Sunday, October 18, 2015

For the money mysterious hackers black Apple Microsoft Facebook and Twitter

For the money, mysterious hackers black Apple, Microsoft, Facebook and Twitter

In February 2013, Twitter found that his company's hacker attacks on your network. And this attack is not like a novice, this is likely to be organized and planned. Just a few weeks later, Facebook, Apple, Microsoft and other companies also have been attacked. In the four attacks because when employees browse the iOS developers Web site, exposing a Java 0day vulnerability.

Recently, security companies have also announced a number of hacker crime cases. The hacker has two names, Morpho, and Wild Neutron, active from 2011, have almost black to a well-known companies in various fields, such as science and technology, pharmaceuticals, investment and health care classes, their tentacles even reach for a law firm involved in the merger. This underlying monitoring malicious software developers, its code will have become very mature, and his management controller is running silky smooth. These hackers seem to have spies in nature, they use internal information about the company to profit.

For the money?

Symantec researcher said in a report, "Morpho is a trained attack hacker organization efficiency is high, had began to perk up in March 2012. "They were shouyantongtian, using at least one or two 0day were to launch an attack. Motivation may be income, and from the three years of operation, might be fruitful. "

https://www.youtube.com/watch?v=Y0KoC5Xf0Co

Researchers at Kaspersky Labs also issued their independent report on the matter. Starting in 2011 the organization begin to attack, and in addition to Java vulnerability, they also started to use ASUS digital certificate vulnerability to get system login password. They also have been found, using unknown Flash Player vulnerabilities, which means they have the new 0day vulnerability.

"Through the character of these attacks, we can see that they do not belong to the State-sponsored hacking" Kaspersky Lab researcher said. "But such a skillful use of loopholes, and multi-platform malware, makes us feel the Organization's motives are huge rewards. "

Moschino iPad Case

For the money, mysterious hackers black Apple, Microsoft, Facebook and Twitter

Two weeks ago, Reuters has reported United States securities regulators are investigating a group suspected of attacking account, access to transaction data for hackers. Kaspersky and Symantec subsequently released a security report. Regulatory investigators have about at least eight companies, to confirm that their data had been attacked, even how hackers get passwords is also part of the investigation. Moschino iPad Case

According to the Symantec report, at least 49 companies were affected by the Organization's malicious software infection. Remember in 2013-infected Twitter Pintsized OS x malware and other companies do? It creates a back door, let the infected computer and control the server secret contacts. In this way, company email, documents and other confidential information are at your fingertips. Since then, hackers and Goo on the Windows platform.

Physical security systems have also been eyeing

In more than one case, hackers use malicious software to wantonly attack physical security information management system, which is gathering the entire physical security systems, software of management and monitoring services.

Symantec researcher said, "physical security systems including video surveillance, access control systems, air conditioning systems and other building security installations. "Break the system, hackers can use the company's video surveillance to monitor and track the activities of every employee.

These recent what's effective control of infected computers, it is not clear. Mentioned at the beginning of 2012, however that attack, was carried out through a trap in the iPhone Developer Forum iphonedevsdk.com, but later research has no such means. Hackers also was careful not to duplicate using the login control system domain name email and use coins to pay for hosting. They even use encrypted virtual machine, build multiple control network to fight the investigation. Moschino iPad Case

However, these well-written code proved the existence of this mysterious group, one person can finish the job.

"Compared with other hackers, Wild Neutron is the most elusive we've ever seen. "Researchers at Kaspersky Labs said.

For the money, mysterious hackers black Apple, Microsoft, Facebook and Twitter

33 votes

Kisslink wireless router

Kisslink App provides only a very limited set of options, for example, was only open in the Wi-Fi settings to change Wi-Fi name, encryption and whether broadcast options, like traffic monitoring, bandwidth allocation and port mappings commonly used functionality is provided, such as home routers, it is unacceptable for me.

View details of the voting >>

No comments:

Post a Comment