An In-Depth Look At What Is Going On In The World
 
Nov 23, 2014 - 02:38 PM
 
Category
Online
There are 3 unlogged users and 0 registered users online.

You can log-in or register for a user account here.
Login




 


 Log in Problems?
 New User? Sign Up!

Topic: Cyber & Tech

The new items published under this topic are as follows.
See all


Wednesday, December 03, 2008 - 03:01 PM

Cyber & Tech Published on 12/3/2008
By Associated Press

Ultra-Orthodox mourners sit behind the bodies of Rabbi Gavriel Noach Holtzberg, 29, and his wife Rivkah, 28, during their funeral procession in Kfar Chabad near Tel Aviv, Israel, Tuesday. Israelis on Tuesday began burying the six Jews killed in the murder spree in the Indian city of Mumbai, the grimness of the occasion deepened by the conviction that the victims were targeted because of their religion.

New Delhi, India - The heavily armed attackers who set out for Mumbai by sea last week navigated with Global Positioning System equipment, according to Indian investigators and police. They carried BlackBerries, CDs holding high-resolution satellite images like those used for Google Earth maps, and multiple cell phones with switchable SIM cards that would be hard to track. They spoke by satellite telephone. And as TV channels broadcast live coverage of the young men carrying out the terrorist attack, TVs were turned on in the hotel rooms occupied by the gunmen, eyewitnesses recalled.

This is terrorism in the digital age. Emerging details about the 60-hour siege of Mumbai suggests the attackers had made sophisticated use of high technology in planning and carrying out the assault that killed at least 174 people and wounded more than 300. The flood of information about the attacks - on TV, cellphones, the Internet - seized the attention of a terrified city, but it also was exploited by the assailants to direct their fire and cover their origins.

”Both sides used technology. The terrorists would not have been able to carry out these attacks had it not been for technology. They were not sailors, but they were able to use sophisticated GPS navigation tools and detailed maps to sail from Karachi (in Pakistan) to Mumbai,” said G. Parthasarathy, an internal security expert at the Center for Policy Research in New Delhi. “Our new reality of modern life is that the public also sent text messages to relatives trapped in hotels and used the Internet to try and fight back.”

During the attacks, an organization calling itself Deccan Mujaheddin asserted responsibility in an e-mail to news outlets that was traced to a computer server in Moscow, according to Praveen Swami, a terrorism expert and media commentator. The message, it was later discovered, originated in Lahore, Pakistan. Investigators have said the e-mail was produced using Urdu-language voice-recognition software to “anonymatize” regional spellings and accents so police would be unable to identify their ethnic or geographic origins.

When the gunmen called back to their leaders, they used satellite telephones calling voice-over-Internet-protocol phone numbers, making it harder to trace, Swami said. Then, once on the scene, they snatched cellphones from hostages and used those to stay in contact with one another.

At every point, Swami said, the gunmen used technology to gain a tactical advantage.

”This was technologically a pretty sophisticated group. They navigated their way to Mumbai using a state-of-the-art GPS system. Most of their rehearsals to familiarize themselves with Mumbai were done on high-resolution satellite maps, so they would have a good feel for the city's streets and buildings where they were going,” Swami said, adding that the CDs containing maps and videos were found in some of the hotel rooms the gunmen had occupied during the siege.

The lone captured gunman, Azam Amir Kasab, told police that he was shown video footage of the targets and the Google Earth images before the attacks, said Deven Bharti, a deputy commissioner in the crime branch of the Mumbai police.

Mumbai police chief Hassan Gafoor, offering the first official details of how the siege was conducted, said at a news conference Tuesday: “Technology is advancing every day. We try to keep pace with it.”


 
Saturday, November 29, 2008 - 05:53 PM

Cyber & Tech 30 Nov 2008, 0039 hrs IST, TNN

NEW DELHI: Investigations into the source of the email purportedly sent by an outfit called Deccan Mujahideen to a TV channel claiming responsibility for the Mumbai attack have hit a dead end due to the jihadis' technical expertise and their knowledge of sophisticated software.

It was found that the jihadis had used the anonymous "remailer" service - which is the most secure and least traceable way to send an email - instead of the normal Internet service availed on earlier occasions.

Contrary to the normal Internet service which can easily trace the origin of an email through IP address of a particular computer, the remailer service not only deletes the IP address but also all details including the sources from where someone might have requested the secret service.

An official said, "There are several software available for the remailer service that lets one send anonymous email through a web interface. Some other software allow send email messages that can only be viewed for a certain time and one can remain anonymous to boot."

Though investigators found that the main server of Deccan Mujahideen's email was located in Russia, they have not been able to locate the place from where the email was sent. Use of the anonymous "remailer" service is a pointer to the meticulous planning of the terrorists and their technical expertise.

Sources in the home ministry said that though cyber experts were still trying to trace the origin of the email using different software and they could even find it, India could contact Russia for help if it failed to trace it as the "remailer" service provider was traced to that country.


 
Saturday, November 29, 2008 - 04:28 PM

Cyber & Tech I am writing this here as I have just spent 3 days with an annoying virus and multiple trojan horse's on my computer and there does not seem to be any information that I could find as to how to remove the "Browser Helper Object" (BHO) that appeared in my browser add-on list.
In the add-on list the only information was "wezibalu.dll". Repeated searches of my system could not find this .dll, it appears to be hidden or non- existent.

I believe the infection took place at a shockwave game site. As I am not certain, I refrain from naming the website.

Microsoft Malicious File Removal Tool did not find any of the files mentioned below.
Adaware seemed to be disabled by these trojans and repeatedly crashed midway through the scan.

A fully updated AVG (Grisoft) did find and contain in the Virus Valt the following:
(however re-infection continued until procedure mentioned further below was completed)

Trojan horse Downloader.Generic_r.BI

Once that was contained, from the Temporary Internet Files, I was then infected with a "Fake Alert" virus.

This is what hijacked the browser sending it to "freescan" html pages. It would appear that each time the browser was redirected a new trojan was injected.

Some of those are:

Trojan Horse SHeur2.ELJ path: C:\WINDOWS\system32\bibeufu.dll

once that was contained, re-infection:

Trojan Horse SHeur2.ELJ path: C:\WINDOWS\system32\jogasubu.dll

when AVG caught that, re-infection:

Trojan Horse SHeur2.ELJ path C:\WINDOWS\system32\~.exe

then

Trojan Horse Fake Alert.CV from Temporary Internet Files
Trojan horse BHO.GNG C:\WINDOWS\system32\tuvikeize.dll
Trohan horse Proxy.AEPU C:\WINDOWS\system32\puvutabo.dll

by now AVG was containing the above from System Restore however the infection remained.

The information available on the web to clean this type of malware is to use most of the brand name malware cleaners. I did use a fully updated Adaware, it appeared to be useless as well against this infection. It repeatedly crashed at roughly 40% through the scan.




It took many attempts to find all the components to this virus, it not only infects Internet Explorer v.7+ & v.8 beta 2, but Firefox v.2+ and Windows Explorer.

This is the procedure I used for removal

On a fresh reboot, go to Control Panel, Internet Options, delete browser history and Temporary Internet Files.

(BTW, going into Browser Add-On's and disabling the "Browser Helper Object" (BHO) is useless, but you will be able to see it in your Add-On list.)

Then go to Start Menu, Run, type msconfig.

Click the startup tab.

Several of the .dll's mentioned above will be in the first colum under "Start Up Item".
Uncheck all of them from the above list that you see. Missing any of them will cause re-infection when you are finished.

This took me several attempts to find them all. I repeatedly had to go back and uncheck these 2:

puvutabo.dll
tuvikeize.dll

Leave the system configuration open or you will have to reboot and the removal is not complete, yet.

Go to Start, Run, type in regedit

From the Edit Menu, use Find:

Copy Paste or type:

{00A8E7EC-3D31-41F3-A358-55CBEC995629}

hit find, then delete the entry. Then go back to the Find option and click Find Next.

There are multiple registry entries for the above string, missing any of them will cause re-infection.

Click OK to close Registry Editor, Close System Configuration, select Yes to restart computer, or reboot.




It took several attempts to fully remove these trojans.
Here is a quick list for removal, and it would appear, in this order.

Reboot
Clean browser history and temporary internet files from Control Panel
Remove startup items, Run, msconfig
Remove Registry entries, Run, regedit
Reboot


Note: Do not open any Explorer or Internet Browser windows while cleaning.

Casey Britton
WorldAnalysis.net
11.29.2008


 
Posted by WorldAnalysis on Saturday, November 29, 2008   

Thursday, November 27, 2008 - 11:26 PM

Cyber & Tech Published Date: 28 November 2008
By Emily Pykett

UNCERTAINTY is a key weapon in the armoury of Islamic fundamentalist terror. As investigators, experts and analysts grope for the truth, someone somewhere is taking satisfaction from the horrified confusion the Mumbai attacks have caused.
Analysts are divided over whether the hand of al-Qaeda can be detected. The only claim of responsibility comes from a group that may not even exist: an e-mail message claiming responsibility and sent to Indian media on Wednesday night said the attackers were from a group called Deccan Mujahideen.

Deccan is a neighborhood of the Indian city of Hyderabad. The word also describes the central and southern region of India, which is dominated by the Deccan Plateau. Mujahideen is the commonly used Arabic word for holy warriors.

But Sajjan Gohel, a security expert in London, called it a "front name" and said the group was "nonexistent."

Alex Neill, head of the Royal United Services Institute's Asia security programme, believes the attacks were probably carried out by local jihadists linked to the radical Students Islamic Movement of India (Simi), a banned Islamic fundamentalist organisation which advocates the "liberation of India" by converting it to an Islamic state.

One possible mastermind and Simi member is Abdul Subhan Qureshi, a 36-year-old computer engineer suspected of being behind multiple bombings in Delhi, Jaipur, Bangalore and Ahmedabad earlier this year.

Qureshi, also known as Tauqeer, is from Mumbai and his expertise with internet security could have played a vital part in pulling off such an ambitious plot, said Mr Neill.

"He is an IT whizz-kid so it is quite possible he is the person investigators will be concentrating on. This is a great embarrassment to the Indian security services because it has been pulled off right under their noses."

Simi has declared jihad on India, the aim of which is to establish Dar-ul-Islam (land of Islam) by forcefully converting everyone to Islam.

Mr Neill said Deccan Muhajideen would be a militant offshoot of Simi which has carried out attacks across India. He added: "The perpetrators have obviously been highly trained and would have been sent to al-Qaeda training camps to prepare. I would be astonished if any of them are from Britain – they were probably recruited from the Mumbai region."

He reckons up to 100 terrorists would have been involved in the planning and execution of the attack and said it was surprising they had managed to keep it a secret.

Other analysts say that while it is not clear whether the Deccan Mujahideen claim is genuine, the attacks may have been carried out by a group called the Indian Mujahideen – also an offshoot of Simi and blamed by police for almost every major bomb attack in India, including explosions on commuter trains in Mumbai two years ago that killed 187 people.

Police said the Indian Mujahideen may also include former members of Bangladeshi militant group, Harkat-ul-Jihad al Islami. In an e-mail in September, the group denounced Mumbai's police anti-terrorist squad (ATS), accusing them of harassing Muslims.

"If this is the degree your arrogance has reached, and if you think that by these stunts you can scare us, then let the Indian Mujahideen warn all the people of Mumbai that whatever deadly attacks Mumbaikars will face in future, their responsibility would lie with the Mumbai ATS and their guardians," it said.

 
Wednesday, November 26, 2008 - 09:38 PM

Cyber & Tech News: NDTV 24x7 Live

http://www.ndtv.com/convergence/ndtv/video/video_live.aspx?id=0

Twitter

http://search.twitter.com/search?q=%23mumbai




There are situations at 2 hotels. Army has been called in. One of the hotels has been stormed by commandos.

There could be possibly 200 people in one of the hotels.

Communications are taking place via intercom.

No certain number of hostages.

Attackers arrived by boat.

At least 12 policemen have been killed.

Attacks at 11 locations.

It is being said this does not follow any previous attack patterns.

From Twitter:
The Police in Mumbai have asked people to stop reporting ops in real time.

/END



 
Posted by WorldAnalysis on Wednesday, November 26, 2008   

Page << | 1 | 2 | 3 | 4 | 5 | 10 | >>
Past Articles
Older articles
Topics

Fatal error: Call to a member function Execute() on a non-object in /home/content/j/e/s/jessical/html/postnuke/html/includes/pnSession.php on line 378