Hacking
Popcorn Time is Vulnerable to Significant Hack Attacks
Popular file sharing and streaming service Popcorn Time contains critical vulnerabilities leaving it open to XSS attacks, files being read locally and remote code execution attacks, according to a security researcher.
The security researcher has discovered significant vulnerabilities within the popular file streaming service Popcorn Time, potentially allowing attackers to gain complete access and control of a computer connected to the service. The researcher made a comprehensive account of his findings in a blog post.
Popcorn Time has always been a target among anti-privacy companies and the MPAA (Motion Picture Association of America) and now finds itself under threat from a different adversary.
The Vulnerability
Antonios Chariton, aka ‘DaKnOb’, the researcher who discovered the vulnerability, claims to be a security engineer and researcher studying in Greece for his B.Sc. in Computer Science.
“There are two reasons that made me look into Popcorn Time,” said Chariton.
First of all, I know many people who have installed this application on their personal computers and use it, and second of all, by pure accident: I was setting up my computer firewall when I noticed the network traffic initiated by Popcorn Time.
The engineering student notes that initial concerns aside, problems really flare up when Popcorn Time initiates a “really smart” process and technique to bypass the blockades set by ISPs (Internet Service Providers) in the UK. The popular streaming service manages to do this by using the CloudFlare infrastructure as a part of its setup and connectivity process. Due to this, ISPs find it nearly impossible to block Popcorn Time purely by means of a DNS address without banning the CloudFlare website entirely.
Despite being clever in its maneuvering around the blockade, the problems coming from such a move are clear.
“First of all, the request to Cloudflare is initiated over plain HTTP. That means both the request and the response can be changed by someone with a Man in the Middle position (Local Attacker, Network Administrator, ISP, Government, etc.),” explains Charlton.
The second mistake is that there is no input sanitization whatsoever. That means, there are no checks in place to ensure the validity of the data received. The third mistake is that they make the previous two mistakes in a NodeJS application.
Furthermore, Chariton was able to engineer and initiate “content spoofing” attack which enabled him to change the title of a movie. Case in point, he gave the movie Hot Pursuit the title of “Hello World” instead.
(Image credit: Daknob Blog)
It was at this point in time that Chariton launched an XSS attack. By injecting malicious JavaScript, the Popcorn Time client executed the code which gave him complete control of the application. He was only getting started, however.
“This essentially is Remote Code Execution on the computer that runs Popcorn Time. You can do anything the computer user could do.”
Image from PopcornTime Website and Wikipedia.
Follow @HackedCom
Feedback or Requests?
Cybersecurity
The Pirate Bay is Hijacking PCs to Stealth-Mine Cryptocurrency
Follow @HackedCom
Feedback or Requests?
Breaches
Coders Safeguard Vulnerable Ethereum Wallets Following Security Breach
Follow @HackedCom
Feedback or Requests?
Hacking
Hackers Only Need Seconds to Figure Out Card Details
Experts from Newcastle University in England has found that hackers only need six seconds to figure out the card number, expiry date, and security code for a Visa debit or credit card by simple guesswork, according to a report from The Telegraph.
According to figures from the Office of National Statistics, in the U.K. the number of bank account fraud cases reported up to June 2016, from the beginning of the year, amounted to over 2.3 million.
The researchers found that all that a hacker needs is a computer and an Internet connection. It is believed that hackers simply utilize what is known as a Distributed Guessing Attack enabling them to get around security features that help prevent online fraud.
By using the Distributed Guessing Attack, the system was unable to detect multiple attempts made by hackers.
Process of Elimination
As such, within a matter of seconds hackers were able to determine the correct information on a person’s card by a process of elimination.
Only recently Tesco bank account customers were subjected to hacking after criminals were able to gain access to their accounts. It is believed that these hackers may have used the Distributed Guessing Attack to siphon money from peoples’ accounts.
Payment Cards Remain Vulnerable
Unfortunately, even though Visa debit and credit cards remain popular and convenient forms of payment, they remain vulnerable as well.
And hackers know this, which is why reports of online card fraud are becoming more prevalent in today’s technologically-advanced world.
Visa states though:
The research does not take into account the multiple layers of fraud prevention that exist within the payments system, each of which must be met in order to make a transaction possible in the real world.
However, while this may be the case, it seems something is amiss if cybercriminals can simply determine a person’s card details in six seconds through guesswork.
Bitcoin to the Rescue?
The digital currency bitcoin, however, may provide an answer to this problem.
As a type of digital currency that is held and created electronically with no central bank governing it, bitcoin is considered the cash of the Internet.
Due to its popularity more people are turning to it instead of fiat currency.
It was recently reported that Sweden is considering the issuance of its own digital currency, ekrona, in an effort to address the significant decline of the use of cash in the country.
Whereas India has announced that digital currency will become the new normal in the country as it attempts to reduce the amount of cash transactions with the banning of its biggest banknotes, the Rs 500 and Rs 1,000.
While these are just a few instances of how bitcoin is revolutionizing how we see money, many are quickly catching on to how safe and effective bitcoin is as a form of payment in a world where hackers are gaining easy access to a person’s Visa debit and credit cards.
Featured image from Shutterstock.
Follow @HackedCom
Feedback or Requests?
-
Analysis5 days agoLong-Term Cryptocurrency Analysis: Correction Continues as Ripple Goes Berserk
-
Recommendations4 days agoTrade Recommendation: IOTA
-
Bitcoin7 days agoHot Crypto Topics For 2018
-
Altcoins1 week agoCryptocurrency Investing: What is a Healthy Portfolio and Where Does Bitcoin Stand
-
Recommendations5 days agoTrade Recommendation: Bitcoin
-
Recommendations1 week agoTrade Recommendation: Siacoin/Bitcoin
-
Recommendations1 week agoTrade Recommendation: Short Bitcoin
-
Altcoins15 hours agoWhy Investors Should Pay Attention to TRON (TRX)










Charles Hebdo
August 16, 2015 at 8:27 am
Well into a PopcornTime session today, my computer sounded 3 alerts, and a few seconds later, a private excel file popped open, by itself. I was naturally alarmed, so I proceeded to close my network connection, and check the event log. Noticed an odd SYSTEM logon event dated a few minutes before the incident. A google update error also showed up. No VNC or similar remote-in software running. Popcorntime Desktop service was the only suspicious thing running…