Nova ferramenta hacker desbloqueia qualquer iPhone no mercado

By: Felipe Payão

 

Ferramenta da Cellebrite invade qualquer iPhone e Android top de linha no mercado.

A empresa israelense Cellebrite lançou hoje (14) a UFED Premium, uma ferramenta hacker com a capacidade de desbloquear qualquer Apple iPhone vendido no mercado atualmente. A UFED Premium é uma ferramenta voltada para autoridades governamentais e policiais no mundo — a Cellebrite, por exemplo, colabora com autoridades brasileiras.

Por meio da UFED Premium, agências policiais poderão realizar a extração completa do sistema de arquivos em celulares iOS, além de smartphones Android top de linha, afirma a Cellebrite. “Obtenha acesso a dados de aplicativos de terceiros, conversas por bate-papo, e-mails baixados e anexos de email, conteúdo excluído e muito mais, aumente suas chances de encontrar provas incriminatórias e leve sua questão a uma resolução”, escreve a empresa ao vender a solução.

Vale notar que, apesar da Cellebrite afirmar que consegue desbloquear todos os iPhones no mercado, o site oficial indica que o UFED Premium ainda não consegue fazer o hack em iPhones com iOS 13, versão do sistema operacional que chegará em breve em todos os aparelhos Apple.

A Cellebrite ganhou mídia no caso Apple x FBI, quando o órgão norte-americano buscava hackear o aparelho de um suspeito do terrorismo. O FBI teve sucesso em extrair os dados de um iPhone 5c por conta da ferramenta.

Mais:  https://m.tecmundo.com.br/seguranca/142593-nova-ferramenta-hacker-desbloqueia-qualquer-iphone-mercado.htm

City of Del Rio Hit by Ransomware Attack

By: Kacy Zurkus

Another ransomware attack has made headlines with the city of Del Rio, Texas, announcing on January 10, 2019, that the servers at City Hall were disabled, according to a press release.

“The first step in addressing the issue, was for the City’s M.I.S. (Management Information Services) Department to isolate the ransomware which necessitated turning off the internet connection for all city departments and not allowing employees to log into the system. Due to this, transactions at City Hall are being done manually with paper.”

As has been the alternative method of communication for many organizations that have been impacted by cyber-attacks, Del Rio turned to social media, using Facebook to inform citizens of alternative payment options available to them.

After reporting the attack to the FBI, Del Rio was referred to the Secret Service. “The City is diligently working on finding the best solution to resolve this situation and restore the system. We ask the public to be patient with us as we may be slower in processing requests at this time,” the press release said.

More: https://www.infosecurity-magazine.com/news/city-of-del-rio-hit-by-ransomware/

UnityPoint warns 1.4 million patients their information might have been breached by email hackers

By: Tony Leys

One of Iowa’s main hospital and clinic systems has notified about 1.4 million patients that their personal information might have been breached.

 UnityPoint Health officials said hackers used “phishing” techniques to break into the company’s email system. The company, based in West Des Moines, said the hackers could have obtained medical information, such as diagnoses and types of care, that was included in emails.

“While we are not aware of any misuse of patient information related to this incident, we are notifying patients about what happened, what information was involved, what we have done to address the situation, and what patients can do to help protect their information,” RaeAnn Isaacson, UnityPoint’s privacy officer, said in a press release Monday.

The hackers also might have obtained some patients’ financial information, such as bank account numbers, UnityPoint said.

The hackers used official-looking emails to obtain employees’ passwords, leading to the breach, the company said. The company said after it discovered the problem May 31, it hired outside experts and notified the FBI.

More: https://amp-desmoinesregister-com.cdn.ampproject.org

FBI: Reboot your home and small office routers to counter Russian malware

By: Ms. Smith

The FBI, DHS and DoJ advised rebooting your router to clear it from advanced stages of the Russian-linked malware VPNFilter. The malware infecting SOHO routers and NAS devices is linked to the Russian military-backed hackers Sofacy Group, aka Fancy Bear and APT 28.

If you have a home or small office router, the FBI suggests you immediately reboot it to counter Russian-linked malware VPNFilter.

It doesn’t take long to simply turn your router off and then back on, and the payoff is worth it, considering it’s within your power to counter Fancy Bear-linked malware that is capable of everything from stealing information to rendering the router inoperable.

The malware, which has so far infected at least 500,000 small office and home office routers in 54 countries, has been dubbed VPNFilter. It’s linked to the Sofacy Group, aka Fancy Bear and APT 28, a sophisticated cyber-espionage hacking group backed by the Russian military intelligence agency.

VPNFilter, according to a trio of three-letter agencies — the FBI, DHS, DoJ — has infected not only hundreds of thousands of SOHO routers, but also other network-attached storage (NAS) devices.

On Wednesday, May 23, Cisco Talos warned that the estimated number of infected devices was “at least 500,000 in at least 54 countries. The known devices affected by VPNFilter are Linksys, MikroTik, NETGEAR and TP-Link networking equipment in the small and home office (SOHO) space, as well at QNAP network-attached storage (NAS) devices.”

Talos security researchers added, “The malware has a destructive capability that can render an infected device unusable, which can be triggered on individual victim machines or en masse, and has the potential of cutting off internet access for hundreds of thousands of victims worldwide.”

Are your phone camera and microphone spying on you?

By: Dylan Curran

Taping over the lens is just the first step in keeping online snoopers out of your business.

ere is what the former FBI director James Comey said when he was asked back in September 2016 if he covered his laptop’s webcam with tape.

“Heck yeah, heck yeah. Also, I get mocked for a lot of things, and I am much mocked for that, but I hope people lock their cars … lock your doors at night. I have an alarm system, if you have an alarm system you should use it, I use mine.”

If he does, we all should.

Who could be accessing your camera and microphone?

Apps like WhatsApp, Facebook, Snapchat, Instagram, Twitter, LinkedIn, Viber

Felix Krause described in 2017 that when a user grants an app access to their camera and microphone, the app could do the following:

  • Access both the front and the back camera.
  • Record you at any time the app is in the foreground.
  • Take pictures and videos without telling you.
  • Upload the pictures and videos without telling you.
  • Upload the pictures/videos it takes immediately.
  • Run real-time face recognition to detect facial features or expressions.
  • Livestream the camera on to the internet.
  • Detect if the user is on their phone alone, or watching together with a second person.
  • Upload random frames of the video stream to your web service and run a proper face recognition software which can find existing photos of you on the internet and create a 3D model based on your face.

MORE: https://amp-theguardian-com.cdn.ampproject.org/c/s/amp.theguardian.com/commentisfree/2018/apr/06/phone-camera-microphone-spying

FBI Claims Cyber Crime Syndicate Founder Medvedev Was Worth $800M+ in BTC

By: sikur

Capturar

by Samuel Haig

February 13, 2018

The Federal Bureau of Investigation (FBI) has claimed that Sergey Sergeyvich Medvedev, a Russian national recently arrested in Bangkok, was the co-founder and second in command of the Infraud group – a notorious international cyber crime syndicate. It has been reported that at the time of his arrest, Mr. Medvedev was in possession of more than 100,000 bitcoins.

Accused Cyber Crime Syndicate Co-Founder Arrested in Thailand

Sergey Sergeyvich Medvedev is accused of being the co-founder and second in command of the transnational crime syndicate, Infraud. The dark-web marketplace associated with the group was seized and taken offline by U.S. authorities.

Mr. Medvedev, a Russian national, fled to Thailand six years ago. Thailand’s Crime Suppression Division (CSD) identified the thirty-one-year-old as being located in Bangkok following an investigation prompted by American requests for cooperation with the FBI.

Maj. Nathapol Ratanamongkolsak of the CSD stated that “The United States […] requested assistance from Thai police, and the police commissioner ordered the Crime Suppression Division to work on this case in late 2017.”

Mr. Medvedev in Possession of Over 100,000 Bitcoins

Mr. Medvedev was arrested during a raid on his apartment in the Sukhumvit area, conducted by 30 CSD officers. The CSD officers seized numerous documents and a notebook computer from Mr. Medvedev.

CSD investigators have claimed that Mr. Medvedev was trading illegal products online in exchange for bitcoin. Thai media outlet, Bangkok Post, has reported that “judging by the evidence obtained during the Feb 2 raid, [Mr. Medvedev] had more than 100,000 bitcoin[s]” – at the time valued at approximately $800 – $900 million USD.

Thailand’s Central Investigation Bureau (CIB) chief, Thitiraj Nhongharnpitak, has confirmed that the raid took place. However, the CIB chief has declined to issue further details regarding the operation, stating that such is an international police matter and that more information will be made public soon.

MORE: https://news.bitcoin.com/fbi-claims-arrested-cyber-crime-syndicate-co-founder-medvedev-worth-800m-in-btc/?utm_source=OneSignal%20Push&&utm_medium=notification&&utm_campaign=Push%20Notifications

Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist

FBI Arrests A Cyberstalker After Shady “No-Logs” VPN Provider Shared User Logs

By: sikur

Capturar

October 08, 2017 

FBI recently arrested a psycho cyber stalker with the help of a popular VPN service and this case apparently exposed the company’s lies about the “no logs” policy.

Taking down cyber stalkers and criminals is definitely a good thing, and the FBI has truly done a great job, but the VPN company whose first line of the privacy policy is—“We Do Not monitor user activity nor do we keep any logs”—has literally betrayed its customer’s trust.

Is your VPN also lying to you? Well, it’s the right time to think about this twice.

It’s no secret that most VPN services—which claim to shield your Internet traffic from prying eyes, assuring you to surf the web anonymously—are not as secure as they claim.

In this post-Snowden era, a majority of VPN providers promise that their service is anonymous, with no log policy, but honestly, there is no way you can verify this.

MORE: https://thehackernews.com/2017/10/no-logs-vpn-service-security_8.html

Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist

Here’s How CIA Spies On Its Intelligence Liaison Partners Around the World

By: sikur

By Swati Khandelwal

Wikileaks Exposes How CIA Spies On Its Intelligence Liaison Partners Around the WorldWikiLeaks has just published another Vault 7 leak, revealing how the CIA spies on their intelligence partners around the world, including FBI, DHS and the NSA, to covertly collect data from their systems.

The CIA offers a biometric collection system—with predefined hardware, operating system, and software—to its intelligence liaison partners around the world that helps them voluntary share collected biometric data on their systems with each other.

But since no agency share all of its collected biometric data with others, the Office of Technical Services (OTS) within CIA developed a tool to secretly exfiltrate data collections from their systems.

MORE: http://thehackernews.com/2017/08/cia-liaison-spying-software.html

 

Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist

Comey says encryption stymies law enforcement, calls for ‘hard conversation’

By: sikur

FBI Director James Comey, who’s drawn criticism from both the left and the right for his handling of the Hillary Clinton email server investigation and a steady stream of national security leaks bemoaned the obstacles to law enforcement thrown up by encryption and said that Americans can’t expect “absolute privacy.”

“It is making more and more of the room of what the FBI investigates dark,” Comey said at a cybersecurity conference at Boston College Wednesday, the Boston Globe reported, though he maintained that he supported “strong encryption.”

MORE: https://www.scmagazine.com/comey-says-encryption-stymies-law-enforcement-calls-for-hard-conversation/article/642915/

 

Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist Lorep ipsum Lorep ipsum, journalist