Microsoft Wins Court Decision, Blocks “Fancy Bears” to Trademarks and Computers

In the recent news reports online, giant tech company Microsoft won the decision against a huge hacking group in Russia in a courthouse in the United States on Tuesday. The court handed the final decision that disallows the alleged Russian hackers in accessing the trademarks of the company.

They recognize the group as “Fancy Bears” that allegedly hacked the “command and control” of Microsoft, which made a decision to file a lawsuit against them.

According to the latest news of Reuters, a US-based courthouse made a decision to disallow or block the alleged “Fancy Bears” from the Russian hackers who intruded the trademarks of giant tech firm Microsoft. Judge Gerald Bruce Lee made a decision favoring the company and permanently banning the hackers or group from accessing the computers and using the trademarks of Microsoft.

Judge Lee is from the US District Court that ruled the decision filed at the Eastern District in Virginia.

Based on the information from the court’s decision, “Fancy Bears” or also known as Strontium and APT28 can no longer send malicious virus or code from the users of Microsoft, unless they have the exact permission to do so. The Russian hacking group had been infecting hundreds or thousands of Microsoft computers and so the decision somehow gave the tech company a decent protection for the benefits of their valued customers.

The news report added that the ruling includes blocking the group from stealing data from the clients, operating, configuring, deploying or joining in or facilitating a command and control infrastructure, as detailed online.

There are also reports that these Russian-based hackers are responsible in intruding the International Association of Athletics Federations (IAAF) and World Anti-Doping Agency (WADA). The revelation came from the provided document from the courthouse on Wednesday.

The alleged Russian hackers intruded the IAAF of which the organization revealed last April and confirming the involvement of the “Fancy Bears.” According to the information from IAAF, the hackers successfully downloaded, stored and released the confidential Therapeutic Use Exemptions (TUE) documents of the athletes, the news added.

In 2016, the group likewise hacked the WADA documents containing the personal information of popular athletes and revealing that they are using banned drugs, which are not allowed by the TUE. Most of the mentioned athletes then are well-known tennis players in the world.

Furthermore, they are blaming the group for the issue about the revealed confidential data from the Democratic National Committee (DNC) during the presidential election in United States last year.

“It is further ordered that defendants are in default, and that judgment is awarded in favor of Microsoft and against defendants,” stated by the US District Court for the Eastern District as quoted by southafricartoday.net.

 

Another possible reason why the courthouse easily favored the giant tech company is that the representatives of the hacking group did not attend the hearing.

Based on the report of the Daily Beast, the ruling of the court permitted Microsoft in taking over the “command and control” domains of the hacking group, which the investigation proved they utilized to hack the computers of their targeted victims. The giant tech firm already controlled almost 70 spots of the “command and control” from the Russian hackers.

However, the company is taking control of the internal domains and not on the physical servers of “Fancy Bears.” Because they are using replicas of Microsoft’s official logos, they successfully victimized many computer users who provided their login details through the executed phishing scams.

The report of the Daily Beast added that despite the attempt of Microsoft to send legal documents via the email of the hacking group, they did not cooperate or responded. The company likewise proved that they were able to open the messages, but ignored them.

“WannaCry” Destroyer Marcus Hutchins Arrested for “Kronos” Malware

From the latest reported news online, the man who helped destroyed the ransom ware attack “WannaCry” got arrested due to hacking issues as detailed from the released information from the courthouse.

They recognized the cyber security expert as Marcus Hutchins from UK.

According from the published online news, an expert of cyber security from the United Kingdom who helped destroy and shut down the ransom  ware “WannaCry” few months ago got arrested due to hacking issues. The 23-year-old Marcus Hutchins is indicted on Thursday at the US District Courthouse in Wisconsin for the necessary filed charges.

Based on the reports, the young IT expert from the United Kingdom is accused of distributing, promoting and earning money from the “Kronos” malware. From the detailed included on the indictment case, he allegedly been doing such unlawful activity since 2014 (July) until 2015 (July) through the Alphabay market.  The main focus of this cyber attack is to target different banks and collect money using illegal transactions.

The authorities were able to arrest Hutchins in Las Vegas during the Def Con hacking conference. He likewise bragged about living in a local mansion in a real estate tycoon and he rent luxurious vehicles to use them, when interviewed by The Outline.

“Marcus Hutchins … was arrested in the United States on August 2, 2017, in Las Vegas, Nevada, after a grand jury in the Eastern District of Wisconsin returned a six-count indictment against Hutchins for his role in creating and distributing the Kronos banking Trojan,” stated by Wyn Norhbuckle who is the Department Of Justice (DOJ) representative and quoted through The Independent.

According to the news reports online, they also recognized him as “MalwareTech” through his social media account and he successfully found a solution to disabled the “WannaCry” ransomware through his own “kill switch.”

During the “WannCry” virus attack, the hackers successfully infected almost 300,000 computers worldwide.

The “Kronos” malware issue is capable of sending email messages and then subsequently stealing passwords from the targeted banks through the infected personal computers. It has accessed different bank credentials from countries like France, Canada, United Kingdom, Poland and Germany, among others, as detailed by the Eastern District of Wisconsin US Attorney.

According to the Attorney of States, they classified or recognized this latest malware attack as a continuous threat to security and privacy.

As reported by rt.com, the FBI has detained the British computer expert already in Las Vegas on Wednesday and he will need to face the six counts of charges that include the following:

  1. Fraud and relevant activity in connection with computers
  2. Conspiracy to commit offense or defrauding the US
  3. Manufacture, distribution, possession and promoting of wire or communication intercepting devices prohibited
  4. Interception and disclosure of wire, oral, or electronic communications prohibited

 

“Cybercrime remains a top priority for the FBI,” said Justin Tolomeo as quoted by The Independent.  “Cybercriminals cost our economy billions in loses each year.  The FBI will continue to work with our partners, both domestic and international, to bring offenders to justice,” he added.

 

Tolomeo is the In-Charge Special Agent.

In line with this issue, the National Crime Agency of UK confirmed the detention of the young British IT expert in the US. However, the agency revealed his case is a matter for the US authorities.

To show his care to Hutchins, a founder of a cyber security firm named Andrew Mabbit is making an effort to find a lawyer for the 23-year-old detained British. He is actually one of the companions of Marcus in Las Vegas to attend the conference.

Mabbit believe that Hutchins is innocent and even posted on Thursday through his Twitter account that the guy had spent his career to stop malware and not writing it.

He is willing to gather fund for the legal fees of the arrested IT professional.

Hospitals in Copenhagen Experienced IT Systems Breakdown, No Hacking Issue

Due to the Information Technology (IT) systems problem, there are hospitals in Denmark that experienced massive break down on Friday. The information came from the authorities of the Capitol Region.

According to the reports online, the systems problem occurred on Friday (7:20 in the morning) and began to affect call center businesses, computers as well as telephones in Copenhagen Municipality, which is the central region of Denmark.

From the tweeted information of the authorities, they confirmed the breakdown of the IT systems and assure the public that all systems and networks will function normally soon.

However, later the day they announced that they already resolve the problem, although they still need to fix some of the non-working functionalities.  Likewise, one of the officials from the authorities of the Capital Region stated that it is still early to confirm if the breakdown may affect the planned operations on Friday when interviewed by TV 2 News channel.

The reliable sources of the TV 2 News said that there will be delay on the planned operations.

According to the reported news through Reuters, a region spokesperson said that they are not confirming yet if the IT system breakdown is caused by cyber hackers or attackers.

From the shared news information also, it revealed that the affected hospitals in Copenhagen had restored their computer systems properly after the massive IT break down. This confirmation came from a local authority in the central region.

“The network crash today was due to an error that occurred during a standard procedure on a central network component,” said the Capital Region of Denmark that takes the responsibility for the hospitals in Copenhagen as posted on Twitter.

 

In line with this, it is very fortunate for the hospitals they did not experience hacking issues during the breakdown.

Few months ago, there are news reports about the recovered health system of United Kingdom from hackers during the “Ransomware” attack globally, which affected almost 100 countries, as revealed by the Interior Minister of UK.

Rudd is the Interior Minister of UK who also revealed that that time, 48 out of the 248 health service trusts within England had encountered problem during the actual hacking attack, as reported by abc.net.au.

Amber Rudd however detailed that about 97% of the health service trusts in the United Kingdom had restored their normal operations after resolving the attacking issues.

From the statement of the Interior Minister, the hackers or attackers failed to stole the data of the patients from the different frozen computers of the affected hospitals. Majority of these hospitals are using the 2001 Windows WP software as detailed by Krishna Chinthapalli who is a doctor at National Hospital for Neurology and Neurosurgery in UK and published the information through British Medical Journal.

With the different kinds of problems and issues about IT systems, it is definitely important to have the best security measure to protect the database and the involved information. Today, there are existing companies with expertise in securing the database of their clients. Of course, they are dependable regardless if a client needs security for a business, home, bank, school or hospital.

Remember that with the kind of exposure that the Internet has, it is possible for anyone to become vulnerable to online hackers who continue to do unlawful activities to their targeted victims. With the right database protection, this assures secured data or information.

Like the issue about the IT systems problem of the hospital in Copenhagen, they probably have the right database protection because they were able to resolve the problem without any involvement of hacking issue.

 

This prevented any vulnerability to the confidential information they have.

WikiLeaks Reveals Usual Spying and Hacking Strategies of the CIA

After revealing the different issues about the Central Intelligent Agency (CIA) for the past months, Wikileaks is again revealing the strategies that the agency is using to hack different electronic units, according to the reported news through rt.com.

 

Based on the shared information online, the CIA’s known technique Vault 7 series has the capacity to spy ordinary individuals who are using their electronic gadgets on a regular basis. Meaning, the United States-based intelligent agency has the capacity to survey their targets through mobile phones, smart television units, various Android units, iPhones and even through WIFI connectivity.

The hacking strategies of the CIA do not exclude anyone because they are capable of spying even those inside the house, if necessary or wanted.

Like the revealed “Dumbo” program of the agency, it can manipulate different types of security systems for homes and can control the Microsoft Windows OS by changing the function of the involved microphones and webcams. Likewise, they can manipulate or corrupt records of videos, as detailed on the news.

 

WikiLeaks also revealed about the agency’s codename 24 “zero days.” According to the information about this spying technique, the CIA can exploit as well as identify even private information from different people and collect them without the knowledge of the owners. They discovered this kind of tool to the Android OS of Google and it can affect almost 85% Android smart phone users worldwide.

This is particularly those who are using Sony and Samsung units.

As for those who are using iPhone units from Apple, they need to be aware of the revealed spying or hacking strategies that the CIA is using. According to the reported news of rt.com, the central agency does not exclude iPhone users from their hacking techniques or strategies. They actually have a particular division on the Valut 7 series that particularly targets Apple units such as Macbook and iPhones.

They recognized this tool as “NightSkies” and different online news had revealed this few months ago. With this kind of strategy, the agency can manipulate the targeted devices using their own command through penetrating the factory setting of the iPhone units.

As for those who are using WIFI connectivity, the intelligence agency also has the software known as the “Cherry Blossom” and it targets, manipulates and monitors connected Internet users through their electronic devices. Furthermore, the CIA utilizes a malware “Elsa” in tracking down devices that are WIFI enables through Microsoft Windows. The agency can quickly determine the information location of the user and do the monitoring without any consent to the person.

In line with this issue, a report from the globalnews.ca on March revealed that the Federal Bureau of Investigation (FBI) instructed Apple in 2016 to rewrite its Operating System to allow them penetrate a locked iPhone device utilized by an attacker in San Bernardino, California.

Unfortunately, Apple did not agree and the FBI needed an outside party to break the involved phone.

The different hacking and spying issues of CIA began to spread online with Edward Snowden exposed the activities of the NSA in secretly spying many digital and phone units. Snowden is actually the former contractor of the National Security Agency (NSA).

From the statement of WikiLeaks on March, it revealed that the CIA has clear knowledge on the different attacks, which include those from Microsoft, Apple and Google.

“Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability,” as detailed from the press release of WikiLeaks and quoted by the news. “If the CIA can discover such vulnerabilities so can others,” it added.

 

 

Trace Unlisted Mobile Numbers to Identify Who Is Calling

These days, many people who live in the United States are beginning to find a dependable website for reverse lookup to trace unlisted mobile numbers. They think that this kind of service can benefit them because it offers the best solution to determine who is calling strangely. Of course, the entire process needs a professional service to determine the necessary information and identify someone who uses an unregistered number.

Some folks consider using public or free directories, but it is not easy to get fresh information about the call. To make sure the information or data are accurate, it is advisable to choose the best service provider with the right expertise. Likewise, this option can provide surefire results and may only charge inexpensive service fees under certain agreement.

Choosing a trusted service provider is necessary to expect immediate positive outcome because of their expertise. Definitely it gives the right solutions to all valued clients who do not hesitate to use their service when tracking down mobile phone calls. Because the database present millions of landline and mobile numbers, it is not difficult to find someone who makes bothering calls.

Surely, having the best service provider online assures quality information that usually coming from other partnered services. They impose certain rules to follow and provide solutions to all the clients who know how to understand the process. Because these are legitimate partnered services, a registered client can assure the same information and results to help deal with a caller who might be a total stranger because of the unlisted or unregistered cell phone number.

As opposed to hiring a private investigator who may charge higher when verifying the origin of the call or number, using dependable reverse look up provides the necessary details conveniently within few seconds without wasting more cash. With this kind of effective service, it is not difficult to resolve a problem about a total strange or prank caller with the help of the Internet.

To assure a positive transaction, it is very important to submit the involved mobile number from an unknown caller. Right after closing the transaction to begin the process, it is the responsibility of the client to review the provided information from the database to reveal the exact identity of the person who uses or owns the number. Regardless of what state in the US, having the most reliable service provider to lookup for surefire information can help.

The Internet can quickly lead its users to hundreds of reverse look up companies to verify unlisted mobile numbers. However, this does not make sure that all of these existing companies are dependable and adhering to the guidelines of the government. It is as well possible that some of them requiring expensive charges and only provide less information. On this, it is best to determine the reputation of the service provider beforehand.

Keep in mind that for someone who needs to determine a prankster, an unknown phone number or an unregistered cellular number, it is not right to get limited information only. It is advisable to search and choose a lookup service with years of experience in providing truthful results without overspending and disappointment.