PINDROP BLOG

Category: Hacking

November 30, 2016
Senate Fails to Delay Change to Rule 41 Hacking Powers
A final effort Wednesday by senators from both parties failed to gain passage of a bill that would have delayed a major change to expand the government’s power to use remote searches of computers. The modification of Rule 41 will go into effect Thursday at midnight. On Wednesday morning, both Sen. Ron Wyden and Sen. Steve…
Read More →
November 29, 2016
Cerber Ransomware Seen Using Tor
Ransomware authors have adopted a number of new tactics recently to help avoid detection and stop takedown attempts, and the latest move by the gang behind the Cerber malware is the use of both Google redirection and the Tor network as evasion and obfuscation mechanisms. Researchers from Cisco’s Talos group have come across a new version…
Read More →
November 28, 2016
Senators Say Government Failed to Answer Many Concerns on Rule 41
With three days before a change to a federal rule would alter the way that federal law enforcement agencies can seek warrants to search remote computers, members of Congress worried about the ramifications of the shift say they still are waiting for answers from the Department of Justice on how the new powers would be…
Read More →
November 23, 2016
178 Arrested in Huge Money Mule Crackdown
Law enforcement agencies from 17 countries, along with Europol, executed a major crackdown on money mules across Europe this week, arresting 178 people in connection with operations that resulted in losses of more than €23 million. The action included authorities from the UK, France, Germany, the United States, Romania, and many other countries, and is…
Read More →
November 18, 2016
New Bills Seek to Delay Expanded Hacking Powers Under Rule 41
As the deadline for Congress to act on a proposed change that would give federal law enforcement agencies expanded power to hack remote computers, a group of senators has introduced a bill to delay the rule change until next summer. The proposed change to Rule 41 of the Federal Rules of Criminal Procedure would allow…
Read More →
November 17, 2016
On the Wire Podcast: Samy Kamkar
Samy Kamkar spends a lot of time coming up with clever hardware hacks, and his latest project, PoisonTap, may be at the top of the heap. Built on a $5 Raspberry Pi Zero board, the device can be plugged into the USB port on any locked or password protected machine and will perform a long…
Read More →
November 17, 2016
Carbanak Gang Calling Hotels to Convince Victims to Install Malware
The Carbanak gang, one of the more successful and prolific cybercrime groups at work today, is using a new tactic to get its malware onto target networks: calls to customer service representatives at hotels that convince victims to open malicious attachments. The technique is a simple one but has proven to be quite effective. Rather…
Read More →
November 16, 2016
Lawmakers Ponder Regulatory Remedy for IoT Security
The recent DDoS attacks by the Mirai botnet against various targets, including DNS provider Dyn, have drawn the attention of congressional leaders, who say there may be a need for regulation of IoT device security in order to address the problem of vulnerable embedded devices. In a joint hearing on Wednesday, the House Subcommittee on Communications and…
Read More →
November 16, 2016
PoisonTap: The Tiny Internet-Hijacking, Cookie-Stealing, Backdoor-on-a-Board
A renowned hardware hacker has released a cheap USB device that, when plugged in to any computer–even password-protected or locked ones–can hijack all of the Internet traffic from the PC, steal web cookies, and install a persistent backdoor that survives after device is removed. Known as PoisonTap, the device is the work of Samy Kamkar,…
Read More →
November 14, 2016
Researchers Warn of BlackNurse Low-Volume DDoS Attacks
The recent wave of high-profile DDoS attacks against hosting providers, telecoms, and other targets have been among the most powerful ever seen, but researchers say there’s a relatively new DDoS technique being used by some attackers that uses much lower volumes of attack traffic and can keep even well-protected targets offline. The attack is a…
Read More →