Security

Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.

Rbcafe » Technology » Security

Dark Matter (Apple vs Wikileaks)

Article found on the Wikileaks :

March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.

Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStarke” are also included in this release. While the DerStarke1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.

Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.

While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.

Article found on the Businessinsider :

Julian Assange’s website WikiLeaks is in possession of what appears to be CIA hacking tools that can target popular computers like Apple’s iPhones and Macs as well as products from other big tech companies like Microsoft and Google. Assange has said that WikiLeaks will share details of the vulnerabilities with Apple and other big tech companies, so they can fix the vulnerabilities that the CIA uses for its hacking tools.

“We have decided to work with them to give them some exclusive access to the additional technical details that we have so that fixes can be developed and pushed out,” Assange said in a press conference earlier this month.

But Apple didn’t sound very grateful to Assange for his “exclusive” offer. In fact, Apple’s public response to WikiLeaks was downright frosty. “We have not negotiated with Wikileaks for any information,” said Apple in a statement provided to Business Insider on Thursday. The statement said that WikiLeaks was just like anyone else, despite its stolen CIA files: It could submit bugs through a standard process, and that while they may have been briefly in touch, Apple hasn’t seen anything that hasn’t been tweeted or posted to the WikiLeaks website.

“We have given them instructions to submit any information they wish through our normal process under our standard terms,” according to the statement. “Thus far, we have not received any information from them that isn’t in the public domain.”

Then, to top it off, Apple says that WikiLeaks, with its public threat to release ways to attack Apple and other tech companies’ products after 90 days if bugs are not “fixed,” is actively working to harm iPhone users:

“We are tireless defenders of our users’ security and privacy, but we do not condone theft or coordinate with those that threaten to harm our users.”

There’s no other way to read this as anything but an unconditional slam on Julian Assange, and essentially, a promise that Apple will not work with him or WikiLeaks.

Apple is not happy with WikiLeaks at all.

Why this matters

What hackers like those that work for the CIA need to really control someone’s phone or computer is what’s called a “zero-day” vulnerability. Zero-days are basically secret bugs that can be used by professionals to break software and gain access to a system. But one problem for the CIA and other hackers is that zero-days expire: as soon as they’re known, the tech companies fix the bug, making the exploit useless. Apple, in particular, kills vulnerabilities all the time, and said all the bugs mentioned in the WikiLeaks files so far have already been patched. (Google and Microsoft are also equally good at squashing zero-days — maybe even better than Apple.) The documents that WikiLeaks is publishing are not code or instructions to recreate an exploit, but strongly suggest that the CIA had an arsenal of zero-days at some point — and if any organization can be expected to have a library of zero-day vulnerabilities, it’s the CIA. This doesn’t just affect Apple: So far, WikiLeaks has dumped two batches of documents from the CIA. The one released earlier this week included details on old Mac and iPhone exploits. The first batch mentioned alleged vulnerabilities in Microsoft Windows and Google Android as well — all patched so far, according to the companies. But WikiLeaks says they have more files they haven’t shown the public yet. Microsoft said in a statement to Business Insider that all the vulnerabilities mentioned in the first WikiLeaks batch have been fixed: “Our investigation confirmed that the information released on March 7 is dated, and the disclosed issues are already addressed in modern systems.” Google said that security updates “already shield users from many of these alleged vulnerabilities.” Google, Microsoft, and Apple have encouraged their users to update their software.

Drip drip drip

The way WikiLeaks is dripping its leaks out in batches leaves companies like Apple, Google, and Microsoft in a tricky position.

These companies can’t really confirm without the code whether the zero-days are legitimate or not. (All they really have is descriptions of the exploits.) But it also can’t wholly dismiss the leaks — or even future leaks — in case some do end up being live exploits. For example, since the vulnerabilities are described in top secret confidential files, it could be legally dangerous for a company like Apple or Microsoft to talk to Assange and WikiLeaks to see purported tools and files that haven’t been made public yet, the Financial Times reported. So companies need to be careful about how they’re talking to Assange. “WikiLeaks made initial contact via secure@microsoft.com and we have followed up, treating them as we would any other finder,” a Microsoft spokeperson told Business Insider. Essentially, tech companies can’t treat WikiLeaks differently than any other bug finder. Making it more difficult is that WikiLeaks seems to be misrepresenting the content of the dumps in its widely-viewed announcements, spurring knee-jerk and potentially misleading news coverage, security experts who evaluated the contents of the dump previously told Business Insider.

WikiLeaks never mentions in its announcement how old any of the various files are, for example. And WikiLeaks uses grandiose language, declaring that the CIA has “lost control of the majority of its hacking arsenal.” Plus, by releasing the leaked files bit-by-bit, WikiLeaks is making it nearly impossible for a big tech company to say that all the problems in the leak have been fixed — what if Assange is sitting on a doozy of a bug? It doesn’t look that way — so far, the security community has been laughing at how old and outdated many of the documents published by WikiLeaks have been.

Not an ally

Speaking privately, tech companies and their lawyers do not see Assange as a defender, as he has been described in the New York Times.

Tech companies aren’t particularly upset at the CIA for finding vulnerabilities in their products, pointing out that most people expect the CIA to develop vulnerabilities — spying is kind of the agency’s purpose — and that the targeted attacks described in the WikiLeaks files are preferable to the mass remote surveillance described in the NSA files leaked by Edward Snowden.

But Assange is not Snowden, and his CIA leaks have not been received warmly in the tech industry. Ultimately, he puts tech companies in a bad position.

Obviously companies like Apple and Microsoft want to patch any possible vulnerabilities as soon as possible, but the way Assange is releasing the CIA files puts them in a terrible position: there’s not enough to go on, it’s possibly illegal to obtain more details, and WikiLeaks is withholding information. So as Assange continues to publish bits and pieces of his trove of files, expect big tech companies to go through a predictable dance: First the files will appear online, and about 24 hours later, you’ll hear that security researchers have found that the files are already old news.

Sources :

https://wikileaks.org/vault7/darkmatter/releases/
http://www.businessinsider.fr/uk/apple-vs-wikileaks-why-tech-isnt-happy-with-julian-assange-2017-3/

Rbcafe » Technology » Security

Dailymotion piraté

Bonjour Utilisateur,

Nous avons appris que suite à un problème de sécurité externe à Dailymotion, les mots de passe d’un certain nombre de comptes pourraient avoir été compromis. Le hack semble être limité et ne concernerait aucune donnée personnelle.

La sécurité de votre compte est extrêmement importante pour nous et nous prenons toutes les mesures nécessaires afin d’identifier les failles éventuelles et y rémedier. Parallèlement et par précaution, nous conseillons vivement à tous nos partenaires et utilisateurs de réinitialiser dès à présent leurs mots de passe. Lors de la saisie d’un nouveau mot de passe, nous recommandons d’utiliser au minimum huit caractères, d’éviter les mots de passe les plus évidents (ex: mot de passe1234) et de ne pas utiliser le même mot de passe sur plusieurs sites.

Pour réinitialiser votre mot de passe, procédez comme suit:

– Allez sur le site Dailymotion
– Connectez-vous à votre compte
– Utilisez le menu déroulant dans le coin supérieur droit pour accéder à vos paramètres
– Sélectionnez Paramètres du compte
– Entrez un nouveau mot de passe et enregistrez les modifications

Si vous utilisez le service Dailymotion dans vos apps ou services avec l’authentification oAuth2 grant_type=password (https://developer.dailymotion.com/api#oauth-client-native-application) vous devez changer le password dans votre app ou service.

Nous voudrions préciser que le meilleur moyen de s’authentifier est d’utiliser le refresh-token service (https://developer.dailymotion.com/api#using-refresh-tokens). Si vous utilisez cette méthode vous n’avez pas de mot de passe à changer dans vos apps et services.

Cordialement,

La team Dailymotion

Les chiffres :

  • 87 millions de comptes Dailymotion piratés
  • DailyMotion.com – 87,610,750 users (Source leakedsource)

Rbcafe » Technology » Security

DomainTools compromised

DomainTools

Yesterday DomainTools experienced a high volume user email harvesting campaign which abused a flaw in our individual membership email update processes. To the best of our knowledge, no DomainTools customer login and password combinations were compromised by this scripting effort. However, the campaign appears to have correctly matched a few hundred current or historic DomainTools account email addresses.

We encourage DomainTools account holders to change their passwords as a precautionary security measure. From our investigation it appears the actor used email addresses from prior well-known breaches and ran those against our email update process. This campaign resulted in the DomainTools website confirming the existence of a limited number of user email addresses in our membership system. From there, the attacker could conceivably attempt login/password combinations sourced from those prior data dumps such as LinkedIn or Dropbox . These large scale data breaches can be researched at discovery sites such as Have I Been Pwned.

We want to apologize to our account holders for the inconvenience this may cause. The security of our users is paramount and despite what initially seems like very limited exposure we wanted to notify all our current and prior active users of this situation. DomainTools has patched the system in question and implemented additional monitoring for any account abuse stemming from yesterday’s activity.

Sincerely,

DomainTools

Rbcafe » Technology » Security

Tor 5.0.4

What’s new inside Tor Version 5.0.4:

  • Update Firefox to 38.4.0esr
  • Update NoScript to 2.6.9.39
  • Update Torbutton to 1.9.3.5
  • Spoof Referer when leaving a .onion domain
  • about:tor should accommodate different fonts/font sizes
  • Don’t translate the homepage/spellchecker dictionary string
  • Don’t show text-select cursor on circuit display
  • Remove unused code
  • Translation updates
  • Remove the en-US dictionary from non en-US Tor Browser bundles
  • Remove dead ScrambleSuit bridge
  • Update meek-amazon fingerprint
  • Isolate favicon requests caused by the tab list dropdown
  • Don’t crash while opening a second Tor Browser

Rbcafe » Technology » Security

Joomla Administrator

Joomla Administrator

 

As a website administrator you might be concerned about the visual appearance of a website but will pass responsibility for making changes and improvements to a web designer. Similarly, when changes to functionality are required you will contract a web developer to do the necessary work. As a website administrator you are responsible for the day-to-day operation and maintenance of the website. Activities might include ensuring that the site is properly backed up; managing user access; possibly installing extensions. You will also have responsibility for maintaining the security of the website.

 

 

Rbcafe » Technology » Security

Bitrix Admin

Bitrix Admin

 

Bitrix Site Manager is the core on which you can build any complex web projects. With Bitrix Site Manager, you do not need any special programming or web design knowledge and skills. Bitrix Site Manager installs to the root directory of a remote server. An administrator can manage sites via the web interface. To function properly, the server configuration should meet the following minimum requirements:

  • Apache web server version 1.3 or higher;
  • PHP version 5.0.0 or higher;
  • MySQL version 4.1.11 or higher / Oracle 10g or MSSQL 2000 or higher;
  • 10 Mb of free disk space (for the Update System).

 

 

Página 1 de 3123
Rbcafe © 2004- | Rb Cafe 1.3 | Contacto Rbcafe | Rbcafe en Twitter | Rbcafe en Facebook | Política de privacidad