Russian Hackers are spreading the Kelihos Trojan leading victims into believing that it is a software to hit Western Governments.
Kelihos botnet is still active and exploited by the cybercrime ecosystem to monetize its effort as discovered by security experts at Bitdefender. Cyber criminals have a single purpose, to earn money by any means, for this reason it is not surprising that Russian hackers are riding the interest on the conflict in Ukraine to serve malware via links found in spam emails purporting to support the Russian cause.
To get the jet repaired and back into the fleet as quickly as possible, technicians on the Bataan and designers at Fleet Readiness Center East (FRCE) at Marine Corps Air Station in Cherry Point, North Carolina 3D printed specialty forming tools to aid in the replacement of the jet’s damaged part. First, FRCE aerospace engineer, Doug Greenwood, worked with a team aboard the Bataan to remove the Harrier’s nose cone to assess the situation inside. Greenwood explains, “The hard landing damaged a portion of one of the structural frames in the nose cone.”
The family of file-encrypting ransomware known as CryptoWall is proliferating quickly, with more than $1 million paid in ransoms to date. Though it became well-known in the first quarter of 2014, researchers believe that the malware is now accelerating to become the largest and most destructive ransomware threat on the internet.
PhishLabs has observed a new wave of “Man-in-the-Middle” (MitM) attacks targeting users of online banking and social media. Customers of more than 70 different financial institutions are being targeted.
August marks two years of regular meetings in Northern Colorado!
April 2014 Meeting
7:00pm to 9:00pm
6 people attended (0 first timers)
DC303 field trip to Denver planned
-Default AES vs double or triple bagging it (AES+TwoFish…)
IT (Admin and Security) Certifications
-Comparing reimbursement policies for various employer
SteamOS, Steam Streaming to lower powered computers
Using VMware ESXi 5 to run a virtual gaming machine using SteamOS, streaming
WPA2 hacking process
Full Disk Encryption options
The old fingerprint login software for Windows that stored the username/password in the registry with 56-bit encryption
Lotus Notes(R) sucks
Domain controller event logs, password lockout
-Potential lulz by intentionally locking out coworkers
-Big lulz by intentionally locking out service accounts
PowerShell scripting games
Minecraft server mod – Client/server/floppy modules
Rust, 7 Days to Die on Steam
PvP glitches, MMO hacks
Another successful meeting…
March 2014 Meeting
7:00pm to 9:15pm
7 people attended (0 first timers)
I didn’t take any notes, but from memory…
- Recent events involving people reporting on vulnerable systems being held liable for criminal charges
- PhutureCon in Denver (http://phuturecon.com/) participation by this group
- Nostalgia gaming (NES) on emulators with USB controllers
- Advanced home networking
- Anti-virus recommendations
- Anti-malware recommendations