality System Tricks Hackers Into Thinking Attack Worked

HADES, standing for High-fidelity Adaptive Deception and Emulation System, is scientist’s new answer to combating hackers. This anti-hacker system, rather than simply blocking the attack, uses an alternate reality to go a step further and actually feed the hackers with false information to make them think their attempt worked.


The aptly named HADES was developed by researchers at Sandia National Laboratories in the US. The system tricks the hackers into revealing their tools and methods by making them carry out the hack in an alternate reality, which basically clones the targeted environment the hacker wishes to enter.


Along with helping organizations protect their data, this will help the experts understand and combat the increasingly sophisticated hacking techniques that are being developed these days.


"Simply kicking a hacker out is next-to-useless. The hacker has asymmetry on his side; we have to guard a hundred possible entry points and a hacker only needs to penetrate one to get in," said researcher Vince Urias, who along with his team, created HADES, in a statement.


He further went on to explain that a hacker may have discovered and sent off over a year’s worth of false data before they realize that something’s wrong.


“And then the adversary must check all data obtained from us because they don’t know when we started falsifying,” he said. And it is at this point where the hacker’s tools and techniques are revealed as they work on separating fact from fiction.


However, HADES is not without its faults. While simple deceptive environments may be carried out on a small computer, large and complex ones cannot be done without huge memory resources and require more CPU.

Still, it is a breakthrough that has already allowed security experts to locate malware introduced into a system and is capable of active attack, and US Department of Homeland Security is already working with Sandia for deploying it.

Kshitija Agarwal

Personal data of 31 million Android users of virtual keyboard app revealed


Security researchers at  the Kromtech Security Center have discovered a massive data breach that could affect over 31 million customers of a popular virtual keyboard app, Ai.type after an open database was found online.  

The breached database MongoDB is believed to belong to Ai.Type a Tel Aviv-based startup that offers a personalized keyboard for phones and tablets supporting  Android as well as iOS devices. 

The app has more than 40 million users across the world.

According to the researchers, the database appears to contain records of only the Android users, which include users names, phone numbers, locations and Google queries.

The head of the app company admitted the breach, but compromised data was not sensitive.

Bob Diachenko, from the Kromtech Security Centre, said: "Why would a keyboard and emoji application need to gather the entire data of the user's phone or tablet?" 

"Based on the leaked database, they appear to collect everything from contacts to keystrokes," he wrote in his report.

However, Eitan Fitusi, chief executive and founder of Ai.type, said to the BBC, "It was a secondary database." 

He further added that the geo-location data was not accurate, and no IMEI information (a model number for a specific phone) had been gathered by the hackers. 

The database has now been shut down 

Rising peril of autonomous vehicles due to cyber attacks

Recently, automotive security threats have heightened from the realm of possibility to frightening reality. The issue has suddenly turned out to be much more critical as more and more cars keep on becoming connected, electric and have utilized autonomous driving features. The issue with these cutting-edge cars is that in order to offer numerous more sorts of services they are expected to remain connected, and once that happens then they are, by definition, "hackable".
Once these hackers get into your internet connected cars, they could disable the airbags, brakes, door locks and even steal cars. The recent episode of Tesla being hacked by Chinese hackers was enough to cause quite a stir. The impact of the hack was that the Chinese security scientists had discovered an approach to turn on the brakes remotely and getting the doors and the trunk of the car to open and close while blinking the lights, through this perplexing hack they could control the car by means of both Wi-Fi and a cell connection.
Likewise, there were a few findings of researchers who, as of late revealed a defect in the way the distinctive parts of a connected car interacted with each other, their work even took after a few exhibitions of remotely hacking into and taking control of the cars.
However, none of these hacks have yet been shown with customary vehicles on street. In any case, they, without a doubt showcase how cybersecurity is progressively turning into a major challenge to the car industry, particularly as vehicles increasingly incorporate driverless innovations and technology.
These have indeed worried the governments of a few nations to such a degree, to the point that they are now contemplating to release a set of guidelines for the matter, which underscores the requirement for various companies to cooperate in order to build such flexible vehicles whose security can be overseen all through their lifetime. In any case, the question still stands as to how the cars, as they are effectively becoming computers on wheels, can be kept safe from hackers.
One answer to this question might be that the diverse frameworks or systems that make up a car are progressively intended towards cooperating to enhance their proficiency thus, they all should have the capacity to convey. Including autonomous systems that make cars somewhat or completely self-driving, implying that the vehicles additionally must be connected to different cars and infrastructure out and about.
Then again, more features and functionality in cars are giving rise to more complexity. A single vehicle is currently equipped with millions of lines of codes, set up together by various manufacturers in various ways, this often makes it hard for the security analyzers to know where to look. For example, if the software recently utilized by Volkswagen to circumvent emissions limits had been a malicious virus, it might have taken months or years to discover the problem.


Nonetheless, the next big challenge is probably going to be the designing such vehicles that match security with safety. Be that as it may, in the longer run as the competition in the sector is gradually rising step by step and the companies are becoming solely reliant on the most recent autonomous and connected technologies to set themselves apart from the others and win new clients.

Their rivalry no doubt often brings about the reluctance to further share insight about more cyber threats and vulnerabilities or even cooperate to develop more secure designs, therefore, getting the car industry to coordinate is more important as the greatest threat that the society will withstand in the coming years as transportation changes are vehicle cybersecurity.
Medha Bhagwat

Andromeda botnet taken down, Belarusian involved arrested

A joint operation involving Germany, the United States and Belarus has taken down a malware system known as “Andromeda” or “Gamarue” that infected more than 2 million computers globally, Europol said on Tuesday.

Andromeda is best described as a "botnet", or group of computers that have been infected with a virus that allows hackers to control them remotely without the knowledge of their owners, using them to steal, destroy websites or spread malicious code.

The police operation, which involved help from Microsoft, was significant both for the number of infected computers and because Andromeda had been used over a number of years to distribute new viruses, said Europol spokesman Jan Op Gen Oorth.
"Andromeda was one of the oldest malware on the market," added the spokesman for Europol, the EU's law enforcement agency.

The suspect whom international authorities arrested in Belarus during a Nov. 29 operation to dismantle the Andromeda botnet has been identified with a high degree of certainty as Jarets Sergey Grigorevich – aka Ar3s, a high-profile cybercriminal and malware expert.

According to a Nov. 5 blog post from Recorded Future's Insikt Group, whose researchers made the identification, Ar3s, 33, is the mastermind of the botnet, and “one of the oldest and more highly respected members of the criminal underground.”

Also known as Apec (in Russian), Ch1t3r, and Sergey Jaretz or Sergey Jarets, Grigorevich's dealings in the Russian-speaking underground date back to at least 2014, the post continues. “Ar3s is recognized as a leading expert in malware development and reverse engineering, network security, and antivirus technology,” writes company blog post authors Andrei Barysevich, director of the advanced collection, and Alexandr Solad, intelligence analyst.

The takedown of the Andromeda system is notable not only because it took over so many computers but also because it was used to spread further danger, with the computers' assembled power being harnassed to spread viruses across the internet.

Website of Chelyabinsk court hits by data-encrypting malware



Attackers hacked into the website of Arbitration court of Chelyabinsk( a federal subject of Russia, on the border of Europe and Asia) and infected the server with a data encrypting malware.

The malware encrypted the information and files on the server. This incident took place on 4th October. By 10th October, the experts have managed to restore the website from previously saved backup.

However, the court lost all the information that was published on their website for this year, as the last backup operation was done only in January. The online resources including news, charts, video of conferences, information about bureau and judicial appointments were irretrievably lost.

According to the local report, the court is still trying to recover the information using their own sources.  There is no detailed information about the malware variant used in the attack.

- Christina

NATO considers a more aggressive cyber defense strategy

First came armies, then navies, air forces and now there are cyber-armies.

Seven members of the North Atlantic Treaty Organization (NATO) are considering a more aggressive approach to tackling state-sponsored hacking. They say retaliation could even involve cyber-attacks. However, there could be some hidden pitfalls since it’s very difficult to prove the source of any attack. 

Countries considering tougher responses to cyber attacks include the US, UK, Germany, Norway, Denmark, Spain and The Netherlands.
“There’s a change in the [NATO] mindset to accept that computers, just like aircrafts and ships, have an offensive capability,” said Michael Widmann, US Navy commander.

In 2014, NATO recognised the need for collective self-defence in the cyber-sphere. In 2016, it recognised the online world is a battle ground-land, air, sea and the internet. Now in 2017, they are talking about offensive capabilities- offence and attacks-that have escalated quickly.

“If someone doesn’t do something then someone else will, and so either you’re doing offensively or defensively. The likelihood of the recurring is very high and I would say that most responsible head of state would be powered by such a program,” said Roger Kay, CEO, Endpoint Technologies Associates.

Though all countries have the right to stand up for themselves, the problem here is that it’s difficult to prove anything in this offensive approach.

“Given the ability to use proxies and to spoof, it’s very difficult to tell where the cyber attack originates from. When the target is able to capture the code that compromises some machine, they can sometimes read the signature of that code and tell that it looks like Russian or Chinese or Israeli code. So through analytic analysis, a likely source can be determined. But one can’t tell where the actual payload came from,” added Kay.

The WikiLeaks knows that the CIA has an entire mechanism dedicated to impersonating others. They do this by faking digital ids, by leaving behind traces, leading to third parties like China or Russia which begs the question how will someone respond to one’s e-mail being hacked when they can’t reliably deduce who did it.

One can crash suspected adversaries-bank network or bring down a power plant, perhaps the national traffic light system. There are no rules in the cyber-world.

Student from the Russian city Vuktyl hacked school electronic diary

The computer science teacher of high school complained to the police of the city of Vuktyl.

It turned out that pupil of a ninth grade improved school grades. He did it by hacking electronic diary and correcting school grades of himself and his school friends. He used a home computer. Hacking information was uploaded to the flash card by young hacker from the computer in classroom.

Criminal charges would be brought under article "Illegal access to computer information".

A similar case occurred in mid-November in the gymnasium of Russian city Novosibirsk. The pupil changed 51 school grades. A criminal case was opened against him.

- Christina

Notable growth in the bitcoin market causes a stir

One of the world's fastest developing economies, India has seen a surge in both the awareness and also the adoption of Cryptographic forms of money i.e. Cryptocurrency especially since the dubious demonetization initiative in November 2016, which viably observed 86% of the nation's physical banknotes rendered old overnight. In 2013, the Reserve Bank of India had cautioned people in general against the utilization of such Virtual monetary forms.
This was after the central bank observed a rising interest for bitcoin, which it saw as risky as it was inclined to theft and had no intrinsic or underlying value, in light of the fact that regardless of how secure and legitimate uses  the payment system bitcoin may have, yet like other technologies it's additionally been demonstrated useful to cybercriminals looking for better approaches to extort money. In any case, the announcement made by the RBI additionally demonstrated that the institution would examine issues with respect to the virtual currency.


These announcements were additionally compounded earlier in August, this year when the Indian Finance Minister Arun Jaitley – the highest financial authority in the nation – conceded that the bitcoin market has indeed demonstrated "exceptional growth" in the parliamentary session, the minister's words were sufficient to drum up a buzz.
However, there is no denying the fact that bitcoin’s popularity in India has grown quite a lot after demonetization took its toll on the country at the time of its announcement in November, the price of one bitcoin in India was $757. It was lingering between $866 and $896 during the early days of demonetization, and then it suddenly escalated to $1.020, 18 days after Prime Minister Narendra Modi made the official announcement on November 8, 2016, and surprisingly the bitcoin was valued around $770 in the U.S the same day.
Therefore on 12th  of April of this current year, the Indian government announced that they have assembled a council to implement bitcoin regulation. Comprising of the central bank itself, and a few finance-related institutions - government organizations and commercial banks, the committee created a deadline to come up with the final report in 3 months time.
The committee soon opened itself to citizens from suggestions and recommendations concerning the control and legality of virtual currency. As just this week, while the cryptocurrency market capital has hit the $200 Bn mark, basically led by Bitcoins which represents $120 Bn, the "bubble", as called by many, has gotten and is still getting more stronger with each passing day.


The government’s “Cashless India” initiative has also led to the RBI researching fiat cryptocurrencies to develop a digitized version of the rupee, India’s fiat currency. Other countries/cities like Russia and Dubai have already done so and by embracing bitcoin too are seeking to set some kind of regulations.
In India, with no official declaration yet, the government has gone into stealth mode. On one hand, the RBI says that it may launch its own particular digital money (cryptocurrency), while then again, the administration board is as yet unyielding on banning the whole Cryptographic money operations. Given that Bitcoin is the most mainstream cryptographic money, the bitcoin regulation would be the best method for monitoring digital money.
Yet the report by the interdisciplinary committee set up by the Indian Government is indeed considered, a step in the direction of bitcoin regulation in India, no matter how strict regulations it suggests.





.