Author - systemdigits.com

A single email can give hackers access to the entire network:


Google researchers find code-execution bug in FireEye threat-prevention devices which can give hackers complete access to networks

Almost all companies install cyber security solutions to safeguard their networks against malicious vectors like hacking, spamming etc. Imagine what happens if there is a vulnerability in once such security device meant to protect your network.

Now, researchers say they have uncovered a critical vulnerability in such a product from security firm FireEye that can give attackers full network access.

According to Tavis Ormandy from Google, they have discovered an vulnerability in the NX, EX, AX, FX series of FireEye products. Ormandy says that the vulnerability makes it possible for attackers to penetrate a network by sending one of its members a single malicious e-mail, even if it’s never opened.

Ormandy, who has already uncovered bugs in many anti-virus solutions in the past says that they have informed FireEye about the bug. Ormandy has explained in a blog post published Tuesday:

For networks with deployed FireEye devices, a vulnerability that can be exploited via the passive monitoring interface would be a nightmare scenario. This would mean an attacker would only have to send an email to a user to gain access to a persistent network tap—the recipient wouldn’t even have to read the email, just receiving it would be enough.

‘A network tap is one of the most privileged machines on the network, with access to employee’s email, passwords, downloads, browsing history, confidential attachments, everything. In some deployment configurations* an attacker could tamper with traffic, inserting backdoors or worse. Because FireEye devices typically have a secondary internet-connected interface for updates and management, the issue could even be wormable across the internet.’

The devices are supposed to passively monitor network traffic from HTTP, FTP, SMTP connections. In instances where there’s a file transfer, the security appliance will scan it for malware. Ormandy and fellow Project Zero researcher Natalie Silvanovich found a vulnerability that can be exploited through such a passive monitoring interface. The researchers used the JODE Java decompiler to reverse engineer Java Archive files used by the FireEye devices. They then figured out a way to get the appliance to execute a malicious archive file by mimicking some of the same features found in legitimate ones.

“Putting these steps together, an attacker can send an e-mail to a user or get them to click a link, and completely compromise one of the most privileged machines on the network,” the researchers reported. “This allows exfiltration of confidential data, tampering with traffic, lateral movement around networks and even self-propagating internet worms.”

In a statement, a FireEye spokesman wrote:

On Friday December 4, FireEye was informed of and confirmed a Remote Code Execution (RCE) vulnerability impacting our NX, EX, AX, and FX products by Google Project Zero’s Tavis Ormandy. FireEye had been engaged with and was supporting the Google Project Zero team prior to this discovery around the testing of our products.

We released an automated remediation to customers just 6 hours after notification, mitigating any customer exposure by Saturday morning, December 5th and released a full, automated fix on Monday, December 7. In addition, we will be releasing a fix to support our out-of-contract customers.

We are thankful for the opportunity to support researchers in the testing of our products and will continue to support their efforts and fully support their efforts to improve our products.

Facebook dispute results in a 14 year old girl being shot dead

Birmingham teenager shot dead after a dispute on Facebook

An argument on Facebook took a ghastly turn of events when it ended in gunfire that killed 14 year old Kierra’onna Rice.

The online Facebook brawl between two groups of friends spilled out into the streets with a fistfight and later ended in gunfire that killed a 14-year-old girl and wounded two others in Alabama on Friday, authorities said. The fistfight between the girls was to be recorded for posting online according to th police.

Birmingham police said 14-year Kierra’onna Rice was shot and killed at around 5 p.m. in Birmingham after two males opened fire after Rice and several other girls met at a park to fight. Birmingham Police Chief A.C. Roper told the NBC reporter that some in the Facebook group planned to record the fight so video could be posted online.

Those who knew Rice say they never dreamed something like this would happen to her. They say she was loving and would lend a helping hand to anyone. Her classmate, Diamond Davis said,, “She was a good person. She, she never had any trouble. She was never in anything. She was a good person. She liked to help people.”

These top ten progamming languages have most vulnerable apps on the Internet.

web-apps
A new research showed that Scripting languages, in general, give birth to more security vulnerabilities in web applications, which raised concerns over potential security bugs in millions of websites.

The app security firm Veracode has released its State of Software Security: Focus on Application Development report (PDF), analyzing more than 200,000 separate applications from October 1, 2013, through March 31, 2015.

A new research showed that Scripting languages, in general, give birth to more security vulnerabilities in web applications, which raised concerns over potential security bugs in millions of websites.

The app security firm Veracode has released its State of Software Security: Focus on Application Development report (PDF), analyzing more than 200,000 separate applications from October 1, 2013, through March 31, 2015.

The security researchers crawled popular web scripting languages including PHP, Java, JavaScript, Ruby, .NET, C and C++, Microsoft Classic ASP, Android, iOS, and COBOL, scanning hundreds of thousands of applications over the last 18 months.

Researchers found that PHP – and less popular Web development languages Classic ASP and ColdFusion – are the riskiest programming languages for the Internet, while Java and .NET are the safest.

Here's the Top 10 List:

The Veracode research report used a unique metric, Flaw Density per MB, which means the number of security bugs in each MB of source code.
Programming-Language
Here's the list of unlucky winners:

    Classic ASP – 1,686 flaws/MB (1,112 critical)
    ColdFusion – 262 flaws/MB (227 critical)
    PHP – 184 flaws/MB (47 critical)
    Java – 51 flaws/MB (5.2 critical)
    .NET – 32 flaws/MB (9.7 critical)
    C++ – 26 flaws/MB (8.8 critical)
    iOS – 23 flaws/MB (0.9 critical)
    Android – 11 flaws/MB (0.4 critical)
    JavaScript – 8 flaws/MB (0.09 critical)


Web Apps in PHP are Most Vulnerable, Here's Why:

PHP, which is on third, is actually leading the ranking because ColdFusion is a high-end niche tool and Classic ASP is almost dead.

Taking a closer look at PHP:

    86% of applications written in PHP contained at least one cross-site scripting (XSS) vulnerability.
    56% of apps included SQLi (SQL injection), which is one of the dangerous and easy-to-exploit web application vulnerabilities.
    67% of apps allowed for directory traversal.
    61% of apps allowed for code injection.
    58% of apps had problems with credentials management
    73% of apps contained cryptographic issues.
    50% allowed for information leakage.

From above issues, SQLi and XSS are among the Open Web Application Security Project's (OWASP) Top 10 most critical web application security risks.
And the Title of "Most Vulnerable Programming Language of Year 2015" Goes to…
SQL injection bugs – which allow hackers to directly interact with a Web site's database – are the ones that have been blamed for the massive data breaches at kiddie toymaker VTech and telecom firm TalkTalk.

According to the report, the risk size of the above vulnerabilities can be measured by the volume of PHP apps developed for the Top 3 CMS (Content Management Systems) – WordPress, Drupal and Joomla – that represent over 70% of the CMS market.

Choose Your Scripting Language Wisely

Less than a quarter of Java applications contain SQL injection flaws, compared to more than three-quarters of those applications written in PHP.

    "When organizations are starting new development projects and selecting languages and methodologies, the security team has an opportunity to anticipate the types of vulnerabilities that are likely to arise and how best to test for them," Veracode's CTO Chris Wysopal advised.

Hacker has built a $10 device that can predict and store hundreds of American Express credit card numbers

Imagine you have lost your credit card and applied for a fresh credit card from your bank. What if some criminal is using your new credit card before you have even received it?

Yes, it's possible at least with this $10 device.

Hardware hacker Samy Kamkar has built a $10 device that can predict and store hundreds of American Express credit card numbers, allowing anyone to use them for wireless payment transactions, even at non-wireless terminals.

The device, dubbed MagSpoof, guesses the next credit card numbers and new expiration dates based on a cancelled credit card's number and when the replacement card was requested respectively.

This process does not require the three or four-digit CVV numbers that are printed on the back side of the credit cards.


The tiny gadget would be a dream of any card fraudster who can pilfer cash from the stolen credit cards even after they have been blocked or cancelled by their owner.

What's MagSpoof?

MagSpoof is a device that can…

    Spoof any magnetic stripe or credit card entirely wirelessly, even on standard magstripe/credit card readers
    Disable chip and PIN (EMV) protection
    Switch between different credit cards
    Accurately predict the card number and expiration date

…on American Express credit cards.


Here's How MagSpoof Works

The wireless function of MagSpoof works by emitting a strong "electromagnetic field" that emulates a traditional magnetic stripe card as if it is physically being swiped.
magspoof-hacking-credit-card

    "What is incredible is that the magstripe reader requires no form of wireless receiver, RFID, or NFC – MagSpoof works wirelessly, even with standard magstripe readers," Kamkar says in his blog. "You can put it up to any traditional point of sales system, and it will believe that a card is being swiped."

After losing an American Express cards, Kamkar noticed that the replacement card's number appeared to have a relationship with his previous three American Express cards.

Kamkar recorded all the numbers and worked out a global pattern that allowed him to accurately predict up to 20 American Express card and replacement card numbers shared with him by his friends for his research.

Kamkar has also provided the necessary code that you can download from Github by following the instructions to build your own MagSpoof device, but…

…the code will be somewhat altered because Kamkar has removed the code's ability to deactivate EMV and hasn't released the AMEX prediction algorithm.


American Express has been notified of the issue and says the company is working on a fix.

A technology that can bring dead back to life might be a reality soon

Researchers plan to bring dead to life by freezing their brains and then resurrecting them with artificial intelligence

Bringing the dead back to life is futuristic and final frontier of science and Humai is working on just that. Humai is a technology company based in Los Angeles and is working on a project known as “Atom & Eve” that would let human consciousness be transferred to an artificial body after their death.

The artificial intelligence company has said it can resurrect human beings within the next 30 years. The “conversational styles, [behavioural]patterns, thought processes and information about how your body functions from the inside-out” would be stored on a silicon chip through AI and nanotechnology.

Humai researchers are banking on three technologies – bionics, nanotechnology and artificial intelligence – to achieve their goal of bringing the dead back to life and they feel that it will take around three decades for them to achieve this goal.

The founder of Humai, Josh Bocanegra told the Australian Popular Science: “I accept death, I’m not afraid of it that I’m not 100% sure I’m going to die one day.” While their Facebook page states, “Will death always be inevitable? We don’t think so.”

Bocanegra told Australian Popular Science that the brain of the deceased will be frozen using cryonics technology so that when the technology is fully developed they can implant the brain into an artificial body.

Humai says that bringing a body back to life won’t be easy, or cheap. It’s not known how the brains would be harvested, or for that matter, how much it would cost to bring someone back from the dead. Bocanegra says,”Using cloning technology, we will restore the brain as it matures”. “I don’t think of it as fighting death. I think of it as making death optional. I personally cannot imagine why someone would want to die, but I respect everyone’s wishes,” Bocanegra adds.

The most astonishing fact about Humai is that it consists of only five members. Two of them are researchers, one is the ambassador and an AI expert.

Should we be playing with the nature and bringing back the dead?

How To Remove Your Embarrassing Photos From All Social Media Websites

Work Hard and Party Even Harder. That’s the byword of today’s generation. Most of us have the same motto, myself being its hardcore follower.
It is pretty cool until a photograph of you being stoned or in an embarrassing situation surfaces on the internet a few days later. You can always try and keep safe your Android set by taking some measures.

No matter how much caution you keep on posting a selfie on Instagram or keeping a strict privacy over your Facebook account, you are just a click away from landing into embarrassing situations. It could either come from your friend or your teen imprudence.

Little embarrassment can be handled, but when something as trivial as this lands you in a major trouble as ruining a relationship (because a troubling pic from a distant past with your ex, resurfaces) or makes you a butt of jokes at the office, first thing that comes to mind is to just erase yourself completely from the internet.

Well, there is a simpler and better alternative.
REMOVE  YOUR  EMBARRASSING PHOTOS  FROM  SOCIAL  MEDIA:

Learn from these infographics to remove your photos from WhoIsHostingThis?

17 ATMs hacked and $1.2 million stolen by hackers from Malaysia

Hackers steal more than $1.2 million from 17 automated teller machines (ATMs) in Malaysia

A Latin American gang of cyber criminals were able to exploit a way to hack and steal millions of dollars from 17 automated teller machines (ATM) in Malaysia.

ATMs of at least 17 bank branches belonging to United Overseas Bank, Affin Bank, Al Rajhi Bank and Bank of Islam were reportedly hacked into by the Latin American gang.

Closed-circuit television (CCTV) footage from the banks showed that 2-3 Latin American men, who were involved in the crime, entered and withdraw money from these ATM’s one after another.

Bukit Aman Commercial Crime Investigation Department chief Comm Datuk Mortadza Nazarene told Bernama that the suspects used a computer malware known as “ulssm.exe” to hack into the ATMs. “The suspects were found to have opened the top panel of the machine without using a key and inserted a compact disc into the machine’s processing centre which caused the ATM’s system to reboot,” he told Bernama, Tuesday morning, The Star reported.

A Selangor Commercial Crime Investigation Department spokesman said that investigations is still going on. In the meantime police were able to recover one of the ATM cards which was used by the hackers to withdraw the money. 

Since it was the ATM which was rebooted to default, no customers data was compromised in the hack, police are investigating the scene and believes the gang members are still in the country.

 

The Top Ten Hacker Tools of 2015

List of top ten hacker tools of 2015

Every task requires a good set of tools.This because having right tools in hand one can save much of its energy and time.In the world of Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares.

If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them. Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll.

1. Nmap:  Network Mapper

Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network, what services (application name and version) they offer,which type of protocols are being used for providing the services,what operating systems (and OS versions and possible patches) and what type and version of packet filters/ firewalls are being used by the target.

2. Metasploit:

A tool for exploiting (Utilising network weakness for making a “backdoor”) vulnerabilities (Weak Points) on Network. This tool is neither free nor open source. But when it comes to features offered it deserves the price it claims. The Metasploit Project is a hugely popular pentesting (penetration testing) or hacking tool that is used by cybersecurity professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

3. Cain and Abel:

Cain & Abel is a password recovery tool that is mostly used for Microsoft Operating Systems. This popular hacking tool allows the user to seek the recovery of various kind of passwords by sniffing the network(capturing some of the data packets), cracking encrypted passwords using Dictionary, Brute-Force(Generation of hashes out of words and then comparison of encrypted hash with the generated one,this method takes less time than dictionary attack method) and Cryptanalysis attacks. Cain, as it is often referred to, can also record VoIP(Voice over IP protocol,used for making calls over using internet) conversations, decode hashed scrambled passwords, recover wireless network keys and more.It can crack various types of hashes including NTLM,MD2,MD5,SHA-1,SHA-2 and many more.These functionalities make Cain and Abel one of the best password recovery tool.

4. Angry IP Scanner: 

Angry IP Scanner, also known as ‘ipscan’ is a freely available (open-source and cross-platform) hacking network scanner that is both fast and easy to use. The main purpose of this hacking tool is to scan IP addresses and ports to find open doors and ports. Worth noting that Angry IP Scanner also has a bunch of other uses as well. Common users of this hacking tool include network administrators and system engineers.

5.John The Ripper: 

John the Ripper is a popular password cracking pentesting tool that is most commonly used to perform dictionary attacks. John the Ripper takes text string samples (from a text file, referred to as a wordlist, containing popular and complex words found in a dictionary or real passwords cracked before), encrypting it in the same way as the password being cracked (including both the encryption algorithm and key), and comparing the output to the encrypted string. This tool can also be used to perform a variety of alterations to dictionary attacks.Including Brute Force and Rainbow attacks.

6. THC Hydra:

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP(Lightweight Directory Access Protocol),SMB, VNC, and SSH(Secure Shell,used by VPN Softwares).

7. Burp Suite:

A pentesting tool,Burp Suite has several features that can help the penetration tester or ethical hacker. Two commonly used applications used within this tool include the ‘Burp Suite Spider’ which can enumerate and map out the various pages and parameters of a web site by examining cookies and initiates connections with these web applications, and the ‘Intruder’ which performs automated attacks on web applications.

8. Nessus Remote Security Scanner

Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus is the worlds Nessus Remote Security Scanner most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. (This tool is not in the Concise list)

9. Ettercap:

Ettercap has a huge following and is widely used by cyber security professionals. Ettercap works by placing the user’s network interface into promiscuous mode and by ARP poisoning(ARP : Address resolution protocol is used to determine a host’s MAC address (address of its Network Interface Card) by knowing its IP address. ARP poisoning is a process where a hacker gives wrong information of either its MAC or IP address to the network.) the target machines, i.e. facilitating a ‘Man In The Middle’ or MITM attack. Once successful Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

10. Wapiti:

Wapiti has a very loyal following. As a pentesting tool (or framework) Wapiti is able to scan and detect hundreds of possible vulnerabilities. Essentially this Multi Purpose Hacker Tools can audit the security of web applications by performing “black-box” scans, i.e. it does not study the source code of the application but will scan the HTML pages of the application seeking scripts and forms where it can inject data.

 

Central Bureau of Investigation (CBI) arrest an Indian for stealing Microsoft product keys and selling them for profit

 

India’s premier investigating agency, the Central Bureau of Investigation (CBI) today arrested a man for stealing product keys of various Microsoft products and selling them to the unsusupecting customers for a ungainly profit.  CBI issued a statement saying that they had arrested a person named D.Prabhu.  D.Prabhu is not linked to any hacker groups and is a private individual.  CBI says that he was doing the about stealing for his personal profit. 

A CBI spokesperson said: “The complaint was lodged by Microsoft. The agency took up the investigation as the alleged offence has larger ramifications.” According to the official, the quantum of loss suffered by Microsoft is yet to be quantified as the thief sold keys of various Microsoft products.

 

According to CBI, a case has been registered on the allegations that Microsoft Volume License Service Centre (VLSC) agreements in respect of different overseas and Indian customers of the Microsoft were unauthorisedly being accessed aka hacked for the purpose of stealing product keys of different Microsoft products.

 

CBI also said that searches made at Prabhu’s premises yielded substantial evidence about the theft including recovery of hard disks, a router, a numbers of Microsoft product kits and other documents. The CBI has also frozen the bank account of the accused used to collect the sale amount. The accused was Friday produced before a local court here and the agency obtained transit remand.

 

Secure messaging App Telegram blocks 78 ‘ISIS-related’ channels

Telegram blocks 78 IS-propaganda channels from using its secure and encrypted messaging platform

It has been well known that the ISIS and its supporters use the Telegram App to propagate their ideology. Now the Telegram creators have blocked as many as 78 ISIS affiliated accounts from using its encrypted and secure service.

The Berlin-based Telegram, a popular mobile messaging service app has blocked 78 known ISIS sympathizer accounts from using its technology to communicate and spread propaganda to a wide audience. Telegram, which has been founded by two Russian brothers, Pavel Durov and Nicolay Durov uses strong encryption that makes it all but impossible for security services to intercept private messages between individuals or members of a group.

In a statement released on Wednesday, Telegram said that it has blocked 78 ISIS-related channels that the terrorist group used to spread propaganda and communicate with other members. The group had been using the app for distributing its propaganda material since October, when Telegram introduced a feature letting users broadcast messages to an unlimited number of subscribers.

“We were disturbed to learn that Telegram’s public channels were being used by ISIS to spread their propaganda. We are carefully reviewing all reports sent to us at abuse@telegram.org and are taking appropriate action to block such channels. As a result, this week alone we blocked 78 ISIS-related channels across 12 languages.

We are also introducing an easier way for our users to report objectionable public content in the upcoming update of Telegram this week.”

Telegram, Russia’s most popular social network site is very famous internationally, where it is used as an alternative to WhatsApp on similar services. It is an ultra-secure way to quickly upload texts and voice messages, and share videos. It says it has 60 million active users. In 2014, the app racked up millions of downloads, following Facebook’s acquisition of WhatsApp. According to its founder, Pavel Durov, who disclosed the stats during TechCrunch Disrupt in September, said that the app sees more than 12 billion messages a day.

According to security researchers, Telegram became the preferred method for Islamic State to broadcast news and share videos of military victories or sermons. The group used Telegram to claim responsibility for the Paris attacks, which left 129 people dead, and the bombing of a Russian airliner over Egypt last month, which killed 224.

According to Alex Kassirer, a counter-terrorism analyst with the New York-based private intelligence firm Flashpoint, said that IS had started using Telegram broadcast channels to send press releases targeted at inspiring and recruiting followers.

Further, Rita Katz, director of Bethesda, Maryland.-based extremist monitoring service SITE Intelligence Group said that some of the dozens of channels set up had 10,000 followers or more. Some of those channels could not be accessed on Wednesday afternoon and a message was displayed saying they were no longer available. She further added that Telegram had appeared to let the jihadists operate without fear of being turned off or traced until Wednesday.

However, Telegram explicitly says on its site that it makes efforts to block Islamic State, which is also known as ISIS.

The company statement stressed that shutting down ISIS channels on the site was not taken to restrict free speech, which it encourages.

“While we do block terrorist (e.g. ISIS-related) bots and channels, we will not block anybody who peacefully expresses alternative opinions,” Telegram said of its actions.

Telegram said the move would only affect public channels and automated response systems called ‘bots.’ Messages between individuals and group chats that can include up to 200 users would not be affected. While the app says it blocked the ISIS-related channels, unfortunately private communications between ISIS members were unaffected by those blocks.