Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

Kaspersky has acknowledged that code belonging to the US National Security Agency (NSA) was lifted from a PC for analysis but insists the theft was not intentional. From a report: In October, a report from the Wall Street Journal claimed that in 2015, the Russian firm targeted an employee of the NSA known for working on the intelligence agency’s hacking tools and software. The story suggested that the unnamed employee took classified materials home and operated on their PC, which was running Kaspersky’s antivirus software. Once these secretive files were identified — through an avenue carved by the antivirus — the Russian government was then able to obtain this information. Kaspersky has denied any wrongdoing, but the allegation that the firm was working covertly with the Russian government was enough to ensure Kaspersky products were banned on federal networks. There was a number of theories relating to what actually took place — was Kaspersky deliberately targeting NSA employees on behalf of the Kremlin, did an external threat actor exploit a zero-day vulnerability in Kaspersky’s antivirus, or were the files detected and pulled by accident? According to Kaspersky, the latter is true. On Wednesday, the Moscow-based firm said in a statement that the results of a preliminary investigation have produced a rough timeline of how the incident took place. It was actually a year earlier than the WSJ believed, in 2014, that code belonging to the NSA’s Equation Group was taken. Read more of this story at Slashdot.

Read the original post:
Kaspersky Admits To Reaping Hacking Tools From NSA Employee PC

Russians Used Malware On Android Devices To Track and Target Ukraine Artillery, Says Report

schwit1 quotes a report from Reuters: A hacking group linked to the Russian government and high-profile cyber attacks against Democrats during the U.S. presidential election likely used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016, according to a new report released Thursday. The malware was able to retrieve communications and some locational data from infected devices, intelligence that would have likely been used to strike against the artillery in support of pro-Russian separatists fighting in eastern Ukraine, the report from cyber security firm CrowdStrike found. The hacking group, known commonly as Fancy Bear or APT 28, is believed by U.S. intelligence officials to work primarily on behalf of the GRU, Russia’s military intelligence agency. The implant leveraged a legitimate Android application developed by a Ukrainian artillery officer to process targeting data more quickly, CrowdStrike said. Its deployment “extends Russian cyber capabilities to the front lines of the battlefield, ” the report said, and “could have facilitated anticipatory awareness of Ukrainian artillery force troop movement, thus providing Russian forces with useful strategic planning information.” Read more of this story at Slashdot.

Continue Reading:
Russians Used Malware On Android Devices To Track and Target Ukraine Artillery, Says Report

Dailymotion Hack Exposes Millions of Accounts

Millions of accounts associated with video sharing site Dailymotion, one of the biggest video platforms in the world, have been stolen. From a ZDNet report: A hacker extracted 85.2 million unique email addresses and usernames from the company’s systems, but about one-in-five accounts — roughly 18.3 million– had associated passwords, which were scrambled with the bcrypt hashing function, making the passwords difficult to crack. The hack is believed to have been carried out on October 20 by a hacker, whose identity isn’t known, according to LeakedSource, a breach notification service, which obtained the data. Dailymotion launched in 2005, and is currently the 113rd most visited website in the world, according to Alexa rankings. Read more of this story at Slashdot.

Read More:
Dailymotion Hack Exposes Millions of Accounts

Researchers Create An Undetectable Rootkit That Targets Industrial Equipment

An anonymous reader quotes Bleeping Computer: “Two researchers presenting at the Black Hat Europe security conference in London revealed a method of infecting industrial equipment with an undetectable rootkit component that can wreak havoc and disrupt the normal operations of critical infrastructure all over the world. The attack targets PLCs (Programmable Logic Controllers), devices that sit between normal computers that run industrial monitoring software and the actual industrial equipment, such as motors, valves, sensors, breakers, alarms, and others.” Researchers say they packed their attack as a loadable kernel module [PDF], which makes it both undetectable and reboot persistent. The attack goes after PLC pin configurations, meaning the PLC won’t be able to tell which are the actual input and output pins, allowing the attacker full-control to make up bogus sensor data, send fake commands, or block legitimate ones. The researchers acknowledge that the attack is extremely complicated, but the article argues it would still be of interest to a state-sponsored actor. Read more of this story at Slashdot.

Read the original post:
Researchers Create An Undetectable Rootkit That Targets Industrial Equipment

Samsung’s Nightmare Continues as It Recalls 2.8 Million Washing Machines

2016 has not been a great year for Samsung, and it doesn’t look like it will be getting better anytime soon. The company just recalled 2.8 million of its top load washing machines, because the machines can basically fall apart during use. Read more…

Taken from:
Samsung’s Nightmare Continues as It Recalls 2.8 Million Washing Machines

Unearthed Clinton emails garner renewed FBI scrutiny (updated)

Although the FBI previously concluded that Hillary Clinton should not face charges over the usage of her personal email server, the Bureau apparently isn’t done looking into Clinton’s emails after all. “In previous congressional testimony, I referred to the fact that the Federal Bureau of Investigation (FBI) had completed its investigation of former Secretary Clinton’s personal email server, ” FBI Director James Comey said in a letter sent out Friday . “Due to recent developments, I am writing to supplement my previous testimony.” “In connection with an unrelated case, ” Comey’s letter continues, “the FBI has learned of the existence of emails that appear to be pertinent to the investigation. I am writing to inform you that the investigative team briefed me on this yesterday, and I agreed that the FBI should take appropriate investigative steps designed to allow investigators to review these emails to determine whether they contain classified information, as well as to assess their importance to our investigation.” Comey concluded: “Although the FBI cannot yet assess whether or not this material may be significant, ” and I cannot predict how long it will take us to complete this additional work, I believe it is important to update your Committees about our efforts in light of my previous testimony.” Engadget will, of course, update as we know more. Update: The Associated Press has tweeted a clarification from an unnamed US official, stating that the newly discovered emails did not come from Clinton’s private email server. BREAKING: US official: Newly discovered emails related to Clinton investigation did not come from her private server. — AP Politics (@AP_Politics) October 28, 2016 Update: The New York Times is reporting that the new emails were discovered after the FBI seized electronic devices belonging to Clinton aide Huma Abedin and her husband Anthony Weiner. Update: John Podesta, the chairman of the Clinton campaign, has responded to Comey’s letter and has called on the FBI director to “immediately provide the American people more information than what is contained in his letter”. “The director owes it to the American people to immediately provide the full details of what he is now examining, ” Podesta continued. “We are confident this will not produce any conclusions different from the one the FBI reached in July.” Via: New York Times , CNBC

Excerpt from:
Unearthed Clinton emails garner renewed FBI scrutiny (updated)

Russia Reveals ‘Satan 2’ Nuclear Missile Capable of Destroying Texas in One Blow

Russia is flexing its military muscle as tensions with the US simmer in the wake of a heated third presidential debate, where Democratic candidate Hillary Clinton called Republican candidate Donald Trump a “ puppet ” for Russian President Vladimir Putin. Now, Russia has declassified the first image of its new thermonuclear intercontinental ballistic missile. Read more…

View original post here:
Russia Reveals ‘Satan 2’ Nuclear Missile Capable of Destroying Texas in One Blow

Who Should We Blame For Friday’s DDOS Attack?

“Wondering which IoT device types are part of the Mirai botnet causing trouble today? Brian Krebs has the list, tweeted Trend Micro’s Eric Skinner Friday, sharing an early October link which identifies Panasonic, Samsung and Xerox printers, and lesser known makers of routers and cameras. An anonymous reader quotes Fortune: Part of the responsibility should also lie with lawmakers and regulators, who have failed to create a safety system to account for the Internet-of-Things era we are now living in. Finally, it’s time for consumers to acknowledge they have a role in the attack too. By failing to secure the internet-connected devices, they are endangering not just themselves but the rest of the Internet as well. If you’re worried, Motherboard is pointing people to an online scanning tool from BullGuard (a U.K. anti-virus firm) which checks whether devices on your home network are listed in the Shodan search engine for unsecured IoT devices. But earlier this month, Brian Krebs pointed out the situation is exacerbated by the failure of many ISPs to implement the BCP38 security standard to filter spoofed traffic, “allowing systems on their networks to be leveraged in large-scale DDoS attacks…” Read more of this story at Slashdot.

Originally posted here:
Who Should We Blame For Friday’s DDOS Attack?

American ‘Vigilante Hacker’ Defaces Russian Ministry’s Website

An anonymous Slashdot reader quotes CNN Money: An American vigilante hacker — who calls himself “The Jester” — has defaced the website of the Russian Ministry of Foreign Affairs in retaliation for attacks on American targets… “Comrades! We interrupt regular scheduled Russian Foreign Affairs Website programming to bring you the following important message, ” he wrote. “Knock it off. You may be able to push around nations around you, but this is America. Nobody is impressed.” In early 2015, CNN Money profiled The Jester as “the vigilante who hacks jihadists, ” noting he’s a former U.S. soldier who now “single-handedly taken down dozens of websites that, he deems, support jihadist propaganda and recruitment efforts. He stopped counting at 179.” That article argues that “the fact that he hasn’t yet been hunted down and arrested says a lot about federal prosecutors and the FBI. Several cybersecurity experts see it as tacit approval.” “In an exclusive interview with CNNMoney this weekend, Jester said he chose to attack Russia out of frustration for the massive DNS cyberattack that knocked out a portion of the internet in the United States on Friday… ‘I’m not gonna sit around watching these f—-rs laughing at us.'” Read more of this story at Slashdot.

Read more here:
American ‘Vigilante Hacker’ Defaces Russian Ministry’s Website

VeraCrypt Security Audit Reveals Many Flaws, Some Already Patched

Orome1 quotes Help Net Security: VeraCrypt, the free, open source disk encryption software based on TrueCrypt, has been audited by experts from cybersecurity company Quarkslab. The researchers found 8 critical, 3 medium, and 15 low-severity vulnerabilities, and some of them have already been addressed in version 1.19 of the software, which was released on the same day as the audit report [which has mitigations for the still-unpatched vulnerabilities]. Anyone want to share their experiences with VeraCrypt? Two Quarkslab engineers spent more than a month on the audit, which was funded (and requested) by the non-profit Open Source Technology Improvement Fund “to evaluate the security of the features brought by VeraCrypt since the publication of the audit results on TrueCrypt 7.1a conducted by the Open Crypto Audit Project.” Their report concludes that VeraCrypt’s security “is improving which is a good thing for people who want to use a disk encryption software, ” adding that its main developer “was very positive along the audit, answering all questions, raising issues, discussing findings constructively…” Read more of this story at Slashdot.

Originally posted here:
VeraCrypt Security Audit Reveals Many Flaws, Some Already Patched