Posts

21 Months Jail & $77000 fine for Sabotaging CITI Bank Network(Cyber Crime) in 2013

Image
21 Months Jail & $77,000 Fine  for Sabotaging CITI Bank Network in 2013 Ex staff of Citibank named  Lennon Ray Brown  was sentenced to Jail for 21 months  along with a $77,000 fine  by a Texas court ( U.S. District C. Godbey   ) for sabotaging the bank’s internal network, The Register reports. Lennon Ray Brown, who worked at the bank’s Irving office, said he wanted to get back at management for "firing" him after he was called out for poor job performance. Brown had been working at Citibank's Irving, Texas, corporate office since 2012, first as a contractor and later as a staff employee, when he was called in by a manager and reprimanded for poor performance. Brown, 38, admitted that on December 23, 2013, he issued commands to wipe the configuration files on 10 core routers within Citibank's internal network. Brown deliberately uploaded commands to the bank's Global Control Center routers that deleted the configuration files, ultimately congesting ne

Anton Piller Order or Order related to Raids in Software Piracy matter : Microsoft loses

Microsoft looses its Anti piracy raid case due to wrong facts in the Petition The Bombay High Court has criticised Microsoft for making misleading claims when it secured a preliminary order that allowed the company to search the premises of a local company it accused of copyright infringement.  Court vacated a stay it had granted this June in favour of the US tech major in its plea against  Girnar Software  over unlicensed use of its products. In a ruling handed down on July 15, 2016  Hon. Justice Gautam Patel vacated a previous order handed down last month and has given Microsoft an opportunity to withdraw its complaint.  In the dispute, US-based Microsoft sued Girnar Software earlier this year for allegedly using unauthorised copies of its software including Microsoft Windows, Office and Visual Studios.  On June 24, Hon. Justice had granted Microsoft’s request for an Anton Piller order. Under those orders, a defendant in a proceeding is required to allow a plaintiff or its r

Adv Prashant Mali Speaking along with The Hon. IT & Telecommunication Minister of India Mr Ravishankar Prasad

Image

Terrorist using Customised Apps to evade detection

Terrorist have created an application 'calculator' which can be downloaded on smart phones attached to the off-air network created specifically for them. The technology is based on the concept of 'cognitive digital radio' that enables users to turn their smartphones into peer-to-peer, off-grid communication tools. The network generates its own signal through proprietary adhoc networking protocols and automatically coordinates with other units within range which enables users to send and receive text messages, share their GPS locations on offline maps regardless of access to WiFi or cellular service. The Calculator app is loaded on a normal Android phone and communicates over WiFi to the Radio which further gets transmitted on VHF as digital burst communication.  The principle is same as Gotennna but with little difference.  Gotennna uses Bluetooth to communicate with the a small Radio device Antenna which further uses UHF to transmit data.  Gotennna works on P2P concept

What is Locky Malware and what to do

Image
is a Malware(virus types) which is sent to your computer via email or via an attachment of a fake invoice then that malware(malicious software) encrypts your hard disk and whole data becomes meaningless like special characters  ं$#़॥ like this only one jpg file u can open. Then only in this jpg file there are instructions to pay ransome via bitcoin. Once u pay the hard disk is decrypted I.e made meaningful. The victim receives an email that requests payment on an attached "invoice", usually a Word file. The attachment contains some sort of executable code, like a VBA macro, that downloads the actual malware from a web site and runs it, encrypting the data on the victim's local and networked hard drives. It then displays a screen that demands a ransom to decrypt the data. WHAT TO DO WITH LOCKY? Backup regularly and keep a recent backup copy off-site. There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a d

Meeting with Dr. Jamie Saunders

Image
Met Dr. Jamie Saunders, Director of UK's National Cyber Crime Unit at the London office of National Crime Agency .Had a good knowledge sharing session and also I presented him my Book on Cyber Crime & Cyber Law. Prashant Mali 

Fast Flux Networks An Introduction

Image
A Fast Flux Network is a network of compromised computers and some public DNS records that change frequently. As a result, the IP address associated with the corresponding domain name changes frequently. This technique is often used by the attackers to hide their malicious websites from detection. Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other web scams). To protect the identity and to maximise the availability of the core components of their business, miscreants have recently started to use fast-flux service networks, large groups of bots acting as front-end proxies to these components. Motivated by the conviction that prompt detection and monitoring of these networks is an essential step to contrast the problem posed by botnets, Attackers typically compromise one or more victim computer systems with malware and exploit those to establish a fraud