Gamigo’s 11 million passwords published in 500MB file, damage already done?

It seems that a user at password-hacking forum Inside Pro published a 500MB file earlier this month that was said to hold nearly 11 million passwords which were harvested from users over at the popular German gaming site Gamigo – at least that is what Forbes reports. The “offending” file that carries those passwords have since been removed, but Forbes believes that the damage has already been done as said file was hanging around cyberspace for weeks prior to being removed.

Steve Thomas, founder of data breach warning service PwnedList, mentioned to Forbes that the published passwords could very well make history as it is the “largest leak I’ve ever actually seen,” but at his final count, he managed to tally “just” 8.2 million unique email addresses and passwords – which is a good 3 million or so short of the 11 million as claimed by the original leaker. Hopefully nothing bad comes out of this in the long run – were you affected by Gamigo’s password leak, and have you already changed your password?

By Ubergizmo. Related articles: Nexus Q hack gives you home replacement launcher, new apps including Netflix, iCloud hacked?,

Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget

Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget

Admittedly, the headline is designed to get your dander up. You’re in no immediate danger of a technologically-gifted thief plugging a couple of wires into your hotel door and making off with your sack of souvenirs from the Mall of America. But that’s not to say it’s impossible. Cody Brocious, who was recently brought on by Mozilla to work on Boot to Gecko, is giving a presentation at the annual Black Hat conference in Vegas where he demonstrates a method for cracking open keycard locks with a homemade $50 device. The hack only works on locks made by Onity at the moment, and real life testing with a reporter from Forbes only succeeded in opening one of three hotel doors. Still, with between four and five million Onity locks installed across the country (according to the company), that is a lot of vulnerable rooms. The attack is possible thanks to a DC jack on the underside of the lock that’s used to reprogram the doors. This provides direct access to the lock’s memory, which is also home to the numeric key required to release the latch — a key that is protected by what Brocious described as “weak encryption.” Ultimately the source code and design for the Arduino-based unlocker will be published online alongside a research paper explaining how these locks work and why they’re inherently insecure. The hope is that manufacturers will take notice and improve the security of their wares before the world’s ne’er-do-wells perfect Brocious’ technique.

Filed under:

Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget originally appeared on Engadget on Tue, 24 Jul 2012 18:34:00 EDT. Please see our terms for use of feeds.

Permalink Ubergizmo  |  sourceForbes, Black Hat  | Email this | Comments

Free In-App Purchases Hack Will Be Dead in iOS 6 [Apple]

Late last week, Apple told developers that they’d have to use a workaround in their apps to prevent the in-app purchasing hack—which lets users avoid paying for in-app purchases— but that the same solution would also be rolled in iOS 6 as standard. Now, Alexey Borodin, the Russian behind the discovery, claims the workaround is impossible to hack. More »

DARPA-backed Power Pwn is power strip by day, superhero hack machine by night

DARPAbacked Power Pwn is power strip by day, superhero hack machine by night

Call the Power Pwn the champion of white hat hacking. Underneath that Clark Kent power strip exterior, there’s a Superman of full-scale breach testing that can push the limits of just about any company network, whether it takes 3G, Ethernet or WiFi to get there. Pwnie Express’ stealthy sequel to the Pwn Plug ships with a Debian 6 instance of Linux whose handy hacking tools are as easy to launch as they are tough to detect. There’s just one step needed to create a snoop-friendly Evil AP WiFi hotspot, and the box dodges around low-level NAC/802.1x/RADIUS network authentication without any help; in the same breath, it can easily leap into stealth mode and keeps an ongoing encrypted link to give do-gooders a real challenge. The hacker doesn’t even need to be in the same ZIP code to crack a firewall or VPN — the 3G link lets the Power Pwn take bash command-line instructions through SMS messages and doles out some of its feedback the same way. While the $1,295 device can theoretically be used for nefarious purposes, DARPA’s blessing (and funding) should help keep the Power Pwn safely in the hands of security pros and thwart more than a few dastardly villains looking for weak networks.

Filed under: ,

DARPA-backed Power Pwn is power strip by day, superhero hack machine by night originally appeared on Engadget on Sun, 22 Jul 2012 07:54:00 EDT. Please see our terms for use of feeds.

Permalink Wired  |  sourcePwnie Express  | Email this | Comments

ULTIMAte hack: Nexus 7 hooks up with external USB storage, floppy drive for retro-gaming

ULTIMAte hack Nexus 7 hooks up with external USB storage, floppy drive

There’s only so much kit you can cram into a sub-$200 tablet without pushing past the price ceiling. And for Google’s Jelly Bean-blessed Nexus 7, corners were definitely cut, leaving users without a handy microSD slot for expansion and rear-facing camera. But where there’s a will, there’s the XDA and its community of developers to remedy the situation. As you can glimpse from the photo above, an enterprising forum member by the handle of c0m47053 devised an interesting workaround for the slate’s lack of expandable storage and then some. Using the StickMount app available on the Play store, which allows users to mount/dismount mass storage devices, he was able to connect the ASUS-made tab to a USB hub and hook it up to a keyboard, mouse and, most amusingly of all, a floppy drive — to play Ultima on DOSbox, of course. It goes without saying that a feat of this kind requires root access, but thankfully that’s what Mountain View made the Nexuses for.

Filed under: , ,

ULTIMAte hack: Nexus 7 hooks up with external USB storage, floppy drive for retro-gaming originally appeared on Engadget on Sat, 21 Jul 2012 22:03:00 EDT. Please see our terms for use of feeds.

Permalink @arnoudwokke (Twitter)  |  sourcexda developers  | Email this | Comments

Apple offers temporary fix for in-app purchase hack

Late last week, we caught wind of a hack that allows iPhone users to receive content from in-app purchases without actually paying for it. Obviously, this is no good, and Apple announced today that it plans to fix the hack in iOS 6, which should be arriving sometime later this year. Of course, saying that it will fix the vulnerabilities in the next release of iOS doesn’t help much when developers are stuck dealing with this hack now, so Apple has also issued a temporary fix that should suffice until iOS 6 is available.


To make sure that you get the money from the content you offer in-app, Apple recommends that developers make use of its receipt validation system, which will compare in-app purchases made with the company’s own records to make sure that nothing fraudulent is going on. By doing this, developers have an extra layer of defense against the vulnerabilities, and should be covered until an official fix is issued along with iOS 6. Apple’s new support documentation goes into further depth about what developers can do to make sure that they aren’t being taken for a ride.

The hack itself allows users to bypass Apple’s validation servers when making an in-app purchase, instead using a proxy to connect to a third-party server and send bogus validation back to the app. This lets users receive the content without any money ever changing hands. It’s unclear how many iOS developers have been affected by this workaround, but CNET says that the number of fraudulent in-app purchases could be as high as 30,000.


Apple offers temporary fix for in-app purchase hack is written by Eric Abent & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Global spam falls by 18% as Grum botnet is knocked offline

There are dedicated botnets out there in the wide world that exist solely for the purpose of distributing spam. Grub, the third largest botnet in the world, was finally taken offline by security experts yesterday, resulting in a dramatic 18% reduction of global spam. Grum’s servers, which were based in Russia, Panama, and the Netherlands, controled around 100,000 PCs. The two botnets that take first and second place, Cutwail and Lethic, are still active.

It took three days for security teams to knock the Grum servers offline, and the team is confident that it won’t be able to start back up again anytime soon: “The botnet does not have any apparent fall back mechanisms that would allow it to spin back up easily in the days to come.” Two command and control servers in the Netherlands were targeted first, then a Panamanian ISP eventually shut down another after feedback from the community.

It wasn’t all that easy, however, as six new command and control servers were enabled in the Ukraine after the Panama server was shut down. Eventually the FireEye Malware Intelligence Lab enrolled heavy cooperation from Russian ISPs and domain registrars, bringing all the servers down once and for all on Wednesday. Some of the bots are still sending out spam, but researchers believe it will eventually wither and die as the template memory runs dry.

[via PCMag]


Global spam falls by 18% as Grum botnet is knocked offline is written by Ben Kersey & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Arduino Kegerator hack checks in your homebrews on Untappd

Arduino Kegerator hack checks in your homebrews on Untappd

Quite possibly the two greatest things in the world — beer and Arduino — have been married once again in a hack does them both justice. Accomplished maker and alcohol enthusiast Jeff Karpinski turned a spare Uno and an Ethernet shield into a gadget that automatically checks him in on Untappd. The build is connected to his kegerator through a hall-effect flow sensor that sits in his tap lines. Every time he pulls himself a pint of homebrew, the Aruino makes an API call to the so-called Foursquare for beer nerds, and updates his profile. Obviously, publishing to the site every time the keg is tapped could get messy, so there’s an automatic five minute time out to avoid getting repeat hits just for topping off. There’s also a button that manually engages the five minute lock out, allowing Jeff to pour his buddies a cold one without claiming the drink for himself on Untappd. And updating is a snap thanks to the simple web server that’s integrated. Changing what beer is on tap in the API call is as simple as opening a web browser. Interested in upgrading your own kegerator? Check out the source link for complete instructions and a parts list.

Filed under: ,

Arduino Kegerator hack checks in your homebrews on Untappd originally appeared on Engadget on Wed, 18 Jul 2012 14:49:00 EDT. Please see our terms for use of feeds.

Permalink Hack a Day  |  sourceJeff Karpinski  | Email this | Comments

HTC HD2 gets unofficial Android 4.1 Jelly Bean port, becomes the Phone That Would Not Die

HTC HD2 gets unofficial Android 41 Jelly Bean port, becomes the Phone That Would Not Die

There’s a golden rule for the HTC HD2: if there’s a new mobile OS, the HD2 must get a port. It’s practically a law of nature, then, that Evervolv at the XDA-Developers forums has produced a pre-alpha port of Android 4.1 for the originally Windows Mobile-based legend. More components are working than not despite the extremely early state, with the camera, Google Now and web browser being the remaining bugaboos. We’re still warned that the experimental firmware isn’t meant for day-to-day use, but there’s every intention of making the release stable — good news for anyone who’s eager to avoid a flash-in-the-pan ROM. If that happens, the HD2 will have had nearly as many lives as a cat.

Filed under:

HTC HD2 gets unofficial Android 4.1 Jelly Bean port, becomes the Phone That Would Not Die originally appeared on Engadget on Mon, 16 Jul 2012 23:38:00 EDT. Please see our terms for use of feeds.

Permalink Electricpig  |  sourceXDA-Developers  | Email this | Comments

Nexus Q hacked to run CM9 and XBMC, inches closer to usefulness

Nexus Q hacked to run CM9 and XBMC, inches closer to usefulness

The Nexus Q hacks are coming fast and furious now, and inching closer to true usefulness with each one. The latest is easily the most exciting — a port of full-blown CyanogenMod 9 and XBMC for Android. While the hack was the work of the actual CM team, the Q is not an officially supported device. There are still plenty of quirks and bugs to iron out, but WiFi and Bluetooth are both up and running. If you’ve got one of the expertly crafted magnesium spheres, there’s nothing stopping you from blessing it with a little custom ROM love. Just know that there’s still lots of work to do, especially on the XBMC for Android front which is still very much in the experimental stage. To see CM9 in action check out the video after the break and hit up the more coverage link for install instructions.

Continue reading Nexus Q hacked to run CM9 and XBMC, inches closer to usefulness

Filed under:

Nexus Q hacked to run CM9 and XBMC, inches closer to usefulness originally appeared on Engadget on Mon, 16 Jul 2012 14:41:00 EDT. Please see our terms for use of feeds.

Permalink TechnoBuffalo, The Verge  |  sourceCyanogenMod (Google+)  | Email this | Comments