Some hacked e-mails, documents from Putin advisor confirmed as genuine

Enlarge Recently a cache of 2,337 e-mails from the office of a high-ranking advisor to Russian president Vladimir Putin was dumped on the Internet after purportedly being obtained by a Ukrainian hacking group calling itself CyberHunta . The cache shows that the Putin government communicated with separatist forces in Eastern Ukraine, receiving lists of casualties and expense reports while even apparently approving government members of the self-proclaimed Donetsk People’s Republic. And if one particular document is to be believed, the Putin government was formulating plans to destabilize the Ukrainian government as early as next month in order to force an end to the standoff over the region, known as Donbass. Based on reporting by the Associated Press’s Howard Amos and analysis by the Atlantic Council’s Digital Forensic Research Lab , at least some of the e-mails—dumped in a 1-gigabyte Outlook .PST mailbox file—are genuine. Amos showed e-mails in the cache to a Russian journalist, Svetlana Babaeva, who identified e-mails she had sent to Surkov’s office. E-mail addresses and phone numbers in some of the e-mails were also confirmed. And among the documents in the trove of e-mails is a scan of Surkov’s passport (above), as well as those of his wife and children. A Kremlin spokesperson denied the legitimacy of the e-mails, saying that Surkov did not have an e-mail address. However, the account appears to have been used by Surkov’s assistants, and the dump contains e-mails with reports from Surkov’s assistants. The breach, if ultimately proven genuine, would appear to be the first major publicized hack of a Russian political figure. And in that instance, perhaps this could be a response to the hacking of US political figures attributed to Russia. Read 6 remaining paragraphs | Comments

Read More:
Some hacked e-mails, documents from Putin advisor confirmed as genuine

Linux Kernel 4.7 Reaches End of Life, Users Urged To Move To Linux 4.8

prisoninmate writes: The Linux 4.7 kernel branch officially reached end of life, and it has already been marked as EOL on the kernel.org website, which means that the Linux kernel 4.7.10 maintenance update is the last one that will be released for this branch. It also means that you need to either update your system to the Linux 4.7.10 kernel release or move to a more recent kernel branch, such as Linux 4.8. In related news, Linux kernel 4.8.4 is now the latest stable and most advanced kernel version, which is already available for users of the Solus and Arch Linux operating systems, and it’s coming soon to other GNU/Linux distributions powered by a kernel from the Linux 4.8 series. Users are urged to update their systems as soon as possible. Read more of this story at Slashdot.

View the original here:
Linux Kernel 4.7 Reaches End of Life, Users Urged To Move To Linux 4.8

Feds seized 50TB of data from NSA contractor suspected of theft

The National Security Operations Center at NSA, photographed in 2012—the nerve center of the NSA’s “signals intelligence” monitoring. (credit: National Security Agency ) In a new Thursday court filing , federal prosecutors expanded their accusations against a former National Security Agency contractor. Federal investigators seized at least 50 terabytes of data from Harold Thomas Martin III, at least some of which was “national defense information.” If all of this data was indeed classified, it would be the largest such heist from the NSA, far larger than what former contractor Edward Snowden took. Prosecutors also said that Martin should remain locked up and noted that he will soon be charged with violations of the Espionage Act . That law, which dates back nearly a century, is the same law that was used to charge Chelsea Manning and Snowden, among others. If convicted, violators can face the death penalty. United States Attorney Rod Rosenstein and two other prosecutors laid out new details in the case against Martin, whose arrest only became public earlier this month . Martin had been a contractor with Booz Allen Hamilton and possessed a top-secret clearance. Read 10 remaining paragraphs | Comments

Visit site:
Feds seized 50TB of data from NSA contractor suspected of theft

Israeli Cyber Weapon Dealers Figured Out How to Hack Every iPhone

NSO Group, a company that sells hacking services to governments so they can spy on journalists and dissidents, exploited gaping security holes in iPhone software, according to a report byLookout Security and Citizen Lab. But don’t worry: Apple just pushed a fix. Read more…

View article:
Israeli Cyber Weapon Dealers Figured Out How to Hack Every iPhone

Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack

The value of bitcoins plummeted 20 percent after almost 120,000 units of the digital currency were stolen from Bitfinex, a major Bitcoin exchange. The Hong Kong-based exchange said it had discovered a security breach late Tuesday, and has suspended all transactions. “We are investigating the breach to determine what happened, but we know that some of our users have had their Bitcoins stolen. We are undertaking a review to determine which users have been affected by the breach. While we conduct this initial investigation and secure our environment, bitfinex.com will be taken down and the maintenance page will be left up,” said the company on its website . Read 7 remaining paragraphs | Comments

View original post here:
Bitcoin value falls off cliff after $77M stolen in Hong Kong exchange hack

Fortune 500 Company Hires Ransomware Gang To Hack the Competition

It’s no secret that ransomware hackers are in the business to make money. But a new business arrangement hitting the news today may surprise many. Vice’s Motherboard, citing research and investigation (PDF) from security firm F-Secure, is reporting that a Fortune 500 company, the name of which hasn’t been unveiled, hired a ransomware gang to hack its competitors. From the article: In an exchange with a security researcher pretending to be a victim, one ransomware agent claimed they were working for a Fortune 500 company. “We are hired by [a] corporation to cyber disrupt day-to-day business of their competition, ” the customer support agent of a ransomware known as Jigsaw said, according to a new report by security firm F-Secure. “The purpose was just to lock files to delay a corporation’s production time to allow our clients to introduce a similar product into the market first.”In a statement to Motherboard, Mikko Hypponen said, “If this indeed was a case where ransomware was used on purpose to disrupt a competitor’s operation, it’s the only case we know of.” F-Secure adds that the consumer representative noted that “politicians, governments, husbands, wives — people from all walks of life contract [them] to hack computers, cell phones.” Read more of this story at Slashdot.

View the original here:
Fortune 500 Company Hires Ransomware Gang To Hack the Competition

How To Make Any Android Phone a Nexus

Nexus phones are essential tools for any Android fan or developer because of their lack of bloatware and regular system updates. Now, thanks to tweaks to the latest version of the operating system, it’s not that difficult to get a Nexus-style experience on any handset. Here’s how you can do it. Read more…

Follow this link:
How To Make Any Android Phone a Nexus

New ‘Hardened’ Tor Browser Protects Users From FBI Hacking

An anonymous reader quotes an article from Motherboard: According to a new paper, security researchers are now working closely with the Tor Project to create a “hardened” version of the Tor Browser, implementing new anti-hacking techniques which could dramatically improve the anonymity of users and further frustrate the efforts of law enforcement… “Our solution significantly improves security over standard address space layout randomization (ASLR) techniques currently used by Firefox and other mainstream browsers, ” the researchers write in their paper, whose findings will be presented in July at the Privacy Enhancing Technologies Symposium in Darmstadt, Germany. The researchers say Tor is currently field-testing their solution for an upcoming “hardened” release, making it harder for agencies like the FBI to crack the browser’s security, according to Motherboard. “[W]hile that defensive advantage may not last for too long, it shows that some in the academic research community are still intent on patching the holes that their peers are helping government hackers exploit.” Read more of this story at Slashdot.

Follow this link:
New ‘Hardened’ Tor Browser Protects Users From FBI Hacking

Fiverr Suffers Six-Hour DDoS Attack After Removing DDoS-For-Hire Listings

Two days after Fiverr, a marketplace for digital services, removed user listings from its website that advertised DDoS-for-hire services, the company’s website suffered a six-hour long DDOS attack. Softpedia reports: The incident took place on the morning of May 27 (European timezones), and the service admitted its problems on its Twitter account. At the time of writing, Fiverr has been back up and functioning normally for more than two hours. Fiverr’s problems stem from an Incapsula probe that found DDoS-for-hire ads on its marketplace, available for $5. Incapsula reported the suspicious listings to Fiverr, who investigated the issue and removed the ads. Fiverr first removed all listings advertising blatantly illegal DDoS services, but later also removed the ads offering to “test” a website for DDoS “protection” measures. Read more of this story at Slashdot.

Taken from:
Fiverr Suffers Six-Hour DDoS Attack After Removing DDoS-For-Hire Listings