SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : How Quickly Can Obama Totally Destroy the US? -- Ignore unavailable to you. Want to Upgrade?


To: Shoot1st who wrote (7265)1/16/2014 11:46:11 AM
From: joseffy  Respond to of 16547
 
A First Look at the Target Intrusion, Malware
...............................................................................

1/14/2014
krebsonsecurity.com

..............................Last weekend, Target finally disclosed at least one cause of the massive data breach that exposed personal and financial information on more than 110 million customers: Malicious software that infected point-of-sale systems at Target checkout counters. Today’s post includes new information about the malware apparently used in the attack, according to two sources with knowledge of the matter.


The seller of the point-of-sale “memory dump” malware allegedly used in the Target attack.

In an interview with CNBC on Jan. 12, Target CEO Gregg Steinhafel confirmed that the attackers stole card data by installing malicious software on point-of-sale (POS) devices in the checkout lines at Target stores. A report published by Reuters that same day stated that the Target breach involved memory-scraping malware.

This type of malicious software uses a technique that parses data stored briefly in the memory banks of specific POS devices; in doing so, the malware captures the data stored on the card’s magnetic stripe in the instant after it has been swiped at the terminal and is still in the system’s memory. Armed with this information, thieves can create cloned copies of the cards and use them to shop in stores for high-priced merchandise. Earlier this month, U.S. Cert issued a detailed analysis of several common memory scraping malware variants.

Target hasn’t officially released details about the POS malware involved, nor has it said exactly how the bad guys broke into their network. Since the breach, however, at least two sources with knowledge of the ongoing investigation have independently shared information about the point-of-sale malware and some of the methods allegedly used in the attack.

‘BLACK POS’

On Dec. 18, three days after Target became aware of the breach and the same day this blog broke the story, someone uploaded a copy of the point-of-sale malware used in the Target breach to ThreatExpert.com, a malware scanning service owned by security firm Symantec. The report generated by that scan was very recently removed, but it remains available via Google cache (Update, Jan. 16, 9:29 a.m.: Sometime after this story ran, Google removed the cached ThreatExpert report; I’ve uploaded a PDF version of it here).


According to sources, “ttcopscli3acs” is the name of the Windows computer name/domain used by the POS malware planted at Target stores; the username that the thieves used to log in remotely and download stolen card data was “Best1_user”; the password was “BackupU$r”

According to a source close to the investigation, that threatexpert.com report is related to the malware analyzed at this Symantec writeup (also published Dec. 18) for a point-of-sale malware strain that Symantec calls “Reedum” (note the Windows service name of the malicious process is the same as the ThreatExpert analysis –”POSWDS”). Interestingly, a search in Virustotal.com — a Google-owned malware scanning service — for the term “reedum” suggests that this malware has been used in previous intrusions dating back to at least June 2013; in the screen shot below left, we can see a notation added to that virustotal submission, “30503 POS malware from FBI”.

The source close to the Target investigation said that at the time this POS malware was installed in Target’s environment (sometime prior to Nov. 27, 2013), none of the 40-plus commercial antivirus tools used to scan malware at virustotal.com flagged the POS malware (or any related hacking tools that were used in the intrusion) as malicious. “They were customized to avoid detection and for use in specific environments,” the source said.

That source and one other involved in the investigation who also asked not to be named said the POS malware appears to be nearly identical to a piece of code sold on cybercrime forums called BlackPOS, a relatively crude but effective crimeware product. BlackPOS is a specialized piece of malware designed to be installed on POS devices and record all data from credit and debit cards swiped through the infected system.

According the author of BlackPOS — an individual who uses a variety of nicknames, including “Antikiller” — the POS malware is roughly 207 kilobytes in size and is designed to bypass firewall software. The barebones “budget version” of the crimeware costs $1,800, while a more feature-rich “full version” — including options for encrypting stolen data, for example — runs $2,300.



THE ATTACK

Target has yet to honor a single request for comment from this publication, and the company has said nothing publicly about how this breach occurred. But according to sources, the attackers broke in to Target after compromising a company Web server. Somehow, the attackers were able to upload the malicious POS software to store point-of-sale machines, and then set up a control server within Target’s internal network that served as a central repository for data hoovered by all of the infected point-of-sale devices.

“The bad guys were logging in remotely to that [control server], and apparently had persistent access to it,” a source close to the investigation told KrebsOnSecurity. “They basically had to keep going in and manually collecting the dumps.”

It’s not clear what type of software powers the point-of-sale devices running at registers in Target’s U.S. stores, but multiple sources say U.S. stores have traditionally used a home-grown software called Domain Center of Excellence, which is housed on Windows XP Embedded and Windows Embedded for Point of Service (WEPOS). Target’s Canadian stores run POS devices from Retalix, a company recently purchased by payment hardware giant NCR. According to sources, the Retalix POS systems will be rolled out to U.S. Target locations gradually at some point in the future.

WHO IS ANTIKILLER?


Image: Securityaffairs.co

A more full-featured Breadcrumbs-level analysis of this malware author will have to wait for another day, but for now there are some clues already dug up and assembled by Russian security firm Group-IB.

Not long after Antikiller began offering his BlackPOS crimeware for sale, Group-IB published an analysis of it, stating that “customers of major US banks, such as such as Chase (Newark, Delaware), Capital One (Virginia, Richmond), Citibank (South Dakota), Union Bank of California (California, San Diego), Nordstrom FSB Debit (Scottsdale, Arizona), were compromised by this malware.”

In his sales thread on at least one crime forum, Antikiller has posted a video of his product in action. As noted by Group-IB, there is a split second in the video where one can see a URL underneath the window being recorded by the author’s screen capture software which reveals a profile at the Russian social networking site Vkontakte.ru. Group-IB goes on to link that account to a set of young Russian and Ukranian men who appear to be actively engaged in a variety of cybercrime activities, including distributed denial-of-service (DDoS) attacks and protests associated with the hackivist collective known as Anonymous.

One final note: Dozens of readers have asked whether I have more information on other retailers that were allegedly victimized along with Target in this scheme. According to Reuters, “smaller breaches on at least three other well-known U.S. retailers took place and were conducted using similar techniques as the one on Target.” Rest assured that when and if I have information about related breaches I feel confident enough about to publish, you will read about it here first.



To: Shoot1st who wrote (7265)1/17/2014 10:15:02 AM
From: joseffy  Respond to of 16547
 
The Military Experience of Anti-Veteran Republicans Paul Ryan, John Boehner, and Eric Cantor


None, 8 weeks, and None


Paul Ryan: NONE

John Boehner: 8 weeks - Graduating from Moeller in 1968, when U.S. involvement in the Vietnam War was at its peak, Boehner enlisted in the United States Navy but was honorably discharged after eight weeks because of a bad back

Eric Cantor: NONE



To: Shoot1st who wrote (7265)1/17/2014 3:19:29 PM
From: joseffy  Respond to of 16547
 
NSA Official: 'We Are Now a Police State'
....................................................................

December 19, 2013 By Matt Vespa
cnsnews.com



Last year, high-ranking NSA official Bill Binney said, “We are, like, that far from a turnkey totalitarian state.” Now, Binney says that the U.S. has already become a full-blown police state.

Binney told Washington’s Blog on Wednesday that:

“The main use of the collection from these [NSA spying] programs [is] for law enforcement. [See the 2 slides below].”





“These slides give the policy of the DOJ/FBI/DEA etc. on how to use the NSA data. In fact, they instruct that none of the NSA data is referred to in courts – cause it has been acquired without a warrant.”

“So, they have to do a ‘Parallel Construction’ and not tell the courts or prosecution or defense the original data used to arrest people.

This I call: a ‘planned programed perjury policy’ directed by US law enforcement.”

“And, as the last line on one slide says, this also applies to ‘Foreign Counterparts.’”

“This is a total corruption of the justice system
not only in our country but around the world. The source of the info is at the bottom of each slide. This is a totalitarian process – means we are now in a police state.”

Binney, a 32-year veteran of the agency, was instrumental in the creation of the NSA’s surveillance program for digital information. He also served as the NSA’s senior technical director.

As a result, he’s been sought after by a multitude of media outlets, like CBS, ABC, CNN, New York Times, USA Today, Fox News, and PBS.

Concerning the collection of data by federal agencies mentioned by Binney, Washington’s Blog added that:

“By way of background, the government is spying on virtually everything we do.”

All of the information gained by the NSA through spying is then shared with federal, state and local agencies, and they are using that information to prosecute petty crimes such as drugs and taxes. The agencies are instructed to intentionally “launder” the information gained through spying, i.e. to pretend that they got the information in a more legitimate way … and to hide that from defense attorneys and judges."

and to hide that from defense attorneys and judges.” - See more at: cnsnews.com

- See more at: cnsnews.com



To: Shoot1st who wrote (7265)1/18/2014 10:30:58 AM
From: joseffy  Respond to of 16547
 


...............................................................................................................................................

credit brumar



To: Shoot1st who wrote (7265)1/18/2014 11:32:11 AM
From: joseffy  Respond to of 16547
 
· Obama Ties Pentagon's Hands In Hunting Benghazi Attackers …………………………………………………………………………………………………………..

Investors Business Daily ^ | 01/17/2014 06:49 PM ET | Editorial



To: Shoot1st who wrote (7265)1/18/2014 2:00:09 PM
From: joseffy  Respond to of 16547
 



To: Shoot1st who wrote (7265)1/20/2014 12:05:31 PM
From: joseffy  Respond to of 16547
 



To: Shoot1st who wrote (7265)1/21/2014 2:41:50 PM
From: joseffy  Respond to of 16547
 
Wall Street Advisor: Actual Unemployment is 37.2%...



To: Shoot1st who wrote (7265)1/22/2014 12:33:16 PM
From: joseffy  Respond to of 16547
 
Revealed: Dispirited Obama “Shocked” He Couldn’t Get Gun Control Passed After Newtown Massacre


The Gateway Pundit ^
| Wednesday, January 22, 2014 | Kristinn Taylor


David Remnick, author of the new nearly 17,000 word profile of President Barack Obama in the New Yorker, revealed in a podcast interview this week that a dispirited Obama told him that he misread the “moment in political history” and was shocked he could not get gun control measures passed in the wake of the December 2012 Newtown, Ct., Sandy Hook Elementary School shooting in which a lone gunman killed twenty children and six adults.



Remnick left this revelation out of his 18 page article which was based on numerous in depth interviews with Obama.

Remnick did not devote anything of substance in the article to Obama’s gun control failure
except to note he couldn’t get it done. This is curious because the way Remnick describes it, this was an enormous political failure that took a toll on Obama . Remnick should have explored this further and reported on it.

Remnick spoke about Obama’s reaction to his failure on gun control in a New Yorker podcast interview about the article with Executive Editor Dorothy Wickenden and Washington correspondent Ryan Lizza that was taped on Monday.

In describing Obama’s reaction, Remnick sounds just as shocked as he says Obama isabout the failure to pass gun control after Newtown. Remnick made his comments while speaking about Obama’s ambitious second term agenda, including gun control, that he laid out in his Inaugural address one year ago this month.

Remnick: “Well look at gun control. You had the ruthless slaughter of school children played out in front of the American public in Connecticut. If ever there was a moment emotionally and politically that serious gun control would take hold of Congress it was then. Eighty-three percent of the public was for at least some minimal gun control. The NRA was a mockery in a lot of quartersand who won? The NRA and the right.

“I think this sh.., I know this shocked Obama. He said along this trip that I followed him on that one moment in political history where he really misread what would happen was on gun control. It was a terrible failure. And I think really dispiriting.”

Obama made an angry speech in the Rose Garden after he was defeated in the Senate last April. He called it a “shameful day for Washington.”

Given the impact he says this political miscalculation had on Obama, it is curious Remnick chose not to include it in his profile but instead buried it in a podcast.



To: Shoot1st who wrote (7265)1/23/2014 1:55:35 PM
From: joseffy  Respond to of 16547
 
SOROS SPEAK--- Now Gun Grabbers are known as “Gun Safety Advocates”

Thursday, January 23, 2014 1:47:06 PM · by rktman · 4 replies
sellingthesecondamendment.com ^ | 1/22/2014 | Gregory Smith



To: Shoot1st who wrote (7265)1/24/2014 2:11:44 PM
From: joseffy  Respond to of 16547
 
Sen. Chuck Schumer (D., N.Y.) openly proposed using the Internal Revenue Service to curtail Tea Party group funding during a speech on how to “exploit” and “weaken” the movement at the Center for American Progress on Thursday. ( read more)

http://theconservativetreehouse.com/2014/01/24/being-on-the-wrong-side-of-an-rabid-progressive-regime/#more-75806

Schumer Calls for Using IRS to Curtail Tea Party Activities
Democratic senator says Obama should bypass Congress, use executive powers

BY: Alana Goodman
January 23, 2014 5:38 pm

Sen. Chuck Schumer (D., N.Y.) proposed using the Internal Revenue Service to curtail Tea Party group funding during a speech on how to “exploit” and “weaken” the movement at the Center for American Progress on Thursday.
...........
http://freebeacon.com/schumer-calls-for-using-irs-to-curtail-tea-party-activities/



To: Shoot1st who wrote (7265)1/29/2014 9:57:32 AM
From: joseffy  Respond to of 16547
 
Vladimir Lenin

"One man with a gun can control 100 without one."

Joseph Stalin

"We don't let them have ideas. Why would we let them have guns?"

"If the opposition disarms, well and good. If it refuses to disarm, we shall disarm it ourselves."

"The only real power comes out of a long rifle.



To: Shoot1st who wrote (7265)1/30/2014 11:31:54 AM
From: joseffy1 Recommendation

Recommended By
The1Stockman

  Read Replies (2) | Respond to of 16547
 
Beretta USA Chooses Tennessee for New Factory

....................................................................
Breitbart.com ^ | 1/29/2014 | AWR Hawkins




To: Shoot1st who wrote (7265)1/30/2014 11:32:31 AM
From: joseffy  Read Replies (1) | Respond to of 16547
 
The Wimp in the White House Wears Mom Jeans

........................................................................................
Canada Free Press ^ | 1/29/2014 | Paula Helton





To: Shoot1st who wrote (7265)1/30/2014 11:59:15 AM
From: joseffy  Respond to of 16547
 
The prosecutor in the D'Souza case is U.S. Attorney Preet Bharara, a former staff member to Democratic Sen. Chuck Schumer of New York and an Obama appointee. Bharara has earned a reputation for his rigorous prosecution of white-collar crime on Wall Street and has been mentioned as a potential successor to Attorney General Eric Holder.

Hasen pointed to the cases involving then-Alaska Sen. Ted Stevens and then-House Speaker Tom DeLay of Texas, both Republicans, as examples of cases that were politically motivated.

In both circumstances their convictions were overturned.