Two major American Universities have been thrust into a state of unrest due to activism in the name of "social justice" and "diversity" late this fall semester. Yale University's crisis was triggered by duelling emails concerning Halloween costumes, while trouble at the University of Missouri began with a isolated incidents of drunks using racial slurs and has escalated into a series of boycotts hindering campus services. Continue reading
Category Archives: Security
Torrent Infrastructure Hindered as Demonii/YIFY/YTS Fall
Late in October the torrent outfit YIFY took down their website and mysteriously ceased operating. TorrentFreak is now reporting the operator of the outfit has reached an undisclosed settlement with the MPAA (archived). A substantial casualty of this settlement is Demonii, the largest public torrent tracker which had been operated by persons affiliated with YIFY. The unprecedented settlement is suggestive of the possibility that the entire YIFY operation may have been a false flag for its entire duration. Readers using torrent software are advised to block connections to the Demonii tracker as it may be used as a data collection tool by the MPAA and other Copyrast operations.
Ransomware Ring Busted, "Decryptors" Rushed by Adware Vendors
Shortly after an FBI agent publicly encouraged ransomware victims to pay off their attackers, some arrests and leaks have lead to the release of a number of private keys maintained by some ransomware authors. Allegedly all of the keys for Coinvault and Bitcryptor ransomware have been acquired and persons alleged to have connections to the schemes have been arrested. Adware vendors Bitdefender (archived) and Kaspersky Labs (archived) have released free adware1 tools to decrypt files related to these ransomware products, though caution is advised as the decryption tools from these providers and those from others have the potential to be at least as malicious as the original ransomware.
It is important to accurately categorize software according to what it really does instead of what it is marketed as. Their free products advertise their paid products and their paid products advertise still more premium paid products. ↩
000webhost Penetrated: 13 Million Plaintext Passwords Compromised
It's been said before but it bears repeating that if you're not paying for a service, you are the service. Furthermore, if you are the service, you get what you pay for, which in the realm of digital security, means that free-loaders are free-basing if they think that their data is in any way secure. Continue reading
Interview with David Francois on Building a Real Bitcoin Business
Operating a Bitcoin business is difficult and, a lot of times is the first step down the road which brings pretty much 9x% to crime within six months to a year (archived). With the excess influx of Venture Capital into companies pretending as to have any involvement with Bitcoin, I sat down with David "davout" Francois CTO of Paymium, formerly known as Bitcoin-Central, to talk about the fundamentals from his personal experience in developing a Bitcoin company that can survive the ruthless climate of the world of Bitcoin. Continue reading
Billion Dollar Blimp Brings Destruction
In the United States a Billion Dollar NORAD JLENS Blimp has broken free from its moorings and is leaving havoc and destruction as it roams. The JLENS mission is declared to be missile detection and defense, though the declared capabilities make it capable of abusive ground level surveillance. The wild blimp is dragging 6,700 feet of cable behind it shorting out power lines and leaving a pronounced trail on the earth underneath it.
FBI Agent Encourages Paying Ransomware Demands
The Security Ledger report at a summit the United States Federal Bureau of Investigation Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program at the Boston field office, Joseph Bonavolonta, encourages paying ransomware demands (archived). The quality of the encryption implementations utilized in ransomware is frequently too high for his office to do anything to recover the affected files. As a prophylactic measure he encouraged healthy backup measures so systems could at least be restored to a pre-ransomware state.
Operation Cyber Juice: Police and Their Favorite Drug of Abuse, Part 1
Back in September the Drug Enforcement Agency announced an action dubbed "Operation Cyber Juice" involving the bust of a handful of underground labs compounding imported raw anabolic steroid materials into oral and injectable preparations suitable for end users. Also busted were a number of distributors including persons dealing steroids at a LA Fitness club Franchise and at a Juice bar (archived). At least as interesting though, not very surprising is the number of underground labs and clearnet internet vendors who were not busted despite publicly declaring a presence in the United States. Continue reading
Fiat Broker Broker Scottrade Hacked
This evening Fiat stock broker and online investment management portal Scottrade revealed it was hacked in an email to customers. The advised customers that critical personally identifying information was in all probability taken from their servers. In the email they offer that they have evidence they were breeched roughly around 2013 and 2014 without being more specific. Numerous fiat based financial services providers this year have not only had to weather attacks to their own infrastructure, but attacks which leveraged information attained in other breaches degrading their ability to provide services at all. Information publicly disclosed on the Scottrade breach so far was offered in an email to customers which availed them of a dubious credit monitoring service. Users of fiat services like Scottrade and of supposedly Bitcoin services that swear allegiance to customs of the fiat identity theft tradition are advised to stop doing that before you find yourself insolvent. The full text of the email is available below: Continue reading
Malleability Issues Continue Testing Zero-conf Faithful
Coinkite in a blog post revealed that a number of their customer's transactions are continuing to be affected by malleability issues (archived) which stem from valid signed transactions having more than one potential transaction ID number until mined. Previously malleability concerns stemmed from different possible valid encodings with MtGox being a noted transaction encoding deviant. The malleability issue affecting Coinkite is that a transaction ID may use either the low or high S value from the ECDSA signature of a transaction. Transaction ID's have never been a reliable tool for distinguishing unconfirmed transactions, and any service that depends on using them to distinguish unmined yet broadcasted transactions does so at their and their customer's peril. Considering the disastrous forking that resulted from the last attempt to soft fork away a malleability vector it is unlikely this can or will be addressed through a soft fork process. Transaction malleability is one of many reasons to wait for confirmation through mining before accepting a Bitcoin transaction.