Republicans storm ultra-secure “SCIF,” some with cell phones blazing

The US House of Representatives.

Enlarge / The US House of Representatives. (credit: Wally Gobetz / Flickr)

On Wednesday, Republican lawmakers committed a major breach of security when they carried cell phones as they tried to storm a secure room where a closed-door impeachment hearing with a Defense Department official was taking place.

At least one House member, Rep. Matt Gaetz of Florida, got inside the Sensitive Compartmented Information Facility (SCIF) in the basement of the House of Representatives. Despite strict rules barring all electronics inside such closed-off areas, Gaetz openly tweeted: "BREAKING: I led over 30 of my colleagues into the SCIF where Adam Schiff is holding secret impeachment depositions. Still inside—more details to come."

A picture published by The New York Times showed a man identified as a House Republican holding up his phone as if taking pictures or video as he entered the secure room. A sign on the door of the room said, "Cameras and other recording devices prohibited without proper authorization." The room has lockers outside the doors where people are required to store electronics before entering.

Read 8 remaining paragraphs | Comments

UBoat – Proof Of Concept PoC HTTP Botnet Project

UBoat – Proof Of Concept PoC HTTP Botnet Project

UBoat is a PoC HTTP Botnet designed to replicate a full weaponised commercial botnet like the famous large scale infectors Festi, Grum, Zeus and SpyEye.

Reviews of popular botnets have shown HTTP-based botnets have a set of attributes that make it difficult for them to be detected. On the other hand, the number of studies focusing on the detection of HTTP-based botnets is relatively low (compared to the number of those on IRC-based and P2P botnets) especially in the HTTP-based mobile botnets which operate on the mobile devices and networks.

Read the rest of UBoat – Proof Of Concept PoC HTTP Botnet Project now! Only available at Darknet.

FBI Releases Article on Defending Against E-Skimming

Original release date: October 23, 2019

The Federal Bureau of Investigation (FBI) has released an article to raise awareness on e-skimming threats. E-skimming occurs when an attacker injects malicious code onto a website to capture credit or debit card data or personally identifiable information (PII).

The Cybersecurity and Infrastructure Security Agency (CISA) encourages businesses and agencies that take online payments to review the FBI article and consider the following tips to help protect against e-skimming:

Users can report suspected attacks to their local FBI office or to the FBI's Internet Crime Complaint Center at www.ic3.gov.

This product is provided subject to this Notification and this Privacy & Use policy.

Beware of Stalking Apps

Original release date: October 23, 2019

The Federal Trade Commission (FTC) has released an article warning consumers of “stalking apps”—spyware that secretly monitors smartphones. These apps can share information like call history, text messages, photos, GPS locations, and browser history without the user's knowledge. Although this can be a useful tool, stalking apps can also be used maliciously.

Smartphone users who suspect an illegitimate stalking app on their device should consider the following steps:

  • Use a rootchecker app to see if the phone is “jailbroken” or modified to allow unrestricted access to the entire file system.
  • Get a new device or remove the stalking app by factory resetting the smartphone and reinstalling the manufacturer’s operating system.
  • Get help. Law enforcement can determine if spyware is on your phone.

The Cybersecurity and Infrastructure Security Agency (CISA) encourages individuals to review FTC’s article and CISA’s Tip on Privacy and Mobile Device Apps for more information.

 

This product is provided subject to this Notification and this Privacy & Use policy.