Posts

The programmable keylogger APT-4

Image
Keylogger/Keystroke Every key we press on an electronic device emits certain frequency and this is termed as DTMF(Dual Tone Multi Frequency) . This tone can be easily detected using some common apps available on play store/App Store today. But, it can also be heard and find the exact key not by only practice but in a perfect silence condition. This consumes time and at least requires 2-3 years of patience.      But this can also be achieved through scripting. Yes!! You read that right. By using some advanced frameworks that were available between 2010-2013, hackers developed some keylogger for the systems targeting defense, aerospace and commercial industries and this was later named as APT-4.  Curious to know how APT-1 , APT-2 and APT-3 . Check out our blogs for cool stuffs.    APT-4(Advanced Persistent Threat) Unlike APT-2 and APT-3 , this was suspected from China and its main target to steal information from computer, possible by creating backdoors. S...

The precedence of Cyberwar from China APT-3

Image
Yet another Chinese APT, it seems like china is getting ready with cyberwarfare . Like APT-1 and APT-2 this thread also started with phishing email, but it targets were limited to public, defense, private, Supply chain sectors, Non-profit, Biotechnology, Construction, Education and Energy. In 2013 Chinese based thread actors thought of creating threads for stealing information using Java, Adobe and Internet Explorer ( default browser for XP and 2007 ). Bug Hunters who were really working hard found various enumeration techniques to exploit java with minimum user interferences. This was bad news for the thread actors. So they planned to espionage and steal information from the above sectors using Adobe and Internet Explorer.      Numerous mails to employees were drafted and sent to the Defense and Aerospace Industry.  Some sample e-mails are shown below Sample-1: Save between $200-450 by purchasing an Apple Certified Refurbished iMac through this link. Refurbished ...

The precedence of Cyberwar from China APT-2

Image
Welcome to the Cyber precedence of China Part-2, Today we are just curious to learn about how APT-2 attack was successfully conducted by targeting Military and Defense network. APT-2 doesn't damage any property instead it was stealing all the information from the unencrypted web and network interface. If you are curious to know about APT-1 and what APT does, check our first previous blog. APT-2 Consists of two main Malwares MOOSE WARP                                                                                                                                            ...

The precedence of Cyberwar from China APT-1

Image
APT,  Advanced Persistent Threat , is usually a state/nation sponsored threat or sometimes a private consultancy service provoke this threat, targeting individual users(high profiles) or preferably a country. They sneak into our system via the network. These threads remain in our system for years, possibly decades too. The main aim of APT is to get all the information from the target without the user knowledge. Even the latest firewall/antivirus would fail to prevent this attack. The main drawback of all the APT's/threat is they require user interaction in order to gain access to our system. This is mostly done through phishing attacks.       Phishing : A threat actor gathers the target's information using publicly disclosed, social media or through breached websites. Threat agents use this information to obtain your PID like email, phone number, Date of birth, Location, Address, your interests, The ads you clicked online and so on. Keeping this details th...

Conflict Minerals

Image
Before stepping into our topic I want to thank each and every niche readers and commenters of this blog. We etched our first achievement. Yes, this is our 25th post and will be continuing our journey till the knowledge well dries. On this special day we have decided to add an announcements page in our blog, so, stay tuned for the updates.                                               Conflict Minerals Every electronic users in the world is a killer. Even you and me. Do you accept? Let our blog elaborates the deepest cries made by the African people and refugees.        Think twice before purchasing an electronic gadget. They can unwittingly kill 4 children's education. If we value our children's future then why can't we value them?? Minerals like Tantalum, Tin and Tungsten are mined by individual miners without using any prevention m...

The Bio-Aid for Everyday

Image
People used  to have a past life and present life, but the Coronavirus has changed a lot. Yes, sitting at home and working, ordering foods and takeout or take in (bit of ironic) have become a new face. People have been slowly forced to use every single piece of plastic against being affected. True, they reduce in spreading Covid-19 strains but, we are creating an enemy parallelly. We have been using it in the name of the coronavirus. Hoping this should be back to normal as it were before Coronavirus(B.C). Here we present the Best biodegradable products that humans should use in their daily life.    1. Edible Spoon from Pineapple waste We are already famous with the edible spoon and plates which are made out of wafer. There's an alternative for them too. Edible Spoons out of bio waste. They make spoons and plates out of pineapple waste. One of the chief that manufactures Edible spoons and cups are Lifepack (Colombian based company)   2. Biodegradable Coconut Straw St...

The Brain Gain vs Economic Drain

Image
We are like the Luminous fish who emit light when the country requires and like tampons who absorb all sort of stains.   Remember what gates said once: If Microsoft stop hiring Indians there would another Microsoft born in India, it was funny until it hits you hard. CEO of the greatest companies like google, Microsoft, Pepsico are Indians. Apart from this there are also some list of businessmen from India who got settled in the USA either as an entrepreneur or became a part in decision-making team. We just want to ask a question to them why they left India and got settled abroad? We do also accept the risk of establishing a startup and converting into a billion dollar company. It requires huge investments, new business strategies, government support and smart people. Luckily India has all these foundations laid up in their government aided educational institutes like IIT's NIIT's and IISc. But why do smarter minds get migrated?        The answer to this is so s...

The What-if Kill Chain

Image
Industrial development was a revolutionary era that gave us the Modern era for which we all are grateful but took it for granted. Technology advancements do made our life easier, but it also starts to eradicate our nature. Sure many of you guessed how it happens! But What  If we can safeguard the nature and avail us the modern gifts,  Raising brows, right? Let me Drive you Through' 1. The Invention of Electric cars We're not going to do the same as others does, rather we will put some facts, and we will try to be more optimistic. Electric cars are powered by Lithium and cobalt. Most of the lithium are mined from the lithium triangle and cobalt are mined from Africa using child labors. Mining activities require more and more water. Geologist states that 65% of the Chile water are used in extracting 1 ton of Lithium which also kills the flamingos . We have also stated why Tesla has recently opened a plant in Brazil and the coup d'état movement that took place at Bolivia....