Browsing category

Data Security

7ev3n Ransomware trashes your PC and then demands 13 Bitcoins

A new ransomware has been spotted called  7ev3n that encrypts your data and demands 13 bitcoins to decrypt your files. A 13 bitcoin ransom demand is the largest we have seen to date for this type of infection, but that is only just one of the problems with this ransomware.  In addition to the large ransom […]

Simple Yet Efficient Linux Backdoor Trojan Discovered

Linux. BackDoor.Xunpes trojan lets cyber-crooks take control and execute commands on your Linux machine. Threats to Linux computers are now appearing on a regular basis, and what was once dubbed a “no-virus zone” has started being targeted by malware authors. The latest of such threats is a trojan with backdoor capabilities named Linux.BackDoor.Xunpes, discovered by Dr.Web security […]

JavaScript Backdoor

Casey Smith recently shared his research on twitter, which is to reverse HTTP Shell by using JavaScript. I found it rather interesting and further analyzed this technique. 0x01 Introduction Observing the above screenshot, we’ll learn how to use this technique. Use rundll32.exe to load the JavaScript code in cmd and a HTTP Shell is returned […]

TorMail hack, FBI surgical operation, or dragnet surveillance?

In 2013 the FBI agents seized TorMail, now new information are emerging on the operations. Someone believes it was a surgical ops others accuse Feds of dragnet surveillance. In 2013 the FBI agents seized TorMail, at the time the most popular dark web email services. The US law enforcement agency seized the TorMail database during in concomitants of the […]

FBI May Have Hacked Innocent TorMail Users

Back in 2013, the FBI seized TorMail, one of the most popular dark web email services, and shortly after started to rifle through the server’s contents. At the time, researchers suspected the agency had also deployed a network investigative technique (NIT)—the FBI’s term for a hacking tool—to infect users of the site. Now, confirmation of […]

British Government Has Already Created a Data Encryption Protocol Complete With a Backdoor

GCHQ insists on shooting itself in the foot with backdoored VoIP encryption protocol, developed in-house by CESG. Britain’s intelligence agency, GCHQ (Government Communications Headquarters), has already developed a phone encryption protocol that contains a backdoor, as the government has been recently asking companies to provide. During the past year, both the US and UK governments […]

Alert Users: MSN Main Page Dropping Malware on User PCs

If you visit MSN.com there is a chance your PC has been affected with a malware — Outlook users should also check for it as upon signing out from their email they are redirected to MSN home page. Once again, Microsoft becomes the victim of malicious malvertising, and the culprit behind these misleading ads is […]

Hot Potato exploit mashes old vulns into Windows System ‘sploit

Exploit takes a long time to cook Windows, but gives hackers a menu of evil options. Shmoocon Foxglove Security bod Stephen Breen has strung together dusty unpatched Windows vulnerabilities to gain local system-level access on Windows versions up to 8.1. The unholy zero-day concoction, reported to Microsoft in September and still unpatched, is a reliable […]

A new archive of US voting records appeared on the Dark Web

A new archive containing alleged voting records of millions of US citizens is available on a hidden service on the dark web. Joseph Fox from Motherboard discovered alleged voting records of millions of American citizens on a website in the dark web. The data were published on a website linked to a notorious cybercrime forum, […]

Ukraine Airport’s Computer Networks Infected with Malware

The computer networks installed at the main airport in Kiev, Ukraine, have been identified as containing malware. The discovery was made public by a report from Reuters. The report stated that the IT network of Boryspil International Airport, which is located nearby Kiev, has been infected by malware. As per the report, the IT network […]

Shop online at Asda? Website vuln created account hijack risk

Walmart-owned store patches hole, but it was open for nearly 2 years. Retailer Asda dragged its heels for nearly two years before finally this week tackling a set of security vulnerabilities reported to it by a UK consultant. Asda has acknowledged the flaws – which Paul Moore, who discovered them, argues offer up an account […]

Tinba, a 20KB trojan that scares banks in Singapore and Indonesia

A new variant of the infamous Tinba banking trojan has emerged in the wild and is targeting financial institutions in the Asia Pacific region. Even small threats can scare the giants, this is the case of Tinba, a small malware that continues to create serious problems for financial institutions. Tinba is a popular financial trojan, the fifth version is […]

Here’s how a cheap webcam can be converted into network backdoor

This is how a $30 D-Link webcam can be converted into a backdoor. Researchers at US security firm Vectra Networks have hacked a ‘tiny’ D-Link web camera and demonstrated how it can be abused by cybercriminals and turned into a medium to steal data or for sending additional commands. In other words, they have shown how the […]

New Interesting revelation on the Stuxnet cyber weapon

New interesting revelation about the Stuxnet attack published by The New York Times, a must read for experts. The popular cyber security expert Mikko Hypponen has published an interesting blog post on the Stuxnet malware. Recently The New York Times has published a detailed article on an Israeli test on worm crucial to interfere and […]

How email in transit can be intercepted using DNS hijacking

This article looks at how an attacker can intercept and read emails sent from one email provider to another by performing a DNS MX record hijacking attack. While our research on the state of email delivery securityindicates that this attack is less pervasive than the TLS downgrade attack, it is equally effective at defeating email […]

Hack Like a Pro: How to Hack Like the NSA

Over the years, I have written many articles here on Null Byte chronicling the many the hacks of the NSA, including the recent hack of the Juniper Networks VPN. (By the way, my speculation in that article has proven to be correct. The NSA did embed a backdoor on those devices.) Many readers here have […]

Feds Prod Automakers to Play Nice With Hackers

THE DEPARTMENT OF Transportation and its automotive safety branch, the National Highway Traffic and Safety Administration, are waking up to the threat of hackable vulnerabilities in Internet-connected cars and trucks. Now they’re nudging the auto giants that make those vehicles to wake up, too—starting with a mandate to listen more closely to the security researchers […]