Search Results for “Zack Whittaker”

July 25, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Cryptocurrency Loan Site YouHolder Leaked 86 Million Lines of Customer Records, Including Credit Card and User Transactions, Via Unsecured Server

Cryptocurrency loan start-up YouHodler exposed reams of customer credit cards and user transactions for almost a month because it forgot to protect the server with a password security researchers Noam Rotem and Ran Locar at VPNMentor discovered. The database contained 86 million lines of daily updating records of the lending platform, containing streams of logs and computer commands based on users’ interactions on the front-end website. Once the researchers reported the leak, YouHodler secured the server.

July 26, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
‘Accidental’ WannaCry Hero Marcus Hutchins Sentenced to Supervised Release for His Role in Creating Kronos Banking Trojan

Malware researcher Marcus Hutchins, also known as MalwareTech, who became famous as the “accidental” hero who stopped the WannaCry worm from spreading globally but who was also shortly thereafter arrested in Las Vegas in August 2017 while boarding a flight back to the U.K. following DEFCON for his role in helping to create the Kronos banking trojan, has been sentenced to supervised release by Judge J. P. Stadtmueller in Milwaukee federal court. Hutchins, a UK citizen, was characterized by the judge as a talented” but “youthful offender.” Hutchins’ work on the technology leading to Kronos began in 2014. “It’s going to take the people like [Hutchins] with your skills to come up with solutions because that’s the only way we’re going to eliminate this entire subject of the woefully inadequate security protocols,” said Stadmueller.

Related: ZDNet, emptywheel, Technology Review, Dark Reading, The GuardianBBC News – Home, Cyberscoop, The Register – Security, VICE News, Slashdot,, North Devon Gazette, The Next Web, The Hacker News, Security – Computing, AP Breaking News

Tweets:@deviantollum @emptywheel @malwaretechblog @malwaretechblog @zackwhittaker @zackwhittaker @gossithedog @marciahoffman

ZDNet: Marcus ‘MalwareTech’ Hutchins gets no prison time, one year supervised release
emptywheel: After Two Years, MalwareTech Is a Free Man
Technology Review : A light sentence for a famous hacker has actually made the world safer
Dark Reading: Malware Researcher Hutchins Sentenced to Supervised Release
The Guardian: Briton who helped stop 2017 WannaCry virus avoids jail over malware charges
BBC News – Home: Marcus Hutchins spared US jail sentence over malware charges
Cyberscoop : Marcus Hutchins, who stopped WannaCry’s spread, avoids prison time
The Register – Security: He’s coming home, he’s coming home … Hutchins’ coming home: British Wannacry killer held in US on malware dev rap set free by judge
VICE News: MalwareTech, the Security Researcher Who Stopped WannaCry Ransomware, Gets No Prison Time for Hacking Crimes
The Verge: WannaCry hero Marcus Hutchins will avoid prison in banking malware case
Slashdot: Marcus ‘MalwareTech’ Hutchins Gets No Prison Time, One Year Supervised Release WannaCry Hero Avoids Jail Time
North Devon Gazette : Ilfracombe cyber expert Marcus Hutchins spared jail
The Next Web: WannaCry hero Marcus “MalwareTech” Hutchins isn’t going to jail
The Hacker News: Judge Rules No Jail Time for WannaCry ‘Killer’ Marcus Hutchins, a.k.a. MalwareTech
Security – Computing: WannaCry hero Marcus Hutchins spared jail in the US over links to Kronos banking Trojan
AP Breaking News: No prison for British cyber expert in malware case

@deviantollum: A wonderful day for @MalwareTechBlog thanks to his loving parents as well as @marciahofmann , @brianeklein , Emily, @Doctor_Tran , @Tarah , and all of you around the world who showed endless support.
@emptywheel: In Milwaukee for @MalwareTechBlog sentencing hearing, that begins in 7 minutes.Most of the sentencing materials are sealed, but here's the govt filing.
@malwaretechblog: I’d like to also dedicate a tweet to thanking my amazing lawyers: @brianeklein , @marciahofmann , and Daniel Stiller. They provided this help pro bono; I’m forever indebt.
@malwaretechblog: Sentenced to time served! Incredibly thankful for the understanding and leniency of the judge, the wonderful character letter you all sent, and everyone who helped me through the past two years, both financially and emotionally.
@zackwhittaker: In a verbal statement, @MalwareTechBlog said he made some "bad decisions" as a teenager. "I deeply regret my conduct and the harm that was caused," he said."I have no desire to go back to that life," he said.
@zackwhittaker: Judge: "Marcus Hutchins turned a corner in regards to further conduct that would be remotely connected to what led to the charges in this case.""There are just too many positives on the other side of the ledger."
@gossithedog: “That’s when what every lawyer watching in the courtroom I spoke with called unprecedented. The Judge suggested Hutchins should get a pardon”
@marciahoffman: .@MalwareTechBlog is going home a free man. @brianeklein and I are thrilled that Judge Stadtmueller recognized Marcus’ important contributions to society and sentenced him to time served, even suggesting Marcus should seek a pardon.

September 18, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Documents Discovered on Nokia Network Employee’s Unprotected Drive Offer Details on Russia’s ‘Lawful Intercept’ Phone and Internet Capabilities

Documents found on an unprotected backup drive owned by an employee of Nokia Networks offer new insight into the scope and scale of the Russian surveillance system known as SORM (Russian: COPM) and how Russian authorities gain access to the calls, messages, and data of customers of the country’s largest phone provider, Mobile TeleSystems (MTS), Chris Vickery, director of cyber risk research at security firm UpGuard, discovered. The documents, nearly two terabytes in size, reveal Nokia’s involvement in providing “lawful intercept” capabilities to phone and internet providers, which Russia mandates by law. They also spell out how, between 2016 and 2017, Nokia planned and proposed changes to MTS’s network as part of the telecom giant’s “modernization” effort. The documents discovered by Vickery include several floor plans, photos and network diagrams for the local phone exchanges. One set of documents show how “modernized” SORM capabilities on MTS’s network also allow the government access to the telecom’s home location register (HLR) database, which contains records on each subscriber allowed to use the cell network, including their international mobile subscriber identity (IMSI) and SIM card details. Vickery informed Nokia of the exposure and the company closed the hole four days later.

Related: Upguard, TechradarGizmodo, Boing Boing

Tweets:@profcarroll @vickerysec @zackwhittaker @zackwhittaker

August 9, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
‘Kinky, Open-Minded’ Sex App 3Fun Exposes Users’ Personal Data, Real-Time Locations, Profiles of Users at White House and CIA Identified

More than 1.5 million users of dating site, 3Fun,  which bills itself as a “private space” where you can meet “local kinky, open-minded people,” have had their personal data exposed, including their real-time location, because of a vulnerability in the app, according to Pen Test Partners’ researchers. The researchers found they could plug in any coordinates they wanted to spoof their location, revealing sensitive information on anyone within any location of their choosing, including government buildings, military bases, and even intelligence agencies. TechCrunch ran the same tests and discovered profiles of users at the White House and the CIA. The data revealed included sexual orientation, preferred matches, age, username, and their partner’s username, bios and full-resolution profile pictures. 3Fun did not respond for comment.

Related: Pen Test Partners, Daily Mail, The Verge

Tweets:@DefTechPat @TroyHunt

September 20, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Online Developer Education Site Thinkful Confirms Data Breach Just Days After Announcing Its Acquisition by Chegg

Online developer education site Thinkful confirmed a data breach, just days after it confirmed it would be acquired by education tech giant Chegg for $80 million. Thinkful said that the credentials stolen in the breach could not have granted the hacker access to certain information, such as government-issued IDs and Social Security numbers, or financial information. Thinkful is requiring all users to change their passwords.

July 28, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Bellingcat Researchers Investigating Activities of Russian Government Targeted by Phishing Attacks on ProtonMail Accounts

Investigative news site Bellingcat has confirmed several of its researchers who work on projects related to activities by the Russian government were targeted by an attempted but failed phishing attack on their ProtonMail accounts. The researchers were targeted by a phishing email purportedly from ProtonMail itself which asked users to change their email account passwords or generate new encryption keys through a similarly-named domain set up by the attackers. The attackers tried to exploit a little-known unpatched flaw in third-party software used by ProtonMail, which has yet to be fixed or disclosed by the software maker. The targeted Bellingcat researchers worked on the ongoing investigation into the downing of flight MH17 by Russian forces and the use of a nerve agent in a targeted killing in the U.K.

Related: Forbes, TechCrunch, Proton Mail, Radio Free Europe/Radio Liberty, The Times of Israel, ThreatConnect, Digital Journal, Channel News Asia IB Times, RAPPLER, Kyiv Post, News Agency UNIAN, Crime Russia


July 29, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Hacker Gained Access to Internal Files, Documents of Security Company Comodo By Using Publicly Exposed Email Address, Password

A hacker gained access to internal files and documents owned by security company and SSL certificate issuer Comodo by using an email address and password mistakenly exposed on the internet, Comodo software developer Jelle Ursem discovered. With these credentials, the hacker was able to log into the company’s Microsoft-hosted cloud services, which were was not protected with two-factor authentication. Comodo said that the account was an“automated account used for marketing and transactional purposes,” adding: “The data accessed was not manipulated in any way and within hours of being notified by the researcher, the account was locked down.” Separately, last week Tenable Researcher reported that multiple vulnerabilities were discovered in version of Comodo Antivirus and Comodo Antivirus Advanced according to Tenable Research.

Related: SC Magazine, IB Times, Infosecurity Magazine, The Daily Swig, Tenable, Tenable Tech Blog, ZDNet


August 1, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
New Threat Group ‘Hexane’ Is Targeting Telecom, Oil and Gas Companies Across Africa, Middle East, Dragos

A new hacking group, dubbed Hexane, is targeting telecommunications and oil and gas companies across Africa and the Middle East, according to industrial security company Dragos. The group’s activity has ramped up in recent months amid heightened tensions in the region since it first emerged a year ago. Hexane may be targeting the telecom companies as a stepping stone to get to industrial control system, Dragos researchers say. They also say that Hexane does not yet have the capability to disrupt industrial control networks critical to the continued operations of power plants, energy suppliers and other critical infrastructure. but may use its leverage on telecom networks as a precursor to attacks on industrial networks. Although Hexane has “similar behaviors” to OilRig, a threat group with suspected ties to Iran, it is a unique entity, according to Dragos.

Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Honda’s Exposed Database Could Have Allowed Anyone to See Which Systems Were Vulnerable to Unpatched Security Flaws, Researcher

An exposed database with no password containing 134 million rows of employee systems data from automaker Honda’s endpoint security service allowed anyone to see which systems on its network were vulnerable to unpatched security flaws, potentially giving hackers insider knowledge of the company’s weak points, security researcher Justin Paine discovered. The data included which operating system a user was running, its unique network identifiers and IP address, the status of the endpoint protection and which patches were installed. Honda shut down the database hours after Paine made contact with the company.

August 4, 2019
Zack Whittaker / TechCrunch

Zack Whittaker / TechCrunch  
Breach at Fashion, Sneaker Trading Platform StockX Exposes Millions of Customers’ Data, Company Initially Portrayed Customer Password Resets as ‘System Updates’

Fashion and sneaker trading platform StockX pushed out a password reset email to its users on Thursday citing “system updates” but was instead dealing with the aftermath of a data breach after a hacker stole purportedly more than 6.8 million records in May and sold them for $300 to at least one buyer. The hacker provided TechCrunch with a 1,000 sample stolen records and every person contacted confirmed the data as accurate. The stolen data contained names, email addresses, scrambled password (believed to be hashed with the MD5 algorithm and salted), and other profile information such as shoe size and trading currency. After TechCrunch posted a story on the breach, StockX posted a statement confirming the breach.