Router hack forces 9,00,000 Deutsche Telekom customers offline on this Sunday and Monday. Serious attempts were made to compromise broadband routers and turn them into a botnet.
Zyxel and Speedport router hack by malicious hackers as the vulnerabilities were exploited. Routers were coded to transform into botnet which can be remotely used to launch a DDos attack against websites.
The vulnerability exploits the TR-069 and TR -064 protocols which were used by internet service providers to manage internet devices remotely.
What can be done?
The attacker in this situation was able to fool the vulnerable routers into downloading malicious code with the intention to exploit them. Hackers can change the DNS settings of the routers, steal WI-FI credentials or can attack websites with unwanted traffic (DDOS attack)
The effected users were advice to switch off there routers for 30 seconds and then turn it on. During the bootup process the routers will update the new firmware from the Telekom servers and this will patch up the existing vulnerabilities.
Check the video which describes in details:
Germany’s BSI states that the attack on routers was an attempt to disturb the government system s but failed due to effective preventive measures taken from their end.
Popular training by Indian Cyber Security Solutions
Android Banking Malware uses social engineering to bypass battery saving process
Android banking malware can stay connected with its control servers even after the android device is off.
Flaw in Doze functionality in Android
Doze is a power mode that activates once the android device haven’t been interacting with the owner of the device for a period of time. This was first introduced in the Android 6.0 Marshmallow.
When this functionality in the android device is activated it restricts all applications access to the network and other services on the device to save battery i.e unless it is included in the battery optimization whitelist.
There is the Flaw
The Android banking malware just need to add it self into the whitelist in the battery optimization. The android banking malware are using social engineering techniques to get the permission.
Basically they are generating a pop up permission message by invoking “REQUEST_IGNORE_BATTERY_OPTIMIZATIONS” . This displays the permission pop up message to the android device user.
The android banking malware can hide itself commonly known as binds itself with any authentic application. For example it can bind itself with a banking app of HDFC. It will pop up a message to fake the user to get the “yes” button clicked by the user and get the necessary permission.
It is important for the users to apply common sense and be alert when they are in the cyber space. It is important that you should not click on the OK or Yes button every time as rightly explained by Dinesh of Symantac. Check it out
If the victim clicks on the yes button the android banking malware will be added to the whitelist of the battery optimization allowing the application to stay connected to its attacker even when the device is switched off.
What does the android banking malware do ?
Once the malware had go the access it can now have full access to the SMS – Messages, install shortcuts, check the phone status.
The actual function of this android banking malware is to check any of the banking applications are installed on the device.
If the android banking malware finds any banking application s in the device it will remove or uninstall it automatically without the permission of the user. The android banking malware will re-create a copy of the application which it had deleted and ask the user to install the updated copy of it. In this process the android banking malware might ask for credentials which the user happily provides it.
How to be safe in the cyber space ?
With all ATM hacking recently this android banking malware had created a panic in the minds of the android users who frequently uses banking applications. With recent currency denomination people have no other option other than using banking application or doing transections using android devices.
Please use your common sense which is highly not common among the users. Do not click and allow permission to applications.
Read the applications display messages very carefully.
Most importantly use a updated anti-virus
And the last one please be alert. We know it is individual trait which differ among individuals but the more you are alert the more you are not vulnerable to cyber attacks.
Hands on training by experts with 10 years of cyber security experience. You can go for online training from any were in the world and the best part your LIVE classes gets recorded and uploaded in the YouTube Chanel of Indian Cyber Security Solutions. You will have a life time access to all the videos which is a huge boost. For people who prefer class room training can come down to Kolkata where you can have 3 months course. We provide 100% money refund guarantee if you are not satisfied with our delivery. In ethical hacking training we provide in depth training on how to use Kali Lynx, Metasploit, N-Map, Back Box and many more. You can also go for the CEH v9 training from us as. CEH v9 is a global certification course valid in more than 160 countries and all MNCs made it compulsory to be eligible for cyber security jobs.
Hackers are familiar with python programming as many hacking tools like port scanner and many more are coded in Python. You will learn from the makers of the tools how to use python programming as per the industry requirement. It is highly recommended to students of IT, CSE, BCA and MCA who are interested in web security and ethical hacking should learn python programming. Our experts led training program is of 3 months. You can go for online or class room training depending on your choice. Our Advance level python training is a new course launched by ICSS focusing on in-depth use of python in diverse fields
Hands on training by experts with 10 years of cyber security experience. You can go for online training from any were in the world and the best part your LIVE classes gets recorded and uploaded in the YouTube Chanel of Indian Cyber Security Solutions. You will have a life time access to all the videos which is a huge boost. For people who prefer class room training can come down to Kolkata where you can have 3 months course. We provide 100% money refund guarantee if you are not satisfied with our delivery. In ethical hacking training we provide in depth training on how to use Kali Lynx, Metasploit, N-Map, Back Box and many more.
Hackers are familiar with python programming as many hacking tools like port scanner and many more are coded in Python. You will learn from the makers of the tools how to use python programming as per the industry requirement. It is highly recommended to students of IT, CSE, BCA and MCA who are interested in web security and ethical hacking should learn python programming. Our experts led training program is of 3 months. You can go for online or class room training depending on your choice
Android Trojan is now being downloaded by millions of users from the Google Play Store. The Russian Security Agency “Doctor Web” found the malware popularly known as Android.MulDrop.924. The new Android Trojan disguise itself as games and other apps in Google play store. The Android Trojan can download exploits and gives them root privileges and it may also allow download software’s without the prior permission of the user.
Millions of users have been compromised
Currently available in Google Play Store is the new application “ Multiple Accounts: 2 Accounts “ is an Android Trojan. To be very precise technically the Android Trojan had masked itself with the application with had already affected millions of Google Android users across the globe. The main frame utility of this application is to help the users to set up multiple accounts for playing games, email, messages and other software on the single device.
The Android Trojan unique module architecture with two auxiliary modules. The two modules are hidden inside a PNG image in the resource catalog of Android.Mul.924.
Once installed the Android Trojan extracts and copies both the modules to the local directory section and then install them into the memory.
Do-not be fooled with the REVIEWS
The main.jar module have several plugins which allows advertisements to pop up. It is designed to generate revenue. It pops up unwanted advertisements which irritates the user.
Main.jar can also carry Triada “ the android Trojan which allows exploits to have root privileges in the device” . This Traida can actually allow other malicious software’s get downloaded in the device and extract critical information’s.
How to be safe
In the world of technology it is highly difficult to come up with a great check list of safety when it comes to mobile devices.
It is highly recommended to update the antivirus they are using in the devices regular.
Download applications from trusted android develops from Google Play Store.
Most Popular Training at Indian Cyber Security Solutions
Trained more than 200 students world wide. Highest rated training in Google Reviews. You can go for the online LIVE classes and get all your classes recorded and uploaded in YouTube. Come down to Kolkata for 100% Lab based classes.
Hands on training on Python Programming. As this is a scripting language we provide LIVE projects to prepare hacking tools like port scanner with it. We don’t have faculties teaching you Python but have Hackers who will share there experience in developing hacking tools with Python Programming
Pseudorandom passcode is a custom System Error message window which appears on every visible user interface of the infected android device. The Android Ransomware also displays message through this window asking the victim / user to interact with the attacker to unlock the android device.
Whatsapp Hacking is an interesting topic where all are interested to know in details. Today we will unleash the real details and how a hacker can conduct a watsapp hacking remotely and you will not be aware of it. Black hat hackers are always one step ahead of finding out the flaws in a software and so does they have done it now. Mobile phone or the new generation smart phone have made common people live easy but at the same time had made their privacy at stake.
Pupy is an open source Remote Administration Tool which have an embedded Python interpreter. It is a cross platform based interpreter which allows to load Python packages from memory and access python objects. As it uses reflection dill injection in windows leaving no traces of it on the disk. Due to this feature malware scanners detects it as it dosent touch the disk like the meterpreter reverse _shell.
On windows, the Pupy payload is compiled as a reflective DLL and the whole python interpreter is loaded from memory. it does not touch the disk
It can reflectively migrate into other processes
Pupy can remotely import, from memory, pure python packages (.py, .pyc) and compiled python C extensions (.pyd).
Modules are quite simple to write and pupy is easily extensible.
A lot of awesome modules are already implemented !
It uses rpyc and a module can directly access python objects on the remote client
Communication transports are modular and it can communicate using obfsproxy pluggable transports
All the non interactive modules can be dispatched on multiple hosts in one command
Multi-platform (tested on windows 7, windows xp, kali linux, ubuntu, osx)
Modules can be executed as background jobs and their output be retrieved later
Commands and scripts running on remote hosts are interruptible
Facebook spam with a news of DONALD TRUMPH dead in a heart attack is new way to hack into your android device.
What it Does ?
Victims if click on the Facebook spam post are redirected to new page and the phone starts vibrating.
Victim is forced to click OK button and the application gets downloaded in the device.
The application automatically shares its post on the timeline of the victim.
This post is harmless if you open it from your laptop or Desktop.
Clever and a new way to hack into your android devices.
Following are the screen shots on the Android devices after you click on the post
After You Click on the post
After you click on the cross button on the pop up option of Facebook Share
The previous page automatically redirects to this page and the option pops up and your Smart Phone starts vibrating
Ethical Hacking Training in Kolkata
Get hired by MNCs as a security professional. According to NASSCOM research 77,000 ethical hackers are demanded in India every month. Due to high rise in cyber attack all over the world MNCs are attacked by malware’s and are facing huge risk.
SMS phishing also known as smishing is not new to the world of technology. We at Indian Cyber Security Solutions think that this SMS phishing scams are increasing in huge numbers and victims have no clue how to be safe. In this article today we will explain how a scammer hacked into Apple ID know as icloud of various customers who use apple devices recently through SMS phishing. We will also discuss the countermeasures if you become a victim or witness a sms phishing.
Humans best friend is the SMART –PHONE. Yes they are with you every time and yes they contain huge sensitive personal data of individual. What if it is public ? What if it is used against you ?
Apple ID hacked
Due to rising popularity of Iphones and Ipads it had become one of the prime target for SMS phishing by the scammers.
You will receive an SMS stating that your ID will expire on certain date and please re-login with a link or a SMS stating your account was being accessed from a different location and due to several attempts to log in it is locked. Click on the link to unlock your ID.
As the internet remains some for every one scammers face an Icloud login page where you can provide your actual ID and Password.
Report the link to Google. They will make sure that Google chrome and other browsers will ban this link to open and delete this eventually.
Advice to ICloud – Apple users
Apple users should enable 2 factor authentication. This will ensure that even scammers if manage to get your password have to face many level of security to eventually hack into your profile. This minimizes the risk and this is a risk mitigation policy for all apple users.
Online training | Free training on CEH v9 | EC – Councile Global certification
Tesco Bank Hacked – 20,000 Accounts are compromised by a Black Hat Hacker
Tesco Bank Hacked as over 20,000 bank accounts of customers where compromised in United Kingdom. After the Tesco bank hacked bank authority had frozen all online transactions from those accounts. Tesco bank hacked had forced the bank authority to implement a quick contingency plan to safeguard their customers.
For customers Tesco bank authority had allowed them to use their Debit and Credit cards for transection. Bank authority officially had not disclosed the actual cause in details but CEO – Benny Higgins of Tesco Bank had said 40,000 accounts where compromised and hackers have stolen money from them.
He added Tesco officially can not disclose the amount stolen from individual account but it is not a huge sum of money. CEO had apologized for the inconvenience caused and announced that all the financial losses will be taken care by the bank and will be repaid to the individual accounts.
Tesco bank authority said it had found some suspicious activity within the customers accounts on late Saturday Night and early Sunday Morning. It was a planed hack as they had selected a week end time.
There was huge panic among the customers due to the sudden balance reduction from individual accounts. Few customers had mailed the bank authority for explanation but were un-answered as the Tesco Bank was working with the Feds to catch hold of the issue.
Kolkata is the city of joy and the capital of state of West Bengal in India. Kolkata famous for its food and sweets is also the hub of technical startup companies. Kolkata sector V surrounded by big IT players like TCS, Wipro, cognizant and RS Software makes it the best place for cyber security lovers. As IT industry is booming in Kolkata and rise of e-commerce across the globe demand for IT security and ethical hackers are increasing sharply. Btech students are hired by software companies if they have a sound cyber security knowledge.
DDoS attack set Liberia out of internet- culprit Mirai Botnet
DDoS attack had put the whole country of Liberia under distress, when people of the country could not access to internet. The culprit used Mirai malware to shut down the internet of insecure IoT devices. Mirai malware is remotely controlled by the bots, the systems that runs on Linux and have tendency to attack in large scale network.
It started just after, when a cyber-criminal published the source code of Mirai Malware that is designed to target IoT devices that exploits into botnet network; this leads to the attack and affects massively.
An enormous DDoSattack had caused internet outage of a DNS provider called Dyn using same Mirai which was later reported that approximately 100,000 were IoT devices were infected.
Few days back, past a week hackers have taken down the internet of entire Liberia using another botnet that is known as Botnet 14. Major concern of attacks had been briefed by the experts that 10Tbps DDoS attacks can happen which is too large a number that can make whole country go out of internet. Again, in another incident Keivin Beaumont, security researcher did notice that a telecommunication company, Lonestar Cell MTN has faced faced the same, that provides internet services in Liberia to 10-15% from undersea fiber cable via single entry point.
Shocking isn’t it?
Liberia has faced civil war in past decade which has unestablished the telecommunications infrastructure of the country. Very small amount of citizen could actually access to internet through satellite communication. However the country is trying well to rebuild the infrastructure undersea fiber optics.
5.12 Tbps is the total capacity of the cable of 23 countries, since a massive DDoS attack has just turned down the IoT devices using Mirai botnet which leads capability of hacking of almost 1 million IoT devices.
With these capacity not the attackers could
disrupt not only Liberia bot all of Europe and Africa that completely thrives on internet of ACE fiber cable.
Know the cause
Vulnerable IoT devices leads to insecurity that will build more Mirai bots. Questions is how to protect your device? Answer to that will be be more alert towards to the smartness of the devices that is use because u must remember that they can be tracked down.
Linux is hacker’s first choice as it is an operating system that is based on open source. By open source we mean, the user or the programmer can use source code that has been applied to design Linux as per programmers or developers requirement. Hence one can easily modify the specification required and a hacker can do that easily in order to carry out own purpose.
Linux shares transparency, hence understanding the operating system to the core will help hackers to work effectively. Since no other operating system such as Windows and Mac provides the level of transparency as it does, it comes to the lime light and becoming as Linux,first choice of hacker’s. Linux gives this privilege to hackers and making their work effective and efficient.
Not A Control Freak
Linux provides control over granular, which means a user can have a great level of control over the operating system from a small input to bigger one. Hence this ability of Linux makes languages easy to understand and code in better manner.
Linux provides best hacking tools
Most of the tools for hacking are programmed for Linux since it has great range of diversity and flexibility that helps users to perform effectively which other operating system does not provides to this level. Linux is hacker’s first choice as it provide great customization readily available to the hackers.
Linux has great advantages in future
Linux was advantageous operating system in the past and will maintain the stability in the future and in regards of reliability and robustness too, hence Linux is upcoming grand thing in IT industry where it will be prior web servers’ choice. Most of the networking devices and virtualization are in application of kernel of Linux. Now coming to the smart phones or tablets most of the bands are using Linux/ UNIX over Windows now this is a big thing that’s crowding up and most part of the world are using Linux as their operating system for the smart phones or tablets.
The future lies with Linux, the hackers or the upcoming hackers would join an elite profession if they took this part seriously. Linux is next big thing in IT industry and job demand is ample in the industry to thrive well security criteria are major concern. Remember , Linux is hackers first choice.