One in four US hackers ‘is an FBI informer’

Comments Off on One in four US hackers ‘is an FBI informer’

By Ed Pilkington
Guardian.co.uk

The underground world of computer hackers has been so thoroughly infiltrated in the US by the FBI and secret service that it is now riddled with paranoia and mistrust, with an estimated one in four hackers secretly informing on their peers, a Guardian investigation has established.

Cyber policing units have had such success in forcing online criminals to co-operate with their investigations through the threat of long prison sentences that they have managed to create an army of informants deep inside the hacking community.

In some cases, popular illegal forums used by cyber criminals as marketplaces for stolen identities and credit card numbers have been run by hacker turncoats acting as FBI moles. In others, undercover FBI agents posing as “carders” – hackers specialising in ID theft – have themselves taken over the management of crime forums, using the intelligence gathered to put dozens of people behind bars.

So ubiquitous has the FBI informant network become that Eric Corley, who publishes the hacker quarterly, 2600, has estimated that 25% of hackers in the US may have been recruited by the federal authorities to be their eyes and ears. “Owing to the harsh penalties involved and the relative inexperience with the law that many hackers have, they are rather susceptible to intimidation,” Corley told the Guardian.

“It makes for very tense relationships,” said John Young, who runs Cryptome, a website depository for secret documents along the lines of WikiLeaks. “There are dozens and dozens of hackers who have been shopped by people they thought they trusted.”

Click here to read more.. »

Posted on June 7th 2011 in Technology, Web Site

Malware for Smartphones

Comments Off on Malware for Smartphones

By Troy Gill
zdnet.com

Cyber crooks are infecting popular mobile platforms through malicious applications and, unfortunately, no mobile platform is immune from the destruction it can cause. According to McAfee’s report, Symbian remains the most targeted mobile platform, though vulnerabilities in both the Android and Apple IOS should not be overlooked.

Android’s open source software is something that gives the platform great appeal, but it is also the basis of its vulnerability. Users may enjoy the freedom to acquire apps both inside and outside the Android Market, but it doesn’t come without risk. The Android Market allows developers to upload apps without first running through an established screening process like one that you might find at Apple’s App Store or when using RIM’s application for BlackBerry. As a result, Google detected more than 50 malicious apps within the Android Market, downloaded to approximately 260,000 Android mobile devices. (Google later remedied the infections remotely via an auto installed software update.)

Click here to read more.. »

Posted on May 26th 2011 in Cell Phones, Internet, Security

FBI Hijacks ‘Coreflood’ Botnet, Sends Kill Signal

Comments Off on FBI Hijacks ‘Coreflood’ Botnet, Sends Kill Signal

By Kim Zetter
Wired.com

In an extraordinary intervention, the Justice Department has sought and won permission from a federal judge to seize control of a massive criminal botnet comprised of millions of private computers, and deliver a command to those computers to disable the malicious software.

The request, filed Tuesday under seal in the U.S. District Court in Connecticut, sought a temporary restraining order to allow the non-profit Internet Systems Consortium to swap out command-and-control servers that were communicating with machines infected with Coreflood — malicious software used by computer criminals to loot victims’ bank accounts.

According to the filing, ISC, under law enforcement supervision, planned to replace the servers with servers that it controlled, then collect the IP addresses of all infected machines communicating with the criminal servers, and send a remote “stop” command to infected machines to disable the Coreflood malware operating on them.

A Justice Department spokeswoman confirmed that the takeover occurred Tuesday evening, and the shutdown command was sent to infected computers based in the U.S.

“Under the authority granted by the court in the TRO, we have responded to requests from infected computers in the United States with a command that temporarily stops the malware from running on the infected computers,” wrote spokeswoman Laura Sweeney in an e-mail.

Click here to read more.. »

Posted on April 14th 2011 in Hacks, Security, Technology

BitTorrent Users Beware of Downloading Movies!

No Comments »

By David Kravets
wired.com

On March 7, Camelot Distribution Group, an obscure film company in Los Angeles, unveiled its latest and potentially most profitable release: a federal lawsuit against BitTorrent users who allegedly downloaded the company’s 2010 B-movie revenge flick Nude Nuns With Big Guns between January and March of this year. The single lawsuit targets 5,865 downloaders, making it theoretically worth as much as $879,750,000 — more money than the U.S. box-office gross for Avatar.

At the moment, the targets of the litigation are unknown, even to Camelot. The mass lawsuit lists the internet IP addresses of the downloaders (.pdf), and asks a federal judge to order ISPs around the country to dig into their records for each customer’s name.

Click here to read more.. »

Posted on April 1st 2011 in Entertainment, Internet, Movies, New to the Internet, Security