Darren Pauli

Contact Mail Follow Twitter RSS feed

Cryptowall's ransomware's tough layers peeled

Cryptowall's 2.0 incarnation is hidden in a tough shell crafted by developers paranoid about the security research community, technical analysis reveals. The ransomware has matured much since it emerged last year, encrypting victims' files and demanding money for the supply of a decryption key. It's superior design lead to …
Darren Pauli, 08 Jan 2015

Thunderstrike shocks OS X with firmware bootkit

Reverse engineer Trammell Hudson has created an attack dubbed Thunderstrike which can quietly, persistently and virally compromise Apple Macs from boot. The Thunderstruck attack uses 35 year-old legacy option ROMs to replace the RSA keys in a Mac's extensible firmware interface (EFI) to allow malicious firmware to be installed …
Darren Pauli, 08 Jan 2015

It's 2015 and ATMs don't know when a daughterboard is breaking them

Carders have jackpotted an ATM by inserting a circuit board into the USB ports of an ATM, tricking it into spitting out cash. The technique was thought to have emulated the cash dispenser of the ATM so the brains of the machine thought everything was normal, buying additional time for the brazen crooks to make off with the cash …
Darren Pauli, 07 Jan 2015
Bitcoin bloodbath

Hackers pilfer $5 MEELLION in BTC from Bitstamp

Criminals have made off with a whopping US$5 million after raiding bitcoin exchange Bitstamp. The attack, in the early hours of Monday, pilfered the site's online operation wallets used for rapid currency exchange. Administrators called police and moved to assure customers their bitcoins would be refunded provided they did not …
Darren Pauli, 07 Jan 2015

Buffer overflow reported in UEFI EDK1

A pair of security researchers have found a buffer overflow vulnerability within the implementation of the unified extensible firmware interface (UEFI) within the EDK1 project used in firmware development. Bromium researcher Rafal Wojtczuk and MITRE Corp's Corey Kallenberg said the bug in the FSVariable.c source file was linked …
Darren Pauli, 07 Jan 2015

Dev put AWS keys on Github. Then BAD THINGS happened

Bots are crawling all over GitHub seeking secret keys, a developer served with a $2,375 Bitcoin mining bill found. DevFactor founder Andrew Hoffman said he used Figaro to secure Rails apps which published his Amazon S3 keys to his GitHub account. He noticed the blunder and pulled the keys within five minutes, but that was …
Darren Pauli, 06 Jan 2015
Virgin America plane in flight

GoGo in-flight WiFi creates man-in-the-middle diddle

In-flight wifi service GoGo, once accused of facilitating excessive interception access for US law enforcement, has now been spotted using fake Google SSL certificates to spy on net traffic and prevent passengers from accessing video streaming services. Google engineer Adrienne Porter Felt (@__apf__) noticed the fake SSL …
Darren Pauli, 06 Jan 2015
Miss Piggy

THREE MILLION Moonpig accounts exposed by flaw

Custom mugs and tat outfit Moonpig has a signficant flaw that exposes personal records and partial credit card details for some three million customers, almost 18 months after it was reported. The failure, discovered and privately reported by developer Paul Price, meant every account and the names, birth dates, and email and …
Darren Pauli, 06 Jan 2015

Snooker WPA secrets with this Wi-Fi tool

Crypto geek George Chatzisofroniou has published a WiFi social engineering tool used to steal credentials and credit cards from users of secure wireless networks. The administrator at the University of Greece developed the WiFiPhisher tool which sought out and then replicated WPA-protected networks, sans password. The tool, …
Darren Pauli, 05 Jan 2015

Saudi Arabia hires 'ethical hackers' to silence smut slingers

Saudi Arabia's prude police have hired ethical hackers to pop hedonistic Twitter accounts identified for spruiking smut leading to arrests. The crackdown reported by Emirates24 was led by the religious police which hired the hackers to obtain personal details of Twitter users. The Commission for the Promotion of Virtue and …
Darren Pauli, 05 Jan 2015

By the power of Xbox, WE HAVE THE POWER! - Leakers publish One's SDK

An online group has released what it claims is the software development kit (SDK) for Microsoft's Xbox One console and, according to reports, may have access to games from Halo developers 343 Industries. The leakers released the kit over the festive break to encourage researchers to develop exploits required to gain full control …
Darren Pauli, 05 Jan 2015

POS malware crooks hack IP cams to validate targets

Carders operating the BackOff point of sales malware are hacking IP cameras to make sure their targets are worth attacking, says researcher Rotem Kerner says. The research plugs a "critical" gap in a July disclosure by the US CERT, which warned the popular carder malware was being flung at businesses using remote desktop …
Darren Pauli, 24 Dec 2014

Hack flings bootkits from Macs' Thunderbolts

Researcher Trammel Hudson has developed a means to foist a new class of bootkits onto Macs, using Thunderbolt devices using a form of USB 'evil maid' attacks. Hudson will present the finding at the upcoming Chaos Communications Congress in Germany next week and said the attacks are easy to perform using the Thunderbolt ports and …
Darren Pauli, 24 Dec 2014

China fingered for Afghan Govt attacks

Chinese hackers have targeted nearly all major Afghanistan Government websites by hacking an official content delivery network (CDN) and gaining a foothold to attack western governments. Hackers popped the network run by the Afghan Ministry of Communications and IT which delivered malware to many of the Government's websites …
Darren Pauli, 23 Dec 2014
Cupid Wings iPhone stand

Easy Tinder prank hack lets you play stupid cupid

Software engineer Robert Heaton has detailed simple tricks to fondle your mates' Tinder and Facebook accounts over the festive season. Friendship is a pre-requisite for the prank that requires cookies to be swiped off an unattended machine and reworked to be absorbed into the iOS Tinder app. In a detailed post Heaton said …
Darren Pauli, 23 Dec 2014

Sucker for punishment? Join Sony's security team

Sony is seeking a steely-willed vulnerability management director in the wake of its thorough hosing by unknown attackers. The beleaguered media giant posted an online advertisement Friday seeking a security bod boasting a decade's hacking experience to, among other things, "Unify and enhance Sony’s global information security …
Darren Pauli, 23 Dec 2014

Hackers pop German steel mill, wreck furnace

Talented hackers have caused "serious damage" after breaching a German steel mill and wrecking one of its blast furnaces. The hack of the unnamed mill, detailed in the annual report of the German Federal Office of Information Security, was pulled off after a victim fell for a phishing email. Hackers then pivoted to the …
Darren Pauli, 22 Dec 2014
Onions

STAY AWAY: Popular Tor exit relays look raided

As foreshadowed last week, Tor network exit nodes have gone down after what appear to be raids by law enforcement authorities. Thomas White (@CthulhuSec) warned users to steer clear of his Tor servers after he lost control following what he's called "unusual activity" that meant "I have now lost control of all servers under the …
Darren Pauli, 22 Dec 2014

Dangerous NTP hole ruins your Chrissy lunch

Critical holes have been reported in the implementation of the network time protocol (NTP) that could allow unsophisticated attackers root access on servers. System administrators may need to forego the Christmas beers and roasted beasts until they've updated NTP daemons running versions 4.2.8 and below. The grinch bug was …
Darren Pauli, 22 Dec 2014

Hack hijacks electric skateboards, dumps hipsters in the gutter

A hacker duo have shown how to hijack "Boosted" brand electricity-assisted skateboards. The boards feature small motors to help riders go up hills, or down hills much faster. An app controls the motors over Bluetooth. Stripe security engineer Richo Healey and penetration tester and Bluetooth expert Mike Ryan found a way to …
Darren Pauli, 19 Dec 2014
Lock security

Kiwi hacker 'menace' pops home detention tracker cuffs

Kiwicon Christchurch bus hacker William Turner has demonstrated how to trick home detention ankle monitors used in New Zealand. The monitor hack meant the location of criminals could be falsely reported to contractor G4S, triggering alarms. The feat was a tool of mischief makers and blackmailers, Turner said, but importantly could not …
Darren Pauli, 19 Dec 2014

Security SEE-SAW: $3 MEEELLION needed to fight a $100k hack

It costs a whopping $3.1m to defend against a $100,000 advanced attack, a security duo claims. The imbalance - well-known to security pros - was illustrated in research presented by Microsoft security strategist Paul McKitrick and founder of security startup ICEBRG William Peteroy (@wepiv) at the Kiwicon hacker fest in …
Darren Pauli, 18 Dec 2014

Social sniffer predicts which Nigerian prince has the best chance of scamming you

Kiwi penetration tester Laura Bell has released a social engineering analysis tool to allow analysis of risky behaviour by punters. The platform dubbed "AVA" and billed as an "automated three-phase human vulnerability scanner" will soon be released as open source and made usable for both hackers using Kali Linux and less tech- …
Darren Pauli, 18 Dec 2014
IBM Power S842L server

IBM and Red Hat power up for virtualisation on Power systems

Red Hat has announced that its Enterprise Virtualization product now works on IBM's Power systems. The move's not a colossal surprise: last week Red Hat revealed a beta of Red Hat Linux 7.1 and it included a version running on IBM's recently-revealed POWER8 platform. Red Hat Enterprise Virtualization for Power is a KVM-derived …
Darren Pauli, 17 Dec 2014

Hackable intercom lets you SPY on fellow apartment-dwellers

Kiwicon Kiwi hacker Caleb "alhazred" Anderson has popped a video intercom device that could have allowed him to spy on the 700 apartments in his building. The GrandStream GXV3175 intercom unit has been patched after Anderson - who by day serves as Context Information Security's lead consultant - began the attack while "inspired" by a …
Darren Pauli, 12 Dec 2014

Craft bazaar Etsy's security plan is candy to get devs talking

Kiwicon podcast Etsy's security chieftain Rich Smith has told the hacker faithful to secure their organisations by buttering-up devs with beer and candy. Speaking at the KiwiCon event in Wellington, New Zealand, the guardian of the popular hipster bazaar and co-founder of Iceland consultancy Syndis offered tips from running the fast-spaced …
Darren Pauli, 12 Dec 2014

Your data: Stolen through PIXELS

Kiwicon Data loss prevention has been dealt a coup de grace with the development of a client-less system that can suck corporate data through monitors. The research, to be detailed in a proof of concept at the Kiwicon hackerfest in Wellington on Friday December 12, bypasses all detection methods, its developer says. The attack requires …
Darren Pauli, 11 Dec 2014
philips triplewriter spd7000 blu-ray recorder

Blu-ray region locks popped by hardware hacker

Scores of Blu-ray players from the biggest names in the industry contain security vulnerabilities that allow region coding to be unlocked, hardware hacker Matthew Garrett says. The players use an antiquated digital rights management scheme to control the distribution of movies meaning some films could only be played in the …
Darren Pauli, 11 Dec 2014

Microsoft lets YOU kill POODLE in Protected Mode sites

Microsoft has granted sysadmins the ability to kill exposure to rabid POODLE websites under SSL 3.0 for Internet Explorer Protected Mode sites. The Christmas gift will be switched on by default from February next year as Redmond moves to euthanised the Padding Oracle on Downgrade Legacy Encryption attack across its web presences …
Darren Pauli, 11 Dec 2014
App Engine Logo

Google App Engine has THIRTY flaws, says researcher

Adam Gowdiak of Polish security consultancy and research outfit Security Explorations claims to have found myriad security holes in Google's App Engine. Explained here, Gowdiak says he and his colleagues “discovered multiple security issues in Google App Engine that allow for a complete Java VM security sandbox escape.” Here's …
Darren Pauli, 09 Dec 2014

AliExpress patches account mass harvesting flaw

Global threads bazaar AliExpress, an offshoot of global tat bazaar AliBaba, has patched a URL flaw that allowed attackers to harvest users' personal details including names, shipping addresses and phone numbers. The insecure direct object reference vulnerability reported by an unnamed researcher affected 7.7 million logged-in …
Darren Pauli, 09 Dec 2014

Linux software nasty slithers out of online watering holes

A malware instance built on the shoulders of a trojan so powerful it lead to the creation of the US Cyber Command has been updated with Linux-popping capabilities, Kaspersky researcher Kurt Baumgartner says. The Turla advanced malware is thought to have employed its top notch stealth capabilities to remain hidden on some systems …
Darren Pauli, 09 Dec 2014

Orion hacker sends stowaway into SPAAAAACE

One of the 1.3 million names sent into space aboard NASA's Orion test capsule was a stowaway, uploaded to NASA's database by a security researcher who found and exploited a vulnerability. The name 'Payload1 Payload2' was one of three uploaded to the NASA Orion database that collected names to be later transferred to a chip …
Darren Pauli, 08 Dec 2014

Mighty Blighty filter tilter causes communications chaos

The Great Firewall of Britain, aka the content filters operated by telcos Vodafone and Three, has blocked access to German hacker party the Chaos Communications Congress (CCC) ahead of its annual confab. The block, presumably made in error, prevented punters from accessing the website, buying tickets and perusing the conference …
Darren Pauli, 08 Dec 2014

Kaspersky exposes SONY-CRIPPLING malware DETAILS

Kaspersky bod Kurt Baumgartner has released more details on the Sony-plundering malware and links it to attacks on Saudi Aramco and South Korea. Research conducted in the wake of the epic Sony breach last month had connected those behind the attack known as the Guardians of Peace (GOP) with the 2012 hacking of Saudi Aramco by ' …
Darren Pauli, 08 Dec 2014

'Sign in with LinkedIn' spoof allows baddies to penetrate Slashdot, NASDAQ.com and more

Bigshot online identity providers LinkedIn and Amazon were vulnerable to a novel attack that allowed ID fraudsters potential access to top websites – including Slashdot, NASDAQ.com and Crowdfunder – an IBM security duo have revealed. Or Peles and Roee Hay of IBM Security Systems said the attacks worked because the providers …
Darren Pauli, 05 Dec 2014
Kim Jong-un

Norks: We might be aggressive but we didn't hack Sony!

North Korea has denied it was the entity behind the epic hack of Sony Pictures Entertainment. An unnamed diplomat based in New York told The Voice of America the country was not linked to the attack despite speculation patriotic hackers had targeted the media giant in retaliation for a satirical film mocking leader Kim Jong Un …
Darren Pauli, 05 Dec 2014

Microsoft remote code exec killjoys to dump seven fixes next week

Redmond will fix three critical holes in Internet Explorer, Office and Windows next week. Microsoft's Advanced Notification service details a seven-fix monthly dump. Among the three critical bulletins are a problem that leaves Internet Explorer open to remote code execution (RCE) attacks. Patching for bulletin two required a …
Darren Pauli, 05 Dec 2014

Big Blue patches big blooper in Endpoint Manager for mobes

Big Blue has patched a serious hole in its Endpoint Manager for Mobile Devices that allows attackers to gain remote access and compromise connected mobes. Endpoint Manager appears to have been written with Ruby, and the (flaw) means "attackers can create valid session cookies containing marshalled objects of their choosing," …
Darren Pauli, 04 Dec 2014

Squashed bug opened EVERY PayPal account to hijacking

PayPal has plugged a huge hole that exposed every account to hijacking. The cross-site request forgery (CSRF) flaw reported by Egyptian researcher Yassar H Ali allowed attackers access to any PayPal account of their choosing if they were capable of convincing a target to click a link. A PayPal spokesperson confirmed the flaw to …
Darren Pauli, 04 Dec 2014

Sony Pictures struggles as staff details, salaries and films leaked

It's getting worse for Sony: the latest data dump from the raid that's brought the company to an IT standstill includes the personal details of staff. Documents leaked through BitTorrent show the names, home addresses, salaries (and bonuses), and social security numbers of thousands of staff, including executives. Sony Pictures …
Darren Pauli, 03 Dec 2014

Iranian CLEAVER hacks through airport security, Cisco boxen

An alleged Iranian hacking group whose existence is denied by the state is turning up the heat on its two-year global campaign to pop critical infrastructure systems, Cylance researchers say. The group was tied to Iran by the local infrastructure it was alleged to use in the attacks and appeared to have formed as a response to …
Darren Pauli, 03 Dec 2014

Silver-tongued phish bait lures execs, hooks M&A deals

A hacking group has been stealing identity information and reading emails to get the inside edge on stock markets to buy and sell to make quick profits. Vendor FireEye reckons the group sent articulate phishing emails with malicious attachments demonstrating "deep" knowledge of financial markets and corporate communications. In …
Darren Pauli, 02 Dec 2014

Australian Government funds effort to secure wearable data pulses

Wearable health devices could feed Australians' health data into official databases to improve diagnosis under security research funded by the Federal Government. The researchers want to find ways to secure wearable consumer devices and validate the identity of users in order to enable health practitioners to trust data feeds. …
Darren Pauli, 02 Dec 2014

OpenVPN plugs DoS hole

OpenVPN has patched a denial-of-service vulnerability which authenticated users could trigger by sending malicious packets. The flaw (CVE-2014-8104) is most hurtful to VPN service providers and was reported by researcher Dragana Damjanovic to OpenVPN last month. Maintainers said in an advisory issued this morning that the flaw …
Darren Pauli, 02 Dec 2014

Pay with your credit card at station kiosk? 'Dare Devil' is targeting YOU

A financial malware strain has been found targeting payment systems behind transit systems and kiosks sucking up all manner of junk data, researchers say. The malware dubbed d4re|dev1l (dare devil) has been found in kiosks at Italy's regional transport company Azienda Regionale Sarda Trasporti, as well as at undisclosed …
Darren Pauli, 01 Dec 2014

EVIL researchers dupe EVERY 32 bit GPG print

Researchers have found collision attacks for 32 bit GPG keys leaving the superseded technology well and truly dead. Eric Swanson and Richard Klafter used graphical processing units to clone fingerprints for each 32 bit key id in Web of Trust strong set. The feat took four seconds per key increasing the chance that human error …
Darren Pauli, 01 Dec 2014

Weather Channel forecast: Bleak, with prolonged XSS

The Weather Channel has dammed a downpour of cross-site-scripting vulnerabilities that soaked three quarters of links on the popular site, security bod Wang Jin says. The website received a tsunami of traffic with more than a billion unique visitors checking in each month according to Drupal which noted it was the "highest …
Darren Pauli, 01 Dec 2014

Author fined $500k in first US spyware conviction

A US man has been handed a US$500,000 fine for selling the StealthGenie malware in the first prosecution of a mobile spyware slinger. Police collared Hammad Akbar, 31, in September after he allegedly sold the malware to an undercover agent in 2012. Akbar a Danish citizen, sold the StealthGenie malware capable of intercepting …
Darren Pauli, 30 Nov 2014

World's best threat detection pwned by HOBBIT

Some of the world's best threat detection platforms have been bypassed by custom malware in a demonstration of the fallibility of single defence security. Five un-named top advanced threat detection products were tested against four custom malware samples written by researchers at Crysys Lab, Hungary and MRG-Effitas, UK” The …
Darren Pauli, 28 Nov 2014