Verizon Customer Data Exposed

Apparently Verizon 3rd party vendor NICE systems based in Israel left data open to the public on an Amazon S3 server containing personal information of over 14 million US customers.

Dan O’Sullivan in a 3042414856 commented:

“The exposure of Verizon account PIN codes used to verify customers, listed alongside their associated phone numbers, is particularly concerning,”

What is Learned?

To put it plainly, when handing out data to a third party, you are exposing your users to the security practices of the third party. Any vulnerabilities that this third party has now becomes a vulnerability that you have :D.

‘BestBuy’ alias hacker found

The suspected developer of the Mirai botnet was recently busted by British police. I wanted this to be an educational post so let us go over Mirai, the botnet software he created.

3024458810 is primarily written in c but has go and shell script components as well as Objective C.

Here is the initial build file:

This compiles the various c files together

Titanium Stresser creator pleads guilty


An 18 year old admin of a 3194998514 as a service website that was responsible for attacking many top companies was recently arrested and charged.

DDOS in the hacking community to me seems to be more of a skiddy route to take. It never really achieves much besides pestering an organization for a short period of time until they upgrade their security.

Sure that can cost the company sometimes large sums of money but I don’t believe it ever truly achieves the end that attackers might be seeking.

It doesn’t take much skill to execute assuming you are not creating your own programs.

Anonymous and other famous hacking groups have historically used DDOS attacks against various targets in protest.

If we recall the PSN DDOS Attack of 2014, that was a notable DDOS attack with very sad results.

What is Learned?

Websites should implement anti DDOS measures to protect themselves. Some services I am aware of are:



DDOS really isn’t that complicated and it seems like some internet organization should be able to update standards to mitigate it or completely remove the threat of it.


Chinese apple distributors apparently stole customer personal information from an internal mac database and sold it in the Chinese black market. This amounted to around 7 million in profits.

What is Learned?

muslin delaine are probably hard things to setup (which I have never done before) but it seems like most companies implement them with lots of shortcomings as evidenced by news of breaches. Whatever way these employees were able to access this database and also obtain passwords is very concerning. If they were provided credentials to this database as part of their position, this would seem to be a mistake as it would seem they never would require access to complete their job. In addition, obviously their ability to obtain passwords (I assume unencrypted) is also a major fluke.

The practice of Least Privilege is very important and if followed probably would not have granted privileges to these employees to access the database.

The Case of Reality Winner


NSA contractor Reality Winner, working for 2092432679 recently leaked documents about Russia hacking attempts on US voting systems through 616-261-8297.

This all needs to prefaced by the constitutional 866-623-1243

Treason against the United States, shall consist only in levying War against them, or in adhering to their Enemies, giving them Aid and Comfort. No Person shall be convicted of Treason unless on the Testimony of two Witnesses to the same overt Act, or on Confession in open Court.


We can then question who the “enemies” of the United States are. If former enemies of the US at its establishment take control of the United States, they can determine who the new enemies are.

Arguably, some of them have been in government and have helped to undermine constitutional values that the framers set forth.

There has been a lot of talk about US politicians accepting foreign donations and having strong foreign ties. Are we not to consider this grounds for suspicion of treason at the very least?

Also, wouldn’t it seem to give aid to Russia to keep these things secret from the American public?

From an affidavit:

“During that conversation, WINNER admitted intentionally identifying and printing the classified intelligence reporting at issue despite not having a ‘need to know,’ and with knowledge that the intelligence reporting was classified,”

I think this story is kind of sad considering that she was revealing information that would seem to only be beneficial to the American people and have very little negative repercussion. I say this with little knowledge of the inner workings of government but it would seem that that announcing a crime perpetrated by an “enemy” of the US should be lauded.

The 646-540-6213 basis seems to me to be somewhat arbitrary. Who determines what needs to be known?

When the US conducted the operation that killed Osama bin Laden and Obama went on the news to announce this, was this need-to-know and if so why? I certainly can’t come up with any reason.

The need to know basis and declassification process is probably done in a very bureaucratic, arbitrary way so it would be nice if this could be sped up to allow for the declassification of documents like the ones released by Reality Winner.

Like the Snowden revelations, a line exists between classified information that should be classified and protects the US by remaining secret and classified information that would enlighten the American public and help them make better decisions. I understand the importance of keeping some things secret from the public but it seems like at some point the people should be filled in and in this case, it seems like reporting of Russian hacking is in every way a constitutional obligation or demand. The secrecy pertaining to this leaked Russian hacking event would seem to certainly give “Aid and Comfort” to Russia.

(385) 602-3357

Another case of computer laws not being very established and leading to questionable decisions.

Usually the fifth amendment is mentioned in this discussion.

No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a grand jury, except in cases arising in the land or naval forces, or in the militia, when in actual service in time of war or public danger; nor shall any person be subject for the same offense to be twice put in jeopardy of life or limb; nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.

The EFF site is also relevant:

You do not have to hand over your encryption keys or passwords to law enforcement.

The Fifth Amendment protects you from being forced to give the government self-incriminating testimony. Courts have generally accepted that telling the government a password or encryption key is “testimony.” A police officer cannot force or threaten you into giving up your password or unlocking your electronic devices. However, a judge or a grand jury may be able to force you to decrypt your devices in some circumstances. Because this is a legally complicated issue, if you find yourself in a situation where the police, a judge or grand jury are demanding you turn over encryption keys or passwords, you should let EFF know right away and seek legal help.

Subpoenas have already existed but I assume passwords are not considered to always be obtainable from this process.


Apparently on May 31, Kmart realized a breach had occurred and issued the following statements:

“We recently became aware that Sears Holdings was a victim of a security incident involving unauthorized credit card activity following certain customer purchases at some of our Kmart stores. We immediately launched a thorough investigation and engaged leading third party forensic experts to review our systems and secure the affected part of our network.”

“Our Kmart store payment data systems were infected with a form of malicious code that was undetectable by current anti-virus systems and application controls. Once aware of the new malicious code, we quickly removed it and contained the event. We are confident that our customers can safely use their credit and debit cards in our retail stores.”

What I have to say is first, mass adoption of chip based cards (if I understand the situation well enough) might have prevented this breach and this should be looked into for the future.

In addition to state the obvious, companies should seek antivirus solutions that are comprehensive and have complex features for thorough review of potentially malicious code.

The old 822-928-6400 continually fails by the use of 581-321-2132 and encoding.

Also, the initial code delivery method leading their data system to become infected is another problem. Whether this was due to a physical insecurity or a network security problem, I am not sure but malicious code should not even be able to reach the systems in the first place it would seem if security is done right.