MasterSearch

AddThis

Showing posts with label cyberattack. Show all posts
Showing posts with label cyberattack. Show all posts

March 26, 2021

#Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals in latest #CyberAttack

The hackers’ methods were unsophisticated: they gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. Kottmann says they found a user name and password for an administrator account publicly exposed on the internet.

www.bloomberg.com /news/articles/2021-03-09/hackers-expose-tesla-jails-in-breach-of-150-000-security-cams
Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals
William Turton
10-12 minutes


A group of hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools.

Companies whose footage was exposed include carmaker Tesla Inc. and software provider Cloudflare Inc. In addition, hackers were able to view video from inside women’s health clinics, psychiatric hospitals and the offices of Verkada itself. Some of the cameras, including in hospitals, use facial-recognition technology to identify and categorize people captured on the footage. The hackers say they also have access to the full video archive of all Verkada customers.

In a video seen by Bloomberg, a Verkada camera inside Florida hospital Halifax Health showed what appeared to be eight hospital staffers tackling a man and pinning him to a bed. Halifax Health is featured on Verkada’s public-facing website in a case study entitled: “How a Florida Healthcare Provider Easily Updated and Deployed a Scalable HIPAA Compliant Security System.”

Another video, shot inside a Tesla warehouse in Shanghai, shows workers on an assembly line. The hackers said they obtained access to 222 cameras in Tesla factories and warehouses.

The data breach was carried out by an international hacker collective and intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into, said Tillie Kottmann, one of the hackers who claimed credit for breaching San Mateo, California-based Verkada. Kottmann, who uses they/them pronouns, previously claimed credit for hacking chipmaker Intel Corp. and carmaker Nissan Motor Co. Kottmann said their reasons for hacking are “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism -- and it’s also just too much fun not to do it.”




A Tesla facility seen through a Verkada camera.

March 28, 2020

#Zoom's iOS App is sending your #PrivateData nonconsensually to Facebook — even if you don’t have a Facebook account.

Zoom's iOS app is sending your data to Facebook, because privacy is a myth
Zoom iOS App
Zoom's iOS app is sending your data to Facebook, because privacy is a myth

Zoom's video conferencing app has grown more popular than ever lately, while people are staying home to flatten the curve. But you should know that there's a major privacy concern with the service.

Last night, Vice reported that Zoom's iOS app is nonconsensually sending data to Facebook — even if you don't have a Facebook account.

What's more shocking is that the company's privacy policy makes no mention of it. Plus, the app doesn't make it clear anywhere that it's sending your data to the social network.

Joseph Cox noted in his report for Vice that every time you open the app, it sends your data to Facebook including your device's model, network provider, time zone, city, and a unique device identifier that advertisers can use to send you targeted ads.

Facebook's policy about using its SDK (Software Development Kit) and tracking Pixels is quite clear: A website or app using it has to explicitly mention that your data is being shared with third-parties, including Facebook. Plus, it has to provide an option to opt-out of tracking. Zoom doesn't address these points at all.

Last week, digital rights non-profit Electronic Frontier Foundation (EFF) pointed out some of the privacy risks in using Zoom's products. The report said IT admins of your company can access a bunch of information about you during a meeting including your device information, IP address, and operating system. Plus, the app has an attention tracking feature, which is off by default, that allows hosts to check if a participant's Zoom app window is active or not on their desktops.

Continue Reading the whole story here: https://thenextweb.com/security/2020/03/27/zooms-ios-app-is-sending-your-data-to-facebook-because-privacy-is-a-myth/?utm_campaign=Feed%3A%2BTheNextWeb%2B%28The%2BNext%2BWeb%2BAll%2BStories%29&utm_medium=feed&utm_source=feedburner


April 18, 2015

'Arab #hackers believed to have breached Israeli military networks' @JPost

The affair shows how the Middle East continues to be a hotbed for cyber espionage.

Cyber hackers [illustrative]. (photo credit:REUTERS)

Hackers have managed to penetrate computer networks associated with the
Israeli military in an espionage campaign that skillfully packages
existing attack software with trick emails, according to private
security researchers.

The four-month-old effort, most likely by
Arabic-speaking programmers, shows how the Middle East continues to be a
hotbed for cyber espionage and how widely the ability to carry off such
an attack has spread, the researchers said.

Waylon Grange, a
researcher with security firm Blue Coat Systems Inc who discovered the
campaign, said the vast majority of the software was cobbled together
from widely available tools, such as the remote-access Trojan called
Poison Ivy.

The hackers were likely working on a budget and had no
need to spend much on tailored code, Grange said, adding that most of
their work appears to have gone into so-called social engineering, or
human trickery.

The hackers sent emails to various military
addresses that purported to show breaking military news, or, in some
cases, a clip featuring "Girls of the Israel Defense Forces." Some of
the emails included attachments that established "back doors" for future
access by the hackers and modules that could download and run
additional programs, according to Blue Coat.

Using standard
obfuscation techniques, the software was able to avoid detection by most
antivirus engines, Blue Coat said. At least some software lodged inside
government computers, because Blue Coat detected it "beaconing," or
sending signals to the hackers that it was in place.



Read the rest of the story online here:  'Arab hackers believed to have breached Israeli military networks' - Arab-Israeli Conflict - Jerusalem Post

February 20, 2011

New Hacking Tools Pose Bigger Threats to Wi-Fi Users - NYTimes.com

New Hacking Tools Pose Bigger Threats to Wi-Fi Users

 

February 16, 2011
You may think the only people capable of snooping on your Internet activity are government intelligence agents or possibly a talented teenage hacker holed up in his parents’ basement. But some simple software lets just about anyone sitting next to you at your local coffee shop watch you browse the Web and even assume your identity online.
“Like it or not, we are now living in a cyberpunk novel,” said Darren Kitchen, a systems administrator for an aerospace company in Richmond, Calif., and the host of Hak5, a video podcast about computer hacking and security. “When people find out how trivial and easy it is to see and even modify what you do online, they are shocked.”
Until recently, only determined and knowledgeable hackers with fancy tools and lots of time on their hands could spy while you used your laptop or smartphone at Wi-Fi hot spots. But a free program called Firesheep, released in October, has made it simple to see what other users of an unsecured Wi-Fi network are doing and then log on as them at the sites they visited.
Without issuing any warnings of the possible threat, Web site administrators have since been scrambling to provide added protections.
“I released Firesheep to show that a core and widespread issue in Web site security is being ignored,” said Eric Butler, a freelance software developer in Seattle who created the program. “It points out the lack of end-to-end encryption.”
What he means is that while the password you initially enter on Web sites like Facebook, Twitter, Flickr, Amazon, eBay and The New York Times is encrypted, the Web browser’s cookie, a bit of code that that identifies your computer, your settings on the site or other private information, is often not encrypted. Firesheep grabs that cookie, allowing nosy or malicious users to, in essence, be you on the site and have full access to your account.
More than a million people have downloaded the program in the last three months (including this reporter, who is not exactly a computer genius). And it is easy to use.
The only sites that are safe from snoopers are those that employ the cryptographic protocol transport layer security or its predecessor, secure sockets layer, throughout your session. PayPal and many banks do this, but a startling number of sites that people trust to safeguard their privacy do not. You know you are shielded from prying eyes if a little lock appears in the corner of your browser or the Web address starts with “https” rather than “http.”
“The usual reason Web sites give for not encrypting all communication is that it will slow down the site and would be a huge engineering expense,” said Chris Palmer, technology director at the Electronic Frontier Foundation, an electronic rights advocacy group based in San Francisco. “Yes, there are operational hurdles, but they are solvable.”
Indeed, Gmail made end-to-end encryption its default mode in January 2010. Facebook began to offer the same protection as an opt-in security feature last month, though it is so far available only to a small percentage of users and has limitations. For example, it doesn’t work with many third-party applications.
“It’s worth noting that Facebook took this step, but it’s too early to congratulate them,” said Mr. Butler, who is frustrated that “https” is not the site’s default setting. “Most people aren’t going to know about it or won’t think it’s important or won’t want to use it when they find out that it disables major applications.”
Joe Sullivan, chief security officer at Facebook, said the company was engaged in a “deliberative rollout process,” to access and address any unforeseen difficulties. “We hope to have it available for all users in the next several weeks,” he said, adding that the company was also working to address problems with third-party applications and to make “https” the default setting.
Many Web sites offer some support for encryption via “https,” but they make it difficult to use. To address these problems, the Electronic Frontier Foundation in collaboration with the Tor Project, another group concerned with Internet privacy, released in June an add-on to the browser Firefox, called Https Everywhere. The extension, which can be downloaded at eff.org/https-everywhere, makes “https” the stubbornly unchangeable default on all sites that support it.
Since not all Web sites have “https” capability, Bill Pennington, chief strategy officer with the Web site risk management firm WhiteHat Security in Santa Clara, Calif., said: “I tell people that if you’re doing things with sensitive data, don’t do it at a Wi-Fi hot spot. Do it at home.”
But home wireless networks may not be all that safe either, because of free and widely available Wi-Fi cracking programs like Gerix WiFi Cracker, Aircrack-ng and Wifite. The programs work by faking legitimate user activity to collect a series of so-called weak keys or clues to the password. The process is wholly automated, said Mr. Kitchen at Hak5, allowing even techno-ignoramuses to recover a wireless router’s password in a matter of seconds. “I’ve yet to find a WEP-protected network not susceptible to this kind of attack,” Mr. Kitchen said.
A WEP-encrypted password (for wired equivalent privacy) is not as strong as a WPA (or Wi-Fi protected access) password, so it’s best to use a WPA password instead. Even so, hackers can use the same free software programs to get on WPA password-protected networks as well. It just takes much longer (think weeks) and more computer expertise.
Using such programs along with high-powered Wi-Fi antennas that cost less than $90, hackers can pull in signals from home networks two to three miles away. There are also some computerized cracking devices with built-in antennas on the market, like WifiRobin ($156). But experts said they were not as fast or effective as the latest free cracking programs, because the devices worked only on WEP-protected networks.
To protect yourself, changing the Service Set Identifier or SSID of your wireless network from the default name of your router (like Linksys or Netgear) to something less predictable helps, as does choosing a lengthy and complicated alphanumeric password.
Setting up a virtual private network, or V.P.N., which encrypts all communications you transmit wirelessly whether on your home network or at a hot spot, is even more secure. The data looks like gibberish to a snooper as it travels from your computer to a secure server before it is blasted onto the Internet.
Popular V.P.N. providers include VyperVPN, HotSpotVPN and LogMeIn Hamachi. Some are free; others are as much as $18 a month, depending on how much data is encrypted. Free versions tend to encrypt only Web activity and not e-mail exchanges.
However, Mr. Palmer at the Electronic Frontier Foundation blames poorly designed Web sites, not vulnerable Wi-Fi connections, for security lapses. “Many popular sites were not designed for security from the beginning, and now we are suffering the consequences,” he said. “People need to demand ‘https’ so Web sites will do the painful integration work that needs to be done.”

New Hacking Tools Pose Bigger Threats to Wi-Fi Users - NYTimes.com: "

iStockphoto
By KATE MURPHY
Published: February 16, 2011

- Sent using Google Toolbar"

Share this|
________________________

February 15, 2011

Google Chases Computer Criminals to Search-Engine Competitors

Incredible the industry that it has become! 
Google Chases Computer Criminals to Search-Engine Competitors - Bloomberg
Google Inc. has almost cut in half the malicious software affecting users of its search engine, driving hackers to competitors including Microsoft Inc.'s BingYahoo! Inc. and Twitter Inc., a report says.
Hackers targeted Google, owner of the most popular search engine, 38 percent of the time as of Dec. 31, according to the report to be released later this month by Barracuda Networks Inc., a web security firm. Mountain View, California-based Google accounted for 69 percent of the attacks in a sample conducted around June, the report says. A Barracuda report in July labeled Google "king of malware."
Even as Google improved its security, the number of attacks increased. In the December sample, Barracuda said it found 226 pieces of bad software a day, compared with 146 in June. Meanwhile, Google's competitors recorded an increase in malware- laced search results: Cyber criminals placed 30 percent of their bad software on Yahoo! search results in December, up from 18 percent in June. Bing accounted for 24 percent in December, up from 12 percent in June. And the targeting of Twitter rose to 8 percent from 1 percent, the report says.
Google said it has ratcheted up efforts to identify and scrub attempts at so-called search poisoning, which allows criminals to take control of computers to perpetuate cyber attacks, as well as large-scale banking and identity-theft swindles.




Sent from my iPad

February 06, 2011

Let the CyberWars begin... Exchanges on high alert after hacker attack - FT


Let the CyberWars begin...


Exchanges on high alert after hacker attack - FT


Nasdaq OMX, the global exchange operator said on Saturday that it had been targeted by hackers. There was a breach but that “at no point” were its trading platforms compromised.
On Saturday, the Wall Street Journal reported that hackers had “repeatedly” penetrated Nasdaq’s systems, and that US officials were investigating the attack.
More recently the operators of Europe’s carbon emissions trading markets suspended business in their spot emissions contracts after the European Union said its carbon trading platform had come under attack from cyber-thieves.

Nasdaq targeted by hackers

By Telis Demos in New York and Joseph Menn in San Francisco
Published: February 5 2011 23:27 | Last updated: February 5 2011 23:27
Nasdaq OMX, the global exchange operator said on Saturday that it had been targeted by hackers. There was a breach but that “at no point” were its trading platforms compromised.
On Saturday, the Wall Street Journal reported that hackers had “repeatedly” penetrated Nasdaq’s systems, and that US officials were investigating the attack.
Nasdaq confirmed that “suspicious files” were detected on Directors Desk, a web application for companies to share documents remotely that is unrelated to its trading systems.
It also said that the US Department of Justice had requested that it not tell customers about the investigation until February 14.
The files were detected late last year, and Nasdaq says it immediately contacted forensic firms and US law enforcement agencies. The files were deleted and Nasdaq says there is “no evidence” that information on Directors Desk was accessed by hackers.
The Federal Bureau of Investigation’s New York cybercrime unit, along with the US Department of Justice’s Southern District of New York is investigating the attack. Nasdaq said it is co-operating with officials on an ongoing inquiry.
Neither agency was available for comment.
Cybercrime against exchanges is a significant concern for government officials, who fear that a significant breach could spark a financial panic.
Nasdaq and other exchanges say their systems are frequently targeted, but have reported no major breaches. Last year, the London Stock Exchange investigated but dismissed the possibility that sabotage was at fault for a trading halt, ultimately blaming “human error”.
More recently the operators of Europe’s carbon emissions trading markets suspended business in their spot emissions contracts after the European Union said its carbon trading platform had come under attack from cyber-thieves.

Read the rest of the article here.

January 18, 2011

Stuxnet Worm Used Against Iran Was Tested in Israel - NYTimes.com

Israeli Test on Worm Called Crucial in Iran Nuclear Delay

This article is by William J. Broad, John Markoff and David E. Sanger.
The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal.
Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own.
Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms.
“To check out the worm, you have to know the machines,” said an American expert on nuclear intelligence. “The reason the worm has been effective is that the Israelis tried it out.”
Though American and Israeli officials refuse to talk publicly about what goes on at Dimona, the operations there, as well as related efforts in the United States, are among the newest and strongest clues suggesting that the virus was designed as an American-Israeli project to sabotage the Iranian program.

---

December 10, 2010

Dutch boy arrested for WikiLeaks-related DDoS attacks on Mastercard and PayPal | Naked Security


Dutch boy arrested for WikiLeaks-related DDoS attacks on Mastercard and PayPal

According to an announcement by the Dutch Public Prosecution Service, a 16-year-old boy has been arrested in connection with the distributed denial-of-service attacks that have been launched against a number of websites this week, including MasterCard and PayPal.
The attacks, which have made the headlines in the last couple of days, have seemingly been in support of the controversial WikiLeaks whistle-blowing site and its high profile founder Julian Assange.
Details are very sketchy, but it is reported that the unnamed youth is in police custody and is being interrogated by detectives from the Dutch National High-Tech Crime Team. He is said to have confessed to the attacks, and is due to appear in court in Rotterdam on Friday.
Computers have also been seized, and it appears that the authorities are not ruling out further arrests. Last night, Dutch broadcasters reported that the police visited the offices of LeaseWeb and EvoSwitch - two firms, believed to be providing internet services to the Anonymous group who have co-ordinated the attacks.
Of course, it is highly unlikely that the attacks are coming from just one part of the world.
As I said just earlier today, denial-of-service attacks are illegal - and you would be very foolish to participate in them, as the penalties can include lengthy jail sentences.

Dutch boy arrested for WikiLeaks-related DDoS attacks on Mastercard and PayPal | Naked Security

September 26, 2010

The MasterBlog: a cyberattack in Iran?

A computer worm proliferating in Iran targets automated activity in large industrial facilities. Speculation that the worm represents an effort by a national intelligence agency to attack Iranian nuclear facilities is widespread in the media. The characteristics of the complex worm do in fact suggest a national intelligence agency was involved. If so, the full story is likely to remain shrouded in mystery.

Analysis
A computer virus known as a worm that has been spreading on computers primarily in Iran, India and Indonesia could be a cyberattack on Iranian nuclear facilities, according to widespread media speculation. _______________________________________

Subscribe to The MasterTech's Feeds

Add This