Tag Archive for: hard

This hard drive will self destruct. Data-wiping malware targets Europe

Enlarge (credit: William Warby)

Shamoon—the mysterious disk wiper that popped up out nowhere in 2012 and took out more than 35,000 computers in a Saudi Arabian-owned gas company before disappearing—is back. Its new, meaner design has been unleashed three time since November. What’s more, a new wiper developed in the same style as Shamoon has been discovered targeting a petroleum company in Europe, where wipers used in the Middle East have not previously been seen.

Researchers from Moscow-based antivirus provider Kaspersky Lab have dubbed the new wiper “StoneDrill.” They found it while they were researching the trio of Shamoon attacks, which occurred on two dates in November and one date in late January. The refurbished Shamoon 2.0 added new tools and techniques, including less reliance on outside command-and-control servers, a fully functional ransomware module, and new 32-bit and 64-bit components.

StoneDrill, meanwhile, features an impressive ability to evade detection by, among other things, forgoing the use of disk drivers during installation. To accomplish this, it injects a wiping module into the computer memory associated with the user’s preferred browser. StoneDrill also includes backdoor functions that are used for espionage purposes. Kaspersky researchers found four command-and-control panels that the attackers used to steal data from an unknown number of targets. Besides sharing code similarities with Shamoon, StoneDrill also reuses code used in an espionage campaign dubbed “NewsBeef,” which targeted organizations around the world.

Read 6 remaining paragraphs | Comments

Technology Lab – Ars Technica

Replace SHA-1. It’s not that hard.

Now that SHA-1 has been broken it’s time for enterprises that have ignored its potential weakness for years to finally act, and it’s not that hard.

The most common use of the hash function is in securing SSL and TLS connections, and to get rid of SHA-1 in that use is to utilize browsers and servers that don’t support it. Depending on the size of an organization, this isn’t onerous, says Paul Ducklin, a senior security advisor at Sophos. (See his excellent description of the problem with SHA-1 and other hashing algorithms.)

To read this article in full or to leave a comment, please click here

Network World Tim Greene

Ransomware Created for Smart Televisions Proved Hard Removing – SPAMfighter News (press release)

Ransomware Created for Smart Televisions Proved Hard Removing
SPAMfighter News (press release)
It has been a 365-day period for ransomware designed to attack Android smart televisions to navigate from the proof-of-concept state onto their in-the-wild assaults. The ultimate date was when one victim found the malware during the 2015 Christmas

android ransomware – read more

Macbook Tips, Hacks, Tricks; How To Turn Macbook Into An External Hard Drive

#MacBoookPro #Laptop – Macbook Tips, Hacks, Tricks; How To Turn Macbook Into An External … Target Disk Mode allows Apple computers to function like an external hard drive. Mac users may connect the mac to another Macbook to access the files in the …
mac hacker – read more