Fake Call Centers in India Scam Americans Of Millions

An anonymous reader writes:Indian police have arrested 70 people and are questioning hundreds more after uncovering a massive scam to cheat thousands of Americans out of millions of dollars by posing as U.S. tax authorities and demanding unpaid taxes, a police officer said Thursday. According to police in Mumbai, the yearlong scam involved running fake call centers which sent voice mail messages telling U.S. nationals to call back because they owed back taxes. Those who called back and believed the threats would fork out thousands of dollars to “settle” their case, Mumbai police officer Parag Marere said Thursday. The scam brought in more than $150, 000 a day, Marere said without giving a total sum. If the scam netted that amount daily, it would have made almost $55 million in one year. Some victims were also told to buy gift vouchers from various companies, and hand over the voucher ID numbers which the impostors then used to make purchases, Marere said. Police said they are likely to file charges against many of the 600 or more people still being questioned on suspicion of running the fake call centers, housed on several stories of a Mumbai office building. Read more of this story at Slashdot.

Continued here:
Fake Call Centers in India Scam Americans Of Millions

California Launches Mandatory Data Collection For Police Use-of-Force

An anonymous Slashdot reader quotes the AP: All 800 police departments in California must begin using a new online tool launched Thursday to report and help track every time officers use force that causes serious injuries… The tool, named URSUS for the bear on California’s flag, includes fields for the race of those injured and the officers involved, how their interaction began and why force was deemed necessary. “It’s sort of like TurboTax for use-of-force incidents, ” said Justin Erlich, a special assistant attorney general overseeing the data collection and analysis. Departments must report the data under a new state law passed last November. Though some departments already tracked such data on their own, many did not… “As a country, we must engage in an honest, transparent, and data-driven conversation about police use of force, ” California Attorney General Kamala Harris said in a news release. It’s an open source tool developed by Bayes Impact, and California plans to share the code with other interested law enforcement agencies across the country. Only three other states currently require their police departments to track data about use-of-force incidents, “but their systems aren’t digital, and in Colorado’s case, only capture shootings.” Read more of this story at Slashdot.

More here:
California Launches Mandatory Data Collection For Police Use-of-Force

Cops Are Raiding Homes of Innocent People Based Only On IP Addresses

Kashmir Hill has a fascinating story today on what can go wrong when you solely rely on IP address in a crime investigation — also highlighting how often police resort to IP addresses. In the story she follows a crime investigation that led police to raid a couple’s house at 6am in the morning, because their IP address had been associated with the publication of child porn on notorious 4chan porn. The problem was, Hill writes: the couple — David Robinson and Jan Bultmann — weren’t the ones who had uploaded the child porn. All they did was voluntarily use one of their old laptops as a Tor exit relay, a software used by activists, dissidents, privacy enthusiasts as well as criminals, so that people who want to stay anonymous when surfing the web could do so. Hill writes: Robinson and Bultmann had specifically operated the riskiest node in the chain: the exit relay which provides the IP address ultimately associated with a user’s activity. In this case, someone used Tor to make the porn post, and his or her traffic had been routed through the computer in Robinson and Bultmann’s house. The couple wasn’t pleased to have helped someone post child porn to the internet, but that’s the thing about privacy-protective tools: They’re going to be used for good and bad purposes, and to support one, you might have to support the other.Robinson added that he was a little let down because police didn’t bother to look at the public list which details the IP addresses associated with Tor exit relays. Hill adds: The police asked Robinson to unlock one MacBook Air, and then seemed satisfied these weren’t the criminals they were looking for and left. But months later, the case remains open with Robinson and Bultmann’s names on police documents linking them to child pornography. “I haven’t run an exit relay since. The police told me they’d be back if it happened again, ” Robinson said; he’s still running a Tor node, just not the end point anymore. “I have to take the threat seriously because I don’t want my wife or I to wake up with guns in our faces.”Technologist Seth Schoen, and EFF Executive Director Cindy Cohn in a white paper aimed at courts and cops. “For many reasons, connecting an individual to a crime linked to an IP address, without any additional investigation, is irresponsible and threatens the civil liberties of innocent people.” Read more of this story at Slashdot.

See the original post:
Cops Are Raiding Homes of Innocent People Based Only On IP Addresses

Long TSA Delays Force Airports To Hire Private Security Contractors

An anonymous Slashdot reader writes: TSA checkpoints caused 6, 800 American Airlines passengers to miss their flights in just one week this spring, and the problem isn’t improving. “Two years ago the Transportation Security Administration (TSA) offered $15, 000 to anybody — literally anybody — who could come up with an idea to speed up airport security…” writes Popular Science. “They wouldn’t say who won or for which idea, but since we’re here two years later with longer wait times than ever, it’s fair to say it hasn’t lived up to the groundbreaking ideals of that call to action… Now in summer 2016, the TSA recommends arriving three hours early instead of a mere two.” So this spring the Seattle-Tacoma airport replaced many of the TSA staff with private screeners, although “Private security operates under strict direction from the TSA, and even those airports that heavily utilize private contractors still have a lot of TSA personnel in the back rooms…” according to the article. “The ability to do exactly what the TSA does, only faster and cheaper, seems to be the major draw.” Now 22 U.S. airports are using private screeners, although the Seattle and San Francisco airports are the only ones with significant traffic. The article also cites a Homeland Security report which discovered that investigators were able to smuggle a test bomb past security checkpoints in 67 out of 70 tests. Read more of this story at Slashdot.

More:
Long TSA Delays Force Airports To Hire Private Security Contractors

New Ransomware Poses As A Windows Update

Slashdot reader MojoKid quotes an article from Hot Hardware: A security researcher for AVG has discovered a new piece of ransomware called Fantom that masquerades as a critical Windows update. Victims who fall for the ruse will see a Windows screen acting like it’s installing the update, but what’s really happening is that the user’s documents and files are being encrypted in the background… The scam starts with a pop-up labeled as a critical update from Microsoft. Once a user decides to apply the fake update, it extracts files and executes an embedded program called WindowsUpdate.exe… As with other EDA2 ransomware, Fantom generates a random AES-128 key, encrypts it using RSA, and then uploads it to the culprit. From there, Fantom targets specific file extensions and encrypts those files using AES-128 encryption… Users affected by this are instructed to email the culprit for payment instructions. While the ransomware is busy encrypting your files, it displays Microsoft’s standard warning about not turning off the computer while the “update” is in progress. Pressing Ctrl+F4 closes that window, according to the article, “but that doesn’t stop the ransomware from encrypting files in the background.” Read more of this story at Slashdot.

Read More:
New Ransomware Poses As A Windows Update

Almost Every Volkswagen Built Since 1995 Is Vulnerable To Wireless Unlocking Hacks

Even more bad news for Volkswagen: security researchers have discovered a huge security hole that affects potentially up to 100 million cars. It’s possible, using hardware as cheap as a $40 setup with an Arduino and an add-on radio transceiver board, to intercept signals from a Volkswagen Group key fob, and then by combining it with a small number of cryptographic keys shared by every VW car, one could essentially clone the car’s key fob. Read more…

Read More:
Almost Every Volkswagen Built Since 1995 Is Vulnerable To Wireless Unlocking Hacks

Nigerian Scammers Infect Themselves With Own Malware, Reveal New Fraud Scheme

“A pair of security researchers recently uncovered a Nigerian scammer ring that they say operates a new kind of attack…after a few of its members accidentally infected themselves with their own malware, ” reports IEEE Spectrum. “Over the past several months, they’ve watched from a virtual front row seat as members used this technique to steal hundreds of thousands of dollars from small and medium-sized businesses worldwide.” Wave723 writes: Nigerian scammers are becoming more sophisticated, moving on from former ‘spoofing’ attacks in which they impersonated a CEO’s email from an external account. Now, they’ve begun to infiltrate employee email accounts to monitor financial transactions and slip in their own routing and account info…The researchers estimate this particular ring of criminals earns about US $3 million from the scheme. After they infected their own system, the scammers’ malware uploaded screenshots and all of their keystrokes to an open web database, including their training sessions for future scammers and the re-routing of a $400, 000 payment. Yet the scammers actually “appear to be ‘family men’ in their late 20s to 40s who are well-respected, church-going figures in their communities, ” according to the article. SecureWorks malware researcher Joe Stewart says the scammers are “increasing the economic potential of the region they’re living in by doing this, and I think they feel somewhat of a duty to do this.” Read more of this story at Slashdot.

More:
Nigerian Scammers Infect Themselves With Own Malware, Reveal New Fraud Scheme

New Attack Steals SSNs, E-mail Addresses, and More From HTTPS Pages

Security researchers at KU Leuven have discovered an attack technique, dubbed HEIST (HTTP Encrypted Information can be Stolen Through TCP-Windows), which can exploit an encrypted website using only a JavaScript file hidden in a maliciously crafted ad or page. ArsTechnica reports: Once attackers know the size of an encrypted response, they are free to use one of two previously devised exploits to ferret out the plaintext contained inside it. Both the BREACH and the CRIME exploits are able to decrypt payloads by manipulating the file compression that sites use to make pages load more quickly. HEIST will be demonstrated for the first time on Wednesday at the Black Hat security conference in Las Vegas. “HEIST makes a number of attacks much easier to execute, ” Tom Van Goethem, one of the researchers who devised the technique, told Ars. “Before, the attacker needed to be in a Man-in-the-Middle position to perform attacks such as CRIME and BREACH. Now, by simply visiting a website owned by a malicious party, you are placing your online security at risk.” Using HEIST in combination with BREACH allows attackers to pluck out and decrypt e-mail addresses, social security numbers, and other small pieces of data included in an encrypted response. BREACH achieves this feat by including intelligent guesses — say, @gmail.com, in the case of an e-mail address — in an HTTPS request that gets echoed in the response. Because the compression used by just about every website works by eliminating repetitions of text strings, correct guesses result in no appreciable increase in data size while incorrect guesses cause the response to grow larger. Read more of this story at Slashdot.

See the article here:
New Attack Steals SSNs, E-mail Addresses, and More From HTTPS Pages

Cisco Finds $34 Million Ransomware Industry

Ransomware is “generating huge profits, ” says Cisco. Slashdot reader coondoggie shares this report from Network World: Enterprise-targeting cyber enemies are deploying vast amounts of potent ransomware to generate revenue and huge profits — nearly $34 million annually, according to Cisco’s Mid-Year Cybersecurity Report out this week. Ransomware, Cisco wrote, has become a particularly effective moneymaker, and enterprise users appear to be the preferred target. Many of the victims were slow to patch their systems, according to the article. One study of Cisco devices running on fundamental infrastructure discovered that 23% had vulnerabilities dating back to 2011, and 16% even had vulnerabilities dating back to 2009. Popular attack vectors included vulnerabilities in JBoss and Adobe Flash, which was responsible for 80% of the successful attacks for one exploit kit. The article also reports that attackers are now hiding their activities better using HTTPS and TLS, with some even using a variant of Tor. Read more of this story at Slashdot.

View original post here:
Cisco Finds $34 Million Ransomware Industry

Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services

An anonymous reader writes from a report via Schneier on Security: Two researchers have discovered over 100 Tor nodes that are spying on hidden services. Cory Doctorow from Boing Boing reports: “These nodes — ordinary nodes, not exit nodes — sorted through all the traffic that passed through them, looking for anything bound for a hidden service, which allowed them to discover hidden services that had not been advertised. These nodes then attacked the hidden services by making connections to them and trying common exploits against the server-software running on them, seeking to compromise and take them over. The researchers used ‘honeypot’ .onion servers to find the spying computers: these honeypots were .onion sites that the researchers set up in their own lab and then connected to repeatedly over the Tor network, thus seeding many Tor nodes with the information of the honions’ existence. They didn’t advertise the honions’ existence in any other way and there was nothing of interest at these sites, and so when the sites logged new connections, the researchers could infer that they were being contacted by a system that had spied on one of their Tor network circuits. No one knows who is running the spying nodes: they could be run by criminals, governments, private suppliers of ‘infowar’ weapons to governments, independent researchers, or other scholars (though scholarly research would not normally include attempts to hack the servers once they were discovered).” The Tor project is aware of the attack and is working to redesign its system to try and block it. Security firm Bitdefender has issued an alert about a malicious app called EasyDoc that hands over control of Macs to criminals via Tor. Read more of this story at Slashdot.

Read this article:
Researchers Discover Over 100 Tor Nodes Designed To Spy On Hidden Services