Capital One Financial Corp latest victim of Cyber Attack

Capital One Financial Corp. said it’s the latest target in a new round of coordinated cyber attacks aimed at disrupting the websites of major U.S. banks, and SunTrust Banks Inc. and Regions Financial Corp. said they expect to be next.

The so-called “Izz ad-Din al-Qassam Cyber Fighters” posted a specific timetable for its attack program on PasteBin.com, a website commonly used by hackers to brag about exploits. Izz ad-Din al-Qassam also threatened to pursue more cyber attacks next week and has long said it will not stop until the video is removed from the Internet.
American banks will reportedly face a massive cyberattack in coming weeks. A Russian-speaking hacker is organizing a massive trojan attack based around fraudulent wire transfers–and American banks appear to be at the center of the raid.
In the past, such attacks have sometimes caused websites to slow to a crawl or become inaccessible for some users; however, the impact cannot be gauged in advance. The same group has taken credit for attacks on Bank of America , J.P. Morgan Chase and the NYSE Euronext  in recent weeks.
Security professionals investigating the recent cyber attacks against the U.S. financial sector said last week that they discovered the tools at the heart of the attacks are more complex than previously thought and that a variant of the malware has been found in labs in Saudi Arabia. It’s not clear whether this means the malware used against U.S. banks came from Saudi Arabia or just ended up there coincidentally.


Original news article at https://thehackernews.com/ on October 10, 2012 at 02:38AM

Splitting passwords up to increase security

Splitting passwords up could be the next big thing next to 2-factor authentication schemes which companies such as Google, Facebook or PayPal have offered as an opt-in service to their users. The two solutions use different angles to improve the protection of user account data from attackers. Where 2-factor authentication is entirely the user’s responsibility, splitting up passwords is entirely dependent on the webmaster and company running the server.

The idea itself is simple: instead of saving passwords in a single location, they are split up and saved in multiple locations. Attackers who attack the server infrastructure of a company therefore need to get into multiple servers instead of just one, and since it is possible to protect the servers in different ways, for instance by using different operating systems, firewalls, security scripts and personal, it reduces the possibility of a potential breach. The technique also protects the data from inside jobs, for instance when an admin downloads data from a database.

A new software by RSA brings the technology later this year on the market. RSA’s approach is the following. Passwords are broken into pieces during account creation, and then randomly saved to different servers. When a user logs in, the supplied password is split into encrypted strings, which are then sent to the password servers. The password is split into as many pieces as there are password servers, and one part of the string is randomly sent to each password server.

The user string is then combined with the stored password piece, and all the newly created strings are then compared to determine whether the password is correct or not. RSI claims that it is mathematically impossible to determine the password from an individual string or all strings combined.

1)      Before it is stored, the password is transformed with a random number. The random number is stored in one server (“red” server) and the transformed password in a different server (“blue” server). Compromising one server is not sufficient to compromise the password.

2)      At regular time intervals, a new random number is generated and both servers are updated with the new random number value, adding a time-based layer of protection:  Both servers must be compromised at the same time for the password to be compromised.

3)      When an application needs to verify a password, the claimed password transformed with a new random number is sent to the “blue” server while the random number is sent to the “red” server. Each server can execute a new transformation involving the stored data and validate whether the claimed password matches the stored password without exposing the legitimate password

RSA calls the approach distributed credential protection, which is a version of long known technique called threshold cryptography. What is new is that the technology will be made available to the general public.

Using multiple servers may be problematic from an availability point of view unless parts of the password are supplied to more servers than necessary so that fallback servers are available when a server goes down.

You can read about the announcement on the official RSA blog.


Original news article at https://www.ghacks.net on October 10, 2012 at 06:29PM

Point-Of-Sale Hackers Plead Guilty To Scheme, Face Prison Time

Two hackers who took part in a hacking scheme that involved more than 146,000 compromised cards leading to more than $10 million in losses, pleaded guilty today in a New Hampshire court. One agreed to spend seven years behind bars, while the other agreed to spend 21-months locked up.

Iulian Dolan and Cezar Butu, both Romanian nationals, admitted that between 2009 and 2011, they cooperated with co-conspirator Adrian-Tiberiu Oprea, who is awaiting trial after being extradited to the U.S.  in May, to hack into hundreds of U.S.-based point of sale (POS) systems to steal credit and debit card numbers and then use the stolen payment card data to make unauthorized charges or sell the stolen card data to others who would do the same.

Click for complete article >>


Written by: jpeterson at https://www.teamshatter.com/topics/database-security/point-of-sale-hackers-plead-guilty-to-scheme-face-prison-time/

Massachusetts Eye And Ear Associates Inc. To Pay $1.5 Million For Potential Violations Of The HIPAA Security Rule

Another HIPAA data breach settlement has been reached, this time with the Massachusetts Eye and Ear Infirmary and Massachusetts Eye and Ear Associates Inc. (MEEI), which will pay $1.5 million to the Department of Health and Human Services (HHS) for potential violations of the HIPAA Security Rule.

HHS officials announced Monday that the settlement also requires MEEI to take corrective action to improve policies and procedures to safeguard the privacy and security of its patients’ protected health information.

Click for complete article >>


Written by: jpeterson at https://www.teamshatter.com/topics/compliance/hipaa/massachusetts-eye-and-ear-associates-inc-to-pay-1-5-million-for-potential-violations-of-the-hipaa-security-rule/

BMW Cars Vulnerable To Blank Key Attack

Techmeology writes “Thieves have discovered how to steal BMW cars produced since 2006 by using the onboard computer that is able to program blank keys. The device used — originally intended for use by garages — is able to reprogram the key to start the engine in around three minutes. The blank keys, and reprogramming devices, have made their way onto the black market and are available for purchase over the Internet.”


Share on Google+

Read more of this story at Slashdot.


Written by: timothy at https://tech.slashdot.org/story/12/09/13/142245/bmw-cars-vulnerable-to-blank-key-attack?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Reliance Net Connect website Defaced by Hackers

Reliance Net Connect , a venture of Reliance Communications , one of the leading CDMA & GSM Service providers in India website was Defaced by Hackers two days back. No reason mentioned by hackers but on deface page, Hackers wrote “Hacked by Dr-FreaK and Napsters Cr3w”.<!– adsense –>
Defaced site link – https://reliancenetconnect.co.in , but at the time of writing this post, site has been 


Written by: noreply@blogger.com (Mohit Kumar) at https://thehackernews.com/2012/09/reliance-net-connect-website-defaced-by.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Daily+Cyber+News+Updates%29