Sunday, June 26, 2016

Ransomware hit university

More than 2.3 million computer users have been targeted with ransomware during the last year, security researchers at Kaspersky Labs concluded in a report published last week.
It’s not just academic institutions and businesses which are targeted. On Friday, for example, Forbes reported that a NASCAR racing team recently agreed to pay an undisclosed amount after suffering from an infection.
Cyber insurance didn’t keep the University of Calgary from recently paying roughly $15,000 after being hit by hackers, but a college official said other schools should consider buying coverage after seeing first-hand how costly a cyberattack can be.
Speaking publicly about the incident Friday afternoon, Linda Dalgetty, the university’s vice president of finance and services, credited a cyber insurance policy purchased last year with helping the school bounce back after email and other services were suspended due to ransomware — an increasingly popular type of malware that encrypts compromised files and holds them hostage until a payment is made to cybercriminals.
“We can prevent as much as we can, but the reality is that cyber-criminals are very smart,” said Ms. Dalgetty according to the Calgary Herald. “They’re prolific, they’re everywhere and I don’t know of any entities that have not had some level of incursion.”
Global consulting firm PricewaterhouseCoopers has predicted the cyber insurance industry will be worth $7.5 billion by the end of the decade, and Rep. John Ratcliffe — who chairs the House’s Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies — recently called such policies a “valuable free-market tool in the ongoing effort to better defend ourselves against cyber risks.


source

Tuesday, March 8, 2016

You are welcome in 5 country if trump wins

Every election season, it seems like everybody threatens to move to Canada if their preferred candidate doesn't win.
But, if Google searches are any indication, 2016 could be the year that people actually go through with it.
But why limit relocation options to Canada?
If the thought of being on the same continent as a President Trump is too much to stomach, there are plenty of other countries that also have a fairly easy immigration process, decent economies and English as a widely-spoken language.
Pray for a future America you want to live in. But if that doesn't work, start filing for immigration status.

New Zealand

The open road that leads somewhere where Donald Trump is not president (Wanaka, New Zealand).
Image: cameron spencer / Getty Images
For Americans that are considering deserting their country, New Zealand developed an entire webpage to make leaving as easy as possible.
First, wannabe Kiwis register their interest, then sign up on a website that will tailor an easy-to-follow checklist for each visa application process.
Public healthcare in New Zealand is free or almost free for citizens, residents or those with two-year work visas. Plus, New Zealand's cities rated less expensive that most major American cities, even though the standard of living was the same.

Ireland

The road to Dingle via the Connor Pass, a narrow, winding road through rocky glaciated mountains.
Image: john greim / LightRocket / Getty Images
Americans can stay in Ireland for up to three months without a visa. Any time longer than that will require going through immigrations.

The immigration process for Ireland is fairly easy — for those who can get a job there. The only other options are marrying an Irish person, having a baby on Irish soil, claiming refugee stats (Americans are not refugees), or becoming a student.
Or consider becoming an Irish citizen: It's easier than you might think. Even just having one great-grandparent who was born in Ireland and then moved to the states is qualification enough.
Why consider Ireland? The Irish are consistently ranked some of the friendliest people in the world — and Americans that are considering relocating will be in desperate need of friendship. Plus, a stroll on the moors is the ideal setting for brooding and cursing America.

Canada

Toronto, Ontario.
Image: roberto machado noa / LightRocket / Getty Images
The classic destination for exasperated Americans, the Great White North has been inundated with attention this week, and for good reason.
Canada has a very open immigration policy, with an express process for skilled workers. And they seem to be welcoming any and all to the country.
Cape Breton, an island in Nova Scotia, built an entire campaign off the fears of many Americans.
Canada's major cities are not that far removed from American cities, in terms of vibes. But Canada also offers plenty of wilderness for those need to drop off the grid for an entire four-year term. Also, immigrants to Canada will get a full year of free access to the country's national parks.
And hey, if Trump does get elected, maybe he'll build a wall on the Canadian border as well! Canadians can only hope.

Svalbard

Image: chris jackson / Getty Images
The unforgiving climate of Svalbard — a territory of Norway — may be more tolerable environment for some than Trump's America.
Also, it's probably the easiest place on Earth to relocate to: "No residence permit or visa is needed to settle on Svalbard," according to the government's pamphlet for foreigners.
However, disgruntled Americans that choose to take up in Svalbard are not entitled to social services. All residents of Svalbard must be able to provide for themselves financially and those who cannot may be "expelled or refused entry into Svalbard." You should also be able to defend yourself against polar bears.
Other than that, everybody who can handle living in the Arctic is welcome.

Sweden

Stockholm, Sweden.
Image: flickr Editorial / Getty Images
Sweden is often lauded for its generous immigration policies. About 15% of the Swedish population is refugees and immigrants — 36% of them are from high-income countries.
The process of applying to immigrate to Sweden can be done online. An offer of employment in Sweden is the first step to getting a work visa, but you can spend a few months in the country without a visa while looking for a job.
It's also been named one of the best countries to be a woman and has the most progressive views regarding gender equality.

Thursday, February 25, 2016

Deadpool

Links are working in firefox or update your flashplayer. (If not working links will upload new links within some hour), I am not doing any piracy I am only helping thank you.

Link 1
http://embedscr.com/?p=2605 (slow working)
http://vodlocker.com/embed-a4vne5yux3g2-866x480.html  (slow loading)

Link 2
http://embedsr.com/?p=21933 (working in firefox)

http://streamcloud.eu/y009ujji8k1y/Deadpool_2016_HD-TS_x264-CPG-DeadPool_2016_HD-TS_x264-CPG.mkv.html   (working)

http://www.auroravid.to/video/4ebc4d12a7dc7  (working)

Link 3
http://www.nowvideo.sx/video/2239f2e6b3b71 

Friday, February 12, 2016

Nepal top list in google search term hacking

Google Trends is a public web facility of Google based on Google Search, that shows how often a particular search term is entered relative to the total search volume across various regions of the world. Research team from Rigo Technology analyzed few search terms related to topic “Hacking” and interestingly found out that Nepal tops the list worldwide on several of those search terms.
Hacking Infographics
As per our infographics prepared by analyzing Google trends, Nepal surprisingly surpasses all other countries on most googled competitive keywords such as
With Internet being accessible to everyone, it looks like every other teenager and people connected to The Internet are particularly interested in Hacking. Which also explains the reason behind the sudden rise of Cyber Crimes we have seen in recent few years. There have been several high-profile attacks on the governmental sector and public organization and the current situation is already worst in itself. The situation is inevitably going to worsen even more as implied by our infographics.
Now is the time for us to focus on strengthening our security infrastructure and get ourselves prepared for the Cyber attacks that are going to be very technical and intricate in near future.
- See more at: http://blog.rigotechnology.com/2016/02/12/computer-hacking-search-trends-from-nepal/#sthash.tWF7AQGZ.dpuf - See more at: http://blog.rigotechnology.com/2016/02/12/computer-hacking-search-trends-from-nepal/#sthash.tWF7AQGZ.dpuf
Reference: Rigo 

Saturday, February 6, 2016

Adwind RAT malware


KasperskyLab recently found an unusual malware which was found in banks of Singapore. This malware is named in different terms as Adwind RAT (Remote Access Tool), AlienSpy, Frutas, Unrecom, Sockrat, JSocket, and jRat. It is developed in java which makes it multi-platform malware and is available to purchase in dark forums. According to the author, the backdoor component(called the server) can keep running on Windows, Mac OS, Linux and Android stages giving rich capabilities to remote control, information gathering, information ex-filtration and supports sidelong development.
The researchers would like to encourage enterprises to review the purpose of using a Java platform and to disable it for all unauthorized sources.
Adwind_timeline_horizontal_final

What exactly is Adwind?

Adwind is a cross-platform, multifunctional backdoor, which can run on Windows, Mac OS, Linux and Android OS.

Is this a nation-state sponsored campaign?

This is not a nation-state sponsored campaign. We believe that it was developed and used mostly by cybercriminals.

Who are the victims? / What can you say about the targets of the attacks?

The victims range from random people that launched the malware following an opportunistic attack to specific organizations, most of which are small and medium-sized businesses.

How did you become aware of this threat? Who reported it?

From one of our partners we received part of an email with a .JAR attachment. The profile of the partner company and the contents of the email indicated a targeted attack attempt. While the partner was not compromised we decided to check the attachment, which led us to the malware platform.

How does Adwind infect computers?

Adwind doesn’t self-infect computers or spread automatically. It relies on user interaction: double-clicking the .JAR attachment in the email or doing the same from an archive. Alternatively, it can be spread via other containers like .hta or .vbs files, which install Java if it’s not available on the system and download the main Adwind.JAR file from a remote server.

Are the attackers using any zero-day vulnerabilities?

We have not seen attackers using zero-day vulnerabilities together with Adwind.

What exactly is being stolen from the target machines?

Limited only by the intelligence needs of the attackers, the malware can:
  • collect keystrokes
  • steal cached passwords and grab data from web forms
  • take screenshots
  • take pictures and record video from the webcam
  • record sound from the microphone
  • transfer files
  • collect general system and user information
  • steal keys for cryptocurrency wallets
  • manage SMS (for Android)
  • steals VPN certificates

Is this a Windows-only threat? Which versions of Windows are targeted? Are there Mac OS X or Linux variants?

This malware is capable of running on any platform that has a modern Java runtime environment installed, which includes all Java-supported versions of Windows, Mac OS X, Linux and potentially other platforms which run Java.

Have you seen any evidence of a mobile component – iOS, Android or BlackBerry?

We have seen Adwind .apk files that can run on Android OS, however iOS and BlackBerry are out of the scope of this platform.

It seems Adwind is all about Java. Why do you think it is so?

Java applications by design should be platform independent. While certain system architectures are quite specific and there is a set of Java libraries designed for them, general purpose code may run on any system that has a Java runtime environment installed. This makes Java a very convenient platform for which to develop malware that can run on any platform.

Do you know the total number of victims?

We have our own estimate of targets attacked by this malware. It is more than 443,000 covering the period from 2013 to the beginning of 2016.

What is the geography of victims?

The geography of victims changed over time. In 2013, Arabic and Spanish-speaking countries were the top targets. In 2014, the most attacked countries were Turkey and India, followed by UAE, the US and Vietnam. In 2015, Russia was the most attacked country, with UAE and Turkey again near the top, along with the USA, Turkey and Germany.

What are the attacked industries?

During their investigation the Kaspersky Lab researchers were able to analyze nearly 200 examples of spear-phishing attacks organized by unknown criminals to spread the Adwind malware, and were able to identify the industries most of the targets worked in:
  • Manufacturing
  • Finance
  • Engineering
  • Design
  • Retail
  • Government
  • Shipping
  • Telecom
  • Software
  • Education
  • Food production
  • Healthcare
  • Media
  • Energy
Map_of_adwind_final
Based on information from Kaspersky Security Network, the 200 examples of spear-phishing attacks observed in the six months between August 2015 and January 2016 resulted in Adwind RAT malware samples being encountered by more than 68,000 users.

Who are the clients of Adwind? Where are they from? How many? Are they APT actors?

To begin with, Adwind only had a Spanish interface; however it now also has an English interface and is recognized by cybercriminals from many countries. We believe that clients of the Adwind platform fall into the following categories:
  1. Scammers that want to move to the next level (using malware for more advanced fraud)
  2. Unfair competitors
  3. Cyber-mercenaries (spies for hire)
  4. Private individuals that want to spy on people they know

How is this different from any other APT attack?

Adwind is not an APT attack. It is a platform with rich capabilities that cybercriminals can use to conduct cyber-espionage.

Are there multiple variants of Adwind? Are there any major differences in the variants?

There have been multiple generations of Adwind, which has been continuously developed and supported since at least 2012. The differences are mostly about malware features and available modules, however all variants rely on the same basic scheme of client-server communication. It’s designed to send commands in an ad-hoc manner, which introduces a constraint of controlling a large number of compromised machines. We believe that it’s not suitable for even medium-sized botnets and used only for targeted network penetrations.

Is the command-and-control servers used by Adwind still active? Have you been able to sinkhole any of the C&Cs?

The Adwind malware is used by hundreds of criminals, which means that there are hundreds of command and control servers. Some of them are down, some are up, the others are turned on as required. It’s not easy and not efficient to take them down in the traditional way. Most of them rely on free Dynamic DNS providers and are not real domain registrations.

Who is responsible for this threat?

We cannot speculate publically about attribution.

How long have the attackers been active?

The users of Adwind malware have been active since at least 2012 with a large spike of users at the end of 2015.

Did the attackers use any interesting/advanced technologies?

Generally speaking, the Java platform is not a common platform for malware at all. It is mainly related to the requirement of having a Java runtime environment on the victim’s system, the size of the generated code and availability of decompilers for Java classes. The author of the Adwind malware attempted to solve all these problems by introducing a number of workarounds.

Does Kaspersky Lab detect all variants of this malware?

Kaspersky Lab products detect all variants of this malware that we know about. The full list is available in the Appendix of our public report.

Are there Indicators of Compromise (IOCs) to help victims identify the intrusion?

Yes, there are many known domains and IP addresses used by the Adwind attackers. The full list is available in the Appendix of our public report.

What is JSocket? How long does it exist?

JSocket is the latest reincarnation of Adwind RAT, and available through online subscription. It was launched in June 2015 and is still running.

What is the problem with just interrupting the JSocket service?

Interrupting the service by suspending the domain or taking down the server wasn’t efficient in the past and led to yet another rebranding and restart of the platform.

What is the difference between JSocket and Adwind?

The Adwind RAT and the JSocket RAT are based on the same source code and were most likely developed by the same author. While Adwind was abandoned some time ago, JSocket still exists and is just another “brand” of the same RAT. As JSocket is the latest variant of the backdoor it has many more features and a rebuilt UI.

How many people you think are behind the whole MaaS platform?

We believe that the platform is in the hands of just one hardworking individual, who sometimes outsources tasks to external developers.

You estimated the revenue of the whole service as 200k per year. How did you calculate this figure?

Based on users’ activity on the internal message board and some other observations, we estimated a number of users in the system as 1,800 by the end of 2015. By making certain assumptions on the percentage of paid accounts, service costs and most probable distribution of the paid customers, we concluded that such a service may generate up to $200K USD annually. However, this is just an estimation of revenue, which doesn’t necessarily mean that the author has already received this money. One important fact is that the latest version of the portal was launched only in summer 2015.
- See more at: http://blog.rigotechnology.com/2016/02/10/adwind-rat-malware/#sthash.NGXGEmck.dpuf