Tag Archive for: shutdown

LeakedSource’s shutdown is a blow to amateur hackers

Amateur hackers are alarmed with the apparent demise of LeakedSource, a controversial breach notification site that’s been accused of doing more harm than good.

U.S. law enforcement has allegedly confiscated its servers, and now some hackers are wondering if customers of LeakedSource might be next.  

“All the people who used PayPal, credit card, etc. to buy membership, the FBI now have your email, payment details and lookup history,” wrote one user on HackForums.net.

To read this article in full or to leave a comment, please click here

Network World Security

Concerns new Tor weakness is being exploited prompt dark market shutdown

A dark market website that relies on the Tor privacy network to keep its operators anonymous is temporarily shutting down amid concerns attackers are exploiting a newly reported weakness that can identify server locations.

As Ars reported last month, the technique requires the adversary to control the Tor entry point for the server hosting the hidden service. It also requires the attacker to have previously collected unique network characteristics that can serve as a fingerprint for that particular service. Still, once that bar is met, the attack has an 88-percent accuracy rate. Hidden services are sites that are accessible only from within the Tor, which conceals IP addresses of servers and users.

“We have recently been discovering suspicious activity around our servers which led us to believe that some of the attacks described in the research could be going on and we decided to move servers once again,” operators of Agora, a hidden service that markets everything from illicit drugs to unlicensed firearms, wrote in various online forums, including this post on Pastebin. “However, this is only a temporary solution.”

Read 2 remaining paragraphs | Comments


Ars Technica » Technology Lab

LightCyber upgrades to speed the shutdown of malicious activity

LightCyber is upgrading its endpoint detection and remediation platform so when it discovers bad behavior on the network it can also identify the machine and exact process that’s causing it, then shut the malware down.

LightCyber Magna 3.0 makes an important step in the evolution of endpoint security in that network behavior can by synched with endpoint telemetry to definitively say what’s behind the problem, says Lawrence Pingree, an analyst with Gartner. The big upside is that it saves time nailing down the cause and shutting down the exploit, which minimizes the damage, he says.

The company calls this new technology Network-to-Process Association (N2PA). Before, when the platform found bad behavior, security pros had to track down the cause of it manually, which isn’t 100% effective. “A human may not connect the dots,” Pingree says.

To read this article in full or to leave a comment, please click here

Network World Tim Greene