Digital gold: why hackers love Bitcoin | Technology | The Guardian

The WannaCry ransomware attackers demanded payment in the cryptocurrency. But its use in the ‘clean’ economy is growing, too, and could revolutionise how we use money

Fuente: Digital gold: why hackers love Bitcoin | Technology | The Guardian


Sólo actas de 1.300 cabildos de más de13.000 serán validadas por problemas en la web – El Mostrador

Una seria advertencia hicieron algunos miembros del Consejo Ciudadano de Observadores (CCO) respecto a que sólo actas de 1.300 cabildos de los más de 13.000 que están inscritos serán validadas e incluidas en el texto final del gobierno, debido a que la página web ha presentado deficiencias como el no contar con un sistema de autoguardado y problemas de conexión.

Fuente: Sólo actas de 1.300 cabildos de más de13.000 serán validadas por problemas en la web – El Mostrador


Swift: fraudulent messages sent over international bank transfer system | Technology | The Guardian

World money exchange tells 11,000 financial institutions to update their software after US$81m was stolen from account of Bangladesh central bank

Fuente: Swift: fraudulent messages sent over international bank transfer system | Technology | The Guardian


The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos

SOFT ROBOTS THAT can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence that will sift through large data sets — these are just a few of the technologies being pursued by companies with investment from In-Q-Tel, the CIA’s venture capital firm, according to a document obtained by The Intercept.

Fuente: The CIA Is Investing in Firms That Mine Your Tweets and Instagram Photos


Regulators are failing to block fraudulent adverts – FT.com

You might have thought that an industry in which a tenth of transactions are fraudulent, which leaks billions of dollars a year, and in which many turn a blind eye to criminality would be raided by the police. So far, there is no sign of it. The

Fuente: Regulators are failing to block fraudulent adverts – FT.com


New smoking gun further ties NSA to omnipotent “Equation Group” hackers | Ars Technica

New smoking gun further ties NSA to omnipotent “Equation Group” hackers | Ars Technica.

What are the chances unrelated state-sponsored projects were both named “BACKSNARF”?

 

 

 

Researchers from Moscow-based Kaspersky Lab have uncovered more evidence tying the US National Security Agency to a nearly omnipotent group of hackers who operated undetected for at least 14 years.

 

The Kaspersky researchers once again stopped short of saying the hacking collective they dubbed Equation Group was the handiwork of the NSA, saying only that the operation had to have been sponsored by a nation-state with nearly unlimited resources to dedicate to the project. Still, they heaped new findings on top of a mountain of existing evidence that already strongly implicated the spy agency. The strongest new tie to the NSA was the string “BACKSNARF_AB25” discovered only a few days ago embedded in a newly found sample of the Equation Group espionage platform dubbed “EquationDrug.” “BACKSNARF,” according to page 19 of this undated NSA presentation, was the name of a project tied to the NSA’s Tailored Access Operations.


Images from up to 200,000 teenagers leaked on to internet after users lured into saving images on Snapsaved.com

jennifer lawrence
It is suspected that those behind the Snapchat scam are linked to the people responsible for the collection and posting of nude photos taken by hundreds of celebrities, including Jennifer Lawrence. Photograph: Axelle/Bauer-Griffin/FilmMagic

Videos and pictures of as many as 200,000 teenagers posted via the Snapchat service and stored on a third party website have been put online, apparently by the same people who were behind the posting of nude celebrity photos in August.

The photos and videos were captured after some users of Snapchat – a mobile phone app which allows people to send photos to each other but which delete themselves within seconds of being viewed – were tempted into using a site called “Snapsaved.com”. That offered to let them use the service on a website on a desktop computer, rather than just on a mobile phone.

But the site appears to have been maliciously saving the users’ login details and storing the photos and videos that were posted. An app called Snapsave, which offers similar functionality but whose developer says it only stores photos on the user’s mobile phone, is not believed to be involved.

By getting a user’s username and password, the site could authorise itself to Snapchat’s servers, and receive or send pictures they viewed through it but could also store it without the knowledge of the user or Snapchat.

It is suspected, but not so far proven, that those behind the scam are linked to those responsible for the collection and posting in August of personal and often nude photos taken by hundreds of celebrities, including Jennifer Lawrence and Kim Kardashian. The celebrity photo leak began with discussions on one of the 4chan discussion forums, and the latest photos have also come via 4chan leaks.

After warnings appeared on the bulletin board 4chan on Friday that the photos would be leaked, a site went live on Sunday offering 13 gigabytes of content which was said to have been captured from users.


Sophisticated iPhone and Android malware is spying on Hong Kong protesters | The Verge

Sophisticated iPhone and Android malware is spying on Hong Kong protesters | The Verge.

Researchers say all signs point to the Chinese government

 

 

A fake smartphone app is being used to remotely monitor pro-democracy protesters in Hong Kong, according to a report from the New York Times. Researchers from Lacoon Mobile Security say the phishing scam is spreading across the messaging application WhatsApp, through texts that read: “Check out this Android app designed by Code4HK for the coordination of OCCUPY CENTRAL!”, along with a link to download software. Lacoon says the software, once downloaded, can access a user’s personal data, including phone calls, text messages, and the physical location of their smartphone. Code4HK — a developer community that has helped to spread information about the protests — tells the Times it had nothing to do with the texts.

 

The origin of the scam remains unknown, but Lacoon CEO Michael Shaulov says the Chinese government is likely behind it, given the location of the servers and the sophistication of the operation. The company traced it to a computer that they say is similar to those that the Chinese government allegedly used to launch cyberattacks against US targets last year. The spread of the app remains equally unclear, though Shaulov says it was downloaded by one out of every ten phones that received the fake message. It has affected both Android and iOS users alike, although many in the security world have noted that only jailbroken iOS phones are vulnerable.


Is there a Rihanna sex tape? No, it's a malware scam on Facebook | Technology | theguardian.com

Is there a Rihanna sex tape? No, it’s a malware scam on Facebook | Technology | theguardian.com.

But it’s not as popular as the fake app pretending to tell you who’s been peeking at your profile

Clicking on a Facebook link to a 'Rihanna sex tape' won't end well.
Clicking on a Facebook link to a ‘Rihanna sex tape’ won’t end well. Photograph: Patrick McMullan Co./REX

There is no sex tape of Rihanna and her boyfriend doing the rounds online. You can’t see who’s been looking at your Facebook profile. And you can’t change your Facebook colour either.

This may all sound obvious, but according to antivirus firm Bitdefender, these are the most popular malware scams on the social network in 2014.

The company has published a list of the top 10 Facebook scams, with the fake app promising to tell you your Facebook views and visitors by far the most popular, accounting for 30.2% of bogus links it identified on the social network this year.

Clicking on any of them will lead Facebook users to sites that try to install viruses on their computers, as malware developers continue to seek new ways to spread their software to unsuspecting victims.

The chart is good news for Taylor Swift and Disneyland, who both featured in Bitdefender’s list a year ago. Swift’s non-existent sex tape and an offer of a free trip to Disneyland have fallen from the top 10 over the last 12 months.

“Why do people still want to see who has been taking a peek at their profile, despite all security warnings? I think they believe these are legitimate apps,” said chief security strategist Catalin Cosoi.

“This is social engineering at its finest – a challenging mental game that pushes the right psychological buttons. The baits have changed over time, with stalkers, peekers, admirers, overly attached girlfriends and exes haunting you, but the reason this scam works is simple: human nature.”


Global police operation disrupts aggressive Cryptolocker virus | Technology | theguardian.com

Global police operation disrupts aggressive Cryptolocker virus | Technology | theguardian.com.

UK botnet victims have two weeks to escape clutches of invasive ransomware after global cybercrime operation

 

 

Cryptolocker will encrypt files with a public key that is widely seen as unbreakable.
Cryptolocker will encrypt files with a public key that is widely seen as unbreakable.

 

The FBI and crime agencies from across the globe have temporarily disrupted one of the most aggressive computer viruses ever seen, but are warning victims they have two weeks to protect their computers before the hackers seize it back.

Digital police from across the globe have claimed success in disrupting the criminal operation behind the ransomware, known as Cryptolocker.

The UK’s National Crime Agency (NCA) has told British victims that they have a two-week window to protect themselves, after working with the FBI, Europol and other law enforcement bodies to temporarily seize control of the global network of infected computers.

Cryptolocker is now disabled, but the NCA said it was a race against time before the hackers circumvent their block on it.

It follows one of the biggest ever international collaborations between the major crime agencies to prevent a virus of this magnitude.

The Cryptolocker software locked PC users out of their machines, encrypting all their files and demanding payment of one Bitcoin (currently worth around £300) for decryption.

The FBI estimates that the virus has already acquired $27m (£17m) in ransom payments in just the first two months of its life, and that it has infected more than 234,000 machines.