Skip to main content

Posts

FBI ISSUES ALERT OVER TWO NEW MALWARE LINKED TO HIDDEN COBRA HACKERS. The US-CERT has released a joint technical alert from the DHS and the FBI, warning about two newly identified malware being used by the prolific North Korean APT hacking group known as Hidden Cobra. Hidden Cobra, often known as Lazarus Group and Guardians of Peace, is believed to be backed by the North Korean government and known to launch attacks against media organizations, aerospace, financial and critical infrastructure sectors across the world. The group was even associated with the WannaCry ransomware menace that last year shut down hospitals and businesses worldwide. It is reportedly also linked to the 2014 Sony Pictures hack, as well as the SWIFT Banking attack in 2016. Now, the Department of Homeland Security (DHS) and the FBI have uncovered two new pieces of malware that Hidden Cobra has been using since at least 2009 to target companies working in the media, aerospace, financial, and critical infrastructure sectors across the world. The malware Hidden Cobra is using are—Remote Access Trojan (RAT) known as Joanap and Server Message Block (SMB) worm called Brambul. Let's get into the details of both the malware one by one. Joanap—A Remote Access Trojan According to the US-CERT alert, "fully functional RAT" Joanap is a two-stage malware that establishes peer-to-peer communications and manages botnets designed to enable other malicious operations. The malware typically infects a system as a file delivered by other malware, which users unknowingly download either when they visit websites compromised by the Hidden Cobra actors, or when they open malicious email attachments. Joanap receives commands from a remote command and control server controlled by the Hidden Cobra actors, giving them the ability to steal data, install and run more malware, and initialize proxy communications on a compromised Windows device. Other functionalities of Joanap include file management, process management, creation and deletion of directories, botnet management, and node management. During analysis of the Joanap infrastructure, the U.S. government has found the malware on 87 compromised network nodes in 17 countries including Brazil, China, Spain, Taiwan, Sweden, India, and Iran. Brambul—An SMB Worm Brambul is a brute-force authentication worm that like the devastating WannaCry ransomware, abuses the Server Message Block (SMB) protocol in order to spread itself to other systems. The malicious Windows 32-bit SMB worm functions as a service dynamic link library file or a portable executable file often dropped and installed onto victims' networks by dropper malware. "When executed, the malware attempts to establish contact with victim systems and IP addresses on victims' local subnets," the alert notes.  "If successful, the application attempts to gain unauthorized access via the SMB protocol (ports 139 and 445) by launching brute-force password attacks using a list of embedded passwords. Additionally, the malware generates random IP addresses for further attacks." Once Brambul gains unauthorized access to the infected system, the malware communicates information about victim's systems to the Hidden Cobra hackers using email. The information includes the IP address and hostname—as well as the username and password—of each victim's system. The hackers can then use this stolen information to remotely access the compromised system via the SMB protocol. The actors can even generate and execute what analysts call a "suicide script." DHS and FBI have also provided downloadable lists of IP addresses with which the Hidden Cobra malware communicates and other IOCs, to help you block them and enable network defenses to reduce exposure to any malicious cyber activity by the North Korean government. DHS also recommended users and administrators to use best practices as preventive measures to protect their computer networks, like keeping their software and system up to date, running Antivirus software, turning off SMB, forbidding unknown executables and software applications. Last year, the DHS and the FBI published an alert describing Hidden Cobra malware, called Delta Charlie —a DDoS tool which they believed North Korea uses to launch distributed denial-of-service (DDoS) attacks against its targets. Other malware linked to Hidden Cobra in the past include Destover, Wild Positron or Duuzer, and Hangman with sophisticated capabilities, like DDos botnets, keyloggers, remote access tools (RATs), and wiper malware.

FBI ISSUES ALERT OVER TWO NEW MALWARE LINKED TO HIDDEN COBRA HACKERS. The US-CERT has released a joint technical alert from the DHS and the FBI, warning about two newly identified malware being used by the prolific North Korean APT hacking group known as Hidden Cobra. Hidden Cobra, often known as Lazarus Group and Guardians of Peace, is believed to be backed by the North Korean government and known to launch attacks against media organizations, aerospace, financial and critical infrastructure sectors across the world. The group was even associated with the WannaCry ransomware menace that last year shut down hospitals and businesses worldwide. It is reportedly also linked to the 2014 Sony Pictures hack, as well as the SWIFT Banking attack in 2016. Now, the Department of Homeland Security (DHS) and the FBI have uncovered two new pieces of malware that Hidden Cobra has been using since at least 2009 to target companies working in the media, aerospace, financial, and critical...

MY RESPONSE TO THE IMMORTAL LADY SO CALLED #KEVIN, REGARDING HER MOCKING OF RAGA PYTON. NB: Blocking of Unfriending will happen after this. Well, my dear Kevin i bet you are in a good and joyous mood per now. This is my intrigue to you concerning your recent statements about the saga betwixt you and your ex-husband Raga Pyton. In your publicly interviewed submissions, you claim that Raga Pyton was not your husband!!! You said, he was just your boy lover. According to my little knowledge about Law, what you said might be fact, if legally considered but must not outlaw our tradition which in fact intercepted you as being a wife to Raga Pyton. In our Lugbara tradition, which you are a subject to, describes that, any adult male or female who befell in Love together and at last agreed to marry by staying and sleeping together in the same house are called married couples, even if no dowries haven't been paid. I, Osuta Yusuf has all those data and information to prove that you were a wife to Raga Pyton! But am not here for that and will never think to file a petition, since you are such a dump lady who thinks too much but feels too little. So many ladies of your kind are out there. Every men should be aware of such ladies, even if you are in good terms with yours right now! What they have in their DNA will always be there and will emerge when the D-DAY comes. I do not have anything personal with you, only that i am angered by what you did to our brother #Ragga_Python, an activist and one of the super star musicians there in WestNile. In my Life, though i do have over emotion sometimes, my anger is always justified. This week began as another opportunity for you to dessert your ex-husband Raga Pyton, which intern, is beginning of troublesome tasks ahead of you. Without having some respect, you boldly and shamelessly defined Raga Pyton as your Ex-lover but not your husband. How the hell, can you defame someone who is now in jail because of you. Someone who was thinking day and night, all on you. Someone who loved you with all his heart and you went a million steps ahead to betray such a person. God forbid. Kevin, you act as if you are immortal. You bubbled to defeat shame but remember, there will be a time when you will not have that power to defeat shame and it's gonna be the time for you to sweat plasma and shade blood as tears. I am not wishing you curse, instead be curious in marking my words. If you are angered, you have my number and possibly, here is the other one for Whatsapp +243810842056. You are a cheater. Your wicked addiction of cheating, caused the imprisonment of Raga Pyton. I heard that, you are a lawyer (preferably, a legal assistant working with a certain law firm there in Arua). I have never seen on this World, such a member of the legal fraternity messing like you. Legal fraternity is one of the most smart, bright, transparent and most appreciated working class on this World! Perhaps, this is why i live all my daily Life in focusing on JUDICIARY (My dream). This is a rebuke to our global Career (LAW). What we do always follow us, where ever we might be. I rest my case. I don't care people's hate of me or trash opinions  about me. I Live my Life fully because i know who i am and will never succumb to intimidations, threats nor a victim to injustice. AUTHOR PROUD LUGBARA OSUTA YUSUF: A CAREER POLITICIAN, BARRISTER, STUDENT FOR LIFE AND TALENTED IN INTERNET. •••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••• BACKGROUND. Raga Pyton was hired to go and perform at Matongi Disco sounds, a local disco dancing set company based in Arua. He was arrested on Boxing day 26 December 2015, while performing on stage. He was arrested on allegations of beating a man, whom, he caught was having another extra Love affair with his wife Kevin (Raga Pyton's wife). In spite of our judicial system not been quite free and fair, Raga Pyton was jailed without having fair hearing and transparent judgement. Because of the may be, rampant corruption in Uganda, Rights and God given Justice of Raga Pyton was curtailed. _________________________________________________________________________________________________________ 1. This is the official Facebook account of RAGA PYTON 👇👇👇👇 https://m.facebook.com/raga.pyton?pn_ref=story ***************************************************************** 2. The Facebook account of his wife Kevin, is here 👇👇👇👇 https://www.facebook.com/story.php?story_fbid=824578424403756&id=246599452201659 ******************************************************************* 3. And lastly, Below is the article in which Kevin rebuked, mocked, betrayed and turned our brother, fellow activist and the super star musician Raga Pyton into a laughing stock 👇👇👇👇 https://www.facebook.com/story.php?story_fbid=824578424403756&id=246599452201659 Raga Pyton WAS JUST MY BOYFRIEND. WE WE'RE NEVER MARRIED - Kevin Precious Responds. In an Exclusive discussion we had with The Legal Practitioner, She Made it clear that they were just friends not Union Couples with the Monster Family President Pyton. "It was a Hard decision to take but I know how to contain it. I have not been married to Raga but instead We were just Boyfriends and Girlfriends Cohabiting so I'm not worried. I never took him home" ... Kevin's Response to critics comes ahead of the Introduction ceremony due on 30th June in their home. She further goes ahead to invite all friends for the Ceremony.

MY RESPONSE TO THE IMMORTAL LADY SO CALLED #KEVIN, REGARDING HER MOCKING OF RAGA PYTON. NB: Blocking or Unfriending will happen after this. Well, my dear Kevin i bet you are in a good and joyous mood per now. This is my intrigue to you concerning your recent statements about the saga betwixt you and your ex-husband Raga Pyton. In your publicly interviewed submissions, you claim that Raga Pyton was not your husband!!! You said, he was just your boy lover. According to my little knowledge about Law, what you said might be fact, if legally considered but must not outlaw our tradition which in fact intercepted you as being a wife to Raga Pyton. In our Lugbara tradition, which you are a subject to, describes that, any adult male or female who befell in Love together and at last agreed to marry by staying and sleeping together in the same house are called married couples, even if no dowries haven't been paid. I, Osuta Yusuf has all those data and information to prove that you were a wi...

Supreme Court will not take up challenge to restrictive Arkansas abortion law. The Supreme Court on Tuesday declined to take up an Arkansas law that challengers say could end the use of medication abortions in the state. The law requires doctors who provide medication abortions to have a contract with a specialist who has hospital admitting privileges. Abortion providers say the requirement is burdensome and unnecessary because complications are extremely rare from the two-pill regimen that is used in the first nine weeks of pregnancy, and any that do arise can be handled by a local emergency room or hospital. The state has only three abortion clinics, and two of those offer only medication abortions. So the law could leave only one clinic, in Little Rock, to serve the entire state--and it would have to offer only surgical abortions. Challengers can still ask a judge to strike down the law, but may have to prove how many women could be affected by it. U.S. District Judge Kristine G. Baker temporarily blocked the law, concluding that any medical benefit from the contract requirement would be “incrementally small” while the burden on women’s access to abortion would be substantial. The law was “a solution in search of a problem,” the judge said. Two years ago, the Supreme Court voted 5 to 3 to overturn a similar Texas law that required doctors who provided abortions to have admitting privileges in a local hospital. The Texas law “provides few, if any, health benefits for women, poses a substantial obstacle to women seeking abortions, and constitutes an ‘undue burden’ on their constitutional right to do so,” Justice Stephen G. Breyer wrote for the majority. The admitting-privileges requirement in Texas cut the number of abortion providers by half. But a panel of the U.S. Court of Appeals for the 8th Circuit upheld the Arkansas law. That court said Baker had “failed to make factual findings estimating the number of women burdened by the statute”--those who would either forgo or postpone an abortion because of the law. Planned Parenthood said in its petition to the Supreme Court that was an approach the majority had rejected in the Texas decision, and that the burden in Arkansas would be extreme. “The restriction would eliminate entirely a safe, common method of early abortion and force all women in the state to travel (twice) to a single provider in Little Rock to have a surgical procedure — thereby preventing many women from obtaining an abortion altogether and delaying many others,” the petition said. “Worse yet, it would do so even where a medication abortion is medically indicated or strongly preferred.” But the Supreme Court declined to accept the challenge, without noted dissent even from liberal justices who are supportive of abortion rights. The case is Planned Parenthood of Arkansas & Eastern Oklahoma v. Jegley.

Supreme Court will not take up challenge to restrictive Arkansas abortion law . The Supreme Court on Tuesday declined to take up an Arkansas law that challengers say could end the use of medication abortions in the state. The law requires doctors who provide medication abortions to have a contract with a specialist who has hospital admitting privileges. Abortion providers say the requirement is burdensome and unnecessary because complications are extremely rare from the two-pill regimen that is used in the first nine weeks of pregnancy, and any that do arise can be handled by a local emergency room or hospital. The state has only three abortion clinics, and two of those offer only medication abortions. So the law could leave only one clinic, in Little Rock, to serve the entire state--and it would have to offer only surgical abortions. Challengers can still ask a judge to strike down the law, but may have to prove how many women could be affected by it. U.S. District Judge Kristine G. B...

JUST TODAY 28 MAY 2018. This has been widely shared in a Whatsapp group called "MAFORD". Below is the clip. Another tractor Vs police car at kafu today ,so unfortunate for gulu highway. We need God at all times

via Instagram

JUST TODAY 28 MAY 2018. This has been widely shared in a Whatsapp group called "MAFORD". Below is the clip. Another tractor Vs police car at kafu today ,so unfortunate for gulu highway. We need God at all times

via Instagram

YouTube pulled down the video i uploaded. This was aimed at serving an electronic advise.

via Instagram

When i uploaded this video, Titled "LESSON FOR THOSE ILLITERATE THIEVES" on YouTube, they pulled it down. Alleging that it violates The Terms and Privacy policy of YouTube. Am wondering if YouTube is siding with thieves. #fb #LI #osutayusuf @osutayusuf

via Instagram https://ift.tt/2IRtzDp

YouTube pulled down the video i uploaded. This was aimed at serving an electronic advise.

via Instagram

INJUSTICE SOMEWHERE IS A THREAT TO JUSTICE ANYWHERE. If you’re a member of a activists group, here are 5 ways you can help welcome people who have been forced to flee their homes: https://t.co/zv4HH5eSuH https://t.co/fi3jfxtXsX #fb #LI Instagram / LinkedIn / Twitter TWEET @osutayusuf #osutayusuf

via Instagram

New Instagram office opening here https://ift.tt/2LAEgYI

via Instagram

George H.W. Bush treated in the hospital for low blood pressure and fatigue.

via Instagram

INJUSTICE SOMEWHERE IS A THREAT TO JUSTICE ANYWHERE. If you’re a member of a activists group, here are 5 ways you can help welcome people who have been forced to flee their homes: https://t.co/zv4HH5eSuH https://t.co/fi3jfxtXsX #fb #LI Instagram / LinkedIn / Twitter TWEET @osutayusuf #osutayusuf

via Instagram

New Instagram office opening here https://ift.tt/2LAEgYI

via Instagram

George H.W. Bush treated in the hospital for low blood pressure and fatigue.

via Instagram
via Instagram

<fg=b00000ff> FBI SEIZES CONTROL OF A MASSIVE BOTNET THAT INFECTED OVER 500,000 DEVICES. Shortly after Cisco's released its early report on a large-scale hacking campaign that infected over half a million routers and network storage devices worldwide, the United States government announced the takedown of a key internet domain used for the attack. Yesterday we reported about a piece of highly sophisticated IoT botnet malware that infected over 500,000 devices in 54 countries and likely been designed by Russia-baked state-sponsored group in a possible effort to cause havoc in Ukraine, according to an early report published by Cisco's Talos cyber intelligence unit on Wednesday. Dubbed VPNFilter by the Talos researchers, the malware is a multi-stage, modular platform that targets small and home offices (SOHO) routers and storage devices from Linksys, MikroTik, NETGEAR, and TP-Link, as well as network-access storage (NAS) devices. Meanwhile, the court documents unsealed in Pittsburgh on the same day indicate that the FBI has seized a key web domain communicating with a massive global botnet of hundreds of thousands of infected SOHO routers and other NAS devices. The court documents said the hacking group behind the massive malware campaign is Fancy Bear, a Russian government-aligned hacking group also known as APT28, Sofacy, X-agent, Sednit, Sandworm and Pamworm. The hacking group has been in operation since at least 2007 and has been credited with a long list of attacks over the past years, including the 2016 hack of the Democratic National Committee (DNC) and Clinton Campaign to influence the U.S. presidential election. "This operation is the first step in the disruption of a botnet that provides the Sofacy actors with an array of capabilities that could be used for a variety of malicious purposes, including intelligence gathering, theft of valuable information, destructive or disruptive attacks, and the misattribution of such activities," John Demers, the Assistant Attorney General for National Security, said in a statement. Among other, Talos researchers also found evidence that the VPNFilter source code share code with versions of BlackEnergy  —the malware responsible for multiple large-scale attacks targeting devices in Ukraine that the U.S. government has attributed to Russia. VPNFilter has been designed in a way that it could be used to secretly conduct surveillance on its targets and gather intelligence, interfere with internet communications, monitor industrial control or SCADA systems, such as those used in electric grids, other infrastructure and factories, as well as conduct destructive cyber attack operations. The seizure of the domain that is part of VPNFilter's command-and-control infrastructure allows the FBI to redirect attempts by stage one of the malware (in an attempt to reinfect the device) to an FBI-controlled server, which will capture the IP address of infected devices and pass on to authorities around the globe who can remove the malware. Users of SOHO and NAS devices that are infected with VPNFilter are advised to reboot their devices as soon as possible, which eliminates the non-persistent second stage malware, causing the persistent first-stage malware on their infected device to call out for instructions. "Although devices will remain vulnerable to reinfection with the second stage malware while connected to the Internet, these efforts maximize opportunities to identify and remediate the infection worldwide in the time available before Sofacy actors learn of the vulnerability in their command-and-control infrastructure," the DoJ said. Since VPNFilter does not exploit any zero-day vulnerability to infect its victims and instead searches for devices still exposed to known vulnerabilities or having default credentials, users are strongly recommended to change default credentials for their devices to prevent against the malware. Moreover, always put your routers behind a firewall, and turn off remote administration until and unless you really need it. If your router is by default vulnerable and can't be updated, it is time you buy a new one. You need to be more vigilant about the security of your smart IoT devices.

FBI SEIZES CONTROL OF A MASSIVE BOTNET THAT INFECTED OVER 500,000 DEVICES. Shortly after Cisco's released its early report on a large-scale hacking campaign that infected over half a million routers and network storage devices worldwide, the United States government announced the takedown of a key internet domain used for the attack. Yesterday we reported about a piece of highly sophisticated IoT botnet malware that infected over 500,000 devices in 54 countries and likely been designed by Russia-baked state-sponsored group in a possible effort to cause havoc in Ukraine, according to an early report published by Cisco's Talos cyber intelligence unit on Wednesday. Dubbed VPNFilter by the Talos researchers, the malware is a multi-stage, modular platform that targets small and home offices (SOHO) routers and storage devices from Linksys, MikroTik, NETGEAR, and TP-Link, as well as network-access storage (NAS) devices. Meanwhile, the court documents unsealed in Pittsburgh on the sam...
via Instagram

So, you want a VPN that you can trust entirely to keep private your web-browsing habits. Who do you choose? Hmm... PornHub anyone? https://t.co/u5kEMqnS20 https://t.co/zEJlNIeN7X

via Instagram

So, you want a VPN that you can trust entirely to keep private your web-browsing habits. Who do you choose? Hmm... PornHub anyone? https://t.co/u5kEMqnS20 https://t.co/zEJlNIeN7X

via Instagram
via Instagram

CONCERNING TECHNOLOGY, WHO IS OSUTA YUSUF ?.

1. Osuta Yusuf on YouTube 👇👇 https://www.youtube.com/channel/UCnk5kqW1EBYI2wW0h5cspBg   2. Osuta Yusuf on Flickr 👇👇 https://www.flickr.com/people/osutayusuf/ 3. Osuta Yusuf on Twitter 👇👇 https://www.twitter.com/osutayusuf 4. Osuta Yusuf on Google plus 👇👇 https://plus.google.com/114766060806939297729 5. Osuta Yusuf is on Facebook 👇👇 https://m.facebook.com/profile.php?id=100009314063577 6. Osuta Yusuf personal website 👇👇 https://osutayusuf.blogspot.com 7. Osuta Yusuf on Pinterest 👇👇 https://www.pinterest.com/osutayusuf/ 8. Osuta Yusuf Whatsapp number 👇👇 https://wa.me/256784136406 9. Osuta Yusuf on Instagram 👇 👇 https://www.instagram.com/osutayusuf 10. Osuta Yusuf on LinkedIn 👇 👇 https://www.linkedin.com/in/osuta-yusuf-a8749a126 Osuta Yusuf is Talented and an expert in Technology (Tracking and Monitoring, Domain registration, Web encoding, Online publications, Website development, Internet security building and so on), with 2+ years solidly practical experience in ...
via Instagram

Liked on YouTube: Nsiimye Nnyo Ronnie Muganzi

Nsiimye Nnyo Ronnie Muganzi via YouTube https://youtu.be/pfqS42UpgWY

Liked on YouTube: Rest In Peace, Westnile music Super star Jack P.

Rest In Peace, Westnile music Super star Jack P. Video just been received right now, in memory of our much talented musician from Westnile - Uganda. This video was recorded from one of his shows. via YouTube https://youtu.be/hBHTZOOsTio

I INITIALLY PUBLISHED THIS ON 24 MAY 2017. ANOTHER EPISODE. I will never stop writing and sharing the suffering out people undergo daily until they are totly free. HERE IS WHAT EXACTLY SOME OF MY PEOPLE IN OTHER PARTS OF UGANDA, ARE EATING TO SURVIVE ON AS PROPOSED BY THE MINISTER!. Some years back in 2009,  when a similar famine hit westnile region,  Teso sub regions and some parts of Uganda,  the then Minister of Disaster Preparedness, Prof. Tarsus Kabwegyere advised the people there to eat grass, mangoes and insects. #Greedy_sectarian_government  Your hateful opinion of me, will never put food on my dining table! BURN. #OSUTA_YUSUF CAREER POLITICIAN, LAWYER, STUDENT FOR LIFE AND TALENTED IN INTERNET.

I INITIALLY PUBLISHED THIS ON 24 MAY 2017. ANOTHER EPISODE. I will never stop writing and sharing the suffering out people undergo daily until they are totly free. HERE IS WHAT EXACTLY SOME OF MY PEOPLE IN OTHER PARTS OF UGANDA, ARE EATING TO SURVIVE ON AS PROPOSED BY THE MINISTER!. Some years back in 2009,  when a similar famine hit westnile region,  Teso sub regions and some parts of Uganda,  the then Minister of Disaster Preparedness, Prof. Tarsus Kabwegyere advised the people there to eat grass, mangoes and insects. #Greedy_sectarian_government Your hateful opinion of me, will never put food on my dining table! BURN. #OSUTA_YUSUF CAREER POLITICIAN, LAWYER, STUDENT FOR LIFE AND TALENTED IN INTERNET.