Monday, August 19, 2013

Mark Zuckerberg’s Facebook Page Was Hacked by an Unemployed Web Developer


An unemployed Palestinian developer named Khalil Shreateh tried several times to report a bug to Facebook’s security team. When no one got back to him, he took the (dubiously) logical next step: He exploited the bug to leave a public comment on Facebook CEO Mark Zuckerberg’s wall.

“First sorry for breaking your privacy and post to your wall,” an apparent screenshot of the hack reads. “I has [sic] no other choice to make after all the reports i sent to Facebook team.”

The break-in, detailed on Shreateh’s blog (and in several agitated posts from Facebook developers on Hacker News), has been more than a little embarrassing for Facebook.

But it’s not exactly newsworthy that Shreateh found a bug — that happens all the time. In fact, Facebook runs a program that encourages white hat hackers to find and report bugs in Facebook infrastructure in exchange for a cash reward. What is unusual is that Facebook didn’t respond to Shreateh’s initial reports about the bug, and that Shreateh then exploited it in violation of Facebook’s policies for white hat hackers.

“The more important issue here is with how the bug was demonstrated using the accounts of real people without their permission,” insisted Matt Jones, a Facebook software engineer, on the forum Hacker News. “Exploiting bugs to impact real users is not acceptable behavior for a white hat.”

Thursday, July 11, 2013

The High Cost Of Cybercrime

Every enterprise has high-value information vital to its success. As cyber-attack techniques become more sophisticated, this “digital gold” is increasingly vulnerable.

A study by the Ponemon Institute found that the average annualized cost of cybercrime in 2012 is $8.9 million per year, with a range of $1.4 million to $46 million.* The cost of cybercrime includes more than the value of the stolen information. It includes the costs of business disruption, lost opportunity, damage to brand, and recovery efforts.
  • Sony estimated their costs from 2011 data breaches were at least $171 million.
  • A competing manufacturer stole source code from a control-system supplier the supplier’s stock dropped 83%.
  • A metallurgical company lost to cyber espionage technology built over 20 years at a cost of $1 billion.
  • The Canadian government stopped a $38.6 billion takeover bid when attacks compromised sensitive information at government agencies and law firms.
  • Civil penalties for ePHI breaches can be up to $250,000, with repeat/uncorrected violations reaching $1.5 million per violation, per year

Wednesday, July 3, 2013

Massive Android flaw allows hackers to ‘take over’ and ‘control’ 99% of Android devices

Mobile security company Bluebox said today that it recently discovered a vulnerability in Android that makes any Android device released in the last four years vulnerable to hackers who can read your data, get your passwords, and control any function of your phone, including sending texts, making phone calls, or turning on the camera.
That’s almost 900 million Android devices globally.

“A Trojan application … has the ability to read arbitrary application data on the device (email, SMS messages, documents, etc.), retrieve all stored account & service passwords,” Bluebox CTO Jeff Forristal posted. “It can essentially take over the normal functioning of the phone and control any function.”

The vulnerability is due to “discrepancies” in how Android apps are approved and verified, Bluebox says, allowing hackers to tamper with application code without changing the app’s cryptographic signatures. That means that an app — any app — which looks perfectly safe and legitimate to an app store, a device, an engineer, or a user actually could actually have malicious code embedded within it.

Reference:

Everyone's Trying to Track What You Do on the Web: Here's How to Stop Them

It's no secret that there's big money to be made in violating your privacy. Companies will pay big bucks to learn more about you, and service providers on the web are eager to get their hands on as much information about you as possible.

So what do you do? How do you keep your information out of everyone else's hands? Here's a guide to surfing the web while keeping your privacy intact.

The adage goes, "If you're not paying for a service, you're the product, not the customer," and it's never been more true. Every day more news breaks about a new company that uploads your address book to their servers, skirts in-browser privacy protection, and tracks your every move on the web to learn as much about your browsing habits and activities as possible. In this post, we'll explain why you should care, and help you lock down your surfing so you can browse in peace

Monday, July 1, 2013

Car Thieves Using New Wireless Technology To Break Into Cars



As cars become more and more like rolling computers, they're facing a new kind of threat formerly reserved for laptops and the like: They're being hacked.

Police in Long Beach, Calif., are looking for two men who used some sort of wireless device to unlock cars. They were caught on video holding something in their hands. As they approach the car, the interior lights came on and the doors simply opened. Police are baffled by how the thieves hacked into the car's wireless system.

It wasn't the first time thieves used technology to rob cars. In Chicago, a similar theft was caught on camera in 2012. Chicago police theorized that code-cracking software sent the same unlock signal to the car that the vehicle's key fob transmitter uses.
But you might not need special software to break into cars -- all you need is a cellphone.

New System Uses Low-Power Wi-Fi Signal To Track Moving Humans — Even Behind Walls

...so much for "I told you so".

The comic-book hero Superman uses his X-ray vision to spot bad guys lurking behind walls and other objects. Now we could all have X-ray vision, thanks to researchers at MIT’s Computer Science and Artificial Intelligence Laboratory.

Researchers have long attempted to build a device capable of seeing people through walls. However, previous efforts to develop such a system have involved the use of expensive and bulky radar technology that uses a part of the electromagnetic spectrum only available to the military.

Now a system being developed by Dina Katabi, a professor in MIT’s Department of Electrical Engineering and Computer Science, and her graduate student Fadel Adib, could give all of us the ability to spot people in different rooms using low-cost Wi-Fi technology. “We wanted to create a device that is low-power, portable and simple enough for anyone to use, to give people the ability to see through walls and closed doors,” Katabi says.



Reference:

Tuesday, June 18, 2013

Does Lax Network Security Lead To Cyber Attacks: 2013’s Top Hacks

... just when you thought it was safe to go back into the web!

1. NY Times Endures Chinese based cyber attack for monthsFor four months, Chinese hackers persistently attacked The New York Times, breaching its computer systems and stealing passwords for its reporters and other employees. Ironically, these attacks on the NY Times network security first surfaced in October 2012 when the Times was investigating China’s Prime Minister, Wen Jiabao and his relatives for wrongfully accumulating his billion dollar fortune. The cyber hack was orchestrated by installing malware onto the company’s computers.

2. US Federal Reserve gets hacked in response to Aaron Swartz suicideIn early February, The US Federal Reserve Bank confirmed one of its internal websites had incurred a data breach by the hacktivist group “Anonymous”. The initial network security scare involved stolen personal information of more than 4,000 bank executives. “Anonymous” reported publishing all the personal data of these 4,000 bank executives using a Twitter account registered to OpLastResort, which has also allegedly has wreaked cyber security breaches on other business and government websites.

3. Twitter Suffers Cyber Attack In February, Twitter came forward to announce they were the latest site to suffer a breach of their network security. The social network said that approximately 250,000 Twitter user accounts were potentially compromised. The breach of Twitter’s network security involved gaining access to personal identifiable information including user names and email addresses. Twitter IT security technicians were able to detect unusual access patterns that led to them toward identifying unauthorized access attempts to Twitter user data.


4.Yahoo! Mail Hacked After Video Uploaded on YouTubeYahoo Mail users have been seeing their accounts broken into for months. Though Yahoo has reported fixing the hacking issue several times, there is still a reported rise in the number of compromised accounts. Yahoo’s network security breaches have been documented for some time. What makes this cyber attack unique is that it seems to stem from a YouTube video uploaded by Shahin Ramezany.

5. South Korean Broadcasts and Banks Hacked In early March, South Korean authorities investigated a hacking attack that brought down the servers of three broadcasters and two major banks. The army rapidly raised its alert level due to its suspicions that North Korea may be involved. Network servers at television stations YTN, MBC and KBS were affected as well as two major banks, Shinhan Bank and NongHyup Bank.

Sunday, January 20, 2013

Building A Penetration Testing Lab Cluster

Building a penetration testing lab cluster at low-cost with virtualization support, further to be used for research and analysis.If you don’t have access to a pentest environment you should build up your own penetration testing lab.If you need a wide range of hosts you should also use virtualization.So today we show you how to build a virtualization cluster to be further used as a penetration testing lab.

Detecting Web Application Firewalls

Web application firewalls play an important role in the security of websites as they can mitigate risks and they can offer protection against a large-scale of vulnerabilities.That is the reason that many companies in nowadays are implementing a web application firewall solution in their existing infrastructure.Of course an implementation of a WAF on its own cannot resolve the security problems that a web application might have and proper modifications must be made in order many of the attacks to be able to identified and blocked.



Read more...

Wednesday, January 9, 2013

Is social engineering an actual threat?

Here are some brief explanations on why social engineering works. It’s tough to cover everything, because social engineering is a really broad field of information. The points made in the list below is taken from the book I’ve quoted on the bottom of this article:
  • Most people have the desire to be polite, especially to strangers.
  • Professionals want to appear well informed and intelligent
  • If you are praised, you will often talk more and divulge more.
  • Most people would not lie for the sake of lying
  • Most people respond kindly to people who appear concerned about them

Being helpful

Usually humans wants to be helpful to each other. We like doing nice things!
I run into the reception at a big corporate office with my papers soaked in coffee. I talk to the receptionist and explain that I have a job interview meeting in 5 minutes, but I just spilled coffee over all my papers. I then ask if the receptionist could be so sweet and print them out again for me with this USB memory stick that I have.This might lead to an actual infection of the receptionist PC and may gain me a foothold within the network.

Using fear

The fear of failing or not doing as ordered:
The company’s director’s (John Smith) facebook page (or whatever other source of information) reveals that he has just left on a cruise for 3 weeks. I call the secretary and with a commanding voice I say “Hi, it’s Chris calling. I just got off the phone with John Smith, hes having a very good time on his cruise with his wife Carla and kids. However we are in the middle of integrating a very important business system and he told me to give you a call so you can help us. He couldn’t call himself because they are going on a safari, but this is really urgent. All you need to do is take the USB stick that is addressed to him in the mail and plug it in, start the computer and we are all done. The project survives!Thank you very much! You have been a great help! I am sure John Smith will recognize you for this act of helpfulness. “

Playing on reciprocation
The tailgate. I hold the entry door for you, and I quickly walk behind you. When you open the next door, which is security enabled, I am heading in the same direction and most people will try and repay the helpful action by holding the door for you again. Thus allowing you into a place where you should not be. Worried about getting caught Nah.. You just say you’re sorry and that you went the wrong way.The target would almost feel obliged to hold the door for you!

Exploiting the curiosity
Try dropping 10 USB sticks around in various locations in your organization. You don’t have to place them in too obvious places. The USB should have a auto-run phone home program so you can see when someone connects the USB stick and should theoretically be exploited.Another version of this is to drop USB sticks with a single PDF document that is i.e. called “John Smith – Norway.pdf”. The PDF document contains a Adobe Acrobat Reader exploit (there is tons of them) and once the user clicks the document he will be owned. Of course you have made sure that the exploit it tailored to the target organizations specific version of Adobe. It will feel natural for most people to open the document so that they can try return the USB stick to its owner.

Another example of curiosity (maybe another term explains this better) is all these SPAM mails or bad Internet ad’s that you have won something or a Nigerian prince is offering you a whole lot of money if you can help him. I am sure you are familiar of these already, but these are also social engineering attacks, and the reason they are not stopping is that they are still working!

Friday, January 4, 2013

The Weakest Link in Data Center Security

The Weakest Link

Many of the organizations who have been attacked utilize comprehensive security technologies. Yet attackers have found a way to penetrate these defenses. This tells us that existing defenses aren’t working and security is being compromised by its weakest link—users in the enterprise.

1. The Human Factor - Via a variety of bad behaviors like weak passwords, negligence of management applications (RDP, Telnet, SSH), and social media oversharing, employees can compromise data center security without meaning to do so. There is no doubt this human factor in security is a challenge and needs to start with comprehensive and clearly understood security and privacy policies. While end-user education and awareness is important, it is insufficient given the uphill nature of that battle. The solution is to balance this with network security best practices: Do not trust, always verify – All users should always be authenticated, and provided least privilege access. In the data center, adopt a positive enforcement model. Positive enforcement means that you selectively allow what is required for day-to-day business operations as opposed to a negative enforcement approach where you would selectively block everything that is not allowed. This means safely enabling user access to specific applications or sub-application functions while inspecting all content for threats. Management applications like RDP, Telnet and SSH should be limited only to IT administrators.

2. Network segmentationNetwork segmentation even in flat layer two networks like Ethernet Fabric architectures is critical. Properly segmenting the user to a segment of the data center helps in various ways. It helps to limit the scope of compliance, limit access to vulnerable servers in the network and limit exfiltration of data if you are compromised. Of course, to do this effectively, you need to have visibility of users, applications and content in every segment.

3. Tackle unknown threats – While addressing known threats is well-understood, addressing targeted, unknown threats is a tougher challenge because they are unlikely to hit honeypots in the wild that can provide comprehensive analysis of the malware and its behavior. Most targeted attacks originate from executable files downloaded onto an end-user device. Therefore, inspecting unknown files in the network in a virtual sandbox is a key strategy adopted by security vendors to weed out targeted, unknown malware. What is critical to complement this inspection is the ability to deliver malware signatures and inline enforcement for any malware that is found.

4. Inspect unknown traffic – In a data center, the amount of unknown traffic should be a very small percentage of all traffic. The ability to categorize and inspect unknowns to determine whether they are threats is a critical part of the data center security strategy.

5. Monitoring and logs - Finally, the monitoring of access by users to key applications in the data center is important to provide valuable information of user activity. It also helps detect critical policy violations and security holes.

Some of these best practices are in fact advocated by Forrester Research’s John Kindervag in his Zero Trust Network architecture, and being adopted by many enterprises worldwide. In summary, while end-users and employees in an organization may form the weakest link when it comes to unknowingly opening up businesses to damaging attacks, the strategy to address this may be to look beyond the users, and complement user awareness and training with network security best practices.

Read more...


DDoS Toolkit Being Used in Synchronized Attacks Against Banking, Hosting and Energy Firms

The denial-of-service toolkit used against financial institutions late last year has also been used against hosting and energy companies, DDoS protection firm Prolexic said in an advisory Thursday.

The “itsoknoproblembro” toolkit was behind the distributed denial-of-service attacks that dogged several banks in the United States last fall. The attacks against the banks were massive, with some peaking at 70 Gbps and more than 30 million pps. The toolkit has a two-tier command mode that can launch multiple high-bandwidth attack types simultaneously and has been used in coordinated campaigns against the energy, hosting provider, and banking industries, Scott Hammack, CEO of Prolexic, said in a statement.

Read more...