More

Pages

Thursday, 30 August 2012

50 EU Government sites Hacked & Defaced By Robot Pirates

Paksitani hacker name Cfr and Dr Ninja From Robot Pirates hacked 50 government sites. EU Governement servers are consider as one of most secure servers in world and it is defiantly not easy to break security of server like these. This also raise lot of question for security experts that how much more security is need in cyber space.


The list of impacted sites was published on Pastebin yesterday, but at press time, most of them still weren’t restored.


Hacked site says:
Game is not 0ver Yet!
Pwn3d By Cfr
[#] Too hot to handle, Too cold to hold . . . Inernet belong to Us! Not we Belong to net
We Are
Cfr - Zqor - Cos - Reaper - Dr Ninja "


Hacked Site & Mirrors List:
http://www.paste.to/MTA0MTgyMw==

US Air Force is spending $10 million For Hacking

The US Air Force is spending $10 million on an effort to hack into opponents’ computer networks to “destroy, deny, degrade, disrupt, deceive, corrupt or usurp” their ability to use the Internet to their advantage.

The ability to hack into networks is part of a list of the military’s “Cyberspace Warfare Operations Capabilities” that it wishes to acquire, reports Wired.

Instead of giving the ability to conduct cyber strikes solely to the White House, the Air Force wants its Trojans and worms to be available to its own officials, including top personnel and operational commanders.



Last week, the Pentagon announced a new $110 million program to make cyber strikes a more routine effort in wartime military operations. “Plan X,” as the Pentagon named it, will officially begin on September 20, but Darpa has already invested $600,000 to cyber security firm Invincea to begin its research immediately.

In early 2007, the Pentagon declared that it “had no plans to shift its cyber warfare focus from a defensive mindset to an offensive one.” But later that year, the Air Force began developing offensive cyber attack strategies, which have materialized into budgeted plans this year.

Other branches of the military are also discussing hacking as a war strategy.

“I can tell you that as a commander in Afghanistan in the year 2010, I was able to use my cyber operations against my adversary with great impact,” said Lt. Gen. Richard Mills at a technology conference last week. The lieutenant general also discussed a Marine company that will be stationed at the National Security Agency to “increase the availability of intelligence analysts, intelligence collectors and offensive cyber operations … so that forward deployed commander in the heat of combat has full access to the cyber domain.”

Invincea, the company in charge of putting together the cyber security project, was contracted one month after it contacted the government with its proposal. The firm has worked with the government before, analyzing cyber attacks facing the US.

As malware becomes increasingly more common, the US has changed its cyber status from defensive to offensive.


Cyber attack takes Qatar's RasGas offline

RasGas, the second largest producer of Qatari LNG after Qatar Petroleum, has been hit with an "unknown virus" which has taken the company offline.

A RasGas spokesperson confirmed that “an unknown virus has affected its office systems" since Monday 27 August.

RasGas confirmed the situation by fax yesterday. “RasGas is presently experiencing technical issues with its office computer systems,” said the RasGas fax seen by Oil & Gas Middle East, dated 28 August. “We will inform you when our system is back up and running.”




Emails to verified addresses at RasGas bounced back with a permanent delivery failure error message. and the RasGas website (www.rasgas.com) is down.

The RasGas spokesman said the virus has “no impact whatsoever on operations in Ras Laffan Industrial City and there are no issues with cargo deliveries.”

“Everyone is reporting to work as normal,” the spokesman said. “We are working with ICT Qatar to resolve the situation as soon as possible.”

The news follows a malware attack against Saudi Aramco on 15 August which forced the world's largest oil company to take down its company-wide office systems for 12 days.

RasGas, a joint venture between QP and ExxonMobil, comprises seven giant LNG process trains in Ras Laffan, Qatar. The company exports 36.3m tonnes a year of LNG, most of which under long-term contracts with customers in Korea, India, Italy, Spain, Belgium, Taiwan, and the Americas. The company us also responsible for around 10% of global helium production.

RedHack Lashes Out at Anonymous Turkey (AnonsTurkey)

The members of the now-infamous RedHack collective are displeased with the fact that Anonymous Turkey (AnonsTurkey) is relying on the Anonymous name “for their personal interests.”

The hacktivists released a statement to ensure that everyone understands that they’re not against Anonymous, but they’re against the teenagers who run AnonsTurkey.

“Relationship between Redhack and Anonymous goes back to the time of 4chan in 2005. We continue to be in solidarity with active and true hackers within Anonymous and offer our help within our capabilities when it is required,” members of RedHack said.



RedHacks coordinated numerous Anonymous Turkey operations, but at one point some of the members of the latter group decided to take matters into their own hands.

“We always thought that they were young and might change positively. But then they were not happy about us being socialist and our revolutionary values were hard for them to accept,” they explained.

“According to them we should act within the norms of ‘official ideology’ and act around the chauvinism that was imposed on people and the brotherhood relations with the Kurdish people should have been cut off.”

The members of Anonymous Turkey who didn’t condone with RedHack’s views formed their own “Anonymous Turkey” (AnonsTurkey).

When the controversial hackers were appointed as terrorists by the Turkish government, this new collective revealed its support, but because of their “track record” RedHack turned down their offer.

Immediately after, AnonsTurkey announced that they no longer support RedHack and a feud began.

RedHack members conclude their statement by saying that their relations with AnonTurkey will not influence their relationship with Anonymous activists in any way.

On the other hand, it’s almost impossible for all hackers to get along with one another when the Anonymous name is free-for-all. A similar situation occurred when the protest against the Republican National Convention in Tampa was announced.

Researchers Unable to Link Mysterious Wiper Malware to Flame

Researchers Unable to Link Mysterious Wiper Malware to Flame

Researchers attempt to find link between Wiper and Flame, but to no avail

After further analyzing the traces of the mysterious Wiper malware, researchers are still unable to precisely determine how it works. They also haven’t been able to find a clear link between it and Duqu, Stuxnet or Flame.
Back in April, the Iranian Oil Ministry reported sightings of a destructive piece of malware that attempted to extract information and then wipe it from the infected devices, hence the name Wiper.

Kaspersky was called in to analyze the attack that took place sometime between April 21 and April 30. The malware’s developers destroyed all the pieces of information that could be used to properly analyze Wiper. 

However, their investigation led them to another interesting thing: the now-infamous Flame.

“The malware was so well written that once it was activated, no data survived,” Kaspersky experts explained

“So, although we’ve seen traces of the infection, the malware is still unknown because we have not seen any additional wiping incidents that followed the same pattern as Wiper, and no detections of the malware have appeared in the proactive detection components of our security solutions.”

They claim that we may never find out precisely what Wiper was and although it led them to discover Flame, they believe that the two are not connected. 

Some common filenames indicate a possible connection to Duqu and Stuxnet, but there isn’t enough evidence to say this for sure. 

Furthermore, experts believe that the creators of Shamoon, the recently discovered malware, have been inspired by Wiper to develop their own Trojan. 

“The fact that the use of Wiper led to the discovery of the 4- or 5-year-old Flame cyber-espionage campaign raises a major question. If the same people who created Duqu/Stuxnet/Flame also created Wiper, was it worth blowing the cover of a complex cyber-espionage campaign such as Flame just to destroy a few computer systems?” experts concluded.

Phishers Promise Woolworths Gift Certificates in Return for Sensitive Information

Phishers Promise Woolworths Gift Certificates in Return for Sensitive Information

Woolworths phishing page


Last week we reported about the existence of a Facebook scam that was trying to trick users into visiting various websites by promising them $500 gift vouchers from Woolworths. Now, the Australian supermarket chain’s reputation is once again used in a malicious campaign.

It all starts with an email entitled “Customer Satisfaction Survey” which reads: You have been selected to access the Woolworths 5 questions Survey and win a $50.00 gift certificate. Please click here and complete the form to receive your reward. Thank you.


 Those unfortunate enough to fall for it and click on the link are taken to a webpage that displays a standard survey with questions such as “Do you think Woolworths employees are friendly and helpful?”

However, the fact that the user provides the answers to the five questions isn’t the main issue, Hoax Slayer notes.

In order for the $50 (€40) credit to be added to their accounts, customers must provide their personal details, including name, address, suburb, postal code, driver license, Medicare card number, individual reference number, date of birth, credit card number, expiration date and CVV.

Once the Continue button is pressed, all this valuable information is stored in a database owned and controlled by the cybercriminals who run the campaign.

To ensure that they can trick as many people as they can, the phishers added the following message to the top of the malicious webpage: Only one survey per credit card is allowed. If you own multiple cards you can run the survey again for each.

This way they can obtain the details from multiple credit or debit cards from one single victim.

Those who have already fallen for this scam and provided the fraudsters with their details are advised to immediately contact the card issuer. The large amount of information could also be used to commit identity theft, which is why we recommend victims to contract the services of a company that deals with fraud prevention.

Intuit Security Tool Spam Campaign Making the Rounds Once Again

Intuit Security Tool Spam Campaign Making the Rounds Once Again

Fake Intuit email

Around one and a half years ago, malicious emails claiming to originate from Intuit attempted to convince recipients that they need to install a piece of software in order to access their QuickBooks accounts, giving them a three-day deadline to comply.

It seems that this spam campaign has been reinitialized in an attempt to steal sensitive information from Intuit customers. Here’s what these emails look like:


 You will not be able to access your Intuit QuickBooks account without Intuit Security Tool (IST) after 31th of August, 2012.

You can download Intuit Security Tool here.

After a successful download please run the setup for an automatic installation, then login to Intuit Quickbooks online to check that it is working properly.

Basically, the email looks exactly the same as the old variant, but the cybercrooks updated the date, and most likely they’ll continue doing so.

The links from the email currently lead to a compromised website from Denmark on which the cybercriminals planted a phishing webpage.

The company has warned users to avoid such emails ever since the campaign started. They highlight the fact that legitimate emails will never contain “software update” or “software download” attachments.

Furthermore, Intuit will never ask customers for their usernames and passwords. Finally, similar to other organizations, they promise never to request banking information or credit card details via email.

And this is not the only type of Intuit email you should beware of. Back in June we reported that fake Intuit tax information update notifications were making the rounds, luring recipients to another hijacked website from Denmark.

Users are advised to report any suspicious emails to spoof@intuit.com. By reporting suspicious emails you can help the company keep all its customers informed on the latest threats that may be leveraging its reputation to cause damage to the computers of unsuspecting internauts.

Times reporter arrested over police blogger hacking


Times reporter arrested over police blogger hacking

Senior executives at The Times newspaper could be questioned by police investigating allegations of computer hacking after a former reporter was arrested on suspicion of conspiracy to pervert the course of justice.


A former Times reporter has been arrested for allegedly hacking into an anonymous police blogger’s email account in an attempt to expose his identity.


Patrick Foster, 28, a former media reporter at Rupert Murdoch’s paper, was arrested at his North London home this morning for allegedly hacking into the email account of an anonymous police blogger named Nightjack in 2009.
The Times subsequently went to the High Court and successfully overturned an injunction banning them from naming Nightjack as Lancashire Police detective Richard Horton.
At the hearing before Mr Justice Eady in June 2009, lawyers for the newspaper argued that Mr Foster had used legitimate journalistic methods to identify Mr Horton.
But the paper’s editor James Harding was later forced to apologise to Mr Justice Eady and Mr Horton, after admitting senior figures had failed to disclose that they knew about the computer hacking when the hearing took place.
In March this year the newspaper’s former legal chief, Alastair Brett, came under fire when he gave evidence to the Leveson Inquiry into press standards admitting he had made a “mistake” by failing to divulge that he knew about the hacking before the Times went to court.
Scotland Yard today confirmed that a 28-year-old journalist had been arrested over the alleged computer hacking, but stating that he was also being questioned over conspiracy to pervert the course of justice, related to the alleged cover up.
Mr Foster’s arrest is the 11th as part of Operation Tuleta, a Metropolitan Police Investigation into alleged computer hacking by journalists, but the first related to the Nightjack incident.
News International, publisher of Times, declined to comment on Mr Foster’s arrest.
The Metropolitan Police said in a statement on Wednesday: “Officers from Operation Tuleta, the investigation into criminal breaches of privacy including computer hacking which is being carried out in conjunction with MPS phone-hacking inquiries, arrested a man in North London this morning, 29 August.
“The 28-year-old man, a journalist (Tuleta arrest 11) was arrested at his home address at approximately 07.00 hrs for suspected offences under the Computer Misuse Act 1990 and suspected conspiracy to pervert the course of justice, contrary to the Criminal Law Act 1977
“He is being questioned at a North London police station about alleged computer hacking relating to the identification of a previously anonymous blogger in 2009.”
News International, publisher of Times, declined to comment on Mr Foster’s arrest.

Internet Download Manager v6.12.11


Description Internet Download Manager v6.12.11:
Internet Download Manager v6.12.11 is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM