Microsoft confirms LIVE accounts hacked, pulls Xbox Entertainment Award app

Microsoft has issued a statement confirming that some of its “high-profile” Xbox LIVE accounts that are said to belong to both former and current employees have been hacked, reports the folks over at ars technica, which was cyberattacked yesterday by the same hacking group. Known as Team Hype, the hackers are suspected to have caused a host of grief, including having possibly caused a police raid on Brian Krebs, a security reporter.

xbox live

Said Microsoft to ars technica: “We are aware that a group of attackers are using several stringed social engineering techniques to compromise the accounts of a handful of high-profile Xbox LIVE accounts held by current and former Microsoft employees. We are actively working with law enforcement and other affected companies to disable this current method of attack and prevent its further use.”

In addition, Team Hype is said to use stolen Social Security numbers and credit information to take over Xbox LIVE accounts, according to Krebs, who has also linked one of the hackers with ordering DoS attacks on both his own and ars technica’s websites. The hackers made public videos of them holding account hijacking sessions, with some of those hijacked accounts then being sold to LIVE users.

Earlier today, Microsoft also confirmed that Xbox LIVE users who had used the Xbox Entertainment Award app were compromised, with the Entertainment website having displayed approximately 3,000 instances of gamertags and private information, such as addresses and names. As a result, Microsoft has temporarily pulled the app while it sorts out the issue, directing concerned customers to its Xbox Security Web page.

[via ars technica]


Microsoft confirms LIVE accounts hacked, pulls Xbox Entertainment Award app is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

iOS 6.1.3 lock-screen bypass bug provides access to Contacts and Camera Roll

Yesterday, Apple rolled out iOS 6.1.3, patching up the popular Evasi0n jailbreak and, as a video we have available after the jump shows, introducing a security vulnerability that allows the lock screen to be bypassed. This is despite the fact that the latest iOS release contains fixes to previous vulnerabilities that allowed anyone to skip the lock screen.

Screenshot from 2013-03-20 20:10:39

The newest security issue isn’t terribly easy to pull off, although anyone with a bit of dedication could manage it. The problem was surfaced by YouTube user videosdebarraquito, who posted a video showing the entire method using an iPhone 4. This was followed up by others confirming that they managed to reproduce the bug, including the folks over at The Next Web.

As you can see on the video above, the bug is exploited by removing the SIM card at a certain moment while initiating a call via voice commands. Doing this provides access to the handset’s Contacts and Camera Roll, which can be fully browsed and edited. The obvious solution until Apple rolls out a fix for this lock screen bypass is to shut off the voice dialing feature.

Some user reports are coming in that this exploit does not work when using Siri, but some have published that they’ve managed to get it to work on the iPhone 5. The full effect of the bug will only be known as word spreads and more variations of the iPhone are tested, but for now it would seem those operating pre-Siri are vulnerable to the issue.

[via The Next Web]


iOS 6.1.3 lock-screen bypass bug provides access to Contacts and Camera Roll is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

South Korea hacked: North Korea key suspect in cyberattack

A huge cyberattack on South Korean banks, broadcasters and others, believed to be one of the most serious in the country’s history, has left investigators hunting for evidence of North Korean involvement as infrastructure struggled back online. Systems at multiple banks and two insurance companies were either forced offline or severely impacted in the attack, which began at roughly 2pm local time; three TV stations were also targeted and suffered downtime. However, despite strong suspicions at North Korean involvement, spokespersons from South Korean agencies insist it’s too early to lay the blame at their insular northern neighbours.

seoul

“We’re looking into the cause of the shutdown,” a spokesperson for South Korea’s president told the WSJ, “but we can’t say North Korea is behind it.” The country’s communications agency described the attacks as the result of “malicious code” though held off suggesting potential culprits.

Some reports have suggested that skulls were seen on the impacted systems, though that has not been corroborated as yet. Television networks KBS, MBC, and YTN all confirmed problems to the National Police Agency, Korea’s Yonhap News reports, in addition to Shinhan Bank and Nonghyup Bank.

However, there was either no attack or no impact of an attempted attack on any South Korean government sites, nor military services. It’s possible the targets were selected because they were considered more vulnerable than their government counterparts.

There are suggestions that the attack may have been connected to recent North Korean allegations that South Korea and the US had themselves been hacking systems, the New York Times reports, targeting North Korean websites as part of joint military exercises this month. On Friday last week, a North Korean spokesperson said that the country would “never remain a passive onlooker to the enemies’ cyberattacks that have reached a very grave phase as part of their moves to stifle it.”

Technicians quickly worked to bring the systems back online, discovering a virus that had prevented computers from booting. A longer-term investigation into the root cause and origins of the attack is still underway. “We cannot rule out the possibility of North Korean involvement,” a South Korean defense department spokesperson said, “but we don’t want to jump to a conclusion.”


South Korea hacked: North Korea key suspect in cyberattack is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Xbox Live Accounts Of ‘High Profile’ Microsoft Employees Hacked

Xbox Live Accounts Of High Profile Microsoft Employees Hacked

We don’t know if Stepto has been hacked again. This is just an example image of a “high profile” account.

South Korea isn’t the only place to see some hacking activity occur today as Microsoft has been the victim of a number of “high profile” accounts get hacked.

“A handful of high-profile Xbox LIVE accounts held by current and former Microsoft employees” have in fact been compromised, said Microsoft in a statement to The Verge. The method used to acquire access to these accounts reportedly utilized the employee’s social security numbers along with some social engineering, which we assume means using pictures of the meals they are about to eat during their travels. Microsoft denies the SSNs were obtained from their connected Xbox Live account, instead pointing blame at a third party for the leaked SSNs.

Microsoft says they’re working with both “law enforcement and other affected companies” in order to hopefully close the hole this hack uncovered. At this time no one knows who exactly carried out these attacks on the high profile Xbox Live accounts, although ultimately we’re sure you’re glad you probably don’t consider yourself a high profile person. And if you are, well, we think you might want to keep an eye on your Xbox Live account for a couple of days.

By Ubergizmo. Related articles: Stinky Footboard: A PC Gaming Accessory In The Right Direction?, SimCity 1.7 Update Helps Fix Traffic Congestion,

Yet another Samsung lockscreen hack identified

A new Samsung lockscreen hack has been identified, allowing unofficial access to PIN-secured Galaxy smartphones through a combination of keypresses and commands, though Samsung is apparently working on a software fix. The exploit relies on brief visibility of the phone’s display, unlocked, after a failed emergency call placed from the lockscreen; though ponderous, you could use that access to download a screenlock disabler from the Google Play store.

galaxy_note_ii

The flaw was identified by Terrence Eden, who has something of a track record for spotting Samsung exploits. Earlier this month he found ways to bypass the lockscreen security on the Galaxy Note II, a hack which then prompted another researcher to come forward with a second hack, this time for the Galaxy S III.

Eden’s latest discovery only allows for a brief period of interaction with the momentarily-unlocked phone at a time, but given sufficient access to repeat the process, it could allow for calls to be placed, apps downloaded, data viewed, or other illicit use to be made of the handset.

Eden says that he’s been in communication with Samsung around the issue, and that the company will have a patch to address the loophole that it intends to release “shortly.” He also offered to withhold an announcement of the exploit until that happened, something Eden says Samsung declined.

Until it’s patched, however, there’s no way to avoid the problem, bar removing Samsung’s ROM and replacing it with a more standard Android installation. As ever, be careful who you leave your phone with.


Yet another Samsung lockscreen hack identified is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

EA Origin exploit leaves 40m at potential hack risk

A vulnerability in EA’s Origin online gaming platform could allow remote hackers to run dangerous code on gamers’ computers without permission, by perverting links used to load titles like Crysis 3, its been revealed. Identified by ReVuln researchers Luigi Auriemma and Donato Ferrante, and presented last week at the Black Hat security conference, the exploit relies on the URI links the Origin desktop client uses to trigger local software from the cloud, and which can be modified to install malware instead.

origin_hack

At its root, the hack [pdf link] is broadly similar to an exploit explored last October by the same research team. The URI links can be tweaked to point to compromised Windows .dll files, which themselves can be used to download malware, tracking software, tools to extract personal details from the user’s local files, or other spyware.

In the case of Crysis 3, the ReVuln researchers showed how a specially crafted link using Origin’s “origin://LaunchGame/<GameID_1>” URI terminology could even open up malware without the authors knowing what games were installed on the target PC. Should the user have allowed Origin to run all URI links without requiring specific approval each time, meanwhile, the exploit could be carried out completely transparently to them.

It’s not an approach EA is unaware of, though it’s uncertain whether the games company was aware of this specific hack. “Our team is constantly investigating hypotheticals like this one” a spokesperson told Ars Technica, “as we continually update our security infrastructure.”

For the moment, the advice to the 40m gamers potentially at risk from exploits of this sort is to disable the “origin://” URI; that’s possible with a tool like Nirsoft’s URL Protocol View app. Games can still be run directly from Origin, but not using custom URIs.


EA Origin exploit leaves 40m at potential hack risk is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Hackers use Crown Casino’s own security cameras to beat the house

An Australian casino called Crown Casino was hit by a group of high-tech hackers. The hackers co-opted the casinos own security cameras for the heist that saw them to make off with about $33 million. The hackers broke into the casino’s surveillance camera network and used the cameras to gain an advantage during some high-stakes card games.

crown

According to reports, the heist took place over only eight different hands of cards before the gambler in the casino was captured. Apparently, the person in the casino was a high roller described only as a foreigner that regularly bet and lost lots of money. The security cameras that were used by the hackers during the highest were in the VIP high-roller room of the casino.

The hackers operating the cameras passed the gambler signals to tip them off about the cards that his opponents held. Apparently, the gambler was staying with his family in the Crown Towers in Melbourne Australia when the casino discovered the fraud. The man was kicked out of the casino and is banned from returning.

Reports indicate that it’s surprisingly easy to intercept signals from many casino cameras if the casino isn’t taking precautions. The casino hopes to recover some of the money that was taken during heist. At this point, there’s no indication of whether or not criminal charges will be filed or if any of the hackers who gained access to the casino’s camera system were caught.

[via Wired]


Hackers use Crown Casino’s own security cameras to beat the house is written by Shane McGlaun & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

The Legend Of Zelda Sees Role Reversal

Househusbands, how are you the envy of other men out there who prefer to be in your shoes, where you are able to wake up late, have no kids to send to school yet, and basically keep the house in good working order, cooking dinner as the corporate, high-flying wife returns home from work. Well, role reversals are an interesting topic to explore, and an enterprising gamer decided to hack The Legend of Zelda, with Princess Zelda doing all of the swashbuckling work instead of Link.

Needless to say, the entire narrative will have to change from a brave man who is out to save a kingdom as well as a hot digitized chick, where a powerful warrior princess is now out to save her kingdom and a handsome in distress. I guess you might as well call this The Legend of Xena, Warrior Princess instead. You can check out the role reversal in the YouTube video above and have a good time reminiscing about the days of yore. What are some of the other games which you would like to see hacked, where the damsel in distress is now the savior of the game universe?

By Ubergizmo. Related articles: SimCity Developer Confirms Game Could Run Offline, Resident Evil 6, Left 4 Dead 2 Crossing Over In Free Update This Spring,

Two men hacked Subway to steal gift cards totaling $40,000

Two men were charged for an elaborate hacking scheme. They have been identified as Shahin Abdollahi, whose alias was Sean Holdt, and Jeffrey Thomas Wilkinson. The two men hacked over 13 point-of-sale (POS) computers at a variety of Subways located in Massachusetts, Wyoming, and California. This isn’t the first time Subway’s been hacked. Last September, the franchise’s credit card terminals were hacked at over 150 of its locations. It suffered $10 million in losses and 146,000 accounts were compromised.

Untitled

Abdollahi and Wilkinson went through an elaborate scheme to execute their plans. Abdollahi operated his own POS business, called “POS Doctor”. There he sold POS computers to various Subways, and he preloaded his LogMeIn (remote desktop tool) information into those machines. In order to get a better understanding of how Subway and their POS systems worked, he operated a few of his own Subway franchises in Southern California.

After learning how Subway operates and how they use their POS system, he and Wilkinson then remotely accessed Subway’s POS systems to create fake gift cards totaling up to $40,000. They took the fake gift cards and sold them either on eBay, or Craigslist. According to the reports, Abdollahi’s hacked systems were sold to a variety of other businesses besides Subway as well.

The two men were charged with computer intrusion and wire fraud. It seems like they did an awful lot of scheming and prep work just to create fake gift cards. Abdollahi went through alot of hassle of owning his own POS company and a few Subways just to get this plan into motion. It’s speculated that Subway was just the testing grounds for an even bigger scheme the two had planned.

[via Ars Technica]


Two men hacked Subway to steal gift cards totaling $40,000 is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Legend of Zelda hack makes Link the damsel in distress

Inspired by the father who modded Donkey Kong so his daughter could play the Princess, another person had the idea of modifying another classic Nintendo game. Kenna W has always loved The Legend of Zelda series, and she always wanted to play the game as Princess Zelda instead of the male protagonist, Link. She wished that she had someone who could do for her what that man did for his daughter. She then realized, “I’m an adult now. If he could work it out, I could too.”

Legend of Zelda hack makes Link the damsel in distress

She worked tirelessly for 3 days to transform the classic Legend of Zelda. She had help from her boyfriend, a professional video game programmer, who told her that there was a ROM editor that could help simplify the process. They discovered tools around the internet that helped them modify the game, and what they realized was that you don’t necessarily need to be a programmer to modify these games (so if you want to modify Final Fantasy, or Teenage Mutant Ninja Turtles, start digging).

By using Tile Layer Pro, she and her boyfriend were able to find Zelda’s sprites and edit them. Her boyfriend also found a code file that let Kenna change the colors of Zelda’s clothing. After modifying the ROM to have Zelda replace Link in-game, Kenna also modified the opening text to change Link’s story into Zelda’s. She also debated making Link a “prince” or a “knight”, but in the end she decided to leave him as just good ol’ Link.

The mod took Kenna and her boyfriend a lot of work to accomplish, and she credits her success to all of the various, already-available modding tools, as well as this Legend of Zelda:ROM Map, and the Computer Archeology. Kenna made the patch available to the public via her Google Drive (available through the link below). You have to find the unedited Legend of Zelda NES ROM yourself however. With Donkey Kong and Legend of Zelda hacked, I wonder which game is coming next.

[via Kenna Stuff]


Legend of Zelda hack makes Link the damsel in distress is written by Brian Sin & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.