Cyber Security

https://www.timesnownews.com/intern...-as-germany-hit-by-massive-data-breach/341888

Hackers steal Angela Merkel's private data as Germany hit by massive data breach

Updated Jan 04, 2019 | 19:26 IST | AFP




Among those affected were members of the Bundestag lower house of parliament, and the European Parliament, as well as those from regional and local assemblies, a government spokesperson said.


German Chancellor Angela Merkel | Photo Credit: AP

Berlin: Private data stolen from hundreds of German politicians, including Chancellor Angela Merkel, have been released online, the government said Friday.
The information, which comprised home addresses, mobile phone numbers, letters, invoices and copies of identity documents, was published via Twitter in December but inexplicably only came to light this week.

It was not immediately clear whether the officials were targeted by hackers or were the victims of an internal leak.

"Personal data and documents belonging to hundreds of politicians and public figures were published on the internet," government spokeswoman Martina Fietz told reporters, confirming that Merkel was one of them.

"The government is taking this incident very seriously."

Among those affected were members of the Bundestag lower house of parliament, and the European Parliament, as well as those from regional and local assemblies, she said.

Deputies from all parties represented in the Bundestag were affected, as well as President Frank-Walter Steinmeier.

But Fietz said a preliminary investigation indicated that "no sensitive information or data" from Merkel's office had been leaked.

Berlin's political establishment reacted with alarm.

"Whoever is behind this wants to damage faith in our democracy and its institutions," Justice Minister Katarina Barley said in a statement.

Beyond politicians, the leak also exposed the private data of celebrities and journalists.

The daily Bild and public broadcaster RBB first reported the leak.

Bild said it was not clear when the data theft began but said it continued until the end of October.

"At first glance, it does not seem that politically sensitive material was included," RBB said.

"However the damage is likely to be massive given the volume of personal data published."

'Satire and irony'
Fietz said the amount of Merkel's data that was exposed was "not excessive" but warned that some of the documents and information published might be faked.

Given the vast range of data hoovered up, RBB said it seemed unlikely that it was taken from a single source.

Parliamentary group leaders were notified of the attack late Thursday and the Federal Office for Information Security (BSI) and the domestic intelligence service said they were investigating.

"According to our current information, government networks have not been targeted," BSI tweeted.

The Twitter account @_0rbit published the links every day last month, along the lines of an advent calendar with each link to new information hidden behind a "door".

The account, which calls itself G0d, was opened in mid-2017 and purportedly has more than 18,000 followers.

It described its activities as "security researching", "artist" and "satire and irony" and said it was based in Hamburg.

Account suspended
A link to Merkel's data showed two email addresses used by the chancellor, a fax number and letters apparently written by her and to her.

By midday Friday, Twitter had suspended the account.

Last year, the domestic intelligence service, the Office for the Protection of the Constitution, said there had been repeated cyber attacks against MPs, the military and several embassies that were allegedly carried out by Russian internet espionage group "Snake".

Also known as "Turla" or "Uruburos", the group -- which targets state departments and embassies worldwide -- is believed to have links to Russian intelligence.

Last March, computer networks belonging to the German government came under sustained attack and data from foreign ministry staff were stolen.

At the time, Moscow denied that Russian hackers were involved.
 
https://economictimes.indiatimes.co...ils-from-16-websites/articleshow/67991603.cms

Hackers steal over 600 mn account details from 16 websites

BY IANS | FEB 14, 2019, 03.21 PM IST
Post a Comment



The databases, which are aimed at making "life easier" for hackers, can be purchased from the Dream Market cyber-souk, located in the Tor network, for less than $20,000 in bitcoin.

LONDON: Hackers have made available on the dark web details of some 617 million accounts stolen from 16 websites including ShareThis, Dubsmash and MyFitnessPalamong others, The Register reported.

It has been claimed that databases, which are aimed at making "life easier" for hackers, can be purchased from the Dream Market cyber-souk, located in the Tor network, for less than $20,000 in bitcoin.

The stolen information mainly includes account holders names, email addresses and passwords, according to the report that appeared this week.

The price appears to be relatively cheap because the information is targeted at spammers and credential stuffers who could use the information to also get access to other sites for which the users use the same usernames and passwords.

The hacked websites are Dubsmash (162 million), MyFitnessPal (151 million), MyHeritage (92 million), ShareThis (41 million), HauteLook (28 million), Animoto (25 million), EyeEm (22 million), 8fit (20 million), Whitepages (18 million), Fotolog (16 million), 500px (15 million), Armor Games (11 million), BookMate (8 million), CoffeeMeetsBagel (6 million), Artsy (1 million), and DataCamp (700,000), according to the report in The Register.

The seller, who is believed to be located outside of the US, told The Register that the Dubsmash data has been purchased by at least one person.

While some of these websites -- particularly MyHeritage, MyFitnessPal and Animoto -- warned their customers last year that they had been compromised, several others have started notifying users about the hacks


Read more at:
//economictimes.indiatimes.com/articleshow/67991603.cms?utm_source=contentofinterest&utm_medium=text&utm_campaign=cppst
 
Trusting digital assets is becoming very difficult. But again, physical assets seem to need a lot of physical security. So how does one protect one's assets ?

Even the big names are not immune from hacking.

https://in.mashable.com/science/428...om-nasa-jpl-using-cheap-raspberry-pi-computer

Hackers Stole Data From NASA JPL Using Cheap Raspberry Pi Computer

NASA is a one-stop solution for most of us, when we want to keep tabs on everything space and science related. It’s always bringing to light new mind-boggling discoveries and theories. However, it appears that even the world’s greatest aerospace and aeronautics research agency is not safe from hackers.

A recent report released by The US Office of the Inspector General (OIG) reveals that NASA JPL was hacked in April 2018 using Raspberry Pi, a low-cost computer, which is used to teach computing to people of all ages.

NASA JPL (Jet Propulsion Laboratory), a government funded research and development center, recently suffered a cyber security breach where one of the external user accounts were hacked, stealing approximately 500MB of data from its system. However, this is not the first time when NASA labs have been attacked by hackers. In 2011, hackers managed to steal 87GB of data by accessing around 18 servers supporting core JPL missions.

OIG report highlights major security weaknesses in JPL that reduces its ability to track or mitigate cyber attacks. Most of the security issues that are presented in the report highlights JPL’s lack of effort when it comes to network security. As a part of its security solutions, JPL uses Information Technology Security Database (ITSDB) to manage and analyze applications on its network. However, report labels the ITSDB as “inaccurate” and “incomplete”, saying that it makes JPL more prone to security related incidents.

There’s another issue of limited visibility where JPL is not able to keep tabs on devices connected to its network, further hindering its security capabilities. JPL also lacked the basic security measures that provides right access to the right users.

“We found that JPL’s network gateway that controls partner access to a shared IT environment for specific missions and data had not been properly segmented to limit users only to those systems and applications for which they had approved access. This shortcoming enabled an attacker to gain unauthorized access to JPL’s mission network through a compromised external user system”, reports OIG.

There were more security discrepancies found on the JPL network including the lack of security guidelines for partners, lack of necessary security training for system administrators and lack of threat hunting program recommended by IT security experts, among others. OIG has now recommended several security measures to NASA JPL that they must implement to make their network more secure. NASA has agreed to 9 out 10 recommendations made by OIG, and plans to put the corrective actions under works.

In all, the fact that a little computer like Raspberry Pi managed to attack NASA JPL sparks concerns because it’s not as advanced as other computers. We can’t help but imagine what the data hackers could have accessed had they used an advanced computer. Given all the highly sensitive information that the NASA JPL network holds including information regarding human space flight missions, it should’ve known better.
 

DanPSup

Hedge Strategy Trader in Options and Futures
This post is usefull for users of "Mac Zoom Client".

In the Zoom Client through 4.4.4 and RingCentral 7.0.136380.0312 on macOS, remote attackers can force a user to join a video call with the video camera active. This occurs because any web site can interact with the Zoom web server on localhost port 19421 or 19424. NOTE: a machine remains vulnerable if the Zoom Client was installed in the past and then uninstalled. Blocking exploitation requires additional steps, such as the ZDisableVideo preference and/or killing the web server, deleting the ~/.zoomus directory, and creating a ~/.zoomus plain file. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13450

Update July 09 2019

The flaw potentially exposes up to 750,000 companies around the world that use Zoom to conduct day-to-day business. All about it you will find in the following link: https://medium.com/bugbountywriteup...t-get-them-to-visit-your-website-ac75c83f4ef5
 
https://www.news18.com/news/tech/ag...roid-phones-in-india-check-point-2225667.html


Agent Smith Malware Has Affected Over 15 Million Android Phones in India: Check Point

IANS
Updated:July 11, 2019, 2:04 AM IST

The Agent Smith malware has affected over 25 million devices globally, spreading in guise of an official Google service and replacing installed apps with malicious ones.

Cyber security solutions provider Check Point on Wednesday revealed that 'Agent Smith," a new variant of mobile malware, has quietly infected around 25 million Android devices globally, including 15 million mobile devices in India.

Disguised as a Google-related app, the malware exploits known Android vulnerabilities and automatically replaces installed apps with malicious versions without the users' knowledge or interaction, said Check Point Research, the threat intelligence arm of Israel-based Check Point.

The malware currently uses its broad access to the devices' resources to show fraudulent ads for financial gain, but could easily be used for far more intrusive and harmful purposes such as banking credential theft and eavesdropping. This activity resembles previous malware campaigns such as "Gooligan", "Hummingbad" and "CopyCat".

"The malware attacks user-installed applications silently, making it challenging for common Android users to combat such threats on their own," said Jonathan Shimonovich, Head of Mobile Threat Detection Research at Check Point. "Agent Smith" was originally downloaded from the widely used third-party app store, 9Apps and targeted mostly Hindi, Arabic, Russian and Indonesian-speaking users.

So far, the primary victims are based in India though other Asian countries such as Pakistan and Bangladesh have also been impacted. There has also been a noticeable number of infected devices in the UK, Australia and the US as well. Check Point has worked closely with Google and at the time of publishing, no malicious apps remain on the Play Store, said the company.

"Combining advanced threat prevention and threat intelligence while adopting a 'hygiene first' approach to safeguard digital assets is the best protection against invasive mobile malware attacks like 'Agent Smith,'" said the report. In addition, users should only be downloading apps from trusted app stores to mitigate the risk of infection as third party app stores often lack the security measures required to block adware loaded apps
 

DanPSup

Hedge Strategy Trader in Options and Futures
Hi TP

Yes it is a shame what this companies (Amazon included) do and it is a shame how stupid people are which trust such dump companies for which users are just dump stupid customers and information givers for selling them any kind of what ever to them.

So let's move on with this thread to at least a few people protect and to make them understanding what is going on, even we do not know everything attoll what ever out there is going on.
 

DanPSup

Hedge Strategy Trader in Options and Futures
If any body has any problems with his provider or what ever app, he may first check in the future in the following link if it is only him or if the problem exist at the same time in other places. This is a link to save.

https://downdetector.com/
 

Similar threads