Posts

Showing posts from January, 2020

How to Clear Data Facebook Collects About You

Image
In today's cyber world we all are using social media apps in our day-to-day life. Such as Facebook, Instagram, Whatsapp, Snapchat, etc. but we don't know the fact that this apps tracking us and know very much about us.  It's not their fault we only give permissions to them to do so. Indirectly we allow them to track us as we don't read which permission we are allowing them is it necessary or not. Facebook is one the biggest advertising platform and that's because it knows a lot about you, me and everyone else. Facebook uses many tools to track people across the Internet, whether they have an account with the social networking site or not, and most of them rely on the online activity data other apps and websites share with Facebook. However, after facing worldwide criticism over privacy and data breach controversies, Facebook last summer announced a privacy tool, called Off-Facebook Activity, which gives users more control of their data collected by Faceb...

Cross-site scripting Vulnerability in WhatsApp

Image
Cross-site scripting Vulnerability in WhatsApp Software Affected: WhatsApp for Desktop prior to 0.3.9309 paired with WhatsApp for iOS prior to 2.20.10 Overview A vulnerability has been reported in WhatsApp which could be exploited by a remote attacker to read local files on the target  system and cross-site scripting attack. Description A Cross-site scripting vulnerability exists in WhatsApp Desktop when paired with WhatsApp for iPhone. A remote attacker could exploit this vulnerability by sending a specially crafted message to the target system and requires the victim to click on this preview link of this message. Successful exploitation of this vulnerability could allow the remote attacker to read local files on the target system and cross-site scripting attack.

What is Formjacking?

Image
What is Formjacking? Formjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's forum page to collect sensitive user information. Formjacking is designed to steal credit card details and other information from payment forms that can be captured on the checkout pages of websites. How does form jacking work? Once a website user enters their payment card data on an e-commerce payment page and clicks “submit,” the malicious JavaScript code is what collects the entered information. The malicious JavaScript code that has been installed by the cyber thieves can collect information such as payment card details, home, and business addresses, phone numbers and more. Once the information has been collected, it is then transferred to the attacker’s servers. The cyber thieves can then use this information for financial gain themselves, or they can sell the information on the dark web. With this information, cyberc...

Some Dark web Links

Image
Here are some of the Forum/Website to visit on dark web related to cybersecurity and hacking. Before visiting this website please follow the steps to be safe on the dark web/ Deepweb. Security Steps to be taken before opening the links: First of All, To browse these dark web forums, first close all active programs and applications in your computer then start Your NordVPN or any Paid and HQ VPN that have TOR service and select Onion Over VPN Server.  Now start Tor Browser and disable Javascript. In this way, you have created a completely secure and untraceable environment for you. If you think Tor Browser gives you full anonymity then you are wrong.  Only premium VPN services can provide you fully secure and untraceable environment. I have tried my hands on many premium VPN services, and I found NordVPN beats its competitor in all features. Disclaimer ⚠ : This info are shared for educational purpose only, neither the website nor creator hold any info or liabl...

What is BotNet?

Image
A Botnet is a group of computers that have been infected by malware and have come under the control of a malicious actor. Botnets are workhorses of the internet. Their connected computers perform repetitive tasks to keep the website ongoing. The botnet can be designed to accomplish illegal or malicious tasks including sending spam, stealing data, ransomware attack, fraudulently clicking on ads or distributed Denial-Of-Service(DDOS) attacks. Some malware such as ransomware has a direct impact on the system. Whereas DDOS botnet has a different level of visibility as per the Attacker commands. Some malware is designed to take total control whereas come run in the background process silently waiting for the instruction from the attacker or "bot Herder" . Some of the attacks can be done by using BotNet: Using your machine’s power to assist in distributed denial-of-service (DDoS) attacks to shut down websites. Emailing spam out to millions of Internet users. Gener...

KL and RAT

Image
Difference Between KL and RAT RAT: A RAT is a malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-requested program.  Remote Administrative Tool  gives a hacker full control over a victim's computer. Webcam, Microphone and what not. RAT's violate a whole heck of Cyber Laws that is why the FBI puts heat on them and they get caught, Mainly  because blackmailing or using their personal information against them. KL: Keystroke logging often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. ... Keylogging can also be used to study human-computer interaction.  It sends keystrokes and stealer logs containing the username , password and website link typed and/ or visited by the victim of the hacker tha...

Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability

Image
Overview A vulnerability has been reported in Microsoft Internet Explorer which could allow a remote attacker to perform arbitrary code execution on the targeted system. Description This vulnerability exists in Microsoft Internet Explorer due to improper handling of objects in memory by the scripting engine. An  attacker could exploit this vulnerability by persuading a user to open a specially -crafted website to trigger memory corruption. Successful exploitation of this vulnerability could allow an unauthenticated remote attacker to execute arbitrary code on the targeted system with the privileges of the user. This vulnerability being exploited in the wild.

Man calls travel firm, finds hacker

Image
Online swindlers cloned the SIM (subscriber's identity module) card of a travel agency and duped one of its customers o RS 12,000 on the pretext of booking his travel ticket. The complaint went to the cyber crime cell and the SSP's public window. Daya Ram, the employee of Maharaja Travels in Sector 22 , said a customer had come to the office on August 15 to say that he had called the agency at 8558876985 and asked for booking a ticket to Amirite. The receiver sent him a web link on his mobile phone and told and him to do a small transaction of RS 20 as a test. He transferred Rs 20 and found RS 12,000 debited from his account, later. Daya Ram told police that even he had called o that number and found a stranger on the other end. The call went to that number even after he had removed this SIM from the agency's handset. The Company's official mobile phone seemed to have been hacked.

Multiple Vulnerabilities in Database Reset Plugin for WordPress

Image
Overview Multiple vulnerabilities have been reported in Database Reset Plugin for WordPress which could be exploited by a remote attacker to gain elevated privileges leading to complete compromise of the targeted system. Description 1.Privilege Escalation Vulnerability ( CVE-2020-7047 ) This vulnerability exists in the WP Database Reset plugin due to improper security controls. A remote attacker could exploit this vulnerability by sending a specially crafted request to the affected system. Successful exploitation of this vulnerability could allow the attacker to gain elevated privileges on the targeted system. 2.Authentication bypass Vulnerability ( CVE-2020-7048 ) This vulnerability exists in the WP Database Reset plugin due to improper security controls. A remote attacker could exploit this vulnerability by sending a specially crafted request to the affected system. Successful exploitation of this vulnerability could allow the attacker to reset any table in the database, a...

Saudi Prince Allegedly Hacked World's Richest Man Jeff Bezos Using WhatsApp

Image
Saudi Prince Allegedly Hacked World's Richest Man Jeff Bezos Using WhatsApp The iPhone of Amazon founder Jeff Bezos, the world's richest man, was reportedly hacked in May 2018 after receiving a WhatsApp message from the personal account of Saudi crown prince Mohammed bin Salman, the Guardian newspaper revealed today. Citing unnamed sources familiar with digital forensic analysis of the breach, the newspaper claimed that a massive amount of data was exfiltrated from Bezos's phone within hours after he received a malicious video file from the Saudi prince. The mysterious file was sent when crown prince Salman and Bezos were having a friendly WhatsApp conversation, and it's 'highly probable' that it exploited an undisclosed zero-day vulnerability of WhatsApp messenger to install malware on Bezos's iPhone. "The forensic analysis found that within hours of receipt of the MP4 video file from the Crown Prince's account, massive and (for Bezos...

Multiple Vulnerabilities in Google Android

Image
Overview  Multiple Vulnerability has been reported in Google Android which could allow a remote attacker to cause a denial of service condition, obtain sensitive information or execute arbitrary code on a targeted system. Description These vulnerabilities exist in Framework, System, Media Framework, Google Play Project Mainline, Kernel =, Qualcomm and Qualcomm closed-source components of Google Android. A remote attacker could exploit these vulnerabilities by using a specifically crafted file designed to exploit these vulnerabilities.

Hacking Emails using FreeMilk

Image
What is Freeemilk? FreeMilk is one of the most dangerous cyber attacks as it keeps on installing malware on your system. It was named FreeMilk by the researchers at Palo Alto Networks , an enterprise security company, who found this phrase in the malware's code. These attacks have been spotted from May 2017 . Working with FreeMilk Malware? Hackers track ongoing email conversations between two or more people. They take control of the victim's email account quietly and insert a new email in the ongoing conversation so that the victim has no way to find out if the email has been sent by the third party. The email contains boobytrapped files that infiltrate the computers using malicious codes and retrieve confidential information without getting noticed. Once executed successfully, FreeMilk installs two payloads, PoohMilk and Franklin , in the victim's system. PoohMilk helps Freenkin run and perform two different tasks: to collect information from the host and to act...

Cross-site scripting Vulnerability in Microsoft Dynamics 365

Image
Vulnerability note CIVN-2020-0012 A vulnerability has been reported in Microsoft Dynamics 365 (on-premises) which could be exploited bu an attacker to perform cross-site scripting attack and run scripts in the context of the current user on a targeted system. Description  This vulnerability exists in MIcros Dynamics 365 (on-premises) due to improper sanitization of web requests by the affected software. An attacker could exploit this vulnerability by sending a specially crafted web request to an affected system. Successful exploitation of this vulnerability could allow the attacker to perform unauthorized actions in the context of the current user such as reading, modifying, or deleting content, or injecting malicious content in the browser of the target system.

Supermodel Complaint about Cyber Harassment

Image
Supermodel Complaint about Cyber Harassment On December 24 of 2019, a complaint was given to Cyber Crime Investigation Cell (CCIC) in Bandra-Kurla complex by Miss India Natasha Suri. The complaint is that A man named Flynn Remedios posted some adult contents tagging her name on some portals like Indiascoops.com and Indiaspeaks.live and also sent the same on other websites for publication. Natasha along with her lawyer Madhav V. Thorat filed the FIR against Remedios at Mumbai's Dadar police station on Wednesday.  While an interview with IANS, Natasha said: "The matter started in November 2019. Somebody started creating fake news articles and started tagging me, and putting objectionable pictures of girls in a bathroom with their faced blurred, and putting the name of some girl called Natasha Suri Singh. This is a non-existent name, but this man Flynn Remedios was doing this for some reason. I am his new target." "He started sharing these fake news artic...

PAK giving online training to terrorists to make explosives

Image
Pakistan's notorious intelligence agency Inter Services Intelligence (ISI) has planned terrorist attacks in India. Also, a new blueprint has been prepared for them. According to intelligence reports, the ISI has named it K2 (Kashmir-Khalistan Nexus). Intelligence inputs indicate that Punjab-based Khalistani elements on social media are being given online training from across the border. These include information on planning explosives, planning and carrying out terrorist attacks. Inputs also reveal that ISI agents are funding the module to make explosives. Sources said that Tanvir Kadir, associated with Tehreek-e-Kashmir, is working to fund the recently activated Punjab-based Khalistani module. It is also related to the Sikh for Justice (SFJ), which runs the separatist agenda 'Referendum 2020'. Intelligence sources said that the activation of separatist elements based in Punjab by the Pakistani intelligence agency ISI is a matter of concern and it has been taken se...

Hack Any TikTok Account by SMS

Image
Researchers Demonstrate How to Hack Any TikTok Account by Sending SMS TikTok is the most downloaded app of the year 2019. TikTok is famous for creating short videos films. TikTok has Millions of user download it is a Chinese viral video-sharing app. Researchers have found that the app contained potentially dangerous vulnerabilities that could have allowed remote attackers to hijack any user account just by knowing the mobile number of targeted victims. Cyber-security researchers at Check Point revealed that chaining multiple vulnerabilities allowed them to remotely execute malicious code and perform unwanted actions on behalf of the victims without their consent. The reported vulnerabilities include low severity issues like SMS link spoofing, open redirection, and cross-site scripting (XSS) that when combined could allow a remote attacker to perform high impact attacks, including: delete any videos from victims' TikTok profile, upload unauthorized videos to victims...