Interesting malware, DoubleLocker, can reset your PIN and encrypts your data. Interesting that is does both.
https://www.darkreading.com/mobile/doublelocker-delivers-unique-two-punch-hit-to-android–/d/d-id/1330134?
ITACS 5211: Introduction to Ethical Hacking
Wade Mackey
Interesting malware, DoubleLocker, can reset your PIN and encrypts your data. Interesting that is does both.
https://www.darkreading.com/mobile/doublelocker-delivers-unique-two-punch-hit-to-android–/d/d-id/1330134?
Recently, security researchers have discovered a new privilege-escalation vulnerability in Linux kernel that could allow a local attacker to execute code on the affected systems with elevated privileges. In the article, it describes that an attacker with local access to the targeted system, they can execute a maliciously crafted application on a targeted system which allows the attackers to elevate his privilege to root on the targeted system. Besides that, the article also mentions that the vulnerability affects major distributions of the Linux operating system including RedHat, Debian, Ubuntu, and Suse.
https://thehackernews.com/2017/10/linux-privilege-escalation.html
https://www.krackattacks.com/
WPA2 encryption has been compromised. KRACK Attacks or Key Reinsallation Attack allows hackers to decrypt packets in Wifi traffic and … “use this novel attack technique to read information that was previously assumed to be safely encrypted. This can be abused to steal sensitive information such as credit card numbers, passwords, chat messages, emails, photos, and so on. The attack works against all modern protected Wi-Fi networks.”
Things to note:
I wonder if this will speed up the adoption of a new protocol.
I thought this was super cool and since I own one of the affected years part of me really wants to build out what they are talking about and try it. ( i already have all the comments that are needed). This article talks about how there is an exploit in specific model year Subarus that can cause you to capture the FOB packets and then with a simple script you are able to unlock and relock the car. Subaru claims they are aware of this issue but have no done anything about it. I also wanted to note that even though I do own one of the effected cars at this point nothing on that car is stock including the alarm so the chances of this actually working for myself are slim because the OEM system is bypassed but it is still cool to give it a try.
https://www.bleepingcomputer.com/news/security/unpatched-exploit-lets-you-clone-key-fobs-and-open-subaru-cars/
USA Today reports the NSA’s Tailored Access Operation unit had a serious data breach. This is one of the largest incidents at NSA over the last five years.
The story reports, the access controls at the TAO’s locations are “porous”, allowing workers to easily remove information by digitally removing or by simply walking out the front door.
Here are a few quotes from the story:
“Physical security wasn’t much better, at least at one TAO operator’s facility. He told The Daily Beast that there were “no bag checks or anything” as employees and contractors left work for the day—meaning, it was easy smuggle things home. Metal detectors were present, including before Snowden, but “nobody cared what came out,” the second source added. The third source, who visited TAO facilities, said bag checks were random and weak.”
“If you have a thumb drive in your pocket, it’s going to get out,” they said.
Unsurprisingly, workers need to swipe keycards to access certain rooms. But, “in most cases, it’s pretty easy to get into those rooms without swipe access if you just knock and say who you’re trying to see,” the third source added.
“The TAO is the tip of the NSA’s offensive hacking spear, and could have access to much more sensitive information”.
“Defense Department’s inspector general completed in 2016 found that the NSA’s “Secure the Net” project—which aimed to restrict access to its most sensitive data after the Snowden breach—fell short of its stated aims. The NSA did introduce some improvements, but it didn’t effectively reduce the number of user accounts with ‘privileged’ access, which provide more avenues into sensitive data than normal users, nor fully implement technology to oversee these accounts’ activities”
I guess the Top Secret classification doesn’t mean what it used too…
http://www.msn.com/en-us/news/technology/elite-hackers-stealing-nsa-secrets-is-%E2%80%98child%E2%80%99s-play%E2%80%99/ar-AAtiWhO?li=AA4Zoy&ocid=spartandhp
Intro-to-Ethical-Hacking-Week-7
Includes update on snaplength. Thanks Ian!