North Korean Hackers Gain Access to Chilean ATMs Through Skype

The one thing no one expects on a job interview is North Korean hackers picking up on the other line. But that’s apparently exactly what happened to a hapless employee at Redbanc, the company that handles Chile’s ATM network. The bizarre story was reported in trendTIC, a Chilean tech site. A Redbanc employee found a Read more about North Korean Hackers Gain Access to Chilean ATMs Through Skype[…]

South Korea says mystery hackers cracked advanced weapons servers

The South Korea Ministry of National Defense says 10 of its internal PCs have been compromised by North Korea unknown hackers . Korea’s Dong-A Ilbo reports that the targeted machines belonged to the ministry’s Defense Acquisition Program Administration, the office in charge of military procurement. The report notes that the breached machines would have held Read more about South Korea says mystery hackers cracked advanced weapons servers[…]

202 Million private Chinese resumes exposed

On December 28th, Bob Diachenko, Director of Cyber Risk Research at Hacken.io and bug bounty platform HackenProof, analyzed the data stream of BinaryEdge search engine and identified an open and unprotected MongoDB instance: The same IP also appeared in Shodan search results: Upon closer inspection, an 854 GB sized MongoDB database was left unattended, with Read more about 202 Million private Chinese resumes exposed[…]

Modlishka allows for very easy fishing / MITM

You basically just put it on a local domain, point people there and it forwards the traffic up and down to the target website – so no templates, no warnings. It will also push through two factor authentication requests and answers. Modlishka is a flexible and powerful reverse proxy, that will take your phishing campaigns Read more about Modlishka allows for very easy fishing / MITM[…]

Can’t unlock an Android phone? No problem, just take a Skype call: App allows passcode bypass

A newly disclosed vulnerability in Skype for Android could be exploited by miscreants to bypass an Android phone’s passcode screen to view photos, contacts, and even launch browser windows. Bug-hunter Florian Kunushevci today told The Register the security flaw, which has been reported to Microsoft, allows the person in possession of someone’s phone to receive Read more about Can’t unlock an Android phone? No problem, just take a Skype call: App allows passcode bypass[…]

Researcher Distributes Tool That Enables Mass-Hijacking of Google Chromecast Devices

Uploaded to Github on Thursday, a tool called Crashcast enables the almost instantaneous takeover all of Chromecast streaming devices left accessible online by mistake. This same misconfiguration issue was taken advantage of by the hacker duo Hacker Giraffe and j3ws3r earlier this week to broadcast a message in support of the YouTube star Felix Kjellberg, Read more about Researcher Distributes Tool That Enables Mass-Hijacking of Google Chromecast Devices[…]

Equifax how-it-was-mega-hacked damning dossier lands, in all of its infuriating glory

A US Congressional report outlining the breakdowns that led to the 2017 theft of 148 million personal records from Equifax has revealed a stunning catalog of failure. The 96-page report (PDF) from the Committee of Oversight and Government Reform found that the 2017 network breach could have easily been prevented had the company taken basic Read more about Equifax how-it-was-mega-hacked damning dossier lands, in all of its infuriating glory[…]

Hack of 100 Million Quora Users Could Be Worse Than it Sounds

On Monday, the question and answer site Quora announced that a third-party was able to gain access to virtually every data point the company keeps on 100 million users. Even if you don’t recall having a Quora account, you might want to make sure. In a blog post, Quora CEO Adam D’Angelo explained that the Read more about Hack of 100 Million Quora Users Could Be Worse Than it Sounds[…]

Twitter user hacks 50,000 printers to tell people to subscribe to PewDiePie

A Twitter user using the pseudonym of @TheHackerGiraffe has hacked over 50,000 printers to print out flyers telling people to subscribe to PewDiePie’s YouTube channel. The messages have been sent out yesterday, November 29, and have caused quite the stirr among the users who received them, as they ended up on a bunch of places, Read more about Twitter user hacks 50,000 printers to tell people to subscribe to PewDiePie[…]

Mass router hack exposes millions of devices to potent NSA exploit through UPNP

More than 45,000 Internet routers have been compromised by a newly discovered campaign that’s designed to open networks to attacks by EternalBlue, the potent exploit that was developed by, and then stolen from, the National Security Agency and leaked to the Internet at large, researchers said Wednesday. The new attack exploits routers with vulnerable implementations Read more about Mass router hack exposes millions of devices to potent NSA exploit through UPNP[…]

Marriott’s Starwood hotels mega-hack: Half a BILLION guests’ deets exposed over 4 years

US hotel chain Marriott has admitted that a breach of its Starwood subsidiary’s guest reservation network has exposed the entire database – all 500 million guest bookings over four years, making this one of the biggest hacks of an individual org ever. “On September 8, 2018, Marriott received an alert from an internal security tool Read more about Marriott’s Starwood hotels mega-hack: Half a BILLION guests’ deets exposed over 4 years[…]

Talk about a cache flow problem: This JavaScript can snoop on other browser tabs to work out what you’re visiting

Computer science boffins have demonstrated a side-channel attack technique that bypasses recently-introduced privacy defenses, and makes even the Tor browser subject to tracking. The result: it is possible for malicious JavaScript in one web browser tab to spy on other open tabs, and work out which websites you’re visiting. This information can be used to Read more about Talk about a cache flow problem: This JavaScript can snoop on other browser tabs to work out what you’re visiting[…]

Google traffic routed to Russian and Chinese servers in BGP attack

People’s connections in the US to Google – including its cloud, YouTube, and other websites – were suddenly rerouted through Russia and into China in a textbook Border Gateway Protocol (BGP) hijacking attack. That means folks in Texas, California, Ohio, and so on, firing up their browsers and software and connecting to Google and its Read more about Google traffic routed to Russian and Chinese servers in BGP attack[…]

The US Military Just Publicly Dumped Russian Government Malware Online

This week, US Cyber Command (CYBERCOM), a part of the military tasked with hacking and cybersecurity focused missions, started publicly releasing unclassified samples of adversaries’ malware it has discovered. CYBERCOM says the move is to improve information sharing among the cybersecurity community, but in some ways it could be seen as a signal to those Read more about The US Military Just Publicly Dumped Russian Government Malware Online[…]

Trivial Bug in X.Org Gives Root Permission on Linux and BSD Systems

A vulnerability that is trivial to exploit allows privilege escalation to root level on Linux and BSD distributions using X.Org server, the open source implementation of the X Window System that offers the graphical environment. […] Three hours after the public announcement of the security gap, Daemon Security CEO Michael Shirk replied with one line Read more about Trivial Bug in X.Org Gives Root Permission on Linux and BSD Systems[…]

How A Massive Ad Fraud Scheme Exploited Android Phones To Steal Millions Of Dollars

Last April, Steven Schoen received an email from someone named Natalie Andrea who said she worked for a company called We Purchase Apps. She wanted to buy his Android app, Emoji Switcher. But right away, something seemed off. “I did a little bit of digging because I was a little sketched out because I couldn’t Read more about How A Massive Ad Fraud Scheme Exploited Android Phones To Steal Millions Of Dollars[…]

Recent wave of hijacked WhatsApp accounts traced back to voicemail hacking

A wave of reports about hijacked WhatsApp accounts in Israel has forced the government’s cyber-security agency to send out a nation-wide security alert on Tuesday, ZDNet has learned. The alert, authored by the Israel National Cyber Security Authority, warns about a relatively new method of hijacking WhatsApp accounts using mobile providers’ voicemail systems. This new Read more about Recent wave of hijacked WhatsApp accounts traced back to voicemail hacking[…]

Netherlands Defence Intelligence and Security Service disrupts Russian cyber operation targeting OPCW

On 13 April 2018, with support from the Netherlands General Intelligence and Security Service and UK counterparts, the Netherlands Defence Intelligence and Security Service (DISS) disrupted a cyber operation being carried out by a Russian military intelligence (GRU) team. The Russian operation had targeted the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Read more about Netherlands Defence Intelligence and Security Service disrupts Russian cyber operation targeting OPCW[…]

Facebook Could Face Up to $1.63 Billion Fine for 50m User Hack Under the GDPR

Facebook’s stunning disclosure of a massive hack on Friday in which attackers gained access tokens to at least 50 million accounts—bypassing security measures and potentially giving them full control of both profiles and linked apps—has already stirred the threat of a $1.63 billion dollar fine in the European Union, according to the Wall Street Journal. Read more about Facebook Could Face Up to $1.63 Billion Fine for 50m User Hack Under the GDPR[…]

Resident evil: Inside a UEFI rootkit used to spy on govts, made by you-know-who (hi, Russia)

A rootkit is a piece of software that hides itself on computer systems, and uses its root or administrator-level privileges to steal and alter documents, spy on users, and cause other mischief and headaches. A UEFI rootkit lurks in the motherboard firmware, meaning it starts up before the operating system and antivirus suites run, allowing Read more about Resident evil: Inside a UEFI rootkit used to spy on govts, made by you-know-who (hi, Russia)[…]

Cold Boot Attacks are back – plug a sleeping laptop into some kit and read all the memory, slurp all the passwords

Olle and his fellow cyber security consultant Pasi Saarinen recently discovered a new way to physically hack into PCs. According to their research, this method will work against nearly all modern computers. This includes laptops from some of the world’s biggest vendors like Dell, Lenovo, and even Apple. And because these computers are everywhere, Olle Read more about Cold Boot Attacks are back – plug a sleeping laptop into some kit and read all the memory, slurp all the passwords[…]

Hacker swipes Snapchat’s source code, publishes it on GitHub

Snapchat doesn’t just make messages disappear after a period of time. It also does the same to GitHub repositories — especially when they contain the company’s proprietary source code. So, what happened? Well, let’s start from the beginning. A GitHub with the handle i5xx, believed to be from the village of Tando Bago in Pakistan’s Read more about Hacker swipes Snapchat’s source code, publishes it on GitHub[…]

How a hacker network turned stolen press releases into $100 million

At a Kiev nightclub in the spring of 2012, 24-year-old Ivan Turchynov made a fateful drunken boast to some fellow hackers. For years, Turchynov said, he’d been hacking unpublished press releases from business newswires and selling them, via Moscow-based middlemen, to stock traders for a cut of the sizable profits. Oleksandr Ieremenko, one of the Read more about How a hacker network turned stolen press releases into $100 million[…]

Nostalgic social network ‘Timehop’ loses data from 21 million users

A service named “Timehop” that claims it is “reinventing reminiscing” – in part by linking posts from other social networks – probably wishes it could go back in time and reinvent its own security, because it has just confessed to losing data describing 21 million members and can’t guarantee that the perps didn’t slurp private Read more about Nostalgic social network ‘Timehop’ loses data from 21 million users[…]