Vancouver-based Burgerville hit by data breachMalware in the company’s computer network may have stolen customer credit card data
Burgerville announced Wednesday that its network had been hit by a cybersecurity breach that may have resulted in...

Vancouver-based Burgerville hit by data breach


Malware in the company’s computer network may have stolen customer credit card data

Burgerville announced Wednesday that its network had been hit by a cybersecurity breach that may have resulted in customers’ credit and debit card information being compromised, including names, card numbers, expiration dates and three-digit CVV numbers.

The company is urging anyone who used a credit or debit card at a Burgerville location between September 2017 and Sept. 30, 2018 to review their statements and credit reports for unauthorized charges. The breach is now contained, the company said in a press release.

Burgerville is also urging customers to consider freezing their credit, which can be done for free by contacting the three major credit bureaus: Equifax, Experian and TransUnion. The total number of affected customers was not immediately clear, the company said, but no personal information appears to have been compromised other than the payment card data.

The FBI notified Burgerville of the breach on Aug. 22, and the company said it cooperated with the FBI and began its own forensic investigation with the assistance of a third-party cybersecurity team. The company said it initially believed the breach had been a brief intrusion, but discovered on Sept. 19 that malware was still active on its network and collecting data.

In response to questions about why Burgerville didn’t notify the public at an earlier date, a spokesperson said the company agreed to keep the breach confidential to assist the FBI investigation and make sure the hackers’ entry pathways were uncovered.

Once the active breach was discovered on Sept. 19, the company began preparing to fix it, which required first identifying all of the hackers’ pathways into the system and then taking Burgerville’s systems offline so that they could be simultaneously updated to close all the pathways.

The operation was completed Sunday, the company said, but had to be kept confidential beforehand in order to prevent the hackers from finding out about it in advance and creating new covert pathways into the company’s network.

Burgerville’s press release says the malware was believed to have been placed in its network by hackers from FIN7, an international cybercrime group. According to an FBI press release in August, the group has targeted more than 100 U.S. companies with “highly sophisticated” malware attacks since 2015, often in the restaurant and hospitality industries.

Companies in 47 states have been affected, according to the FBI, as well as companies in Australia, France and the United Kingdom. Chipotle, Chili’s, Arby’s and Red Robin have all previously been targeted by FIN7 attacks, as well as several companies in Western Washington, such as the Emerald Queen Casino.

The group typically used a technique called “spear phishing” to infiltrate company networks, according to the FBI. The cyberattack group sent emails to employees at affected companies that were designed to mimic the appearance of official company communications. The intent, the FBI says, was to trick employees into opening malware-infected attachments contained in the email. The emails were often accompanied by phone calls in order to create a greater appearance of legitimacy.

Once opened, the malware gave FIN7 access to the company’s computers in order to steal information including credit card numbers. The group has stolen data from more than 15 million cards since 2015, according to the FBI, and later sold the data through underground marketplaces.

“Beyond a breach of information, this type of intrusion impacts our entire community — Burgerville’s customers, vendor partners, employees, and the entire eco-system of the place we call home, the Pacific Northwest,” Burgerville interim CEO Jill Taylor said in a statement. “Unfortunately, these types of breaches are all too common today and they are taking a toll on people’s ability to feel safe and to trust one another — core tenets of building a resilient community. From our mission: Serve With Love, we stand committed to being a good partner and helping to build confidence with the community that has given us so much.”

Source Code: https://www.columbian.com


Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

Evil Maid Attack We have seen several stories of journalists, politicians and other targets talking about having their machines hacked inside hotel rooms. These type of attacks (known as an “evil maid attack) are so popular for scenarios where...

                                       Evil Maid Attack 


We have seen several stories of journalists, politicians and other targets talking about having their machines hacked inside hotel rooms. These type of attacks (known as an “evil maid attack) are so popular for scenarios where attackers have physical access to the device that Edward Snowden went ahead to create a free tool to secure your devices when you have to leave your devices in a hotel room, even if for just a few minutes.

These attacks don’t need a lot of time since anyone with physical access, the right tools, and some skills can break into a room to install malware that is nearly impossible to detect. In an effort to raise awareness around the issue, security researchers have shared a demo video showing how easy these attacks are to pull off.

“Physical attacks are hard to defend against and most people aren’t doing anything to defend against them,” John Loucaides of Eclypsium told Motherboard. “It’s not that hard of a attack to pull off as most people think.”

In the demo, Mickey Shkatov, one of the security researchers at Eclypsium, is shown opening up a laptop that he then connects with a device, and proceeds to install malicious firmware onto the chip that contains the BIOS. How long did it take him? Less than 5 minutes and that too on an enterprise machine. 

Researchers wrote that the ease and “tools and techniques make firmware rootkits accessible to non-experts, even a ‘script kiddie’,” ensuring that even not-so-experts can install a firmware backdoor on a laptop in a few minutes.

While this type of an “evil maid attack” takes someone to have physical access to your laptop, it’s not such a difficult feat as many believe. Spies, security researchers, and politicians aren’t the only targets. The ease and availability of these tools enable everyone – even your friends and foes – to get access to your devices. However, to get access to your devices, the attacker does need to learn about your whereabouts and when exactly you are out of your hotel room. Suddenly those Instagram vacay pics no longer look so harmless…

Source code: https://blog.eclypsium.com/2018/07/23/evil-mai%EF%BB%BFd-firmware-attacks-using-usb-debug/

Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

Hackers hijack Tesla’s cloud system to mine cryptocurrency
Hackers hijack Tesla’s cloud system to mine cryptocurrency 11:29 AM ET Wed, 21 Feb 2018 | 00:53
Tesla’s cloud system was hijacked by hackers who used it to mine cryptocurrency, according to...
image

Originally posted by teslamodel3

Hackers hijack Tesla’s cloud system to mine cryptocurrency


Hackers hijack Tesla’s cloud system to mine cryptocurrency  11:29 AM ET Wed, 21 Feb 2018 | 00:53

Tesla’s cloud system was hijacked by hackers who used it to mine cryptocurrency, according to researchers.

Hackers were able to infiltrate the automaker’s Kubernetes administration console because it was not password protected, cybersecurity firm RedLock said Tuesday. Kubernetes is a Google-designed system aimed at optimizing cloud applications.

This left access credentials for Tesla’s Amazon Web Services (AWS) account exposed, and hackers deployed cryptocurrency mining software called Stratum to mine cryptocurrency using the cloud’s computing power.

Cryptocurrency mining is a process whereby so-called miners solve complex mathematical problems to validate a transaction and add it to the underlying network.

RedLock did not specify which cryptocurrency was mined in the cyber breach.

Other major firms, including British insurer Aviva and Dutch SIM-maker Gemalto, were affected by similar problems, RedLock said. But the incident affecting Tesla’s cloud system was more sophisticated, and used a number of different strategies to hide the hackers from being detected.

RedLock said that it notified Tesla of the cyber exposure and that it was swiftly rectified.

Tesla said that it did not see any initial impact on customer data protection or the safety and security of its vehicles.

“We maintain a bug bounty program to encourage this type of research, and we addressed this vulnerability within hours of learning about it,” a spokesperson for Tesla said in an emailed statement.

“The impact seems to be limited to internally-used engineering test cars only, and our initial investigation found no indication that customer privacy or vehicle safety or security was compromised in any way.”

RedLock CTO Gaurav Kumar said businesses should monitor suspicious cyber activities to avoid being compromised.

“The message from this research is loud and clear — the unmistakable potential of cloud environments is seriously compromised by sophisticated hackers identifying easy-to-exploit vulnerabilities,” Kumar said in a statement Tuesday.

“In our analysis, cloud service providers such as Amazon, Microsoft and Google are trying to do their part, and none of the major breaches in 2017 was caused by their negligence.”

He added: “However, security is a shared responsibility. Organizations of every stripe are fundamentally obliged to monitor their infrastructures for risky configurations, anomalous user activities, suspicious network traffic, and host vulnerabilities. Without that, anything the providers do will never be enough.”

What is ‘cryptojacking’?

This incident marks another case of what is known in the cryptocurrency world as “cryptojacking.”

Cryptojacking is a process whereby hackers deploy software that exploits a computer’s CPU (central processing unit) to mine cryptocurrency.

Earlier this month, it was revealed that hackers had deployed an altered version of the popular plugin Browsealoud to a number of government websites in the U.K., the U.S. and Australia.

This version of Browsealoud infected the government websites with Coinhive code, which is used to generate units of privacy-focused cryptocurrency monero.

U.S. online news outlet Salon is even asking visitors to its site who use ad blocking plugins if it can use their computing power to mine moneroinstead.


Source: ABC news


Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

Computer Virus Hits Tim Hortons Locations, Causing ClosuresA group representing a large cohort of Tim Hortons franchisees is threatening legal action against the coffee chain’s parent company after a computer virus knocked cash registers offline at...
image

Originally posted by v1r0l0gy

Computer Virus Hits Tim Hortons Locations, Causing Closures


A group representing a large cohort of Tim Hortons franchisees is threatening legal action against the coffee chain’s parent company after a computer virus knocked cash registers offline at an unconfirmed number of stores.

In a letter addressed to Restaurant Brands International CEO Daniel Schwartz, a lawyer representing the Great White North Franchisee Association (GWNFA) said there have been “significant losses as a result of the current attack” and insists a meeting be convened no later than Friday to discuss the ongoing situation.

“Should you refuse to meet with our clients to resolve this important problem, our clients shall unfortunately be left with no alternative but to pursue litigation,” GWNFA’s attorney Peter Proszanski wrote on Monday.

He claims impacted Tim Hortons locations have suffered store closures, lost employee wages, lost sales, and food spoilage as a direct result of the malware-infected point-of-sale terminals. Resolving the issue and compensating franchise owners for their losses without delay is “of the utmost importance,” he stated.

The fast-food giant told The Canadian Press it is working with an external vendor to address a virus causing intermittent cash register outages, and no consumer data or credit card information has been compromised.

The Globe and Mail reported that fewer than 100 restaurants were currently affected, and fewer than 10 were unable to operate their point-of-sale system. The malware first affected Tim Hortons’ point-of-sale terminals a week ago, according to a source who spoke to the Business News Network on the condition of anonymity.

The crashing cash registers follow a number of other clashes between some restaurant owners, Tim Hortons and Restaurant Brands over changes to employee pay due to Ontario’s minimum wage increases, expanding menu options, and corporate cost-cutting.

“The public relations debacle related to the minimum wage increase in Ontario is causing tremendous downward pressure on the value of the Tim Horton’s brand,” Proszanski wrote.

This latest misfortune struck during the company’s widely-popular “Roll Up the Rim” promotion, which has been beset with problems of its own this year. The company distributed a small batch of misprinted cups with no messages under the rim in Atlantic Canada and Alberta.

Adding to the sting of Restaurant Brands’ cost-cutting, sales at the coffee-and-doughnut chain sagged for a fifth straight quarter while the parent company outperformed expectations for its fourth quarter results earlier this month.

Proszanski stated that while Restaurant Brands has provided franchise owners with “partial answers” regarding its efforts to minimize downtime related to the virus, a number of serious questions have not been addressed. Among those: how the outage happened, when Restaurant Brands become aware of the risk, and will hardware manufacturer Panasonic, reimburse franchisees for their losses.

Frustration is brewing over the faulty cash registers, according to BNN’s source.

“The cash registers just plain don’t work,” the source said. “Many of the stores had to close totally. Some had to close their drive-thrus and have customers go into the stores to one or two working registers.”

Tim Hortons customer Ben Verret tweeted a photo of a customer-facing monitor displaying an error message at a Levis, Que location on Tuesday. The screen reads, “A recent hardware or software change might have caused this.”

image

Tim Hortons did not respond to CTV’s requests for comment by publication time.


When More information is released our blog will be updated for my new’s clicks below 


Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

RSA Conference 2018 takes place April 16 to 20 in San Francisco!
About RSA ConferenceInformation is power. And wherever there’s power, there are people looking to steal it. But that’s also where you’ll find us. We’re RSA Conference. And we’re here to...
image

Originally posted by glitchblackmusic

RSA Conference 2018 takes place April 16 to 20 in San Francisco!


About RSA Conference

Information is power. And wherever there’s power, there are people looking to steal it. But that’s also where you’ll find us. We’re RSA Conference. And we’re here to stand against cyberthreats around the world.

That means being here for you. Connecting you with the people and insights that will empower you to stay ahead of cyberthreats. We do this through our online outreach and with our events around the globe. And we make a great host, if we do say so ourselves.

Some say it’s impossible to stay ahead of cybersecurity threats. We disagree. We’ll always be here as your go-to resource for exchanging ideas, learning the latest trends and finding the solutions for a more secure tomorrow.

We’re here. Where are you?

Not to brag, but collectively our conferences draw over 50,000 attendees per year, more than any other conference out there. Why? Two words. Valuable content. And the networking. And the inspiration. Ok so that’s more than two words. It’s hard not to get carried away because we’re so passionate about finding new industry voices and new ways for our community to feel inspired and engaged.

So, want to be better prepared for tomorrow’s challenges? Connect with RSA Conference today. You’ll feel smarter for doing it.

Take this opportunity to learn about new approaches to info security, discover the latest technology and interact with top security leaders and pioneers. Hands-on sessions, keynotes and informal gatherings allow you to tap into a smart, forward-thinking global community that will inspire and empower you.

Register today and save $1,000 on a Full Conference Pass!


Agenda

The RSA Conference 2018 Agenda is here to help you with your planning. Based on its popularity last year, we’ll be bringing back Reserve a Seat for RSAC 2018. Please check back periodically as we’ll continue to update this page as we get closer to Conference.*

SATURDAY, APRIL 14

Registration

1 PM – 5 PM | Moscone West, Level 1

SUNDAY, APRIL 15

Registration

7 AM – 6 PM | Moscone West, Level 1

Trainings & Tutorials

9 AM – 5 PM

MONDAY, APRIL 16

Shuttles

7 AM – 8 PM

Registration

7 AM – 7 PM | Moscone West, Level 1

Trainings & Tutorials

9 AM – 5 PM

Seminars

8:30 AM – 5 PM

RSAC Innovation Sandbox Contest

1:30 – 4:30 PM

Welcome Reception

5 – 7 PM | Expo Halls

TUESDAY, APRIL 17

Shuttles

6:30 AM – 7 PM

Registration

6:30 AM – 6 PM | Moscone West, Level 1

Opening Keynote

8 – 10:30 AM | Moscone West, Level 3

Expo

10 AM – 6 PM

Sessions

1:15 – 4:30 PM

WEDNESDAY, APRIL 18

Shuttles

6:30 AM – 7 PM

Registration

6:30 AM – 6 PM | Moscone West, Level 1

Sessions

8 – 10 AM

Expo

10 AM – 6 PM

Keynotes

10:30 AM – 12 PM | Moscone West, Level 3

Forums

12:30 – 1:15 PM

Sessions

1:30 – 3:30 PM

Keynotes

4 – 4:45 PM | Moscone West, Level 3

THURSDAY, APRIL 19

Shuttles

6:30 AM – 10:30 PM

Registration

6:30 AM – 6 PM | Moscone West, Level 1

Sessions

8 – 10 AM

Expo

10 AM – 3 PM

Keynotes

10:30 AM – 11:40 AM | Moscone West, Level 3

Forums

12:30 – 1:15 PM

Sessions

1:30 – 3:30 PM

Keynotes

4 – 5:10 PM | Moscone West, Level 3

RSAC Bash

7:30 – 10:30 PM

FRIDAY, APRIL 20

Shuttles

8 AM – 3 PM

Registration

8 AM – 2 PM | Moscone West, Level 1

Sessions

9 AM – 12:15 PM

Closing Keynote

1 – 2 PM | Moscone West, Level 3

*The agenda is subject to change.


Hope to see you all at RSA 2018 Register now click the link below:

https://www.rsaconference.com/events/us18/register?utm_source=bing&utm_medium=cpc&utm_campaign=US%20-%20Branded%20-%20Key%20States&utm_term=%2Brsa%20%2Bsan%20%2Bfrancisco&utm_content=RSA%20-%20San%20Francisco



Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

California computer scientists develop simple data breach detection tool Computer scientists at the University of California (UC) San Diego have built and successfully tested a tool designed to detect when websites have fallen victim to a data...
image

Originally posted by scipunk

California computer scientists develop simple data breach detection tool


Computer scientists at the University of California (UC) San Diego have built and successfully tested a tool designed to detect when websites have fallen victim to a data breach, by monitoring the activity of email accounts associated with them.

During the 18-month study period, the researchers found that close to 1pc of the websites they tested had suffered a data breach, regardless of the audience and reach size.

Although 1pc doesn’t seem like much on first glance, when you consider that there are more than 1bn sites on the internet, this translates to roughly 10m websites that could be affected by a data breach annually.

A data breach is a case of when, not if

Alex C Snoeren, a professor of computer science at the Jacobs School of Engineering at UC San Diego and the paper’s senior author, said: “No one is above this – companies or nation states – it’s going to happen, it’s just a question of when.”

Researchers found that popular sites were just as likely to be hacked as unpopular ones, which translates to 10 out of the top 1,000 most visited sites on the internet potentially falling victim to a data breach.

Joe DeBlasio, the first author of the paper, said: “1pc of the really big shops getting owned is terrifying.”

The detection tool was presented in November at the ACM Internet Measurement Conference in London. The concept behind the tool is called TripWire.

DeBlasio created a bot that registers and creates accounts on a large number of websites (approximately 2,300 were included in this study). Each account is associated with a unique email address.

The tool was designed to use the same password for both the email account and the website account associated with each email. Researchers then bided their time to see if an outside party used the password to access the email account, which would indicate the website’s account information had been leaked.

Researchers also had to ensure the breach was related to hacked websites and not the email provider or their own infrastructure, so a control group was set up consisting of more than 100,000 email accounts created with the same provider used in the study. These addresses weren’t used to register on websites, and none of them were found to have been accessed by hackers.

19 websites were determined to have been hacked, including a well-known US start-up with more than 45m active customers. Once the accounts had been breached, the security teams of the affected sites were warned, and emails and phone calls were exchanged.

Snoeren said he was “heartened” by the serious response from the large sites that had been affected, but was surprised that none of the affected sites acted on the results of the study by disclosing their respective breaches to customers.

He continued: “The reality is that these companies didn’t volunteer to be part of this study.

“By doing this, we’ve opened them up to huge financial and legal exposure. So, we decided to put the onus on them to disclose.”

Breaches often used to leverage data harvesting

Very few of the breached accounts were used to send spam. Instead, hackers mostly monitored email traffic, which researchers speculated was in order to harvest valuable information such as credit card or banking details.

Researchers then took things up a notch, creating at least two accounts per website. One account had easy password strings of seven-character words, with a capitalised first letter and single digit at the end. The other account had harder passwords of 10-character strings of numbers and letters in both upper and lower case.

Seeing which of the two accounts were breached allowed researchers to make an educated guess about how websites store passwords. If both the easy and hard passwords were hacked, the website likely just stores them in plain text, in violation of best practice. If only the account using the easy password was breached, the sites likely used a more sophisticated method for password storage – an algorithm that turns passwords into a random string of data, with random information added.

The researchers had some advice for users: don’t reuse passwords, use a password manager and question how much you really need to disclose online.

Snoeren asked: “Why do they need to know your mother’s real maiden name and the name of your dog?”

The researchers hope that companies avail of the tool themselves, and said any major email provider could provide the service. By using the tool, an organisation could be better armed against a data breach.


Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

North Carolina County Refuses to Pay $23K Ransom to Hacker Who Froze Servers Deputies processed arrests by hand and building code officers used paper records Wednesday as one of North Carolina’s largest counties was hit by a hacker who froze county...

North Carolina County Refuses to Pay $23K Ransom to Hacker Who Froze Servers


image

Originally posted by altruistech

Deputies processed arrests by hand and building code officers used paper records Wednesday as one of North Carolina’s largest counties was hit by a hacker who froze county servers and demanded ransom.

Mecklenburg County Manager Dena Diorio told reporters that officials faced a deadline of 1 p.m. Wednesday to decide whether to pay a ransom of two bitcoins, or more than $23,000. Bitcoin is a digital currency used around the world and favored by hackers because it can often be exchanged online anonymously.

When more information is released our blog will be updated

Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

Whole Foods says customer payment information was hackedWhole Foods says the credit and debit card information of customers who bought meals or drinks at its in-store restaurants or bars were exposed to hackers.
The grocer, which was recently...
image

Originally posted by aaronnieh

Whole Foods says customer payment information was hacked


Whole Foods says the credit and debit card information of customers who bought meals or drinks at its in-store restaurants or bars were exposed to hackers.

The grocer, which was recently acquired by Seattle-based online retailer Amazon.com Inc., says the data breach did not affect its main checkout registers or any Amazon.com shoppers.

Whole Foods did not say which of its 470 stores were affected, and a spokeswoman declined to answer any questions. The Whole Food stores that do have in-store restaurants and bars tend to be in or near cities.

Whole Foods says it is investigating the hack.


When more information is released our blog will be updated 

Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

Kali Linux 2017.2 Release New Hacking Tools We are happy to announce the release of Kali Linux 2017.2, available now for your downloading pleasure. This release is a roll-up of all updates and fixes since our 2017.1 release in April. In tangible...

Kali Linux 2017.2 Release New Hacking Tools 


We are happy to announce the release of Kali Linux 2017.2, available now for your downloading pleasure. This release is a roll-up of all updates and fixes since our 2017.1 release in April. In tangible terms, if you were to install Kali from your 2017.1 ISO, after logging in to the desktop and running ‘apt update && apt full-upgrade’, you would be faced with something similiar to this daunting message:

1399 upgraded, 171 newly installed, 16 to remove and 0 not upgraded.

Need to get 1,477 MB of archives.

After this operation, 1,231 MB of additional disk space will be used.

Do you want to continue? [Y/n]

That would make for a whole lot of downloading, unpacking, and configuring of packages. Naturally, these numbers don’t tell the entire tale so read on to see what’s new in this release.

New and Updated Packages in Kali 2017.2

In addition to all of the standard security and package updates that come to us via Debian Testing, we have also added more than a dozen new tools to the repositories, a few of which are listed below. There are some really nice additions so we encourage you to ‘apt install’ the ones that pique your interest and check them out.

  • hurl – a useful little hexadecimal and URL encoder/decoder
  • phishery – phishery lets you inject SSL-enabled basic auth phishing URLs into a .docx Word document
  • ssh-audit – an SSH server auditor that checks for encryption types, banners, compression, and more
  • apt2 – an Automated Penetration Testing Toolkit that runs its own scans or imports results from various scanners, and takes action on them
  • bloodhound – uses graph theory to reveal the hidden or unintended relationships within Active Directory
  • crackmapexec – a post-exploitation tool to help automate the assessment of large Active Directory networks
  • dbeaver – powerful GUI database manager that supports the most popular databases, including MySQL, PostgreSQL, Oracle, SQLite, and many more
  • brutespray – automatically attempts default credentials on discovered services

On top of all the new packages, this release also includes numerous package updates, including jd-gui, dnsenum, edb-debugger, wpscan, watobo, burpsuite, and many others. To check out the full list of updates and additions, refer to the Kali changelog on our bug tracker.

Ongoing Integration Improvements

Beyond the new and updated packages in this release, we have also been working towards improving the overall integration of packages in Kali Linux. One area in particular is in program usage examples. Many program authors assume that their application will only be run in a certain manner or from a certain location. For example, the SMBmap application has a binary name of ‘smbmap’ but if you were to look at the usage example, you would see this:

Examples:

$ python smbmap.py -u jsmith -p password1 -d workgroup -H 192.168.0.1

$ python smbmap.py -u jsmith -p ‘aad3b435b51404eeaad3b435b51404ee:da76f2c4c96028b7a6111aef4a50a94d’ -H 172.16.0.20

$ python smbmap.py -u 'apadmin’ -p 'asdf1234!’ -d ACME -h 10.1.3.30 -x 'net group “Domain Admins” /domain’

If you were a novice user, you might see these examples, try to run them verbatim, find that they don’t work, assume the tool doesn’t work, and move on. That would be a shame because smbmap is an excellent program so we have been working on fixing these usage discrepancies to help improve the overall fit and finish of the distribution. If you run ‘smbmap’ in Kali 2017.2, you will now see this output instead:

Examples:

$ smbmap -u jsmith -p password1 -d workgroup -H 192.168.0.1

$ smbmap -u jsmith -p 'aad3b435b51404eeaad3b435b51404ee:da76f2c4c96028b7a6111aef4a50a94d’ -H 172.16.0.20

$ smbmap -u 'apadmin’ -p 'asdf1234!’ -d ACME -h 10.1.3.30 -x 'net group “Domain Admins” /domain’

We hope that small tweaks like these will help reduce confusion to both veterans and newcomers and it’s something we will continue working towards as time goes on.

Learn More About Kali Linux

In the time since the release of 2017.1, we also released our first book, Kali Linux Revealed, in both physical and onlineformats. If you are interested in going far beyond the basics, really want to learn how Kali Linux works, and how you can leverage its many advanced features, we encourage you to check it out. Once you have mastered the material, you will have the foundation required to pursue the Kali Linux Certified Professional certification.

Kali ISO Downloads, Virtual Machines and ARM Images

The Kali Rolling 2017.2 release can be downloaded via our official Kali Download page. This release, we have also updated our Kali Virtual Images and Kali ARM Images downloads. As always, if you already have Kali installed and running to your liking, all you need to do in order to get up-to-date is run the following:

apt update

apt dist-upgrade

reboot


Source code: https://www.kali.org/news/kali-linux-2017-2-release/


Download Link:  https://www.kali.org/downloads/


Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~

West Virginia Department of Environmental Protection said a computer breach has affected some online applications. CHARLESTON, WV (WCHS/WVAH) — The West Virginia Department of Environmental Protection said a computer breach has affected some online...

West Virginia Department of Environmental Protection said a computer breach has affected some online applications.


CHARLESTON, WV (WCHS/WVAH) — The West Virginia Department of Environmental Protection said a computer breach has affected some online applications.

The state agency said in a news release that is has temporarily taken offline all of the external applications the agency hosts, except GIS mapping. The Electronic Submission System, the primary application affected, is used by various industries to file permit applications and to submit compliance data.

DEP officials said there currently is no reason to suspect any personally identifiable information of any users was compromised. The investigation suggests the WVDEP servers were used to send spam phishing emails, and not to steal information of users. The method used to gain entrance to the servers has been identified and is being addressed.

The systems are expected to return to full functionality early next week, the DEP said.


Read More Cyber New’s Visit Our Facebook Page Click the Link :  https://www.facebook.com/pages/Cyber-crew/780504721973461


Read More Cyber New’sVisit Our Twitter Page Click the Link :  https://twitter.com/Cyber0Crew

~R@@T @CCE$$~