Monday, May 26, 2014

Blackshades malware spies through your webcam

In the old days, one simply had to draw their blinds to avoid peeping toms from spying on their private business. Now, it seems that even with the shades drawn, one must also shutter their webcam. Earlier this week, the FBI initiated a crackdown leading to the arrest of nearly 100 users of a program called Blackshades malware. This program allows hackers to remotely access the computers of their victims, enabling them to steal files, log passwords, and even turn on microphones and webcams unnoticed. This spying software could be purchased online for as little as $40 U.S.D.

Blackshades malware is referred to as a remote access tool (RAT), meaning it allows the hacker to gain full access to your machine as if he were sitting right in front of it. The technology behind this threat is similar to that used by the IT department at your office. When Joe IT Guy needs to access your work computer to install updates, fix an issue with your settings, or remotely control your machine for a variety of other reasons, he can with advanced warning and mutual understanding that he has the right to do so. Perpetrators of Blackshades malware aren’t quite as courteous.

Prior to the FBI crackdown this week, anyone with an Internet connection could purchase the Blackshades software, and they didn’t need to be a skilled hacker to use it, either. As security blogger Brian Krebs put it, “Blackshades was a tool created and marketed principally for buyers who wouldn’t know how to hack their way out of a paper bag.” The ease of use (and ease of purchase) associated with Blackshades malware illustrates the “hacking as a service” phenomenon, where anyone with the financial means necessary can become a cybercriminal. The software even came with tools known as “spreaders” which helped these novice cybercriminals distribute malicious links via social media, in an effort to infect more computers. As with most other malware attacks, Blackshades relies on you visiting an infected website or downloading an infected file in order to install a hacker’s malicious software on your computer.

The prepackaged malware also came with tools to help cybercriminals extract money from their victims, otherwise known as ransomware. Ransomware works by allowing the hacker to lock or encrypt files (sometimes even locking you out of your device completely), and then demand money in exchange for allowing you to regain access.

Blackshades malware is a multidimensional, robust software program with a relatively puny price tag. And just because the FBI has cracked down on its users, doesn’t mean it’s disappeared from the Web completely. In fact, this strain of malware has been around for years.

Here are some steps you can take to protect yourself from virtual peeping toms:
  • Do not click on links from unknown senders
  • Use web protection when surfing online
  • Avoid attachments from unknown senders
  • Download apps, music, and movies from official sources
  • Install comprehensive security on your system

Microsoft ends support for Windows XP and Office 2003

Microsoft is ending support for the Windows XP operating system and Office 2003 product line on April 8, 2014. After this date, these products will no longer receive:
  1. Security patches which help protect PCs from harmful viruses, spyware, and other malicious software
  2. Assisted technical support from Microsoft
  3. Software and content updates

All software products have a lifecycle. End of support refers to the date when Microsoft no longer provides automatic fixes, updates, or online technical assistance. As of February 2014, nearly 30 percent of Internet-connected PCs still run Windows XP.

Microsoft will send “End of Support” notifications to users of Windows XP who have elected to receive updates via Windows Update. Users in organizations using Windows Server Update Services (WSUS), System Center Configuration manager, or Windows Intune will not receive the notification.

The Impact
Computer systems running unsupported software are exposed to an elevated risk to cybersecurity dangers, such as malicious attacks or electronic data loss.

Users may also encounter problems with software and hardware compatibility since new software applications and hardware devices may not be built for Windows XP or Office 2003.

Organizations that are governed by regulatory obligations may find they are no longer able to satisfy compliance requirements.


What is the Solution?
Computers operating Windows XP with SP3 or running Office 2003 products will continue to work after support ends. However, using unsupported software may increase the risk of viruses and other security threats.

Users have the option to upgrade to a currently supported operating system or office productivity suite. The Microsoft “End of Support” pages for Windows XP andOffice 2003 offer additional details.

There are software vendors and service providers in the marketplace who offer assistance in migrating from Windows XP or Office 2003 to a currently supported operating system or office productivity suite.

Users who choose to continue using Windows XP after the end of support may mitigate some risks by using a web browser other than Internet Explorer. The Windows XP versions of some alternative browsers will continue to recieve support temporarily. Users should consult the support pages of their chosen alternative browser for more details.

So Windows XP users must migrate to Windows7 otherwise be careful about viruses and cyber threats.

Saturday, May 24, 2014

Apple iCloud stormed by Dutch Hackers

Apple cloud service "iCloud" is probably one of the secure cloud service owned by the Apple Inc. It the same cloud storage and cloud computing service provided by the Apple Inc. to its users since October 2011 with more than 320 million users across the world. 

Couple of the hackers go by the name AquaXetine and Moroccan hacker with the name Merruktechnolog, have claimed to hack the Apple iCloud system. Hackers have used the Man-in-Middle attack for the hack of the Apple locked devices. 

According to a report from Dutch news organization De Telegraaf, the hackers purchased locked iPhone devices for $50 to $150 each and then bypassed Apple’s iCloud activation lock through a serious security vulnerability Apple has failed to patch with its most recent updates. iCloud service allows users to store and back-up data such as music, photos, applications, documents, bookmarks, reminders, backups, notes, iBooks, and contacts, and provides a platform for Apple's email servers and calendars. 

Security experts says that hackers can do more thing with the vulnerability. Attacker can read the message and also steal the Apple ID credentials from the devices. Hackers have worked for five months to breach the security of Apple iCloud system. Last day Doulci hacker group on their twitter have posted that the group have “processed” more than 5,700 Apple devices in just five minutes using the hack. With the good intention and with ethical subject, hackers have reported the vulnerability to Apple Security team back in March, but Apple team have never responded to their vulnerability report. 

This makes the hackers to disclose the vulnerability publicly. The pair of hackers are offering unlocking services via doulCi.nl website, according to information found on their website. With this doulCi is the world’s first Alternative iCloud Server, and the world’s first iCloud Activation Bypass.