$500 Million Worth of Cryptocurrency Stolen From Japanese Exchange

Locke2005 shares a report from CNBC: Hackers stole several hundred million dollars’ worth of a lesser-known cryptocurrency from a major Japanese exchange Friday. Coincheck said that around 523 million of the exchange’s NEM coins were sent to another account around 3 a.m. local time (1 p.m. ET Thursday), according to a Google translate of a Japanese transcript of the Friday press conference from Logmi. The exchange has about 6 percent of yen-bitcoin trading, ranking fourth by market share on CryptoCompare. The stolen NEM coins were worth about 58 billion yen at the time of detection, or roughly $534.8 million, according to the exchange. Coincheck subsequently restricted withdrawals of all currencies, including yen, and trading of cryptocurrencies other than bitcoin. Locke2005 adds, “That, my friends, is the prime reason why speculating in cryptocurrency is a bad idea!” Read more of this story at Slashdot.

More:
$500 Million Worth of Cryptocurrency Stolen From Japanese Exchange

"SANS Poster – White Board of Awesome Command Line Kung Fu (PDF Download)"

  by: SANS Pen Test Team Imagine you are sitting at your desk and come across a great command line tip that will assist you in your careeras an information security professional, so you jot the tip down on a note, post-it, or scrap sheet of paper and tape it to your white board… now … Continue reading SANS Poster – White Board of Awesome Command Line Kung Fu (PDF Download)

Excerpt from:
"SANS Poster – White Board of Awesome Command Line Kung Fu (PDF Download)"

2017’s biggest cybersecurity facepalms

2017 was a year like no other for cybersecurity. It was the year we found out the horrid truths at Uber and Equifax, and border security took our passwords . A year of WannaCry and Kaspersky , VPNs and blockchains going mainstream, healthcare hacking , Russian hackers , WikiLeaks playing for Putin’s team , and hacking back . In 2017 we learned that cybersecurity is a Lovecraftian game in which you trade sanity for information. Let’s review the year that was (and hopefully will never be again). Moscow mules This was the year Kaspersky finally got all the big press they’ve been angling for. Unfortunately for them, it wasn’t for their research. The antivirus company spent an uncomfortable year in the headlines being accused of working with Russia’s FSB (former KGB) . Eventually those suspicions got it banned from use by US government agencies. Kaspersky’s alleged coziness with Putin’s inner circle has made the rounds in the press and infosec gossip for years. But it came to a head when an NSA probe surfaced, the Senate pushed for a ban, and — oddly — the Trump administration came with the executioner’s axe. Obviously, Kaspersky — the company, and its CEO of the same name — denied the accusations, and offered to work with the US government. They offered up their code for review and filed suit when the ban passed. At this point, the only thing that might save Kaspersky’s reputation in the US is finding us that pee tape. Fingers crossed. Be still my backdoored heart A ransomware attack on Hollywood Presbyterian Hospital in 2016 put health care hacking center stage, but in 2017 it turned into a true nightmare. The WannaCry ransomware attack spread like wildfire, locking up a third of the National Health Service (NHS) in England. That was followed by other worms, like Petya/NotPetya, which hit US hospitals in June. The security of pacemakers was exposed as being awful, specifically in the case of medical device manufacturer St. Jude Medical (now rebranded as Abbott). A lot of people hated on researcher Justine Bone and MedSec for the way they went about exposing pacemaker flaws, but they were right . The FDA put a painful pin in it when it notified the public of a voluntary recall (as a firmware update) of 465, 000 pacemakers made by St. Jude Medical. Meanwhile, white hat hackers put together the first Cyber Med Summit — a doctor-run, hacker boot camp for medical professionals. That the Summit exists is a tiny bit of good news in our medical mess, but it also proved that you should probably make sure your doctor keeps a hacker on staff. Medical staff at the Summit got a wake-up call about medical devices exploits, and concluded they need to add “hacking” to their list of possible problems to assess and diagnose. I’m not crying, you’re crying On May 12, over 150 countries were hit in one weekend by a huge ransomware crimewave named WannaCry . The attack was derived from a remote code execution vulnerability (in Windows XP up through Windows Server 2012) called “EternalBlue, ” found in the April Shadow Brokers/NSA dump. Those who did their Windows updates were not affected. WannaCry demanded $300 in Bitcoin from each victim and among those included were the UK’s National Health Service (NHS). The ransomworm was stopped in its tracks by the registration of a single domain that behaved like a killswitch. The creators apparently neglected to secure their own self destruct button. Researcher MalwareTech was the hero of the day with his quick thinking, but was sadly repaid by having his identity outed by British tabloids. Adding injury to insult, he was later arrested on unrelated charges as he attempted to fly home after the DEF CON hacking conference in August. Two weeks after the attack, Symantec published a report saying the ransomware showed strong links to the Lazarus group (North Korea). Others independently came to the same conclusion. Eight months later, and just in time for his boss’ warmongering on North Korea, Trump team member Thomas P. Bossert wrote in the Wall Street Journal that “the U.S. today publicly attributes the massive “WannaCry” cyberattack to North Korea.” Maybe he’s just a backdoor man US Deputy Attorney General Rod Rosenstein in October introduced the world to the new and totally made-up concept of ” responsible encryption ” — and was promptly laughed out of the collective infosec room. “Responsible encryption is effective secure encryption, coupled with access capabilities, ” he said . He suggested that the feds won’t mandate encryption backdoors “so long as companies can cough up an unencrypted copy of every message, call, photo or other form of communications they handle.” Even non-infosec people thought his new PR buzzwords were suspect. “Look, it’s real simple. Encryption is good for our national security; it’s good for our economy. We should be strengthening encryption, not weakening it. And it’s technically impossible to have strong encryption with any kind of backdoor, ” said Rep. Will Hurd (R-Texas) at The Atlantic’s Cyber Frontier event in Washington, D.C. Politico wrote : It’s a cause Rosenstein has quietly pursued for years, including two cases in 2014 and 2015 when, as the US attorney in Maryland, he sought to take companies to court to make them unscramble their data, a DOJ official told POLITICO. But higher-ups in President Barack Obama’s Justice Department decided against it, said the official, who isn’t authorized to speak to the news media about the cases. To everyone’s dismay, Rosenstein doubled down on his “responsible encryption” campaign when he capitalized on a mass shooting (using as his example the phone of Devin Patrick Kelley who opened fire on a congregation in Texas, killing 26 people). He said , “Nobody has a legitimate privacy interest in that phone … But the company that built it claims that it purposely designed the operating system so that the company cannot open the phone even with an order from a federal judge.” Like Uber, but for Equifax If there was some kind of reverse beauty pageant for worst look, worst behavior, and best example of what not to do with security, we’d need a tiebreaker for 2017. Equifax and Uber dominated the year with their awfulness. Equifax was forced to admit it was hacked badly in both March and July, with the latter affecting around 200 million people (plus 400, 000 in the UK). Motherboard reported that “six months after the researcher first notified the company about the vulnerability, Equifax patched it — but only after the massive breach that made headlines had already taken place… This revelation opens the possibility that more than one group of hackers broke into the company.” Shares of Equifax plummeted 35% after the July disclosure. And news that some of its execs sold off stock before the breach was made public triggered a criminal probe. Which brings us to the “unicorn” that fell from grace . In late November Uber admitted it was hacked in October 2016, putting 57 million users and over half a million drivers at risk. Uber didn’t report the breach to anyone — victims or regulators — then paid $100K to the hackers to keep it quiet, and hid the payment as a bug bounty. All of which led to the high-profile firing and departures of key security team members. Just a couple weeks later, in mid-December, the now-notorious ‘Jacobs letter’ was unsealed, accusing Uber of spying and hacking . “It was written by the attorney of a former employee, Richard Jacobs, and it contains claims that the company routinely tried to hack its competitors to gain an edge, ” Engadget wrote , and “used a team of spies to steal secrets or surveil political figures and even bugged meetings between transport regulators — with some of this information delivered directly to former CEO Travis Kalanick.” The letter was so explosive it’s now the trial between Uber and Waymo — so we can be sure we haven’t seen the last of Uber’s security disasters in the news. Images: Getty Images/iStockphoto (Wannacry); D. Thomas Magee (All illustrations)

Continue Reading:
2017’s biggest cybersecurity facepalms

Cryptocurrency mining marketplace loses $64 million to hackers

A cryptocurrency marketplace called NiceHash has suffered a security breach that left its bitcoin wallet tens of millions of dollars lighter. Slovenia-based NiceHash connects miners, or people selling their hashing/computer power, with people willing to pay for that power. Andrej P. Škraba, the marketplace’s head of marketing, told Reuters that the company was targeted by “a highly professional attack” that involved “sophisticated social engineering.” He also revealed that the infiltrators got away with 4, 700 bitcoins — or around $64 million. Before Škraba talked to Reuters , NiceHash posted an announcement on Reddit and on its website that it’s pausing all operations for the next 24 hour to investigate the incident. The post said the company’s payment system was compromised, and that it’s working with authorities on top of conducting its own investigation. Unfortunately, Škraba didn’t reveal more details than that, but it’s advising users to change their passwords on NiceHash and other services — a great advice now that bitcoin looks more alluring to hackers than ever. It has soared past $15, 000 in value, just hours after it broke past the $14, 000 mark. Authorities in some countries are cracking down on cryptocurrency, however, in hopes of gaining greater control over the virtual currency. Source: Reuters , Reddit

View the original here:
Cryptocurrency mining marketplace loses $64 million to hackers

Lightning Can Trigger Nuclear Reactions, Creating Rare Atomic Isotopes

sciencehabit shares a report from Science Magazine: Rare forms of atoms, like carbon-13, carbon-14, and nitrogen-15, have long been used to figure out the ages of ancient artifacts and probe the nuances of prehistoric food chains. The source of these rare isotopes? Complicated cascades of subatomic reactions in the atmosphere triggered by high-energy cosmic rays from outer space. Now, a team of scientists is adding one more isotope initiator to its list: lightning. Strong bolts of lightning can unleash the same flurry of nuclear reactions as cosmic rays, the researchers report in Nature. But, they add, the isotopes created by these storms likely constitute a small portion of all such atoms — so the new findings are unlikely to change the way other scientists use them for dating and geotracing. Read more of this story at Slashdot.

Visit site:
Lightning Can Trigger Nuclear Reactions, Creating Rare Atomic Isotopes

Amazon Is Making a ‘Lord of the Rings’ Prequel Series

Amazon is making a Lord of the Rings prequel TV series for its Amazon Instant streaming service. The show, which already carries a multi-season commitment, will “explore new storylines preceding J.R.R. Tolkien’s The Fellowship of the Ring.” TechCrunch reports: It’s possible the new series will mine the ponderous but rich Silmarillion for material, as fan fiction writers and lore aficionados have done for decades. The exploits of the Elf-Lords of old would make for a stirring epic, while many would thrill at the possibility of seeing Moria at the height of its grandeur. So much depends on the quality of the adaptation, though. Amazon has been pretty good about its Originals, but this will be an undertaking far beyond the scope of anything its studios and partners have yet attempted. Amazon is partnering with New Line Cinema, which of course was the film company behind the much-loved trilogy that began in 2001, and the Tolkien Estate, as well as HarperCollins for some reason. The deal also “includes a potential additional spin-off series, ” presumably if it’s popular enough. Read more of this story at Slashdot.

Read the original post:
Amazon Is Making a ‘Lord of the Rings’ Prequel Series

Massive 70-Mile-Wide Butterfly Swarm Shows Up On Denver Radar System

dryriver shares a report from BBC: A colorful, shimmering spectacle detected by weather radar over the U.S. state of Colorado has been identified as swarms of migrating butterflies. Scientists at the National Weather Service (NWS) first mistook the orange radar blob for birds and had asked the public to help identifying the species. They later established that the 70-mile wide (110km) mass was a kaleidoscope of Painted Lady butterflies. Forecasters say it is uncommon for flying insects to be detected by radar. “We hadn’t seen a signature like that in a while, ” said NWS meteorologist Paul Schlatter, who first spotted the radar blip. “We detect migrating birds all the time, but they were flying north to south, ” he told CBS News, explaining that this direction of travel would be unusual for migratory birds for the time of year. So he put the question to Twitter, asking for help determining the bird species. Almost every response he received was the same: “Butterflies.” Namely the three-inch long Painted Lady butterfly, which has descended in clouds on the Denver area in recent weeks. The species, commonly mistaken for monarch butterflies, are found across the continental United States, and travel to northern Mexico and the U.S. southwest during colder months. They are known to follow wind patterns, and can glide hundreds of miles each day. Read more of this story at Slashdot.

Read more here:
Massive 70-Mile-Wide Butterfly Swarm Shows Up On Denver Radar System

Yahoo’s 2013 hack impacted all 3 billion accounts

Last year Yahoo (now part of Oath along with AOL after its acquisition by Verizon) announced that back in 2013, hackers had stolen info covering over one billion of its accounts . Today, the combined company announced that further investigation reveals the 2013 hack affected all of its accounts that existed at the time — about three billion. The information taken “may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers.” For users being notified of the hack now, the notification is that their information is included. At the time the breach was first announced, Yahoo required everyone who had not reset their passwords since the breach to do so. According to the FAQ posted, it doesn’t appear there’s any new action being taken. The announcement isn’t very specific about why or how it determined the breach was so much larger — or how it was missed in the original forensic analysis, or how this happened in the first place — likely due to pending lawsuits over the issue. Subsequent to Yahoo’s acquisition by Verizon, and during integration, the company recently obtained new intelligence and now believes, following an investigation with the assistance of outside forensic experts, that all Yahoo user accounts were affected by the August 2013 theft. While this is not a new security issue, Yahoo is sending email notifications to the additional affected user accounts. The investigation indicates that the user account information that was stolen did not include passwords in clear text, payment card data, or bank account information. The company is continuing to work closely with law enforcement. Source: Oath , Yahoo FAQ

See the original article here:
Yahoo’s 2013 hack impacted all 3 billion accounts

LibreOffice 5.4 Adds More New Features, Improves Office File Format Compatibility

The Document Foundation has released LibreOffice 5.4. Again, it’s on time, arriving six months after the release of LibreOffice 5.3. From a report: LibreOffice 5.4 is “the last major release of the LibreOffice 5.x family, ” and like other point releases is a major one, adding features across all components and incrementally improving compatibility with Microsoft Office document formats. Highlights include a new standard color palette based on the RYB (Red Yellow Blue) color model. File format compatibility improvements include better support for EMF vector images and higher quality rendering of imported PDF files (with support for embedding video in exported PDFs from Writer and Impress). Also added is OpenPGP key support for signing ODF documents in Linux. LibreOffice Writer adds new context menu items for working with sections, footnotes, endnotes and styles. Users can now import AutoText entries from Microsoft Word .dotm templates. The full structure of bulleted and numbered lists is now preserved when pasted as plain text, and users gain the ability to create custom watermarks for their documents via the Format menu. Read more of this story at Slashdot.

Continue reading here:
LibreOffice 5.4 Adds More New Features, Improves Office File Format Compatibility

NIST’s Draft To Remove Periodic Password Change Requirements Gets Vendors’ Approval

An anonymous reader writes: A recently released draft of the National Institute of Standards and Technology’s digital identity guidelines has met with approval by vendors. The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies. The new framework recommends, among other things: “Remove periodic password change requirements.” There have been multiple studies that have shown requiring frequent password changes to actually be counterproductive to good password security, said Mike Wilson, founder of PasswordPing. NIST said this guideline was suggested because passwords should be changed when a user wants to change it or if there is indication of breach. Read more of this story at Slashdot.

More:
NIST’s Draft To Remove Periodic Password Change Requirements Gets Vendors’ Approval