Recent Posts

Pages: [1] 2 3 ... 10
1
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by pavo on Today at 04:44:38 pm »
I shouldn't have to come here today... :(
I am so sorry for your loss Dan...
Take care and remember that all dogs go to heaven...
2
Playpen pervert fails to convince appeals court
By Iain Thomson in San Francisco 24 Feb 2018 at 03:56

Analysis US judges have shut down an appeal from a convicted pedophile who claimed the FBI hacking of his computer was an illegal and unreasonable search.

Gabriel Werdene, 53, of Bucks County, Philadelphia, is serving two years in a federal prison for rummaging through the Playpen dark-web filth souk for images and footage of child sexual abuse. Copies of the banned material were found on a DVD and USB drive at his home by the Feds during a sting operation in 2015.

Full Article Here:https://www.theregister.co.uk/2018/02/24/tor_fbi_hacking_appeal/
3
By Catalin Cimpanu

Two days after crooks started advertising the Data Keeper Ransomware-as-a-Service (RaaS) on the Dark Web, ransomware strains generated on this portal have already been spotted in the wild, infecting the computers of real-world users.

Spotted earlier this week by Bleeping Computer, Data Keeper is the third ransomware strain offered as a RaaS offering this year, after Saturn and GandCrab.
The service launched on February 12 but didn't actually come online until February 20, and by February 22, security researchers were already reporting seeing the first victims complaining of getting infected.

Just like the Saturn RaaS, Data Keeper lets anyone sign up for the service and lets them generate weaponized binaries right away, without having to pay a fee to activate an account.

Full Article Here:https://www.bleepingcomputer.com/news/security/data-keeper-ransomware-makes-first-victims-two-days-after-release-on-dark-web-raas/
4
 by Lindsey O'Donnell

Drupal developers patched two critical vulnerabilities this week in versions 7 and 8 of its content management system platform. Overall, Drupal patched seven vulnerabilities including four rated moderately critical and two flaws rated less critical.

The first of the critical flaws is a comment reply form bug in Drupal version 8. This vulnerability gives unauthorized users access to restricted content, allowing them to view and add comments and content in certain restricted areas in the CMS, according to the advisory published Wednesday.

Full Article Here:https://threatpost.com/drupal-patches-critical-bug-that-leaves-platform-open-to-xss-attack/130070/
5
Security & Technology News / Czech President Wants Hacker 'Extradited to Russia' Not US
« Last post by Antus67 on February 24, 2018, 01:14:57 pm »

By AFP on February 24, 2018

The Czech Republic's pro-Moscow president has repeatedly lobbied for a Russian hacker held in Prague and wanted by the US to be extradited to Russia, the justice minister was quoted as saying Saturday.

Yevgeni Nikulin, sought by the US for alleged cyberattacks on social networks and also by his native Russia on fraud charges, has been in a Prague prison since he was arrested in the Czech capital in October 2016 in a joint operation with the FBI.

Full Article Here:https://www.securityweek.com/czech-president-wants-hacker-extradited-russia-not-us
6
By Catalin Cimpanu

Two days after crooks started advertising the Data Keeper Ransomware-as-a-Service (RaaS) on the Dark Web, ransomware strains generated on this portal have already been spotted in the wild, infecting the computers of real-world users.

Spotted earlier this week by Bleeping Computer, Data Keeper is the third ransomware strain offered as a RaaS offering this year, after Saturn and GandCrab.

Full Article Here:https://www.bleepingcomputer.com/news/security/data-keeper-ransomware-makes-first-victims-two-days-after-release-on-dark-web-raas/
7
BY:  Zeljka Zorz - Managing Editor February 23, 2018

Signing malicious code with valid digital certificates is a helpful trick used by attackers to maximize the odds that malware won’t be flagged by antivirus solutions and often even by network security appliances.

Digitally signed malware can also bypass OS protection mechanisms that install or launch only programs with valid signatures.
As it happens, it has recently been pointed out that the practice of signing malicious code is more widespread than previously thought.

But, while there’s a general assumption (granted, backed by many instances) that attackers prefer using stolen certificates to sign their malicious payloads, Recorded Future researchers have discovered that, for the last couple of years, a few underground vendors have been offering legitimately issued code signing certificates and domain name registration with accompanying SSL certificates.

Full Article Here:https://www.helpnetsecurity.com/2018/02/23/counterfeit-digital-certificates-for-sale/
8
By: Jai Vijayan

The new malware also can turn bots into DDoS attack machines, says Fortinet.

Numerous versions of the Mirai IoT bot malware have surfaced since the creators of the original code - one of whom is a former Rutgers University student - first released it in Sept. 2016.

The latest iteration of Mirai is dubbed "OMG," and turns infected IoT devices into proxy servers while also retaining the original malware's DDoS attack capabilities.

Security researchers at Fortinet recently encountered the new Mirai variant, and say the modification likely provides the malware authors another way to generate money from the code. Satori, another IoT bot malware based on Mirai code, was discovered in December and is designed for mining cryptocurrencies rather than launching DDoS attacks.

Full Article Here:https://www.darkreading.com/vulnerabilities---threats/omg-new-mirai-variant-converts-iot-devices-into-proxy-servers/d/d-id/1331122
9
VoodooShield / Re: VoodooShield v4 STABLE Thread
« Last post by hayc59 on February 24, 2018, 07:53:57 am »
 My condolences also Danny..that is very cool dog and thanks for sharing a small part of your great life
Nancy & Gordon
10
Security & Technology News / Iranian Hackers Use New Trojan in Recent Attacks
« Last post by Antus67 on February 23, 2018, 11:42:01 pm »

By Ionut Arghire on February 23, 2018

The cyberespionage group known as OilRig and previously linked to Iran has been observed using a new Trojan in recent attacks, Palo Alto Networks reports.

A highly active group mainly targeting organizations in the Middle East, OilRig was attempting to deliver a Trojan called OopsIE in two attacks targeting an insurance agency and a financial institution in the Middle East. While one of the attacks relied on a variant of the ThreeDollars delivery document, the other attempted to deliver the malware to the victim directly, likely via a link in a spear phishing email.

The first attack occurred on January 8, 2018, and started with two emails being sent to two different email addresses at the same organization within a six minutes time span. Both messages originated from an email address associated with the Lebanese domain of a major global financial institution, but researchers from Palo Alto Networks believe the email address was spoofed.

Full Article Here:https://www.securityweek.com/iranian-hackers-use-new-trojan-recent-attacks
Pages: [1] 2 3 ... 10