Syrian Electronic Army cyberattacks The Financial Times

Another day, another cyberattack by the Syrian Electronic Army. This time the hacktivist collective targeted The Financial Times, making a nuisance of itself by taking over several of the company’s Twitter accounts, as well as changing the titles of posts on The Financial Times‘ blog posts to “Hacked by the Syrian Electronic Army.” While the actions themselves are annoying, one message in particular crossed the line when it sent readers to a video of an execution.

SEA

The Syrian Electronic Army has attacked a variety of media companies, including CBS, The Guardian, E! Online, and even The Onion. Often times, the hackers take control of the company’s Twitter account(s) and use it/them to post messages, some of them coming across as nonsense, others as fake news (such as Justin Bieber coming out of the closet), and sometimes things of a more serious nature, such as the link to a video execution on YouTube posted on one of the Financial Times’ Twitter accounts.

The Financial Times confirmed the hacks to The New York Times in an email, according to the latter company. While the company didn’t specify how the hackers gained access to their system, there’s a good chance it was accomplished the same way its other breaches have been achieved, which was detailed by The Onion earlier this month.

According to a blog post published on May 10, The Onion’s attack was the result of a rather conventional phishing scheme that involved sending links to a few of the company’s employees. The links purported to be of an interesting story, but instead took the recipient to a page requesting Google Apps login information. When someone falls for the ruse, their email is then used to try to message other workers for additional login information.

When someone in possession of the company’s social media accounts takes the bait, the hackers can then log into the account, change the password, and begin wrecking havoc. A similar attack was performed on The Associated Press, with one of the hackers revealing that 50 of the company’s employees had revealed their login information. Such attacks reaffirm that companies should train their employees on how to recognize phishing attempts, as well as taking measures to reduce the amount of damage that can result if someone does provide their credentials.

SOURCE: The New York Times


Syrian Electronic Army cyberattacks The Financial Times is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

iOS 6 approved for use on American military networks

iOS 6 approved for use on American military networks

The Defense Department has officially given the thumbs up to Apple devices running iOS 6 — paving the way for iPhones and iPads to become standard issue around the Pentagon. The move was hardly shocking. In fact, the Wall Street Journal had it on good authority weeks ago that the DoD was planning to give iOS its seal of approval. With Samsung devices running the Knox security suite and BlackBerry 10 already trickling into the hands of Pentagon employees, the decision sets the stage for a three-way bout for military market supremacy. And we’re sure the government drones can’t pick sides fast enough. After all, who wants to live under the tyranny of BlackBerry 7 any longer than necessary?

Filed under: , , ,

Comments

Source: Bloomberg

Security expert details how he nabbed millions of dollars from a bank

Bank heists – they’re the subject of movies, books, and, in some cases, real-world news. While not every mission goes as planned, many have managed to gain ill-gotten wealth from lax security systems, prompting banks to step up their game and stay on top of ever-changing technologies. The best ways to find out you have a security vulnerability is to have someone exploit it, which is what one bank hired a security expert to do. Having successfully accomplished his mission, Nisha Bhalla has detailed how he managed to “steal” $14 million.

Hack

Bhalla is the CEO of security company Security Compass, which specializes in breaking into the security sytems of organizations and companies, exposing any vulnerabilities and issues that compromise data – or, in this case, allow someone to run off with millions of dollars. A bank located in the United States – name not provided – hired Bhalla’s company to test its system.

As we noted, the system wasn’t secure, and as a result Bhalla set himself up a checking account and funded it with $14 million that didn’t exist – money generated on the fly, so to speak. He then went over to the ATM machine and grabbed a receipt, which you can see an image of above, confirming that he was now – temporarily, at least – a multi-millionaire. Needless to say, such a massive infiltration “shocked” the bank, and it closed down his account before sprucing up its network security.

Not stopping there, he spoke to the folks over at CNN, detailing how the process of acquiring the funds went, and, in doing so, demonstrated how other stores, banks, and organizations could potentially suffer at the hands of the technically-inclined unscrupulous. The first step, as you likely guessed, was gaining access to the bank’s network, which Bhalla says it is simple to do by latching on to its wireless network – something many banks provide for its customers to use as a courtesy.

From there, it was only a matter of using freely available sniffer software to map the bank’s computer network, followed by flooding the network’s switches to gather data. He found log-in information for a teller’s computer, which didn’t use encryption when sending data to the bank’s main database. As such, Bhalla had free reign, and used it to create a bank account with $14 million in funds, something that would likely go undetected until well after he transferred the funds overseas and left the country.

Such a revelation comes only days after eight individuals were charged with swiping $45 million from ATM machines.

SOURCE: CNN Money


Security expert details how he nabbed millions of dollars from a bank is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

The New Yorker unveils Strongbox for anonymous tip sharing

Media companies of all sorts enjoy tips from readers and others, some of them being small snippets of information that are more or less without consequence, and with others putting the tipster’s job – or worse – at stake. As such, privacy and anonymity are of the utmost importance, and conventional messaging methods often fall short of providing it. Because of this, The New Yorker has implemented StrongBox.

Aaron Swartz

Strongbox was created by Kevin Poulsen and the late Aaron Swartz, who committed suicide earlier this year after intense legal pressure following his JSTOR hacking debacle. It is an extension of DeadDrop, the code of which will be made open source and released for other companies and individuals to use. Unlike traditional methods for submitting tips and information, Strongbox aims to keep the tipster anonymous, and makes it so the recipient won’t be able to determine from where the information comes.

The Strongbox system is both fairly simple and quite involved, with several steps happening between the sharing of the tip and access of the information on the receiving end. Tipsters have to access Tor in order to upload a file or message (which are encrypted using PGP), and will receive a randomly generated alias. The files are then shuttled off to a server that is isolated from the recipient’s network and checked regularly by those with access.

If information has been received, the recipient downloads it via a VPN-connected laptop onto a flash drive, then decrypts the files on a secondary laptop running a live CD that is wiped with every restart using a second thumb drive containing the decryption keys. From there, the recipient can then return a message if desired via Strongbox, and the tipster can receive it by accessing the system using the randomly-generated alias that was assigned.

Poulsen talks about the project in his own write up, detailing how it was initiated and the work that went into it, mixed it with a personal perspective on the man himself and the weeks leading up to his untimely passing days after a launch date for the project had been set.

SOURCE: The New Yorker


The New Yorker unveils Strongbox for anonymous tip sharing is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Saudi telecom Mobily working on project to intercept mobile data

Software engineer Moxie Marlinspike over at Thought Crime says he’s no stranger to unsolicited emails from individuals seeking help with surveillance efforts, due to some of the software he has created. While the programmer says he ignores most of them, one he received earlier this month caught his eye, and a short while later he discovered that Saudi Arabia telecom Mobily is working on a project to intercept mobile traffic.

Mobily

The email, says Marlinspike, appeared in his inbox one day with the alluring subject line: Solution for monitoring encrypted data on telecom. Though he wasn’t interested in helping, he did respond to the agent’s email, initiating a correspondence that the programmer says lasted for a week. The end result was revelation of telecommunication company Mobily’s current project for intercepting data from mobile applications, with particular emphasis on Line, Viber, Twitter, and WhatsApp.

Reportedly, Mobily’s Executive Manager of Network & Information Security Yasser D. Alruhaily is at the helm of the project, which was initiated by someone referred to as “the initiator.” Marlinspike believes “the initiator” to be the Saudi government, but it doesn’t sound like that information was ever explicitly provided.

In one of the emails from Mobily that were published, it is revealed the telecom company is looking for information on how to go about intercepting traffic from mobile apps, whether a workaround exists for accomplishing that task, and if there are any other places it could approach in regards to the project. Marlinspike goes on to specify that one document they provided indicates using SSL certificates for interception, as well as SSL exploits and vulnerabilities.

Word has it a WhatsApp interception prototype is up and working.

So, what is compelling such an action? Terrorism, according to a message Marlinspike posted from Mobily. The telecom company, after being informed that he wouldn’t help them, said that Saudi Arabia has a “big terrorist problem” with those responsible using the aforementioned mobile apps – and others – to transmit information. The telecom company then goes on to say that because of this its actions are not only necessary, but Marlinspike’s refusal to help is indirectly aiding terrorist activities.

SOURCE: Thought Crime


Saudi telecom Mobily working on project to intercept mobile data is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

The Onion pegs Syrian Electronic Army hacks on phishing schemes

Over the last several weeks the Syrian Electronic Army has made a nuisance of itself (again), serving as a sort of annoying prankster who is repeatedly ordered to go stand in the corner. The organization is reportedly responsible for quite a number of hacks, with The Onion having been one of its unlucky victims. The humor website pinpointed the source of its infiltration and has revealed precisely how it happened, adding in a few pieces of advice for other media outlets to help combat the attacks.

SEA

Last month, the Syrian Electronic Army claimed credit for a few different compromised accounts. On April 21, the organization said it was responsible for the hacking of several CBS Twitter accounts, and a week later it went after The Guardian’s Twitter accounts, sending out tweets in its own favor. It didn’t take long for another compromised account to surface, this time being E! Online’s Twitter account, where the hackers spread false information about singer Justin Bieber before proclaiming in another tweet that fans had been trolled.

Its latest target was The Onion, which was digitally infiltrated this past Monday by the SEA, something that was originally suspected to be a joke given the nature of the company. That notion was laid to rest on Wednesday when The Onion posted a series of screenshots and URLs detailing precisely how the organization compromised its Twitter account, revealing that the hack – as with previous ones – had been accomplished via a few different phishing methods.

The attack was initiated via emails sent to The Onion employees containing a link that, with a quick glance, appeared to be from The Washington Post on content about The Onion. When clicked, however, the link took the recipient to the URL “hackwordpresssite.com/theonion.php,” which then redirected again to one requesting Google App login information, after which point it took the victim full circle back to Gmail. Only a few employees received the emails, and at least one was fooled by it, resulting in the second phase of the attack.

Using the employee’s compromised email, the SEA sent messages to other The Onion employees early in the morning containing another link that again requested Google login information. Of those targeted, one of the individuals who fell for it had the login information for The Onion’s social media accounts, including Twitter.

The Onion notified employees of the breech and sent emails instructing workers to reset their passwords, unaware that one of their accounts was still compromised. Via that account, the SEA sent an email to all but those involved in the IT department with a link said to be a password-reset URL. A couple people fell for the second link, with both of their accounts then being used by the hackers to take control of The Onion’s Twitter account. Because of this, the company required all Google Apps passwords to be reset company wide, but not before posting a humorous jab at the SEA.

In summary, The Onion advises other media companies to avoid such attacks by taking such steps as employee education on phishing, isolating social media account logins, feeding tweets through a third-party application, and having access to all employees outside of corporate email accounts.

SOURCE: The Onion


The Onion pegs Syrian Electronic Army hacks on phishing schemes is written by Brittany Hillen & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Mother’s Day Email Scams: 5 Ways to Prevent Them

If you haven’t figured out how you’re going to show mom how much you care, it’s not too late. Emails from brands you trust and the Web can help you shop, ship and rest easy knowing that your gift will […]

Like It , +1 , Tweet It , Pin It Original content from Ubergizmo.

    

PayPal wants to get rid of passwords in favor of biometric security

While passwords are the way of the land on the internet, PayPal’s chief information security officer Michael Barrett says that passwords and PINs are obsolete and we need a new standard for security on computers and the internet. Barrett thinks that the next step is fingerprint scanners, which he believes will debut on smartphones at some point this year.

password-login

Speaking at the Interop IT conference, Barrett was quite positive that passwords will die sometime this year, even going as far as putting an image of a tombstone up on the screen that gave an “R.I.P.” to passwords. He says that passwords “are starting to fail us,” and that there are better, more secure ways to easily log into accounts in a secure manner.

On top of PayPal, Barrett is the president of the Fast IdentityOnline Alliance (FIDO), which is an organization that aims to change online authentication with an open standard that’s both secure and convenient to use. Barrett thinks that fingerprint scanners will be the wave of the future, and he even brought up rumors about the next iPhone coming equipped with a fingerprint scanner, as well as a handful of other new smartphones.

We can certainly see where Barrett is coming from. Passwords can be really easy to crack, especially if people use the same password for all of their accounts, which is inexcusable, but it makes sense, as many people don’t want to take the time to remember 20 different complex passwords. Two-factor authentication has been making the rounds, requiring users to log in using a password as well confirming their identity through a hardware device, but it’s inconvenient. Barrett thinks that biometrics is not only convenient, but also much more secure than passwords.

However, he noted that passwords simply won’t go away after biometrics are introduced. It’ll certainly take a while before a new standard can completely take over, especially considering that passwords have been the standard for so many years. So while we could see smartphones with integrated fingerprint scanners, it could be a few years before a new security standard takes over full-time.

VIA: Macworld


PayPal wants to get rid of passwords in favor of biometric security is written by Craig Lloyd & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.

Google’s updated security roadmap details increased friction, reliance on hardware

Google's updated security roadmap details increased friction, reliance on hardware

A lot has changed in the security realm since 2008 — remember Alicia Keys’ recent attempt to convince us her Twitter account was hacked, when we all know she still uses an iPhone even as BlackBerry’s Creative Director? Pranks aside, the consumer world alone has been overrun with mass data hackings — everyone from Evernote to Microsoft to Sony to RSA has felt the wrath. To combat all of this, Google is revamping its five-year security plan, which calls for a complex authentication code replacing the conventional password in due time; in other words, Google is going to make it harder to access your accounts when initially setting up a device, but hopes you’ll deal. Eric Sachs, group product manager for identity at Google, put it as such: “We will change sign-in to a once-per-device action and make it higher friction, not lower friction, for all users. We don’t mind making it painful for users to sign into their device if they only have to do it once.”

The documents also suggest that two-step verification may soon become less of an option, and more of a mandate. Sachs straight-up confesses that Google didn’t predict the current level of smartphone adoption back in 2008, but now realizes that utilizing mobile hardware and apps as friction points for logging in makes a lot more sense. A huge swath of Google users are already carrying around a product that could be used as a verification token, so the obvious solution is to make use of that. We’re also told that learnings from Android will be carried over to Chrome, and further into the world of web apps. No specific ETAs are given, but trust us — half a decade goes by quickly when you’re having fun.

Filed under: ,

Comments

Via: ZDNet

Source: Google

Apple’s iPhone Security Measures Prompt Queue Of Unlock Requests From Law Enforcement

Image (1) iphone-unlocked.jpg for post 379913

Apple faces a whole lot of inbound requests to unlock iPhone devices from law enforcement officials, according to a new report from CNET. Seized iPhones with a passcode lock are apparently secure enough to frustrate a lot of police agencies in the U.S., resulting in a wait list that Apple has put in place to help it deal with unlock requests from the authorities.

The waiting list was long enough that it resulted in a 7-week delay for a recent request by the ATF last summer, according to the CNET report. The good news for iPhone owners is that the ATF in that instance turned to Apple as a last resort, after trying to find a law enforcement body at either the local, state or federal level that had the capability to unlock the phone in-house for three months to no avail. The bad news is that an affidavit obtained by CNET, the decryptions seem to take place without necessarily requiring a customer’s knowledge, whereas with Google there’s a password reset involved that notifies a user via email of the unlock.

Apple can reportedly bypass the security lock to get access to data on a phone, download it to an external device and hand that over to the authorities, according to an ATF affidavit, which means that ultimately, the information on an iOS device isn’t 100 percent secure. But overall, repeated reports peg Apple devices as particularly resistant to prying eyes operating in law enforcement.

A previous report from CNET also identified iMessage as resilient in the face of outside surveillance attempts, especially compared to more common text communication methods like SMS. Combined, the reports suggest that Apple’s technology for its mobile devices is especially good at repelling unwanted advances, which is great for privacy buffs, though the policies around when and why Apple does share that information needs more fleshing out.

We’ve reached out to Apple to see if they have any official comment on the unlock queue from law enforcement and how they proceed with requests, and will update if we hear more.