Translate

Hacker accused of stealing credit card data and breaking into Romania’s presidency website arrested with more than €153,000

The Romanian man accused of stealing more than 62,000 credit card details and hacking into Romania’s presidency website was arrested this wednesday.
Hacker accused of stealing credit card data and breaking into Romania’s presidency website arrested with more than €153,000
the accused broke into the website of Presidency of Romania aiming to gain access to classified information, the Department for Combatting Organized Crime and Terrorism told newsmen today.


Read more: http://voiceofrussia.com/news/2014_04_16/Police-seize-Romanian-hacker-who-broke-into-Romanian-Presidency-website-1952/
police told that the he has also been engaged in the Activity of stealing Credit card data for more than four years between 2010-2014.

he used to send phishing emails acting as the "Bank", tricking victim to provide his personal and financial details. 
Using the method he managed to steal more than 62,000 credit card details which he frequently used to withdraw cash and also sold about 3,500 card details to other Individuals.

A Search warrant was released and the Authorities found €153,000 and $41,000 at the home of the accused.

However Spokesperson from Special Telecommunications Service (STS) says that the website's security was never been breached.


German Air and space research center under Cyber espionage attack.

12:31 Abhishek kumar 0 Comments
German Air and space research center is the latest victim of a sophisticated Cyber espionage program, most likely carried out by foreign intelligence agency. Der Spiegel reported Sunday.
German Air and space research center under Cyber espionage attack.
The Cologne-headquartered DLR center is the German National facility for aerospace, energy and transportation research. Der Spiegel said that DLR was for month been targeted by a foreign intelligence agency which infected its system with several Trojans and other spyware software.

The well coordinated Cyber espionage attack which lasted for months infected almost every computers of DLR network. Information technology experts investigating the case and found that the Sophisticated Malware used in the attack was programmed in such a manner that it destroys itself on discovery. 

IT forensic experts of the Federal Office for Security in Information Technology (BSI) discovered in the code of some Trojan Chinese characters and recurring typos that suggest attacker from the Far East giving indication that the Attackers may be from China. 

This can also be a simple camouflage, to hide the real truth. says an insider, Involvement of western intelligence agency such as the U.S. National security agency (NSA) may not be completely ruled out. 

German Government has classified the case as extremely serious as the Organisation deals with the Missile, armor technology and aerospace programs.


Adobe releases security update for Adobe Reader for the Android to patch critical remote code execution Vulnerability

08:23 Abhishek kumar 0 Comments
Adobe has released a security update to a critical vulnerability in Adobe reader for Android which allows remote code execution.
Adobe releases security update for Adobe Reader for the Android to patch critical remote code execution Vulnerability
The Vulnerability "CVE-2014-0514" was discovered by security researcher Yorick Koster of Securify BV and has been explained as, 
"An attacker can create a specially crafted PDF file containing Javascript that runs when the target user views (or interacts with) this PDF file. Using anyone of the exposed Javascript the attacker gets access to the public Reflection APIs inherited from Object. These APIs can be abused to run arbitrary Java code."
Multiple vectors are present in the open by use of which cyber criminals can exploit the vulnerability. for example phishing attack or spam campaign using Facebook or rogue emails can be used to take advantage to exploit the vulnerability. which can result in a compromise of the documents stored in Reader and files stored on SD card from the victim's device.

Remote code execution vulnerability effects all Adobe Reader Mobile 11.1.3 and earlier version for Android. Adobe has categorized the vulnerability as "critical" and released a updated version "Adobe Reader for Android 11.2.0" which includes the required patch.

Users are being advised to update their Adobe reader for Android devices to the latest version as soon as possible. updated patched version of the Application can be downloaded from here

Adobe Reader for mobile is one of the most popular Application for Android devices. the app allows user to work with Pdf files and has been installed on 100 million to 500 million devices from Google play.


Major Flaw in WhatsApp allows hackers and Service provider to trace Your location data.

23:59 Abhishek kumar 0 Comments
Researchers at UNH have discovered a major flaw in WhatsApp which puts the user location data at risk of being traced by hackers and Network provider.
Major Flaw in WhatsApp allows hackers and Service provider to trace Your location data.
WhatsApp is said to be using SSL encryption to secure its messaging service, however this year has not been so kind with WhatsApp security. about a month back Researchers discovered 4 gaping SSL security holes in the app which would have compromised its 430 million user ids and phone numbers  and now a unpatched flaw that puts the user location at risk of being traced by hackers or attacker over Rogue Access point.

According to the report, there is a major flaw in the way WhatsApp sends location data when it downloads the location from google maps. The main issue is that the location image is unencrypted, leaving it open for interception through either a Rouge AP, or any man-in-the middle attacks.

A feature in the WhatsApp allows user to share his current location, once the request is made by the user to share his location. whatsApp uses an unencrypted channel to access the present location of the user and then send a screenshot of the Google map location of the user. the flaw can work here and hackers can sniff the requested Image.

Considering the Condition of a Rogue Access point (network) how the bug can be exploited was explained by the Researcher,

The mobile traffic was captured using the Windows 7 virtual wifi miniport adapter feature. The host computer was connected to the Internet via an Ethernet cable so that the wireless card was not in use. The Ethernet connection was set to share its Internet access with the virtual wifi miniport adapter – this helped them to mimic a Rouge Access Point (AP). and allowed to capture the traffic over the wireless network using NetworkMiner and Wireshark.

A Video Demonstartion can be seen below:


Result of the Research: Researchers managed to reconstruct the location image with the source of the Image as Google maps and destination as the tested device.

The Vulnerability has already been reported to WhatsApp security team with a response Acknowledge message sent back as,

" Hello XXXXXX, Thank you for your report. We have already implemented this solution in the latest beta versions of our app. We will be rolling this fix out to the general public with the next release on each platform. If you have any other questions or concerns, please feel free to contact us. We would be happy to help!"

This could be noted that the latest beta version of the app is not vulnerable to the found bug, how ever all other versions are still to be patched.