Bad Rabbit Ransomware Outbreak Also Used NSA Exploit

Two days after the Bad Rabbit ransomware outbreak has wreaked havoc in Russia and Ukraine, security researchers are still unearthing details regarding the malware's modus operandi. While initially it was believed that the ransomware spread from the initial victim to nearby computers using a custom scanning mechanism that relied on the SMB protocol, new research [...]

Advertisements

Defcon hackers find it’s very easy to break voting machines

When the password for a voting machine is "abcde" and can't be changed, the integrity of our democracy might be in trouble. The Advanced Voting Solutions WinVote machine, dubbed "America's worst voting machine," came equipped with this simple password even as it was used in some of the country's most important elections. AVS went out [...]

The Real Roots of the Worldwide Ransomware Outbreak: Militarism and Greed

A runaway strain of malware hit Windows computers Friday and spread through the weekend, rendering hundreds of thousands of computers around the world more or less useless. The big twist: The virus was made possible by U.S. government hackers at the National Security Agency. But the finger-pointing won’t stop there, and it probably shouldn’t. As [...]

FSF Certifies Another Batch Of Old Hardware For Respecting Your Freedom

The Free Software Foundation has endorsed fifteen "new" devices under their Respects Your Freedom (RYF) certification. These new devices though amount to another supplier ,Technoethical, selling old, refurbished ThinkPad laptops shipping with Libreboot and using the FSF-approved Trisquel Gnu/Linux distribution. The ThinkPad X200, X200T, X200s, T400, T400s, and T500 are among the models being spun [...]

CIA malware BothanSpy and Gyrfalcon targeting Windows and Linux

WikiLeaks has dumped its newest Vault 7 documents, detailing the capabilities of two alleged CIA hacking tools dubbed BothanSpy and Gyrfalcon. The malware payloads have allegedly been designed to steal SSH credentials from systems running both Windows and Linux operating systems (OS). According to WikiLeaks, while BothanSpy targets Windows computers, Gyrfalcon goes after Linux platforms. [...]

Backdoor built in to widely used tax app seeded NotPetya outbreak

The third-party software updater used to seed last week's NotPetya worm that shut down computers around the world was compromised more than a month before the outbreak. This is yet another sign the attack was carefully planned and executed. malware was spread through a legitimate update module of M.E.Doc, a tax-accounting application that's widely used [...]

CIA’s “Pandemic” turns Windows servers to attack machine

WikiLeaks just published details of a purported CIA operation that turns Windows file servers into covert attack machines that surreptitiously infect computers of interest inside a targeted network. "Pandemic," as the implant is codenamed, turns file servers into a secret carrier of whatever malware CIA operatives want to install, according to documents published Thursday by [...]

Intel x86s hide another CPU that can take over your machine

Recent Intel x86 processors implement a secret, powerful control mechanism that runs on a separate chip that no one is allowed to audit or examine. When these are eventually compromised, they'll expose all affected systems to nearly unkillable, undetectable rootkit attacks. I've made it my mission to open up this system and make free, open [...]

If Gnu/Linux won’t install on your laptop, blame Intel not Microsoft

Why won’t Linux install on modern Lenovo laptops? The discovery of this problem set off a recent firestorm. But contrary to initial speculation, it’s not that Microsoft is forcing Lenovo to block the installation of Linux on its laptops. It’s that Intel isn’t making modern hardware compatible with Linux. Intel needs to provide better Linux [...]

Juniper confirms leaked “NSA exploits” affect its firewalls, no patch released yet

Juniper confirmed exploits leaked by the Shadow Brokers group appear to affect its firewalls, but has not yet patched the vulnerabilities. The firewall manufacturer is “investigating the recent release of files reported to have been taken from the so-called Equation Group,” Juniper's security incident response manager Derrick Scholl wrote in a corporate blog post. Juniper [...]