MSpy Hacked

from the have-some-information dept.
pdclarry writes: mSpy sells a software-as-a-service package that claims to allow you to spy on iPhones. It is used by ~2 million people to spy on their children, partners, Exes, etc. The information gleaned is stored on mSpy’s servers. Brian Krebs reports that mSpy has been hacked and their entire database of several hundred GB of their customer’s data has been posted on the Dark Web. The trove includes Apple IDs and passwords, as well as the complete contents of phones that have mSpy installed. So much for keeping your children safe.

Ubuntu To Officially Switch To systemd Next Monday

from the dissenting-dachshund dept.
jones_supa writes: Ubuntu is going live with systemd, reports Martin Pitt in the ubuntu-devel-announce mailing list. Next Monday, Vivid (15.04) will be switched to boot with systemd instead of UpStart. The change concerns desktop, server, and all other current flavors. Technically, this will flip around the preferred dependency of init to systemd-sysv | upstart in package management, which will affect new installs, but not upgrades. Upgrades will be switched by adding systemd-sysv to ubuntu-standard‘s dependencies. If you want, you can manually do the change already, but it’s advisable to do an one-time boot first. Right now it is important that if you run into any trouble, file a proper bug report in Launchpad (ubuntu-bug systemd). If after some weeks it is found that there are too many or too big regressions, Ubuntu can still revert back to UpStart.

A Cybersecurity Threat That Could Be Lurking On Your Phone

A Cybersecurity Threat That Could Be Lurking On Your Phone

Gary Miliefsky, SnoopWall CEO, and founding member of the US Department of Homeland Security announces a privacy breach posed by smartphone flashlight apps. Miliefsky has advised two White House Administrations on Cybersecurity.

He was scheduled to join us on set for Special Report, but we had to make room for breaking news. We know you were all excited to hear this story and so we brought Gary in just for The Daily Bret. Share your thoughts with us on Twitter @BretBaier or here on the blog– after hearing this story will you delete your flashlight app?

New variant of Zorenium Bot can infect iOS devices


by paganinip on March 22nd, 2014

Security analysts at SenceCy which are monitoring the advancement of a new Zorenium Bot discovered that it is able to infect also iOS devices.
Security analysts at SenceCy are monitoring the evolution for the Zorenium Bot, a new and unknown malware which has been advertised in the underground since January 2014.

This is the third article in two days of cyber criminal activities against mobile industry, demonstrating the high interest of cybercrime in the exploitation of so powerful and widespread platforms.

Zorenium Bot seems to be an ongoing project, the authors provided new updates this month, probably the most important improvement announced is the ability to infect Apple iOS devices. Apple iOS devices based on version from 5 up to 7 could be infected by the Zorenium Bot, exactly like Linux and Windows based machines.


The cost for the entry-level Zorenium bot is 350 GBP, the price grows up to over 5000GBP if the botnet includes advanced features like the support of P2P communication to C&C, or i2p C&C.

The authors of Zorenium Bot have updated the rootkit to TDL4 (Alureon), a very common rootkit that has been around for several years used in numerous large botnets. Recent versions TDL4 has different advanced capabilities, including the ability to bypass some Windows code-signing requirements.

The security analysts consider the Zorenium Bot very insidious because it still goes undetected by most AV companies.

The Zorenium Bot is an extremely versatile malware, it could be used for surveillance activities thanks formgrabbing and remote monitoring features, for financial frauds thanks the implementation of features of banking Trojan, to run DDoS, instructed as Bot-killing agent, to mine Bitcoin.

Zorenium has been advertised on Pastebin, the full release notes for the latest version of Zorenium bot provided detailed information on malware functionalities.

According to the developers Zorenium bot is still in beta mode, future release could include more features that can make the botnet more resilient.

Pierluigi Paganini

(Security Affairs – Zorenium bot, cybercrime)
Original article>