Thursday, February 25, 2016

Deadpool

Links are working in firefox or update your flashplayer. (If not working links will upload new links within some hour), I am not doing any piracy I am only helping thank you.

Link 1
http://embedscr.com/?p=2605 (slow working)
http://vodlocker.com/embed-a4vne5yux3g2-866x480.html  (slow loading)

Link 2
http://embedsr.com/?p=21933 (working in firefox)

http://streamcloud.eu/y009ujji8k1y/Deadpool_2016_HD-TS_x264-CPG-DeadPool_2016_HD-TS_x264-CPG.mkv.html   (working)

http://www.auroravid.to/video/4ebc4d12a7dc7  (working)

Link 3
http://www.nowvideo.sx/video/2239f2e6b3b71 

Friday, February 12, 2016

Nepal top list in google search term hacking

Google Trends is a public web facility of Google based on Google Search, that shows how often a particular search term is entered relative to the total search volume across various regions of the world. Research team from Rigo Technology analyzed few search terms related to topic “Hacking” and interestingly found out that Nepal tops the list worldwide on several of those search terms.
Hacking Infographics
As per our infographics prepared by analyzing Google trends, Nepal surprisingly surpasses all other countries on most googled competitive keywords such as
With Internet being accessible to everyone, it looks like every other teenager and people connected to The Internet are particularly interested in Hacking. Which also explains the reason behind the sudden rise of Cyber Crimes we have seen in recent few years. There have been several high-profile attacks on the governmental sector and public organization and the current situation is already worst in itself. The situation is inevitably going to worsen even more as implied by our infographics.
Now is the time for us to focus on strengthening our security infrastructure and get ourselves prepared for the Cyber attacks that are going to be very technical and intricate in near future.
- See more at: http://blog.rigotechnology.com/2016/02/12/computer-hacking-search-trends-from-nepal/#sthash.tWF7AQGZ.dpuf - See more at: http://blog.rigotechnology.com/2016/02/12/computer-hacking-search-trends-from-nepal/#sthash.tWF7AQGZ.dpuf
Reference: Rigo 

Saturday, February 6, 2016

Adwind RAT malware


KasperskyLab recently found an unusual malware which was found in banks of Singapore. This malware is named in different terms as Adwind RAT (Remote Access Tool), AlienSpy, Frutas, Unrecom, Sockrat, JSocket, and jRat. It is developed in java which makes it multi-platform malware and is available to purchase in dark forums. According to the author, the backdoor component(called the server) can keep running on Windows, Mac OS, Linux and Android stages giving rich capabilities to remote control, information gathering, information ex-filtration and supports sidelong development.
The researchers would like to encourage enterprises to review the purpose of using a Java platform and to disable it for all unauthorized sources.
Adwind_timeline_horizontal_final

What exactly is Adwind?

Adwind is a cross-platform, multifunctional backdoor, which can run on Windows, Mac OS, Linux and Android OS.

Is this a nation-state sponsored campaign?

This is not a nation-state sponsored campaign. We believe that it was developed and used mostly by cybercriminals.

Who are the victims? / What can you say about the targets of the attacks?

The victims range from random people that launched the malware following an opportunistic attack to specific organizations, most of which are small and medium-sized businesses.

How did you become aware of this threat? Who reported it?

From one of our partners we received part of an email with a .JAR attachment. The profile of the partner company and the contents of the email indicated a targeted attack attempt. While the partner was not compromised we decided to check the attachment, which led us to the malware platform.

How does Adwind infect computers?

Adwind doesn’t self-infect computers or spread automatically. It relies on user interaction: double-clicking the .JAR attachment in the email or doing the same from an archive. Alternatively, it can be spread via other containers like .hta or .vbs files, which install Java if it’s not available on the system and download the main Adwind.JAR file from a remote server.

Are the attackers using any zero-day vulnerabilities?

We have not seen attackers using zero-day vulnerabilities together with Adwind.

What exactly is being stolen from the target machines?

Limited only by the intelligence needs of the attackers, the malware can:
  • collect keystrokes
  • steal cached passwords and grab data from web forms
  • take screenshots
  • take pictures and record video from the webcam
  • record sound from the microphone
  • transfer files
  • collect general system and user information
  • steal keys for cryptocurrency wallets
  • manage SMS (for Android)
  • steals VPN certificates

Is this a Windows-only threat? Which versions of Windows are targeted? Are there Mac OS X or Linux variants?

This malware is capable of running on any platform that has a modern Java runtime environment installed, which includes all Java-supported versions of Windows, Mac OS X, Linux and potentially other platforms which run Java.

Have you seen any evidence of a mobile component – iOS, Android or BlackBerry?

We have seen Adwind .apk files that can run on Android OS, however iOS and BlackBerry are out of the scope of this platform.

It seems Adwind is all about Java. Why do you think it is so?

Java applications by design should be platform independent. While certain system architectures are quite specific and there is a set of Java libraries designed for them, general purpose code may run on any system that has a Java runtime environment installed. This makes Java a very convenient platform for which to develop malware that can run on any platform.

Do you know the total number of victims?

We have our own estimate of targets attacked by this malware. It is more than 443,000 covering the period from 2013 to the beginning of 2016.

What is the geography of victims?

The geography of victims changed over time. In 2013, Arabic and Spanish-speaking countries were the top targets. In 2014, the most attacked countries were Turkey and India, followed by UAE, the US and Vietnam. In 2015, Russia was the most attacked country, with UAE and Turkey again near the top, along with the USA, Turkey and Germany.

What are the attacked industries?

During their investigation the Kaspersky Lab researchers were able to analyze nearly 200 examples of spear-phishing attacks organized by unknown criminals to spread the Adwind malware, and were able to identify the industries most of the targets worked in:
  • Manufacturing
  • Finance
  • Engineering
  • Design
  • Retail
  • Government
  • Shipping
  • Telecom
  • Software
  • Education
  • Food production
  • Healthcare
  • Media
  • Energy
Map_of_adwind_final
Based on information from Kaspersky Security Network, the 200 examples of spear-phishing attacks observed in the six months between August 2015 and January 2016 resulted in Adwind RAT malware samples being encountered by more than 68,000 users.

Who are the clients of Adwind? Where are they from? How many? Are they APT actors?

To begin with, Adwind only had a Spanish interface; however it now also has an English interface and is recognized by cybercriminals from many countries. We believe that clients of the Adwind platform fall into the following categories:
  1. Scammers that want to move to the next level (using malware for more advanced fraud)
  2. Unfair competitors
  3. Cyber-mercenaries (spies for hire)
  4. Private individuals that want to spy on people they know

How is this different from any other APT attack?

Adwind is not an APT attack. It is a platform with rich capabilities that cybercriminals can use to conduct cyber-espionage.

Are there multiple variants of Adwind? Are there any major differences in the variants?

There have been multiple generations of Adwind, which has been continuously developed and supported since at least 2012. The differences are mostly about malware features and available modules, however all variants rely on the same basic scheme of client-server communication. It’s designed to send commands in an ad-hoc manner, which introduces a constraint of controlling a large number of compromised machines. We believe that it’s not suitable for even medium-sized botnets and used only for targeted network penetrations.

Is the command-and-control servers used by Adwind still active? Have you been able to sinkhole any of the C&Cs?

The Adwind malware is used by hundreds of criminals, which means that there are hundreds of command and control servers. Some of them are down, some are up, the others are turned on as required. It’s not easy and not efficient to take them down in the traditional way. Most of them rely on free Dynamic DNS providers and are not real domain registrations.

Who is responsible for this threat?

We cannot speculate publically about attribution.

How long have the attackers been active?

The users of Adwind malware have been active since at least 2012 with a large spike of users at the end of 2015.

Did the attackers use any interesting/advanced technologies?

Generally speaking, the Java platform is not a common platform for malware at all. It is mainly related to the requirement of having a Java runtime environment on the victim’s system, the size of the generated code and availability of decompilers for Java classes. The author of the Adwind malware attempted to solve all these problems by introducing a number of workarounds.

Does Kaspersky Lab detect all variants of this malware?

Kaspersky Lab products detect all variants of this malware that we know about. The full list is available in the Appendix of our public report.

Are there Indicators of Compromise (IOCs) to help victims identify the intrusion?

Yes, there are many known domains and IP addresses used by the Adwind attackers. The full list is available in the Appendix of our public report.

What is JSocket? How long does it exist?

JSocket is the latest reincarnation of Adwind RAT, and available through online subscription. It was launched in June 2015 and is still running.

What is the problem with just interrupting the JSocket service?

Interrupting the service by suspending the domain or taking down the server wasn’t efficient in the past and led to yet another rebranding and restart of the platform.

What is the difference between JSocket and Adwind?

The Adwind RAT and the JSocket RAT are based on the same source code and were most likely developed by the same author. While Adwind was abandoned some time ago, JSocket still exists and is just another “brand” of the same RAT. As JSocket is the latest variant of the backdoor it has many more features and a rebuilt UI.

How many people you think are behind the whole MaaS platform?

We believe that the platform is in the hands of just one hardworking individual, who sometimes outsources tasks to external developers.

You estimated the revenue of the whole service as 200k per year. How did you calculate this figure?

Based on users’ activity on the internal message board and some other observations, we estimated a number of users in the system as 1,800 by the end of 2015. By making certain assumptions on the percentage of paid accounts, service costs and most probable distribution of the paid customers, we concluded that such a service may generate up to $200K USD annually. However, this is just an estimation of revenue, which doesn’t necessarily mean that the author has already received this money. One important fact is that the latest version of the portal was launched only in summer 2015.
- See more at: http://blog.rigotechnology.com/2016/02/10/adwind-rat-malware/#sthash.NGXGEmck.dpuf

Thursday, January 28, 2016

A robot Salamander

Roboticist Auke Ijspeert designs biorobots, machines modeled after real animals that are capable of handling complex terrain and would appear at home in the pages of a sci-fi novel. The process of creating these robots leads to better automata that can be used for fieldwork, service, and search and rescue. But these robots don't just mimic the natural world — they help us understand our own biology better, unlocking previously unknown secrets of the spinal cord.
Video: http://www.ted.com/talks/auke_ijspeert_a_robot_that_runs_and_swims_like_a_salamander?utm_campaign=social&utm_medium=referral&utm_source=facebook.com&utm_content=talk&utm_term=technology

Apple pay

Both Bank Of America and Wells Fargo are working on integrating Apple Pay into their ATMs, according to a source familiar with the teams on the projects. Engineers at both companies have been placed on multi-month assignments to build the Apple Pay options. I’ve confirmed the identity of at least one engineer who publicly lists themselves as a Bank Of America employee.
Wells Fargo’s head of ATMs Jonathan Velline implied Apple Pay would come to its ATMs. He confirmed that “We’ve been working on the technology that allows us to hook to digital wallets, leveraging NFC on mobile phones to replace the card at the transaction at the ATM. Right now the wallet that we support is Android Pay.”
Velline continued “But we’re also looking at lots of different mobile wallets and evaluating which ones are going to be appropriate for our customers. We’ll likely add more mobile wallets throughout the year. We recognize our customers are going to have lots of different types of wallets based on their device, based on their bank, based on their OS, and we’re going to continue to find the right balance of which wallets we’re going to support. Right now the initial launch is with Android Pay, but that doesn’t limit us from considering other mobile wallets.”
Apple Pay Bank Of AmericaWhen I pressed harder and asked if that meant Apple Pay would likely be one of those mobile wallets, he admitted with a laugh “I think that’s a good assessment.”
When asked about whether its ATMs would work with Apple Pay, Bank Of America’s Consumer Banking Products press representative Betty Riess told me “We already have number of mobile wallet programs…” implying Apple Pay could join them.
She confirmed that Bank Of America is “currently developing a new cardless ATM solution. This solution will enable customers to leverage NFC (near field communication) technology on their smart phone in order to authenticate and complete transactions at a Bank of America ATM.  We will roll out this capability in late February with associates at select ATMs in Silicon Valley, San Francisco, Charlotte, New York and Boston followed by a broader roll out to customers mid year.” The Charlotte Observer reported news of the cardless ATMs yesterday but didn’t specify that Apple Pay would be involved.
Riess requested to double-check what she could say specifically about Apple Pay. When she called me back regarding the ATMs, she was more reserved, saying “At this point we’re not confirming which phones they’ll work with.” But the iPhone is by far the most popular phone in the U.S., so this all meshes with our source saying Bank Of America is working on Apple Pay for ATMs.
Apple also did not respond to a request for comment. Bank Of America and Wells Fargo competitor Chase recently announced it will be rolling out cardless ATMs this year.
While it’s unclear exactly how Apple Pay at ATMs would work, it would likely allow people to withdraw money without needing their debit card or credit card. That could be especially useful if someone lost or forgot their wallet or card.
Card Skimmer
Using NFC and Apple Pay could thwart fraud made possible by card skimmers like this one, from Krebs On Security
Users would likely tap their phone to the ATM’s NFC point, which would bring up the passcode or thumbprint verification screen on the phone. Once confirmed, users would be able to access some ATM functionality as if they’d inserted their card and entered their pin.
Working with Apple Pay could also save the banks money by protecting against fraud. It’s much easier to duplicate a credit card than an iPhone. Apple Pay can be set to require a fingerprint scan, which ATMs don’t offer. Apple Pay passcodes can also be long and complex, compared to the simple 4-digit pin codes used on debit cards.
Most importantly, Apple Pay would thwart the use of card skimmers. These devices fit over the front of ATMs as a fake facade, and then steal the information from cards inserted into them. Switching to NFC and mobile phones would prevent this since there would be no card involved.
These anti-fraud incentives and consumer interest in the convenience of using NFC to withdraw money could spur banks to race to integrate Apple Pay.
[Image Credit: Alex]
Source:http://techcrunch.com/2016/01/28/apple-pay-atm/#.tjvsevu:JwU3

Wednesday, January 27, 2016

“Xunpes” Linux Trojan

Dr. web security firm had found a new trojan that has been targeting Linux machine named “Xunpes”, Dr. web registered “Xunpes” in their virus database with name Linux.BackDoor.Xunpes.1This trojan is capable of putting backdoor and dropper to perform malicious functions on the infected machine. The dropper was built using Lazarus, a free cross-platform IDE for the Free Pascal compiler and contains the backdoor in its body.
After dropper is launched, backdoor which is stored in unencrypted form in droppers’ body is saved into /tmp/.ltmp folder. The researcher had warned the second component of this trojan is responsible for all malicious activities on the infected machine. Once launched, the backdoor written in C decrypts the configuration file using the key that is hard-coded in its body. Its configuration parameters include a list of C&C servers and proxy servers addresses and other information necessary for the correct operation of the malicious program. After that, the Trojan establishes a connection to the server and waits for commands from cyber criminals.
Dr. web also reveals this trojan can be executed using 40 commands, to steal user information, key logging, and screenshots.
Moreover, the security analysts found that the Trojan can send record names in a specified directory and can transfer files to the server and that it can create, delete, and rename files and folders. Besides, the cybercriminals behind the malware can utilize it to execute bash commands, send information about the machine and the .default.conf record, close determined windows, and others.

Wednesday, September 2, 2015

2 days event at GYPC

"United Generation of Nepal for Sustainable Peace and Development"


For international youth day GYPC organization had created a 2 days event for youth from different colleges. In first day of the event participants from different colleges likes Orient, British gurkha, Global, Kings and Islington college registered their name in the desk. Event was started by Alisha singh thakuri co-ordinator of the program. 
In most of the other events I had attended, program usually start from introduction of the program but she start the program with the game where participants had to know other participants name. Game was funny and interactive among participants. I was able to get only 18 participant name from 45. From the game and starting of the program I had feelings of my 2 days going to be awesome. 
After completion of game she started to give small introduction about GPYC than introduce us Mr. Dhurba P. Lamichhane who is president of GYPC. He share past activities of GYPC and his knowledge and experience about what we youth can do for the nation. 
Next for some refreshment our co-ordinator call up some participants to show their skills & talents in front of the all participants some participants tell poems, crack joke, does caricature which make hall environment in the good mood. After some talent show up it was again time for some game this time it was team game "water game" where each team member have to pass the water from their palm to the end of the member who have to fill the two glasses that were kept behind end member of each team. After this fun game we had a guest Mr. Pradeep poudel who was former president of Na.Bi.sangh Nepal student union. His speech was little bit towards to political but still it was encourage towards the nation. He also address that being youth of our nation we must think 1st towards the nation rather than living in the abroad nation. After his motivational speech we were introduce miss kripa sigdel who was one of the active activities of GYPC organization. Being late for the participants the program was end for the 1st day and participants were call up for "international youth day" rally for 18 august in Brikuti Mandap, Kathmandu.