Showing posts with label leak. Show all posts
Showing posts with label leak. Show all posts

British Spy Agency GCHQ Performed DDoS Attack Against Anonymous -Snowden Documents Transpired

British Spy Agency GCHQ Performed DDoS Attack Against Hacktivist Anonymous & LulzSec -Snowden Documents Transpired
While excavating the past, it was always found that cyber criminals, large hacker collective groups were the culprits for engaging voluminous denial of service attack. But this widely transfusing story get a one eighty degree reverse turn, when the former NSA contractor Edward Snowden revealed another trade secret. Recently a lurid story get spot lighted, as the whistle blower Snowden unfold yet another breathtaking stealthy  documents taken from the National Security Agency. The clandestine documents taken the mask from the so called good guys, unveiling British spy agency GCHQ had launched a secret war against the infamous hacktivist collective Anonymous and a splinter group known as LulzSec several years ago. Many of you guessed right, this was happened when Anonymous were targeting various UK companies and government websites. The documents disclose that GCHQ carried out seemingly illegal DDoS attacks against the collective, flooding their chatrooms with so much traffic that they would become inaccessible – and all with the approval of the British government. The revelations come less than a year after several LulzSec activists were jailed by a British court for carrying out similar DDoS attacks against targets including the CIA, the UK’s Serious Organized Crime Agency (SOCA), News International, Sony and the Westboro Baptist Church, among others. 
This sensational issue was made public by NBC News deferentially with the help of none other than Edward Snowden. In their exclusive report headed 'War on Anonymous: British Spies Attacked Hackers,' NBC said -The blunt instrument the spy unit used to target hackers, however, also interrupted the web communications of political dissidents who did not engage in any illegal hacking. It may also have shut down websites with no connection to Anonymous. According to the documents, a division of Government Communications Headquarters (GCHQ), the British counterpart of the NSA, shut down communications among Anonymous hacktivists by launching a “denial of service” (DDOS) attack – the same technique hackers use to take down bank, retail and government websites – making the British government the first Western government known to have conducted such an attack.
The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder -- and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms. 
The existence of JTRIG has never been previously disclosed publicly. The documents also show that JTRIG infiltrated chat rooms known as IRCs and identified individual hackers who had taken confidential information from websites. In one case JTRIG helped send a hacktivist to prison for stealing data from PayPal, and in another it helped identify hacktivists who attacked government websites. 
As soon as this story getting all the spot lights, immediately the GCHQ responded to this saying all their movements and operations were lawful“All of GCHQ’s work is carried out in accordance with a strict legal and policy framework which ensure[s] that our activities are authorized, necessary and proportionate, and that there is rigorous oversight, including from the Secretary of State, the Interception and Intelligence Services Commissioners and the Parliamentary Intelligence and Security Committee. All of our operational processes rigorously support this position.” -GCHQ said the press. To know more detail about this story, don't forget to stay tuned with VOGH



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Security Breach Invaded 8,500 Recipients of Unemployment Insurance Agency Michigan (UIA)

Michigan Unemployment Insurance Agency (UIA) Hacked! 8,500 Recipients Personal Data Leaked
A major security breach has invaded Unemployment Insurance Agency of Michigan, widely known as UIA. Sources revealed that the attack was placed in between mid of July to mid of September which affected more than 8,500 unemployment insurance recipients in Michigan with leak of social security numbers, bank account numbers, passwords, phone numbers & few other sensitive data. This security breach was first detected Sept. 17 by contractor JP Morgan Chase. In his reaction the director of the Unemployment Insurance Agency, Shaun Thomas said -“The UIA is deeply concerned about this incident.” But due to some untold reason state official were not notified until this December first week. Dan Lohrmann, the state’s chief security officer in the Department of Technology, Management and Budget, said he has “worked closely with JP Morgan Chase to share our concern about the delayed notification and to ensure that the state receives immediate notice of future problems. “We work around the clock to keep citizen information and data protected, and I feel confident that everyone involved in this event understands the importance of protecting personal information.” Chase, which handles the debit cards Michigan uses to pay unemployment insurance benefits to some recipients, said those who accessed the bank’s website between mid-July and mid-September may have been affected. The 8,500 claimants in Michigan are among about 465,000 cardholders nationwide who may have been affected, the bank said. So far the identity of the hackers & their reasons behind this attack is not been identified, but Chase has notified law enforcement and both the bank and the state will be notifying claimants whose information was potentially compromised. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Revealed Two New Documents of Trans Pacific Partnership Agreement (TPP)

WikiLeaks Revealed Two New Documents of Confidential Trans Pacific Partnership Agreement (TPP)
Last month WikiLeaks has published  the draft of secret Trans Pacific Partnership Agreement (TPP), uncovering the United States' covert international push for stronger intellectual property rights. Now just a month later two more breathtaking documents of TPP has been revealed by the whistle blower, that show the state of negotiations as the twelve TPP countries began supposedly final negotiations at a trade ministers’ meeting in Singapore this week. This leaks come at a particularly inconvenient time for negotiators, as they enter into their fourth day of talks in Singapore amid growing criticism. The talks are premised on secrecy, allowing countries to push for particular proposals without having to justify their positions publicly, but the continued pressure from WikiLeaks has brought unintended attention to the proceedings.
According to official release of WikiLeaks -One document describes deep divisions between the United States and other nations, and "great pressure" being exerted by the US negotiators to move other nations to their position. The other document lists, country-by-country, the many areas of disagreement remaining. It covers intellectual property and thirteen other chapters of the draft agreement. This suggests that the TPP negotiations can only be concluded if the Asia-Pacific countries back down on key national interest issues, otherwise the treaty will fail altogether. The above described two documents are dubbed as TPP Salt Lake Extracts & TPP Salt Lake Positions. For additional information about this issue click Here.  For further updates on TPP and also other hot WikiLeaks stories & cyber issues, just stay tuned with VOGH




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cupid Media Network Breach Exposes 42 Million Passwords in Plain Text

Cupid Media Network Breach Exposes 42 Million Passwords in Plain Text (Uunencrypted)

Cupid Media one of the leading niche online dating network that have more than 35 large online dating website, faced a massive intrusion that effects more than 42 million of its registered users. From an exclusive report of Kerbs On Security we came to know that the breach was taken earlier in this year. Where the hackers managed to gain access into the crucial servers belongings to Cupid Media network. According to the managing director of Cupid Media, Mr Andrew Bolton - "In January we detected suspicious activity on our network and based upon the information that we had available at the time, we took what we believed to be appropriate actions to notify affected customers and reset passwords for a particular group of user accounts.” After a preliminary investigation it has been found that the purloined database of Australia-based niche dating service Cupid Media was found on the same server where hackers had amassed tens of millions of records stolen from AdobeMore than 42 million peoples' unencrypted names, dates of birth, email addresses and passwords have been found from the pinched database. I am very much wearied to see that a high value site like Cupid is unconcerned about the basic security counter measure. Even their confidential tables remained unencrypted which allows the hacker to gain the personal information in plain text. Like the Cupid Media security team, the registered users also found very much inadvertent and unaware of basic security measures. I am saying this because of the leaked passwords, almost two million picked "123456", and over 1.2 million chose "111111". "iloveyou" and "lovely" both beat out "password", and while 40,000 chose "qwerty", 20,000 chose the bottom row of the keyboard instead - yielding the password "zxcvbnm"
Jason Hart of famous data protection firm Safenet said "The true impact of the breach is likely to be huge. Yet, if this data had been encrypted in the first place then all hackers would have found is scrambled information, rendering the theft pointless."
This security breach of Cupid Media reminds us  the decent history of breach where we have seen a slew of attacks against the following sites: Drupal.org  Scribd, Guild Wars 2, Gamigo, Blizzard, Yahoo, LinkedIn, eHarmony, Formspring, Android Forums, Gamigo,  Nvidia,Blizzard, Philips, Zynga, VMWare, Adobe,  Twitter,  New York Times, Apple and so on. While covering this story on behalf of VOGH, I am warning our readers across the globe to use strong alphanumeric passwords to avoid such disaster. Also the webmasters and security administrator are highly recommended to use salted encryption in their database to prevent fortuitousness cyber attack


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet 
After SOPA, PIPA & ACTA now the Internet is about to face another ferocious challenge named Trans-Pacific Partnership Agreement (TPP). I am sure that many of you are unaware of this TPP, as it is still on process, but WikiLeaks have uncovered ad released secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) which is a multilateral free-trade treaty currently being negotiated in secret by 12 Pacific Rim nations. The current TPP negotiation member states are the United States, Japan, Mexico, Canada, Australia, Malaysia, Chile, Singapore, Peru, Vietnam, New Zealand and Brunei. "This Trans Pacific “Partnership” is really, really bad News. #WikiLeaks" -said the twitter feed of WikiLeaks. From the leaked draft we came to know that  TPP will take time for all the corporate rigging in this lengthy document to be understood, but already it is evident that Internet freedom will be curtailed, access to health care will become more expensive and access to information will be undermined. In short the more you know about the odious Trans-Pacific Partnership, the less you’ll like it. It’s made for corporate intellectual property and profits. According to WikiLeaks official website -"The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19-24 November 2013. The chapter published by WikiLeaks is perhaps the most controversial chapter of the TPP due to its wide-ranging effects on medicines, publishers, internet services, civil liberties and biological patents. Significantly, the released text includes the negotiation positions and disagreements between all 12 prospective member states." 

In the words of WikiLeaks’ Editor-in-Chief Julian Assange, “If instituted, the TPP’s IP regime would trample over individual rights and free expression, as well as ride roughshod over the intellectual and creative commons. If you read, write, publish, think, listen, dance, sing or invent; if you farm or consume food; if you’re ill now or might one day be ill, the TPP has you in its crosshairs.” To download the entire TPP (Trans-Pacific Partnership) draft click here

While talking about Jullian Assange and WikiLeaksand this sensational leak of TPP, I would like to give you reminder that in this year we got several leaks from WikiLeaks, among them -'Detainee Policies' containing more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. SpyFilesGI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Customs Services of Ukraine Govt Hacked By Anonymous, 1 GB of Classified Data Stolen

Customs Services of Ukraine Government Hacked By Anonymous, 1 GB of Classified Data Stolen
Anonymous -the world largest hacker community, also known as the infamous hacktivist who is widely known for engaging massive cyber attack against several governments strikes again. This time the target was Ukraine Government. According to multiple relevant sources of Anonymous it has been confirmed that the hackers have launched what it called an organised attack against different servers belongs to Ukrainian Government. During this round of cyber attack the main target was the Customs department of Ukraine. In their press release Anonymous took responsibility of performing onerous attack on CUSTOMS.GOV.UA, and caused what it called a voluminous data leak from it. This is the server that is responsible for the Odessa customs and handling of goods in the region of the Danube and Black Sea. From the press release we came to know that voluble of the stolen data is almost of 1GB, which is pointing a finger of sensational information of illegal operations of oil and gas, corruption schemes, bribes, cargo operations and so on. 
Most of the information is reported on the site, concerning the former head of the State Customs Service of Ukraine Ihor Kaletnik , who left the post after being elected deputy to in 2012 by Communist Party of Ukraine. Now Kaletnyk is the Deputy Speaker

Official Release of Anonymous: -

"Ukraine GOV hacked. CUSTOMS of UKRAINE customs.gov.ua MASSIVE Docs leak.
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + 
Greetings Our Fellow lulz. + 
Time to anchore Our ​​Marie Lulzize in an unstable Harbour + of Odessa in Ukraine. This Great Day We present you 1GB of raw + Data from one of the Servers of CUSTOMS.GOV.UA. To be pricise Ukraine Customs in + Black Sea and Danube - marine Customs. + Inside you Will Find lulz much related to Illegal Operations with + Oil and gas, corruption and Schemes Also much of good eddible Intel + All related to corruption in Ukraine Government controlled marine + Cargo Operations, Bribes and kickbacks gov. + Much of the Inside of the package is related to Ukraine + Former Chief Customs - Ihor Kaletnyk WHO is an active FSB operative + Russian enforcing rules of Engagement in Ukraine. + Also alot of Offshore moneylaundering by this persona and Other Government + Crooks. We undrstand that oil is money and money is power. + But They just do not Realize That one Day + shit happens and this shit pours from Big A Greedy right into Their throats.  + Sneak Peak of 64 Documents ..."

The hacker community has posted all the leaked information on an image archive and made that available for public. The 1 GB of the stolen data has also been made public in three different archive links

But on other hand the Ukrainian Government Officials denied the entire issue, according to the spokes man of government "Custom server can not be compromised. Therefore, as at customs.gov.ua a web server. Other documents, as far as I know, this server is not stored."  He also said that "Those documents that have posted allegedly crackers were not extracted from the server to the customs. In this I am 100%. Let me explain. Please note, most of the documents photographed, that is, it is done the person who had physical access to them, perhaps even temporary. Given that the documents from different regions of Ukraine, then they could meet only in the State Customs Service (MinDohodov) or law-enforcement agencies." 

While talking about this recent breach, we would like to remind you that couple of years ago, another infamous hacker community going by the name of Kosovo Hackers Security (KHS) targeted Ukraine govt. That time KHS have successfully penetrated the official website of Ukraine Police, Gazeta.ua (Ukraine Largest News Portal) and many more high profile sites. Now this hack of Anonymous is again another big attack which caused a serious damage to the Ukrainian cyber space. For updates on this hack and also all the other cyber updates stay tuned with VOGH




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'Royal Concierge' Secret Program of GCHQ to Spy Foreign Diplomats Through Hotel Bookings Unveiled By Edward Snowden

'Royal Concierge' Secret Program of GCHQ to Spy Foreign Diplomats By Hotel Bookings Unveiled By Edward Snowden

Edward Snowden the American whistle blowers who is currently living in Russia under temporary asylum, after Snowden is considered a fugitive by American authorities who have charged him with espionage and theft of government property  yet again uncovered what it called sensational information. This time he unfold a top secret program of Britain's GCHQ intelligence agency & US National Security Agency (NSA). In which they infiltrated the reservation systems of around 350 luxury hotels popular among diplomats and government officials with the help of a sophisticated program code-named "Royal Concierge" Royal Concierge designed to keeps tabs on foreign diplomats by monitoring their hotel bookings. This can include monitoring a hotel room and its guest by wiretapping the telephone and fax machine, gaining access to computers hooked up to the hotel network, or eavesdropping on the diplomat in the hotel bar. This surveillance program, uses a logo with a penguin -- meant to stand for the black and white uniforms worn by staff at top hotels -- wearing a crown, a purple cape and holding a wand. The top secret program automatically checked whether the e-mail address of a visitor on the hotel booking system matched with the address of his government and with this information the GCHQ could take the necessary steps to bug the concerned hotel room, to tap its telephones or to eavesdrop into the electronic data transfer, the news weekly said. Snowden said GCHQ has been using the search and analyse program for more than three years to track diplomats and government officials among hotel guests. 

The above breathtaking information first came on a German magazine 'Der Spiegel' on Sunday. And this exciting leaks been provided by former US intelligence contractor Edward Snowden. After this lurid information came to light, press asked questions to GCHQ, in response an official of GCHQ said "We are not going to comment on this report". But the entire conversation with Der Spiegel reporter with GCHQ officials came to the conclusion of GCHQ "neither confirms nor denies the allegation". On th other hand Britain's top spy chiefs reacted angrily to leaks by Snowden, a fugitive former analyst for the US National Security Agency, in an appearance this month before a parliamentary committee. Denying Britons were under mass surveillance, the heads of the foreign spy agency MI6, the domestic intelligence service MI5 and GCHQ warned that al-Qaeda and other enemies were "lapping up" intelligence revelations by Snowden and using them to change the way they operate.


-Source (AFP, News 24)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Pirate Bay Co-Founder Svartholm Warg Accused For Hacking, Fraud & Attempt to Steal Money From Bank

Pirate Bay Co-Founder Svartholm Warg Accused For Hacking, Fraud & Attempt to Steal Money From Swedish Bank 

The Pirate Bay also known as TPB is the most infamous website providing torrent files and magnet links to facilitate peer to peer file sharing. It is fact that many of us love the website, but it is also undeniable that if you are in the core team to run TPB then you are definitely sitting on the edge of legality. Many of you have already started terrifying! But I have the news which will not frighten you but surely will surely frighten Gottfrid Svartholm Warg, the co-founder of Pirate Bay. Gottfrid might get mercy if he could limited himself only into Pirate Bay, but in reality he did not and crossed all the lines. The 27-year-old’s Gottfrid widely known as 'Anakata' has been charged for hacking several Swedish companies and stealing their personal data. He and three others are also accused of attempting to make illegal online money transfers. Prosecutors claim Warg  along with three others—hacked IBM mainframes belonging to tax firm Logica and the bank to transfer money from various bank accounts. In total, the four men reportedly attempted to transfer just over US$900,000. Warg has also been accused of hacking into the databases of several Swedish businesses and the government’s federal taxing agency.
In his statement prosecutor Henrik Olin said - "A large amount of data from companies and agencies was taken during the hack, including a large amount of personal data, such as personal identity numbers (personnummer) of people with protected identities. I'd say that Svartholm Warg is the main person and brains behind the hacker attack. We've had a lot of theories but I can't find a motive in the evidence. What I can say is that we're talking about an incredibly technically advanced hack against a large server environment considered to have very high security and that can boost one's status in certain circles" 
Three other people have been indicted along with Svartholm Warg. They are all charged with serious fraud, attempted aggravated fraud, and aiding attempted aggravated fraud. According to the indictment, authorities seized a computer and chat transcripts of Svartholm Warg and the other suspects. Olin claims that it is the biggest investigation into a data intrusion ever conducted in the country
Here we want to remind you that Svartholm Warg, 27, was arrested in Cambodian and deported to Sweden in September last year due to an arrest warrant issued for him in relation to his conviction in the Pirate Bay trial. Since December, Svartholm Warg has been held in a prison in Mariefred in central Sweden where he is serving out a prison sentence related to his activities with The Pirate Bay.



-Source (The Local, RT)












SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'Scribd' World's Largest Document Sharing Website Admits Security Breach

'Scribd' World's Largest Document Sharing Website Admits Security Breach 

Scribd- San Francisco-based document sharing site have fallen victim of cyber attack. Such kind of massacre is no doubt very much shameful for one of the world largest document sharing website which have more than 100 million of registered user. Like other largest companies, Scribd acknowledged the attack. In their official security announcement the company said that the operations team of Scribd have discovered and blocked suspicious activity on Scribd's network that appears to have been a deliberate attempt to access the email addresses and passwords of registered Scribd users. But the matter of relief is that only the 1% of its registered users have been affected during the hack. Immediately after this intrusion get spotted Scribd security team have emailed every user whose password was potentially compromised with details of the situation and instructions for resetting their password.  So, if you are a Scribd user and you did not receive such email from Scribd, then you are most likely unaffected.  If you still wish to check, you can use this web tool to determine if your account was among those affected. From the official announcement of Scribd, we came to know that the inertial investigation have already take place, which indicates that no content, payment and sales-related data, or other information were accessed or compromised. It has been  believed that the information accessed by the hackers was limited to general user information, which includes usernames, emails, and encrypted passwords.  Even though this information was accessed, the passwords stored by Scribd are encrypted (in technical terms, they are salted and hashed). Most of the users were therefore unaffected by this; however, the analysis shows that a small percentage may have had their passwords compromised. In an abundance of caution, it has been highly recommended for those affected users to reset their password and to change their password on any other services they might have used it on. 
At conclusion of the note, Scribd team did serious apology to its users while saying -"we would like to sincerely apologize for our failure to live up to our users' expectations in this instance. We’re incredibly disappointed that this happened and are committed to doing everything we can to prevent this from happening again. We will work harder than ever to ensure that we deserve the trust that our users place in us." 
While talking about big cyber attacks against large companies we would like to remind you in the last year we have been a slew of attacks against the following sites: Guild Wars 2GamigoBlizzardYahooLinkedIneHarmonyFormspringAndroid ForumsGamigo,  Nvidia,BlizzardPhilipsZyngaVMWare, Adobe Twitter  New York Times, Apple and so on. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Angelina Jolie & Lady Gaga Became Victim of Ongoing Celebrity Hacking

Angelina Jolie & Lady Gaga Became Victim of Ongoing Celebrity Hacking 

Now a days it has became a fascination for cyber criminals to target and hack celebrities and public figures. Earlier we have seen similar scenario many a time. Last month an unnamed hacker released personal details of many public figure, national leaders, celebrities. The hacked data dubbed "The Secret Files" by the hackers contains personal information and credit reports (including social security numbers, details of their mortgages, addresses, and details of their credit card and banking details) was made public by those hackers on a website. Now we have past just a couple of weeks, yet again the same massacre took place, the hackers returned to the Internet after a brief hiatus and immediately hit six more. 
Angelina Jolie who played a key role in one of the most fine hacking movie named "Hackers" herself became victim to hackers in real life, as well as Jolie; Lady Gaga, NRA advocate Wayne LaPierreDennis RodmanMichael Vick, Secret Service Director Julia Pierson and Robert De Niro
Like earlier, this time also the nature of the hack was similar to the previous the hackers have posted what they claim to be the social security numbers, mortgage amounts, credit card info, car loans, banking and other info for the celebs listed on their site. Last time, the website; where the hacker have posted those hacked credentials; were shutdown by the authorities. But it's now back up and running with a new domain extension (.re) that suggests it's based out of the French island of Réunion located off the coast of Madagascar -said TMZ in an exclusive report. Again also the same style were followed by the hacker group and leaving the very same message saying - "If you believe that God makes miracles, you have to wonder if Satan has a few up his sleeve."
According to sources - Jolie's page (prepared by the hacker) includes what is said to be her social security number as well as her credit report, which can be downloaded. There are addresses listed as well, but they are all business addresses, likely for her lawyer and other people she employs. The same information for Lady Gaga and Johansson is also available. However, Johansson's page also features a photo of her which became public through a previous hacking incident. The FBI has already started investigation, but so far no arrest have been made. In 2011 another high profile hack taken place, where the hacker targeted several celebrities like Scarlett Johansson & few more; while leaking nude photos. Later FBI carried out a special operation named 'Hackerazzi' which put a full stop in that issue and also FBI arrested the master mind named Christopher Chaney was sentenced to imprisonment after pleading guilty. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

'The Secret Files'- Hackers Exposed Personal Details of Celebrities, Public Figure, FBI Director & National Leaders

'The Secret Files'- Hackers Exposed Personal Details of Celebrities, Public Figure, FBI Director & National Leaders 

Yet again celebrities fallen victim to cyber attack, no this time not the nude photo but confidential personal information. Renowned public figure, national leaders, celebrities like Kim Kardashian, US Vice President Joe Biden, Hillary Clinton, Mel Gibson, Michelle Obama, Ashton Kutcher, Jay Z, Beyoncé, Paris Hilton, Britney Spears, Sarah Palin, Hulk Hogan, Donald Trump and Arnold Schwarzenegger together became prey. The list does not end here, the hacker catches two more big fishes in his net and they are head of the Los Angeles police force Charlie Beck and FBI Director Robert Mueller. Many of you might be astonished of how such big public figure, including Vice President, FBI Director became victim in single round of cyber attack! Let me tell you what exactly happened- the hacked data dubbed "The Secret Files" by the hackers contains personal information and credit reports (including social security numbers, details of their mortgages, addresses, and details of their credit card and banking details) was made public by those hackers on a new website, as shown in the picture below. 

The hacker left a message or in other word a satire while saying "The Secret Files - If you believe that God makes miracles, you have to wonder if Satan has a few up his sleeve." Such hack, is very rare, where numbers of big fish get caught. The nature of this hack can be categorized as a clear identity theft. But the question is how? Well the answer is some of the United States' top credit bureaus have come forward and acknowledged that fraudulent and unauthorized access to the records of well-known figures have taken place. Most of the reports were apparently obtained from one of the three major U.S. credit ratings agencies Equifax, TransUnion and Experian — via a special Internet portal they maintain for the public to check their own credit ratings. All three companies have said that some of their reports had been fraudulently accessed since Monday by someone using personal data about the victims. Security experts said that suggests the attack is a “social hack” rather than a classic cyber security data breach


-Source (Sophos & WT)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

NASA Sub-domain is Vulnerable Allowing Information Disclosure

NASA Sub-domain is Vulnerable Allowing Serious Information Disclosure

National Aeronautics and Space Administration, widely known as NASA used to fascinate the hackers to come and breach its security system. Many of our readers may be astonished after reading the above lines, but its a fact and history is the witness of that. So far NASA have been targeted several times, where hackers have figured out vulnerability and penetrated the digital security. Yet again same thing happened to NASA, when an ethical hacker from India going by the name of "Zero Cool" find out serious loopholes in one of the sub-domain of NASA, which could lead sensitive information disclosure. The hacker shared a vulnerability report with us, where he has shown that, exploiting the vulnerability one malicious attacker can easily extract lots of confidential data from NASA server, such as source code of various programs (used by NASA), current project information, future research paper, topological graph, license information, several executable files, .dll files, private application software & it's source codes, employ details and many more highly confidential or in other word "Top Secrete" data and files. For security and privacy purpose we are not disclosing those vulnerable links, but exclusively for VOGH readers we are sharing few images to justify the fact. 



This vulnerability report has already been submitted to NASA, and as expected they immediately reacted and promised to path those loopholes with immediate effect. While talking about the ethical hacker "Zero" we would like to remind you that, before this NASA vulnerability disclosure, he exposed several vulnerabilities among many major and high profile websites such as FacebookReebok,Indiagames, mtv, lapdonline, UNESCO, Toshiba, Discovery.com, Novell.comMicrosoft Store India, several Pakistani  and Bangladeshi Govt websites and many more.  




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Tweet Revealed- Aaron Swartz Was an Ally & Possible Source of WikiLeaks

WikiLeaks Tweet Revealed- Aaron Swartz Was an Ally & Possible Source of WikiLeaks 

WikiLeaks, the organization who used to dig the truth and bring them in front, has disclosed a sensational matter while saying that the late internet activist and renowned hacker Aaron Swartz who committed suicide a few weeks ago was possibly an active worker and source for WikiLeaks

Over the weekend, in a series of tweets, WikiLeaks said that activist and hacker Swartz, who committed suicide earlier this month while awaiting trial on computer fraud charges, "assisted" the organization and "was in communication with Julian Assange, including during 2010 and 2011,"  

Unfortunately those tweets did not go so far as to name Swartz as a WikiLeaks source, only saying, "We have strong reasons to believe, but cannot prove, that" he was. 

WikiLeaks -globally famous for exposing classified classified and top secrete documents of several government said it decided to reveal these details in light of the US Secret Service's involvement in Swartz's  case. At the time of his death, Swartz was awaiting trial for allegedly harvesting millions of scholarly articles over the Massachusetts Institute of Technology's network. He was charged with computer fraud and other crimes in July 2011, and faced up to 35 years in prison. 
Although WikiLeaks doesn't elaborate on its decision, the organization has a policy of maintaining anonymity for its sources. "As far as we can ascertain, WikiLeaks has never revealed any of its sources," according to its website. "We cannot provide details about the security of our media organization or its anonymous drop box for sources because to do so would help those who would like to compromise the security of our organization and its sources."  But after these round of tweets we can say that Wikileaks may have broken its own rules of anonymity by doxxing (removing the anonymity) of Swartz as an ally and possible source. 






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Ministry of Defense Argentina Hacked By LulzSec Peru, Sensitive Information (Aircraft, Submarines, Weapons) Leaked

Ministry of Defense Argentina Hacked By LulzSec Peru, Sensitive Information (Aircraft, Submarines, Weapons) Leaked

A hacktivist group claiming to be the part of infamous LulzSec, targeted the official website of Argentinian Ministry of Defense. This round of cyber attack taken sensitive data from Ministry of Defense server, along with that the index page also get defaced by the hacker group calling them selves 'LulzSec Peru'. The leaked data, allegedly said “top secret” documents from the ministry’s systems has been posted on AnonPaste. The total leak is almost 100 megabytes in size, contains information on submarines, radars and weapons. It also contains user details such as usernames, passwords, the names of officials and other sensitive information. The release on AnonPaste also did satire of the cyber security system of Argentinian Ministry while saying "According to statements by the DEPARTMENT OF ARGENTINA DEFENSE the computer systems area say they had a system impossible to hack, thing turned otherwise. The event should not be taken as terrorism, was for the simple fact to prove that the system was totally vulnerable. The documents contain highly sensitive material rated SECRET (aircraft, submarines, guns)..."
As per sources the data dump, leaked by the hacker was indeed stolen from Ministry's system, also the deface mirror on Zone-H is showing that the official website was indeed hacked and defaced. Though the officials of Argentinian Ministry did not commented about this incident. After the hack was spotted on the wild, the authorities restored their system, and the website came back to its normal format very soon. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

More Leaks are Coming in 2013 Said WikiLeaks Founder Julian Assange

More Leaks are Coming in 2013 Said WikiLeaks Founder Julian Assange

The government are trying their best to dominate WikiLeaks founder Julian Assange, while blocking public search containing WikiLeaks, blocking banking donations, keeping him in under house arrest. But its is a undeniable that the enthusiasm and the will power of Assange can never be ruled or dominated. Again the above fact came into light when Julian Assange announced in a defiant speech from the balcony of Ecuadorian embassy here as his supporters shouted, and sang Christmas carols. In his speech Assange said that WikiLeaks have planned to release over one million new secret documents that would affect "every country in the world" 
It was his second ``balcony’’ address since he sought refuge there six months ago to avoid extradition to Sweden over allegations of sexual assault. And he made clear he had no intention of leaving the cramped mission which he described as ``my home, my office and my refuge’’ until ``this immoral investigation continues’’.
Referring to the impasse over his extradition, Mr Assange said that as long as long as the American government sought to prosecute him and his native country, Australia, refused to defend his journalism, he would remain in the embassy. But, he said, he was open to negotiations. "However, the door is open, and the door has always been open, for anyone who wishes to use standard procedures to speak to me or guarantee my safe passage," he said.
Mr Assange has been given asylum by Ecuador but is prevented by the British Government from leaving the country arguing that it is under a legal obligation to extradite him to Sweden. He will be arrested the minute he steps out of the embassy. Police say he broke his bail conditions when he sought refuge in the Ecuadorian embassy without informing them. Mr Assange claims the case against him is politically motivated and fears that Sweden would hand him over to Americans who have threatened to prosecute him for publishing confidential diplomatic cables.

While talking about Jullian Assange and WikiLeaks, we would like to give you reminder that in this year we got several leaks from WikiLeaks, among them -'Detainee Policies' containing more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. SpyFiles, GI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies.



-Source (The Hindu)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Adobe Confirms Data Breach, Hacker Leaked More Than 150,000 Customer Details

Adobe Confirms Data Breach, Hacker Leaked More Than 150,000 Customer Details 

Yet again Adobe, the American multinational computer software company had fallen victim of cyber attack. In September Adobe faced what it called a sophisticated cyber attack where hackers have breached Adobe server in order to compromise certificate to sign malware. As a move Adobe revoked those certificates on October 4th. After that massacre, here again one of Adobe's databases has been breached by a hacker and that it has temporarily taken offline the affected Connectusers.com website. The attacker who claimed responsibility for the attack, told that he used a SQL injection exploit in the breach. Adobe confirmed the breach and said that the hacker indeed managed to break into an Adobe server and copy the private credentials of approximately 150,000 users – including their names, email addresses and password hashes. Those affected accounts include Adobe customers, Adobe employees and partners along with U.S. military users including U.S. Air Force users, and users from Google, NASA, universities, and other companies. To prove the attack, the intruder, who goes by the name of "ViruS_HimA" and claims to be from Egypt, has released extracts from his haul on the Pastebin text hosting service. 
"It was an SQL Injection vulnerability -- somehow I was able to dump the database in less requests than normal people do," said ViruS_HimA. Users passwords for the Adobe Connect users site were stored and hashed with MD5, says the hacker, which made them "easy to crack" with freely available tools. And Adobe wasn't using WAFs on the servers, the hacker notes. "I just want to be clear that I'm not going against Adobe or any other company. I just want to see the biggest vendors safer than this," he told the press. "Every day we see attacks targeting big companies using Exploits in Adobe, Microsoft, etc. So why don't such companies take the right security procedures to protect them customers and even themselves?"
"Adobe is a very big company but they don't really take care of them security issues, When someone report vulnerability to them, It take 5-7 days for the notification that they've received your report!!" he wrote. "It even takes 3-4 months to patch the vulnerabilities!" 
While talking about such big cyber attacks, here we would like to give you reminder that in the last few months we have been a slew of attacks against the following sites: Guild Wars 2GamigoBlizzardYahooLinkedIneHarmonyFormspringAndroid ForumsGamigo,  Nvidia,BlizzardPhilips, Zynga, VMWare, & so on. For all the latest on cyber security and hacking related stories; stay tuned with VOGH


-Source (Dark Reading, The-H)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...