This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Saturday, December 06, 2014

After Sony Pictures Hack Attack Employees Receive Threatening Email

Sony Pictures employees received e-mails from hackers threatening to harm them and their family members.It seems like matters for Sony Pictures is getting worse with time. Last month hacking attack on Sony Pictures Entertainment made the studio’s internal corporate systems offline and spewed confidential information onto the Internet. Hackers group that identifies itself as #GOP (Guardians of Peace) claimed responsibility for the hack and apparently stolen reams of internal corporate data as well.

Just a week after the cyber-attack on Sony Pictures Entertainment, high-quality versions of five newest films distributed by Sony Pictures leaked have made their way onto torrent file-sharing websites,online during Black Friday. Although it has not been confirmed that the leak of all the films came from the same breach, but the company suffering is the same.



  • "Still Alice" starring Julianne Moore, Alec Baldwin – US release date: Jan 16, 2015
  • "Mr Turner" starring Timothy Spall. – US release date: Dec 19, 2014
  • "Annie" starring Jamie Foxx and Cameron Diaz. – US release date: Dec 19, 2014
  • "Fury" starring Brad Pitt – US release date: Oct 17, 2014
  • "To Write Love on Her Arms" – US release date: March 2015

However, it didn’t end up here!! Just last week, the massive data breach at Sony appeared to have exposed more sensitive documents, revealing the US Social Security numbers of more than 47,000 celebrities, freelancers, and current and former Sony employees.
And now, according to several media sources, employees at Sony Pictures Entertainment were sent threatening emails from the GOP group of hackers.

The e-mail was written in English that asked the company employees, "Please sign your name to object the false (sic) of the company at the email address below, if you don't want to suffer damage. If you don’t, not only you but your family will be in danger."

Sony Pictures is working with the Federal Bureau of Investigation (FBI) to investigate the whole matter. Till then, the employees at the Studio were told to turn off their phones after receiving this email messages.
As we reported earlier, there are some possibilities that hackers working on behalf of North Korea were behind the hacking incident, though the country denied it. But Sony believes that the cyber attack on its network is the payback for upcoming Kim Jong assassination comedy film, "The Interview," which is about two journalists who are recruited by the CIA to assassinate North Korean leader Kim Jong Un.





The FBI investigating the matter said that cyber criminals have used malicious software, Wiper malware, to launch destructive cyber-attacks including the one occurred at Sony Pictures Entertainment.
The full email send by hackers to the Studio’s employee reads:

"I am the head of GOP who made you worry. 
Removing Sony Pictures on earth is a very tiny work for our group which is a worldwide organization. And what we have done so far is only a small part of our further plan.It’s your false if you if you think this crisis will be over after some time. All hope will leave you and Sony Pictures will collapse. This situation is only due to Sony Pictures. Sony Pictures is responsible for whatever the result is. Sony Pictues clings to what is good to nobody from the beginning. It’s silly to expect in Sony Pictures to take off us. Sony Pictures makes only useless efforts. One beside you can be our member.

Many things beyond imagination will happen at many places of the world. Our agents find themselves act in necessary places. Please sign your name to object the false of the company at the email address below if you don’t want to suffer damage. If you don’t, not only you but your family will be in danger.

Nobody can prevent us, but the only way is to follow our demand. If you want to prevent us, make your company behave wisely."







Wednesday, December 03, 2014

One Click Paypal Account Hack

An Egyptian security researcher, Yasser H. Ali has discovered three critical vulnerabilities in PayPal website including CSRF, Auth token bypass and Resetting the security question, which could be used by cybercriminals in the targeted attacks.
Cross-Site Request Forgery (CSRF or XSRF) is a method of attacking a website in which an attacker need to convince the victim to click on a specially crafted HTML exploit page that will make a request to the vulnerable website on their behalf.

This vulnerability enabled my to completely bypass the CSRF Prevention System implemented by PayPal, The vulnerability is patched very fast and PayPal paid me the maximum bounty they give ;). -Yasser H. Ali

1- Reusable CSRF Token:
The CSRF token “that authenticate every single request made by the user” which can be also found in the request body of every request with the parameter name “Auth” get changed with every request made by user for security measures, but after a deep investigation I found out that the CSRF Auth is Reusable for that specific user email address or username, this means If an attacker found any of these CSRF Tokens, He can then make actions in the behave of any logged in user.
Hmm, it seems interesting but still not exploitable, as there is no way for an attacker to get the “Auth” value from a victim session.

2- Bypassing the CSRF Auth System:
The CSRF Auth verifies every single request of that user, So what If an attacker “not logged in” tries to make a “send money” request then PayPal will ask the attacker to provide his email and password, The attacker will provide the “Victim Email” and ANY password, Then he will capture the request, The request will contain a Valid CSRF Auth token Which is Reusable and Can authorise this specific user requests. Upon Further Investigation, We have found out that an Attacker can obtain the CSRF Auth which can be valid for ALL users, by intercepting the POST request from a page that provide an Auth Token before the Logging-in process, check this page for the magical CSRF Auth “https://www.paypal.com/eg/cgi-bin/webscr?cmd=_send-money”. At this point the attacker Can CSRF “almost” any request on behave of this user.




The application generates a valid "Auth" token for a logged-out user!
The application generates a valid “Auth” token for a logged-out user!
Through examination of the password change process, I have found that an attacker can NOT Change the victim password without answering the Security Questions set by user, Also the user himself can NOT change the security questions without entering the password!

3- ByPassing the Security Questions Change:
Screen Shot 2014-08-13 at 12.20.52 AM

The initial process of “setting” security questions is not password protected and is reusable
After further investigation, I have noticed that the request of setting up the security questions “which is initiated by the user while signing up” is not password-protected, and it can be reused to reset the security questions up without providing the password, hence, Armed with the CSRF Auth, an attacker can CSRF this process too and change the victim’s Security questions.

At this point, An attacker can conduct a targeted CSRF attack against a PayPal users and take a full control over his account Hence, An attacker can CSRF all the requests including but not limited to:

1- Add/Remove/Confirm Email address
2-Add fully privileged users to business account
3- Change Security questions
4- Change Billing/Shipping Address
5- Change Payment methods
6- Change user settings(Notifications/Mobile settings) ………… and more.
To automate the who process, I have coded a Python interactive server to demonstrate how an attacker can exploit this vulnerability in a real-life scenario attack.

source: http://yasserali.com/hacking-paypal-accounts-with-one-click/
Here is the POC Video: