Úno 21

Tesla’s Amazon Cloud Account Hacked to Mine Cryptocurrency

· February 21, 2018 · 10:30 am

Tesla, the automotive company, was the victim of a cryptojacking attack as their Amazon cloud account was compromised and used to mine cryptocurrency.


Even the largest and most technologically advanced companies can be vulnerable to being hacked. Case in point is the pioneering electric car company, Tesla, owned by tech billionaire Elon Musk. They were recently the target of a cryptojacking attack that saw their Amazon cloud account compromised and used to mine cryptocurrency.

Tesla car

Security Not up to Snuff

A hacker, or group of hackers, hijacked an IT administrative console belonging to Tesla that had no password protection. The cybercriminals then used sophisticated scripts to begin mining for cryptocurrency.

The hack was discovered by RedLock, a cybersecurity firm. Apparently, researchers for RedLock were tracking down which groups had left their Amazon Web Services credentials openly exposed on the internet. One of the groups that RedLock found was Tesla.

Of the hack, a Tesla spokesman says:

We maintain a bug bounty program to encourage this type of research, and we addressed this vulnerability within hours of learning about it..

The impact seems to be limited to internally used engineering test cars only, and our initial investigation found no indication that customer privacy or vehicle safety or security was compromised in any way.

Crafty Hackers

RedLock notes that the hackers exposed an Amazon “simple storage service” (S3) bucket that held telemetry, mapping, and vehicle servicing data for Tesla. It appears that individual information was not accessed, but the CEO of RedLock, Varun Badhwar, says that they “didn’t try to dig in too much” and instead alerted the car company.

Elon Musk

Elon Musk

Badhwar says that the hackers were pretty crafty in hiding their tracks. They made sure to lower the CPU usage demanded by the Stratum software they were using for cryptocurrency mining. This allowed the mining to be virtually undetected. The hackers also kept their internet addresses secret by hiding behind the services of a content delivery service, CloudFlare.

Overall, it is unknown what cryptocurrency the hackers mined for. The current popular choice is Monero. The amount of cryptocurrency mined by the hackers is also unknown.

For their efforts, RedLock were given $3,133.70 by Tesla as part of the company’s bounty program to reward outside hackers who find flaws in their system. The amount is a reference to 1337, which is old hacker slang for elite.

Tesla is not alone in being the victim of cryptojacking. RedLock estimates that 58% of businesses that use public cloud services have exposed “at least one cloud storage device” to the public. Of that amount, the cybersecurity firm says a full 8% have had cryptojacking incidents.

Do you think companies like Tesla can do more to protect themselves from cryptojacking attacks? Let us know in the comments below.


Images courtesy of Flickr/@Maurizio Pesce, Pixabay, and Flickr/@JD Lasica.

Show comments

Share
Dub 15

Global Banking System Under Threat As Hackers Crack NSA, SWIFT Again

· April 15, 2017 · 2:00 pm

Hacker group Shadow Brokers has allegedly proved the US National Security Agency (NSA) hacked SWIFT international banking network.


NSA ‘Documents And Files’ Show SWIFT Transactions ‘Monitored’

In “documents and files” released Friday, Reuters reports, the group said it had evidence the NSA used SWIFT to “monitor money flows among some Middle Eastern and Latin American banks.”

The news marks the second time Shadow Brokers has laid claim to compromising NSA secrets. In August 2016, the group said it had entered an agency affiliate and taken details of cyberweapons, which it planned to auction for one million bitcoins.

If true, it is also a further blow to SWIFT, which last year recorded several high-level security failures worth hundreds of millions of dollars.

“NSA hacked a bunch of banks, oil and investment companies in Palestine, UAE, Kuwait, Qatar, Yemen, more,” Mustafa Al-Bassam, computer science researcher at University College London, commented on the findings.

Bitcoin Core Dev: Implications Beyond Spying ‘Burning Question’

Reactions from within the cryptocurrency community meanwhile focussed on the broader implications of Shadow Brokers’ latest attack.

Core developer Wladimir van der Laan wrote on Twitter “(finding) indication of tools for manipulation of banks/markets, more than spying” was now the “burning question.”

As the traditional financial system comes under increasing threat from cyber criminals, Bitcoin could emerge as the go-to method for storing wealth thanks to its decentralized blockchain and SHA 256 encryption, especially when compared to the ‘honeypot’ of banks’ centralized databases.

Microsoft Back In Spying Spotlight

The released data does not only focus on SWIFT, but also on Microsoft. Having been outed as involved in NSA spying activities by Wikileaks’ Vault 7 dump in March, the corporation this time is facing stolen code for compromising Windows, “at least some of which still work.”

In a responsorial statement, Microsoft protested ignorance. No official correspondence regarding the threat had been received.

“Other than reporters, no individual or organization has contacted us in relation to the materials released by Shadow Brokers,” it told Reuters.

Windows 10

Regarding the specifics of the SWIFT hack, it appears Dubai-headquarted service bureau Eastnets could be a major target.

Like Microsoft, the SWIFT intermediary denied any malicious activity had occurred.

The reports of an alleged hacker-compromised EastNets Service Bureau network is totally false and unfounded,” the BBC quotes a spokesperson as saying. “The EastNets Network Internal Security Unit has run a complete check of its servers and found no hacker compromise or any vulnerabilities.”

NSA spying activities are claimed to have affected not just companies, but politicians and even everyday consumers.

As part of Vault 7, WikiLeaks suggested end-user electronic devices such as smartphones and smart TVs could have become microphones for intelligence officers to listen in on.

Even Donald Trump and his family may have fallen victim.

What do you think about the Shadow Brokers’ latest claims? Let us know in the comments below!


Images courtesy of Swift, Twitter, Shutterstock

Show comments

Share
Srp 02

Bitfinex Hacked, Bitcoin Confirmed Stolen

Source: bitcoin

bitfinex

On August 2, 2016, it has been reported that the major cryptocurrency exchange, Bitfinex, was hacked with some customers losing Bitcoin as a result. Additionally, BitGo has commented on the event.

Also read: Indacoin: Buying Bitcoin, Litecoin with a Credit Card

The Breach of Bitfinex

Bitfinex itself confirmed the hack in a press release earlier today, saying they have halted all trading on the platform. Additionally, all deposits to and withdrawals from Bitfinex have been temporarily stopped.

The exchange does not have much information about the hack, but the press release confirmed that customers of the exchange have lost Bitcoin following the breach.

Now, Bitfinex has launched an investigation into the matter and will “secure the environment,” as the bitfinex.com domain will be taken down with the maintenance page left up. They will also be conducting a review to determine who has actually been affected by the hack.

Furthermore, Bitfinex has also reported the theft to law enforcement and is now working with them to presumably help with the investigation.

According to the press release, Bitfnex says they will have to settle open margin positions in the wake of the hack as they attempt to account for individualized customer losses. Also, it has also been stated that all settlements will be at market prices as of 18:00 UTC. This action has been taken with the intention of normalizing account balances and resuming operations.

The blockchain security company, BitGo, recently released a statement regarding the hack at Bitfinex, saying:

Dear BitGo customer:

You may have read that Bitfinex announced a security breach today. We are working with Bitfinex to determine what happened.
To date, our investigation has found no evidence of any compromise of BitGo servers or services.  We believe the compromise is isolated to Bitfinex.
The security of your transactions is our highest priority.  We will keep you up to date as the situation evolves.
BitGo Team
The Bitfinex team will be posting status updates on the event when appropriate at their status page, bitfinex.statuspage.io.

What do you think of Bitfinex’s confirmed hack? Let us know in the comments below!


Images courtesy of Bitfinex, BitGo

The post Bitfinex Hacked, Bitcoin Confirmed Stolen appeared first on Bitcoinist.net.

Bitfinex Hacked, Bitcoin Confirmed Stolen

Share
Čvn 03

TeamViewer Credential Breach, Bitcoiner Computers at Risk

Source: bitcoin

TeamViewer Credential Breach, Bitcoiner Computers at Risk

User beware if you’re a TeamViewer! According to recent reports across Reddit and elsewhere, we have come to determine that the remote viewing service has had a data breach recently, rendering account usernames, password, and 2-factor authentication details compromised. 

Also read: Cyber attacks to the federal reserve under our noses for the past five years 

TeamViewer Access Credentials Stolen

As a casual Bitcoin user, if you have ever hired an external developer or perhaps used TeamViewer as a drop-in solution to gain remote access to your home or work computer, then those connection points are now likely compromised.

Reports of a service outage came midnight on June 2 through Twitter, where TeamViewer mentioned that they were experiencing a Denial of Service Attack to their DNS servers.

More troublesome is the reaction of from TeamViewer, who has since blamed “weak user credentials” as the culprit for the string of unauthorized logins. According to a source who goes by the name of /u/Macdonjo on Reddit, the company is attempting to silence articles and publications through threats:

“We were basically forced to change what the article said, based on what TeamViewer wanted us to say about them.”

According to self-reporting — which may be lower than reality due to shame or embarrassment — a vast majority of the breaching incidents reported by end-users occurred between May 29 and June 2, 2016.

While possible that TeamViewer’s breach is correlated to the recent Myspace hacking incident, the availability of 2-factor authentication data rules out Myspace credentials being the main culprit.

If you currently use TeamViewer, then your first step is to check if your authentication credentials were leaked (Use HaveIBeenPwned to check.) If so, change passwords for every service and consider yourself very lucky if nothing else has been accessed — like your email or bank account.

Next, you should login to TeamViewer’s application console. Now, on the upper-right side of the screen, click your username > edit profile > active logins, to see every device and location that has accessed your account.

Nothing is worse than having your cryptocurrency stolen. Eliminate potential vectors of attack! Use SSH tunneling with X-forwarding (for the screen and graphics capability) if you can. And for heaven’s sake, stop using the same password across domains!

Were you affected by this breach? Let us know in the comments below!


Images courtesy of DummyGallery, TeamViewer. 

The post TeamViewer Credential Breach, Bitcoiner Computers at Risk appeared first on Bitcoinist.net.

TeamViewer Credential Breach, Bitcoiner Computers at Risk

Share
Dub 24

LocalBitcoins Database Allegedly Hacked, User Info For Sale

Source: bitcoin

LocalBitcoins Database Allegedly Hacked, User Info For Sale

The bitcoin marketplace, LocalBitcoins, has reportedly been hacked by a malicious agent who claims to have the full database of usernames and passwords.

Also read: Bitcoin Price Stirs Up Bullish Sentiment

LocalBitcoins Possibly Hacked

So far, the hacker has only posted an alleged partial list for sale on Satoshibox and it remains unknown if there is a larger list being sold. There is a belief among some that this is simply a hoax as the very same person who is claiming to be the hacker has apparently tried to sell a fake “bitcointalk.org database” in the past.

Below is a partial quote of the original post on Bitcointalk forum:

For sale in here is the Localbitcoins.com database, including up to 700k+ users, most are active.
I’ve managed to get into a few accounts, but the passwords are encrypted but pretty easy to crack if you have to programs… Inside is a partial upload of the Localbitcoin.com Database… using multiple methods of Cross Service and Injections I’ve managed to gain access to their server. Included with the majority of checked logins are Bitcoins. Please be aware, if you plan to transfer to your account it may be risky business.

With the recent hacking of Shapeshift, this very well could just be the result of paranoia on the part of bitcoin users who are simply over-reacting. However, substantiated or not you can be assured that any hacking claims are going to draw some attention, maybe even more than it should or normally would have.

One thing is for certain, if this alleged hack is for real, then it will be a huge blow to not only LocalBitcoins, but to the entire Bitcoin community. Back-to-back large scale hacking events increases skepticism about Bitcoin and decreases trust in the cryptocurrency. For now, we can’t know for sure what has actually happened, we can only speculate until further events unfold that illuminate the situation a little better.

What Do you think of the possible hacking of LocalBitcoins’ database? Let us know in the comments below!


Sources: 1, 2

Images courtesy of  Harborly, LocalBitcoins.

The post LocalBitcoins Database Allegedly Hacked, User Info For Sale appeared first on Bitcoinist.net.

LocalBitcoins Database Allegedly Hacked, User Info For Sale

Share
Dub 21

FBI Used Invalid Warrant To Infect Tor Website With Malware

Source: bitcoin

Bitcoinist_Tor Hack Malware

Malware is a grave threat to computer users all over the world, and even law enforcement does not shy away from using this technique to hack Tor and obtain sensitive information. But at a recent Massachusetts court has determined, this method of acquiring evidence is not legal.

Also read: Duo Search Is A Search Engine For OpenBazaar

Evidence Acquired Through Tor Hack Thrown Out

Even though the malware threat against consumers is worrying enough when internet criminals are involved, it becomes even more disconcerting when law enforcement decides to join the party. The FBI recently acquired a substantial amount of evidence in a child porn case and presented this information in court not too long ago.

But that was not to the liking of the Massachusetts court, as they threw out all of this evidence. Law enforcement hacking operations are not entirely new, although they are hardly an excuse to disallow evidence from being presented in court. In fact this decision marks the first time a court denies evidence obtained through a cyber attack by law enforcement.

Some people may recall how the FBI took control of a child porn service called Playpen not that long ago. This service, only accessible through the Tor protocol, was infiltrated to gain access to pedophiles’ computers all over the world. By collecting several thousand IP addresses, the FBI managed to arrest a significant amount of pedophiles in the US.

However, asking permission to hack computers belonging to Playpen users required approval from a district judge, rather than a magistrate. This puts an interesting spotlight on why this particular magistrate authorized the Tor hack, as he does not have the legal right to do so. Moreover, there are several different district judges housed in the same building as this magistrate.

This invalid search warrant results in most of the evidence in this case being thrown out. Considering how the FBI added malware to the Playpen site to infiltrate other computers, none of the information gathered during this attack can be used. For now, only one of the people arrested has pointed out this issue, but it is not unlikely others will follow suit.

It is not the first time the FBI is involved in a Tor breach. Just a few weeks ago, one judge ruled how the FBI and Carnegie Mellon University were in cahoots to breach the Silk Road marketplace, which eventually lead to the arrest of Ross Ulbricht. It is clear for everyone to see US law enforcement is taking a lot of liberties when it comes to cyber security and hacking, but their free reign might be coming to an end sooner rather than later.

What are your thoughts on the court throwing out this evidence? Will this lead to more thorough investigations as to how law enforcement gathers data? Let us know in the comments below!

Source: Engadget

Images courtesy of Shutterstock, FBI

The post FBI Used Invalid Warrant To Infect Tor Website With Malware appeared first on Bitcoinist.net.

FBI Used Invalid Warrant To Infect Tor Website With Malware

Share
Úno 27

University Data Compromised When Will Proponents of Centralization Learn?

Source: bitcoin

University Data Compromised When Will Proponents of Centralization Learn?

The University of California Berkeley announced on February 26th that 80,000 students and faculty members have been victim to a cyber attack within the schools records system. The compromise revealed to the hackers large amounts of data filled with social security numbers, credit card credentials, and bank account information. Paul Rivers, UC Berkeley’s chief information security officer said in a statement:  

Also Read: Coinbase CEO Brian Armstrong Announces Switch to Bitcoin Classic 

“We looked at all the available evidence of what the attackers did, and as we looked at that, we don’t see any evidence that these are the kinds of attackers that did access the data, or did anything to take that data. However, in an abundance of caution, we don’t want to depend on our judgment alone. We want to be transparent and (let people) make their own choice on how they should respond.” — Paul Rivers, University of California Berkeley

University’s Central System Failed 

The University of Berkeley attack is just another example of centralized planning gone wrong. After the past few years of government breaches and financial institutions losing data to hackers people still haven’t learned. Berkeley says currently there is no evidence that the attackers actually took the personal information but it wanted to alert school members that it was a possibility.

Berkeley’s hackers gained access to the financial management software in December due to a “security flaw,” within the school’s system. Officials at the university say they have contacted the FBI and local law enforcement about the incident. In the press statement Berkeley says that 57,000 current and former student’s information was potentially compromised. The university says that credit protection services will be offered to victims of the case free of charge. The rest of the numbers applied to vendors working at the school and former and current employees. Paul Rivers, UC Berkeley’s chief information security officer, explains:

“The security and privacy of the personal information provided to the university is of great importance to us. We regret that this occurred and have taken additional measures to better safeguard that information.” — Paul Rivers, University of California Berkeley

This is another shining example of how centralization has serious faults. Blockchain technology and zero-knowledge proof systems would be ideal for these organizations to research. Concepts like MIT’s Enigma are pushing the envelope with this type of trustless technology and it’s making its way into Bitcoin core discussions as well. Businesses, financial institutions, and schools need to realize that housing personal data in a centralized way will always be open to points of failure. Until these organizations realize this it’s open game for hackers, the NSA, and malicious entity’s prying into the public’s private affairs.

What do you think about the University of California Berkeley hack? Let us know in the comments below.


Images courtesy of California Berkeley, the Zero-Knowledge Privacy Standard, and Pixbay

 

The post University Data Compromised When Will Proponents of Centralization Learn? appeared first on Bitcoinist.net.

University Data Compromised When Will Proponents of Centralization Learn?

Share