Archive for April, 2014


KALI Linux Mailing List Website Hacked By Libyan Hackers

When it comes to Digital Forensics, Penetration and Security testing, we mostly relies on Kali Linux distribution (also known as Backtrack), which is designed for security professionals and packed with more than 300 security testing tools.
But Today, Mailing List sub-domain of Kali Linux get hacked and defaced by Libyan hacking group known as ‘The GreaT TeAm (TGT)’.

A mailing list is simply a list of email addresses to which the same information is being sent. A discussion list is used to allow a group of people to discuss topics amongst themselves, with everyone able to send mail to the list and have it distributed to everyone in the group.

At the time of writing, The Homepage of Kali Linux mailing list domain was displaying two lists, i.e.

  • Kali with description “Hacked By The GreaT TeAm -TGT”
  • Kali-Dev with description “Libyan Hackers”

KALI Linux Mailing List Website Hacked By Libyan Hackers
Somehow Hackers managed to exploit some unknown vulnerability, either on Kali Linux web server or in Mailing list software used by Offensive Security team, and posted a Batman movie pic with Greetings text, “h4x3d by The GreaT TeAm” and “Libyan H4x0rz 😀”, as shown in the above screenshot.
Hackers have also shared mirror of the defacement attack at Zone-H website. Mailing lists have become a popular way for Internet users to keep up with topics they’re interested in.

l3uKDI

via The Hacker News http://ift.tt/1u5deKU

Target finally Plans to issue Chip and PIN Credit Cards
The massive data breaches in U.S largest retailers ‘Target‘, marked the largest card heists in the U.S. history in which financial credentials of more than 110 million customers were compromised, have forced the retailer to take step towards more secure transactions.

The retailer company on Tuesday said it is implementing chip-and-PIN payment card systems for its stores and will be soon working with the MasterCard to replace all of its REDcard customer cards to chip-and-PIN secured cards. The transition to chip-and-Pin-enabled REDcards is set to begin in early 2015.

The new payment terminals will be in all 1,797 U.S. stores by this September, six months ahead of schedule. In addition, by early next year, Target will enable all REDcards with chip-and-PIN technology and begin accepting payments from all chip-enabled cards in its stores,” the company said.

The chip-and-PIN system, also known as the EMV standard. Instead of using a magnetic stripe to store financial information, these cards store the data on embedded microchips. It generates a unique code for every transaction, making it nearly impossible for criminals to use the card for counterfeit fraud.

In our previous article, we explained, ‘As the Target hack exposed that traditional magnetic stripe payment cards transmit your account number and, in the case of debit cards, your secret PIN to merchants, but in case of ‘Chip-and-PIN’ cards you’re not transmitting an actual credit card number, instead it transmits a one-time-use token number that banks and card processors can match up with your account on the other end to process the transaction, but that doesn’t reveal your account number, even with the merchant.’
This new move will include only the customers who use Target’s branded credit and debit cards. The company will reissue both its branded and co-branded payment cards to the new and secure MasterCard’s chip-and-PIN solution.

MasterCard is a technology company in the global payments industry that operate the world’s fastest payments processing network in more than 210 countries and territories.

Target has long been an advocate for the widespread adoption of chip-and-PIN card technology,” said Target CFO and executive vice president John Mulligan. “As we aggressively move forward to bring enhanced technology to Target, we believe it is critical that we provide our REDcard guests with the most secure payment product available. This new initiative satisfies that goal.

Target and MasterCard are taking an important step forward in providing consumers with a secure shopping experience, and the latest in payments technology,” said Chris McWilton, president, North American Markets for MasterCard. “Our focus, together with Target, is on safety and security.

This ongoing data security enhancement effort will be under the leadership of Bob DeRodes, Target’s new executive vice president and chief information officer. A former adviser for the US Department of Homeland Security and U.S. Department of Justice, DeRodes was also brought by Target for his past work in helping to secure data for a number of US banks and financial institutions.

However, Chip and Pin technology doesn’t prevent an ID thief from using stolen card numbers for online or phone purchases and also cyber criminals have already found their own ways to clone Chip-n-Pin cards physically. There is no such thing as a card that is 100% safe from clever criminals.

l3uKDI

via The Hacker News http://ift.tt/1pOZvIw

4chan Hacked
The founder of 4chan, Christopher Poole, aka “moot” has confirmed few hours ago, in a blog post that the popular image-based bulletin board was hacked.

The attacker gained access to the administrative functions and successfully hacked into one of 4chan’s database by exploiting a website’s software vulnerability last week. The motive behind the hack was to expose the posting habits of a specific user the attacker didn’t like, moot wrote.

It is believed that the software vulnerability allowed the attacker to hack into only the image-board moderation panels, and some tables in the 4chan back-end database. According to the blog post, the way hacker extracted the information from its database, 4chan knows the “detailed logs of what was accessed”, which indicate that the “primarily moderator account names” and their “credentials” were targeted and compromised by the hacker.

Due to the way the intruder extracted information from the database, we have detailed logs of what was accessed. The logs indicate that primarily moderator account names and credentials were targeted,” reads the blog post.

The hacker was able to access the Pass credentials of three 4chan Pass (paid account without CAPTCHAs system) users, who have been notified by the company shortly after the discovery of the attack and offered refunds along with the lifetime Passes.

The founder of the 4chan assured its users that their financial information has not been compromised in the attack as 4chan doesn’t process any payment information and all the payment information is “processed securely” by the Stripe.

After 4chan aware of this software vulnerability exploited by the hacker, it was patched quickly and 4chan assured its users that they continue to review its software and systems to prevent future attacks and breaches.

A week ago, Moderators of Social-sharing website Reddit were under attack after being accused of censoring posted links containing words like “National Security Agency,” “Edward Snowden” and even “Bitcoin” on the website’s subreddit r/technology.

The Reddit moderators have lost their focus of what they were there to do. Their job is to moderate effectively, but this secret censorship is a “disaster” as it lost the transparency between the user and the service.

4chan apologized for the inconvenience caused to its users, but this is not first time hacker targeted 4chan. Back in June 2012, the hacker UGNazi changed the DNS for 4chan and redirected its visitors to UGNazis Twitter account.

l3uKDI

via The Hacker News http://ift.tt/1n16yt0

AOL Hit by Massive Data Breach, Urges Users to Change Passwords

If you are a user of the American On-Line (AOL) mail service then you are advised to change your password as soon as possible.

AOL Inc. on Monday confirmed the company suffered a massive data breach that may have affected a “significant number” of email accounts.

The company has issued a warning to users that their personal information including email addresses, postal addresses, address books, encrypted passwords and the encrypted answers to security question-answers, has been stolen by attackers, the New York-based company said Monday.

The ongoing investigation of this serious criminal activity is our top priority,” AOL said in a blog post. “We are working closely with federal authorities to pursue this investigation to its resolution. Our security team has put enhanced protective measures in place, and we urge our users to take proactive steps to help ensure the security of their accounts.”

AOL said it began investigating the matter after it noticed a spike in spoofed emails from AOL user accounts. The company believes that hackers used the contact information to send spoofed emails that appear to come from roughly 2 percent of its email accounts.

“Spoofed” emails are kind of phishing emails or messages that masquerade itself as if they have come from legitimate user accounts known to the recipient in order to trick the recipient into opening it, but in real are the links to malicious websites or malware.
The company believes that neither the financial data of users such as credit and debit cards number, nor the passwords or the answer to the security questions has been revealed as the hackers weren’t be able to break the encryption.

Importantly, we have no indication that the encryption on the passwords or the answers to security questions was broken,” AOL wrote. “In addition, at this point in the investigation, there is no indication that this incident resulted in disclosure of users’ financial information, including debit and credit cards, which is also fully encrypted.

Nevertheless, AOL suggests all its users to reset their passwords and also change their security questions and answers in order to protect themselves from such breaches.

Although there is no indication that the encryption on the passwords or answers to security questions was broken, as a precautionary measure, we nevertheless strongly encourage our users and employees to reset their passwords used for any AOL service and, when doing so, also to change their security question and answer,” AOL said.

In addition, it also provided some steps to protect its users from cyber threats:

  • Do not click on any suspicious links or attachments in the email you received.
  • When in doubt, contact the sender to confirm that he or she actually sent the email to you or not.
  • Never provide your personal or financial information through an email to someone you do not know.
  • AOL will never ask you for your password or any other sensitive personal information over an email.
  • If you found yourself a victim of spoofing, inform your friends that your emails may have been spoofed and warn them to avoid clicking the links in suspicious emails.

l3uKDI

via The Hacker News http://ift.tt/1iyGEaH

Skype leaves Sensitive User Data Unencrypted Locally on Systems
An application should always encrypt users’ sensitive data, either it is local or stored on company servers, but still many popular services failed to provide fully secured solutions to their users.
Dragoş Gaftoneanu, a Romanian programmer at Hackyard Security Group, a private community dedicated to IT security research approaches ‘The Hacker News‘ editorial and claimed that the Microsoft owned most popular free voice calling service Skype leaves its local database unencrypted, that puts users’ sensitive information at risk.
Though the Skype database is supposed to be encrypted because it is sensitive enough, but Dragoş found that Skype leaves users’ full name, birthday, phone numbers, country, city and even full chat conversations unencrypted on the systems’ hard drive in a known location without any encryption or password.

Skype is a free online service that allows users to communicate with peers by voice using a microphone, video by using a webcam, and instant messaging over the Internet. Due to its worldwide popularity it was acquired by Microsoft Corporation on May 2011 for US$8.5 billion.

UNENCRYPTED SKYPE ACCOUNT LOCAL DATABASE

Dragoş claimed that private information of skype users is stored in such a way that anyone with access to the device can see the private chats, usernames, phone number etc and use them for any purpose.

UNENCRYPTED SKYPE ACCOUNT LOCAL DATABASE
Unencrypted data is obviously a loophole for cyber criminals and the Skype’s unencrypted database also displays users’ location information such as country and city, which could be considered a jackpot for unsavory hackers.
While chatting with his friend on Skype, Dragoş noticed a folder in his Linux home directory that contains a database file, called main.db, created by the Skype software.

In Linux: /home/user/.Skype/skypename/
In Mac OS X: /Users/user/Library/Application Support/Skype/skypeuser
In Windows : C:\Users\Username\AppData\Roaming\Skype\skype.id

Using SQLite utility, Dragoş connected to the unencrypted Skype database and found Skype user account related information in plaintext under different tables.

The Account table contains the basic information of the user such as skypename, fullname, birthday, country, city, mobile phone numbers, emails from Accounts, etc.

Another Table labeled ‘CallMembers‘ stores the information about when and whom user called. The ‘Contacts’ table stores the user’s friend list along with skypename, fullname, and some interesting columns, such as birthday, country, city and phone_mobile.

The most surprising table came out to be the ‘Messages’ Table that stores the users’ chat conversations in complete plain text format. Even some tables regarding video calls and SMSes sent also reveals users’ personal data.

A flaw in the popular voice calling and messaging service may have left its Millions of users vulnerable to the attackers by storing the data in such a way that anyone can read it. The users’ details are kept inside one of Skype’s database files buried within the file system, but anyone could see it if they had access to users’ device and knew where to look.

The researcher tested this on the Linux based operating system but later it was found that the application makes the same files on every operating system.

Dragos advised users to remove the content of main.db every time they close Skype application and also provided a Linux based script to remove main.db automatically, which users just need to make it run on every startup.

This is an example of poor software development practices. Microsoft should take proactive steps to ensure the privacy of users data.

l3uKDI

via The Hacker News http://ift.tt/1mX1i9L

CVE-2014-1776: Internet Explorer Zero-Day Vulnerability affects all versions of IE
Microsoft confirmed a new Zero Day critical vulnerability in its browser Internet Explorer. Flaw affects all versions of Internet Explorer, starting with IE version 6 and including IE version 11.
In a Security Advisory (2963983) released yesterday, Microsoft acknowledges a zero-day Internet Explorer vulnerability (CVE-2014-1776) is being used in targeted attacks by APT groups, but the currently active attack campaigns are targeting IE9, IE10 and IE11.

INTERNET EXPLORER VULNERABILITY (CVE-2014-1776)

According to Advisory, Internet Explorer is vulnerable to Remote Code Execution, which resides ‘in the way that Internet Explorer accesses an object in memory that has been deleted or has not been properly allocated.‘ Microsoft said.

Microsoft Investigation team is currently working with FireEye Security experts, and dubbed the ongoing targeted campaign as “Operation Clandestine Fox“.

In a blogpost, FireEye explained that an attacker could trigger the zero-day IE exploit through a malicious webpage that the targeted user has to access with one of the affected Internet Explorer browser. Successful exploitation of this vulnerability allows an attacker to execute arbitrary code within the browser in order to gain the same user rights as the current user.

But, Internet Explorer zero-day exploit depends upon the loading of a Flash SWF file that calls for a Javascript in vulnerable version Internet Explorer to trigger the flaw, and which also allows the exploit to bypass Windows’ ASLR and DEP protections on the target system by exploiting the Adobe Flash plugin.

According to the advisory, there is currently no security patch available for this vulnerability. “Collectively, in 2013, the vulnerable versions of IE accounted for 26.25% of the browser market.” FireEye said.

HOW TO PROTECT COMPUTER FROM ZERO-DAY EXPLOIT?

Microsoft is working on a security patch for Internet Explorer vulnerability, could be available from the Next Patch Tuesday update (13th May, 2014). However, you can still migrate the zero-day threat by following below given methods:

  • Install Enhanced Mitigation Experience Toolkit (EMET 4.1), a free utility that helps prevent vulnerabilities in software from being successfully exploited.
  • You can protect against exploitation by changing your settings for the Internet security zone to block ActiveX controls and Active Scripting.
  • Tools > Internet Options > Security > Internet > Custom Level > Under Scripting Settings > Disable Active Scripting
  • Under Local intranet’s Custom Level Settings > Disable Active Scripting
  • If you are using Internet Explorer 10 or the higher version, enable Enhanced Protected Mode to prevent your browser from Zero-Day Attack.
  • IE Exploit will not work without Adobe Flash. So Users are advised to disable the Adobe Flash plugin within IE.
  • De-Register VGX.dll (VML parser) file, which is responsible for rendering of VML (Vector Markup Language) code in web pages, in order to prevent exploitation. Run following command:
    • regsvr32 -u “%CommonProgramFiles%\Microsoft Shared\VGX\vgx.dll”

Stay Safe!

l3uKDI

via The Hacker News http://ift.tt/1irbXZT

Silk Road Drug Dealer Plead Guilty For Selling Illegal Drugs for Bitcoins
Last October, the ‘Silk Road’ story broke when its owner Ross William Ulbricht, a 29-year-old who allegedly created and managed the Silk Road underground website, was arrested by the Federal Bureau of Investigation (FBI). The police seized the website that was considered one of the most popular Underground places on the Internet for buying drugs and other illicit goods and services.
Just some days after the Shutdown of Silk Road, Authorities in Britain, Sweden, and the United States arrested eight more vendors who dedicatedly used to sell illegal drugs on Silk Road.
Yesterday, Cornelis Jan Slomp, a 22-year old Dutch man who allegedly used the Silk Road underground black market website to sell illegal drugs for bitcoins worth millions of dollars has agreed to plead guilty in Chicago federal court to federal drug conspiracy charge filed against him, according to a statement issued by U.S. Attorney Zachary T. Fardon in Chicago and Slomp’s lawyer.
The ‘Silk Road‘ website, which had operated since early 2011, generated about $1.2 billion in sales of heroin, cocaine, ecstasy, marijuana and other illegal substances in less than three years, with Silk Road’s operators netting $80 million in commissions. The website also offered tutorials on hacking ATM machines, contact lists for black market connections and counterfeiters, and guns and hit men for sale, according to the charges.

Cornelis Jan Slomp, who go by the name ‘SuperTrips’ was arrested with over $20,000 in cash at Miami International Airport in August where, according to police, he planned to meet with the partners in the drug trade last year. He is in custody facing a maximum term of as long as 40 years, a $5 million fine and a forfeiture of more than $3 million in alleged proceeds of his crimes.

The suspect was accused of distributing worldwide about “104 kilograms of powder 3,4-methylenedioxy-N-methylamphetamine (MDMA); 566,000 ecstasy pills containing MDMA; four kilograms of cocaine; three kilograms of Benzodiazepine; and substantial quantities of amphetamine, lysergic acid diethylamide (LSD), and marijuana, in addition to allowing substantial quantities of methamphetamine, ketamine, and Xanax to be distributed through his SuperTrips vendor account from March 2012 through August 2013,” according to the authorities.

According to the prosecutors, Slomp received about 385,000 bitcoins from more than 10,000 transactions using the shuttered Silk Road website.

Some undercover Homeland security agents were monitoring the website for about 18 months and observed Slomp who had offered various controlled substances for sale and on April 2012, authorities at Chicago’s O’Hare International Airport seized an envelope mailed from the Netherlands containing ecstasy hidden inside an empty two DVD cases.

During the investigation, agents collected more than 100 similar envelopes in Chicago, each mailed from the Netherlands or Germany, containing various controlled substances,” the Chicago US Attorneys Office said in a statement.

In February, Ross William Ulbricht, who allegedly created and ran the black website under the name “Dread Pirate Roberts,” pleaded not guilty to operating a drugs trafficking scheme, conspiring to launder money and other crimes.

U.S. Attorney Zach Fardon — who formed a new cybercrime unit last month — said, “Illegal drug-trafficking is not new but drug-trafficking using a sophisticated underground computer network designed to protect anonymity of buyers and sellers presents new challenges to law enforcement that we are prepared to meet.

The hidden underground black market website, Silk Road used an online tool known as Tor to mask the location of its servers, that made it difficult for authorities to know who was using the website. The hidden or anonymous online environments were a key priority for the cyber criminals to carry out illicit activities.

l3uKDI

via The Hacker News http://ift.tt/1hz724b

DDoS Websites Using Facebook Servers
Reading a note on the Facebook could trick you automatically to do malicious attacks against others unknowingly.

A security researcher known as chr13 claims that the flaw resides in ‘Notes’ section of the most popular social networking site – Facebook, that could allow anyone to launch the distributed denial-of-service (DDoS) attack of more than 800 Mbps Bandwidth on any website.

A Distributed Denial-of-Service (DDoS) attack is one in which multiple compromised systems attacks a single target system or service to make it unavailable to its intended users. The flood of incoming requests essentially forces the target system or service to shut down, thereby denying service to the system to its legitimate users.

While demonstrating the vulnerability on his blog, he explained that Facebook allows its users to include tags inside the post in order to draft a note with beautiful related images from any source.

Facebook basically downloads external images from the original source for the first time only, and then cache them, but if the image url have dynamic parameters, then Facebook cache mechanism could be bypassed to force the Facebook servers to download all included images each time whenever anybodys open the note in its browser.

Facebook will only cache the image once however using random get parameters the cache can be by-passed and the feature can be abused to cause a huge HTTP GET flood.” he said.

DDoS FACTOR, A SCENARIO

Let’s suppose if you want to DDoS a website target.com, that have an image of 1 MB Size on its server. An attacker can create a Facebook Note with some text, including same image multiple times with dynamic parameters, i.e.

<img src=http://ift.tt/1pz2SmL;

<img src=http://ift.tt/1fAb24s;

..

..

<img src=http://ift.tt/1pz2SmN;

This way one can force Facebook servers to load 1 mb of file 1000 times in one pageview and if 100 Facebook users are reading the same crafted note at the same time, then Facebook servers will be forced to download 1 x 1000 x 100 = 100000 Mb = 97.65Gb bandwidth within few seconds on the targeted servers.

400 MBPS DDoS ATTACK DEMO

Researcher demonstrated the proof-of-concept with 400 Mbps attack on his own web server.

DDoS Websites Using Facebook Servers

The factor and danger of DDoS attack could be even higher when the image is replaced by a pdf or video of larger size, in case Facebook would crawl a huge file but the user gets nothing.

Facebook allows a user to create maximum of 100 Notes in a short span of time and each Note could support 1000+ links, but because there is no captcha for the Facebook Notes creation, so all this operation can be performed automatically and an attacker could easily creates hundreds of notes using multiple users at the time of performing attack.

It seems there is no restriction put on Facebook servers and with so many servers crawling at once we can only imagine how high this traffic can get.” he concluded.

STILL UNPATCHED AND DON’T EXPECT ANY PATCH FROM FACEBOOK

Unfortunately, Facebook has no plans to fix this critical vulnerability, “In the end, the conclusion is that there’s no real way to us fix this that would stop “attacks” against small consumer grade sites without also significantly degrading the overall functionality,” Facebook replied to the researcher.

Similar kind of attack was noticed in mid of 2011 year when a security penetration tester at Italian security firm AIR Sicurezza Informatica discovered flaws in Google’s Plus servers that allowed hackers to exploit the search giant’s bandwidth and launch a distributed denial-of-service (DDoS) attack on a server of their choice.

l3uKDI

via The Hacker News http://ift.tt/1lcA0w6

Android Bitcoin Mining Malware found on Google PlayStore
Google always bound to face trouble over the wide and open nature of its app checking policies on Google Play Store, and despite so many security measures, the search engine giant mostly fails to recognize the Android malware that are lurking around its Google Play store in vast numbers.
Recently, Google had offered users refund and additional credit of $5 for the bogus antivirus app ‘Virus Sheild‘ that potentially defrauded more than 10,000 Android users who have downloaded the app from the Google play store. The step taken by Google is really appreciated, as the refunding cost Google around $269,000.

Now, it has been found that a number of malicious Android apps on the Google Play store secretly turn users’ android devices into small rigs contributing to a large-scale crypto currency mining operation.

CRYPTO MINER IN ANDROID APP

Security researchers from an anti-malware firm Lookout have identified various malware apps at Google Play Store, which they dubbed as ‘BadLepricon’ containing hidden crypto miner that stealthily exploit users’ android device to perform the cumbersome computational process without their knowledge.

BadLepricon malware was specially designed to be delivered via wallpaper apps and researchers found it in five separate apps masquerading as ‘Live Wallpaper Apps’ that had more than 100 of downloads each, according to a blog post published Thursday.

These apps did fulfill their advertised purpose in that they provided live wallpaper apps, which vary in theme from anime girls to ‘epic smoke’ to attractive men,” Meghan Kelly, a Lookout security communications manager, wrote in a company blog post. “However, without alerting you in the terms of service, BadLepricon enters into an infinite loop where — every five seconds — it checks the battery level, connectivity, and whether the phone’s display was on.”
Android Bitcoin Mining Malware found on Google PlayStore

DETECTING MOBILE MALWARE

So, if you found your mobile devices overheated harder than usual, then you may have malicious wallpaper installed in your Smartphones that could be secretly mining cryptocurrency without your knowledge, and once your device connects to the internet, the mining capabilities kick into action in the background.

Due to an increase in the value of digital coins, cyber criminals has added it in their watchlist and making every effort to steal your virtual money. As we know, coin mining is the key component for digital currencies and such malware does not steal data. Instead, they are capable of mining Bitcoin, Litecoin and Dogecoin using the victim’s device.
Google expeditiously removed the malicious apps as soon as Lookout Mobile security firm reported it. This is not first time when an Android malware is targeting users’ Smartphones for mining crypto-currencies. Few weeks back researchers from the Antivirus firm Trend micro also spotted two such apps named – ‘Songs’ and ‘Prized’ on Google play store that mined the Litecoin and Dogecoin cryptocurrencies without users’ knowledge, and was downloaded by more than one million users.

l3uKDI

via The Hacker News http://ift.tt/1fxRTQL

Malicious Chrome Browser Extension Hijacks CryptoCurrency and Online Wallets
Although the number of malicious browser extensions has significantly increased in the past years, but recently a new extension of the Google Chrome is allegedly targeting Cryptocurrency users that is capable of stealing Bitcoins and other crypto coins silently.
The malicious Chrome browser extension dubbed as ‘Cryptsy Dogecoin (DOGE) Live Ticker’ which is available on Chrome Web store for free downloads and developed by “TheTrollBox” account. Reddit user noticed that the updated version of the extension has a malicious code, which is designed to hijack the crypto currency transactions.

HOW CHROME EXTENSION STEALS CRYPTOCURRENCY

It is very obvious that the kind of crypto related software extensions is downloaded only by the users who deal with the digital currency. So, once the user installed the malicious extension, the software within the extension starts monitoring users’ web activity and looks for those users who go to Cryptocurrency exchange sites such as Coinbase and MintPal.

After realizing that the user is performing a transaction in digital coins, the malicious extension replaces the receiving address, where the user is trying to transfer his Cryptocurrency, with the a different BTC address of its own (attacker’s bitcoin address)

The same happened to a Reddit user, who had been reported this activity from the Cryptocurrency exchange MintPal in a withdrawal confirmation. After then he posted a Warning about the rogue extension on Reddit, advising all to “Be careful of what you install on your devices you use to access your wallets.”

OTHER CHROME EXTENSIONS FROM SAME DEVELOPER

TheTrollBox, the developer of malicious ‘Cryptsy Dogecoin (DOGE) Live Ticker’ Chrome extension has also developed 21 more similar extensions, which are currently available on Google Chrome Store. These Chrome extensions also could be susceptible to have malicious code, so if you have installed any of the followings extensions, then you should remove them as soon as possible:

  1. Cryptsy MOON
  2. BTER NXT
  3. DGEX NXT
  4. Cryptsy DOGE
  5. Cryptsy LOT
  6. Coinbase BTC
  7. MTGox BTC
  8. BTC-E BTC
  9. BTC-E LTC
  10. BTC-E PPC
  11. BTC-E NVC
  12. BTC-E NMC
  13. BTC-E FTC
  14. BTC-E XPM
  15. Bitstamp BTC
  16. BTCChina BTC
  17. OKCoin BTC
  18. OKCoin LTC
  19. FXBTC BTC
  20. FXBTC LTC
  21. BitcoinAverage BTC

MALWARE vs DIGITAL COINS

As the business has moved to greater use of mobile and non-Windows computers, so cyber criminals have adapted techniques monetize their efforts. Due to an increase in the value of digital coins, cyber criminals has added it in their watchlist and making every effort to steal your virtual money.

We have seen Android malware distributed by cyber criminals on Google play store that have hidden Coinkrypt malware, which had capability to turn your mobile device into crypto-currency miners, also cyber criminals spreading malware through Home appliances in order to mine virtual currencies, and now they are started editing software extensions with malicious codes to grab users digital coins.

PROTECT YOUR WALLETS

Users are advised to choose a Crypto currency exchange or wallet service that enables two-factor authentication for the high level of security of their virtual wallets, as two-factor authentication required more than one device, which will eventually decrease the chances of malicious malware modifying changes to your transactions.

l3uKDI

via The Hacker News http://ift.tt/1lN648u