Sunday, November 14, 2021

GOTCHA AGAIN REAL GOOD! Two Waves of Sophisticated Chain Attacks Hack Into FBI Email Servers

Funny thing there was a warning sent just before, saying "Enjoy"

FBI system hacked to email 'urgent' warning about fake cyberattacks

FBI system hacked to email 'urgent' warning about fake cyberattacks
By  November 13, 2021 01:36 PM
 
"The Federal Bureau of Investigation (FBI) email servers were hacked to distribute spam email impersonating FBI warnings that the recipients' network was breached and data was stolen.
The emails pretended to warn about a “sophisticated chain attack” from an advanced threat actor known, who they identify as Vinny Troia. Troia is the head of security research of the dark web intelligence companies NightLion and Shadowbyte.
The spam-tracking nonprofit SpamHaus noticed that tens of thousands of these messages were delivered in two waves early this morning. They believe this is just a small part of the campaign.
Legitimate address delivers fake content
Researchers at the Spamhaus Project, an international nonprofit that tracks spam and associated cyber threats (phishing, botnets, malware), observed two waves of this campaign, one at 5 AM (UTC) and a second one two hours later.
The messages came from a legitimate email address - eims@ic.fbi.gov - which is from FBI’s Law Enforcement Enterprise Portal (LEEP), and carried the subject “Urgent: Threat actor in systems.”

All emails came from FBI’s IP address 153.31.119.142 (mx-east-ic.fbi.gov), Spamhaus told us.

Fake cyber attack alert from legit FBI email address

The message warns that a threat actors has been detected in the recipients' network and has stolen data from devices.

Our intelligence monitoring indicates exfiltration of several of your virtualized clusters in a sophisticated chain attack. We tried to blackhole the transit nodes used by this advanced persistent threat actor, however there is a huge chance he will modify his attack with fastflux technologies, which he proxies trough multiple global accelerators. We identified the threat actor to be Vinny Troia, whom is believed to be affiliated with the extortion gang TheDarkOverlord, We highly recommend you to check your systems and IDS monitoring. Beware this threat actor is currently working under inspection of the NCCIC, as we are dependent on some of his intelligence research we can not interfere physically within 4 hours, which could be enough time to cause severe damage to your infrastructure.


Stay safe,

U.S. Department of Homeland Security | Cyber Threat Detection and Analysis | Network Analysis Group

Spamhaus Project told BleepingComputer that the fake emails reached at least 100,000 mailboxes. The number is a very conservative estimate, though, as the researchers believe “the campaign was potentially much, much larger.”

> In a tweet today, the nonprofit said that the recipients were scraped from the American Registry for Internet Numbers (ARIN) database. While this looks like a prank, there is no doubt that the emails originate from FBI’s servers as the headers of the message show that it’s origin is verified by the DomainKeys Identified Mail (DKIM) mechanism.

> The headers also show the following FBI internal servers that processed the emails:

  • dap00025.str0.eims.cjis
  • wvadc-dmz-pmo003-fbi.enet.cjis
  • dap00040.str0.eims.cjis

The FBI confirmed that the content of the emails is fake and that they were working on solving the issue as their helpdesk is flooded with calls from worried administrators.

In a statement to BleepingComputer, the FBI said that they could not share more information due to being an ongoing situation.

"The FBI and CISA are aware of the incident this morning involving fake emails from an @ic.fbi.gov email account. This is an ongoing situation and we are not able to provide any additional information at this time. We continue to encourage the public to be cautious of unknown senders and urge you to report suspicious activity to www.ic3.gov or www.cisa.gov.” - FBI.

Aimed to discredit security researcher

Whoever is behind this campaign was likely motivated to discredit Vinny Troia, the founder of dark web intelligence company Shadowbyte, who is named in the message as the threat actor responsible of the fake supply-chain attack.

Members of the RaidForums hacking community have a long standing feud with Troia, and commonly deface websites and perform minor hacks where they blame it on the security researcher.

Tweeting about this spam campaign, Vinny Troia hinted at someone known as “pompomourin,” as the likely author of the attack. Troia says the individual has been associated in the past with incidents aimed at damaging the security researcher’s reputation.

Speaking to BleepingComputer, Troia said that “my best guess is 'pompomourin' and his band of minions [are behind this incident].”

“The last time they [pompompurin] hacked the national center for missing children’s we site blog and put up a post about me being a pedophile” - Vinny Troia

This assumption is further supported by the fact that 'pompompurin' contacted Troia a few hours before the spam email campaigns started to simply say “enjoy,” as a warning that something involving the researcher was about to happen.

Troia said that 'pompompurin' messages him every time they start an attack to discredit the researcher.

Update 11/13/21: Added statement from the FBI.

Related Articles:

Windows 10 App Installer abused in BazarLoader malware attacks

Void Balaur hackers-for-hire sell stolen mailboxes and private data

Gmail accounts are used in 91% of all baiting email attacks

FBI warns of Iranian hackers looking to buy US orgs’ stolen data

Operation Cyclone deals blow to Clop ransomware operation

Saturday, November 13, 2021

HOLIDAY SEASON AT TEMPLE SQUARE IN SALT LAKE CITY: The Church/First Presidency has set forth these "vaccination" mandates thus far . . .

Some readers of this blog might want to know this information

Tuesday, November 9, 2021

Efficacy of Salt Lake Temple Dedicatory Prayer?

Here is an excerpt from the Salt Lake Temple Dedicatory Prayer given on April 6, 1893 by Wilford Woodruff. 
"Preserve these buildings, we beseech Thee, from injury or destruction by flood or fire; from the rage of the elements, the shafts of the vivid lightning, the overwhelming blasts of the hurricane, the flames of consuming fire, and the upheavals of the earth-quake, O Lord, protect them."

Do we no longer believe in the efficacy of our dedicatory prayers for our Temples? Have we found evidence that the Lord is not preserving our temples and so we need to spend hundreds of millions of dollars to solve the problems of cracks in the foundations? flooding? lightning strikes and fires? 

Posted by

"Sidenote:

Just in case you want to go down to Temple Square  this holiday season, the Church just released this statement: https://newsroom.churchofjesuschrist.org/article/christmas-temple-square-2021
"Attendees at any events on Temple Square are required to wear masks and be vaccinated if in the eligible age categories."
So the list continues to grow. The Church/First Presidency has set forth these "vaccination" mandates thus far -
* ALL people attending ANY events on Temple Square are required to be "vaccinated".
* ALL members of the Tabernacle Choir are required to be "vaccinated".
* ALL stake patriarchs and their wives are required to be "vaccinated".
* ALL missionaries entering any of the MTC's are required to be "vaccinated".
* ALL missionaries going on foreign missions (regardless of the country they are going to) are required to be "vaccinated".
I would not be surprised in the near future for those wanting to attend the Temple (including the youth doing baptisms for the dead) will be also required to be vaccinated."

Friday, November 12, 2021

BLEEPING COMPUTER: Hackers For Hire (and what they get away with) . . .

From the evidence that Trend Micro collected, it is clear that Void Balaur focuses on selling private data to anyone willing to pay the right money. It is a cyber-mercenary group that does not care what its customers do with the data they buy.

Void Balaur hackers-for-hire sell stolen mailboxes and private data

Void Balaur hackers-for-hire sell mailboxes and private data

A hacker-for-hire group called Void Balaur has been stealing emails and highly-sensitive information for more than five years, selling it to customers with both financial and espionage goals.

With more than 3,500 targets spread across almost all continents, this prolific threat actor is advertising its services on Russian underground forums.

Security researchers at Trend Micro profiling Void Balaur’s activity say that the business model of this actor is to steal “the most private and personal data of businesses and individuals” and sell it to interested customers.

Targets include individuals as well as organizations in various sectors (telecommunications, retail, financial, medical, biotechnology), especially if they have access to troves of private data.

“Void Balaur is not only into hacking email mailboxes but is also in the business of selling the sensitive private information of its targets. This includes cell tower log data, passport details, SMS messages, and more. In addition, Void Balaur appears to target many organizations and individuals that are likely to have access to highly sensitive data on people” - Trend Micro

Wide range of services and targets

The hacking activity of Void Balaur is believed to go as far back as 2015, although the earliest references about this actor date from September 2017, in the form of complaints about the group spam advertising its services.

Paid ads from Void Balaur started to appear in 2018 on Russian-speaking forums Darkmoney (carding), Probiv, Tenec (stolen credentials), and Dublikat.

The services included access to free webmail (Gmail, Protonmail, Mail.ru, Yandex, VK), social media (Telegram), and corporate email accounts. The hackers would offer customers copies of the breached mailboxes.

In 2019, the group’s services diversified as they began to sell sensitive private data of Russian individuals for starting prices between $21 and $124. The info included:

  • passport and flight information
  • traffic camera snapshots
  • traffic police data (fines, car registration)
  • weapon registration
  • criminal records
  • credit history
  • bank account balance and statements
  • tax service records

The new services also provided data from cellular services, such as phone numbers, phone call and SMS records (with or without cell tower location), mapping the calls, phone or SIM card location, printouts of text messages.

It is unclear how Void Balaur obtained this information. Bribing insiders at telecom companies is one explanation.

[. . .]

Based on reports from Canadian non-profit eQualitie and Amnesty International, the researchers could connect Void Balaur activity to attacks that started in 2016 against human rights activists and journalists in Uzbekistan.

More recent activity from the group in September 2020 targeted political personalities in Belarus, presidential candidates, and a member of the opposition party.

In September 2021, the hackers focused on “the private email addresses of a former head of an intelligence agency, five active government ministers (including the minister of defense) and two members of the national parliament of an Eastern European country.”

Political figures and diplomats in other countries (Armenia, Ukraine, Kazakhstan, Russia, France, Italy, Norway, Slovakia), media organizations, dozens of journalists are also among the targets of Void Balaur’s phishing activity.

In another campaign that lasted between September 2020 and August 2021, Void Balaur targeted board members, directors, and executives (and their family members) of companies of a large Russian corporation. 

The beneficiaries of these attacks remain unknown, but long-term espionage campaigns typically serve nation-state, corporate, or political interests.

Another set of targets includes organizations that handle large amounts of individual sensitive data, which could be used to facilitate financially-motivated attacks:

  • Mobile and core telco companies
  • Cellular equipment vendors
  • Radio and satellite communication companies
  • ATM vendors
  • Point-of-sale (POS) system vendors
  • Fintech companies and banks
  • Business aviation companies
  • Medical insurance organizations in at least three regions of Russia
  • In Vitro Fertilization (IVF) clinics in Russia
  • Biotechnology companies that offer genetic testing services

Apart from these, Void Balaur has been constantly seeking access to cryptocurrency wallets of various exchange services (Binance, EXMO, BitPay, YoBit), using phishing sites to lure victims.

In the case of phishing EXMO users, although the threat actor had multiple domains, one of them was used for almost three years.

Overlap with Fancy Bear activity

Void Balaur emerged on Trend Micro’s radar after a source provided multiple phishing emails that the researchers initially believed to be the work of Pawn Storm, a Russian threat actor also known by the names Fancy Bear, Sednit, Pawn Storm, and Strontium.

Although they ended up attributing the emails to Void Balaur, the researchers also found an overlap between the two groups, despite the hackers-for-hire showing more diverse customers and targets.

“In total, we have observed a dozen email addresses that were targeted by both Pawn Storm during the period of 2014 to 2015, and by Void Balaur from 2020 to 2021,” the researchers write in a report today.

“Besides the religious leaders, we also saw attacks on diplomats, politicians and a journalist from both Pawn Storm and Void Balaur,” Trend Micro added.

 
Latest Articles

BEYOND MAKING WHOOPY: Getting The Greenlight To Resume Sexual Intercourse Post Partum

Planning Parenthood is one thing and then there are all sorts of unexpected things to know so
Thanks to HuffPost for going into some of those things. To save space - and to encourage you to go to the source to see more details provided, the 10 things are included in a list.

10 Things No One Tells You About Sex After You Have A Baby

Parents get real about postpartum sex, including leaky boobs, vaginal dryness, vibrators and so much more.

"When you have a baby, people are practically lining up to tell you about the endless feedings, dirty diapers and sleepless nights that lie ahead. But the conversations about what sex is like post-baby tend to be few and far between.
Many health care professionals recommend avoiding intercourse for about six weeks after giving birth to allow the body time to heal, regardless of delivery method. At your postpartum checkup around this time, the doctor or midwife will do an examand determine whether you’re cleared to resume sex and exercise.
Even if you had an uncomplicated birth experience, adjusting to all of the physical and emotional changes takes time. Mom Gracie X, an author who asked that we use her pen name, told HuffPost she was surprised by how “beat up” her body was after giving birth.
“It took me six weeks to feel ‘normal’ in terms of my girly parts — and I had a vaginal quick delivery!” she said. “Also, I felt like I was in a hormonal altered state, almost like I had a new and completely different body, swollen breasts, no sex drive and was hyperemotional.”
Many who get the green light to have sex at their postpartum appointment aren’t anywhere near ready to do so. In fact, according to a 2019 survey from Motherly, 38% of moms said it took six to 12 months after birth before they were interested in sex again. (On the other hand, 11% of respondents said they were interested in getting busy sooner than the six-week mark — which just goes to show you that the time it takes to feel ready again can vary quite a bit.)
Even if you aren’t the birthing partner — or if neither of you gave birth — sex post-baby can be a lot to contend with. You’re probably sleep-deprived, devoting what little energy you have to caring for a tiny human, and perhaps learning how to navigate your partner’s new body and fluctuating hormones.
To find out what sex after a baby is really like, we asked moms to share some of the unexpected things they discovered about the experience. (Responses have been lightly edited for length and clarity.)
1 Natural lubrication might be sorely lacking.
2 It’s not unusual for sex to be painful, at least at first. But it gets better with time.
3 Just because you had a C-section doesn’t mean you can jump back in the sack quickly — or that you’ll want to.
4 Sex toys will become your new best friends.
5 Breastfeeding can make you feel ‘touched out.’
6 If you have sex while nursing, you’ll probably leak milk.
7 Boob play might be off the table for a while.
8 In some ways, sex may actually be better after sharing this bonding experience with your partner.
9 When you’re short on downtime, you learn to embrace the quickie.
10
Don’t beat yourself up over a dry spell. Remember this is temporary.
“You get to say ‘no’ to sex. We love our partners and we want everyone happy and fulfilled, but if your body is still in recovery (from pushing an entire human out of it) or you’re tired, or your drive is just hard to muster, let sex slide for a little bit. Things will get better and more back to normal.
In the meantime, normalize solo sex in your relationship.” — Brunelle

NEW SOURCE OF NEWS ADDED HERE FOR INVESTMENT REAL ESTATE: ORION - Phoenix Top 5 News Bulletin - November 12th, 2021

Mesa, AZ – Nick Miner, CCIM of ORION Investment Real Estate reports selling a 100% occupied property at 1258 West Baseline Road for $1,500,000 or $123 per square foot and a 7.1% cap rate. Miner of ORION represented the Seller, Van’s Golf Properties LLC, while the...»
It's long been thought that employment would surge once enhanced unemployment benefits, handed out to cushion the pain of the pandemic, were allowed to expire. While many unemployed workers may not yet be ready to return to work, last week’s...»
 
CA Industrial (“CA”) announced the groundbreaking of the first phase of Luke Logistics Center in Glendale, Arizona. The development is the product of a joint venture partnership between CA Industrial and DWS/RREFF. “The groundbreaking of the first phase of Luke Logistics Center marks the...»
 
Restaurants are facing shrinking margins with higher food, fuel, labor and transportation costs, according to a report from the Restaurant Finance group at Mitsubishi UFJ Financial Group. The rise in labor costs comes from a number of post-pandemic factors including the...»
California-based business park developer Majestic Realty Co.has completely leased its Majestic 202 spec development before construction is finished. The two-building speculative development is being built located at Loop 202 and Greenfield Road in Mesa. A single tenant leased the entire...» 
 

Mesa Spec Business Park Fully Leased, Children’s Hospital Breaks Ground; 11 More Valley Real Estate Deals Rounded Up

Article originally posted on Phoenix Business Journal on November 11, 2021

California-based business park developer Majestic Realty Co.has completely leased its Majestic 202 spec development before construction is finished. The two-building speculative development is being built located at Loop 202 and Greenfield Road in Mesa. A single tenant leased the entire 158,656-square-foot, two-building property.

Majestic was represented by Stein Koss and Tom Louer of Lee & Associates for the long-term lease agreement.

Find The Complete Article Here: https://www.bizjournals.com/phoenix/news/2021/11/11/real-estate-deal-wrap-business-park-hospital.html

GIBBERISH FROM LINDSAY GRAHAM: Calling Him Out For Nonsense in A Tweet

Karl Bode writing in TechDirt takes it all on to put things about content moderation and questionable claims of conservative censorship into context.
Please take your own time to review the comments at the source

Rupert Murdoch Spreads False Claim Biden FCC Nom Wants To 'Censor Conservatives.' NewsMax & OAN Immediately Prove Him Wrong.

from the gibberish-and-nonsense dept

We'd already noted how telecom and media giants are hard at work trying to scuttle the nomination of consumer advocate Gigi Sohn to the FCC.
Sohn is broadly popular on both sides of the aisle in telecom and media circles, so companies like AT&T and News Corporation are working overtime to come up with talking points politicians can use to oppose her nomination.
This week, that included prodding Lindsey Graham to frame Sohn (who has decades of telecom policy experience) as an unqualified radical extremist looking to censor conservatives:

Gigi Sohn is a complete political ideologue who has disdain for conservatives. She would be a complete nightmare for the country when it comes to regulating the public airwaves.

— Lindsey Graham (@LindseyGrahamSC) November 9, 2021

Anybody who knows or has worked with Sohn (which is pretty much everyone in telecom policy circles, including myself) knows this is gibberish.
> Graham's rant was timed with the release of this clumsy missive by the Wall Street Journal editorial board that tries to claim Sohn wants to "censor conservatives."
 
Their evidence of this?
She supported holding Sinclair Broadcasting accountable after it lied to regulators to try and get its merger with Tribune Broadcasting approved:

"After Tribune Broadcasting abandoned its merger with the conservative-leaning Sinclair Broadcast Group in 2018, she declared, "Today is a good day for every American who believes that diversity of voices in the media is better for our democracy" and urged the FCC to "look at whether Sinclair is qualified to be a broadcast licensee at all."

 

The Journal oddly forgets to mention this important context, but Sinclair didn't just "abandon" that merger. It was blocked by the Trump FCC and then fined for using shell companies, relatives, and other shady side deals to try and pretend the Tribune merger wouldn't violate bipartisan media ownership rules. Sinclair's efforts were so legally dubious, even Trump FCC boss Ajit Pai was forced to oppose the deal. Sohn's big crime? Agreeing with Pai. This somehow gets twisted into Sohn "supporting Conservative censorship"; fairly reflective of the Journal's integrity and the quality of policy discourse in 2021.

One ironic bit that ruins AT&T's and News Corporation's lobbying efforts here: right-wing disinformation mills Newsmax and OAN (who both opposed the threat the Sinclair merger posed to smaller right wing disinformation mills) released statements in support of Sohn's nomination. Their primary justification? That she... supports conservative voices. From Newsmax commentator Bradley Blakeman:

"I know Gigi. I have worked with Gigi. And I have seen her fight for people's right to express themselves, even when she disagrees with them."

AT&T, News Corp., and Comcast very much don't want a consumer advocate at the FCC. They very much want to retain all the favors they nabbed during the Trump era, whether that is the death of net neutrality and broadband privacy rules, or the elimination of many media consolidation rules and neutered FCC consumer protection authority. Their problem is Sohn is both qualified and popular across the aisle, which is forcing them to dig a little too deeply into the nonsense bin to try and justify opposition to the nomination."

Filed Under: fcc, gigi sohn, lindsey graham, regulations, rupert murdoch

 

 

 

 

Rising Tides: First Year in Space for NASA’s Earth Flagship ...