Posts Tagged ‘ cyber warfare ’

Anonymous targets Sweden over Pirate Bay

December 16, 2014
posted by

Anonymous stuff [New Zealand]    

"A 'hacktivist' group using the Anonymous banner claims it has leaked official login details of Swedish government email accounts as payback for last week's raid that shut down The Pirate Bay. 'HagashTeam' released the sensitive data in a document on Pastebin, which also includes login credentials for what appear to be official email accounts of the Israeli, Indian, Brazilian, Argentinian and Mexican administrations. The hackers said the leak was 'in retaliation' for the Pirate Bay raid." [editor's note: Couldn't have happened to a nicer bunch of evil, filthy low-lifes. Go, Anon! - TLK] (12/16/14)

http://tinyurl.com/l9g4raf  

No Comments »

Isohunt resurrects The Pirate Bay

December 15, 2014
posted by

ZDNet ZDNet    

"Days after The Pirate Bay was wiped from the Web, many believed that it was only a matter of time before a carbon copy of the website's database reappeared online. Thanks to The Pirate Bay's database of torrent links being freely available for download, it would only take another organization to upload the site's base and cater for traffic levels in order to resurrect the system. It seems the game of whack-a-mole with law enforcement is back on, thanks to Isohunt stepping into the breach. Isohunt, one of many torrent search websites blocked [sic] in countries including the United Kingdom, recreated a version of The Pirate Bay over the weekend." (12/15/14)

http://www.zdnet.com/article/isohunt-steps-in-to-resurrect-pirate-bay/  

No Comments »

Sweden: Stockholm gangsters steal Pirate Bay equipment, site goes down briefly

December 10, 2014
posted by

ZDNet ZDNet    

"The Pirate Bay is yet to reappear online following a raid in Stockholm by police who confiscated servers and equipment, placing the website in the dark. On Tuesday, access to The Pirate Bay disappeared, together with a number of torrent-related websites. While there was no official word from authorities, sources told TorrentFreak that a raid in Stockholm caused the temporary closure, which was later confirmed by Paul Pinter, police national coordinator for Sweden's IP enforcement. ... At the time of writing, the main website has reappeared with a Costa Rican address, although high volumes of traffic makes access difficult .... The Pirate Bay's magnet link archive has been hosted as a downloadable file itself for some time, and there are likely hundreds of copies of the database stored globally -- especially as the full file is less than 100MB." (12/10/14)

http://tinyurl.com/oyrrpak  

No Comments »

Sony’s PlayStation hit by hack attack

December 8, 2014
posted by

BBC News [UK state media]    

"A hacker group has claimed responsibility for attacking Sony's online PlayStation store, which is down on Monday. Visitors to the site are greeted with a message that says 'Page Not Found! It's not you. It's the internet's fault.' A group called 'Lizard Squad' has taken credit for the outage, posting 'PSN Login #offline #LizardSquad' as their Twitter status. The outage is the most recent in a series of attacks on tech giant Sony." (12/08/14)

http://www.bbc.com/news/technology-30373686  

No Comments »

North Korea: Regime denies Sony attack, calls it “righteous deed”

December 7, 2014
posted by

Fox News Fox News    

"North Korea released a statement Sunday that clearly relished a cyberattack on Sony Pictures, which is producing an upcoming film that depicts an assassination plot against Pyongyang's supreme leader. While denying responsibility for an attack last week that disrupted Sony's computer system and spewed confidential information onto the Internet, an unidentified spokesman for the North's powerful National Defense Commission acknowledged that it 'might be a righteous deed of the supporters and sympathizers' of the North's call for the world to turn out in a 'just struggle' against U.S. imperialism." (12/07/14)

http://tinyurl.com/oaofj46  

No Comments »

Sony cyber attack one of the worst in corporate history

December 4, 2014
posted by

Newsweek    

"Sony Pictures Entertainment experienced one of the most devastating corporate attacks in history. Thousands of files, seized by hackers last week, have been leaked online including personal details of around 6,000 Sony employees, upcoming Sony feature films and the salary details of top executives. The hackers also managed to access details about Deloitte bankers who are Sony’s auditors. The initial data breach, which occurred on 24th November, resulted in the shutdown of the entire computer network of one of Hollywood’s largest and most powerful studios." (12/04/14)

http://tinyurl.com/ptvzk74  

No Comments »

“Bone-chilling” research suggests Iran gearing up to avenge Stuxnet hacks

December 3, 2014
posted by

Forbes    

"A vast number of western organisations have been breached by hackers operating out of Iran, according to researchers at Cylance, a security startup. The victims include military, energy firms, airlines and airports, hospitals, governments and their contractors in the US, the UK and beyond, the Operation Cleaver report read. And the level of access at some of the compromised critical organisations was described as 'bone-chilling.' ... US researchers have repeatedly claimed the Middle Eastern nation has expanded its cyber divisions at a startling pace since the uncloaking of Stuxnet, malware thought to have been forged in the labs of US and Israeli computer labs that sought to cause disruption to Iranian nuclear development. Now, Iran’s hackers are seeking to establish a 'beachhead for cyber sabotage' in response, the study suggested." (12/02/14)

http://tinyurl.com/prcaz28  

No Comments »

Hackers stealing Wall Street insider data

December 1, 2014
posted by

Detroit News    

"Hackers with Wall Street expertise have stolen merger-and-acquisition information from more than 80 companies for more than a year, according to security consultants who shared their findings with law enforcement. A group dubbed FIN4 by researchers at FireEye Inc. has been tricking executives, lawyers and consultants into providing access to confidential data and communications, and probably using the information for insider trading, FireEye said in a report Monday. The hackers’ sophistication suggests they’ve worked in the financial sector, Jen Weedon, FireEye’s manager of threat intelligence, said in an interview." (12/01/14)

http://tinyurl.com/m5pvhgz  

No Comments »

NSA reform — the consequences of failure

December 1, 2014
posted by

Cato Institute Cato Institute
by Patrick G Eddington  

"In the absence of real reform, people and institutions at home and abroad are taking matters into their own hands. In America, the NSA’s overreach is changing the way we communicate with and relate to each other. In order to evade government surveillance, more and more Americans are employing encryption technology." (11/26/14)

http://tinyurl.com/njuanja  

No Comments »

Censoring the Web isn’t the solution to terrorism or counterfeiting. It’s the problem.

November 30, 2014
posted by

Electronic Frontier Foundation Electronic Frontier Foundation
by Jeremy Malcolm  

"In politics, as with Internet memes, ideas don't spread because they are good—they spread because they are good at spreading. One of the most virulent ideas in Internet regulation in recent years has been the idea that if a social problem manifests on the Web, the best thing that you can do to address that problem is to censor the Web. It's an attractive idea because if you don't think too hard, it appears to be a political no-brainer." (11/25/14)

http://tinyurl.com/obny3pf  

No Comments »

Sony looks for possible North Korea link in hacking, movie leak

November 30, 2014
posted by

Chicago Tribune    

"Sony Pictures Entertainment is investigating to determine if hackers working on behalf of North Korea might be responsible for a cyber attack that knocked out the studio's computer network earlier this week, the technology news site Re/code reported. The attack occurred a month before Sony Pictures, a unit of Sony Corp, is to release 'The Interview.' The movie is a comedy about two journalists who are recruited by the CIA to assassinate North Korean leader Kim Jong Un. The Pyongyang government denounced the film as 'undisguised sponsoring of terrorism, as well as an act of war' in a letter to U.N. Secretary-General Ban Ki-moon in June." (11/29/14)

http://tinyurl.com/mz85854  

No Comments »

Secret malware in European Union attack linked to US and British intelligence

November 25, 2014
posted by

The Intercept The Intercept
by Morgan Marquis-Boire, Claudio Guarnieri and Ryan Gallagher  

"Complex malware known as Regin is the suspected technology behind sophisticated cyberattacks conducted by U.S. and British intelligence agencies on the European Union and a Belgian telecommunications company, according to security industry sources and technical analysis conducted by The Intercept. Regin was found on infected internal computer systems and email servers at Belgacom, a partly state-owned Belgian phone and internet provider, following reports last year that the company was targeted in a top-secret surveillance operation carried out by British spy agency Government Communications Headquarters, industry sources told The Intercept." (11/24/14)

http://tinyurl.com/p9o3ww9  

No Comments »

Highly advanced backdoor trojan cased high-profile targets for years

November 23, 2014
posted by

Ars Technica Ars Technica    

"Researchers have unearthed highly advanced malware they believe was developed by a wealthy nation-state to spy on a wide range of international targets in diverse industries, including hospitality, energy, airline, and research. Backdoor Regin, as researchers at security firm Symantec are referring to the trojan, bears some resemblance to previously discovered state-sponsored malware, including the espionage trojans known as Flame and Duqu, as well as Stuxnet, the computer worm and trojan that was programmed to disrupt Iran's nuclear program. Regin likely required months or years to be completed and contains dozens of individual modules that allowed its operators to tailor the malware to individual targets." (11/23/14)

http://tinyurl.com/kns2tww  

No Comments »

Amnesty anti-spyware app tells you if the government is watching you

November 20, 2014
posted by

CNet News CNet News    

"Ever feel like someone's watching you? Amnesty International has released an app to find out if governments are spying on you. Detekt is a free and open source software that scans your computers for known surveillance spyware. The app was developed by German security researcher Claudio Guarnieri, and it's launched by Amnesty today in partnership with civil rights and consumer protection organisations Digitale Gesellschaft from Germany, Electronic Frontier Foundation from the US and Privacy International from the UK." (11/20/14)

http://tinyurl.com/kmtarex  

No Comments »

Anonymous takes over Ku Klux Klan’s Twitter account

November 18, 2014
posted by

Anonymous The Guardian [UK]    

"The internet activist group Anonymous has responded to Twitter taunts from the Ku Klux Klan by taking over its US Twitter account. ... [Twitter status message: 'Under Anon control as of 16 NOV 2014 09:11:47. You should've expected us.'] ... Anonymous has tweeted sparingly from the account, but has confirmed it has access to direct messages that confirm the validity of the @KuKluxKlanUSA account and promised a further statement at 3am GMT on 18 November." [hat tip -- David Klaus] (11/17/14)

http://tinyurl.com/m3ey4xe  

No Comments »

Son of Stuxnet

November 13, 2014
posted by

The Intercept The Intercept
by Kim Zetter  

"When Eric Chien awoke on October 14, a Friday, he immediately reached for his BlackBerry to check his e-mail. The subject line of one message caught his eye. It read simply, 'important malware,' and came with an attachment. It had been sent to Chien, the technical director of Symantec's security response team, by two computer scientists at an obscure university lab in Hungary, who wrote in stilted English that they'd discovered a new attack that bore 'strong similarities' to Stuxnet. They dubbed it 'Duqu' (dew queue) -- because temporary files the malware created on infected machines all had names that began with ~DQ. They were certain that Duqu would 'open a new chapter in the story of Stuxnet.'" (11/12/14)

https://firstlook.org/theintercept/2014/11/12/stuxnet/  

No Comments »

Silk Road takedown was only one shot in larger terror attack on freedom

November 9, 2014
posted by

BBC News    

"Silk Road 2.0 and 400 other sites believed to be selling illegal items including drugs and weapons have been shut down. The sites operated on the Tor network -- a part of the internet unreachable via traditional search engines. The joint operation between 16 European countries and the US saw 17 [abductions], including Blake Benthall who is said to be behind Silk Road 2.0." (11/07/14)

http://www.bbc.com/news/technology-29950946  

No Comments »

800 million Apple devices threatened by “WireLurker” malware

November 6, 2014
posted by

MarketWatch MarketWatch    

"A new, ugly malware threat could be lurking for millions of Apple Inc. customers. The new family of malware, dubbed WireLurker, has been discovered by Palo Alto Networks Inc. which said it shows 'characteristics unseen in any previously documented threats targeting Apple platforms.' ... WireLurker monitors any iOS device connected via USB with an infected OS X computer and then downloads third-party applications onto the device." (11/06/14)

http://tinyurl.com/lckofak  

No Comments »

The FBI can bypass encryption

November 3, 2014
posted by

CounterPunch CounterPunch
by Bill Blunden  

"James Comey's performance at Brookings was an impressive public relations stunt. Yet recent history is chock full of instances where the FBI employed malware like Magic Lantern and CIPAV to foil encryption and identify people using encryption-based anonymity software like Tor. If it's expedient the FBI will go so far as to impersonate a media outlet to fool suspects into infecting their own machines. It would seem that crooks aren't the only attackers who wield social engineering techniques. In fact the FBI has gotten so adept at hacking computers, utilizing what are referred to internally as Network Investigative Techniques, that the FBI wants to change the law to reflect this." (10/31/14)

http://www.counterpunch.org/2014/10/31/the-fbi-can-bypass-encryption/  

No Comments »

MCX confirms CurentC email breach

October 29, 2014
posted by

USA Today    

"E-mail addresses connected to a pilot program for payments service CurrentC have been breached, confirms the consortium that created the system. MCX confirmed 'unauthorized third parties' grabbed the e-mail addresses of some members of the CurrentC pilot program. The exchange says most addresses were 'dummy accounts' and that the app itself was not affected. ... The CurrentC payment system has vaulted into the spotlight after retailer Rite-Aid and CVS dropped support for Apple Pay in favor of the MCX system. Retailers who opt to use the CurrentC mobile payment system must do so exclusively, dropping access to rival services, according to a blog post from the creators of CurrentC." (10/29/14)

http://tinyurl.com/oent6dd  

No Comments »

Report: White House computer network hacked

October 29, 2014
posted by

Los Angeles Times    

"A White House computer network was hit by hackers, resulting in a series of outages and connectivity issues, a White House official said Tuesday. The official, who asked not to be named discussing the security issues, would not comment on who was believed to be behind the attack. Russian hackers were suspected, the Washington Post reported, citing unnamed sources." (10/28/14)

http://tinyurl.com/lxmw2sh  

No Comments »

Apple addresses iCloud hacks; Chinese regime denies hacking allegations

October 21, 2014
posted by

Mashable    

"On Monday, a group that monitors online censorship in China accused the People's Republic of intercepting traffic between local users and iCloud.com in an attempt to steal their passwords. In a so-called 'man-in-the-middle' attack, the Chinese government allegedly hijacked virtually all connections to iCloud.com from inside the country using a fake certificate. A day later, Apple appears to have thwarted the operation with a technical fix, though the company has not confirmed whether the change was a direct response to the attacks. ... The Chinese government has categorically denied being involved in the 'man-in-the-middle' attack." (10/21/14)

http://mashable.com/2014/10/21/apple-icloud-attacks-china/  

No Comments »

The Silk Road case outcome will impact us all

October 13, 2014
posted by

Students For Liberty Students For Liberty
by Brittney Little  

"The future of our internet freedom, privacy, and online commerce is at stake. On August 21, 2014, federal prosecutors charged the alleged creator of the Silk Road, Ross Ulbricht, with seven drug trafficking, narcotics, and ID theft charges after the FBI conducted illegal hackings against Ulbricht. FedEx is essentially facing many of the same charges for creating a way for people to obtain illegal substances. There is a lot that just doesn’t seem right here and the public should be demanding answers." (10/10/14)

http://tinyurl.com/m3gg6l6  

No Comments »

Attack code for “unpatchable” USB flaw released

October 6, 2014
posted by

BBC News [UK state media]    

"Computer code that can turn any almost any device that connects via USB into a cyber-attack platform has been shared online. Computer security researchers wrote the code following the discovery of the USB flaw earlier this year. The pair made the code public in an attempt to force electronics firms to improve defences against attack by USB." (10/06/14)

http://www.bbc.com/news/technology-29475566  

No Comments »

Of Russian hackers and Google cops

August 10, 2014
posted by

CounterPunch CounterPunch
by Alfredo Lopez  

"Last week, Google revealed that it had turned into police a Google user who had included child pornography on some of his emails. The company made clear that it had been investigating this guy and that its procedures for doing so 'cannot violate the privacy of other users.' This week, MicroSoft made a similar announcement about a similar investigation of data stored on its 'Cloud' storage system. It seems these guys can’t refrain from competing in whatever they’re into. It also seems that, as usual, these companies are playing an informational shell game when they explain what they’re doing and the threat it poses." (08/08/24)

http://tinyurl.com/pww72eq  

No Comments »

Our Sponsors





Making a living off your Drupal site?

Drupal Managed Hosting

Fed up with Maintenance and Hosting companies?