hacker

Latest

  • PWN 2 OWN over: MacBook Air gets seized in 2 minutes flat

    by 
    Darren Murph
    Darren Murph
    03.27.2008

    And just think -- last year you were singing Dino Dai Zovi's praises for taking control of a MacBook Pro in nine whole hours. This year, the PWN 2 OWN hacking competition at CanSecWest was over nearly as quickly as the second day started, as famed iPhone hacker Charlie Miller showed the MacBook Air on display who its father really was. Apparently Mr. Miller visited a website which contained his exploit code (presumably via a crossover cable connected to a nearby MacBook), which then "allowed him to seize control of the computer, as about 20 onlookers [read: unashamed nerds] cheered him on." Of note, contestants could only use software that came pre-loaded on the OS, so obviously it was Safari that fell victim here. Nevertheless, he was forced to sign a nondisclosure agreement that'll keep him quiet until "TippingPoint can notify the vendor," but at least he'll have $10,000 and a new laptop to cuddle with during his silent spell.

  • PWN 2 OWN contest lets hackers choose Vista, OS X or Linux

    by 
    Darren Murph
    Darren Murph
    03.27.2008

    Last year's PWN 2 OWN contest at the CanSecWest security conference went over way better than expected (read: exploits were glorified), so this year, organizers have spiced things up by letting hackers have their way with three separate machines. The Linux, OS X and Vista-based rigs were all setup as similarly as possible in order to "make sure the attack surface was the same on all of them." For attendees in Vancouver, there sits a $20,000 top prize -- which dwindles with each passing day as restrictions on attacks ease up -- but it can only be acquired if an all new zero-day cyber roundhouse kick is used. Anyone here going to give it a go? You get to keep the freshly victimized laptop too, you know.

  • WoW Rookie: Account Security Basics

    by 
    Amanda Dean
    Amanda Dean
    03.17.2008

    Recently we've had several posts about being hacked, guild banks assaulted, and Blizzard's typical response. The Customer Service Forum is filled with threads started by desperate World of Warcraft players seeking the return of their accounts and belongings as a gesture of goodwill. It is our responsibility to keep our accounts safe from hackers. I speak from experience when I say that being hacked is just dreadful. Although it is usually possible to have your account returned, there is usually significant damage done in the process. In the past, even Blizzard employees have had their accounts compromised. This post is designed to help you do the best you can to protect your World of Warcraft investment.

  • Another blow in the keylogging experience

    by 
    Amanda Dean
    Amanda Dean
    03.15.2008

    Thank you all for the encouragement I received in response to my recent keylogging experience. As a whole the experience was just dreadful. As I mentioned on last week's WoW Insider Show podcast, I am still afraid every time I log in that I will get the "The information you have entered is not valid" error. For the most part things have settled down, but the fear remains. The worst part of the keylogging episode was that my Shaman was transferred from a PvP to PvE server. After about a week in limbo my beloved Tauren was returned to her proper place. I was extremely relieved. Unfortunately that's the only thing on my account that Blizzard was kind enough to restore. They refused to return any of my gear or gold and did nothing about the items ninjaed from the guild bank. I appealed their decision with several emails. Those appeals were ubiquitously denied despite logical arguments and heart-filled plights. I thought it was all over, for better or for worse. I got more bad news in my email box the other day:

  • Your Christmas gift could be hacking your WoW account

    by 
    Daniel Whitcomb
    Daniel Whitcomb
    02.17.2008

    Hackers seem to be trying more and more ways to get legitimate accounts out of players hands and working to steal and farm more gold, but if you think they've had some sneaky schemes in the past, you ain't seen nothing yet. Our colleagues at Massively have a story that's both amazing and disturbing at the same time. A lot of geeks found a digital photo frame under the tree this year. Seems like a good idea, I'm sure a lot of us have a pretty large collection of digital photographs stored on memory cards and flash drives that we just haven't quite gotten around to printing for display. Unfortunately, certain frames sold at Best Buy, Target, Costco and Sam's Club come with an extra undocumented feature, in that they have a nasty little bug that's being dubbed Mocmex. The bug can burrow its way into your computer, latch itself in, and sniff out account information. It doesn't seem to affect Linux or Macs, at least not in its current form, but right now there doesn't seem to be a single manufacturer or frame type that's infected, so the origin of the bug hasn't been nailed down. If you think you've got one of the infected picture frames, Massively recommends contacting the SANS institute and calling the store where the frame was purchased. You can check their story for the contact information. The upside of this, I suppose, is that if the farmers are starting to branch into using peripherals to steal our accounts, they may be getting pretty desperate. The downside is, when we have people who practice safe web browsing and keep a clean computer getting bitten, like our Amanda Dean for example, we could be in some trouble. With any luck, all the major virus programs will have a cure for Mocmex and programs like it soon. In the meantime, it looks like we'll have to be extra careful about what we install on our computers, and make sure our anti-virus programs and firewalls are up to date.

  • Breakfast Topic: Hacked

    by 
    Amanda Dean
    Amanda Dean
    02.15.2008

    My first post on WoW Insider was about a friend of mine being hacked, this time it's about me. I woke yesterday and tried to copy a character over to the public test realm as I've been doing often lately. I got a password error. I tried to log into my account- same thing. My email had this happy little surprise for me: Hello Amanda, The character transfers listed below have been completed as of 2/14/2008. The character[s] listed will now appear in the new location and/or account selected and are immediately available for play! - <character> - Level 70 Tauren Shaman - now on realm: Blade's Edge.

  • Oh Noes!!!1!1!1one: I've been hax0red!

    by 
    Amanda Dean
    Amanda Dean
    02.05.2008

    On Saturday night I noticed a guildie acting strangely. He kept switching between characters and wouldn't respond to tells from even his closest friends in the guild. Concerned about him, we gave him a call... on the phone, to see what was up. You guessed it, he was nowhere near his computer at the time. He went to log in and found his password was changed. Unfortunately, he had also forgotten the correct response to his secret question "What is your favorite activity?" The hacker kept running in and out of the Shadow Labyrinth. I checked the customer service forums and found that this was common behavior among hackers. Either there is an exploit in that instance, or hackers just really enjoy hanging out with Blackheart the Inciter. I'm leaning toward the latter.

  • Hackers reportedly targeting cities' power systems

    by 
    Darren Murph
    Darren Murph
    01.19.2008

    We know, hackers tend to get a pretty bad rap these days, but with some of 'em out there creating ginormous gridlocks in Los Angeles and shutting down networks in enemy territories, we sort of understand the sentiment. Most recently, it seems that hackers are being blamed for "penetrating power systems (sound familiar?) in several regions outside the US, and in at least one case, causing a power outage affecting multiple cities." That's according to Tom Donahue, a CIA official, who failed to dole out critical details such as where or when the attacks occurred nor how many folks were actually left in the dark. 'Course, Bruce Schneier, CTO of security firm BT Counterpane, warns that these attacks could in fact be aided by individuals with administrative access to said systems, implying that "human vulnerability" could share at least some of the blame. Don't worry guys, we're faxing CTU right now, they'll be right on it within 72 business hours.[Image courtesy of WPS]

  • Experts predict malware field day for iPhone in '08

    by 
    Chris Ziegler
    Chris Ziegler
    12.17.2007

    Like Y2K and the end of rock and roll, pundits love to call out platforms that are ripe for a nightmarish, post-apocalyptic hell-on-earth sort of attack by the world's technologically inclined miscreants. In that vein, mobile phones have been billed for years as the next great frontier in virii, largely because they're getting smarter, more open, and more ubiquitous than ever before. We can buy that logic, but the waves upon waves of malicious code infecting the world's smartphones simply haven't happened. So at what point do we say that these analysts are crying wolf?Now might not be a bad time to start, as Arbor Networks' security group is calling the iPhone a likely target in 2008 by hackers who want to "be the first to hack a new platform." We wouldn't dare say that there won't be attacks on the iPhone's security holes next year and beyond, but we don't think users need to be scrambling to disable their data connections, either; Windows Mobile, Symbian, Palm OS, and everyone else have gotten along fine for years aside from the occasional malware blip on the radar that barely makes a splash and goes unnoticed by 99 percent of the world's users. Not to mention the fact that the opportunity to "be the first" to hack the iPhone has come and gone -- so to the hackers of the world who're thinking about diving into the wide world of iPhone hacking, may we suggest you put your brainpower to the forces of good, not evil?

  • SlySoft's latest AnyDVD beta cracks BD+

    by 
    Darren Murph
    Darren Murph
    11.07.2007

    Regardless of what those oh-so-knowledgeable analysts had to say, we all knew this day was coming. Yep, that highly-touted, totally "impenetrable" copy protection technology known as BD+ has officially been brought to its knees, and it's not at all surprising to hear that we have SlySoft to thank. The AnyDVD 6.1.9.6 beta has quite a comical change log too, and aside from noting that users now have the ability to backup their BD+ movies and watch titles sans the need for HDCP-compliant equipment, it also includes a candid note to Twentieth Century Fox informing the studio that its prior assumptions about BD+'s effectiveness were apparently incorrect. You know the drill, hit the read link below to try 'er out.[Thanks, Aaron]

  • Apple sends takedown notice to iPod hacker's ISP

    by 
    Mike Schramm
    Mike Schramm
    09.25.2007

    Yesterday, Erica posted in her state of the iPod touch jailbreak that a hacker named "Martyn" had obtained a broken iPod touch, and was planning to dive in and download every bit of code on it in the increasingly complicated effort to put 3rd party applications on the iPod touch. He didn't plan to release the code to the public, but he did plan to upload the code to a secured area of his site in order to let the other touch hackers have a crack at it.But even before his upload finished, we're told, his ISP showed up, with a takedown notice in hand. Apple had somehow found his site, had contacted his ISP, and let them know that it would be against copyright law for him to upload that code to the Internet. Martyn isn't interested in breaking the law (and it would be illegal to share that code), so he pulled the page off. But what's amazing here is how fast Apple moved on this-- either they've got someone listening in on the development wiki, or they're taking cues from us on how things are going over there (hi, Apple!).Despite what we've heard before, clearly they are very, very interested in making sure the iPod touch doesn't get hacked. Martyn tells me, as has Erica, that Apple has clearly gone out of their way to keep hackers out of their latest iPod. We're also told that progress continues despite all that, but Apple is apparently bending over backwards to do everything they can to keep the iPod touch closed.

  • Workaround enables Netflix 'Watch Now' titles to be decrypted, saved

    by 
    Darren Murph
    Darren Murph
    08.08.2007

    Looking for a new way to use FairUse4WM? Have a Netflix account? If so, go on and roll your sleeves up, as a crafty (and acrimonious) fellow has managed to find a workaround that enables you to not only decrypt the DRM-laced "Watch Now" movie files, but save them to your hard drive for future viewing. Admittedly, the process is somewhere between painless and potentially frustrating, but the gist of it involves Windows Media Player 11, FairUse4WM, Notepad, a Netflix account, and a broadband connection. Through a series of hoop jumping, users can now strip the "Watch Now" files free of DRM and watch them at their leisure and on any video-playing device they choose. Granted, there's certainly issues of legality mixed in here, but where there's a will, there's a way. [Warning: Read link language potentially NSFW][Via TVSquad]

  • Wii update provides minor menu changes, could brick modded consoles

    by 
    Darren Murph
    Darren Murph
    08.07.2007

    It's that time again folks -- the moment when you're rushing out of the house, but you make the oh-so-wise decision to head in even later rather than leaving that glowing Wii unattended. Today, Wii owners in Europe, Japan, and the US can download a shiny new firmware update, which institutes a new digital clock on the main menu, a few "aesthetic changes to the Wii Shop," an updated Forecast Channel window, a "Today's Accomplishments" note on the message board, and a made over Wii Shop that "changes the way Virtual Console games are ordered." Also of note, some users are reporting that a message appears before updating that states: "If your Wii console has an unauthorized technical modification, this upgrade could cause interoperability of your console." Of course, this shouldn't come as a surprise considering the Big N's crackdown on modders, but in our single attempt of updating a Wii not left on standby, the aforementioned statement did not appear. So go on, head on down and get to updatin' (if you're not chipped, that is), and do let us know how your experience goes.[Via The Wolf Web]UPDATE: We've seen numerous reports of the new firmware not bricking modded Wii consoles, and that includes machines using Cyclowiz and WiiKey. If you're courageous enough, give it a go yourself and let us know how it turns out in comments.

  • Mod chip raid victim details the experience

    by 
    Darren Murph
    Darren Murph
    08.04.2007

    While US Immigrations and Customs Enforcement are remaining tight-lipped about what exactly they have seized thus far, a certain modder has come forward to depict his story and explain the experience of getting raided by the fuzz. After agents woke up his grandmother and perused her domicile with a warrant in hand, they confiscated a number of consoles and spare parts around the house before heading out to find the man behind FallsInc. Once locating him at his girlfriend's dwelling, they persuaded him to hand over everything even remotely related to modding, and he was left with "nothing of worth" outside of a computer monitor and his vehicle. Unsurprisingly, the culprit (or victim, depending on perspective) feels that his "life was taken away by a ludicrous interpretation of the DCMA" as the "little guy" was taken down while mass piraters remain at large. To read his whole account, be sure and tag the read link.

  • Voting machine producers criticize critiques

    by 
    Darren Murph
    Darren Murph
    07.31.2007

    Voting machine makers scoffing at bad reviews? That's preposterous! Actually, it's not all that alarming to hear that Diebold, Hart InterCivic, and Sequoia Voting Systems all had less-than-amicable responses to a state study that "found that their machines could be breached by hackers." Of course, we're not exactly sure what all that groaning is about, as we've seen nothing but proof to back the investigation up. Nevertheless, Sequoia dubbed the review "an unrealistic, worst-case-scenario evaluation," Diebold kvetched that the study didn't look at its most recently developed software, Hart found "several inconsistencies, alternate conclusions, and errors," and Elections Systems & Software bypassed the rigmarole entirely by failing to provide their information to the secretary of state. Oh, the irony. [Warning: Read link requires subscription]

  • Analyst claims BD+ is impenetrable for ten years, hackers chuckle

    by 
    Darren Murph
    Darren Murph
    07.10.2007

    We must say, it feels awfully good to not be Richard Doherty of the Envisioneering Group right about now, as he's probably taking an incredible amount of flack for his nonchalant comments made in the latest issue of HMM. As seen in the scan, Mr. Doherty claims that "BD+, unlike AACS, which suffered a partial hack last year, won't likely be breached for ten years." As if that weren't comical enough, he also added that "if it were, the damage would affect one film and one player," essentially nullifying his prior claim of invincibility. Of course, he did mention that BD+ offered up "four times the safeguards on top of AACS against piracy," so we'll give the oh-so-inundated hackers about four times longer than usual to prove this guy wrong.[Via Slashdot]

  • PSP firmware hack drives Lumines sales

    by 
    Kyle Orland
    Kyle Orland
    06.25.2007

    Well that was fast. It was just Saturday that hackers at Noobz found a buffer overflow exploit in the puzzle classic Lumines that allowed hackers to run a simple Hello World program on any PSP firmware, including the recently released version 3.5. By Sunday, our blogging brethren at PSPFanboy caught the above screengrab of Amazon's Movers and Shakers page showing the game's sales jumping a ludicrous 5900 percent in just one day. As of this posting Monday morning, the same page shows a more moderate 750 percent rise pushing the two-year-old title to the second-highest spot on Amazon's video game sales charts.We understand that there are a lot of people out there that want to exploit this new, uh, exploit to run homebrew code on their PSPs. What we don't understand is how there can be so many PSP owners out there that don't already own Lumines. How do you buy a PSP and not immediately pick up this hauntingly beautiful musical puzzler? We suppose there could be some PSP owners out there who eschew UMDs altogether for legally questionable emulators, but really, if you need a firmware hack to justify shelling out a few bucks for such sublime puzzle goodness then we don't want to be your friend anymore.

  • Hacked Xbox 360 firmware prevents banning

    by 
    Thomas Ricker
    Thomas Ricker
    05.31.2007

    In today's episode of tit-for-tat, hackers have blocked Microsoft's attempt to ban their modified consoles. Just two weeks ago remember, Microsoft began checking and then banning Xbox 360 consoles from Xbox Live if the Big M found the gear to be modified in violation of the Terms of Use. However, new firmware -- a tat if you will -- was just released by the lively (to say the least) modding community making hacked Xbox 360s invisible to Microsoft's snooping; if they can't see it, they can't ban it. Now come on Microsoft, show us your tit. Erm.

  • Apple issues fix for recently discovered QuickTime flaw

    by 
    Darren Murph
    Darren Murph
    05.02.2007

    Just over a week after a dubious duo found a way to commandeer a Mac thanks to an elusive flaw in QuickTime (of all things), Apple's security police have purportedly fixed the flaw and issued an update. Apparently, the hole could be "exploited through a rigged website and let an attacker control computers running both Mac OS X and Windows," and the firm elaborated by stating that a "maliciously crafted Java applet could lead to arbitrary code execution" if users didn't apply the patch. The newest version of QuickTime now sits at 7.1.6, and reportedly "repairs the problem by performing additional checking," and interestingly enough, Apple seemingly tipped its hat to Dino Dai Zovi and the TippingPoint Zero Day Initiative for reporting the issue. So make sure you fire up that Software Update today if you haven't already -- a presumably small bundle of downloadable joy should be waiting.

  • Microsoft corroborates Windows Vista OEM hacks

    by 
    Darren Murph
    Darren Murph
    04.12.2007

    At least Redmond can't say that no one told them so, as the folks at Microsoft are finally holding up a hesitantly-raised white flag and admitting that Windows Vista is indeed far from crack-proof. After depressing the mental "Allow" button, Microsoft Senior Product Manager Alex Kochis has come to grips with the Vista hacks that are currently floating around (and apparently functioning). Interestingly, he insinuates that the company will be looking at ways to "disrupt the business model of organized counterfeiters and protect users from becoming unknowing victims," but also mentioned that it wouldn't be rushing out in a likely futile attempt to nab every "mad scientist" (saywha?) on a mission to hack Windows. Hmm, wonder if that has anything to do with the barren efforts it exhausted trying to one-up FairUse4WM?