Uncategorized

Traffic for Google, Apple, Facebook, Microsoft and other tech giants routed through Russia

Traffic for Google, Apple, Facebook, Microsoft and other tech giants routed through Russia, experts believe it was an intentional BGP Hijacking. Last week a suspicious event routed traffic for major tech companies (i.e. Google, Facebook, Apple, and Microsoft) through a previously unknown Russian Internet provider. The event occurred on Wednesday, researchers who investigated it believe the traffic was intentionally hijacked.

The incident involved the Internet’s Border Gateway Protocol that is used to route traffic among Internet backbones, ISPs, and other large networks.

https://twitter.com/bgpmon/status/940724787311022080

A similar incident occurred eight months when a huge amount of traffic belonging to MasterCard, Visa, and more than two dozen other financial services was briefly routed through a telecom operator controlled by the Russian Government.

“Early this morning (UTC) our systems detected a suspicious event where many prefixes for high profile destinations were being announced by an unused Russian Autonomous System.  Starting at 04:43 (UTC) 80 prefixes normally announced by organizations such Google, Apple, Facebook, Microsoft, Twitch, NTT Communications and Riot Games were now detected in the global BGP routing tables with an Origin AS of 39523 (DV-LINK-AS), out of Russia.” states a  blog post published by Internet monitoring service BGPMon. “Looking at timeline we can see two event windows of about three minutes each. The first one started at 04:43 UTC and ended at around 04:46 UTC. The second event started 07:07 UTC and finished at 07:10 UTC.  Even though these events were relatively short lived, they were significant because it was picked up by a large number of peers and because of several new more specific prefixes that are not normally seen on the Internet. So let’s dig a little deeper. “

BGPMon observed two distinct events for a total of six minutes that affected 80 separate address blocks.

bgp hijack 1

Another monitoring service, Qrator Labs, stated the event lasted for two hours during which the number of hijacked address blocks varied from 40 to 80.

bgp hijack 2

BGPMon experts consider the incident as suspicious for the following reasons:

  • The rerouted traffic belonged to big tech companies.
  • Hijacked IP addresses belong to small and specific blocks that aren’t’ normally seen on the Internet.

“What makes this incident suspicious is the prefixes that were affected are all high profile destinations, as well as several more specific prefixes that aren’t normally seen on the Internet. This means that this isn’t a simple leak, but someone is intentionally inserting these more specific prefixes, possibly with the intent the attract traffic.” continues the analysis from BGPMon.

The BGP hijacking was caused by an autonomous system located in Russia that added entries to BGP tables claiming it was the legitimate origin of the 80 affected prefixes. This assertion caused large amounts of traffic sent to and received by the affected companies to pass through the Russian AS 39523 before being routed to its final destination.

Below the list of ISPs that picked up the new route:

  • xx 6939 31133 39523 (path via Hurricane Electric)
  • xx 6461 31133 39523 (path via Zayo)
  • xx 2603 31133 39523 (path via Nordunet)
  • xx 4637 31133 39523 (path via Telstra)

AS39523 is a previously unused autonomous system that hasn’t been active in years, but he made the headlines in August when it was involved in another BGP incident that involved Google.

“Whatever caused the incident today, it’s another clear example of how easy it is to re-route traffic for 3rd parties, intentionally or by accident. It also is a good reminder for every major ISP to filter customers. ” concluded BGPMon.

“This hijack highlights a common problem that arises due to lack of route filtering. We can blame AS39523 for the accident, but without proper filters at the intermediate transit providers boundaries we are doomed to see similar incidents again and again. We’d like to encourage all networks involved in this incident to review their route filtering strategy, and at the very least implement prefix-based BGP filters on all interconnections towards their customers.” concluded Qrator Labs.

Trim, Cut, or Split a Video the Quickest Way for Free

With phones, DSLRs, and GoPros we’re all shooting more video than ever. But it rarely comes straight out of the camera in perfect shape. Often you’ll need to do a little editing of a video before showing or sharing it. You might want to trim a few seconds off the start or end, or cut it so that it’s a more shareable length.

Fortunately, you don’t need any editing skills to do this. You just need the right software — and you’ve probably already got it installed on your computer.

So let’s take a look at the quickest way to trim videos in Windows, Mac, Linux, and in a web browser.

Trim Video in Windows

The quickest way to trim and cut videos in Windows 10 is to the use the built in Photos app.

Open your video to get started. You can do this either by launching Photos from the Start menu and navigating your way to where the clip is stored on your hard drive, or by right-clicking the file and selecting Open with > Photos.

A video in the Windows Photos app

When the video has opened click Edit & Create in the top right corner of the window then select Trim.

The video now reopens in Edit mode. On the timeline at the bottom there’s a blue handle that enables you to scroll through the video, plus two white dots that be used to set the start and end points for your newly trimmed clip.

Using handles to trim video in the Windows Photos app

First, drag the left dot towards the right until you reach the point where you want your video to start (everything to the left of this will be cut). Then drag the right dot leftwards to trim off the end of the video.

Hit the Play button to preview the changes, and tweak the positions of the white dots to fine-tune your edit. When you’re happy, hit Save as to save the edited version as a new file. By default, it’ll be saved with the same filename with the word “Trim” appended to it. This ensures you never overwrite the original file.

Saving a new trimmed video in Windows

And that’s it. You can split a longer video into two or more shorter clips using the same technique. Just repeat the process for each clip, setting different start and end points to isolate the sections you want to save.

Trim Video on a Mac

On macOS you can trim video using QuickTime Player, which is pre-installed on all Macs.

Open the video. By default, supported video files open automatically in QuickTime Player. If yours doesn’t, right-click and select Open With > QuickTime Player, or drag the file onto the app icon in the Dock.

Editing a video in Quicktime Player on a Mac

Next, go to Edit > Trim. You’ll now see the trimming bar at the bottom of the window. Everything inside the yellow section is included in your trimmed video, while everything outside will be removed.

Grab the left handle and drag it to the right until you reach the point where you want your video to start. Then grab the right handle and drag it to the left. Hit the Play button to preview your selection, and tweak the handles if necessary.

Trimming a video in Quicktime Player on a Mac

When done, click Trim. The video will now be trimmed, and will open as a new untitled file. Go to File > Save to save the new, trimmed video.

Trim Video in Linux

If you’re on Linux, you’ll need to find a third party app to trim and split your videos. We recommend VidCutter, which we’ll be using in this guide on Ubuntu.

To begin, you’ll need to install VidCutter. How you do this depends on which Linux distro you’re using. Check out VidCutter on Github for full instructions for all main distros.

On Ubuntu, we install VidCutter through the Terminal app, starting with the following commands:

sudo add-apt-repository ppa:ozmartian/apps
sudo apt update

Finally, install the app:

sudo apt install vidcutter

To open your file either launch VidCutter and select Open Media, or navigate your way to where the video is stored on your computer. Right-click the file and select Open With > VidCutter.

Opening a video in VidCutter on Linux

When the video opens, locate the filmstrip at the bottom of the window. Drag the green handle to the point where you want your video to start. Click Start Clip to save that position.

A video in VidCutter on Linux

Next, drag the green handle to the point where you want your video to the end. Click End Clip to save this position. Now click Save Media to save a copy of your newly edited file.

Trimming a video in VidCutter on Linux

What’s good about VidCutter is that you can make multiple cuts to the same video all at once. If you want to remove something from the middle of a clip, set two start points and two end points either side of the unwanted portion. Clicking Save Media will then create a new video where the two sections you’ve selected are joined together.

Trim Videos Online

If you’re using a Chromebook, or just prefer to work in the browser on any machine, there are lots of options to trim videos online. We’re going to use ClipChamp. This service is good for editing up to five videos per month on a free account.

You need to sign up to get started. Fortunately this is painless, since you can log in straight away with your Google or Facebook accounts.

Loading a video into ClipChamp via the browser

Click Convert my video, or drag and drop your chosen clip into the browser window. ClipChamp also optimizes your videos for your target platform, but we need to focus on the trimming first.

In the right-hand pane, click Edit Video. A filmstrip appears below the video with two blue flags at either end. Grab these flags and drag them inwards to set new start and end points. Your selected area is shaded blue, and everything outside of this will be trimmed off.

Trimming a video in ClipChamp in the browser

There’s no need to confirm your edits at this stage, although you can undo them by clicking the Xbutton alongside the Trim icon.

Now take a look at the optimization options in the left part of the screen. You can choose a platform you want to optimize for, such as web, mobile, or to create a GIF. You can also adjust the resolution, file format, and quality.

Optimizing a video in ClipChamp

When you’re happy with your choices, click Start in the bottom right corner. It will now start processing; the amount of time it takes depends on the size of the video.

Downloading the final trimmed video from ClipChamp

When it’s finished you have two options: Upload & Share and Save. The first enables you to post the video to various social media sites. The second lets you download and save a local copy of your edited file.

New "PRILEX" ATM Malware Used in Targeted Attacks

Trend Micro security researchers recently discovered a highly targeted piece of malware designed to steal information from automated teller machines (ATMs).

Dubbed PRILEX and written in Visual Basic 6.0 (VB6), the threat was designed to hijack a banking application and steal information from ATM users. The malware was spotted in Brazil, but similar threats could prove as harmful anywhere around the world, the security researchers say.

First reported in October 2017, PRILEX was designed to hook certain dynamic-link libraries (DLLs) and replace them with its own application screens. The targeted DLLs (P32disp0.dll, P32mmd.dll, and P32afd.dll) belong to the ATM application of a bank in Brazil.

Because of this atypical behavior, the researchers concluded that the malware was being used in a highly targeted attack. What’s more, the threat only affects a specific brand of ATMs, meaning that its operators might have possibly analyzed the machines to devise their attack method, Trend Micro explains.

After infecting a machine, the malware starts operating jointly with the banking application. Thus, the malware can display its own fake screen requesting the user to provide their account security code. The code is delivered to the user as part of a two-factor authentication method meant to protect ATM and online transactions, and the malware captures and stores the code.

The malware attempts to communicate with the command and control (C&C) server to send stolen credit card data and account security code. The security researchers believe the malware’s operators might be dealing bulk credit card credentials.

“To our knowledge, this is the first ATM malware that assumes it is connected to the internet. It is likely that this bank’s ATMs are connected, since the attackers seem to be very familiar with this particular bank’s methods and processes,” Trend Micro says.

PRILEX also shows that cybercriminals can analyze the methods and processes of any bank to abuse them in highly targeted attacks. Thus, all financial institutions should take this into consideration when defending their ATM infrastructure, especially since a silent attack as this could go unnoticed for months, if not years.

At the DefCamp conference in Bucharest in early November, Kaspersky Lab’s Olga Kochetova and Alexey Osipov explained how easy it is to create ATM botnets. Discoverable online, these devices are susceptible to a broad range of attacks and infecting a single machine could allow attackers to compromise a bank’s entire network.

“A targeted malware likely took significant time and resources to develop. This shows that in today’s world, criminals consider that a worthwhile investment. Gone are the days when banks were seen as unassailable—now they are simply the biggest fish in the sea. It is not easy to kill a whale, but it is possible—and doing so allows an attacker to eat for a long time,” Trend Micro notes.

CUTLET MAKER gets cracked

In addition to PRILEX, Trend Micro analyzed CUTLET MAKER, a relatively new ATM malware that was first detailed in October this year. A run-of-the-mill program, the malware consists of multiple components and can be run from a USB memory stick connected to an ATM. The malware relies on the Diebold Nixdorf DLL (CSCWCNG.dll) to send commands to the ATM’s dispensing unit.

Designed to empty the ATM of all its banknotes, the malware was found being sold on underground markets for as much as $5,000. However, it appears that competitors have already managed to crack its code, allowing anyone to use it for free.

Each time the malware is executed, a code is required to use the program and empty the ATM. Apparently, the threat doesn’t use time-based codes, but just an algorithm, which means that the same input would generate the same output, and some cybercriminals have already built a “key generator” to automatically calculate the return code.

“The code is available on the internet and relatively easy to find. This means that anybody can start victimizing ATMs without having to pay for the program—or at least ATMs with an accessible USB port,” Trend Micro says.

Thus, some have started selling the malware along with the keygen for much lower prices compared to the original. It appears that the malware’s developers haven’t responded yet, and no new version of the tool that uses a different algorithm has been released.

How to Use Google’s Productivity Tools to Maximize Your Time

Until someone puts more hours in the day or days in the week, many of us are stuck with a 40-hour work week. Tackling everything that needs to be done can be quite a struggle. To find the best way to manage your time as well as your productivity, look no further than the tools from Google. While we’ve based our tips on Google’s tools, you can adapt many of the ideas to other productivity tools as well.

Block Time for Emails

Depending on the type of position you hold, business emails might be a huge part of your day. Although you have to create and respond to messages, it can be distracting. For example, you could be working on an business document but constantly stop because those emails are flying into your inbox. Now, that important document takes a back seat and takes you longer to complete with each distraction.

Instead, try blocking a specific time to work on emails each day. Of course, critical or emergency messages should be attended to as a priority. However, those that can wait, should.

Create an Event

You can block time in Google Calendar by creating a recurring event with a reminder. Plus, if you share your calendar with others, they will see your blocked time. Just select the appropriate date and time from Google Calendar, give the event a name, set the reminder, make it repeat, and click Create.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal RecurringEvent web

Flag Messages for Follow-up

If you use Gmail for your business, you can easily keep track of those messages that you need to handle during your blocked time. A simple way to do this is by flagging emails as you see them. Gmail offers a nice selection of flags called Stars.

To select those that you want to use, click Settings (gear icon) and the General tab. Scroll down to Stars and drag those you want to activate from Not in use to In use. Then when you see an email you want to flag, click the star next to it until the appropriate one appears.

How to Use Google's Productivity Tools to Maximize Your Time GmailStars web

With this combination of Google Calendar and Gmail, you can organize your email time with ease.

Schedule Your Availability

Planning your work week is an essential part of time management. You must be sure that you are making the most of the time that you have available. Google Calendar makes it easy to see your schedule with day, week, month, and work-week views. And, with a handy built-in feature, you can display your availability.

Work With Appointment Slots

A great way to manage your time for coworkers to see is with Google Calendar’s Appointment Slots feature. Keep in mind that you must have a work or school account to access this feature. With Appointment Slots, you do not block your time as with calendar events, but instead provide times when you are available.

For instance, if you are available from 1 PM to 4 PM, here are the steps once you access Google Calendar:

  1. Make sure that your calendar is in Day or Week view.
  2. Click the day and time you will be available.
  3. Select Appointment Slots in the pop-up window.
  4. Add a name for the slot, choose the type, and click Create. In case further details are needed, click Edit Details instead of Create.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal AppointmentSlots web

If you do not have access to the Appointment Slots feature, you can still display your availability by blocking the times you are busy, as we did above for email time.

Optimize Meeting Time

If you coordinate meetings on a regular basis, let Google Docs and Google Calendar help you make this a smooth process.

Meeting Agenda and Minutes

There is nothing worse than a meeting with no plan, organization, or structure. So, start by creating a meeting agenda that you can attach to the calendar request. Google Docs has a few different templates that combine an agenda with minutes, for an all-in-one document.

After signing into your Google account on Google Docs, click Template Gallery from the top. Scroll down to the Work category and you will see the three Meeting Notes templates. Each option contains the same basic details including attendees, agenda, notes, and action items. They only differ in their look and feel.

How to Use Google's Productivity Tools to Maximize Your Time GoogleDocsMinutesTemplates

Meeting Requests

After you have created the agenda, put together the meeting request with Google Calendar.

Select the appropriate date and time for your meeting in Google Calendar. Then click the Edit Details button. When the page opens, you will see a spot on the right to add Guests. Just pop in the email addresses for your attendees.

To attach the agenda, click Add Attachment beneath the Description box and select your file.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal MeetingRequest web

Toggle Tasks and Reminders

While Google Tasks is a decent tool for simple to-dos, you will find many advantages to using Google Keep instead. Plus, you can switch between Google Tasks and Google Keep reminders in your calendar quickly.

Add Tasks in Google Keep

With Google Keep you can easily turn notes into tasks and to-do lists. Then, take advantage of the helpful features for managing those tasks. You can set up a reminder, create a checklist, attach an image, add a drawing, and collaborate with a coworker.

How to Use Google's Productivity Tools to Maximize Your Time GoogleKeepExtras web

In addition, you can pin notes to keep them at the top of the list, which is perfect for high-priority items. You can also incorporate tags and color-coding for easy organization.

Switch Between Tasks and Reminders

To switch between the tasks and reminders in Google Calendar, be sure that you are on your main calendar screen. On the left under My calendars, click the arrow next to Tasks. Then select Switch to Reminders. All reminders that you have set up in Google Keep will then be displayed on your calendar.

How to Use Google's Productivity Tools to Maximize Your Time GoogleCal TaskReminderSwitch web

When you want to switch back, simply follow those same steps, ending with Switch to Tasks. Your Google Tasks will then pop open on the right of the screen as normal.

Plan Your Week Ahead of Time

When planning your work week, Google makes it easy for you to do so from anywhere. Whether you are relaxing on the couch or hanging out on the patio, just grab your mobile device and use the Google tools you need.

You do not have to even open your computer. Google Calendar, Google Keep, Google Docs, and Gmail are all available for both Android and iOS devices:

How to Use Google's Productivity Tools to Maximize Your Time iPhoneGoogleCalendar mobile1

Preparing and reviewing your schedule not only gives you a solid work-week plan, but also a head start before you go into the office on Monday morning.

How to Transcribe Audio to Text for Free

You might think you don’t have a need for a transcribing tool if you aren’t a journalist, lawyer, or medical professional, but you’d be surprised. You could be in a meeting with a recording app turned on. Or in a classroom lecture as your professor drones away. Basically, we can all benefit from ways to convert audio to text, transcription is the best way to do that.

How to Transcribe Audio Using oTranscribe

oTranscribe

In the good old days, turning audio into text was sheer grunt work, but not anymore. oTranscribe is a free and open-source app that runs in your browser. Got your audio file ready? Here’s how to start the transcribing session:

  1. Click the blue Start Transcribing button on the homepage.
  2. Upload the audio recording into the browser with a click on the Choose audio (or video) filebutton. The web app also supports the transcription of YouTube videos.
  3. The file is displayed as a play head on top of the browser window with controls for rewind, pause or fast-forward. There are keyboard shortcuts for the productivity ninjas too.
  4. The word processor is where you type the transcribed text. Bold and Italic are the two formatting options available.
  5. Start typing and control the speed of playback with the slider on top or the F3 and F4 keys.

oTranscibe also has interactive timestamps. Press Ctrl + J (Cmd + J on Mac) to insert the audio file’s current time into the document. This timestamp is hyperlinked and when you click on it it will take you to the specific time in the audio file.

Once you’ve finished transcribing, you can download the transcript as a markdown file, a plain text file, or retain it in the oTranscribe document format. The .OTR format can be imported back into the app. You also have the choice to export it to Google Drive and keep a backup or make it part of another document.