Vault 7 – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Sat, 11 Mar 2017 06:47:05 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Vault 7 – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Vault 7 Unlocked | Unfilter 228 https://original.jupiterbroadcasting.net/107436/vault-7-unlocked-unfilter-228/ Thu, 09 Mar 2017 02:42:38 +0000 https://original.jupiterbroadcasting.net/?p=107436 RSS Feeds: Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes Become an Unfilter supporter on Patreon: — Show Notes — Links Sessions met with top Russian official twice – CNNPolitics.com Obama administration reportedly raced to preserve intelligence on possible contact between Russians and Trump associates | Fox […]

The post Vault 7 Unlocked | Unfilter 228 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

Video Feed | MP3 Feed | OGG Feed | HD Torrent | Mobile Torrent | iTunes

Become an Unfilter supporter on Patreon:

Patreon

— Show Notes —

Links

The post Vault 7 Unlocked | Unfilter 228 first appeared on Jupiter Broadcasting.

]]>
Bad Boy Backups | TechSNAP 309 https://original.jupiterbroadcasting.net/107361/bad-boy-backups-techsnap-309/ Tue, 07 Mar 2017 21:42:43 +0000 https://original.jupiterbroadcasting.net/?p=107361 RSS Feeds: HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed Become a supporter on Patreon: Show Notes: Data from connected CloudPets teddy bears leaked and ransomed, exposing kids’ voice messages Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed Spiral […]

The post Bad Boy Backups | TechSNAP 309 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Data from connected CloudPets teddy bears leaked and ransomed, exposing kids’ voice messages

  • Extortionists Wipe Thousands of Databases, Victims Who Pay Up Get Stiffed

  • Spiral Toys xCEO denies voice recordings stolen

  • CloudPets left their database exposed publicly to the web without so much as a password to protect it.

  • There are references to almost 2.2 million voice recordings of parents and their children exposed by databases that should never have contained production data.

  • CloudPets has absolutely no password strength rules

  • The CloudPets Twitter account has also been dormant since July last year so combined with the complete lack of response to all communications, it looks like operations have well and truly been shuttered.

Spammers expose their entire operation through bad backups

  • Today we release details on the inner workings of a massive, illegal spam operation. The situation presents a tangible threat to online privacy and security as it involves a database of 1.4 billion email accounts combined with real names, user IP addresses, and often physical address. Chances are that you, or at least someone you know, is affected. Spammergate: The Fall of an Empire

  • The data from this well-known, but slippery spamming operation, was discovered by Chris Vickery, a security researcher for MacKeeper and shared with Salted Hash, Spamhaus, as well as relevant law enforcement agencies.

  • Vickery also discovered thousands of warm-up email accounts used by RCM to skirt anti-spam measures

  • RCM’s data breach also exposed 2,199 IP addresses used for public-faced activities; as well as the group’s internal assets. This is in addition to the 60 IP blocks RCM has identified for activities in the past, as well as current and future operations; and the 140 active DNS servers that are rotated frequently.

  • Based on campaign logging documents, the data breach also exposed more than 300 active MX records. In just two spreadsheets alone, RCM recorded nearly 100,000 domains used for their campaigns.

  • If an offer doesn’t inbox (meaning it is rejected, or otherwise dumped into a spam or junk folder), or a given domain is blacklisted, RCM goes back to a list of thousands of domains and selects another to restart the process.


Feedback


Round Up:


The post Bad Boy Backups | TechSNAP 309 first appeared on Jupiter Broadcasting.

]]>
CIA’s Dank Trojans | LINUX Unplugged 187 https://original.jupiterbroadcasting.net/107336/cias-dank-trojans-lup-187/ Tue, 07 Mar 2017 20:10:58 +0000 https://original.jupiterbroadcasting.net/?p=107336 RSS Feeds: MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed Become a supporter on Patreon: Show Notes: Follow Up / Catch Up GNU founder Richard Stallman's famous quote resonates with today's @WikiLeaks publication on the CIA's #Vault7 https://t.co/h5wzfrReyy pic.twitter.com/aPk2CK2DbN — WikiLeaks (@wikileaks) March 7, 2017 […]

The post CIA's Dank Trojans | LINUX Unplugged 187 first appeared on Jupiter Broadcasting.

]]>
RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed | WebM Torrent Feed

Become a supporter on Patreon:

Patreon

Show Notes:

Follow Up / Catch Up

Vault7 – HIVE Targets Linux

The CIA has developed automated multi-platform malware attack and control
systems covering Windows, Mac OS X, Solaris, Linux and more, such
as EDB’s “HIVE” and the related “Cutthroat” and “Swindle” tools, which are
_described in the examples section below
._

HIVE

HIVE is a multi-platform CIA malware suite and its associated control
software. The project provides customizable implants for Windows, Solaris,
MikroTik (used in internet routers) and Linux platforms and a Listening
Post (LP)/Command and Control (C2) infrastructure to communicate with
these implants.

The implants are configured to communicate via HTTPS with the webserver of a
cover domain; each operation utilizing these implants has a separate cover
domain and the infrastructure can handle any number of cover domains.

Each cover domain resolves to an IP address that is located at a commercial
VPS (Virtual Private Server) provider. The public-facing server forwards all
incoming traffic via a VPN to a ‘Blot’ server that handles actual connection
requests from clients. It is setup for optional SSL client authentication: if
a client sends a valid client certificate (only implants can do that), the
connection is forwarded to the ‘Honeycomb’ toolserver that communicates with
the implant; if a valid certificate is missing (which is the case if someone
tries to open the cover domain website by accident), the traffic is forwarded
to a cover server that delivers an unsuspicious looking website.

The Honeycomb toolserver receives exfiltrated information from the implant; an
operator can also task the implant to execute jobs on the target computer, so
the toolserver acts as a C2 (command and control) server for the implant.

Similar functionality (though limited to Windows) is provided by the RickBobby
project.

See the classified user and
developer guides for HIVE.

What time period is covered?

The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).

WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.

What is “Vault 7”

“Vault 7” is a substantial collection of material about CIA activities obtained by WikiLeaks.

When was each part of “Vault 7” obtained?

Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.

Setting Up a Linux Build Environment for EFI

This page will walk you through building a build environment for a Linux machine. Specifically, this tutorial is focused on Ubuntu/Linux Mint.


Linux Academy

“Linux Sucks… For the Last Time” – 2017

“Linux Sucks”. 2017 edition. The very last “Linux Sucks”. Ever. Recorded live at the Southern California Linux Expo (SCaLE) on March 2nd, 2017.

The Story of Firefox OS

Well, I’m Ben and I’m a Mozillian. I’m a Software Engineer who worked on the “Boot to Gecko” project full time for five years and I have a story to tell.

The Endless Mission One is a gorgeous Linux-powered desktop with a tempting price tag

But the Endless Mission One, which is the subject of this review, is significantly more expensive, costing $250. It also packs more capable hardware, and a gorgeous wood finish that wouldn’t look out of place in a home office. P

OggCamp 17 – Aug 19th & 20th 2017 | Canterbury, UK

OggCamp is a Free Culture Unconference.

TING

Gnome and Endless at SCaLE 15x

View post on imgur.com

The Endless Mission One comes in two variants — one with 320GB of storage, and one with 500GB. I reviewed the latter.

For many users, GNOME 3, also known as Gnome Shell, is the definitive desktop interface. It’s clean and simple, without too many twinkles or distractions. That said, this article describes some tricks to change the GNOME notifications experience.

DigitalOcean

Litebook is a $249 Linux laptop – Liliputing

You can order the 2.9 laptop from the Litebook website. A model with a 512GB hard drive is priced at $249. Or you can pay $20 more for a version with a 32GB mSATA solid state disk and a 512GB hard drive.

k. Litebooks are the perfect combination of beautiful hardware and software. Fast and intuitive the Litebook offers a computing experience like no other. Unlike Windows laptops, Litebooks are highly optimized, come without performance hogging bloatware, are designed to ensure your privacy, and are entirely free of malware and viruses, while unlike macs Litebooks are affordable, customizable, and are backwards compatible with windows software.

The post CIA's Dank Trojans | LINUX Unplugged 187 first appeared on Jupiter Broadcasting.

]]>