Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How the darknet, dar ...

 Privacy

What associations do the words “deep web” conjure in your mind? A place for godlike hackers where mere mortals should fear to tread? A den of iniquity? If so, it may come as a surprise that you use the deep web every single day. In fact, although the term deep web is easy to confuse with the   show more ...

similar-sounding dark web and darknet — and weirdly, the documentary film Deep Web was in fact about the dark web — we think it’s worth untangling the thread. Deep web and surface web By way of illustration, let’s imagine the Internet as one big city. Like any metropolis, it contains public spaces open to everyone, such as the streets, boulevards, and parks you’ll find on the map. Anyone can go there and look around; 360-cam cars can see them; and you can easily find them on a map such as MapQuest or Google Maps. On the Internet, these public spaces are known as the surface web. They are Web pages, Web applications, and other online elements that search bots — digital analogues of cartographers’ cameras — can index. They may hold documents, media files, and more. Anyone can find them using a search engine and view them without paying, registering, or installing special software. In addition to public areas, cities have private zones that require a pass, ticket, or invitation for access. These include homes, business centers, private clubs, cinemas, and so on. Usually, no publicly available map will show you what’s going on inside these places. The Web, too, is home to many corners that Google, Bing and others do not peer into. Collectively, such places are known as the deep web. They consist primarily of all of the Internet pages that cannot be searched and opened by normal means, and bot-cartographers cannot index them. If a site requires you to enter a CAPTCHA for access, then a search bot won’t be able to learn much about its contents — the point of a CAPTCHA is to weed out bots, after all. If an article is available only by subscription, a bot can’t open and index this article because bots have no accounts or money to pay the fee. Reading a document requires a password? Again, no luck for a bot: it doesn’t know a password. If something cannot be found, even if it can be opened, then it too belongs to the deep web. If you configure Facebook to hide your profile from search engines, for example, then even if a search bot gets to it, it will have to ignore it. Nor can a search engine process content that a Web page generates only when the page is opened and that varies depending on who opens it. For example, to view personalized offers, you have to be a user with certain digital habits. Finally, deep web also refers to all content to which no links exist from the visible or surface web. A search bot simply does not know that such content exists; it finds new pages by following links from the pages it’s already indexed. Just as a Google Street View car cannot get into a private courtyard, search bots cannot come across unlinked content. As you see, the bulk of the deep web is made up of harmless, even useful web pages and documents that most of us use. There’s nothing wrong with them being off-limits to outsiders. Quite the opposite. Dark web and darknets Both in town and online, privacy is sought not only by upstanding citizens, but also by those looking to hide their not entirely legal activities. In the physical world, we think of shady business as taking place in slums and criminal dens — places selected for their lack of foot traffic and that are not marked on public maps. The addresses and whereabouts of each den are known to a limited circle of individuals, although many are aware that they exist somewhere. That is approximately how darknets — restricted-access networks used chiefly for questionable activities — operate. The nodes of each individual darknet (servers, computers, routers) are invisible not only to search engines, but, because they use nonstandard protocols to transfer data, to most browsers as well. Neither a direct link nor a password will get an ordinary user in. Together, darknets make up the dark web — generally considered a haven for murky characters such as drug traffickers, arms dealers, extortionists, and sellers of stolen data. Many people know that the dark web exists, but few know how to get there. Of course, hackers and criminals aren’t the only people who need secrecy. Dissidents, free speech activists, whistleblowers helping investigative journalists, and many more people use the dark web to evade persecution and communicate anonymously online. Some people go there for protection from online data collection. Secure and affordable tools exist for that purpose, but some prefer a more radical approach. All shades of Internet security It’s no bad thing for data to be buried deep, invisible to those for whom it is not intended. If, for example, corporate correspondence were to find its way into a search index, the consequences could be unfortunate. It’s better to protect your portion of the depths — accounts and documents to which only you have access. Always use strong and unique passwords. And if you have too many accounts to remember all of them, use a password manager to help you keep them under control. Always confirm you’re exactly where you want to be before entering your credentials online. For example, if the URL is misspelled or looks like a meaningless jumble of letters and numbers, the page is not to be trusted. Give access to confidential documents only to those who really need it. Avoid the dark web unless you’re completely comfortable telling the difference between a forum for human rights activists and one for hackers. Use a trustworthy security solution that will keep you out of trouble wherever you go online.

image for U.K. Arrest in ‘SM ...

 Ne'er-Do-Well News

Authorities in the United Kingdom have arrested a 20-year-old man for allegedly operating an online service for sending high-volume phishing campaigns via mobile text messages. The service, marketed in the underground under the name “SMS Bandits,” has been responsible for blasting out huge volumes of   show more ...

phishing lures spoofing everything from COVID-19 pandemic relief efforts to PayPal, telecommunications providers and tax revenue agencies. The U.K.’s National Crime Agency (NCA) declined to name the suspect, but confirmed that the Metropolitan Police Service’s cyber crime unit had detained an individual from Birmingham in connection to a business that supplied “criminal services related to phishing offenses.” The proprietors of the phishing service were variously known on cybercrime forums under handles such as SMSBandits, “Gmuni,” “Bamit9,” and “Uncle Munis.” SMS Bandits offered an SMS phishing (a.k.a. “smishing”) service for the mass sending of text messages designed to phish account credentials for different popular websites and steal personal and financial data for resale. Image: osint.fans Sasha Angus is a partner at Scylla Intel, a cyber intelligence startup that did a great deal of research into the SMS Bandits leading up to the arrest. Angus said the phishing lures sent by the SMS Bandits were unusually well-done and free of grammar and spelling mistakes that often make it easy to spot a phony message. “Just by virtue of these guys being native English speakers, the quality of their phishing kits and lures were considerably better than most,” Angus said. According to Scylla, the SMS Bandits made a number of operational security (or “opsec”) mistakes that made it relatively easy to find out who they were in real life, but the technical side SMS Bandits’ operation was rather advanced. “They were launching fairly high-volume smishing campaigns from SMS gateways, but overall their opsec was fairly lousy,” Angus said. “But on the telecom front they were using fairly sophisticated tactics.” The proprietor of the SMS Bandits, telling the world he lives in Birmingham. For example, the SMS Bandits automated systems to check whether the phone number list provided by their customers was indeed tied to actual mobile numbers, and not landlines that might tip off telecommunications companies about mass spam campaigns. “The telcos are monitoring for malicious SMS messages on a number of fronts,” Angus said. “One way to tip off an SMS gateway or wireless provider is to start blasting text messages to phone numbers that can’t receive them.” Scylla gathered reams of evidence showing the SMS Bandits used email addresses and passwords stolen through its services to validate a variety of account credentials — from PayPal to bank accounts and utilities providers. They would then offload the working credentials onto marketplaces they controlled, and to third-party vendors. One of SMS Bandits’ key offerings: An “auto-shop” web panel for selling stolen account credentials. SMS Bandits also provided their own “bulletproof hosting” service advertised as a platform that supported “freedom of speach” [sic] where customers could “host any content without restriction.” Invariably, that content constituted sites designed to phish credentials from users of various online services. The “bulletproof” offerings of Muni Hosting (pronounced “Money Hosting”). The SMS Bandits phishing service is tied to another crime-friendly service called “OTP Agency,” a bulk SMS provider that appears catered to phishers: The service’s administrator stated on multiple forums that he worked directly with the SMS Bandits. Otp[.]agency advertises a service designed to help intercept one-time passwords needed to log in to various websites. The customer enters the target’s phone number and name, and OTP Agency will initiate an automated phone call to the target that alerts them about unauthorized activity on their account. The call prompts the target to enter a one-time password generated by their phone’s mobile app, and that code is then relayed back to the scammer’s user panel at the OTP Agency website. “We call the holder with an automatic calling bot, with a very believable script, they enter the OTP on the phone, and you’ll see it in real time,” OTP Agency explained on their Telegram channel. The service, which costs anywhere from $40 to $125 per week, advertises unlimited international calling, as well as multiple call scripts and voice accents. One of the pricing plans available to OTP Agency users. The volume of SMS-based phishing skyrocketed in 2020 — by more than 328 percent — according to a recent report from Proofpoint, a security firm that processes more than 80 percent of North America’s mobile messages [Full disclosure: Proofpoint is currently an advertiser on this site].

 Malware and Vulnerabilities

Web shells can be embedded on servers and can be used by attackers to launch arbitrary code. In as little as 15 bytes, web shells can enable remote administration of an infected machine or system.

 Malware and Vulnerabilities

Researchers believe they identified the same zero-day vulnerability that a mysterious threat actor used to gain access to SonicWall's internal network in a security breach disclosed on January 23.

 Trends, Reports, Analysis

While ransomware attacks continue to pummel organizations, fewer victims have been paying a ransom, and when they do, on average they're paying less than before according to an assessment by Coveware.

 Malware and Vulnerabilities

The VC150’s administrative web interface is vulnerable to a stored Cross-Site Scripting vulnerability (CVE-2020-27262). Further, the device can be shut down via keystroke injection.

 Malware and Vulnerabilities

Whereas weaponized email attachments were a common feature of previous Trickbot campaigns, this one encourages users to click on a phishing link, which redirects them to a compromised server.

 Malware and Vulnerabilities

It is distributed as a warez copy of the CCleaner Windows utility. When executed, the ransomware will launch a legitimate CCleaner installer and copy itself to a random file name in the %Temp%folder.

 Expert Blogs and Opinion

A flaw can be harmless, but zero-days represent vulnerabilities that can be turned into weapons. And governments have been buying them and storing them in vaults, like vials of the bubonic plague.

 Malware and Vulnerabilities

Instead of demanding an immediate ransom from victims, Danabot is focused on gaining persistence and stealing data that can be monetized later.

 Feed

Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. This is the source code release.

 Feed

AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire(tm). It generates a database that can be used to check the integrity of files on server. It uses regular expressions for determining which files get added to the database. You can use several message digest algorithms to ensure that the files have not been tampered with.

 Feed

There is a heap buffer overflow in libgcrypt due to an incorrect assumption in the block buffer management code. Just decrypting some data can overflow a heap buffer with attacker controlled data and no verification or signature is validated before the vulnerability occurs.

 Feed

Ubuntu Security Notice 4716-1 - Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.23 in Ubuntu 20.04 LTS and Ubuntu 20.10. Ubuntu 16.04 LTS and Ubuntu 18.04 LTS have been updated to MySQL 5.7.33. In addition to   show more ...

security fixes, the updated packages contain bug fixes, new features, and possibly incompatible changes. Various other issues were also addressed.

 Feed

Gentoo Linux Security Advisory 202102-2 - Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. Versions less than 78.7.0 are affected.

 Feed

Elena Petrova discovered that the pin controller device tree implementation in the Linux kernel did not properly handle string references. A local attacker could use this to expose sensitive information (kernel memory). Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly   show more ...

initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information (kernel memory). Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-0319-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.5 on RHEL 7 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.4.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a server-side request forgery vulnerability.

 Feed

Red Hat Security Advisory 2021-0320-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.5 on RHEL 8 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.4.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a server-side request forgery vulnerability.

 Feed

Ubuntu Security Notice 4715-1 - Wang Baohua discovered that Django incorrectly extracted archive files. A remote attacker could possibly use this issue to extract files outside of their expected location.

 Feed

Red Hat Security Advisory 2021-0318-01 - Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.5 on RHEL 6 serves as a replacement for Red   show more ...

Hat Single Sign-On 7.4.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include a server-side request forgery vulnerability.

 Feed

A "severe" vulnerability in GNU Privacy Guard (GnuPG)'s Libgcrypt encryption software could have allowed an attacker to write arbitrary data to the target machine, potentially leading to remote code execution. The flaw, which affects version 1.9.0 of libgcrypt, was discovered on January 28 by Tavis Ormandy of Project Zero, a security research unit within Google dedicated to finding zero-day bugs

 Feed

Cybersecurity researchers today disclosed a new supply chain attack compromising the update mechanism of NoxPlayer, a free Android emulator for PCs and Macs. Dubbed "Operation NightScout" by Slovak cybersecurity firm ESET, the highly-targeted surveillance campaign involved distributing three different malware families via tailored malicious updates to selected victims based in Taiwan, Hong Kong,

 Feed

We likely all agree that 2020 was a year we won't soon forget - for many reasons. One area particularly impacted last year was (and continues to be) cybersecurity.  While Internet access allowed many businesses to continue functioning during the COVID-19 stay at home requirements, the unprecedented number of people accessing company assets remotely introduced many new challenges for

 Feed

A financially-motivated threat actor notorious for its cryptojacking attacks has leveraged a revised version of their malware to target cloud infrastructures using vulnerabilities in web server technologies, according to new research. Deployed by the China-based cybercrime group Rocke, the Pro-Ocean cryptojacking malware now comes with improved rootkit and worm capabilities, as well as harbors

2021-02
Aggregator history
Monday, February 01
MON
TUE
WED
THU
FRI
SAT
SUN
FebruaryMarchApril