Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian

The so-called Shadow Brokers, who claimed responsibility for releasing NSA tools that were used to spread the WannaCry ransomware through the NHS and across the world, said they have a new suite of tools and vulnerabilities in newer software. The possible targets include Microsoft’s Windows 10, which was unaffected by the initial attack and is on at least 500m devices around the world.

Fuente: Shadow Brokers threaten to unleash more hacking tools | Technology | The Guardian


Digital gold: why hackers love Bitcoin | Technology | The Guardian

The WannaCry ransomware attackers demanded payment in the cryptocurrency. But its use in the ‘clean’ economy is growing, too, and could revolutionise how we use money

Fuente: Digital gold: why hackers love Bitcoin | Technology | The Guardian


Pirates of the Caribbean 5: hackers threaten to post film online unless Disney pays ransom | US news | The Guardian

Hollywood Reporter says CEO Bob Iger has told employees that film would be released in segments online unless hackers were paid in bitcoin

Fuente: Pirates of the Caribbean 5: hackers threaten to post film online unless Disney pays ransom | US news | The Guardian


Leaked NSA Malware Is Helping Hijack Computers Around the World

In mid-April, an arsenal of powerful software tools apparently designed by the NSA to infect and control Windows computers was leaked by an entity known only as the “Shadow Brokers.” Not even a whole month later, the hypothetical threat that criminals would use the tools against the general public has become real, and tens of thousands of computers worldwide are now crippled by an unknown party demanding ransom.

Fuente: Leaked NSA Malware Is Helping Hijack Computers Around the World


Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador

El gigante de la informática criticó el papel de los gobiernos y organizaciones que coleccionan vulnerabilidades informáticas que después pueden ser robadas o vendidas a delincuentes informáticos. La empresa pide que lo sucedido sea una lección para erradicar esta práctica en el mundo.

Fuente: Microsoft responsabiliza a la Agencia de Seguridad Nacional de EE.UU. de propiciar el ciberataque masivo que afectó al menos a 150 países – El Mostrador


WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador

Expertos en informática advierten que un nuevo ataque global con un brote de ransomware es “inminente” y que incluso podría ser lanzado el lunes. BBC Mundo te cuenta los detalles y cómo protegerte de estos virus.

Fuente: WannaCry: por qué los expertos creen que puede haber otro ciberataque muy pronto – El Mostrador


El ciberataque de escala mundial y “dimensión nunca antes vista” que afectó a instituciones y empresas de casi 100 países – El Mostrador

Un ciberataque “de dimensión nunca antes vista” logró este viernes bloquear el acceso a los sistemas informáticos de instituciones estatales y empresas de varios países.La policía europea, Europol, indicó que el ciberataque era de una escala “sin precedentes” y advirtió que una “compleja investigación internacional” era necesaria para “identificar a los culpables”.

Fuente: El ciberataque de escala mundial y “dimensión nunca antes vista” que afectó a instituciones y empresas de casi 100 países – El Mostrador


Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.

Fuente: WikiLeaks publishes ‘biggest ever leak of secret CIA documents’ | Media | The Guardian


Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices

It’s difficult to buy a new TV that doesn’t come with a suite of (generally mediocre) “smart” software, giving your home theater some of the functions typically found in phones and tablets. But bringing these extra features into your living room means bringing a microphone, too — a fact the CIA is exploiting, according to a new trove of documents released today by Wikileaks.

Fuente: Wikileaks Dump Shows CIA Could Turn Smart TVs into Listening Devices


WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador

La información revelada hoy sobre “hacking” (ataque cibernético) es parte de una serie en siete entregas que define como “la mayor filtración de datos de inteligencia de la historia”.

Fuente: WikiLeaks filtra programa encubierto de la CIA que usa celulares y televisores como “micrófonos encubiertos” – El Mostrador


The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard

In January, Motherboard reported on the FBI’s “unprecedented” hacking operation, in which the agency, using a single warrant, deployed malware to over one thousand alleged visitors of a dark web child pornography site. Now, it has emerged that the campaign was actually an order of magnitude larger.

Fuente: The FBI Hacked Over 8,000 Computers In 120 Countries Based on One Warrant | Motherboard


Adult Friend Finder and Penthouse hacked in largest personal data breach on record

Over 412m accounts from pornography sites and sex hookup service reportedly leaked as Friend Finder Networks suffers second hack in just over a year

Fuente: Adult Friend Finder and Penthouse hacked in largest personal data breach on record


DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian

The cyber-attack that brought down much of America’s internet last week was caused by a new weapon called the Mirai botnet and was likely the largest of its kind in history, experts said.

Fuente: DDoS attack that disrupted internet was largest of its kind in history, experts say | Technology | The Guardian


Spies for Hire

While cybersecurity companies traditionally aim to ensure that the code in software and hardware is free of flaws — mistakes that malicious hackers can take advantage of — DarkMatter, according to sources familiar with the company’s activities, was trying to find and exploit these flaws in order to install malware. DarkMatter could take over a nearby surveillance camera or cellphone and basically do whatever it wanted with it — conduct surveillance, interfere with or change any electronic messages it emitted, or block the signals entirely.

Fuente: Spies for Hire


Cyber attack: hackers ‘weaponised’ everyday devices with malware to mount assault | Technology | The Guardian

The huge attack on global internet access, which blocked some of the world’s most popular websites, is believed to have been unleashed by hackers using common devices like webcams and digital recorders.

Fuente: Cyber attack: hackers ‘weaponised’ everyday devices with malware to mount assault | Technology | The Guardian


Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas

Un grupo de hackers vinculado a la Agencia de Seguridad Nacional de los Estados Unidos, mejor conocida como la NSA (National Security Agency), ha sido hackeado recientemente y sus herramientas de espionaje, recolección de información, malware y más, han sido puestas en venta por 1 millón de bitcoins (más de 550 millones de dólares al momento de la publicación).

Fuente: Hackean grupo de espionaje de la NSA y subastan información por 1 millón de bitcoins | CriptoNoticias – Bitcoin, Blockchain y criptomonedas


¿Son estas las armas de espionaje de la NSA? | Derechos Digitales

Un grupo de hackers dice haber obtenido información confidencial de Equation Group, un conocido y sofisticado grupo de ciber atacantes ligado a la NSA. Parte de la información publicada permite por primera vez echar un vistazo a las herramientas utilizadas por la agencia de seguridad estadounidense.

Fuente: ¿Son estas las armas de espionaje de la NSA? | Derechos Digitales


Se cumple el aniversario de la filtración masiva de datos del Hacking Team | R3D: Red en Defensa de los Derechos Digitales

Hace un año, más de mil 500 correos electrónicos y 400 GB de información de la empresa italiana Hacking Team, dedicada a la venta de software para vigilancia, fueron hechos públicos.

Fuente: Se cumple el aniversario de la filtración masiva de datos del Hacking Team | R3D: Red en Defensa de los Derechos Digitales


“La ciberguerra sería una forma de terrorismo de Estado”

El libro pretende incentivar la mirada crítica entre el gran público ante los acontecimientos calificados de “ciberguerra” y alertar de la coartada que puede proporcionar el tremendismo sensacionalista en estos temas a quienes pretenden recortar libertades o privacidad.

Fuente: “La ciberguerra sería una forma de terrorismo de Estado”


The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard

Back in July of last year, the controversial government spying and hacking tool seller Hacking Team was hacked itself by an outside attacker. The breach made headlines worldwide, but no one knew much about the perpetrator or how he did it.That mystery has finally been revealed.

Fuente: The Vigilante Who Hacked Hacking Team Explains How He Did It | Motherboard


Reino Unido espía a los refugiados hackeando sus móviles y ordenadores

Los refugiados no tienen derechos. De ahí se deriva que sus teléfonos pueden ser hackeados y sus ordenadores también. Al parecer, esto es lo que ha hecho -legalmente y según The Observer – los funcionarios de la oficina de inmigración británica. En 2013 recibieron poderes para hackear los dispositivos electrónicos de todos los refugiados y peticionarios de asilo que considerasen necesario. Y lo consideran.

Fuente: Reino Unido espía a los refugiados hackeando sus móviles y ordenadores


Major sites including New York Times and BBC hit by ‘ransomware’ malvertising | Technology | The Guardian

Adverts hijacked by malicious campaign that demands payment in bitcoin to unlock user computers

Fuente: Major sites including New York Times and BBC hit by ‘ransomware’ malvertising | Technology | The Guardian


Malicious attacks account for bulk of data loss – FT.com

Malware and hacking have overtaken employee error as the leading cause of data loss at companies, according to research from Beazley, the insurer. Malicious attacks accounted for a third of data breaches last year, up from 18 per cent in 2014.

Fuente: Malicious attacks account for bulk of data loss – FT.com


Apple Macs targeted by KeRanger ransomware for first time | Technology | The Guardian

Apple customers were targeted by hackers over the weekend in the first campaign against Macintosh computers using a pernicious type of software known as ransomware, researchers with Palo Alto Networks have revealed.Ransomware, one of the fastest-growing types of cyber threats, encrypts data on infected machines, then typically asks users to pay ransoms in hard-to-trace digital currencies to get an electronic key so they can retrieve their data.

Fuente: Apple Macs targeted by KeRanger ransomware for first time | Technology | The Guardian


Regulators are failing to block fraudulent adverts – FT.com

You might have thought that an industry in which a tenth of transactions are fraudulent, which leaks billions of dollars a year, and in which many turn a blind eye to criminality would be raided by the police. So far, there is no sign of it. The

Fuente: Regulators are failing to block fraudulent adverts – FT.com


Danger in the digital age: the internet of vulnerable things – FT.com

Danger in the digital age: the internet of vulnerable things – FT.com.

Steel workers are silhouetted by the light emanating from a steel mill oven in the eastern German town of Eisenhuettenstadt in this undated file photo©Reinhard Kraus/Reuters

Hackers gained access to control systems at a German steel mill

Since the first PC virus was set loose in the mid-1980s by two brothers in Lahore — reportedly to deter piracy of software they had written — technology users have discovered that the connected world delivers risks as well as benefits.

Less well understood are the growing cyber threats to physical assets, as the online world merges with the real one.

The internet of things — the network of physical objects embedded with electronics, software, sensors and connectivity — allows domestic appliances to be controlled automatically or production lines to be managed remotely.

But it also creates the possibility of cyber kinetic attacks — opportunities for hackers to target anything from fridges and factories, traffic lights or water treatment plants.

In industries such as oil and gas, for example, the ability to monitor and alter well pressure, temperature and flow extraction rates remotely offers opportunities to streamline operations and maximise production and profitability. But these networked systems also create areas of vulnerability.

At the end of last year, Germany’s Federal Office for Information Security revealed that hackers had managed to access the control systems at an unnamed steel mill in the country, preventing a blast furnace from shutting down properly and causing “massive” — though unspecified — damage.

The attackers had gained access through the plant’s business network, using a “spear-phishing” email — a targeted email that appears to come from a trusted source but contains a malware attachment or link to a malicious website. Once a foothold had been established on the corporate system, the hackers were able to explore the company’s networks, before causing damage via the production network.

 


How to tell if you've been hacked | Technology | The Guardian

How to tell if you’ve been hacked | Technology | The Guardian.

Worried that you might get compromised by hackers? The bad news is that the rest of the internet might know before you do

A man uses a laptop.
If you’ve been hacked, you may be the last to know. Photograph: Magdalena Rehova / Alamy/Alamy

According to the UK Government’s 2014 cybersecurity survey, 81% of large businesses have suffered malicious data breaches. That suggests almost one in five didn’t. But how can those companies be sure?

Working out whether you’ve been hacked by cybercriminals is like leaving your diary in your bag while you visit the bathroom. When you get back, everything might still be in your bag, but you can’t be certain that no one sneaked a peek.

“In this context, it’s impractical to prove a negative,” said Lenny Zeltser, a senior faculty member at the SANS Institute, who teaches malware defence and analysis there. “A company responding to signs of infection can conclude that it has been breached,” he points out. “However, the lack of visible signs of a compromise doesn’t indicate that the enterprise has not been breached.”

Or to quote Donald Rumsfeld, when thinking about hackers, companies will always have to cope with those pesky unknown unknowns.

In the early days of cyber intrusion, many hackers were crying out to be known. They were eager to crow about what they had done, and often revealed themselves in spectacular fashion by deleting files or defacing websites. These attackers still exist, and are often driven to make a political point.


New smoking gun further ties NSA to omnipotent “Equation Group” hackers | Ars Technica

New smoking gun further ties NSA to omnipotent “Equation Group” hackers | Ars Technica.

What are the chances unrelated state-sponsored projects were both named “BACKSNARF”?

 

 

 

Researchers from Moscow-based Kaspersky Lab have uncovered more evidence tying the US National Security Agency to a nearly omnipotent group of hackers who operated undetected for at least 14 years.

 

The Kaspersky researchers once again stopped short of saying the hacking collective they dubbed Equation Group was the handiwork of the NSA, saying only that the operation had to have been sponsored by a nation-state with nearly unlimited resources to dedicate to the project. Still, they heaped new findings on top of a mountain of existing evidence that already strongly implicated the spy agency. The strongest new tie to the NSA was the string “BACKSNARF_AB25” discovered only a few days ago embedded in a newly found sample of the Equation Group espionage platform dubbed “EquationDrug.” “BACKSNARF,” according to page 19 of this undated NSA presentation, was the name of a project tied to the NSA’s Tailored Access Operations.


Hackers take down Lenovo website – FT.com

Hackers take down Lenovo website – FT.com.

High quality global journalism requires investment. Please share this article with others using the link below, do not cut & paste the article. See our Ts&Cs and Copyright Policy for more detail. Email ftsales.support@ft.com to buy additional rights. http://www.ft.com/cms/s/0/77843ec2-bd5f-11e4-b523-00144feab7de.html#ixzz3SzdZG1cE

 

February 26, 2015 2:45 am

Hackers take down Lenovo website

 

A pedestrian walks past the Lenovo Group Ltd. flagship store on Qianmen Street in Beijing, China, on Tuesday, Nov. 11, 2014. Lenovo Chief Executive Officer Yang Yuanqing has expanded in computer servers and mobile phones, including the $2.91 billion purchase of Motorola Mobility, to help combat a shrinking personal-computer market. Photographer: Tomohiro Ohsumi/Bloomberg©Bloomberg

Lenovo’s website has been hacked, less than a week after the personal computer maker was forced to disable controversial software that left users of its laptops vulnerable to cyber attacks.

On Thursday, the group – the world’s largest PC manufacturer by unit sales – said that users trying to visit its website had been redirected to another site by hackers.Hacker collective Lizard Squad had claimed credit for the attack via Twitter, where it also posted internal Lenovo e-mails discussing Superfish, the advertising software that the PC maker disabled on its products last week.

Lizard Squad has previously claimed credit for cyber attacks on Sony’s PlayStation network and Microsoft’s Xbox Live network. On Thursday, it also boasted of an attack on Google’s Vietnamese website.

Lenovo said it had taken its website down and was also investigating “other aspects” of the attack.

Later on Thursday morning, visitors to lenovo.com on Thursday morning received a message stating: “The Lenovo site you are attempting to access is currently unavailable due to system maintenance.” It was restored on Thursday afternoon.

Last week, Lenovo acknowledged that its consumer division had sold laptops pre-installed with controversial advertising software called Superfish that potentially left its computers open to being hacked. It said it had stopped installing Superfish on new units in January and disabled the software on existing machines.

Computer experts had warned of a security hole in the software that hackers could exploit to eavesdrop on a user’s web-browsing behaviour.

 


Lenovo admits to software vulnerability – FT.com

Lenovo admits to software vulnerability – FT.com.

 

Last updated: February 19, 2015 7:00 pm

Lenovo admits to software vulnerability

 

Lenovo Group Ltd. signage is displayed near laptops in an arranged photograph at a Lenovo store in the Yuen Long district of Hong Kong, China, on Friday, May 23, 2014. Lenovo, the world's largest maker of personal computers, reported a 25 percent jump in fourth-quarter profit as its desktop models and mobile devices gained global market share. Photographer: Brent Lewin/Bloomberg©Bloomberg

Lenovo, the world’s largest computer manufacturer by unit sales, has been forced to disable controversial software that left users of its laptops vulnerable to hacking attacks.

The software Superfish, which was pre-installed on Lenovo’s devices, was billed as a free “visual search” tool. But Lenovo used it to inject adverts into web pages.

More controversially, however, computer experts have discovered that Superfish contains a major security hole that hackers can potentially exploit to eavesdrop on a user’s web-browsing behaviour.

Users have been raising concerns about Superfish on Lenovo’s own online forums since September, complaining that the software is putting additional advertising into web pages without their permission.

Computer manufacturers often pre-install so-called “adware” into their laptops and PCs in exchange for payment by the software makers, which in turn make money from advertisers.

Lenovo said its customers were given a choice about whether to use the product.

However, Graham Cluley, an independent security expert, said the way in which Lenovo had installed the adware was “cack-handed, and could be exploited by a malicious hacker to intercept the traffic of innocent parties”.

While there is no evidence that hackers have exploited the vulnerability, Mr Cluley said: “If you have Superfish on your computer you really can’t trust secure connections to sites any more.”

 


Cuentas en redes de Comando Central de EE.UU. hackeadas por “simpatizantes” de EI – El Mostrador

Cuentas en redes de Comando Central de EE.UU. hackeadas por “simpatizantes” de EI – El Mostrador.

Centcom es el comando estadounidense que maneja las operaciones en Medio Oriente, Asia Central y Africa del Norte, y por tanto es donde se coordina la ofensiva contra EI en Irak y Siria.

EI

Algunas cuentas de redes sociales del Comando Central del Ejército de Estados Unidos (CentCom) fueron hackeadas este lunes por un grupo que se declaró simpatizante de Estado Islámico.

Centcom es el comando estadounidense que maneja las operaciones en Medio Oriente, Asia Central y Africa del Norte, y por tanto es donde se coordina la ofensiva contra EI en Irak y Siria.

En la cuenta de Twitter se pudo observar como los piratas informáticos cambiaron las imágenes de la cuenta y ubicaron la de un hombre encapuchado y el siguiente mensaje: “El cibercalifato continúa su ciber yihad. Ya está aquí. Estamos en sus PCs. En cada base militar”.

También fue publicada una lista de generales y una lista de direcciones aparentemente asociadas a ellos.

Además se colocó una serie de lo que parece ser documentos militares vinculados a China y Corea del Norte.

En el sitio de YouTube fueron colocados videos de propaganda del grupo mostrando operaciones militares.


US Central Command Twitter account hacked to read 'I love Isis' | US news | theguardian.com

US Central Command Twitter account hacked to read ‘I love Isis’ | US news | theguardian.com.

Twitter avatar used by @CENTCOM was replaced with an image of a masked militant and the legends ‘CyberCaliphate’ and ‘I love Isis’

US Central Command
Central Command said it was aware of the apparent hack.

The Twitter account for US military forces in the Middle East and South Asia was hacked on Monday.

@CENTCOM, the account used by the US Central Command, tweetedout “messages from Islamic State (Isis) sympathizers threatening attacks on US military personnel”. Other tweets contained contact details for current and retired senior officers, though they did not appear to disseminate classified material.

The Twitter avatar used by the command was replaced with an image of a masked militant and the legends “CyberCaliphate” and “I love Isis”.

Documents and images tweeted out by the hackers did not appear to be classified, despite their boast that Isis had deeply penetrated the cyber defenses of the US military. Other military websites, including Central Command’s, appeared unaffected, and did not show any mark of cybervandalism, let alone any more hostile acts.

A similar avatar appeared on Central Command’s YouTube channel as well, as did at least two pro-Isis videos. Its Facebook account appeared unaffected.

“American soldiers, we are coming, watch your back!” read one tweet.Another claimed: “Isis is already here, we are in your PCs, in each military base.”

Within minutes of the hijacked tweets, the Twitter account switched to a neutral, egg-like avatar as the unauthorized tweets paused. Twitter appeared to have suspended the account shortly after 1pm ET.

The hack happened nearly the same time President Obama was unveiling a plan to require companies to inform customers when their data has been hacked.