7 Million Dropbox users’ accounts credentials posted online


Hackers now-a-days targeting the users’ online accounts instead of credit or debit cards hack, don’t know why, but these hacks are being done on a large scale. Recently, Hackers posted nearly 7 Million dropbox users’ account credentials online, and this was claimed at that moment, but later various sources reported about the hack—IT is Real.

After the news came out, Dropbox reportedly started doing research on the hack, and later it is confirmed by the Anton Mityagin, a security engineer for Dropbox, that The Dropbox system are secure and these leaks are the result of any 3rd Party service hack, which users use to sync the dropbox users’ data.

Well, if a Hacker not able to hack the genuine place or stuff like in the Dropbox Hack, then he/she will go on to the 3rd Party Flaw, by which the targeted user account will be hacked, who uses that vulnerable 3rd Party service app or services.

leaked pictures from the Apple i Cloud server also seems to an example of a 3rd Party hack, as Apple too later confirmed about the hack, that it is not connected to the i Cloud Services, It could be a 3rd Party hack or a phishing attack.

 One of the person on the social site reddit, says that their are a total of 6,937,081 accounts whose credentials leaked online. Users on Reddit too confirmed the credentials by logging in and found many of them working.

Mityagin said that the attacker in this case used the stolen credentials across a variety of websites, with Dropbox just one of them.

Dropbox has certain security measures in effect that could pinpoint any suspicious attempts to log-in, with an automatic response of resetting the account’s password when such activity is detected, he added like these are one of the reasons why we strongly encourage users not to reuse passwords across services,” Mityagin said It is also recommended by the Dropbox that— users should use two-step verification system for their accounts.

“It’s a shared responsibility — the providers’ responsibility is to protect the service, but the users’ responsibility is to protect their credentials,” said Adallom senior vice president Tal Klein. “Every time you put data in the cloud, you need to do a quick summation of how valuable the data is and how it should be protected.”


Delhi cop posing as NRI transfers Rs 35 lakh into own account

PANAJI: A Delhi police constable posing as an NRI account holder in a nationalized bank branch in Goa transferred 35 lakh into his bank accounts in Delhi through an alleged fraudulent online transaction, but ran out of luck after cyber crime cell sleuths of Goa police cracked the hacking code and traced him with the booty.

Accused Neeraj Kumar, a constable attached to Lodhi colony police station, New Delhi, was nabbed by the Goa police on Thursday and brought to Goa. The original NRI customer, whose account he is said to have hacked, holds an account with a nationalized bank in Mapusa.

Police said that a complaint was received from the manager of the nationalized bank that based on an email sent to them by the accused who posed as the NRI customer based in Dubai the bank had transferred the amount into the account as per the email.

The account holding NRI customer was earlier a manager in the same bank and hence had a good rapport with the bank staff.

He used to transfer his money regularly by sending an email to the bank. Police suspect that the NRI account was hacked and his transactions were tailed by the accused. Knowing the system well, the Delhi constable used the methodology to commit the crime.

As soon as the customer got a message of the funds transfer, he complained to the bank that he had never made such a request. Soon after receiving the information from the NRI, the bank manager lodged a complaint before the cyber crime cell of Goa police. A case was registered on September 27, 2014, under Sections 468 (forging documents for forging purpose), 471 (using forged documents as genuine), 66 (hacking) and 66-D (forging documents through electronic means) of IT Act.

During investigations, police traced the IP address of the internet connection, registered from a Delhi address, from which the email was sent. Investigations showed that money was transferred to five different accounts.

Police said that the accused opened a bank account in a nationalized bank in Noida, Sector 19, in the name of Kumar Trading Company and the amount was transferred to this account through fraudulent means.

The accused then withdrew part of the amount using self cheques and ATM withdrawals and some amount was transferred to another account in the name of Shyam Trading company, Delhi, which also belonged to the accused.

The cyber crime cell consisting of inspector Rajesh Job and constable Amresh Rane rushed to Delhi and collected leads in the case while camping there for a week. They zeroed in on the constable. Police said that the accused has been suspended several times from service in the past.

Goa crime branch SP Karthik Kashyap said that two to three more persons involved in the case are on the run.

Here’s what hackers do with your data

The past few weeks have seen a flurry of hacker activity. From the leak of celebrity nudes to the 200,000 Snapchat photos stolen and posted on 4chan, to the most recent infiltration of Dropbox, it’s clear hackers have moved on from the days of stealing our credit card details. But what do hackers actually do with our data once they have stolen it?

The short answer is they sell it on the cybercriminals’ black market. According to a report released earlier this year by the RAND Corporation’s National Security and Research Division, the hacker market is highly sophisticated and organized. The hacker market has, in some respects, become more profitable than the illegal drug trade, that report found. The data hackers steal ends up on a network of illegal trading sites where they buy and sell large amounts of personal data for profit.

Gone are the days when credit card fraud and identity theft were all we had to worry about. Hackers have discovered new ways to make money with your photos and social media account information. To hackers, LinkedIn and eHarmony offer a goldmine of passwords that can be used to update their “rainbow tables.” These tables are basically huge databases that serve as a digital key for hacking harder-to-crack encrypted passwords, as Slate’s Will Oremus has explained. According to the RAND report, Twitter accounts are now more profitable than stolen credit cards.

Not even our medical records are safe. Don Jackson, director of threat intelligence at PhishLabs, monitored underground hacking exchanges and discovered cybercriminals make around 10 times more money hacking someone’s medical information than from stealing their credit card details, according to Reuters. By stealing names, birth dates, and policy numbers, hackers can create fake IDs to buy medical equipment which they can later resell. They can also use the data to file made-up insurance claims.

RAND’s report on cybercrime describes the cyber black market as a “Hackers’ Bazaar” that is becoming increasingly diverse in the products it offers. Some underground organizations can reach up to 80,000 people and bring in hundreds of millions of dollars by turning stolen account information into usable money.

The market is surprisingly competitive and undoubtedly lucrative. RAND predicts that the exploitation of social networks and mobile devices will only continue to grow as YouTube “how-to’s” and Google guides make it easier for people to get involved in stealing, buying, and selling information.

Internet-based phone hacking targets US SMBs

NEW YORK: Hackers in the US are targeting small businesses in a phone fraud through which they swindle millions of dollars, according to a media report which said revenue collected through a similar scheme authorities believe financed the 2008 Mumbai terror attacks.

The report in the New York Times said that the phone fraud scheme, easier to pull off on the web and more profitable, affects mostly small businesses and cost victims $4.73 billion globally last year.

It said catching the criminals is difficult because the crime can cross as many as three jurisdictions.

“In 2011, the Federal Bureau of Investigation and police in the Philippines arrested four men who used the scheme to make two million dollars in fraudulent calls; revenue was directed to a Saudi Arabian militant group that United States officials believe financed the 2008 Mumbai terrorist bombings,” it said.

According to telecommunications fraud experts, hackers sign up to lease premium-rate phone numbers, often used for sexual-chat or psychic lines, from one of dozens of web-based services that charge dialers over $1 a minute and give the lessee a cut.

With high-speed computers, they can make hundreds of calls simultaneously, forwarding as many as 220 minutes’ worth of phone calls a minute to the pay line.

The hacker gets a cut of the charges, typically delivered through a Western Union, MoneyGram or wire transfer.

While major carriers have sophisticated fraud systems in place to catch hackers before they run up false six-figure charges, small businesses often use local carriers, which lack such antifraud systems.

At this point, the law is not much help either, because no regulations require carriers to reimburse customers for fraud the way credit card companies must, the report said.

Last year, New York senator Charles Schumer pushed the Federal Communications Commission to adopt new regulations after dozens of small businesses around Albany were hit with the swindle.

Hackers from India, Pakistan in full-blown online war

NEW DELHI. Even as gunfire continues to be traded across the Indo-Pak border, a full-blown hacking and defacement war has erupted in cyberspace. On Thursday, over a dozen Indian and Pakistani websites were defaced by hackers from either side of the fence.

The website of the Press Club of India (PCI) in the capital was hacked and defaced, with the hackers’ message on the website’s home page claiming Pakistani origin.

A hacker group calling itself “Indian Hackers Online Squad” hacked and defaced the website of the Pakistan’s main opposition party, Pakistan People’s Party (PPP), http://www.ppp.org.pk on Wednesday, with one “Bl@k Dr@gon” claiming credit. On Thursday, the Pakistan railways website was hacked as well, the second time this year, with the same name appearing on the defaced page.

Responding to a Wednesday attack on Malayalam films actor Mohanlal’s website, a group called “The Mallu soldiers” defaced the website of Pakistan’s National University of Modern Languages. The websites of Quaid-e-Azam Public College in Gujranwala (http://qpc.edu.pk/), Pakistan Electric Power Company (Private) Limited (www.pepco.gov.pk) and National Manpower Bureau (www.nmb.com.pk) were also among the sites hacked by anonymous Indian hackers.

The “about me” page of singer Sonu Nigam’s official website and teammodi.in were also defaced by a group claiming to be “Pakistan Cyber Attackers”. Two Punjab news websites were also reported to have been hacked.

Cyber security consultant Rakshit Tandon says that he had been getting constant calls throughout Thursday to report these incidents. The hackers claimed to be from Pakistan and India. But Tandon feels it would be wiser to wait for the investigation to confirm their locations. “It is easy for someone to use a proxy server and claim to be coming from anywhere in the world,” says Tandon, also advisor to the Gurgaon cyber cell.

Even as the hackers continued well into Thursday night, hashtags like #BuzdilPakistan have been trending in India on Twitter, while the Paksitan top trends feature tags such as #CowardModi, #freekashmirfromindia, #IndiaIsTerrorist, and #SayNoToBollywood.

Asking people to calm down, Indo-Pak friendship group Aaghaz-E-Dosti has asked netizens not to ignite the tension. “We must know that for both the countries, peace is of utmost importance and also our common need is being focused on development rather than spending huge money of taxes for arms and ammunition…We believe that any dispute can be resolved only by talk and mutual negotiation and agreements and not with violence,” said a statement released by the group of youths from India and Pakistan.

A recent report from the Indian Computer Emergency Response Team (CERT-In) says the agency handled 71,780 cyber attacks and tracked 24216 Indian website defacements in 2013. “Most of the defacements were under ‘.in’ domain, in which a total 15490 ‘.in’ domain websites were defaced,” says the report.

The PPP defacement responded to party chairman and Bhutto family scion Bilawal Bhutto Zardari’s comments on taking back Kashmir from India. The website was defaced with memes deriding his comments on Kashmir. “To Citizens of Pakistan, Pakistan’s Army, Pakistan Peoples Party and Specially Mr. Bilawal Bhutto- Zardari. Without any Violence Let Me tell you that Pakistan will never Get Kashmir. This is the Truth. You Have to Accept it :)” said the message on the page.

Press Club of India officials said the breach on the PCI website took place about four days ago. The PCI has filed a complaint with the cyber crime cell in Mehrauli. This is the second time in three years that their website – pressclubofindia.org has been hacked.

The message on the defaced home page of the press club website read, “Our Target is your Government’s Websites … We will Inshalaah with The help of Many Muslim Hackers Take You Off From The InterneT ! Your Credit Cards , Your Bank’s Account , Your Servers … Are In Danger ! We Never Forget what You Do (sic) against the Humanity …In Jammu and Kashmir Millions Of People Were Dead…, Pakistan’s Muslims Are Killed In The Force’s Attacks… Indian Forces Destroyed Kashmir’s Families …Killed Innocent Childrens (sic)… But No One Cares !!!! You Want To Stop Us !! But Let me guess ! Can a Men (sic) Catch a Shadow ?!”

PCI officials said there was no risk of data being compromised as the website only featured public event details, daily menu updates and other such public information. “No data has been compromised and members have nothing to worry about. Only the home page has been defaced,” PCI general secretary Nadeem Ahmad Kazmi told TOI.

The periodic online attacks have been going on for some years. Pakistani newspaper The Express Tribune reported back in 2011, that Indian hackers had defaced the website of the Karachi Press Club. In 2010, a group of hackers identifying themselves as the “Indian Cyber Army” had reportedly defaced 36 Pakistani government websites. This, in turn had happened after the CBI website was defaced. In August this year, an Indian hacker group that calls itself “Black Dragon Indian Hacker Online Squad” hacked and defaced the official Pakistan railways website.

16-year-old Indian hacked Pakistan People’s Party site?

NEW DELHI: He goes by the alias “Bl@ck Dr@gon” and claims to be the one behind the hacking and defacement of the Pakistan People’s Party (PPP) website earlier this month. Bl@ck Dr@gon, the Indian hacker who says he is only 16 years old, pulled off one of the major hacking attacks in the massive cross-border website defacement activity earlier this month that saw over a dozen Indian and Pakistani websites hacked. On the defaced PPP website home page, he had left an email address.

Bl@ck Dr@gon told TOI in an email exchange that he and a group of hackers work in tandem to hack and deface websites, mostly as a means of self expression. The attack on the PPP website, which Bl@ck Dr@gon claims to have hacked all by himself, was in response to Bilawal Bhutto’s inflammatory statement on Kashmir.

“Statements of foolish politicians drive me to hack and deface these sites — it’s the way we express our thoughts. I think Indian cops shouldn’t have a problem if I hack Pakistani sites. Me and my team (sic) — Indian Hacker’s Online Squad — never hack Indian sites,” says the teenager, who did not divulge his real name. He also didn’t reply to TOI’s follow-up mail for more personal details.

Cyber lawyer Pavan Duggal points out that such actions would be liable for action, albeit only when reported. “If the hacking takes place through a computer resource located within India, it is punishable under section 43 and 66 of the Information Technology Act,” says Duggal

The news of a hacking or defacement activity is often quickly circulated through Facebook groups. In the recent attacks and counter attacks that took place in the Indo-Pak cyberspace by hackers from both sides of the border, the targets were varied. They included, among others, websites of Indian actor Mohanlal, singer Sonu Nigam, the Pakistan electricity board, a Lahore university institute, the Press Club of India.

While these may seem random, the choices are made with consideration. Reciprocity seems to trump an independent mandate or a set of principles. “Mainly we try to hack high rank/popular sites, or sites of famous people, so that our message easily gets conveyed to the government and the people. We try not to (harm) sites of innocent people, but as you know, Pakistani hackers are hacking Indian sites of innocent people so we don’t have a choice,” Bl@ck Dr@gon said.

All said and done, the recent hacking face-off revealed serious lacunae in website security on both sides of the border. “Government websites are not secure enough. The government should get their websites’ security tested and patched to prevent hacking,” says the student hacker, offering his and his team’s services to the Centre for free.

JPMorgan Chase Hacking Affects 76 Million Households


A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever.

The details of the breach — disclosed in a securities filing on Thursday — emerge at a time when consumer confidence in the digital operations of corporate America has already been shaken. Target, Home Depot and a number of other retailers have sustained major data breaches. Last year, the information of 40 million cardholders and 70 million others were compromised at Target, while an attack at Home Depot in September affected 56 million cards.

But unlike retailers, JPMorgan, as the largest bank in the nation, has financial information in its computer systems that goes beyond customers’ credit card details and potentially includes more sensitive data.

“We’ve migrated so much of our economy to computer networks because they are faster and more efficient, but there are side effects,” said Dan Kaminsky, a researcher who works as chief scientist at White Ops, a security company.

Until just a few weeks ago, executives at JPMorgan said they believed that only one million accounts were affected, according to several people with knowledge of the attacks.

As the severity of the intrusion — which began in June but was not discovered until July — became more clear in recent days, bank executives scrambled for the second time in three months to contain the fallout and to reassure skittish customers that no money had been taken and that their financial information remained secure.

The hackers appeared to have obtained a list of the applications and programs that run on JPMorgan’s computers — a road map of sorts — which they could crosscheck with known vulnerabilities in each program and web application, in search of an entry point back into the bank’s systems, according to several people with knowledge of the results of the bank’s forensics investigation, all of whom spoke on the condition of anonymity.

Operating overseas, the hackers gained access to the names, addresses, phone numbers and emails of JPMorgan account holders. In its regulatory filing on Thursday, JPMorgan said that there was no evidence that account information, including passwords or Social Security numbers, had been taken. The bank also noted that there was no evidence of fraud involving the use of customer information.

Still, until the JPMorgan breach surfaced in July, banks were viewed as relatively safe from online assaults because of their investment in defenses and trained security staff. Most previous breaches at banks have involved stealing personal identification numbers for A.T.M. accounts, not burrowing deep into the internal workings of a bank’s computer systems.

Even if no customer financial information was taken, the apparent breadth and depth of the JPMorgan attack shows how vulnerable Wall Street institutions are to cybercrime. In 2011, hackers broke into the systems of the Nasdaq stock market, but did not penetrate the part of the system that handles trades.


JPMorgan’s chairman and chief executive, has acknowledged the growing digital threat. In his annual letter to shareholders, Mr. Dimon said, “We’re making good progress on these and other efforts, but cyberattacks are growing every day in strength and velocity across the globe.”

Even though the bank has fortified its defenses against the attacks, Mr. Dimon wrote, the battle is “continual and likely never-ending.”

On Thursday, some lawmakers weighed in. Edward J. Markey, Democrat of Massachusetts and a member of the Senate Commerce Committee, said “the data breach at JPMorgan Chase is yet another example of how Americans’ most sensitive personal information is in danger.”

Hackers drilled deep into the bank’s vast computer systems, reaching more than 90 servers, the people with knowledge of the investigation said. As they analyze the contours of the breach, investigators in law enforcement remain puzzled, partly because there is no evidence that the attackers looted any money from customer accounts.

That lack of any apparent profit motive has generated speculation among the law enforcement officials and security experts that the hackers, which some thought to be from Southern Europe, may have been sponsored by elements of the Russian government, the people with knowledge of the investigation said.

By the time the bank’s security team discovered the breach in late July, hackers had already obtained the highest level of administrative privilege to dozens of the bank’s computer servers, according to the people with knowledge of the investigation. It is still unclear how hackers managed to gain such deep access.

The people with knowledge of the investigation said it would take months for the bank to swap out its programs and applications and renegotiate licensing deals with its technology suppliers, possibly giving the hackers time to mine the bank’s systems for unpatched, or undiscovered, vulnerabilities that would allow them re-entry into JPMorgan’s systems.

Beyond its disclosures, JPMorgan did not comment on what its investigation had found. Kristin Lemkau, a JPMorgan spokeswoman, said that describing the bank’s breach as among the largest was “comparing apples and oranges.”

Preparing for the disclosure on Thursday, JPMorgan retained the law firm WilmerHale to help with its regulatory filing with the Securities and Exchange Commission, people with knowledge of the matter said. Earlier on Thursday, some executives — Barry Sommers, the chief executive of Chase’s consumer bank — flew back to New York from Naples, Fla., where they had convened for a leadership conference, these people said.

The initial discovery of the hack sent chills down Wall Street and prompted an investigation by the Federal Bureau of Investigation. The bank was also forced to update its regulators, including the Federal Reserve, on the extent of the breach.

Faced with the rising threat of online crime, JPMorgan has said it plans to spend $250 million on digital security annually, but had been losing many of its security staff to other banks over the last year, with others expected to leave soon.

Hackers Charged for Stealing Data and Software From US Army, Xbox


Four members of an international hacking ring were charged with cracking the networks of the US Army and developers of blockbuster war video games to steal software, prosecutors said Tuesday.

Two of the men entered guilty pleas in the case, which centers on the”cyber theft” of at least $100 million worth of software and data, according to the Justice Department.

The hackers are accused of breaking into programs used for the Army’s Apache helicopter pilot training, Microsoft’s Xbox One consoles, and yet-to-be released video games “Gears of War 3″ and “Call of Duty: Modern Warfare 3.”

Those charged in the case teamed with others in the US and abroad to hack into networks of Microsoft, Epic Games, Valve Corporation, and the US Army, according to the indictment.

“Members of this international hacking ring stole trade secret data used in high-tech American products, ranging from software that trains US soldiers to fly Apache helicopters to Xbox games that entertain millions around the world,” assistant attorney general Leslie Caldwell said.

An indictment returned in April and unsealed Tuesday charged the four with conspiracy to commit computer fraud, theft of trade secrets and other offenses.

Those named in the indictment were Nathan Leroux, 20, of Bowie, Maryland; Sanadodeh Nesheiwat, 28, of Washington, New Jersey; David Pokora, 22, of Mississauga, Canada; and Austin Alcala, 18, of McCordsville, Indiana.

Additionally, an Australian citizen has been charged under Australian law for his alleged role in the conspiracy, officials said, without identifying the suspect.

Officials said Pokora and Nesheiwat pleaded guilty in a Delaware federal court to some of the charges and are scheduled for sentencing on January 13.

Pokora was arrested on March 28, at the US-Canada border in Lewiston, New York. Officials said Pokora is believed to be the first person based outside the United States convicted of hacking into US businesses to steal trade secret information

According to the indictment, the group hacked into networks to steal the source code, technical specifications and related information for Microsoft’s then-unreleased Xbox One gaming console, and other proprietary data related to the online gaming platform Xbox Live.

Other trade secrets stolen were from the Apache helicopter simulator software developed by Zombie Studios for the US Army and a pre-release version of Epic’s video game “Gears of War 3.”

The value of the stolen intellectual property and other losses was estimated between $100 million and $200 million.

Officials said they had seized over $620,000 in cash and other proceeds from the suspects.

This case is being investigated by the FBI, with assistance from the Department of Homeland Security, the US Postal Inspection Service and in coordination with the Western Australia Police and the Peel Regional Police of Ontario, Canada.


Europe’s Police Need Data Law Changes to Fight Cybercrime: Europol


Law enforcers in Europe need greater powers to retain data for longer in order to catch cybercriminals selling discrete services that police cannot trace under existing regulations, according to a Europol report published on Monday.

Cybercrime is increasingly conducted by a highly specialised chain of software break-in experts, underground market-makers and buy-side fraudsters who convert stolen passwords and identities into financial gains. Criminals can keep data for months or even years before using it to defraud victims.

The study, entitled “The Internet Organised Crime Threat Assessment” by the EU’s criminal intelligence agency, says because laws limit how much data can be held and for how long, police cannot effectively trace and prosecute criminals.

Tougher laws for investigating and prosecuting cybercrime also need to be harmonised across the bloc, the report said.

“The majority of intelligence and evidence for cyber investigations comes from private industry. With no data retention, there can be no attribution and therefore no prosecutions,” says Europol of criminals who often operate beyond EU borders in Eastern Europe and beyond.

Europol also says the pool of cyberfraudsters is growing.

“Entry barriers into cybercrime are being lowered, allowing those lacking technical expertise including traditional organised crime groups to venture into cybercrime by purchasing the skills and tools they lack,” it said.

While providing no specific numbers, the agency says that the scale of financial losses due to online fraud has surpassed damages to payment from physical credit and other payment cards. Losses are huge, not just for card issuers but also for airlines, hotels and online retailers, the report states.

In other recommendations, it also warns about the abuse of anonymous virtual currency schemes such as Bitcoin, pointing to a “considerable challenge in tracking such transactions or even identifying activities such as money laundering”.

The agency highlights the role of anonymous, private networks, known as Darknets, in enabling a vast underground trade in drugs, weapons, stolen goods, stolen personal and payment card data, forged documents and child pornography.

Europol’s report capitalises on a growing body of literature from academic and private sector cyber threat researchers that have traced the rise of such online criminal marketplaces trading in billions of personal financial details.

“The future is already here”
Cybercriminals are cashing in on the latest Internet trends such as Big Data, Cloud Computing and The Internet of Things, allowing them to rent massive computing power to analyse vast troves of data gathered from the ever-expanding range of connected devices in homes, cars and on consumers themselves.

For example, the report finds that “Big Data” predictive software is now used by criminals to identify the most lucrative targets for credit card fraud and to improve methods of tricking consumers into divulging more personal data for later attacks.

“The future is already here,” the Europol study states.

The agency describes the rise of what it labels “Crime-as-a-Service”, running illicit activities via a network of independent suppliers, mimicking parts of the “Software as a Service” playbook that drives top Web companies, including Salesforce, Amazon.com and Google.

Crime-as-a-Service offerings include:
Data as a service collects huge volumes of compromised financial data such as credit cards and bank account details and bundles it with standard personal ID info. Such specialisation allows the massive automation of both online and offline fraud.

Pay-per-install, another service, is a means of distributing malware to comprised computers, by country or demographic, expediting both online and offline fraud because it frees fraudsters from having to steal personal data themselves.

Translation services, in which native speakers are hired to convert phishing or spam attacks written in one language into convincing, grammatically correct scripts in other tongues.

Money laundering services act as bridges to cash out from digital or physical world financial systems, often using money mules as go-betweens.