FreshRSS

πŸ”’
☐ β˜† βœ‡ ZDNet | security RSS

Backdoor code found in 11 Ruby libraries

August 20th 2019 at 16:02
RubyGems staff have removed 18 malicious Ruby library versions that have been downloaded 3,584 times since July 8.
☐ β˜† βœ‡ Paul's Security Weekly

HNN #230 - August 20, 2019

By paul@securityweekly.com β€” August 20th 2019 at 20:59

This week, 61 impacted versions of Apache Struts let off security advisories, a hacker publicly releases Jailbreak for iOS version 12.4, Chrome users ignoring warnings to change breached passwords, an unpatchable security flaw found in popular SoC boards, and a reward up to $30,000 for find vulns in Microsoft Edge dev and beta channels! In the expert commentary, we welcome Jason Wood, to discuss Ransomware and City Governments!

Β 

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode230

Roman Sannikov, Recorded Future - https://www.youtube.com/watch?v=0kCZIX6a-6o

Β 

Visit https://www.securityweekly.com/hnn for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ ZDNet | security RSS

Moscow's blockchain voting system cracked a month before election

August 20th 2019 at 22:57
French researcher nets $15,000 prize for finding bugs in Moscow's Ethereum-based voting system.
☐ β˜† βœ‡ Paul's Security Weekly

No Spoilers - BSW #140

By paul@securityweekly.com β€” August 21st 2019 at 09:00

This week, we welcome Jessica Johnson and Amber Pedroncelli to discuss Hacker Halted and the Global CISO Forum! In the Leadership and Communications segment, 3 Traits Of Successful Entrepreneurs, 4 Ways To Gain Power And Use It For Good, 5 Reasons to Never Compromise on Punctuality, and more!

Β 

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode140

To register for Hacker Halted, visit: https://securityweekly.com/hackerhalted and use the discount code HH19SW to get $100 off!

Β 

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ ZDNet | security RSS

Cancer research organizations are now the focus of Chinese hacking groups

August 21st 2019 at 09:02
One way to speed up research? Steal it.
☐ β˜† βœ‡ ZDNet | security RSS

Apple, Google, and Mozilla block Kazakhstan's HTTPS intercepting certificate

August 21st 2019 at 10:00
Kazakhstan government's root certificate banned inside Chrome, Firefox, and Safari.
☐ β˜† βœ‡ ZDNet | security RSS

SEC charges rating service $269,000 for hiding ICO touting payments

August 21st 2019 at 12:08
The company failed to mention some Initial Coin Offerings were paying for inclusion.
☐ β˜† βœ‡ ZDNet | security RSS

Researcher publishes second Steam zero day after getting banned on Valve's bug bounty program

August 21st 2019 at 12:45
Valve gets heavily criticized for mishandling a crucial bug report.
☐ β˜† βœ‡ ZDNet | security RSS

Suspected Capital One hacker requests release from jail on health grounds

August 21st 2019 at 12:52
It is believed the alleged cybercriminal stole information belonging to 100 million citizens.
☐ β˜† βœ‡ ZDNet | security RSS

Intel, IBM, Google, Microsoft & others join new security-focused industry group

August 21st 2019 at 16:00
New Confidential Computing Consortium will promote the use of TEEs (trusted execution environments).
☐ β˜† βœ‡ ZDNet | security RSS

A botnet has been cannibalizing other hackers' web shells for more than a year

August 21st 2019 at 22:39
Neutrino botnet is hijacking servers by taking over other hackers' PHP and Java web shells.
☐ β˜† βœ‡ Paul's Security Weekly

Wither on the Vine - ESW #150

By paul@securityweekly.com β€” August 22nd 2019 at 09:00

This week, Paul is joined by John Strand and Matt Alderman to talk Enterprise News, in which ThreatConnect released Enhanced Integration with Flashpoint, ObserveIT unveils crowdsourced insider threat analytics solution, Thycotic launches automated solution for managing service accounts, and StackRox Kubernetes Security Platform is offered on the GCP! In our second segment, we air three pre-recorded interviews from BlackHat 2019 with Steve Laubenstein of CoreSecurity, Ian McShane from Endgame, and Peter Smith from Edgewise! In our final segment, we air two more pre-recorded interviews from BlackHat 2019 with Carsten Willems of VMRay and David Etue of BlueVoyant!

Β 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode150

Visit https://www.securityweekly.com/esw for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ ZDNet | security RSS

US military veterans swindled out of millions by former army employee

August 22nd 2019 at 09:05
Millions of dollars were stolen from those who have served after their PII was taken.
☐ β˜† βœ‡ ZDNet | security RSS

Open-source spyware makes it on the Google Play Store

August 22nd 2019 at 10:16
Spyware based on two-year-old AhMyth RAT makes past Play Store's scans, despite not being anything special.
☐ β˜† βœ‡ ZDNet | security RSS

UK cybersecurity agency warns devs to drop Python 2 due to looming EOL & security risks

August 22nd 2019 at 13:13
NCSC likens companies continuing to use Python 2 past its EOL to tempting another WannaCry or Equifax incident.
☐ β˜† βœ‡ ZDNet | security RSS

Chrome devs propose Privacy Sandbox to balance ad targeting and user privacy

August 22nd 2019 at 15:46
New technical spec will allow advertisers to track users in groups and categories, rather than individually.
☐ β˜† βœ‡ ZDNet | security RSS

Valve patches recent Steam zero-days, calls turning away researcher 'a mistake'

August 22nd 2019 at 18:08
Valve also updates bug bounty rules to prevent similar incidents from happening again.
☐ β˜† βœ‡ ZDNet | security RSS

Employees connect nuclear plant to the internet so they can mine cryptocurrency

August 22nd 2019 at 22:21
The Ukrainian Secret Service is investigating the incident as a potential security breach.
☐ β˜† βœ‡ ZDNet | security RSS

80 suspects arrested in massive business email scam takedown

August 23rd 2019 at 09:22
Police say the mainly-Nigerian network was responsible for the attempted theft of $46 million.
☐ β˜† βœ‡ ZDNet | security RSS

Data stolen from Hy-Vee customers offered for sale on Joker’s Stash Dark Web forum

August 23rd 2019 at 10:15
A card dump of 5.3 million accounts may be tied to the recent security breach.
☐ β˜† βœ‡ ZDNet | security RSS

Asruex Trojan exploits old Office, Adobe bugs to backdoor your system

August 23rd 2019 at 11:23
The malware’s selection of old vulnerabilities highlights a patching issue worldwide.
☐ β˜† βœ‡ ZDNet | security RSS

Hong Kong protesters warn of Telegram feature that can disclose their identities

August 23rd 2019 at 16:01
Message shared on discussion boards sparks panic among protesters.
☐ β˜† βœ‡ ZDNet | security RSS

Police to sell hacker's $1.1 million Bitcoin stash to compensate victims

August 23rd 2019 at 20:27
Hacker told to give up bitcoins or face four more years in prison.
☐ β˜† βœ‡ ZDNet | security RSS

Capital One hacker denied release, will remain in jail

August 23rd 2019 at 22:05
Defense argued for her release, but judge decided she was a flight risk and a danger to herself and others.
☐ β˜† βœ‡ ZDNet | security RSS

Hackers mount attacks on Webmin servers, Pulse Secure, and Fortinet VPNs

August 25th 2019 at 11:30
Enterprise networks across the world are at risk after hackers start exploiting three very popular products.
☐ β˜† βœ‡ ZDNet | security RSS

Hostinger resets customer passwords after security incident

August 25th 2019 at 16:56
Up to 14 million Hostinger users might be impacted by a security breach that took place two days ago, on August 23.
☐ β˜† βœ‡ ZDNet | security RSS

Clickjacking scripts found on 613 popular sites, academics say

August 26th 2019 at 14:08
Scripts that intercept mouse clicks are being used for ad fraud or to redirect users to malicious sites.
☐ β˜† βœ‡ ZDNet | security RSS

Apple patches iPhone jailbreaking bug

August 26th 2019 at 18:55
Apple releases security update to re-patch bug that it accidentally unpatched last month.
☐ β˜† βœ‡ Paul's Security Weekly

Save the World - PSW #617

By paul@securityweekly.com β€” August 26th 2019 at 21:00

This week, we present a Technical Segment sponsored by our partner DomainTools, on Deobfuscating JavaScript to investigate Phishing Domains! In our second segment, we welcome Richard Melick, Senior Technology Product Marketing Manager at Automox, to talk about why waiting to deploy critical patches makes you a bigger target! In our final segment, we air two pre recorded interviews from BlackHat USA 2019, with Roman Sannikov from Recorded Future and Ray Dimeo of Virsec!

Β 

To learn more about Automox, visit: https://securityweekly.com/automox

To learn more about DomainTools, visit: https://securityweekly.com/domaintools

Full Show Notes: https://wiki.securityweekly.com/Episode617

Β 

Visit https://www.securityweekly.com/psw for all the latest episodes!

Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ ZDNet | security RSS

Microsoft: Using multi-factor authentication blocks 99.9% of account hacks

August 27th 2019 at 04:30
Microsoft cloud services are seeing 300 million fraudulent sign-in attempts every day. MFA can help protect accounts against many types of account takeover attacks.
☐ β˜† βœ‡ ZDNet | security RSS

Middle East cyber-espionage is heating up with a new group joining the fold

August 27th 2019 at 13:00
New Lyceum APT is targeting oil and gas companies in the Middle East, and telecoms across Africa and Asia.
☐ β˜† βœ‡ ZDNet | security RSS

Protocol used by 630,000 devices can be abused for devastating DDoS attacks

August 27th 2019 at 13:40
Security researchers warn that the WS-Discovery protocol is currently being abused for massive DDoS attacks.
☐ β˜† βœ‡ Paul's Security Weekly

Still Alive - ASW #74

By paul@securityweekly.com β€” August 27th 2019 at 17:00

This week, we welcome Pawan Shankar, Senior Product Marketing Manager of Sysdig! In our second segment, we air two pre-recorded interviews with Azi Cohen, Co-Founder of WhiteSource, and Jeff Hudson, CEO of Venafi from BlackHat USA 2019!

Β 

To learn more about Sysdig, visit: https://securityweekly.com/sysdig

Full Show Notes: https://wiki.securityweekly.com/ASW_Episode74

Β 

Visit https://www.securityweekly.com/asw for all the latest episodes!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ Paul's Security Weekly

HNN #231 - August 27, 2019

By paul@securityweekly.com β€” August 27th 2019 at 19:16

This week, a hacker finds Instagram Account Takeover Flaw worth $10,000, a U.S. Judge orders Capital One hacker Paige Thompson to remain in prison, a vast majority of newly registered domains are malicious, and why half of all Social Media logins are fraud! In the expert commentary, Jason Wood joins us to discuss Building Your First Incident Response Policy: A Practical Guide for Beginners!

Β 

Full Show Notes: https://wiki.securityweekly.com/HNNEpisode231

Visit https://www.securityweekly.com/hnn for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ ZDNet | security RSS

Imperva discloses security incident impacting cloud firewall users

August 27th 2019 at 16:43
Security incidents impacts cloud WAF (formerly Incapsula) customers registered up until September 15, 2017.
☐ β˜† βœ‡ ZDNet | security RSS

Avast and French police take over malware botnet and disinfect 850,000 computers

August 28th 2019 at 08:00
Joint private-law enforcement efforts shuts down two-year-old Retadup malware operation for good.
☐ β˜† βœ‡ Paul's Security Weekly

Ulterior Motive - BSW #141

By paul@securityweekly.com β€” August 28th 2019 at 09:00

This week, we welcome Tony Howlett, CISO at SecureLink, to talk about best practices to limit 3rd party risk! In the Leadership and Communications segment, The elements of a good company apology, 8 ways leaders delegate successfully, there's no shame in working on vacation, and more!

Β 

Full Show Notes: https://wiki.securityweekly.com/BSWEpisode141

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweek

Like us on Facebook: https://www.facebook.com/secweekly

Β 

☐ β˜† βœ‡ ZDNet | security RSS

A new IOT botnet is infecting Android-based set-top boxes

August 28th 2019 at 11:22
New Ares IoT malware/botnet has been seen on HiSilicon, Cubetek, and QezyMedia set-top boxes, per new report.
☐ β˜† βœ‡ ZDNet | security RSS

North Korean state hackers target retired diplomats and military officials

August 28th 2019 at 12:53
In a first of its kind operations, state-sponsored group goes after retired South Korean officials.
☐ β˜† βœ‡ ZDNet | security RSS

Apple will no longer keep Siri audio recordings by default, makes feature opt-in

August 28th 2019 at 16:03
If users opt in, only Apple employees will be able to listen to Siri recordings. No more contractors.
☐ β˜† βœ‡ ZDNet | security RSS

TrickBot, today's top trojan, adds feature to aid SIM swapping attacks

August 28th 2019 at 19:37
TrickBot trojan seen collecting credentials and PIN codes for Sprint, T-Mobile, and Verizon Wireless accounts.
☐ β˜† βœ‡ Paul's Security Weekly

Holding People Back - ESW #151

By paul@securityweekly.com β€” August 29th 2019 at 09:00

This week, Paul and Matt Alderman talk Enterprise News, to discuss 5 tips on how testers can collaborate with software developers, Imperva discloses a data breach affecting some firewall users, VMware unveils security enhancements in Virtual Cloud Network Offering, and how Veristor and Synack partner to apply Ethical Hackers and AI Technology! In our second segment, we air three pre-recorded interviews from BlackHat 2019 with Chris Kennedy from AttackIQ, Balaji Prasad of BlueHexagon, and Mike Weber of Coalfire! In our final segment, we air three more pre-recorded interviews from BlackHat 2019 with Brett Wahlin of Respond Software, Andrew Homer of Morphisec, and Mat Gangwer from Sophos!

Β 

Full Show Notes: https://wiki.securityweekly.com/ES_Episode151

Visit https://www.securityweekly.com/esw for all the latest episodes!

Β 

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ Infosec Island Latest Articles

Why a Business-Focused Approach to Security Assurance Should Be an Ongoing Investment

August 29th 2019 at 13:14

How secure is your organization’s information? At any given moment, can a security leader look an executive in the eye and tell them how well business processes, projects and supporting assets are protected?Β  Β 

Security assurance should provide relevant stakeholders with a clear, objective picture of the effectiveness of information security controls. However, in a fast-moving, interconnected world where the threat landscape is constantly evolving, many security assurance programs are unable to keep pace. Ineffective programs that do not focus sufficiently on the needs of the business can provide a false level of confidence. Β 

A Business-Focused Approach

Many organizations aspire to an approach that directly links security assurance with the needs of the business, demonstrating the level of value that security provides. Unfortunately, there is often a significant gap between aspiration and reality.

Improvement requires time and patience, but organizations do not need to start at the beginning. Most already have the basics of security assurance in place, meeting compliance obligations by evaluating the extent to which required controls have been implemented and identifying gaps or weaknesses.Β 

Taking a business-focused approach to security assurance is an evolution. It means going a step further and demonstrating how well business processes, projects and supporting assets are really protected, by focusing on how effective controls are. It requires a broader view, considering the needs of multiple stakeholders within the organization.

Business-focused security assurance programs can build on current compliance-based approaches by:

  • Identifying the specific needs of different business stakeholders
  • Testing and verifying the effectiveness of controls, rather than focusing purely on whether the right ones are in place
  • Reporting on security in a business context
  • Leveraging skills, expertise and technology from within and outside the organization

A successful business-focused security assurance program requires positive, collaborative working relationships throughout the organization. Security, business and IT leaders should energetically engage with each other to make sure that requirements are realistic and expectations are understood by all.

A Change Will Do You Good

The purpose of security assurance is to provide business leaders with an accurate and realistic level of confidence in the protection of β€˜target environments’ for which they are responsible. This involves presenting relevant stakeholders with evidence regarding the effectiveness of controls. However, common organizational approaches to security assurance do not always provide an accurate or realistic level of confidence, nor focus on the needs of the business.

Security assurance programs seldom provide reliable assurance in a dynamic technical environment, which is subject to a rapidly changing threat landscape. Business stakeholders often lack confidence in the accuracy of security assurance findings for a variety of reasons.

Common security assurance activities and reporting practices only provide a snapshot view, which can quickly become out of date: new threats emerge or existing ones evolve soon after results are reported. Activities such as security audits and control gap assessments typically evaluate the strengths and weaknesses of controls at a single point in time. While these types of assurance activities can be helpful in identifying trends and patterns, reports provided on a six-monthly or annual basis are unlikely to present an accurate, up-to-date picture of the effectiveness of controls. More regular reporting is required to keep pace with new threats.

Applying a Repeatable Process

Organizations should follow a clearly defined and approved process for performing security assurance in target environments. The process should be repeatable for any target environment, fulfilling specific business-defined requirements.

The security assurance process comprises five steps, which can be adopted or tailored to meet the needs of any organization. During each step of the process a variety of individuals, including representatives from operational and business support functions throughout the organization, might need to be involved.

The extent to which individuals and functions are involved during each step will differ between organizations. A relatively small security assurance function, for example, may need to acquire external expertise or additional specialists from the broader information security or IT functions to conduct specific types of technical testing. However, in every organization:

  • Business stakeholders should influence and approve the objectives and scope of security assurance assessments
  • The security assurance function should analyze results from security assurance assessments to measure performance and report the main findings

Organizations should:

  • Prioritize and select the target environments in which security assurance activities will be performed
  • Apply the security assurance process to selected target environments
  • Consolidate results from assessments of multiple target environments to provide a wider picture of the effectiveness of security controls
  • Make improvements to the security assurance program over time

AnΒ Ongoing Investment

In a fast-moving business environment filled with constantly evolving cyber threats, leaders want confidence that their business processes, projects and supporting assets are well protected. An independent and objective security assurance function should provide business stakeholders with the right level of confidence in controls – complacency can have disastrous consequences.

Security assurance activities should demonstrate how effective controls really are – not just determine whether they have been implemented or not. Focusing on what business stakeholders need to know about the specific target environments for which they have responsibility will enable the security assurance function to report in terms that resonate. Delivering assurance that critical business processes and projects are not exposed to financial loss, do not leak sensitive information, are resilient and meet legal, regulatory and compliance requirements, will help to demonstrate the value of security to the business.

In most cases, new approaches to security assurance should be more of an evolution than a revolution. Organizations can build on existing compliance-based approaches rather than replace them, taking small steps to see what works and what doesn’t.

Establishing a business-focused security assurance program is a long-term, ongoing investment.

About the author: Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of focus include strategy, information technology, cyber security and the emerging security threat landscape across both the corporate and personal environments. Previously, he was senior vice president at Gartner.

Copyright 2010 Respective Author at Infosec Island
☐ β˜† βœ‡ Infosec Island Latest Articles

Three Strategies to Avoid Becoming the Next Capital One

August 30th 2019 at 14:00

Recently, Capital One discovered a breach in their system that compromised Social Security numbers of about 140,000 credit card customers along with 80,000 bank account numbers. The breach also exposed names, addresses, phone numbers and credit scores, among other data.

What makes this breach even more disconcerting is Capital One has been the poster child for cloud adoption and most, if not all, of their applications are hosted in the cloud. They were one of the first financial companies - a very technologically conservative industry -- to adopt the cloud and have always maintained the cloud has been a critical enabler of their business success by providing incredible IT agility and competitive strengths.

So, does this mean companies should rethink their cloud adoption? In two words: hell o! The agility and economic value of cloud are intact and accelerating.Β  Leading edge companies will continue to adopt the cloud and SaaS technologies. The breach does, however, put a finer point on what it means to manage security in the cloud.

So how do you avoid becoming the next Capital One? At Sumo Logic, we are fully in the cloud and work with thousands of companies who have (or are planning to) adopt the cloud. Our experience enables us to offer three strategies to our enterprise CISO/security teams:

1. Know the β€œshared security” principles in the cloud environment.

The cloud runs on a shared security model. If you are using the cloud and building apps in the cloud, you should know that your app security is shared between you (the application owner) and the cloud platform. .

Specifically, the cloud security model means that:

  • The cloud vendor manages and controls the host operating system, the virtualization layer, and the physical security of its facilities.
  • To ensure security within the cloud, the customer configures and manages the security controls for the guest operating system and other apps (including updates and security patches), as well as for the security group firewall. The customer is also responsible for encrypting data in-transit and at-rest.
  • Have a strong IAM strategy, access control and logging are key to stopping inseider threats
  • Consider a Bug Bounty program, this was an essential point in what Capital One did right to identify the breach.

Hence, running in the cloud does not absolve you of managing the security of your application or its infrastructure, something all cloud enterprises should be aware of. It is also a good time to step up you security to invite ethical hacking on your services. At Sumo Logic, we have been running Bounties on our platform for two years using both HackOne and BugCrowd to open the kimono and gain trust from our consumers that we are doing everything possible to secure their data in the cloud.

Your call to action: Know the model. Know what you are responsible for (at the end of the day, almost everything!).

2. Know and use the cloud native security services

Some elements of cloud infrastructure and systems are opaque -- all cloud providers provide native security services to help you get control of access/security in the cloud. It’s imperative enterprises in the cloud use these foundational services. In Sumo Logic’s third annual State of the Modern App Report, we analyzed the usage of these services in AWS and saw significant usage of these services.

Your call to action: Implement the cloud platform security services. They are your foundational services and help implement your basic posture.

3. Get a β€œcloud” SIEM to mind the minder

A security information event management (SIEM) solution is like a radar system pilots and air traffic controllers use. Without one, enterprise IT is flying blind in regard to security. Today’s most serious threats are distributed, acting in concert across multiple systems and using advanced evasion techniques to avoid detection. Without a SIEM, attacks are allowed to germinate and grow into emergency incidents with significant business impact.

Cloud security is radically different from traditional SIEM’s. There are many key differences:

  • The architecture of cloud apps (microservices, API based) is very different from traditional apps
  • The surface area of cloud applications (and therefore security incidents) is very large
  • The types of security incidents (malware, ransomware etc.) in the cloud could also be very different from traditional data center attacks

While you consider a SIEM, consider one focused on new threats in the cloud environment, built in the cloud, for the cloud.

So, there you have it -- three strategies to preventing catastrophic cloud security issues. These strategies will not fix everything, but they are the best starting points to improve your security posture as you move to the cloud.

About the author: As Sumo Logic's Chief Security Officer, George Gerchow brings over 20 years of information technology and systems management expertise to the application of IT processes and disciplines. His background includes the security, compliance, and cloud computing disciplines.

Copyright 2010 Respective Author at Infosec Island
☐ β˜† βœ‡ ZDNet | security RSS

Ransomware hits hundreds of dentist offices in the US

August 29th 2019 at 16:20
Ransomware group gains access to dental software backend, deploys ransomware on customers' systems.
☐ β˜† βœ‡ ZDNet | security RSS

Google adds all Android apps with +100m installs to its bug bounty program

August 29th 2019 at 16:30
Google will pay security researchers for bugs they report in non-Google Android apps that have over 100 million installs.
☐ β˜† βœ‡ ZDNet | security RSS

Google launches bounty program to spot misuses of Google API, Chrome, and Android user data

August 29th 2019 at 16:30
Google follows Facebook's steps and launches program to spot app devs stealing or misusing Google user data.
☐ β˜† βœ‡ ZDNet | security RSS

Russian police take down malware gang that infected 800,000+ Android smartphones

August 29th 2019 at 18:30
TipTop malware gang was making between $1,500 and $10,500 in daily profits.
☐ β˜† βœ‡ ZDNet | security RSS

Some of Russia's surveillance tech leaked data for more than a year

August 30th 2019 at 00:23
Security researcher finds that some of Russia's SORM wiretapping equipment had been leaking user data.
☐ β˜† βœ‡ ZDNet | security RSS

Google finds malicious sites pushing iOS exploits for years

August 30th 2019 at 08:22
Google finds exploits for 14 iOS vulnerabilities, grouped in five exploit chains, deployed in the wild since September 2016.
☐ β˜† βœ‡ ZDNet | security RSS

Company behind Foxit PDF Reader announces security breach

August 30th 2019 at 14:09
Foxit Software said hackers breached website accounts and stole user information.
☐ β˜† βœ‡ ZDNet | security RSS

Jack Dorsey's Twitter account got hacked

August 30th 2019 at 20:27
Hackers tweet and retweet offensive content, make bomb threat.
☐ β˜† βœ‡ ZDNet | security RSS

WordPress sites under attack as hacker group tries to create rogue admin accounts

August 30th 2019 at 22:19
Hackers exploit vulnerabilities in more than ten WordPress plugins to plant backdoor accounts on unpatched sites.
☐ β˜† βœ‡ Paul's Security Weekly

So Many Jokes, So Little Time - PSW #618

By paul@securityweekly.com β€” August 30th 2019 at 19:00

This week, we present the Security News, to discuss how AT&T employees took bribes to plant malware on the company’s network, how hackers could decrypt your GSM calls, 80 suspects charged with massive BEC scam, and how the passports and licenses of 300 people were leaked in New Zealand! In our second segment, we welcome back Corey Thuen, Co-Founder at Gravwell, to talk about analyzing custom log sources! In our final segment, we air a pre-recorded interview with Chris Hadnagy, Founder, CEO, and Chief Human Hacker at Social Engineer, LLC., to talk about the SEVillage Orlando 2020, and the mission and some info on the Innocent Lives Foundation!

Β 

To learn more about Gravwell, visit: https://securityweekly.com/gravwell

Full Show Notes: https://wiki.securityweekly.com/Episode618

Visit https://www.securityweekly.com/psw for all the latest episodes!

Β 

Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter!

Follow us on Twitter: https://www.twitter.com/securityweekly

Like us on Facebook: https://www.facebook.com/secweekly

☐ β˜† βœ‡ ZDNet | security RSS

How MuleSoft patched a critical security flaw and avoided a disaster

September 1st 2019 at 18:47
MuleSoft deals with a sensitive security issue and sets up an example for the whole industry to follow.
☐ β˜† βœ‡ ZDNet | security RSS

Cisco releases guides for incident responders handling hacked Cisco gear

September 2nd 2019 at 08:54
Forensic investigation guides available for Cisco ASA, IOS, IOS XE, and FTD gear.
☐ β˜† βœ‡ ZDNet | security RSS

BEC overtakes ransomware and data breaches in cyber-insurance claims

September 2nd 2019 at 11:43
BEC-relatedcyber-insurance claims accounted for nearly a quarter of all claims in the EMEA region, AIG said.
☐ β˜† βœ‡ Infosec Island Latest Articles

Android RAT Exclusively Targets Brazil

September 2nd 2019 at 14:59

A newly discovered Android remote access Trojan (RAT) is specifically targeting users in Brazil, Kaspersky reports.Β 

Called BRATA, which stands for Brazilian RAT Android, the malware could theoretically be used to target any other Android user, should the cybercriminals behind it want to. Widespread since January 2019, the threat was primarily hosted in Google Play, but also in alternative Android app stores.Β 

The malware targets Android 5.0 or later and infects devices via push notifications on compromised websites, messages delivered via WhatsApp or SMS, or sponsored links in Google searches.

After discovering the first RAT samples in January and February 2019, Kaspersky has observed over 20 different variants to date, in Google Play alone, most posing as updates to WhatsApp.Β 

One of the topics abused by BRATA is the CVE-2019-3568 WhatsApp patch. The infamous fake WhatsApp update had over 10,000 downloads in the official Android store when it was removed, KasperskyΒ says.

As soon as it has infected a device, BRATA enables its keylogging feature and starts abusing Android’s Accessibility Service feature to interact with other applications.

The commands supported by the malware allow it to capture and send user’s screen output in real-time, or turn off the screen or give the user the impression that the screen is off while performing actions in the background.Β 

It can also retrieve Android system information, data on the logged user and their registered Google accounts, and hardware information, and can request the user to unlock the device or perform a remote unlock.

What’s more, BRATA canΒ launch any application installed with a set of parameters sent via a JSON data file, send a string of text to input data in textboxes, and launch any particular application or uninstall the malware and remove traces of infection.

β€œIn general, we always recommend carefully review permissions any app is requesting on the device. It is also essential to install an excellent up-to-date anti-malware solution with real-time protection enabled,” Kaspersky concludes.Β 

Related:Β Malware Found in Google Play App With 100 Million Downloads

Related:Β Researchers Discover Android Surveillance Malware Built by Russian Firm

Copyright 2010 Respective Author at Infosec Island
☐ β˜† βœ‡ ZDNet | security RSS

German bank loses €1.5 million in mysterious cashout of EMV cards

September 3rd 2019 at 08:00
Brazilian criminal gang cloned Mastercard debit cards issued by German bank OLB and withdrew more than €1.5 million from about 2,000 of its customers.
☐ β˜† βœ‡ ZDNet | security RSS

Over 47,000 Supermicro servers are exposing BMC ports on the internet

September 3rd 2019 at 10:00
Researchers discovered a new remote attack vector on Supermicro servers that are exposing their BMC port over the internet. Patches are available.
❌