The Federal Bureau of Investigation, or the FBI, has issued a warning about a series of spoofed domains that are being used by cybercriminals in an attempt to steal user information. Spoofed domains typically look like real domains, only that malicious actors turn to a very simple trick: they change one letter, the show more ...
Internet domain, or add more words that make sense for each target, all in an attempt to trick users into thinking they’re loading the legitimate site. In most cases, hackers publish content that encourages users to provide information like personal details and credit card numbers. The FBI says it has already detected a number of spoofed domains, as well as others that no longer resolve, which means they have been suspended (though there’s also a chance they might be reactivated at a later time). Users who want to visit the FBI’s official site should check the URL in the address bar and make sure ... (read more)
The first version of Minecraft was released way back in 2009, but the game remains incredibly popular to this day. That should come as no surprise; not only is it enormous fun, but it’s a platform for kids and adults alike to create their own worlds. Some even use it for urban planning — and some teachers use show more ...
it in the classroom. Unfortunately, as with any successful project, cybercriminals are eager for a piece of the action. Since July of this year, we have detected more than 20 apps on Google Play claiming to be modpacks for Minecraft, when in fact their primary purpose is to display ads on smartphones and tablets in an extremely intrusive manner. We explain what these apps are and how to protect Android devices against such threats. Fake Minecraft mods on Google Play At the time of this writing, most of the unscrupulous apps we found on Google Play had already been removed. The five that remained were: Zone Modding Minecraft, Textures for Minecraft ACPE, Seeded for Minecraft ACPE, Mods for Minecraft ACPE, Darcy Minecraft Mod. The humblest of them had more than 500 installations, and the most popular more than 1 million. Although the apps have different publishers, two of the fake modpacks carried almost the exact same description, down to the typos. Apps with different publishers, same description The app reviews are contradictory. Average ratings hover around the 3-star mark, but overall, scores are highly polarized, mostly 5s and 1s. That kind of spread suggests that bots are leaving rave reviews but real users are very unhappy. Unfortunately, in this case, the cybercriminals are targeting kids and teenagers, who may not pay attention to ratings and reviews before installing an app. The apps receive either five stars or one. Suspicious! We informed Google about the malicious apps mentioned above, and the apps were deleted from Google Play by the time this post was published. Nevertheless, it’s worth mentioning that: After apps are deleted from Google Play, they remain on the smartphones of any users who already installed them; The malware creators can try to get their apps back in the store by modifying them and publishing them from a different developer’s account. Fake mods on the device Meanwhile, users rightly curse the apps for not doing what they promised. Having landed on a smartphone, the “modpack” lets itself be opened once, but it doesn’t load any mods (in fact, the app we studied closely did nothing useful at all). The frustrated user closes the app, which promptly vanishes. More precisely, its icon disappears from the smartphone’s menu. Users complain that the app doesn’t work and seemingly deletes itself Because the “modpack” seemed glitchy from the start, most users, especially kids and teens, won’t waste time looking for it. They may even forget it and not bother trying to remove it. Unbeknownst to the user, however, the app remains on the smartphone — and not merely there, but hard at work. Concealed from the user, the fake modpack starts displaying ads. The sample we examined automatically opened a browser window with ads every two minutes, greatly interfering with normal smartphone use. In addition to the browser, the apps can open Google Play and Facebook or play YouTube videos, depending on the C&C server’s orders. Whatever the case, the constant stream of full-screen ads makes the phone practically unusable. How to remove malicious Minecraft modpacks Perhaps the most annoying thing about the fake Minecraft mods is that their victims have a very hard time figuring out why their browser (or Google Play, or Facebook, or YouTube) keeps opening. They are likely to conclude that the problem lies in the browser (or whichever app the fake modpack loads). However, uninstalling and reinstalling the browser will not fix the issue, and neither will tinkering with settings. The only way to defeat the problem is to get rid of the malicious app. But that means locating it, which may be tricky; affected users may not remember what exactly they installed before their phones started acting up. After identifying the malicious app, you’ll need to find it in device settings (Settings → Apps and notifications → Show all apps) and delete it from there. Fortunately, the misbehaving modpacks get removed entirely with deletion and do not try to restore themselves. If you’re having trouble figuring out which app is to blame for the smartphone’s odd behavior, or you just want to clean your child’s gadget quickly and easily, install a reliable security solution and scan the device. For example, Kaspersky Internet Security for Android recognizes fake Minecraft modpacks with the verdict not-a-virus:HEUR:AdWare.AndroidOS.HiddenAd.os, and prompts the user to delete any that are already on the smartphone or tablet. For the future, to prevent your child from downloading malware, teach them about the potential dangers of apps, including ones on Google Play. In particular, focus on poorly written descriptions and wildly varying ratings and reviews — warning signs the developer or publisher might not be on the up-and-up. And just to repeat, be sure to install a mobile antivirus utility on their smartphone.
TroubleGrabber is a credential stealer that spreads through Discord attachments and leverages Discord webhooks to deliver the stolen information to the malware operators.
Google has begun rolling out end-to-end encryption for Rich Communication Service, the text-messaging standard the industry giant is pushing as an alternative to the older SMS protocol.
“The hack, which the athletes became aware of this week, has caused panic and one leading sports agency has advised its clients to take extra measures to protect their private data,” as per The Times.
With this release, TrickBot is now injecting its DLL into the legitimate Windows wermgr.exe (Windows Problem Reporting) executable directly from memory using code from the 'MemoryModule' project.
Romanian police forces have arrested this week two individuals suspected of running two malware crypter services called CyberSeal and DataProtector, and a malware testing service called CyberScan.
Dragos researchers have found multiple ransomware strains, such as Clop, EKANS, and Megacortex, adopting ICS-aware functionality, including the ability to kill industrial processes.
Researchers at Malwarebytes discovered yet another Malsmoke campaign that appears to have begun mid-October, using malvertising attacks to trick adult site users into downloading a fake Java update.
South Korean fashion and retail conglomerate E-Land Group said Sunday it has suspended operations at nearly half of its stores (23 out of 50) in the country due to a ransomware attack.
In March, a voice phishing scam targeting GoDaddy support employees allowed attackers to assume control over at least a half-dozen domain names, including transaction brokering site escrow.com.
This year, URL redirection has featured in a variety of attacks campaigns, including malvertising attacks, tech support scams, brand impersonation attacks, and more.
The exploit posted by the hacker lets attackers access the sslvpn_websession files from Fortinet VPNs to steal login credentials which could then be used to compromise a network and deploy ransomware.
The Drupal team did not say that they aware of the vulnerability being actively exploited, but recommended admins to audit all previously uploaded files to check for malicious extensions.
The liquidity mining project lost about $20 million of users' funds in DAI tokens. The attacker exploited the vulnerability of Pickle Finance smart contract called DAI PickleJar using fake swaps.
A report by Wipro provides fresh insights on how AI will be leveraged as part of defender stratagems as more organizations lock horns with sophisticated cyberattacks and become more resilient.
Turkish hackers hacked and defaced Joe Biden’s Presidential campaign 'Vote Joe’ website. As per the note left by the hackers on the hacked site, “RootAyyildiz” has claimed responsibility for the hack.
Threat actors from Russia, China, Iran, and North Korea, including Fancy Bear, Cozy Bear, APT41, Charming Kitten, and Lazarus, have launched targeted attacks against vaccine research efforts.
The malware called “xpc.js” includes next-generation machine learning algorithms that automatically detect potentially malicious activity associated with open source ecosystems.
The think tank Parliament Street collected Freedom of Information (FOI) responses to reveal that over 22.3 million cyberattacks were blocked by parliament from January 1, 2020, to August 31, 2020.
The bug affected GitHub's Actions feature – a developer workflow automation tool – that Google Project Zero researcher Felix Wilhelm said was "highly vulnerable to injection attacks".
Organizations that qualify as leaders recognize their own limitations and are much more likely to supplement their security efforts with crowdsourced penetration testing and bug bounty programs.
VMware last week addressed six vulnerabilities in its SD-WAN Orchestrator product, including some issues that can be chained by an attacker to hijack traffic or shut down an enterprise network.
The U.S. Federal Bureau of Investigation issued a flash alert to warn private industry partners of an increase of the Ragnar Locker ransomware activity following a confirmed attack from April 2020.
As the need for healthcare and pharmaceutical organizations during the pandemic increases more than ever, APT groups are ramping up their attacks on these institutions to steal critical research.
A hacker could rewrite the firmware of a Tesla key fob via Bluetooth connection, lift an unlock code from the fob, and use it to steal a Model X in just a matter of minutes.
Alex Inführ discovered a new shell injection vulnerability related to the parsing of PDF files by ImageMagick while investigating ‘ImageTragick’, a set of vulnerabilities discovered in 2016.
This year’s Black Friday DDoS attacks may be especially challenging for online retailers' operations globally if they accompany exceptionally high volumes of normal traffic.
WISeKey will acquire a majority interest in arago, a leading German technology company that provides artificial intelligence to enterprises globally through knowledge automation.
TikTok has patched a reflected cross-site scripting security flaw and a vulnerability leading to account takeover impacting the firm's web domain, which were reported by a security researcher.
Telefónica, via Telefónica Tech Ventures, its vehicle for investment in cybersecurity startups, has invested in Smart Protection, a startup that protects brands against counterfeiting on the internet.
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws, and much more. It is written in (pure) bash, makes only use of standard Unix utilities, openssl and last but not least bash sockets.
AIEngine is a packet inspection engine with capabilities of learning without any human intervention. It helps network/security professionals to identify traffic and develop signatures for use them on NIDS, Firewalls, Traffic classifiers and so on.
Red Hat Security Advisory 2020-5175-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 6, 7, and 8. Issues addressed include a remote SQL injection vulnerability.
Red Hat Security Advisory 2020-5174-01 - Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime. This asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.3. Issues addressed include a remote SQL injection vulnerability.
Ubuntu Security Notice 4634-2 - USN-4634-1 fixed several vulnerabilities in OpenLDAP. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that OpenLDAP incorrectly handled certain malformed inputs. A remote attacker could possibly use this issue to cause OpenLDAP to crash, resulting in a denial of service. Various other issues were also addressed.
Red Hat Security Advisory 2020-5170-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This show more ...
release of Red Hat JBoss Web Server 5.4 serves as a replacement for Red Hat JBoss Web Server 5.3, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2020-5173-01 - Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache Tomcat Servlet container, JBoss HTTP Connector, the PicketLink Vault extension for Apache Tomcat, and the Tomcat Native library. This show more ...
release of Red Hat JBoss Web Server 5.4 serves as a replacement for Red Hat JBoss Web Server 5.3, and includes bug fixes, enhancements, and component upgrades, which are documented in the Release Notes, linked to in the References. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2020-5163-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.4.3.
Red Hat Security Advisory 2020-5168-01 - Eclipse is an integrated development environment. The rh-eclipse packages have been upgraded to version 4.17, which is based on the Eclipse Foundation's 2020-09 release train. For instructions on how to use rh-eclipse, see Using Eclipse linked from the References section.
Red Hat Security Advisory 2020-5164-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.4.3.
Red Hat Security Advisory 2020-5162-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.4.3.
Red Hat Security Advisory 2020-5166-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.4.3.
Red Hat Security Advisory 2020-5165-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 86.0.4240.198. Issues addressed include a use-after-free vulnerability.
Red Hat Security Advisory 2020-5167-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 78.4.3.
At present, web applications have become the top targets for attackers because of potential monetization opportunities. Security breaches on the web application can cost millions. Strikingly, DNS (Domain Name System) related outage and Distributed denial of service (DDoS) lead a negative impact on businesses. Among the wide range of countermeasures, a web application firewall is the first line
Last Friday, the day before it was scheduled to play a football match against West Bromwich Albion, Manchester United revealed that it had fallen victim to a cyber attack. What Manchester United chose not to do is give any details of the “cyber attack” it had suffered.
REvil Ransomware Strikes Hosting Provider In recent days the web hosting provider Managed.com has been working to recover from a ransomware attack targeting many of their core systems. While the company was able to stop the spread of the attack by shutting down their systems and client websites, it remains unclear show more ...
what information may have been encrypted and sent elsewhere. The demanded ransom is equal to $500,000 in Monero cryptocurrency and is set to double if not paid in the next week. Cyberattack Shuts Down Americold Operations Cold storage provider Americold revealed this week it was forced to shut down many of its systems after discovering evidence of a cyberattack. Some variant of ransomware is thought to be responsible for the attack, which has disabled several customer-facing services and could still be affecting Americold. Fortunately, the company responded quickly and was able to stop the attack from spreading across its network, which could have caused significantly more damage, especially if financial information was accessed. Ticketmaster Receives Fine for 2018 Data Breach More than two years after Ticketmaster announced a data breach had compromised a significant amount of customer information, the Information Commissioner’s Office (ICO) has settled on a fine of £1.25 million. The attack was significant because, while multiple organizations warned Ticketmaster of the breach, the company did nothing to resolve the security lapse. Officials also discovered that upwards of 60,000 customer payment cards were used for additional fraudulent activity after the Ticketmaster breach. Healthcare Remains Easiest Target for Cyberattacks A recent survey of healthcare organizations found that 73% had computer systems totally unprepared to repel a cyberattack. Attackers are improving their operations rapidly compared to security improvements being implemented by these organizations, even with the increasing year-over-year cybersecurity spending. To make matters worse, pressure put on the healthcare industry by the COVID-19 pandemic has forced many facilities to put security improvements on hold as they deal with increased patient numbers. Severity of Capcom Breach Continues to Rise A ransomware attack on Capcom that was initially suspected to not affect customer data has been found to be more severe than first thought. Upwards of 135,000 customers, employees and other individuals with ties to the company may have had sensitive personal information compromised. While Capcom has confirmed that payment data is processed through a third-party and isn’t stored on their systems, internal documents and statements seem to have been compromised by the attack. The post Cyber News Rundown: REvil Ransomware Strikes appeared first on Webroot Blog.