{"id":2357,"date":"2024-11-19T11:00:00","date_gmt":"2024-11-19T14:00:00","guid":{"rendered":"https:\/\/www.blog.lineasdns.com\/hackers-hijack-unsecured-jupyter-notebooks-to-stream-illegal-sports-broadcasts\/"},"modified":"2024-11-19T11:00:00","modified_gmt":"2024-11-19T14:00:00","slug":"hackers-hijack-unsecured-jupyter-notebooks-to-stream-illegal-sports-broadcasts","status":"publish","type":"post","link":"https:\/\/www.blog.lineasdns.com\/en\/hackers-hijack-unsecured-jupyter-notebooks-to-stream-illegal-sports-broadcasts\/","title":{"rendered":"Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a target=\"_blank\" href=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2024\/12\/streaming.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools.<\/p>\n<p>The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed to facilitate illegal live streaming of sports events, Aqua said in a <a target=\"_blank\" href=\"https:\/\/www.aquasec.com\/blog\/threat-actors-hijack-misconfigured-servers-for-live-sports-streaming\/\" target=\"_blank\">report<\/a> shared with The Hacker News.<\/p>\n<p>The covert piracy campaign within interactive environments widely used for data science applications was discovered by the cloud security firm following an attack against its honeypots.<\/p>\n<p>&#8220;First, the attacker updated the server, then downloaded the tool <a target=\"_blank\" href=\"https:\/\/ffmpeg.org\" rel=\"noopener\" target=\"_blank\">FFmpeg<\/a>,&#8221; said Assaf Morag, director of threat intelligence at cloud security firm Aqua. &#8220;This action alone is not a strong enough indicator for security tools to flag malicious activity.&#8221;<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/thehackernews.uk\/zerotrust-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2024\/12\/zz-inside-d.png\" width=\"727\" height=\"90\"\/><\/a><\/center><\/div>\n<p>&#8220;Next, the attacker executed FFmpeg to capture live streams of sports events and redirected them to their server.&#8221;<\/p>\n<p>In a nutshell, the end goal of the campaign is to download FFmpeg from MediaFire and use it to record live sports events feeds from the Qatari beIN Sports network and duplicate the broadcast on their illegal server via ustream[.]tv.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a target=\"_blank\" href=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2024\/12\/1733748123_51_attack.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><img decoding=\"async\" src=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2024\/12\/1733748123_51_attack.png\" alt=\"Illegal Sports Broadcasts\" border=\"0\" data-original-height=\"699\" data-original-width=\"900\" title=\"Illegal Sports Broadcasts\"\/><\/a><\/div>\n<p>This not only facilitates the abuse of compromised Jupyter Notebook server and its resources by serving as an intermediary, but also enables threat actors to make a profit through advertising revenue by illicitly broadcasting the live streams.<\/p>\n<p>It&#8217;s not clear who is behind the campaign, although there are indications that they could be of Arab-speaking origin owing to one of the IP addresses used (41.200.191[.]23).<\/p>\n<p>&#8220;However, it&#8217;s crucial to remember that the attackers gained access to a server intended for data analysis, which could have serious consequences for any organization&#8217;s operations,&#8221; Morag said.<\/p>\n<p>&#8220;Potential risks include denial-of-service, data manipulation, data theft, corruption of AI and ML processes, lateral movement to more critical environments, and, in the worst-case scenario, substantial financial and reputational damage.&#8221;<\/p>\n<p><\/p>\n<div class=\"cf note-b\">Found this article interesting?  Follow us on <a target=\"_blank\" href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter <i class=\"icon-font icon-twitter\">\uf099<\/i><\/a> and <a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to read more exclusive content we post.<\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/>\n<center><\/p>\n<p>________________________________________________<\/p>\n<p><\/center><\/p>\n<p>Here, we deliver the latest insights from the world of cybersecurity, featuring updates from industry leaders and our trusted partners. Stay ahead of emerging threats, cutting-edge solutions, and the opportunities defining the future of digital security. \ud83d\udee1\ufe0f\ud83c\udf10<\/p>\n<p>Thank you for trusting us as your guide. \ud83d\udd12 Together, we\u2019re building a safer digital world!<\/p>\n<p>\n<a href=\"https:\/\/thehackernews.com\/2024\/11\/hackers-hijack-unsecured-jupyter.html?rand=1734\">Source Link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using&hellip;","protected":false},"author":1,"featured_media":2358,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"0","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[68],"tags":[84,77,70,69,71,72,73,78,74,75,80,82,81,79,76,83],"class_list":{"0":"post-2357","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacker-news","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-hacker-news","17":"tag-hacking-news","18":"tag-how-to-hack","19":"tag-information-security","20":"tag-network-security","21":"tag-ransomware-malware","22":"tag-software-vulnerability","23":"tag-the-hacker-news","24":"cs-entry"},"_links":{"self":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/2357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/comments?post=2357"}],"version-history":[{"count":0,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/2357\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media\/2358"}],"wp:attachment":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media?parent=2357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/categories?post=2357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/tags?post=2357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}