Student Charged By FBI For Hacking His Grades More Than 90 times

An anonymous reader shares a report: In college, you can use your time to study. Or then again, you could perhaps rely on the Hand of God. And when I say “Hand of God, ” what I really mean is “keylogger.” Think of it like the “Nimble Fingers of God.” “Hand of God” (that makes sense) and “pineapple” (???) are two of the nicknames allegedly used to refer to keyloggers used by a former University of Iowa wrestler and student who was arrested last week on federal computer-hacking charges in a high-tech cheating scheme. According to the New York Times, Trevor Graves, 22, is accused in an FBI affidavit of working with an unnamed accomplice to secretly plug keyloggers into university computers in classrooms and in labs. The FBI says keyloggers allowed Graves to record whatever his professors typed, including credentials to log into university grading and email systems. Court documents allege that Graves intercepted exams and test questions in advance and repeatedly changed grades on tests, quizzes and homework assignments. This went on for 21 months — between March 2015 and December 2016. The scheme was discovered when a professor noticed that a number of Graves’ grades had been changed without her authorization. She reported it to campus IT security officials. Read more of this story at Slashdot.

Continued here:
Student Charged By FBI For Hacking His Grades More Than 90 times

What happened to Las Vegas shooter’s hard drive? It’s a mystery

Enlarge / Vehicles drive past a Las Vegas billboard featuring a Federal Bureau of Investigation tip line number on Interstate 515. On October 1, Stephen Paddock killed 58 people and injured more than 450 after he opened fire on a large crowd at the Route 91 Harvest country music festival. (credit: Drew Angerer/Getty Images) Local and federal investigators still have not come up with a motive that sparked a Nevada man to commit one of the deadliest mass shootings in American history. More than three weeks after Stephen Paddock opened fire and killed 58 people and wounded hundreds of others attending a country music festival below his Las Vegas hotel room, authorities appear stumped about uncovering a critical piece of information—Paddock’s hard drive—that could potentially lead them to other suspects. Stephen Paddock. (credit: Facebook ) Some madmen leave behind manifestos of sorts, like the one from Theodore Kaczynski, the Unabomber. His 35,000-word manifesto railing against technology  paved the way for his 1996 arrest after his brother, David, realized it was written by his sibling. Paddock, who killed himself in his Mandalay Bay hotel room after the October 1 shooting rampage, hasn’t left any hint of a motive to explain his murders. The FBI is currently examining computers and cellphones in the FBI’s lab in Quantico tied to the Paddock case. However, a hard drive in a laptop found in the shooter’s hotel room is now missing, according to The Associated Press . Read 8 remaining paragraphs | Comments

See the original post:
What happened to Las Vegas shooter’s hard drive? It’s a mystery

Justice Department Demands Five Twitter Users’ Personal Info Over an Emoji

An anonymous reader quotes a report from Techdirt: Back in May, the Justice Department — apparently lacking anything better to do with its time — sent a subpoena to Twitter, demanding a whole bunch of information on five Twitter users, including a few names that regular Techdirt readers may be familiar with. If you can’t see that, it’s a subpoena asking for information on the following five Twitter users: @dawg8u (“Mike Honcho”), @abtnatural (“Virgil”), @Popehat (Ken White), @associatesmind (Keith Lee) and @PogoWasRight (Dissent Doe). I’m pretty sure we’ve talked about three of those five in previous Techdirt posts. Either way, they’re folks who are quite active in legal/privacy issues on Twitter. And what info does the DOJ want on them? Well, basically everything: [users’ names, addresses, IP addresses associated with their time on Twitter, phone numbers and credit card or bank account numbers.] That’s a fair bit of information. Why the hell would the DOJ want all that? Would you believe it appears to be over a single tweet from someone to each of those five individuals that consists entirely of a smiley face? I wish I was kidding. Here’s the tweet and then I’ll get into the somewhat convoluted back story. The tweet is up as I write this, but here’s a screenshot in case it disappears. The Department of Justice’s subpoena is intended to address allegations that Shafer, who has a history of spotting weak encryption and drawing attention to it, cyberstalked an FBI agent after the agency raided his home. Vanity Fair summarizes the incident: “In 2013, Shafer discovered that FairCom’s data-encryption package had actually exposed a dentist’s office to data theft. An F.T.C. settlement later validated Shafer’s reporting, but in 2016, when another dentist’s office responded to Shafer’s disclosure by claiming he’d violated the Computer Fraud and Abuse Act and broken the law, the F.B.I. raided his home and confiscated many of his electronics. Shafer was particularly annoyed at F.B.I. Special Agent Nathan Hopp, who helped to conduct the raid, and who was later involved in a different case: in March, he compiled a criminal complaint involving the F.B.I.’s arrest of a troll for tweeting a flashing GIF at journalist Kurt Eichenwald, who is epileptic. Shafer began to compile publicly available information about Hopp, sharing his findings on Twitter. The Twitter users named in the subpoena had started a separate discussion about Hopp, with one user calling Hopp the “least busy F.B.I. agent of all time, ” a claim that prompted Shafer’s smiley-faced tweet.” Read more of this story at Slashdot.

Read the article:
Justice Department Demands Five Twitter Users’ Personal Info Over an Emoji

Kaspersky says it briefly possessed classified NSA files

Earlier this month, reports surfaced that classified NSA documents detailing how US agencies defend their cyber networks and how they breach foreign ones were stolen by Russian hackers in 2015. Those reports noted that the files were spotted through Kaspersky security software used by an NSA contractor who had saved the classified documents on a home computer. Well, Kaspersky has now provided some more information about the incident and it has acknowledged that it did in fact have classified NSA materials in its possession, the Associated Press reports. The company’s founder, Eugene Kaspersky, said that in 2014, Kaspersky analysts informed him that their software had plucked some classified files from an NSA contractor’s computer. Kaspersky said it was immediately clear what needed to be done — the materials had to be deleted. And so they were. However, whether the files in question were obtained purposefully or as a result of normal functions of the security software is still up in the air. As Kaspersky tells it, the company was already tracking a team of hackers called the Equation Group, which was later revealed to be part of the NSA. The NSA contractor that exposed the files had run Kaspersky software on his computer after infecting it with a bootleg copy of Microsoft Office and while the software cleaned up the viruses, it was also triggered by the Equation Group materials stored on the contractor’s computer. Those were then sent to Kaspersky headquarters for evaluation and as soon as analysts saw that the files were classified NSA documents, they alerted Eugene Kaspersky and subsequently deleted the files. Releasing this information is part of Kaspersky Lab’s recent push towards transparency as mistrust in the US has mounted over the past few months. Best Buy pulled Kaspersky software from its shelves last month and the US government banned the software in all federal agencies. Earlier this year, the FBI was reportedly discouraging private companies from using Kaspersky products, which have been a focus in government investigations of late and an interest of both the Senate and House of Representatives . Earlier this week, in order to regain some trust, Kaspersky announced that it would allow its source code to be reviewed by third parties and would open three “transparency centers” around the world. Jake Williams, a cybersecurity expert and former NSA analyst, told the AP that because Kaspersky was trying to woo US government clients at the time, it made sense that it would have chosen to delete the files. “It makes sense that they pulled those up and looked at the classification marking and then deleted them, ” he said. “I can see where it’s so toxic you may not want it on your systems.” However, he added the fact that an NSA employee put classified material on an already compromised home computer was “absolutely wild.” Source: Associated Press

Link:
Kaspersky says it briefly possessed classified NSA files

FBI tried and failed to unlock 7,000 encrypted devices

In an 11-month period, the FBI failed to gain access to around 7, 000 encrypted mobile devices, BBC News reports , which is about half of those targeted by the agency according to FBI Director Christopher Wray. In a speech given at the Association of Chiefs of Police conference yesterday, he said that device encryption was “a huge, huge problem, ” for the agency. The FBI publicly went after Apple following the 2015 San Bernardino terror attack as it sought access to the shooter’s locked iPhone 5c — a request that Apple staunchly refused . It eventually got around the issue by paying an undisclosed vendor reportedly $900, 000 for software that gave the agency access to the phone. While that incident garnered a lot of attention, it certainly wasn’t the first time the FBI made it clear that encrypted smartphones were a headache for the agency. In 2014, then Director James Comey said that secure communications could lead to “a very dark place” and called on Congress to change the Communications Assistance for Law Enforcement Act accordingly. Further, while the FBI presented the San Bernardino attacker’s phone as a special case of national security, the Wall Street Journal reported that the Department of Justice was pursuing nine similar requests around the same time. Wray said at the conference, “I get it, there’s a balance that needs to be struck between encryption and the importance of giving us the tools we need to keep the public safe.” But as cybersecurity expert Alan Woodward told BBC News , encryption is here to stay. “Encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies, ” he said. “Even if the equipment manufacturers didn’t build in such encryption it would be possible to obtain software that encrypted data in the same way.” Source: BBC News

View the original here:
FBI tried and failed to unlock 7,000 encrypted devices

This admin helped music pirates pilfer 1 billion copyrighted tracks

Enlarge / ShareBeast piracy site visitors are greeted with this FBI anti-piracy warning today. The admin for a prolific file-sharing site that helped pirates score more than 1 billion tracks now faces five years in prison after pleading guilty to a single count of criminal copyright infringement. Artur Sargsyan, the 29-year-old owner and operator of ShareBeast, is to be sentenced in Atlanta federal court in December for operating  (PDF) what the Recording Industry Association of America said was the most prolific US-based file-sharing site. The defendant also forfeited $185,000 in ill-gotten gains, the government said. The authorities in 2015 seized the ShareBeast domain and a few others connected to the site, which regularly allowed users to score pre-release music. Sargsyan was charged last month. Read 5 remaining paragraphs | Comments

View post:
This admin helped music pirates pilfer 1 billion copyrighted tracks

FBI arrests UK security researcher who stopped WannaCry outbreak (Updated)

Marcus Hutchins, the 23-year-old security researcher who is credited with halting the spread of the WannaCry malware program earlier this year has been arrested by the FBI while attending the DefCon security conference in Las Vegas, Motherboard reports . This is a developing story and details remain scarce as of the publication of this post, however The Telegraph states that “UK law enforcement and security agencies confirmed a British citizen has been arrested” as part of an ongoing FBI investigation. I can confirm @MalwareTechBlog was detained yesterday and FBI/US Marshalls won’t tell me where he is. https://t.co/lV5SxZjsRi — Andrew Mabbitt (@MabbsSec) August 3, 2017 Hutchins was hailed as a hero in May when he found the killswitch to the WannaCry virus, a malware program that had infected vulnerable targets across Europe and Asia, including the UK’s National Health Service and a Spanish telecommunications company. Hutchins, who works for Kryptos Logic, halted the virus’ spread by registering a web domain that the program’s code relied on. Motherboard reports that as of early Thursday morning Hutchins was being held in the Henderson Detention Center in Nevada, however he was later moved to an undisclosed location. “I’ve spoken to the US Marshals again and they say they have no record of Marcus being in the system. At this point we’ve been trying to get in contact with Marcus for 18 hours and nobody knows where he’s been taken, ” an unnamed friend of Hutchins told Motherboard . “We still don’t know why Marcus has been arrested and now we have no idea where in the US he’s been taken to and we’re extremely concerned for his welfare.” Engadget has reached out to Kryptos Logic and the FBI for comment. This story will be updated as they reply. Update (2:29 pm EDT): Hutchins has reportedly been located and is being held at the FBI’s Las Vegas field office. Finally located @MalwareTechBlog , he’s in the Las Vegas FBI field office. Can anyone provide legal representation? — Andrew Mabbitt (@MabbsSec) August 3, 2017 Update: (2:45 pm EDT) : The Department of Justice has just announced that Hutchins is in custody not for his role in the Wannary event but for “his role in creating and distributing the Kronos banking Trojan.” According to the DoJ, between July 2014 and July 2015 Hutchins developed the malware and shared it online. Source: Telegraph UK , Motherboard

Read the original post:
FBI arrests UK security researcher who stopped WannaCry outbreak (Updated)

Engineer at Boeing admits trying to sell space secrets to Russians

Enlarge / The “high bay” at Boeing’s Satellite Development Center in El Segundo, California. A Boeing employee sold documents from the plant to an FBI undercover agent posing as a Russian intelligence agent. Gregory Allen Justice, a 49-year-old engineer living in Culver City, Calif., has pleaded guilty to charges of attempted economic espionage and attempted violation of the Export Control Act. Justice, who according to his father worked for Boeing Satellite Systems in El Segundo, Calif., was arrested last July after selling technical documents about satellite systems to someone he believed to be a Russian intelligence agent. Instead, he sold the docs to an undercover Federal Bureau of Investigation employee. The sting was part of a joint operation by the FBI and the US Air Force Office of Special Investigations. The documents provided by Justice to the undercover agent included information on technology on the US Munitions List, meaning they were regulated by government International Trade in Arms regulations (ITAR). “In exchange for providing these materials during a series of meeting between February and July of 2016, Justice sought and received thousands of dollars in cash payments,” a Justice Department spokesperson said in a statement. “During one meeting, Justice and the undercover agent discussed developing a relationship like one depicted on the television show ‘The Americans.'” Just before he was arrested, Justice offered to take the agent on a tour of the facility where he worked—where he told the agent “all military satellites were built,” according Justice’s plea agreement. Read 1 remaining paragraphs | Comments

Read More:
Engineer at Boeing admits trying to sell space secrets to Russians

Reddit Users Lose Real Money After Meme Currency Bot Dies

Another day, another cryptocurrency clusterfuck. This week, the creator of the tipping bot “dogetipbot”—a service that let Reddit users “tip” each other in Dogecoin— announced that his company is broke, he’s broke, and the bot is broke because he spent all the coins, after he himself ran out of money. Read more…

View article:
Reddit Users Lose Real Money After Meme Currency Bot Dies

Reddit Users Lose Real Money After Meme Currency Bot Dies

Another day, another cryptocurrency clusterfuck. This week, the creator of the tipping bot “dogetipbot”—a service that let Reddit users “tip” each other in Dogecoin— announced that his company is broke, he’s broke, and the bot is broke because he spent all the coins, after he himself ran out of money. Read more…

See the article here:
Reddit Users Lose Real Money After Meme Currency Bot Dies