Software Update to $20 Phones Could Topple 2G Cell Networks

In normal situations, when a call or SMS is sent over the network, a cellular tower “pages” nearby devices to find the one that should receive it. Normally, only the proper phone will answer—by, in effect, saying “It’s me,” as Seifert puts it. Then the actual call or SMS goes through.

The rewritten firmware can block calls because it can respond to paging faster than a victim’s phone can. When the network sends out a page, the modified phone says “It’s me” first, and the victim’s phone never receives it.

“If you respond faster to the network, the network tries to establish a service with you as an attacker,”

via Software Update to $20 Phones Could Topple 2G Cell Networks | MIT Technology Review.

The “Red October” Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies – Securelist

During the past five years, a high-level cyber-espionage campaign has successfully infiltrated computer networks at diplomatic, governmental and scientific research organizations, gathering data and intelligence from mobile devices, computer systems and network equipment.

Kaspersky Lab’s researchers have spent several months analyzing this malware, which targets specific organizations mostly in Eastern Europe, former USSR members and countries in Central Asia, but also in Western Europe and North America.

It doesn’t seem to be a governmental attack, allthough the base code seems to be written by Chinese people and plugins by Russians. Someone out there has an awesome intelligence gathering capability!

The "Red October" Campaign – An Advanced Cyber Espionage Network Targeting Diplomatic and Government Agencies – Securelist.

Use the Magic SysRq Key on Linux to Fix Frozen X Servers, Cleanly Reboot, and Run Other Low-Level Commands – How-To Geek

A useful summary:

Cleanly Restarting Your System

Used in sequence, some of these actions can be used to cleanly end processes, flush data to disk, unmount all file systems, and restart your computer. To perform this process, press and hold the Alt + SysRq key combination and – while holding the Alt and SysRq keys down — type the following keys in order, pausing for several seconds in between each key:

reisub

The mnemonic “Raising Elephants Is So Utterly Boring” is often used to remember this sequence. Here’s what each key does:

r – Puts the keyboard into raw mode, taking control of it away from the X server.
e – Sends the terminate signal to all processes, asking them to end gracefully.
i – Sends the kill signal to all processes, forcing them to end immediately.
s – Flushes data from your cache to disk.
u – Remounts all file systems read-only.
b – Reboots your computer.

More Commands

Here are some other actions you can perform with the magic SysRq key. To perform an action, press and hold the Alt + SysRq keys while typing the letter:

n – Resets the nice level (priority) of all high and realtime priority processes.
f – Calls oom_kill, which will kill a memory-hogging process.
o – Shuts off the computer.

Use the Magic SysRq Key on Linux to Fix Frozen X Servers, Cleanly Reboot, and Run Other Low-Level Commands – How-To Geek.

$1000,- to hack US UAVs and control them

A group of researchers led by Professor Todd Humphreys from the University of Texas at Austin Radionavigation Laboratory recently succeeded in raising the eyebrows of the US government. With just around $1,000 in parts, Humphreys’ team took control of an unmanned aerial vehicle operated by the US Department of Homeland Security.

They used the same technique the Iranians claimed to have used to force the US’ latest and greatest stealth UAV to land on their territory: spoofing the GPS signal of the drone, lending a lot of credibility to that claim.

Texas college hacks government drone — RT.

TOOOL Emergency Lock-Pick Card

Thanks to The Open Organisation of Lockpickers (TOOOL) and their ISO Standard Emergency Pick Card,

there’s no need to worry! This handy lock-picking tool set will fit in your wallet next to your other cards and can be quickly snapped apart when a situation arises. After the tools have been removed you can put the tension wrenches in your wallet and put the lock picks on your key chain, ready for your next emergency.

via TOOOL Emergency Lock-Pick Card.

Three steps to properly protect your personal data

Basically it comes down to implementing full disk encryption, creating an encrypted volume inside this with an easy password and a hidden encrypted volume with a hard password which people won’t bother to find. Then installing a tracker to find your laptop back if it gets stolen.

Three steps to properly protect your personal data – CSO Online – Security and Risk.

International Cryptography Freedom

Since 2000 the US has cracked down hard on cryptography information sharing and it’s hard to find any information on it since around 2001.

There are still a few good sources around.

Piracy.com: International Cryptography Freedom.

Cryptography links outside of North America

C4I.org strong crypto links

Treachery Unlimited

Shmoo

Speak Freely encrypted VOIP

utopia hacktic

uni-hamburg

PGP International

Sunet.se

Semper

It’s incredible how research in cryptography seems to have been wiped out.

Poorly secured SCADA systems logins posted live on Twitter

Basically SCADA systems are so poorly secured you can find their logins on Google. In a protest that people are uncovering vulnerabilities but the suppliers aren’t fixing the problem but rather trying to silence the exploiters entirely, this twitter account is posting links to loads of SCADA systems. So if you want to play with some systems, now is your chance 🙂

Someone unnumbered ntisec on Twitter.