Android Malware Used To Hack and Steal Tesla Car

An anonymous reader writes: By leveraging security flaws in the Tesla Android app, an attacker can steal Tesla cars. The only hard part is tricking Tesla owners into installing an Android app on their phones, which isn’t that difficult according to a demo video from Norwegian firm Promon. This malicious app can use many of the freely available Android rooting exploits to take over the user’s phone, steal the OAuth token from the Tesla app and the user’s login credentials. This is possible because the Tesla Android app stores the OAuth token in cleartext, and contains no reverse-engineering protection, allowing attackers to alter the app’s source code and log user credentials. The OAuth token and Tesla owner’s password allow an attacker to perform a variety of actions, such as opening the car’s doors and starting the motor. Read more of this story at Slashdot.

Read the article:
Android Malware Used To Hack and Steal Tesla Car

Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

The SENA UD100 Bluetooth adapter, plus a slightly larger antenna, allows Blue Hydra to peer deep into the Bluetooth world. Sean Gallagher My new neighbor was using AirDrop to move some files from his phone to his iMac. I hadn’t introduced myself yet, but I already knew his name. Meanwhile, someone with a Pebble watch was walking past, and someone named “Johnny B” was idling at the stoplight at the corner in their Volkswagen Beetle, following directions from their Garmin Nuvi. Another person was using an Apple Pencil with their iPad at a nearby shop. And someone just turned on their Samsung smart television. I knew all this because each person advertised their presence wirelessly, either over “classic” Bluetooth or the newer Bluetooth Low Energy (BTLE) protocol—and I was running an open source tool called Blue Hydra , a project from the team at Pwnie Express . Blue Hydra is intended to give security professionals a way of tracking the presence of traditional Bluetooth, BTLE devices, and BTLE “iBeacon” proximity sensors. But it can also be connected to other tools to provide alerts on the presence of particular devices. Despite their “Low Energy” moniker, BTLE devices are constantly polling the world even while in “sleep” mode. And while they use randomized media access control (MAC) addresses, they advertise other data that is unique to each device, including a universally unique identifier (UUID). As a result, if you can tie a specific UUID to a device by other means, you can track the device and its owner. By using the Received Signal Strength Indication (RSSI), you can get a sense of how far away they are. Read 6 remaining paragraphs | Comments

Excerpt from:
Hands-on: Blue Hydra can expose the all-too-unhidden world of Bluetooth

Stealing login credentials from a locked PC or Mac just got easier

Enlarge Snatching the login credentials of a locked computer just got easier and faster, thanks to a technique that requires only $50 worth of hardware and takes less than 30 seconds to carry out. Rob Fuller, a principal security engineer at R5 Industries, said the hack works reliably on Windows devices and has also succeeded on OS X, although he’s working with others to determine if it’s just his setup that’s vulnerable. The hack works by plugging a flash-sized minicomputer into an unattended computer that’s logged in but currently locked. In about 20 seconds, the USB device will obtain the user name and password hash used to log into the computer. Fuller, who is better known by his hacker handle mubix, said the technique works using both the Hak5 Turtle ($50) and USB Armory ($155) , both of which are USB-mounted computers that run Linux. “First off, this is dead simple and shouldn’t work, but it does,” mubix wrote in a blog post published Tuesday . “Also, there is no possible way that I’m the first one that has identified this, but here it is (trust me, I tested it so many ways to confirm it because I couldn’t believe it was true).” Read 5 remaining paragraphs | Comments

See more here:
Stealing login credentials from a locked PC or Mac just got easier

Personal Information of Nearly 200 Democrats Leaked in Latest Hack

We already knew that a recent hack that targeted Democratic officials was going to be more than just access to possibly incriminating emails, but we didn’t realize it would be this soon. Read more…

More:
Personal Information of Nearly 200 Democrats Leaked in Latest Hack

Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack

The value of bitcoins plummeted 20 percent after almost 120,000 units of the digital currency were stolen from Bitfinex, a major Bitcoin exchange. The Hong Kong-based exchange said it had discovered a security breach late Tuesday, and has suspended all transactions. “We are investigating the breach to determine what happened, but we know that some of our users have had their Bitcoins stolen. We are undertaking a review to determine which users have been affected by the breach. While we conduct this initial investigation and secure our environment, bitfinex.com will be taken down and the maintenance page will be left up,” said the company on its website . Read 7 remaining paragraphs | Comments

View original post here:
Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack

Hacker Steals 1.6 Million Accounts From Top Mobile Game’s Forum

Zack Whittaker, reporting for ZDNet: A hacker has targeted the official forum of popular mobile game “Clash of Kings, ” making off with close to 1.6 million accounts. The hack was carried out on July 14 by a hacker, who wants to remain nameless, and a copy of the leaked database was provided to breach notification site LeakedSource.com, which allows users to search their usernames and email addresses in a wealth of stolen and hacked data. In a sample given to ZDNet, the database contains (among other things) usernames, email addresses, IP addresses (which can often determine the user’s location), device identifiers, as well as Facebook data and access tokens (if the user signed in with their social account). Passwords stored in the database are hashed and salted. LeakedSource has now added the total 1, 597, 717 stolen records to its systems. Read more of this story at Slashdot.

Continue Reading:
Hacker Steals 1.6 Million Accounts From Top Mobile Game’s Forum

Over 1M BeautifulPeople Dating Site User Details Leak Online

An anonymous reader writes: Personal information of over one million users stored by popular dating site BeautifulPeople has leaked, and is now accessible online. We already knew that BeautifulPixel.com was hacked (it happened in November 2015), but this is the first confirmation from a security researcher that the details are legitimate. (BeautifulPeople had downplayed it at the time, saying that it was a staging server, and not a production server, that was hacked.) Security researcher Troy Hunt, citing a source, noted that the data has been sold online. The leaked personal information include email addresses, phone numbers, as well as hair color, weight, job and other details.Troy also noted that of the 1.1 million users details, 170 of them have government email addresses. Some of you may remember BeautifulPixel as the creator the “Shrek” virus. Read more of this story at Slashdot.

Read More:
Over 1M BeautifulPeople Dating Site User Details Leak Online

Facebook was the victim of a backdoor hack

Even a tech giant like Facebook isn’t immune to significant security breaches. Devcore’s Orange Tsai recently discovered that someone had installed a backdoor on one of Facebook’s corporate servers (that is, not the social network itself) in a bid to swipe workers’ login details. While it’s not clear how successful the script-based exploit was, Tsai noted that the file transfer app hosted on the server had several vulnerabilities that effectively gave any intruder free rein. The attacker could have checked employee email, for instance, or even connected to Facebook’s virtual private network to get access to the company’s inner workings. Thankfully, this is all past tense. You’re only hearing about this now because Tsai reported the bugs to Facebook (to get a bounty, naturally), and waited until the firm completed its investigation before disclosing the flaws. That backdoor isn’t there anymore, folks. All the same, the incident is bound to humble Facebook a bit — it’s proof that the company is a prime target for hackers, and that it can’t assume it’s always on top of every possible security flaw. Via: Hacker News Source: Devcore

View post:
Facebook was the victim of a backdoor hack

Apple Says Sorry For iPhone Error 53 and Issues IOS 9.2.1 Update To Fix It

Mark Wilson writes: Apple has a lot of support at the moment for its stance on encryption and refusing the FBI access to an iPhone’s contents, but it’s only a couple of weeks since the company was seen in a less favorable light. There was quite a backlash when users found that installing an update to iOS resulted in Error 53 and a bricked iPhone. Apple initially said that Error 53 was caused ‘for security reasons’ following speculation that it was a bid to stop people from using third party repair shops. iFixit suggested that the problem was a result of a failure of parts to correctly sync, and Apple has been rounding criticized for failing to come up with a fix. Today the company has issued an apology, along with an update that ensures Error 53 won’t happen again. But there’s more good news … If you were talked into paying for an out of warranty replacement as a result of Error 53, you could be in line to get your money back. Read more of this story at Slashdot.

View original post here:
Apple Says Sorry For iPhone Error 53 and Issues IOS 9.2.1 Update To Fix It

Hackers hold Hollywood hospital’s systems for ransom

A Hollywood hospital is having to rely on pencil and paper after a ransomware attack. For more than a week, the computer systems at Hollywood Presbyterian Memorial Medical Center have been down at the hands of hackers . In addition to having to keep registration and logs on paper, staff is without email access and unable to use some patient records. Patients have been transported to other facilities as the computers needed to complete lab work, pharmacy tasks and CT scans are all unavailable. Hospital officials say they’re working with LAPD and the FBI on the investigation, but they’ve yet to determine who is responsible for the attack. President and CEO Allen Stefanek said the attack was random, and local news outlets report that the breach shows signs of a ransomware-style bug. Details on the intrusion are still quite scarce, but the culprits are demanding 9, 000 bitcoin or just under $3.6 million in exchange for the key to restore the facility’s systems. Source: CSO

Taken from:
Hackers hold Hollywood hospital’s systems for ransom