STE WILLIAMS

Rumble in the Tumblr: Troll-worm infected thousands of blogs

A worm spread like wildfire across Tumblr on Monday, defacing pages on the blogging website with an abusive message penned by a notorious trolling crew.

The outbreak was triggered by the GNAA, a group of anonymous troublemakers who get their kicks from winding up bloggers with offensive posts.

Tumblr temporarily halted the publication of new journal posts to prevent the worm from spreading further before restoring the service to normal a few hours later.

“Tumblr engineers have resolved the issue of the viral post attack that affected a few thousand Tumblr blogs. Thanks for your patience,” the website’s operators said in an official status update.

Net security firm Sophos reckoned the worm spread after attackers managed to embed malicious JavaScript in a Tumblr post. Anyone who viewed the booby-trapped page while logged into Tumblr spread the infectious post to their own blog, Sophos explained.

“It appears that the worm took advantage of Tumblr’s reblogging feature, meaning that anyone who was logged into Tumblr would automatically reblog the infectious post if they visited one of the offending pages,” wrote Graham Cluley, senior technology consultant at Sophos.

“It shouldn’t have been possible for someone to post such malicious JavaScript into a Tumblr post – our assumption is that the attackers managed to skirt around Tumblr’s defences by disguising their code through Base 64 encoding and embedding it in a data URI,” he added.

GNAA has trolled several prominent websites including Slashdot, Wikipedia, CNN and Barack Obama’s campaign site. The group founded Goatse Security, a grey-hat information security crew that infamously obtained and leaked the email addresses of approximately 120,000 early adopter Apple iPad users. Andrew “weev” Auernheimer, 27, of New York, was found guilty at the end of last month of one count of identity fraud and one count of conspiracy to access a computer without authorisation over the iPad leak incident – a court verdict condemned by many members of the information security community. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/tumblr_javascript_worm/

Assange: Google, Facebook run ‘side projects’ for US spooks

WikiMartyr-in-waiting Julian Assange has emitted another screed in which he shares his belief that democracy is being dangerously undermined by government monitoring of the internet, and that Facebook and Google are helping those efforts.

Chatting with RT, Assange has outlined his belief that nations now conduct surveillance on a massive scale, because “it is cheaper to intercept every individual rather that it is to pick particular people to spy upon.”

French company AMESYS’ ‘EAGLE’ product is nations’ weapon of choice, Assange said, going on to add a quote from Bill Binney, whom he describes as a National Security Agency whistleblower, to the effect that nations now posses “turnkey totalitarianism”. Assange himself says “all the infrastructure has been built for absolute totalitarianism.”

Assange then says Google and Facebook are co-operating with the shadowy forces behind mass surveillance.

“And then you also have Google and Facebook, who started up predominantly serving the public, but also have developed side projects to service the US intelligence complex,” Assange says in the interview. “And individuals are constantly pushing their thoughts into Google as each thing that they want to research; it is pushed via emails, and on Facebook, through their social relationships. That’s an undreamt of spy database.

“Facebook is completely undreamt of even by the worst spying nation, given the richness and sophistication of relationships expressed.”

There’s plenty more in the same vein in the video below, but precious little evidence, if you’re willing to endure about 13 minutes of Assange in full flight.

®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/assange_says_google_facebook_pass_data_to_us_intelligence/

Operation Hunt the Hunter: Anonymous targets ‘revenge porn’ man

Hacktivist collective Anonymous has set its sights on the former owner of a “revenge porn” website.

Hunter Moore gained internet infamy by posting sexually revealing images of men and women without their permission, alongside links to their social networking profiles. The images were normally submitted by aggrieved ex-boyfriends or ex-girlfriends. Victims who requested the removal of images were further ridiculed. Legal threats were routinely ignored: however in the end Moore’s website IsAnyoneUp.com was sold to an anti-bullying charity.

Moore’s fresh plans to relaunch a similar site have provoked the ire of elements of Anonymous. Putative plans to post victims’ home addresses, since denied by Moore, only served to further inflame the controversy.

Anonymous characterised Moore as a bully and facilitator of abuse who would be held “accountable for his actions”.

“We will protect anyone who is victimised by abuse of our internet, we will prevent the stalking, rape, and possible murders as by-product of his sites,” the group said.

“Operation anti-bully. Operation hunt Hunter engaged. We are Anonymous, we are legion, we do not forgive, we do not forget, Hunter Moore, expect us,” it added.

A video by Anonymous featured Amanda Todd, 15, who took her own life after being bullied following the publication of topless pictures of her on the net. Todd was not featured on Moore’s website.

Anonymous published personal details about Moore online, including his home address and the names of family members, the BBC reports.

IsAnyoneUp.com reportedly pulled in $20,000 in advertising revenue a month prior to the sale. Moore blamed the media for distorting his original vision, promising that his new site would be “very scary but yet fun”.

“I am creating something that will question if you ever want to have kids,” he boasted.

Moore told tech site Betabeat that his new venture would “introduce the mapping stuff so you can stalk people” a statement he retracted in subsequent interviews, claiming it was only a drunken boast. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/anon_operation_hunt_hunter/

Assange: Google, Facebook run “side projects” for US spooks

WikiMartyr in waiting Julian Assange has emitted another screed in which he shares his belief that democracy is being dangerously undermined by government monitoring of the internet, and that Facebook and Google are helping those efforts.

Chatting with RT, Assange has outlined his belief that nations now conduct surveillance on a massive scale, because “it is cheaper to intercept every individual rather that it is to pick particular people to spy upon.”

French company AMESYS’ ‘EAGLE’ product is nations’ weapon of choice, Assange said, going on to add a quote from Bill Binney, whom he describes as a National Security Agency whistleblower, to the effect that nations now posses “turnkey totalitarianism”. Assange himself says “all the infrastructure has been built for absolute totalitarianism.”

Assange then says Google and Facebook are co-operating with the shadowy forces behind mass surveillance.

“And then you also have Google and Facebook, who started up predominantly serving the public, but also have developed side projects to service the US intelligence complex,” Assange says in the interview. “And individuals are constantly pushing their thoughts into Google as each thing that they want to research; it is pushed via emails, and on Facebook, through their social relationships. That’s an undreamt of spy database.”

“Facebook is completely undreamt of even by the worst spying nation, given the richness and sophistication of relationships expressed.”

There’s plenty more in the same vein in the video below, but precious little evidence, if you’re willing to endure about 13 minutes of Assange in full flight.

If that’s not to your taste, perhaps former Australian Prime Minister Mal

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/assange_says_google_facebook_pass_data_to_us_intelligence/

UK.gov: ‘Foreign cyber reconnaissance’ underway in UK

Foreign states may already have used malware to map the networks that support the UK’s critical infrastructure systems, the government admitted.

The admission by government officials came in the run-up to a parliamentary statement by Cabinet Office minister, Francis Maude, marking the first anniversary of the UK’s government’s National Cyber Security Strategy.

Maude highlighted future work on a new UK National Computer Emergency Response team, further work on education and skills, Cyber Reservists for the MoD and a partnership with the private sector to boost the cyber security sector in the UK. He pointed out that the private sector is the largest economic victim of crime-crime, such as IP theft, and from economic espionage perpetrated through cyberspace, as well as highlighting efforts to improvement the protection of the UK’s critical infrastructure in a written statement to parliament on Monday (3 December).

“We have invested in new and unique capabilities for GCHQ to identify and analyse hostile cyber attacks in order to protect our core networks and services and support the UK’s wider cyber security mission,” Maude said. “I cannot reveal details of this work, but it has broadened and deepened our understanding of the threat, helping us prioritise and direct defensive efforts.”

“The Security Service has developed and enhanced its cyber structures, focusing on investigating cyber threats from hostile foreign intelligence agencies and terrorists, and working with UK victims. This informs the work of the Centre for the Protection of National Infrastructure (CPNI) which is helping organisations to improve their cyber security measures.”

“CPNI is actively influencing standards, researching vulnerabilities and focusing on the key technologies and systems of cyber infrastructure. As part of this work it has commissioned a major research programme from the University of Oxford with the aim of delivering advice, guidance and products to help reduce the risk of cyber attacks mounted or facilitated with the help of company insiders.”

Maude praised efforts to secure systems during the Olympics as well as looking ahead to a new Cyber Incident Response scheme, recently launched by CESG and CPNI in pilot form, will move to become fully operational in 2013. Next year will also see the merger of cyber-policing units at Scotland Yard and SOCA to form the new National Cyber Crime Unit of the new National Crime Agency.

The cyber security strategy was launched on 25 November 2011 as a means to co-ordinate government and private sector efforts in the fight against cyber-espionage, malware and other internet security threats.

The government budgeted £650m to bolster the nation’s cyber-defences as part of the 2010 strategic defence review. GCHQ was given the lead role and the lion’s share of the budget. Only £30m was earmarked for law enforcement.

Government ministers and officials argue that the threats is growing and facilities that power utilities, banking and other vital services are at the front line of attack. The threats come in the form of attacks designed to steal intellectual property and trade secrets as well as more general cybercrime and probes against the networks of utilities and others.

Officials will not be drawn on who is responsible for reconnaissance-style attacks on UK infrastructure systems, beyond saying that the threat came from abroad.

“We understand that there is a threat from hostile foreign states and others to attack it,” a senior official said, The Guardian reports.

“It would be absolutely in keeping with that – we have seen attempts by hostile foreign states through cyberspace as well.”

“There are attacks against critical national infrastructure and I am not going to say whether they were or weren’t successful,” the official added.

US officials have warned about attacks on that country’s national infrastructure but unlike their UK counterparts they have been far less reticent about apportioning blame, singling out China and Russia for criticism.

Chris McIntosh, chief exec at encryption firm ViaSat, commented that news that cyber-attacks are increasingly targeting critical infrastructure ought to come as little surprise.

“While previously national energy or resource infrastructure was relatively safe from these attacks, the modernisation of these networks has meant they are closely connected to the internet and so more vulnerable than ever. While at one level the threat to infrastructure could involve the targeting of individual sections of the network and deny certain services at specific areas, at the extreme level these attacks could potentially be used to overload systems or override safety mechanisms, causing catastrophic damage to the surrounding area and the infrastructure as a whole.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/cyber_security_strategy/

Littlest pirate’s Winnie-the-Pooh laptop on the way home

The ten year old girl accused of piracy in Finland will probably still find it hard to stay off Santa’s naughty list, but has at least cost her family only €300 after pinching Finnish pop songs.

Big Content, in the form of the Finnish Copyright Information and Anti-Piracy Centre (CIAPC), was last week revealed to have issued a demand for €600 from the Nylund family, in order to compensate recording artist Chisu for the theft and distribution of his work.

The family was raided and the girl’s laptop, complete with Winnie-the-Pooh stickers, was confiscated.

Torrent Freak reports the laptop’s now on the way home after the story went both viral and global, leading to widespread opining that CIAPC may have chosen the nuclear option when a little sabre rattling would have done just fine.

The girl’s father reportedly met CIAPC in the middle with his €300 offer and the case is now considered closed, with the laptop heading home. CIAPC has declared itself happy a settlement has been reached, but unease about the way in which a child has been targeted persists. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/littlest_pirates_dad_settles_finnish_case/

MySQL gains new batch of vulns

A series of posts on ExploitDB by an author signing as “King Cope” reveal a new set of MySQL vulnerabilities – along with one issue that could just be a configuration issue.

The vulnerabilities, which emerged on Saturday, include a denial-of-service demonstration, a Windows remote root attack, two overrun attacks that work on Linux, and one privilege escalation attack, also on Linux.

The overflow bugs crash the MySQL daemon, allowing the attacker to then execute commands with the same privileges as the user running MySQL. “King Cope” also demonstrated a user enumeration vulnerability.

The privilege escalation vulnerability, in which an attacker could escalate themselves to the same file permissions as the MySQL administrative user, has provoked some to-and-fro on the Full Disclosure mailing list, with one writer stating that “CVE-2012-5613 is not a bug, but a result of a misconfiguration, much like an anonymous ftp upload access to the $HOME of the ftp user.”

Red Hat has assigned CVEs to the vulnerabilities, but at the time of writing, Oracle has not commented on the issues. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/mysql_new_vulns/

Internet shut-down easier, in more countries, than you think

Given Syria’s recent “have you tried turning it off and turning it back on again?” Internet experience, analysing what other countries this might happen to is a good idea.

It’s a particularly pertinent question given the current America-Versus-The-Black-Helicopters scenario currently playing out at WCIT, as countries line up for-and-against the ITU’s mooted re-write of the International Telecommunications Regulations.

Renesys, the company that documented the Syrian telecommunications blackout last week, has released just such an analysis, here. Unsurprisingly, it rates North America and most of Europe as “resilient” in the face of attempts to yank the “kill switch” on Internet services.

As Renesys states, its analysis is based on the routing table, which indicates how many network operators announce routes at the IP layer – which ignores the diversity of physical paths available, as is documented by Telegeography.

The Register is not proposing a full run-down of errors on a country-by-country basis, but would draw readers’ attention to two nations familiar to us, Australia and New Zealand.

According to Renesys’ definition, “if you have more than 40 providers at your frontier, your country is likely to be extremely resistant to Internet disconnection” while “if you have fewer than 10 service providers at your international frontier, your country is probably exposed to some significant risk of Internet disconnection”. At most risk are countries with “one or two companies at your international frontier”.

Australia is rated “resistant” in both the map and the table Renesis provides, while New Zealand carries the “low risk” colour on the map (but is listed as “resistant” in the table).

The reason The Register is querying these assessments lies in the submarine cable interconnectedness of these two countries. Australia’s major international fibre links are the Southern Cross Cable Network, the Telstra Endeavour cable, the Australia-Japan Cable, TPG’s PPC-1, and Sea-Me-We 3 (the cables connecting Papua New Guinea and New Caledonia aren’t relevant to this discussion).

While Australia may have more than 40 announced routes at the frontier, those routes traverse just five cables.

Poor suffering New Zealand has one trans-Pacific connection – the Southern Cross Cable Network – and one trans-Tasman cable, Tasman 2. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/04/kill_switch_analysis_renesys/

Who’s using ‘password’ as a password? TOO MANY OF YOU

A study to find the top 25 leaked passwords of 2012 has revealed too many people are still using “password”, “123456” and “12345678” for their login credentials.

The table was compiled from plain-text passwords and weak unsalted password hashes lifted from compromised databases and dumped online by Anonymous hacktivists and other miscreants. The new entries in this year’s list of common passwords are “welcome”, “jesus”, “ninja”, “mustang” and “password1”.

This year the dataset was boosted by several high-profile password security breaches at major websites including Yahoo!, LinkedIn, eHarmony and Last.fm.

Here’s the table of the top 25 most common leaked web passwords, with the change in position from last year in brackets:

  1. password (unchanged)
  2. 123456 (unchanged)
  3. 12345678 (unchanged)
  4. abc123 (up one)
  5. qwerty (down one)
  6. monkey (unchanged)
  7. letmein (up one)
  8. dragon (up two)
  9. 111111 (up three)
  10. baseball (up one)
  11. iloveyou (up two)
  12. trustno1 (down three)
  13. 1234567 (down six)
  14. sunshine (up one)
  15. master (down one)
  16. 123123 (up four)
  17. welcome (new entry!)
  18. shadow (up one)
  19. ashley (down three)
  20. football (up five)
  21. jesus (new entry!)
  22. michael (up two)
  23. ninja (new entry!)
  24. mustang (new entry!)
  25. password1 (new entry!)

The roundup, produced by mobile security biz SplashData, put “123456” in the number two slot for 2012; the same password was used by 37 per cent of all user accounts at the Anonymous-hacked Greek finance ministry.

Meanwhile, Kaspersky Lab published a summary of terrible password choices: trendy words like ninja, sports-themed passwords, names of loved ones or pets are each a big no-no.

A good primer on how to devise hard to crack passwords can be found in a recent article by the New York Times here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/03/lame_passwords_still_rife/

Home Sec: Let us have Snoop Charter or PEOPLE WILL DIE

Home Sec: Let us have Snoop Charter or PEOPLE WILL DIE

  • alert
  • print
  • comment

Do what I want or bad things will happen to children

Free whitepaper – Nemertes Research: Mobile Security Challenge Emerges

Home Secretary Theresa May today claimed in The Sun that her draft law to massively ramp up online surveillance of Brits will “save lives”.

The Tory minister managed to squeeze in a bit of last-minute lobbying ahead of the publication of a report by peers and MPs scrutinising her controversial communications data bill.

In an interview published today in the Murdoch-owned tabloid, May repeated the same points she made in April.

The Home Sec said of her snoopers’ charter, which will cost £1.8bn to implement:

The people who say they’re against this bill need to look victims of serious crime, terrorism and child sex offences in the eye and tell them why they’re not prepared to give the police the powers they need to protect the public.

Anybody who is against this bill is putting politics before people’s lives. We would certainly see criminals going free as a result of this.

There will be paedophiles who will not be identified and it will reduce our ability to deal with this serious organised crime.

Her comments came after it emerged Lib Dem MPs in the UK coalition government may reject May’s plans to increase the monitoring of citizens’ web activities if she failed to address concerns laid out by cross-party peers and MPs on the influential Home Affairs Select Committee.

Their report is expected to be published within the next two weeks.

On Saturday, The Sun reported that Lib Dem leader and Deputy Prime Minister Nick Clegg wants to stall plans to legislate greater snooping on internet communications – which would include requiring ISPs to retain sensitive subscriber data for 12 months – until 2014 to allow for further scrutiny of May’s proposals. ®

Free whitepaper – Forrester: Prepare For Anywhere, Anytime, Any-Device Engagement with a Stateless Mobile Architecture

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2012/12/03/home_secretary_snoopers_charter_will_save_lives/