• chevron_right

      Mass Ransomware Attack

      news.movim.eu / Schneier · Thursday, 23 March, 2023 - 02:56

    A vulnerability in a popular data transfer tool has resulted in a mass ransomware attack :

    TechCrunch has learned of dozens of organizations that used the affected GoAnywhere file transfer software at the time of the ransomware attack, suggesting more victims are likely to come forward.

    However, while the number of victims of the mass-hack is widening, the known impact is murky at best.

    Since the attack in late January or early February—the exact date is not known—Clop has disclosed less than half of the 130 organizations it claimed to have compromised via GoAnywhere, a system that can be hosted in the cloud or on an organization’s network that allows companies to securely transfer huge sets of data and other large files.

    • chevron_right

      Hackers drain bitcoin ATMs of $1.5 million by exploiting 0-day bug

      news.movim.eu / ArsTechnica · Tuesday, 21 March, 2023 - 20:03 · 1 minute

    A BATM sold by General Bytes.

    Enlarge / A BATM sold by General Bytes. (credit: General Bytes)

    Hackers drained millions of dollars in digital coins from cryptocurrency ATMs by exploiting a zero-day vulnerability, leaving customers on the hook for losses that can’t be reversed, the kiosk manufacturer has revealed.

    The heist targeted ATMs sold by General Bytes, a company with multiple locations throughout the world. These BATMs, short for bitcoin ATMs, can be set up in convenience stores and other businesses to allow people to exchange bitcoin for other currencies and vice versa. Customers connect the BATMs to a crypto application server (CAS) that they can manage or, until now, that General Bytes could manage for them. For reasons that aren’t entirely clear, the BATMs offer an option that allows customers to upload videos from the terminal to the CAS using a mechanism known as the master server interface.

    Going, going, gone

    Over the weekend, General Bytes revealed that more than $1.5 million worth of bitcoin had been drained from CASes operated by the company and by customers. To pull off the heist, an unknown threat actor exploited a previously unknown vulnerability that allowed it to use this interface to upload and execute a malicious Java application. The actor then drained various hot wallets of about 56 BTC, worth roughly $1.5 million. General Bytes patched the vulnerability 15 hours after learning of it, but due to the way cryptocurrencies work, the losses were unrecoverable.

    Read 7 remaining paragraphs | Comments

    • chevron_right

      Hacking the JFK Airport Taxi Dispatch System

      news.movim.eu / Schneier · Wednesday, 21 December, 2022 - 19:06

    Two men have been convicted of hacking the taxi dispatch system at the JFK airport. This enabled them to reorder the taxis on the list; they charged taxi drivers $10 to cut the line.

    • chevron_right

      Sirius XM Software Vulnerability

      news.movim.eu / Schneier · Thursday, 1 December, 2022 - 15:10

    This is new :

    Newly revealed research shows that a number of major car brands, including Honda, Nissan, Infiniti, and Acura, were affected by a previously undisclosed security bug that would have allowed a savvy hacker to hijack vehicles and steal user data. According to researchers, the bug was in the car’s Sirius XM telematics infrastructure and would have allowed a hacker to remotely locate a vehicle, unlock and start it, flash the lights, honk the horn, pop the trunk, and access sensitive customer info like the owner’s name, phone number, address, and vehicle details.

    Cars are just computers with four wheels and an engine. It’s no surprise that the software is vulnerable, and that everything is connected.

    • chevron_right

      Jabber/XMPP Hack Night

      pubsub.movim.eu / berlin-xmpp-meetup · Tuesday, 8 November, 2022 - 07:57

    Jabber/XMPP Hack Night

    We will hack on Jabber/XMPP software, mainly on Dino, Kaidan, Libervia, and sms4you. Join us and hack on your favourite Jabber/XMPP project!

    When? Wednesday, 2022-11-09 18:00 CEST (always 2ⁿᵈ Wednesday of every month)

    Where? In xHain hack+makespace, Grünberger Str. 16, 10243 Berlin

    No live stream and no recording this time, sorry.

    See you there or in our virtual room xmpp:berlin-meetup@conference.conversations.im?join

    #jabber #xmpp #community #xhain #freesoftware #berlin #meetup #federation #dino #kaidan #libervia #sms4you #hacking #hacknight

    • chevron_right

      Relay Attack against Teslas

      news.movim.eu / Schneier · Thursday, 15 September, 2022 - 15:28 · 1 minute

    Nice work :

    Radio relay attacks are technically complicated to execute, but conceptually easy to understand: attackers simply extend the range of your existing key using what is essentially a high-tech walkie-talkie. One thief stands near you while you’re in the grocery store, intercepting your key’s transmitted signal with a radio transceiver. Another stands near your car, with another transceiver, taking the signal from their friend and passing it on to the car. Since the car and the key can now talk, through the thieves’ range extenders, the car has no reason to suspect the key isn’t inside—and fires right up.

    But Tesla’s credit card keys, like many digital keys stored in cell phones , don’t work via radio. Instead, they rely on a different protocol called Near Field Communication or NFC. Those keys had previously been seen as more secure, since their range is so limited and their handshakes with cars are more complex.

    Now, researchers seem to have cracked the code . By reverse-engineering the communications between a Tesla Model Y and its credit card key, they were able to properly execute a range-extending relay attack against the crossover. While this specific use case focuses on Tesla, it’s a proof of concept—NFC handshakes can, and eventually will, be reverse-engineered.

    • chevron_right

      High-School Graduation Prank Hack

      news.movim.eu / Schneier · Wednesday, 14 September, 2022 - 01:34 · 1 minute

    This is a fun story, detailing the hack a group of high school students perpetrated against an Illinois school district, hacking 500 screens across a bunch of schools.

    During the process, the group broke into the school’s IT systems; repurposed software used to monitor students’ computers; discovered a new vulnerability (and reported it ); wrote their own scripts; secretly tested their system at night; and managed to avoid detection in the school’s network. Many of the techniques were not sophisticated, but they were pretty much all illegal .

    It has a happy ending: no one was prosecuted.

    A spokesperson for the D214 school district tells WIRED they can confirm the events in Duong’s blog post happened. They say the district does not condone hacking and the “incident highlights the importance of the extensive cybersecurity learning opportunities the District offers to students.”

    “The District views this incident as a penetration test, and the students involved presented the data in a professional manner,” the spokesperson says, adding that its tech team has made changes to avoid anything similar happening again in the future.

    The school also invited the students to a debrief, asking them to explain what they had done. “We were kind of scared at the idea of doing the debrief because we have to join a Zoom call, potentially with personally identifiable information,” Duong says. Eventually, he decided to use his real name, while other members created anonymous accounts. During the call, Duong says, they talked through the hack and he provided more details on ways the school could secure its system.

    EDITED TO ADD (9/13): Here’s Minh Duong’s Defcon slides . You can see the table of contents of their report on page 59, and the school’s response on page 60.

    • chevron_right

      Jabber/XMPP Hack Night

      pubsub.movim.eu / berlin-xmpp-meetup · Sunday, 11 September, 2022 - 21:33 edit

    Jabber/XMPP Hack Night

    We will hack on Jabber/XMPP software, mainly on Dino, Kaidan, and sms4you. Join us and hack on your favourite Jabber/XMPP project!

    When? Wednesday, 2022-09-14 18:00 CEST (always 2ⁿᵈ Wednesday of every month)

    Where? In xHain hack+makespace, Grünberger Str. 16, 10243 Berlin

    No live stream and no recording this time, sorry.

    See you there or in our virtual room xmpp:berlin-meetup@conference.conversations.im?join

    Btw. the hack night takes place during the Berlin volunteer days.

    #jabber #xmpp #community #xhain #freesoftware #berlin #meetup #federation #dino #kaidan #sms4you #hacking #hacknight #freiwilligentage #gemeinsamesache

    • chevron_right

      Russia Creates Malware False-Flag App

      news.movim.eu / Schneier · Wednesday, 20 July, 2022 - 15:32

    The Russian hacking group Turla released an Android app that seems to aid Ukrainian hackers in their attacks against Russian networks. It’s actually malware, and provides information back to the Russians:

    The hackers pretended to be a “community of free people around the world who are fighting russia’s aggression”—much like the IT Army. But the app they developed was actually malware. The hackers called it CyberAzov, in reference to the Azov Regiment or Battalion, a far-right group that has become part of Ukraine’s national guard . To add more credibility to the ruse they hosted the app on a domain “spoofing” the Azov Regiment: cyberazov[.]com.

    […]

    The app actually didn’t DDoS anything, but was designed to map out and figure out who would want to use such an app to attack Russian websites, according to Huntely.

    […]

    Google said the fake app wasn’t hosted on the Play Store, and that the number of installs “was miniscule.”

    Details from Google’s Threat Analysis Group here .