Saturday, November 2, 2019

WhatsApp Hack Targeted Officials in More Than 20 Countries | WIRED

Microsoft reported findings that the Russian hacking group Fancy Bear (also called APT28 or Strontium) has targeted at least 16 antidoping agencies around the world in the lead-up to the 2020 Tokyo Olympics! Videos for WhatsApp Hack Targeted Officials In 6:27 WhatsApp used to hack smartphones; WION Correspondent also targeted YouTube!! Russian hackers have barraged the Olympics for three years now, including a particularly stealthy and insidious digital attack on the Pyeongchang Winter Games in 2018.

We detailed how to keep your smart-assistant devices locked down so human reviewers at big tech companies don't end up listening to audio snippets of your voice, or other accidental recordings taken in your home. And Will Roper, assistant secretary of the Air Force for acquisition, technology, and logistics, made the case that three technologies —open systems design, agile cloud-based software, and digital engineering—represent a sort of "digital holy trinity" that will underlie next-generation weapons for the US military.

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Were you following this:

Convention draws hackers to Albany pub - Times Union

ALBANY — Leaving your phone or laptop unattended anywhere is a bad idea — but especially at The Pearl Street Pub this weekend, where people are gathering for AnyCon, the third-annual hacker convention.

The purpose of the two-day convention, being held Friday and Saturday, is to serve as a gathering place for the information-security community in the Capital Region! 2:46 WhatsApp Israeli Spyware: Several Indian Users Hit By Israeli Spyware, WhatsApp Confirms To NDTV YouTube!! Attendees share knowledge and experience with different types of hacking — which, in its most basic meaning, is the concept of making something do what it's not supposed to do.

But despite the negative connotation often associated with hackers, the convention isn't a gathering of criminals! WhatsApp Hack Targeted Officials in More Than 20 Countries ...www.wired.com ...officials - hack ed- whatsapp Now, in the same week when WhatsApp revealed that NSO Group had in fact targeted 1,400 of its users, Reuters reports that government officials in more than 20 countries have also been targeted via ...!! Hackers are often used to test the strength of, and find weaknesses in, a company's security infrastructure so vulnerabilities can be found before they're discovered by somebody with nefarious intentions.

Publisher: Times Union
Date: 2019-11-01T18:45:20Z
Twitter: @TimesUnion
Reference: (Read more) Visit Source



Hackers demand bitcoin ransom from Johannesburg city after cyber attack - CNN

(CNN) Authorities in Johannesburg are scrambling to gain control of the city's cyber networks from hackers who are demanding payment in bitcoins.

Publisher: CNN
Date: 2019-10-29T15:49:54Z
Author: Bukola Adebayo CNN
Reference: (Read more) Visit Source



Government officials targeted by hackers through WhatsApp

Senior government officials in multiple US-allied countries were targeted earlier this year with hacking software that used Facebook’s WhatsApp to take over users' phones, according to people familiar with the messaging company's investigation.

The hacking of a wider group of top government officials' smartphones than previously reported suggests the WhatsApp cyber intrusion could have broad political and diplomatic consequences.

WhatsApp filed a lawsuit on Tuesday against Israeli hacking tool developer NSO Group. The Facebook-owned software giant alleges that NSO Group built and sold a hacking platform that exploited a flaw in WhatsApp-owned servers to help clients hack into the cellphones of at least 1,400 users between April 29, 2019, and May 10, 2019.

The total number of WhatsApp users hacked could be even higher. A London-based human rights lawyer, who was among the targets, sent Reuters photographs showing attempts to break into his phone dating back to April 1.

logo
Publisher: New York Post
Date: 2019-11-01T14:00:00+00:00
Twitter: @nypost
Reference: (Read more) Visit Source



In case you are keeping track:

China-Linked Hackers Spy on Texts With MessageTap Malware | Threatpost

Chinese state-sponsored hackers are attacking telecom networks to sniff out SMS messages that contain keywords revolving around political dissidents.

The espionage tool, dubbed MessageTap, was discovered by FireEye Mandiant during a 2019 investigation of a cluster of Linux servers within an unspecified telecom network; these operated as Short Message Service Center (SMSC) servers! Government officials worldwide targeted in WhatsApp hack ...www.msn.com ...targeted -in...Officials in several countries have reportedly been targeted in a hack affecting the messaging app WhatsApp . Reuters reported Friday, citing people familiar with an investigation into the matter ...!! In mobile networks, SMSCs are responsible for sending SMS messages to an intended recipient or storing them until the recipient has come online.

“The tool was deployed by APT41 in a telecommunications network provider in support of Chinese espionage efforts,” said FireEye researchers Raymond Leong, Dan Perez and Tyler Dean, in a report on Thursday . “APT41’s operations have included state-sponsored cyber-espionage missions as well as financially motivated intrusions! Government officials targeted for hacking through WhatsApp ...officials - targeted -for...Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc's (FB.O) WhatsApp to take over users' phones ...!! These operations have spanned from as early as 2012 to the present day.”

Twitter: @threatpost
Reference: (Read more) Visit Source



The First BlueKeep Mass Hacking Is Finally Here—but Don't Panic | WIRED

When Microsoft revealed last May that millions of Windows devices had a serious hackable flaw known as BlueKeep —one that could enable an automated worm to spread malware from computer to computer—it seemed only a matter of time before someone unleashed a global attack. As predicted, a BlueKeep campaign has finally struck. But so far it's fallen short of the worst case scenario.

Security researchers have spotted evidence that their so-called honeypots—bait machines designed to help detect and analyze malware outbreaks—are being compromised en masse using the BlueKeep vulnerability. The bug in Microsoft's Remote Desktop Protocol allows a hacker to gain full remote code execution on unpatched machines; while it had previously only been exploited in proofs of concept, it has potentially devastating consequences. Another worm that targeted Windows machines in 2017, the NotPetya ransomware attack , caused more than 10 billion dollars in damage worldwide.

Publisher: Wired
Author: Condé Nast
Twitter: @wired
Reference: (Read more) Visit Source



Hackers Claim 'Any' Smartphone Fingerprint Lock Can Be Broken In 20 Minutes

Owners of almost every Android smartphone, and iPhones up to and including the iPhone 8, could have a new security problem to worry about: Chinese hackers claim to be able to beat any fingerprint scanner in just 20 minutes.

Unless you have invested in a smartphone such as the iPhone 11 that has done away with fingerprints as a biometric security measure, the chances are you rely upon that finger image to unlock your device and many of the apps within. Which could be bad news as Chinese hackers have demonstrated how, they say, any fingerprint scanner can be beaten using equipment costing $140 (£108) and an app that analyzes a photograph of your print.

The X-Lab team leader, Chen Yu, asked random audience members to touch a glass. The fingerprints left behind were then photographed using a smartphone and passed through an app that the hackers have developed. Although the precise methodology was not revealed, the app is thought to extract the data required to clone a fingerprint, presumably using a 3D printer.

Publisher: Forbes
Date: 2019-11-02
Author: Davey Winder
Twitter: @forbes
Reference: (Read more) Visit Source



Hackers seized cameras before Trump's inauguration and left a smoking gun behind - The Verge

But before those attacks, there was an attack on the nation's capital, days before the presidential inauguration. An article from The Wall Street Journal details how hackers Alexandru Isvanca and Eveline Cismaru seized control of Washington, DC's surveillance cameras right before Trump's inauguration. The piece is full of twists and turns, from the small-time beginnings of the hackers' scamming careers to them eventually turning on each other.

Publisher: The Verge
Date: 2019-10-30T15:14:24-04:00
Author: Aliya Chaudhry
Twitter: @verge
Reference: (Read more) Visit Source



Happening on Twitter

1 comment:

Popular Posts