Official website of NASA defaced by Prosox

The website of CERES (Clouds and the Earth’s Radiant Energy System) of the National Aeronautics and Space Agency (NASA) was hacked approximately 9:00 p.m. last September 17, 2017. CERES is an organization under NASA which conducts experiments focused on the role of clouds and energy cycle in global climate change. The website, under the subdomain Read more…

 

BILLIONS OF DEVICES THREATENED BY NEW BLUETOOTH EXPLOIT BLUEBORNE

Now, researchers have devised an attack that uses the wireless technology to hack a wide range of devices, including those running Android, Linux, and Windows –by utilizing the most common feature included in modern devices, BLUETOOTH CONNECTIVITY, and using a Bluetooth exploit BlueBorne. Over the past decade, Bluetooth has become almost the default way for Read more…

 

UNITEDRAKE, A NEW LEAK FROM THE NSA HACKING TOOLS

The Shadow Brokers has newly released an NSA tool called UNITEDRAKE. The said implant is a fully extensible remote collection system that comes with a number of plug-ins, enabling attackers to remotely take full control over targeted Windows computers. Last 2013, a group of hackers known as the SHADOW BROKERS stole disks full of National Read more…

 

LOCKY RANSOMWARE RETURNS WITH A MORE POWERFUL SCHEME

The Locky Ransomware returns, for the second time, infecting computers with an innovative yet effective phishing scheme. Previously, a ransomware known as Locky had made chaos across the world in 2016, and devastated a great number of computers worldwide. On August 2017, said ransomware made its way back into cyberspace using the Diablo6 variant, and Read more…

 

A NOT-SO-ROYAL RANSOMWARE, “PRINCESS” RANSOMWARE EMERGED WITH A NEWER VERSION

Researchers have discovered that last year’s (2016) ransomware have crawled its way again to the cyber-world – PrincessLocker Ransomware. The PrincessLocker Ransomware was first discovered on September 2016 as a light-threat ransomware. It was first discovered on darkweb forums. Princess Locker encrypts a victim’s data and then demands a large ransom amount of 3 bitcoins, Read more…

 

Wikileaks Website hackers Ourmine Website Defaced by Turkish Hackers

A group of Turkish Hackers dubbed as JRB Ops successfully defaced a page on the sub domain of the official website of Ourmine hacking group. The users visiting the domain are being greeted with a custom webpage with black background with title “Jonturk75 & RootDevilz & Bozkurt97” with a message “When a hacker group gets hacked by an other group, the hacked one will been lamer for the one who hack em.” followed by “What if one when get hacked?” Ourmine’s subdomain appears to be defaced only, while homepage “ourmine.org” appears to be working fine. It’s hard to tell if their server’s got compromised or is their subdomain hosted on a different server that got hacked by the said hackers. On the other hand, Ourmine is a nototious hacking group recently hacked the official website of the non-profit whistle blower wikileaks website last Auguts 31, 2017 for vengeful intent. At the time of writing and publishing this article, the website’s subdomain remained defaced and in case it got fixed, Hackers created a defaced mirror, so the users may check mirror at Zone-H. This article will be updated upon receiving new information about the hack.  

 

OURMINE HACKERS HAVE FINALLY PAID BACK THEIR VENGEANCE TO WIKILEAKS

WikiLeaks is an international non-profit organization that publishes secret information, and has consecutively released different hacking tools categorized as the Vault 7 leak. The Vault 7 leaks continue to flow fast, giving more empasis on the hacking and infiltration capabilities of the CIA. All of their releases of the Vault 8 were briefly detailed and published, along with Read more…

 

Wifi Pineapple Alternative – FruityWifi

FruityWifi is an open source tool to audit / intercept wireless networks alternative to Wifi Pineapple. It allows the user to deploy advanced attacks by directly using the web interface or by sending messages to it. Initially the application was created to be used with the Raspberry-Pi, but it can be installed on any Debian Read more…

 

Pseudo-Terminal with Python

This tutorial will introduce some very quick Python “Manny Cuevas” Kung Fu to fix a raw shell. To fully understand the awesomeness of this little trick, you need to understand some of the challenges with a raw shell. A raw shell is a command shell (cmd.exe, /bin/sh) bound to a network socket and either thrown Read more…

 

Reverse shell written in Python

This blog post will demonstrate how you can leverage Python to create a reverse shell.  First we will show how to leverage the web server functionality to move files from one host to another.  Say for example you have a raw shell on a potential victim and want to pull over a Python reverse shell(or Read more…