BlackBox (Security) Archiv – Telegram
BlackBox (Security) Archiv
4.16K subscribers
183 photos
393 videos
167 files
2.67K links
👉🏼 Latest viruses and malware threats
👉🏼 Latest patches, tips and tricks
👉🏼 Threats to security/privacy/democracy on the Internet

👉🏼 Find us on Matrix: https://matrix.to/#/!wNywwUkYshTVAFCAzw:matrix.org
Download Telegram
Tür und Tor stehen offen – wortwörtlich

Auch im echten Leben agieren Social Engineers. Und hier erinnern die Methoden endgültig an Cyber-Thriller. Beispiel USB-Drop: Auf einem Parkplatz werden USB-Sticks auf den Boden geworfen (oft weiß der Engineer, wer wo geparkt hat). Der Finder steckt den Stick in den Rechner – ob um herauszufinden, wem er gehört oder aus simpler Neugier. Und schon kann Schadsoftware installiert werden.

Social Engineers nutzen also nicht immer das Netz oder den Telefonkontakt, sondern erledigen ihre Recherche in schlichter Detektivmanier: Das Opfer wird beschattet, das Facebook-Profil analysiert und Gewohnheiten ausspioniert. Oft auch im persönlichen Kontakt: Zufällig wird ein Gespräch begonnen und das Ziel ausgefragt. Dabei täuscht der Engineer eifrig Interesse vor. In vielen Fällen sind sie eloquent und empathisch und dem Opfer fällt gar nicht auf, was für empfindliche Geheimnisse es gerade preisgibt.

Manche gehen auch weiter und verschaffen sich Zugang zu Gebäuden. Schließt jemand gerade die Tür auf, läuft der Kriminelle hinterher; er habe seinen Schlüssel vergessen. Das Opfer lässt ihn rein– wird schon stimmen. Und die Konfrontation und die Frage, ob der Engineer überhaupt zum Unternehmen gehört, vermeidet er – den Weg des geringsten Widerstands gehen (zu) viele. Und selbst das Wühlen nach Informationen im Müll ist Social Engineers nicht zuwider.

💡Was tun gegen Social Engineering?

Die Gefahren sind zahlreich; aber was kann man gegen Social Engineering unternehmen? Die IT-Sicherheitslösungen können nur bedingt helfen, der Mensch muss geschützt werden.

💡Sicherheitsrichtlinien einführen und Mitarbeiter sensibilisieren

Mitarbeiter müssen gründlich über die Gefahren der Cyberkriminalität aufgeklärt werden. Jedes Unternehmen braucht Richtlinien: Wie kann man sich schützen, und was ist bei einer Sicherheitslücke zu tun? Am besten spricht man im Unternehmen auch über neueste Entwicklungen sowie Gefahren, und sorgt für regelmäßigen Schulungen, etwa in Form von Vorträgen. Ganz wichtig: Unternehmen sollten Mitarbeitern deutlich vermitteln, dass sie bei einem Verdacht Bescheid sagen und sich nicht schämen müssen.

💡Augen auf beim Posten

Klingt paranoid, aber: Je detaillierter man seinen Tagesablauf postet, desto angreifbarer macht man sich für Social Engineers. Beispiel: Jemand postet immer, wenn er in einem Café arbeitet. Ein Social Engineer kann dann irgendwann auch dort auftauchen. Und ein öffentliches WLAN ist gefährlich: Alle, die im selben WLAN angemeldet sind, können sich Zugriff auf die Rechner des anderen verschaffen.

💡… und bei Links in sozialen Medien

Dieses Beispiel sieht man in der eigenen Timeline recht häufig: Auf einmal preist jemand billige Sonnenbrillen an. Relativ einfach lassen sich Gewinnspiele oder Rabattaktionen gezielt an Personen mit bestimmten Interessen ausspielen. Wenn die dann klicken, müssen sie einer App Erlaubnis geben, auf ihr Profil zuzugreifen. Und wenn dann die genauen Bedingungen nicht durchgelesen werden, ist auf einmal der ganze Account übernommen.

💡Passwort-Lösungen

Um sich vor Account-Takeovern zu schützen, gibt es inzwischen technische Lösungen. Sie lassen sich auf Anmeldeformulare für Softwarelösungen setzen und erkennen, ob ein Passwort schon einmal verwendet wurde und verhindern, dass es erneut festgelegt wird. Dazu sollte man sich natürlich eine Lösung wie One-Password oder Keychain anschaffen, die verlässliche Passwörter generieren und abspeichern.

💡Software-Maßnahmen im Fall einer Attacke

Unternehmen brauchen Maßnahmen für und gegen Cyberattacken. Kommt es zur Attacke, sollten beispielsweise automatisch Daten vom Zielgerät gelöscht werden können, um sie zu schützen.

💡Nutzungsrechte einschränken

Zudem sollte genau überlegt werden, welcher Mitarbeiter welche Zugangsrechte bekommt. Braucht er wirklich Zugriff auf alle Verträge, Bankkonten oder Dokumente? So können Social-Engineering-Attacken abgeschwächt werden.
Fazit
Die große Gefahr im Social Engineering liegt darin, dass es von IT-Methoden zum großen Teil nicht verhindert werden kann. Es braucht einen bewussten Umgang mit Daten und Technologie. Es reicht nicht, nur regelmäßig Updates aufzuspielen – das Wissen der Mitarbeiter muss ebenso regelmäßig aufgefrischt werden.

Quelle und mehr Info (
🇩🇪)
https://t3n.de/news/social-engineering-mitarbeiter-1146954/

#SocialEngineering #Tipp #Sicherheit #Mitarbeiter
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
🇪🇸 IBM: uno de cada cinco ataques cibernéticos es en contra de instituciones financieras.

De acuerdo con un análisis publicado por IBM, la industria financiera es víctima de 19% de los ataques cibernéticos en todo el mundo. Esto significa que uno de cada cinco ataques a la confidencialidag, integridad y disponibilidad de la información se da en contra del sistema financiero.

En segundo lugar se encuentra la industria del transporte, con 13%, la cual incluye transporte aéreo, autobuses, ferrocarriles y transporte marítimo. Las empresas de servicios profesionales, figuran en el tercer lugar de la lista de las industrias que más reciben ataques cibernéticos, con 12%, mientras que las compañías de retail y manufactura tienen un 11%.

De acuerdo con el reporte de IBM, un tercio (29%) de los ataques analizados por la compañía están vinculados con compromisos a través de correos electrónicos de phishing, es decir que buscan engañar al usuario del correo para que dé clic en un enlace y así tener acceso a su computadora o incluso a la red.

"De estos, el 45% involucró estafas de compromiso de correo electrónico comercial (BEC), también conocidas como "fraude de CEO" o ataques de caza de ballenas. Cuando se trata de los tipos más lucrativos de estafas de ingeniería social, BEC ha sido una marea creciente durante varios años que abarca todas las industrias y geografías. Las estafas de BEC pretenden originarse en un propietario o CEO o un empleado de alto rango. Se envían a quienes controlan las cuentas bancarias de la empresa con instrucciones para realizar una transferencia bancaria confidencial", refiere el informe.

"Muchos de los ataques de phishing siguen siendo hacia correos corporativos, sí bien existe phishing contra correos personales, vemos un crecimiento importante de esta práctica a correos de empresas que además son muy sofisticados", dijo Carrillo.

IBM destacó en su reporte que casi un tercio (30%) de las vulnerabilidades documentadas por sus investigadores, que han sido divulgadas en las últimas tres décadas, han sido reportadas en los últimos tres años. Esto representa más de 42.000 vulnerabilidades que la mitad (50%) de los ataques registrados en el 2018 fueron ataques nunca antes vistos.

El análisis de IBM es el resultado de un monitoreo de datos a partir de 70.000 millones de eventos de seguridad por día en más de 130 países, junto con datos derivados de activos ajenos a sus clientes, como sensores de spam y redes. "Los investigadores de X-Force también ejecutan trampas de spam en todo el mundo y monitorean decenas de millones de ataques de spam y phishing a diario, analizando miles de millones de páginas web e imágenes para detectar actividades fraudulentas y abusos de marca para proteger a nuestros clientes", apuntó la compañía.

📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
rp-mobile-threat-report-2019.pdf
5.2 MB
The mobile platform is an increasing target for nation states to observe key individuals. Threat actors against mobile platforms are broader groups than those simply looking to boost ad revenues.

PDF: Mobile Malware Continues to Increase in Complexity and Scope McAfee Mobile Threat Report Q1, 2019
https://www.mcafee.com/enterprise/en-us/assets/reports/rp-mobile-threat-report-2019.pdf

#malware #backdoor #handy #android #threat #report
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
🇬🇧 How Brexit is changing the Internet

The outcome of the Brexit vote has left deep marks on British society. The decision is also likely to have lasting consequences for the Internet, as disinformation and manipulation of opinion are not confined to the offline world. The British parliament is now demanding consequences for Facebook & Co. - and could thus become a worldwide model for similar laws.

The UK will soon not only cut itself off from Europe and the rest of the world when the Brexit (perhaps) takes place in a few weeks' time. The island could also play a pioneering role in platform regulation, the British government says, following the far-reaching recommendations of a parliamentary committee. This could further isolate the country, which is not particularly critical of mass surveillance, pre-installed porn filters or State Trojans - or set an example for other countries, for better or for worse.

Parliament's demands are tough. They depict large parts of the current debate and show concrete ways in which democratic societies should deal with dominant social networks, algorithmic black boxes and manipulation by users or even entire ballots: Providers like Facebook could in future be held liable for "harmful content" posted by users; they should disclose their security mechanisms and algorithms to regulators; information derived from raw data should be protected as much as personal data; and overpowering IT corporations could even be smashed if they develop into a monopoly.

Powder Barrel Brexit

Out of nowhere these proposals presented last week do not come. In fact, they are inextricably linked to the very close outcome of the referendum on British withdrawal from the EU. This led to massive disinformation, dark money flows and intransparent roped parties, both off- and online - especially in the camp of Brexit supporters. Many therefore fundamentally doubt the legitimacy of the referendum result. In order to get to the bottom of these accusations, the British House of Commons finally set up its own commission.

For 18 months, members of the Committee on Digital Affairs, Culture, the Media and Sport had scrutinised the toxic ecosystem of disinformation, opinion manipulation, election influence and data misuse. The investigation got new explosive after the data scandal around Facebook and Cambridge Analytica became known. Sensational statements by whistleblower Christopher Wylie revealed questionable linkages between the EU exit campaign and data analysis companies, which ranged from Putin's Russia to Donald Trump's US presidential campaign. The result is a more than 100-page paper with tangible demands on Prime Minister Theresa May. In terms of content, it largely coincides with the interim report on which we reported in detail last summer.

Whether the conservative government will implement the proposals of the majority of the also conservative deputies is in the stars - if only because it is hopelessly overwhelmed by the approaching Brexit and this will probably remain so for the foreseeable future. And also because leading Brexit advocates such as Michael Gove or Stephen Parkinson now hold high government offices. Both played an important role in the "Vote Leave" campaign. This campaign had commissioned the Canadian data company AggregateIQ (AIQ) to address voters in a targeted manner using micro-targeting - with information about the respective people, extracted from Facebook and cast in profiles. Because all this was half to totally illegal, Facebook has now suspended the company opaquely associated with Cambridge-Analytica parent SCL Group. But the child had long since fallen into the well.
"Frontal attack on the Internet" lives on

However, at least a partial implementation of the committee's recommendations is not completely absurd, even if the British ex-vice premier Nick Clegg, an intimate expert on British domestic policy, has meanwhile been appointed chief lobbyist Facebooks. The Conservatives, for example, entered the last election with a manifesto that could be described as a "frontal attack on the Internet". In this manifesto, the ultimately victorious Tories demanded, among other things, that "harmful content" be swept off the net in order to make the United Kingdom the "safest place online". "Harmful content" can, of course, be anything from a nipple to a decapitation video.

The proposal to extend this deletion approach to "terrorist propaganda" on the Internet, for example, succeeded at the European level. The explosive draft regulation, which could noticeably restrict freedom of opinion and information on the Internet, is currently being negotiated by the EU Parliament - under the leadership of a conservative British man of all people.

Now it would be unfair to blame the UK alone for the EU bill. After all, the plan received energetic support from Germany and France. And it is precisely the relatively new legal regulations - the first attempts to make platforms compulsory - of these two countries that the parliamentary report refers to, namely the German Network Enforcement Act (NetzDG) and the French law against disinformation in election campaign times.

In particular, the NetzDG would have led providers such as Facebook not to leave it at lip service: "As a result of this law, one of six Facebook moderators now works in Germany," the report says. This is proof that such laws, combined with high fines for possible violations, would work.

Social networks are not "neutral" mediators

But at this point the British MEPs don't want to stop and demand that their government get down to business. Facebook, Twitter & Co. should no longer hide behind the pretence that they are merely neutral platforms to avoid liability. Instead, there needs to be a new category for such IT companies, somewhere between "platform" and "publisher". "This approach would ensure that tech companies take legal responsibility for harmful content posted by users," write MEPs.

In other words, platforms would have to filter, detect, evaluate and, if necessary, delete all content. Or mark them accordingly, e.g. for political advertising. A binding code of ethics and finally a legal regulation should enforce this, the MEPs demand.

In principle, these proposals are not wrong. At the very latest, since Facebook, Youtube & Co. have begun to algorithmically evaluate the content on their platforms, to treat it differently and to flush particularly exciting content upwards for the purpose of maximising profits, regardless of the truth or utility value, the fairy tale of the "neutral provider" can no longer be kept.

But as so often the devil is in the detail. Because a legal regulation must have a solid legal basis and not shift the responsibility for decisions that restrict fundamental rights onto the corporations themselves - even if the responsible politicians think they are asserting something else.

Deleting what is undesirable

Most of the criticism of the NetzDG and the planned EU anti-terrorism regulation revolves around the ever-increasing privatisation of law enforcement in the digital arena. Bypassing the democratic constitutional state, a parallel legal system is increasingly establishing itself based on private, constantly changing general terms and conditions, community directives or other commercially oriented regulations. What is also removed is not necessarily what is actually illegal, but what is undesirable on the respective platform.
Coupled with the fact that the modern digital public sphere and opinion-forming now takes place on only a handful of platforms - a market that tends to form monopolies - and that many politicians, against their better judgement, show their belief in technology, there is a threat of arbitrary restrictions on freedom of opinion and information. Calls for the regulation of social networks sound good, but often remain remarkably blurred when it comes to concrete implementation.

Damian Collins, chairman of the committee, referred the Guardian to the German and French approaches in order to get the algorithmically amplified problems of hate speech and disinformation under control. At the same time, however, Collins made it clear who he expected to come up with which solution: Social networks "could invest more to deal with [hate speech and disinformation] and proactively recognize these contents themselves," Collins said. A proposed solution that is also to be found in the EU's anti-terrorism regulation, but which places too much trust in automated filter systems supported by artificial intelligence.

Despite all the well-meaning declarations of intent, at the end of the day Facebook would decide for itself again. In their report, MEPs say: "Companies like Facebook should not be allowed to behave like 'digital gangsters' in the online world and to believe that they are above the law.

Source and more info at: https://netzpolitik.org/2019/wie-der-brexit-das-internet-veraendert/

#brexit #internet #eu #england #SocialNetworks #FreeSpeach #disinformation #responsibility #Netzpolitik
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Android without Google: Take back control! (Part 1)

1. android without data octopus

The article series "Your phone your data" from 2014 has played a major role in the success story of this blog. Many thousands of people wanted to learn how to get rid of Google and regain control of their Android device.

After now five years it is time for a new edition of the article series. Much has changed. Partly for the positive, partly also for the negative. Also the article series "Take back control!" requires a lot of patience and the willingness to say goodbye to one's own comfort - and of course also to the indoctrination of the manufacturers.

The ambitious goal of the article series "Take back control!" can be summarized in one sentence: You as a user should regain control over your Android device and your data. Step by step I will lead you towards this goal. Because it must finally be an end to proprietary apps and (Google) services that merely fool us into believing our independence and self-determination over our data.

2nd Google has long been evil

Directly after switching on our android we are asked to create a Google account or to link the already existing one with the device. We are pushed into the cloud and should not worry about our data, but rather trust the providers or Google "blindly". In return, so to speak, we receive a perfectly coordinated eco-system that can hardly be surpassed in terms of simplicity and convenience, but also in terms of perfidy.

Google's strategy of conquering the market with user-friendly products and services has therefore paid off. Success proves them right. But with this success story, the price paid by the actual users must always be borne in mind. They pay and pay with the data they "produce". However, they are not aware of this "paying with data" because they lack the transparency to see what is actually happening "behind their backs" when using smartphones.

Google is like a junkie, constantly on the lookout for new data sources that will allow the already accumulated data treasures to continue to grow. Google wants to know everything. In an interview with James Bennet, supervisory board chairman Eric Schmidt said:

"With your permission you give us more information about you, about your friends, and we can improve the quality of our searches. We don't need you to type at all. We know where you are. We know where you've been. We can more or less know what you're thinking about."

This remark, already made in 2010, is now more relevant than ever. Android and other Google products and services are perfectly interlocking gears that give the user an illusion of control over his data. Google relies on dark patterns or nudging to hide data protection settings, to mislead users or to prevent them from protecting their privacy with misleading formulations.

2.1 The bitter reality and small rays of hope

In 2019, the market dominance of Android is overwhelming. Over the past three years, Android's market share in the smartphone segment has continuously exceeded 85% - one could also say that Google's mobile operating system Android dominates the market like no other. Only iOS still plays a role and costs Android a few market shares.

The market dominance of Android is enormous and prevents almost every new development. It is therefore not surprising that alternative mobile operating systems like Sailfish OS or Ubuntu Touch are hardly noticed by the market and disappear from the market as fast as they have been introduced.

This market dominance of Google inevitably arouses the feeling of helplessness. Or, if we think further: without alternatives, helplessness would inevitably end in resignation. But there is hope. Over the last few years, various alternatives to Google services have emerged. Projects like the Nextcloud, OpenStreeMap, mailbox.org and others are not only a glimmer of hope, but offer a real way out of Google's ecosystem. If you would like to get to know them, we recommend the article "Bye Data Octopus: A Life Without Google".
In the following, we will deal specifically with Android and what alternatives and possibilities we have to free ourselves not only from Google's tentacles, but how we can achieve an overall self-determined handling of our data on the smartphone.

3 What we can achieve

Before we regain control of our android, a problem of the smartphone world should not go unmentioned: The lack of verifiability or transparency of proprietary hardware chips (e.g. basebands). Even if we only use open source software on a smartphone, the trustworthiness is directly influenced by the underlying hardware. However, this consideration leads too far in the context of the series of articles, since this is particularly relevant if a (state) secret service wants to gain access. But the combination of open source software and (semi-)open or proprietary hardware will at least protect us from the ubiquitous data krakens like Google and Co.

That's why I don't want to leave out the obligatory note and make it unmistakably clear: The project "Take back control!" does not protect against targeted surveillance by secret services or other organizations that have "targeted" you.

Regardless of these "restrictions", we want to achieve the following with our project:

Complete control over your own data
Independent and self-determined use of the device
The decoupling from the Google eco-system
The exit from the advertising machinery of the manufacturers
Protection against advertising profiling

Ultimately, our ambitious goal must be to regain dominion and control over our data - even if it always remains a "blind spot". As soon as you exchange data with other people, be it via e-mail or Messenger, there is simply no guarantee that the transmitted data will be treated sensitively by the recipient or that it will not end up in the Microsoft cloud immediately upon receipt, or that the contact data will be synchronized via a Google account.

Ultimately this means that even if you handle your data responsibly and only use services and software that keep you in control, you are always exposed to external influences. However, this should not diminish our goal, but make us aware that the protection of our own data sovereignty depends on various factors.

4. the components

Our ambitious goal of a "free Android" can only be achieved if we include all necessary components and combine them to a whole. Only the interaction as a "whole" allows us to regain our independence and data control. In my opinion, the following components are necessary for this:

Operating system:
The central software component of our Android is based on the free operating system LineageOS. This Android operating system variant is available for many smartphones, is constantly further developed by an active community and does not contain any Google apps. In the context of the article series "Take back control! I decided in advance for the BQ Aquaris X Pro. With this device I will describe the unlock process and the installation of LineageOS. Of course you can follow the article series even if you don't have a BQ Aquaris X (Pro).

App Store:
Many users only know the Google Play Store as a source for new apps. As an alternative we will use for our Projekt F-Droid, where only "free" and "open source" apps will be offered for download. If you want to get apps from the Google Play Store later, you can use alternatives like the Yalp Store.

Apps:
We will only use free and open source apps from F-Droid. The FOSS apps available there will be of particular benefit to critical users who value apps that do not require a tracker or deal sensitively with (fed) data.

Services:
We will only become independent of Google's ecosystem if we also say goodbye to Google on other levels or services. For example, alternative services for e-mails, Google Maps, etc. must be used.

Tools:
We get additional control over Android with tools like AFWall+, Magisk or XPrivacyLua - the latter is only necessary if you don't want to or can't do without apps from the Google Play Store.
Correct settings:
The installation of LineageOS alone is not enough. Only the activation of the device encryption and a sufficiently long unlock PIN will protect your data from physical attackers. In short: Also the settings of the system play a role, because also in LineageOS we encounter critical default settings.

Common sense:
Technology alone cannot protect you from Google's data collection frenzy. Common sense is also needed to make all the above components work.

⚠️ In the coming parts of the article series I will deal in detail with the components only briefly introduced here. You should be aware that switching to an alternative system (LineageOS) does not necessarily protect you from the unwanted outflow of sensitive data. It requires further adjustments and the correct use of the tools linked above. Please consider this, if you want to use tools like AFWall+ already before the detailed denoscription, in further parts of the article series.

5. conclusion

The road to more control over the Android device and your own data is rocky. It's often not easy to dare to break out of the Google eco-system by taking advantage of the convenience you've grown fond of and self-taught.

Whether the individual will ultimately succeed in regaining a (large) piece of informational self-determination depends solely on the individual's willingness to learn and take on personal responsibility. The inner pig will be your biggest enemy.

Soure and more infos / read in german (
🇩🇪
) at:
https://www.kuketz-blog.de/android-ohne-google-take-back-control-teil1/

#android #NoGoogle #guide #part1 #kuketz
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Audio
🎧🇬🇧 Drugs as Weapons Against Us
Porkins Policy Radio episode 175 John Potash

Writer and filmmaker John Potash joined me to discuss his latest documentary Drugs As Weapons Against Us. We talked about the main thesis behind the film and the original book. We discussed about the CIA’s involvement in the LSD movement in the 1960’s with groups like The Brotherhood of Eternal Love and the Mellon Hitchcock family.

📻 Web player:
http://podplayer.net/?id=64489847
http://JohnPotash.com

#drugs #weapons #CIA #Podcast
📡 @NoGoolag
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
🇩🇪 🇬🇧 📺 Smart Home - Smart Hack
Wie der Weg ins digitale Zuhause zum Spaziergang wird

Mehr als 10.000 unterschiedliche Device-Hersteller aus aller Welt verwenden die Basis-Plattform (WIFI-Modul, Cloud, App) eines einzigen Unternehmens zur technischen Umsetzung ihrer Smart-Home-Produkte.
Die Analyse dieser Basis zeigt erhebliche Sicherheitsmängel auch konzeptioneller Natur und somit diverse Angriffspunkte, von denen mehrere Millionen Smart Devices betroffen sind.
Der Vortrag stellt die Funktionsweise smarter Geräte im Zusammenhang mit der genannten Basis-Plattform dar, zeigt das Ausmaß der Sicherheitslücken anhand diverser Angriffsszenarien und bietet der Community eine Lösung für die sichere Nutzung der betroffenen Geräte.

🇬🇧 Smart Home - Smart Hack
How the digital home becomes a stroll


More than 10,000 different device manufacturers from all over the world use the basic platform (WIFI module, cloud, app) of a single company to technically implement their smart home products.
The analysis of this base shows considerable security deficiencies, also of a conceptual nature, and thus various points of attack, which affects millions of smart devices.
The lecture will present the functionality of smart devices in relation with the above-mentioned basic platform, show the extent of the security gaps using various attack scenarios and offer the community a solution for the secure use of the affected devices.

📺 Original (🇩🇪🇬🇧):
https://media.ccc.de/v/35c3-9723-smart_home_-_smart_hack#t=35

📺 BlackBox Archive:
https://news.1rj.ru/str/BlackBox_Archiv/160

🇬🇧🇩🇪
Audio (mp3) https://mirror.netcologne.de/CCC/congress/2018/mp3/35c3-9723-deu-Smart_Home_-_Smart_Hack_mp3.mp3

#smarthome #smarthack #ccc #podcast #guide #video
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
1703.05953.pdf
341.1 KB
🇩🇪 Das Internet-Adressbuch bedroht unsere Privatsphäre

🇬🇧 The Internet address book threatens our privacy

PDF (🇩🇪)
Universität Hamburg, Fachbereich Informatik, Sicherheit in verteilten Systemen
https://arxiv.org/pdf/1703.05953.pdf

#android9 #pie #DoT #DNS
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
🇬🇧 Cloudflare – The bad, the worse and the ugly?
What is Cloudflare and why not to use Cloudflare!

Cloudflare, the operator of the probably best-known content delivery network, is not only very popular with black copiers. Credit card fraudsters, phishing site operators, blackmailers and terrorists also like to use the services of the Californian company. Volker Rieck takes a closer look
.

In the USA, a large technology company is about to go public. Cloudflare from San Francisco wants to collect almost 3.5 billion dollars on the stock exchange in the first half of the year with the support of the investment bank Goldman Sachs. However, there are heavy shadows over Cloudflare. The spectrum of his customers ranges from credit card fraudsters and spammers to sites that operate copyright infringement as a business model and terrorist sites. Even US embargoes are undermined.

💡 What is Cloudflare?

The service of Cloudflare is the supply of a content Delivery network (CDN) - also content distribution network called. That is simplified said a type of turbo for web pages, so that these are delivered world-wide fast and surely. Cloudflare hangs itself thereby between the web page and/or the servers of its customers and the visitor of the side and/or user of a service and provides by purposeful control and distribution of the Traffics for a correspondingly high speed. In this way Cloudflare can offer also protection against overload attacks (DDoS) in the net.

💡 However, it offers a hidden feature:
the company anonymizes its customers.

By doing so, Cloudflare will put a screen over the original website or its server, making the operator of this site almost untraceable. If, for example, you want to know where a certain website is hosted, you only receive Cloudflare data, but you can neither identify the original computer center nor the IP address, which would be necessary, among other things, for prosecuting legal violations.

Civil law inquiries are useless, because Cloudflare only provides the naming of a computer center, which is worthless without the respective IP address. This would be roughly comparable to the information of an address in a high-rise building with thousands of residents, where there are no bell signs.

💡 The copyright problem "Cloudflare" is well-known

This hidden service from Cloudflare attracts a number of dubious customers. Among other things, the company appears again and again in connection with copyright infringements, but not only there.

Since December 2018, the EU Commission has listed Cloudflare in a watch list for counterfeiting and piracy. Most recently, the service received the dubious prize as the worst enemy of the creative from the US blog The Trichordist.

The listing of infringing market participants has a long tradition in the USA. The music association RIAA submits the list of the worst cases to the US Department of Commerce on an annual basis. In 2017, 9 out of 20 disturbers could not be identified by the RIAA because Cloudflare effectively camouflaged them.

The US film association MPA is also aware of the problems with cloudflare obfuscation and names them in its annual list of disturbers. In the relatively new piracy segment IPTV, i.e. the streaming of non-licensed TV signals, the company is also on the move. A study from autumn 2018 shows the role of Cloudflare both in camouflaging the sites that sell IPTV subnoscriptions and in concealing the origin of the streams. In a survey of file and streaming host data centers in 2016, 40% of the top 10 and 47% of the top 30 used cloudflare.
💡 The ECO, a German association, which obviously doesn't care about anything

The company is a member of the German industry association ECO. The purpose of this membership is probably to get a discount for traffic at the Frankfurt (DE-CIX) internet node, which ECO operates through a subsidiary.
ECO has always been unimpressed by the fact that, in addition to Cloudflare, other providers who are extremely heavily involved in piracy are members of the association. In any case, no reaction was made to corresponding reports, although ECO members, in addition to Cloudflare, are responsible for over 50% of piracy traffic in the film sector in 2014, for example; 45.2% of this is accounted for by Cloudflare and around 6% by a further five members.

💡 Cloudflare in court

The list of reports of court cases against Cloudflare is long. The lawsuits do not only concern virtual goods. Two manufacturers of bridal fashions filed suits for trademark and copyright infringements by plagiarism shops, which were made anonymous by Cloudflare.

In particular, the proceedings of the adult entertainment provider ALS-Scan against the company, which ended in a settlement when it became tight for the service provider, caused a sensation. The judge had decided that Cloudflare can significantly support copyright infringement by hosting cached copies of files.
The decision, whether Cloudflare also did this and must be liable for it, averted Cloudflare by the settlement.

💡 Support for Illegal Offerings - System or Slip?

Further news caused a sensation in autumn 2018, when Cloudflare discontinued its business relationship with the scene host Rapidvideo. After all, until then there had only been the case of Daily Stormer, a US Nazi site that Cloudflare had announced had terminated its business relationship with in 2017.

💡 Big Data brings it to the surface

The current Google Transparency Report makes it possible to demonstrate the actual extent of Cloudflare's involvement in piracy. In the report, Google lists all requests from rights holders for deletions from the Google search index that concern infringements. Meanwhile that is more than 2.9 billion messages. The top 5,000 of still existing domains already account for 79% of all reported URLs.

If one takes a closer look at these 5,000 domains, especially with regard to whether they use cloudflare as masking, the result speaks for itself: 37% of the infringements come from their customers, who operate 34% of the 5,000 pages.

If one were to extrapolate this proportion to the total number of domains listed in the Google Report for copyright infringements, one would arrive at almost 750,000 domains protected by cloudflare. And that with a total of 2.2 million domains for which there were deletion requests.

Among the "Piraterie customers" of the enterprise Cloudflare rank among other things: Torrentz.eu, Gosong.net, Share-online.biz, Catshare.net, Bitnoop.com, Deepwarez.org, Turbobit.net, Myfreemp3.eu or also Nitroflare.com. Each of these web pages received at least three million deletion inquiries from the Google search index.

💡 Also credit card fraudsters, Phisher, blackmailers & terrorists love Cloudflare

The Watchwebsite Crimeflare is a real treasure trove for information around Cloudflare. It lists alone 650 credit card fraud sides, to which Cloudflare is to offer shelter.

In addition, in things SSL certificates the enterprise mixes cheerfully also. Particularly Phishingseiten need such actually confidence-building certificates, in order to be successful and the consumer security to pretend. Apparently hundreds of such certificates for cheats were issued by Cloudflare according to the German magazine Heise.
💡 Also the spreading of Malware takes place over Cloudflare, as Spamhaus reports.

With extortioners the enterprise is likewise highly in the course. The German news magazine mirror reports of a twin business. On the one hand, this CDN service ensures that blackmailers who threaten, for example, to bring a website to a standstill via DDoS can no longer be tracked. The sites affected by the DDoS attacks are then sold their DDoS protection. A special form of customer acquisition.

The topic of terror is very special, because good business can also be done there. Already in 2012, the news agency Reuters Cloudflare confronted Cloudflare with the fact that the websites of Hamas and Al-Quds would be maintained; both are called terrorist groups by the United States. In 2015 there was even a petition against Cloudflare in the USA, because the service offered shelter to about 50 websites, which are attributed to ISIS. But even in 2018, terrorist organizations were still supported. The Dutch security researcher Bert Hubert identified at the end of 2018 at least 7 different websites of terrorist organisations that use cloudflare.

The Huffingtonpost had these findings evaluated by Benjamin Wittes, Senior Fellow of the Brookings Institution:
"This is not a content-based issue. Cloudflare] can be as pure-free-speech people as they want - they have an arguable position that it's not their job to decide what speech is worthy and what speech is not - but there is a law, a criminal statute, that says that you are not allowed to give services to designated foreign terrorist organisations. Full stop."

As a icing on the cake, the company even has customers who are on the official embargo list of the USA (SDN list). For example, CENTRAL REPUBLIC BANK from the Donetsk region (Ukraine) uses the service of Cloudflare.

❗️Do investors actually know what they are investing in?
Given all these facts, two things are surprising:

1)
How has the company been able to obtain financing rounds from various investment companies in the past, including Google's mother Alphabet?

2) Does Goldman Sachs actually know anything about the extent of its involvement in rights violations and its support for very dubious "ventures" - even to the point of undermining US embargoes?

Risk management is one of the central parameters of investment banks when evaluating investments. Risks must be known and assessable in advance. However, such a large participation in dubious transactions is rare in an IPO and a huge risk. All the more so if, as in the ALS-Scan procedure, the company is faced with its own liability or if criminal law is violated with the service for terrorist organisations.

Either Goldman Sachs and the current investors are not interested in moral standards, are naive or consider the risk of failure to be very low. This shows how urgently there is a need for government regulation of intermediaries on the Internet.

Links:
http://trade.ec.europa.eu/doclib/docs/2018/december/tradoc_157564.pdf
https://thetrichordist.com/2019/01/01/2019-artist-enemy-1-cloudflare/
https://torrentfreak.com/images/RIAA_2017NotoriousMarketOCR.pdf
https://torrentfreak.com/cloudflare-counters-mpaa-and-riaas-rehashed-piracy-complaints-171020/
http://webschauder.de/iptv-rechenzentren-illegaler-streamingangebote/
http://webschauder.de/tag/cloudflare_verfahren/
https://torrentfreak.com/cloudflare-settles-dangerous-piracy-liability-lawsuit-180621/
https://transparencyreport.google.com/copyright/overview?hl=de
http://www.crimeflare.com:82/carders.html
http://www.heise.de/newsticker/meldung/SSL-Zertifizierungsstellen-stellen-hunderte-Zertifikate-fuer-Phishing-Seiten-aus-2848793.html
https://tarnkappe.info/steckt-cloudflare-bald-in-schwierigkeiten/

Source and more info (🇩🇪):
https://tarnkappe.info/cloudflare-the-bad-the-worse-and-the-ugly/

📡 @NoGoolag
#cloudflare #truth #why
🇩🇪 Cloudflare – The bad, the worse and the ugly?
Was Cloudflare wirklich ist und warum man es nicht nutzen sollte!

Cloudflare, der Betreiber des wohl bekanntesten Content Delivery Networks, ist nicht nur bei den Schwarzkopierern hoch im Kurs. Auch Kreditkartenbetrüger, Betreiber von Phishing-Seiten, Erpresser und Terroristen nehmen die Dienstleistungen des kalifornischen Unternehmens gerne in Anspruch. Volker Rieck schaut einmal genauer hin.

In den USA kündigt sich der Börsengang eines großen Technologieunternehmens an. Cloudflare aus San Francisco will im ersten Halbjahr mit der Unterstützung der Investmentbank Goldman Sachs an der Börse fast 3,5 Mrd. Dollar einsammeln. Es liegen allerdings schwere Schatten über Cloudflare. Die Bandbreite seiner Kunden reicht nämlich von Kreditkartenbetrügern und Spammern über Seiten, die Urheberrechtsverletzungen als Geschäftsmodell betreiben, bis hin zu Terrorseiten. Sogar US-Embargos werden unterlaufen.

💡 Was ist Cloudflare?

Die Dienstleistung von Cloudflare ist die Bereitstellung eines Content Delivery Networks (CDN) – auch Content Distribution Network genannt. Das ist vereinfacht gesagt eine Art Turbo für Webseiten, damit diese weltweit schnell und sicher ausgeliefert werden. Cloudflare hängt sich dabei zwischen die Webseite bzw. die Server seiner Kunden und den Besucher der Seite bzw. Nutzer eines Service und sorgt durch gezielte Steuerung und Verteilung des Traffics für eine entsprechend hohe Geschwindigkeit. Auf diese Weise kann Cloudflare auch Schutz vor Überlastungsattacken (DDoS) im Netz anbieten.

💡 Allerdings bietet es dabei ein verstecktes Feature, das es in sich hat:
das Unternehmen anonymisiert seine Kunden.

Durch die Art und Weise wie Cloudflare quasi einen Schirm über die Originalwebseite bzw. deren Server legt, wird der Betreiber dieser Seite nahezu unauffindbar. Will man beispielsweise wissen, wo eine bestimmte Webseite gehostet wird, erhält man lediglich Cloudflare-Daten, kann aber weder das Originalrechenzentrum identifizieren noch die IP-Adresse, die unter anderem bei der Verfolgung von Rechtsverletzungen notwendig wäre.

Zivilrechtliche Anfragen laufen ins Leere, weil Cloudflare lediglich die Nennung irgendeines Rechenzentrums liefert, welche aber ohne die jeweilige IP-Adresse wertlos ist. Dies wäre in etwa vergleichbar mit der Auskunft einer Anschrift in einem Hochhaus mit tausenden Bewohnern, bei dem es keine Klingelschilder gibt.

💡 Das Urheberechtsproblem „Cloudflare“ ist bekannt

Diese verstecke Dienstleistung von Cloudflare zieht reihenweise dubiose Kunden an. Unter anderem taucht das Unternehmen immer wieder im Zusammenhang mit Urheberrechtsverletzungen auf, aber nicht nur dort.

Die EU-Kommission führt Cloudflare seit Dezember 2018 in einer Watchlist für Fälschungen und Piraterie. Zuletzt erhielt der Service den zweifelhaften Preis als schlimmster Feind der Kreativen vom US-Blog The Trichordist.

Die Auflistung rechtsverletzender Marktteilnehmer hat eine lange Tradition in den USA. Der Musikverband RIAA reicht auf jährlicher Basis die Liste der schlimmsten Fälle beim US-Handelsministerium ein. Im Jahr 2017 konnten 9 von 20 Störern von der RIAA nicht identifiziert werden, weil Cloudflare diese effektiv camouflierte.

Auch der US-Filmverband MPA kennt die Probleme mit der Verschleierung durch Cloudflare und benennt diese in seiner jährlichen Störerliste. Im relativ jungen Piraterie-Segment IPTV, also dem Streamen von nicht-lizenzierten TV- Signalen, ist das Unternehmen ebenfalls unterwegs. Eine Studie aus dem Herbst 2018 belegt die Rolle von Cloudflare sowohl bei der Tarnung der Seiten, die IPTV Abonnements verkaufen, als auch beim Kaschieren der Herkunft der Streams. Bei einer Untersuchung der Rechenzentren von File- und Streaminghostern in 2016 nutzten 40 % der Top 10 und 47 % der Top 30 Cloudflare.
💡 Der ECO, ein deutscher Verband, dem offenbar alles egal ist

Das Unternehmen ist Mitglied im deutschen Branchenverband ECO. Der Sinn dieser Mitgliedschaft dürfte darin bestehen, einen Rabatt für Traffic am Internetknoten Frankfurt (DE-CIX) zu bekommen, den der ECO über eine Tochterfirma betreibt.
Den ECO schert seit jeher nicht, dass neben Cloudflare noch weitere Anbieter, die extrem stark in Piraterie verwickelt sind, Verbandsmitglieder sind. Auf entsprechende Berichte wurde jedenfalls nicht reagiert, obwohl ECO-Mitglieder neben Cloudflare zum Beispiel 2014 für über 50% des Piraterie-Traffics im Filmbereich verantwortlich sind; davon entfallen 45,2 % auf Cloudflare und rund 6 % auf weitere fünf Mitglieder.

💡 Cloudflare vor Gericht

Die Liste der Meldungen über Gerichtsverfahren gegen Cloudflare ist lang. Die Klagen betreffen nicht nur virtuelle Güter. Zwei Hersteller von Brautmoden klagten wegen Marken- und Urheberrechtsverletzungen von Plagiatsshops, die durch Cloudflare anonymisiert wurden.

Aufsehen erregte insbesondere das Verfahren des Adult-Entertainment-Anbieters ALS-Scan gegen das Unternehmen, das in einem Vergleich endete, als es für den Dienstleister eng wurde. Der Richter hatte nämlich entschieden, dass Cloudflare Urheberrechtsverletzungen erheblich unterstützen kann, indem es zwischengespeicherte Kopien von Dateien hostet.
Die Entscheidung, ob Cloudflare dies auch tat und dafür haften muss, hat Cloudflare durch den Vergleich abgewendet.

💡 Unterstützung Illegaler Angebote – System oder Ausrutscher?

Weiteres Aufsehen erregten Nachrichten im Herbst 2018, als Cloudflare die Geschäftsbeziehung zu dem Szene-Hoster Rapidvideo einstellte. Schließlich gab es bis dahin nur den bekanntgewordenen Fall Daily Stormer, einer US-Naziseite, dem Cloudflare die Geschäftsbeziehung in 2017 von sich aus gekündigt hatte.

💡 Big Data bringt es an den Tag

Der aktuelle Google Transparency-Report ermöglicht es, den tatsächlichen Umfang der Beteiligung von Cloudflare am Piraterieaufkommen zu demonstrieren. In dem Report listet Google alle Anfragen von Rechteinhabern zu Löschungen aus dem Google Suchindex auf, die Rechtsverletzungen betreffen. Mittlerweile sind das mehr als 2,9 Milliarden Meldungen. Die Top 5.000 der noch existierenden Domains machen davon bereits 79 % aller gemeldeten URLs aus.

Betrachtet man diese 5.000 Domains näher, insbesondere im Hinblick darauf, ob sie Cloudflare als Maskierung benutzen, spricht das Ergebnis für sich: 37 % der Rechtsverletzungen kommen von ihren Kunden, die 34 % der 5.000 Seiten betreiben.

Wenn man diesen Anteil auf die gesamte Zahl von Domains hochrechnen würde, die im Google Report wegen Urheberrechtsverletzungen aufgeführt sind, käme man auf fast 750.000 durch Cloudflare geschützte Domains. Und das bei insgesamt 2,2 Millionen Domains, zu denen es Löschanforderungen gab.

Zu den „Piraterie Kunden“ des Unternehmens Cloudflare zählen u. a.: Torrentz.eu, Gosong.net, Share-online.biz, Catshare.net, Bitnoop.com, Deepwarez.org, Turbobit.net, Myfreemp3.eu oder auch Nitroflare.com. Jede dieser Webseiten erhielt mindestens drei Millionen Löschanfragen aus dem Google Suchindex.

💡 Auch Kreditkartenbetrüger, Phisher, Erpresser & Terroristen lieben Cloudflare

Die Watchwebsite Crimeflare ist eine wahre Fundgrube für Informationen rund um Cloudflare. Sie listet alleine 650 Kreditkartenbetrugsseiten auf, denen Cloudflare Unterschlupf bieten soll.

Aber auch in Sachen SSL Zertifikaten mischt das Unternehmen munter mit. Ganz besonders Phishingseiten brauchen solche eigentlich vertrauensbildenden Zertifikate, um erfolgreich zu sein und dem Konsumenten Sicherheit vorzugaukeln. Offenbar wurden laut dem deutschen Magazin Heise Hunderte solcher Zertifikate für Betrüger durch Cloudflare ausgestellt.
💡 Auch die Verbreitung von Malware findet über Cloudflare statt, wie Spamhaus berichtet.

Bei Erpressern liegt das Unternehmen ebenfalls hoch im Kurs. Das deutsche Nachrichten-Magazin „Der Spiegel“ berichtet von einem Zwillingsgeschäft. Einerseits sorgt dieser CDN-Dienst dafür, dass Erpressern, die z. B. damit drohen, eine Webseite per DDoS zum Erliegen zu bringen, nicht mehr verfolgbar sind. Den von den DDoS-Attacken betroffenen Seiten verkauft man dann seinen DDoS-Schutz. Eine besondere Form der Kundengewinnung.

Ganz speziell wird es beim Thema Terror, denn auch dort sind gute Geschäfte zu machen. Bereits 2012 konfrontierte die Nachrichtenagentur Reuters Cloudflare damit, dass man Webseiten von Hamas und Al-Quds betreuen würde; beide werden von den Vereinigten Staaten als terroristische Gruppen bezeichnet. 2015 gab es in den USA sogar eine Petition gegen Cloudflare, weil der Dienst etwa 50 Webseiten Unterschlupf bot, die der ISIS zugerechnet werden. Aber auch 2018 wurden noch Terrororganisationen unterstützt. Der niederländische Sicherheitsforscher Bert Hubert identifizierte Ende 2018 mindestens 7 verschiedene Webseiten von Terrororganisationen, die Cloudflare benutzen.

Die Huffingtonpost ließ diese Erkenntnisse von Benjamin Wittes, Senior Fellow der Brookings Institution, bewerten:
“This is not a content-based issue. [Cloudflare] can be as pure-free-speech people as they want — they have an arguable position that it’s not their job to decide what speech is worthy and what speech is not — but there is a law, a criminal statute, that says that you are not allowed to give services to designated foreign terrorist organizations. Full stop.”

Als Sahnehäubchen hat das Unternehmen sogar Kunden, die auf der offiziellen Embargoliste der USA stehen (SDN Liste). So nutzt beispielsweise die CENTRAL REPUBLIC BANK aus der Donezk-Region (Ukraine) den Dienst von Cloudflare.

❗️Wissen die Anleger eigentlich, in was sie da investieren?
Vor dem Hintergrund dieser ganzen Fakten verwundern zwei Dinge:

1.
Wie konnte das Unternehmen in der Vergangenheit bereits Finanzierungsrunden diverser Investmentgesellschaften, unter anderem auch der Google Mutter Alphabet erhalten?

2. Weiß man bei Goldman Sachs eigentlich etwas über das Ausmaß der Beteiligung an Rechtsverletzungen und der Unterstützung von sehr zweifelhaften „Unternehmungen“ – bis hin zum Unterlaufen von US-Embargos?

Risikomanagement ist einer der zentralen Parameter von Investmentbanken bei der Bewertung von Investments. Risiken müssen vorab bekannt und einschätzbar sein. Eine derartig große Beteiligung an dubiosen Geschäften ist bei einem Börsengang allerdings selten und ein gewaltiges Risiko. Erst recht, wenn, wie im Verfahren ALS-Scan, eine eigene Haftung des Unternehmens im Raume steht oder mit dem Service für Terrororganisationen gegen Strafrecht verstoßen wird.

Entweder Goldman Sachs und die aktuellen Investoren interessieren keine moralischen Standards, sind blauäugig oder sie schätzen das Risiko des Scheiterns als sehr gering ein. Das zeigt, wie dringend es hier staatlicher Regulierung von Intermediären im Internet bedarf.

Links:
http://trade.ec.europa.eu/doclib/docs/2018/december/tradoc_157564.pdf
https://thetrichordist.com/2019/01/01/2019-artist-enemy-1-cloudflare/
https://torrentfreak.com/images/RIAA_2017NotoriousMarketOCR.pdf
https://torrentfreak.com/cloudflare-counters-mpaa-and-riaas-rehashed-piracy-complaints-171020/
http://webschauder.de/iptv-rechenzentren-illegaler-streamingangebote/
http://webschauder.de/tag/cloudflare_verfahren/
https://torrentfreak.com/cloudflare-settles-dangerous-piracy-liability-lawsuit-180621/
https://transparencyreport.google.com/copyright/overview?hl=de
http://www.crimeflare.com:82/carders.html
http://www.heise.de/newsticker/meldung/SSL-Zertifizierungsstellen-stellen-hunderte-Zertifikate-fuer-Phishing-Seiten-aus-2848793.html
https://tarnkappe.info/steckt-cloudflare-bald-in-schwierigkeiten/

Quelle und mehr Infos:
https://tarnkappe.info/cloudflare-the-bad-the-worse-and-the-ugly/

📡 @NoGoolag
#Cloudflare #Wahrheit #warum
Con la promesa de verificación, los piratas informáticos apuntan a influenciadores de Instagram.

Los
piratas informáticos han enviado correos electrónicos que dicen ser del “Equipo de verificación de Instagram” y ofrecen a los usuarios la oportunidad de solicitar una marca de validación verificada, según descubrió la firma de ciberseguridad Trend Micro. No está claro cuándo comenzó este esquema de piratería.

Se les pide a los usuarios que caen en el correo electrónico de phishing que ingresen su nombre de usuario, contraseña, dirección de correo electrónico y fecha de nacimiento de Instagram, un esfuerzo que permite a los piratas informáticos obtener el control de las cuentas.

Trend Micro dijo que en un caso había visto a los piratas informáticos amenazando con eliminar una cuenta a menos que el usuario pagara un rescate o enviara fotos o videos de desnudos.

“Hemos visto casos en los que los propietarios de perfiles de Instagram con seguidores entre 15.000 y 70.000 fueron pirateados y nunca fueron recuperados. Las víctimas iban desde actores y cantantes famosos hasta propietarios de empresas de nueva creación, como de alquiler de equipos de fotos”, informó Trend Micro en su blog este jueves.

La compañía dijo que buscara correos electrónicos con “estilos de fuente dudosos”, y gramática y puntuación incorrectas.

Aunque no está claro a partir de ahora quién está tras este caso de piratería, la compañía dijo que parecen ser personas que hablan turco.

Trend Micro dijo que había revelado sus hallazgos a Instagram y su empresa matriz Facebook, pero aún no ha recibido respuesta.

En una declaración enviada a CNN Business, Instagram advirtió a los usuarios que desconfíen de cualquier comunicación que alegue ser de la empresa.

“Nunca le enviaremos un correo electrónico proactivo acerca de la verificación, y ciertamente nunca intentaremos venderle la verificación. Más allá de los anuncios, Instagram no vende ningún producto o servicio y no le haremos ninguna oferta por correo electrónico”, indica el comunicado.

La compañía dijo que recomienda a sus usuarios implementar una autenticación de dos factores para hacer que las cuentas sean aún más seguras.
https://cnnespanol.cnn.com/2019/03/01/instagram-influencers-verificacion-piratas-informaticos-phishing/

#instagram #seguridad #hacker
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES