Posts

Experts Warn Against Storing Passwords in This Browser After Hackers Target Remote Workers

Hackers are preying on people working from home for passwords stored in web browsers, experts claim.

Keeping passwords saved in the likes of Chrome and Edge are pretty common practice and usually considered quite safe.

They are designed to take the hassle out of remembering login details for every site you use.

But now IT researchers are cautioning against using such features in any browser over a recent security breach that compromised a company.

Bad actors appear to be exploiting the fact office workers in the UK and US are being forced to work from home amid the ongoing coronavirus pandemic. (Read more from “Experts Warn Against Storing Passwords in This Browser After Hackers Target Remote Workers” HERE)

Delete Facebook, Delete Twitter, Follow Restoring Liberty and Joe Miller at gab HERE.

Pipeline Hackers Received $90M in Ransom From Dozens of Victims: Report

The hackers behind the cyberattack on the Colonial Pipeline, DarkSide, received $90 million in bitcoin ransom payments over the past nine months from dozens of online victims before shutting down last week, according to new research released Tuesday.

DarkSide is a group of organized hackers, suspected to be based in Eastern Europe, selling software hacking tools to other criminals to carry out attacks on wealthy organizations and entities. The FBI confirmed the group was responsible for the pipeline attack earlier this month that caused major oil shortages on the East Coast of the United States.

The average amount that DarkSide received from 47 online victims in the past year was approximately $1.9 million, according to British blockchain analytics firm Elliptic.

“To our knowledge, this analysis includes all payments made to DarkSide, however further transactions may yet be uncovered, and the figures here should be considered a lower bound,” said Tom Robinson, Elliptic’s co-founder and chief scientist. (Read more from “Pipeline Hackers Received $90M in Ransom From Dozens of Victims: Report” HERE)

Delete Facebook, Delete Twitter, Follow Restoring Liberty and Joe Miller at gab HERE.

U.S. Government Announces 21 States Had Hackers Target Their System – Leaves out DHS Hackers

The federal government just announced on Friday that election officials in 21 states had Russian hackers target their systems before last year’s presidential election according to the Associated Press. But what about the DHS’s own attempted meddling in the election, getting caught red-handed running unauthorized scans for vulnerabilities in voter databases in more than five states?

Last year, before the election the federal government was attempting to declare state election systems as “critical infrastructure.” After that attempt failed, it seems they attempted to illegally take matters into their own hands and scanned election systems without first notifying each respective state official.

Several states reported the reconnaissance scans for vulnerabilities in their servers performed by DHS IP addresses.

Cyber security experts agree the Obama administration’s Department of Homeland Security attempted to hack into states’ voter registration systems in Georgia, Idaho, Indiana, Kentucky, Maine, and West Virginia.

According to one report published by the Daily Caller News Foundation, the Department of Homeland Security, under the Obama administration, attempted to hack the Indiana State electoral system nearly 15,000 times.

The second case was revealed by Georgia’s secretary of state wh0 stated that the DHS tried to breach its firewall of computers housing voter registration data on November 15.

Unlike the CIA’s narrative that the Russians hacked the election, this is well documented, and even the DHS itself has admitted it, blaming a “rogue employee.”

The problem that has since emerged for the DHS is that there are now ten separate cyber attacks known coming from the DHS, trying to breach Georgia’s computers housing Americans’ voting data that was scanned for vulnerabilities in 2016.

The other problem is the timing of the attacks. Georgia Secretary of State Brian Kemp told The DCNF Jan. 24, 2016, he was suspicious because four of the 10 attacks against the Georgia election network occurred as he was about to talk to DHS officials, or coincided with his public testimony opposing designation of election systems as “critical infrastructure.”

Georgia and Indiana aren’t the only states to confirm that the DHS attempted hacking them according to a report from WSB-TV in Atlanta; two more states, West Virginia and Kentucky, also confirmed the same DHS IP address accessed their election system close to election day.

DHS Secretary Jeh Johnson told the Georgia Secretary of State that the DHS accessing Georgia’s election system was a federal contractor conducting “normal” internet searches on the website.

That’s not all. The DHS also attempted to hack Idaho, and Maine, while the agency may have also backdoored Hawaii’s election systems which seemingly had problems after being “secured” by the agency. Call it another long list of coincidences.

In Idaho, Secretary of State Lawerence Denney said that his state had detected attempts to hack the state’s election system on Nov. 8, 2016.

Denney said that when they “looked at IP addresses that tried to get into our system,” there wasn’t “a single IP address from a foreign country,” such as Russia, but one from “our own Department of Homeland Security,” Computer World reported.

The DHS explained that:

When DHS conducts a cybersecurity scan of a network or system, we do so only with the cooperation and consent of the system owner.

On November 3, 2016, it was reported that Hawaii was working with the Department of Homeland Security to secure its election systems.

On November 8, 2016, there were reports of equipment problems at 18 different polling places with ballot scanning machines.

The argument that many without any type of knowledge of security are making is that it’s possible that DHS IP addresses were spoofed. The problem with this is that if this were done, it would have been pointless because spoofing your IP address as a DHS IP address would do nothing but show your IP address as the DHS’s. You would not be able to receive information data packets and, instead, the IP address you spoofed would receive those replies.

In simple terms, imagine you spoof a phone number—as was possible with Skype years ago—and someone called that number back. They wouldn’t be talking to you, but would instead be talking to the real owner of that phone number you spoofed. For another example, it’s the equivalent of sending a letter with the wrong return address and expecting to receive your letter.

Thus it’s exposed that a rogue group in the DHS tried to hack the election, which should be worrying because originally the DHS wanted to oversee the election to prevent just this. There have been no reported incidents where any states had their votes changed, but the DHS never looked into it – one has to question why.

On his way out of office then-DHS secretary Jeh Johnson signed an order designating election systems as “critical infrastructure” that U.S. President Donald Trump still hasn’t rolled back, meaning the federal government could easily rig the election disguised as protecting our election integrity.

On election day voters all across the U.S. reported that their votes were being switched from Donald Trump to Hillary Clinton, according to CBS. It is not known who hacked these machines or how many votes may have been affected, and it probably never will be, but this should concern you – it’s a bipartisan issue.

All 50 state-level secretaries of state have urged the Trump administration to repeal the DHS directive. It’s worth noting that according to the WikiLeaks Stratfor documents, the 2008 election results were manipulated by Democrats.

As Thomas Jefferson once wrote, “Democracy requires constant vigilance.” (For more from the author of “U.S. Government Announces 21 States Had Hackers Target Their System – Leaves out DHS Hackers” please click HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.

House Intelligence, Foreign Affairs Committee Possibly Compromised by Rogue IT Staff

Three brothers who managed office information technology for members of the House Permanent Select Committee on Intelligence and other lawmakers were abruptly relieved of their duties on suspicion that they accessed congressional computers without permission.

Brothers Abid, Imran, and Jamal Awan were barred from computer networks at the House of Representatives Thursday, The Daily Caller News Foundation Investigative Group has learned.

Three members of the intelligence panel and five members of the House Committee on Foreign Affairs were among the dozens of members who employed the suspects on a shared basis. The two committees deal with many of the nation’s most sensitive issues and documents, including those related to the war on terrorism.

Also among those whose computer systems may have been compromised is Rep. Debbie Wasserman Schultz, the Florida Democrat who was previously the target of a disastrous email hack when she served as chairman of the Democratic National Committee during the 2016 campaign.

The brothers are suspected of serious violations, including accessing members’ computer networks without their knowledge and stealing equipment from Congress. (Read more from “House Intelligence, Foreign Affairs Committee Possibly Compromised by Rogue IT Staff” HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.

British Expert: Cyber Hackers Are GREATER Threat to Security Than Nuclear Weapons

Dr Sally Leivesley, a former Home Office scientific adviser, said rogue states such as North Korea are already developing technology that can infiltrate defense systems and shut down power grids.

Her warning follows the huge data hack on TalkTalk that has hit four million customers who face having their bank accounts drained and personal details stolen.

Russian “cyberjihadists” have claimed responsibility for the attack although the true perpetrators remain unknown.

There is a suspicion the Russian government sponsored the attack on telecoms giant TalkTalk and stolen data has been passed on for espionage use.

Dr Leivesley wants to see a team of international observers set up to monitor cyber technology in the same way they monitor nuclear armaments. (Read more from “Cyber Hackers Are GREATER Threat to UK Security Than Nuclear Weapons” HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.

China Tells U.S. To Stop ‘Groundless’ Hacking Accusations

hacker1China reacted angrily on Friday following a call by America’s top intelligence official for cyber security against China to be stepped up, and said the United States should stop “groundless accusations”.

Director of National Intelligence James Clapper said the United States must beef up cyber security against Chinese hackers targeting a range of U.S. interests to raise the cost toChina of engaging in such activities . . .

China routinely denies any involvement in hacking and says it is also a victim.

“Maintaining cyber security should be a point of cooperation rather than a source of friction between both China and the United States,” Chinese Foreign Ministry spokesman Hong Lei told a daily news briefing.

“We hope that the U.S. stops its groundless attacks against China, start dialogue based on a foundation of mutual respect, and jointly build a cyberspace that is peaceful, secure, open and cooperative.” (Read more from “China Tells U.S. To Stop ‘Groundless’ Hacking Accusations” HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.

Hackers Dump SECOND, Even Bigger Batch of Ashley Madison Records

2B87F0CA00000578-0-image-a-1_1440097972336By Daily Mail Reporter. A second, even bigger, cache of files exposing details about the adultery website Ashley Madison has been released.

Hacking group ‘the Impact team’ at lunchtime on Thursday released another mine of documents and confidential information to back up their first 9.7 gigabyte leak, according to Vice.

The new documents were dumped with a taunting message to the adultery website’s founder as exposed users began to publicly admit their involvement.

‘Hey Noel, you can admit it’s real now,’ read the post – presumably directed at the company’s millionaire CEO Noel Biderman, who has refused to admit the material is all legitimate.

The 20GB is focused on the inner workings of the website rather than individual subscribers but the release will do little to calm the nerves of the cheaters whose personal details have been exposed. (Read more from “Hackers Dump SECOND, Even Bigger Batch of Ashley Madison Records” HERE)

___________________________________________________________

Report: Popular Christian Video Blogger Had Ashley Madison Account

By Michael Allen. Sam Rader, a popular Christian blogger (along with his wife Nia), was allegedly a member of the adultery web site Ashley Madison, according to a new report.

The couple, who have two small children, made news earlier this month when Sam secretly tested his wife’s urine from a toilet and told her that she was pregnant. Nia claimed three days later to have miscarried, but some medical experts questioned the pregnancy, noted Buzzfeed News. In response, Sam followed up with diatribe against the “haters,” and said his family was being persecuted for being Christians.

The Daily Mail reports today that Sam was listed as a former paid member per the Ashley Madison data that was recently dumped online by hackers.

Sam allegedly paid Ashley Madison $189 twice in September 2013, which would have been when his second child was born during his fourth year of marriage to Nia. There were allegedly four more payments by Sam to Ashley Madison for $14 each.

According to the Daily Mail, the account info was first revealed in an online 4chan forum, which are notorious for exposing hacked content. (Read more from this story HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.

Obama Considering Range of Options in Response to China’s Severely Damaging OPM Hack

By Bill Gertz. President Obama is considering a range of options in addition to economic sanctions in response to the massive theft of data from federal government computer networks, a senior White House security official said Tuesday.

“We’ve got a range of tools and we’ll consider all of them,” said Lisa Monaco, the White House’s homeland security adviser.

Monaco said in a brief interview with the Washington Free Beacon after a speech on cyber threats that the U.S. government is currently investigating the clandestine theft of sensitive information on at least 4 million government workers from computers at the Office of Personnel Management (OPM) . . .

Monaco’s comments on possible responses to the cyber attack were the first to indicate that the administration is considering more than economic sanctions in retaliation. Josh Earnest, the White House press secretary, suggested Friday that sanctions were among the options.

Monaco did not respond when asked why neither the president nor his advisers have condemned the cyber attack against the Office of Personnel Management, which has been described by U.S. officials as one of the most damaging compromises of sensitive information in recent years. (Read more from “Obama Considering Range of Options in Response to OPM Hack” HERE)

___________________________________________________________________

Chinese Cyber Attacks That Might Be Even Worse Than the OPM Hack

By Robert Knake. February 2013. DHS says that between December 2011 and June 2012, cyber criminals targeted twenty-three gas pipeline companies and stole information that could be used for sabotage purposes. Forensic data suggests the probes originated in China.
Why it’s worse: Espionage is one thing, sabotage is another. This incident crosses into what might be called “preparation of the battlefield”—laying the groundwork for military operations. In this incident, the hackers targeted an entire sector. They weren’t going after business data or stealing designs. The worst you can do with PII? Gain account access. The worst you can do with this info? Blow up pipelines.

March 2015. Canadian researchers say Chinese hackers attacked U.S. hosting site GitHub. GitHub said the attack involved “a wide combination of attack vectors” and used new techniques to involve unsuspecting web users in the flood of traffic to the site. According to the researchers, the attack targeted pages for two GitHub users—GreatFire and the New York Times’ Chinese mirror site—both of which circumvent China’s firewall.
Why it’s worse: This incident gets closer to the line North Korea crossed—interfering with our right to free speech. We haven’t quite articulated a norm in this area, but theInternational Strategy for Cyberspace comes close. In this case, China targeted GitHub because it was hosting pages for organizations that circumvent its Great Firewall. It may be time we put out a Monroe Doctrine for cyberspace, which would, make clear that trying to stifle freedom of speech in this country crosses a red line. We could go further and make it official policy to bring dissidents from other countries under this veil of protection. Taking a page from the Kennedy doctrine, the United States could declare that it will pay any price, bear any burden, host any website and defeat any denial of service attack in the cause of Internet freedom. . .

February 2012. Media reports say that Chinese hackers stole classified information about the technologies onboard F-35 Joint Strike Fighters.
Why it’s worse: Under current norms, military technology is fair game but this one is devastating if true. The hack targeted classified information on one of our most advanced weapons platforms. The info could save the Chinese decades in research and development. Worse, it could be used to find vulnerabilities that could be exploited in combat—think the pilot episode of Battlestar Gallactica. (Read more from this story HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.

What Was Stolen?: Massive Cybersecurity Breach Raises Concerns About What Hackers Stole [+video]

A massive hack of government personnel files is being treated as the work of foreign spies who could possibly use the information to sneak their way into more-secure computers and plunder U.S. secrets.

Dan Payne, a senior counterintelligence official for the Director of National Intelligence, told federal employees Friday to change their passwords, put fraud alerts on their credit reports and watch for attempts by foreign intelligence services to exploit them.

“Some of you may think that you are not of interest because you don’t have access to classified information,” he said. “You are mistaken.”

Federal officials said Friday the cyberattack appeared to have emanated in China, but did not point fingers directly at the Chinese government. The Chinese responded saying any accusation would be “irresponsible and unscientific.”

“We know that the attack occurred from somewhere in China, but we don’t know whether it was an individual or a group or a nation-state attack,” said Rep. Jim Langevin, a Rhode Island Democrat and leading voice in Congress on cybersecurity. He added, though that it had “all the hallmarks of a nation-state attack.” (Read more from “What Was Stolen?: Massive Cybersecurity Breach Raises Concerns About What Hackers Stole” HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.

“Biggest Breach Ever”: U.S. Government Hacked, Here’s Who the Feds Think Is the Culprit

By Kevin Liptak and Theodore Schleifer. Four million current and former federal employees might have had their personal information hacked, the Office of Personnel Management said on Thursday.

The agency, which is conducting background checks, warned it was urging potential victims to monitor their financial statements and get new credit reports.

U.S. officials believe this could be the biggest breach ever of the government’s computer networks.

The breach is beyond the Office of Personnel Management and the Department of Interior, with nearly every federal government agency hit by the hackers, government officials said . . .

U.S. investigators believe they can trace the breach to the Chinese government. Hackers working for the Chinese military are believed to be compiling a massive database of Americans, intelligence officials told CNN on Thursday night. (Read more from “U.S. Government Hacked; This Is Who the Feds Think Is the Culprit” HERE)

___________________________________________________________

China Suspected in Massive Breach of Federal Personnel Data

By Ken Dilanian and Ricardo Alonso-Zaldivar. China-based hackers are suspected of breaking into the computer networks of the U.S. government personnel office and stealing identifying information of at least 4 million federal workers, American officials said Thursday.

The Department of Homeland Security said in a statement that data from the Office of Personnel Management and the Interior Department had been compromised.

“The FBI is conducting an investigation to identify how and why this occurred,” the statement said.

The hackers were believed to be based in China, said Sen. Susan Collins, a Maine Republican.

Collins, a member of the Senate intelligence committee, said the breach was “yet another indication of a foreign power probing successfully and focusing on what appears to be data that would identify people with security clearances.” (Read more from “China Suspected in Massive Breach of Federal Personnel Data” HERE)

Follow Joe Miller on Twitter HERE and Facebook HERE.