FreshRSS

πŸ”’
❌ About FreshRSS
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Backdoor code found in 11 Ruby libraries

RubyGems staff have removed 18 malicious Ruby library versions that have been downloaded 3,584 times since July 8.
  • August 20th 2019 at 16:02

HNN #230 - August 20, 2019

By paul@securityweekly.com

This week, 61 impacted versions of Apache Struts let off security advisories, a hacker publicly releases Jailbreak for iOS version 12.4, Chrome users ignoring warnings to change breached passwords, an unpatchable security flaw found in popular SoC boards, and a reward up to $30,000 for find vulns in Microsoft Edge dev and beta channels! In the expert commentary, we welcome Jason Wood, to discuss Ransomware and City Governments!

Β 

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode230

Roman Sannikov, Recorded Future - https://www.youtube.com/watch?v=0kCZIX6a-6o

Β 

Visit https://www.securityweekly.com/hnn for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 20th 2019 at 20:59

Moscow's blockchain voting system cracked a month before election

French researcher nets $15,000 prize for finding bugs in Moscow's Ethereum-based voting system.
  • August 20th 2019 at 22:57

No Spoilers - BSW #140

By paul@securityweekly.com

This week, we welcome Jessica Johnson and Amber Pedroncelli to discuss Hacker Halted and the Global CISO Forum! In the Leadership and Communications segment, 3 Traits Of Successful Entrepreneurs, 4 Ways To Gain Power And Use It For Good, 5 Reasons to Never Compromise on Punctuality, and more!

Β 

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode140

To register for Hacker Halted, visit: https://securityweekly.com/hackerhalted and use the discount code HH19SW to get $100 off!

Β 

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 21st 2019 at 09:00

Apple, Google, and Mozilla block Kazakhstan's HTTPS intercepting certificate

Kazakhstan government's root certificate banned inside Chrome, Firefox, and Safari.
  • August 21st 2019 at 10:00

SEC charges rating service $269,000 for hiding ICO touting payments

The company failed to mention some Initial Coin Offerings were paying for inclusion.
  • August 21st 2019 at 12:08

Suspected Capital One hacker requests release from jail on health grounds

It is believed the alleged cybercriminal stole information belonging to 100 million citizens.
  • August 21st 2019 at 12:52

Intel, IBM, Google, Microsoft & others join new security-focused industry group

New Confidential Computing Consortium will promote the use of TEEs (trusted execution environments).
  • August 21st 2019 at 16:00

A botnet has been cannibalizing other hackers' web shells for more than a year

Neutrino botnet is hijacking servers by taking over other hackers' PHP and Java web shells.
  • August 21st 2019 at 22:39

Wither on the Vine - ESW #150

By paul@securityweekly.com

This week, Paul is joined by John Strand and Matt Alderman to talk Enterprise News, in which ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP! In our second segment, we air three pre-recorded interviews from BlackHat 2019 with Steve Laubenstein of CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise! In our final segment, we air two more pre-recorded interviews from BlackHat 2019 with Carsten Willems of VMRay and David Etue of BlueVoyant!

Β 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 22nd 2019 at 09:00

US military veterans swindled out of millions by former army employee

Millions of dollars were stolen from those who have served after their PII was taken.
  • August 22nd 2019 at 09:05

Open-source spyware makes it on the Google Play Store

Spyware based on two-year-old AhMyth RAT makes past Play Store's scans, despite not being anything special.
  • August 22nd 2019 at 10:16

UK cybersecurity agency warns devs to drop Python 2 due to looming EOL & security risks

NCSC likens companies continuing to use Python 2 past its EOL to tempting another WannaCry or Equifax incident.
  • August 22nd 2019 at 13:13

Chrome devs propose Privacy Sandbox to balance ad targeting and user privacy

New technical spec will allow advertisers to track users in groups and categories, rather than individually.
  • August 22nd 2019 at 15:46

Valve patches recent Steam zero-days, calls turning away researcher 'a mistake'

Valve also updates bug bounty rules to prevent similar incidents from happening again.
  • August 22nd 2019 at 18:08

Employees connect nuclear plant to the internet so they can mine cryptocurrency

The Ukrainian Secret Service is investigating the incident as a potential security breach.
  • August 22nd 2019 at 22:21

80 suspects arrested in massive business email scam takedown

Police say the mainly-Nigerian network was responsible for the attempted theft of $46 million.
  • August 23rd 2019 at 09:22

Data stolen from Hy-Vee customers offered for sale on Joker’s Stash Dark Web forum

A card dump of 5.3 million accounts may be tied to the recent security breach.
  • August 23rd 2019 at 10:15

Asruex Trojan exploits old Office, Adobe bugs to backdoor your system

The malware’s selection of old vulnerabilities highlights a patching issue worldwide.
  • August 23rd 2019 at 11:23

Hong Kong protesters warn of Telegram feature that can disclose their identities

Message shared on discussion boards sparks panic among protesters.
  • August 23rd 2019 at 16:01

Police to sell hacker's $1.1 million Bitcoin stash to compensate victims

Hacker told to give up bitcoins or face four more years in prison.
  • August 23rd 2019 at 20:27

Capital One hacker denied release, will remain in jail

Defense argued for her release, but judge decided she was a flight risk and a danger to herself and others.
  • August 23rd 2019 at 22:05

Hackers mount attacks on Webmin servers, Pulse Secure, and Fortinet VPNs

Enterprise networks across the world are at risk after hackers start exploiting three very popular products.
  • August 25th 2019 at 11:30

Hostinger resets customer passwords after security incident

Up to 14 million Hostinger users might be impacted by a security breach that took place two days ago, on August 23.
  • August 25th 2019 at 16:56

Clickjacking scripts found on 613 popular sites, academics say

Scripts that intercept mouse clicks are being used for ad fraud or to redirect users to malicious sites.
  • August 26th 2019 at 14:08

Apple patches iPhone jailbreaking bug

Apple releases security update to re-patch bug that it accidentally unpatched last month.
  • August 26th 2019 at 18:55

Save the World - PSW #617

By paul@securityweekly.com

This week, we present a Technical Segment sponsored by our partner DomainTools, on Deobfuscating JavaScript to investigate Phishing Domains! In our second segment, we welcome Richard Melick, Senior Technology Product Marketing Manager at Automox, to talk about why waiting to deploy critical patches makes you a bigger target! In our final segment, we air two pre recorded interviews from BlackHat USA 2019, with Roman Sannikov from Recorded Future and Ray Dimeo of Virsec!

Β 

To learn more about Automox, visit: https://securityweekly.com/automox

To learn more about DomainTools, visit: https://securityweekly.com/domaintools

Full Show Notes: https://wiki.securityweekly.com/Episode617

Β 

Visit https://www.securityweekly.com/psw for all the latest episodes!

Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 26th 2019 at 21:00

Microsoft: Using multi-factor authentication blocks 99.9% of account hacks

Microsoft cloud services are seeing 300 million fraudulent sign-in attempts every day. MFA can help protect accounts against many types of account takeover attacks.
  • August 27th 2019 at 04:30

Middle East cyber-espionage is heating up with a new group joining the fold

New Lyceum APT is targeting oil and gas companies in the Middle East, and telecoms across Africa and Asia.
  • August 27th 2019 at 13:00

Protocol used by 630,000 devices can be abused for devastating DDoS attacks

Security researchers warn that the WS-Discovery protocol is currently being abused for massive DDoS attacks.
  • August 27th 2019 at 13:40

Still Alive - ASW #74

By paul@securityweekly.com

This week, we welcome Pawan Shankar, Senior Product Marketing Manager of Sysdig! In our second segment, we air two pre-recorded interviews with Azi Cohen, Co-Founder of WhiteSource, and Jeff Hudson, CEO of Venafi from BlackHat USA 2019!

Β 

To learn more about Sysdig, visit: https://securityweekly.com/sysdig

Full Show Notes: https://wiki.securityweekly.com/ASW_Episode74

Β 

Visit https://www.securityweekly.com/asw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 27th 2019 at 17:00

HNN #231 - August 27, 2019

By paul@securityweekly.com

This week, a hacker finds Instagram Account Takeover Flaw worth $10,000, a U.S. Judge orders Capital One hacker Paige Thompson to remain in prison, a vast majority of newly registered domains are malicious, and why half of all Social Media logins are fraud! In the expert commentary, Jason Wood joins us to discuss Building Your First Incident Response Policy: A Practical Guide for Beginners!

Β 

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode231

Visit https://www.securityweekly.com/hnn for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 27th 2019 at 19:16

Imperva discloses security incident impacting cloud firewall users

Security incidents impacts cloud WAF (formerly Incapsula) customers registered up until September 15, 2017.
  • August 27th 2019 at 16:43

Avast and French police take over malware botnet and disinfect 850,000 computers

Joint private-law enforcement efforts shuts down two-year-old Retadup malware operation for good.
  • August 28th 2019 at 08:00

Ulterior Motive - BSW #141

By paul@securityweekly.com

This week, we welcome Tony Howlett, CISO at SecureLink, to talk about best practices to limit 3rd party risk! In the Leadership and Communications segment, The elements of a good company apology, 8 ways leaders delegate successfully, there's no shame in working on vacation, and more!

Β 

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode141

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweek

Like us on Facebook: https://www.facebook.com/secweekly

Β 

  • August 28th 2019 at 09:00

A new IOT botnet is infecting Android-based set-top boxes

New Ares IoT malware/botnet has been seen on HiSilicon, Cubetek, and QezyMedia set-top boxes, per new report.
  • August 28th 2019 at 11:22

North Korean state hackers target retired diplomats and military officials

In a first of its kind operations, state-sponsored group goes after retired South Korean officials.
  • August 28th 2019 at 12:53

Apple will no longer keep Siri audio recordings by default, makes feature opt-in

If users opt in, only Apple employees will be able to listen to Siri recordings. No more contractors.
  • August 28th 2019 at 16:03

TrickBot, today's top trojan, adds feature to aid SIM swapping attacks

TrickBot trojan seen collecting credentials and PIN codes for Sprint, T-Mobile, and Verizon Wireless accounts.
  • August 28th 2019 at 19:37

Holding People Back - ESW #151

By paul@securityweekly.com

This week, Paul and Matt Alderman talk Enterprise News, to discuss 5 tips on how testers can collaborate with software developers, Imperva discloses a data breach affecting some firewall users, VMware unveils security enhancements in Virtual Cloud Network Offering, and how Veristor and Synack partner to apply Ethical Hackers and AI Technology! In our second segment, we air three pre-recorded interviews from BlackHat 2019 with Chris Kennedy from AttackIQ, Balaji Prasad of BlueHexagon, and Mike Weber of Coalfire! In our final segment, we air three more pre-recorded interviews from BlackHat 2019 with Brett Wahlin of Respond Software, Andrew Homer of Morphisec, and Mat Gangwer from Sophos!

Β 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode151

Visit https://www.securityweekly.com/esw for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 29th 2019 at 09:00

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

How secure is your organization’s information? At any given moment, can a security leader look an executive in the eye and tell them how well business processes, projects and supporting assets are protected?Β  Β 

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls. However, in a fast-moving, interconnected world where the threat landscape is constantly evolving, many security assurance programs are unable to keep pace. Ineffective programs that do not focus sufficiently on the needs of the business can provide a false level of confidence. Β 

A Business-Focused Approach

Many organizations aspire to an approach that directly links security assurance with the needs of the business, demonstrating the level of value that security provides. Unfortunately, there is often a significant gap between aspiration and reality.

Improvement requires time and patience, but organizations do not need to start at the beginning. Most already have the basics of security assurance in place, meeting compliance obligations by evaluating the extent to which required controls have been implemented and identifying gaps or weaknesses.Β 

Taking a business-focused approach to security assurance is an evolution. It means going a step further and demonstrating how well business processes, projects and supporting assets are really protected, by focusing on how effective controls are. It requires a broader view, considering the needs of multiple stakeholders within the organization.

Business-focused security assurance programs can build on current compliance-based approaches by:

  • Identifying the specific needs of different business stakeholders
  • Testing and verifying the effectiveness of controls, rather than focusing purely on whether the right ones are in place
  • Reporting on security in a business context
  • Leveraging skills, expertise and technology from within and outside the organization

A successful business-focused security assurance program requires positive, collaborative working relationships throughout the organization. Security, business and IT leaders should energetically engage with each other to make sure that requirements are realistic and expectations are understood by all.

A Change Will Do You Good

The purpose of security assurance is to provide business leaders with an accurate and realistic level of confidence in the protection of β€˜target environments’ for which they are responsible. This involves presenting relevant stakeholders with evidence regarding the effectiveness of controls. However, common organizational approaches to security assurance do not always provide an accurate or realistic level of confidence, nor focus on the needs of the business.

Security assurance programs seldom provide reliable assurance in a dynamic technical environment, which is subject to a rapidly changing threat landscape. Business stakeholders often lack confidence in the accuracy of security assurance findings for a variety of reasons.

Common security assurance activities and reporting practices only provide a snapshot view, which can quickly become out of date: new threats emerge or existing ones evolve soon after results are reported. Activities such as security audits and control gap assessments typically evaluate the strengths and weaknesses of controls at a single point in time. While these types of assurance activities can be helpful in identifying trends and patterns, reports provided on a six-monthly or annual basis are unlikely to present an accurate, up-to-date picture of the effectiveness of controls. More regular reporting is required to keep pace with new threats.

Applying a Repeatable Process

Organizations should follow a clearly defined and approved process for performing security assurance in target environments. The process should be repeatable for any target environment, fulfilling specific business-defined requirements.

The security assurance process comprises five steps, which can be adopted or tailored to meet the needs of any organization. During each step of the process a variety of individuals, including representatives from operational and business support functions throughout the organization, might need to be involved.

The extent to which individuals and functions are involved during each step will differ between organizations. A relatively small security assurance function, for example, may need to acquire external expertise or additional specialists from the broader information security or IT functions to conduct specific types of technical testing. However, in every organization:

  • Business stakeholders should influence and approve the objectives and scope of security assurance assessments
  • The security assurance function should analyze results from security assurance assessments to measure performance and report the main findings

Organizations should:

  • Prioritize and select the target environments in which security assurance activities will be performed
  • Apply the security assurance process to selected target environments
  • Consolidate results from assessments of multiple target environments to provide a wider picture of the effectiveness of security controls
  • Make improvements to the security assurance program over time

AnΒ Ongoing Investment

In a fast-moving business environment filled with constantly evolving cyber threats, leaders want confidence that their business processes, projects and supporting assets are well protected. An independent and objective security assurance function should provide business stakeholders with the right level of confidence in controls – complacency can have disastrous consequences.

Security assurance activities should demonstrate how effective controls really are – not just determine whether they have been implemented or not. Focusing on what business stakeholders need to know about the specific target environments for which they have responsibility will enable the security assurance function to report in terms that resonate. Delivering assurance that critical business processes and projects are not exposed to financial loss, do not leak sensitive information, are resilient and meet legal, regulatory and compliance requirements, will help to demonstrate the value of security to the business.

In most cases, new approaches to security assurance should be more of an evolution than a revolution. Organizations can build on existing compliance-based approaches rather than replace them, taking small steps to see what works and what doesn’t.

Establishing a business-focused security assurance program is a long-term, ongoing investment.

About the author: Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of focus include strategy, information technology, cyber security and the emerging security threat landscape across both the corporate and personal environments. Previously, he was senior vice president at Gartner.

Copyright 2010 Respective Author at Infosec Island
  • August 29th 2019 at 13:14

Three Strategies to Avoid Becoming the Next Capital One

Recently, Capital One discovered a breach in their system that compromised Social Security numbers of about 140,000 credit card customers along with 80,000 bank account numbers. The breach also exposed names, addresses, phone numbers and credit scores, among other data.

What makes this breach even more disconcerting is Capital One has been the poster child for cloud adoption and most, if not all, of their applications are hosted in the cloud. They were one of the first financial companies - a very technologically conservative industry -- to adopt the cloud and have always maintained the cloud has been a critical enabler of their business success by providing incredible IT agility and competitive strengths.

So, does this mean companies should rethink their cloud adoption? In two words: hell o! The agility and economic value of cloud are intact and accelerating.Β  Leading edge companies will continue to adopt the cloud and SaaS technologies. The breach does, however, put a finer point on what it means to manage security in the cloud.

So how do you avoid becoming the next Capital One? At Sumo Logic, we are fully in the cloud and work with thousands of companies who have (or are planning to) adopt the cloud. Our experience enables us to offer three strategies to our enterprise CISO/security teams:

1. Know the β€œshared security” principles in the cloud environment.

The cloud runs on a shared security model. If you are using the cloud and building apps in the cloud, you should know that your app security is shared between you (the application owner) and the cloud platform. .

Specifically, the cloud security model means that:

  • The cloud vendor manages and controls the host operating system, the virtualization layer, and the physical security of its facilities.
  • To ensure security within the cloud, the customer configures and manages the security controls for the guest operating system and other apps (including updates and security patches), as well as for the security group firewall. The customer is also responsible for encrypting data in-transit and at-rest.
  • Have a strong IAM strategy, access control and logging are key to stopping inseider threats
  • Consider a Bug Bounty program, this was an essential point in what Capital One did right to identify the breach.

Hence, running in the cloud does not absolve you of managing the security of your application or its infrastructure, something all cloud enterprises should be aware of. It is also a good time to step up you security to invite ethical hacking on your services. At Sumo Logic, we have been running Bounties on our platform for two years using both HackOne and BugCrowd to open the kimono and gain trust from our consumers that we are doing everything possible to secure their data in the cloud.

Your call to action: Know the model. Know what you are responsible for (at the end of the day, almost everything!).

2. Know and use the cloud native security services

Some elements of cloud infrastructure and systems are opaque -- all cloud providers provide native security services to help you get control of access/security in the cloud. It’s imperative enterprises in the cloud use these foundational services. In Sumo Logic’s third annual State of the Modern App Report, we analyzed the usage of these services in AWS and saw significant usage of these services.

Your call to action: Implement the cloud platform security services. They are your foundational services and help implement your basic posture.

3. Get a β€œcloud” SIEM to mind the minder

A security information event management (SIEM) solution is like a radar system pilots and air traffic controllers use. Without one, enterprise IT is flying blind in regard to security. Today’s most serious threats are distributed, acting in concert across multiple systems and using advanced evasion techniques to avoid detection. Without a SIEM, attacks are allowed to germinate and grow into emergency incidents with significant business impact.

Cloud security is radically different from traditional SIEM’s. There are many key differences:

  • The architecture of cloud apps (microservices, API based) is very different from traditional apps
  • The surface area of cloud applications (and therefore security incidents) is very large
  • The types of security incidents (malware, ransomware etc.) in the cloud could also be very different from traditional data center attacks

While you consider a SIEM, consider one focused on new threats in the cloud environment, built in the cloud, for the cloud.

So, there you have it -- three strategies to preventing catastrophic cloud security issues. These strategies will not fix everything, but they are the best starting points to improve your security posture as you move to the cloud.

About the author: As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines.

Copyright 2010 Respective Author at Infosec Island
  • August 30th 2019 at 14:00

Ransomware hits hundreds of dentist offices in the US

Ransomware group gains access to dental software backend, deploys ransomware on customers' systems.
  • August 29th 2019 at 16:20

Google adds all Android apps with +100m installs to its bug bounty program

Google will pay security researchers for bugs they report in non-Google Android apps that have over 100 million installs.
  • August 29th 2019 at 16:30

Google launches bounty program to spot misuses of Google API, Chrome, and Android user data

Google follows Facebook's steps and launches program to spot app devs stealing or misusing Google user data.
  • August 29th 2019 at 16:30

Russian police take down malware gang that infected 800,000+ Android smartphones

TipTop malware gang was making between $1,500 and $10,500 in daily profits.
  • August 29th 2019 at 18:30

Some of Russia's surveillance tech leaked data for more than a year

Security researcher finds that some of Russia's SORM wiretapping equipment had been leaking user data.
  • August 30th 2019 at 00:23

Google finds malicious sites pushing iOS exploits for years

Google finds exploits for 14 iOS vulnerabilities, grouped in five exploit chains, deployed in the wild since September 2016.
  • August 30th 2019 at 08:22

Company behind Foxit PDF Reader announces security breach

Foxit Software said hackers breached website accounts and stole user information.
  • August 30th 2019 at 14:09

Jack Dorsey's Twitter account got hacked

Hackers tweet and retweet offensive content, make bomb threat.
  • August 30th 2019 at 20:27

WordPress sites under attack as hacker group tries to create rogue admin accounts

Hackers exploit vulnerabilities in more than ten WordPress plugins to plant backdoor accounts on unpatched sites.
  • August 30th 2019 at 22:19

So Many Jokes, So Little Time - PSW #618

By paul@securityweekly.com

This week, we present the Security News, to discuss how AT&T employees took bribes to plant malware on the company’s network, how hackers could decrypt your GSM calls, 80 suspects charged with massive BEC scam, and how the passports and licenses of 300 people were leaked in New Zealand! In our second segment, we welcome back Corey Thuen, Co-Founder at Gravwell, to talk about analyzing custom log sources! In our final segment, we air a pre-recorded interview with Chris Hadnagy, Founder, CEO, and Chief Human Hacker at Social Engineer, LLC., to talk about the SEVillage Orlando 2020, and the mission and some info on the Innocent Lives Foundation!

Β 

To learn more about Gravwell, visit: https://securityweekly.com/gravwell

Full Show Notes: https://wiki.securityweekly.com/Episode618

Visit https://www.securityweekly.com/psw for all the latest episodes!

Β 

Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

  • August 30th 2019 at 19:00

How MuleSoft patched a critical security flaw and avoided a disaster

MuleSoft deals with a sensitive security issue and sets up an example for the whole industry to follow.
  • September 1st 2019 at 18:47

Cisco releases guides for incident responders handling hacked Cisco gear

Forensic investigation guides available for Cisco ASA, IOS, IOS XE, and FTD gear.
  • September 2nd 2019 at 08:54

BEC overtakes ransomware and data breaches in cyber-insurance claims

BEC-relatedcyber-insurance claims accounted for nearly a quarter of all claims in the EMEA region, AIG said.
  • September 2nd 2019 at 11:43

Android RAT Exclusively Targets Brazil

A newly discovered Android remote access Trojan (RAT) is specifically targeting users in Brazil, Kaspersky reports.Β 

Called BRATA, which stands for Brazilian RAT Android, the malware could theoretically be used to target any other Android user, should the cybercriminals behind it want to. Widespread since January 2019, the threat was primarily hosted in Google Play, but also in alternative Android app stores.Β 

The malware targets Android 5.0 or later and infects devices via push notifications on compromised websites, messages delivered via WhatsApp or SMS, or sponsored links in Google searches.

After discovering the first RAT samples in January and February 2019, Kaspersky has observed over 20 different variants to date, in Google Play alone, most posing as updates to WhatsApp.Β 

One of the topics abused by BRATA is the CVE-2019-3568 WhatsApp patch. The infamous fake WhatsApp update had over 10,000 downloads in the official Android store when it was removed, KasperskyΒ says.

As soon as it has infected a device, BRATA enables its keylogging feature and starts abusing Android’s Accessibility Service feature to interact with other applications.

The commands supported by the malware allow it to capture and send user’s screen output in real-time, or turn off the screen or give the user the impression that the screen is off while performing actions in the background.Β 

It can also retrieve Android system information, data on the logged user and their registered Google accounts, and hardware information, and can request the user to unlock the device or perform a remote unlock.

What’s more, BRATA canΒ launch any application installed with a set of parameters sent via a JSON data file, send a string of text to input data in textboxes, and launch any particular application or uninstall the malware and remove traces of infection.

β€œIn general, we always recommend carefully review permissions any app is requesting on the device. It is also essential to install an excellent up-to-date anti-malware solution with real-time protection enabled,” Kaspersky concludes.Β 

Related:Β Malware Found in Google Play App With 100 Million Downloads

Related:Β Researchers Discover Android Surveillance Malware Built by Russian Firm

Copyright 2010 Respective Author at Infosec Island
  • September 2nd 2019 at 14:59

German bank loses €1.5 million in mysterious cashout of EMV cards

Brazilian criminal gang cloned Mastercard debit cards issued by German bank OLB and withdrew more than €1.5 million from about 2,000 of its customers.
  • September 3rd 2019 at 08:00

Over 47,000 Supermicro servers are exposing BMC ports on the internet

Researchers discovered a new remote attack vector on Supermicro servers that are exposing their BMC port over the internet. Patches are available.
  • September 3rd 2019 at 10:00
❌