Leaked NSA Malware Threatens Windows Users Around the World

“This is as big as it gets,” Hickey said. “Nation-state attack tools are now in the hands of anyone who cares to download them…it’s literally a cyberweapon for hacking into computers…people will be using these attacks for years to come.”

Fuente: Leaked NSA Malware Threatens Windows Users Around the World


Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

Fuente: Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email


NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees

Booz Allen Hamilton, the defense contracting giant whose employee was charged Wednesday in connection with the theft of hacking codes used by the National Security Agency, provides a fairly ironic service to the government: spotting rogue employees.

Fuente: NSA Theft Suspect Worked For Contractor That Sells the Government Tech for Spotting Rogue Employees


NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian

Shares183Save for laterThe FBI has arrested a National Security Agency contractor on suspicion of the theft of top secret classified data and documents in an alleged security breach at the same intelligence agency whose spy secrets were exposed by Edward Snowden.

Fuente: NSA contractor arrested for alleged theft of top secret classified information | US news | The Guardian


Yahoo faces questions over delay in data breach revelation – FT.com

ft.com > Companies >TechnologySubscribe Sign in Home World Companies Energy Financials Health Industrials Luxury 360 Media Retail & Consumer Tech Telecoms Transport By Region Tools Markets Global Economy Lex Comment Work & Careers Life & Arts Try the new FT.comLast updated: September 23, 2016 11:59 pmYahoo faces questions over delay in data breach revelationNic Fildes and Madhumita Murgia in London, Tim Bradshaw in San Francisco Share Print Clip Commentsepa05552696 The Yahoo logo is pictured on a computer monitor in Taipei, Taiwan, 23 September 2016. According to news reports on 23 September, around 500 million Yahoo account users information had been stolen or hacked on its network in 2014. EPA/RITCHIE B. TONGO©EPAYahoo chief executive Marissa Mayer and her board are facing serious questions over the handling of the largest-ever cyber attack recorded, as customers, regulators and even its new owners search for answers on why a two-year-old data breach has only just come to light.

Fuente: Yahoo faces questions over delay in data breach revelation – FT.com


Filtrada World-Check, la base de datos usada por Gobiernos y bancos con sospechosos de terrorismo

La base de datos contendría 2.240.000 entradas con categorías como “individuo político”, “corporativo”, “militar”, “Crimen-narcóticos” y “terrorismo”. Estos datos estarían siendo utilizados por más de 300 gobiernos y agencias de inteligencia, nueve de los diez mejores bufetes de abogados o 49 de los 50 bancos más grandes del mundo. En total, se estima que son 6.000 clientes los que la utilizan en 170 países.

Fuente: Filtrada World-Check, la base de datos usada por Gobiernos y bancos con sospechosos de terrorismo


How to Leak to The Intercept – The Intercept

How to Leak to The Intercept – The Intercept.

Featured photo - How to Leak to The Intercept

People often tell reporters things their employers, or their government, want to keep suppressed. But leaking can serve the public interest, fueling revelatory and important journalism.

This publication was created in part as a platform for journalism arising from unauthorized disclosures by NSA contractor Edward Snowden. Our founders and editors are strongly committed to publishing stories based on leaked material when that material is newsworthy and serves the public interest. So ever since The Intercept launched, our staff has tried to put the best technology in place to protect our sources. Our website has been protected with HTTPS encryption from the beginning. All of our journalists publish their PGP keys on their staff profiles so that readers can send them encrypted email. And we’ve been running a SecureDrop server, an open source whistleblower submission system, to make it simpler and more secure for anonymous sources to get in touch with us.

But caution is still advised to those who want to communicate with us without exposing their real-world identities.


Empresa busca ‘hácker’ | Tecnología | EL PAÍS

Empresa busca ‘hácker’ | Tecnología | EL PAÍS.


Algunas compañías se sirven de ‘piratas’ para que examinen sus debilidades

Jóvenes especialistas españoles hacen carrera en Estados Unidos

Asistentes a una feria informática en Londres. / C. R. (BLOOMBERG)

Enviar a LinkedIn37
Enviar a TuentiEnviar a Eskup

EnviarImprimirGuardar

“Puedes acompañarnos ahora o, si quieres, esperamos abajo hasta que vayas a comprar el pan”, le dijeron. Al salir del portal le pusieron las esposas y fue a comisaría. A. G. I. se lo olía. Era noviembre de 2012. Desde agosto, este experto en pirateo informático de 26 años que prefiere no dar su nombre, sabía que tarde o temprano recibiría esa visita.

La policía española se lo llevaba al calabozo durante algo menos de un día a comienzos de noviembre. La culpa, asegura, la tuvo su curiosidad. Vio una máquina expendedora de billetes en Atocha estropeada, se puso a investigar y descubrió que todos los archivos donde se guardaban las tarjetas de crédito de los clientes estaban accesibles en Internet, sin cifrar.

Cumple todos los requisitos para cubrir un puesto que no se publica en los listados de Linkedin, sino que se demuestra poniendo a prueba contraseñas, sistemas de seguridad, vigilancia y control. Sus formas rozan la frontera de la ley. Según Glassdoor, una web de comparación de perfiles y salarios, el salario de este tipo de háckers oscila entre 180.000 y el millón de dólares. Los expertos consultados prefieren no dar su suelto exacto, pero asegura que no se corresponde con la realidad.

“Mandé un correo a Renfe, pero nadie dijo nada”, se excusa con cara de no haber roto un plato. Profundizó en su conocimiento hasta alcanzar la hazaña que todo hácker sueña, presentar el caso en la DEFCON, la conferencia anual en Las Vegas. “Normalmente lleva más tiempo, introducirse en un sistema es sencillo de contar, pero tiene mucha reflexión y estrategia detrás”, aclara.

El salario de este tipo dehácker profesional oscila en EE UU entre 180.000 y un millón de dólares

Tras la charla comenzó su persecución, cuando su travesura comenzó a cobrar rango de hazaña. Por suerte, un acuerdo verbal y el compromiso de ayudar a solventar el fallo fueron suficiente para recobrar la libertad.

Entre el público se encontraba otro joven español, A. P., mánager senior de una empresa estadounidense, que también prefiere reservar su identidad. Allí mismo, se fijó en su compatriota. “Este tipo es peligroso, pero creo que lo podemos convertir”, pensó. Entonces habló con su jefe y su paisano entró a trabajar como penetration hacker (experto en colarse). En agosto hizo un año que comenzó la relación laboral y en octubre cumplirá el primero en San Francisco.

Esta modalidad va más allá de pantallas y teclados. Si hace falta físicamente, o con un disfraz, por todos los medios posibles en las empresas hasta conseguir una base de datos concreta, la clave del garaje o el sistema de turnos. “Me lo tomo como un reto y me pagan, muy bien, por romper cosas”, confiesa en el argot, para referirse a reventar la seguridad.

La pizza es su mejor aliada. “A todo el mundo le gustan, así que haces de repartidor y tienes el acceso casi asegurado a muchísimos lugares”, dice con expresión pícara. Nunca se ha lucrado por los ataques, es lo que se llama “sombrero blanco”, búsqueda de errores para alertar de los mismos, documentarlo y que se corrijan. Solo ataca a su compañía y a empresas integradas en esta. Una decena en los últimos dos años y varios edificios por toda la Bahía. El trabajo no termina nunca. Las comprobaciones son constantes. Cuando termina, comienza la ronda de nuevo para buscar nuevas filtraciones.

Quizá no sea el chico más popular de su empresa: “Pisas demasiados callos como para caer bien. A nadie le gusta que le digan que lo ha hecho mal, pero reflexionan y se dan cuenta de que es bueno ponerse a prueba”. A. P. dice que le parece natural que haya fallos: “La proporción es indicativa. Por cada 12 o 15 que crean algo, hay uno para ponerlo a prueba. Los humanos cometemos errores, por supuesto”. Él busca los que haya en el software. A. G. I. usa la ingeniería social, algo así como el conocimiento de los mecanismo humanos para caer en trampas. “El hombre es el eslabón más débil de la cadena. Donde hay un persona, puede haber una vulnerabilidad”, apunta.


Hackers peruanos vulneran seguridad de la FACH y filtran cientos de correos electrónicos de la institución – El Mostrador

Hackers peruanos vulneran seguridad de la FACH y filtran cientos de correos electrónicos de la institución – El Mostrador.

Los correos son entre febrero y mayo del 2013 y contienen detalles de las negociaciones entre la institución y empresas de Israel y EE.UU., entre otros países. El hecho deja en evidencia una vulnerabilidad en la institución, aunque fuentes cercanas a la FACH sostienen que la información liberada no pone en riesgo la Seguridad Nacional. La acción es una ‘venganza cibernética’ por una acción cometida por hackers chilenos hace cinco años. La Fuerza Aérea designó a un fiscal para investigar los hechos.

Foto Hack Fach

El jueves pasado el grupo de hackers Lulz Security Perú (@LulzSecPeru) anunció a través de su cuenta de Twitter que hackeó a la Fuerza Área de Chile (FACH) y “liberó” cientos de correos electrónicos.

El ataque evidenció una debilidad en el sistema de ciberseguridad de la FACH. La información corresponde a dos cuentas de correos electrónicos. La primera es del Departamento de Pasaportes y Visas y contiene datos privados (Rut, fechas de nacimiento, estado civil, entre otras) de funcionarios de la institución y de sus familiares.

La segunda son los correos del Departamento de Administración de Contratos del Comando de Logística y contienen una serie de negociaciones y contratos de la FACH para la adquisición de misiles, sistemas de radares y aviones, entre otros productos.

Consultados por el ataque, desde la FACH dicen que “efectivamente entre mayo y junio de 2013 se detectó que dos casillas de correo institucional fueron vulneradas, para lo cual se adoptaron inmediatamente las medidas de seguridad informática pertinentes”. Además, aseguraron que “este hecho puntual, no significó una vulneración a la seguridad nacional, tras lo cual se han mantenido los máximos estándares en materia de seguridad informática”. Finalmente, agregaron que los sistemas de correos funcionan con total normalidad, “bajo estrictos parámetros de fiscalización y los debidos resguardos de los sistemas de protección informática, que permiten alertarnos sobre acciones de esta naturaleza”.


Guardian launches SecureDrop system for whistleblowers to share files | Technology | theguardian.com

Guardian launches SecureDrop system for whistleblowers to share files | Technology | theguardian.com.

SecureDrop platform allows sources to submit documents and data while avoiding most common forms of online tracking

SecureDrop
SecureDrop makes use of well-known anonymising technology such as the Tor network and the Tails operating system

The Guardian has launched a secure platform for whistleblowers to securely submit confidential documents to the newspaper’s reporters.

The launch comes a year to the day since the Guardian posted the first of a series of NSA documents leaked by former NSA contractor Edward Snowden, sparking a worldwide debate on surveillance, privacy, and civil liberties.

Free speech and privacy groups alongside popular sites including Reddit, BoingBoing and Imgur, are marking the day with a Reset the Net campaign, encouraging internet users to take direct action to secure their privacy online. Several technology companies are also expected to announce new steps to protect users’ privacy over the course of the day.

The SecureDrop open-source whistleblowing platform provides a way for sources, who can choose to remain anonymous, to submit documents and data while avoiding virtually all of the most common forms of online tracking.

It makes use of well-known anonymising technology such as the Tor network and the Tails operating system, which was used by journalists working on the Snowden files.


Compare the NSA's Facebook Malware Denial to its Own Secret Documents – The Intercept

Compare the NSA’s Facebook Malware Denial to its Own Secret Documents – The Intercept.

By 


Featured photo - Compare the NSA’s Facebook Malware Denial to its Own Secret DocumentsA top-secret NSA presentation reveals how the agency used Facebook to hack into targeted computers for surveillance.

On Wednesday, Glenn Greenwald and I revealed new details about the National Security Agency’s efforts to radically expand its ability to hack into computers and networks across the world. The story has received a lot of attention, and one detail in particular has sparked controversy: specifically, that the NSA secretly pretended to be a Facebook server in order to covertly infect targets with malware “implants” used for surveillance.

This revelation apparently infuriated Facebook founder Mark Zuckerberg so much that he got on the phone to President Barack Obama to complain about it. “I’ve been so confused and frustrated by the repeated reports of the behavior of the US government,” Zuckerberg wrote in a blog post Thursday. “When our engineers work tirelessly to improve security, we imagine we’re protecting you against criminals, not our own government.”

That wasn’t all. Wired ran a piece saying that the NSA’s widespread use of its malware tools “acts as implicit permission to others, both nation-state and criminal.” Slate noted that the NSA’s hacking platform appears to be “becoming a bit more like the un-targeted dragnets everyone has been so upset about.” Meanwhile, Ars Technica wrote that the surveillance technology we exposed “poses a risk to the entire Internet.”

In response, the NSA has attempted to quell the backlash by putting out a public statementdismissing what it called “inaccurate” media reports. The agency denied that it was “impersonating U.S. social media or other websites” and said that it had not “infected millions of computers around the world with malware.” The statement follows a trend that hasrepeatedly been seen in the aftermath of major disclosures from documents turned over by NSA whistleblower Edward Snowden, in which the NSA or one of its implicated allies issues a carefully worded non-denial denial that on the face of it seems to refute an allegation but on closer inspection does not refute it at all.

Prior to publishing our story, we asked the NSA to explain its use of Facebook to deploy malware as part of a top-secret initiative codenamed QUANTUMHAND. The NSA declined to answer all of our questions or offer context for the documents. We went into meticulous detail in our report, which went through a rigorous fact-checking process because of the gravity of the revelations. What we reported, accurately, was that the Snowden files showed how the agency had in some cases “masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive.” The source for that detail was not plucked from thin air; it was rooted in multiple documents that refer to the technique in action, including the internal NSA animation that we published.

A particular short excerpt from one of the classified documents, however, has taken on new significance due to the NSA’s statement. The excerpt is worth drawing attention to here because of the clarity of the language it uses about the Facebook tactic and the light it shines on the NSA’s denial. Referencing the NSA’s Quantum malware initiative, the document, dated April 2011, explains how the NSA “pretends” to be Facebook servers to deploy its surveillance “implants” on target’s computers:

 


Edward Snowden discusses NSA leaks at SXSW: 'I would do it again' | World news | The Guardian

Edward Snowden discusses NSA leaks at SXSW: ‘I would do it again’ | World news | The Guardian.

• Whistleblower patches in to Texas conference from Russia
• Snowden insists leaks have strengthened national security

 

 

Edward Snowden talks NSA and internet surveillance at SXSW

 

Edward Snowden, the NSA whistleblower whose unprecedented leak of top-secret documents led to a worldwide debate about the nature of surveillance, insisted on Monday that his actions had improved the national security of the United States rather than undermined it, and declared that he would do it all again despite the personal sacrifices he had endured.

In remarks to the SXSW culture and technology conference in Texas, delivered by video link from his exile in Russia, Snowden took issue with claims by senior officials that he had placed the US in danger. He also rejected as demonstrably false the suggestions by some members of Congress that his files had found their way into the hands of the intelligence agencies of China or Russia.

Snowden spoke against the backdrop of an image of the US constitution, which he said he had taken an oath to protect but had seen “violated on a mass scale” while working for the US government. He accepted praise from Sir Tim Berners-Lee, the inventor of the world wide web, accorded the first question via Twitter, who described him as “acting profoundly in the public interest”.

The session provided a rare and extensive glimpse into the thoughts of Snowden, granted temporary asylum by Russia after the US revoked his passport. He struck back strongly against claims made again last week by the NSA director, General Keith Alexander, that his release of secret documents to the Guardian and other outlets last year had weakened American cyber-defences.

“These things are improving national security, these are improving the communications not just of Americans, but everyone in the world,” Snowden said. “Because we rely on the same standard, we rely on the ability to trust our communications, and without that, we don’t have anything.”

He added later that thanks to the more secure communication activity that had been encouraged by his disclosures, “the public has benefited, the government has benefited, and every society in the world has benefited”.