World cyber news is online news media.we bought daily hottest news occuring in the world related to cyber.. We propogate news specially related to hacking, technology updates , cyber world updates....

Wednesday, April 20, 2011

Is European Space Agency Hacked?

1:12 AM Posted by Administrator , ,

Broken door

A hacker has claimed to have breached the European Space Agency, gaining access to and publishing online what appears to be 200 usernames, passwords and email addresses related to the organisation, along with details on root servers and databases.
(Broken doors image by Eran Sandler, CC2.0)
In his blog, hacker TinKode listed email addresses allegedly linked to the prestigious CERN science institute, defence giant BAE systems and a string of others tied to the space agency.
The breach also revealed logs with titles such as calibration sources and orbit maintenance, according to TinKode.
The attack was launched on 17 April, but it’s not clear where it originated.
Stratsec head of delivery Nick Ellsmore said that the veracity of the breach or methods behind it cannot be verified, but noted that the leaked details appear authentic.
“Just about every system out there can be compromised if given enough attention from someone who wants to do it,” Ellsmore said. “The European Space Agency, or whoever else. They are, after all, a government agency.”
To illustrate his point, Ellsmore noted the string of breaches in recent history which have hit Barracuda, WordPress, Comodo, RSA and Epsilon.
“It’s wrapping up to a bigger picture that just about all organisations are subject to attack.”
source: http://www.zdnet.com.au/european-space-agency-hacked-339313416.htm

133t Indian h4x0rs Strikes Again

1:10 AM Posted by Administrator , ,
133t indian h4x0rs
After Cat Techie akka vaidehi sachin’s all 15 sites,including Security Firm & News Company getting  Hacked, now the 133t Indian h4x0rs group strikes on TEAM NUTS.
133t Indian h4x0rs group defaced 7 domains of TEAM NUTS  and their members.
List of hacked domains:-
aakashmishra.in/index.html
hacknuts.com/index.html
teamnuts.in/index.html
mayankyadav.in/index.html
rahulroshan.in/index.html
aakashmishra.in/index.html
securitylayer.in/index.html
You can also download their whole database here :-
http://www.multiupload.com/88EI5HQHPW
passw0rd:- hackfucksgotfucked
mirror of hacked site here :-
Mirrors:-
http://mirror.sec-t.net/defacements/?id=12023
http://www.zone-h.net/mirror/id/13492977
http://www.zone-h.net/mirror/id/13493032
http://mirror.sec-t.net/defacements/?id=12025
http://www.zone-h.net/mirror/id/13493036
http://www.zone-h.net/mirror/id/13493034

you can see the original message of 133t ndian h4x0rs here :-
http://pastebin.com/3JQuFfaZ
——————————————————————————————–

Verizon 2011 Data Breach Investigations Report Released !

12:58 AM Posted by Administrator , , ,

Data loss through cyber attacks decreased sharply in 2010, but the total number of breaches was higher than ever, according to the " Verizon 2011 Data Breach Investigations Report ." These findings continue to demonstrate that businesses and consumers must remain vigilant in implementing and maintaining security practices.

The number of compromised records involved in data breaches investigated by Verizon and the U.S. Secret Service dropped from 144 million in 2009 to only 4 million in 2010, representing the lowest volume of data loss since the report's launch in 2008. Yet this year's report covers approximately 760 data breaches, the largest caseload to date.

According to the report, the seeming contradiction between the low data loss and the high number of breaches likely stems from a significant decline in large-scale breaches, caused by a change in tactics by cybercriminals. They are engaging in small, opportunistic attacks rather than large-scale, difficult attacks and are using relatively unsophisticated methods to successfully penetrate organizations. For example, only 3 percent of breaches were considered unavoidable without extremely difficult or expensive corrective action.

The report also found that outsiders are responsible for 92 percent of breaches, a significant increase from the 2010 findings. Although the percentage of insider attacks decreased significantly over the previous year
(16 percent versus 49 percent), this is largely due to the huge increase in smaller external attacks. As a result, the total number of insider attacks actually remained relatively constant.

Hacking (50 percent) and malware (49 percent) were the most prominent types of attack, with many of those attacks involving weak or stolen credentials and passwords. For the first time, physical attacks -- such as compromising ATMs -- appeared as one of the three most common ways to steal information, and
constituted 29 percent of all cases investigated.

For the second year in a row, the U.S. Secret Service collaborated with Verizon in preparing the report. In addition, the National High Tech Crime Unit of the Netherlands Policy Agency (KLPD) joined the team this year, allowing Verizon to provide more insight into cases originating in Europe. Approximately one-third of Verizon's cases originated in either Europe or the Asia-Pacific region, reflecting the global nature of data breaches.

A complete copy of the "2011 Data Breach Investigations Report" is available for download.

Hacker “Handshake” Hole Found In Common Firewalls

12:51 AM Posted by Administrator , ,
Hacker “Handshake” Hole Found In Common Firewalls
NSS Labs tested Cisco, Check Point, Fortinet, Juniper, the Palo Alto Networks, and SonicWall firewalls


Some of the most commonly-used firewalls are subject to a hacker exploit that lets an attacker trick a firewall and get into an internal network as a trusted IP connection.
NSS Labs recently tested half a dozen network firewalls to evaluate security weaknesses, and all but one of them was found to be vulnerable to a type of attack called the “TCP Split Handshake Attack” that lets a hacker remotely fool the firewall into thinking an IP connection is a trusted one behind the firewall.
“If the firewall thinks you’re inside, the security policy it applies to you is an internal one, and you can run a scan to see where machines are,” says Rick Moy, president of NSS Labs. An attacker can then pretty much run wild in the network because the firewall mistakenly considers the IP address as a trusted one coming from behind the firewall.
This week NSS Labs published its “Network Firewall 2011 Comparative Test Results” research paper about the findings. NSS Labs is a well-known product testing organization that evaluates a wide range of security gear, sometimes as vendor-sponsored comparative tests, sometimes as completely independent tests under its own determination. The Network Firewall 2011 Comparative Test published this week is in the latter category, where costs were assumed wholly by NSS Labs itself.
NSS Labs independently tested the Check Point Power-1 11065, the Cisco ASA 5585-40, the Fortinet Fortigate 3950, the Juniper SRX 5800, the Palo Alto Networks PA-4020, and the SonicWall NSA E8500.
Moy pointed out that vendors were generally reluctant to participate in the battery of tests that NSS Labs did and that in fact about half the firewall equipment in the tests was contributed directly by end-user customers, such as financial services firms, which supported the tests because they wanted to find out about possible vulnerabilities in their firewalls.
The NSS Labs report says, “Five of the six products allowed external attackers to bypass the firewall and become an internal ‘trusted machine.’” The only firewall tested by NSS labs that didn’t was the Check Point one.
Moy says the exploit used in the test is known as the “TCP Split Handshake,” which begins during the point that the firewall and any connection is being initiated during the TCP “handshake” process to set up a connection. Moy says attack code in the wild has been known for about a year. It’s ‘”an easy way for an attacker to become part of the network,” he says. What’s particularly insidious about it is that since it occurs at the handshake stage, they are unlikely to be logs and alerts associated with the attack, Moy says.
The vendors whose equipment did not pass the “TCP Split Handshake” security test are in varying stages of remediation, according to the report.
Cisco is said to be currently working with NSS Labs on this issue and “recommendations will be provided as soon as they are available.”
“Fortinet does not currently provide their customers protection against the TCP Split handshake attack,” the report says, but NSS Labs says Fortinet has advised the lab that one will be included in an upcoming release in May.
“By default, Juniper does not enable protection against the TCP Split Handshake attack,” the report states, but NSS labs recommends that Juniper customers examine their firewall configuration and follow the guidelines described in the report. NSS Labs warns the “protection may have a negative impact on performance and/or break applications that are not using TCP properly.”
Palo Alto has indicated they are targeting an official fix in an upcoming release, according to NSS Labs, adding there may be “a negative impact on performance and/or break applications that are not using TCP properly.”
By default, SonicWall does not enable protection against the TCP Split handshake, and NSS Labs advises those customers “to examine their firewall configuration at the earliest opportunity.”
Other findings in the NSS Labs security evaluation include insight into what performance throughput rates were in specific conditions for all the half dozen different firewalls tests in comparison to the line speed rates advertised publicly by vendors.
“Performance claims in vendor data sheets are generally grossly overstated,” NSS Labs points out.
In addition, three of the six products tested crashed when subject to certain types of stability tests, a troubling situation because an attacker could exploit this over time, especially as the instability may be due to a software flaw, the report states. The Check Point Power-1 and the Cisco ASA firewall 5585-40 and the Palo Alto PA-4020 passed the test, called a protocol fuzzing and mutation test, but the Fortinet 3950B and the SonicWall NSA E8500 did not.
The NSS Labs report also includes analysis related to purchase price and total cost of ownership for all the firewalls tested.

OpenEMR Local File Include and Cross-Site Scripting Vulnerabilities

12:46 AM Posted by Administrator , ,

OpenEMR is prone to a local file-include vulnerability and multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input.
An attacker can exploit the local file-include vulnerability using directory-traversal strings to view and execute local files within the context of the affected application. Information harvested may aid in further attacks.
The attacker may leverage the cross-site scripting issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
Vendor:
http://www.sourceforge.net/projects/openemr/
http://www.oemr.org/
OpenEMR 4.0.0 is vulnerable; other versions may also be affected.
Exploit:
Local file include:

http://www.example.com/openemr-4.0.0/index.php?site=..%2f..%2f..
%2f..%2f..%2f..%2f..%2f..%2fwindows%2fwin.ini

Cross-site scripting:

http://www.example.com/openemr-4.0.0/setup.php?site=%3Cscript%3Ealert
(0)%3C/script%3E

http://www.example.com/openemr-4.0.0/gacl/admin/object_search.php?
object_type=&action

Contact Us

12:43 AM Posted by Administrator
We The World Cyber News Cordially invites your Article For Our News Website. Please support us ,All Hacker Friends and People from Cyber World to make this Website for most Authenticated place for News. please email (worldcybernews[at]yahoo.com) us yourself, your websites, your aim, your skills and your achievements. Tthe articles sent by you will be published in our official news site : http://www.worldcybernews.com/


News Article Format
1.) Title
2.) Description
3.) Article + Suitable Images + Links
4.) Source Link (If any)
5.) Submitted By ( Name + Pic + website link + Codename )


Email Us you article in the form of a MS word file as attachment to : WorldCyberNews[at]yahoo.com

Regards

World Cyber News.


Link To Us

12:43 AM Posted by Administrator
World cyber news is online news media.we bought daily hottest news occuring in the world related to cyber.. We propogate news specially related to hacking, technology updates , cyber world updates....


To Contact Us ,Mail to :
WorldCyberNews[at]Yahoo.com

About Us

12:42 AM Posted by Administrator
World cyber news is online news media.we bought daily hottest news occuring in the world related to cyber.. We propogate news specially related to hacking, technology updates , cyber world updates , vulnerability updates and more....

Monash Web Server Briefly Hacked

12:41 AM Posted by Administrator ,

Victoria’s Monash University has acknowledged that its website was briefly broken into on Saturday and replaced with what appeared to be an Iranian flag encased in a geographical map of the country.
On Sunday the university issued a statement noting that the site had been subject to what it described as “an external hacker breach”, although it noted the situation was “quickly identified and dealt with”. “No university data was compromised and the effects was limited to the publishing of non-Monash material on the externally-facing web site,” it said. “It appears that neither Monash, nor the wider Australian Higher Education Community, were a specific target.”
The attack resulted in some users seeing the Iranian image or just the normal version of the university’s website between 12 noon and 2pm on Saturday. It appears this story was broken by the Sydney Morning Herald.
In a further statement issued today (Monday), the university said it was continuing to investigate the hack, and was liaising with other institutions, as well as the Australian Computer Emergency Response Team (AusCERT), with which it had opened communications shortly after the breach happened. “The investigation has identified the source but has yet to identity a specific motive for the breach,” the university wrote.
Monash didn’t appear very worried about the attack. “The university has experienced very infrequent breaches on its web pages over recent years and understands the persistent risks in this area. The frequency of such events has been at the lower end of the expected range,” it said.
“Our CIO has not yet determined whether any changes to Monash web hosting practices will be recommended to University senior management.”
It is unclear as to what avenue of attack the hackers used to break into Monash’s web site, which appears to be running the Apache web server (one of the most popular web server software packages used online) on top of the Linux operating system. “We take the matter of security of all our IT resources very seriously and strive to balance the risks involved with the benefits gained from these resources,” said Monash.

Oracle Announces Its Intention to Move OpenOffice.org to a Community-Based Project

12:39 AM Posted by Administrator ,

REDWOOD SHORES, CA  Oracle Corporation (NASDAQ: ORCL) today is announcing its intention to move OpenOffice.org to a purely community-based open source project and to no longer offer a commercial version of Open Office.
“Given the breadth of interest in free personal productivity applications and the rapid evolution of personal computing technologies, we believe the OpenOffice.org project would be best managed by an organization focused on serving that broad constituency on a non-commercial basis,” said Edward Screven, Oracle’s Chief Corporate Architect. “We intend to begin working immediately with community members to further the continued success of Open Office. Oracle will continue to strongly support the adoption of open standards-based document formats, such as the Open Document Format (ODF).”
Oracle has a long history of investing in the development and support of open source products. We will continue to make large investments in open source technologies that are strategic to our customers including Linux and MySQL. Oracle is focused on Linux and MySQL because both of these products have won broad based adoption among commercial and government customers.
About Oracle
Oracle (NASDAQ: ORCL) is the world’s most complete, open, and integrated business software and hardware systems company. For more information about Oracle, please visit our Web site at www.oracle.com.

Militants Use Mobile Phones in Kashmir Jail

12:38 AM Posted by Administrator
SRINAGAR: A day after the Kashmir police claimed that the conspiracy to kill the president of Jamait-Ahl-e-Hadees had been hatched in Central Jail Srinagar, cops on Sunday raided the jail premises and discovered that several detained militants were fully equipped with the means of communication. The police recovered seven mobile phones and 15 SIM cards from jail inmates.  The police party led by IG Kashmir S M Sahai questioned several detainees in the jail and searched various barracks. Sahai on Saturday had claimed that some militants including Qasim Faktoo undergoing sentence in central jail hatched a conspiracy to kill Moulana Showkat Shah, chief of Jamait-Ahl-e-Hadees.
Use of communication equipment like phones, smart-phones and computers with internet access is prohibited in all jails.

SC Student Information Hacked

12:35 AM Posted by Administrator ,
LANCASTER, SC – The identity of thousands of students and teachers has potentially been compromised after officials with the Lancaster County School District say a hacker was able to access their system.
According to school officials, the hackers were able to hack into the district’s system by monitoring district computers and capturing keystrokes to get passwords. Those passwords gave the hackers access into the records on the state system of more than 25,000 students and more than 2,500 school district employees.
While it’s still not clear exactly what information the hackers were able to access, the database houses information on current and former students and employees including names, birth dates, social security numbers, addresses and phone numbers.
School officials say the hacking occurred in March and were discovered by the U.S. Computer Emergency Readiness Team, which notified the S.C. Information Sharing & Analysis Center who notified the school district of the incidents last week.
No credit card or bank account information appears to have been compromised, school officials say.
The district notified SLED and other appropriate law enforcement agencies once they were alerted that personal student and employee information could have been downloaded. WBTV has learned that the computers that were compromised were immediately taken off-line and the breach was secured.
“We deeply regret the hacking and that the security breach occurred, and we sincerely regret any inconvenience the breach may cause,” superintendent Gene Moore said. “We are doing everything we can to prevent this from happening again, and we have put new measures in place to better assure that our computers are protected from such attempts.”
According to the school district, the hackers used a sophisticated system to capture keystrokes from district computers and determine district passwords for the state systems that store the district’s student and employee information.
The school district’s Computer Security Task Force is working to put in place safeguards against hacking attempts. The Information Technology Department is continually upgrading the districts’ computer system with the most current anitvirus software available.  They are monitoring the development of new viruses and provide the protection for the district as soon as new viruses are detected.
School officials say there is no evidence to indicate that any confidential information has been used illegally. The attack appears to be a random crime, officials say, and they have no reason to believe any specific person was targeted.
“The hacking was an intentional and [criminal] action to obtain protected information,” a school official said.
The district is assisting in efforts to identify and apprehend the person or people responsible for the hacking and Dr. Moore says the school district is reviewing all its computer security procedures.
All affected employees and students affected by this incident will be notified in writing, and the district will make its best effort to notify former employees and students, Moore said.
The school district will provide instructions to students, parents and employees on how to protect themselves from identity theft on the district’s website and by mail.

Tuesday, April 19, 2011

Vaidehi Sachin Aka Cattechie Hacked By Indian 133t h4xors

In a recent hacking attack, a group of hackers attacked the websites of ethical hacking company to compromise their multiple websites hosted on the same server. From the message left by the hackers on the pastie.org website, it seems hackers aren’t happy with the standard of education being offered by the training company. Hackers have not disclosed their individual identity. Below is the message about this compromise:
———————————————–
Beware!!
g3t r34dy to b3 0wn3d
Indian.l33t.h4x0rs
we will be nightmare to you all....

Reason :
Bragging about security.
Trying to make money by teaching shit hacking.
Message to all others teams,hackers
Just a Awareness..
--------------------------------------------------------
target :
www.indiancyberarmy.info
www.indiancybersoldiers.com
www.afternoonvoice.com
www.indiancybersquad.com
www.indiancyberwarrior.com
www.unitehackers.com
www.beyondthenews.biz
www.cattechie.com
www.vaidehisachin.com
www.sabkileak.com
www.cyberghost.in
www.hackers5.com
www.hackingschool.co.in
www.nbcvoice.com
www.newsmakers.co.in
www.kaizen.org.in
www.mumbaimanoos.com
www.maritimebridges.com
www.artscape.net.in
#--------ScreenShots----------------#
http://i52.tinypic.com/2iuuw0g.png
http://i.min.us/im7mCA.png
and some mirror-links:-
http://www.zone-h.net/mirror/id/13425468
http://www.zone-h.net/mirror/id/13425472
http://www.zone-h.net/mirror/id/13425471
http://www.zone-h.net/mirror/id/13425466
http://www.zone-h.net/mirror/id/13425467
http://www.zone-h.net/mirror/id/13425464
http://www.zone-h.net/mirror/id/13425469
http://www.zone-h.net/mirror/id/13425465
http://www.zone-h.net/mirror/id/13425470
http://www.zone-h.net/mirror/id/13425487
http://www.zone-h.net/mirror/id/13425486
http://www.zone-h.net/mirror/id/13425482
http://www.zone-h.net/mirror/id/13425484
http://www.zone-h.net/mirror/id/13425481
http://www.zone-h.net/mirror/id/13425483
http://www.zone-h.net/mirror/id/13425485
http://www.zone-h.net/mirror/id/13425488
#----------- VPS server ------------#
Status :- g0t root? 
 
ehh?? 
 
password changed
#-----------------------------------#
 
All the Websites were on a Single Server.