• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Main Content

“OceanLotus” targets BMW and Hyundai networks

December 10, 2019 By Jaimin Pandya Leave a Comment

APT hacker group “OceanLotus” apparently compromised network systems of automaker BMW and Hyundai by installing some hacking tool which would control and spy their systems. What they did was nothing new but it was sophisticated.

According to the article

“Created Fake Websites

To get access to other computers, the hackers created a fake website that gave the impression of belonging to the BMW branch in Thailand, as they can monitor networks and find out which folders and files that users logged in.

Hackers Observed for Months

The security team at BMW allowed hackers to stay active with an intention to know more details like, who they were, how many systems they managed to compromise, and what kind of data they were after.

Based on sources, no sensitive information was accessed by hackers during the incident and no primary computers were compromised.

BMW declined to provide additional information on the attack.

“We have implemented structures and processes that minimize the risk of unauthorized external access to our systems and allow us to quickly detect, reconstruct, and recover in the event of an incident,” BMW said in a statement.”

Source Article: https://www.cisomag.com/apt-hacker-group-targets-bmw-and-hyundai-networks/

 

Week 14 Presentation and Video

December 9, 2019 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-14

https://capture.fox.temple.edu/Mediasite/Play/63abf86c86f943eb85d5d510d1fc81231d

Week 13 Presentation and Video

December 9, 2019 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-13

https://community.mis.temple.edu/mis5211sec001fall2019/

Largest cyber-attack in Georgia’s history linked to hacked web hosting provider

October 29, 2019 by Rami Saba Leave a Comment

A hacker has defaced over 15,000 websites hosted on the infrastructure of Pro-Service, a Georgian web hosting provider, including government sites, local newspapers, and TV stations.

Yesterday, the country of Georgia suffered a major cyber-attack.  Over 15,000 websites were defaced with an image of former Georgian President Mikheil Saakashvili, with the text “I’ll be back” overlaid on top.  Two television stations went off-air following the attacks.  I did read in another article that one of the TV station’s equipment was actually destroyed by the attack.  A third TV station was affected, but did not go off-air.  Several newspaper sites were also brought down.  Many linked yesterday’s attack with a similar 2008 Russian attack that defaced government sites and hacked TV and radio stations.  Although currently there is no evidence to suggest it was Russian based, an investigation was started to identify the culprit.

Pro-Service, a local web hosting provider, took blame for the issue.  They admitted that a hacker breached its network and took down customer websites.

 

Filed Under: Week 09: Web Application Hacking Tagged With:

7.5 Million Records of Adobe Creative Cloud User Data Exposed

October 26, 2019 by Percy Jacob Rwandarugali Leave a Comment

Adobe secured a database with 7.5 million records belonging to Adobe Creative Cloud users. The cache was not protected in any way, allowing anyone access to client information if they knew how to find it. Although the details included are not highly sensitive, they could be used to launch better-crafted phishing campaigns against customers whose data was exposed.

https://www.bleepingcomputer.com/news/security/75-million-records-of-adobe-creative-cloud-user-data-exposed/

Filed Under: Week 09: Web Application Hacking Tagged With:

Senior Infosec Staffer Resigns, Says White House On Track To Be Hacked Again

October 26, 2019 by Percy Jacob Rwandarugali Leave a Comment

A senior member of the White House cybersecurity staff delivered his resignation as part of a scathing memo this week. Among other things, he claims security is taking a back seat to convenience at 1600 Pennsylvania Avenue.

That staffer was Dimitrios Vastakis, whose official title was branch chief of the White House computer network defense. His resignation this week is just the latest in a string of worrying departures by members of the White House infosec team.

Vastakis was originally part of the Office of the Chief Information Security Officer (OCISO). That Office was created just 5 years ago – after it was discovered that hackers linked to Russian intelligence agencies breached White House systems.

In a short amount of time, the staff of the OCISO made dramatic improvements to the White House systems known collectively as the Presidential Information Technology Community (PITC).

https://www.forbes.com/sites/leemathews/2019/10/23/senior-infosec-staffer-resigns-says-white-house-on-track-to-be-hacked-again/

Filed Under: Week 08: Malware Tagged With:

Japanese Hotel Apologizes for Robots That Allowed Video and Sound to Be Hacked

October 26, 2019 by Rami Saba Leave a Comment

The Henn na Hotel in Japan has bedside robots that serve as guest assistants.  Several weeks ago, a researcher warned HIS Group that the bed-bots were easily accessible because they allowed unsigned code to run simply by tapping an NFC tag to the back of the robot’s head.  This allowed a hacker to remotely watch and listen through cameras and microphones in the robot.  He released a 0day vulnerability after the researcher had not heard back from the hotel for more than 90 days.  The hotel then apologized and fixed the robots.

The researcher’s twitter also makes for a good read.

The report also includes a note from a cybersecurity specialist.  Joseph Carson said such a vulnerability is not surprising and anything connected to the internet: a laptop, phone, webcam or hospitality robot, are all exposed to the risk of being hacked and abused.

https://www.securitymagazine.com/articles/91157-japanese-hotel-apologizes-for-robots-that-allowed-video-and-sound-to-be-hacked

Filed Under: Uncategorized Tagged With:

Small and Medium-sized businesses at risk of E-Skimming attacks

October 26, 2019 by Andrew P. Sardaro Leave a Comment

https://cyware.com/news/fbi-issues-warning-to-smbs-about-e-skimming-attacks-a251120c 

The FBI is warning SMBs and government agencies about the risk of e-skimming attacks for businesses that take credit card payments online.

E-Skimming, also known as Magecart attacks, occurs when malicious code is injected into a website’s POS system disguised as payment card skimmer scripts. Once the POS is compromised, hackers can then steal customers’ payment card information.

Hackers gain access to the POS server through a phishing attack, third party vendor vulnerability. Once they have access they act as a silent man in the middle and steal user credit card information to sell for profit.

The FBI recommends standard mitigation measures to protect your business from E-Skimming.

Patch Patch Patch your systems.

User education to avoid falling victim to phishing attacks

Remove any default login credentials

Segment networks to avoid easy hops for hackers

Here is an article which breaks down Magecart attack and its evolution: https://www.csoonline.com/article/3400381/what-is-magecart-how-this-hacker-group-steals-payment-card-data.html

 

Filed Under: Week 09: Web Application Hacking Tagged With:

Adobe exposed Creative Cloud accounts to the Public

October 25, 2019 by Xiduo Liu Leave a Comment

The latest data breach came from Adobe exposing 7.5 million Creative Cloud accounts to the public via a “vulnerability related to work on one of our prototype environments”. According to Adobe, the misconfigured environment has been shut down and the vulnerability has been addressed.

According to one report, the exposed data included email addresses, the Adobe products they subscribed to, account creation date, subscription, and payment status, local timezone, member ID, time of the last login, and whether they were an Adobe employee.

It is unknown if there has been unauthorized access, and the issue was discovered on 10/19 and Adobe addressed the issue on the same day.

There are no sensitive details like passwords or payment data, but the database is close to 86GB in size. Additional information and screenshots can be found here.

 

Filed Under: Week 09: Web Application Hacking Tagged With:

Some local news – Downingtown school data breach

October 25, 2019 by Jaimin Pandya Leave a Comment

A “brute-force” computer hacking. Leaked student records. A criminal investigation. References to past suicides. Suspensions. And a nationwide teen craze called Assassin. – This is what the article says. It’s a really weird and interesting case if anyone wants to read up on it. This is a local school around the area and the story has no specific background – its all over the place. It will be interesting to see how it all unfolds.

Link: https://www.inquirer.com/news/downingtown-school-district-hacking-students-assassin-game-20191025.html

Filed Under: Week 09: Web Application Hacking Tagged With:

Cyware Weekly Threat Intelligence, October 14 – October 18, 2019

October 24, 2019 by Percy Jacob Rwandarugali Leave a Comment

This link gives weekly news about cyber security, this includes the good and bad stuff.

The Good
Another week has almost come to an end, and it was quite an eventful one in cyberspace. Let’s begin our weekly roundup with the positive cybersecurity advancements. The Medical Imaging & Technology Alliance (MITA) has released a cybersecurity playbook on medical device security and risk management processes. The Healthcare and Public Health Sector Coordinating Council (HSCC) has published guidance focusing on supply chain cybersecurity risk management. Meanwhile, Microsoft and NIST are working on a new guide to make enterprise patch management easier.

 

 

https://cyware.com/weekly-threat-briefing/cyware-weekly-threat-intelligence-october-14-october-18-2019-ddd4

Filed Under: Week 08: Malware Tagged With:

Avast, NordVPN Breaches Tied to Phantom User Accounts

October 24, 2019 by Jiahao Karl Li Leave a Comment

Attackers are using forgotten or unknown user accounts with little more than a password to gain remote access to the internal system of Avast, antivirus and security giant, and NordVPN, virtual private networking (VPN) software provider. Both companies disclosed details about the month-long, from May to August, intrusion today.

krebsonsecurity.com

 

 

Filed Under: Week 09: Web Application Hacking Tagged With:

How to Avoid the Top Three Causes of Data Breaches in 2019

October 24, 2019 by Numneung Koedkietpong Leave a Comment

The article states that there are three main causes of data breaches in 2019 as following;

  1. Misconfigured cloud storage: most of companies don’t use encryption to protect data in cloud or don’t put any security access control as a standard. What’s more, they don’t concern about term and agreement.
  2. Unprotected code repositories: external software developers are the weakness because they lack of security traning awareness which allows attackers easily exploit to the systems.
  3. Vulnerable open source software: The companies still have the vulnerabilities of open source component, libraries, and frameworks. Patches are not regularly updated.

Therefore, five recommendations are provided;

  1. Maintain an up2date and holistic inventory of your digital assets
  2. Monitor your external attack surface and risk exposure
  3. Keep your software up2date, implement patch management and automated patching
  4. Prioritize your testing and remediation efforts based on risks and threats
  5. Keep an eye on Dark Web and monitor data leaks.

Source: https://thehackernews.com/2019/10/data-breach-protection.html

Filed Under: Uncategorized Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Interim pages omitted …
  • Page 18
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in