Tor exit node in Russia spotted downloading malicious code. Users of the Tor network now have one more reason to be cautious when using the service to browse the Internet or to download executable code anonymously.
A security researcher uncovered a malicious Tor exit node in Russia being used by unknown attackers to insert malicious code into files being downloaded by Tor users. Tor administrators have since flagged the node as a BadExit, meaning that Tor clients now know to avoid using the server. Tor is a network that allows users to browse the web anonymously. It uses a series of encrypted connections to route data packets in such a manner as to hide the true IP address of the person using the service.Read more
The security firm of the USA has claimed that a sophisticated, Russia-based hacker group is spying on NATO and former Soviet member states, most likely on the orders of the Russian government.
Russian cyber espionage efforts have long been considered unrivaled in skill and scope, but the difficulty of identifying attacks and tracing them to an identifiable source has prevented cyber security investigators from pinning any activity directly on a single Russian entity. But evidence of a wide-ranging cyber espionage campaign is mounting. Earlier a group of Russian hackers with suspected government backing had used a previously unknown backdoor.Read more
Using Skype, Twitter and other western services harms the security of the country, says the head of Chechnya. Chechen leader Ramzan Kadyrov said that the spread of western communication services on the Internet harms national security.
Their use encourages the ongoing double standards west policy, Kadyrov said. He considers situation to be unacceptable in which the West controls Russian users, and Russia is far from the steering information. The main problem is lack of control. Kadyrov also offered to turn off the Internet, as a global network, in his opinion, interfere with the proper education of youth.Read more
A cyberespionage campaign believed to be based in Russia has been targeting government leaders and institutions for nearly five years, according to researchers with iSight Partners who have examined code used in the attacks.
The campaign, dubbed “Sandworm” is believed to have been running since 2009, and used a wide-reaching zero-day exploit uncovered by the researchers that affects nearly every version of the Windows operating system released since Windows Vista. The attackers also targeted attendees of this year’s GlobSec conference, a high-level national security gathering that attracts foreign ministers and other top leaders.Read more
Russian hackers were able to get access to the accounts of many users. Alexander Grebenshikov and Leo Loktionov, information security specialists told about the presence of a dangerous gap in the Yo messenger.
Experts said that if you update the account login application, the system sends a confirmation code to the mobile number by default, without making sure that it really belongs to the owner of the account. Information security experts explained that on the Yo Password Reset page, one may write any user‘s name and get a link to change the password, by using and entering your own phone number. Alexander Grebenshikov noticed this kind of vulnerability, while Leo Loktionov found a way with the help of which one may get account using the panel of service creators.Read more
The FBI is investigating an incident of data theft from JPMorgan Chase & Co. (JPM) that could potentially have been carried out by Russian hackers, Bloomberg reported Thursday, citing sources familiar with the situation.
“The way the Russians do it, to the extent we can see into the process, is they encourage certain targets,” James Lewis, the director of the Strategic Technologies program at the Center for Strategic and International Studies in Washington, was quoted as saying by Bloomberg. “The Russians typically keep open the options to do something more, and the question now is what would trigger that and what would our response be,” he added.Read more
Russia is to crack the Tor anonymity network out of high reward. According to British media reports, offering a reward of 3.9 million Russian rubles (about 680,000 yuan), hoping to find crack Tor anonymity network called the program.
The anonymous network hides the user's location and identity, let them through computers on the network to upload a lot of data, and the program is encrypted. Russia's Interior Ministry made this reward decision and said it was to 'ensure the country's defense and security.' This award rule only applies to the Russian people; the program submission deadline is August 13. Applicants need to pay 19.5 million rubles (about 34,000 yuan), to participate in competitions.Read more
Authors of "Confidential Index" research from the EMC Company told about number of Russians who are ready to open personal information for convenience. About 38 percent of Russians are ready to open the personal information for convenience of work on the Internet whereas in the world this indicator makes only 27 percent.
About it it is spoken in EMC corporation research. To medical institutions and medical insurance companies we are ready to entrust the personal information about 39 percent of Russians, to banking and other financial institutions ─ 42 percent. It is interesting that the world indicator of trust of personal information to medical institutions makes nearly 50 percent.Read more
Moscow-based Elcomsoft has developed a new version of Phone Password Breaker 3.0 program with access into iCloud without Apple ID and the password function.
But this feature is mostly intended for our law enforcement and forensic customers, as using a password-free entry into iCloud requires a binary authentication token that must be extracted from the suspect’s computer (OS X or Windows). But you’ll still need the suspect’s PC with iCloud Control Panel installed which has iCloud Control Panel installed. Moreover the user must’ve been logged in to iCloud Control Panel on that PC at the time the computer is seized. If the user logged out of the Panel, the authentication tokens are then deleted.Read more
A computer program made in Russia became the first in the history that managed to pass Turing test which was developed in 1950 in order to determine how machine‘s intelligence can imitate the human‘s one.
The program was created by Russian engineer Vladimir Veselov and Ukrainian Eugene Demchenko. A computer program has managed to convince judges it was a 13-year-old boy Eugene Goostman from Odessa. The Turing Test is based on 20th century mathematician and code-breaker Alan Turing's question and answer game set out in his 1950 paper ‘Computing Machinery and Intelligence’. During the tests the machine has to convince the person by means of correspondence that it is a person, instead of artificial intelligence.Read more