May 2016

Two days after the terrorist attacks in the city of Paris, France, that killed more than 120 people, the hacker group known as Anonymous declared war on the Islamic State, an organization that has claimed responsibility for the attacks.
Em vídeo, a spokesman using the mask of Guy Fawkes - that is the hallmark of Anonymous group - said that members from around the world will "hunt down" the terrorists of the Islamic State. "Wait for us. Know that we will find them and we will not let them. We will launch our largest operation to date against you," says the video.
The spokesman further states, in French, that the goal is "to unite humanity" and that the Islamic state can expect cyber attacks "massive". On Twitter, the Anonymous organization also warned: "We are best hackers" </ div>.
It is not the first time that people speaking on behalf of the group Anonymous are threats to the Islamic State. In January, after the attacks against journalists and cartoonists of satirical magazine Charlie Hebdo, also in France, the hackers also stated in action against extremists.

Someone is hacking unprotected WiFi routers everywhere -- and forcing them to be on guard.

Does your home WiFi use a default password? It forces you to change it. Does it leave unconscious communication channels open? It forces you to close them.
To experts, this seems like the work of a well-intentioned hacker vigilante. Illegal, yes. But helpful, kinda.
The custom-built software is nicknamed "Ifwatch" and it is spreading quickly, according to researchers at the cyber security firm Symantec (SYMCTech30).
"We have not seen any malicious activity whatsoever," said Symantec threat intelligence officer Val Saengphaibul. "However, in the legal sense, this is illegal activity. It's accessing computers on a network without the owner's permission."
To date, it has snuck into at least 10,000 Internet-connected devices, usually WiFi routers.
Ifwatch first popped up last year, when an independent security researcher spotted something funky in a home WiFi router.
Why does Ifwatch seem nice? Because it tries to kill any malware on your router. It also gives your device automatic, friendly updates that protect it from computer viruses. In some cases, it forces a device to reboot every week, clearing away any dangerous malware.
Then again, there's no telling if this intrusive program is really as benign as it seems. Ifwatch has the ability to monitor what's going on in your router -- and capture that data.
So, in theory, it could spy on you. When you're prompted to type in a new password, it's hard to tell if that stays private. Would you type in a new password with someone looking over your shoulder?
"We have no idea who is behind this -- or what their full intention is," Saengphaibul said.
But there's a clue. There's a hidden message in the program's computer code: "To any NSA and FBI agents reading this: please consider whether defending the US Constitution against all enemies, foreign or domestic, requires you to follow Snowden's example."
This altruistic hack could be an attempt to improve everyone's privacy. Or maybe it's just a very clever diversion.

A precocious youth has won a $10,000 bug bounty from Facebook after he figured out a way to delete other users' comments from Instagram's servers, Mashable reports.
The youngster, a 10-year-old Finnish kid named Jani, claimed the security flaw he discovered could even allow him to delete Justin Bieber's Instagram comments and captions, should he feel so inclined. Jani showed off his hack to the Instagram team by deleting a comment they posted on a test account. As the boy's father told the Finnish news site Iltalehti, Jani and his twin brother are fairly prolific at poking holes in seemingly secure websites, but the Instagram hack was their biggest to date.
The $10,000 prize was part of Facebook's Bug Bounty program, which offers rewards to White Hat hackers and other researchers who find bugs or security flaws in their code. In 2015, Facebook reportedly paid out $936,000 to 210 different researchers, out of a grand total of 13,000 submissions. 102 of those submissions were considered "high impact."

Creators of SpyEye Virus Sentenced to 24 Years in Prison


 IN BRIEF

Two International hackers, Aleksandr Andreevich Panin and Hamza Bendelladj, have been sentenced to a combined 24 years and 6 months in prison for their roles in developing and distributing SpyEye banking trojan, a powerful botnet similar to the infamous ZeuS malware.

Both hackers were charged with stealing hundreds of millions of dollars from banking institutions worldwide.

Masterminds behind the development and distribution of the infamous "SpyEye" botnet have finally been sentenced to a combined total of 24 years and 6 months in prison.

Aleksandr Andreevich Panin and Hamza Bendelladj have been sentenced for their roles in developing and distributing SpyEye malware that is said to have caused hundreds of millions of dollars in losses to the financial sector, the U.S. Justice Department said on Wednesday.

SpyEye, a successor to the notorious Zeus banking malware, has affected financial institutions since 2009.
"Once infected, the malware connects to the command-and-control servers controlled by attackers and steals the victim's personal and financial information, like online banking credentials and credit card information using keyloggers and Web injection."

Panin, a 27-year-old Russian programmer also known by the aliases 'Gribodemon' and 'Harderman,' was sentenced by the court to nine years, six months in prison for developing SpyEye as a successor to Zeus.

In 2010, Panin allegedly received the source code and rights to sell Zeus from Evginy Bogachev, aka Slavik, and incorporated many components of it into SpyEye. Bogachev, who is currently the FBI's most wanted hacker, remains at large.

Panin's associate Bendelladj, a 27-year-old Algerian national also known by the hacker alias as 'Bx1' and 'Happy Hacker,' who hacked 217 banks, donated more than $280 Million to Palestinian charities. He got a sentence of 15-year in prison for marketing and advertising the SpyEye malware on various online forums.

Bendelladj sold versions of SpyEye to almost 150 clients for prices ranging from $1,000 to $8,500 and one of his customers, 'Soldier,' had reported having made over $3.2 Million in just six months using the virus.

The Department of Justice (DoJ) has described SpyEye as a "preeminent malware banking Trojan,"which was used to infect over 50 million computers worldwide from 2010 to 2012, causing nearly $1 Billion in financial losses to individuals and financial institutions globally.

Bendelladj was arrested in Thailand in January 2013 and extradited to the United States at the same year while Panin was detained in July 2013 while he was flying through Hartsfield-Jackson Atlanta International Airport.


<h2 style="border-bottom-color: rgb(222, 222, 222); border-bottom-style: solid; border-width: 0px 0px 1px; color: #212121; font-family: 'Open Sans', arial, Helvetica, sans-serif; font-size: inherit; font-stretch: inherit; letter-spacing: onepx; line-height: 1.4; margin: 0px 0px 10px; outline: 0px; padding: 0px 0px 10px; text-transform: uppercase; vertical-align: baseline;">
 IN BRIEF</h2>
<span style="background-color: whitesmoke; color: #212121; font-family: 'Open Sans', arial, Helvetica, sans-serif; font-size: fifteen.5px; line-height: 28px;">Investigators from the rhetorical coaching Institute of the East Pakistan investigated the $80 Million bank heist and discovered that the hackers managed to realize access to the network as a result of the Bank was victimisation second-hand $10 network switches while not a Firewall to run its network.</span>
<div id="aim16023480530316261091" style="background-color: white; border: 0px; color: #212121; font-family: 'Open Sans', arial, Helvetica, sans-serif; font-size: fifteen.5px; font-stretch: inherit; line-height: 28px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<div dir="ltr" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on">
When it had been reported last month that Associate in Nursing unknown hacking cluster tried to <a href="http://thehackernews.com/2016/03/bank-hack.html" style="border: 0px; color: #006cd8; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">steal $1 Billion</a> from Bangladesh's Fed checking account with the assistance of a malware and, in fact, successfully<a href="http://thehackernews.com/2016/03/bank-hacking-malware.html" style="border: 0px; color: #006cd8; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">stole over $80 Million</a>, the investigators wouldn't say however the hackers managed to bypass the safety solutions on its network.<br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" /><br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" />But truly, there was no security answer put in to assist defend against progressively subtle attacks.</div>
</div>
<div class="clear" id="insidearticlead" style="background-color: white; border: 0px; color: #212121; font-family: 'Open Sans', arial, Helvetica, sans-serif; font-size: fifteen.5px; font-stretch: inherit; line-height: 28px; margin: 10px 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<center style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
<ins class="adsbygoogle" data-ad-client="ca-pub-7983783048239650" data-ad-slot="3325994802" data-adsbygoogle-status="done" style="border: 0px; display: inline-block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 90px; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline; width: 728px;"><ins id="aswift_1_expand" style="background-color: transparent; border: none; display: inline-table; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 90px; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 728px;"></ins></ins><div id="aim26023480530316261091" style="border: 0px; font-stretch: inherit; margin: 0px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
This lack of security practices created it unbelievably easier for the hackers to interrupt into the system and steal $81 Million, tho' a <a href="http://thehackernews.com/2016/03/bank-hack.html" style="border: 0px; color: #006cd8; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">simple misprint (spell error) by hackers</a> halted the additional transfers of the $850 Million funds.<br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" /><br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" />The network computers that were coupled through the second-hand routers were connected to the SWIFT world payment network, permitting hackers to realize access to the credentials needed to create high-value transfers straight into their own accounts.<br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" /><blockquote class="tr_bq" style="background: rgb(253, 253, 253); border: 1px solid rgb(241, 241, 241); color: #222222; font-family: inherit; font-size: fifteen.4px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 10px; quotes: none; vertical-align: baseline;">
"It can be tough to hack if there was a firewall," rhetorical investigator Mohammad Shah Alam<a href="http://www.reuters.com/article/us-usa-fed-bangladesh-idUSKCN0XI1UO" rel="nofollow" style="border: 0px; color: #006cd8; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank">told</a> Reuters.</blockquote>
Firewall area unit meant to assist exclude malicious hackers and malware from doing nasty things.</div>
<div id="aim36023480530316261091" style="border: 0px; font-stretch: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-align: left; vertical-align: baseline;">
<br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" />Moreover, the employment of low cost routers created it tough for investigators to pinpoint the hackers behind the biggest bank heist and fathom the hackers ways, Alam added.<br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" /><blockquote class="tr_bq" style="background: rgb(253, 253, 253); border: 1px solid rgb(241, 241, 241); color: #222222; font-family: inherit; font-size: fifteen.4px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 10px; quotes: none; vertical-align: baseline;">
The investigator damn each the bank moreover as SWIFT, spoken language "It was their responsibility to purpose it out, however we've got not found any proof that they suggested before the heist."</blockquote>
Hackers bust into the bank's systems and tried to steal $1 Billion from its account at the Fed Bank of recent royal line in early Feb so transferred massive sums to fallacious accounts primarily based within the Philippines and country.<br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" /><br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" />Bangladesh police have known twenty foreigners concerned within the heist however the police aforesaid the individuals seem to be WHO|those that|people who} received a number of the payments instead of the hackers who at first scarf the cash.<br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" /><br style="content: " "; display: block; margin: 24px 0px 0px; outline: 0px; padding: 0px;" />Though the investigators area unit still scratching their heads to spot the hackers with no clue, the incident could be a smart reminder for money establishments across the worldwide to restrain the safety of their systems.

 IN BRIEF

The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction.

Under the original Rule 41, let’s say, a New York judge can only authorize the FBI to hack into a suspect's computer in New York.

But the amended rule would now make it easier for the FBI to hack into any computer or network, literally anywhere in the world.

The Federal Bureau of Investigation (FBI) can now Hack your computers anywhere, anytime.

The FBI appeared to have been granted powers to hack any computer legally across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any United States judge.
The U.S. Supreme Court approved yesterday a change in Rule 41 of the Federal Rules of Criminal Procedure that would let U.S. judges issue warrants for remote access to electronic devices outside their jurisdiction.
"These amendments will have significant consequences for Americans' privacy and the scope of the government's powers to conduct remote surveillance and searches of electronic devices," Democratic Senator Ron Wyden of Oregon said in a statement Thursday.
"Under the proposed rules, the government would now be able to obtain a single warrant to access and search thousands or millions of computers at once; and the vast majority of the affected computers would belong to the victims, not the perpetrators, of cybercrime."
If Congress doesn't act, the changes to the Rule 41 will take immediate effect in December despite opposition from technology giants and civil liberties groups who believes the changes would expand the FBI's power to conduct mass hacks on computer networks.

The tech giants and civil liberties groups like the American Civil Liberties Union (ACLU) say the change also could run afoul of the American Constitution's protections against inappropriate searches and seizures.

However, while proposing the rule change in 2014, the U.S. Department of Justice described it as a small modification required to modernize the criminal code for the digital age, saying the changes wouldn't permit searches that aren't already legal.

The FBI Now Can Legally Hack TOR Users


Previously, under the Rule 41, magistrate judges could not approve search warrants to remotely hack or access computers outside their jurisdiction.

But with the rule change, magistrate judges could now issue orders to search or seize computers and electronic devices outside their local authority if the target's location is unknown or if the target is using anonymity software like TOR.

More than a Million of Internet users make use of TOR anonymity software to browse the Web just to hide their actual identity for entirely legitimate reasons, in addition to criminals who use TOR to hide their locations.

Recently, the court threw out evidence that the FBI brought by hacking the members of the child pornography site PlayPen on the TOR network using its so-called Network Investigative Technique(NIT), explaining the feds violated Rule 41's territorial restrictions.

This rule change would prevent something like that from happening, opening doors for the FBI to legally hack any computer in any country.

The Congress has time until 1 December 2016 to reject changes or make more changes to Rule 41, after which the amended version of the rule will take effect.
Back To Top