• 00

    Days

  • 00

    Hours

  • 00

    Minutes

  • 00

    Seconds

Menu :

Sunday, June 15, 2014

INTERNET PROTEST
GROUPS Will Fight Back FEBRUARY 11TH 2014



   


INTERNET PROTEST GROUPS, news websites and user webpages are clubbing together to fight mass surveillance next week on 11 February.
The protestors are uniting under the "Day We Fight Back" banner, and include the American Civil Liberties Union (ACLU), Demand Progress, Mozilla, Reddit, environmental activist group Greenpeace and websites like Boingboing.
The groups are uniting to protest after seven odd months of US National Security Agency (NSA) revelations on the anniversary of persecuted internet activist Aaron Schwartz's passing. The campaign launched in January and now, in the final preparation stages, the protestors are asking more people to participate.
"Today the greatest threat to a free internet, and broader free society, is the National Security Agency's mass spying regime," said David Segal, executive director of Demand Progress. "If Aaron were alive he'd be on the front lines, fighting back against these practices that undermine our ability to engage with each other as genuinely free human beings."
Not participating is Wikileaks, a website that has some common ground with the protestors. However, according to a blog post on the Fight Back website, discussions with Wikipedia have failed to meet on that common ground, and it appears that the organisation will not be participating.

The Day We Fight Back group has posted an open letter to Wikipedia trying to change its mind.
"We believe Wikipedia should take part because the project and its crucial mission are threatened by the mass surveillance we now face, and because Wikipedia's participation can have a meaningful impact," it said.
"Wikipedia provides access to material that might be considered subversive, that challenges authority structures, that cuts against what one can learn from government propaganda or mainstream media sources. It is precisely the people who engage in the editing and reading of this sort of material who are the most likely to be chilled - and the most likely to be noticed by the surveillance regime. In other words, the people that Wikipedia most needs to reach are the ones whose freedom is being most threatened."
On the day of action the websites and their users will put out messages and questions about the NSA and surveillance. Internet users are asked to take part by using supportive avatars and sharing memes and tools and passion. 

Beware! Malicious

 major website ads lead to ransomware




Malicious advertisements on domains belonging to Disney, Facebook, The Guardian newspaper and others are leading people to malware that encrypts a computer's files until a ransom is paid, Cisco Systems has found.

The finding comes shortly after technology companies and U.S. law enforcement banded together in a large operation to shut down a botnet that distributed online banking malware and so-called "ransomware," a highly profitable scam that has surged over the last year.

Cisco's investigation unraveled a technically complex and highly effective way for infecting large number of computers with ransomware, which it described in detail on its blog.

"It really is insidious," said Levi Gundert, a former Secret Service agent and now a technical lead for threat research and analysis at Cisco, in a phone interview Friday.

Cisco has a product called Cloud Web Security (CWS) which monitors its customers web surfing and reports if they are browsing to suspected malicious domains. CWS monitors billions of web page requests a day, Gundert said.

The company noticed that it was blocking requests to 90 domains, many of those WordPress sites, for more than 17 percent of its CWS customers, he said.

Further investigation showed that many of the CWS users were ending up on those domains after viewing advertisements on high-traffic domains such as "apps.facebook.com," "awkwardfamilyphotos.com," "theguardian.co.uk" and "go.com," a Disney property, among many others.

Certain advertisements that appeared on those domains, however, had been tampered with. If clicked, they redirected victims to one of the 90 domains.

The style of attack, known as "malvertising," has long been a problem. Advertising networks have taken steps to try and detect malicious advertisements placed on their network, but the security checks aren't foolproof.

Occasionally, bad advertisements slip in, which are shown on a vast array of websites that have signed up with the network or its affiliates. The websites where the ads appear are often unaware they're being abused.

"It goes to show that malvertising is a real problem," Gundert said. "People expect when they go to a Tier 1 website that it is a trustworthy place to visit, but because there are so many third-party external links, that's not really true."

The 90 domains the malicious advertisements pushed traffic to had also been hacked, Gundert said. In the case of the WordPress sites, it appears the attackers used brute-force attacks -- which involves guessing login credentials -- to access the site's control panels. Then, an exploit kit called Rig was inserted, which attacked the victim's computer, Gundert said.

The Rig exploit kit, first spotted in April by Kahu Security, checks if users are running an unpatched version of Flash, Java or the Silverlight multimedia program. If someone's computer isn't patched, "you're instantly exploited," Gundert said.

In the next stage of the attack, a ransomware program called "Cryptowall," a relative of the infamous Cryptolocker malware, is installed. It encrypts the user's files, demanding a ransom. In another sign of the operation's sophistication, the website where users can pay the ransom is a hidden website that uses The Onion Router, or the TOR network.

To navigate to a TOR hidden website, a user must have TOR installed, which Cryptowall helpfully provides instructions for how to install. Those who delay paying the ransom find it increases as time passes.

Because of the use of TOR and the technically complex attack chain, Cisco hasn't yet been able to identify a group behind the attacks.

Gundert said it is likely that several groups or people with different skills -- such as malvertising, traffic redirection, exploit writing and ransomware campaigns -- are working together.

"You could have a threat actor putting together all of these pieces on their own, but there are so many different specialties involved in this attack chain," he said.

Popular Posts

Labels

About Me

Followers

Gallery

.

Blog Archive

Most Commented

Sociallize Us

.

Sponser

Contact Form

Name

Email *

Message *

Find us on Facebook

Popular Posts

Find us on Facebook

Decoration