Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Open season on PUBG  ...

 Threats

Free cheese exists only in mousetraps, but businesses everywhere have been desensitizing people to the idea of freemium cheese for years. The freemium approach is especially prevalent in the gaming industry. Game developers and publishers commonly offer users minor but genuinely free goodies — the expectation being   show more ...

that the gamers will get sucked in and end up spending on in-game purchases. The addictiveness of freemium cheese is what cybercriminals are exploiting when they offer giveaways of rare items for the hit title PUBG Mobile. Giveaway for PUBG Mobile’s new season The mobile multiplayer shooter recently launched a new season with items, monsters, and mechanics imported from another popular shooter, Metro: Exodus. No sooner had it gone live than numerous websites appeared offering the chance to win new items. Phishing pages with a Lucky Spin giveaway for the new season of PUBG Mobile with Metro: Exodus They all look pretty much the same: distinctly gamer-themed with PUBG Mobile and Metro: Exodus branding, plus an invitation to spin the wheel to win one of the items depicted on it. Those who know PUBG Mobile are probably familiar with this wheel; at the start of each new season, the developers of PlayerUnknown’s Battlegrounds offer the chance to get unique items by spinning such a wheel. It’s called the Lucky Spin, and it’s basically a win-win (or at least a no-loss) lottery because spinning the wheel doesn’t cost any points, but it could yield a spanking new gun. Phishing pages with Twitter or Facebook login — a familiar option for PUBG Mobile players To receive the item, all you need to do is log in to your account. This stage offers two options familiar to PUBG Mobile players: log in with Twitter or log in with Facebook. Either option, however, results in an error message. If you try again, it’ll seem to work, but the page will then ask for additional account information including character name, phone number, and PUBG Mobile account level. Enter those and the system will return a positive message: Your winnings will arrive within 24 hours. Form for entering additional data, supposedly to verify the user’s PUBG Mobile account, and confirmation that the item will be available within 24 hours How PUBG Mobile/Metro: Exodus phishing pages work Unfortunately for the player, the item will never arrive. All of the pages — our researchers came across 260 of them in just a few days, and their number continues to grow — were created by scammers. They have nothing whatsoever to do with Tencent, the developer of PlayerUnknown’s Battlegrounds, or the creators of Metro: Exodus. The sites’ purpose is to steal gamers’ data. First, they grab Facebook or Twitter login credentials. The calculation here is that between the user’s desperation to get hold of the new item, and the pervasiveness of using a social network login for another app, their suspicions won’t be aroused. But the scammers go one step further, asking for additional information, such as phone number and PUBG Mobile account level, apparently to help them evaluate the account’s resale value. How to avoid PUBG Mobile phishing The attackers prepared thoroughly for the start of PUBG Mobile‘s new season; the pages with item giveaways are very convincing in terms of both design and requested actions. Still, on closer inspection, certain phishing elements give away the giveaway, so to speak. Any item giveaway outside of PUBG Mobile’s official website or the game itself is almost certainly a scam. If the site URL is not pubgmobile.com, do not enter anything; just leave immediately. If a promotion is real, the game developer is unlikely to keep it a secret. Check their social media channels and the game’s official website. It’s important to make sure you’re checking the real accounts or sites. Also keep in mind that even real sites and accounts can be hacked (which has happened — and not just once). Spotting convincing scams takes a keen eye — and sometimes even that’s not enough. Therefore, we recommend using a reliable security solution that blocks dangerous Web pages to protect you from online scams and phishing.

image for Convicted SIM Swappe ...

 Ne'er-Do-Well News

A 21-year-old Irishman who pleaded guilty to charges of helping to steal millions of dollars in cryptocurrencies from victims has been sentenced to just under three years in prison. The defendant is part of an alleged conspiracy involving at least eight others in the United States who stand accused of theft via SIM   show more ...

swapping, a crime that involves convincing mobile phone company employees to transfer ownership of the target’s phone number to a device the attackers control. Conor Freeman of Dublin took part in the theft of more than two million dollars worth of cryptocurrency from different victims throughout 2018. Freeman was named as a member of a group of alleged SIM swappers called “The Community” charged last year with wire fraud in connection with SIM swapping attacks that netted in excess of $2.4 million. Among the eight others accused are three former wireless phone company employees who allegedly helped the gang hijack mobile numbers tied to their targets. Prosecutors say the men would identify people likely to have significant cryptocurrency holdings, then pay their phone company cohorts to transfer the victim’s mobile service to a new SIM card — the smart chip in each phone that ties a customer’s device to their number. A fraudulent SIM swap allows the bad guys to intercept a target’s incoming phone calls and text messages. This is dangerous because a great many sites and services still allow customers to reset their passwords simply by clicking on a link sent via SMS. From there, attackers can gain access to any accounts that allow password resets via SMS or automated calls, from email and social media profiles to virtual currency trading platforms. Like other accused members of The Community, Freeman was an active member of OGUsers, a forum that caters to people selling access to hijacked social media and other online accounts. But unlike others in the group, Freeman used his real name (username: Conor), and disclosed his hometown and date of birth to others on the forum. At least twice in the past few years OGUsers was hacked, and its database of profiles and user messages posted online. According to a report in The Irish Times, Freeman spent approximately €130,000, which he had converted into cash from the stolen cryptocurrency. Conor posted on OGUsers that he spent approximately $14,000 on a Rolex watch. The rest was handed over to the police in the form of an electronic wallet that held the equivalent of more than $2 million. The Irish Times says the judge in the case insisted the three-year sentence was warranted in order to deter the defendant and to prevent others from following in his footsteps. The judge said stealing money of this order is serious because no one can know the effect it will have on the victim, noting that one victim’s life savings were taken and the proceeds of the sale of his house were stolen. One way to protect your accounts against SIM swappers is to remove your phone number as a primary or secondary authentication mechanism wherever possible. Many online services require you to provide a phone number upon registering an account, but in many cases that number can be removed from your profile afterwards. It’s also important for people to use something other than text messages for two-factor authentication on their email accounts when stronger authentication options are available. Consider instead using a mobile app like Authy, Duo, or Google Authenticator to generate the one-time code. Or better yet, a physical security key if that’s an option.

image for TV Maker TCL Denies  ...

 Android

Chinese electronics giant TCL has acknowledged security holes in some models of its smart television sets, but denies that it maintains a secret "back door" that gives it control over deployed TVs. The post TV Maker TCL Denies Back Door, Promises Better Process appeared first on The Security Ledger. Related   show more ...

StoriesSecurity Holes Opened Back Door To TCL Android Smart TVsPodcast Episode 189: AppSec for Pandemic Times, A Conversation with GitLab Security VP Jonathan HuntEpisode 190: 20 Years, 300 CVEs. Also: COVID’s Lasting Security Lessons

 Trends, Reports, Analysis

AI-supported ransomware attacks might feature intelligent targeting and evasion, and self-propagation at high speed to cripple victim networks before they’ve had a chance to react, the report argued.

 Malware and Vulnerabilities

Updates released on Wednesday for the Drupal content management system (CMS) patch a remote code execution vulnerability related to failure to properly sanitize the names of uploaded files.

 Trends, Reports, Analysis

Researchers at Menlo Security found that while two-thirds of their customers run the latest version of Google Chrome, an eye-popping 83% run versions that are vulnerable to recent zero-day attacks.

 Geopolitical, Terrorism

State-sponsored programs from China, Russia, Iran, and North Korea pose the greatest high-tech threats to Canada, a report from the nation's authority on cybersecurity warned Wednesday.

 Trends, Reports, Analysis

With the trend towards the overall improvement of organizational security, experts think that actors will focus more on exploiting vulnerabilities in network appliances such as VPN gateways.

 Trends, Reports, Analysis

A Blue Voyant report highlighted that nation-states are ramping up cyber attacks on companies that are developing vaccines, and this is likely to increase as production and distribution gets underway.

 New Cyber Technologies

Authenticated Resolution could help thwart DDoS attacks — attackers wouldn't be able to access the actual addresses of their targets because they would not be authorized to do so.

 Breaches and Incidents

A hacker group was spotted targeting MercadoLivre, an e-commerce platform in Latin America, to harvest sensitive information such as login credentials and additional financial details. 

 Malware and Vulnerabilities

Academics from the University of Maryland and the National University of Singapore found that a smart vacuum cleaner can be manipulated into behaving like a recording microphone.

 Feed

This Metasploit module exploits a series of vulnerabilities to achieve unauthenticated remote code execution on the Rockwell FactoryTalk View SE SCADA product as the IIS user. The attack relies on the chaining of five separate vulnerabilities. The first vulnerability is an unauthenticated project copy request, the   show more ...

second is a directory traversal, and the third is a race condition. In order to achieve full remote code execution on all targets, two information leak vulnerabilities are also abused. This exploit was used by the Flashback team (Pedro Ribeiro + Radek Domanski) in Pwn2Own Miami 2020 to win the EWS category.

 Feed

This Metasploit module exploits a buffer overflow in Free MP3 CD Ripper versions 2.6 and 2.8. By constructing a specially crafted WMA WAV M3U ACC FLAC file and attempting to convert it to an MP3 file in the application, a buffer is overwritten, which allows for running shellcode.

 Feed

Ubuntu Security Notice 4637-2 - USN-4637-1 fixed vulnerabilities in Firefox. This update provides the corresponding updates for Ubuntu 16.04 LTS. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a   show more ...

denial of service, obtain sensitive information across origins, bypass security restrictions, conduct phishing attacks, conduct cross-site scripting attacks, bypass Content Security Policy restrictions, conduct DNS rebinding attacks, or execute arbitrary code. Various other issues were also addressed.

 Feed

Ubuntu Security Notice 4639-1 - It was discovered that there was a bug in the way phpMyAdmin handles the phpMyAdmin Configuration Storage tables. An authenticated attacker could use this vulnerability to cause phpmyAdmin to leak sensitive files. It was discovered that phpMyAdmin incorrectly handled user input. An   show more ...

attacker could possibly use this for an XSS attack. It was discovered that phpMyAdmin mishandled certain input. An attacker could use this vulnerability to execute a cross-site scripting attack via a crafted URL. Various other issues were also addressed.

 Feed

Barco wePresent WiPG-1600W versions 2.5.1.8, 2.5.0.25, 2.5.0.24, and 2.4.1.19 have firmware that does not perform verification of digitally signed firmware updates and is susceptible to processing and installing modified/malicious images.

 Feed

Barco wePresent WiPG-1600W version 2.5.1.8 has an SSH daemon included in the firmware image. By default, the SSH daemon is disabled and does not start at system boot. The system initialization scripts read a device configuration file variable to see if the SSH daemon should be started. The web interface does not   show more ...

provide a visible capability to alter this configuration file variable. However, a malicious actor can include this variable in a POST such that the SSH daemon will be started when the device boots.

 Feed

The Barco wePresent WiPG-1600W version 2.5.1.8 web interface does not use session cookies for tracking authenticated sessions. Instead, the web interface uses a "SEID" token that is appended to the end of URLs in GET requests. Thus the "SEID" would be exposed in web proxy logs and browser history. An   show more ...

attacker that is able to capture the "SEID" and originate requests from the same IP address (via a NAT device or web proxy) would be able to access the user interface of the device without having to know the credentials.

 Feed

An attacker armed with hardcoded API credentials from KL-001-2020-004 (CVE-2020-28329) can issue an authenticated query to display the admin password for the main web user interface listening on port 443/tcp for Barco wePresent WiPG-1600W version 2.5.1.8.

 Feed

Barco wePresent device firmware includes a hardcoded API account and password that is discoverable by inspecting the firmware image. A malicious actor could use this password to access authenticated, administrative functions in the API. Versions affected include 2.5.1.8, 2.5.0.25, 2.5.0.24, and 2.4.1.19.

 Feed

Facebook has patched a bug in its widely installed Messenger app for Android that could have allowed a remote attacker to call unsuspecting targets and listen to them before even they picked up the audio call. The flaw was discovered and reported to Facebook by Natalie Silvanovich of Google's Project Zero bug-hunting team last month on October 6 with a 90-day deadline, and impacts version

2020-11
Aggregator history
Friday, November 20
SUN
MON
TUE
WED
THU
FRI
SAT
NovemberDecemberJanuary