How hackers made life hell for a CIA boss and other top US officials

Enlarge (credit: Flickr user Erica Zabowski ) A North Carolina man has pleaded guilty to a conspiracy that illegally accessed the e-mail and social media accounts of Central Intelligence Director John Brennan and other senior government officials and then used that access to leak sensitive information and make personal threats. Justin Gray Liverman, 24, of Morehead City, North Carolina, pleaded guilty to conspiracy to violate the Computer Fraud and Abuse Act, commit identity theft, and make harassing, anonymous phone calls, federal prosecutors said Friday . Among the 10 people targeted in the conspiracy were Brennan; then-Deputy FBI Director Mark Giuliano; National Intelligence Director James R. Clapper; Greg Mecher, the husband of White House Communication Director Jen Psaki; and other government officials. The group called itself Crackas with Attitude, and it was led by a co-conspirator going by the name of Cracka. “She talks mad shit abt snowden,” Liverman said on December 10, 2015 in an online chat with Cracka, referring to a target who is believed to be Psaki, according to a statement of facts signed by Liverman and filed in US District Court for the Eastern District of Virginia. (The document refers to Mecher and Psaki as Victim 3 and the spouse of Victim 3 respectively.) “If you come across anything related to [Victim 3’s spouse] let me know. If you find her cell or home number omg gimme.” Liverman went on to say he wanted to “phonebomb the shitt [sic] outta” Psaki. Read 7 remaining paragraphs | Comments

Visit link:
How hackers made life hell for a CIA boss and other top US officials

Over 1,800 MongoDB Databases Held For Ransom By Mysterious Attacker

An anonymous reader writes: “An attacker going by the name of Harak1r1 is hijacking unprotected MongoDB databases, stealing and replacing their content, and asking for a 0.2 Bitcoin ($200) ransom to return the data, ” reports Bleeping Computer. According to John Matherly, Shodan founder, over 1, 800 MongoDB databases have had their content replaced with a table called WARNING that contains the ransom note. Spotted by security researcher Victor Gevers, these databases are MongoDB instances that feature no administrator password and are exposed to external connections from the internet. Database owners in China have been hit, while Bleeping Computer and MacKeeper have confirmed other infections, one which hit a prominent U.S. healthcare organization and blocked access to over 200, 000 user records. These attacks are somewhat similar to attacks on Redis servers in 2016, when an unknown attacker had hijacked and installed the Fairware ransomware on hundreds of Linux servers running Redis DB. The two series of attacks don’t appear to be related. Read more of this story at Slashdot.

More here:
Over 1,800 MongoDB Databases Held For Ransom By Mysterious Attacker

Millions of Websites Vulnerable Due To Security Bug In Popular PHP Script

An anonymous reader writes from a report via BleepingComputer: A security flaw discovered in a common PHP class allows knowledgeable attackers to execute code on a website that uses a vulnerable version of the script, which in turn can allow an attacker to take control over the underlying server. The vulnerable library is PHPMailer, a PHP script that allows developers to automate the task of sending emails using PHP code, also included with WordPress, Drupal, Joomla, and more. The vulnerability was fixed on Christmas with the release of PHPMailer version 5.2.18. Nevertheless, despite the presence of a patched version, it will take some time for the security update to propagate. Judging by past incidents, millions of sites will never be updated, leaving a large chunk of the Internet open to attacks. Even though the security researcher who discovered the flaw didn’t publish any in-depth details about his findings, someone reverse-engineered the PHPMailer patch and published their own exploit code online, allowing others to automate attacks using this flaw, which is largely still unpatched due to the holiday season. Read more of this story at Slashdot.

See the article here:
Millions of Websites Vulnerable Due To Security Bug In Popular PHP Script

BitTorrent Live’s ‘Cable Killer’ P2P Video App Finally Hits iOS

An anonymous reader quotes a report from TechCrunch: BitTorrent has now done for live video what it did for file downloads: invented peer-to-peer technology that moves the burden of data transfer from a centralized source to the crowd. Instead of cables and satellites, BitTorrent piggybacks on the internet bandwidth of its users. Since P2P live streaming is so much cheaper than traditional ways to deliver live content, BitTorrent could pay channel owners more for distribution per viewer. And BitTorrent can offer that content to viewers for free or much cheaper than a cable subscription. The transfer technology and the app that aggregates these channels are both called BitTorrent Live. Now, almost a year after the protocol’s debut on smart TVs, and six months after it was supposed to arrive on iPhone, the BitTorrent Live app quietly became available on iOS this week. Until now it’s only existed on Mac, Apple TV and Amazon Fire TV — much less popular platforms. And that’s after being in development since 2009. The app features 15 channels, including NASA TV, France One, QVC Home and TWiT (This Week In Tech) that you can watch live. The latency is roughly 10 seconds, which could be faster than terrestrial cable, as well as systems like Sling TV that can delay content more than a minute. The problem right now is that BitTorrent Live has a pretty lackluster channel selection. It’s still working on striking deals with more name-brand channels. It could offer some for pay-per-view, but cheaper than the same content on traditional TV due to the reduced broadcasting costs. Read more of this story at Slashdot.

Visit link:
BitTorrent Live’s ‘Cable Killer’ P2P Video App Finally Hits iOS

Bitcoin Circulation Hits Record High Of $14 Billion

Bitcoin, the digital currency that most people have never actually used, has hit a record value of $14 billion after jumping 5 percent on Thursday. From a report on The Guardian: The price of one bitcoin reached $875 on the Europe-based Bitstamp exchange, its strongest level since January 2014, putting the cryptocurrency on track for its best daily performance in six months. That compared with levels around $435 at the start of the year, with many experts linking bitcoin’s rise with the steady depreciation of the Chinese yuan, which has slid almost 7% in 2016. Data shows the majority of bitcoin trading is done in China, so any increase in demand from there tends to have a significant impact on the price. Read more of this story at Slashdot.

Originally posted here:
Bitcoin Circulation Hits Record High Of $14 Billion

Russians Used Malware On Android Devices To Track and Target Ukraine Artillery, Says Report

schwit1 quotes a report from Reuters: A hacking group linked to the Russian government and high-profile cyber attacks against Democrats during the U.S. presidential election likely used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016, according to a new report released Thursday. The malware was able to retrieve communications and some locational data from infected devices, intelligence that would have likely been used to strike against the artillery in support of pro-Russian separatists fighting in eastern Ukraine, the report from cyber security firm CrowdStrike found. The hacking group, known commonly as Fancy Bear or APT 28, is believed by U.S. intelligence officials to work primarily on behalf of the GRU, Russia’s military intelligence agency. The implant leveraged a legitimate Android application developed by a Ukrainian artillery officer to process targeting data more quickly, CrowdStrike said. Its deployment “extends Russian cyber capabilities to the front lines of the battlefield, ” the report said, and “could have facilitated anticipatory awareness of Ukrainian artillery force troop movement, thus providing Russian forces with useful strategic planning information.” Read more of this story at Slashdot.

Continue Reading:
Russians Used Malware On Android Devices To Track and Target Ukraine Artillery, Says Report

Barnes & Noble’s Latest Tablet Is Running Spyware From Shanghai

Long-time Slashdot reader emil writes about how ADUPS, an Android “firmware provisioning” company specializing in both big data collection of Android usage and hostile app installation and/or firmware control, has been found pre-loaded on Barnes and Noble’s new $50 tablet: ADUPS was recently responsible for data theft on BLU phones and an unsafe version of the ADUPS agent is pre-loaded on the Barnes and Noble BNTV450. ADUPS’ press releases claim that Version 5.5 of their agent is safe, but the BNTV450 is running 5.2. The agent is capable of extracting contacts, listing installed apps, and installing new apps with elevated privilege. Azzedine Benameur, director of research at Kryptowire, claims that “owners can expect zero privacy or control while using it.” Read more of this story at Slashdot.

More:
Barnes & Noble’s Latest Tablet Is Running Spyware From Shanghai

Nigerian Man Charged in Hacking of Los Angeles County Emails

A ‘mere’ 10.8% phishing success rate has forced Los Angeles County to notify approximately 756, 000 individuals that their personal information may have been compromised. The attack occurred on May 13, 2016 when 1, 000 County employees received phishing emails. 108 employees were successfully phished. A Nigerian national has been charged in connection with the hack. From a report on The Guardian: Many large organizations would welcome a 10% success rate in their internal anti-phishing training sessions, with 30% and above being common. The 2016 Verizon DBIR suggests that 30% of all phishing emails are opened. The high number of individuals affected from a relatively low number of successes in LA County demonstrates how dangerous phishing attacks can be. The nature of the potentially compromised information is also concerning. “That information may have included first and last names, dates of birth, Social Security numbers, driver’s license or state identification numbers, payment card information, bank account information, home addresses, phone numbers, and/or medical information, such as Medi-Cal or insurance carrier identification numbers, diagnosis, treatment history, or medical record numbers, ” said the County of Los Angeles Chief Executive Office in a statement. Read more of this story at Slashdot.

See more here:
Nigerian Man Charged in Hacking of Los Angeles County Emails

Yahoo’s Billion-User Database Reportedly Sold On the Dark Web for Just $300,000 – NYT

An anonymous reader writes: As if 2016 wasn’t shitty enough for Yahoo — which admitted to two separate breaches that saw 500 million users’ and then 1 billion users’ details stolen by hackers — the New York Times reports that a billion-user database was sold on the Dark Web last August for $300, 000. That’s according to Andrew Komarov, chief intelligence office at security firm InfoArmor. He told NYT that three buyers, including two prominent spammers and another who might be involved in espionage tactics purchased the entire database at the aforementioned price from a hacker group believed to based in Eastern Europe. It’s lovely to know that it only costs $300, 000 to be able to threaten a billion people’s online existence — which means each account is only worth $0.0003 to hackers who can ruin your life online in a matter of minutes. Yahoo also doesn’t yet know who made off with all the data from the attack in 2013, which is said to be the largest breach of any company ever. Read more of this story at Slashdot.

Read More:
Yahoo’s Billion-User Database Reportedly Sold On the Dark Web for Just $300,000 – NYT

A $300 Device Can Steal Mac FileVault2 Passwords

An anonymous reader writes: Swedish hardware hacker Ulf Frisk has created a device that can extract Mac FileVault2 (Apple’s disk encryption utility) passwords from a device’s memory before macOS boots and anti-DMA protections kick in. The extracted passwords are in cleartext, and they also double as the macOS logon passwords. The attack requires physical access, but it takes less than 30 seconds to carry out. A special device is needed, which runs custom software (available on GitHub), and uses hardware parts that cost around $300. Apple fixed the attack in macOS 10.12.2. The device is similar to what Samy Kamker created with Poison Tap. Read more of this story at Slashdot.

Continue Reading:
A $300 Device Can Steal Mac FileVault2 Passwords