BlackBox (Security) Archiv
4.1K subscribers
183 photos
393 videos
167 files
2.67K links
๐Ÿ‘‰๐Ÿผ Latest viruses and malware threats
๐Ÿ‘‰๐Ÿผ Latest patches, tips and tricks
๐Ÿ‘‰๐Ÿผ Threats to security/privacy/democracy on the Internet

๐Ÿ‘‰๐Ÿผ Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
FBI 2019 Internet Crime Report

A new FBI report on Internet crime highlights the most devastating cybercrime with reported losses exceeding $3.5 billion in 2019.

The FBI based its report on 467,000 complaints by the public to the FBIโ€™s Internet Crime Complaint Center (IC3) in 2019.

SIM swapping is an emerging high-profile crime, the FBI cited in the report. In a SIM swap, a wireless carrier is tricked into switching the SIM linked to the subscriber to the criminalโ€™s SIM. In one case based in San Francisco, the arrest of a SIM swapping group leader led to the seizure of over $18 million, five vehicles, a $900,000 home, and hundreds of thousands of dollars in jewelry, the FBI said in March 2019.

๐Ÿ’ก PDF:
https://pdf.ic3.gov/2019_IC3Report.pdf

๐Ÿ‘‰๐Ÿผ Read more:
https://www.foxnews.com/tech/5-internet-crimes-you-need-to-pay-attention-to

#FBI #report #pdf #internet #crime
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
The Age of Surveillance Capitalism (Unabridged)
Shoshana Zuboff
The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power

The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior.

In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth.

๐Ÿ‘‰๐Ÿผ PDF Reference Material:
https://t.iss.one/BlackBox_Archiv/808

๐Ÿ“ป The Age of #Surveillance #Capitalism #podcast

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
The Age of Surveillance Capitalism - Reference Material.pdf
2.2 MB
The Age of Surveillance Capitalism - The Fight for a Human Future at the New Frontier of Power

PDF with Reference Material

๐Ÿ‘‰๐Ÿผ Podcast:
https://t.iss.one/BlackBox_Archiv/807

#Surveillance #Capitalism #pdf
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Audio
Edward Snowden - Permanent Record

In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it.

๐Ÿ“ป #PermanentRecord #Snowden #podcast

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
The Crypto AG Scandal And The Question Of Swiss Neutrality

On the 11 February 2020, the Washington Post published an extensive article revealing the #CryptoAG Scandal. The article damningly exposes the way in which the #Swiss #encryption company Crypto AG was co-opted by the #CIA for decades. The #spy #agency coerced the companyโ€™s founder into working for them in the 1950s, and later bought out Crypto AG in a secret partnership with the German spy agency the #BND. Throughout this time, faulty encryption machines were sold to governments around the world to improve American #espionage capabilities. This โ€œaudaciousโ€ project lasted well into the 21st century, presumably until the companyโ€™s liquidation in 2018. According to the Washington Post article, โ€œCIA and BND documents indicate that Swiss officials must have known for decades about Cryptoโ€™s ties to the U.S. and German spy services, but intervened only after learning that news organizations were about to expose the arrangement.โ€ It is this revelation which has led various news agencies (including the BBC) to declare that Swiss neutrality has been โ€œshatteredโ€.

The Swiss have long cultivated a policy of neutrality. This concept is ubiquitous in popular culture, from the end of The Sound of Music, to the English phrase โ€œbeing Switzerlandโ€ which is synonymous with neutrality. What impact, (if any), will the implications of Swiss partiality toward the U.S. in the scandal have upon their aura of neutrality?

๐Ÿ‘‰๐Ÿผ Read more:
https://theowp.org/the-crypto-ag-scandal-and-the-question-of-swiss-neutrality/

๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Chinese hacking: 5 major cases of Beijing-linked cyber intrusion

๐Ÿ‘‰๐Ÿผ
https://video.foxnews.com/v/6135425508001#sp=show-clips

#china #hacking #beijing #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
54: NotPetya
NotPetya

This is the story of NotPetya. Which seems to be the first time weโ€™ve seen what a cyber war looks like. In the summer of 2017 Ukraine suffered a serious and catastrophic cyber attack on their whole country. Hear how it went down, what got hit, and who was responsible.

๐Ÿ“ป https://darknetdiaries.com/episode/54/

#darknetdiaries #NotPetya #podcast
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
TikTok star meticulously lays out grains of rice to depict Jeff Bezos' obscene wealth

Jeff Bezos is rich as hell, but if you have trouble understanding just how obscenely wealthy the Amazon founder is, we suggest you visit TikTok.

Entrepreneur and TikTok star Humphrey Yang, a 32-year-old eCommerce consultant and freelancer from Silicon Valley, recently created a striking visual representation of Jeff Bezos' net worth using grains of rice.

๐Ÿ“บ https://mashable.com/article/tiktok-rice-billionaire-jeff-bezos-net-worth-humphrey-yang-/?europe=true

#Bezos #TikTok #Yang #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Hackers are targeting other hackers by infecting their tools with malware

A newly discovered malware campaign suggests that hackers have themselves become the targets of other hackers, who are infecting and repackaging popular hacking tools with malware.

Cybereasonโ€™s Amit Serper found that the attackers in this years-long campaign are taking existing hacking tools โ€” some of which are designed to exfiltrate data from a database through to cracks and product key generators that unlock full versions of trial software โ€” and injecting a powerful remote-access trojan. When the tools are opened, the hackers gain full access to the targetโ€™s computer.

Serper said the attackers are โ€œbaitingโ€ other hackers by posting the repackaged tools on hacking forums.

But itโ€™s not just a case of hackers targeting other hackers, Serper told TechCrunch. These maliciously repackaged tools are not only opening a backdoor to the hackerโ€™s systems, but also any system that the hacker has already breached.

โ€œIf hackers are targeting you or your business and they are using these trojanized tools it means that whoever is hacking the hackers will have access to your assets as well,โ€ Serper said.

๐Ÿ‘‰๐Ÿผ Read more:
https://techcrunch.com/2020/03/09/hacking-the-hackers/

#hacker #hacking #tools #malware
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Law Enforcement Guide To Satanic Cults (1994)

A dated documentary into the oft-overlooked risk of Satanic cults and demonic activity for police and law enforcement officers.

#documentary #video #police #guide #90s
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
โ˜ฃ๏ธ CoronaVirus-Outbreak-App โ˜ฃ๏ธ

The main purpose of this application was to help people have all the stats about CoronaVirus at a glance, on their android smartphones.

This application has all the premium features activated, including an ad-free experience, so you can fully enjoy it.

โ—๏ธPlease Note:
Although the app is linked to GitHub, it is not FOSS.

https://github.com/TheWCKD/CoronaVirus-Outbreak-App/blob/master/README.md

๐Ÿ‘‰๐Ÿผ Download from MEGA.NZ (v1.1.1)
๐Ÿ‘‰๐Ÿผ Download from GOOGLE DRIVE (v1.1.1)

#Corona #app
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Forwarded from Privacy Today
โš ๏ธ PSA: To all German users, starting from tomorrow (2020-03-22), Telekom and Telefonica providers will hand over your phone's movement data to the government and other authorities. This is happening behind our backs using the COVID-19 situation as a cover-up! Telekom has already transferred 5GB of movement data to a Government institute (RKI) on Tuesday.

Click on the following link to start the opt-out process if you're a customer of Telekom:
๐Ÿ”— https://www.optout-service.telekom-dienste.de/public/anmeldung.jsp

Telekom claims to anonymize mobile data, which is then passed on to the Telekom subsidiary Motionlogic GmbH in aggregate form. They are also grabbing data related to the age group (by 10 year increments), gender and the first 4 digits of your postcode. After inputting your details, you will receive a 4-digit code via SMS.

Click on the following link to start the opt-out process if you're a customer of Telefonica:
๐Ÿ”— https://www.telefonica.de/dap/selbst-entscheiden

Telefonica is also claiming the same as Telekom, as in they anonymize the data and will only use it for analysis afterwards. The procedure is the same as above, you enter your details and receive a one-time password via SMS.

If you're a Vodafone user, you probably need to go into the app ๐Ÿ“ฑ and disable everything. They have about 20 telemetry functions. Web login doesn't work with Vodafone prepaid SIMs, unless you manually request a password for it from their customer service.

Make sure to opt-out NOW before this goes into effect tomorrow!

--- Austria ---
Same phenomenon is also happening right now in Austria. The government currently receives - "anonymously" - the movement data of its customers from the domestic mobile operator A1. A1 claims its approach is GDPR-compliant. A1 also emphasized that the data could not be used to draw any conclusions about the individual cell phone user and that each cell phone is assigned a number that is automatically generated randomly for tracking. All these numbers are freshly assigned every 24 hours.

--- Italy ---
Italy, the European country hit worst by COVID-19 until now, has also requested aggregated data from the providers to track the movement of people, in order to try and contain the spread of the virus. The vice president of the region of Lombardy said more than 40% of people have moved further than 200-300 metres from their houses, based on data provided by the telecom providers.

--- Other countries ---
Following the grave situation of COVID-19, other countries are also expected to take the same steps related to the aggregation of customer movement data.

โ›”๏ธ While public health might be more important than movement tracking in the current situation, this can set dangerous precedent and open the way for these institutions to normalize similar behaviour and process these data points in the future for malicious purposes.

๐Ÿค” What do you as a citizen think? Do you trust these institutions to be benevolent with the data/power they possess?

โ„น๏ธ Sources:
https://orf.at/stories/3158211/
https://netzpolitik.org/2020/unverhofftes-datengeschenk/
https://www.borsaitaliana.it/borsa/notizie/radiocor/economia/dettaglio/coronavirus-fsala-lombardia-40-persone-esce-da-casa-non-va-bene-nRC_17032020_1836_602124871.html

๐Ÿ›ก
Snowden warns: The surveillance states weโ€™re creating now will outlast the coronavirus

Temporary security measures can soon become permanent

Governments around the world are using high-tech surveillance measures to combat the coronavirus outbreak. But are they worth it?

Edward Snowden doesnโ€™t think so.

The former CIA contractor, whose leaks exposed the scale of spying programs in the US, warns that once this tech is taken out of the box, it will be hard to put it back.

โ€œWhen we see emergency measures passed, particularly today, they tend to be sticky,โ€ Snowden said in an interview with the Copenhagen International Documentary Film Festival.

"The emergency tends to be expanded. Then the authorities become comfortable with some new power. They start to like it."

Supporters of the draconian measures argue that normal rules are not enough during a pandemic and that the long-term risks can be addressed once the outbreak is contained. But a brief suspension of civil liberties can quickly be extended.

๐Ÿ‘‰๐Ÿผ Read more:
https://thenextweb.com/neural/2020/03/25/snowden-warns-the-surveillance-states-were-creating-now-will-outlast-the-coronavirus/

#surveillance #coronavirus
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Zoom iOS App Sends Data to Facebook Even if You Donโ€™t Have a Facebook Account

Zoom's privacy policy isn't explicit about the data transfer to Facebook at all.

As people work and socialize from home, video conferencing software Zoom has exploded in popularity. What the company and its privacy policy don't make clear is that the iOS version of the Zoom app is sending some analytics data to Facebook, even if Zoom users don't have a Facebook account, according to a Motherboard analysis of the app.

This sort of data transfer is not uncommon, especially for Facebook; plenty of apps use Facebook's software development kits (SDK) as a means to implement features into their apps more easily, which also has the effect of sending information to Facebook. But Zoom users may not be aware it is happening, nor understand that when they use one product, they may be providing data to another service altogether.

"That's shocking. There is nothing in the privacy policy that addresses that," Pat Walshe, an activist from Privacy Matters who has analyzed Zoom's privacy policy, said in a Twitter direct message.

Upon downloading and opening the app, Zoom connects to Facebook's Graph API, according to Motherboard's analysis of the app's network activity. The Graph API is the main way developers get data in or out of Facebook.

๐Ÿ‘‰๐Ÿผ Read more:
https://www.vice.com/en_us/article/k7e599/zoom-ios-app-sends-data-to-facebook-even-if-you-dont-have-a-facebook-account

#zoom #iOS #privacy #Facebook #DeleteFacebook
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Corona crisis: EU evaluates contact blocks with mobile phone data

COVID-19 - Mobile phone location datas - Q&A

https://audiovisual.ec.europa.eu/en/video/I-187513

#coronavirus #privacy #eu
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
42 million Iranian โ€œTelegramโ€ user IDs and phone numbers leaked online

42 million user IDs and phone numbers for a third-party version of Telegram were exposed online without a password. The accounts belong to users in Iran, where the official Telegram app is blocked.

42 million records from a third-party version of messaging app Telegram used in Iran was exposed on the web without any authentication required to access it. Comparitech worked with security researcher Bob Diachenko to uncover and report the exposure, which included usernames and phone numbers, among other data.

The data was posted by a group called โ€œHunting systemโ€ (translated from Farsi) on an Elasticsearch cluster that required no password nor any other authentication to access. It was removed after Diachenko reported the incident to the hosting provider on March 25.

Telegram says the data came from an unofficial โ€œforkโ€ of Telegram, a version of the app unaffiliated with the company. Telegram is an open-source app, allowing third parties to make their own versions of it. Because the official Telegram app is frequently blocked in Iran, many users flock to unofficial versions.

A Telegram spokesperson told Comparitech, โ€œWe can confirm that the data seems to have originated from third-party forks extracting user contacts. Unfortunately, despite our warnings, people in Iran are still using unverified apps. Telegram apps are open source, so itโ€™s important to use our official apps that support verifiable builds.โ€

๐Ÿ‘‰๐Ÿผ Read more:
https://www.comparitech.com/blog/information-security/iranian-telegram-accounts-leaked/

#leak #Iran #telegram
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Mozilla shares telemetry data on the corona crisis

The Firefox manufacturer wants to support research into the coronavirus pandemic with this

The browser manufacturer Mozilla has recorded a significant increase in the number of its daily users of Firefox on the desktop in the past days and weeks. The company attributes this increase to the corona crisis and the associated measures for so-called social or physical distancing. Mozilla is therefore now releasing this data for research, as the company announces in its data blog.

๐Ÿ‘‰๐Ÿผ Read more:
https://blog.mozilla.org/data/2020/03/30/opening-data-to-understand-social-distancing/

https://www.golem.de/news/social-distancing-mozilla-teilt-telemetrie-daten-zur-coronakrise-2003-147610.html

#mozilla #firefox #browser #telemetry #coronavirus
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
โ€˜Dictatorships often start in the face of a threatโ€™: UN privacy chief warns against long-lasting theft of freedoms amid coronavirus surveillance

Strict surveillance measures adopted to monitor citizens during coronavirus lockdowns could result in the long-lasting theft of personal freedoms, the United Nationsโ€™ privacy chief has warned.

โ€œDictatorships and authoritarian societies often start in the face of a threat,โ€ Joseph Cannataci, the UN special rapporteur on the right to privacy told the Thomson Reuters Foundation.

โ€œThat is why it is important to be vigilant today and not give away all our freedomsโ€.

The coronavirus pandemic has led governments to declare themselves essentially on a war footing โ€“ with many politicians referencing an โ€œinvisibleโ€ enemy or attacker.

At the advice of health experts, even countries regarded as the worldโ€™s most liberal democracies have enforced quarantine measures thought unthinkable mere weeks ago.

๐Ÿ‘‰๐Ÿฝ Read more:
https://www.independent.co.uk/news/world/coronavirus-lockdown-surveillance-tracking-dictatorship-authoritarian-united-nations-privacy-a9438561.html

#surveillance #dictatorship #coronavirus #thinkabout #why
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN
Media is too big
VIEW IN TELEGRAM
Chaos Colloquium #1 - Dr. Roland van Rijswijk-Deij on DNS privacy and security

Post-Snowden, privacy became a prime focus of the IETF, and let to the improvement of a number of Internet protocols. Among these protocols is the Domain Name System, which maps human readable names to machine readable addresses.

The original DNS protocol communicates mostly in plain text over UDP, making it highly susceptible to eavesdropping. Since knowing what names a person queries for is highly revealing about their Internet surfing behaviour, the IETF decided to address the privacy shortcomings of the DNS. Initially, this led to the standardisation of DNS-over-TLS (DoT), and more recently, the standardisation of DNS-over-HTTPS (DoH).

https://media.ccc.de/v/chaoscolloquium-1-dns-privacy-security

#ccc #Colloquium #DNS #privacy #security #video
๐Ÿ“ก@cRyPtHoN_INFOSEC_DE
๐Ÿ“ก@cRyPtHoN_INFOSEC_EN
๐Ÿ“ก@BlackBox_Archiv
๐Ÿ“ก@FLOSSb0xIN