Starbucks Wi-Fi Hijacked People’s Laptops to Mine Cryptocurrency
The ultimate secret menu item? Continue reading Starbucks Wi-Fi Hijacked People’s Laptops to Mine Cryptocurrency
Collaborate Disseminate
The ultimate secret menu item? Continue reading Starbucks Wi-Fi Hijacked People’s Laptops to Mine Cryptocurrency
By now, you might have heard about an adware infection operation that has allegedly spread to 250 million systems called Fireball. The threat intelligence and research teams at Check Point wrote a blog post last week describing the operation, what th… Continue reading Fireball Chinese malware and you
The world of BGP routing is a fascinating place with lots of interesting BGP events happening every day. It can be challenging to keep track of it all and so two years ago we started the BGPstream website where we keep track of large scale outages and BGP hijacks. We list the events, basic info and visualize […] Continue reading BGPstream and The Curious Case of AS12389
The PacTec Security Conference in Tokyo had something interesting show up. A countermeasure against drones that allows you to take control of any craft using the popular DSMx protocol. According to Ars Technica, DSMx transmitters and receivers exchange a key to prevent interference between adjacent systems. The key isn’t protected very well so by observing traffic and applying a little brute force, you can recover the key (which is set when the transmitter binds to the aircraft).
What’s more is a timing vulnerability allows the rogue transmitter to lock out the legitimate one. You can see a demonstration of the …read more
Continue reading You Kids Get Those Drones out of my Airspace!
The hosts file is the internet variant of a personal phonebook. We discuss a few malware variants that replace or change that phonebook, so you end up calling the wrong sites. The ones they want you to call.Categories: Cybercrime
MalwareTags: dnshijac… Continue reading Hosts file hijacks
First Mark Zuckerberg, and now the hacking outfit, OurMine, have hijacked another high-profile Twitter account. Continue reading Wikipedia co-founder Jimmy Wales’ Twitter account hijacked
April 23, Update: NOC Team at innofield posted an explanation of the Incident in the comments section below. Starting today at 17:09 UTC our systems detected a large scale routing incident affecting hundreds of Autonomous systems. Many BGPmon users have received an email informing them of this change. Our initial investigation shows that the scope […] Continue reading Large hijack affects reachability of high traffic destinations
BGP hijacks happen every day, some of them affect more networks than others and every now and then there’s a major incident that affects thousands of networks. Our monitoring systems keep an eye out for our users and if you would like to have a general idea of what’s going on in the world of […] Continue reading Large scale BGP hijack out of India
By Andree Toonk and Dhia Mahjoub As part of the Hacking Team fall out and all the details published on Wikileaks, it became public knowledge that Hacking Team helped one of their customers Special Operations Group (ROS), regain access to Remote Access Tool (RAT) clients. As first reported here: http://blog.bofh.it/id_456 ROS recommended using BGP hijacking […] Continue reading How Hacking Team Helped Italian Special Operations Group with BGP Routing Hijack
Earlier today many BGPmon users received one or more alerts informing them that their autonomous system (AS) started to announce a more-specific prefix. BGPmon classified many of these alerts as possible BGP man-in-the-middle (MITM) attacks. Here is an example alert: ==================================================================== Possible BGP MITM attack (Code: 21) ==================================================================== Your prefix: 23.20.0.0/15: Prefix Description: acxiom-online.com — […] Continue reading BGP Optimizer Causes Thousands Of Fake Routes