Jump to content

Search the Community

Showing results for tags 'Leaks'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Found 11 results

  1. The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says. The public leaks of classified NSA and CIA hacking tools in 2016 and 2017 appear to have leveled the playing field for nation-state cybercriminals to some extent, new research shows. Threat intelligence firm DarkOwl recently analyzed Dark Web data gathered from public and proprietary sources and found the leaked cyber weapons have strengthened the ability of emerging nation-state actors to attack rivals and project attribution to others. The NSA and CIA data — released publicly by a group called the Shadow Brokers and WikiLeaks, respectively — included an NSA espionage and mass-surveillance system called UNITEDRAKE, a multiplatform CIA malware suite called HIVE, and numerous documents describing sophisticated false-flag and other cyber-offense tactics. The leaked cyber weapons have given adversaries new ways to capture text, video, and images from target systems, including the Internet of Things (IoT) and smart TVs; attack smart vehicles; hide implants in Windows and other operating systems; and conduct a range of other surreptitious actions. Significantly, the leaks also made widely available capabilities that let attackers conceal the origins of an attack or to make it appear as if an attack originated from somewhere else entirely. Details on the NSA and CIA tools and processes have been extensively studied on the Dark Web and are now part of the arsenal of everyone from nation-state actors to ordinary cybercriminals, DarkOwl says. "The wide dissemination of cyber weapons from the NSA and CIA has changed the international cyber battle space considerably," says Andrew Lewman, vice president at DarkOwl. "Sophisticated, weapons-grade cyber tools are available on the Dark Web and [are creating] numerous challenges in determining who could be behind various cyber campaigns." The US, Russia, and China continue to be cyber superpowers in terms of skills, influence, money, and manpower. But other less powerful nations have acquired formidable strength because of their access to these previously unattainable tools. "At this time, we do not have enough intelligence to support a statement on what country has benefited the most from the leaks of these tools," Lewman says. But a generalized leveling of the playing field since the NSA and CIA leaks is clear, he notes. In DarkOwl's assessment, Israel, Germany, and the UK rank behind the top three nations in their cyber capabilities, followed by Ukraine, France, Iran, and India. But it is Iran and North Korea that present a major threat to US interests in cyberspace, especially given their ongoing cooperation and collaboration in military and technology development, Lewman says. Cyber proxies, specifically as contracted by the Kingdom of Saudi Arabia, are another increasing concern because previously the Kingdom displayed little to no cyber capabilities. "Financial resources and international influence is of concern for them and their role in international conflicts," Lewman says. Leveraging the Dark Web DarkOwl's research shows that nation-state funded threat groups are leveraging the Dark Web in multiple ways. One of the most common is for infrastructure disruption campaigns targeted at networks containing sensitive government or corporate information. Many are using the cover of the Dark Web — and tools from the NSA and CIA leaks — to go after critical infrastructure targets, as well. Attacks earlier this year involving the use of Triton malware against Triconex industrial-control systems are one example, Lewman says. Triton — a tool the NSA has previously used — is designed specifically to exploit weaknesses in industry control systems. The Dark Web also has been a source of credentials and other information for state-backed threat groups seeking to break into the networks of governments they perceive as being hostile or being of geopolitical or military interest. "For example, the Dark Web is replete with US *.gov email addresses that could be exploited for brute-force network intrusion or targeted phishing campaigns," DarkOwl said. According to the vendor, there were over a half-million Dark Web pages with credentials that included a .gov address. "Nation-state actors, cyber proxies, and terrorists will continue to use the Dark Web for operations, albeit not in as straightforward means as we'd assume," Lewman says. Source
  2. steven36

    Sure Apple, Whatever

    Apple still hasn’t set an official day for its annual fall product launch event (aka iPhone Day), but that hasn’t stopped leaks and rumors from shedding light on what we might see some time in early September. But one thing that’s still mostly a guess are the official names for Apple’s upcoming batch of iPhones. However, based on a stock list from smartphone case maker ESR (discovered by iPhonesoft.fr), the general consensus is that the next products in the iPhone family will be called the iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max. While these aren’t exactly the most intriguing or eye-catching names, by simplifying its naming scheme, Apple could eliminate some consumer confusion now that the iPhone portfolio has expanded to three new phones every year instead just two. The 6.1-inch iPhone 11 looks to be the replacement for the iPhone XR, which should continue to be the “entry-level” phone in Apple’s smartphone lineup. Meanwhile the iPhone 11 Pro will succeed the iPhone XS as Apple’s smaller, but still a very premium option. The one that sort of throws a wrench into things is the 6.5-inch iPhone 11 Pro Max, which seems like a mash-up of tags and monikers from Apple’s phone and laptop lines. While this isn’t really the first time people have theorized that Apple could add the “Pro” tag to the iPhone line, an accessory maker having the confidence to list the next iPhone as the iPhone 11 in their internal records does add a little bit of weight to previous reports. Of course, none of this means much until Tim Apple, I mean, Tim Cook gets on stage and officially announces the name of the next iPhone to the world. Personally, I think this leaked naming scheme is a little boring and somewhat clunky, but it works, even if the next batch will technically be the 13th generation of Apple’s iPhones. Source
  3. A hacker has targeted and released private data on German chancellor Angela Merkel and other senior German lawmakers and officials. The data was leaked from a Twitter account, since suspended, and included email addresses, phone numbers, photo IDs and other personal data on hundreds of senior political figures. According to a government spokesperson, there was no “sensitive” data from the chancellor’s office, but other lawmakers had more personal data stolen. Other portions of the leaked data included Facebook and Twitter passwords. Some had their credit card information stolen, and chat logs and private letters published in the breach. Germany’s Federal Office for Information Security said in a statement that it was “extensively investigating” the breach, but does not believe there was an attack on the government’s networks. It’s been reported that the hacker may have obtained passwords to access social media accounts. Often, hackers do this by tricking a phone company into “porting out” a person’s phone number to another SIM card, allowing them to password reset accounts or obtain two-factor codes. The hacker leaked data on senior lawmakers across the political spectrum, but noticeably absent were accounts for the country’s far-right Alternative for Germany party. The hack is reminiscent of a data breach involving the Democratic National Committee in 2016, which targeted the Democrats in the U.S. in the months running up to the U.S. presidential election. The U.S. government later attributed the hack to Russia, which prosecutors say tried to influence the election to elect Donald Trump to the White House. The Justice Department brought charges against seven suspects earlier this year for being part of the so-called “Fancy Bear” group of hackers, working on behalf of the Russian government. Little is known about who is behind the leak of German lawmakers’ data. The German government has not speculated about who — or if a nation state — may have been behind the attack. But the alleged hacker said in a statement linked from their Twitter account that they “operated alone and does not belong to any organization or similar on Twitter.” According to security experts who’ve seen portions of the data, the hacker spread the stolen information across several sites and mirrors, making it “really hard to take down.” This data leak has so much data squirrelled away to avoid take downs. It must have required many man hours of uploading. – 70 mirrors of the download links – 40 d/l links, each with 3-5 mirrors – 161 mirrors of data files Plus the tweets, blog posts, mirrors of mirror links. — the grugq (@thegrugq) January 4, 2019 Germany’s minister for justice Katarina Barley called the breach a “serious attack,” one that aimed to “damage confidence in our democracy and institutions,” according to the BBC. It’s not the first time that the German parliament has faced security issues. In 2015, attackers stole gigabytes of data on lawmakers, which Germany’s domestic spy agency later accused Russia of being behind the breach. Russia has repeatedly denied launching cyberattacks. Source
  4. My theory is that this causes the browser-wide Firefox developer console to capture the exception object, which in turn presumably captures a bunch of JavaScript state, variables, and code, and means that none of them can be garbage collected the way they normally would be. Trigger such exceptions very often and there you go. Replacing the console.log(e) with 'console.log("some-message")' seemed to usually make the prominent leaks go away. The loss of information was irrelevant; it's not as if I'm going to debug addons (or core Firefox code written in JavaScript). I never even look at the browser console. It's possible that opening the browser console every so often and explicitly clearing it would make my memory usage drop. I may try that the next time I have a bloated-up Firefox, just to see. It's also possible that there's a magic option that causes Firefox to just throw away everything sent to console.log(), which would be fine by me. Article source
  5. New Vault 7 leaks show CIA can install persistent malware on OS X and iOS devices A new trove of documents belonging to Wikileak’s Vault 7 leaks, dubbed “Dark Matter” reveal that Apple devices including Macs and iPhones have been compromised by the CIA. They are affected by firmware malware meaning that even a re-installation of the operating system will not fix the device. The CIA’s Embedded Development Branch (EDB) have created several tools for exploiting Apple devices, these include: Sonic Screwdriver – allows an attacker to boot its malware from peripheral devices such as a USB stick. DarkSeaSkies – is an “implant” that persists in the EFI firmware of MacBook Air computers. It consists of “DarkMatter”, “SeaPea” and “NightSkies” which affect EFI, kernel-space, and user-space respectively. Triton – macOS malware. Dark Mallet – Triton infector. DerStake – EFI-persistent version of Triton. The documents show that DerStake was at version 1.4 as of 2013, but other documents show that as of 2016, the CIA was working on DerStake 2.0. According to Wikileaks, NightSkies can infect Apple iPhones, the organisation said what’s noteworthy is that NightSkies has been able to infect iPhones since 2008. The CIA documents say NightSkies is a “beacon/loader/implant tool”. It is “expressly designed” to be physically installed onto factory fresh iPhones meaning the CIA has been intercepting the iPhone supply chain of its targets since at least 2008. "Dark Matter" is just the latest release of documents from the wider Vault 7 leaks, more CIA documents are expected in the future. Main Source: Wikileaks Source
  6. The computer storage specialists LaCie, makers of popular detachable hard drives and USB devices, has admitted to a major data breach in which credit card details and passwords of shoppers may have leaked. In a statement, the French company said that an unknown attacker may have used malware to penetrate its online store. At the time of writing, it’s still unclear whether the leaked data has been used – or how many customers have been affected. The LaCie breach is one of the longer-lasting ones among the spate of such recent attacks, with the leak extending from March 2013 to 10 March this year, according to LaCie. The company said that it had notified potential victims via email, and was working closely with credit card companies and law enforcement to deal with the breach. In a statement, the company also said that it had suspended trading until improved security measures were implemented. The BBC’s report said that for such a major breach to go unnoticed for so long was unusual. It also said that the breach could be particularly damaging as LaCie sold some security products, and a breach of this scale could damage its reputation. Veteran security researcher and writer, and We Live Security contributor, Graham Cluley says, “In an ideal world, attacks get prevented in the first place and you have done enough work to secure your website and maybe hired some penetration testers to see if there are vulnerabilities,” he said. “If you can’t prevent it in the first place, hopefully you can pick it up while it’s occurring and deflect it. Clearly LaCie did fail in some way. They should have spotted something was happening.” Speaking to the BBC, “It is a major breach,” Ron Austin, senior lecturer in computer security at Birmingham City University, told the BBC. “LaCie is a fairly big company and you would question their information security policies. “No expert can guarantee 100% security, but it goes back to compliance and ensuring that if you’re offering services out on to the web that you are carrying out regular checks.” LaCie responded quickly with a statement saying, “On March 19, 2014, LaCie USA, a subsidiary of Seagate, found indications that an unauthorized person used malware to gain access to information from customer transactions made through LaCie’s website. The information that may have been accessed by the unauthorized person includes name, address, email address, payment card number and card expiration date for transactions made between March 27, 2013 and March 10, 2014. “We engaged a leading forensic investigation firm, who conducted a thorough investigation into this matter. As a precaution, we have temporarily disabled the e-commerce portion of the LaCie website while we transition to a provider that specializes in secure payment processing services. We will resume accepting online orders once we have completed the transition.” Source
  7. Geeksphone recently made headlines for collaborating on the allegedly NSA-proof Blackphone, but the Spanish startup is also hard at work on its own flagship handset. The first photos of the Geeksphone Revolution were recently leaked online by German site Mobile Geeks, showing off the dual-booting Android-Firefox OS handset. The company has since confirmed that the pictures are authentic. The Revolution comes equipped with a 4.7-inch IPS qHD display, a 1.6 GHz dual-core Intel Atom processor, and a 2000mAh battery. The device appears to come in black or white and feature a slightly curved design with three capacitive buttons on the front. There’s still no word on pricing or availability, though Geeksphone has hinted that the upcoming smartphone will come at a budget-friendly price. Dual-booting devices have just begun to catch on, with a few Android-Windows devices making an appearance at CES 2014 earlier this month. We’ve also heard rumors that Microsoft unsuccessfully pressured HTC and other smartphone-makers to put Windows Phone 8 on their Android devices as a secondary OS. Geeksphone appears primed to actually release the first dual-booting smartphone, and we’re looking forward to seeing the Revolution in action. Source
  8. In November, WikiLeaks published a rare draft of the secretive Trans-Pacific Partnership treaty — revealing the United States' covert international push for stronger intellectual property rights. Now, nearly a month after the first documents were published, the group is back on the case, publishing a new raft of documents from the TPP negotiations currently taking place in Singapore. The revelations are mostly the same, with the United States leading the charge for SOPA-like penalties on file-sharing and stringent patent reforms, but the new documents suggest that the public outcry against these proposals has had little effect on the negotiations. The leaks come at a particularly inconvenient time for negotiators, as they enter into their fourth day of talks in Singapore amid growing criticism. The talks are premised on secrecy, allowing countries to push for particular proposals without having to justify their positions publicly, but the continued pressure from WikiLeaks has brought unintended attention to the proceedings. These latest documents highlight the United States' role in the process, as it attempts to force the smaller nations to adopt more stringent rules. "The US is exerting great pressure to close as many issues as possible this week," says a state-of-play summary included in the leaks. "This pressure will increase with every passing day." Source
  9. geeteam

    Galaxy S5 Metal Frame Leaks

    The frame arrives courtesy of notorious leaker Nowhereelse.fr, a French blog with a rich history in getting hold of products and parts before during the very early stages. One reason, perhaps, why the Galaxy S4 has not sold in the vast numbers Samsung might have hoped, is cited by many to be the cheap, plastic body. Many other companies competed with the Galaxy S / S2 / S3 in terms of hardware, but most of these rivaling handsets also sported a fairly underwhelming finish. This all changed earlier on in the year with the HTC One, a handset with an uber-sharp display, quad-core Snapdragon processor and, notably, a slick aluminum finish. Many Samsung fans have been crying out for the high-end handset to be afforded an equally high quality finish, and this metal frame suggests this could finally be the case with the S5. Of course, this leak cannot be verified, and it’s also very much possible that the rest of the device could be comprised of plastic, but for those hoping Samsung comes through with something vastly different from the S 4, this should be taken as an encouraging sign. Nowhereelse.fr’s sources claim Samsung will be bringing an aluminum smartphone in the future, and with the HTC One and iPhone 5s both the subject of much acclaim from design experts and fans in general, it will be interesting to see whether the South Korean company does feel like breaking a habit of a lifetime. The frame also points to a slightly larger display than that of the S4, but we’d expect this to be the case anyway. We’ve also been hearing that Samsung plans to really push the envelope with regards to the cameras of both the Note 4 and Galaxy S5, and we certainly cannot wait to hear more about these two eagerly-awaited handsets. Source
  10. Samsung has committed to bringing Android 4.3 Jelly Bean to its Galaxy S III former flagship and the rollout should start in a few weeks’ time. If you know your way around flashing a ROM manually, though, you don’t even have to wait that long as a pre-release version of the Android 4.3 build has just surfaced. The beta version is reportedly stable enough to work as a daily driver, although it may have a bug or two. It brings a number of UI changes, including a new settings menu with tabbed interface as found on more recent Samsung flagships. The transparent notification bar is here too. Unfortunately the majority of the widgets in this build are still using the old design and Samsung Knox isn’t enabled. That should change in the final Android 4.3 ROM for the Galaxy S III, though, so you don’t have to worry about missing on the security feature. If you feel like giving the latest Jelly Bean version a trial run, download link here flash with Odin and enjoy. source: gsmarena
  11. DAVID CAMERON has defended the security services amid claims that Britain may have helped America to spy on European leaders. The PM accused those leaking information about the intelligence agencies of putting lives at risk. He said: “The first priority of a prime minister is to help try and keep your country safe. That means not having some lah-di-dah, airy-fairy view about what this all means – it’s understanding security services do an important job.” His comments came as France and Germany pressed America to come clean about the extent of its eaves-dropping on world leaders. It is alleged that the US may have “indirectly” listened to Cameron when he was speaking to another person under surveillance. The PM refused to comment, saying he never spoke about intelligence activities. He also snubbed an invitation from German leader Angela Merkel and French president Francois Hollande to talks with the White House on the issue. Instead he launched a blistering attack on former US intelligence operative Edward Snowden, who lifted the lid on the US National Security Agency and GCHQ’s internet surveillance. Cameron said: “We have intelligence services and I will back the work that they do. “I will criticise, though, those that make public some of the techniques that they use because that is helping our enemies. Simple.” source: dailyrecord
×
×
  • Create New...