RAT – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Wed, 05 Sep 2018 04:28:09 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png RAT – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Privacy Priorities| LINUX Unplugged 265 https://original.jupiterbroadcasting.net/126966/privacy-priorities-linux-unplugged-265/ Tue, 04 Sep 2018 20:28:09 +0000 https://original.jupiterbroadcasting.net/?p=126966 Show Notes/Links: linuxunplugged.com/265

The post Privacy Priorities| LINUX Unplugged 265 first appeared on Jupiter Broadcasting.

]]>

Show Notes/Links: linuxunplugged.com/265

The post Privacy Priorities| LINUX Unplugged 265 first appeared on Jupiter Broadcasting.

]]>
Dongs and Noodles | User Error 34 https://original.jupiterbroadcasting.net/119826/dongs-and-noodles-user-error-34/ Sat, 11 Nov 2017 18:25:41 +0000 https://original.jupiterbroadcasting.net/?p=119826 RSS Feeds: MP3 Feed | Video Feed | iTunes Feed Become a supporter on Patreon: Links Well-capitalized Seattle start-up seeks Unix developers – Google Groups Remember when Amazon only sold books? – LA Times Amazon CEO Jeff Bezos sold more than $1 billion worth of stock this week – The Verge Pranksters create fake Apple […]

The post Dongs and Noodles | User Error 34 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

MP3 Feed | Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

Links

The post Dongs and Noodles | User Error 34 first appeared on Jupiter Broadcasting.

]]>
Double Sided Tape | User Error 10 https://original.jupiterbroadcasting.net/115081/double-sided-tape-user-error-10/ Fri, 26 May 2017 17:44:04 +0000 https://original.jupiterbroadcasting.net/?p=115081 RSS Feeds: MP3 Feed | Video Feed | iTunes Feed Become a supporter on Patreon: — Links — StartPage Search Engine Bug 745032 – Mouse Tracking ‘Laggy’ on Wayland, and mouse movements cause frame drops in other OpenGL applications Wonder why your GNOME Shell feels jerky or stuttery? You may be a victim of this […]

The post Double Sided Tape | User Error 10 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

MP3 Feed | Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Links —



gnome-shell-perf-tool —perf-iters=3 —perf=core —replace > perf.txt 2<&1

Noah's SD Card Reader

X32 Rack Mount Mixer Running Linux

The post Double Sided Tape | User Error 10 first appeared on Jupiter Broadcasting.

]]>
Here’s the Thing | User Error 9 https://original.jupiterbroadcasting.net/114856/heres-the-thing-user-error-9/ Fri, 19 May 2017 15:09:21 +0000 https://original.jupiterbroadcasting.net/?p=114856 RSS Feeds: MP3 Feed | Video Feed | iTunes Feed Become a supporter on Patreon: — Links — On the 20th anniversary of its IPO, Amazon’s market cap stands at $459 billion. Walmart’s? $228 billion. https://t.co/i2RQI0TQ2Y pic.twitter.com/Vz4sp0GvhI — Recode (@Recode) May 15, 2017 Recode on Twitter: “On the 20th anniversary of its IPO, Amazon’s market […]

The post Here's the Thing | User Error 9 first appeared on Jupiter Broadcasting.

]]>

RSS Feeds:

MP3 Feed | Video Feed | iTunes Feed

Become a supporter on Patreon:

Patreon

— Links —

The post Here's the Thing | User Error 9 first appeared on Jupiter Broadcasting.

]]>
Double ROT-13 | TechSNAP 241 https://original.jupiterbroadcasting.net/90526/double-rot-13-techsnap-241/ Thu, 19 Nov 2015 16:45:11 +0000 https://original.jupiterbroadcasting.net/?p=90526 Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video […]

The post Double ROT-13 | TechSNAP 241 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Encryption & privacy took quite a beating this week in the wake of the Paris attacks. We come to its defense. Your ISP heard you like backdoors, so they put a backdoor in your backdoor, the story of the social RAT & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Foo

— Show Notes: —

The Paris Attacks Were An Intelligence Community Failure, Not An ‘Encryption’ Problem

  • Less than two months ago that Techdirt noted that, having lost the immediate battle for US legislation to backdoor encryption, those in the intelligence community knew they just needed to bide their time until the next big terrorist attack.
  • Here was the quote from Robert Litt — the top lawyer for the Office of the Director of National Intelligence from September:

“the legislative environment is very hostile today,” the intelligence community’s top lawyer, Robert S. Litt, said to colleagues in an August e-mail, which was obtained by The Post, “it could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement.”


Backdoor in cable modem, contains backdoor

  • Security researcher Bernardo Rodrigues was invited to give a talk at a security conference, and he decided to research the topic of Cable Modem security
  • Unlike talks from years ago, this wasn’t about how to get free cable internet, but instead about “the security of the cable modems, the technology used to manage them, how the data is protected and how the ISPs upgrade the firmwares. Spoiler Alert: everything’s really really bad.”
  • “While researching on the subject, I found a previously undisclosed backdoor on ARRIS cable modems, affecting many of their devices including TG862A, TG862G, DG860A. As of this writing, Shodan searches indicate that the backdoor affects over 600.000 externally accessible hosts and the vendor did not state whether it’s going to fix it yet.”
  • “ARRIS SOHO-grade cable modems contain an undocumented library (libarris_password.so) that acts as a backdoor, allowing privileged logins using a custom password”
  • ARRIS password of the day is a remote backdoor known since 2009. It uses a DES encoded seed (set by the ISP using the arrisCmDoc30AccessClientSeed MIB) to generate a daily backdoor password. The default seed is MPSJKMDHAI and guess what – many ISPs won’t bother changing it at all.”
  • “The backdoor account can be used to enable Telnet and SSH remotely via the hidden HTTP Administrative interface “https://192.168.100.1/cgi-bin/tech_support_cgi” or via custom SNMP MIBs”
  • “The default password for the SSH user ‘root’ is ‘arris’. When you access the telnet session or authenticate over SSH, the system spawns the ‘mini_cli’ shell asking for the backdoor password”
  • “Yes, they put a backdoor in the backdoor (Joel from Dlink is sure to be envy). The undocumented backdoor password is based on the last five digits from the modem’s serial number. You get a full busybox shell when you log on the Telnet/SSH session using these passwords.”
  • The researchers marketing solution for the vulnerability? A old fashion keygen complete with chiptunes and ascii art
  • The vulnerability was disclosed to CERT on 2015-09-13, and CERT has a 45 disclosure policy. The vendor has yet to correct the issue
  • Ohh, and it seems there are more backdoors

The Story of the Social RAT-in-the-Browser

  • A Remote Access Trojan (RAT) is a malicious malware that runs on your computer giving unlimited access to a cybercriminal who can then steal information or install other malicious software.
  • They are able to operate under the radar of traditional security measures because a RAT’s installation mechanism is usually attached to a legitimate program, allowing an intruder to do just about anything on the targeted computer including, access confidential information, such as credit card and social security numbers, activate a system’s video or webcam, distribute malware, or alter files.
  • RATs have been used by countries and hacktivists for many years, however recently, we’ve seen this remote access attack vector migrate to online banking fraud.
  • These specific RATs, termed RAT-in-the-Browser (RitB), give cybercriminals access to banking credentials and account information.
  • One of the reasons these Trojans have spread so rapidly is because banks often use traditional security measures such as device fingerprinting to validate a device’s reputation, assigning ‘risk’ to new or untrustworthy devices and assigning ‘trust’ to known user devices.
  • RitB sessions are, therefore, often successful since these detection tools won’t find anything unusual.
  • A Social RitB, adding another layer of complexity, as fraudsters are beginning to use social engineering to carry out remote access attacks. All a fraudster needs to do is convince a user to install a standard remote support tool on their computer — for example, Ammyy, UltraVNC, AeroAdmin, or RemotePC — and use it to perpetrate online banking fraud.
  • This type of banking fraud is simple for cybercriminals to carry out since it doesn’t require the technical knowhow needed to develop malware and is easy to infect users through various exploitation mechanisms.
  • Here’s how it works: a fraudster calls a user and convinces him or her that he or she is an employee of a reputable organization (i.e. an Internet service provider or bank), explains to the user that there is a security issue on his computer and then fools the user into downloading and installing a remote support tool (or gives the fraudster access to an existing tool already installed). The fraudster then convinces the user to login to his or her bank account for a quick ‘security check.’ And voilà, the attacker is in and can submit a fraudulent transaction. This is a relatively easy process for the criminal that requires far less technical know-how and monetary expenditure than a regular RitB attack.

Feedback:


Round-Up:


The post Double ROT-13 | TechSNAP 241 first appeared on Jupiter Broadcasting.

]]>