The 'Great Cannon' Is China's Powerful New Hacking Weapon. The relentless days-long cyberattack on GitHub showed that someone was willing to use hundreds of thousands of innocent internet users to try to take down two single pages set up by an organization fighting Chinese censorship.
A group of cybersleuths has discovered that someone is indeed China, as everyone suspected. Localized Tools and Services, Prominent in the Brazilian Underground. In our monitoring of the global threat landscape, we tend to notice that countries sometimes are affiliated with a particular cybercriminal activity.
One classic example is Brazil, which is known for its association with banking malware. As we noted in a previous blog entry, “nline banking theft is especially rampant in the country, whose history of hyperinflation has once led to an early adoption of online financial systems and a large online banking community.” However, we felt like something was missing. What would explain the growth of these activities in Brazil? Several factors may have contributed to this growth. Broadband routers: SOHOpeless and vendors don't care. Feature It is far more common to find routers with critical flaws than without – Craig Young It's sad that end-user education about strong passwords, password safes, and phishing can be undone by something as innocuous as the blinking box in the corner of your room. – Peter Adkins Introduction.
Scary code of the week: Valve Steam CLEANS Linux PCs (if you're not careful) Linux desktop gamers should know of a bug in Valve's Steam client that will, if you're not careful, delete all files on your PC belonging to your regular user account.
According to a bug report filed on GitHub, moving Steam's per-user folder to another location in the filesystem, and then attempting to launch the client may perform the following heart-stopping command: rm -rf /* That means: remove all files recursively, and without stopping, from the root directory down. Assuming the client is run as a normal user, it will delete everything owned by that account – including mounted backup drives and network shares – although leave other stuff, such as system files owned by root, intact.
Steam is Valve Software's Swiss-army-knife-like application for downloading and managing collections of computer games, and getting to know fellow players. ASUS router-popping exploit on the loose. ASUS routers contain a vulnerability that turns users into admins, researcher Joshua Drake says.
The boxes could be exploited by malicious local users, but not those on the wider internet, re-rerouting all users on the network to malicious sites, among other attacks. Drake wrote in an advisory that several popular models were affected including the RT-N66U and RT-AC66U. "Currently, all known firmware versions for applicable routers are assumed vulnerable," Drake said.
ASUS has been contacted for comment. Forget the Sony Hack, This Could Be the Biggest Cyber Attack of 2015. On Friday, the FBI officially named North Korea as the party responsible for a cyber attack and email theft against Sony Pictures.
The Sony hack saw many studio executives’ sensitive and embarrassing emails leaked online. The hackers threatened to attack theaters on the opening day of the offending film, “The Interview,” and Sony pulled the plug on the movie, effectively censoring a major Hollywood studio. The end of “The Interview” is not the end of the world.
Technology journalists were quick to point out that, even though the cyber attack could be attributable to a nation state actor, it wasn’t particularly sophisticated. Ars Technica’s Sean Gallagher likened it to a “software pipe bomb.” Weather Channel forecast: Bleak, with prolonged XSS. How to simplify SSL certificate management The Weather Channel has dammed a downpour of cross-site-scripting vulnerabilities that soaked three quarters of links on the popular site, security bod Wang Jin says.
The website received a tsunami of traffic with more than a billion unique visitors checking in each month according to Drupal which noted it was the "highest trafficked Drupal site in existence". Wang Jin, a doctoral student at Nanyang Technological University, reported the poor conditions to the site administrators who closed the basic holes affecting tens of thousands of links late November. EVIL researchers dupe EVERY 32 bit GPG print. The hidden costs of self-signed SSL certificates Researchers have found collision attacks for 32 bit GPG keys leaving the superseded technology well and truly dead.
Eric Swanson and Richard Klafter used graphical processing units to clone fingerprints for each 32 bit key id in Web of Trust strong set. The feat took four seconds per key increasing the chance that human error could land users with attackers keys. "32 bit key IDs were reasonable 15 years ago but are obsolete now," the duo said in a blog. EVIL researchers dupe EVERY 32 bit GPG print.
USB coding anarchy: Consider all sticks licked. Choosing a cloud hosting partner with confidence Thumb drives are so inconsistently manufactured it is all but impossible to know if any unit could be reprogrammed to own computers, researcher Karsten Nohl says.
The conditions that determined if a unit could be hacked varied not only between vendors but also within product unit lines due to manufacturers buying different hardware components due to fluctuating prices.