CyberWarfare Cyberguerre

Subscribe:

Labels

samedi 31 mars 2012

17-year-old hacker arrested for KPN-hack by Dutch goverment

The High Tech Crime Team of the National Crime Squad in the Netherlands has arrested a 17-year-old boy on suspicion of hacking into KPN.
The 17-year-old is suspected of hacking at KPN held on 16 January. He was arrested last Tuesday. The police seized a encrypted computer, two laptops and data carriers. During the hack the hacker obtained access to hundreds of servers from KPN. Possibly because of poor security of the company itself. There was controversy when details were published on the Internet, but these were from another hack, namely shop Babydump.nl

The boy used the aliases xS, and Yui Yoshioka. On a chat channel of Korean students he would have bragged about the digital intrusion. The cyber team followed him for weeks on the internet. The boy is therefore suspected of hacking the Tokohu University in Japan, the University of Trondheim in Norway and the KAIST in Korea.

#Anonymous Message to #HomelandSecurity



Greetings Homeland Security, we are Anonymous.
It’s been fun hasn’t it? These games we’ve played.
As you have seen, we the people veto the power grab of corporations and agencies over the internet.
We have read your blueprints, we know that your masters will not relent in their quest for complete power.
It may interest you to know that those you serve are multinational, their loyalty is only to power and profit, they are using you as pawns.
As we speak they have disregarded the will of the people and are forcing through several Acts that will fill the purposes of SOPA.

mardi 28 février 2012

Android Reverse Engineering (A.R.E.) Virtual Machine available

The Honeynet Project is happy to announce the release of the Android Reverse Engineering (A.R.E.) Virtual Machine.
Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox.
Tools currently found on A.R.E. are:
  • Androguard
  • Android sdk/ndk
  • APKInspector
  • Apktool
  • Axmlprinter
  • Ded
  • Dex2jar
  • DroidBox
  • Jad
  • Smali/Baksmali
You can download A.R.E. for free from http://redmine.honeynet.org/projects/are/wiki.

jeudi 23 février 2012

Gmail & Yahoo India emails will be monitored by the force of the govermental law

Looks like the Government Of India is really after the digital communication in India. Internet content providers Yahoo, Gmail and others would be asked to route all emails accesed in India through the country even if the mail account is registered outside the country. In a written statement filed in a civil court here, Yahoo India has dubbed a suit filed against it and several other websites alleging that they hosted objectionable content as “motivated” and an “abuse of the process of law.”

How to Remove Your Google Search History Before Google's New Privacy Policy Takes Effect

 It is important to note that disabling Web History in your Google account will not prevent Google from gathering and storing this information and using it for internal purposes.

On March 1st, Google will implement its new, unified privacy policy, which will affect data Google has collected on you prior to March 1st as well as data it collects on you in the future.

Anonymous message to the NSA: For once don't expect us.





Greetings NSA,


We are Anonymous.


Your statement regarding the potential future sabotage of power grids by Anonymous, disgusts us to the core, as it is clearly an attempt at fear mongering. The idea that Anonymous would shut down one of the most vital resources for it to operate, is ludicrous.


While security and intelligence organizations throughout the world attempt to depict Anonymous as a 'terrorist organization', many people understand that this same subset of Anonymous they speak of, is actually a movement for freedom. This appears to scare government organizations, to the point where they might do anything in an attempt to discredit Anonymous, and make people believe Anonymous exists solely to harm innocent people.

mardi 21 février 2012

Morocco Telecom main ISP Block's All VoIP Services !

According to Moroccan Blog, Moroccan Geeks [French], Skype and all other VoIP services have been blocked in the country, pointing to an article from Moroccan newspaper Al Sabaheya confirming the news [Arabic].
While services are more often than not blocked as a result of authoritative governments, Skype usually finds itself targeted by mobile operators and telecom providers, as was the case for Skype itself in Egypt. In Morocco, it would appear the move has been made in an attempt to create a monopoly on calling options available in the country.
According to Moroccan Geeks, Skype is a popular mode of communication in the country, adding that it, along with other VoIP services including TeamSpeak and Viber have also been affected by the block.
The blog goes on to say that the telecom provider is 'protecting itself against competition, pushing customers to use its own services instead of free services like Skype, TeamSpeak or Viber.'
According to the newspaper, Al Sabaheya, the move comes at a time when Maroc Telecom is promoting its own VoIP service, MTBOX. Over the past few months, accessing Skype in Morocco has proved difficult, with complaints of poor call quality and dropped calls, and at the time, users speculated whether it was an intentional move on the part of Maroc Telecom.
With the latest blog posts, tweets and Facebook posts, coming out of Morocco, it’s safe to assume that Skype and other VoIP services are no longer welcome on Maroc Telecom’s network.

2012 April Fools' joke:Anonymous hackers vow to shut down Internet !!

Anonymous, or someone pretending to be part of the elusive hacktivist network, has threatened to launch a coordinated cyberattack that would effectively shut down the worldwide Internet. But a few notable errors in the group's manifesto announcing the mission may reveal this to be merely an April Fools' Day hoax.
On Sunday, an announcement appeared on the file-hosting site Pastebin declaring March 31 as the day "anonymous will shut the Internet down." Called " Operation Global Blackout," the massive cyberattack, the message claims, is a protest against 'SOPA, Wall street, our irresponsible leaders and the beloved bankers who are starving the world for their own selfish needs out of sheer sadistic fun.' It's not designed to kill the Internet, but to temporarily take it down to prove the hackers' point.

Greek hackers (GHS) join Anonymous attacks

Three Greek hackers have been arrested and accused of hacking and defacing a government web site. The attack happened at the start of February and the three are accused of defacing the Greek Ministry of Justice with a protest message, according to a report on Greek news web site in.gr.

'What is going on in your country is unacceptable. You were chosen by your people to act on behalf of them and express their wishes, but you have derogatorily failed,' says the message that is still available on Youtube. 'You have killed the most sacred element your country had and that is democracy. Democracy was given birth in your country but you have now killed it.'

lundi 13 février 2012

Anonymous - Première Cyber Guerre Mondiale - #MegaUpload




Citoyens du monde,
Nous sommes Anonymous.

Nous avons regardé les événements récents comme ils se sont lentement mais sûrement dérouler, de la distorsion et la destruction du premier amendement visant à légaliser et à justifier la corruption politique, à l'aube d'une nouvelle lutte politique composée de millions de citoyens criant leur indignation à ce détournement du système judiciaire, et la proposition même de la soi-disant, " Stop Online Piracy Act ", SOPA, sans aucune préoccupation pour la morale. Nous avons assisté aux actions récentes de cette «Corporation». Le gouvernement a justifié la fermeture de megaupload.com, un site qui a servi, et continue à servir, comme un moyen très légitime de transférer des informations.

mardi 7 février 2012

US Army Upgrade to Android 4.0

The United States wish has already forbid their government workers to use smart phone to send any formal message is about changing mind, they are currently preparing a modified version of Android OS which will have more security importance.Many prototype of smart phone and tablets was tested in US and sent to soldiers overseas, soldier will benefit from this new project at first federal agent came later.Soldiers may use their new smart phone the get localisation or weather cast update directly in their phone but not to give their coordination to enemy because weather cast application retrieve coordination from the smart phone to obtain your location and give the right information this information can be intercepted.iOS is discussed too because the US want that many platform be supported by the new OS.To apply their change over the original OS research must obtain access from the owner that's why they talked to Google and Apple,Google freely allow developers to fiddle with its code Apple refused to give the feds access to the core of its mobile operating system. Google was simply more cooperative                       

lundi 6 février 2012

Anonymous published the Email sent by the FBI agent to plan the conferance call that was resently leaked

Anonymous published the Email sent by the FBI agent to plan the conferance call that was resently leaked.
The conversation covers the tracking of Anonymous and other splinter groups, dates of planned arrests and details of evidence held by police. Anonymous also published an email from the FBI, showing the email addresses of call participants. The FBI confirmed the intercept and said it was hunting those responsible.
and this is the body of email

"A conference call is planned for next Tuesday (January 17, 2012) to =
discuss the on-going investigations related to Anonymous, Lulzsec, =
Antisec, and other associated splinter groups. The conference call was =
moved to Tuesday due to a US holiday on Monday."

continue reading here

dimanche 5 février 2012

Best Camouflage Uniforms In The World By An Indian Sniper

Origins of Global Hacks: America And China are Leader


 Where do hackers come from? | Global tracking ranks hacks by country of origin

Computer hacks originating in the UK cost the global economy over $2 billion in 2011 according to latest research from FTSE listed IT assurance company, NCC Group.
The research, which tracks the country of origin of hacks, observed over 23 million hacks attempted in the UK in the second half of 2011. This figure places the UK at 15th in the global league table.

samedi 4 février 2012

Trojan found breaking Yahoo CAPTCHA security in minutes

Researchers have discovered a malware engine that appears to be able to break the CAPTCHA security used by Yahoo's webmail service after only a handful of attempts.

There is nothing new in malware that tries to break CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) - a low-level war has been ongoing since this type of security was first implemented almost a decade ago - but what matters is how quickly and invisibly this can de done.

Google's 'Me on the Web' Tool Alerts You to Personal Data Leaks

Google has launched Me on the Web, a new tool allowing anyone with a Google account to monitor what personal information about them appears online.
Me on the Web allows users to create e-mail alerts that will be sent as soon as the information is uncovered by Google's search bot. Alerts also can be sent daily or weekly.

vendredi 3 février 2012

A Conferance call between FBI And Scotland Yard leaked by anonymous



latest FBI leak, Anonymous publish a conference call between FBI agents.   

You can download MP3 file HERE


DPI Deep Packet Inspection is it used against SOPA And PIPA Or To Apply Their decisions

It's easy to turn a deaf ear to the controversy surrounding recent copyright protection bills like the Stop Online Piracy Act (SOPA) or the PROTECT IP Act, which threatened to curtail free speech on the Internet by allowing the U.S. Department of Justice to blacklist and block access to websites suspected of copyright infringement. Most of us don't visit websites suspected of illegally distributing copyrighted material, so blocking us from accessing them seems harmless. But should your ISP ever be legally obligated to prevent you from accessing restricted websites, it will have to find a way to monitor your online activity, and that could cause your privacy to be compromised if your ISP employs deep packet inspection tools to keep tabs on you.
Deep packet inspection: an enabling technology

FaceBook join HoneyNet Project to brings information security expert from around the world

The 2012 Honeynet Project Security Workshop brings together experts in the field of information security from around the world to share the latest advances and threats in information security research. Organized by the The Honeynet Project and co-sponsored by Facebook, this two-day workshop features a rare, outstanding line-up of international security professionals who will present on the latest research tools and findings in the field.
This year’s workshop will be held in Facebook headquarter, SF Bay Area, CA, USA on 19-20 March 2012. The workshop includes one-day technical presentations and one-day hands-on tutorial trainings. Presentation topics cover the latest honeynet/honeypot technology, android security and social network security from The Honeynet Project and Facebook. This year, we also offer several security training courses.
If you’re looking to attend a high quality and challenging workshop and to learn the practical security skills, then we encourage you to take advantage of this rare opportunity.


http://www.honeynet.org/

Disclosure of personal data of hundred of Texas police officers

DALLAS - The hacking group known as 'Anonymous' has published the names, addresses and police departments of more than 700 officers across the state, including dozens in North Texas, after stealing the data from the Texas Police Association's web site.

jeudi 2 février 2012

France: Réapparition de Carberq - Malware ciblant le fournisseur internet FREE

Un code malveillant s´invite chez les clients Free afin de leur ponctionner leurs données bancaires. L’année dernière, Cabrerp faisait son apparition sur la scène des fraudes bancaires en ligne, prenant la relève des malware Zeus et SpyEye. Comme l'explique Data Security Breach, la société Trusteer a récemment découvert une nouvelle version de Carberp ciblant le fournisseur d’accès à Internet Free. Le malware est conçu pour subtiliser les informations bancaires des abonnés en utilisant une attaque de type « Man in the Browser » (MitB), c'est-à-dire une infection du navigateur internet permettant notamment de modifier des pages internet.

La Banque Postale: Tentative de Piratage

Nouvelle tentative de piratage des données bancaires des clients de la Banque Postale. Le piège n'est pas nouveau mais a une fâcheuse tendance à s'améliorer. ZATAZ.COM a détecté plusieurs nouvelles tentatives de filoutages de données bancaires appartenant aux clients de La Banque Postale. Cet hameçonnage débute par un courriel aux couleurs de la filiale bancaire de La Poste. Un émail avec logo et contenus pouvant piéger le lecteur : "Nous avons récemment déterminé que différents ordinateurs connectés a votre compte, Mot de passe et les échecs multiples étaient présents avant la connexion." Mission de l'escroc, inciter le lecteur de la missive usurpatrice à cliquer sur le lien fourni. Dans les cas détectés par ZATAZ.COM, les sites elmaleka.tv et 196.206.0.126 étaient exploités dans cette arnaque. Des urls qui dirigent le surfeur sur des espaces numériques se faisant passer pour un espace d'administration personnel de La Banque Postale.

source:ZATAZ.COM

mercredi 1 février 2012

TOP 10 list of the most destructive viruses ever.

Viruses have been wreaking havoc on computers since 1986 when the first virus, known as BRAIN showed up on the scene.  Brain is considered to be the first virus found on PC’s and infected MS-DOS.  Over the past 24 years there have been over 65,000 viruses created.  Today we highlight our selected TOP 10 list of the most destructive viruses ever.

Counting down.

#10 Sircam

Sircam was notable during its outbreak for the way it distributed itself. Document files (usually .doc or .xls) on the infected computer were chosen at random, infected with the virus and emailed out to email addresses in the host’s address book. Opening the infected file resulted in infection of the target computer.

les secrets de fabrication de l'iPad


Les secrets derrières le fabrication du fameux tablet de l'Appel .Une forte stratégie commerciale et pas seulement une innovation technique qui est derrière le succès de l'Appel.        

Nuclear Reactor worm infection - Davis-Besse

On January 25, 2003, at 12:30 AM Eastern Standard Time, the Slammer worm began exploiting a
vulnerability in Microsoft SQL Server. Within ten minutes, it had infected 75,000 servers
worldwide—90% of vulnerable hosts. The design of Slammer was simple; it did not write itself to
the hard drive, delete files, or obtain system control for its author. Instead, it settled in system
memory and searched for other hosts to infect. Removing the worm was as simple as rebooting the
server after closing network port 1434, Slammer's point of entry.

Anonymous: Operation Black 'March'



New Anonymous OP
Join us February 3rd. Our Day of Action is here. Destroy them by ignoring them.

mardi 31 janvier 2012

Wath is DMARC?

DMARC, which stands for "Domain-based Message Authentication, Reporting & Conformance", is a technical specification created by a group of organizations that want to help reduce the potential for email-based abuse by solving a couple of long-standing operational, deployment, and reporting issues related to email authentication protocols.
DMARC standardizes how email receivers perform email authentication using the well-known SPF and DKIM mechanisms. This means that senders will experience consistent authentication results for their messages at AOL, Gmail, Hotmail, Yahoo! and any other email receiver implementing DMARC.


DMARC is launched by industry heavyweights Google, PayPal,Microsoft and AOL -- along with 11 others in high-tech such as Facebook and LinkedIn, as well as the financial world's Bank of America and Fidelity Investments,in order to stop phishing attacks right in their tracks? the group says that DMARC can through policy-based steps filter out spoofed email that attackers use for phishing.


Is it the end of Phishing attacks?
dmarc.net


U.S. lags Finland, Sweden and Israel in cybersecurity

The United States and China are less prepared for disruptive computer attacks than smaller countries such as Finland and Israel, according to the first-ever ranking of individual nations' cybersecurity postures.
The smaller nations' greater dependence on the Internet and strong private sector oversight partly contributed to their high scores, noted a report released Monday by the Security and Defense Agenda, a Brussels think tank. The purpose of the study was to show how each country's defenses stack up against each other's.

Internet and IPv6 By 2020

the growth of the number of entities connected to the Internet can be the major cause of strengthens cyber crime.
think about the IPv6 address that you may have in your internal chip or may be the address of your brain...