Darren Pauli

Contact Mail Follow Twitter RSS feed

700,000 beautiful women do the bidding of one Twitter-scamming man

Satnam Narang of Symantec says one scammer was so taken with Twitter he established 750,000 accounts. The senior security response manager found the one man spam plague set up the mind boggling number of Twitter accounts he calls 'mockingbirds' to flog Green Coffee Bean Extract earning cash for visitors referrals. Narang said …
Darren Pauli, 27 Mar 2015

Court recording biz with clients EVERYWHERE has forums breached

Australian court transcription company "For The Record" – which bills itself as "The No.1 digital evidence recording platform in the world" and says its products are "used in courtrooms throughout North America, Europe and Asia" – has had its forum hacked. The firm is used by the likes of the Victorian and NSW Supreme courts to …
Darren Pauli, 27 Mar 2015

Optus must hire checkbox champion after epic router, voicemail borking

Optus has escaped a financial penalty imposed Australia's privacy boss and instead must review its internal security measures after it shipped hundreds of thousands of routers with open internet ports and default credentials, opened voice mails, and marked public scores of private phone numbers. The order billed as an ' …
Darren Pauli, 27 Mar 2015
Random numbers

'Bar Mitzvah attack' should see off ancient and crocked RC4 algo

Security boffin Itsik Mantin has found a new attack based on old weaknesses that is the first 'practical' attack on SSL that does not require man-in-the-middle to steal sensitive data from RC4 algorithms. The Imperva bod's research reveals a 13 year-old weakness in the superseded algorithm, which is known to be insecure but is …
Darren Pauli, 27 Mar 2015

I helped Amazon.com find an XSS hole and all I got was this lousy t-shirt

Amazon has patched dangerous cross-site scripting (XSS) vulnerability in its website that exposed accounts to hijacking. A Brazilian hacker using the handle @BruteLogic published the then-zero-day flaw to XSSposed.org Saturday without tipping off the book giant. Amazon swatted the flaws two days later. The time between …
Darren Pauli, 26 Mar 2015

Hacker builds cheatbot for hit app Trivia Crack

Security researcher Randy Westergren has reverse engineered super popular app Trivia Crack, recompiled it to help cheaters and along the way showed how to turn it into nastyware. Trivia Crack has taken the world by storm, accruing some 130 million installs across Android devices and an unknown on iOS units. The app which pits …
Darren Pauli, 26 Mar 2015
Rickmote

And the prize for LEAST SECURE BROWSER goes to ... Chrome!

More vulnerabilities were discovered in Google Chrome last year than any other piece of core internet software – that's according to research that also found 2014 clocked record numbers of zero-day flaws. The Secunia Vulnerability Review 2015 report [PDF] is built on data harvested by the company's Personal Software Inspector …
Darren Pauli, 26 Mar 2015

Israeli boffins hack air gap, fire missiles on compromised kit

One of the weirder attacks to bridge air gap networks has emerged, and uses heat to transfer data between machines. The command and control mechanism forged by Ben Gurion University researchers could transfer sensitive data through "thermal pings" between two physically close computers. Like many air gap bridges, the so-called …
Darren Pauli, 25 Mar 2015

Favicons used to update world's 'most dangerous' malware

Developer Jakub Kroustek has found new features in the dangerous Vawtrak malware that allow it to send and receive data through encrypted favicons distributed over the Tor network. The AVG security bod reveals the features in a report (pdf) into the malware which is considered one of the worst single threats in existence. He …
Darren Pauli, 25 Mar 2015

Half of Android devices open to silent hijack

Hacker Zhi Xu has found that seemingly legitimate apps can unleash a hidden dark side to compromise almost half of all Android devices. The Palo Alto Networks senior engineer says legitimate Google Play apps can establish a kind of beachhead on devices that can be invaded by a second app installed from legitimate third party …
Darren Pauli, 25 Mar 2015

BlackHat talk hibernated over 0-day in SAP's Afaria mobile manager

Updated Alexander Polyakov has been forced to withdraw a talk detailing dangerous vulnerabilities into SAP's mobile device management product Afaria scheduled to be given at BlackHat Asia Pacific this week. The prolific SAP hacker and chief technology officer of ERPScan says his talk was scuppered after SAP failed to patch the …
Darren Pauli, 24 Mar 2015

Adobe Flash fix FAIL exposes world's most popular sites

Hackers Luca Carettoni and Mauro Gentile found a badly-applied four-year-old Adobe patch allows attackers to steal information and commandeer accounts for three of the world's top ten websites and 'many' others. The LinkedIn and Minded Security researchers say the indirect Same-Origin-Policy Request Forgery and Cross-Site …
Darren Pauli, 24 Mar 2015

Hilton member accounts info, trip dates open to plunder

A pair of security researchers have found a basic flaw that allows anyone to steal email and home address information, trip data, and spend points of Hilton Worldwide "HHonors" loyalty club members. The cross-site request forgery is tied to a password reset initiative the company launched offering 1000 points to those who took …
Darren Pauli, 24 Mar 2015
Spying image

CREEPS rejoice: Small biz Cisco phones open to eavesdrop 0-day

Creeps can listen in to conversations placed over vulnerable Cisco small business phones. Remote eavesdropping requires a crafted XML request be sent to the Borg's SPA 300 and 500 IP phones. Cisco warns version 7.5.5 of the software powering the phones is vulnerable, possibly along with more recent iterations. "An …
Darren Pauli, 23 Mar 2015

PoSeidon, brother of Zeus, forks up point of sale terminals

Cisco has found a new and stupendously badass breed of point of sale (POS) malware it says is meaner than the code that tore through Target. The "PoSeidon" malware is built on the shoulders of infamous Zeus money sucking exploit kit and sports improvements to BlackPOS which plundered millions from Target payment terminals in …
Darren Pauli, 23 Mar 2015
GEC PABX 3 switchboard and operator

NZ used XKEYSCORE to spy on World Trade Org election emails

New Zealand used the National Security Agency's XKEYSCORE to spy on World Trade Organisation elections targeting candidates from Indonesia, Brazil, and South Korea as its Trade Minister vied for the top job, according to reports. Secret documents obtained by the New Zealand Herald and Snowden spout The Intercept reveal …
Darren Pauli, 23 Mar 2015

Australian online voting system may have FREAK bug

UPDATE Next weekend, voters in the Australian State of New South Wales go to the polls to elect a new government. Some have already cast their votes online, with a system that may be running the FREAK bug. So say Vanessa Teague and J. Alex Halderman, respectively a research fellow in the Department of Computing and Information Systems …
Darren Pauli, 22 Mar 2015

Tax fraud fugitive nabbed after posting selfies

A US man charged with tax fraud and identity theft has been arrested after fleeing authorities and allegedly posting bragging selfies on Twitter. Lance Ealy, 28, of Ohio was arrested in a raid Wednesday in Atlanta by federal authorities after he skipped trial on charges he purchased stolen Social Security numbers and personal …
Darren Pauli, 20 Mar 2015

US threatened Berlin with intel blackout over Snowden asylum: report

The US Government threatened to starve Berlin of intelligence if it harboured fugitive document-leaker Edward Snowden, German Vice Chancellor Sigmar Gabriel says. The National Security Agency (NSA) leaker considered Germany as a place of refuge after he fled to Russia from the United States via Hong Kong in 2013. Moscow granted …
Darren Pauli, 20 Mar 2015
Facebook privacy image

Facebook found leaking private photos

Bug hunter Laxman Muthiyah has reported a Facebook vulnerability that exposes private photos to potentially malicious applications. The hacker received US$10,000 from Menlo Park for reporting the bug in Facebook Photo Sync and an API that allows third party apps to siphon private pics. Muthiyah says iOS and Android apps that …
Darren Pauli, 20 Mar 2015
DDoS image

Massive DDoS racks up $30,000-a-day Amazon bill for China activists

Chinese activist site Greatfire.org which masks censored traffic into the country is under a sustained distributed denial of service (DDoS) attack that is racking up $30,000 a day in server costs. The website masks internet traffic from websites including Facebook and Google, so it can be seen in China, and does so using cloudy …
Darren Pauli, 20 Mar 2015

PIRATES and THIEVES to get Windows 10 as BOOTY

Pirates running stolen Windows operating systems will get a free copy of Windows 10, according to reports. Microsoft told reporters the next Windows will be made free to whet appetites for legitimate software, particularly in China. "We are upgrading all qualified PCs, genuine and non-genuine, to Windows 10," Microsoft's …
Darren Pauli, 19 Mar 2015

Pinterest throws cash at topless bug-finders

Pinterest has stopped giving out t-shirts and started paying cash for vulnerabilities found under its bug bounty program. The web clipboard will offer up to US$200 under the BugCrowd-managed program for nine of its assets, including the Android and iOS applications. Security engineering lead Paul Moreno said the number of bug …
Darren Pauli, 19 Mar 2015

Noobs can pwn world's most popular BIOSes in two minutes

Millions of flawed BIOSes can be infected using simple two-minute attacks that don't require technical skills and require only access to a PC to execute. Basic Input/Output Systems (BIOS) have been the target of much hacking research in recent years since low-level p0wnage can grant attackers the highest privileges, persistence …
Darren Pauli, 19 Mar 2015
Collection of antique keys

Sensitive apps with 6.3 BILLION downloads found open to FREAK

Thousands of Android and Apple apps could lose sensitive financial and privacy data through exposure to the FREAK vulnerability, researchers say. The FREAK (Factoring RSA Export Keys) attack allowed sensitive data to be stolen before encrypted connections are secured by requesting weak export-grade 512-bit RSA keys. FireEye …
Darren Pauli, 18 Mar 2015
Routers

Cisco posts kit to empty houses to dodge NSA chop shops

Cisco will ship boxes to vacant addresses in a bid to foil the NSA, security chief John Stewart says. The dead drop shipments help to foil a Snowden-revealed operation whereby the NSA would intercept networking kit and install backdoors before boxen reached customers. The interception campaign was revealed last May. Speaking …
Darren Pauli, 18 Mar 2015
Internet of Things

Borg to assimilate Square Kilometre Array data

Cisco will open two internet of everything centres in the Australian cities of Sydney and Perth in coming months, in part to develop data-crunching capabilities for the Square Kilometre Array (SKA) and the mining and agricultural sectors. The centres will be the eight and ninth such sheds across Asia and the US and will foster …
Darren Pauli, 18 Mar 2015

Microsoft scrambles to kill Live.fi man-in-the-middle diddle

Microsoft is firing off updates to kill a fake certificate that can be used to create a convincing man-in-the-middle attack against its Live services. Certificate Authority Comodo has killed the bad cert, which it issued, and now Redmond is following suit by updating its revocation list for Windows platforms. "Microsoft is …
Darren Pauli, 17 Mar 2015

Redmond boffins' infosec trick will ship better code, faster

Security boffins from Microsoft and North Carolina State University have developed a method to help software developers better identify attack surfaces and therefore ship code more quickly. The work is effective enough for Microsoft's own security teams to consider adopting it in its internal review processes. The technique is …
Darren Pauli, 17 Mar 2015

Microsoft gives EMET divine powers to repel God Mode attack

Microsoft has released an update to its Enhanced Mitigation Experience Toolkit (EMET) that kills off an attack known as God Mode and improves Windows' defensive capabilities. The toolkit is designed to better protect Windows systems by diverting, terminating, and blocking the most common attacks. It hardens legacy applications …
Darren Pauli, 17 Mar 2015

OpenSSL preps fix for mystery high severity hole

The OpenSSL Project will repair a "high severity" security hole in updates due Thursday. Information is thin on the ground. El Reg has asked OpenSSL for more details to help admins prepare for the patching. The hole will be patched as part of a series of fixes that will land on 19 March and apply to versions 1.0.2a, 1.0.1m, 1.0 …
Darren Pauli, 17 Mar 2015
Brute Force

Brute force box lets researchers, Cops, pop iDevice locks

Apple fans have more reason to update to iOS 8.2 with the discovery of a device used in the computer repair industry that automates password exploitation. The IP-Box tool exploits CVE-2014-4451 to conduct unlimited password guesses against iOS devices on 8.1 and below for iPhones and iPads. A barrage of PINs are entered by …
Darren Pauli, 16 Mar 2015

Authy 2FA app popped by simple, secret, code

Attackers could bypass the Authy two factor authentication (2FA) system by typing a phrase in a token field. Authy's apps make it possible for punters to log in to services like Gmail, Dropbox and Facebook, or even Amazon Web Services, with a one-time password sourced from an app. But prior to the advent of a patch issued 8 …
Darren Pauli, 16 Mar 2015

Mozilla peers into processes with student-built forensics probe

Student hackers from the University of Buenos Aires have developed with Mozilla an open-source forensics tool to analyse memory of running processes. Computer science quartet Marco Vanotti, Patricio Palladino, Nahuel Lascano, and Agustin Martinez Suñé are part of Masche Team, who are "highly motivated by coding, security and …
Darren Pauli, 16 Mar 2015

Sydney's Bugcrowd lands $6m from venture capitalists

Vulnerability mercenary outfit Bugcrowd has scored $6 million in Venture Capital funding. The Series A funds for the crowd-sourced security testing outsourcer have been provided by Costanoa Venture Capital, Rally Ventures, Paladin Capital Group and Australian outfit Blackbird Ventures. Bugccrowd founder Casey Ellis says the …
Darren Pauli, 16 Mar 2015

Microsoft RE-BORKS Windows 7 patch after reboot loop horror

Reports are emerging that a twice-issued Microsoft Windows 7 patch is still causing pain for users, with some claiming the fix is triggering continuous reboots. The patch was first issued as KB2949927 and withdrawn in October due to system faults, before being re-released this week as KB3033929. Sporadic reports across internet …
Darren Pauli, 13 Mar 2015
Lock security

Google tells world where Apps users live after WHOIS SNAFU

Names, home and email addresses, and phone numbers for a whopping 282,867 Google Apps domains have been exposed through previously borked private WHOIS records, Cisco boffins say. The research is the work of Nick Biasini, Alex Chiu, Jaeson Schultz, Craig Williams and William McVey of Cisco's Talos team who today published an …
Darren Pauli, 13 Mar 2015

Kaspersky claims to have found NSA's 'space station malware'

Kaspersky malware probers have uncovered a new 'operating system'-like platform that was developed and used by the National Security Agency (NSA) in its Equation spying arsenal. The EquationDrug or Equestre platform is used to deploy 116 modules to target computers that can siphon data and spy on victims. "It's important to …
Darren Pauli, 12 Mar 2015

104 Australian orgs report breaches to privacy commissioner

Australian organisations have voluntarily submitted 104 data breach notifications over the last year, the Privacy Office says. News of the breach disclosures arrived today, the first anniversary of the country's tougher privacy policies, among reports of 4,016 privacy complaints, a 43 percent increase over the prior year. …
Darren Pauli, 12 Mar 2015

$1.3 million survelliance systems fights Logan bogans

Queensland's Logan City Council has opened a $1.3 million CCTV surveillance centre using facial recognition technology to track drunks, criminals, and burst water mains. The monitoring program has grown over the last decade from nine CCTVs to more than 300, and runs on the Teleste platform used in Paris, Sweden and in Austria's …
Darren Pauli, 12 Mar 2015
Don Draper is sad

Ad bidding network caught slinging ransomware

Attackers are using Flash exploits and foisting ransomware through real time advertising bidding networks, FireEye researchers say. The attacks link to malicious or compromised advertising sites which participate in real time bidding systems in which ad inventory is sold to and by publishers. More than 1700 malicious …
Darren Pauli, 11 Mar 2015

CloudFlare launches nameserver DDoS shield

CloudFlare has launched a DNS proxy service it says will help organisations improve DNS resilience by pushing distributed denial of service attacks to the outer edge of its network. The Virtual DNS service is billed as a means for DNS providers to mitigate a potential "massive single point of failure" in their nameservers caused …
Darren Pauli, 11 Mar 2015
Close-up of the flu virus (artist's impression) - Shutterstock

Malware uses Windows product IDs to mix mutex

Malware writers are using Windows unique product numbers to generate mutex values to evade researchers, SANS security boffin Lenny Zeltser says. Mutex values are used as an accurate reference to determine if multiple identical processes are running. Malware including the infamous BackOff credit card stealer has used mutex for …
Darren Pauli, 11 Mar 2015
ElasticSearch_ELK_stack

Attackers targeting Elasticsearch remote code execution hole

Attackers are targeting a patched remote code execution vulnerability in Elasticsearch that grants unauthenticated bad guys access through a buggy API. The flaw (CVE-2015-1427) within the world's number two enterprise search engine was patched last month. It relates, for folks at Mitre say, to the Groovy scripting engine in …
Darren Pauli, 10 Mar 2015

Yes our NAS boxen have a 0day, says Seagate: we'll fix it in May

Owners of some Seagate NAS boxen will be exposed to a remote execution zero day flaw until a patch drops in May unless they kill some external services. The company learned of flaw in its Business Storage 2-bay NAS products on 18 October, 2014. Australian Beyond Binary hacker OJ Reeves alleged the company failed to fix the flaw …
Darren Pauli, 10 Mar 2015

OpenSSL audit kicks off for post-Heartbleed strengthening program

A major audit of the ubiquitous OpenSSL web security protocol is set to commence under a US$1.2 million industry commitment to harden open source technologies. OpenSSL is first off the rank under the Linux Foundation’s Core Infrastructure Initiative given its popularity and lack of in-depth security review. "OpenSSL has been …
Darren Pauli, 10 Mar 2015

White-listed phish slip through Google Apps

Security probers Patrik Fehrenbach and Behrouz Sadeghipour have found a (since-patched) flaw in Google Apps that allowed criminals to register corporate domains and send white-listed phishing emails from admin addresses. The Choc Factory patched the flaw and handed the duo US$500 by way of thanks. the flaw meant attackers could …
Darren Pauli, 10 Mar 2015
Central Intelligence Agency

CIA re-orgs to build cyber-snooping into all investigations

The United States Central Intelligence Agency (CIA) has decided to re-invent itself for the digital age, promising to “place our activities and operations in the digital domain at the very center of all our mission endeavours.” The re-org was announced last Friday by CIA director John Brennan, who has made an unclassified …
Darren Pauli, 09 Mar 2015
Sad cloud

AWS cuts its own set of keys to VMware's vCenter kingdom

When Amazon Web Services (AWS) last year released the AWS Management Portal for vCenter we described it as a “stealth biz stealer” because it gave AWS a way to give VMware admins a way to run virtual machines in the Amazon cloud and manage them with vCenter. That's not quite VMware's script for the way things run in the vWorld: …
Darren Pauli, 09 Mar 2015

France fingered as source of Syria-spying Babar malware

France's spy agency has been fingered as the likely author of complex reconnaissance malware, researchers say. The Casper malware is one of a handful with links to the Babar spy program which leaked NSA documents revealed last month to be the handiwork of France's Direction Générale de la Sécurité Extérieure (General Directorate …
Darren Pauli, 06 Mar 2015