• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Main Content

“OceanLotus” targets BMW and Hyundai networks

December 10, 2019 By Jaimin Pandya Leave a Comment

APT hacker group “OceanLotus” apparently compromised network systems of automaker BMW and Hyundai by installing some hacking tool which would control and spy their systems. What they did was nothing new but it was sophisticated.

According to the article

“Created Fake Websites

To get access to other computers, the hackers created a fake website that gave the impression of belonging to the BMW branch in Thailand, as they can monitor networks and find out which folders and files that users logged in.

Hackers Observed for Months

The security team at BMW allowed hackers to stay active with an intention to know more details like, who they were, how many systems they managed to compromise, and what kind of data they were after.

Based on sources, no sensitive information was accessed by hackers during the incident and no primary computers were compromised.

BMW declined to provide additional information on the attack.

“We have implemented structures and processes that minimize the risk of unauthorized external access to our systems and allow us to quickly detect, reconstruct, and recover in the event of an incident,” BMW said in a statement.”

Source Article: https://www.cisomag.com/apt-hacker-group-targets-bmw-and-hyundai-networks/

 

Week 14 Presentation and Video

December 9, 2019 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-14

https://capture.fox.temple.edu/Mediasite/Play/63abf86c86f943eb85d5d510d1fc81231d

Week 13 Presentation and Video

December 9, 2019 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-13

https://community.mis.temple.edu/mis5211sec001fall2019/

ACLU sues FBI, DOJ over facial-recognition technology, criticizing ‘unprecedented’ surveillance and secrecy

October 31, 2019 by Jiahao Karl Li Leave a Comment

ACLU sues FBI, DOJ over facial-recognition technology, criticizing ‘unprecedented’ surveillance and secrecy

The reports talked about the the American Civil Liberties Union (ACLU) suing the Department of Justice, the FBI and the Drug Enforcement Administration the usage of facial-recognition software, and arguing in a detailed records that Americans’ civil rights and privacy were threaten by their use of the secretly implemented a nationwide surveillance technology.

 

The Washington Post

Filed Under: Week 10: SecuritySheperd Tagged With:

Facebook content moderation firm Cognizant quits

October 31, 2019 by Percy Jacob Rwandarugali Leave a Comment

It follows an investigation by The Verge into working conditions and the mental health of employees working at an Arizona moderation center on behalf of the social network.

Cognizant also has workers in India, Europe and Latin America.It is believed its decision will result in around 6,000 job cuts.

The firm told the BBC: “We have determined that certain content work in our digital operations practice is not in line with our strategic vision for the company and we intend to exit this work over time. This work is largely focused on determining whether certain content violates client standards – and can involve objectionable materials.

“Our other content-related work will continue. In the meantime, we will honor our existing obligations to the small number of clients affected and will transition, over time, as those commitments begin to wind down. In some cases, that may happen over 2020, but some contracts may take longer.”

In response, Facebook’s Arun Chandra said: “We respect Cognizant’s decision to exit some of its content review services for social media platforms.

https://www.bbc.com/news/technology-50247540

Filed Under: Uncategorized, Week 10: SecuritySheperd Tagged With:

Georgia ‘I’ll Be Back’ Cyber Attack Terminates TV, Takes Down 15,000 Websites

October 31, 2019 by Percy Jacob Rwandarugali Leave a Comment

A “massive” cyber-attack against multiple targets in Georgia has taken place on October 28, as the BBC and other media reported.

Not only has this seen thousands of websites impacted but two Georgian TV broadcasters, Imedi TV and Maestro, were temporarily taken offline as well. Critical national infrastructure, however, would appear not to have been affected.

Filed Under: Week 09: Web Application Hacking Tagged With:

Week 9 Presentation and Video

October 31, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-9

 

https://capture.fox.temple.edu/Mediasite/Play/19ca5f5e1b8f452cad8debc470df07871d

Filed Under: Week 09: Web Application Hacking Tagged With:

Week 8 Presentation and Video

October 31, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-8

 

https://capture.fox.temple.edu/Mediasite/Play/ab2489455d0a4295baf86b63361af17c1d

Filed Under: Week 08: Malware Tagged With:

Data breach causes 10 percent of small businesses to shutter

October 30, 2019 by Penghui Ai Leave a Comment

People are aware that the impact of data breach will be more severe for big company like Facebook and Target, but it could be more serious for small company because it could cause the bankruptcy in the end. This article shows the results of a survey of 1,008 small businesses with up to 500 employees to prove it. This survey found that 10 percent of the business went out of business, and 25 percent of them had to file for bankruptcy and 37 percent experienced a financial loss after suffering a data breach. 44 percent of these victims were from larger firms of 251-500 people, while 11 percent were companies with 10 or fewer workers. Even though these company has less probability to be the target of hackers and the scale of the organization determines the amount of losses it can suffer, the problem will become more severe for the organization itself based on poor cyber security policy.

https://www.scmagazine.com/home/security-news/data-breach-causes-10-percent-of-small-businesses-to-shutter/

Filed Under: Week 09: Web Application Hacking Tagged With:

Could your ERP system make you a victim of cybercrime?

October 30, 2019 by Penghui Ai Leave a Comment

Hackers can destroy a organization though multiple ways, and one of that is get the information on enterprise resource planning (ERP) software. The information including personal information, IP and financial data. All information, if in the wrong hands, could destroy a company. This article interprets that 90% of SAP systems are reported to be vulnerable to 10KBLAZE, a public exploit discovered in April this year. Even though the ORACLE publishes patches to fix the bugs, the company still needs make sure they have cybersecurity and application maintenance policies and procedures in place. They should also make sure that included in those procedures is an audit process that truly assesses the system – identifying any vulnerabilities, and ensuring fixes and patches are implemented in a timely manner.

 

https://www.natlawreview.com/article/could-your-erp-system-make-you-victim-cybercrime

Filed Under: Week 08: Malware Tagged With:

Cyber Attack on Indian Nuclear Plant

October 30, 2019 by Xiduo Liu Leave a Comment

A government-owned entity – the Nuclear Power Corporation of India was one of the victims of the most recent high profile cyber-attacks. According to a statement released by the company, the attack was discovered on September 4, and no plant control systems were affected. “The investigation revealed that the infected PC belonged to a user who was connected in the internet-connected network used for administrative purposes. This is isolated from the critical internal network. The networks are being continuously monitored. The investigation also confirms that the plant systems are not affected.” According to the article by TNW, the attacks used malware to access the domain controller account that grants access and authenticates requests from other computers in the network.

Some additional information also provided in the article is the data collected by the malware was sent to a mounted drive via SMB and the drive and credential is statically encoded: net use \\\\10.38.1.35\\C$ su.controller5kk /user:KKNPP\\administrator

 

Filed Under: Week 09: Web Application Hacking Tagged With:

Android gets new security sandboxing features

October 29, 2019 by Daniel Bavaro Leave a Comment

https://www.itpro.co.uk/google-android/34657/android-gets-new-security-sandboxing-features

This article describes a new feature in Chrome and Android that aims to help with cross-site scripting attacks and other similar attacks. The feature isolates the data in each tab of Chrome and prevents them from reaching out and communicating with each other. So, some malicious code on Tab A, wouldn’t be able to pull your session or credentials from Tab B.

Filed Under: Week 09: Web Application Hacking Tagged With:

Hacking victim who paid Bitcoin ransom goes on to hack the hackers

October 29, 2019 by William Ha Leave a Comment

A ransomware victim who paid the attackers to decrypt his files gets revenge by hacking them right back. The German programmer released almost 3,000 decryption keys to assist others hit by the Muhstik ransomware, alongside free decryption software. What he did wasn’t legal, but it’s cool to see this vigilante type response to being hacked. Who knows? Maybe if situations like these happened more often, we’d see a decline in ransomware related attacks. Since the FBI warns companies not to pay the ransom anyway, the possibility of getting hacked right back could further deter ransomware attacks.

 

https://thenextweb.com/hardfork/2019/10/08/ransomware-bitcoin-hacker-cryptocurrency-muhstik-rekt/

Filed Under: Week 09: Web Application Hacking Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Interim pages omitted …
  • Page 18
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in