Archive for October, 2013


The+Hacker+News+-+Anniversary.jpg
The World’s First Dedicated Hacking and Cyber Security News platform – ‘The Hacker News‘ is celebrating its 3rd Anniversary today.

When we began our journey 5 years back as a Small Local Community of few Hackers and Researchers, we had the dream of providing the Hacking Community with World’s first Hacking News Platform. We wanted to gift them their own trusted news platform.

A Unique Platform which is run by Hackers and was dedicated to hackers, a platform which is free from Censorship, Conventions, Governments and Borders.

In the last 5 years of our Dedicated service to Hacking and Security community we have grown into a huge family of more than One Million Google+ Followers, 200 thousand Facebook Fans, and 100 thousand Twitter Followers with Two Million Readers Monthly and the family keeps growing with new members everyday.

In our journey of THN, we have seen the cyber world growing from Defacement to most Sophisticated cyber crimes of the Decade i.e Stuxnet and Flame Malwares. We have seen individual hacker joining together and making some of the most admired hacking groups like Syrian Electronic Army, Lulzsec, APT China. We have seen the largest hacking collectives like Anonymous group. But we have also seen some of the most celebrated portals being busted by Governments i.e. Liberty Reserve, Megaupload, Silk Road. We have seen the surveillance programs like PRISM by NSA which has threaten our Privacy and Technology. We have seen young hackers giving up their precious lives due to government i.e. Topiary, Barrett Brown, Jeremy Hammond.
Today we are dedicating this anniversary to the courage of Edward Snowden, to the service of Julian Assange of Wikileaks and to the memory of Aaron Swartz.
In between these celebrations, we would like to thank every single Hacker, Researcher, Journalist, Enthusiast who have contributed to our phenomenal growth. We all are obliged to take Security in a Serious way. We promise to serve you to our best.

Make sure that you never miss our latest THN Stories, so Subscribe free updates right straight from our website to your Email Inbox.

./Keep Hacking

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/the-hacker-news-celebrating-3rd.html

Dark Mail Alliance, Lavabit and Silent Circle
Yesterday I learned about ‘Dark Mail Alliance‘, where Lavabit, reportedly an email provider for NSA leaker Edward Snowden and Silent Circle coming together to create a surveillance-proof email technology.
Ladar Levison at Lavabit and Silent Circle CEO Mike Janke, Founders of two e-mail services that recently shut down amid government efforts to nab encryption keys, as well as the larger revelations regarding the NSA’s surveillance efforts.
The newly developed technology has been designed to look just like ordinary email, with an interface that includes all the usual folders i.e. inbox, sent mail, and drafts. But where it differs is that it applies peer-to-peer encryption not only to the body of the digital missive, but also to its metadata (To:, From: and Subject fields) that third parties are most likely to collect.
The encryption, based on a Silent Circle instant messaging protocol called SCIMP and the secret keys generated to encrypt the communications will be deleted after each exchange of messages.
All Dark Mail emails passing over the company’s servers will be encrypted, and it won’t hold the keys to decrypt them. Its servers will be located in Canada and Switzerland.
Our goal is to open source the protocol and architecture and help others implement this new technology to address the privacy concerns over surveillance and back door threats of any kind.team said.

Dark+Mail+Alliance.jpg
Image credit : Ars Technica

Existing forms of email encryption like PGP, can be used to encrypt the content of an email. But PGP cannot encrypt the “subject” header or metadata like the “to” and “from” fields, and the average user can find it too complicated to use.

What we call ‘Email 3.0.’ is an urgent replacement for today’s decades old email protocols (‘1.0’) and mail that is encrypted but still relies on vulnerable protocols leaking metadata (‘2.0’)” they said.

They are planning to launch an iOS app and an Android app, as well as a desktop version for both Mac and Windows.

Any agencies that come down to us have no way to force us to comply with surveillance because architecturally it’s impossible,” they said. “That’s the beauty of it.

The new technology may not be fully NSA or GCHQ proof, but they sure are going to be nightmare for such spying agencies. The company plans to release a white paper detailing the technical specifications within the next two weeks.

Photo of Mohit Kumar Hacker NewsMohit Kumar – Founder and Editor-in-Chief of ‘The Hacker News’. Cyber Security Analyst, Information Security Researcher, Developer and Part-Time Hacker. (Google+ Profile)

Popular Stories

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/Dark-Mail-Alliance-Lavabit-Silent-Circle-surveillance-NSA.html

Critical+vulnerability+in+Twitter+allows+attacker+to+upload+Unrestricted+Files.jpg
Security expert Ebrahim Hegazy, Cyber Security Analyst Consultant at Q-CERT, has found a serious vulnerability in Twitter that allows an attacker to upload files of any extension including PHP.

When an application does not validate or improperly validates file types before uploading files to the system, called Unrestricted File upload vulnerability. Such flaws allow an attacker to upload and execute arbitrary code on the target system which could result in execution of arbitrary HTML and script code or system compromise.

According to Ebrahim, when a developer creates a new application for Twitter i.e. dev.twitter.com – they have an option to upload an image for that application.
While uploading the image, the Twitter server will check for the uploaded files to accept certain image extensions only, like PNG, JPG and other extensions won’t get uploaded.

But in a Video Proof of Concept he demonstrated that, a vulnerability allowed him to bypass this security validation and an attacker can successfully upload .htaccess and .PHP files to twimg.com server.

Twimg.com is working as a CDN (content delivery network) which mean that every time attacker will upload a file, it will be hosted on a different server or subdomain of twimg.com.
In CDN’s usually scripting engines are not allowed to run. So, in normal scenarios a successful Exploitation of uploading htaccess & PHP files to a server that supports the PHP i.e. Remote Code Execution on that server.

But in the case of Twitter:

  • Vulnerability could be used to make twimg.com as a Botnet Command server by hosting a text file with commands, so infected machines would connect to that file to take its commands. Since twimg.com is a trusted domain by users so it won’t grab the attention.
  • For hosting of malicious files.
  • At least it could be used to upload a text page with a defacement content and then add the infected sub-domains of twimg.com as a mirror to Zone-h.org which would affect the reputation of Twitter.

Twitter recognized the criticality of the Unrestricted File Upload Vulnerability and added Hegazy name to their Hall of Fame. I personally reached Ebrahim Hegazy that revealed me that he has also found an Open redirection Vulnerability in Twitter on 15th Sept. that has also been fixed.

I conclude with a personal consideration, it’s shame Twitter hasn’t a bounty program, in my opinion is fundamental to incentive hackers to ethical disclosure of the bug. An attack against a social media could have serious repercussion on the users and on the reputation of the platform, if hackers sell the knowledge of the flaw on the black market a growing number of cyber criminals could benefit from it.

Photo of Pierluigi Paganini Hacker NewsPierluigi Paganini – Researcher, Security Evangelist, Security Analyst. Founder of ‘Security Affairs‘ Author: The Deep Dark Web. (Google+ Profile)

Popular Stories

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/critical-vulnerability-in-twitter.html

British+Baptist+Minister's+son+charged+with+hacking+US+Army+and+Nasa+Computer+Systems.jpg

Son of a Baptist Minister, 28-year-old British man named Lauri Love has been charged with hacking into the computer systems of the US army, NASA and other federal agencies.

He was arrested Friday at his home in Stradishall, England by the National Crime Agency and according to the indictment alleges Love and his unnamed co-conspirators hacked into thousands of computer systems between October 2012 and October 2013. The indictment does not accuse Love of selling information or doing anything else with it for financial gain.

His father Alexander Love, 60, a Baptist minister, works as a chaplain at HMP Highpoint North. His mother Sirkka-Liisa Love, 59, also works at the jail as a teacher.

He is charged with one count of accessing a U.S. Department or agency computer without authorization and one count of conspiracy. The government said the purpose was to disrupt the operations and infrastructure of the federal government. They stole data on more than 5,000 individuals, as well as information on government budgets and procurement processes.

British+Baptist+Minister's+son+charged+with+hacking+US+Army+and+Nasa+Computer+Systems.jpg

Love is alleged to have used the online monikers “nsh“, “route“, and “peace” to plot attacks from his home with three unnamed conspirators in Australia and Sweden and US authorities declined to discuss whether they had been arrested or will be arrested and extradited to the US.

You have no idea how much we can fuck with the US government if we wanted to,” Love told a hacking colleague in one exchange over Internet relay chat, prosecutors alleged. “This… Stuff is really sensitive. It’s basically every piece of information you’d need to do full identity theft on any employee or contractor“.

Love could be extradited to the US, where if convicted he faces up to ten years in prison and a fine for twice the damage caused. Gary McKinnon’s mother, Janis Sharp, accused US authorities of targeting young British geeks, said “They are just young geeks sitting in their bedrooms; they’re not murderers, they’re not terrorists, they’re not selling secrets, they’re just searching for information,“.

He has been released on bail until February and could face a maximum potential penalty of five years in prison and a $250,000 fine for each count.

Photo of Wang Wei Hacker NewsWang Wei – Security consultant for the government, financial Securities & Banks. Malware Analyst, Penetration Tester, Security Researcher at ‘The Hacker News’. (Google+ Profile)

Popular Stories

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/british-baptist-ministers-son-charged.html

iOS+apps+vulnerable+to+HTTP+Request+Hijacking.jpg
Security researchers Adi Sharabani and Yair Amit disclosed details about a widespread vulnerability in iOS apps, that could allow hackers to force the apps to send and receive data from the hackers’ own servers rather than the legitimate ones they were coded to connect to.
Speaking about the issue at RSA Conference Europe 2013 in Amsterdam, researchers from Israel-based mobile security vendor Skycure, have provided details on the iOS app vulnerability, which stems from a commonly used approach to URL caching, shown that insecure public networks can also provide stealth access to our iOS apps to potential attackers using HTTP request hijacking methods.
The researchers put together a short video demonstrating how attackers can manipulate an app. They use what is called a 301 directive to redirect the traffic flow from an app to an app maker’s server to the attacker’s server.

The attacker needs to be physically near the victim for the initial poisoning to perform this attack and flaw works only against HTTP traffic.

A victim walks into Starbucks, connects to the Wi-Fi and uses her favorite apps,” explains an example. “Everything looks and behaves as normal, however an attacker is sitting at a nearby table and performs a silent HRH attack on her apps. The next day, she wakes up at home and logs in to read the news, but she’s now reading the attacker’s news!

They estimate that at least 10,000 iOS apps in the App Store are vulnerable to the hack. As a result, apps that display news, stock quotes, social media content, or even some online banking details can be manipulated to display fraudulent information and intercept data sent by the end user.

Since Apple does not approve automatic download and scanning of iOS applications, we decided to do manual tests of a bunch of high-profile applications. Due to the fact that almost half of them were susceptible to HRH, we estimate that the number of vulnerable apps is very large, probably tens of thousands.” Yair Amit said.

Victims can uninstall apps to scrub their devices clean, and Skycure has released app code that prevents the web caching from taking place. It may be a while until developers can get this fix implemented, so connect to those public networks with extreme caution.

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/ios-apps-vulnerable-to-http-request_29.html

Vulnerability+in+Facebook+app+allows+hackers+to+steal+access+tokens+and+hijack+accounts.jpg
There are more than 100 Million users who are using Facebook mobile app. Facebook has fixed multiple critical vulnerabilities in its Android based applications that allows hackers to steal access tokens and hijack accounts.
Egyptian security researcher Mohamed Ramadan, Security researcher with Attack Secure, has who disclosed a couple of vulnerabilities in the Facebook Main app and Facebook messenger app and Facebook page’s manager application for Android.

User’s access token is the key to accessing a Facebook account and according to him, an attacker only needs to send a message that contains an attachment of any type, i.e. Videos, documents, and pictures.

Vulnerability+in+Facebook+app+allows+hackers+to+steal+access+tokens+and+hijack+accounts.jpg
Once the victim will click on that file to download, immediately victim’s access_token will be stored in the Android’s log messages called – logcat, that enables other apps to grab user’s access token and hijack the account.

Video Demonstration:

The second flaw which is reported by Ramadan, impacts the Facebook Pages Manager application for Android and similar to the first. “The vulnerability I found in the Facebook Pages Manager app is the same like the other one but to exploit it, you need to login to your Facebook account and your access token will be leaked to all apps without a need to download ANYTHING from ANYONE,”.
Vulnerability+in+Facebook+app+allows+hackers+to+steal+access+tokens+and+hijack+accounts.jpg

Ramadan also mentioned that the Facebook access_tokens don’t expire, So the user should update their Facebook apps to patch the vulnerability.

The vulnerabilities have been fixed and for reporting he is rewarded with total $6,000 in bug bounties.

Photo of Mohit Kumar Hacker NewsMohit Kumar – Founder and Editor-in-Chief of ‘The Hacker News’. Cyber Security Analyst, Information Security Researcher, Developer and Part-Time Hacker. (Google+ Profile)

Popular Stories

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/vulnerability-in-facebook-app-allows.html

Cryptolocker.png
When you’re online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few years.
Among home PC users, you may think that you protected from malicious software by Installing an effective, trusted antivirus solution, but most if the Antivirus solutions still it merely finds and removes any known threats.

But what if someday you turn on your system and you will find a pop up window with a warning that says “Your system is Locked and Important drives are encrypted and there is no way out unless you will not Pay fine“.

This is what Ransomware malware does to your system. Ransomware is the most serious emerging threat in the virtual world of computing devices. Ransomware is a kind of malware which is designed to Block access to the computing system or can lock your system until an amount of money is paid through Internet banking.

Ransomware is usually installed when you open a malicious attachment in an email message or when you click on a malicious link in an email message, instant message, a social networking site or other websites.

A new piece of ransomware is giving Internet users one more reason to think twice before they click a link in an email. You may have read about the Cryptolocker malware in our previous stories on The Hacker News, a new ransomware Trojan that encrypts your files and demands money to return them.
Cryptolocker has been infecting PCs around the world and effectively holding the files within for ransom. Cryptolocker first made an appearance last month. Malware Researcher ‘Octavian Minea‘ from Bitdefender explains the detailed inner workings of the Cryptolocker Ransomware, lets have a look:

The Cryptolocker ransomware gets installed with the help of Zbot variant (Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse. Zeus, which is sold on the black market, allows non-programmers to purchase the technology they need to carry out cybercrimes.) and after installation it immediately adds itself to the Startup folder with a random name. Then it tries to establish connection with its command and control server on remote location using the Internet and send a 192 byte encrypted packet:

“version=1&id=1&name={COMPUTER_NAME}&group={GROUP_NAME}&lid={LOCATION_ID}”

Where {GROUP_NAME} seems to be related to the time of compilation of the malware and an example for {LOCATION_ID} is ‘en-US’.
On successful connection, the server generates a pair of 2048-bit RSA public and private key and the malware receives only the public key and a newly generated Bitcoin address. For each victim, only the Cryptolocker authors have access to the decryption private keys.

The received information from the server gets stored in the system registry at:

HKEY_CURRENT_USER\Software\Cryptolocker_NUMBER\

Which contain the values PublicKey, Version Info with Bitcoin address and the command and control server address in an encrypted form.

Cryptolocker uses a solid encryption scheme as well, which so far appears unbreakable. It begins encrypting documents on any local or network storage drive, which are in any of these formats:

*.odt*.ods*.odp*.odm*.odc*.odb*.doc*.docx*.docm*.wps*.xls*.xlsx*.xlsm*.xlsb*.xlk*.ppt*.pptx*.pptm*.mdb*.accdb*.pst*.dwg*.dxf*.dxg*.wpd*.rtf*.wb2*.pdf*.mdf*.dbf*.psd*.pdd*.eps*.ai*.indd*.cdr????????.jpg????????.jpeimg_*.jpg*.dng*.3fr*.arw*.srf*.sr2*.bay*.crw*.cr2*.dcr*.kdc*.erf*.mef*.mrw*.nef*.nrw*.orf*.raf*.raw*.rwl*.rw2*.r3d*.ptx*.pef*.srw*.x3f*.der*.cer*.crt*.pem*.pfx*.p12*.p7b*.p7c

An AES key is generated for each file to be encrypted, the file is then AES-encrypted and the AES key is itself encrypted using the public key. The encrypted AES key is then appended to the encrypted file.

While the public key is stored on the computer, the private key is stored on the command-and-control server; CryptoLocker demands a payment with either a MoneyPak card or Bitcoin to recover the key and begin decrypting files, and threatens to delete the private key if a payment is not received within 3 days.

Payment of the ransom can generally be performed in Bitcoins, although some Cryptolocker variants also accept payment methods Ukash, CashU or, only in the US of A, in Money Pack prepaid cards which can only be bought with cash. All these payment methods are practically anonymous.” he said.

Due to the extremely large key size it uses, analysts and those affected by the worm have considered CryptoLocker to be extremely difficult to repair.

CryptoLocker+process.png
Users who have their files locked up by the ransomware are currently paying $300 to $700 to the criminals who run the virus to gain control of their computer. Once the victim pays the ransom, the transaction ID must be entered and purportedly verifications ensue. If a private key is sent by the server, it is added to the registry and the decryption process begins.
CryptoLocker+bitcoin.png
So far, there have been no reports of the hackers reinfecting a machine once the ransom has been paid. However, the attackers give you roughly three days to pay them, otherwise your data is gone forever, especially if they do not perform regular and off-site backups.
Today’s cybercriminals are using more sophisticated attacks, such as ransomware and spear phishing, which yield them more money per attack than ever before. A sample study of 1000 users by Symantec found India to be the ransomware capital of Asia Pacific with 11% victims of virtual extortion.

There are several free ways to help protect your computer against ransomware and other malware:

  • Make sure to keep all of the software on your computer up to date.
  • Make sure automatic updating is turned on to get all the latest security updates.
  • Never open any attachment unless you know who it’s from and why they are sending it
  • Use secure connections for sensitive transactions.
  • Use strong alphanumeric and symbol passwords.
  • Use virtual keyboard for internet banking.
  • Common sense is another good weapon in the fight against viruses.

Photo of Swati Hacker NewsSwati Khandelwal – Working at ‘The Hacker News’. Social Media Lover and Gadgets Girl. Speaker, Cyber Security Expert and Technical Writer.(Google+ Profile)

Popular Stories

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/Cryptolocker-Ransomware-Bitcoin-malware-remove-software.html

Barack+Obama%E2%80%99s+Campaign+website+Hacked+by+Syrian+Electronic+Army.jpg
The pro-Assad group Syrian Electronic Army claims it has hacked the President Barack Obama’s website , Email accounts and associated Twitter and Facebook accounts also.

Last night, Syrian Electronic Army (SEA) hacked into Obama’s donation website donate.barackobama.com, which was temporarily redirected to the website of the hacking group (sea.sy/indexs/) with a short message: “Hacked by SEA”.

The hackers were able to take over only a secondary donations page. It was an older page – still on the site, but was no longer being used.
obama+twitter+hacked.png

obama+facebook+hacked.png

They have also tweeted and posted from Obama’s Facebook Page and Twitter accounts, “All the the links that Barack Obama account tweeted it and post it on Facebook was redirected to a video showing the truth about Syria” Hacker told Mashable.

According to a screenshot shared by the hacking group, they have also claimed that they have access Obama Campaign email accounts.

obama+emails+hacked.png
‘Syrian Electronic Army is an organized hacking group loyal to the Syrian President Bashar al-Assad and known for their high profile cyber attacks. This year they were able to disrupt the New York Times web page multiple times, Twitter, CNN, the Huffington Post and Global Post and many more targets.
Barack+Obama%E2%80%99s+Campaign+website+Hacked+by+Syrian+Electronic+Army.jpg
At the time of writing, the donate.barackobama.com website no longer redirects visitors to the SEA’s website, but the links posted on his Twitter and Facebook accounts had not been fixed as of publishing time.

But Zone-H mirrors of hack are also available for readers:

The SEA website launched in May 2011 stating the group’s mission: to attack the enemies of the Syrian government, mainly those who fabricated stories about the Syrian civil war.

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/president-obamas-twitter-facebook.html

How+Security+breach+at+OAuth+based+applications+can+cause+Social+Media+Disaster.jpg
With all the popular social networking websites there on the web, managing them from several different internet browser tabs or windows can get frustrated very quickly.

Besides our own Facebook Page, Twitter account, and Google+ profile, I also manage several others and, YES, I feel the “time management” pain!

To make social media management and monitoring easier for users, some very innovative desktop applications and mobile apps were developed to help organize multiple platforms and information sharing across selected networks.

hootsuite-buffer.jpg

Using online tools like TweetDeck, Seesmic, Hootsuite, Feedly, Twuffer and Buffer App for scheduling and posting directly from a web page has become an absolute necessity especially where Twitter is concerned.

Additionally these apps gives you the ability to post on one or all of your connected accounts together i.e Multiple Facebook, Twitter or Google+ profiles.

These applications don’t require your passwords for social media accounts, i.e. It would be really very uncool in sharing your Facebook password with a third-party site. That’s where OAuth comes in.

OAuth is an open standard for authorization, which keeps your passwords safe on third-party sites and instead of giving the keys to your entire house, you’ve given a special key called ‘Access token‘ that only opens one room which you want them to access.

How+Security+breach+at+OAuth+based+applications+can+cause+Social+Media+Disaster.jpg

This Access token behaves similar to a session variable which you can store in a cookie to keep the user logged into your website. The only difference is that many services will send back an Access Token and Secret Access Token. You likely need both of these to pull any data from the server.

But more importantly, if somehow that application server gets hacked, your Twitter or Facebook passwords are still safe. But yes, the hackers would still be able to post on your behalf on Facebook or Twitter and can spread spam via tweets, status updates or Direct Inbox messages.

Rather than hacking into individual accounts which is almost impossible, Hacking an OAuth based application server, having millions of users – is enough to damage the Internet and Social Media.

Just yesterday Buffer, the social content management and scheduling service was hacked by cyber crooks, which resulted in a flood of unauthorized posts to user accounts for both Twitter and Facebook.
Buffer+hacked;+Twitter,+Facebook+flooded+with+Spam+Weight-loss+links.png
The security of such apps should be very high, where access to Social media accounts of millions of users are available in bulk after exploiting the vulnerabilities in application server only. Buffer Hack was basically used to spread SPAM messages linked to weight-loss web site.

The main reason why this particular attack is so effective is because:

  • The victims were essentially receiving messages including links from sources they trust; accounts that they follow on Twitter or Facebook.
  • A hacker could trigger huge spam messages on all buffer users with one click.

But in the worst scenarios, a malicious attacker could use the same techniques to spam links to Malware infected websites or other such websites serving exploit kits to compromise visitors’ computers.

After recovering for Security Breach, Buffer said on Sunday that they have encrypted all OAuth access tokens in the database for further security.

To avoid such issues, pay attention to the permissions that each app is taken from your account. If it does something you don’t want it to do, just don’t use that app.

There is no good or even half good way to protect keys that untrusted users can access. The minimum amount of effort won’t be effective. Even the maximum amount of effort won’t be effective against a skilled hacker with just a few hours of spare time.

It is a genuine problem with no effective solution. Not in Java, not in C#, not in Perl, not in C, not in anything. Think of it as if it was a Law of Physics. Your alternatives are:

  • Always use trusted applications and grant limited required permissions.
  • Turn your application into a service and run it on a machine that you control access to.
  • Use some authentication mechanism that doesn’t require permanent secret keys to be distributed.

Always, be sure to regularly review your authorized apps so you don’t run into trouble if you haven’t used one of them in a while, you’re probably better off getting rid of it completely.

All you need to do is go to your Twitter settings and revoke access to that app. That way, your tokens become useless and your account is under your control again, without even having to change your password.

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/security-breach-at-oauth-based.html

Israeli+Road+Control+System+hack,+shutting+down+Haifa+highway+Traffic.jpg
Israel is considered one of the most advanced country in cyber security, but at the same time is a privileged target for hostile governments intent in sabotage and cyber espionage on his technology.

Yesterday, Cybersecurity experts revealed that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack, that caused massive traffic congestion in the City.

Isreal military officials are aware of cyber threats that could hit the infrastructure of the country and they afraid the possible effect of a cyber attack on a large scale.

Israeli government websites suffer thousands of cyberattacks each day according Ofir Ben Avi, head of the government’s website division. The Israel Electric Corp. confirmed that its servers register about 6,000 unique computer attacks every second.

In June, Prime Minister Benjamin Netanyahu stated that Iran militia, Hezbollah and Hamas have targeted in numerous occasions Israel’s “essential systems,” including its water facilities, electric grid, trains and banks.

Every sphere of civilian economic life, let’s not even talk about our security, is a potential or actual cyber attack target,” said Netanyahu.

Israel’s military chief Lt. Gen. Benny Gantz made a high-profile speech recently outlining that within the greatest threats his country might face in the future there is the computer sabotage as a top concern. A sophisticated cyber attack could be used to shut down a banking system of Israel, the national electric grids or a defense system, this is a nightmare for the Defense.

Israeli+Road+Control+System+hack,+shutting+down+Haifa+highway+Traffic.jpg
Cybersecurity experts revealed to The Associated Press that a major artery in Israel’s national road network located in the northern the city of Haifa suffered a cyber attack that has caused serious logistical problems and hundreds of thousands of dollars in damage.

The tunnel is a strategic thoroughfare in the third largest city of the country, and as a demonstration of its importance in the city is exploring the possibility to use the structure as a public shelter in case of emergency.

It seems that the attackers used a malware to hit the security camera apparatus in the Carmel Tunnel toll road in Sept. 8 and to gain its control.

The attack caused an immediate 20-minute lockdown of the roadway. The next day, the expert said, it shut down the roadway again during morning rush hour. It remained shut for eight hours, causing massive congestion.

The experts that have investigated on the incident exclude that the hypothesis of a state-sponsored attack because the malicious code used was not sophisticated enough to be the work of a hostile government, it is likely the involvement of a group of hacktivists.

Carmelton company that oversees the toll road, blamed a “communication glitch” for the incident, while Oren David, a manager of security firm RSA’s anti-fraud unit, said that although he didn’t have information about the tunnel incident similar attacks could represent a serious menace for population.

Most of these systems are automated, especially as far as security is concerned. They’re automated and they’re remotely controlled, either over the Internet or otherwise, so they’re vulnerable to cyberattack,” “among the top-targeted countries.” said David.

In reality Iranian hackers and other hostile entities have penetrated successfully Israeli systems, Israel has controlled the attacks to track back the hackers, profile their methods of attack and to conduct a disinformation campaign making available false information.

To improve security of critical infrastructure the Israeli civilian infrastructure, Israel’s national electric company has recently launched a training program, jointly with cyber defense company CyberGym, to teach engineers and managers of critical plants to detect ongoing cyber attacks.

The attack scenario revealed portends to an escalation of attacks by hostile entities, whether they are cyber criminals, hacktivits or state-sponsored hackers, it’s crucial for the Israeli government to invest in improvement of cyber capabilities for its survival.

Photo of Pierluigi Paganini Hacker NewsPierluigi Paganini – Researcher, Security Evangelist, Security Analyst. Founder of ‘Security Affairs‘ Author: The Deep Dark Web. (Google+ Profile)

Popular Stories

p-89EKCgBk8MZdE.gif

via The Hacker News http://thehackernews.com/2013/10/israeli-road-control-system-hacked.html