Quantcast
Channel: Hackers Online Club (HOC)
Viewing all 855 articles
Browse latest View live

New Ransomware AVCrypt Found To Uninstall Your Antivirus And Security Software

$
0
0
New Ransomware AVcrypt Found To Uninstall Your Security Software


New Ransomware AVcrypt Found To Uninstall Your Antivirus And Security Software

AVCrypt known as new ransomware with unique behavior. The ransomware found by MalwareHunterTeam and Bleeping Computer security researchers.


How it works?

If the malicious script executes in the Victim Pc's, then its first work to remove your Windows Protection Services  with targeting MalwareBytes and Windows Defender. Also the ransomware will delete other security services of your computer such as

MBAMService, MBAMSwissArmy, MBAMChameleon, MBAMWebProtection, MBAMFarflt, ESProtectionDriver, MBAMProtection, Schedule, WPDBusEnum, TermService, SDRSVC, RasMan, ,PcaSvc, MsMpSvc, SharedAccess, wscsvc, srservice, VSS, swprv, WerSvc, MpsSvc, WinDefend, wuauserv

If any antivirus software is registered with Windows Security center, then the malware deletes the details through command Line.

cmd.exe /C sc config "MBAMService" start= disabled & sc stop "MBAMService"& sc delete "MBAMService";

It then queries to see what AV software is registered with Windows Security Center and attempts to delete it via WMIC.

cmd.exe /C wmic product where ( Vendor like "%Emsisoft%" ) call uninstall /nointeractive & shutdown /a & shutdown /a & shutdown /a;

The above command, though, was not able to uninstall Emsisoft in this manner. It is unknown if it would work with other AV software.

Microsoft has told BleepingComputer, that they have only detected two samples of this ransomware, with of them possibly being my computer, so they feel that this infection is currently in development.

Microsoft is currently detecting it as Ransom:Win32/Pactelung.A.

Once the ransomware executes completely, then AVCrypt uploads an encryption key to a TOR website remotely. The malware scans for files to encrypt and renaming them in the process.

In each encrypted file folder, it will saved as ransom note, +HOW_TO_Unlock.txt. It does not provide any information, there is just simple Text written inside the text file is "lol n".

Security research on this ransomware is currently on the way.

Facebook To Expand Bug Bounty Program To Include Misuse of Data By App Developers

$
0
0
Facebook To Increase Bug Bounty Program Included Misuses of Data By App Developers


Facebook To Expand Bug Bounty Program To Include Misuse of Data By App Developers.


In the wake of growing Cambridge Analytica Scandal, Facebook have made some of the following changes and increase its Bug bounty Program


  • Pause app review: We paused app review last week while we implement new changes to our platform.
  • Access to user friends requires Login Review: We are treating user_friends as an extended permission that requires Login Review.

Facebook said in post that, in the upcoming days and beyond, we will:


  • Conduct an in-depth review of our platform: We will investigate all apps that had access to large amounts of information before we changed our platform in 2014 to reduce data access, and we are conducting a full audit of any app with suspicious activity.
  • Inform people if an app is removed for data misuse: If we find developers that misused personally identifiable information, we will ban them from our platform. Moving forward, if we remove an app for misusing data, we will notify everyone who used it.
  • Encourage people to manage the apps they use: We already show people what apps their accounts are connected to and control what data they’ve permitted those apps to use. In the coming month, we’re going to make these choices more prominent and easier to manage.
  • Require heightened terms for business-to-business applications: All developers that build applications for other businesses will need to comply with rigorous policies and terms, which we will share in the coming weeks.
  • Reward people who find vulnerabilities: Facebook’s bug bounty program will expand so that people can also report to us if they find misuses of data by app developers. We are beginning work on this and will have more details as we finalize the program updates in the coming weeks.


Last week, Facebook CEO Mark Zuckerberg Admits It is "Breach of Trust" on Cambridge Analytica Scandal. and said,

"We have a responsibility to protect your data, and if we can't then we don't deserve to serve you. I've been working to understand exactly what happened and how to make sure this doesn't happen again. The good news is that the most important actions to prevent this from happening again today we have already taken years ago. But we also made mistakes, there's more to do, and we need to step up and do it."

Facebook team takes action on this breach and announced to increase Bug Bounty Program for security researchers.

Remote Code Execution Vulnerability Found In Drupal, Is Your Website Running on Drupal?

$
0
0
Remote Code Execution Vulnerability Found In Drupal, Is your website running on Drupal?


Remote Code Execution Vulnerability Found In Drupal, 

Is your website running on Drupal? 

You need to fix it out as soon as possible with Latest Drupal update.

The Drupal Security Team has announced that critical patches to address several security issues in Drupal site, including highly critical Remote Code Execution (RCE) vulnerabilities,

Drupal core - Highly critical - Remote Code Execution - SA-CORE-2018-002


A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised.

The security team has written an FAQ about this issue.

Solution: 

Upgrade to the most recent version of Drupal 7 or 8 core.


  • If you are running 7.x, upgrade to Drupal 7.58. (If you are unable to update immediately, you can attempt to apply this patch to fix the vulnerability until such time as you are able to completely update.)
  • If you are running 8.5.x, upgrade to Drupal 8.5.1. (If you are unable to update immediately, you can attempt to apply this patch to fix the vulnerability until such time as you are able to completely update.)

Drupal 8.3.x and 8.4.x are no longer supported and we don't normally provide security releases for unsupported minor releases. However, given the potential severity of this issue, we are providing 8.3.x and 8.4.x releases that includes the fix for sites which have not yet had a chance to update to 8.5.0.

Your site's update report page will recommend the 8.5.x release even if you are on 8.3.x or 8.4.x. Please take the time to update to a supported version after installing this security update.



This issue also affects Drupal 8.2.x and earlier, which are no longer supported. If you are running any of these versions of Drupal 8, update to a more recent release and then follow the instructions above.

If your website is running on Drupal, you need to apply the security patches as soon as possible.

RetireJS: A Scanner Detecting The Use of JavaScript Libraries With Known Vulnerabilities

$
0
0
RetireJS: A Scanner Detecting The Use of JavaScript Libraries With Known Vulnerabilities

RetireJS: A Scanner Detecting The Use of JavaScript Libraries With Known Vulnerabilities


What you require you must also retire?

There is a plethora of JavaScript libraries for use on the Web and in Node.JS apps out there. This greatly simplifies development,but we need to stay up-to-date on security fixes.

"Using Components with Known Vulnerabilities" is now a part of the OWASP Top 10 list of security risks and insecure libraries can pose a huge risk to your Web app. The goal of Retire.js is to help you detect the use of JS-library versions with known vulnerabilities.

Retire.js can be used in many ways:


  1. As command line scanner
  2. As a grunt plugin
  3. As a gulp task
  4. As a Chrome extension
  5. As a Firefox extension
  6. As a Burp and OWASP Zap plugin

Command line scanner

Scan a web app or node app for use of vulnerable JavaScript libraries and/or Node.JS modules. In the source code folder of the application folder run:

$ npm install -g retire
$ retire

Grunt plugin

A Grunt task for running Retire.js as part of your application's build routine, or some other automated workflow.

Gulp task

An example of a Gulp task which can be used in your gulpfile to watch and scan your project files automatically. You can modify the watch patterns and (optional) Retire.js options as you like.

var gulp = require('gulp');
var spawn = require('child_process').spawn;
var gutil = require('gulp-util');

gulp.task('retire:watch', ['retire'], function (done) {
    // Watch all javascript files and package.json
    gulp.watch(['js/**/*.js', 'package.json'], ['retire']);
});

gulp.task('retire', function() {
    // Spawn Retire.js as a child process
    // You can optionally add option parameters to the second argument (array)
    var child = spawn('retire', [], {cwd: process.cwd()});
    
    child.stdout.setEncoding('utf8');
    child.stdout.on('data', function (data) {
        gutil.log(data);
    });

    child.stderr.setEncoding('utf8');
    child.stderr.on('data', function (data) {
        gutil.log(gutil.colors.red(data));
        gutil.beep();
    });
});

Chrome and firefox extensions

Scans visited sites for references to insecure libraries, and puts warnings in the developer console. An icon on the address bar displays will also indicate if vulnerable libraries were loaded.

Burp and OWASP ZAP plugin

@h3xstream has adapted Retire.js as a plugin for the penetration testing tools Burp and OWASP ZAP. An alternative OWASP ZAP plugin exists at https://github.com/nikmmy/retire/

Download RetireJS

GameNetworkingSockets: A Basic Transport Layer for Games To Reliable And Unreliable Messages over UDP, Message fragmentation And reassembly, bandwidth estimation, encryption.

$
0
0


GameNetworkingSockets: A Basic Transport Layer for Games.

To Reliable And Unreliable Messages over UDP. Message fragmentation and reassembly, bandwidth estimation, encryption.

The features are:

  • Connection-oriented protocol (like TCP)
  • ... but message-oriented instead of stream-oriented
  • Mix of reliable and unreliable messages
  • Messages can be larger than underlying MTU, the protocol performs fragmentation and reassembly, and retransmission for reliable
  • Bandwidth estimation based on TCP-friendly rate control (RFC 5348)
  • Encryption. AES per packet, Ed25519 crypto for key exchange and cert signatures. The details for shared key derivation and per-packet IV are based on Google QUIC.
  • Tools for simulating loss and detailed stats measurement

The main interface class is named SteamNetworkingSockets, and many files have "steam" in their name. But Steam is not needed. The reason for the name is that this provides a subset of the functionality of the API with the same name in the SteamworksSDK.

The intention is that on PC you can use the Steamworks version, and on other platforms, you can use this version. In this way, you can avoid having the Steam version be "weird" or not take full advantage of the features above that it provides.

But even if you don't make games or aren't on Steam, feel free to use this code for whatever purpose you want.

Building

Dependencies
  • OpenSSL
  • Google protobuf
  • ed25519-donna and curve25519-donna. We've made some minor changes, so the source is included in this project.

Linux

This has only really been tested on Ubuntu 17.10.

$ meson src build
$ ninja -C build

Work in progress!

We're still in the process of extracting the code from our proprietary build toolchain and making everything more open-source friendly. Bear with us.
  • The code in this form is only known to compile on Ubuntu 17.10. (Although this code has shipped through our toolchain on Win32/Win64 and OSX as well and also compiles for several Android flavors).
  • We don't provide any Windows project files or any straightforward method for building on windows yet.
  • There is a unit test, but it's not currently included and we don't have it working in any standard framework.

Roadmap

Here are some areas where we're working on improvement

Reliability layer improvements

We have a new version of the "SNP" code in progress. (This is the code that takes API messages and puts them into UDP packets. Long packets are fragmented and reassembled, short messages can be combined, and lost fragments of reliable messages are retransmitted.)
  • The wire format framing is rather....prodigious.
  • The reliability layer is a pretty naive sliding window implementation.
  • The reassembly layer is likewise pretty naive. Out-of-order packets are totally discarded, which can be catastrophic for certain patterns of traffic over, e.g. DSL lines.

Abstract SteamIDs to generic "identity"

We'd like to generalize the concept of an identity. Basically anywhere you see CSteamID, it would be good to enable the use of a more generic identity structure.


OpenSSL bloat

Our use of OpenSSL is extremely limited; basically just AES encryption. We use Ed25519 keys for signatures and key exchange and we do not support X.509 certificates.

However, because the code is going through a wrapper layer that is part of Steam, we are linking in much more code than strictly necessary. And each time we encrypt and decrypt a packet, this wrapper layer is doing some work which could be avoided.

Download

New Android Trojan Steals Data from Messaging Apps Like Facebook, Twitter And Telegram

$
0
0
New Android Trojan Steals Data from Messaging Apps Like Facebook, Twitter And Telegram


New Android Trojan Steals Data from Messaging Apps Like Facebook, Twitter And Telegram.


A CyberSecurity firm Trustlook labs found a Trojan which obfuscates its configuration file and part of its modules. 


The purpose of the content/file obfuscation is to avoid detection to steal data from messaging apps remotely.  The malware has capabilities to modify the “/system/etc/install-recovery.sh” file in order to start at every boot, thus making sure that it can extract instant messaging data even if the device is restarted.

The malware collects information from the following apps:


  • Tencent WeChat
  • Weibo
  • Voxer Walkie Talkie Messenger
  • Telegram Messenger
  • Gruveo Magic Call
  • Twitter
  • Line
  • Coco
  • BeeTalk
  • TalkBox Voice Messenger
  • Viber
  • Momo
  • Facebook Messenger
  • Skype


The Malware has chinese name and uses the anti-emulator and debugger detection techniques to evade dynamic analysis. The Malware attempts to hide the strings to avoid being detected.

The malware also includes some modules in its Assets folder, and all the modules are encrypted.

Screenshot by TrustLook

Code obfuscation/hiding increases the malware author’s ability to avoid detection and becomes a sophisticated challenge to anti-virus software.

Security?

If you are running any third party Apps, you should be uninstalled it soon. Always use anti-malware security app in your mobile devices.

Microsoft Updates Office 365 With Recovery Tool and Ransomware Protection

$
0
0
Microsoft Updates Office 365 With Recovery Tool and Ransomware Protection


Microsoft Updates Office 365 With Recovery Tool and Ransomware Protection.


Microsoft new updates of office 365 Home and Personal Edition. A tool to protect their 365 customers from Cybercrime including Ransomware now.


According to Kirk Koenigsbauer,Microsoft corporate Vice President for office said in blog,

With the growing presence and sophistication of online threats like viruses, ransomware, and other cyber threats, it’s increasingly important to have the right protection and tools to help protect your devices, personal information, and files from being compromised.

The new protection capabilities offer subscribers additional peace of mind with:


  • File recovery from malicious attacks like ransomware.
  • Tools to help keep your information secure and private.
  • Advanced protection from viruses and cybercrime.


Files Restore - Microsoft says, we’re bringing our powerful Files Restore feature from OneDrive for Business to your personal OneDrive account, so it doesn’t matter if they’re work or personal files they’re protected in OneDrive. Files Restore allows you to restore your entire OneDrive to a previous point in time within the last 30 days. You can use this feature to recover from an accidental mass delete, file corruption, ransomware, or another catastrophic event.

Ransomware detection & recovery - Office 365 can now detect ransomware attacks and help you restore your OneDrive to a point before files were compromised, so you don’t have to submit to cybercriminal demands.


Office 365 is adding three new capabilities to help keep your data secure and private in these cases.

Password protected sharing links - Microsoft adding an additional security option for links you share in OneDrive. You will now be able to set and require a password to access a shared file or folder. This prevents others from accessing your files if your intended recipient accidentally forwards or shares the link.

Email encryption - Email encryption in Outlook.com offers an added layer of protection and ensures end-to-end encryption of your email. Unlike Outlook.com, some email providers don’t encrypt their connection, making it easy for hackers to intercept and read your communication. When you use Outlook.com email encryption, your email remains encrypted over a secure connection minimizing the threat of your information being intercepted or leaked to cyber criminals.

Prevent forwarding - You can now restrict your email recipients from forwarding or copying emails you send from Outlook.com. Additionally, Microsoft Office documents you attach to these emails are encrypted even after downloading, so if the recipient shares or forwards your attachment, the recipient of the forwarded email will not be able to open the attachment. Emails sent with the prevent forwarding option are also encrypted.

In October 2017, Microsoft announced advanced link checking and attachment scanning in Outlook.com to protect you from previously unseen viruses and phishing scams in real-time. Also its added in Microsoft Word, Excel, and PowerPoint. If the link is suspicious, you will be redirected to a warning screen recommending you don’t access the site.

Ubuntu Bionic Beaver 18.04 LTS Desktop, Server And Cloud products Released

$
0
0
Ubuntu Bionic Beaver 18.04 LTS Desktop, Server, and Cloud products Released


Ubuntu Bionic Beaver 18.04 LTS Desktop, Server And Cloud products Released


The Ubuntu team is pleased to announce the final beta release of the Ubuntu 18.04 LTS Desktop, Server, and Cloud products.

Ubuntu new version launches with Bionic Beaver means "Long term Support" for 5 years. In comparison non-LTS Ubuntu version get for 9 month.

Codenamed "Bionic Beaver", 18.04 LTS continues Ubuntu's proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution.  The team has been hard at work through this cycle, introducing new features and fixing bugs.

This beta release includes images from not only the Ubuntu Desktop, Server, and Cloud products, but also the Kubuntu, Lubuntu, Ubuntu Budgie, UbuntuKylin, Ubuntu MATE, Ubuntu Studio, and Xubuntu flavours.

The beta images are known to be reasonably free of showstopper CD build or installer bugs, while representing a very recent snapshot of 18.04 that should be representative of the features intended to ship with the final release expected on April 26th, 2018.

This new version of Ubuntu Linux 18.04 LTS 'Bionic Beaver Beta 2 also including the GNOME 3.28 desktop environment. Whereas Beta 1 didn't include GNOME.

Ubuntu, Ubuntu Server, Cloud Images: Bionic Final Beta includes updated versions of most of our core set of packages, including a current 4.15 kernel, and much more.

Download here Ubuntu Bionic Beaver 18.04 LTS Desktop


New ATMJackpot Malware To Steal Your Money From ATMs Machine

$
0
0


New ATMJackpot Malware To Steal Your Money From ATMs Machine


A Cybersecurity researchers have found a Malware which steals your money From ATMs machine remotely, code named "ATMJackpot". 


ATM Jackpot can be installed remotely or through USB port, if the ATM computer system become vulnerable. A similar attacks was discovered in 2014 targeted European and Russia countries as reported. After its spread in Asian countries.

According to cybersecurity firm Netskope,
ATM Malware control via physical access to the ATM using USB, and also via the network by downloading the malware on to already-compromised ATM machines using sophisticated techniques. After tracking event the malware follow the commands, reads the data from PIN pad to cash transaction and eject cards. Netskope for Web detects the download of this malware as Gen:Variant.Razy.255528.

How ATMJackpot Malware works?


  1. The ATMJackpot malware first registers the windows class name ‘WIN’ with a window procedure that is responsible for all of the malware activity.
  2. After registering a window class, the malware creates the window, populates the options on the window, and initiates the connection with the XFS manager.
  3. After initiating a connection with the XFS manager, the malware opens the session with the service providers and registers to monitor the events. The malware opens a session with CDM (cash dispenser), IDC (card reader) and PIN (pin pad) service providers.


After successful registration, the malware can monitor the events from different service providers and execute the commands.

Commands:


  • Malware reads the data from PIN pad asynchronously using WFSAsyncExecute API call.
  • Malware has the functionality to dispense cash.
  • Malware also has the functionality to eject the card. 
The ATMJackpotting technique are on rise in cyber crime activities. All banks should be concerned about ATM's security. There are many ATM machine runs on Windows XP Operating system which is responsible to hack by cyber criminals easily. Microsoft had end the support for Windows XP in 2014.

Robots Vulnerable To Ransomware Attack: A Boon For Cybercriminals

$
0
0
Ransomware Special Robots: A Boon For Cybercriminals


Ransomware Special Robots: A Boon For Cybercriminals


Security researchers have just pointed out flaws in the protections of two particularly popular robots, making them highly vulnerable to a ransomware attack. 


A risk of importance, because this type of attack could paralyze some companies.

Humanoid robots seem to be on the rise, in the buoyant market of artificial intelligence: but their large-scale deployment urgently requires an improvement in their security protocol, which is far too porous for the moment. Like all connected objects, they can be a privileged gateway for cybercriminals.

A robot who insults his "masters" and claims bitcoin to get back to work!


Security researchers at IOActive have successfully tested an attack on the NAO robot, manufactured by Softbank, and infected it with a Ransomware. Not lacking in humor, the team programmed the malware so that the robot starts to stop working, insults the township and asks to be fed with bitcoin to resume its task!

According to the researchers, this attack, made possible by hacking the WiFi network that sends commands to NAO, would have had the same effects on the Pepper robot. "If a team hack WiFi, the attack can come from a computer or other terminal connected to the Internet. Thus, a computer is hacked and from there, the robot can be hacked because it is in the same network as the compromised computer "details César Cerrudo, technology director of IOActive Labs.

Inactive robot loses money every second.

And, amusing as it is, this attack shows with brilliance the defects of security of these new tools. The worry is that the activity of a company may depend on that of its robots, a boon for hackers.

"To force the boss of a company to pay a ransom to a pirate, you can make robots stop working and because robots are directly related to production and services, the fact that they stop to work will cause a financial problem for the manager, losing money for every second of inactivity "explained César Cerrudo, IT searcher.

Indeed, debugging a hacked robot can take a long time and sometimes imposes a return to the manufacturer. In the case of a company using dozens of these robotic auxiliaries, the shortfall can quickly escalate. And the payment of a ransom to be perceived by the leaders as a lesser evil. Reason for which the hackers risk aiming particularly at these last-born of the technology.

Rapid security is needed.

"Even if we do not interact with robots on a daily basis, they will soon be democratized and companies around the world are deploying robots for different services. If we do not start now to secure the robots, and if more these robots put into service are easy to hack, the consequences will be very serious,” claimed Cerrudo.

Especially since the possibilities currently offered to cybercriminals are numerous, more than fifty different vulnerabilities were spotted by IOActive researchers and with various consequences: "Complete interruption, pornographic content on the digital display of the robot, insults, and same violent movements! The infected robot could also be a gateway to the company's internal network, functioning as a backdoor and offering hackers an entry point to steal sensitive data." Lucas Apa, co-leader of the study.

Manufacturers want reassurance... but fear an epidemic!

On the side of Softbank, a spokesman said that the company continued to improve the safety of robots. IOActive is much more pessimistic, doubting the technical possibility of solving this problem without modifying all the current architecture and design of the robots.

As if the history of connected objects were replayed before us: security researchers who point out weaknesses, companies that say they work there and that we should not worry and, ultimately, epidemics of botnet and Ransomware.

Adhrit: The Android Recon Tool

$
0
0


Adhrit: The Android Recon Tool



Adhrit is an open source Android APK reversing and analysis tool that can help security researchers and CTF enthusiasts alike. 

The tool is an effort to cut down on the amount of time spent on reversing and basic reconnaissance of Android applications.

Millions of mobile applications are launching day by day. Some may contain malicious scripts that can compromise your personal data anytime. When malware databases are analysed, the count increases continuously. ADHRIT is one such tool for reversing and analyzing those vulnerable applications.


Normally the following steps were adopted by experts to extract the source code of an APK file.

Steps of Static Analysis:

1.Use ApkTool to disassemble the Android app and perform small code analysis
using any editor.
2. Use Dex2Jar to convert the source code from .dex file into java code and
then use JDGUI to parse the java code.

ADHRIT will consume just seconds to do the above mentioned steps. This tool holds a characteristic feature of user flexibility as they could decide how much of data they want.


What Adhrit Can Do?

•Extract the APK contents into a directory
•Dump certificate details
•Extract source code in Smali
•Extract source code in Java
•Recompile smali back into APK
•Parse binary Manifest XML into readable XML
•Search for native libraries
•Analyze permissions used by the application
•Check for malware footprints in the VirusTotal database


PRE-REQUISITES:

•Linux or MAC
•Java JDK

USAGE:


  • Dowload the zip or clone the package and extract the tool ( git clone https://github.com/abhi-r3v0/Adhrit.git ).
  • Place the application in the tool directory.
  • Open a terminal and cd into the directory.
  • Run python installer.py for installing the necessary tools.
  • Use python adhrit.py -h for usage help.


Example: python adhrit.py -a my_app.apk

Facebook Starts Notifying To Users The Data Was Leaked or Not?

$
0
0
Facebook Starts Notifying To Users The Data Was Leaked or Not?


Facebook Starts Notifying To Users The Data Was Leaked or Not??

The Feature is live for some users and will be roll out to others soon.

Some of Facebook users will see "Protecting Your Information" on their News Feed. Where you can find, what kind of information that you have shared with your connected apps in Facebook.

In terms of Cambridge Analytica, create the personality Quiz app called "This is Your Digital Life" was designed by Aleksandr Kogan, a researcher in Cambridge University. The app was able to access data and share the information to Cambridge Analytica. As many as 87 million Facebook users had their information improperly obtained and used to help in Election Campaigns.


According to Wired,
It appears that only those who were friends with someone who used Kogan's app—called "This Is Your Digital Life"—will see the Cambridge Analytica warning.

"We have banned the website 'This Is Your Digital Life,' which one of your friends used Facebook to log into," the message reads. "You can learn more about what happened and how you can remove other apps and websites any time if you no longer want them to have access to your Facebook information."

If you are not accessing "This is Your Digital Life" app , then you will see a different message titled "Protection Your Information" to see which third-party apps and websites are linked to your Personal Facebook Account.

In the Latest update of Guardian,

Facebook has told the country’s privacy commissioner that it is in the process of alerting New Zealanders who were affected by the breach, which occurred when ten users downloaded a personality quiz app.

“For New Zealand, we estimate a total of 63,724 people may have been impacted – 10 are estimated to have downloaded the quiz app with 63,714 friends possibly impacted,” said Antonia Sanda, head of communications for Facebook in Australia and New Zealand.

Facebook is working on more privacy and setting options for Future protection. Some of the biggest celebrities and persons like Elon Musk was also removed their company page from Facebook.

YouTube Vevo Celebrities Channel Gets Hacked

$
0
0
YouTube Vevo Celebrities Channel Gets Hacked


YouTube Vevo Celebrities Channel Gets Hacked

Someone exploiting the bug in the YouTube on Vevo Channel and change the Titles to "Hacked".


The official Vevo Celebrity's Channel Got Hacked On YouTube. The Possibility Hackers were using  content injection technique and able to change the Video Titles.

After the reported, Vevo channel deleted some of the famous videos song, "Despacito by Luis Fonsi and Daddy Yankee."

The twitter handle who claims these hacks said to Vevo,

"@Vevo You have all my respect but do not leave the control to your site to any developer did not take into account this hacking it was a fun if we would like to harm your customers we would delete all the video but I did not delete despacito must believe me"

Screenshot of Shakira and DrakeVevo Channel Hacked


Some of the Vevo Channels Hacked Screenshot


The following YouTube Celebrity Channels were hacked:



  • Shakira (ShakiraVEVO)
  • Adele (AdeleVEVO)
  • Selena Gomez (SelenaGomezVEVO)
  • Chris Brown (ChrisBrownVEVO)
  • Luis Fonsi (LuisFonsiVEVO)
  • Post Malone (PostMaloneVEVO)
  • Kaaris (KaarisOfficialVEVO)
  • Lacrim (LacrimMusicVEVO)
  • Vevo (Vevo)
  • Katy Perry
  • Maître Gims (MaitreGimsVEVO)
  • Taylor Swift (TaylorSwiftVEVO)

At last Year ourMine Hackers group leaked 3.12TB VEVO Data online

goGetBucket - A Penetration Testing Tool To Enumerate And Analyse Amazon S3 Buckets

$
0
0


goGetBucket - AWS S3 Bucket Discovery Through Alterations And Permutations


A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.


When performing a recon on a domain - understanding assets they own is very important. AWS S3 bucket permissions have been confused time and time again, and have allowed for the exposure of sensitive material.

What this tool does, is enumerate S3 bucket names using common patterns I have identified during my time bug hunting and pentesting. Permutations are supported on a root domain name using a custom wordlist. I highly recommend the one packaged within AltDNS.

The following information about every bucket found to exist will be returned:

  • List Permission
  • Write Permission
  • Region the Bucket exists in
  • If the bucket has all access disabled

Installation

go get -u github.com/glen-mac/goGetBucket

Usage

goGetBucket -m ~/tools/altdns/words.txt -d <domain> -o <output> -i <wordlist>

Usage of ./goGetBucket:


  •   -d string: Supplied domain name (used with mutation flag)
  •   -f string:  Path to a testfile (default "/tmp/test.file")
  •   -i string:  Path to input wordlist to enumerate
  •   -k string: Keyword list (used with mutation flag)
  •   -m string: Path to mutation wordlist (requires domain flag)
  •   -o string: Path to output file to store log
  •   -t int: Number of concurrent threads (default 100)


Throughout my use of the tool, I have produced the best results when I feed in a list (-i) of subdomains for a root domain I am interested in. E.G:

www.domain.com
mail.domain.com
dev.domain.com

The test file (-f) is a file that the script will attempt to store in the bucket to test write permissions. So maybe store your contact information and a warning message if this is performed during a bounty?

The keyword list (-k) is concatenated with the root domain name (-d) and the domain without the TLD to permutate using the supplied permuation wordlist (-m).

Be sure not to increase the threads too high (-t) - as the AWS has API rate limiting that will kick in and start giving an undesired return code.

To-Do


  • Write better GoLang
  • Use net/http instead of the aws service libraries for go
  • Optimize the region checking
  • Optimize use of channels / passed structs

Google Enable DNS Over TLS Support In Android P Developer Preview For Security

$
0
0
Google Enable DNS Over TLS Support In Android P Developer Preview For Security


Google Enable DNS Over TLS Support In Android P Developer Preview For Security


Google wants to make its Android operating system more secure for all users and it implemented DNS over TLS support in the latest Android P Developer Preview.


According to Google blog , Like HTTPS, DNS over TLS uses the TLS protocol to establish a secure channel to the server. Once the secure channel is established, DNS queries and responses can't be read or modified by anyone else who might be monitoring the connection. (The secure channel only applies to DNS, so it can't protect users from other kinds of security and privacy violations.)

How DNS over TLS Support works in Android P version.


The Android P Developer Preview includes built-in support for DNS over TLS. Google added a Private DNS mode to the Network & internet settings.

By default, devices automatically upgrade to DNS over TLS if a network's DNS server supports it. But users who don't want to use DNS over TLS can turn it off.

If you want to use private DNS provider then Users need to enter a hostname. Then all DNS queries send over a secure channel to this server or marks the network as "No internet access" if it can't reach the server. (For testing purposes, see this community-maintained list of compatible servers.)

DNS over TLS mode automatically secures the DNS queries from all apps on the system. However, apps that perform their own DNS queries, instead of using the system's APIs, must ensure that they do not send insecure DNS queries when the system has a secure connection. Apps can get this information using a new API: LinkProperties.isPrivateDnsActive().

Android security engineer said, with the Android P Developer Preview, we're proud to present built-in support for DNS over TLS. In the future, we hope that all operating systems will include secure transports for DNS, to provide better protection and privacy for all users on every new connection.

Google Android P is expected to have final release on next Google I/O developer conference.

Russia Bans Telegram Messenger Over Encryption Dispute

$
0
0
Russia Bans Telegram Messenger Over Encryption Dispute

Russia Bans Telegram Messenger Over Encryption Dispute


In Moscow the disctrict court have ordered to be blocked Telegram Messenger, after the company repeatedly refused to hand over encryption keys to its messages to Russia's Federal Security Service.

The Telegram representatives said to press that they planned to appeal the decision.  Roskomnadzor's legal team stated that access to Telegram in Russia would be restored after the company fulfills the order to hand over the encryption keys.

Whereas Telegram officials says, that its impossible to provide authorities with encryption key that decrypts end-user messages.

At Telegram, we have the luxury of not caring about revenue streams or ad sales. Privacy is not for sale, and human rights should not be compromised out of fear or greed.

On Friday morning, the court ruled that Telegram refusals were illegal and ordered the messenger service to be blocked. However, the ban could later be lifted if Telegram files a successful appeal.

Telegram block from Russian ISP's network. While it would be possible for users to use Virtual Private Network to bypass the block.

Telegram is the second global network to be blocked in Russia after LinkedIn was banned in 2016 for failing to comply with a law that requires companies holding  Russian citizens data to store it on servers. It is not first time that Russia Bans Telegram, it was also banned in last June 2017.

Currently, Telegram has 200 Million users worldwide.

How Do Cookies Work In Browser?

$
0
0

How Do Cookies Work In Browser?

First, we need to understand the word Cookie Browser.


When you open any one of the websites then its stored in your browser in text format. The text can be user ID, session ID or any other text.

How do cookies work?

The most common method used by web servers to know whether the user is logged in or not, and which account they are logged in with. Without such a mechanism, the site would not know whether to send a page containing sensitive information or require the user to authenticate themselves by logging in.

The webpage can save their setting elements in term of cookie, so whenever you will open the same website in future, the browser can read the cookie and open the required website with the same cookie.

Example: 

If you have opened Gmail account, then close your browser after your work has completed without log off. So in future whenever you open the Gmail.com in the same browser, it will automatically read the cookies and show your account. There is no need to login the account again.

Types of Cookies:

Session cookie
A session cookie, also known as an in-memory cookie or transient cookie, exists only in temporary memory while the user navigates the website. Web browsers normally delete session cookies when the user closes the browser. Unlike other cookies, session cookies do not have an expiration date assigned to them, which is how the browser knows to treat them as session cookies.

Persistent cookie
Instead of expiring when the web browser is closed as session cookies do, a persistent cookie expires at a specific date or after a specific length of time. This means that, for the cookie's entire lifespan (which can be as long or as short as its creators want), its information will be transmitted to the server every time the user visits the website that it belongs to, or every time the user views a resource belonging to that website from another website (such as an advertisement).

For this reason, persistent cookies are sometimes referred to as tracking cookies because they can be used by advertisers to record information about a user's web browsing habits over an extended period of time. However, they are also used for "legitimate" reasons (such as keeping users logged into their accounts on websites, to avoid re-entering login credentials at every visit).

These cookies are however reset if the expiration time is reached or the user manually deletes the cookie.

Secure cookie
A secure cookie can only be transmitted over an encrypted connection (i.e. HTTPS). They cannot be transmitted over unencrypted connections (i.e. HTTP). This makes the cookie less likely to be exposed to cookie theft via eavesdropping. A cookie is made secure by adding the Secure flag to the cookie.

HttpOnly cookie
An HttpOnly cookie cannot be accessed by client-side APIs, such as JavaScript. This restriction eliminates the threat of cookie theft via cross-site scripting (XSS). However, the cookie remains vulnerable to cross-site tracing (XST) and cross-site request forgery (XSRF) attacks. A cookie is given this characteristic by adding the HttpOnly flag to the cookie.

Is there any Security Purpose?

Yes, we need to delete our cookies at the time to close your browser.

The security of an authentication cookie generally depends on the security of the issuing website and the user's web browser, and on whether the cookie data is encrypted. Security vulnerabilities may allow a cookie's data to be read by the cyber-criminal, used to gain access to user data, or used to gain access (with the user's credentials) to the website to which the cookie belongs.

Cookies are tracking your web surfing information to display advertising on the based on your last visit to any website.

So, if you clear the cookies you will log out automatically from all websites which you saved in cookies format.

Some of the sites are selling your cookie data to third parties for your online behaviour.

Improving Cybersecurity - 12 Tools and Approaches Your Business Can Use

$
0
0
Improving Cybersecurity - 12 Tools and Approaches Your Business Can Use

Improving Cybersecurity - 12 Tools and Approaches Your Business Can Use


How can you make your business computers and devices as secure as possible?


Cyber Security remains at the front of many business leaders’ minds. Data breaches are a constant threat to your organization’s customer data, which means organizations must remain vigilant in their attempts to prevent a cyber attack from breaking through or causing damage. As attacks develop, so do awareness and defensive tools.

To help you be more proactive in preventing these cyber-issues, 12 entrepreneurs from Young Entrepreneur Council weigh in on the best tips or applications to improve Cyber Security at your business.

Download CyberSecurity for Business Ebook FREE

Python Taint: A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications

$
0
0
Python Taint: A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications

Python Taint: A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications


Static analysis of Python web applications based on theoretical foundations (Control flow graphs, fixed point, data flow analysis)


Features


  • Detect Command injection
  • Detect SQL injection
  • Detect XSS
  • Detect directory traversal
  • Get a control flow graph
  • Get a def-use and/or a use-def chain
  • Search GitHub and analyse hits with PyT
  • A lot of customisation possible

Example usage and output:


Install


  1. git clone https://github.com/python-security/pyt.git
  2. cd pyt/
  3. python3 setup.py install
  4. pyt -h

Usage from Source

Using it like a user python3 -m pyt -f example/vulnerable_code/XSS_call.py save -du

Running the tests python3 -m tests

Running an individual test file python3 -m unittest tests.import_test

Running an individual test python3 -m unittest tests.import_test.ImportTest.test_import

Contributions

Join our slack group: 
https://pyt-dev.slack.com/ - ask for invite: mr.thalmann@gmail.com

Guidelines

Virtual env setup guide
Create a directory to hold the virtual env and project

mkdir ~/a_folder

cd ~/a_folder

Clone the project into the directory

git clone https://github.com/python-security/pyt.git

Create the virtual environment

python3 -m venv ~/a_folder/

Check that you have the right versions

python --version sample output Python 3.6.0

pip --version sample output pip 9.0.1 from /Users/kevinhock/a_folder/lib/python3.6/site-packages (python 3.6)

Change to project directory

cd pyt

Install dependencies

pip install -r requirements.txt

pip list sample output

gitdb (0.6.4)
GitPython (2.0.8)
graphviz (0.4.10)
pip (9.0.1)
requests (2.10.0)
setuptools (28.8.0)
smmap (0.9.0)

In the future, just type source ~/a_folder/bin/activate to start developing.

Download Python Taint

5 Ways To Prevent DDoS Attacks On Your Website

$
0
0
5 Ways to Prevent DDoS Attacks on Your Website


5 Ways To Prevent DDoS Attacks On Your Website

Denial of Service attacks have been a hazard for web sites since the earliest days of the World Wide Web. 

Although the average speeds and network capacities for the earliest users of Internet service were nowhere near as high as they are today, it was still possible to generate enormous volumes of traffic and direct them at servers that were totally unprepared for the onslaught.

Today, due to innovative and often fast-reacting defensive measures, it is possible to mitigate most of the damage from what is now more accurately referred to as a "distributed denial of service" attack or DDoS. The purpose of a denial of service is to overload a web server or other service with so much unauthorized traffic that legitimate users can't make use of it. The distributed nature of the attack means that traffic is not directed to the target server from one source. Rather it is coordinated across many sources so blocking one attacking web address is insufficient to stop the attack entirely.

As these attacks have grown in sophistication and power, the measures available to combat them have advanced as well. With adequate planning and a proper understanding of the threat, many of the largest sites on the web have reached a point where they are well defended against all but the most unusually intense events.

The chances of any one site being targeted are low, but if you run a mission-critical service online, whether it is web-based or runs on its own protocol, you should at least be aware of the potential for denial of service attacks and prepare yourself and your organization to combat them. Here are some things to consider.

Know Your Traffic Patterns 


There are three primary "loads" on a web or network server. Your analytics software should be able to track one. Your network security should be able to, at minimum, track the other two. The first is volume, which is a measure of how many and what kind of network connections are being made to your server. By and large, this number shouldn't deviate more than a few percentage points in any given day. If it does, your monitoring software or IT staff should be alerted and prepared to determine causes.

The second load is CPU utilization. For a standard web server, processor utilization should rarely climb above sixty percent. While high CPU load isn't technically a denial of service attack, when combined with a strategically organized surge of network traffic, CPU load can create cascade effects through all your network services and degrade other devices like failover servers and anti-virus services running elsewhere on your network.

Third is storage. A full disk can not only cause degradation of services but can also cause operating systems and other software to malfunction. On some kinds of servers, a strategically timed series of large uploads combined with one or more other attack vectors can not only degrade services, but cut them off entirely.

The longer your server is running, the more data you will have regarding the normal ranges for all these loads. You can then set up your monitoring and analytics to alert IT staff in the event any of them move out of normal ranges.

Here are some of the most popular and effective ways to defend against and prevent distributed denial of service attacks.

1. Know If It's Happening 

Use the data provided by your monitoring and analytics. Be particularly careful to notice any deviation from your rolling 30 and 90 day patterns for network load, CPU utilization and storage. Occasionally a slow increase in one will precede a spike in one or more of the others. Set up alerts in your monitoring and security systems to notify key personnel in the event of any anomalies. For one-off testing, you can use a speed test tool like Dotcom-Tools in order to spot check website performance issues that could be related to DDoS.

2. Failover and Provisioning 

If your services are commercial in nature, you should have enough network capacity available at any given time to endure a minimum 200% temporary increase in traffic. This is called "provisioning" and it is a service that most network operations centers can provide at minimal cost. Under no circumstances should your server be running without a cloned backup ready to take over operations in the event the front-line machine goes off-line. This is known as fail over protection and it is particularly important in the event of a denial of service attack, especially if your network operations staff needs to hotfix or spin up new security on the fly.

3. Reinforce at the Router 

While not a permanent solution to a DDoS attack, your router can buy you some time in the early phases of the build-up to an attack. Truly massive targeted attacks often require some time to reach full capacity. These minutes are crucial, as they can be the difference between an ability to get back on-line quickly and having your systems down for extended periods. There are several ways your router can help. For example, setting lower timeouts on certain kinds of connections, reducing thresholds on UDP and SYN packet floods and identifying remote IP ranges to block can buy you anywhere from ten to thirty minutes of up-time in some cases. Even that much time can often make all the difference.

4. UDP Phantom Zone 

Unless your servers have a very good reason for receiving or sending UDP traffic, your best option is to simply ask your upstream providers to drop the packets at their routers. Some of the most popular DDoS strategies use NTP and UDP amplification which can overwhelm many networks with relatively minimal hardware. However, if your network sends all UDP traffic to the phantom zone, your servers will never see it.

5. Geographically Distributed Servers 

One of the best ways to avoid a distributed attack is to have a distributed server network, according to Web Hosting Buddy. The fewer points of failure your system has, the more vulnerable it is. However, if a DDoS attack only affects a localized geographic area, your network operations can distribute legitimate traffic to other servers on your network automatically and isolate the attacker before the unauthorized traffic has a chance to cause any trouble.

There are commercial companies, naturally, that can provide all these services for high reliability web sites and web services. Although most sites likely don't need industrial strength denial of service defense, it is something to consider as your traffic grows and your network's importance increases.
Viewing all 855 articles
Browse latest View live