BlackBox (Security) Archiv
4.07K subscribers
183 photos
393 videos
167 files
2.67K links
πŸ‘‰πŸΌ Latest viruses and malware threats
πŸ‘‰πŸΌ Latest patches, tips and tricks
πŸ‘‰πŸΌ Threats to security/privacy/democracy on the Internet

πŸ‘‰πŸΌ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Huawei opens core tech to developers and hopes to inspire the next TikTok

It also laid out plans to see Google replacement HarmonyOS on smartphones from next year and a handful of new consumer devices.

Huawei has announced it will fully open core technologies, including its software and hardware capabilities, to developers and partners.

As part of this plan, Huawei will open software services, such as browsing, search, map, payment, advertising kits, and hardware capabilities, including AR map, communication and transmission tools, as well as security capabilities.

Huawei consumer business group CEO Richard Yu appealed to developers and partners to work with the company to "jointly build a fully-connected all-scenario intelligent ecosystem" featuring new apps across different categories.

"Developers can benefit from all the resources we have … we're dedicated to introducing Chinese developers' work to global consumers, hoping to see more TikTok in the future, so that we can take them to the overseas market," Yu said, speaking through a translator during his keynote speech at Huawei's Developer Conference 2020.

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/huawei-opens-core-tech-to-developers-and-hopes-to-inspire-the-next-tiktok

#huawei #open #core #tech #HarmonyOS #developers
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Fishing in the Piracy Stream: How the Dark Web of Entertainment is Exposing Consumers to Harm

Digital Citizens Investigation Finds Malware on PiracyApps That Steal User Names and Passwords, Probe to Breach Networks, and Secretly Upload Data.

πŸ‘€ πŸ‘‰πŸΌ (PDF)
https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Fishing_in_the_Piracy_Stream_v6.pdf

πŸ‘€ πŸ‘‰πŸΌ Read as well:
Dark Web-Hosted Movies and Fake Apps Are Costing the US Movie and TV Industry Billions Every Year
https://tapeucwutvne7l5o.onion/dark-web-hosted-movies-and-fake-apps-are-costing-the-us-movie-and-tv-industry-billions-every-year

#darknet #darkweb #movies #piracy #report #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Dark Web-Hosted Movies and Fake Apps Are Costing the US Movie and TV Industry Billions Every Year

The dark web facilitates the movie piracy industry that’s costing the US movie and TV industry billions of dollars in lost revenue

Illegal movie downloads and counterfeit entertainment apps are costing the US movie and television industry billions of dollars every year.

Today, there are more than 150 billion views of illicit multimedia being consumed across the US every single year. It turns out that a majority of these views have been unaccounted for as a significantly high number of offenders continue to operate under the radar of copyright enforcement authorities.

Illegal file sharing is normally facilitated via torrent websites, which denote online platforms where individuals upload large files.

The torrent websites are accessible to people looking out to download uploaded information that would include pirated movie content, software programs, and video games.

Importantly, the dark web, which is known for hosting illicit goods and services for sale, has become a significantly relevant player in the illegal movies and fake apps business. Here, millions of illicit files are uploaded and accessed by darknet downloaders.

While speaking to Amarillo News, Dr. Brandon Bang, a criminal justice expert, said that the current circumstance surrounding pirated entertainment material has led to the loss of employment opportunities and revenue streams across the economic spectrum.

He went on to highlight the role of torrent websites in enabling the illegal movie download business that has affected the entire industry. The criminal justice pundit went on to cite the case involving shutdown of the torrent website MegaUpload – an event that was big enough to cause noticeable positive changes in the TV industry, which gained a more than 5 percent increase in revenue due to the anti-piracy operation.

πŸ‘€ πŸ‘‰πŸΌ https://tapeucwutvne7l5o.onion/dark-web-hosted-movies-and-fake-apps-are-costing-the-us-movie-and-tv-industry-billions-every-year

πŸ‘€ πŸ‘‰πŸΌ https://abc7amarillo.com/news/local/illegal-downloading-is-costing-the-us-movie-television-industry-billions-per-year

πŸ‘€ πŸ‘‰πŸΌ Read as well (pdf)
Fishing in the Piracy Stream: How the Dark Web of Entertainment is Exposing Consumers to Harm
https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/DCA_Fishing_in_the_Piracy_Stream_v6.pdf

#darknet #darkweb #movies #piracy #report #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
QAnon Website Shuts Down After N.J. Man Identified as Operator

A popular website for posts about the conspiracy group QAnon abruptly shut down after a fact-checking group identified the developer as a New Jersey man.

Qmap.pub is among the largest websites promoting the QAnon conspiracy, with over 10 million visitors in July, according to web analytics firm SimilarWeb Ltd., and served as the primary archive of QAnon’s posts. The website aggregates posts by Q, the anonymous figure behind the QAnon theory, and the creator of the Qmap.pub website is known online only as β€œQAppAnon.”

The fact-checking site Logically.ai identified Jason Gelinas of New Jersey on Sept. 10 as the β€œdeveloper and mouthpiece” for the site. New Jersey state records connect QAppAnon to Gelinas’s home address, Bloomberg found.

Reached outside his home, Gelinas declined to comment on the Logically report, saying only that someone had sent it to him on Twitter after it was published.

β€œI’m not going to comment on any of that,” Gelinas said when asked if he was behind the website Qmap. β€œI’m not going to get involved. I want to stay out of it.”

Wearing an American flag baseball cap, Gelinas said that QAnon is a β€œpatriotic movement to save the country.”

πŸ‘€ πŸ‘‰πŸΌ https://www.bloomberg.com/news/articles/2020-09-11/qanon-website-shuts-down-after-n-j-man-identified-as-operator

#qanon #qmap #QAppAnon #website #shutdown
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Bitcoin Inventory Out-of-Memory Denial-of-Service Attack - Researcher kept a major Bitcoin bug secret for two years to prevent attacks

The INVDoS bug would have allowed attackers to crash Bitcoin nodes and other similar blockchains.

In 2018, a security researcher discovered a major vulnerability in Bitcoin Core, the software that powers the Bitcoin blockchain, but after reporting the issue and having it patched, the researcher opted to keep details private in order to avoid hackers exploiting the issue.

Technical details were published earlier this week after the same vulnerability was independently discovered in another cryptocurrency, based on an older version of the Bitcoin code that hadn't received the patch.

Called INVDoS, the vulnerability is a classic denial-of-service (DoS) attack. While in many cases, DoS attacks are harmless, they are not for internet-reachable systems, which need to have stable uptime in order to process transactions.

INVDoS was discovered in 2018 by Braydon Fuller, a Bitcoin protocol engineer. Fuller found that an attacker could create malformed Bitcoin transactions that, when processed by Bitcoin blockchain nodes, would lead to uncontrolled consumption of the server's memory resources, which would eventually crash impacted systems.

πŸ‘€ πŸ‘‰πŸΌ CVE-2018-17145: Bitcoin Inventory Out-of-Memory Denial-of-Service Attack (pdf)
https://invdos.net/paper/CVE-2018-17145.pdf

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/researcher-kept-a-major-bitcoin-bug-secret-for-two-years-to-prevent-attacks

#researcher #bitcoin #bug #INVDoS #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Welcome to the quantum Internet, with privacy guaranteed by the laws of physics

Quantum computing is gradually moving from the realm of science – and even science fiction – to become a practical technology that is being used in real-life contexts.

Three years ago, Privacy News Online wrote about one aspect – the possibility that quantum computers will be able to unlock all of today’s encryption, including the strongest. But increasingly, a more positive vision of quantum computing is emerging. It is centered around the creation of what is being called the quantum Internet.

That’s just a shorthand way of saying a global network of quantum computers and other devices based on the physics of quantum mechanics, able to exchange information much as ordinary systems do across today’s non-quantum Internet. But the quantum version has one crucial property that makes it of great importance for privacy: it offers a fundamentally secure way of communication in which privacy is guaranteed by the laws of physics.

That’s because the quantum bits – qubits – that move across a quantum network link are subject to the observer effect: any attempt to monitor them as they traverse the network would modify them. As a result, it will be evident when things like encryption keys or data have been compromised en route. There is no way around this – it is an inherent property of quantum mechanical systems – which is why so many companies and governments are exploring how to create quantum networks and the quantum Internet.

πŸ‘€ πŸ‘‰πŸΌ https://www.privateinternetaccess.com/blog/welcome-to-the-quantum-internet-with-privacy-guaranteed-by-the-laws-of-physics/

πŸ‘€ πŸ‘‰πŸΌ (pdf)
https://www.energy.gov/sites/prod/files/2020/07/f76/QuantumWkshpRpt20FINAL_Nav_0.pdf

#quantum #internet #privacy #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
ByteDance won't allow TikTok's algorithm to be part of a sale: Report

As the deadline for a forced sale or shutdown of the U.S. operations of the TikTok video-sharing app fast approaches, ByteDance is said to have decided its algorithm won't be part of any sale that happens.

September 15, the date by which U.S. President Donald Trump has ordered ByteDance to either sell TikTok to a U.S. company or see the service banned from the U.S. market, is looming. Today, September 13, The South China Morning Post is reporting (based on an unnamed source that the SCMP says was briefed on the Chinese company's boardroom discussions) that ByteDance has decided TikTok's algorithm won't be included as part of the sale.

So now the question is will a sale still happen by Tuesday? Will Microsoft and Walmart, Oracle -- with close ties to Trump -- and/or various TikTok investors still see enough value in TikTok to push forward with a purchase? And for how much?

Even before today's report about terms around the algorithm, there were questions whether a sale would happen at all. The Wall Street Journal reported on September 9 that ByteDance was discussing with the U.S. government various possible arrangements that would allow TikTok to avoid a full sale of its U.S. operations. And before that, the Chinese government had put in place steps designed to make a sale to a U.S. company more difficult, if not impossible.

πŸ‘€ πŸ‘‰πŸΌ https://www.scmp.com/economy/china-economy/article/3101362/tiktoks-algorithm-not-sale-bytedance-tells-us-source

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/bytedance-wont-allow-tiktoks-algorithm-to-be-part-of-a-sale-report

#report #TikTok #DeleteTikTok #china #usa #sale #algorithm
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Protect your information from physical threats

πŸ’‘ πŸ‘‰πŸΌ Table of Contents πŸ‘ˆπŸΌ

πŸ‘€ πŸ‘‰πŸΌ
What you can learn from this guide

πŸ‘€ πŸ‘‰πŸΌ Assessing your risks

πŸ‘€ πŸ‘‰πŸΌ Creating your physical security policy

πŸ‘€ πŸ‘‰πŸΌ Protecting your information from physical intruders

πŸ‘€ πŸ‘‰πŸΌ Software and settings related to physical security

πŸ‘€ πŸ‘‰πŸΌ Maintaining a healthy environment for your equipment

πŸ‘€ πŸ‘‰πŸΌ Further reading

πŸ’‘ πŸ‘€ πŸ‘‰πŸΌ https://securityinabox.org/en/guide/physical/

#security #physical #information #guide
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
China's 'hybrid war': Beijing's mass surveillance of Australia and the world for secrets and scandal

A Chinese company with links to Beijing's military and intelligence networks has been amassing a vast database of detailed personal information on thousands of Australians, including prominent and influential figures.

A database of 2.4 million people, including more than 35,000 Australians, has been leaked from the Shenzhen company Zhenhua Data which is believed to be used by China's intelligence service, the Ministry of State Security.

Zhenhua has the People's Liberation Army and the Chinese Communist Party among its main clients.

Information collected includes dates of birth, addresses, marital status, along with photographs, political associations, relatives and social media IDs.

It collates Twitter, Facebook, LinkedIn, Instagram and even TikTok accounts, as well as news stories, criminal records and corporate misdemeanours.

While much of the information has been "scraped" from open-source material, some profiles have information which appears to have been sourced from confidential bank records, job applications and psychological profiles.

The company is believed to have sourced some of its information from the so-called "dark web".

One intelligence analyst said the database was "Cambridge Analytica on steroids", referring to the trove of personal information sourced from Facebook profiles in the lead up to the 2016 US election campaign.

πŸ‘€ πŸ‘‰πŸΌ https://www.abc.net.au/news/2020-09-14/chinese-data-leak-linked-to-military-names-australians/12656668

#china #beijing #australia #eu #uk #canada #hybrid #war #mass #surveillance #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Interview mit den Machern vom Zeroday-Podcast: bitte Fragen einreichen!

Zeroday-Podcast für Informationssicherheit und Datenschutz von Stefan und Sven. Schon seit Ende 2016 begeistern uns die beiden regelmÀßig mit ihrem Podcast. In den einschlÀgigen Telegram-Nachrichten KanÀlen sind sie schon lange regelmÀßig vertreten. Aber auch in unseren Lesetipps sind sie immer wieder mit dabei und gern gesehene GÀste. Jetzt haben wir endlich die Gelegenheit für ein Interview mit den beiden.

So ein Podcast ist schon eine feine Sache. Egal wo man sich gerade befindet, man kann sich immer und ΓΌberall zu seinen Lieblingsthemen etwas Passendes anhΓΆren. Und klar, welches Thema kΓΆnnte fΓΌr einen Leser der Tarnkappe passender sein, als Informationssicherheit und Datenschutz. Denn digitale Selbstverteidigung, Informationssicherheit und unser Datenschutz werden immer wichtiger.

Stefan und Sven haben sich genau diesem Thema verschrieben. Seit Ende 2016 sind sie mit viel Leidenschaft dabei. Mit ihrem regelmÀßig erscheinenden Zeroday-Podcast, versuchen sie seit nun fast vier Jahren ihre Hârer für diese Themen zu begeistern.

🎧 πŸ‘‰πŸΌ https://t.iss.one/cRyPtHoN_INFOSEC_DE/4335

⚠️ Denkt immer daran, diese Techniken oder Hardware nur bei GerÀten anzuwenden, deren Eigner oder Nutzer das erlaubt haben. Der unerlaubte Zugriff auf fremde Infrastruktur ist strafbar (In Deutschland §202a, §202b, §202c StGB).

πŸ‘€ πŸ‘‰πŸΌ https://tarnkappe.info/interview-mit-den-machern-von-zeroday-podcast-bitte-fragen-einreichen/

#Interview #Zeroday #Podcast
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
IRS Wants to Pay $625,000 for Tools to Track Monero

The United States Internal Revenue Service is offering $625,000 for Monero-tracing software, according to a recently published proposal request.

In the proposal request, the IRS described the need for β€œinnovative solutions for tracing and attribution of privacy coins,” including Monero and the Bitcoin Lightning Network.

The use of privacy coins is becoming more popular for general use, and is also seeing an increase in use by illicit actors,” the IRS wrote in the proposal. β€œCurrently, there are limited investigative resources for tracing transactions involving privacy cryptocurrency coins such as Monero, Layer 2 network protocol transactions such as Lightning Labs, or other off-chain transactions that provide privacy to illicit actors.”

The IRS is planning on spending $1 million this fiscal year on multiple proposals, according to the document.

πŸ’‘ Documents attached to the proposal: πŸ‘ˆπŸΌ

πŸ‘‰πŸΌ Pilot+IRS+Crypto+RFP+FINAL.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Pilot+IRS+Crypto+RFP+FINAL.pdf

πŸ‘‰πŸΌ Clauses+Provision+Attachment+Crypto.pdf
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/documents/Clauses+Provision+Attachment+Crypto.pdf

πŸ‘‰πŸΌ Related: CipherTrace Provided Feds with β€œMonero Tracing” Tools
https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/ciphertrace-provided-feds-with-monero-tracing-tools/

πŸ‘€ πŸ‘‰πŸΌ https://darkzzx4avcsuofgfez5zq75cqc4mprjvfqywo45dfcaxrwqg6qrlfid.onion/post/irs-wants-to-pay-625000-to-track-monero/

#irs #monero #tracking #tracing #privacy #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Magento online stores hacked in largest campaign to date

Almost 2,000 Magento stores have been compromised over the weekend in the largest hacking campaign since 2015.

More than 2,000 Magento online stores have been hacked over the weekend in what security researchers have described as the "largest campaign ever."

The attacks were a typical Magecart scheme where hackers breached sites and then planted malicious scripts inside the stores' source code, code that logged payment card details that shoppers entered inside checkout forms.

"On Friday, 10 stores got infected, then 1,058 on Saturday, 603 on Sunday and 233 today," said Willem de Groot, founder of Sanguine Security (SanSec), a Dutch cyber-security firm specialized in tracking Magecart attacks.

"This automated campaign is by far the largest one that Sansec has identified since it started monitoring in 2015," de Groot added. "The previous record was 962 hacked stores in a single day in July last year."

πŸ‘€ πŸ‘‰πŸΌ https://sansec.io/research/largest-magento-hack-to-date

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/magento-online-stores-hacked-in-largest-campaign-to-date

#magento #online #store #hacked
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Media is too big
VIEW IN TELEGRAM
Joe Rogan Experience #1536 - Edward Snowden

Former CIA contractor turned whistleblower Edward Snowden shocked the world when he revealed the misdeeds of the US intelligence community and its allies. Now living in Russia, he is a noted privacy advocate and author who serves as president of the Freedom of the Press Foundation.

πŸ“Ί πŸ‘‰πŸΌ https://www.youtube.com/watch?v=_Rl82OQDoOc

#snowden #cia #whistleblower #usa #video #podcast
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
You are not anonymous on Tor - Last February, my Tor onion service came under a huge Tor-based distributed denial-of-service (DDoS) attack

I spent days analyzing the attack, developing mitigation options, and defending my server. (The Tor service that I run for the Internet Archive was down for a few hours, but I managed to keep it up and running through most of the attack.)

While trying to find creative ways to keep the service up, I consulted a group of friends who are very active in the network incident response field. Some of these are the people who warn the world about new network attacks. Others are very experienced at tracking down denial-of-service attacks and their associated command-and-control (C&C) servers. I asked them if they could help me find the source of the attack. "Sure," they replied. They just needed my IP address.

I read off the address: "152 dot" and they repeated back "152 dot". "19 dot" "19 dot" and then they told me the rest of the network address. (I was stunned.) Tor is supposed to be anonymous. You're not supposed to know the IP address of a hidden service. But they knew. They had been watching the Tor-based DDoS. They had a list of the hidden service addresses that were being targeted by the attack. They just didn't know that this specific address was mine.

As it turns out, this is an open secret among the internet service community: You are not anonymous on Tor !!

πŸ’‘ Threat Modeling

There are plenty of documents that cover how Tor triple-encrypts packets, selects a route using a guard, relay, and exit, and randomizes paths to mix up the network traffic. However, few documents cover the threat model. Who can see your traffic?

πŸ‘€ πŸ‘‰πŸΌ https://www.hackerfactor.com/blog/index.php?/archives/896-Tor-0day-Finding-IP-Addresses.html

#tor #onion #service #zeroday #DDoS #attacks #anonymous #poc #thinkabout
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Billions of devices vulnerable to new 'BLESA' Bluetooth security flaw

New BLESA attack goes after the often ignored Bluetooth reconnection process, unlike previous vulnerabilities, most found in the pairing operation.

Billions of smartphones, tablets, laptops, and IoT devices are using Bluetooth software stacks that are vulnerable to a new security flaw disclosed over the summer.

Named BLESA (Bluetooth Low Energy Spoofing Attack), the vulnerability impacts devices running the Bluetooth Low Energy (BLE) protocol.

BLE is a slimmer version of the original Bluetooth (Classic) standard but designed to conserve battery power while keeping Bluetooth connections alive as long as possible.

Due to its battery-saving features, BLE has been massively adopted over the past decade, becoming a near-ubiquitous technology across almost all battery-powered devices.

As a result of this broad adoption, security researchers and academics have also repeatedly probed BLE for security flaws across the years, often finding major issues.

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/billions-of-devices-vulnerable-to-new-blesa-bluetooth-security-flaw

#BLESA #BLE #bluetooth #security #flaw
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
A Chrome Reverse Proxy Extension has been put up for sale by the threat actor MrMillionaire.

According to the actor the extension turns victim Chrome browsers into fully-functional HTTP/HTTPS proxies, allowing the actors to browse sites as their victims.

πŸ‘€ πŸ‘‰πŸΌ https://twitter.com/shad0wintel/status/1306080368114589698

#chrome #reverse #proxy #extension #MrMillionaire
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
Revealed: Israeli Firm Provided Phone-hacking Services to Saudi Arabia

A representative of Cellebrite, which states that it has complied with the rules, flew to Riyadh from London last November, and at the request of the Saudi prosecutor’s office hacked into a Samsung cellphone

In November of last year, a representative of the Israeli firm Cellebrite landed at King Khaled International Airport in the Saudi capital, Riyadh. The man, a foreign national whose identity is known to TheMarker, Haaretz’s sister publication, arrived on a commercial flight from London to hack into a phone in the possession of the Saudi Justice Ministry. The details of the visit were agreed upon before the hacker landed.

The staff at Cellebrite demanded of the Saudis that their employee be met at the Riyadh airport by a government representative. They insisted that he pass through passport control without his passport being stamped and without an inspection of the electronic equipment that he would have with him, which they demanded would not leave his possession and only which he would use.

From there, it was agreed in advance that the hacker would be immediately taken to an isolated hotel room, where the Saudis committed not to install cameras – and where the job of hacking and copying information from a mobile cellphone was carried out. When the work was completed, Cellebrite’s representative returned to the airport and flew back to London.

Cellebrite is not the only Israeli company to provide hacking or other cybersecurity services to the Saudi kingdom, but it is apparently the only one that does so without any oversight from the Israeli Defense Ministry.

πŸ‘€ πŸ‘‰πŸΌ https://www.haaretz.com/israel-news/tech-news/.premium-revealed-israeli-firm-provided-phone-hacking-services-to-saudi-arabia-1.9161374

πŸ‘€ πŸ‘‰πŸΌ https://twitter.com/haaretzcom/status/1306233686761889798

#israel #hacking #samsung #cellebrite #saudiarabia
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
My stolen credit card details were used 4,500 miles away. I tried to find out how it happened

When cybersecurity reporter Danny Palmer found his card was apparently used on another continent, he set out to discover more.

On a Thursday back in February I was relaxing and watching TV when my evening was interrupted by the ping of a text message from my bank.

"You will shortly receive an SMS to confirm recent activity on your card."

I was puzzled. I certainly hadn't made any strange or unexpected purchases that day, so what was this about? About 30 seconds later, I received my answer in a second text message.

It said my credit card details had been used less than a minute before to try to make a payment of Β£108 at a store with an unfamiliar name.

A quick search online revealed it to be a supermarket in the city of Paramaribo, Suriname – a small country on the north-eastern coast of South America, bordered by Brazil, Guyana and French Guiana. That's quite a long way from my home in London, so I was pretty sure I hadn't popped into that store to pick anything up in the last 60 seconds.

The alert asked me to confirm the transaction by replying with 'Yes' or 'No'. It did cross my mind that perhaps this was a double- or triple-bluff scam and that by responding to an unexpected text message, I would be making a big mistake. Just in case, I chose to phone the bank instead.

They confirmed that yes, someone had attempted to use my card details over 4,500 miles away from London – but the attempted payment was blocked as suspicious, so no money was stolen.

I cancelled my card and ordered a new one as the recommended safety precaution, given someone else had my details. But as a reporter I was left wondering how did this happen?

How was it that my bank details were somehow stolen, passed onto someone on the other side of the world and almost successfully used at what looked to be a small retailer in Suriname?
Credit cards are a solution - and part of the problem

Debit and credit cards are a part of everyday life that we don't think about, but not so long ago they would have felt like a strange concept to those using physical currency to buy things. The first UK credit card was issued in 1966, while the first debit card didn't arrive in the UK until 1987.

Now, there are over 51 million debit cardholders in the UK, accounting for 96% of adults, while over 32 million UK adults have a credit card. According to the trade association UK Finance, total spending on credit and debit cards accounted for over Β£800 billion during 2018, with over 20 billion transactions over the course of the year.

Such is the increased popularity of using card payments – helped by online shopping and the ability to make contactless payments in stores – that it's overtaken cash as the most common form of payment in the UK, and the number of card payments is still growing.

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/my-stolen-credit-card-details-were-used-4500-miles-away-i-tried-to-find-out-how-it-happened

#stolen #creditcard #details #story
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
In China, smart locks are being used to track citizens and enforce lockdowns

Proprietary "smart" devices are an absolute nightmare. If users can't audit the code they don't know what they are doing and the device works for the tech company selling it rather than the user.

πŸ‘€ πŸ‘‰πŸΌ See here:
https://moniotrlab.ccis.neu.edu/wp-content/uploads/2019/09/ren-imc19.pdf

On a really basic level think about the information someone can infer just by looking at data from devices like this:

Your door is opened and locked at 7:30 am everyday and then reopened and unlocked at 6:30 pm but never during the hours in between? Chances are you ....

πŸ‘€ πŸ‘‰πŸΌ https://www.reddit.com/r/privacytoolsIO/comments/its9h7

#smart #locks #thinkabout #pdf
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag
US charges two Russians for stealing $16.8m via cryptocurrency phishing sites

The two hackers stole from hundreds of users of cryptocurrency exchanges Poloniex, Binance, and Gemini.

The US Department of Justice has filed charges today against two Russian nationals for orchestrating a multi-year phishing operation against the users of three cryptocurrency exchanges.

The two suspects stand accused of creating website clones for the Poloniex, Binance, and Gemini cryptocurrency exchanges, luring users on these fake sites, and collecting their account credentials. These phishing operations began around June 2017.

US officials said the Russian duo β€” made up of Danil Potekhin (aka cronuswar) and Dmitrii Karasavidi; residents of Voronezh and Moscow, respectively β€” used the stolen credentials to access victim accounts and steal their Bitcoin (BTC) and Ether (ETH) crypto-assets.

In total, US officials estimated the victims in the hundreds. Court documents cite 313 defrauded Poloniex users, 142 Binance victims, and 42 users at Gemini.

Losses were estimated at $16,876,000.

πŸ‘€ πŸ‘‰πŸΌ (pdf)
https://assets.documentcloud.org/documents/7211805/Potekhin-Superseding-Indictment.pdf

πŸ‘€ πŸ‘‰πŸΌ https://www.zdnet.com/article/us-charges-two-russians-for-stealing-16-8m-via-cryptocurrency-phishing-sites

#Potekhin #cryptocurrency #phishing #russia #usa
πŸ“‘@cRyPtHoN_INFOSEC_DE
πŸ“‘
@cRyPtHoN_INFOSEC_EN
πŸ“‘
@BlackBox_Archiv
πŸ“‘
@NoGoolag