HACKING NEWS
WE ARE FOLLOWERS OF HACKERS NEWS WEBSITES
1)Exclusive: British Channel 4 Blog hacked by Syrian Electronic Army
Channel 4 is the latest media organization fell victim to the Syrian Electronic Army hacktivist that target western media organizations. Channel 4 is a British public-service television broadcaster which began transmission on 2 November 1982.
"#SEA hacks Channel 4 blog, but they hired an admin to stay up all night to try and stop us | http://channel4.com/blogs | hxxp://www.zone-h.org/mirror/id/20430814 …" The recent tweet from Syrian Electronic Army reads.
We at EHN found that the Channel 4 Blog was using outdated wordpress version "Wordpress 3.1.2". The vulnerable word press version allowed hackers to deface the blog.
The hacker also tweeted the admin panel of the Wordpress. At the time of writing, the site(blogs.channel4.com) displays the following error message " Sorry ...Something’s broken (or we’re making things better). Please come back and try again later."
2)Pakistan Hacker Explains How Pakistan google and other sites got hackeD
Recently, The news about the Pakistani Google hack spread like a wildfire in the Internet. At the time, Top Level Pakistan Domains displayed the defacement page including Yahoo, MSN, HSBC, EBay,Paypal and more sites. Today, khanisgr8, a hacker from Pakistan hacker collective called "TeamBlackHats" sent an email regarding the security breach. He explains how those websites got hacked by Turkish Hacker group "EBoz". -
The day before yesterday we mentioned those hacked sites' dns records points to different free hosting site. Also we report that the site might be hacked using PKNIC vulnerability.
PKNIC is responsible for the administration of the .PK domain name space, including the operation of the DNS for the Root-Servers for .PK domains,
and registration and maintenance of all .PK domain names. PKNIC is operated as a self-supporting organization.
PKNIC is responsible for the administration of the .PK domain name space, including the operation of the DNS for the Root-Servers for .PK domains,
and registration and maintenance of all .PK domain names. PKNIC is operated as a self-supporting organization.
The hackers have claimed to have discovered a Boolean-based blind SQL injection, persistent cross site scripting, sensitive directory directory disclosure vulnerabilities in the official website of PKNIC. They provide us the vulnerable link with POC to exploit it. Also they sent some data compromised using the vulnerability which contains database details, username and hashed password.
He also provide the screenshot of the Cross site scripting vulnerability. When i tried to verify the XSS vulnerability, i just searched in google for the url and visit a PKNIC link. After visiting the link, i just saw a text "". May be Code Injector team attempts to exploit the vulnerability. "Apparently Google Pakistan has been defaced by a Turkish Hacker group 'Eboz' . It's still quite hard to believe that Google server has been hacked. They really need to put a lot of focus on their defenses because if one website got hacked that means every other websites can be hacked. " they said. We have sent an email to PKNIC regarding the vulnerability and waiting for their response. We are not sure whether the vulnerability is fixed or not So we are not providing the vulnerable link here.
3) Malicious emails purportedly from Chinese Ministry of Defense targets Asian,European Governments
TrendMicro researchers have come across a new spam mail claimed to be from Chinese Ministry of Defense that targets European and Asian Government. However, it is not that much hard to find the real address of the email. According to TrendMicro report, the emails come from a gmail account which didn't use Chinese name. "We value Your Feedback very much and have carefully studied the suggestions and advices given back by the attaches and spouses in the feedback." The spam mail reads "China is still a developing country and we are ready to make progress together with our attach?? friends in all the fields of our work" The attached document attempts to exploit the old Microsoft office vulnerability. The successful exploitation will drop the backdoor in the victim's machine
The malware is capable of stealing login credentials for websites and email accounts from Internet Explorer and Microsoft Outlook. To make the victims believe that nothing malicious happened, it displays a legitimate dummy document. The stolen information is then uploaded to two Hong Kong server. The researcher says that message has been sent to 16 European officials and Chinese media organizations.
IF U LIKE WRITE A COMMENTS...................................................................................................
No comments:
Post a Comment