An anonymous reader quotes a report from Bleeping Computer: Dutch security researcher Victor Gevers has discovered 2, 893 Bitcoin miners left exposed on the internet with no passwords on their Telnet port. Gevers told Bleeping Computer in a private conversation that all miners process Bitcoin transactions in the same mining pool and appear to belong to the same organization. “The owner of these devices is most likely a state sponsored/controlled organization part of the Chinese government, ” Gevers says, basing his claims on information found on the exposed miners and IP addresses assigned to each device. “At the speed they were taken offline, it means there must be serious money involved, ” Gevers added. “A few miners is not a big deal, but 2, 893 [miners] working in a pool can generate a pretty sum.” According to a Twitter user, the entire network of 2, 893 miners Gevers discovered could generate an income of just over $1 million per day, if mining Litecoin. Read more of this story at Slashdot.
View original post here:
Nearly 3,000 Bitcoin Miners Exposed Online Via Telnet Ports, Without Passwords
According to iClarified, a hacker by name of “xerub” has posted the decryption key for Apple’s Secure Enclave Processor (SEP) firmware. “The security coprocessor was introduced alongside the iPhone 5s and Touch ID, ” reports iClarified. “It performs secure services for the rest of the SOC and prevents the main processor from getting direct access to sensitive data. It runs its own operating system (SEPOS) which includes a kernel, drivers, services, and applications.” From the report: The Secure Enclave is responsible for processing fingerprint data from the Touch ID sensor, determining if there is a match against registered fingerprints, and then enabling access or purchases on behalf of the user. Communication between the processor and the Touch ID sensor takes place over a serial peripheral interface bus. The processor forwards the data to the Secure Enclave but can’t read it. It’s encrypted and authenticated with a session key that is negotiated using the device’s shared key that is provisioned for the Touch ID sensor and the Secure Enclave. The session key exchange uses AES key wrapping with both sides providing a random key that establishes the session key and uses AES-CCM transport encryption. Today, xerub announced the decryption key “is fully grown.” You can use img4lib to decrypt the firmware and xerub’s SEP firmware split tool to process. Decryption of the SEP Firmware will make it easier for hackers and security researchers to comb through the SEP for vulnerabilities. Read more of this story at Slashdot.
In a piece describing the paranoid vibe in Las Vegas during the DEFCON convention, CNET reported Friday that the Wet Republic web site “had two images vandalized” with digital graffiti. But their reporter now writes that “my paranoia finally got the best of me, and it turned out to be an ad campaign.” The images included a scribbled beard and eye patch on a photo of bikini model, along with the handwritten message “It’s all out war.” CNET’s updated story now reports that “It looked like a prank you’d see from a mischievous hacker…” When I spotted the vandalism on the Wet Republic site Friday morning, it looked like other attacks I’d seen throughout the week, such as a Blue Screen of Death on a bus ticket machine… Hakkasan, which hosts the event at MGM Grand, said the “vandalism” was part of the cheeky advertisements for a seasonal bikini contest it’s been running since 2015. The “all-out war” is between the models in the competition, not between hackers and clubs. Hakkasan’s spokeswoman said nothing on its network has been compromised. So maybe not everything online in Las Vegas is getting hacked this week, and this n00b learned to calm down the hard way. For that matter, maybe that blue screen of death was also just another random Windows machine crashing. CNET’s reporter made one other change to his article. He removed the phrase “when hackers are in town for Defcon, everything seems to be fair game.” Read more of this story at Slashdot.