Independent

IndependentKrebs

Who Is Marcus Hutchins?

Credit to Author: BrianKrebs| Date: Tue, 05 Sep 2017 10:50:03 +0000

In early August 2017, FBI agents in Las Vegas arrested 23-year-old U.K. resident Marcus Hutchins on suspicion of authoring and/or selling “Kronos,” a strain of malware designed to steal online banking credentials. Hutchins was virtually unknown to most in the security community until May 2017, when a British newspaper revealed him as the “accidental hero” who inadvertently halted the global spread of WannaCry, a ransomware contagion that had taken the world by storm just days before. Relatively few knew it before his arrest, but Hutchins for many years authored the popular cybersecurity blog MalwareTech. When this fact became more widely known — combined with his hero status for halting Wannacry — a great many MalwareTech readers quickly leapt to his defense to denounce his arrest. They reasoned that the government was overstepping on flimsy evidence, noting that Hutchins has worked tirelessly to expose cybercriminals and their malicious tools. To date, some 226 supporters have donated more than $14,000 to his defense fund. At first, I did not believe the charges against Hutchins would hold up under scrutiny. But as I began to dig deeper into the history tied to dozens of hacker forum pseudonyms, email addresses and domains he apparently used over the past decade, a very different picture began to emerge. In this post, I will attempt to describe and illustrate more than three weeks’ worth of connecting the dots from what appear to be Hutchins’ earliest hacker forum accounts to his real-life identity. The clues suggest that Hutchins began developing and selling malware in his mid-teens — only to later develop a change of heart and earnestly endeavor to leave that part of his life squarely in the rearview mirror.

Read More
ComputerWorldIndependent

Down memory lane — and into a ditch

Credit to Author: Sharky| Date: Tue, 05 Sep 2017 03:00:00 -0700

One of this pilot fish’s most memorable users is a sales guy who has security issues using his PC — mainly, locking himself out because he can’t remember his password.

“In the past, he would repeatedly get locked out of his computer for entering wrong passwords,” says fish. “I eventually changed his password to be his last name. Should be easy to remember, right?

“Not so. Sales guy calls and he’s locked out of his computer. I unlock it and tell him to try again. Nope, he’s locked out again.

“I reset it again and make a trip to his desk to make sure the Caps Lock isn’t on. I get him logged in.

“A couple hours later he calls again. He’s locked out again. I tell him again, ‘Your password is your last name — just enter it the same way as you spell it.’

To read this article in full or to leave a comment, please click here

Read More
IndependentSecuriteam

SSD Advisory – Mako Web-server Tutorials Multiple Unauthenticated Vulnerabilities

Credit to Author: SSD / Maor Schwartz| Date: Sun, 03 Sep 2017 06:38:44 +0000

Vulnerabilities Summary The following advisory describe three (3) vulnerabilities found in Mako Server’s tutorial page. The vulnerabilities found are: Unauthenticated Arbitrary File Write vulnerability that leads to Remote Command Execution Unauthenticated File Disclosure Unauthenticated Server Side Request Forgery As these tutorial may be used as the basis for production code, it is important for users … Continue reading SSD Advisory – Mako Web-server Tutorials Multiple Unauthenticated Vulnerabilities

Read More