Home Blog Page 2197

Botnet Compromises insecure RDP Servers at POS systems

11

Sunday 13 July, 2014

Written by: Anonymous Singer

A new botnet campaign, known as BrutPOS, aims to steal payment card information from the POS systems. They are capable to do it because of poorly secured Microsoft Remote Desktop Protocol (RDP) servers and simple passwords.

“Cyber criminals are infecting thousands of computers around the world with malware and are utilizing those compromised machines to break into Point-of-Sale (PoS) terminals usingbrute-force techniques, and the attackers have already compromised 60 PoS terminals bybrute-force attacks against poorly-secured connections to guess remote administration credentials,” researchers from FireEye said.

The Point-of-Sale (PoS) machine is used worldwide and it can be easily set-up. It has a better track inventory and accuracy of records. But, Point-of-Sale (PoS) systems are critical components in any retail environment and the users are not aware of the emerging threats it can cause in near future.

There are 51 out of 60 RDPs located in the United States, according to three researchers from FireEye, named Nart Villeneuve, Joshua Homan and Kyle Wilhoit.

It is really shameful that the most common username used by the breached servers was

“administrator” and the most common passwords were “pos” and “Password1”.”

Five BrutPOS command-and-control (CnC)two are active and both based in Russia, researchers at FireEye uncovered.

servers, three of which are now offline and were set up in late May and early June,

The campaign has been active since at least February this year. According to the latest count, cyber criminals are running 5,622 bots in 119 countries. The majority of them appeared to be located in Eastern Europe, most likely from Ukraine or Russia.

The infected system begins to make connections to port 3389; if the port is open it adds the IP to a list of servers to be brute forced with the supplied credentials,” FireEye researchers Nart Villeneuve, Josh Homan and Kyle Wilhoit wrote in a blog post. “If the infected system is able to successfully brute force an RDP server, it reports back with credentials.

So once the BrutPOS malware successfully guesses the remote access credentials of anRDP-enabled system, the attacker is able to install a malware program on the infected system and extract payment card information from the memory of applications running on it.

The malware also attempted to obtain debug permissions, plausibly to identify POS configurations, and if it succeeds in getting those permissions, it becomes an executable program. But once it fails, it copies itself to %WINDIR%\lsass.exe and installs itself as a service.

The FireEye researchers have built a honey pot to try to understand the attacker’s intentions. The honey pot had a fake POS software and some fake credit card details on the desktop, allowing hackers to compromise it. The researchers issued signals mimicking infection and watched as attackers stole the RDP login and attempted to open the box’s installed PoS software before formatting the drive to erase evidence trails.

At last, over the years we have seen many massive data breaches targeting POS machines such as TARGET data breach, which is the third-largest U.S. retailer and whereof over 40 million Credit & Debit cards were stolen.

Links: Surf anonymously, protect yourself from hackers and hide yourself from NSA

Google Drive leaks users personal data

23

Sunday July 13 2014 Author: FlU5CH A new privacy problem within Google drive has been found; it resulted in personal data being exposed to unauthorised parties. The security problem has now been fixed by Google, but it now shows us how easily our private data can be leaked out of cloud storage, the problem was allowing “anyone who had the link” to access our personal data with no further authentication. How it works: Basically the flaw was open to anybody who had a clickable URL on their cloud file sharing service. If you or anyone you shared permissions to this file clicked  on the URL then the owner of the third party website would be able to see a referrer URL, and if they accessed that URL then they would potentially be gaining access to your private and sensitive information. Google said: Google explained that only a “small subset of file types” in Google drive where affected by this flaw and it was fixed as soon as possible. The issue only affects you if all the following apply:

  • The file was uploaded to Google drive
  • The file was not converted (i.e. it remains as its original format e.g. .docx, pdf etc)
  • The owner enabled the sharing setting “anyone with the link”
  • The file contained URL’s (hyperlinks) to third party HTTPS website(‘s)

It would be smart to copy any previous files placed into the Google drive and delete the original copy to ensure that your personal data is once again safe.

 

Links: Surf anonymously, protect yourself from hackers and hide yourself from NSA

Skyscraper concepts from recycled waste

6

Saturday 12 July 2014

Author: Chaotic Indian

Green structures and buildings are a growing trend. Vertical residences like the Clearpoint Residencies apartment block in Sri Lanka and The Living’s Hy-Fi organic sculpture in New York are two examples. Now, Chartier-Corbasson from France has designed a concept for a skyscraper that would be built the recycle waste of it’s occupants.

The Organic London Skyscraper concept sought to show how the financial outlay required to build a skyscraper could be moderated. The idea proposes that the paper-and-plastic waste created by the existing residents/tenants of a building could be recycled and used to create panels for it’s continued construction. The building would grow using the waste of it’s residents and Chartier-Corbasson suggests that enough materials could be collected within a year to create the building’s facade.

To minimize costs and make cash flow more manageable, the proposal calls for waste materials to be collected and sorted within the building, which would then be re-fabricated on-siteinto construction panels. In addition, the quicker that vacant spaces within such a building are taken, the quicker the construction would be completed due to the increased amount of recyclable waste being produced. In this way, the building is actually “self-regenerating.”

Chartier-Corbasson proposes the use of a scaffolding structure inspired by the bamboo scaffolding used in Asia to enable the building’s construction. The scaffoldings are all the same size and would be provided in pre-fabricated sections to simplify assembly. Instead of removing the scaffoldings once the building is completed, it would become a part of the building.

chartier-corbasson-recycled-skyscraper-london

The designers say that it’s hollow tubes would reduce wind impact and would contain small wind turbines to generate electricity,in order to contribute to the building’s energy needs.

The pyramid-shaped building would allow for access to different levels by way of an elevator. Chartier-Corbasson says that there would be enough access via elevator to make way for a tower crane. The building’s design includes landings, lobbies and spaces for areas like gyms,conference rooms, restaurants, bars and even observation platforms.

Chinese hacked database of US federal employees

16

Friday 11 July 2014

Written by: Anonymous Singer

Chinese hackers have obtained access to a U.S. government agency that manages employee data. The hackers’ target would have been tens of thousands of applications for a top secret-clearance by federal employees.

The attackers would have obtained access to databases which are managed by the Office of Personnel Management. When the hackers were discovered, the access would have been blocked immediately, reports The New York Times.

In response to this matter, a senior Department of Homeland Security official confirmed that the attack had occurred but said that “at this time,” neither the personnel agency nor Homeland Security had “identified any loss of personally identifiable information.” The official said an emergency response team was assigned and handled over the matter “to assess and mitigate any risks identified.

The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a system called e-QIP, in which federal employees applying for security clearances enter their most personal information, including financial data. Federal employees who have had security clearances for some time are often required to update their personal information through the website,” states the New York Times.

It is still unclear how deep the hackers were invaded in the government systems, but the authorities have assembled a team to investigate the hack. Initial findings would have shown that the attackers were operating from China, but it is still unclear whether the hackers work for the Chinese government.

The attack comes at a time when China and the United States accuse each other of hacking and espionage. As a result of this, tensions between the two countries are increased. Recently, five members of the Chinese People’s Liberation Army have been indicted. According to the U.S. they were involved with stealing company secrets from several large companies. However, Edward Snowden argues that the U.S. also performs hacking attacks on China regularly. This would be done by the NSA.

Links:

Protect your Computer and Devices from hackers and stay anonymous

Google – Free Coding Classes for Women and Minorities

20

Friday, July 11, 2014

Author: Captain Planet

This year’s Google I/O came with the announcement that Google and Codeschool were coming together to open up the technology industry to women and minorities. Just 30% of Google’s workforce are female and a small 3% are African-American and Hispanic. Google wants to transform these figures and is openly aiming for change, saying, “We shouldn’t feel guilty about our biases, we should wake up and do something about them.”

Headlines declare that Google is offering ‘Free Coding Lessons to Women and Minorities’, that it is to ‘Pay for Women and Minorities to Build Code Skills’ and one headline even states that “Google will Pay ‘Thousands’ of Women In Tech To Take Coding Lessons’. Upon further investigation, though, it seems that the headlines are slightly misleading, and the facts behind Google’s latest initiative are somewhat confusing.

83180071

Google is not actually paying anybody to take coding lessons, but what it is offering is vouchers for a 3-month subscription to Codeschool, so that women and minorities can teach themselves via Codeschool’s resources. Codeschool is a for-profit online learning computer programming school which uses video lessons, coding challenges and screencasts to teach its students. It costs $29 per month to be a member of Codeschool; that fee gives unlimited access to all offered courses.

At first glance Google’s offer looks appealing. It gives the impression that anybody can apply and that it will be giving a lot of people vouchers. However, it is only actually available to women and minorities who are already working in the tech industry, something which is loosely brushed over in most headlines. Reports are non-specific when talking about how many vouchers will be given out, with Google and Codeschool not committing to a number. Instead they simply state that “thousands of people interested in continuing their path with programming will have the ability to do so free of charge.”

A thousand vouchers have already been handed out and according to Codeschool they were distributed by Google “strategically at the conference and inside the community” – the conference that was held at Google I/O, with access to the main annual conference costing $900 per person. Realistically, with non-specification of the amount of vouchers that will be handed out, and one thousand vouchers already gone, there could perhaps be as little as another thousand up for grabs. 2000 people receiving 3 months training surely is not going to be particularly effective in women and minorities’ plight to learn coding?

It may seem that women and minorities who are hoping to get 3 months online learning courtesy of Google, who make a whopping $23,509 profit per minute[1], may not stand much of a chance of being successful. Google warn hopeful candidates to apply soon, as “Opportunities are limited.” Before Google will consider you, you need to convince that you are worthy of a voucher by explaining what “inspired you to join the technology industry” in the form you must fill out as way of applying. So a quick application with a well thought out plea will give you a potentially very small chance at a free voucher.

1735502 If you are unsuccessful then do not fear. There are entirely free online learning resources available such as Alison; a free online learning website which offers courses in programming, Information Technology, Adobe and many more. A list of subjects is available at http://alison.com/learn/ . Learning is done through screen shows, text and tests, with no charge for the information at all. You can even give prospective employers a key code that they can confirm with Alison, which will prove you have done any desired studying. This probably won’t get you a job at Google, but let’s face it, a 3month learning voucher was never really going to get you a job at Google anyway. In fact, there’s a possibility that the whole thing might have been a marketing stunt by Google and Codeschool and that there never was much intention to give thousands of women and minorities great opportunities; so don’t feel too bad if you missed out.

[1](source: www.gizmodo.com. Amount based this amount on current earnings reports)