Archive for May, 2017


Here's another shot of Genesis' mining operations. More than 10,000 mining GPUs are in this one room.

Bitcoin is going nuclear. The digital currency is hitting all-time highs, with a single coin going for more than $2,197. Continue reading

According to KSN data, Kaspersky Lab solutions detected and repelled 479,528,279 malicious attacks from online resources located in 190 countries all over the world. Continue reading

 

A new malware called EternalRocks was discovered in late May that uses not only EternalBlue and DoublePulsar—the two National Security Agency (NSA) exploits leaked by the ShadowBrokers hacking group and used by the notorious WannaCry ransomware—but five other exploits and tools similarly leaked by the same group: EternalChampion, EternalRomance, EternalSynergy, ArchiTouch and SMBTouch. Most of these exploits target the MicrosoftServer Message Block (SMB), which handles access sharing between nodes on a network. Continue reading

While the entire cybersecurity world is focusing on WannaCryptor ransomware and ways to help its victims, someone has released 200 master keys for the latest variants of another notorious ransomware family (detected by our systems as Win32/Filecoder.Crysis) – namely those that add the .wallet and .onion extension to the affected files. Continue reading

Malicious clients can upload and cause the smbd server to execute a shared library from a writable share. Continue reading

During the security exploration of Twitter social network as part of  BugBounty-program, I found the vulnerability which allowed hackers to publish entries in Twitter-network by any user of this service, meanwhile without having the access to the account of a victim. This vulnerability was found 26-th February 2017 and was fixed on 28-th February 2017.

Continue reading

Wi-Fi can pass through walls. This fact is easy to take for granted, yet it’s the reason we can surf the web using a wireless router located in another room. Continue reading

Wireless data transmission systems such as wi-fi or Bluetooth emit coherent light—electromagnetic waves with a precisely known amplitude and phase. Propagating in space, this radiation forms a hologram—a two-dimensional wave front encoding a three-dimensional view of all objects traversed by the light beam. Here we demonstrate a scheme to record this hologram in a phase-coherent fashion across a meter-sized imaging region. We recover three-dimensional views of objects and emitters by feeding the resulting data into digital reconstruction algorithms.  Continue reading

Backdoor-Duuzer.png

Similarities in code and infrastructure indicate close connection to group that was linked to Sony Pictures and Bangladesh Bank attacks Continue reading

Solid-state drives (SSDs), which consist of NAND ash memory chips, are widely used today as a primary medium of data storage. SSDs are found within large-scale data centers, consumer PCs, and mobile devices, as the per-bit cost of NAND ash memory has greatly decreased and, as a result, SSD storage capacity has greatly increased. These improvements have been enabled by both aggressive process technology scaling and the development of multi-level cell (MLC) technology. In earlier ash memory generations, each ash cell could store only a single bit of data (a single-level cell). A multi-level cell stores two bits of data within a single cell [3, 12, 21, 25, 37, 41], thereby doubling storage capacity. Continue reading