BlackBox (Security) Archiv
3.93K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
FTC requests Facebook sell WhatsApp and Instagram in major antitrust case

The US Federal Trade Commission has re-filed its complaint against Facebook, arguing that the company should be broken up and forced to sell Instagram and WhatsApp.

The revised complaint argues that Facebook has a monopoly over social networking in the US and argues that Facebook has looked to make it difficult for other companies to compete.

The complaint is partly redacted, and the FTCโ€™s filing asks that it is sealed for 10 days.

The new case comes amid mounting scrutiny over the size and power of Facebookโ€™s empire, and the way that it has bought up competitors as they have grown.

The case makes reference to an email from Mark Zuckerberg, sent in 2008, in which he said โ€œit is better to buy than competeโ€. The FTCโ€™s lawyers argue that Facebook has acted in accordance with that strategy, tracking its rivals and buying them when they become big enough to be threats.

https://www.independent.co.uk/life-style/gadgets-and-tech/facebook-ftc-whatsapp-instagram-antitrust-b1905429.html

#ftc #facebook #whatsapp #instagram #antitrust
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
More than $90 million in cryptocurrency stolen after a top Japanese exchange is hacked

Japanese cryptocurrency exchange Liquid said Thursday it has been hit by a cyberattack that saw hackers make off with a reported $97 million worth of digital coins.

Liquid said some of its digital currency wallets had been "compromised," and that hackers were transferring the assets to four different wallets.

"We are currently investigating and will provide regular updates," Liquid tweeted. "In the meantime deposits and withdrawals will be suspended."

Liquid did not provide an estimate for the loss. It says it is regulated by Japan's Financial Services Agency. The watchdog was not immediately available for comment when contacted by CNBC.

Elliptic, a blockchain analytics company, said its analysis showed that about $97 million in cryptocurrencies have been obtained by the hackers.

Of the total haul, $45 million in tokens were being converted to ethereum through decentralized exchanges โ€” blockchain-based platforms that require no intermediaries โ€” like Uniswap and SushiSwap, Elliptic said.

"This enables the hacker to avoid having these assets frozen โ€” as is possible with many Ethereum tokens," Elliptic said in a blog post.

Liquid ranks among the top 20 crypto exchanges globally by daily trading volumes, processing more than $133 million of transactions in the last 24 hours, according to CoinMarketCap data.

https://www.cnbc.com/2021/08/19/liquid-cryptocurrency-exchange-hack.html

#liquid #cryptocurrency #exchange #hack #cyberattack
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
Lake County commissioners order takedown of secret surveillance cameras

Flock Safety installed about 100 cameras in new pilot program to fight crime

Surveillance cameras are being taken down across Lake County after commissioners say they didnโ€™t know about them in the first place.

According to the Lake County Sherriffโ€™s Office, surveillance cameras were installed around the county in July under a new pilot program to help fight crime, but county commissioners said the cameras have to go.

https://www.clickorlando.com/news/local/2021/08/12/shocking-violation-of-procedure-lake-county-commissioners-order-takedown-of-traffic-surveillance-cameras/

#usa #traffic #surveillance #cameras #video
๐ŸŽฅ@cRyPtHoN_INFOSEC_FR
๐ŸŽฅ
@cRyPtHoN_INFOSEC_EN
๐ŸŽฅ
@cRyPtHoN_INFOSEC_DE
๐ŸŽฅ
@BlackBox_Archiv
AT&T denies data breach after hacker auctions 70 million user database

AT&T says that they did not suffer a data breach after a well-known threat actor claimed to be selling a database containing the personal information of 70 million customers.

The threat actor, known as ShinyHunters, began selling this database yesterday on a hacking forum with a starting price of $200,000 and incremental offers of $30,000. The hacker states that they are willing to sell it immediately for $1 million.

From the samples shared by the threat actor, the database contains customers' names, addresses, phone numbers, Social Security numbers, and date of birth.

A security researcher who wishes to remain anonymous told BleepingComputer that two of the four people in the samples were confirmed to have accounts on att.com.

Other than these few details, not much is known about the database, how it was acquired, and whether it is authentic.

However, ShinyHunters is a well-known threat actor with a long history of compromising websites and developer repositories to steal credentials or API keys. This authentication is then used to steal databases, which they then sell directly to other threat actors or utilize a middle-man data breach seller.

In many cases, when a database is not sold, ShinyHunters will release it for free on hacker forums.

In the past, ShinyHunters has breached numerous companies, including Wattpad, Tokopedia, Microsoft's GitHub account, BigBasket, Nitro PDF, Pixlr, TeeSpring, Promo.com, Mathway, and many more.

https://www.bleepingcomputer.com/news/security/atandt-denies-data-breach-after-hacker-auctions-70-million-user-database/

#breach #atandt #ShinyHunters
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
A Facebook hacker beat my 2FA, bricked my Oculus Quest, and hit the company credit card

If you havenโ€™t been following the action on Twitter, you may or may not have noticed I vanished from Facebook and Instagram. That was just the beginning. In this post Iโ€™ll run you through the timeline, share what Iโ€™ve pieced together, and post updates as they unfold. Let me encourage you to follow @CodeWritePlay or @Mechatodzilla on Twitter where Iโ€™ll alert you when those updates occur.

The timeline

8/19, shortly before 3:30 AM โ€“ While I slept like I was dead after staying up too late watching Hulu, my Facebook account was disabled for violating community guidelines.....

https://codewriteplay.com/2021/08/20/a-facebook-hacker-beat-my-2fa-bricked-my-oculus-quest-and-hit-the-company-credit-card/

#codewriteplay #hacker #facebook
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
GNU Privacy Assistant: PGP (Part I)

We generate our first open PGP keys and encrypt text using a wonderful GUI tool:
GNU Privacy Assistant (on Linux). We describe the public/private key exchange encryption/decryption process, and create our first encrypted text message. Briefly talking about potential issues with all in one encryption + communication programs and how PGP can help solve this.

The benefits of a compartmentalized, offline encryption setup are discussed as we learn to generate a key and encrypt a message in GNU Privacy Assistant.

I think you will enjoy the all in one nature of this setup.

https://devtube.dev-wiki.de/videos/watch/4d106a61-a850-4d42-b2ff-34f14b6b16cd

#pgp #encryption #gnu #PrivacyAssistant #linux #tool #video #guide
๐ŸŽฅ@cRyPtHoN_INFOSEC_FR
๐ŸŽฅ
@cRyPtHoN_INFOSEC_EN
๐ŸŽฅ
@cRyPtHoN_INFOSEC_DE
๐ŸŽฅ
@BlackBox_Archiv
Jumpskip - Watch movies on Netflix without the jumpscares

Jumpskip is a Chrome Extension for Netflix that helps you watch movies without being scared by jumpscares. Skip, mute, get a warning when jumpscares are about to happen, view all the jumpscare timestamps, and much more.

๐Ÿ‘‰๐Ÿฝ https://chrome.google.com/webstore/detail/jumpskip-skip-jumpscares/fbemiaecodgpghdfegmdcikjkobdghab

https://github.com/alyssaxuu/jumpskip

#jumpskip #netflix #chrome #extension
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Office 365 audit logging

Itโ€™s important to enable audit logging for o365 even if you are not monitoring them actively. Atleast if you get hacked thereโ€™s logging to investigate :). The audit log is not always enabled by default, it seems to rely on license levels. However there are some important things to take into consideration.

You can enable the unified audit log and be done. However there are some things to take into consideration. Especially when it comes to mailbox operations and logging. Office 365 audit logging can be tricky to manage. Thereโ€™s some things you need to be wary of when relying on the o365 logging. Essentially we need to make sure Unified Audit log is enabled and the mailbox audit settings are set correctly.

https://nitter.pussthecat.org/rikvduijn/status/1428628157456949253#m

https://zolder.io/office-365-audit-logging/

#office #audit #logging
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Apple Exec: โ€˜We Are The Greatest Platform For Distributing Child Pornโ€™

Apple fraud executive Eric Friedman told colleague Herve Sibert that Apple is the greatest platform for distributing child pornography. The comment sheds light on why Apple is now pursing a controversial program and automating checks for child porn on customersโ€™ phones and in their messages.

According to a rather thin LinkedIn profile, Eric Friedman is a senior engineering manager at Apple. Security websites, however, list his actual role as โ€œhead of Appleโ€™s Fraud Engineering Algorithms and Risk unit,โ€ also known as FEAR. Sibert is Appleโ€™s security and fraud engineering manager, according to his LinkedIn profile.

Friedman made the claim in a February 2020 text message conversation revealed in discovery for the Apple-Epic trial over whether Apple can demand app developers use its payment services, among other things. The Verge has published an extensive list of the most interesting reveals from court discovery.

Friedman was messaging using Appleโ€™s iMessage platform, which is end-to-end encrypted for privacy. That privacy, however, works for both positive and negative uses.

https://www.forbes.com/sites/johnkoetsier/2021/08/19/apple-exec-we-are-the-greatest-platform-for-distributing-child-porn/

#usa #apple #iphones #childabuse #surveillance
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Apple and Google ordered by Russia's media authority to take down the app of Vladimir Putin's biggest opponent

Russia's media authority Roskomnadzor has ordered Apple and Alphabet, Google's parent company, to take the app of the biggest opponent of Russian President Vladimir Putin off of their platforms, according to a report.

Roskomnadzor said the app dedicated to publishing stories about Alexei Navalny should be taken off of Google and Apple's app stores because Russian courts have labeled Navalny's anti-corruption foundation as extremist, the Russian news agency Interfax reported on Friday.

Neither Apple or Alphabet were immediately available for comment Saturday about the request.

The development marks the latest attempt by the Russian government to silence Navalny. Navalny is currently in a Russian prison after returning to the country from Germany, where he recovered from being poisoned with the Soviet-era nerve agent Novichok during a flight within Russia last August. The Russian government says he is guilty of embezzlement.

Putin and the Russian government's treatment of Navalny continues to draw criticism from abroad. During a Friday meeting with Putin, German Chancellor Angela Merkel called Navalny's imprisonment unacceptable and called for his release.

The team of US President Joe Biden has warned Russia of "consequences" if Navalny dies while in custody.

https://www.businessinsider.com/russia-media-authority-orders-apple-google-take-down-navalny-app-2021-8

#usa #russia #putin #biden #navalny #roskomnadzor #apple #google #appstore #takedown
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Virtual machines with PCI passthrough on Ubuntu 20.04, straightforward guide for gaming on a virtual machine

Preamble

The direct way to a PCI passthrough virtual machines on Ubuntu 20.04 LTS. I try limit changes of the host operating system to a minimum, but provide enough details, that even Linux rookies are able to participate.

The final system will run Xubuntu 20.04 as host operating system(OS), and Windows 10 2004 as guest OS. Gaming is the main use-case of the guest system.

Unfortunately, the setup process can be pretty complex. It consists of fixed base settings, some variable settings and several optional (mostly performance) settings. In order to sustain readability of this post, and because I aim to use the virtual machine for gaming only, I minimized the variable parts for latency optimization. The variable topics itself are linked in articles โ€“ I hope this makes sense. ๐Ÿ™‚

๐Ÿ’กAbout this guide

This guide targets Ubuntu 20.04 and is based on my former guides for Ubuntu 18.04 and 16.04 host systems.

However, this guide should be also applicable to Pop!_OS 19.04 and newer. If you wish to proceed with Pop!_OS as host system you can do so, just look out for my colorful Pop!_OS labels.

https://mathiashueber.com/pci-passthrough-ubuntu-2004-virtual-machine/

#virtual #gaming #ubuntu #guide
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
PAM Duress - a module used to allow someone pressed to give a password under coersion to provide a password that grants access but in the background runs scripts to clean up sensitive data

The PAM Duress is a module designed to allow users to generate 'duress' passwords that when used in place of their normal password will execute abritrary scripts.

This functionality could be used to allow someone pressed to give a password under coersion to provide a password that grants access but in the background runs scripts to clean up sensitive data, close connections to other networks to limit lateral movement, and/or to send off a notifcation or alert (potentially one with detailed information like location, visible wifi hotspots, a picture from the camera, a link to a stream from the microphone, etc). You could even spawn a process to remove the pam_duress module so the threat actor won't be able to see if the duress module was available.

https://github.com/nuvious/pam-duress

#pam #duress #tool
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Data Protection Laws of the World

Compare data protection laws around the world

https://www.dlapiperdataprotection.com/index.html

#dataprotection #worldwide
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
You Can Gain Admin Privileges to Any Windows Machine by Plugging in a Razer Mouse

Is it an interesting security hack, or a PSA to keep your computer safe? (It's both.)

Not all users are equal in Windows. Without administrator access, you can use the computer, but you arenโ€™t allowed to install certain apps or perform commands, and youโ€™re generally blocked from full control of the machine. But right now, you can grant yourself SYSTEM privileges on any Windows 10 machine simply by plugging in a Razer keyboard or mouse. That seems... bad.

Usually, different โ€œuser rightsโ€ are a good thing for Windows. It protects your system from people who would abuse those privileges, either nefariously or not. When you have adminโ€”or SYSTEMโ€”privileges, you are in total control over Windows, so it can be dangerous to give that power to just anyone.

The idea that plugging in the right mouse could give you total control over a computer sounds more unrealistic than a TV hacker, but itโ€™s true. When you plug in one of these Razer peripherals, Windows will automatically download Razer Synapse, the software that controls certain settings for your mouse or keyboard. Said Razer software has SYSTEM privileges, since it launches from a Windows process with SYSTEM privileges.

https://lifehacker.com/you-can-gain-admin-privileges-to-any-windows-machine-by-1847537634

#razer #mouse #windows #vulnerability
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
supplemental_information_geofence_warrants_united_states.pdf
177.9 KB
US authorities want more and more location data from Google

The cell phone in your pocket often leaves a rich data trail, including its location. U.S. investigative agencies are asking for more and more of this data to track down possible suspects who were in a particular place at a particular time. Now Google has published figures for the first time.

https://services.google.com/fh/files/misc/supplemental_information_geofence_warrants_united_states.pdf

#google #usa #geofence #warrants #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Media is too big
VIEW IN TELEGRAM
Razer Mice + Microsoft Windows = Privilege Escalation - ThreatWire

Razer mice plus a windows machine can give you admin privileges, contact tracing data is exposed in a data leak, and a t-mobile hack followup - yes, itโ€™s real! All that coming up now on ThreatWire.

https://www.youtube.com/watch?v=NA1ocWiAMVg

#threatwire #hak5 #video
๐ŸŽฅ@cRyPtHoN_INFOSEC_FR
๐ŸŽฅ
@cRyPtHoN_INFOSEC_EN
๐ŸŽฅ
@cRyPtHoN_INFOSEC_DE
๐ŸŽฅ
@BlackBox_Archiv
Ransomware gang's script shows exactly the files they're after

A PowerShell script used by the Pysa ransomware operation gives us a sneak peek at the types of data they attempt to steal during a cyberattack.

When ransomware gangs compromise a network, they usually start with limited access to a single device.

They then use various tools and exploits to steal other credentials used on the Windows domain or gain elevated privileges on different devices.

Once they gain access to a Windows domain controller, they search for and steal data on the network before encrypting devices.

The threat actors use this stolen data in two ways.

The first is to generate a ransom demand based on company revenue and whether they have insurance policies. The second is to scare the victims into paying a ransom because the gang will leak the data.

https://www.bleepingcomputer.com/news/security/ransomware-gangs-script-shows-exactly-the-files-theyre-after/

#ransomware #pysa
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
LibreTranslator

LibreTranslater a translator based on LibreTranslate

๐Ÿ’ก Features:
-
translate your text into up to 16 languages
- 5 different themes
- share translation easily from the app
- completely open source
- more coming...

https://f-droid.org/en/packages/de.beowulf.libretranslater/

#translator #apk #LibreTranslate #fdroid
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
Popular IPTV Service and Android Application Offline

Germany, August 23, 2021 โ€“
The Alliance for Creativity and Entertainment (ACE), the worldโ€™s leading coalition dedicated to protecting the dynamic legal marketplace and reducing digital piracy, today announced it has successfully taken down both Iconic Streams, a popular IPTV service and Fillelinked, an Android app used to sideload applications.

Iconic Streams offered over 3,500 channels, with a specific focus on premium sports channels. After successful outreach and action executed by ACE with the serviceโ€™s operator in Dresden, the service has not been available to consumers since June.

Once a popular bulk downloader tool for Amazon Fire TV and Android devices, the Filelinked app was used to sideload applications. More specifically, users could install pirate applications on their Android devices via unofficial sources. This service was popular in both the US and in Europe, running operations out of Freising.

All Iconic Streams domains and all domains related to the Filelinked app have now been transferred to ACE and are redirecting to the Watch Legally section on the ACE website.

https://www.alliance4creativity.com/news/ace-actions-successfully-shut-down-iconic-streams-and-filelinked/

#iptv #ace #takedown #filelinked #IconicStreams #germany
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv
OnlyFans Drops Planned Porn Ban, Will Continue to Allow Sexually Explicit Content

OnlyFans said it has dropped plans to ban pornography from its service, less than a week after the U.K. content-creator subscription site had announced the change citing the need to comply with policies of banking partners.

On Wednesday, the company said it โ€œsecured assurances necessary to support our diverse creator community,โ€ suggesting that it has agreements with banks to pay OnlyFansโ€™ content creators, including those who share sexually explicit material.

โ€œThank you to everyone for making your voices heard. We have secured assurances necessary to support our diverse creator community and have suspended the planned October 1 policy change,โ€ the company said in a tweet Wednesday.

โ€œOnlyFans stands for inclusion and we will continue to provide a home for all creators,โ€ the company said.

So was this all much ado about nothing?

OnlyFans may have been able to resolve its conflict with banks โ€” some of which had refused to do business with the site โ€” by going public with the issue. OnlyFans founder and CEO Tim Stokely put the blame for the porn ban on banks in an interview with the Financial Times published Aug. 24, saying that banks including JP Morgan Chase, Bank of New York Mellon and the U.K.โ€™s Metro Bank had cut off OnlyFansโ€™ ability to pay creators.

https://variety.com/2021/digital/news/onlyfans-drops-porn-ban-sexually-explicit-policy-1235048705/

https://nitter.pussthecat.org/onlyfans/status/1430499277302816773

#onlyfans #porn #ban
๐Ÿ“ก@cRyPtHoN_INFOSEC_FR
๐Ÿ“ก
@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก
@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก
@BlackBox_Archiv