| 

LulzSec Hacker Gets A Year For Sony Hack

  • Post author: Omid Farhang
  • Post published: April 20, 2013
  • Reading Time: 2 min
  • Word Count: 317 words

A former LulzSec hacker has been jailed for a year for ransacking Sony Pictures Entertainment’s computer systems. Cody Kretsinger, 25, from Decatur, Illinois – better known to his fellow LulzSec cohorts as “Recursion” – was also ordered to carry out 1,000 hours of community service, and a year of home detention, following his release from prison. He was sentenced by a Los Angeles court on Thursday, Reuters reports. Kretsinger had pleaded guilty to a single count of conspiracy and unauthorized impairment of a protected computer (i.e. computer hacking) in a plea-bargaining agreement. Kretsinger admitting breaking into the Sony Pictures website and extracting information which he passed on to other members of LulzSec, who leaked the data in order to embarrass Sony, a hated enemy of the hacktivist group. ...

Continue Reading LulzSec Hacker Gets A Year For Sony Hack

Java 8 release schedule delayed for renewed focus on security

  • Post author: Omid Farhang
  • Post published: April 20, 2013
  • Reading Time: 1 min
  • Word Count: 144 words

ISC Handler Rob V pointed out a blog post from Oracle’s Mark Reinhold stating that Oracle has “mounted an intense effort to address those issues in a series of critical-patch update releases” and that they’ve also upgraded their “development processes to increase the level of scrutiny applied to new code, so that new code doesn’t introduce new vulnerabilities.” Framing statements state that Oracle: is committed to continue fixing security issues at an accelerated pace will enhance the Java security model will introduce new security features recoginizes that more engineer hours are required than can be freed up by dropping features from Java 8 or otherwise reducing the scope of the release at this stage As such, the likely release of Java 8 will be in the first quarter of 2014 (had been intended for September 2013). ...

Continue Reading Java 8 release schedule delayed for renewed focus on security

Boston Marathon Bombing Links May Hide Java-Based Exploits

  • Post author: Omid Farhang
  • Post published: April 17, 2013
  • Reading Time: 3 min
  • Word Count: 629 words

PCMag: My social media accounts and email inbox are full of links to stories about the horrific incident in Boston earlier this week. I am reading about the victims, the bystanders and first responders that rushed to help, and looking for updates on the investigation. It turns out I should be careful about what links I click on, as cyber-criminals have already started exploiting the tragedy for their own nefarious purposes, security experts told SecurityWatch. ...

Continue Reading Boston Marathon Bombing Links May Hide Java-Based Exploits

Microsoft to plug holes in Windows Defender in Patch Tuesday

  • Post author: Omid Farhang
  • Post published: April 5, 2013
  • Reading Time: 1 min
  • Word Count: 190 words

Microsoft’s Patch Tuesday on 9 April will be an important spring cleaning day; the company plans to implement nine security bulletins. One of the bulletins deals with vulnerabilities in Windows Defender for Windows 8 and RT; the hole is rated as important and can be exploited to achieve elevated privileges. The headline bulletins will be the two critical security holes, one of which affects all versions of Windows and Windows Server, and another critical vulnerability which can be found in all versions of Internet Explorer. Whether the Internet Explorer fix will be addressing the IE vulnerability revealed at the recent Pwn2Own contest is unclear though. Both critical holes allow for remote code execution. ...

Continue Reading Microsoft to plug holes in Windows Defender in Patch Tuesday

Russian malware spies on US ATMs

  • Post author: Omid Farhang
  • Post published: March 31, 2013
  • Reading Time: 2 min
  • Word Count: 327 words

Security firm Group-IB has identified a malware program called Dump Memory Grabber that can take debit and credit card data from point-of-sale (POS) terminals and ATMs. The researchers say that the program has already been used to steal data from clients of US banks including Chase, Capital One, Citibank, and Union Bank N.A. as well as from clients with Nordstrom-branded cards. SecurityWeek reports the author of Dump Memory Grabber has put a video online to teach other hackers how it works. The Windows program written in C++ reads the target system’s memory using an external tool called mmon.exe. ...

Continue Reading Russian malware spies on US ATMs

Backdoor Uses Evernote as Command-and-Control Server

  • Post author: Omid Farhang
  • Post published: March 29, 2013
  • Reading Time: 1 min
  • Word Count: 98 words

With its rich functionality and accessibility, Evernote is a popular note-taking tool for its many users. Unfortunately, it may also provide the perfect cover for cybercriminals’ tracks. We recently uncovered a malware that appears to be using Evernote as a communication and control (C&C) server. The malware attempts to connect to Evernote via https://evernote.com/intl/zh-cn, which is a legitimate URL. The sample we gathered consists of an executable file, which drops a .DLL file and injects it into a legitimate process. The said .DLL file performs the actual backdoor routines. ...

Continue Reading Backdoor Uses Evernote as Command-and-Control Server

Turkish FlashPlayer? no! It’s malware

  • Post author: Omid Farhang
  • Post published: March 28, 2013
  • Reading Time: 1 min
  • Word Count: 98 words

I recently came across the file “FlashPlayer.exe” during the course of regular research. The file had been distributed with the file name FlashPlayer.exe and not surprisingly, when executed, it shows the following GUI, partly written in Turkish: Obviously, it’s disguised as an Adobe Flash Player 11 installer. Here is more info about the file: 1 2 3 4 5 6 7 8 9 10 File Name: FlashPlayer.exe MD5: e2856b1ad6c74c51767cab05bdedc5d1 SHA1: 1ac150ddb964722b6b7c96808763b3e4d0472daf CRC32: a8464606 SHA-256: b5f37cc44365a5a1b240e649ea07bbb17959ceddc3f8b67a793df694a6f03a88 SHA-512: e2d1388bd5feec51227cfa10a5606f7d3bc58f12ea95d688acb5178ff31a156a1092f739e7dd276f4c5368d89c33ed6a15b08ff5df294b9c3647905c1083921d SHA-384: 5d622afcf87e33334a446df5dfd2be7769cab596cc9a121bfd6269bc85ee980f75e1a2d1472f0eb379788845230d883b File Size: 561,152 Version: 2.01 Source: hxxps://flash-player-download.com/FlashPlayer.exe VirusTotal: Latest Report ...

Continue Reading Turkish FlashPlayer? no! It’s malware

IRS uncorks Dirty Dozen Tax Scams for 2013

  • Post author: Omid Farhang
  • Post published: March 26, 2013
  • Reading Time: 7 min
  • Word Count: 1377 words

The Internal Revenue Service today reminded taxpayers that there are plenty of scam artists and cybercriminals that want your money. The tax collection agency issued its “Dirty Dozen” list of tax scams that it says peak at this time of year and include: Identity theft Tax fraud through the use of identity theft tops this year’s Dirty Dozen list. Identity theft occurs when someone uses personal information such as your name, Social Security number (SSN) or other identifying information, without your permission, to commit fraud or other crimes. In many cases, an identity thief uses a legitimate taxpayer’s identity to fraudulently file a tax return and claim a refund, the IRS said. ...

Continue Reading IRS uncorks Dirty Dozen Tax Scams for 2013

Anonymous-linked groups hack Israeli websites, release personal data

  • Post author: Omid Farhang
  • Post published: March 25, 2013
  • Reading Time: 3 min
  • Word Count: 540 words

An anti-Israel hacking collective affiliated with Anonymous says it has initiated a widespread cyber attack against the Jewish state, penetrating websites affiliated with the Mossad security service and a slew of related entities. The hackers claimed late Friday that they have obtained and released personal information relating to 35,000 Israeli government officials, including politicians, military leaders, and police officers, according to a Twitter feed associated with the hackers. ...

Continue Reading Anonymous-linked groups hack Israeli websites, release personal data

Emma Stone’s twitter hacked

  • Post author: Omid Farhang
  • Post published: March 25, 2013
  • Reading Time: 1 min
  • Word Count: 186 words

3/22/2013: Emma Stone revealed that she was not behind the ambiguous tweets concerning boyfriend Andrew Garfield and co-star Shailene Woodley that sparked cheating rumors. Speculation surrounded Stone’s mysterious “tweet and delete” spree over the past few months. Emma addressed the rumors on an On Air with Ryan Seacrest radio interview. One tweet in particular on her Twitter appeared to be an anagram that solved to read, “Andrew and Shailene sitting in a tree.” ...

Continue Reading Emma Stone’s twitter hacked