Tuesday 25 February 2014

MTGOX world's largest bitcoin trading website turned OFFLINE ~ Hack4friends

MTGOX world's largest bitcoin trading website turned OFFLINE ~ Hack4friends


As we all know in recent days the virtual currency-Bitcoins gained much popularity among all countries's people. And its exchange value to US Dollars raised to 1200$. But now its going to smashed because its exchange values is also decreasing day by day and today its value downed to 425.304$(Biggest fall).




MTGOX got much popularity in few months and ranked as No. 1 online bitcoin trading website.But now website is disappeared from internet and a blank page is left on their website. People from all countries have invested so millions of Dollars($) for online trading with Bitcoins but MTGOX disappeared with all money.
Mark Karpeles, CEO of the pioneering but troubled Bitcoin exchange MtGox, has resigned his seat on the board of the Bitcoin Foundation, the organization that standardizes and promotes the cryptocurrency.

MtGox, which handled the bulk of Bitcoin transactions until fraudulent hacking forced it to freeze withdrawals earlier this month, has had serious liquidity problems since last year. Though others were subsequently hit too, Bitcoin Foundation chief scientist Gavin Andresen blamed the exchange rather than the core protocol for the episode, and MtGox’s systems have struggled to recover.
                                   
                              
                                           All tweets are deleted by MTGOX

The Tokyo-based company has repeatedly promised a fix but failed to deliver. Its most recent communication was on Thursday, claiming that “security problems” had forced it to relocate, slowing down its progress in fixing its records after the attack. It’s not clear whether this is a reference to the couple of angry bitcoiners who were camped outside the MtGox offices, demanding their money.

In a statement on Sunday, the Bitcoin Foundation said it was “grateful for [MtGox's] early and valuable contributions as a founding member in launching the Bitcoin Foundation.” A request for comment from MtGox itself had gone unanswered at the time of writing, though as many have noted the company has deleted its entire tweet history, so take from that what you will.

We also contacted to MTGOX via their old email addresses but till now we have not got any response from their side about it all.

Team Hack4Friends,
@E-Hackers

Friday 14 February 2014

Biggest DDos attack of the world with 400Gbps ~ Hack4Friends

Biggest DDos attack of the world with 400Gbps ~ Hack4Friends

A massive distributed-denial-of-service attack Monday reached more than 400Gbps at its peak, about 33 percent greater than last year's Spamhaus attack, the previous DDoS record-holder.
The attack was apparently directed at one of the customers of content delivery network and security provider CloudFlare, which first reported the attack. The company said it appeared that attackers leveraged a flaw in the Network Time Protocol (NTP), a network protocol used to synchronize computer clock times.


"Very big NTP reflection attack hitting us right now. Appears to be bigger than the #Spamhaus attack from last year. Mitigating," Cloudflare CEO Matthew Price said in a tweet. "Someone's got a big, new cannon. Start of ugly things to come," he wrote in a follow-up tweet.
Price did not identify the customer targeted by the attack but did say it was directed at servers in Europe, adding that "these NTP reflection attacks are getting really nasty."
The frequency of NTP reflection attacks has grown in recent months. After an NTP attack was used to take down game servers hosting EA's Origin service, Blizzard's Battle.net, and League of Legends, among others, US-CERT issued an alert warning companies of the attack technique's growing popularity.
The basic attack technique consists of attackers querying vulnerable NTP servers for traffic counts using the victim's spoofed address.
"Due to the spoofed source address, when the NTP server sends the response it is sent instead to the victim," CERT warned. "Because the size of the response is typically considerably larger than the request, the attacker is able to amplify the volume of traffic directed at the victim."

"Because the responses are legitimate data coming from valid servers, it is especially difficult to block these types of attacks," US-CERT said in its January advisory, which included suggestions on how administrators could mitigate vulnerability.
The technique's popularity has grown since the emergence of toolkits such as DNS Flooder v1.1, according to security vendor Prolexic, which said Tuesday it has observed the attack used on several clients during the past six months, sometimes with amplification factors of 50 times the originating bandwidth.
"This toolkit uses a unique method where attackers assign DNS servers with arbitrary names and utilize them as reflectors," according to Prolexic's report. "This new technique allows malicious actors to purchase, set up, and use their own DNS servers to launch reflection attacks, without the need to find open and vulnerable DNS servers on the Internet."
Monday's DDoS surpassed the attack last March that peaked with a 300Gbps torrent of traffic flooding spam fighter Spamhaus, CloudFlare, and key Internet switching stations in Amsterdam, Frankfurt, and London. That onslaught resulted, according to some reports, service slowdowns across the Internet.

Team Hack4Friends,
E-hackers

Flappy Bird fakes are hatching Android malware ~ Hack4friends

Flappy Bird fakes are hatching Android malware ~ Hack4friends

Flappy Bird's takedown by its creator has given malware creators a new outlet to exploit unsuspecting users.
According to security firm Sophos, it has discovered several applications claiming to be Flappy Bird in third-party Android app marketplaces. The trouble, however, is that the games in some cases contain malware and in others force users to send a text message to a given number, effectively giving the malware creators all they need to potentially exploit users.


Another security firm, Trend Micro, also chimed in on the issue, saying that it has discovered "a bunch of fake Android Flappy Bird apps spreading online." Every one of those it has discovered so far are "apps that send messages to premium numbers, thus causing unwanted changes to victims' phone billing statements."
Flappy Bird has become a hot-button issue in the mobile world after the game soared to popularity and was subsequently taken down by its creator, Dong Nguyen. That was the opening malware creators needed, the security firms say, to take advantage of users who didn't have a chance to try out the game and want to see what all the hype is about.
Both Trend Micro and Sophos said that users shouldn't attempt to download anything calling itself Flappy Bird, since the original version is "dead." They also warned users to "be wary of apps from alternative markets."

Team hack4friends,
E-hackers

Snapchat hack spams users with smoothie photos ~ Hack4Friends

Snapchat hack spams users with smoothie photos ~ Hack4Friends

Snapchat is combating yet another security issue, and it's a juicy one.
In a story posted late Tuesday, Wired editor Joe Brown said his Snapchat friends were asking why he was sending them messages with photos of fruit smoothies. That was a surprise to Brown because he hadn't sent any such messages. Other Snapchatters have since complained about receiving these same messages, according to a Twitter search.
The messages serve up a URL for a company called Snapfroot, which then redirects the recipient to an AllRecipes.com page for a "Berry Delicious" smoothie. The spam outbreak so far seems innocuous, albeit annoying, but it does point to yet another vulnerability for the photo-sharing site.

Snapchat


Snapchat told Brown that these messages have been bouncing around the past couple of days.
"It's mostly cases where someone has your e-mail address and password and gets in on the first try," an anonymous Snapchat spokesperson told Wired. "We're not seeing any evidence of brute-force tactics."
Snapchat is trying to plug the leak. In the meantime, site users may want to change their passwords. The spokesperson also advised people to stay away from third-party apps that ask for your Snapchat username and password.
"Yesterday a small number of our users experienced a spam incident where unwanted photos were sent from their accounts," a Snapchat representative told Reuters. "Our security team deployed additional measures to secure accounts. We recommend using unique and strong passwords to prevent abuse."

Team Hack4friends,
E-hackers

Saturday 8 February 2014

Adobe issues emergency Update for flash (Windows & MAC)

Adobe issues emergency Update for flash (Windows & MAC)

Adobe is recommending that users update their Flash Players immediately -- especially those who frequent Google Chrome and Internet Explorer. The company released an emergency security bulletin on Tuesday that addresses vulnerabilities in Flash, which could be exploited by hackers.


hack4friends, flash player

"This vulnerability could allow an attacker to remotely take control of the affected system," Adobe wrote in a blog post. "Adobe is aware of reports that an exploit for this vulnerability exists in the wild, and recommends users apply the updates referenced in the security bulletin."
Adobe assigned a Priority 1 rating to the vulnerabilities being exploited on Windows and Macintosh and advised users of both operating systems to install the update. That rating -- Adobe's highest threat level -- identifies "vulnerabilities being targeted, or which have a higher risk of being targeted, by exploit(s) in the wild." The bulletin also said that the Flash vulnerability faced by Linux users rated a Priority 3, which refers to "a product that has historically not been a target for attackers."
Adobe recommends users update to the latest versions:
Users of Adobe Flash Player 12.0.0.43 and earlier versions for Windows and Macintosh should update to Adobe Flash Player 12.0.0.44.
Users of Adobe Flash Player 11.2.202.335 and earlier versions for Linux should update to Adobe Flash Player 11.2.202.336.
Adobe Flash Player 12.0.0.41 installed with Google Chrome will automatically be updated to the latest Google Chrome version, which will include Adobe Flash Player 12.0.0.44 for Windows, Macintosh and Linux.
Adobe Flash Player 12.0.0.38 installed with Internet Explorer 10 will automatically be updated to the latest Internet Explorer 10 version, which will include Adobe Flash Player 12.0.0.44 for Windows 8.0.
Adobe Flash Player 12.0.0.38 installed with Internet Explorer 11 will automatically be updated to the latest Internet Explorer 11 version, which will include Adobe Flash Player 12.0.0.44 for Windows 8.1.

You can update your flash player from here Officially 

Team hack4friends,
E-hackers

*****************************Thanks for Your kind Visit****************************

Receive All Free Updates Via Facebook.