Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Recapping the GReAT  ...

 Special Projects

When your company hosts an AMA on Reddit, you have to be ready for all possibilities. About four years ago, we were a bit apprehensive heading into our Global Research and Analysis Team (GReAT)’s first AMA and then the one with Eugene Kaspersky — but like Boy Scouts, we prepared. And despite the expected   show more ...

trolls (more on them in a bit), both events went off without a hitch for the most part. You know, working with a global team and getting everyone on the same page was challenging even before COVID. Nevertheless, it had been a while, and we wanted to get the gang — plus a few more — back together. Yesterday, we logged on to a virtual room for the AMA with Costin Raiu, Vitaly Kamluk, Brian Bartholomew, Noushin Shabab, Aseel Kayal, Ivan Kwiatkowski, Maria Namestnikova, Dmitry Bestuzhev, Ariel Jungheit, Dan Demeter, Igor Kuznetsov, and Kurt Baumgartner to kick off our second Reddit AMA. The event was slated to last 2 hours, but the team had so much fun, it lasted almost three times as long. Below are some of my favorite question threads of the chat. What’s up with Antidrone? I was glad to see the recent news of our antidrone technology caught some Reddit users’ eyes. The question and answer were pretty good. There was a story recently about a “drone detector” originating from Kaspersky. Is that really a threat for some orgs, or is this primarily a Russian hobby? Maria here: My neighbor has a drone, and he is Russian. So maybe it’s a Russian hobby, I don’t know. But a drone is, in many cases, just a flying camera that can make photos of anything the owner wants, be it what’s inside someone’s house or in the office, say on the monitors of the computers. So it seems there is something to worry about. Brian here: Drones are definitely a threat to many organizations. For instance, prisons in the US are using anti-drone technology to help prevent the smuggling of contraband. The tech is also used in many public spaces, such as sporting events, large crowd gatherings, etc. for protection and monitoring. Some organizations are also concerned with corporate espionage through the use of drones. How to learn YARA As many a reader of this blog knows, YARA is a crucial tool for our research team as well as for many other threat hunters around the world. I’m glad to see people becoming interested in using it professionally. I was hoping to learn Yara, but before doing that, what prerequisites should I be aware of? Do I need to know assembly, C & reverse engineering? My background is in network security. Costin here: Yara’s syntax and strings are similar to C, so that would be a good start. General knowledge of reverse engineering helps, although we know many people who write Yara rules without ever having reversed any samples! A general feel of how malware looks like, how malware works and things like file formats is probably a good start. In case you haven’t seen it yet, do check out this short webinar I did on Yara back in March: https://securelist.com/hunting-apts-with-yara/96386/ PS: Our PR and sales are kindly asking me to try to sell you this training :) Some people say it’s pretty good actually: https://xtraining.kaspersky.com/ Vitaly here: To add to what Costin said and give him some credits, please watch this short presentation written entirely in Yara about Costin using Yara to catch 0-days: https://www.youtube.com/watch?v=fbidgtOXvc0 In essence, those skills are not required, but the more you know the more tools you have to create your own perfect Yara rule! The Catcher in the YARA — predicting black swans How to start working in the field I was psyched to see a number of questions about how to get into the cybersecurity field. This on stood out in particular and is one that gives me positive feelings for the future. Do you have any idea how can I get remote job as Malware Analyst? is such position exist? I’m 17 y/o; have read famous book in subject; currently reversing malware that I had access to (gootkit, remcos, netwalker, …) and reading Advanced Binary DeObfuscation Material Ivan here: If you’re reversing those samples at 17 years old, I have the feeling that finding a job will not be an issue :) Just keep doing what you’re doing and companies will be fighting for your services in no time! Maria here: I totally agree with Ivan:) Just today we’ve hired an intern who is 18 and who is reversing samples and is really interested in the cybersecurity topic just like you are. So There is a way to start your career path really soon and even working remotely. Gogogo!:) Good ol’ trolling Of course, we expected some challenges, and sure enough, Reddit came through. Some people still cannot get over the false narrative that Kaspersky is run by the Russian Federation — seriously, that joke is old. Our folks replied in earnest, but it seemed that people wanted to dish it out, not take it. Come on — it’s Reddit! Still working for the Russian government? Costin here: Of course! From the banya, when we are not riding bears to the beach. We also run a chocolate factory 6 miles north of the Kremlin Ariel here: If it ain’t broken, don’t fix it. Ivan here: I’ve been trying for years, but as a French citizen they just won’t let me. Brian here: Secretly for the Americans, with the Russians Dan here: Privet! At least some people got our point. Hacker movies The age-old question about hacker movies was sure to come, and our researchers had some good answers. What’s your favourite hacker movie? Igor Hackers, 1995 Ariel here: I’m a fan of the TRON universe. Vitaly here: How about Mr Robot? Of course everyone knows it. But I was once surprised to see something I missed. It was Defcon Movie Night where they screened “23” and it was pretty cool! Check it out: https://en.wikipedia.org/wiki/23_%28film%29 Brian here: Matrix series Kurt here: Matrix ++ Noushin here: Ghost In The Shell anime, Cyber City Oedo 808 Maria here: Code Mercury. Bruce Willis is the best A modern take on the movie Hackers AV as a target Here’s an interesting question about whether AV is a tempting target for attackers. What is your take on the argument that antivirus programs are juicy targets for exploits, in the sense that they are widely installed, are huge, complex, closed-source code bases which have a large attack surface area and generally run with high privileges? Also, do you encounter and have to fend off attacks of this nature on a regular basis, or is it rare? Ariel here: It’s a bold move to target antivirus software, not something your average attacker does. Antivirus software runs in a high privilege context in order to be able to detect and stop attacks from threats that are also executing with high privileges. There is easier software that is more widely used—word processors for example. Take a look at the exploits available for Antivirus products in the recent year—the number is so small it’s not a good reason not to use them :) Kurt here: It’s rare. Take a look at what is really getting exploited – it’s not anti-malware. There is no shame; Careto had a thing for our product several years back. Although, Blackhat presenters might get more high-fives for exploiting an “AV” than Chrome. Well, those were my favorite moments from the AMA. Take a look and let us know on Twitter what yours were. If everyone thinks it was fun, we may jump in again with the team or maybe some other members of Kaspersky — maybe we won’t have to wait four years for the next one. Until then, see you on the social webs!

 Malware and Vulnerabilities

The RAT consists of multiple obfuscation techniques to hide strings, API names, command and control (C2) URLs, and instrumental functions, along with static detection evasion.

 Malware and Vulnerabilities

Nvidia is red-flagging a high-severity flaw in its GeForce NOW software for Windows that an attacker on a local network can exploit to execute code or gain escalated privileges on affected devices.

 Security Products & Services

Cyber-security firm Comodo has open-sourced this week its endpoint detection and response (EDR) solution, Open EDR, becoming the first major security vendor to take this route.

 Govt., Critical Infrastructure

“I’m very proud of the work that CISA has done this year. And I think against significant odds, the work we did on [protecting] elections is really a testament to what this agency can do,” Ware said.

 Malware and Vulnerabilities

Weeks after US Cyber Command, Microsoft, and several others took coordinated action to extensively disrupt Trickbot activity, there are signs the botnet operators have still not fully given up yet.

 Trends, Reports, Analysis

A survey of 500 US employees by portfolio website Visual Objects found that 63% increased their vulnerability to cyberattacks by recycling the same passwords for multiple accounts on work devices.

 Govt., Critical Infrastructure

The Department of Defense has tapped Dave McKeown, a long-time government IT and security official, to be its next chief information security officer, a DOD official confirmed to FedScoop.

 Feed

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals   show more ...

to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).

 Feed

Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.

 Feed

There is an out-of bounds read vulnerability in WindowsCodecsRaw.dll while processing a malformed Canon raw image. This can potentially lead to disclosing the memory of the affected process. All applications that use Windows Image Codecs for image parsing are potentially affected. The vulnerability has been confirmed on Windows 10 v2004 with the most recent patches applied.

 Feed

Ubuntu Security Notice 4607-2 - USN-4607-1 fixed vulnerabilities and added features in OpenJDK. Unfortunately, that update introduced a regression that could cause TLS connections with client certificate authentication to fail in some situations. This update fixes the problem. Various other issues were also addressed.

 Feed

This Metasploit module exploits a code execution vulnerability within the ASUS TM-AC1900 router as an authenticated user. The vulnerability is due to a failure filter out percent encoded newline characters within the HTTP argument SystemCmd when invoking /apply.cgi which bypasses the patch for CVE-2018-9285.

 Feed

This Metasploit module exploits an arbitrary file upload vulnerability in HorizontCMS 1.0.0-beta in order to execute arbitrary commands. The module first attempts to authenticate to HorizontCMS. It then tries to upload a malicious PHP file via an HTTP POST request to /admin/file-manager/fileupload. The server will   show more ...

rename this file to a random string. The module will therefore attempt to change the filename back to the original name via an HTTP POST request to /admin/file-manager/rename. For the php target, the payload is embedded in the uploaded file and the module attempts to execute the payload via an HTTP GET request to /storage/file_name.

 Feed

A group of academics from the University of California and Tsinghua University has uncovered a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks. Dubbed "SAD DNS attack" (short for Side-channel AttackeD DNS), the technique makes it possible for a malicious actor to carry out an off-path attack, rerouting any traffic originally destined to a specific

 Feed

Complexity is the bane of effective cybersecurity. The need to maintain an increasing array of cybersecurity tools to protect organizations from an expanding set of cyber threats is leading to runaway costs, staff inefficiencies, and suboptimal threat response. Small to medium-sized enterprises (SMEs) with limited budgets and staff are significantly impacted. On average, SMEs manage more than a

 Feed only

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! There has never been a better time to be a cybercriminal. From extortion ransomware to cyberespionage campaigns, malicious hackers are capitalizing on uncertainty in 2020, causing   show more ...

chaos, and cashing in. The best … Continue reading "Free tools from Recorded Future that can make you a security intelligence expert"

 Data loss

An undisclosed number of customers of outdoor clothing retailer The North Face have had their passwords reset by the company, following a credential-stuffing attack. The company has revealed that on October 9, 2020, it became aware that hackers had used usernames and passwords stolen from a third-party website to gain   show more ...

unauthorised access to customer accounts. Read more in my article on the Tripwire State of Security blog.

 Industry Intel

Reading Time: ~ 2 min. Phony IRS Emails Flooding Inboxes Upwards of 70,000 inboxes have been receiving spam claiming to be from the IRS threatening legal action for late or missing payments. Most recipients are Microsoft Office 365 users and have been receiving threats of lawsuits to, wage garnishment and even arrest.   show more ...

These spoofing scams have risen in popularity in recent years, but have mixed results since many users are familiar with the tactic. Pakistani Airlines Network Access for Sale Researchers found a listing for full admin access to the Pakistan International Airlines network on multiple dark web forums earlier this week. The current asking price is an incredibly low $4,000, considering the amount of information that could be used for malicious activities. The hackers claim to have 15 databases, each with many thousands of records, including passport data and other highly sensitive personal information on passengers and employees alike. It is believed that this group has been responsible for at least 38 other sales of network access in the past five months. Zoom Enhances Security at Heed of FTC Following a settlement with the FTC, the video communication service Zoom is being forced to upgrade its overall security after it was found that they weren’t implementing the end-to-end encryption the business touted. It was also discovered that encryption of recorded video calls often did not take place and regular security testing of security measures did not occur, endangering user privacy for personal video calls and chats. Mashable Database Compromised The online media outlet Mashable confirmed it had suffered a cyberattack on its systems, and that the attacker had already published some of the stolen data, this weekend. Fortunately, Mashable also confirmed the stolen data was from a system that was no longer in use. The company has also begun contacted affected customers and informing them to be wary of suspicious emails and to forward them to Mashable for further investigation. Millions of RedDoorz Records for Sale Roughly 5.8 million user records belonging to the hotel booking platform RedDoorz were found for sale on a hacker forum. These records were likely the the result of a cyberattack targeting RedDoorz in September, though the company firmly stated no financial information was compromised. After viewing a sample of the stolen data, however, it was discovered that a significant amount of extremely sensitive information belonging to customers who may have stayed at any of their 1,000 properties across Southeast Asia had been published. The post Cyber News Rundown: Flood of Phony IRS Emails appeared first on Webroot Blog.

2020-11
Aggregator history
Friday, November 13
SUN
MON
TUE
WED
THU
FRI
SAT
NovemberDecemberJanuary