Jump to content

A computer programmer from Ohio was indicted for spying Mac users for 13 years

17 minutes ago, Drak3 said:

Asides for the last part, basically what happened in my company last year. Thankfully, the system we use for resumes is isolated from anything important.

You got a computer infected from a fake job application? That must've sucked.

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, hey_yo_ said:

You got a computer infected from a fake job application? That must've sucked.

It was an easy fix, the malware wasn't even that bad.

Come Bloody Angel

Break off your chains

And look what I've found in the dirt.

 

Pale battered body

Seems she was struggling

Something is wrong with this world.

 

Fierce Bloody Angel

The blood is on your hands

Why did you come to this world?

 

Everybody turns to dust.

 

Everybody turns to dust.

 

The blood is on your hands.

 

The blood is on your hands!

 

Pyo.

Link to comment
Share on other sites

Link to post
Share on other sites

59 minutes ago, tjcater said:

I guess I'm not the target of decently made emails :P Most of mine usually are fake student aid/loans, medicine/insurance, or some crappy I love you or want to get laid.

I remember that my Yahoo! Mail account that I no longer use typically gets spam emails from Canadian pharmacies selling Viagra and Rolex. Now my Outlook email's junk folder contains either promo messages from the mall or people wanting me to strip naked in a camera which I will never, ever do. :P

 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, hey_yo_ said:

Spam emails nowadays are much more clever unlike ILOVEYOU which will just annoy you. Let's say you own a company and you're currently hiring new employees. Me as an attacker can craft a job application that looks legit attached with either a word document containing a macro or a PDF file that contains a .exe inside which serves as the fake CV. Then I make a burner email from protonmail and send it to your human resources. Once the HR opens my fake job application including the attachment, the malware I made could either deliver a ransomware payload which will spread through the entire corporate network or an espionage malware to sniff login credentials and personal information just like in the OP or exploit CVEs such as SMB or Kerberos and later sell what I collected to the highest bidder or send your company to bankruptcy.

We had a PDF that exploited the custom font feature where the PDF reader will automatically ask to download it by using the given URL in that custom font, luckily the person that got it suspected it was dodgy AF and got us to check it. No AV scanner/spam filter can pick that sort of thing up and it's on the PDF readers to just remove that feature completely.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, hey_yo_ said:

then it's an oversight from Apple for having an unpatched vulnerability persist for 13 years.

How does a company patch their own users?  :P 

Main Rig:

Case: Lian Li Lancool Mesh RGB

CPU: Ryzen 5 3600 

Cooler: CoolerMaster MasterLiquid 240

MB: MSI B550 Gaming Pro Carbon 

Ram: Gskill DDR4 3600 x 32GB 

GPU: Asus Arez Strix Vega 64 OC

PS: Seasonic FOCUS Gold Plus Series SSR-750FX

SSD1: Crucial P1 1TB NVME

SSD2: Adata SU800 512gb M.2 Sata

HDD: Hitatchi 2tb 7200RPM + 3x 2TB WD Passport USB 3.0

Monitors: AOC C24G1

Keyboard: Cheap Blue Knockoff Mechanical

Mouse: Uhuru Gaming Mouse
OS: Pop! 21.04



Current Vintage Equipment:  Please ask me about it, I love to talk old tech!
IBM Thinkpad 390, IBM Aptiva A12, IBM PS/2 Model 25-004.  Compaq Contura 4/25C, Presario 7596
Asus P5A-B Socket 7 Box, Tandy 1000RLX-HD "B" & 1200-2FD, VIC20, Zenith ZFL-181-93, Packard Bell 300SX.

Apple II/gs, Mac Plus x2, Mac SE x2, Performa 450

Link to comment
Share on other sites

Link to post
Share on other sites

18 minutes ago, leadeater said:

No AV scanner/spam filter can pick that sort of thing up and it's on the PDF readers to just remove that feature completely.

Maybe it’s tine for Microsoft to get rid of vulnerable legacy Macros permanently in Office 365. I think there are other ways to automate spreadsheets in Excel without relying on Macros. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

Not sure if this is a job application or the guy's regretting not getting a job at the NSA 13 years ago. Cause obviously it's perfectly okay if the government does it but as soon as a single individual does the same thing everyone loses their minds.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, ElfFriend said:

Not sure if this is a job application or the guy's regretting not getting a job at the NSA 13 years ago. Cause obviously it's perfectly okay if the government does it but as soon as a single individual does the same thing everyone loses their minds.

Despite the Patriot Act enacted during the Bush Administration, do you really think the likes of Pentagon and NSA would hire a 15 y/o hacker?

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, hey_yo_ said:

Despite the Patriot Act enacted during the Bush Administration, do you really think the likes of Pentagon and NSA would hire a 15 y/o hacker?

If they showed significant skill for their age why wouldn't they? 

                     ¸„»°'´¸„»°'´ Vorticalbox `'°«„¸`'°«„¸
`'°«„¸¸„»°'´¸„»°'´`'°«„¸Scientia Potentia est  ¸„»°'´`'°«„¸`'°«„¸¸„»°'´

Link to comment
Share on other sites

Link to post
Share on other sites

Wait, if he's 28 now does that mean he developed the malware when he was 15...?

23 hours ago, leadeater said:

when you think about it but the DNA of Linux and Mac OS is even older mind you.

Unlike windows, unix-like kernels don't follow the policy of "just pile stuff on" to fix issues or add features... :P let's just say they don't feel their age nearly as much.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, Sauron said:

Wait, if he's 28 now does that mean he developed the malware when he was 15...?

Yep. 

 

Looking back I probably should've studied code and metasploit in Kali Linux back when I was 15 so that instead of being incarcerated, I could've either got a career for the government or get paid even higher by tech companies in their bug bounty programs. -_-

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

10 hours ago, hey_yo_ said:

Maybe it’s tine for Microsoft to get rid of vulnerable legacy Macros permanently in Office 365. I think there are other ways to automate spreadsheets in Excel without relying on Macros. 

It doesnt seem they will, at my uni we have to learn Excel VBA and its a PITA...

Edited by jagdtigger
Link to comment
Share on other sites

Link to post
Share on other sites

16 hours ago, DrMacintosh said:

So much effort to report on such a small topic.....

Hahaha would you like some fries with that salt?to-much-salt-400x400.jpg?itok=Zrjw-unY

8700k @5.0GHz | Maximus X Hero | RAM 32GB @3200MHz CL14 | 1080 TI | SSD 250GB + 2x500GB Raid 0 | Monitor 1440p 165Hz ISP

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, Sauron said:

Unlike windows, unix-like kernels don't follow the policy of "just pile stuff on" to fix issues or add features... :P let's just say they don't feel their age nearly as much.

Actually the NT kernel isn't that bad, most things have been moved out of the kernel especially drivers. Most of the BSOD in the past were due to drivers and hardware faults crashing the system. Most things you'd expect to be in the kernel actually are not, like Storage Spaces which is partly why you can't boot from it.

 

Linux kernel isn't that light weight either but at least you can customize it. It's for this reason it's hard to comment on which is bigger or more bloated etc, one you can see and change and the other you cannot.

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, jagdtigger said:

It doesnt seem they will, at my uni we have to learn Excel VBA and its a PITA...

What? Learning VBA now days? Why don't you just hit your hand with a hammer, just as useful.

Link to comment
Share on other sites

Link to post
Share on other sites

5 minutes ago, leadeater said:

What? Learning VBA now days? Why don't you just hit your hand with a hammer, just as useful.

Unfortunately yes... And on paper matlab too but we have to use octave instead.

 

/EDIT

To top it off sometimes i get stuff that i need to fill out from my workplace, and guess what? I cant do it in LO because its full of macros! Im basically a black sheep in the eyes of the personal department since told them either send something i can open normally or dont even send it :D .

Edited by jagdtigger
Link to comment
Share on other sites

Link to post
Share on other sites

17 hours ago, Drak3 said:

Asides for the last part, basically what happened in my company last year. Thankfully, the system we use for resumes is isolated from anything important.

Smart.  Why do I get the feeling this is very uncommon

Solve your own audio issues  |  First Steps with RPi 3  |  Humidity & Condensation  |  Sleep & Hibernation  |  Overclocking RAM  |  Making Backups  |  Displays  |  4K / 8K / 16K / etc.  |  Do I need 80+ Platinum?

If you can read this you're using the wrong theme.  You can change it at the bottom.

Link to comment
Share on other sites

Link to post
Share on other sites

On 1/12/2018 at 6:48 PM, hey_yo_ said:

wanting me to strip naked in a camera which I will never, ever do. :P

I feel that if I ever did that, my computer would burn out its USB port in self-preservation, much like an animal chewing its own leg off. lol.gif.a025bf31cb5af2e8ac8b581949f1e024.gif

On 1/12/2018 at 7:12 PM, hey_yo_ said:

Maybe it’s tine for Microsoft to get rid of vulnerable legacy Macros permanently in Office 365. I think there are other ways to automate spreadsheets in Excel without relying on Macros. 

Macros aren't really the problem, it's the lack of a proper sandbox for the macros that makes them an issue.

Link to comment
Share on other sites

Link to post
Share on other sites

Yeah... another reason for me to use Linux and use Symantec endpoint protection for Linux. You can never be too secure these days 

Sudo make me a sandwich 

Link to comment
Share on other sites

Link to post
Share on other sites

49 minutes ago, wasab said:

Yeah... another reason for me to use Linux and use Symantec endpoint protection for Linux. You can never be too secure these days 

It’s good that you use an enterprise grade endpoint protection but just so you know, the persistent malware’s code is Linux compatible so it’s a message that users of Linux and macOS shouldn’t get too cocky when it comes to security and since Linux is almost everywhere in the internet and macOS user base is growing significantly, targeted attacks on these platforms will just keep growing. 

Edited by hey_yo_

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

10 hours ago, Jito463 said:

Macros aren't really the problem, it's the lack of a proper sandbox for the macros

Isn’t Microsoft Office since version 2010 already have a sandbox feature called “Protected Mode”? 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 minutes ago, hey_yo_ said:

Isn’t Microsoft Office since version 2010 already have a sandbox feature called “Protected Mode”? 

As I understand it (based on my limited knowledge), the sandbox mode doesn't  work as well as it should.  I remember reading something about it, but I can't recall where.

Link to comment
Share on other sites

Link to post
Share on other sites

16 minutes ago, Jito463 said:

As I understand it (based on my limited knowledge), the sandbox mode doesn't  work as well as it should.  I remember reading something about it, but I can't recall where.

I don’t know if it’s possible to sandbox macros in Office 365. Maybe @Windspeed36 or @leadeater can answer. 

There is more that meets the eye
I see the soul that is inside

 

 

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, hey_yo_ said:

It’s good that you use an enterprise grade endpoint protection but just so you know, the persistent malware’s code is Linux compatible so it’s a message that users of Linux and macOS shouldn’t get too cocky when it comes to security and since Linux is almost everywhere in the internet and macOS user base is growing significantly, targeted attacks on these platforms will just keep growing. 

We linux users do not hand out root access to everything we downloaded from the web unlike the windows users who grant administrator privilege left and right. , Everything on the repo, the main source of our softwares, is very clean. Third party softwares are either .deb packages, those from third party PPAs, those in the form of .sh, or sourced codes we compile ourselves. Not many malware coders will bother writing codes for linux when so many linux users are more often than not be installing their software from the distro repo. Windows users are usually what they target.

 

I use end point just in case I get rare instances of windows malware that have cross platform capability and because my university provide it free of charge so why the hell not. 

Sudo make me a sandwich 

Link to comment
Share on other sites

Link to post
Share on other sites

21 minutes ago, wasab said:

We linux users do not hand out root access to everything we downloaded from the web unlike the windows users who grant administrator privilege left and right. , Everything on the repo, the main source of our softwares, is very clean. Third party softwares are either .deb packages, those from third party PPAs, those in the form of .sh, or sourced codes we compile ourselves. Not many malware coders will bother writing codes for linux when so many linux users are more often than not be installing their software from the distro repo. Windows users are usually what they target.

 

I use end point just in case I get rare instances of windows malware that have cross platform capability and because my university provide it free of charge so why the hell not. 

Default admin privileges isn't a thing now. You have to turn down UAC settings, meaning you have to be intentionally stupid now days on Windows :P. Granted a lot of people turn UAC down to min/off resulting them right back at the issue of why it was implemented in the first place, which is the intentionally stupid part as mentioned.

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×