Jump to content


Active Members
  • Posts

  • Joined

  • Last visited

  • Days Won


Stfean_Iordache last won the day on June 10 2014

Stfean_Iordache had the most liked content!

About Stfean_Iordache

  • Birthday 08/05/1990

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

Stfean_Iordache's Achievements


Newbie (1/14)



  1. A Linux worm first spotted in November has joined the growing ranks of malware mining for crypto-currency. The worm is called Darlloz. Late last year, Symantec reported that the worm was spreading via a known vulnerability in PHP that was patched in 2012. "The worm targets computers running Intel x86 architectures," blogged Symantec researcher Kaoru Hayashi. "Not only that, but the worm also focuses on devices running the ARM, MIPS and PowerPC architectures, which are usually found on routers and set-top boxes. Since the initial discovery of Linux.Darlloz, we have found a new variant of the worm in mid-January. According to our analysis, the author of the worm continuously updates the code and adds new features, particularly focusing on making money with the worm." The most recent update includes functionality that installs 'cpuminer' and begins mining for Mincoins or Dogecoins, which are similar to bitcoins. The main reason for this is Mincoin and Dogecoin use the scrypt algorithm, which can still successfully mine on home PCs, whereas bitcoin requires custom ASIC chips to be profitable, the researcher explained. "By the end of February 2014, the attacker mined 42,438 Dogecoins (approximately US$46 at the time of writing) and 282 Mincoins (approximately US$150 at the time of writing)," Hayashi blogged. "These amounts are relatively low for the average cybercrime activity so, we expect the attacker to continue to evolve their threat for increased monetization." While the initial version of Darlloz has nine combinations of usernames and passwords for routers and set-top boxes, the latest version comes armed with 13 of these login credential combinations - including ones that work for IP cameras. Once a device is infected, the malware starts a HTTP Web server on port 58455 in order to spread. The server hosts worm files and lets anyone download files through this port by using a HTTP GET request, the researcher explained. "The Internet of Things is all about connected devices of all types," Hayashi blogged. "While many users may ensure that their computers are secure from attack, users may not realize that their IoT (Internet of Things) devices need to be protected too. Unlike regular computers, a lot of IoT devices ship with a default user name and password and many users may not have changed these. As a result, the use of default user names and passwords is one of the top attack vectors against IoT devices. Many of these devices also contain unpatched vulnerabilities users are unaware of. While this particular threat focuses on computers, routers, set-top boxes and IP cameras, the worm could be updated to target other IoT devices in the future, such as home automation devices and wearable technology." The worm also includes functionality to block other malware to keep other attackers from controlling an infected device. So far, Symantec has identified more than 31,000 unique IP addresses as being infected. Thirty-eight percent appear to be IoT devices such as routers, IP cameras and printers. Five regions of the world that account for half of the Darlloz infections are China, South Korea, Taiwan, India and the United States. "Consumers may not realize that their IoT devices could be infected with malware," blogged Hayashi. "As a result, this worm managed to compromise 31,000 computers and IoT devices in four months and it is still spreading. We expect that the malware author will continue to update this worm with new features as the technology landscape changes over time. Symantec will continue to keep an eye on this threat." Sursa : Linux Worm Turns Focus to Digital Dollars | SecurityWeek.Com
  2. mersi am adaugat pe toata lumea lunea asta incep sa sterg din paginile mai vechi
  3. Da . Cam asta e businessul . Cumperi ieftin vinzi mai scump . ON : 10 cupoane de cate 50$ fiecare le dai cu 45 in total ? De asemenea merg folosite unul dupa altul ? Adica cu 45$ eu imi bag in facebook 500$ ?
  4. Security researchers have uncovered a total of 22 vulnerabilities affecting the custom Java Virtual Machine (JVM) implementation used in Oracle Database. The issues affecting Oracle JVM (Aurora VM) were reported to Oracle last week by Poland-based security research company Security Explorations, which has been working on this project for the past four months. Adam Gowdiak, the company's CEO and founder, told SecurityWeek that Oracle indirectly confirmed on Tuesday the existence of six of the flaws, which have been fixed in the main codeline and are scheduled for a future Critical Patch Update (CPU). The rest of the flaws have been assigned a status of "under investigation / being fixed in main codeline." Update: As of Friday, June 27, Security Explorations told SecurityWeek that Oracle has confirmed 20 of the 22 reported vulnerabilities. The vulnerabilities can be leveraged by an attacker for privilege escalation and to execute arbitrary Java code on an affected Oracle Database server. "A malicious user with a bare minimum privilege required to connect and login to Oracle Database (with 'CREATE SESSION' privilege only) can successfully compromise the security of the software that according to Oracle's CEO 'hasn't been broken into for a couple of decades by anybody' and that is 'so secure, there are people that complain'," Gowdiak explained. "By escaping the Java VM security sandbox of Oracle Database, one can easily gain database admin privileges in it. Java based exploits make such a privilege elevation in particular simple," he added. "Java security vulnerabilities can have a devastating effect not only for desktop users (Java Plugin in the browser), but also for cloud and database environments." The vulnerabilities are caused by flaws in the Java Reflection API, which has been responsible for a lot of Java SE security issues in 2012 and 2013, the expert told SecurityWeek. "It's been almost 2 years since Java Reflection API issues were brought to the public attention. Regardless of that, simple instances of these issues are still present in Oracle products other than Java SE," Gowdiak said. Security Explorations has successfully reproduced the exploits on Oracle Database 11g Release 2 ( for Microsoft Windows x64, Oracle Database 11g Release 2 ( Patch Bundle 18590877 for Microsoft Windows x64, Oracle Database 12c Release 1 ( for Microsoft Windows x64 and Oracle Database 12c Release 1 ( Bundle Patch 18724015 for Microsoft Windows x64. Sursa : 22 Vulnerabilities Found in Oracle Database Java VM Implementation | SecurityWeek.Com
  5. Da , dar sunt si dezavantaje . Se renunta practic la anonimitate complet , ceea ce intr-o tara democrata nu ar trebui sa fie ok .
  6. Salut . In primul rand vezi ca e 5000 coins - 1$ iar dintr-un click faci pana in 9 coins . In al doilea rand nu mai face posturi din astea ca mai mult faci reclama negativa . Daca vrei sa iti faci referrals atunci pune in semnatura un banner cum am pus si eu .
  7. vplus sucks au abandonat treaba de mult timp , dar eu caut ceva gen vplus/voyo/netflix doar sa aiba toate serialele si complete .... nu veniti cu dughene de site-uri cu 50 popuri si sa astept juma de ora sa ma prind care e reclama si care e playerul adevarat....
  8. haaha asta ar merge poate daca aveti proxyuri private din alea de 1$ bucata altfel cu cele scrapeuite o sa va ceara din prima captcha daca vreti sa faceti ceva bun luati api-ul de la deathbycaptcha si bagati-l in bot (au dll gata facut).
  9. Un backtrack cu design mai dragut , sau care e diferenta ?
  10. Mai da o data linkul . Nu am putut adauga pe toata lumea deoarece unii deja aveau linkul in sistem si nu poate fii adaugat de pe 2 conturi . Same .
  11. Buna seara . Care este cel mai bun site de seriale subtitrate (in romana/engleza) ? Nu ma deranjeaza sa fie platit , dar sa nu fie serialepenet.ro (nu vreau sa fac ordin de plata , iar codurile de la gecko au expirat) . Site-ul daca e cu plata sa accepte paypal eventual . Sa nu fie cu 500 popupuri/reclame/ads and shit si sa nu fie serialele uploadate pe kkt de servere unde stau 50 de min sa mi se incarce primele 5 min .
  12. E in beta in curand il lansez . Cat despre ceilalti v-am adaugat
  13. salve 1 2 conturi de yahoo mai ai?

  14. Salut , ma poti ajuta si pe mine cu niste likeuri la aceasta pagina ?


    Multumesc anticipat.

  • Create New...