je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.


70,000 Memcached Servers Can Be Hacked Using Eight-Month-Old Flaws - 24 Červenec, 2017 - 14:35 Eight months after three critical vulnerabilities were fixed in the memcached open source caching software, there are over 70,000 caching servers directly exposed on the internet that have yet to be patched. Hackers could execute malicious code on them or steal potentially sensitive data from their caches, security researchers warn.
Kategorie: Hacking & Security

Glassdoor pushes back against moves to identify anonymous reviewers

Sophos Naked Security - 24 Červenec, 2017 - 14:06
Would you contribute to sites like Glassdoor if law enforcement could demand that the company turned over your ID details?

Sweden Accidentally Leaks Personal Details of Nearly All Citizens

The Hacker News - 24 Červenec, 2017 - 14:03
Another day, Another data breach! This time sensitive and personal data of millions of transporters in Sweden, along with the nation's military secrets, have been exposed, putting every individual's as well as national security at risk. Who exposed the sensitive data? The Swedish government itself. Swedish media is reporting of a massive data breach in the Swedish Transport Agency (
Kategorie: Hacking & Security

Your pacemaker could be put in the witness box against you

Sophos Naked Security - 24 Červenec, 2017 - 12:42
What happens when a wearable or embedded medical device tells a different story to someone suspected of a crime?

Writing Windows or Linux apps? Microsoft just launched a cloud-powered bug hunter to find the flaws - 24 Červenec, 2017 - 12:40 Microsoft has unveiled a new bug hunting tool, named Microsoft Security Risk Detection, that's built to help customers find and eliminate bugs before attackers can seize on them.
Kategorie: Hacking & Security

Spring Dragon – Updated Activity

Kaspersky Securelist - 24 Červenec, 2017 - 11:05

Spring Dragon is a long running APT actor that operates on a massive scale. The group has been running campaigns, mostly in countries and territories around the South China Sea, since as early as 2012. The main targets of Spring Dragon attacks are high profile governmental organizations and political parties, education institutions such as universities, as well as companies from the telecommunications sector.

In the beginning of 2017, Kaspersky Lab became aware of new activities by an APT actor we have been tracking for several years called Spring Dragon (also known as LotusBlossom).

Information about the new attacks arrived from a research partner in Taiwan and we decided to review the actor’s tools, techniques and activities.

Using Kaspersky Lab telemetry data we detected the malware in attacks against some high-profile organizations around the South China Sea.

Spring Dragon is known for spear phishing and watering hole techniques and some of its tools have previously been analyzed and reported on by security researchers, including Kaspersky Lab. We collected a large set (600+) of malware samples used in different attacks, with customized C2 addresses and campaign codes hardcoded in the malware samples.

Spring Dragon’s Toolset

The threat actor behind Spring Dragon APT has been developing and updating its range of tools throughout the years it has been operational. Its toolset consists of various backdoor modules with unique characteristics and functionalities.

The threat actor owns a large C2 infrastructure which comprises more than 200 unique IP addresses and C2 domains.

The large number of samples which we have managed to collect have customized configuration data, different sets of C2 addresses with new hardcoded campaign IDs, as well as customized configuration data for creating a service for malware on a victim’s system. This is designed to make detection more difficult.

All the backdoor modules in the APT’s toolset are capable of downloading more files onto the victim’s machine, uploading files to the attacker’s servers, and also executing any executable file or any command on the victim’s machine. These functionalities enable the attackers to undertake different malicious activities on the victim’s machine.

A detailed analysis of known malicious tools used by this threat actor is available for customers of Kaspersky Threat Intelligence Services.

Command and Control (C2) Infrastructure

The main modules in Spring Dragon attacks are backdoor files containing IP addresses and domain names of C2 servers. We collected and analyzed information from hundreds of C2 IP addresses and domain names used in different samples of Spring Dragon tools that have been compiled over the years.

In order to hide their real location, attackers have registered domain names and used IP addresses from different geographical locations. The chart below shows the distribution of servers based on geographical location which the attackers used as their C2 servers.

Distribution chart of C2 servers by country

More than 40% of all the C2 servers used for Spring Dragon’s operations are located in Hong Kong, which hints at the geographical region (Asia) of the attackers and/or their targets. The next most popular countries are the US, Germany, China and Japan.

Targets of the Attacks

As was mentioned, the Spring Dragon threat actor has been mainly targeting countries and territories around the South China Sea with a particular focus on Taiwan, Indonesia, Vietnam, the Philippines, Hong Kong, Malaysia and Thailand.

Our research shows that the main targets of the attacks are in the following sectors and industries:

  • High-profile governmental organizations
  • Political parties
  • Education institutions, including universities
  • Companies from the telecommunications sector

The following map shows the geographic distribution of attacks according to our telemetry, with the frequency of the attacks increasing from yellow to red.

Geographic map of attacks

Origin of the Attacks

The victims of this threat actor have always been mainly governmental organizations and political parties. These are known to be of most interest to state-supported groups.

The type of malicious tools the actor has implemented over time are mostly backdoor files capable of stealing files from victims’ systems, downloading and executing additional malware components as well as running system commands on victims’ machines. This suggests an intention to search and manually collect information (cyberespionage). This activity is most commonly associated with the interests of state-sponsored attackers.

As a routine analysis procedure, we decided to figure out the attacker’s possible time zone using the malware compilation timestamps from a large number of Spring Dragon samples. The following diagram shows the frequency of the timestamps during daytime hours. The timestamps range from early 2012 until now and are aligned to the GMT time zone.

Assuming the peak working hours of malware developers are the standard working day of 09:00-17:00, the chart shows that compilation took place in the GMT+8 time zone. It also suggests that either there is a second group working another shift in the same time zone or the attackers are cross-continental and there is another group, possibly in Europe. The uneven distribution of timestamps (low activity around 10am, 7-8pm UTC) suggests that the attackers didn’t change the timestamps to random or constant values and they might be real.

Histogram of malware files’ timestamps


Spring Dragon is one of many long-running APT campaigns by unknown Chinese-speaking actors. The number of malware samples which we managed to collect (over 600) for the group surpassed many others, and suggests an operation on a massive scale. It’s possible that this malware toolkit is offered in specialist public or private forums to any buyers, although, to date, we haven’t seen this.

We believe that Spring Dragon is going to continue resurfacing regularly in the Asian region and it is therefore worthwhile having good detection mechanisms (such as Yara rules and network IDS signatures) in place. We will continue to track this group going forward and, should the actor resurface, we will provide updates on its new modus operandi.

More information is available to Kaspersky Lab private report subscribers. Please contact


Below is the list of public references and reports related to the Spring Dragon attackers:

  1. Securelist –
  2. Palo Alto Networks –
  3. Palo Alto Networks IoC2 –
  4. Palo Alto Networks 2 –
  5. Palo Alto Networks Unit 42, full report –
  6. TrendMicro –
  7. TrendMicro –
  8. PwC –

Monday review – the hot 27 stories of the week

Sophos Naked Security - 24 Červenec, 2017 - 10:29
From ATM crooks upping the ante with infrared and Orpheus' Lyre, the Windows security hole to Google wants you to give up SMS, and more!

4 způsoby, jak na internetu surfovat anonymně - bezpečnost - 23 Červenec, 2017 - 19:00
** Anonymní režim v prohlížeči vám anonymitu nezaručí ** K dispozici je několik možností, jak skrýt svoji adresu i další identifikátory ** Nejúčinnější je stále Tor
Kategorie: Hacking & Security

THN Weekly Roundup — 10 Most Important Stories You Shouldn't Miss

The Hacker News - 22 Červenec, 2017 - 20:40
Here we are with our weekly roundup, briefing this week's top cyber security threats, incidents and challenges. This week has been very short with big news from shutting down of two of the largest Dark Web marketplaces and theft of millions of dollars in the popular Ethereum cryptocurrency to the discovery of new Linux malware leveraging SambaCry exploit. We are here with the outline of this
Kategorie: Hacking & Security

Microsoft’s secret weapon in ongoing struggle against Fancy Bear? Trademark law

Ars Technica - 21 Červenec, 2017 - 20:55

Enlarge (credit: Harald Deischinger)

On Friday, representatives of the notorious hacking entity known as Fancy Bear failed to appear in a federal court in Virginia to defend themselves against a civil lawsuit brought by Microsoft.

As the Daily Beast first reported on Friday, Microsoft has been waging a quiet battle in court against the threat group, which is believed to be affiliated with the GRU, Russia's foreign intelligence agency. For now, the company has managed to seize control of 70 domain names, but it's going after many more.

The idea of the lawsuit, which was filed in August 2016, is to use various federal laws—including the Computer Fraud and Abuse Act (CFAA), the Electronic Communications Privacy Act (ECPA), and American trademark law—as a way to seize command-and-control domain names used by the group, which goes by various monikers, including APT28 and Strontium. Many of the domain names used by Fancy Bear contain Microsoft trademarks, like and hundreds of others.

Read 5 remaining paragraphs | Comments

Kategorie: Hacking & Security

Dark Web Users Suspect "Dream Market" Has Also Been Backdoored by Feds

The Hacker News - 21 Červenec, 2017 - 20:36
By now you might be aware of the took down of two of the largest online dark websites—AlphaBay and Hansa—in what's being called the largest-ever international operation against the dark web's black market conducted by the FBI, DEA (Drug Enforcement Agency) and Dutch National Police. But the interesting aspect of the takedown was that the federal authorities shut down AlphaBay, but took
Kategorie: Hacking & Security

Trickbot Malware Now Targets US Banks

Threatpost - 21 Červenec, 2017 - 19:50
Researchers with IBM and Flashpoint warn the Trickbot Trojan is growing more potent and now targeting U.S. banks.
Kategorie: Hacking & Security

Something for the weekend? How about an Apple patch for BroadPwn?

Sophos Naked Security - 21 Červenec, 2017 - 19:30
Apple's latest updates include a patch for the vulnerability that could have attacked your device's wireless hardware

Hit the road – with your insurer and lender keeping an eye on your driving

Sophos Naked Security - 21 Červenec, 2017 - 19:08
How would you feel about your insurer or your finance company having access to data about your driving and where you go?

Twitter says it’s cracking down on the abuse – but is it?

Sophos Naked Security - 21 Červenec, 2017 - 18:37
Twitter's moves to tackle abuse on the platform seem to be making their mark - but there's a way to go before everyone feels safe there

Motivation Mystery Behind WannaCry, ExPetr

Threatpost - 21 Červenec, 2017 - 18:31
A shift in APT tactics is emerging as characterized by the destructive ExPetr attacks hidden in ransomware, and WannaCry, which also failed to turn a profit.
Kategorie: Hacking & Security

WannaCry přiměl britskou vládu investovat 21 miliónů liber do zabezpečení zdravotnictví - bezpečnost - 21 Červenec, 2017 - 18:06
Ničivý útok ransomwaru WannaCry ochromil v květnu značnou část zdravotnických zařízení na britských ostrovech. Britská vláda bude proto investovat 21 miliónů liber (620 miliónů korun) do lepšího zabezpečení počítačových sítí zdravotnických zařízení Národní zdravotní služby (NHS).
Kategorie: Hacking & Security

Practical Android Phone Forensics

InfoSec Institute Resources - 21 Červenec, 2017 - 15:20

Introduction Today’s world is Android World. Almost 90% of devices are running on Android, and each one of us is using Android in some or the other way. There are various devices which run on Android, but Android is widely used on Smart Phones. Also, if you check the Global Smart Phone Market Share Android […]

The post Practical Android Phone Forensics appeared first on InfoSec Resources.

Kategorie: Hacking & Security

Watch out for the Android malware that snoops on your phone

Sophos Naked Security - 21 Červenec, 2017 - 14:58
GhostCtrl, being distributed by rogue versions designed to look like legitimate apps, can monitor what you do and lock up your device - beware!

Global police swoop shutters Hansa and AlphaBay dark web markets

Sophos Naked Security - 21 Červenec, 2017 - 13:20
Two key marketplaces for illegal drugs go dark as it's revealed that Dutch police secretly ran Hansa for a month during its investigation
Syndikovat obsah