Adobe confirms customer data stolen in security breach

Adobe Confirms Security Breach, Hackers Steal Source Code and 2.9 Million Customer’s Detail

The attackers accessed encrypted customer passwords and payment card numbers, the company said.

But it does not believe decrypted debit or credit card data was removed.

Adobe Security Breech

Adobe Security Breech

Adobe also revealed that it was investigating the “illegal access” of source code for numerous products, including Adobe Acrobat and ColdFusion.

“We deeply regret that this incident occurred,” said Brad Arkin, Adobe’s chief security officer.

“Based on our findings to date, we are not aware of any specific increased risk to customers as a result of this incident,” he said.

But Chester Wisniewski, senior adviser at internet security company Sophos, told the BBC: “Access to the source code could be very serious.

“Billions of computers around the world use Adobe software, so if hackers manage to embed malicious code in official-looking software updates they could potentially take control of millions of machines.

“This is on the same level as a Microsoft security breach,” he added.

Adobe said it had been helped in its investigation by internet security journalist Brian Krebs and security expert Alex Holden.

The two discovered a 40GB cache of Adobe source code while investigating attacks on three US data providers, Dun & Bradstreet, Kroll Background America, and LexisNexis.

Mr Krebs said the Adobe code was on a server he believed the hackers used.

 Adobe said it is resetting customer passwords of those who were affected by the attack. Adobe said it’s also in the process of notifying customers whose credit or debit card information might have been compromised, as well as getting in touch with the banks processing customer payments.

“We deeply regret that his incident occurred,” Adobe said in a blog post. “We’re working diligently internally, as well as with external partners and law enforcement, to address the incident.”

About these ads

Mark Zuckerberg’s Facebook Account Hacked

A Palestinian programmer has highlighted a flaw in Facebook’s security system by posting a message on Mark Zuckerberg’s private page.

Khalil Shreateh used a vulnerability he discovered to hack the account of the Facebook founder and raise the alarm.

Mr Shreateh said he had tried to use Facebook’s White Hat scheme, which offers a monetary reward for reporting vulnerabilities, but had been ignored.

A screenshot of the message left on Mark Zuckerberg's wall

A screenshot of the message left on Mark Zuckerberg’s wall

Facebook said it had fixed the fault but would not be paying Mr Shreateh.

Mr Shreateh found a security breach that allowed Facebook users to post messages on the private “walls” of people who had not approved them as “friends”, overriding the site’s privacy features.

‘Not a bug’

He wrote to Facebook’s White Hat team to warn them of the glitch, providing basic details of his discovery.

After a short exchange with the team, Mr Shreateh received an email saying: “I am sorry this is not a bug”.

Following this rebuttal, Mr Shreateh exploited the bug to post a message on Mr Zuckerberg’s page.

In the post, Mr Shreateh, whose first language is Arabic, said he was “sorry for breaking your privacy and post to your wall” but that he had “no other choice” after being ignored by Facebook’s security team.

An engineer on Facebook’s security team, Matt Jones, posted a public explanation saying that although Mr Shreateh’s original email should have been followed up, the way he had reported the bug had violated the site’s “responsible disclosure policy”.

He added that as Mr Shreateh had highlighted the bug “using the accounts of real people without their permission”, he would not qualify for a payout.

New targets for hackers: Your car and your house

Imagine driving on the freeway at 60 miles per hour and your car suddenly screeches to a halt, causing a pileup that injures dozens of people. Now imagine you had absolutely nothing to do with the accident because your car was taken over by hackers.

Charlie Miller, a security researcher at Twitter, and Chris Valasek, director of security intelligence at IOActive, a security research company, recently demonstrated car hacks at the DefCon computer security conferences in Las Vegas. The researchers completely disabled a driver’s ability to control a vehicle. No brakes. Distorted steering. All with a click of a button. While the demos were with hybrid cars, researchers warn that dozens of modern vehicles could be susceptible.

Vulnerabilty in Hybrid Cars

Vulnerabilty in Hybrid Cars

Hackers and security researchers are moving away from simply trying to break into — or protect — people’s e-mail accounts, stealing credit cards and other dirty digital deeds. Now they’re exploring vulnerabilities to break through the high-tech security of homes, cause car accidents or in some extreme cases, kill people who use implanted medical devices.

“Once any single computer in a car is compromised, safety of the vehicle goes out the window,” Mr. Miller said in an e-mail interview. Modern cars typically have 10 to 40 little computers in them.

“Right now, there aren’t a lot of ways for hackers to remotely attack cars: Bluetooth, wireless tire sensors, telematics units,” he added. “But as cars get Internet connections, things will get easier for the attacker.”

Carmakers and the government are aware that our vehicles are vulnerable. In fact, Mr. Miller and Mr. Valasek received a grant from the Defense Advanced Research Projects Agency, or Darpa, to research ways car-makers can thwart attacks. The biggest fear is the future: as cars become more computerized — or become fully automated, computers on wheels that drive for you — they’ll become more inviting targets. Read More on NYTIMES

Apple Computers Hacked

Apple Computers Were Hacked By Same Hackers Who Targeted Facebook: Reuters

Apple Inc. has recently admitted to have been attacked on a small scale basis by unknown hackers who infected the machines of their employees. The company made this unexpected disclosure after the recent cyber attacks on social networking giant Facebook came into the limelight and mentioned that the attack was the largest known attack on Apple machines. However, the company was quick to clarify that the only a small fraction of their machines were infected and that they had isolated those infected machines immediately.

Apple Computers Hacked

Apple Computers Hacked

The attacks occurred after some employees of the firm visited a website which caters to software developers. The site has been identified as an online forum for iPhone developers’ viz. www.iphonedevsdk.com which was infected with a malware which was loaded on to the machines of the people who visited the site. The malware was designed so as to exploit a hitherto unknown security vulnerability in the Java plug in developed by Oracle corp. for Mac computers which means that this was done with an intent of infecting these devices specifically. The interesting fact is that the same malware was used by some hackers a few days back to attack Facebook, as the company revealed on Friday. Moreover, the company also mentioned that the same malware was used to attack Mac computers of other companies while not specifying the extent of the attacks. Furthermore, Twitter has announced that it faced a similar assault on February 1 and that hackers had stolen personal info of about 250,000 users  and was part of a similar series of attacks.

These revelations have raised doubts about these attacks being state sponsored by the Chinese government and persons close to these investigations feel that Chinese hackers could be responsible for these attacks, though there is no official evidence for the same. This is not the first time that the Chinese are facing such allegations.

Investigations have begun and as of now there has been not any breakthrough regarding the nature of the attacks and what type of data had been stolen or not though Apple has denied any theft of data as such from their company. Apple is assisting the authorities in these investigations completely to get to the culprits.

Some cyber security firms are of the opinion that many companies and corporations in the U.S. suffer extensive cyber espionage at the hands of Chinese military who could be the perpetrators of these attacks. White House officials have commented that the government has repeatedly raised the issue of cyber espionage with the Chinese government.

Since the malware was designed to exploit the Java vulnerability so people who have their Java plug-ins enabled still are at a risk and this applies to smartphones and even Windows based devices. Apple has meanwhile released a patch for OS X users and will be coming up with software that will let know the users of any infection with malware.

Well, this is the first time such a large scale attack on Mac computers has been observed. So Mac users and smartphone users will have to stay cautious of malicious software till the company fixes this problem effectively.

iOS 6.1 Hack allows iPhone lock screen bypass

According to latest reports, the latest version of operating system for iPhone 5 i.e. iOS 6.1 has a certain security loophole which can be exploited by hackers to override the smartphones lock screen password so as to unlock the phone. This development was reported sometime last week when a video was posted on YouTube which details the hack procedure for unlocking the screen lock of the iPhone even when a password was in place.

iOS 6.1 Hack allows iPhone lock screen bypass

iOS 6.1 Hack allows iPhone lock screen bypass

Apparently, it is not very difficult to exploit this loophole and a simple set of steps which take only up to a minute can help unlock the iPhone. The basic trick involved is to attempt emergency calling and then cancelling those calls while holding down the power button and a few other steps. The result being that one can bypass the phone security code and access all phone features such as call logs, contacts, photos etc. but further navigation returns the phone to the locked mode. Furthermore the video has received more than 500,000 views during this week.

The glitch is applicable to all models of iPhone and iPad which are using iOS 6.1 as their operating system though it is more easy to unlock the iPhone 4 and iPhone 4S as compared to iPhone 5. The hacker commented on the video that “For prank your friends…For a magic show…Use it as you want, at your own risk, but… please… do not use this trick to do evil !!!”. Seems like a good humored prank with possibly not so funny consequences. Meanwhile officials at Apple have stated that they are indeed working on a fix and will come with a new version soon.  They stated that “Apple takes user security very seriously. We are aware of this issue, and will deliver a fix in a future software update.” In fact, a new version of the iOS i.e. iOS 6.1.1 is under development as of now.

This is not the first time that iOS 6.1 is facing such problems since its release in January. It was reported that iPhone 4S users were having trouble sending messages, making calls, surfing the internet etc. while some others complained of reduced battery life because of spiked networking activity. Moreover, researchers had earlier also unlocked a previous version of iOS as soon as in under six minutes.

For now, the users can make do with substituting their four digit pin codes with a text based code as it is not easy to hack until an updated version of the software is released officially. However, it is advisable not to lose track of your phone until the hysteria of this glitch dies away.

Turkmenistan Gmail, Microsoft, Youtube Domains Hijacked

Iranian hackers deface multiple big companies Turkmenistan domains (.tm) yesterday using DNS poisoning attack.The defaces includes major sites of Google,Youtube,Orkut,Gmail,Intel,Xbox,etc. All those Hacked domains are registered at NIC  Turkmenistan. Hackers used SQL Injection Vulnerability to get the access to Database of NIC website.

The plain text passwords stored in the database makes very easy for hackers to access all the domain panels and changing  the DNS entries to shift websites on a rouge server with defaced page.

As usual the hackers uploaded a simple html page to show that the site has been defaced by them. The defaced message as shown below.

NIC Turkmenistan Domain Namesdefaced

NIC Turkmenistan Domain Names Defaced

The defaced domain names include

This is the first attack on NIC websites in 2013. Whatever it may be, but it points out strongly that still many of the websites having SQL vulnerabilities. The hackers have also got access to DNS records.

You can view the entire Data leak from here

http://ha.cker.ir/2013/01/data-leakage-from-nic-tm/

Mirrors of Defaced sites can be viewed here
 http://zone-h.com/archive/ip=198.105.216.250

http://append-hc.com/mirror/id/66204