Paranoid Technology All things cybersecurity


Wanna Cry?!!! We do…

The cyber-attack that happened earlier this week reminded us of the questions posed in our March post – Initial Thoughts on Wikileaks Vault 7 Leak Series:

This wikileak points to increasing erosion of public safety - despite having these tools at hand, world governments (US, UK, Germany) continue to push for encryption back doors. Equation Group’s leak (NSA) late 2016 and this latest CIA leak once again prove all organizations have their OpSec issues - the three letter agencies are themselves at risk; backdoors, once discovered, work just as well for foreign spies, cyber-criminals and script kiddies.  Who is protecting the innocent? “

Apparently no one… Is the NSA going to step up and accept responsibility? Maybe if hell freezes over – “Cannot either deny or confirm the existence of these weapons…” Well, everybody else did – who cares if you do or don’t?!!

Interestingly, even Chinese state media called for the NSA to take some responsibility, how ironic… Like they should be talking…


Zuckerberg Calls Obama about NSA’s antics…

fb-markzuckerbegMark Zuckerbeg apparently called President Obama the day after more revelations from Edward Snowden documents came into light that NSA was using a system called Turbine to emulate Facebook servers for hijacking user accounts and hacking into computer systems.

Zuckerberg who has been speaking against NSA's intrusive surveillance operations for a while now wrote on his page:

"I've called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform."

On his personal page Zuckerberg further said -


More on Java Vulnerability… Got $5K???

deadly-javaWe deliberately did not report on this, but could not skip the update. Since last August things have not been going well for Java, researchers have discovered a flurry of vulnerabilities leading Apple to drop Java from its OS. Those of you that are Java users might have followed the recent software vulnerability that allows an attacker that to take over a machine using Java jvm. Consequently Oracle rushed out an update to fix the issue, well the researches  and hackers say otherwise.... KrebsOnSecurity reportedly came across an offer for a fully weaponized Java 7 Exploit for $5000, apperantly this is a brand-new 0 day flaw that Oracle did not fix in Java 7 Update 11 released a couple of days back.

Here is a excerpt from what Krebs came across on the hacker forum:


“.... New Java 0day, selling to 2 people, 5k$ per person

And you thought Java had epically failed when the last 0day came out. I lol’d. The best part is even-though java has failed once again and let users get compromised… guess what? I think you know what I’m going to say… there is yet another vulnerability in the latest version of java 7. I will not go into any details except with seriously interested buyers..............


Adobe Reader Zero Day Attack

Adobe officials say they're investigating claims of a recent attack. A newly published report claims the latest versions of the widely used Reader document viewer are under attack by exploit code that targets a previously unknown vulnerability.

The particular exploit is available in underground forums for as much as $50,000. It's significant because it pierces a security sandbox that until now has proved impervious to other online attacks, Krebson Security journalist Brian Krebs reported on Wednesday. The security mechanism is designed to minimize the damage of attacks that exploit buffer overflows and other types of software bugs by isolating Web content from sensitive parts of the underlying operating system.


Facebook, Dropbox app security holes

It is hard to believe top notch companies in 2012 are still looking over the security reality, but believe it folks... The same security hole recently discovered in Facebook’s iOS and Android apps has now been found in Dropbox’s iOS app as well. The flaw allows anyone with physical access to your phone to copy your login credentials — the reason, because your login information is stored in unencrypted text files on your phone by both apps.


CrowdStrike Reveals Their Exploit in RSA 2012

Remember our post on New Android Remote Exploit by the stealth security company CrowdStrike? Well they just announced at RSA 2012 in San Francisco - Attack in summary takes over your phone by SMS phishing, tricks the user to download an exploit from a remote site. And the exploit forces the phone to reboot - essentially takes takes over the phone allowing the attacker fully control the device remotely. See the video below:


HITB2012AMS Live-Hacking Competition

Here is a little press release from HackInTheBox Hackers Conference – This one is very interesting as it presents a live hack challenge to a bank and a defense attack simulation, read it below:


New Android Remote Exploit

It is the hottest trend in the security market right now, finding holes in smartphones... Seems that smart phones have more security holes than earlier versions of MS Internet Explorer. 🙂 This time a stealth-mode security start-up company called CrowdStrike found a hole that enables an attacker to take over an Android phone.


XSS Flaw discovered in Skype’s Shop

An independent security researcher Ucha Gobejishvili from Georgia has detected a cross site scripting (XSS) vulnerability on Skype's shop application. The vulnerability effects and; it allows allows an attacker to hijack cookies via required user interaction. Successful exploitation of the bug can result in session hijacking and account steal.

Upon successful exploitation the vulnerability allows an attacker to hijack cookies via required user interaction, leading to complete session hijacking and stealing of the account.

Gobejishvili has informed Skype of the vulnerabilities and is currently investigating.


802.1X password exploit on many HTC Android devices

A new vulnerability discovered shows that it is possible to gain access to a user's wireless username and password. This vulnerability discovered by Bret Jordan and Chris Hessing on February 1, the CERT already issued a vulnerability entry in its database... In his blog Bret said: