Cyber security news and services

Fuzzing Adobe Reader for exploitable vulns (fun != profit)


Fuzzing Adobe Reader for exploitable vulns (fun != profit)

Wow did I underestimate this one! I told myself it would take quite some time to build a reliable exploit once I found a bug in Adobe Reader. There are so many mitigations to work through once you have an exploitable crash.

Amongst others: Data Execution Protection (DEP: prevents your code from being executed), Address Space Layout Randomization (ASLR: where in memory is my code anyway?), Sandboxing (you need to escape this one, it limits what your code can do). Itâs hard to end up with reliable code execution.

Read more ⟶

Nukes in the Age of AI


Nukes in the Age of AI

In 1983, Soviet Lieutenant Colonel Stanislav Petrov sat in a bunker in Moscow watching monitors and waiting for an attack from the US. If he saw one, he would report it up the chain and Russia would retaliate with nuclear hellfire. One September night, the monitors warned him that missiles were headed to Moscow.

But Petrov hesitated. He thought it might have been a false alarm.

Read more ⟶

Startup Offers $3 Million to Anyone Who Can Hack the iPhone


Startup Offers $3 Million to Anyone Who Can Hack the iPhone

The startup is called Crowdfense and is based in the United Arab Emirates. In an unusual move in the normally secretive industry of so-called zero-days, Crowdfense sent out a press release to reporters on Tuesday, advertising what it calls a bug bounty.

Source: vice.com

Read more ⟶

Police Appear to Have Seized Revenge Porn Site Anon-IB


Police Appear to Have Seized Revenge Porn Site Anon-IB

Law enforcement appears to have seized Anon-IB, possibly the most infamous site focused on revenge porn—explicit or intimate images of people shared without their consent. Although it’s unclear whether Anon-IB members will make a replacement site, the apparent seizure is still a significant blow against people who share revenge porn.

Source: vice.com

Read more ⟶

Supreme Court Upholds Patent Office Power to Invalidate Bad Patents


Supreme Court Upholds Patent Office Power to Invalidate Bad Patents

In one of the most important patent decisions in years, the Supreme Court has upheld the power of the Patent Office to review and cancel issued patents. This power to take a “second look”is important because, compared to courts, administrative avenues provide a much faster and more efficient means for challenging bad patents. If the court had ruled the other way, the ruling would have struck down various patent office procedures and might even have resurrected many bad patents.

Read more ⟶

Bezop Cryptocurrency Server Spills 25K in Private Investor, Promoter Data


Bezop Cryptocurrency Server Spills 25K in Private Investor, Promoter Data

Kromtech Security said that it found the unprotected data on March 30, adding that it included a treasure-trove of information ranging from “full names, (street) addresses, email addresses, encrypted passwords, wallet information, along with links to scanned passports, driver’s licenses and other IDs,” according to the researchers.

Source: threatpost.com

Read more ⟶

Hackers built a ‘master key’ for millions of hotel rooms


Hackers built a ‘master key’ for millions of hotel rooms

Any key card will do. Even old and expired, or discarded keys retain enough residual data to be used in the attack. Using a handheld device running custom software, the researchers can steal data off of a key card — either using wireless radio-frequency identification (RFID) or the magnetic stripe.

That device then manipulates the stolen key data, which identifies the hotel, to produce an access token with the highest level of privileges, effectively serving as a master key to every room in the building.

Read more ⟶

Amazon’s Alexa Hacked To Surreptitiously Record Everything It Hears


Amazon’s Alexa Hacked To Surreptitiously Record Everything It Hears

Gaining access to Alexa turned out to be surprisingly easy. Checkmarx attached their malicious code to a seemingly innocuous app. The company used a simple calculator app for demonstration purposes.

Getting Alexa to continue recording after the benign script in the app was executed proved more difficult. Checkmarx had two problems to solve. Alexa needed to keep listening after the benign response was given without alerting the user, and it had to record what it heard.

Read more ⟶

Exclusive: NSA encryption plan for ‘internet of things’ rejected by international body


Exclusive: NSA encryption plan for ‘internet of things’ rejected by international body

A source at an International Organization for Standardization (ISO) meeting of expert delegations in Wuhan, China, told WikiTribune that the U.S. delegation, including NSA officials, refused to provide the standard level of technical information to proceed.

Source: wikitribune.com

Read more ⟶

Ride-hailing service Careem lost 14 million users’ data… in January


Ride-hailing service Careem lost 14 million users’ data… in January

Update your Careem passcode, and then update your password on any other accounts using the same or similar details. Make your new one good and strong. Here’s how.

And if we’ve said it once, we’ve said it a million times: reusing passwords is really, truly a terrible idea. So don’t! Watch out for spearphishers.

Unsolicited communications that try to get personal information out of you, or send you to a site that wants your account credentials, should be greeted with your hairiest of eyeballs. Don’t click on links or download attachments from unfamiliar emails. Keep an eye on your bank account and credit card statements for suspicious activity.

Read more ⟶

Why investors pumped $133 million into “stablecoin” Basis


Why investors pumped $133 million into “stablecoin” Basis

Today’s most widely used stable cryptocurrency, called Tether, claims to back each unit of its currency with a dollar of hard currency reserves. However, the company has a poor transparency record, causing critics to wonder if Tether might not actually have reserves backing all of the cryptocurrency in circulation as it claims.

Source: arstechnica.com

Read more ⟶

Cops Take Down World’s Biggest ‘DDoS-For-Hire’ Site They Claim Launched 6 Million Attacks


Cops Take Down World’s Biggest ‘DDoS-For-Hire’ Site They Claim Launched 6 Million Attacks

European law enforcement are today celebrating the dismantling of a website police claim sold Distributed Denial of Service (DDoS) attacks and helped launch up to 6 million of them for as many as 136,000 registered users. Four alleged administrators of the webstresser.org service were arrested on Tuesday in the U.K., Canada, Croatia and Serbia, whilst the site was shut down and its infrastructure seized in Germany and the U.S., Europol announced Wednesday.

Read more ⟶

BGP leaks and cryptocurrencies


BGP leaks and cryptocurrencies

The broad definition of a BGP leak would be IP space that is announced by somebody not allowed by the owner of the space. When a transit provider picks up Cloudflare’s announcement of 1.1.1.0/24 and announces it to the Internet, we allow them to do so. They are also verifying using the RIR information that only Cloudflare can announce it to them.

Source: cloudflare.com

Read more ⟶

Mysterious “double kill” IE zero-day allegedly in the wild


Mysterious “double kill” IE zero-day allegedly in the wild

If you open the booby-trapped document, which is denoted by Qihoo as containing some unspecified sort of shellcode, Internet Explorer is apparently activated in the background, ultimately leading to an executable program being downloaded and executed without any visible warning.

Source: sophos.com

Read more ⟶

Someone Is Trying to Extort iPhone Crackers GrayShift With Leaked Code


Someone Is Trying to Extort iPhone Crackers GrayShift With Leaked Code

Last week, an unknown party quietly leaked portions of GrayKey code onto the internet, and demanded over $15,000 from Grayshift—ironically, the price of an entry-level GrayKey—in order to stop publishing the material. The code itself does not appear to be particularly sensitive, but Grayshift confirmed to Motherboard the brief data leak that led to the extortion attempt.

Source: vice.com

Read more ⟶

Suspicious event hijacks Amazon traffic for 2 hours, steals cryptocurrency


Suspicious event hijacks Amazon traffic for 2 hours, steals cryptocurrency

Amazon lost control of a small number of its cloud services IP addresses for two hours on Tuesday morning when hackers exploited a known Internet-protocol weakness that let them to redirect traffic to rogue destinations. By subverting Amazon’s domain-resolution service, the attackers masqueraded as cryptocurrency website MyEtherWallet.com and stole about $150,000 in digital coins from unwitting end users. They may have targeted other Amazon customers as well.

Read more ⟶

MyEtherWallet Confirmed Hack via DNS Loophole


MyEtherWallet Confirmed Hack via DNS Loophole

The attackers don’t seem to have compromised MyEtherWallet itself. Instead, they attacked the infrastructure of the internet, intercepting DNS requests formyetherwallet.comto make the Russian server seem like the rightful owner of the address. Most of the affected users were employing Google’s 8.8.8.8 DNS service.

However, because Google’s service isrecursive, the bad listing was likely obtained through Amazon’s “Route 66” system.

Source: altcoinreport.co

Read more ⟶

These People Are Selling the CIA’s Internal Board Game to the Public


These People Are Selling the CIA’s Internal Board Game to the Public

Last month, a series of Freedom of Information Act requests to the CIA unearthed a trove of documents related to the agency’s in-house board games, used to train agents in intelligence gathering and other clandestine activities. The documents included detailed rulebooks and pages of cut-out components and cards, and it seemed only a matter of time before gamers with a printer and some scissors started playing the once-classified games themselves.

Read more ⟶

Hijack of Amazon’s domain service used to reroute web traffic for two hours


Hijack of Amazon’s domain service used to reroute web traffic for two hours

The attackers used BGP—a key protocol used for routing internet traffic around the world—to reroute traffic to Amazon’s Route 53 service, the largest commercial cloud provider who count major websites such as Twitter.com as customers.

Source: doublepulsar.com

Read more ⟶

Amazon Key expands to deliver packages inside your car


Amazon Key expands to deliver packages inside your car

Amazon added a new delivery location to the ever-growing number of spots it can leave your packages: inside your car. The company announced an expansion of its Amazon Key in-home delivery service that now lets Prime members get packages deposited in their cars at no extra cost. The service is available today in 37 cities across the country for Prime members with eligible vehicles and active subscriptions to connected car services.

Read more ⟶