When your company hosts an AMA on Reddit, you have to be ready for all possibilities. About four years ago, we were a bit apprehensive heading into our Global Research and Analysis Team (GReAT)’s first AMA and then the one with Eugene Kaspersky — but like Boy Scouts, we prepared. And despite the expected show more ...
trolls (more on them in a bit), both events went off without a hitch for the most part. You know, working with a global team and getting everyone on the same page was challenging even before COVID. Nevertheless, it had been a while, and we wanted to get the gang — plus a few more — back together. Yesterday, we logged on to a virtual room for the AMA with Costin Raiu, Vitaly Kamluk, Brian Bartholomew, Noushin Shabab, Aseel Kayal, Ivan Kwiatkowski, Maria Namestnikova, Dmitry Bestuzhev, Ariel Jungheit, Dan Demeter, Igor Kuznetsov, and Kurt Baumgartner to kick off our second Reddit AMA. The event was slated to last 2 hours, but the team had so much fun, it lasted almost three times as long. Below are some of my favorite question threads of the chat. What’s up with Antidrone? I was glad to see the recent news of our antidrone technology caught some Reddit users’ eyes. The question and answer were pretty good. There was a story recently about a “drone detector” originating from Kaspersky. Is that really a threat for some orgs, or is this primarily a Russian hobby? Maria here: My neighbor has a drone, and he is Russian. So maybe it’s a Russian hobby, I don’t know. But a drone is, in many cases, just a flying camera that can make photos of anything the owner wants, be it what’s inside someone’s house or in the office, say on the monitors of the computers. So it seems there is something to worry about. Brian here: Drones are definitely a threat to many organizations. For instance, prisons in the US are using anti-drone technology to help prevent the smuggling of contraband. The tech is also used in many public spaces, such as sporting events, large crowd gatherings, etc. for protection and monitoring. Some organizations are also concerned with corporate espionage through the use of drones. How to learn YARA As many a reader of this blog knows, YARA is a crucial tool for our research team as well as for many other threat hunters around the world. I’m glad to see people becoming interested in using it professionally. I was hoping to learn Yara, but before doing that, what prerequisites should I be aware of? Do I need to know assembly, C & reverse engineering? My background is in network security. Costin here: Yara’s syntax and strings are similar to C, so that would be a good start. General knowledge of reverse engineering helps, although we know many people who write Yara rules without ever having reversed any samples! A general feel of how malware looks like, how malware works and things like file formats is probably a good start. In case you haven’t seen it yet, do check out this short webinar I did on Yara back in March: https://securelist.com/hunting-apts-with-yara/96386/ PS: Our PR and sales are kindly asking me to try to sell you this training :) Some people say it’s pretty good actually: https://xtraining.kaspersky.com/ Vitaly here: To add to what Costin said and give him some credits, please watch this short presentation written entirely in Yara about Costin using Yara to catch 0-days: https://www.youtube.com/watch?v=fbidgtOXvc0 In essence, those skills are not required, but the more you know the more tools you have to create your own perfect Yara rule! The Catcher in the YARA — predicting black swans How to start working in the field I was psyched to see a number of questions about how to get into the cybersecurity field. This on stood out in particular and is one that gives me positive feelings for the future. Do you have any idea how can I get remote job as Malware Analyst? is such position exist? I’m 17 y/o; have read famous book in subject; currently reversing malware that I had access to (gootkit, remcos, netwalker, …) and reading Advanced Binary DeObfuscation Material Ivan here: If you’re reversing those samples at 17 years old, I have the feeling that finding a job will not be an issue :) Just keep doing what you’re doing and companies will be fighting for your services in no time! Maria here: I totally agree with Ivan:) Just today we’ve hired an intern who is 18 and who is reversing samples and is really interested in the cybersecurity topic just like you are. So There is a way to start your career path really soon and even working remotely. Gogogo!:) Good ol’ trolling Of course, we expected some challenges, and sure enough, Reddit came through. Some people still cannot get over the false narrative that Kaspersky is run by the Russian Federation — seriously, that joke is old. Our folks replied in earnest, but it seemed that people wanted to dish it out, not take it. Come on — it’s Reddit! Still working for the Russian government? Costin here: Of course! From the banya, when we are not riding bears to the beach. We also run a chocolate factory 6 miles north of the Kremlin Ariel here: If it ain’t broken, don’t fix it. Ivan here: I’ve been trying for years, but as a French citizen they just won’t let me. Brian here: Secretly for the Americans, with the Russians Dan here: Privet! At least some people got our point. Hacker movies The age-old question about hacker movies was sure to come, and our researchers had some good answers. What’s your favourite hacker movie? Igor Hackers, 1995 Ariel here: I’m a fan of the TRON universe. Vitaly here: How about Mr Robot? Of course everyone knows it. But I was once surprised to see something I missed. It was Defcon Movie Night where they screened “23” and it was pretty cool! Check it out: https://en.wikipedia.org/wiki/23_%28film%29 Brian here: Matrix series Kurt here: Matrix ++ Noushin here: Ghost In The Shell anime, Cyber City Oedo 808 Maria here: Code Mercury. Bruce Willis is the best A modern take on the movie Hackers AV as a target Here’s an interesting question about whether AV is a tempting target for attackers. What is your take on the argument that antivirus programs are juicy targets for exploits, in the sense that they are widely installed, are huge, complex, closed-source code bases which have a large attack surface area and generally run with high privileges? Also, do you encounter and have to fend off attacks of this nature on a regular basis, or is it rare? Ariel here: It’s a bold move to target antivirus software, not something your average attacker does. Antivirus software runs in a high privilege context in order to be able to detect and stop attacks from threats that are also executing with high privileges. There is easier software that is more widely used—word processors for example. Take a look at the exploits available for Antivirus products in the recent year—the number is so small it’s not a good reason not to use them :) Kurt here: It’s rare. Take a look at what is really getting exploited – it’s not anti-malware. There is no shame; Careto had a thing for our product several years back. Although, Blackhat presenters might get more high-fives for exploiting an “AV” than Chrome. Well, those were my favorite moments from the AMA. Take a look and let us know on Twitter what yours were. If everyone thinks it was fun, we may jump in again with the team or maybe some other members of Kaspersky — maybe we won’t have to wait four years for the next one. Until then, see you on the social webs!
The Email Appender software, a tool one hacker is advertising on a dark web forum, can be used to bypass email security measures, according to Gemini Advisory research released Wednesday.
The RAT consists of multiple obfuscation techniques to hide strings, API names, command and control (C2) URLs, and instrumental functions, along with static detection evasion.
Ransomware incidents at manufacturing firms have risen in 2020 as attackers have found ways to disrupt facilities’ operations by targeting IT networks and software that supports industrial processes.
Nvidia is red-flagging a high-severity flaw in its GeForce NOW software for Windows that an attacker on a local network can exploit to execute code or gain escalated privileges on affected devices.
Cyber-security firm Comodo has open-sourced this week its endpoint detection and response (EDR) solution, Open EDR, becoming the first major security vendor to take this route.
“I’m very proud of the work that CISA has done this year. And I think against significant odds, the work we did on [protecting] elections is really a testament to what this agency can do,” Ware said.
Weeks after US Cyber Command, Microsoft, and several others took coordinated action to extensively disrupt Trickbot activity, there are signs the botnet operators have still not fully given up yet.
The incident took place on March 11 and happened as a result of human error when three data files were inadvertently stored in an unsecured external storage service, and were removed on August 1.
A survey of 500 US employees by portfolio website Visual Objects found that 63% increased their vulnerability to cyberattacks by recycling the same passwords for multiple accounts on work devices.
Their end goal is to gain access to as many accounts as possible onto the targeted site and to steal sensitive information, steal money, or take over the identities of the account owners.
The Department of Defense has tapped Dave McKeown, a long-time government IT and security official, to be its next chief information security officer, a DOD official confirmed to FedScoop.
Researchers on Wednesday presented a new technique that can once again cause DNS resolvers to return maliciously spoofed IP addresses instead of the site that rightfully corresponds to a domain name.
This software contains several different vulnerabilities, including some bugs that could corrupt memory in a way that an attacker could carry out additional malicious actions on the victim machine.
Microsoft says these attacks targeted vaccine makers that have COVID-19 vaccines undergoing clinical trials, a clinical research firm involved in trials, and one that developed a COVID-19 test.
Discussing the increase in phishing attacks since the lockdown began, Or Katz said there has been an increase in numbers of phishing attack victims, as well as an increase in the number of attacks.
These vulnerabilities, while specific and technical in nature, basically allow attackers to fiddle with the code and steal as much money as possible in a very short amount of time.
For the first time, there’s a year-over-year reduction in the cybersecurity workforce gap, due to increased talent entry into the field and uncertain demand due to COVID-19, (ISC)² finds.
DarkSide is run as a ransomware-as-a-service where developers are in charge of creating the ransomware and payment site, and affiliates are recruited to hack businesses and encrypt their devices.
Organizations underwent an unprecedented IT change this year amid a massive shift to remote work, accelerating adoption of cloud technology, new research by Duo Security reveals.
Ant and Cockroach is not run-of-the-mill malware. While the payload only employs light obfuscation for its loader, heavy radix obfuscation is used to hide the main skimmer.
In response to 5G's potential to exacerbate an already complex problem of IoT security, researchers in defense and academic circles have launched programs to jumpstart R&D.
The endorsements themselves are part of affiliate advertising networks. Partners receive a cut of the scam’s proceeds for directing online traffic to the scammer’s websites.
Indeed, a recent string of high-profile cyberattacks against prominent game developers such as Ubisoft, Capcom, and WildWorks has reminded the industry that the threat has far from dissipated.
According to new analysis by Arkose Labs, 1.3 billion fraud attacks were committed in the third quarter of 2020, with some 770 million making use of credential-stuffing techniques.
The Australian Cyber Security Center said it "observed increased targeting activity against the Australian Health sector by actors using the SDBBot Remote Access Tool (RAT)."
A hacker group allegedly uploaded the Cobalt Strike post-exploitation toolkit on a GitHub repository and it has been forked more than a hundred times, as per reports.
A team of academics has disclosed an attack method called Platypus that can allow attackers to extract data from Intel CPUs using power side-channel attacks.
Nine of the 31 ransomware attacks disclosed in the third quarter of the year involved data exfiltration, a tactic that has become common with ransomware gangs over the past year.
From the samples seen by BleepingComputer, the stolen data includes users' full name, email address, MD5 hashed passwords, company name, phone number, address, PayPal email (if used), and IP address.
The new headquarters will be consolidating and maturing the expertise gathered in cyber investigations, incident response, and threat hunting activities across the region under one roof.
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. It provides the foundation for a range of applications that allow organizations and individuals show more ...
to share information over public networks without compromising their privacy. Individuals can use it to keep remote Websites from tracking them and their family members. They can also use it to connect to resources such as news sites or instant messaging services that are blocked by their local Internet service providers (ISPs).
Botan is a C++ library of cryptographic algorithms, including AES, DES, SHA-1, RSA, DSA, Diffie-Hellman, and many others. It also supports X.509 certificates and CRLs, and PKCS #10 certificate requests, and has a high level filter/pipe message processing system. The library is easily portable to most systems and compilers, and includes a substantial tutorial and API reference. This is the current stable release.
There is an out-of bounds read vulnerability in WindowsCodecsRaw.dll while processing a malformed Canon raw image. This can potentially lead to disclosing the memory of the affected process. All applications that use Windows Image Codecs for image parsing are potentially affected. The vulnerability has been confirmed on Windows 10 v2004 with the most recent patches applied.
Ubuntu Security Notice 4607-2 - USN-4607-1 fixed vulnerabilities and added features in OpenJDK. Unfortunately, that update introduced a regression that could cause TLS connections with client certificate authentication to fail in some situations. This update fixes the problem. Various other issues were also addressed.
This Metasploit module exploits a code execution vulnerability within the ASUS TM-AC1900 router as an authenticated user. The vulnerability is due to a failure filter out percent encoded newline characters within the HTTP argument SystemCmd when invoking /apply.cgi which bypasses the patch for CVE-2018-9285.
This Metasploit module exploits an arbitrary file upload vulnerability in HorizontCMS 1.0.0-beta in order to execute arbitrary commands. The module first attempts to authenticate to HorizontCMS. It then tries to upload a malicious PHP file via an HTTP POST request to /admin/file-manager/fileupload. The server will show more ...
rename this file to a random string. The module will therefore attempt to change the filename back to the original name via an HTTP POST request to /admin/file-manager/rename. For the php target, the payload is embedded in the uploaded file and the module attempts to execute the payload via an HTTP GET request to /storage/file_name.
Anuko Time Tracker version 1.19.23.5311 suffers from an implementation flaw where password reset emails can be continuously triggered against unsuspecting users.
A group of academics from the University of California and Tsinghua University has uncovered a series of critical security flaws that could lead to a revival of DNS cache poisoning attacks. Dubbed "SAD DNS attack" (short for Side-channel AttackeD DNS), the technique makes it possible for a malicious actor to carry out an off-path attack, rerouting any traffic originally destined to a specific
Complexity is the bane of effective cybersecurity. The need to maintain an increasing array of cybersecurity tools to protect organizations from an expanding set of cyber threats is leading to runaway costs, staff inefficiencies, and suboptimal threat response. Small to medium-sized enterprises (SMEs) with limited budgets and staff are significantly impacted. On average, SMEs manage more than a
Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! There has never been a better time to be a cybercriminal. From extortion ransomware to cyberespionage campaigns, malicious hackers are capitalizing on uncertainty in 2020, causing show more ...
chaos, and cashing in. The best … Continue reading "Free tools from Recorded Future that can make you a security intelligence expert"
An undisclosed number of customers of outdoor clothing retailer The North Face have had their passwords reset by the company, following a credential-stuffing attack. The company has revealed that on October 9, 2020, it became aware that hackers had used usernames and passwords stolen from a third-party website to gain show more ...
unauthorised access to customer accounts. Read more in my article on the Tripwire State of Security blog.
Reading Time: ~ 2 min. Phony IRS Emails Flooding Inboxes Upwards of 70,000 inboxes have been receiving spam claiming to be from the IRS threatening legal action for late or missing payments. Most recipients are Microsoft Office 365 users and have been receiving threats of lawsuits to, wage garnishment and even arrest. show more ...
These spoofing scams have risen in popularity in recent years, but have mixed results since many users are familiar with the tactic. Pakistani Airlines Network Access for Sale Researchers found a listing for full admin access to the Pakistan International Airlines network on multiple dark web forums earlier this week. The current asking price is an incredibly low $4,000, considering the amount of information that could be used for malicious activities. The hackers claim to have 15 databases, each with many thousands of records, including passport data and other highly sensitive personal information on passengers and employees alike. It is believed that this group has been responsible for at least 38 other sales of network access in the past five months. Zoom Enhances Security at Heed of FTC Following a settlement with the FTC, the video communication service Zoom is being forced to upgrade its overall security after it was found that they weren’t implementing the end-to-end encryption the business touted. It was also discovered that encryption of recorded video calls often did not take place and regular security testing of security measures did not occur, endangering user privacy for personal video calls and chats. Mashable Database Compromised The online media outlet Mashable confirmed it had suffered a cyberattack on its systems, and that the attacker had already published some of the stolen data, this weekend. Fortunately, Mashable also confirmed the stolen data was from a system that was no longer in use. The company has also begun contacted affected customers and informing them to be wary of suspicious emails and to forward them to Mashable for further investigation. Millions of RedDoorz Records for Sale Roughly 5.8 million user records belonging to the hotel booking platform RedDoorz were found for sale on a hacker forum. These records were likely the the result of a cyberattack targeting RedDoorz in September, though the company firmly stated no financial information was compromised. After viewing a sample of the stolen data, however, it was discovered that a significant amount of extremely sensitive information belonging to customers who may have stayed at any of their 1,000 properties across Southeast Asia had been published. The post Cyber News Rundown: Flood of Phony IRS Emails appeared first on Webroot Blog.