Takes

now browsing by tag

 
 

COVID-19 takes its own toll on kids | #coronavirus | #kids. | #children | #parenting | #parenting | #kids

Travis Whitehead/Valley Morning Star Homer Salinas, 13, of Harlingen, has sheltered at home for months while the COVID-19 pandemic rages. The eighth grader at Memorial Middle School says it hasn’t […] View full post on National Cyber Security

Beijing Attempts To Remake Hong Kong In Its Image As National Security Law Takes Hold | #teacher | #children | #kids | #parenting | #parenting | #kids

Textbooks censored. Teachers investigated for improper speech. Students arrested and charged with secession for their social media posts. Just over a month after Beijing imposed a national security law in […] View full post on National Cyber Security

#hacking | #SocialSec – Hot takes on this week’s biggest cybersecurity news (Feb 7)

Source: National Cyber Security – Produced By Gregory Evans

Expired cert blamed on Microsoft Teams outage; rancor over Iowa caucus app; and an artist with 99 smartphones causes traffic mayhem in Berlin

This week didn’t get off to the smoothest of starts for Microsoft Teams users, as widespread reports surfaced on Monday that the collaboration software had ground to a halt.

From around 8:30 ET on February 3, users around the world were unable to log into Microsoft’s Slack-like group messaging service, leaving them with nothing else to do but post impromptu memes on Twitter.

At around 10:00 ET, Microsoft said it had discovered that the problem was due to an expired digital certificate.

The Teams service was restored later that day, although with a reported 20 million daily users being locked out of their accounts, the episode no doubt left the chat app’s devs more than a little red-faced.

In the US, social media feeds have been clogged with news of ‘The App That Broke the Iowa Caucus’.

Tech outlets were quick to jump onto reports that the results from Monday’s Democratic caucus in the midwestern state had been delayed because of problems with the smartphone app that was being used to report votes.

The confusion delayed the announcement of the winner in the first round for presidential hopefuls. Unsurprisingly, the fracas attracted no small amount of controversy, with many directing their ire towards the app developers.

Speaking to CNET, Irfan Asrar of cybersecurity company Blue Hexagon, said: “What we believe is, this is an oversight, and an example of the app being rushed into production.”

Offering their own take on the situation (and framing their article with a pointed reminder that “trust and transparency are core to the US elections”), Motherboard published the full .apk file of the app that malfunctioned and sent the caucus into a tailspin.

From unreliable apps to shady social media accounts, Twitter said it has suspended a large network of “fake accounts” that were being used to exploit its API in order to match usernames to phone numbers.

According to TechCrunch, a bug in the microblogging platform opened the door for an attacker to submit “millions of phone numbers” through an official API, which returned any associated user account.

The news comes as Indian website The Print reported allegations that “nearly 18,000 Twitter accounts” were spreading fake news on behalf of the right-wing Bharatiya Janata Party (BJP).

“Approached for comment, both the BJP and the Congress [a rival Indian party] denied the allegation that they supported accounts propagating misinformation,” the report reads.

And finally this week, an artist has shown how Google Maps could be abused to cause potential chaos on the roads, after he wheeled 99 smartphones in a wagon around Berlin in order to create a fake traffic jam.

In his ‘Google Maps Hacks’ performance piece, Simon Weckert demonstrated how it was possible to turn a ‘green street’ to ‘red’ on the popular online mapping service – showing how one small step for a man could have a giant impact on other road users, who would be directed into taking alternative routes from an actually clear road.

A video posted to Weckert’s YouTube account offers a real-time demonstration of what The Daily Swig is dubbing a ‘Distributed Denial-of-(Road) Surface’ attack. *bows*

Source link

The post #hacking | #SocialSec – Hot takes on this week’s biggest cybersecurity news (Feb 7) appeared first on National Cyber Security.

View full post on National Cyber Security

#hacking | #SocialSec – hot takes on this week’s biggest cybersecurity news (Jan 10)

Source: National Cyber Security – Produced By Gregory Evans

CES kicks off as Las Vegas tackles cyber-attack; British electronics retailer slapped with ICO fine; and nominations open for the top 10 web hacking techniques of 2019

CES 2020 opened its doors in Las Vegas this week, with tech enthusiasts from around the world getting a first look at hundreds of thousands of new gadgets and gizmos from more than 4,000 exhibiting companies.

With four conference sessions being dedicated to security and privacy this year, it’s good to see that infosec was not completely overshadowed by the invisible keyboards, next-gen wheelchairs, and other products of the (not too distant) future.

However, dominating Twitter this week was the organizers’ decision to bring in Ivanka Trump as CES keynote speaker.

Trump took to the stage to discuss the importance of government and industry collaboration for jobs creation, along with employer-led strategies to reskill workers.

Many, however, questioned the organizers’ choice of keynote speaker.

“Ivanka is not a woman in tech,” tweeted Brianna Wu, a software engineer who is running for Congress in Massachusetts.

“She’s not a CEO. She has no background. It’s a lazy attempt to emulate diversity, but like all emulation it’s not quite the real thing.”

Outside of the exhibition hall, Las Vegas officials said the city narrowly avoided a security incident on January 7.

Municipal officials confirmed that systems were attacked early on Tuesday morning, forcing government IT staff to take down a number of online services, including its public website.

A full-blown crisis was apparently averted thanks to swift action from those tasked with protecting Sin City’s digital infrastructure.

Elsewhere, the US Department of Homeland Security (DHS) issued a bulletin warning of a potential escalation of malicious cyber activity following the recent killing of Iranian military commander Qasem Soleimani.

Speaking to The Daily Swig this week, Suzanne Spaulding, advisor at Nozomi Networks and former DHS employee said the risk of retaliatory action by Iran is particularly high, given “that the ‘red lines’ are not clearly defined in cyberspace”.

Check out our coverage for more on the Iranian cyber threat.

Over in the UK, electronics retailer DSG Retail has been fined £500,000 ($655,000) after its point of sale system was compromised.

An investigation by the Information Commissioner’s Office (ICO) found that an attacker installed malware on nearly 5,400 checkout tills in Currys PC World and Dixons Travel stores between July 2017 and April 2018.

As previously reported by The Daily Swig, the breach impacted at least 14 million people and resulted in the payment card details of 5.6 million consumers being compromised.

“DSG breached the Data Protection Act 1998 by having poor security arrangements and failing to take adequate steps to protect personal data,” the ICO said.

“This included vulnerabilities such as inadequate software patching, absence of a local firewall, and lack of network segregation and routine security testing.”

Although £500,000 would be enough to make even the world’s biggest organizations sit up and pay attention, some noted that if the breach had taken place just one month later, DSG could have faced a far heftier, GDPR-induced fine.

And finally, nominations are open for the top 10 web hacking techniques of 2019.

Hosted annually by PortSwigger, this community-led initiative aims to seek out and honor the best hacking techniques of the past 12 months.

Caching exploits topped the 2018 web security hit list, and while it remains to be seen who will lead the pack this year, nominations in 2019 include developments in server-side request forgery, request smuggling, mutation cross-site scripting, and many other areas of research.

Check out the PortSwigger blog for full details.

Source link

The post #hacking | #SocialSec – hot takes on this week’s biggest cybersecurity news (Jan 10) appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | hacker | Cybersecurity takes the stage | SC Media

Source: National Cyber Security – Produced By Gregory Evans

No longer just the concern of IT, cybersecurity is the bad boy headliner that dominates centerstage and all stages beyond.  Teri Robinson reports. 

At the recent Lonestar Blues and Heritage Festival in, where else, Texas, fans bounced between the main stage where headliners strutted their stuff and the porch stage where more modest acts plucked their guitars – and they all had one thing in common, blues, once relegated outside the mainstream, permeated everything. 

That’s how it is with cybersecurity. It’s now the headliner on the main stage and it fills the side stages, too, holding the crowd in its thrall, with hot licks and tricks. Whether you scurry or stroll leisurely from one stage to the next depends entirely upon your security posture. 

“Cybersecurity is everyone’s problem, and the current state is troubling. According to Gartner, 99 percent of breaches exploit known infrastructure vulnerabilities,” says Thomas Hatch, CTO and cofounder of SaltStack. “If this isn’t indicative of a pervasive systematic problem with our cybersecurity efforts, I don’t know what is.” 

“Cybersecurity made headlines for all the wrong reasons in 2019. There seemed to be more thefts and breaches involving digital identity than ever before,” says Shahrokh Shahidzadeh, CEO at Acceptto. “Even trusted technologies like MFA generated negatives headlines.” 

These following acts took the stage during the past year. 

Open servers 

2019 may have left you wondering, yet again, if anyone at all bothered to secure their AWS S3 buckets or any other cloud-based database for that matter. Just recently, an unsecured Elasticsearch database, uncovered by security researcher Bob Diachenko, exposed the account information of about 7.5 million Adobe Creative Cloud users. 

And researchers Noam Rotem and Ran Locar from vpnMentor claimed to have found an open Elasticsearch database containing five million records related to 1.5 million Freedom Mobile customers, though those figures were disputed by the telecommunications company. 

The exposed files contained email address, home and mobile phone numbers, home addresses, dates of birth, customer types, IP addresses connected to payment methods and encrypted credit card and CVV numbers. 

Whether it was a credit firm, a subscription television company or online casinos, no one, it seems, was immune from the folly of not misconfiguring servers and databases in the cloud. 

“We’ve learned a lot about infrastructure security over the past year. It is well known that misconfigurations are an ever present danger,” says James Condon, director of research at Lacework. “Hardly a week went by in 2019 without learning of a new data breach coming from something like an internet accessible Elasticsearch cluster with no authentication, containing highly sensitive data.” 


And for a look at the top stories overall for 2019


Ransomware

If cybersecurity was indeed like a music festival, then ransomware would be its Mick Jagger, brazenly strutting across the stage tongue out, an in-your-face reminder that your organization – particularly if you’re a municipality or hospital – could be the next to fall prey.  

“In 2019, local and state governments prove to be low-hanging fruit for ransomware attacks and there seems to be no end in sight,” says Mickey Bresman, CEO, Semperis. “The recent influx of city ransomware payouts sends a strong message that public state institutions are woefully unprepared to defend themselves from cybercrime, and attackers are taking notice. Surprisingly it’s not only the major cities like Baltimore, Atlanta or Dallas that are being attacked,” but also “lesser known” cities like Riviera Beach and Lake City in Florida.  

Noting that since 2015, “ransomware has evolved into a billion-dollar business” with the ransom pricetag “strategically weighed to be the most affordable option for victims based on their specific circumstances,” Bresman said, “The alternative to paying the ransom is to rebuild the entire network from scratch, which costs weeks of downtime and risks permanent loss of sensitive data.” 

And pay up is what many victims did. Unlike Atlanta and Baltimore, Riviera Beach and Lake City, for instance, “paid out over $500,000 in ransom to criminal groups with untraceable currency,” said Bresman. 

That’s a sign of a shifting view toward mitigating a ransomware attack. “A few years ago, if a company was locked out of its data by hackers, it wasn’t necessarily inclined to pay the ransom demand. That’s because there used to a ‘silver bullet,’ in that if the company was doing regular backups of its systems, it could restore its data,” says Robert Rosenzweig, vice president and national cyber risk practice leader at Risk Strategies. 

Now more complex malware gets hackers into the production environment as well as the backup system to deploy the ransomware encryption, meaning there’s no longer a perfect mitigating control. 

While the U.S. Council of Mayors this year voted on a resolution NOT to pay ransom, any competent business advisor would likely tell a client that spending $76,000 to fend off an incident that could cost that organizations millions would be money well spent, but that calculus is more complicated when the initial outlay is not to pay for a cybersecurity preventative measure, but rather for a cybercriminal’s ransom demand.  

“The true price concerns public safety,” said Bresman. “Since when is it O.K. to negotiate with terrorists? City governments could be funding the next global cyber assault. What is the moral decision to make when public safety is at stake?” 

SC Media’s wrap up for all things 2019

Privacy

While organizations may have found it difficult to keep private information private, privacy was a mainstage act in 2019, culminating in a showstopper from California, which passed the robust, aggressive California Consumer Privacy Act (CCPA). The CCPA not only puts strict privacy requirements in place, like its GDPR sister, it levies hefty fines on violators. 

Fueled by a spate of state privacy bills, including CCPA and some eye-popping, difficult-to-ignore privacy violations, it seems the U.S. Congress is finally motivated and engaged. And that puts a national law, on par with Europe’s GDPR, within spittin’ distance, as they say down South. 

“When we look back, 2019 will be considered the year of the dawn of U.S. Internet privacy laws,” says Dov Goldman, director of risk and compliance at Panorays. “During the year a number of state data privacy laws were passed or went into effect in California, Nevada and Vermont. There are other similar laws in the works across the country, and it’s reasonable to expect that in 2020, we will see a few others passed.” 

But Congress has led us down this path before only to cave at the last minute to inertia or political squabbling. This time, with a stringent state law on the books in California, it could be different, privacy advocates contend. “The tectonic plates are coming together,” says J. Trevor Hughes, president of the International Association of Privacy Professionals (IAPP). “Whether that creates an earthquake or a volcano remains to be seen.” 

Nation-state actors up their game

Talk about pervasive. Nation-state attacks, whether on a government entity or a private sector company, are commonplace. Once shocking, no one blinks an eye these days when operatives from Russia or China or North Korea or even Iran infiltrate an organization’s systems. From hacks on antidoping agencies to a ransom denial of service (RDoS) attacks to influence campaigns on social media, Russian continues its assault on government and private entities around the world, particularly in the U.S. and other Western countries.  

In a particular nefarious and sneaky effort, the Russian hacker group Turla disguised itself as Iranians and stole state secrets from multiple countries, authorities from the U.S. and U.K.  

In an 18-month campaign, Turla, aka Uroboros, “acquired access to Iranian tools and the ability to identify and exploit them to further their own aims,” Paul Chichester, director of operations at GCHQ’s National Cyber Security Centre, said in a release. They were able to infiltrate systems of organizations located in more than 35 countries.  

The Russian hackers, in some cases, seemed to use an IP address associated with Iran’s APT34, or OilRig, group to deploy an implant, which they later accessed from Turla, or Venomous Bear, which a joint advisory from the NCSC and the National Security Agency (NSA) said suggested “Turla effectively took control of victims previously compromised by a different actor.” 

Other implants “had previously been connected to by Virtual Private Server (VPS) IP addresses associated in the open source cybersecurity community with Iranian APT groups,” the advisory said. 

Once Turla had acquired tools and data needed to use them, it “tested them against victims they had already compromised using their Snake toolkit, and then deployed the Iranian tools directly to additional victims,” the security agencies said. “Turla sought to further their access into victims of interest by scanning for the presence of Iranian backdoors and attempting to use them to gain a foothold. The focus of this activity from Turla was largely in the Middle East, where the targeting interests of both Advanced Persistent Threats (APTs) overlap.” 

An analysis of Turla’s behavior in scanning for Iranian backdoors, as well as the timeline, suggest that while the Neuron and Nautilus tools used by the group originated in Iran, the advisory said. “Turla were using these tools and accesses independently to further their own intelligence requirements” with the scanning for backdoor shells indicating the Russian hackers “did not have full knowledge of where they were deployed.” 

Big fines

Robert Cattanach, partner at law firm Dorsey & Whitney, said “federal and state regulators have lost all patience with companies whose lax security measures have compromised extremely sensitive consumer information.”  

Indeed, the Federal Trade Commission (FTC) walloped Equifax with a $330 million to $425 million fine that will go into a restitution fund for victims in a settlement over a 2017 breach that exposed the personal information of 148 million people. 

That fine followed a $5 billion fine that the commission laid on Facebook in the wake of the Cambridge Analytica scandal after it found the social media giant violated a 2011 consent decree. 

“This record-breaking fine highlights the importance of data stewardship in the digital age. The FTC has put all companies on notice that they must safeguard personal information,” said Center for Democracy & Technology (CDT) former President and CEO Nuala O’Connor. 

China, too, upped its game. For instance, Chinese-speaking APT group, Calypso, has actively been targeting state institutions in six countries, hacking systems and injecting a program to gain access to internal networks, according to a report from researchers at Positive Technologies Expert Security Center. 

The researchers found the hackers either exploited the remote code execution vulnerability MS17-010 or used stolen credentials. 

“These attacks succeeded largely because most of the utilities the group uses to move inside the network are widely used by the specialists everywhere for network administration,” says Denis Kuvshinov, lead specialist in threat analysis at Positive Technologies. “The group used publicly available utilities and exploit tools, such as SysInternals, Mimikatz and EternalRomance. Using these widely available tools, the attackers infected computers on the organization’s LAN and stole confidential data.” 

Cyberattacks continue to be the great equalizer for nation-states like North Korea and Iran that can’t afford the military necessary to launch effective kinetic attacks on enemies.  

Bots 

It would remiss to let 2019 slip from view without mentioning the proliferation and growing savvy of bots. Malicious bots account for about 30 percent of all traffic on the internet, Cequence Security CMO Franklyn Jones told SC Media earlier this year. Tiffany Olson Kleemann, CEO, Distil Networks, calls them an existential threat to the U.S. economy. 

“A scary 42 percent of all internet traffic wasn’t human – it was bots,” Kleeman writes. “Of that amount, 22 percent were bad bots. The remaining 20 percent were good bots that deliver useful services such as search engine indexing, stock trade execution, news updates and weather alerts.” 

She notes that “bad bot volume increased nearly 10 percent last year and there’s evidence they are becoming more sophisticated – for example, producing mouse movements and clicks that fool even advanced detection methods or using malware installed within browsers to connect to sites.” 

Consider that Akamai observed attackers using a technique dubbed, Cipher Stunting, or using advanced methods to randomize SSL/TLS signatures in an attempt to evade detection attempts. 

“In 2019 we observed increasing sophistication in bot characteristics, such as new types of carding bots. Carding is a brute force attack on a retailer’s website using stolen credit cards or gift cards,” said Safruti. “A single breach of CapitalOne in August 2019 exposed 100 million credit card numbers. With 4.1 billion records breached in the first six months of 2019, a 52 percent increase from the same period in 2018, it is clear that the supply of stolen credit cards is only increasing and we predict that carding attacks will further surge in number and sophistication in 2020.” 

Election security

Elections couldn’t catch a break, even in what was pretty much an off year and with the 2020 presidential contest bearing down, concerns over the integrity of U.S. elections looms large. 

“Elections are approaching. Our system is vulnerable to attacks. Hackers from Russia could even get into those servers and literally change the numbers. How bad is that? Doomsday bad,” says Stella.   

Not that the public would know it by looking at Senate where numerous election security-centric bills have either died on the vine or have been shelved to an undetermined later date. 

“So you’d think that at least on this issue, our politicians would set aside partisan divisions and do the right thing – set up rules and allocate funds to ensure our elections, the very foundation of our democracy, aren’t tainted,” says Pierluigi Stella, CTO Network Box USA. “The sheer idea that the results might be fudged by hackers is already bad enough. But think about the psychological impact of the population knowing their vote might be ‘useless’ because hackers can change it. How many of us would be tempted to stay home, not vote, give up on the very thing that guarantees our liberties? How impactful would that be? Of history changing proportions!” 

Lawmakers like Rep. Ted Lieu, D-Calif., who has introduced numerous bills, are frustrated and alarmed. At Def Con Lieu told reporters Senate Majority Leader Mitch McConnell should bring the bills to a vote. 

While Stella doesn’t have an answer to “what the technical solution needs to be right now,” he does “‘hope’” that this issue stays relevant, for the right reasons – because we’re trying to do something to resolve it.”   

The past informs the future 

Goodbye, Yellow Brick Road? Hardly. Don’t expect any of the cybersecurity acts from 2019 to embark on a farewell tour a la Elton John. In fact, their importance and affect will likely amplify in 2020. 

“The technology and security adoptions in 2019 have set the stage for further security enablement in 2020,” says Condon. “Just as technology and automation has empowered developers and applications, it too will empower security. Next year we will see the difficult and complex security issues addressed with automation. This will extend from early enforcement before deployment, to continuous security of infrastructure, to automating incident response at runtime.” 

Condon says 2020 will find “auditing systems move from using a pull system to report misconfigurations, to real time alerting systems that can fix the problem right away.” As a result, he expects exposed storage buckets to “immediately be made private” and fixes made to overly permissive network firewall policies. 

“Servers not intended to be exposed to the internet will automatically be moved to a private subnet,” Condon says, and “appropriate logging will be automatically enabled when new infrastructure is created.” 

This year’s ransomware attacks don’t bode well for 2020. “The attack on Texas municipalities, preceded by a similar attack in Florida, is a clear sign of things to come,” says Stella. “Our small cities (and one must wonder if only the small ones) are ill prepared against any form of threat. They aren’t ready to combat what hackers are hurtling their way.” 

In fact, “our cities are a softbelly hackers have just discovered,” says Stella. “And since some of the cities seem willing to pay to get their data back, I’m pretty certain hackers will continue to knock on this door.” 

He calls for the industry to put a “high focus” on a trio of issues in response. “Our local governments aren’t remotely prepared for what hackers are about to throw at them; should we pay for data when we get a ransomware attack?” Stella says. And finally, “our governing bodies can’t seem to get along even when it comes to protecting our democracy (the very thing we elected them to do).” 

Fending off and surviving ransomware attacks may require a shift in focus. “To avoid further ransom payouts in 2020, recovery strategies must be efficient and affordable, especially for local and state governments that are already resource-strapped,” says Semperis CEO Mickey Bresman. “As ransomware attacks continue to evolve and bypass security measures, the focus needs to be on recovery. Historically, prevention and detection have been the main defenses against malware, but for ransomware we’ve already shown these approaches are only moderately effective. Recreating lost data is usually impossible or impractical.” 

The Magecart attacks of 2019 have bearing on security in the year to come. “We predict that Magecart attacks will evolve in methods of infection and in tasks, including collecting more data such as username/password to execute large-scale ATO attacks, and infecting applications using drive-by, shared and free networks,” says Safruti. “With regulators cracking the whip and new regulations like the California Consumer Privacy Act (CCPA) coming soon, this pervasive client-side blind side can’t be ignored.” 

Privacy will continue to grab the spotlight, with even more prominence. “The big 2020 data security story will likely be the enforcement of these new laws,” says Goldman. “As we saw clearly with GDPR, it will be some time before local regulators have the resources and the know-how to enforce them. However, given the political value and potential financial windfall from high-profile enforcements, there is no doubt that funding will materialize and investigators will be hard at work seeking and investigating juicy targets.” 

But a weaker federal privacy statute that preempts state laws could throw “a wrench in the works,” Goldman says. “The internet giants are feverishly lobbying for just such a national law, as it would simplify compliance.” 

The line-up for 2020 is far from being set and acts are likely to be added as the year unfolds, but it promises to be a heckuva show. Now, give me a “C,” give me a “Y,” give me a “B”… 

Original Source link

The post #cybersecurity | hacker | Cybersecurity takes the stage | SC Media appeared first on National Cyber Security.

View full post on National Cyber Security

It Takes All Kinds: #Identifying New Sources of #Cybersecurity #Talent

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans National Cyber Security Awareness Month (NCSAM) highlights important security issues to help governments, businesses and individuals improve their online hygiene. One critical area to consider is the growing shortage of qualified security professionals, which is projected to reach 6 million unfilled positions across the globe by 2019. There are plenty […] View full post on AmIHackerProof.com | Can You Be Hacked?

CYBERSECURITY BILL TAKES AIM AT VULNERABILITIES IN MEDICAL DEVICES

Source: National Cyber Security – Produced By Gregory Evans

On July 27, U.S. Senator Richard Blumenthal (D-CT) introduced the Medical Device Cybersecurity Act of 2017, a bill that CHIME supports. The legislation, S.1656, would make the cybersecurity capabilities of medical devices more transparent to providers, clarifies expectations concerning security enhancements and maintenance of medical devices and establishes a cybersecurity…

The post CYBERSECURITY BILL TAKES AIM AT VULNERABILITIES IN MEDICAL DEVICES appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

It Only Takes Minutes for a Thief to Use Your Data

Source: National Cyber Security – Produced By Gregory Evans

It Only Takes Minutes for a Thief to Use Your Data

Hackers have a few different goals when it comes to using stolen data. For the most part, it narrows down to using the data themselves to steal identities or to sell the stolen data on the dark web to thieves who will then create accounts with the information. Some data…

The post It Only Takes Minutes for a Thief to Use Your Data appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Personal Security Takes A Hit With Public Release Of NSA’s Hacking Toolkit

Source: National Cyber Security – Produced By Gregory Evans

Personal Security Takes A Hit With Public Release Of NSA’s Hacking Toolkit

Former members of Team Espionage recently expressed their concern that the Shadow Brokers’ dump of NSA Windows exploits had done serious damage to the security of the nation. The unwanted exposure of NSA power tools supposedly harmed intelligence gathering efforts, even though the tools targeted outdated operating systems and network software.
However, there are still plenty of computers and networks online using outmoded software. This makes the released exploits a threat (especially those targeting XP users, as that version will never be patched). But not much of a threat to national security, despite the comments of anonymous former Intelligence Community members. It makes them a threat to personal security, as Chris Bing at CyberScoop points out:
One of these hacking tools, a backdoor implant codenamed DOUBLEPULSAR — which is used to run malicious code on an already compromised box — has already been installed on 30,000 to 50,000 hosts, according to Phobos Group founder Dan Tentler. Other researchers have also engineered different detection scripts to quickly scan the internet for infected computers.
John Matherly, the CEO of internet scanning-tool maker Shodan.io, said that upwards of 100,000 computers could be affected.
Rather surprisingly, data gathered by security researchers shows a majority of the infected computers are in the United States. This shows Microsoft’s steady updating push still faces a sizable resistance right here at home. What it also shows is how fast exploits can be repurposed and redeployed once they’re made public. The scans for DOUBLEPULSAR have turned up thousands of hits worldwide.
DOUBLEPULSAR is simply a backdoor, but an extremely handy one. Once installed, it makes targeted computers extremely receptive to further malware payloads.
“The presence of DOUBLEPULSAR doesn’t mean they’re infected by the NSA, it means there is a loading dock ready and waiting for whatever malware anyone wants to give it,” Tentler said. “The chances are none that all theses hosts [were hacked by] the NSA.
So, there’s that small bit of comfort. It’s not the NSA nosing around the innards of your Windows box, but a bunch of script kiddies playing with new toys… adding them to the normal rolls of malware purveyors seeking to zombify your device and/or make off with whatever information is needed to open fraudulent credit card accounts or whatever.
The NSA certainly could have informed Microsoft of these exploits before it ended support for certain platforms, thus ensuring late- (or never-) adopters were slightly more protected from malware merchants and state agencies. But that’s the Vulnerabilities Equity Process for you: no forewarning until a third party threatens to turn your computing weapons over to the general public.

Source:

The post Personal Security Takes A Hit With Public Release Of NSA’s Hacking Toolkit appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Husband Finds Out Wife Is Cheating, Takes Advantage Of The New Lover

Infidelity has been the death of far too many marriages to count. The hurt feelings and what not can be simply too much to overcome, and anything that was left of the relationship can quickly fall apart. This unidentified man realized that his wife was running around on him, but he had an awfully peculiar reaction. As AWM shares, he decided to leave a note for his wife’s new beau. “To the guy doing my wife. Read More….

The post Husband Finds Out Wife Is Cheating, Takes Advantage Of The New Lover appeared first on Dating Scams 101.

View full post on Dating Scams 101