Inside Man Tampered With Random Number Generator to Generate Lottery Results

We’ve recently reported about how a group had managed to track down and exploit a flaw in lottery machines, giving them the ability to print off winning tickets. Now it would seem that investigators have finally managed to track down the methods that Eddie Raymond Tipton, other gentlemen charged with tampering with lottery results, managed to win the lottery on not one but several occasions. It all turned out to be because he was able to act like an inside man and tamper with the random number generator that’s used to select the winning lottery balls.

At the time of the offense, Tipton was the information security director of the multi-state lottery associated. Using this authority he was able to access the random number generator room where he installed several dynamic link libraries (DLLs) to random number generators system. The reason it’s taken so long for the methods used to be determined is because there wasn’t a set pattern, not every result was predictable but as it turns out, some were.

Triggered on three particular days of the year, one at a certain time of a day while the other two were triggered on specific days, the software would then instead of creating random numbers use a provided algorithm, one that Tipton was aware and could calculate the results of.

Hacker Who Created Fake Game Listing On Steam Says More Vulnerabilities Will Be Found

Earlier this week Ruby Nealon became famous on the internet for managing to get a game onto Valve’s steam store without anyone at Valve even knowing about it. The Watch paint dry game raised concerns about the system Valve has in place when it comes to Steams content, with him saying that more vulnerabilities will be found on the platform.

Nealon states that it was an HTML-based attack that let him post the game without anyone at Valve approving or even seeing the game before it went live. With this exploit noted and fixed, Nealon went on to point out a way of inserting scripts into pages, potentially taking details from a Valve administrator who wanted to check out their games page. This second exploit was then fixed, although Nealon doesn’t seem too impressed with Steam’s website.

In discussions with ArsTechnica, Nealon told them that “it looks like their website hasn’t been updated for years” and even went on to say that “Compared to even other smaller Web startups, they’re really lacking. This stuff was like the lowest of the lowest hanging fruit.”.

Nealon wasn’t just upset with the website, though, saying that he won’t be hacking Steam’s platform anymore due to a lack of recognition from Valve on the matter. Nealon wrote on his site saying that the exploit he used for posting the “watching paint dry” game he had tried to contact Valve for months about, but it was only fixed when he publicly demonstrated its viability.

Nealon isn’t happy with Valve’s lack of a bug bounty system, a program where users are rewarded for alerting the company about bugs and issues in their software, something that even apps like Uber have started in recent weeks. In his “won’t be finding bugs anymore for Valve because there are plenty of companies that appreciate the time and effort put in by security researchers” and even went on to explain how the entire process had made him feel like “Valve were exploiting me”.

Steam isn’t a service that’s immune to hacks either, last year it was hacked and allowed people to bypass the two-factor authentication required to log into an account from a new machine. They’ve even accidentally exposed users details before, no external help required for that blunder.

Personally, I feel like anyone who puts time and effort into finding a problem and then revealing it to a company should be rewarded, not brushed under a matt and ignored until it becomes an issue the public are aware of.

Man Pleads Guilty To Leaking US Military Aircraft Blueprints

When it comes to security and privacy, there is little more protected than military details. As a result, the information is often protected by several layers of protection, and even if these are breached the chances of it going unnoticed are even slimmer than being able to gain access in the first place. Something Su Bin found out the hard way when he pleaded guilty to leaking US military aircraft blueprints. Su Bin, a Chinese national, has pleaded guilty to illegally accessing sensitive military data and distributing this material to China for financial gain. Bin’s role in the scheme was to obtain access to Boeing and other companies servers, in the process retrieving information about their military aircraft

Su Bin, a Chinese national, has pleaded guilty to illegally accessing sensitive military data and distributing this material to China for financial gain. Bin’s role in the scheme was to obtain access to Boeing and other companies servers, in the process retrieving information about their military aircraft such as the C-17 and even fighter jets. Once he obtained access, he told two associates, un-named in his plea deal, which servers to hack and what information was useful on the projects. He even provided a translating service, converting the documentation from English to Chinese before sending it back to China, all at a cost.Sending both server details and names of US executives (and their emails)

After being caught in Canada in 2014 and then extradited to the US last month, Bin will now be charged with stealing data listed on the US Munitions List contained in the International Traffic in Arms Regulations.

With countries becoming more and more aware of the risks and dangers regarding the digital world, catching anybody is a stark warning that just because you can do something, doesn’t mean that you will get away with it.

Apple Vs The FBI is Over!

The legal case of the year is over already. Apple vs the FBI is over in a court case that saw the question of security vs privacy raised on a national, and even global, level. After cancelling a court hearing with Apple, the FBI have officially closed the court case.

It would seem that even without their assistance, the FBI claim to have managed to break into and access the data required on the iPhone in question. In their response, the FBI stated that the new hack was “sufficiently plausible” to a point where they could stop pursuing Apple’s assistance.

Currently, there is no information about who performed the hack or how many iPhones the hack works against. With so little information about the hack, it’s hard to tell if the court case could reemerge in the future with over a hundred phones in government control still locked.

In their response the Department of Justice reminded us that they would continue to gather information from encrypted devices, saying that “It remains a priority for the government to ensure that law enforcement can obtain crucial digital information to protect national security and public safety”, and then there is a small reminder that with or without help, “either with cooperation from relevant parties or through the court system”.

Hackers Leave Advice for Breached Security Company

Security firm Staminus servers have been taken offline today, following a supposedly successful cyber-attack on their network. The Newport Beach, California-based hosting and distributed denial of service (DDoS) protection company went down at 8 am EST on Thursday, with the company communicating details of the event via Twitter citing it as a “rare event [that] cascaded across multiple routers in a system-wide event.”

This ‘rare event’ was quickly revealed to be a far more deliberate malicious act against the company, with a data dump of Staminus’ servers being posted to the internet shortly afterwards. This leak contained the details of a large number of customer names and email addresses as well as their database table structures, routing tables and other crucial operational information. An unnamed Staminus customer verified the contents of the hack, confirming that his details were among those released in the dump. The posters of the dump declared that they had managed to gain access to all of Staminus’ routers and networked systems, resetting them to factory settings.

The dump begins with a note from the hackers responsible for the breach, titled “TIPS WHEN RUNNING A SECURITY COMPANY.” This preface detailed a number of security flaws found while breaching Staminus’ systems in a sarcastic style:

  • Use one root password for all the boxes
  • Expose PDU’s [power distribution units in server racks] to WAN with telnet auth
  • Never patch, upgrade or audit the stack
  • Disregard PDO [PHP Data Objects] as inconvenient
  • Hedge entire business on security theatre
  • Store full credit card info in plaintext
  • Write all code with wreckless [sic] abandon

While no credit card information was visible in the dumped data, doing so unencrypted goes against Payment Card Industry (PCI) security standards and inappropriate for any company handling such details, especially one claiming to be in the security business.

Also laid bare was the colourful selection of customers that Staminus served. From a number of small gaming server operators, including those for Minecraft all the way to the Ku Klux Klan, it was found that the KKK’s official website was in fact hosted by Staminus, as well as a number of affiliated sites such as the American Heritage Committee.

While Staminus claimed that service had been restored globally, many customers took to Twitter claiming that it was not the case. Since then, the only communication from the firm has been the announcement of a statement from their CEO, which is linked to their (currently offline) site. When Staminus will regain full functionality of the network is anyone’s guess, however, it will be interesting to see how the company will recover from this major event.

FBI Employees Details Published by Hacker

The Federal Bureau of Investigation (FBI) are known for being involved in all kinds of work, from exposing corrupt judges to fighting malware. They have also been known to take part in some hacking, from using ethically questionable equipment to zero-day exploits. Imagine the irony then when hackers threatened to release information about twenty thousand FBI employees, only to then carry out that threat and expose the FBI employees details online.

The hackers, who posted from the twitter account @DotGovs, claimed that by hacking the Department of Justice’s (DOJ) database, they were able to obtain the information. This information was released only a day after posting similar information on 10,000 Department of Homeland Security employees.

Listing their names, phone numbers and emails addresses the information, if revealed to be true, could be dangerous to both the government and the employees listed in the data breaches. Peter Carr, speaking on behalf of the Department, told CNN the following.

“The department is looking into the unauthorized access of a system operated by one of its components containing employee contact information. “This unauthorized access is still under investigation; however, there is no indication at this time that there is any breach of sensitive personally identifiable information. The department takes this very seriously and is continuing to deploy protection and defensive measures to safeguard information. Any activity that is determined to be criminal in nature will be referred to law enforcement for investigation.”

Stating that there was no “sensitive personally identifiable information” is one thing but if it reveals names, numbers and emails, that’s personal enough for me. The hackers tweeted saying “When will the US government realize we won’t stop until they cut relations with Israel”. This following on from their initial boast of “FBI and DHS info is dropped and that’s all we came to do, so now its time to go, bye folks! #FreePalestine.”.

If this information is found to be genuine it represents a clear breach of the DOJ’s systems and the employees of several major governmental organisations.

Bohemia Interactive Confirms DayZ Forum Hacked

DayZ see’s players fight off and survive in a harsh apocalyptic world where zombies are the second most dangerous thing, only after the other players that want all your stuff. Seems someone took that one step further and have taken people’s login details for the DayZ forums.

With reports that it was hacked as early as last week, Bohemia Interactive (the creators of the standalone game, based on the popular mod) have sent an email round to their forum members stating the extent of the hack and the details that were obtained during the hack.

Greetings,

A security incident occurred on forums.dayzgame.com recently. According to our investigation all usernames, emails and passwords from forums.dayzgame.com were accessed and downloaded by hackers.

While the passwords were not stored in plain text, but in a more secure form, it is highly recommended that if you have used the same password elsewhere you change it immediately on all applicable websites and services.

We would like to apologize for the inconvenience caused, and share with you one of the major changes planned in order to mitigate similar risks in the future. We will be replacing the IPBoards login system with Bohemia Account within the next two weeks. As Bohemia Account is a separate custom-built service currently used by Bohemia Interactive Forums and Store, it offers much better security and its use should prevent similar incidents going forward.

We ask for your patience over the next few days and weeks as we implement this and other security overhauls, as there are likely to be service interruptions and forum unavailability from time to time. In particular, the forums will be down until migration to the Bohemia Account is complete. We will keep you up to date on vital info and scheduled down-time on the site itself and via our Twitter.

Yours sincerely,

Bohemia Interactive

While everything from usernames and emails was taken,  the passwords were luckily encrypted in some way. We highly recommend that you change your password for the DayZ forum and any other sites or services that you use that password for (recommended that everything has a unique password in future, helps prevent breaches like this affecting other accounts).

While hacks are becoming more and more common, sites like these need to respond quicker and alert their users as soon as they detect the hack, a whole week is a lot of time to have access to people’s emails and social media accounts (all of which could be done using your email and potentially your password).

The Division Beta Has Already Been Hacked

The Division is a third person cover shooter set in a mid-crisis New York City and the latest entry in the highly acclaimed Tom Clancy’s franchise. Developed by Ubisoft Massive, the studio decided to grant access to the game prior to release, and launch a fairly extensive beta. Ubisoft’s history on the PC platform when it comes to optimization isn’t great, so this provided a valuable insight into the game’s performance. While it’s far from perfect, the overall picture is pretty good and should work well providing you turn off NVIDIA’s advanced effects. Unfortunately, I really don’t like the game’s dull, dreary hue which makes the open world appear lifeless. Perhaps, that’s the idea to properly depict a world in chaos, but I’d like to see more vibrant colours.

Despite this, the gameplay is really fun especially when you team up with a few friends. However, according to initial reports, the game hasn’t got an effective anti-cheat system and hackers have already found a number of exploits. Reddit’s member ‘division_throwaway’ explained:

“However, without stating anything specific on how to ‘cheat’ in this beta. It’s scarily simple.

Everything from ammo count, level XP, Dark Zone currency, player speed are all CLIENT trusted, and take time to sync via server time.

For example. Infinite ammo is possible by removing the instruction that’s responsible for adding/subtracting ammo into your player structure.

Speedhacking is possible by modifying the delta time used in the game’s update.”

Here we can see clear video evidence of the terrible anti-cheat system in operation:

Hopefully this is restricted to the beta because the game will just become a mess, and gain a reputation for having a terrible community. Surely, Ubisoft is aware of the impact of cheating on a multiplayer focussed game and has measures in place to protect players. If not, then The Division really could struggle to maintain a loyal player base after a few months of being released.

The Unique World Of 2016 Cyber Security Predications

2016 is here and I still want my hoverboard, by this, I mean an authentic Back to the Future machine and not the cheap plastic device that is currently being marketed. Anyway, this year promises to be compelling for a number of reasons including Cyber Security and the nature of locking data away from the many threats that now lurk within the Cyber walls. Various individuals have had their predictions concerning the coming year’s potential cyber security issues and I thought it would be interesting to convey a selection of the many theories below.

A Cyber Attack will look to exploit the 2016 US presidential election
This may be classed as an outside possibility, even though it would be technically possible whether it will happen is a different matter, this prediction arrives courtesy of Ryan Olson, director of threat intelligence for Palo Alto Network who states that hackers could look to obtain private information from candidates via emails or social network accounts.  Any sensitive information that might be released could, in theory, sway an election, unless you’re Mr Trump who says what he thinks anyway.

Virtual Boarders that control access to the Internet
This theory is far from new, but could be a reality if certain powerful figures are able to exert major control over the internet.  According to Kaspersky Lab, we could see a development of Internet borders that divide access to information along country lines.

Hacked data could become a huge commodity
2015 became the year of the hack and included everything from Dating websites to the leaking of huge databases containing sensitive government details, according to Dmitri Alperovitch, CTO and co-founder of Crowdstrike, who states that hackers are aiming to build up huge stocks of information that contain multiple strands of data. This could lead to blackmailageddon, or something equally terrifying, whereby extortion attacks on individuals and companies are widespread.

Chinese VS Russian Hackers
This one sounds like an opening scene from Rush Hour, but no, according to experts with IID predict, as China’s economy stops growing, many cyber hackers might turn from Cyber espionage to cybercrime. This could then lead to criminal activity that is far bigger than that of Easton Europe.  Is it possible?  You never know considering the technical expertise many hackers possess in china.

Cyber attacks will destroy a major brand or product.  
This prediction from Mark Painter who is a security evangelist for Hewlett-Packard Enterprises is quite feasible considering the many holes which exist within certain tech products.  This individual states that “We are increasingly close to finding out in 2016 if a major product will shut down due to security issues”. Adobe Flash springs to mind considering we all know companies would quite happily cut their losses if a product becomes more trouble than it’s worth.

Will any of these come true?  Only time will tell, especially if Ronald McDonald becomes president.

Image courtesy of PCWorld

Global Bot Network ‘Dorkbot’ Busted and Taken Down

There are two well-known groups that both use the name Dorkbot, one being a great group of organizations that sponsor grassroots meetings of artists, engineers, designers, scientists, inventors, and anyone else working under the very broad term ‘electronic art’. The other one is part of the dark side and it is, or rather was, a large bot network of worms that spread through instant messaging, USB drives, websites, and social media sites.

The Dorkbot network has been watched since 2011 and had over a million systems infected with 80,000 to 120,000 more each month according to Microsoft. But now the law enforcement agencies around the world have put a stop to it thanks to the FBI, European Cybercrime Center, and the Interpol Digital Crime Center while being assisted by Microsoft in tracking down the control servers.

The network was stealing pretty much anything it could get it hands on such as Facebook and Gmail credentials, Netflix accounts, but also PayPal and other payment credentials. This is just the latest in many botnets that have been cracked lately and it is nice to see the officials doing something about this nuisance of hackers that plague the internet. At the same time, senates and legislators are trying to push for harder penalties for operators and users of botnets.

At the time of writing, there was no news whether they had any leads on who was behind the network and controlling it or whether they just managed to take down the network itself.

Microsoft Outlook Web App Vulnerable to Password Hacking via “Backdoor”

Typical Microsoft, the tech giant has more backdoors than Disneyland and World put together; the latest vulnerability that has been unearthed by researchers is a pretty serious breach and allows an attacker the option to steal e-mail authentication credentials from major organizations.

So what is it this time? The Microsoft Outlook Web Application or OWA in question is an Internet-facing webmail server that is being deployed within private companies and organisations, this then offers the ability to provide internal emailing capabilities. Research and subsequent analyses undertaken by security firm “Cybereason” has discovered a backdoor of sorts in the form of a suspicious DLL file. This file was found to be loaded into the companies OWA server with the aim of siphoning decrypted HTTPS requests.

The clever part of this attack is the innocuous nature of deployment in the form of the file name that was the same as another legitimate file; the only difference was the attack file was unsigned and loaded from another directory. According to Cybereason, the attacker (whoever it might be, mentioning no names) replaced the OWAAUTH.dll file that is used by OWA as part of the authentication mechanism with one that contained a dangerous backdoor.

Thus, this allowed attackers to harvest log in information in plain decrypted text, even more worrying is the discovery of more than “11,000 username and password combinations in a log.txt file in the server’s “C:\” partition. The Log.txt file is believed to have been used by attackers to store all logged data”.

The attackers ensured the backdoor could not be removed by creating an IIS (Microsoft Web Filter) that loaded the malicious OWAAUTH.dll file every time the server was restarted.

Indeed, yep, same old same old then, breaches of passwords is worryingly common in the digital age, there needs to be a radical re think of security infrastructure. I do feel companies are using tech as a cheaper alternative without investing in system protection or even real-time analyses, servers and communication lines are being ignored to the point whereby attackers have free reign over such systems. I wonder as I write this as to what else is being siphoned to individuals and attackers, if I see next the formula for Coke in China own brand cola, then it will make sense.

Thank you cybereason for providing us with this information.

Image courtesy of thehackernews

Hosting Companies Could Be Hit With New DDoS Attack

Denial Of Service (Or DDoS) attacks have become more and more frequent in recent years with the expansion of the internet and the speeds it can deliver information. A denial of service attack is pretty simple, you find the device you wish to disrupt and send as much data as you can to it, this means that the device quickly becomes overwhelmed and unresponsive, this can be anything from your home router to a world championship tournament.

Level 3 Communications is an American telecommunications and internet service provider company and is considered one of the main bodies for internet within the US. Their chief security officer, Dale Drew, has warned that people may have figured out how to abuse Portmap services to conduct a new form of DDoS attack, one which could have the “potential to be very, very bad”.

Portmap is an open source utility used on both Unix and windows systems, meaning that all operating systems will potentially be open to this new kind of attack. Portmap works by mapping a location and port number to essentially bind and access anything from a networked hard drive to accessing your computer from work over the internet. Either way when someone says that these ports are often left open, you can understand why being able to send lots of unwanted information to a home system could become a problem.

When ports are queried they tend to respond with lots of information about the system or just why it’s saying “NO!”. The problem you often have though is that when you get a response, groups are able to redirect this information to other networks, causing the DDoS attack, all the while the information is coming from your average family router at home.

This particular type of attack is aptly called a DDoS amplification attack, as you can probably tell, it will often result in a lot of people being affected, normally by abusing systems which a lot of people don’t realise are doing anything bad.

Level 3 has contacted ISP’s and forwarded details of those running open Portmap servers, hoping that this way they can quickly resolve the issue before it’s abused too much.

Thank you PC World for the information.

Image courtesy of West End Solutions.

Researchers Create Silent Mac Worm

Macs have often be heralded as safe, or rather safer than Windows PC’s. This has often been accredited to the fact that unlike windows, developing applications on a Mac requires you have a particular license. With fewer people able to program, it is said to lead to even fewer people programming nasty stuff. In a recent study Mac, OS and iOS actually came up as more vunerable than Windows, once again attacking at this belief that Windows based systems are the most dangerous computers to own. Ahead of a presentation though, Xeno Kovah, Trammell Hudson and Corey Kallenberg have demonstrated that Mac’s are still vulnerable to the same problems windows PCs suffer from.

Firmware is the software in your computer that controls how it interacts with the hardware you own, so for example when you buy a new USB stick and it starts to download the drivers, these are examples of firmware. The problem being that most security systems don’t check these while wiping your computer and reinstalling your operating system will not touch the firmware, they will still be present on your computer. In this example it means you could be sent to a site to download drivers to help you play your latest game, and along comes a virus that will hide in plain sight and probably not get picked up by your security software, meaning you’ve installed a virus over the internet and won’t even know about it till it’s too late.

The researchers have alerted Apple and they have already fixed one vulnerability and are working on the next now.

Thank you Wired for providing us with this information.

Epic Games Forums Taken Down After Hack

There is no shortage of victims in hacking cases these days, it seems like it’s the hobby of the generation or something. The latest victim is Epic Games who had their forums hacked and as a consequence they have temporarily taken the forums down and disabled them until the situation has been dealt with.

A round of mass emails went out this morning informing signed up users about the security breach and effects there off. It is still unclear how much information the hacker made off with, but the hack might have resulted in access to your usernames, passwords, email addresses, and date of birth that you provided when you signed up.

“We have just discovered that the Epic Games forums located at forums.epicgames.com were compromised by a hacker. We are sorry to report that the incident may have resulted in unauthorized access to your username, email address, password, and the date of birth you provided at registration.”

Epic Games is strongly suggesting that you change your password on any other site that might use the same combination as on Epic Games forums. One should never use the same password and user combination more than one place, but we also all know that a lot of people do it for convenience.

The affected forum site covers UDK, Infinity Blade, Gears of War, Bulletstorm, and prior Unreal Tournament games. However, the separate forum sites covering Unreal Engine 4, Fortnite, and the new Unreal Tournament were unaffected.

Kelly Brooks Private Pictures Hacked for the Second Time

So they are at it again, the hackers just can’t seem to leave the celebrities alone, especially when it comes to their own private images. This time, it is round two for former model Kelly Brooks who was targeted in the original hacking scandal back last year.

Despite Kelly Brooks denying that she had any private pictures, tweeting:

“The only nude photos you’ll ever see of me are the ones that I “leak” and the ones that my head are superimposed on”

She then confirmed that the most recent leak were in fact real during a Twitter conversation between her and David McIntosh.

Now this isn’t the first instance of this happening, back last year we had multiple celebrities hacking their private stash hacked and posted online, which has been dubbed ‘The Fappenning’. A few other celebrities caught up in this are Jennifer Lawrence and Kaley Cuoco.

What is there to gain for the hackers doing this to these people? Is it a form of ‘knocking them down a few pegs’? Ego boost? However, it can then be something blamed on the celeb’s themselves as to why they are taking these images and not storing them securely in the first place.

Thank you HuffPost for providing us with this information

Lenovo’s Website Hacked, Teenagers, High School Musical Take Over

Lenovo’s website has been hacked. In what is probably in response to the Superfish scandal, Lizard Squad took over their website in quite a bizarre fashion.

Their homepage was replaced with images of teenagers accompanied by music from ‘High School Musical’. The hack was very brief, with the site already back up and running.

Superfish essentially throws out ads on pages like Google that appear to match your search results. It seemingly does such a thing in Chome and Internet Explorer. It also provides annoying popups – something very common with adware. Superfish is dangerous as well as annoying. It appeared that the software was implementing a man-in-the middle attack by using a self-signed certificate authority, which allowed it to decrypt secure connections, such as those to your bank account or when you’re making a purchase.

Lenovo has since apologised, however it’s an apology some are clearly unhappy with.

Source: The Next Web

AMD Gaming Evolved App Powered by Raptr Was Hacked

There isn’t long between the high-profile hacks these days and this week starts out pretty bad for the AMD Gaming Evolved App powered by Raptr. The service has sent out emails to users informing them about the hack and urges them to change their passwords.

There shouldn’t be any direct risk and saved up rewards are secured. Compromised details include sign up names, usernames, email addresses, and password hashes.

Raptr security update: Please change your password

Maintaining the highest level of security around your Raptr account information is of the utmost importance to us, so we’re very sorry to inform you that some Raptr user data may have been recently compromised in an attack similar to hacking activities that have targeted other high-profile sites and services such as Xbox Live and Sony’s PlayStation Network.

User names, email addresses, password hashes, and some first and last names may have been accessed. This means that although the passwords are hashed, users with weak passwords are vulnerable to unauthorized access. It’s important to note that our two-factor authentication system used for redeeming Raptr Reward Points ensures that even if your Raptr account was among those compromised, the points you’ve earned as a Raptr member are protected.

Although the potential risk to Raptr users is pretty minimal, we urge you to access any accounts on other sites and services in which you use the same login and password associated with your Raptr account and change the related password(s) immediately.

Reset your password at your earliest convenience in order to help safeguard your Raptr account. In doing so, we strongly advise you to use a password that is reasonably complex and not associated with another site/service account.

If you have any questions or concerns, please don’t hesitate to contact Raptr’s Customer Service group.

We’re extremely sorry about this situation and are committed to further improving account security going forward.

Sincerely,
Dennis Fong
Founder & CEO, Raptr

Thanks to Videocardz for providing us with this information

Crayola Facebook Page Hacked – Flooded With NSFW Content

When you think of Crayola, you think of youthfulness and innocence, a child scribbling with his or her favourite colour crayons perhaps. What you don’t think of is “The Worst Kind of Boobs”, “Reasons why girls don’t give blow jobs” and “Disney For Adults”.

That pretty much summarises what happened to the company’s Facebook page this past weekend after it was hacked and flooded with racy and sometimes mildly pornographic content.

The company did eventually get back in control of the page, but fortunately Adweek managed to screenshot some of the offending posts.

Source: Adweek

US Central Command’s Twitter and YouTube Hacked by ISIS

It appears that the Twitter and YouTube accounts of the US Central Command have been hacked. The hackers seem to associate themselves with ISIS. As of writing, the Twitter account has been suspended, while the YouTube page is still up carrying a load of ISIS propaganda.

They’ve posted a number of documents, including links to those documents, which seem to contain personal information regarding US troops. With the Twitter account having been shut down, most of that data has now gone.

The US Central Command or any department of US government has yet to issue a statement on the matter, but we’ll update you with a further article as this story develops.

Update: CENTCOM released a statement calling the hack “a case of cybervandalism” and added that “no classified information was posted and that none of the information posted came from CENTCOM’s server or social media sites.”

Earlier today, U.S. Central Command’s Twitter and YouTube sites were compromised for approximately 30 minutes. These sites reside on commercial, non-Defense Department servers and both sites have been temporarily taken offline while we look into the incident further. CENTCOM’s operational military networks were not compromised and there was no operational impact to U.S. Central Command. CENTCOM will restore service to its Twitter and YouTube accounts as quickly as possible. We are viewing this purely as a case of cybervandalism.

In the meantime, our initial assessment is that no classified information was posted and that none of the information posted came from CENTCOM’s server or social media sites. Additionally, we are notifying appropriate DoD and law enforcement authorities about the potential release of personally identifiable information and will take appropriate steps to ensure any individuals potentially affected are notified as quickly as possible.

Source: The Next Web

Sony Pictures Brought to a Halt – Hackers Have Taken Over

A (now deleted) member of the Reddit community has recently brought to light that all Sony Pictures staff have been locked out of their office systems, with the warning message above being displayed on every single monitor. The original thread can be found here, with various user reports of people who have friends, or friends of friends confirming this information.

We’ve come to learn that all Sony staff have been sent home until further notice, while the Sony executives figure out what to do with this issue at hand. Sony have shut down all their computers in Los Angeles as a precaution and are working on recovering their functionality.

Here’s a quick run down on the data avaialble as shown in the above image, by Reddit user tehrabbit:

“ZIP file contains 3 files, LIST1, and LIST2 followed by a “Readme” file.
The Readme contains a list of e-mails.
the “#GOP” refers to “Guardians of Peace” apparently.

Contents of README.txt:

These two files are the lists of secret data we have acquired from SPE.
Anyone who needs the data, send an email titled ��To the Guardians of Peace�� to the following email addresses.
marc.parker-8t52ebo@yopmail.com
emma.murphy-0ohbp3m1@yopmail.com
lisa.harris-cxkjch3@yopmail.com
john.murphy-7o2h3uh3@yopmail.com
axel.turner-ffqbv9c@yopmail.com
lisa.harris-ezd6e1j@yopmail.com
mike.morris-f2iyqki@yopmail.com
abc@spambog.com
lena@spambog.com
john@spambog.com

In Addition, The two files, LIST1 and LIST2 seem to contain file names of several PDF, DOC, and Excel files related to Internal Financial Reports.

File size information:
638359749 list1.txt
397802180 list2.txt

Rather large text files, mostly just a list of what looks like the contents of a fileserver.

Some members have tested the above email address’, but receive no confirmation or immediate response when the special pass-code is sent. This is rumored to be because these hackers will be sending out all of the information in one hit as the deadline is met. What exactly will happen when the deadline is reached? We’ll have to wait and find out.

We will continue to report as the story develops here on eTeknix.

Canon Printer Hacked to Play Doom

Security flaws can be demonstrated in many ways, and usually it is pretty boring to watch and read about. Not so this time, as Michael Jordon shows us how to play Doom on a Canon Pixma wireless printer. Using a security flaw in the printers web administration-interface, he was able to run doom on the printers very own LED display.

Like it is with so many connected smart devices, these printers lack the most basic forms of security out of the box. While it does use a simple encryption, there is no pre-setup passwords and it is a plain login method that is used. Normally the worst someone could do after hacking your printer, would be to print thousands of test pages until the ink cartridges become empty. Not so in this case, as this is a lot worse. Michael Jordon learned that he not only could update the firmware at will, he could even tell the printer what location to get the firmware from.

This flaw has big potential, if one were to build a custom firmware and sneak it onto a device with the security flaw. Not only would it allow the hacker to spy on anything that is printed and otherwise going on inside the network, he could further use it as a bridge and gateway to infect other systems on the network

“If you can play Doom on a printer, you can do a lot more nasty things,” Jordon said while Canon provided the following statement regarding the issue:

“We thank Context for bringing this issue to our attention; we take any potential security vulnerability very seriously. At Canon we work hard at securing all of our products, however with diverse and ever-changing security threats we welcome input from others to ensure our customers are as well protected as possible.

We intend to provide a fix as quickly as is feasible. All PIXMA products launching from now onwards will have a username/password added to the PIXMA web interface, and models launched from the second half of 2013 onwards will also receive this update, models launched prior to this time are unaffected. This action will resolve the issue uncovered by Context.”

If you’d like to see a video of Jordon playing Doom on the printer display, you can follow this link to the MP4 file. The display might not support all the colours of the game, but there is no doubt about what game it is.

Thank you Contextis for providing us with this information

Images and video courtesy of Contextis

5 Million Gmail Passwords and Usernames Leaked

First Apple had their iCloud fiasco, and now the business giant Google has seen 5 million of its users have their usernames and passwords published online.

The evidence of this has been seen on Russian forum boards, incorporating a comprehensive list of all the people affected and are now seencirculating around file sharing websites. But according to Google, this issue is not due to a direct leak of Gmail services, with experts claiming that this list was most likely compromised over a long period of time with the information being stolen from other websites.

Thanks to The Next Web, we were able to read the direct statement from a Google spokesperson which reads:

We have no evidence that our systems have been compromised, but whenever we become aware that accounts may have been, we take steps to help those users secure their accounts.”

Since the leak, the forum linked above has purged the passwords in the original text file, with only the login information remaining. But, if you’re a cyber-criminal looking to take advantage of the situation, the original poster claims that at least 60% of the uncovered account passwords are valid and functional.

We suggest that you change your password just to be safe – and don’t go searching for the document yourself as you never know what you’ll find. Google also suggests you enable their 2-step verification process.

Image courtesy of Create New Gmail Account

There was no ‘Leak’ to the iCloud – Apple Proclaims

We’re sure you’ve seen the above image by now. In recent days, an apparent Apple iCloud hack has seen numerous A-list celebrities have naked pictures and videos leaked all over the internet – stemming from popular image board website 4chan. Some people seem to think they may have even found the original perpetrator in this case.

Apple has now come to their own defence, claiming that it was not in fact an iCloud ‘leak’ but these celebrities have had their personal accounts hacked individually. Apples Natalie Kerris explained:

“We wanted to provide an update to our investigation into the theft of photos of certain celebrities. When we learned of the theft, we were outraged and immediately mobilized Apple’s engineers to discover the source. Our customers’ privacy and security are of utmost importance to us. After more than 40 hours of investigation, we have discovered that certain celebrity accounts were compromised by a very targeted attack on user names, passwords and security questions, a practice that has become all too common on the Internet. None of the cases we have investigated has resulted from any breach in any of Apple’s systems including iCloud or Find my iPhone. We are continuing to work with law enforcement to help identify the criminals involved.

To protect against this type of attack, we advise all users to always use a strong password and enable two-step verification. Both of these are addressed on our website at http://support.apple.com/kb/ht4232.” Business Wire

So although technically not a leak, Apple are claiming that these stars have fallen victim to “social engineering”. Although this is quite possibly true, Apple has already had some serious damage dealt to their reputation surrounding iCloud as a whole since this story surfaced just a few short days ago.

Moral of the story once again? If you’re going to take these kinds of photos, don’t store them anywhere on, at or near the internet!

Stay tuned to eTeknix for more information as it develops.

Image courtesy of 4chan

The Main Suspect behind the Celebrity Nude Leak Denies All Accusations

The leak of hundreds of erotic and nude photos of celebrities quickly got the interest of most of the internet and has dominated the news headlines for the past day already. As it is with every leak, people start to wonder where it came from and who could be behind it. Like before, the users of reddit and 4chan started their own investigation and also got some results quite fast.

They started the claim that the 26-year old web developer Bryan Hamade was behind the hack and leak. This was based on the posted screenshots that appeared online that showed a series of names that could be connected to the web development company Southern Digital Media. At first however they thought it was the 15-year old intern that was the culprit, but quickly changed their target towards the server administrator.

Hamade has given several interviews and is denying any and all allegations that he should be the hacker, saying “I only reposted one thing that was posted elsewhere and stupidly had my network folders visible.”

“I am not the original leaker. The real guy is on 4chan posting intermittently,” Hamade says. “He’s most likely the one behind it, but it does seem the photos passed around to multiple people before being leaked, so it may just be someone who has them and didn’t hack to get them. I’d never in a million years know how to hack into any of the accounts listed. 4chan just attacked me because they like to attack anyone in situations such as this.”

Hamade has also become the target of serious abuse in the wake of the accusations. It’s been a nightmare and he hasn’t slept for 34 hours, he said in a statement to BuzzFeed. He is being bombarded by email threatening him and to hack his websites and calling him at home to insult him only to hang up again. They even said they would hack his mothers website, so he took that down for now.

Hamade really regrets that he shared the photos, specially since he didn’t even get any Bitcoins out of it. “It’s the stupidest thing I’ve done and I hope it won’t ruin my life, though it probably will sine it’s the biggest news story.”

I honestly hope that this story won’t turn into another version of the CCTV investigation by the Reddit community on the Boston marathon bombings, where their identified suspect turned out to be an innocent homeless man, and was found dead. Vigilante actions aren’t the solution.

Apple is currently investigating the breach, but haven’t said anything definite about the attacks yet. “We take user privacy very seriously and are actively investigating this report,” said Apple spokeswoman Natalie Kerris. Some reports also indicate that the photos have been sold on black market sites for some time, but it wasn’t until they hit 4chan that the general population found out about it.

Thank you Business Insider for providing us with this information

Image courtesy of Business Insider.

Celebrities Hacked and Nude Photos Published Online

Image sharing website 4chan has been the breeding ground for many hacking attempts and ‘social justice campaigns’ in the past. Recently users of the large scale image board have been seen to be posting brand new, illegally obtained nude photographs of celebrities including Jennifer Lawrence.

These images are said to have come around through a hack into celebrities iCloud accounts and mobile phones, surfacing on 4chan and Reddit this morning.

Thanks to Mashable, we obtained a statement from Jennifer Lawrence’s spokesperson:

“This is a flagrant violation of privacy. The authorities have been contacted and will prosecute anyone who posts the stolen photos of Jennifer Lawrence.”

It’s unlikely that these hackers will be caught easily – as we’ve seen numerous times in a past, it’s in their best interest to take all measures they can to hide their identities, but we can’t completely count out the possibility of justice being served.

According to those involved, there is quite a large portion of A-list celebrities set to be effected by this hack, those including:

Aly and AJ Michalka, Aubrey Plaza, Abby Elliott, Avril Lavigne, Amber Heard, Brie Larson, Candice Swanepoel, Cara Delevigne, Emily Ratjakowski, Farrah Abraham, Gabrielle Union, Hayden Pannettiere, Hope Solo, Hillary Duff, Jenny McCarthy, Kayley Cuoco, Kate Upton, Kate Bosworth, Keke Palmer, Kim Kardashian, Kirsten Dunst, Krysten Ritter, Lea Michele, Lizzy Caplan, Mary Kate Olsen, Mary Elizabeth Winstead, Rihanna, Scarlet Johansson, Selena Gomez, Vanessa Hudgens, Wynona Ryder, Alison Brie and Dave Franco.

Some celebrities have confirmed the images are real, some have denied but it’s obvious that they’re all not happy.

Since the outbreak of these photos, Twitter has taken action to remove accounts created to spread these leaked images and Apple has provided no comment on possible loopholes within their iCloud service.

This story is ongoing, we’ll keep you all updated. But I guess one question needs to be asked. If you’re an A-list celeb, why are you taking naked pictures in this day and age?

Image courtesy of 4chan

Don’t Count on GTA V for PC and Next Gen Any Time Soon

New rumours are starting to appear that we shouldn’t expect to play GTA V on our PC, Xbox One or Playstation 4 during the Christmas holidays as many had hoped for. Some point towards a 2015 release date while other suggest the project has been completely cancelled.

There are a lot of conflicting information at the moment, and in a way it seems unlikely that it would be cancelled after all the extra effort they put into the PC specific features. The lack of their presence at this years Gamescon on the other hand shows that something could be fishy in the Rockstar pond.

Users have let their rage over this out over at 4chan and their user-base has hacked the Rantic website leaving a message that reads “Dear Rockstar, Hacked by 4chan, Give us our GT5 for PC”. Rantic is a PR company and it’s founder who currently is  known as Brad is also an Rockstar North employee. Brad had shared concerns about the current state of the game on the Rantic website and the chairman backed up the rumours in an interview, saying they (Rockstar) never wanted to create a PC version and only did so due to their customers pressure.

It’s yet to be seen if we get our GTA V on PC and next gen consoles or not, but for now the user-base from 4chan has sent a solid signal to Rockstar. They want it, and they are willing to fight for it. I’m sure Rockstar will be forced to come with some sort of public statement now, something they usually don’t do at all.

Thank you gamersky for providing us with this information

Image courtesy of Rockstar