According to this article at Ars, the remote admin tool Ammyy Admin was compromised and has been being used by a criminal gang to install a banking trojan to drain the bank accounts of it’s victims. The article does an excellent job of detailing it but the short story seems to be the following: A […]
Author: bumpkey
Quick OpEd on MIT anonymizing network Riffle
Researchers at MIT have recently released a whitepaper detailing Riffle, “An Efficient Communication System With Strong Anonymity” that was quickly picked up by a number of news outlets including ThreatPost. There’s plenty of details in the PDF and linked articles but, for the TL;DR crowd, a couple of things stand out that I think are […]
New Mac trojan disguised as Easy Doc Converter.app
Interesting article over at C|Net on a new trojan that’s been spotted in the wild actively targeting Mac users. According to the article, the trojan gives the attackers remote access to vulnerable Macs to access data, the webcam and presumably use the infected Mac as a pivot point further into the network. Mac users have […]
Another healthcare breach exposes hundreds of thousands of patient records
Data breaches in three different locations including Farmington Missouri (48,000 records), Atlanta Georgia (397,000 records) and the Central / Midwest US (210,000 records) allegedly including Social Security numbers, full names, physical addresses, dates of birth and insurance information. The names of the organizations have not yet been released and the attacker has advised that a […]
DEF CON 24 Workshop Schedule Live
DEF CON 24 is now less than 2 months away and the schedules are starting to finalize. Below is a link to the DC24 workshops and I’ll try to post the other schedules (villages, skytalks, etc.) as I catch them. https://defcon.org/html/defcon-24/dc-24-workshops.html
Malicious hackers using TeamViewer compromise to empty bank accounts
TeamViewer is an application that allows users remote access to computers over the Internet. It is often used by support personnel to provide technical support for remote users. As of this writing, the TeamViewer website is back online (it was down per the Inquisitor article) and the last blog entry on their Blog is from […]
Pastejack – Attacking from the clipboard
Our goal as penetration testers is to learn how malicious hackers operate to compromise the confidentiality, integrity and / or availability of their victims in the real-world and integrate those attacks into our engagements. This gives our clients the most realistic experience possible so that they’re able to quickly identify an attack when it happens […]