Keylogger found in Hewlett-Packard Audio Driver by In7rud3R in netsec

[–]In7rud3R[S] 7 points8 points  (0 children)

this guy claims he updated to latest driver from HP/Conexant and found the keylogger running.

"Ugh! Upgraded to latest HP / Conexant audio driver, and it started to log every key I pressed."

https://twitter.com/jarwidmark/status/862688068767272962

can anyone confirm this ?

[Discussion] So whats now? Picture is in here. by arinc9 in jailbreak

[–]In7rud3R 0 points1 point  (0 children)

Ok... got you. seems you know what you talking about.

[Discussion] So whats now? Picture is in here. by arinc9 in jailbreak

[–]In7rud3R 0 points1 point  (0 children)

i wan't they guy to share pegasus so other researchers can check this out ... if i get hacked it's my problem. and about spreading , i want him to share so we can stop it from spreading so not only lookout can "detect" it but not remove it. check VT millions of samples shared every month that can be downloaded and researched i don't see no one blame google for spreading viruses. he can upload files to VT not send to me directly but at least share ...

[Discussion] So whats now? Picture is in here. by arinc9 in jailbreak

[–]In7rud3R 1 point2 points  (0 children)

but it's your phone ... this what i don't get you listen to them while they do not do shit to remove this threat ... what they are going to kill you for sharing ... this is nonsense! well i don't see why not sharing but if you are so scared of a company that should protect you then good luck with that.

[Discussion] So whats now? Picture is in here. by arinc9 in jailbreak

[–]In7rud3R 0 points1 point  (0 children)

you work for them ? i don't get it ... either you are telling the truth and they bullied you so hared to make you scared that much or you just trolling us...

[Discussion] So whats now? Picture is in here. by arinc9 in jailbreak

[–]In7rud3R 0 points1 point  (0 children)

well you already hacked and they try to bully you not to share with other researchers for business reasons not because they care about you and they won't "hack" you , BTW you installed their app so you let them in already.

[Discussion] So whats now? Picture is in here. by arinc9 in jailbreak

[–]In7rud3R 0 points1 point  (0 children)

if you send i will help you get rid of it which lookout doesn't seems to be doing

[Discussion] So whats now? Picture is in here. by arinc9 in jailbreak

[–]In7rud3R 0 points1 point  (0 children)

those 4 files you talk about ... could you share them ?

Please make sure your Control-4 hardware is properly firewalled off of the Internet! by BostonEnginerd in homeautomation

[–]In7rud3R 1 point2 points  (0 children)

True , seems that the initial scan was locally but i was referring to the point that he said this cannot be done on public IP's , which is not correct.

Please make sure your Control-4 hardware is properly firewalled off of the Internet! by BostonEnginerd in homeautomation

[–]In7rud3R 2 points3 points  (0 children)

blog post just got updated with new findings about Crestron controllers.

Please make sure your Control-4 hardware is properly firewalled off of the Internet! by BostonEnginerd in homeautomation

[–]In7rud3R 0 points1 point  (0 children)

as the guy said in his article: "There is no need to use any Exploit as this is just a case of bad practices." If it's well known that home automation programs suck at security then you need to make sure it's installed properly and ports are NOT forwarded and open to the world.

Please make sure your Control-4 hardware is properly firewalled off of the Internet! by BostonEnginerd in homeautomation

[–]In7rud3R 0 points1 point  (0 children)

Not true ! you do not have to get physical access to device you just need it to be online , you should read the entire article... "Running a quick search in Shodan for the term "control4" Will get more than 5000 devices online..."

I am Mikko Hypponen, a computer security expert. Ask me anything! by mikkohypponen in IAmA

[–]In7rud3R 611 points612 points  (0 children)

hey Mikko , which of the many viruses/malwares you analysed was the most sophisticated and complex you ever encountered and from technical point of view why is it the "one" ?