Ubisoft hacked with usernames and passwords stolen, financial info safe

It’s been a bit of awhile since we’ve heard about a large online service hack, but we should’ve knocked on wood when we had the chance. Ubisoft has confirmed that some of its “online systems” were hacked, with only usernames, email addresses, and passwords stolen. The game publisher says that financial information is safe, since that info isn’t kept by Ubisoft.

timthumb

Obviously, Ubisoft is recommending that all account holders change their passwords on ubi.com, as well as on other websites where they use the same password. Of course, it’s good practice to not use the same password for everything, as that could start a chain reaction if your password gets stolen on one service.

However, Ubisoft says that the passwords are encrypted on their servers, so while the hackers didn’t have the passwords themselves at the time of the breach, Ubisoft says they “could be cracked, in particular if the password chosen is weak,” which is why the company is recommending that its users change their passwords as quickly as possible.

51rEm9gy4GL._SY445_

Unfortunately, specifics about how the breach happened weren’t disclosed by Ubisoft “for security reasons,” but they said that the hack did not affect their Uplay gaming service. Currently, ubi.com is “under maintenance,” and isn’t accessible at this time because the publisher is working on solving the attack.

Ubisoft is just one of the multiple big game publishers that will be releasing games for the Xbox One and PlayStation 4 later this year. Watch Dogs seems to be one of the big games to hit the new consoles in the fall, and the publisher looks to go all-in on the next-generation of gaming.

SOURCE: Ubisoft Blog


Ubisoft hacked with usernames and passwords stolen, financial info safe is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2013, SlashGear. All right reserved.

iOS 7 jailbreak claimed by infamous iOS hacker

The second beta for iOS 7 was just released last week, but iOS hackers are undoubtedly working around the clock to jailbreak the new version of iOS, and it seems like it has been accomplished as one famous iOS hacker as posted a screenshot of what appears to be a jailbroken version of iOS 7,

Read The Full Story

Microsoft unveils bug bounty programs and rewards starting June 26

Microsoft has announced that it is kicking off three bounty programs this month to encourage hackers to find bugs and exploitations. Each bounty program has its own cash reward, with the highest one being $100,000, and the lowest being $11,000. All three bounty programs start on June 26, and with two of them having an

Read The Full Story

Banks brace for cyberwarfare drill Quantum Dawn 2

Banks brace for cyberwarfare drill Quantum Dawn 2

Come June 28th, Wall Street outfits including the likes of Citigroup and Bank of America will be under siege — from fake hackers, that is. Representatives from a total of 40 companies along with the Federal Reserve, Securities and Exchange Commission, US departments of Treasury and Homeland Security will take part in Quantum Dawn 2: a simulated cyberattack on faux trading and information systems. Led by the Securities Industry and Financial Markets Association, the drill will test the ability of participants to cooperate via email and phone to suss out what’s going on and hatch a plan. The exercise will momentarily pause so that those involved can decide on a course of action, and then it’ll speed up and model the effects of the decision over a longer period of time. With the recent flurry of hacking incidents and international finger pointing, something tells us this won’t be the last we hear of drills like Quantum Dawn.

[Image credit: MoneyBlogNewz, Flickr]

Filed under:

Comments

Via: AllThingsD

Source: Reuters

Chinese hackers steal US advanced weapons blueprints according to report

It seems you can’t go a day without hearing a new report about hackers, whether they’re of the annoying Twitter-hijacking variety or the more troublesome DDoSing type. Some, however, are more insidious, including the Iranian hackers who are actively attacking the United States’ energy industry. Now a leaked government document shows that Chinese hackers have accessed designs for some of the nation’s most advanced weapons.

Blueprints

The information is said to come from a report that was made for the Pentagon detailing a breach of data in which Chinese hackers gained access to the blueprints of advanced US weapons systems. According to The Washington Post, in excess of two dozen “major” systems were compromised, including ones said to be essential to the nation’s defense against missiles.

The report was created by the Defense Science Board, which is comprised of a combination of civilian and government experts. Such experts say that the Chinese government getting its hands on such sensitive data as weapons designs could have two-fold ramifications: on one side of the scale, it could fuel China’s development of such weapons, and on the other side it could weaken the US’ advantage that results from having these systems.

According to officials who are said to have knowledge of the situation, most of these breaches are parts of China’s overall cyberattacks that have been hitting companies – particularly of the media variety – for some time now. The attacks are said to be against both the US government’s various agencies, as well as its defense contractors.

While specific information on what the hackers acquired isn’t available, it is said that the missile system PAC-3, ballistic missile system Terminal High ALtitude Area Defense/THAAD, and ballistic missile defense Aegis of the US Navy were all compromised. Likewise, the F/A-18, Black Hawk heli, V-22 Osprey, and Littoral Combat Ship all had designs compromised.

SOURCE: The Washington Post


Chinese hackers steal US advanced weapons blueprints according to report is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

US energy industry under cyberattack by Iranian hackers

Unnamed United Stated officials, both current and former, spoke with the folks at the Wall Street Journal, revealing that hackers backed by the Iranian government have ramped up cyberattacks against the US, specifically zeroing in on the control systems that manage the energy industry. Unlike the Chinese hackers who have infiltrated various US companies, the intent behind the Iranian hackers appears to be sabotage.

DoE

The United States is no stranger to cyberattacks from Iran, which has been carrying on DDoS attacks against various bank websites for some time now. The difference with the latest attack from the nation is the potential for damage it provided, as well as showing a different area of intent behind the hackers’ motives, one that points toward wrecking havoc and causing disruption.

Reportedly, this newest attack by the hackers, according to a former US official, provided them with access to the control system for various gas and oil pipelines. Such a breach went “far enough to worry people.” That’s not all, however, with it also being reported that the hackers are using surveillance to access data, having accessed information on how to destroy or otherwise harm the systems controlling company operations.

It was suggested by one official that Iran could end up provoking a response from the United States if it does not back off its cyberattacking efforts: “This is representative of stepped-up cyber activity by the Iranian regime. The more they do this, the more our concerns grow. What they have done so far has certainly been noticed, and they should be cautious.”

Which oil, gas, and electric companies are being targeted was not specified, with the officials only saying that some of them lie along the US and Canadian border. Likewise, the proof that Iran is behind the attacks wasn’t specified either, with the officials merely saying that there is “technical evidence.” Not surprisingly, Iran denies having engaged in any such activities, but did point out that it has suffered these kind of attacks from the US.

SOURCE: Wall Street Journal

Image via Energy.gov


US energy industry under cyberattack by Iranian hackers is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

UK’s ITV News hacked by Syrian Electronic Army

It has been a week to the dot since the Syrian Electronic Army has last commandeered an unsuspecting Twitter account, this time going after the United Kingdom’s ITV News media company, which owns the UK’s largest TV station. Earlier this evening, half a dozen unusual tweets were sent out via the account, with a couple of them referencing the SEA hacking collective.

SEA

The messages were deleted a short while later, followed by a confirmation from ITV News that it had, in fact, been cyberattacked, making it the latest victim in what has been a long and ever-growing list replete with other big-name companies. Until today, The Financial Times was its latest victim, and before that The Guardian, which was hit on April 29.

According to Businessweek, the six tweets included one insulting the French, saying, “Francois Hollande to double aid to rebels, including a complementary French flag with every aid package.” Included in that tweet was an image of a white flag. The tweets eventually pointed towards the SEA as being the source, with one linking to an article said to concern Twitter’s victory over the hacking group. Shortly after that one was another that read: “Just kidding. The Syrian Electronic Army was here.”

The last two tweets perhaps referred to the brief battle between the SEA and Twitter on April 23, with Twitter banning accounts as fast the Syrian Electronic Army could make them. The hackers created at least 6 Twitter accounts that day, with the social network eventually banning each of them.

As we’ve previously noted, humor fake-news website The Onion, which had also fallen victim earlier this year, posted a write up explaining the result of its investigation into the matter. As had been stated by victims before it, the Syrian Electronic Army managed to get the social media account’s credentials after sending out phishing emails to a few employees, with it usually only taking one to fall for it in order for the plan to be successful. As such, media companies are encouraged to teach their workers how to recognize phishing schemes to help prevent such an attack.

SOURCE: Businessweek


UK’s ITV News hacked by Syrian Electronic Army is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Anonymous operation sends Guantanamo’s wifi into shutdown

Reports have been surfacing for awhile now regarding hunger strikes at Guantanamo Bay by prisoners over indefinite imprisonment – without trial – which has resulted in force feeding. To show their support for the cause behind the hunger strikes, hacking collective Anonymous threatened to take Guantanamo down, prompting a shutdown of its wireless Internet network.

Anonymous

According to the Associated Press, the military issued a shutdown of the wireless network at the Guantanamo Bay Naval Base, also blocking access to social media websites, including Twitter and Facebook, via the base’s computers. No cyberattacks have happened thus far; the shutdown was initiated merely as a precaution due to the posted threats.

The threats were made on May 6 via Anon Insiders, where Anonymous published a press release regarding “Operation Guantanamo.” According to the statement, May 18 represented the 100th day the prisoners had been on the hunger strike, the same time the hackers’ 3-day operation would take place. The public was called to initiate “twitterstorms, email bombs, and fax bombs” nonstop to show their support.

The press release also included numbers to the White House, U.S. Southern Command, and Department of Defense, urging the public to call the numbers and demand a change in conditions and eradication of the force-feedings, as well as demands that the Obama Administration close Guantanamo, as was the original plan. People were also asked to call their representatives and senators to petition for its closure.

It is worth noting the press release doesn’t say anything about hacking or cyberattacking the network, instead urging the public to bombard the powers that be with denouncements of the prison’s conditions, actions, and continued existence. As such, it has been pointed out on the Operation Guantanamo’s Twitter account that the base has taken itself offline, with the hacking collective not having to do anything, seemingly fulfilling the purpose it was assumed Anonymous sought to achieve.

There’s no word on when the network will be available again.

SOURCE: Associated Press


Anonymous operation sends Guantanamo’s wifi into shutdown is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Syrian Electronic Army cyberattacks The Financial Times

Another day, another cyberattack by the Syrian Electronic Army. This time the hacktivist collective targeted The Financial Times, making a nuisance of itself by taking over several of the company’s Twitter accounts, as well as changing the titles of posts on The Financial Times‘ blog posts to “Hacked by the Syrian Electronic Army.” While the actions themselves are annoying, one message in particular crossed the line when it sent readers to a video of an execution.

SEA

The Syrian Electronic Army has attacked a variety of media companies, including CBS, The Guardian, E! Online, and even The Onion. Often times, the hackers take control of the company’s Twitter account(s) and use it/them to post messages, some of them coming across as nonsense, others as fake news (such as Justin Bieber coming out of the closet), and sometimes things of a more serious nature, such as the link to a video execution on YouTube posted on one of the Financial Times’ Twitter accounts.

The Financial Times confirmed the hacks to The New York Times in an email, according to the latter company. While the company didn’t specify how the hackers gained access to their system, there’s a good chance it was accomplished the same way its other breaches have been achieved, which was detailed by The Onion earlier this month.

According to a blog post published on May 10, The Onion’s attack was the result of a rather conventional phishing scheme that involved sending links to a few of the company’s employees. The links purported to be of an interesting story, but instead took the recipient to a page requesting Google Apps login information. When someone falls for the ruse, their email is then used to try to message other workers for additional login information.

When someone in possession of the company’s social media accounts takes the bait, the hackers can then log into the account, change the password, and begin wrecking havoc. A similar attack was performed on The Associated Press, with one of the hackers revealing that 50 of the company’s employees had revealed their login information. Such attacks reaffirm that companies should train their employees on how to recognize phishing attempts, as well as taking measures to reduce the amount of damage that can result if someone does provide their credentials.

SOURCE: The New York Times


Syrian Electronic Army cyberattacks The Financial Times is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

LulzSec hackers sentenced in London court

In April, LulzSec members Ryan Ackroyd, Jake Davis, and Mustafa al-Bassam plead guilty to various charges in London for their roles in cyberattacks against Sony, the NHS, News International, and more. Today the three of them – plus Ryan Cleary – were sentenced in the same court, with all but one getting prison sentences. This follows other members who have already been sentenced, including Cody Kretsinger, who was known as Recursion.

Lulzy

Last month, 20-year-old Jake Davis, 26-year-old Ryan Ackroyd, and 18-year-old Mustafa al-Bassam plead guilty to charges of cyberattacking the NHS, News International, and Sony. On top of those, Ackroyd in particular also plead guilty to plotting attacks on other websites in addition to a computer hacking charge. Al-Bassam and Davis, in addition to the aforementioned, plead guilty to conspiring to attack various law enforcement agencies in both the US and UK.

While those three plead guilty last month, 21-year-old Ryan Cleary, who was also sentenced today, had already plead guilty in his own legal spat, which consisted of six various related charges. The guilty pleas were entered about two years after the attacks for which they were sentenced took place. Out of the four, Ackroyd had been the only to initially maintain his innocence.

Now that the sentencing is complete, we see that Cleary was given a 32-month prison sentence, Ackroyd a 30-month sentence, and Davis a 24-month sentence. Al-Bassam was the only one to side-step a prison sentence, instead receiving a 20-month suspended sentence because – though now an adult – he was only 16-years-old when he committed the cyberattacks, making him a minor. Instead, he will perform 300 hours of community service.

Crown Prosecution Service lawyer Andrew Hadik said: “The harm they caused was foreseeable, extensive and intended. Indeed, they boasted of how clever they were with a complete disregard for the impact their actions had on real people’s lives. This case should serve as a warning to other cybercriminals that they are not invincible.”

SOURCE: BBC News


LulzSec hackers sentenced in London court is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.