65% of Washington DC’s Outdoor Surveillance Cameras Infiltrated by Romanian Hackers

An anonymous reader quotes The Hill: Two Romanian hackers stand accused of hacking more than 100 outdoor police security cameras in the D.C. area during the days leading up to President Trump’s inauguration, according to a court document obtained by CNN. According to an affidavit from Secret Service agent James Graham, Mihai Alexandru Isvanca and Eveline Cismaru are accused of hacking and disabling 123 out of 187 of the city’s cameras between Jan. 12 and Jan. 15… Isvanca and Cismaru are also accused in the affidavit of spreading ransomware. In a possibly-related story, the Washington Post reports: Five Romanian hackers were arrested over the past week as part of an international investigation into computer ransomware, officials in the United States and Europe said Wednesday. In six houses across Romania, law enforcement operatives from Romania, Britain, the United States and the Netherlands seized hard drives, laptops, external storage devices and documents related to malicious software called CTB-Locker or Critroini. Read more of this story at Slashdot.

Read More:
65% of Washington DC’s Outdoor Surveillance Cameras Infiltrated by Romanian Hackers

With a Single Wiretap Order, US Authorities Listened In on 3.3 Million Phone Calls

US authorities intercepted and recorded millions of phone calls last year under a single wiretap order, authorized as part of a narcotics investigation, ZDNet’s Zack Whittaker reports. From the article: The wiretap order authorized an unknown government agency to carry out real-time intercepts of 3.29 million cell phone conversations over a two-month period at some point during 2016, after the order was applied for in late 2015. The order was signed to help authorities track 26 individuals suspected of involvement with illegal drug and narcotic-related activities in Pennsylvania. The wiretap cost the authorities $335, 000 to conduct and led to a dozen arrests. But the authorities noted that the surveillance effort led to no incriminating intercepts, and none of the handful of those arrested have been brought to trial or convicted. Read more of this story at Slashdot.

Excerpt from:
With a Single Wiretap Order, US Authorities Listened In on 3.3 Million Phone Calls

Wind, Solar Surpassed 10 Percent of US Electricity In March, Says EIA

According to the Energy Department’s Energy Information Administration, wind and solar produced 10 percent of the electricity generated in the U.S. for the first time in March. The Hill reports: The Energy Information Administration’s (EIA) monthly power report for March found that wind produced 8 percent of the electricity produced in the U.S. that month, with solar producing 2 percent. The two sources combined to have their best month ever in terms of percentage of overall electricity production, EIA said. The agency expects the two sources topped 10 percent again in April but forecasts that their generation will fall below that mark during the summer months. Due to the way geographic wind patterns affect the generation of electricity, the two sources typically combine for their best months in the spring and fall. Annually, wind and solar made up 7 percent of electric generation in 2016, EIA said. Read more of this story at Slashdot.

View article:
Wind, Solar Surpassed 10 Percent of US Electricity In March, Says EIA

Malware Uses Obscure Intel CPU Feature To Steal Data and Avoid Firewalls

An anonymous reader writes: Microsoft’s security team has come across a malware family that uses Intel’s Active Management Technology (AMT) Serial-over-LAN (SOL) interface as a file transfer tool. The problem with Intel AMT SOL is that it’s part of Intel’s ME, a separate chip inside Intel CPUs that runs its own OS and stays on even when the main CPU is off. Inside Intel’s ME, AMT SOL opens a virtual network interface which works even when the PC is turned off. Furthermore, because this virtual network interface runs inside ME, firewalls and security products installed on the main OS won’t detected malware using AMT SOL to exfiltrate data. The malware was created and used by a nation-state cyber-espionage unit codenamed PLATINUM, active since 2009, and which has targeted countries around the South China Sea. PLATINUM is by far one of the most sophisticated hacking groups ever discovered. Last year [PDF], the OS maker said the group was installing malware by abusing hotpatching — a mechanism that allows Microsoft to issue updates that tap into active processes and upgrade applications or the operating system without having to reboot the computer. Details about PLATINUM’s recent targets and attacks are available in a report [PDF] Microsoft released yesterday. Read more of this story at Slashdot.

View the original here:
Malware Uses Obscure Intel CPU Feature To Steal Data and Avoid Firewalls

Keylogger Found in Audio Driver of HP Laptops, Says Report

An anonymous reader writes: The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user’s keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look. Swiss cyber-security firm modzero discovered the keylogger on April 28 and made its findings public today. According to researchers, the keylogger feature was discovered in the Conexant HD Audio Driver Package version 1.0.0.46 and earlier. This is an audio driver that is preinstalled on HP laptops. One of the files of this audio driver is MicTray64.exe (C:windowssystem32mictray64.exe). This file is registered to start via a Scheduled Task every time the user logs into his computer. According to modzero researchers, the file “monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys.” Read more of this story at Slashdot.

More:
Keylogger Found in Audio Driver of HP Laptops, Says Report

Keylogger Found in Audio Driver of HP Laptops, Says Report

An anonymous reader writes: The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user’s keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look. Swiss cyber-security firm modzero discovered the keylogger on April 28 and made its findings public today. According to researchers, the keylogger feature was discovered in the Conexant HD Audio Driver Package version 1.0.0.46 and earlier. This is an audio driver that is preinstalled on HP laptops. One of the files of this audio driver is MicTray64.exe (C:windowssystem32mictray64.exe). This file is registered to start via a Scheduled Task every time the user logs into his computer. According to modzero researchers, the file “monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys.” Read more of this story at Slashdot.

Continued here:
Keylogger Found in Audio Driver of HP Laptops, Says Report

Keylogger Found in Audio Driver of HP Laptops, Says Report

An anonymous reader writes: The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user’s keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look. Swiss cyber-security firm modzero discovered the keylogger on April 28 and made its findings public today. According to researchers, the keylogger feature was discovered in the Conexant HD Audio Driver Package version 1.0.0.46 and earlier. This is an audio driver that is preinstalled on HP laptops. One of the files of this audio driver is MicTray64.exe (C:windowssystem32mictray64.exe). This file is registered to start via a Scheduled Task every time the user logs into his computer. According to modzero researchers, the file “monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys.” Read more of this story at Slashdot.

Link:
Keylogger Found in Audio Driver of HP Laptops, Says Report

Keylogger Found in Audio Driver of HP Laptops, Says Report

An anonymous reader writes: The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user’s keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look. Swiss cyber-security firm modzero discovered the keylogger on April 28 and made its findings public today. According to researchers, the keylogger feature was discovered in the Conexant HD Audio Driver Package version 1.0.0.46 and earlier. This is an audio driver that is preinstalled on HP laptops. One of the files of this audio driver is MicTray64.exe (C:windowssystem32mictray64.exe). This file is registered to start via a Scheduled Task every time the user logs into his computer. According to modzero researchers, the file “monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys.” Read more of this story at Slashdot.

Read the original:
Keylogger Found in Audio Driver of HP Laptops, Says Report

Keylogger Found in Audio Driver of HP Laptops, Says Report

An anonymous reader writes: The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user’s keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look. Swiss cyber-security firm modzero discovered the keylogger on April 28 and made its findings public today. According to researchers, the keylogger feature was discovered in the Conexant HD Audio Driver Package version 1.0.0.46 and earlier. This is an audio driver that is preinstalled on HP laptops. One of the files of this audio driver is MicTray64.exe (C:windowssystem32mictray64.exe). This file is registered to start via a Scheduled Task every time the user logs into his computer. According to modzero researchers, the file “monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys.” Read more of this story at Slashdot.

Read More:
Keylogger Found in Audio Driver of HP Laptops, Says Report

Keylogger Found in Audio Driver of HP Laptops, Says Report

An anonymous reader writes: The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user’s keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look. Swiss cyber-security firm modzero discovered the keylogger on April 28 and made its findings public today. According to researchers, the keylogger feature was discovered in the Conexant HD Audio Driver Package version 1.0.0.46 and earlier. This is an audio driver that is preinstalled on HP laptops. One of the files of this audio driver is MicTray64.exe (C:windowssystem32mictray64.exe). This file is registered to start via a Scheduled Task every time the user logs into his computer. According to modzero researchers, the file “monitors all keystrokes made by the user to capture and react to functions such as microphone mute/unmute keys/hotkeys.” Read more of this story at Slashdot.

More:
Keylogger Found in Audio Driver of HP Laptops, Says Report