Category Archives: Hackers News

Hackers News

Donald Trump — Boycott Apple! But Still Tweeting from an iPhone

As the groundwork for the presidential election is being cooked up in the United States to be held on 8 November 2016, candidates are very busy in sharpening their skills to gain the vote of reliance.

By struggling to gain an upper hand in the National issues at this moment could benefit the candidates bring them into the limelight and stardom.

Donald Trump (a Presidential Candidate

FBI Screwed Up — Police Reset Shooter's Apple ID Passcode that leaves iPhone Data Unrecoverable

Another Surprising Twist in the Apple-FBI Encryption Case: The Apple ID Passcode Changed while the San Bernardino Shooter’s iPhone was in Government Custody.

Yes, the Federal Bureau of Investigation (FBI) has been screwed up and left with no option to retrieve data from iPhone that belonged to San Bernardino shooter Syed Farook.

Apple has finally responded to the Department of Justice (

Linux Foundation Launches 'Zephyr', a tiny OS for Internet of Things

The 21st century is witnessing a great change over in the daily life of folks with the advent of IoT devices that are capable of talking to each other without any human intervention.

Yeah! Now you do not have to individually cascade an instruction to each of your home devices to accomplish a task. All have gone automated with the actuators and sensors which are infused into the home

Now We Know — Apple Can Unlock iPhones, Here's How to Hack-Proof your Device

Apple has been asked to comply with a federal court order to help the FBI unlock an iPhone 5C by one of the terrorists in the San Bernardino mass shootings that killed 14 and injured 24 in December.

The FBI knows that it can not bypass the encryption on the iPhone, but it very well knows that Apple can make a way out that could help them try more than 10 PINs on the dead shooter’s iPhone

15-year-old Teenage Hacker Arrested Over FBI Computer Hack

Another 15-year-old teenager got arrested from the land of cakes, Scotland, by British Police for breaking into the FBI Systems on 16th February.

Under the Britain’s anti-hacking law, Computer Misuse Act 1990, the boy has been arrested for his role in hacking and unauthorized access to the digital material.

<!– adsense –>

Federal Agents had fled to Glasgow in an attempt to carry out a

How Just Opening an MS Word Doc Can Hijack Every File On Your System

If you receive a mail masquerading as a company’s invoice and containing a Microsoft Word file, think twice before clicking on it.

Doing so could cripple your system and could lead to a catastrophic destruction.

Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised websites to lure the victims into

Using SimpliSafe Home Security? — You're Screwed! It's Easy to Hack & Can't be Patched

hacking-smart-home-security

If you are using a SimpliSafe wireless home alarm system to improve your home security smartly, just throw it up and buy a new one. It is useless.

The so-called ‘Smart’ Technology, which is designed to make your Home Safer, is actually opening your house doors for hackers. The latest in this field is SimpliSafe Alarm.
SimpliSafe wireless home alarm systems – used by more than 300,000 customers in the United States – are Hell Easy to Hack, allowing an attacker to easily gain full access to the alarm and disable the security system, facilitating unauthorized intrusions and thefts.
…and the most interesting reality is: You Can Not Patch it!
As the Internet of Things (IoT) is growing at a great pace, it continues to widen the attack surface at the same time.
Just last month, a similar hack was discovered in Ring – a Smart doorbell that connects to the user’s home WiFi network – that allowed researchers to hack WiFi password of the home user.

How to Hack SimpliSafe Alarms?

According to the senior security consultant at IOActive Andrew Zonenberg, who discovered this weakness, anyone with basic hardware and software, between $50 and $250, can harvest alarm’s PIN and turn alarm OFF at a distance of up to 200 yards (30 meters) away.
Since SimpliSafe Alarm uses unencrypted communications over the air, thief loitering near a home with some radio equipment could sniff the unencrypted PIN messages transferred from a keypad to the alarm control box when the house owner deactivates the alarm.
The attacker then records the PIN code on the microcontroller board’s memory (RAM) and later replay this PIN code to disable the compromised alarm and carry out burglaries when the owners are out of their homes.
Moreover, the attacker could also send spoofed sensor readings, like the back door closed, in an attempt to fool alarm into thinking no break-in is happening.

Video Demonstration of the Hack

You can watch the video demonstration that shows the hack in work:

“Unfortunately, there’s no easy workaround for the issue since the keypad happily sends unencrypted PINs out to anyone listening,” Zonenberg explains.

Here’s Why Your Smart Alarms are Unpatchable

Besides using the unencrypted channel, SimpliSafe also installs a one-time programmable chip in its wireless home alarm, leaving no option for an over-the-air update.

“Normally, the vendor would fix the vulnerability in a new firmware version by adding cryptography to the protocol,” Zonenberg adds. But, “this isn’t an option for the affected SimpliSafe products because the microcontrollers in currently shipped hardware are one-time programmable.”

This means there is no patch coming to your SimpliSafe Alarm, leaving you as well as over 300,000 homeowners without a solution other than to stop using SimpliSafe alarms and buy another wireless alarm systems.
Zonenberg said he has already contacted Boston-based smart alarm provider several times since September 2015, but the manufacturer has not yet responded to this issue. So, he finally reported the issue to US-CERT.

Hollywood Hospital Pays $17,000 Ransom to Hacker for Unlocking Medical Records

ransomware-medical-record

Ransomware has seriously turned on to a noxious game of Hackers to get paid effortlessly.

Once again the heat was felt by the Los Angeles-based Presbyterian Medical Center when a group of hackers had sealed all its sensitive files and demanded $17,000 USD to regain the access to those compromised data.
The devastation of the compromised files can be pitched as:
  • Compromised emails
  • Lockout Electronic Medical Record System [EMR]
  • Encrypted patient data
  • Unable to carry CT Scans of the admitted patients
  • Ferried risky patients to nearby hospitals
…and much more unexplained outcomes.
The hospital had confirmed that the Ransomware malware had hit its core heart a week before, potentially affecting the situation to grow much worse.

Hospital End up Paying $17,000

As the situation was grown out of wild, the hospital paid 40 Bitcoins (Roughly US $17,000) to the Ransomware Criminals to resume their medical operations after gaining the decryption keys.
“The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key,” the hospital CEO Allen Stefanek said in a letter.
All the electronic medical system were restored back soon after unlocking the encrypted file locks.
The Ransomware had stolen the nights of many network administrators, as they would be often blamed to fight up this nasty threat; instead of blaming staffs who click the illegit links in their e-mail.

The FBI Advises Victims to Just Pay the Ransom

Last year, even the FBI advised paying off the Ransom amount to the ransomware criminals as they had not come up with any other alternatives.
Several companies had got webbed in the Ransomware business including a US Police Department that paid US $750 to ransomware criminals three years back.
Criminals often demand the ransom in BTC (their intelligent move) for the surety of not getting caught, as Bitcoin transactions are non-trackable due to its decentralized nature.
So until and unless a permanent solution evolves, users are requested not to click malicious or suspected links sent via an unknown person.
The frequent payment to Ransomware encourages the hackers in the dark to stash the cash and develop a more enticing framework for the next target.
But affecting a medical system is a heinous crime as hospitals are acting as a bridge between life and heaven.

Apple vs. FBI — Google Joins Tim Cook in Encryption Backdoor Battle

Apple vs. FBI — Google CEO Joins Apple in Encryption Backdoor Battle

In the escalating battle between the Federal Bureau of Investigation (FBI) and Apple over iPhone encryption, former National Security Agency (NSA) contractor Edward Snowden and Google chief executive Sundar Pichai just sided with Apple’s refusal to unlock iPhone.

Yesterday, Apple CEO Tim Cook refused to comply with a federal court order to help the FBI unlock an iPhone owned by one of the terrorists in the mass shootings in San Bernardino, California, in December.

Here’s What the FBI is Demanding:

The federal officials have asked Apple to make a less secure version of its iOS that can be used by the officials to brute force the 4-6 digits passcode on the dead shooter’s iPhone without getting the device’s data self-destructed.
Cook called the court order a “chilling” demand that “would undermine the very freedoms and liberty our government is meant to protect.” He argued that to help the FBI unlock the iPhone would basically providing an Encryption Backdoor that would make the products less secure.

Backdoor for Government, Backdoor for All

However, Apple is worried that once this backdoor gets created and handed over to the FBI, there would be chances that the backdoor will likely get into the hands of malicious hackers who could use it for evil purposes.
Although many politicians, including Donald Trump, have slammed Apple’s decision, Google has stepped up and taken a public stand in support of Apple’s decision.
“I agree 100 percent with the courts,” Trump said in a statement. “But to think that Apple won’t allow us to get into her cell phone, who do they think they are? No, we have to open it up.”

Google Sided with Apple

In a series of tweets late Wednesday, Pichai sided with Apple while saying “forcing companies to enable hacking could compromise users’ privacy” and “requiring companies to enable hacking of customer devices & data. Could be a troubling precedent.”

However, Pichai took more than 12 hours to talk about this burning issue, after Edward Snowden pointed out that Google had not yet stepped forward to speak up on his stand.

“The @FBI is creating a world where citizens rely on #Apple to defend their rights, rather than the other way around,” Snowden tweeted on Wednesday. Snowden called on Google to stand with Apple, saying, “This is the most important tech case in a decade.”

Pichai’s stance is basically: 

The technology companies will give its customers’ data to law enforcement when it is required to, but the companies will not put in a “Backdoor” for the government.
While the statements made by Pichai is not quite as forceful as Cook’s statement published in an open letter to its customers, we can assume both Google and Apple are together, at least in the sense that the federal agencies are asking too much.

Judge Orders Apple to Unlock iPhone Used by San Bernardino Shooters

unlock iphone passcode
The Tech Giant Apple has come into an entangled situation which could be a potential security threat for Apple users in near future: Help the FBI Unlock an iPhone.
The US Magistrate Judge Sheri Pym has ordered Apple to provide a reasonable technical assistance in solving a critical case of Syed Farook; who with his wife Tashfeen Malik planned a coordinated “2015 San Bernardino attack” that killed 14 people injured 22.
As part of the investigation, the Federal Bureau of Investigation (FBI) had seized the Farook’s iPhone 5C that would be considered as an insufficient evidence until and unless the iPhone gets unlocked by any means.
Previously, Apple had made several crystal clear statements about its Encryption Policy, stating that even the company is not able to decrypt any phone data as the private key lies at the user’s end.
A similar problem encountered three years back with Lavabit, who was forced to shut down its services soon after when FBI demands SSL keys to snoop the emails.
However, despite forcing or ordering Apple to break the encryption and unlock the suspect’s iPhone, judges have ordered the company to find an alternative way to unlock iPhone, keeping data intact.

Can Apple Unlock iPhone? Yes, Here’s How:

unlock-iphone-san-bernardino-shooters

From iOS 8, Apple added a data security mechanism called Data Protection, which uses 256-bit AES Encryption key to encrypt everything on the device.

Here the passcode a user enters is itself used as part of the encryption key and thus, it is impossible for an attacker or even Apple itself to unlock iPhone until the user re-inputs the passcode.
Besides Data Protection, Apple offers “Auto-Destruct Mode” security feature that will erase all the data on the iPhone if an incorrect password is entered 10 times concurrently, making the data unrecoverable.
So, Judge Pym wants Apple to come up with an alternative that should increase the brute force attempts from 10 to millions, in order to prevent the data from getting self-destructed.
Apple has not yet confirmed whether it is possible to write such a code that can bypass iOS Auto-Destruct feature.
But, if it’s possible, it would provide an alternative backdoor mechanism to every law enforcement and intelligence agency to unlock iPhone by simply brute forcing 4-6 Digit Pins effectively within few hours.
Here we support Apple policy not to help break its users’ encryption, because once a master key is created to unlock that particular iPhone, we’re sure that the US government will misuse this power and demand for the key again and again in near future for unlocking other phones.

Apple Rejects FBI Demands

apple-iphone-unlock

Apple has dismissed the court order to unlock San Bernardino gunman Syed Rizwan Farook’s iPhone.

Here’s what Apple CEO Tim Cook said in a statement:

“The United States government has demanded that Apple takes an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.”

“We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.”