Tuesday, 23 January 2018

"Healthcare Data A New Area For Hackers"


     "Healthcare Data A New Area For Hackers"

Why the Healthcare data is more valuable than Credit card  or Debit card details for Hackers?

We all have heard about hacking of Credit card and Debit Card Details, and many other data breaches . Hacker want to hacked everything which is valuable for them from Facebook account to destructive weapon.

In current scenario, Hackers are very interested in Healthcare Data. In last 8 years, we have seen  Healthcare data breaches  grow in both size and frequency. The question is why the healthcare data  became more attractive  for hackers now a days. 

Because  our medical information is 10 times worth than credit card or debit card details on the dark market.

“Hospitals have low security, so it’s relatively easy for these hackers to get a large amount of personal data for medical fraud.”

Hacker used these stolen data to

This is not a small problem. A February 2017 survey from Accenture reveals that healthcare data breaches have affected 26% of U.S. consumers, or more than one in every four Americans. Additionally, the survey also found that 50% of breach victims eventually suffered medical identity theft.

So, You can see How important is our Healthcare data. It's essential to all medical center and Hospital  to secure their Data and system. 
Image result for breaches healthcare data



 



          




Thursday, 1 June 2017

  Another Wikileaks Exposure

  Pandemic


Today, June 1st 2017, WikiLeaks publishes documents from the "Pandemic" project of the CIA, a persistent implant for Microsoft Windows machines that share files (programs) with remote users in a local network. "Pandemic" targets remote users by replacing application code on-the-fly with a trojaned version if the program is retrieved from the infected machine. To obfuscate its activity, the original file on the file server remains unchanged; it is only modified/replaced while in transit from the pandemic file server before being executed on the computer of the remote user. The implant allows the replacement of up to 20 programs with a maximum size of 800 MB for a selected list of remote users (targets).
As the name suggests, a single computer on a local network with shared drives that is infected with the "Pandemic" implant will act like a "Patient Zero" in the spread of a disease. It will infect remote computers if the user executes programs stored on the pandemic file server. Although not explicitly stated in the documents, it seems technically feasible that remote computers that provide file shares themselves become new pandemic file servers on the local network to reach new targets.

Wednesday, 8 March 2017

The US intelligence agencies are facing fresh embarrassment after WikiLeaks published what it described as the biggest ever leak of confidential documents from the CIA detailing the tools it uses to break into phones, communication apps and other electronic devices.
The thousands of leaked documents focus mainly on techniques for hacking and reveal how the CIA cooperated with British intelligence to engineer a way to compromise smart televisions and turn them into improvised surveillance devices.
The leak, named “Vault 7” by WikiLeaks, will once again raise questions about the inability of US spy agencies to protect secret documents in the digital age. It follows disclosures about Afghanistan and Iraq by army intelligence analyst Chelsea Manning in 2010 and about the National Security Agency and Britain’s GCHQ by Edward Snowden in 2013.



The new documents appear to be from the CIA’s 200-strong Center for Cyber Intelligence and show in detail how the agency’s digital specialists engage in hacking. Monday’s leak of about 9,000 secret files, which WikiLeaks said was only the first tranche of documents it had obtained, were all relatively recent, running from 2013 to 2016.
The revelations in the documents include:
  • CIA hackers targeted smartphones and computers.
  • The Center for Cyber Intelligence, based at the CIA headquarters in Langley, Virginia, has a second covert base in the US consulate in Frankfurt which covers Europe, the Middle East and Africa.
  • A programme called Weeping Angel describes how to attack a Samsung F8000 TV set so that it appears to be off but can still be used for monitoring.
The CIA declined to comment on the leak beyond the agency’s now-stock refusal to verify the content. “We do not comment on the authenticity or content of purported intelligence documents,” wrote CIA spokesperson Heather Fritz Horniak. But it is understood the documents are genuine and a hunt is under way for the leakers or hackers responsible for the leak.
WikiLeaks, in a statement, was vague about its source. “The archive appears to have been circulated among former US government hackers and contractors in an unauthorised manner, one of whom has provided WikiLeaks with portions of the archive,” the organisation said.
The leak feeds into the present feverish controversy in Washington over alleged links between Donald Trump’s team and Russia. US officials have claimed WikiLeaks acts as a conduit for Russian intelligence and Trump sided with the website during the White House election campaign, praising the organisation for publishing leaked Hillary Clinton emails.
Asked about the claims regarding vulnerabilities in consumer products, Sean Spicer, the White House press secretary, said: “I’m not going to comment on that. Obviously that’s something that’s not been fully evaluated.”
Asked about Trump’s praise for WikiLeaks during last year’s election, when it published emails hacked from Clinton’s campaign chairman, Spicer told the Guardian: “The president said there’s a difference between Gmail accounts and classified information. The president made that distinction a couple of weeks ago.”
Julian Assange, the WikiLeaks editor-in-chief, said the disclosures were “exceptional from a political, legal and forensic perspective”. WikiLeaks has been criticised in the past for dumping documents on the internet unredacted and this time the names of officials and other information have been blacked out.
WikiLeaks shared the information in advance with Der Spiegel in Germany and La Repubblica in Italy.
Edward Snowden, who is in exile in Russia, said in a series of tweets the documents seemed genuine and that only an insider could know this kind of detail.


The document dealing with Samsung televisions carries the CIA logo and is described as secret. It adds “USA/UK”. It says: “Accomplishments during joint workshop with MI5/BTSS (British Security Service) (week of June 16, 2014).”
It details how to fake it so that the television appears to be off but in reality can be used to monitor targets. It describes the television as being in “Fake Off” mode. Referring to UK involvement, it says: “Received sanitized source code from UK with comms and encryption removed.”
WikiLeaks, in a press release heralding the leak, said: “The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‘Fake Off’ mode, so that the owner falsely believes the TV is off when it is on. In ‘Fake Off’ mode the TV operates as a bug, recording conversations in the room and sending them over the internet to a covert CIA server.”
The role of MI5, the domestic intelligence service, is mainly to track terrorists and foreign intelligence agencies and monitoring along the lines revealed in the CIA documents would require a warrant.
The Snowden revelations created tension between the intelligence agencies and the major IT companies upset that the extent of their cooperation with the NSA had been exposed. But the companies were primarily angered over the revelation the agencies were privately working on ways to hack into their products. The CIA revelations risk renewing the friction with the private sector.
The initial reaction of members of the intelligence community was to question whether the latest revelations were in the public interest.
A source familiar with the CIA’s information security capabilities took issue with WikiLeaks’s comment that the leaker wanted “to initiate a public debate about cyberweapons”. But the source said this was akin to claiming to be worried about nuclear proliferation and then offering up the launch codes for just one country’s nuclear weapons at the moment when a war seemed most likely to begin.
Monday’s leaks also reveal that CIA hackers operating out of the Frankfurt consulate are given diplomatic (“black”) passports and US State Department cover. The documents include instructions for incoming CIA hackers that make Germany’s counter-intelligence efforts appear inconsequential.
The document reads:
“Breeze through German customs because you have your cover-for-action story down pat, and all they did was stamp your passport.
Your cover story (for this trip):
Q: Why are you here?
A: Supporting technical consultations at the consulate.”
The leaks also reveal a number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high-security networks that are disconnected from the internet, such as police record databases. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB stick containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and extracts data.
A CIA attack system called Fine Dining provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a programme showing videos, presenting slides, playing a computer game, or even running a fake virus scanner. But while the decoy application is on the screen, the system is automatically infected and ransacked.
The documents also provide travel advice for hackers heading to Frankfurt: “Flying Lufthansa: Booze is free so enjoy (within reason).”
The rights group Privacy International, in a statement, said it had long warned about government hacking powers. “Insufficient security protections in the growing amount of devices connected to the internet or so-called ‘smart’ devices, such as Samsung smart TVs, only compound the problem, giving governments easier access to our private lives,” the group said.

Tuesday, 7 March 2017

Preparation before going to war

               





It's true that War never won by the bad weapon and weak soldiers.
It's also apply on hacking. If you really wanna hack ,you have to make your machine sharp.You have to set up your machine.For this you have to first install any Unix based operating system in you machine. .You are free to install any Unix based OS like Ubuntu, Mint, Fedora and others, but  I suggest you to install Kali Linux (Debian distribution) , in Kali Linux 300+ hacking tools are install already. So you don't have to install any hacking tools in  it after installation . You can install Kali or other Unix flavor either in virtual machine or your main machine. You can also install this along with Windows Os (called Dual Boot , as  you feel comfort). But  I suggest  you to install Unix  only , because I think option makes you weak. If you want to use Windows along with Kali Linux thats OK, install  Kali Linux in virtual machine.
Lets start friends......

 Virtualization and system cloning

1. What is Virtualization?
 Ans:-   Virtualization in terms of Computers is the duplicity of hardware as well as software.
The main concept behind virtualization to proper utilization of hardware as well as
Processor. Virtualization does nothing but creates separate Platform with Hardware
which acts as another machine.
Types of Virtualization
Mainly Virtualization is divided into two categories and they are.
1. Hardware Virtualization
2. Software Virtualization


Hardware Virtualization: - these types of virtualization offers you to make a
copy of your hardware like volatile Memory, non volatile memory, sharing of
processor and give you a Virtual hardware that will act as a Separate Machine
and after that you can utilize that hardware for installing operating system and
storage device. 


 Software virtualization: - This type of virtualization offer to virtual system
software, operating System, Application software and other third party Services.
Instead of purchasing multiple licenses for software, take Single License and
make Software virtualization and install it in multiple virtualized Operating
systems.

1. Need and Benefits of Virtualization
2. Run multiple Systems with instant access to each.
3. Proper Utilization of hardware and processor
4. Snapshots facilities for easy backup
5. Sharing of folders , Devices like USB, Camera etc
6. Cloning of system
7. Dynamic Allocation of Memory
8. Virtual networking



Requirements

1. VirtualBox Or VMware , In whatever you feel comfortable.
2. Kali Linux , Ubuntu ISO file. whatever you want to install.

For installation  click here



Apple announce to give Bug Bounty reward!!!!

So finally , Apple  will pay you to finding vulnerability in their products.

While major technologies companies like Microsoft , Facebook ,Google  and Dropbox are already a part of bug bounty program. In March 2016, Peter Cook announced the federal government's first bug bounty ... In total, the US Department of Defense paid out $71,200.

Apple announced at the Black Hat security conference that the company would be launching a bug bounty program starting this fall to pay outside security researchers and white hat hackers privately disclose security flaws in the company's products.

How much is a vulnerability in Apple software worth? Any Guesses?

It's up to $200,000.

Head of Apple security team, Ivan Krstic, said the company plans to offer rewards of up to $200,000 (£152,433) to researchers who report critical security vulnerabilities in certain Apple software.

While that's certainly a sizable bounty reward — one of the highest rewards offered in corporate bug bounty programs.

Apple Bug Bounty Program — Invite Only, For Now


Well, for now, Apple is intentionally keeping the scope of its bug bounty program small by launching the program as invitation-only that will be open only to limited security researchers who have previously made valuable bug disclosures to Apple.

The company will slowly expand the bug bounty program.

Launching in September, the program will offer bounties for a small range of iOS and iCloud flaws.

Here's the full list of risk and reward:

  • Flaws in secure boot firmware components: Up to $200,000.
  • Flaws that could allow extraction of confidential data protected by the Secure Enclave: Up to $100,000.
  • Vulnerabilities that allow executions of malicious or arbitrary code with kernel privileges: Up to $50,000.
  • Flaws that grant unauthorized access to iCloud account data on Apple servers (remember celebrity photo leak?): Up to $50,000.
  • Access from a sandboxed process to user data outside of that sandbox: Up to $25,000.
For the eligibility of a reward, researchers will need to provide a proof-of-concept (POC) on the latest iOS and hardware with the clarity of the bug report, the novelty of the bounty problem and the possibility of user exposure, and the degree of user interaction necessary to exploit the flaw.

Decision Comes in the Wake of the FBI Scandal


Earlier this year, Apple fought a much-publicized battle with the FBI over a court order to access the locked San Bernardino shooter's iPhone.

When the FBI forced Apple to unlock the shooter's iPhone, it refused, eventually making the bureau hire professional hackers to break into the iPhone -- supposedly paying out over $1 Million.

Perhaps the company is trying to eliminate these lucrative backdoors into its software to make its iOS devices so secure that even the company can not crack them.

Thursday, 25 August 2016

Famous Bug Buunty Hunters

10 Famous Bug Bounty Hunters of All Times

                                      We don’t like people who point out our mistakes. You must have heard from your elders that pointing out someone else’s mistakes is a very bad habit. In fact, most of us love to do that, our mind is like radar which keeps on checking mistakes of anyone who lies within the range. But again, pointing out mistakes is a bad habit. Do you think it will ever help you in life? No? This article may change your concepts then.Who are bug bounty hunters?

You must be familiar with bounty hunters. These are people who get rewards for capturing people who are fugitives or involved in some or the other illegal activities. So from this name itself, the concept of bug bounty hunters originated. People who can find bugs or errors are bug bounty hunters in IT industry.Their work and its result

Basically, they find out bugs in software or any services, they point out its faults and they also suggest how these can be improved. Good bug bounty hunters are always in good demand and are also paid well. The result of bug bounty hunters hard work is, the company gets rid of vulnerabilities and bugs. Then it launches a new version of the same software or service, which is known as an update.Heroes

So let us take a look at the well-known top 10 bug bounty hunters who have been rocking their charts in IT sector. 

Rafay Baloch
                           Rafay Baloch is from Pakistan and is an independent security researcher. Rafay found a vulnerability in PayPal. The vulnerability was regarding remote code execution. PayPal offered him $10,000 and a job. He also discovered Android Stock Browser Address Bar Spoofing which was useful in Lollipop as well as previous Android versions.


Roy Castillo
                    Roy Castillo participated inbug bounty hunting program. He is the first Filipino to participate in it. His achievements include reporting stored XXS in Gmail for IOS. He also found a bug in Facebook which exposed primary email addresses of their users.

Jason Haddix 
                    Jason has scored really well as a bug bounty hunter. Jason became a Bug bounty hunter in Bugcrowd and became its Director of Technical Operations. Not only this, but Jason also is a notable mobile and web hacker.

Frans Rosen
                   Frans is a superstar in reporting bugs. He stands second in the bug bounty hunters list ofHackerone. He has worked as a security researcher and has reported many bugs. One of the famous bugs reported includes flash-based XSS vulnerability.

Stephane Chazela
                             Stephane is very active inFree Software/Open Source and UNIXcommunities. Stephane discovered the GNU Bourne-Again Shell (Bash) Shellshock Vulnerability. Stephane found Shellshock in Hackerone which also earned him a good reward.

Bitquark
                    Bitquark is very active and keep’s updating his blog which isbitquark.co.uk. Bitquark is very talented in this field and has also topped the list of bug bounty hunter. Bitquark has also received many rewards from ‘Google Sites’ and many other companies in this sector.

Neal Poole
                Neal Poole‘s bug-hunting techniques have always been effective and have proved to produce amazing results. Neal works as a security engineer at Facebook. Neal also works in the Product Security Team. Facebook hired Neal for his bug hunting talent.

A Bailey
            One of the famous bug bounty hunters whose talent was also considered by top news channels such as CNN and BBC. Lab Mouse Security was his start-up. He reported on memory corruption onLZ4 softwarewhich earned him $6000 from Hackerone.

JungHoon Lee
                      Our hero from Korea is an exploit developer. He stood apart and gained recognition at the CanSecWest security conference in 2015. He received$225,000 in Pwn2Ownwhere he exploited browsers like Internet Explorer, Chrome and Firefox.

Mazin Ahmed
                    Mazin found vulnerabilities in Facebook Messenger. He is very active in his personal blog. He got recognition for his research onW3 Total Cache’s Vulnerability.

End Note

So these are some of the famous bug bounty hunters in our list. I have included famous bug bounty hunters only, there are security researchers too who have also performed really well in bug bounty hunting programs.

So now what do you think? Finding mistakes is good or bad?
                                           

Monday, 20 June 2016

8 Cyber Security Tools

With the introduction of newer cyber-security threats every day, it is essential that you keep updating your system by these 8 cyber security tools to protect yourself. Cyber threats are more potent than ever owing to the massive technological advancement witnessed by the world in the contemporary era.

Lucky for you, there are several professional tools available today which will give you a peace of mind while surfing the web. So, keep reading to find out more about such tools.

Microsoft EMET

EMET, basically, employs extra protection at the vulnerabilities of different applications where the chances of intrusion by malicious elements are the most. The hackers have to put in extra efforts in order to bypass that level giving ample time to the users to take notice of such attempts and employing different measures to prevent those. Highly recommended by Yier Jin, Assistant Professor at the University of Central Florida, it is amongst the best security tool amongst the available choices.

Fire Eye malware Detection

It is a great tool for monitoring the extrusion detection closely. The tool is recommended by Randy Marchany, the IT security lab director at Virginia Tech. Quite capable of detecting the extrusions, it is also extremely helpful in monitoring network security. Other tools may be good at detecting the inbound traffic but for complete protection, the outbound traffic also needs to be monitored closely.

Privilege Identity Management

Management of access to different components of your business is another area which requires utmost attention. Thus, the Privilege Identity Management tool will assist you in monitoring administrative privileges of the team seamlessly. The tool is also capable of changing passkeys of critical locations at regular intervals, making the job of cyber-criminals even more difficult. The tool has been recommended by the VP and security analyst at Forrester, Mr. Andras Cser.

Windows GodMode

Ron Woerner, the director of Cyber Security Studies at The Bellevue University, vehemently advocates for the use of this tool to gain reliable access to information. This tool enables access to the OS controls and user information easily through a single folder.

Patch Management

The Patch Management tool might be the most important cyber security tool on this list. As the name suggests, it fixes security patches to any vulnerability present on your device. Not only does it patche the vulnerabilities but it also tests the applied patches, thereby upgrading the overall security and improves the performance and stability of the device. The tool has been recommended by Mr. Gary Hayslip, the Deputy Director and CISO for the City of San Diego.

Insider Threat Protection

You are not as threatened by the ‘outside’ factors as the ‘inside’ factors. Incidences of cyber-breach are on a rise due to the vulnerabilities present inside the system. An Insider Threat Protection tool makes early detection of any vulnerabilities or anomalies and informs them to the management ASAP giving them ample time to resolve the issue.  Mike Pappy, VP, and CISO at Northrop Grumman recommends this tool for proving complete security to your system.

Endpoint Detection and Response

Neil MacDonald, VP, and Analyst at Gardner endorses the use of this tool to prevent the execution of any unauthorized code on your system. The tool is capable of continuously monitoring and analyzing the various threats present on the system and gives warning in case of any unauthorized execution of any code. A great precautionary tools for an average as well as a professional user.

Endnote

Amongst the plethora of choices available, we have brought this comprehensive list of must have any of the 7 cyber security tools recommended by the professionals themselves. Use of such tool will significantly reduce the chances of any hack attacks on your system. One cannot leave any stone unturned if one needs complete peace of mind online. Thus, the readers are advised to give these tools a shot and make their online life a better and safer place.

"Healthcare Data A New Area For Hackers"

     "Healthcare Data A New Area For Hackers" Why the Healthcare data is more valuable than Credit card  or Debit card details...