Tag Archives: Malware

They’ll hack your Android in T Minus 10 seconds

FOTO 1

The word that scared all Google users last summer is back and worse than ever. Stagefright, nicknamed by its founder Metaphor, is even more dangerous in its new version.

Much like its name’s meaning, Stagefright, hides deep in the Android library, unnoticeable to Android users as they watch videos of cute puppies and crafty DIY hacks, all the while exposing themselves to its vulnerabilities.

How many devices are affected?

Now in its second swing, these Stagefright vulnerabilities have already affected hundreds of thousands of Android devices through holes in the multimedia library. More specifically, they have even affected those who use versions 5.0-5.1 (23.5% of affected Androids) and some using versions 2.2 and 4.0 (unsafe due to old terminals that had been exposed to previous viruses).

Google fights back

After the bugs’ discovery, Google implemented a series of bug-fixes and other security measures, even creating its own group of vulnerabilities to counter the attacks. Upgrades and patches were set up to make it more difficult for Stagefright to infiltrate an Android in a real attack.

Unfortunately, Metaphor has been able to dodge these protection mechanisms that were added to the more modern versions of the Android. With this new exploit, as their own creators have shown, Stagefright can easily control devices as diverse and modern as the Nexus 5, Samsung Galaxy S5 UN, UN LG G3 or HTC One UN.

So, how exactly does Stagefright break in?

Sneakily. The user does not need to be using their smartphone during an attack, really. In the case of Stagefright, the attacker can gain access through a particular website (e.g. through a malicious video link received by email or MMS). In a proof of concept, an email with a corrupted video link promoting videos of kittens leads to a page actually containing this material. The recipient has no way of knowing, that while the video is rendering, their Android is also being attacked. It can take as little as 10 to 15 seconds for the cyber-criminal to have control of their victim’s terminal.

Spent some time today messing with Lightroom's post-processing tools to teach myself. I don't want to end up relying on them for every shot but it's nice to know what I have to work with.

Metaphor’s strategy is not exactly new. It largely relies on the attacks that were released last summer, when the holes were first discovered. However, today’s danger lies in Stagefright’s ability to bypass ASLR, which is the barrier Google raised in all versions of Android after 4.1. The problem is that this new threat binds itself not only to older devices but also to more modern ones. Those who have Android´s Lollipop 5.1 are not even safe, representing about 19% of all of Android smartphones.

No matter what, the best way to protect your Android and all other risks associated with Stagefright is to keep your operating system as up-to-date as possible and install a good antivirus. If your phone has been left out of the recent updates, take caution: you should not browse pages unless they are fully trusted. Even those who promise photos of adorable and fluffy kittens.

Warning! Think Twice Before Using USB Drives

Security researchers have discovered a new data-stealing Trojan that makes special use of USB devices in order to spread itself and does not leave any trace of activity on the compromised systems.

Dubbed USB Thief ( or Win32/PSW.Stealer.NAI), the malware has the capability of stealthy attacking against air-gapped or isolated computers, warns ESET security firm.

The malware author has

Who are the most famous hackers in history?

 

PandaSecurity-most-famous-hackers-in-history

Since the beginning of the internet, there have been hackers who have used the Net to benefit at the expense of other users.  Some have managed to attack so many people, or companies and institutions so large, that they have become internationally infamous.  These are the great villains of the internet.

At Panda Security, we have spent the last 25 years successfully fighting against these cyber criminals. We work every day to protect all of our users from the threats these hackers create, making your Panda antivirus purchase more than worthwhile 😉

Today we are going to recall some of the biggest hackers, whose cyber-crimes made them famous and led to arrest and jail time. Some of them even switched sides, saying goodbye to the dark side of the Internet.

1. “Cracka”: The mysterious British teenager who hacked into the CIA director’s database

The latest cyber-criminal to draw international press attention is a 16-year-old British boy who managed to hack into the personal mailings of the CIA Director, FBI Director and the Director of National Intelligence.  He was also able to hack into the Director of National Intelligence’s phone bills, revealing the identities of 31,000 US government agents (CIA, Homeland Security, and FBI).

The true identity of this kid has not been disclosed but we know that he calls himself “Cracka” and claims to be a member of the group of hackers, “Crackas with Attitude”, who act in defense of the Palestinian movement. “Cracka” was arrested last month in the southeast of England.

PandaSecurity-cracka-cia

2. “The homeless hacker” who betrayed Bradley Manning

Adrian Lamo is known as “The homeless hacker” because he was always traveling, connecting, and attacking via WiFi at Internet cafes and other public access points. Although he began his hacking career legally; analyzing security threats for large companies like Microsoft, Fortune 500, Bank of America or Yahoo!; he was later arrested for stealing data from more than 2,000 subscribers of The New York Times.

In 2002, he was sentenced to six months of house arrest and two months of probation for the above crime.  He is also remembered for his betrayal of US soldier Bradley Manning; in 2010 he reported Manning to the Federal Government for leaking classified information about the army and the Secretary of State to another famous hacker, WikiLeaks.

PandaSecurity-adrian-lamo

Adrian Lamo, Kevin Mitnick, and Kevin Poulsen (2001).

 

3. “Soupnazi”: 170 million credit cards hacked from Miami Beach

Albert Gonzalez is the hacker hiding behind the alter-ego “Soupnazi” and the person responsible for one of the largest identity thefts in the history of the Internet.  He gained access to accounts and stole more than 170 million credit cards from users worldwide.

This hacker was arrested in 2008 at a Miami Beach hotel and, in 2010, was sentenced to 20 years in prison by a New Jersey Federal Court. It is believed that Gonzalez was working with hackers hiding in other countries, making them impossible to catch.

 

PandaSecurity-miami-beach-hacked

 

4. The St. Petersburg hacker who stole $10 million from Citibank network

After the end of the Cold War, St. Petersburg became one of the main hot-spots for cyber-crime.  This is where Vladimir Levin had a remarkable career that could be straight out of a James Bond film.

In 1994, after graduating from Saint Petersburg State Institution of Technology, Levin managed to steal $10 million from Citibank clients, all from his apartment in St. Petersburg.  Unfortunately for Levin, Interpol tracked him down and arrested him in London’s Stansted airport. He was extradited to the United States, where he was sentenced to serve three years in prison and pay a fine of $240,015 (plus return all of the stolen money).  It is believed that Levin could be part of an organized group (leading it or taking orders) connected to the Russian mafia.

 

5. The Most Wanted cyber-criminal in the United States

Kevin Mitnick’s case is probably the most controversial in Internet history. In 1983, he managed to hack into the Pentagon network and into the systems of very large corporations (similar to Nokia or Motorola).  He combined social engineering practices by hacking both computers and telephone networks. This made him the most wanted cyber-criminal in the world, in a highly-publicized investigation that ended with his arrest two years later.

After serving five years in prison, Mitnick decided to leave the dark side of the Net. He became a security consultant for several companies and began to hold conferences about cyber security on universal forums. He currently runs his own security consulting company, Mitnick Security Consulting, LLC.

PandaSecurity-cyber-criminal

These are our Top 5 hackers. We are very well-informed about the malware these hackers create and we analyze it every day so that you can have the best virus protection. Who do you think is the worst hacker?

 

The post Who are the most famous hackers in history? appeared first on MediaCenter Panda Security.

Locky’s JavaScript downloader

Locky is a considerable security threat that is now widely spread.

It seems that Locky’s authors are now predominately using one campaign to spread the ransomware. Last week, we published a blog post about Locky Ransomware, the ransomware that is most likely being spread by the infamous Dridex botnet. In our last blog post, we described three campaigns the Locky authors are using to spread their malware. Now Locky’s authors are mainly using the campaign with javascript packed into a zip file sent to people through phishing emails.

Malvertising Campaign Hits Top Websites to Spread Ransomware

Hackers are always in search for an elite method to create loopholes in the cyberspace to implement the dark rules in the form of vulnerability exploitation.

Top Trustworthy sites such as The New York Times, BBC, MSN, AOL and many more are on the verge of losing their face value as a malwertized advertisement campaign are looming around the websites, according to SpiderLabs.

Here’s