HomeLogin

Mega Now Accepts Bitcoin and new services will be coming soon

17 February, 2013 at 2:03 pm by anonymous!
bitcoin-tor-network

Kim Dotcom announced that Mega will start accepting Bitcoin as payment for their cloud storage service through a reseller on Twitter Saturday. New users get 50 GB storage space for free, those who want more can now pay using Bitcoin at BitVoucher. This means that you can now sign up anonymously using Tor and pay for cloud storage anonymously using Bitcoin. Dotcom also announced that Mega will be expanding their services and offer Email, Chat, Voice and Video services soon.

The United States of Fascism closed down Kim Dotcom’s previous MegaUpload service. They have not yet managed to stop his new Mega service nor have they proved that MegaUpload was doing anything illegal.

Bitcoins on the rise

The value of one Bitcoin (BTC) has exploded during the last few months.

btc-usd-1m-2013-02

Mega’s new Bitcoin acceptance as well as new Tor hidden service marketplaces like Black Market Reloaded (link requires Tor) is likely to further increase the demand for the digital currency.


Openssl 1.0.1d breaks Tor on aesni-supported CPUs

8 February, 2013 at 2:40 pm by anonymous!
onion

Openssl 1.0.1d if you have a CPU with aesni supportUsers with such CPUs should use the older 1.0.1c or wait for the 1.0.1e release. Official Tor project story is:

There’s a bug in openssl 1.0.1d that breaks Tor (and lots of other programs) if you have a CPU with aesni support.

If you have aesni support on your CPU, and you’re using the openssl
1.0.1 series, and you decide that you simply _must_ upgrade OpenSSL
before 1.0.1e can be released (soon, I hope), then see the link below
for a patch that will make Tor work around the bug in question.

For more information on the openssl bug, see
https://trac.torproject.org/projects/tor/ticket/8179 .


Spy agency ASIO are hacking into personal computers

13 January, 2013 at 6:48 pm by anonymous!
secure_beneath_the_watchful_eyes

Natasha Bita, National Social Editor / News Limited Network / January 13, 2013 12:00AM

http://www.news.com.au/technology/spy-agency-asio-wants-powers-to-hack-into-personal-computers/story-e6frfro0-1226552661701

“SPY agency ASIO[1] wants to hack into Australians’ personal computers and commandeer their smartphones to transmit viruses to terrorists.

The Attorney-General’s Department is pushing for new powers for the Australian Security Intelligence Organisation to hijack the computers of suspected terrorists.

But privacy groups are attacking the ”police state” plan as ”extraordinarily broad and intrusive”.

A spokesman for the Attorney-General’s Department said it was proposing that ASIO be authorised to ”use a third party computer for the specific purpose of gaining access to a target computer”.

”The purpose of this power is to allow ASIO to access the computer of suspected terrorists and other security interests,” he told News Limited.

”(It would be used) in extremely limited circumstances and only when explicitly approved by the Attorney-General through a warrant.

”Importantly, the warrant would not authorise ASIO to obtain intelligence material from the third party computer.”

The Attorney-General’s Department refused to explain yesterday how third-party computers would be used, ”as this may divulge operationally sensitive information and methods used by ASIO in sensitive national security investigations.”

But cyber specialist Andrew Pam, a board member of the Electronic Frontiers lobby group, predicted ASIO could copy the tactics of criminal hackers to seize control of target computers.

Australians’ personal computers might be used to send a malicious email with a virus attached, or to load ”malware” onto a website frequently visited by the target.

”This stuff goes on already in the commercial and criminal world, and security agencies could be using the same techniques to commandeer people’s computers and use them to monitor a target,” Mr Pam said.

”Once you get control of a computer and connect to their network you can do whatever you want.”

The ASIO Act now bans spies from doing anything that ”adds, deletes or alters data or interferes with, interrupts or obstructs the lawful use of the target computer by other persons”.

But ASIO wants the ban lifted, so Attorney-General Nicola Roxon can issue a warrant for spies to secretly intercept third-party computers to disrupt their target.

The departmental spokesman said the federal government had made ”no decisions” about whether to grant ASIO the new power.

The government would first consider advice from the federal Parliamentary Joint Committee on Intelligence and Security, which is reviewing national security legislation.

Victoria’s acting Privacy Commissioner, Dr Anthony Bendall, has told the committee that ASIO’s proposed new powers are ”characteristic of a police state.”

”To access a third party’s computer, which has no connection with the target, is extraordinarily broad and intrusive,” his submission states.

But the Attorney-General’s Department insists that ASIO will not examine the content of third-party computers.

”The use of the third party computer is essentially like using a third party premises to gain access to the premises to be searched, where direct access is not possible,” it states in response to questions from the committee.

”It involves no power to search or conduct surveillance on the third party.”

The department said technological advances had made it ”increasingly difficult” for ASIO to execute search warrants directly on target computers, ”particularly where a person of interest is security conscious.”

Australian Council for Civil Liberties president Terry O’Gorman yesterday said ASIO should have to seek a warrant from an independent judge, rather than a politician.

He warned that ASIO might be able to spy on individuals – including journalists protecting a whistleblower – by tapping into their computers.

”I’m concerned they will access all sorts of information on a computer that has nothing to do with terrorism,” he said.”

======================================================
[1] https://en.wikipedia.org/wiki/Australian_Security_Intelligence_Organisation

http://www.asio.gov.au/



Secret firewall-disabling security exploit found in the Tails Tor Linux Live-distribution

31 December, 2012 at 8:59 pm by anonymous!
onion

Tails is the live-cd/usb distribution for using the Internet securely with Tor when you are on the move.

1340824379556We are shocked to learn that Tails comes with a file called do_not_ever_run_me in /usr/local/sbin and this file contains the security risk. The file allows a root user to disable the iptables firewall so that traffic is no longer routed through the Tor network. This means that any exploit that can gain root access could potentially expose the system to the Internet directly. No such exploits are know, but that does not mean that they do not exist.


Links Deep Web .onion By M1cr0b10

30 December, 2012 at 10:27 pm by anonymous!

http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page – Hidden Wiki.

http://xqz3u5drneuzhaeo.onion/users/haruspex/sms/ – SMSbomber.

http://s6cco2jylmxqcdeh.onion/ – Cebolla-chan.

http://p2uekn2yfvlvpzbu.onion/ – Armas, entrenamiento militar etc.

http://xqz3u5drneuzhaeo.onion/users/zvc/imgboard/ – Tor4chan.(Peligroso)

http://clsvtzwzdgzkjda7.onion/ – Foro de Hacking, Phreaking, Cracking, etc.

http://4jbxjjrbakmdcmvb.onion/ – Paginas Variadas.

http://dppmfxaacucguzpc.onion/index….9e18f83ab9233d – Paginas variadas.

http://xqz3u5drneuzhaeo.onion/users/heidenwut2/ – Politica, Ocultismo, Spy vs Spy, Revolucion!!

http://c2hluuzwi7tuceu6.onion/ – Chat anonimo de texto plano.

http://4v6veu7nsxklglnu.onion/SimplePM.php – Mensajes privados sin registro.

http://tag3ulp55xczs3pn.onion/cgi-bin/ssi/index.shtml – Eliminar DRM de Itunes

http://3terbsb5mmmdyhse.onion/ – Crackear Hash

http://g7pz322wcy6jnn4r.onion/openso…ont/index.html – Seguridad informatica entre otras cosas.

http://am4wuhz3zifexz5u.onion/ – Libros.

http://xqz3u5drneuzhaeo.onion/users/iskanderarchiv/ – Libros.

http://carson27rcopqmms.onion/ – TV

http://honeynetvg7i4lc6.onion/hack español

http://kpynyvym6xqi7wz2.onion/ – Actividades Ilicitas.

http://4eiruntyxxbgfv7o.onion/

Assasination Market

http://am4wuhz3zifexz5u.onion/

Deep web related ebooks

http://627kx22vati6uqkw.onion/

Get something stolen for ya, pay a fraction of the price.

http://kpynyvym6xqi7wz2.onion/files.html

http://4eiruntyxxbgfv7o.onion/snapbbs/736364f4/showthread.php?&threadid=0bf8a39efd46fd7dd67dc3a1 d0291860

http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page (hidden wiki)

http://627kx22vati6uqkw.onion/

http://4eiruntyxxbgfv7o.onion/pm/

http:// kpvz7ki2v5agwt35.onion

http://7cov2loswjrmaqot secret corner

http://6x77gb7ngu6nymwl.onion

http://opva2pilsncvtwmh.onion

http://7cov2loswjrmaqot.onion

http://eqt5g4fuenphqinx.onion/

http://b4yrk2nkydqfpzqm.onion/girls/topic/1045+full/

http://m3hjrfh4hlqc67gb.onion/inliner.php?num=50&size=120&filter=0

http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

http://opva2pilsncvtwmh.onion/

http://b4yrk2nkydqfpzqm.onion/

http://lph5po3mivnjjzjo.onion/kusaba.php

http://jkpos24pl2r3urlw.onion:6969/

http://6sxoyfb3h2nvok2d.onion/

http://dppmfxaacucguzpc.onion/

http://kpynyvym6xqi7wz2.onion/files.html <-Parazite – Arquivos, tutoriais, etc.

http://kpynyvym6xqi7wz2.onion/links.html <-Parazite – Links para outros sites.

http://dppmfxaacucguzpc.onion/ <-Tem vários links que direcionam p varias páginas secretas

http://clsvtzwzdgzkjda7.onion/ <-HackBB – Fórum hacker

http://mlz3apezci5ya6k6.onion/ <- Moralize us – Ajude a decidir o que é certo e o que é errado lol

http://hmybz2aqe7whj7qr onion/wiki/Main_Page <-Um dos links da Hidden Wiki.

http://sx3jvhfgzhw44p3x.onion/ <-Wikileaks original, antes de ir para a surface.

http://xqz3u5drneuzhaeo.onion/users/heidenwut2/books/SatanicBible-AntonLaVey.txt <-Bíblia satanica de LaVey

http://xqz3u5drneuzhaeo.onion/users/heidenwut2/books/DemonicBible-MagusTsirkSusej.txt <-Bíblia demoniaca por Magnus – anticristo discipulo de satanás.

http://xqz3u5drneuzhaeo.onion/users/heidenwut2/books/TheAntichrist-FriedrichNietzsche.txt <-Nietzche o anticristo.

http://www.jordanmaxwell. com <- Pesquisador de sociedades secretas e muito mais.. (Surface, mas tem a ver com o assunto.)

http://www.jordanmaxwell.com/links. html <-Direciona a vários links de sites sobre ocultismo , teologia , fiolosofia de vida , sociedade secretas. e muito mais.

http://xqz3u5drneuzhaeo.onion/users/heidenwut2/books/000i.html <- Livros disponíveis no site, fantasia, ficção, espionagem, religião, segredos financeiros… foda, tem até senhor dos anéis.

http://xqz3u5drneuzhaeo.onion/users/heidenwut2/games/000i.html <-Games

http://3terbsb5mmmdyhse.onion <- Blackhat Hacking

http://p2uekn2yfvlvpzbu.onion/arm/50calRifleConstructionManual.pdf <-Calibre .50 Manual de Construção Rifle, Bill Holmes

http://xqz3u5drneuzhaeo.onion/users/penispanic/ <-Multilação genital (gore!)

http://ci3hn2uzjw2wby3z.onion/ <- “fórum” anônimo, Talk masked (ou seria talked mask?.

http://am4wuhz3zifexz5u.onion <- Tor Library.

http://ci3hn2uzjw2wby3z.onion <- Boards.

http://p2uekn2yfvlvpzbu.onion <-Armas.

http://ci3hn2uzjw2wby3z.onion <-Site de hospedagem na onion.

http://kpvz7ki2v5agwt35.onion <- Mais links da Hidden Wiki.

http://xqz3u5drneuzhaeo.onion

http://7ll6yck7azloqjqv.onion <-Tor Music.

http://ci3hn2uzjw2wby3z.onion <-Tor directory.

http://a5ec6f6zcxtudtch.onion <-Anonymous Email.

http://5onwnspjvuk7cwvk.onion/ <- Mercado negro

http://kpynyvym6xqi7wz2.onion/links.html#gore <-Gores

http://xmh57jrzrnw6insl.onion/ <-TORCH (site de busca)

http://4eiruntyxxbgfv7o.onion/snapbbs/1acda566/threadlist.php?PHPSESSID=65odjfpu90ktst1ttj2959hnu6 <-Assassination Market. lol

http://hmybz2aqe7whj7qr.onion <-Mais um link da Hidden Wiki.

http://kpynyvym6xqi7wz2.onion/lyingninja.txt <-Aprenda a ser um mestre na arte de mentir.

http://kpynyvym6xqi7wz2.onion/fuksomeone.txt <-Como conseguir informações detalhadas de qualquer pessoa.

http://kpynyvym6xqi7wz2.onion/success.txt <-Aprenda a ter sucesso sem talento.

http://kpynyvym6xqi7wz2.onion/iNFeCTioN_CooKBooK.txt <- Destrancar portas (até de carros), explosivos (incendiários, correios, granadas, ácido), trapacear os sistemas telefônicos, hacking, conseguir uma nova identidade, etc…

http://kpynyvym6xqi7wz2.onion/molitov.txt <-Fazendo um “cocktail molotov”.

http://utup22qsb6ebeejs.onion/ <-Hidden Blog.

http://3g2upl4pq6kufc4m.onion <- Outro buscador.

http://4eiruntyxxbgfv7o.onion/ – Circle

http://am4wuhz3zifexz5u.onion/ – Tor Library

http://627kx22vati6uqkw.onion/ – Black Market.

http://4eiruntyxxbgfv7o.onion/snapbbs/736364f4/ – Intel Exchange

http://4eiruntyxxbgfv7o.onion/pm/ – TorPM

http://eqt5g4fuenphqinx.onion/ – Core.onion

http://ahmia.fi/ Recomendada!!! , funciona igual que google solo que te da sitios onion

c2h6fmbujndylrny.onion

http://m3hjrfh4hlqc67gb.onion/ no lo recomiendo , lo puse por si algun compañero lo desee tumbar o sacar de servicio.

http://sc3njt2i2j4fvqa3.onion/ ne2bin especie de taringa

http://drugsbb6fa564p4d.onion/index.php Drogas y mas drogas

http://nstmo7lvh4l32epo.onion/ the abyss

http://ugh6gtz44ifx23e7.onion/ Contratar un hacker de la deep web en ingles :(

http://6vmgggba6rksjyim.onion/ anon x change

http://eqyk66cptyi5jpay.onion/index.php/Main_Page

http://pja3dhxxpn4cba63.onion/TSSA/index.html secret story archive :D

http://62lpxb2lt3yt6vgr.onion/ polish hackers zone

http://c2h6fmbujndylrny.onion/ creative hack

http://wn323ufq7s23u35f.onion/ dox bin

http://snwmlvc3a2bzt63q.onion/ anon server

el enlace de las webs marianas solo lo puedes ingresar con un hardware especial , pero no te recomiendo!!!

http://dx37guvtyy7wil3n.onion/index.htm Extremadamente peligrosa!!!

zbnnr7qzaxlk5tms.onion – Wikileaks espejo

v6pgrjno6mzbjicf.onion – Prensa Cebolla

http://am4wuhz3zifexz5u.onion/ – Libros

http://b4yrk2nkydqfpzqm.onion/mobile/

polymeric falcighol derivation

http://xqz3u5drneuzhaeo.onion/users/experiments/

http://eqt5g4fuenphqinx.onion/ tor onion

http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

http://gbzig3ov3o25tgew.onion/w/index.php/Main_Page

http://gbzig3ov3o25tgew.onion/w/index.php/Main_Page

http://gbzig3ov3o25tgew.onion/w/index.php?title=Main_Page&oldid=7622

http://gbzig3ov3o25tgew.onion/w/index.php/Hard_Candy

https://xqz3u5drneuzhaeo.tor2web.org/users/hackbloc/index.php?title=Mirror/kpvz7ki2v5agwt35.onion/Main_Page&oldid=131

http://kpvz7ki2v5agwt35.onion/

http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

http://4eiruntyxxbgfv7o.onion/ Assasination Market
http://am4wuhz3zifexz5u.onion/ Deep web related ebooks
http://627kx22vati6uqkw.onion/ Get something stolen for ya, pay a fraction of the price.
http://hkfjbmo2rdjun56b.onion/ (onionchan, dead)

http://kpynyvym6xqi7wz2.onion/files.html

http://4eiruntyxxbgfv7o.onion/snapbbs/736364f4/showthread.php?&threadid=0bf8a39efd46fd7dd67dc3a1 d0291860
http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page (hidden wiki)

http://627kx22vati6uqkw.onion/

http://4eiruntyxxbgfv7o.onion/pm/

http:// kpvz7ki2v5agwt35.onion
http://7cov2loswjrmaqot secret corner

http://6x77gb7ngu6nymwl.onion

http://opva2pilsncvtwmh.onion

http://7cov2loswjrmaqot.onion

http://eqt5g4fuenphqinx.onion/

http://b4yrk2nkydqfpzqm.onion/girls/topic/1045+full/

http://m3hjrfh4hlqc67gb.onion/inliner.php?num=50&size=120&filter=0

http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page

http://opva2pilsncvtwmh.onion/

http://b4yrk2nkydqfpzqm.onion/

http://lph5po3mivnjjzjo.onion/kusaba.php

http://jkpos24pl2r3urlw.onion:6969/

http://6sxoyfb3h2nvok2d.onion/

http://dppmfxaacucguzpc.onion/

http://kpynyvym6xqi7wz2.onion/files.html <-Parazite – Arquivos, tutoriais, etc.
http://kpynyvym6xqi7wz2.onion/links.html <-Parazite – Links para outros sites.
http://dppmfxaacucguzpc.onion/ <-Tem vários links que direcionam p varias páginas secretas
http://clsvtzwzdgzkjda7.onion/ <-HackBB – Fórum hacker
http://mlz3apezci5ya6k6.onion/ <- Moralize us – Ajude a decidir o que é certo e o que é errado lol
http://hmybz2aqe7whj7qr onion/wiki/Main_Page <-Um dos links da Hidden Wiki.
http://sx3jvhfgzhw44p3x.onion/ <-Wikileaks original, antes de ir para a surface.
hthttp://www.jordanmaxwell. com <- Pesquisador de sociedades secretas e muito mais.. (Surface, mas tem a ver com o assunto.)
http://www.jordanmaxwell.com/links. html <-Direciona a vários links de sites sobre ocultismo , teologia , fiolosofia de vida , sociedade secretas. e muito mais.
http://xqz3u5drneuzhaeo.onion/users/heidenwut2/books/000i.html <- Livros disponíveis no site, fantasia, ficção, espionagem, religião, segredos financeiros… foda, tem até senhor dos anéis.
http://xqz3u5drneuzhaeo.onion/users/heidenwut2/games/000i.html <-Games
http://3terbsb5mmmdyhse.onion <- Blackhat Hacking
http://p2uekn2yfvlvpzbu.onion/arm/50calRifleConstructionManual.pdf <-Calibre .50 Manual de Construção Rifle, Bill Holmes
http://xqz3u5drneuzhaeo.onion/users/penispanic/ <-Multilação genital (gore!)
http://ci3hn2uzjw2wby3z.onion/ <- “fórum” anônimo, Talk masked (ou seria talked mask?.
http://am4wuhz3zifexz5u.onion <- Tor Library.
http://ci3hn2uzjw2wby3z.onion <- Boards.
http://p2uekn2yfvlvpzbu.onion <-Armas.
http://ci3hn2uzjw2wby3z.onion <-Site de hospedagem na onion.
http://kpvz7ki2v5agwt35.onion <- Mais links da Hidden Wiki.

http://xqz3u5drneuzhaeo.onion

http://7ll6yck7azloqjqv.onion <-Tor Music.
http://ci3hn2uzjw2wby3z.onion <-Tor directory.
http://a5ec6f6zcxtudtch.onion <-Anonymous Email.
http://5onwnspjvuk7cwvk.onion/ <- Mercado negro
http://kpynyvym6xqi7wz2.onion/links.html#gore <-Gores
http://xmh57jrzrnw6insl.onion/ <-TORCH (site de busca)
http://4eiruntyxxbgfv7o.onion/snapbbs/1acda566/threadlist.php?PHPSESSID=65odjfpu90ktst1ttj2959hnu6 <-Assassination Market. lol
http://hmybz2aqe7whj7qr.onion <-Mais um link da Hidden Wiki.
http://kpynyvym6xqi7wz2.onion/lyingninja.txt <-Aprenda a ser um mestre na arte de mentir.
http://kpynyvym6xqi7wz2.onion/fuksomeone.txt <-Como conseguir informações detalhadas de qualquer pessoa.
http://kpynyvym6xqi7wz2.onion/success.txt <-Aprenda a ter sucesso sem talento.
http://kpynyvym6xqi7wz2.onion/iNFeCTioN_CooKBooK.txt <- Destrancar portas (até de carros), explosivos (incendiários, correios, granadas, ácido), trapacear os sistemas telefônicos, hacking, conseguir uma nova identidade, etc…
http://kpynyvym6xqi7wz2.onion/molitov.txt <-Fazendo um “cocktail molotov”.
http://utup22qsb6ebeejs.onion/ <-Hidden Blog.
http://3g2upl4pq6kufc4m.onion <- Outro buscador.
http://4eiruntyxxbgfv7o.onion/ – Circle
http://am4wuhz3zifexz5u.onion/ – Tor Library
http://627kx22vati6uqkw.onion/ – Black Market.
http://4eiruntyxxbgfv7o.onion/snapbbs/736364f4/ – Intel Exchange
http://4eiruntyxxbgfv7o.onion/pm/ – TorPM
http://eqt5g4fuenphqinx.onion/ – Core.onion
http://b4yrk2nkydqfpzqm.onion/ onionib

http://54dgeda4ik6iypui.onion/main.php?cmd=album

http://jva7jpw27pfycasu.onion/index.php?&pagenumber=0


Nobody Seems To Notice and Nobody Seems To Care – Government & Stealth Malware

5 October, 2012 at 5:30 pm by anonymous!
danza_point_to_multipoint_(wimax)_scenario

In Response To Slashdot Article: Former Pentagon Analyst: China Has Backdoors To 80% of Telecoms

How many rootkits does the US[2] use officially or unofficially?

How much of the free but proprietary software in the US spies on you?

Which software would that be?

Visit any of the top freeware sites in the US, count the number of thousands or millions of downloads of free but proprietary software, much of it works, again on a proprietary Operating System, with files stored or in transit.

How many free but proprietary programs have you downloaded and scanned entire hard drives, flash drives, and other media? Do you realize you are giving these types of proprietary programs complete access to all of your computer’s files on the basis of faith alone?

If you are an atheist, the comparison is that you believe in code you cannot see to detect and contain malware on the basis of faith! So you do believe in something invisible to you, don’t you?

I’m now going to touch on a subject most anti-malware, commercial or free, developers will DELETE on most of their forums or mailing lists:

APT malware infecting and remaining in BIOS, on PCI and AGP devices, in firmware, your router (many routers are forced to place backdoors in their firmware for their government) your NIC, and many other devices.

Where are the commercial or free anti-malware organizations and individual’s products which hash and compare in the cloud and scan for malware for these vectors? If you post on mailing lists or forums of most anti-malware organizations about this threat, one of the following actions will apply: your post will be deleted and/or moved to a hard to find or ‘deleted/junk posts’ forum section, someone or a team of individuals will mock you in various forms ‘tin foil hat’, ‘conspiracy nut’, and my favorite, ‘where is the proof of these infections?’ One only needs to search Google for these threats and they will open your malware world view to a much larger arena of malware on devices not scanned/supported by the scanners from these freeware sites. This point assumed you’re using the proprietary Microsoft Windows OS. Now, let’s move on to Linux.

The rootkit scanners for Linux are few and poor. If you’re lucky, you’ll know how to use chkrootkit (but you can use strings and other tools for analysis) and show the strings of binaries on your installation, but the results are dependent on your capability of deciphering the output and performing further analysis with various tools or in an environment such as Remnux Linux. None of these free scanners scan the earlier mentioned areas of your PC, either! Nor do they detect many of the hundreds of trojans and rootkits easily available on popular websites and the dark/deep web.

Compromised defenders of Linux will look down their nose at you (unless they are into reverse engineering malware/bad binaries, Google for this and Linux and begin a valuable education!) and respond with a similar tone, if they don’t call you a noob or point to verifying/downloading packages in a signed repo/original/secure source or checking hashes, they will jump to conspiracy type labels, ignore you, lock and/or shuffle the thread, or otherwise lead you astray from learning how to examine bad binaries. The world of Linux is funny in this way, and I’ve been a part of it for many years. The majority of Linux users, like the Windows users, will go out of their way to lead you and say anything other than pointing you to information readily available on detailed binary file analysis.

Don’t let them get you down, the information is plenty and out there, some from some well known publishers of Linux/Unix books. Search, learn, and share the information on detecting and picking through bad binaries. But this still will not touch the void of the APT malware described above which will survive any wipe of r/w media. I’m convinced, on both *nix and Windows, these pieces of APT malware are government in origin. Maybe not from the US, but most of the ‘curious’ malware I’ve come across in poisoned binaries, were written by someone with a good knowledge in English, some, I found, functioned similar to the now well known Flame malware. From my experience, either many forum/mailing list mods and malware developers/defenders are ‘on the take’, compromised themselves, and/or working for a government entity.

Search enough, and you’ll arrive at some lone individuals who cry out their system is compromised and nothing in their attempts can shake it of some ‘strange infection’. These posts receive the same behavior as I said above, but often they are lone posts which receive no answer at all, AT ALL! While other posts are quickly and kindly replied to and the ‘strange infection’ posts are left to age and end up in a lost pile of old threads.

If you’re persistent, the usual challenge is to, “prove it or STFU” and if the thread is not attacked or locked/shuffled and you’re lucky to reference some actual data, they will usually attack or ridicule you and further drive the discussion away from actual proof of APT infections.

The market is ripe for an ambitious company or individual to begin demanding companies and organizations who release firmware and design hardware to release signed and hashed packages and pour this information into the cloud, so everyone’s BIOS is checked, all firmware on routers, NICs, and other devices are checked, and malware identified and knowledge reported and shared openly.

But even this will do nothing to stop backdoored firmware (often on commercial routers and other networked devices of real importance for government use – which again opens the possibility of hackers discovering these backdoors) people continue to use instead of refusing to buy hardware with proprietary firmware/software.

Many people will say, “the only safe computer is the one disconnected from any network, wireless, wired, LAN, internet, intranet” but I have seen and you can search yourself for and read about satellite, RF, temperature, TEMPEST (is it illegal in your part of the world to SHIELD your system against some of these APT attacks, especially TEMPEST? And no, it’s not simply a CRT issue), power line and many other attacks which can and do strike computers which have no active network connection, some which have never had any network connection. Some individuals have complained they receive APT attacks throughout their disconnected systems and they are ridiculed and labeled as a nutter. The information exists, some people have gone so far as to scream from the rooftops online about it, but they are nutters who must have some serious problems and this technology with our systems could not be possible.

I believe most modern computer hardware is more powerful than many of us imagine, and a lot of these systems swept from above via satellite and other attacks. Some exploits take advantage of packet radio and some of your proprietary hardware. Some exploits piggyback and unless you really know what you’re doing, and even then… you won’t notice it.

Windows user

Back to the Windows users, a lot of them will dismiss any strange activity to, “that’s just Windows!” and ignore it or format again and again only to see the same APT infected activity continue. Using older versions of sysinternals, I’ve observed very bizarre behavior on a few non networked systems, a mysterious chat program running which doesn’t exist on the system, all communication methods monitored (bluetooth, your hard/software modems, and more), disk mirroring software running[1], scans running on different but specific file types, command line versions of popular Windows freeware installed on the system rather than the use of the graphical component, and more.

[1] In one anonymous post on pastebin, claiming to be from an intel org, it blasted the group Anonymous, with a bunch of threats and information, including that their systems are all mirrored in some remote location anyway.

[2] Or other government, US used in this case due to the article source and speculation vs. China. This is not to defend China, which is one messed up hell hole on several levels and we all need to push for human rights and freedom for China’s people. For other, freer countries, however, the concentration camps exist but you wouldn’t notice them, they originate from media, mostly your TV, and you don’t even know it. As George Carlin railed about “Our Owners”, “nobody seems to notice and nobody seems to care”.

[3] http://www.stallman.org/

Try this yourself on a wide variety of internet forums and mailing lists, push for malware scanners to scan more than files, but firmware/BIOS. See what happens, I can guarantee it won’t be pleasant, especially with APT cases.

So scan away, or blissfully ignore it, but we need more people like RMS[3] in the world. Such individuals tend to be eccentric but their words ring true and clear about electronics and freedom.

I believe we’re mostly pwned, whether we would like to admit it or not, blind and pwned, yet fiercely holding to misinformation, often due to lack of self discovery and education, and “nobody seems to notice and nobody seems to care”.

##

Schneier has covered it before: power line fluctuations (differences on the wire in keys pressed).

There’s thermal attacks against cpus and temp, also:

ENF (google it)

A treat (ENF Collector in Java):

sourceforge dot net fwdslash projects fwdslash nfienfcollector

No single antimalware scanner exists which offers the ability to scan (mostly proprietary) firmware on AGP/PCI devices (sound cards, graphics cards, usb novelty devices excluding thumb drives), BIOS/CMOS.

If you boot into ultimate boot cd you can use an archane text interface to dump BIOS/CMOS and examine/checksum.

The real attacks which survive disk formats and wipes target your PCI devices and any firmware which may be altered/overwritten with something special. It is not enough to scan your hard drive(s) and thumb drives, the real dangers with teeth infect your hardware devices.

When is the last time you:

Audited your sound card for malware?
Audited your graphics card for malware?
Audited your network card for malware?

Google for:

* AGP and PCI rootkit(s)
* Network card rootkit(s)
* BIOS/CMOS rootkit(s)

Our modern PC hardware is capable of much more than many can imagine.

Do you:

  • Know your router’s firmware may easily be replaced on a hacker’s whim?
  • Shield all cables against leakage and attacks
  • Still use an old CRT monitor and beg for TEMPEST attacks?
  • Use TEMPEST resistant fonts in all of your applications including your OS?
  • Know whether or not your wired keyboard has keypresses encrypted as they pass to your PC from the keyboard?
  • Use your PC on the grid and expose yourself to possible keypress attacks?
  • Know your network card is VERY exploitable when plugged into the net and attacked by a hard core blackhat or any vicious geek with the know how?
  • Sarch out informative papers on these subjects and educate your friends and family about these attacks?
  • Contact antimalware companies and urge them to protect against many or all these attacks?

Do you trust your neighbors? Are they all really stupid when it comes to computing or is there a geek or two without a conscience looking to exploit these areas?

The overlooked threat are the potential civilian rogues stationed around you, especially in large apartment blocks who feed on unsecured wifi to do their dirty work.

With the recent news of Russian spies, whether or not this news was real or a psyop, educate yourself on the present threats which all antimalware scanners fail to protect against and remove any smug mask you may wear, be it Linux or OpenBSD, or the proprietary Windows and Mac OS you feel are properly secured and not vulnerable to any outside attacks because you either don’t need an antivirus scanner (all are inept to serious attacks) or use one or several (many being proprietary mystery machines sending data to and from your machine for many reasons, one is to share your information with a group or set database to help aid in threats), the threats often come in mysterious ways.

Maybe the ancients had it right: stone tablets and their own unique language(s) rooted in symbolism.

#

I’m more concerned about new rootkits which target PCI devices, such as the graphics card and the optical drives, also, BIOS. Where are the malware scanners which scan PCI devices and BIOS for mismatches? All firmware, BIOS and on PCI devices should be checksummed and saved to match with others in the cloud, and archived when the computer is first used, backing up signed firmware.

When do you recall seeing signed router firmware upgrades with any type of checksum to check against? Same for PCI devices and optical drives and BIOS.

Some have begun with BIOS security:

http://www.biosbits.org/

Some BIOS has write protection in its configuration, a lot of newer computers don’t.

#

“Disconnect your PC from the internet and don’t add anything you didn’t create yourself. It worked for the NOC list machine in Mission Impossible”

The room/structure was likely heavily shielded, whereas most civvies don’t shield their house and computer rooms. There is more than meets the eye to modern hardware.

Google:

subversion hack:
tagmeme(dot)com/subhack/

network card rootkits and trojans
pci rootkits
packet radio
xmit “fm fingerprinting” software
“specific emitter identification”
forums(dot)qrz(dot)com

how many malware scanners scan bios/cmos and pci/agp cards for malware? zero, even the rootkit scanners. have you checksummed/dumped your bios/cmos and firmware for all your pci/agp devices and usb devices, esp vanity usb devices in and outside the realm of common usb devices (thumbdrives, external hdds, printers),

Unless your computer room is shielded properly, the computers may still be attacked and used, I’ve personally inspected computers with no network connection running mysterious code in the background which task manager for windows and the eqiv for *nix does not find, and this didn’t find it all.

Inspect your windows boot partition in *nix with hexdump and look for proxy packages mentioned along with command line burning programs and other oddities. Computers are more vulnerable than most would expect.

You can bet all of the malware scanners today, unless they are developed by some lone indy coder in a remote country, employ whitelisting of certain malware and none of them scan HARDWARE devices apart from the common usb devices.

Your network cards, sound cards, cd/dvd drives, graphics cards, all are capable of carrying malware to survive disk formatting/wiping.

Boot from a Linux live cd and use hexdump to examine your windows (and *nix) boot sectors to potentially discover interesting modifications by an unknown party.

#
eof


livelyblog.com | Random blog | Login | Get your own blog | ^^^
anonymous.livelyblog.com/Login