Vanilla 1.1.9 is a product of Lussumo. More Information: Documentation, Community Support.

  1.  
    Posted By: maryyugoDura and Dunc must have a strange idea of what constitutes "due process" and searches requiring warrants from judges in the US. Oh sure, like anything else, they are sometimes abused or used in error but rarely. If the FBI has obtained permission to crack someone's safe or search their home, there is usually a pretty good reason. Why not a similar process for cracking an iPhone?

    And BTW, it does little good for law enforcement in the US to work around the reasonable search laws. If they do, the evidence and everything derived from it gets thrown out of court. All it takes is a half way educated defense lawyer.


    WITH SUPPORT FROM NANCY PELOSI, HOUSE GIVES TRUMP ADMINISTRATION BROAD LATITUDE TO SPY ON AMERICANS

    WITH BIPARTISAN BACKING, the House of Representatives passed a bill Thursday that would renew one of the government’s most sweeping surveillance authorities for six years with minimal changes.

    The measure, which passed 256-164, reauthorized Section 702 of the Foreign Intelligence Surveillance Act, which was set to expire later this month.

    The law was first passed in 2008 to legalize President George W. Bush’s warrantless wiretapping program. It allows the National Security Agency to collect Americans’ communications with people overseas, as long as the NSA is “targeting” the foreigners involved.

    The vote followed a morning of confusion, as President Donald Trump tweeted in opposition to the bill, referencing a conspiracy theory about then-President Barack Obama spying on the Trump campaign. He walked himself back two hours later, tweeting, “We need it! Get Smart!”

    The law serves as the legal backing for two mammoth NSA programs revealed by Edward Snowden: Upstream, which collects information from the internet junctions where data passes in and out of the country, and PRISM, which collects communications from U.S.-based internet companies, like Google, Microsoft, Apple, and Yahoo.

    The programs rest on the notion that they are “targeting” foreigners, but they also collect massive amounts of data on Americans, including wholly domestic communications. Amazingly, the intelligence community has never disclosed how much. Numerous members of Congress have requested an estimate since 2011, but both the Obama and Trump administrations have refused to provide one.

    The bill also consolidates the FBI’s legal authority to search those communications without a warrant. Under current rules, the NSA shares certain kinds of information it collects under Section 702 with the FBI, whose agents can then search it in the course of investigating crimes unrelated to national security. In a secret court hearing in 2015, a lawyer for the Justice Department compared the frequency of those searches to the use of Google.

    On Thursday, the House failed to pass an amendment to the bill offered by Rep. Justin Amash, R.-Mich., which would have required federal law enforcement agents to get a warrant before searching NSA data for information on Americans. The amendment was defeated 183-233, with 125 Democrats voting for it and 55 Democrats against, including Minority Leader Nancy Pelosi, D-Calif..

    As it is, the bill contains a cosmetic reform to the practice of “backdoor searches,” which requires the FBI to get a warrant whenever conducting searches related to an established criminal investigation. But it carves out massive exceptions, including for any investigation related to national security and whenever the FBI determines there is a “threat to life or serious bodily harm.” The issue is largely moot anyway because current rules allow the FBI to conduct queries even before opening an investigation.

    “Our right to privacy does not begin when the Department of Justice has a fully formed criminal case against us,” said Rep. Jerrold Nadler, D-N.Y., the top Democrat on the House Judiciary Committee, who spoke on the floor in support of the amendment. “The Constitution guarantees far more than this — our right to privacy protects us when the government first makes its decision to search our private communications for information it might find useful.”

    Democratic and Republican leadership both lined up to support the bill and oppose the amendment. “Respectful of debate on this issue, I myself will be voting to support my ranking member on the Intelligence Committee,” said Pelosi, referring to the bill’s roots in a template from the Intelligence Committee. “Weighing the equities, that’s the path I will take.”

    House Speaker Paul Ryan, R-Wisc., also spoke in support of the bill and against the amendment from a member of his own party, adding: “I want to thank [Pelosi] for coming up and speaking against the Amash amendment, and in favor of the underlying bipartisan [bill].”

    The bill’s passage follows a monthlong push by Republicans on the House Intelligence Committee to reauthorize Section 702 with as few reforms as possible. On multiple occasions, Rep. Devin Nunes, R-Calif., chair of the committee, circulated fliers with pictures of Islamic State fighters urging passage of the bill. This week, Nunes circulated a flier opposing the Amash amendment with pictures of the Boston Marathon explosion and the bomber, Dzhokhar Tsarnaev.

    Daniel Schuman, policy director for the progressive group Demand Progress, told The Intercept that by supporting the bill, Democrats in the leadership and on the Intelligence Committee were buying into Nunes’s tactics.

    “Seventy percent of Democrats voted to protect Americans against giving President Trump the ability to spy on all of us without first obtaining a warrant, as the Constitution requires,” Schuman told The Intercept by email. “Unfortunately, 55 Democrats, led by Rep. Adam Schiff, lent their support to legislation — and implicitly signed on to the racist, xenophobic language used by the Intelligence Committee majority — that expands domestic surveillance and gives reason for every American to be fearful of their government. A swing of just 26 Democrats would have defeated the measure.”

    (Emphasis mine)

    What was that you were saying again about warrants and "reasonable search laws", MY?
    •  
      CommentAuthorDuracell
    • CommentTimeJan 12th 2018
     
  2.  
    Perhaps the final part of the quiz
    •  
      CommentAuthorgoatcheez
    • CommentTimeJan 12th 2018
     
    WHY SENIORS NEVER RESET THEIR PASSWORDS

    WINDOWS:
    Please enter your new password.

    USER:
    cabbage

    WINDOWS:
    Sorry, the password must be more than 8 characters.

    USER:
    boiled cabbage

    WINDOWS:
    Sorry, the password must contain 1 numerical character.

    USER:
    1 boiled cabbage

    WINDOWS:
    Sorry, the password cannot have blank spaces

    USER:
    50damnboiledcabbages

    WINDOWS:
    Sorry, the password must contain at least one upper case character

    USER:
    50Cabbages

    WINDOWS:
    Sorry the password cannot use more than one upper case character consecutively.

    USER:
    50damnBoiledCabbagesShovedUpYo urAssIfYouDon'tGiveMeAccessNow !

    WINDOWS:
    Sorry, the password cannot contain punctuation.

    USER:
    ReallyPissedOff50DamnBoiledCab bagesShovedUpYourAssIfYouDontG iveMeAccessNow

    WINDOWS:
    Sorry, that password is already in use
    • CommentAuthorAsterix
    • CommentTimeJan 12th 2018
     
    So what OS was the malware targeted at? (Let me guess...)
    •  
      CommentAuthorDuracell
    • CommentTimeJan 12th 2018
     
    It’s not always Windows: Man charged with spying on thousands of Mac users for 13 years

    Besides the creep factor, a stunning thing about Fruitfly is that it is both unsophisticated and relatively easy to spot, yet according to the DoJ, Durachinsky was able to use it undetected from 2003 until January 2017, when he was arrested and jailed on another charge.
    • CommentAuthorAsterix
    • CommentTimeJan 12th 2018
     
    The indictment charges that while Durachinsky primarily used Fruitfly to infect Macs, he also wrote variants of Fruitfly that were capable of infecting computers running Windows.


    Strange that Linux isn't mentioned...
    •  
      CommentAuthorDuracell
    • CommentTimeJan 12th 2018
     
    Posted By: Asterix
    The indictment charges that while Durachinsky primarily used Fruitfly to infect Macs, he also wrote variants of Fruitfly that were capable of infecting computers running Windows.


    Strange that Linux isn't mentioned...
    Yes, especially when you consider that Mac OS is based on a BSD code base ...
    • CommentAuthorAsterix
    • CommentTimeJan 12th 2018 edited
     
    Yabut, Apple has morphed the hell out of 4.2BSD. I can recognize parts of it on a Mac, but that's about it.

    And Linux isn't BSD, by a long shot. It's similar and uses a lot of BSD/Unix ideas, but the code is apparently sui generis. The utilities, on the other hand, are a different story. You can see references to BSD in a lot Linux man pages.
    • CommentAuthorAsterix
    • CommentTimeJan 13th 2018
     
    •  
      CommentAuthorDuracell
    • CommentTimeJan 13th 2018
     
    Posted By: AsterixGot a recent Intel laptop? You should probably read this.


    To sidestep the password prompts, all an attacker needs to do is power up the target machine, and press CTRL+P during boot. The attacker then may log into Intel Management Engine BIOS Extension (MEBx) using the default password "admin",
    FFS ...
    • CommentAuthorAsterix
    • CommentTimeJan 13th 2018
     
    Well, it's better than "password" or "1234"...

    I suspect that less than !% of laptop owners are aware of MEBx.
    •  
      CommentAuthorDuracell
    • CommentTimeJan 13th 2018 edited
     
    I just simply cannot believe that in the aftermath of the IoT default password shambles ANY Internet enabled devices are STILL being manufactured / shipped with default passwords instead of random unique passwords. What a fucking joke ...
    • CommentAuthorAsterix
    • CommentTimeJan 29th 2018
     
    • CommentAuthorAsterix
    • CommentTimeJan 30th 2018
     
    •  
      CommentAuthorDuracell
    • CommentTimeJan 30th 2018
     
    InsaneCrypt ransomware spotted in the wild.

    After our analysis we have noticed that the Malware does not provide a way to input a key or UID to restore the partition table. It is currently unclear whether InsaneCrypt is yet another wiper masquerading as ransomware or if it is just poorly coded malware.


    That’s ... erm ... insane!
  3.  
    Once they've got their ransom, the data is unimportant to them.
    •  
      CommentAuthorDuracell
    • CommentTimeFeb 6th 2018
     
    Leaked NSA exploits work on all Windows versions since 2000


    Three US National Security Agency (NSA) exploits previously leaked by The Shadow Brokers have been tweaked so they now work on all vulnerable Windows 2000 through Server 2016 targets, as well as standard and workstation counterparts.

    Before this, EternalSynergy, EternalRomance, and EternalChampion had partially been used in the NotPetya cyber attack. However, they had not been used by malicious actors nearly as much as EternalBlue because they did not work on recent Windows versions. That has now changed thanks to RiskSense security researcher Sean Dillon (aka @zerosum0x0), who ported the Microsoft Server Message Block (SMB) exploits to work on Windows versions released over the past 18 years.

    Can you judge by a disclaimer how much reworked exploits might wreck your digital world? Dillon’s disclaimer warned:

    “This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorised. Authors and project maintainers are not responsible or liable for misuse of the software. Use responsibly.”

    The “new and improved” versions of these exploits were ported to the Metasploit Framework.

    How the exploits work
    Tripwire explained, “Each of the revised exploits boast remote command and code execution modules that rely on the zzz_exploit adaptation in that they exploit the SMB connection session structures to gain Admin/SYSTEM access. Unlike EternalBlue, EternalSynergy, EternalRomance, and EternalChampion do not use kernel shellcode to stage Meterpreter. Someone could still stage Meterpreter, a payload which comes with the Metasploit penetration testing software, but they would likely need to evade their payloads.”

    While that does not mean this is the end for EternalBlue, Dillon noted, “This module is highly reliable and preferred over EternalBlue where a Named Pipe is accessible for anonymous logins (generally, everything pre-Vista, and relatively common for domain computers in the wild).”

    Security researcher Kevin Beaumont tried it out and added that it is reliable and does not cause a Blue Screen of Death like EternalBlue does.

    According to Heimdal Security, “Instead of going for injecting a shellcode into a target system and taking control over it, attackers will try to overwrite the SMB (Server Message Block) connection session structures to gain admin rights over the system.”

    Dillon added, “Unlike EternalBlue, the exploit module will drop to disk (or use a PowerShell command).”

    In the span of a few short days, the newly modified exploits became two of the most popular tested modules for Metasploit.

    “It is worth mentioning that these exploits could have self-replicate abilities that enable to spread fast and impact lots of machines, so we urge you to apply all software patches available,” wrote Heimdal Security.

    Microsoft issued a patch in March 2017. If you haven’t deployed the fixes on your box yet, then it would be wise to do so now.

    Versions of Windows that can be exploited
    The reworked NSA exploits work on all unpatched versions, 32-bit and 64-bit architectures, of Windows since 2000. Dillon included this list of supported versions of Windows that can be exploited:

    Windows 2000 SP0 x86
    Windows 2000 Professional SP4 x86
    Windows 2000 Advanced Server SP4 x86
    Windows XP SP0 x86
    Windows XP SP1 x86
    Windows XP SP2 x86
    Windows XP SP3 x86
    Windows XP SP2 x64
    Windows Server 2003 SP0 x86
    Windows Server 2003 SP1 x86
    Windows Server 2003 Enterprise SP 2 x86
    Windows Server 2003 SP1 x64
    Windows Server 2003 R2 SP1 x86
    Windows Server 2003 R2 SP2 x86
    Windows Vista Home Premium x86
    Windows Vista x64
    Windows Server 2008 SP1 x86
    Windows Server 2008 x64
    Windows 7 x86
    Windows 7 Ultimate SP1 x86
    Windows 7 Enterprise SP1 x86
    Windows 7 SP0 x64
    Windows 7 SP1 x64
    Windows Server 2008 R2 x64
    Windows Server 2008 R2 SP1 x64
    Windows 8 x86
    Windows 8 x64
    Windows Server 2012 x64
    Windows 8.1 Enterprise Evaluation 9600 x86
    Windows 8.1 SP1 x86
    Windows 8.1 x64
    Windows 8.1 SP1 x64
    Windows Server 2012 R2 x86
    Windows Server 2012 R2 Standard 9600 x64
    Windows Server 2012 R2 SP1 x64
    Windows 10 Enterprise 10.10240 x86
    Windows 10 Enterprise 10.10240 x64
    Windows 10 10.10586 x86
    Windows 10 10.10586 x64
    Windows Server 2016 10.10586 x64
    Windows 10 10.0.14393 x86
    Windows 10 Enterprise Evaluation 10.14393 x64
    Windows Server 2016 Data Center 10.14393 x64
    • CommentAuthorAsterix
    • CommentTimeFeb 6th 2018
     
    Still convinced that Linux isn't a valid alternative?
    •  
      CommentAuthorDuracell
    • CommentTimeFeb 9th 2018