ATM ‘jackpotting’ hacks reach the US

For some ATM thieves, swiping card data involves too much patience — they’d rather just take the money and run. The US Secret Service has warned ATM makers Diebold Nixdorf and NCR that “jackpotting” hacks, where crooks force machine to cough up large sums of cash, have reached the US after years of creating problems in Asia, Europe and Mexico. The attacks have focused largely on Diebold’s front-loading Opteva ATMs in stand-alone locations, such as retail stores and drive-thrus, and have relied on an combination of malware and hardware to pull off heists. In previous attacks, the thieves disguised themselves as technicians to avoid drawing attention. After that, they hooked up a laptop with a mirror image of the ATM’s operating system and malware (Diebold also mentioned replacing the hard drive outright). Security researcher Brian Krebs understands American ATMs have been hit with Ploutus.D, a variant of “jackpotting” malware that first launched in 2013. The mirror image needs to be paired with the ATM to work, but that’s not as difficult as you might think — the intruders used endoscopes to find and press the necessary reset button inside the machine. Once done, they attached keyboards and used activation codes to clean out ATMs within a matter of minutes. NCR hasn’t been explicitly targeted in these attacks, but it warned that this was an “industry-wide issue” and urged caution from companies using its ATMs. It’s definitely possible to thwart attacks like this. The Secret Service warned that ATMs still using Windows XP were particularly easy targets, and that updating to Windows 7 (let alone Windows 10) would protect against these specific attacks. Diebold also recommended updating to newer firmware and using the most secure configurations possible. And both organizations recommended physical security changes, such as using rear-loading ATMs, locking down physical access and closely watching for suspicious activity like opening the machine’s top. The catch, of course, is that ATM operators either haven’t been diligent or may have a hard time justifying the updates. It’s telling that victim machines have been running XP, a 16-year-old platform whose official support ended in 2014 — the odds aren’t high that companies will keep their ATMs up to date, let alone replace them with more secure models or institute advanced defenses. You may not see a widespread attempt to combat jackpotting in the US until the problem becomes too large to ignore. Via: Reuters Source: Krebs on Security

Continue reading here:
ATM ‘jackpotting’ hacks reach the US

A 1×1 tracking pixel was used as evidence of treason against 30,000 Turks, sent tens of thousands to jail

When Recep Tayyip Erdogan’s Turkish government took reprisals against hundreds of thousands of people suspected to have been involved in the failed coup of 2016, one of the criteria they used for whom to round up for indefinite detention as well as myriad human rights abuses (including torture) was whether people had a cookie on their computers set by a 1×1 tracking pixel served by Bylock, which the Erdogan regime says is evidence of support of exiled opposition leader Fethullah Gülen. (more…)

Read the original:
A 1×1 tracking pixel was used as evidence of treason against 30,000 Turks, sent tens of thousands to jail

One quarter of New Orleans’ catch-basins were clogged to uselessness with 93,000 lbs of plastic Mardi Gras beads

London has fatbergs : glistening, multiton agglomerations of fat, sanitary napkins, “flushable” wipes, human waste, dirty diapers, used condoms, and delicious strawberry jam; New Orleans has 93,000 pounds of plastic Mardi Gras beads. (more…)

See more here:
One quarter of New Orleans’ catch-basins were clogged to uselessness with 93,000 lbs of plastic Mardi Gras beads

Microsoft’s new Windows 10 Spectre patch disables Intel’s ‘fix’

Intel recently admitted that its latest patch for “Spectre” was essentially worse than the bug it was supposed to fix, as it was causing computers to spontaneously reboot. Now, Microsoft has taken action by issuing an out-of-band patch for Windows 7, 8.1 and 10 that disables that fix for Spectre variant 2. If you’re experiencing the problem you’ll need to download the update, as it won’t yet install automatically. Microsoft said that its internal testing shows the patch will stop the rebooting until Intel gets a new update together. Intel had already recommended that customers stop deploying the original patch, but that’s obviously impossible for individual Windows users, as the fixes come bundled in Microsoft’s own security updates. Intel dodged a bullet when its latest earnings report showed minimal financial impact from Spectre and Meltdown. However, it has been criticized by security experts over its lack of forthrightness about the scope of the problem. At one point, the chip maker had said the faulty patches only affect older CPUs, but later admitted that it can cause newer computers to reboot for no good reasons, too. Intel took another knock over the weekend for reportedly disclosing Meltdown and Spectre to Chinese customers like Lenovo and Alibaba before it even told the US government. The concern was that the Chinese government could have found out about the vulnerability and exploited it. Meanwhile, Intel has promised to release new patches for Spectre and Meltdown soon, and said chips invulnerable to the problem are coming later this year. Via: The Verge Source: Microsoft

Read more here:
Microsoft’s new Windows 10 Spectre patch disables Intel’s ‘fix’

Elon Musk’s Boring Co. flamethrower is real, $500 and up for pre-order

 So that flamethrower that Elon Musk teased The Boring Company would start selling after it ran out of its 50, 000 hats? Yeah, it’s real – and you can pre-order one now if you want need a ridiculous way to spend $500. Musk revealed the flamethrower on Saturday, after some digging tipped its existence late last week. The Boring Company Flamethrower is functional, too, as you can see… Read More

Read the original:
Elon Musk’s Boring Co. flamethrower is real, $500 and up for pre-order

Coincheck loses $400 million in massive cryptocurrency heist

Tokyo-based cryptocurrency exchange Coincheck just made history, and not in a good way. It has lost around $534 million worth of NEM tokens, one of the lesser-known cryptocurrencies, after its network was hacked on January 25th, 12:57pm EST. The attackers remained undetected for eight hours, giving them enough time to steal 523 million tokens kept in a “hot wallet, ” a type of storage that’s connected to the internet for easy spending. While the exact value of the stolen coins are unclear due to the ever-changing nature of cryptocurrency — it’s $400 million at the very least — Coincheck might have already lost more than what Mt. Gox did a few years ago. Mt. Gox, which was also based in Shibuya like Coincheck, was the victim of another massive cryptocurrency theft back in 2014. It lost between $400 and $480 million from the heist, prompting Japan’s legislators to pass a law to regulate bitcoin exchanges. Despite the comparable figures, Coincheck’s hack didn’t quite affect the market the way Mt. Gox did. Mt. Gox, after all, handled around 80 percent of Bitcoins back in the day when there weren’t a lot of exchanges yet. Also, affected Mt. Gox users didn’t get their money back. Coincheck suspended its trading and withdrawal for all cryptocurrencies other than Bitcoin, but the company promised not to run from its customers. It said it will use its own money to reimburse all 260, 000 affected users, though it didn’t specify when it will start disbursing funds. Source: CoinDesk , BBC , Bloomberg

View the original here:
Coincheck loses $400 million in massive cryptocurrency heist

Amateur Astronomer Discovers Long-Dead NASA Satellite Has Come Back To Life

schwit1 shares a report from Behind The Black: In his hunt to locate Zuma, an amateur astronomer has discovered that a long-dead NASA satellite, designed to study the magnetosphere, has come back to life. IMAGE went dead in 2005, and though NASA thought it might come back to life after experiencing a total eclipse in 2007 that would force a reboot, no evidence of life was seen then. It now appears that the satellite came to life sometime between then and 2018, and was chattering away at Earth waiting for a response. NASA is now looking at what it must do to take control of the spacecraft and resume science operations. Zuma is the secret U.S. government payload that was launched by SpaceX earlier this month and reportedly lost. As for why Scott Tilley — the amateur radio astronomer — decided to have a look for the present of secret military satellites, Ars Technica reports that he apparently does this semi-regularly as a hobby and, in this case, was inspired by the Zuma satellite. Read more of this story at Slashdot.

See more here:
Amateur Astronomer Discovers Long-Dead NASA Satellite Has Come Back To Life

Crooks Created 28 Fake Ad Agencies To Disguise Massive Malvertising Campaign

An anonymous reader quotes a report from Bleeping Computer: A group of cyber-criminals created 28 fake ad agencies and bought over 1 billion ad views in 2017, which they used to deliver malicious ads that redirected unsuspecting users to tech support scams or sneaky pages peddling malware-laden software updates or software installers. The entire operation — codenamed Zirconium — appears to have started in February 2017, when the group started creating the fake ad agencies which later bought ad views from larger ad platforms. These fake ad agencies each had individual websites and even LinkedIn profiles for their fake CEOs. Their sole purpose was to interface with larger advertising platforms, appearing as legitimate businesses. Ad security company Confiant, the one who discovered this entire operation, says ads bought by this group reached 62% of ad-monetized websites on a weekly basis. All in all, Confiant believes that about 2.5 million users who’ve encountered Zirconium’s malicious ads were redirected to a malicious site, with 95% of the victims being based in the U.S. Read more of this story at Slashdot.

View post:
Crooks Created 28 Fake Ad Agencies To Disguise Massive Malvertising Campaign

Elon Musk’s Boring Company Delivers $600 Flamethrower

Last December, Boring Company CEO Elon Musk promised to sell a Boring Company-branded flamethrower after selling 50, 000 Boring Company hats. Well, sure enough, 50, 000 hats were sold and Musk is delivering on his promise. The Verge reports: Mark this down as one of the promises Elon delivers on, apparently, because it looks like the Boring Company flamethrower is here. Redditors in a few SpaceX, Boring Company, and Musk-related subreddits noticed earlier this week that the URL “boringcompany.com/flamethrower” started redirecting to a page with a password box. And at least one user was able to guess the original password, too: “flame.” (It’s since been changed.) Behind that password was a shop page that looks just like the one for The Boring Company’s hat. But instead of a $20 cap, they found a preorder prompt for a $600 flamethrower. “Prototype pictured above, ” the listing reads. “Final production flamethrower will be better.” Read more of this story at Slashdot.

Read the original:
Elon Musk’s Boring Company Delivers $600 Flamethrower

Now Even YouTube Serves Ads With CPU-draining Cryptocurrency Miners

YouTube was recently caught displaying ads that covertly leach off visitors’ CPUs and electricity to generate digital currency on behalf of anonymous attackers, it was widely reported. From a report: Word of the abusive ads started no later than Tuesday, as people took to social media sites to complain their antivirus programs were detecting cryptocurrency mining code when they visited YouTube. The warnings came even when people changed the browser they were using, and the warnings seemed to be limited to times when users were on YouTube. On Friday, researchers with antivirus provider Trend Micro said the ads helped drive a more than three-fold spike in Web miner detections. They said the attackers behind the ads were abusing Google’s DoubleClick ad platform to display them to YouTube visitors in select countries, including Japan, France, Taiwan, Italy, and Spain. The ads contain JavaScript that mines the digital coin known as Monero. Read more of this story at Slashdot.

View article:
Now Even YouTube Serves Ads With CPU-draining Cryptocurrency Miners