Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Stalkerware 2020: Th ...

 Privacy

These days, spying on people has gotten far too easy. Anyone can buy stalkerware apps, which can look like parental control software or a smartphone antitheft solution. The classification may help developers avoid legal trouble; the software’s real purpose is to collect a great deal of highly sensitive   show more ...

information from devices without their users’ knowledge. Although the legal status of stalkerware is gray, the use of such apps is not only unethical but also dangerous. We believe in countering the threat, in particular by raising awareness about it and any protective measures available to concerned citizens. The scale of the scourge Stalkerware apps’ features vary, but most enable total surveillance of the victim’s smartphone. Moreover, to install the app on the target device, the attacker simply needs to gain physical access to it once. Many people trust their partners enough to give them that access. Among other things, stalkerware users can, without alerting their target in any way: Track a victim’s location; Read messages in messaging apps and social networks; View photos, videos, and other files on the device; Eavesdrop on telephone conversations; See everything typed on the keypad, including passwords and two-factor authentication codes. Stalkerware typically hides itself from the list of installed programs and does not display any activity notifications. Knowing their victim’s every move, an attacker can control, threaten, and psychologically pressure them. According to a 2017 report by the European Institute for Gender Equality (EIGE), seven of ten women affected by online stalking have experienced physical violence, sexual violence, or both at the hands of the perpetrator. The scale of the problem continues to grow. For example, an Australian study on technology abuse and domestic violence showed that, since 2015, attackers have become far more likely to track the locations of current and former partners, and almost twice as likely to monitor them with cameras. The Centre Hubertine Auclert in France reports that one in five victims of relationship violence has encountered spyware. Germany also notes a rise in the use of stalkerware in recent years. 54,000 stalkerware victims in 2020 What has changed since 2019, when we teamed up with like-minded companies and nonprofits in the fight against stalkerware? Data from Kaspersky Security Network indicates almost 54,000 users worldwide were affected by stalkerware apps in 2020. Is that high or low? The figure in 2018 was almost 40,000, but in 2019 it topped 67,000. Unique users worldwide affected by stalkerware, 2018–2020. Source This much is clear: The fight against online stalking is far from won. First, when it comes to threats of violence, 54,000 is a big number, however you slice it. Second, the pandemic and its consequences are factors, holding people house-bound in 2020 — and household members (spouses, roommates) are by far the most likely to use stalkerware apps. Isolation is likely to skew the numbers; with a victim stuck at home, a stalker may not monitor their smartphone’s whereabouts. With that in mind, it is unsurprising that the yearly curve of users affected by stalkerware globally shows a decline in reports from March to June 2020. That period coincides with the beginning of worldwide lockdowns. Later, when many countries around the world began to ease restrictions, the numbers began to rebound and stabilize. As for geography, our solutions most often detected stalkerware in Russia, Brazil, and the US, all of which landed in the Top 5 in 2019 as well. Among Asian countries, the problem was most acute in India, and the hardest hit in Europe were Germany, Italy, and the UK. 2020’s most common stalkerware families As for stalkerware apps, the most common specimen in 2020 was the one our solutions call Monitor.AndroidOS.Nidb.a. Its developers allow the app to be resold under other names, so it is prominent in the market. The iSpyoo, TheTruthSpy, and Copy9 apps, for example, are all Nidb. Interestingly, until just a year ago, this stalkerware family was only the third most prevalent. Another very popular piece of spyware is Cerberus, which is sold as antitheft smartphone protection and hides itself to avoid notice. What’s more, like genuine phone-finding apps, Cerberus has access to geolocation, can take photos and screenshots, and records sound. Other high-ranking stalking apps include Track My Phone (which our solutions detect as Agent.af), MobileTracker (which enables remote control of the victim’s device), and the stalkerware program Alnost. The latter, like Cerberus, appears to be an antitheft tool, but it’s available on Google Play, which declared war on stalkerware last year, because it meets the store’s requirements. How to detect stalkerware One of the main problems with stalkerware is that it can’t just be found and removed. Removing stalkerware could alert an abuser that the victim is aware of being spied on. Some of the samples actually send a notification to the stalker, in which case deleting the app could escalate conflict and further endanger the victim. But stalkerware can, and must, be detected — for starters, knowing you are being watched can lead you to take precautions or seek help. There are several ways to sniff out a spy. Keep an eye on battery and mobile data usage. Stalkerware runs in the background, sending constant streams of data to its server and eating up resources; Check which apps have been given dangerous permissions such as geolocation access or Accessibility (a set of Android features that lets an app control phone settings, read on-screen text, and more). If an unfamiliar app is using such permissions, it is likely to be stalkerware; Use a security solution that identifies and warns you about stalkerware. However, bear in mind that some types of stalkerware notify their operators if their target installs antivirus protection; Use TinyCheck, a solution designed to find stalkerware without its operator knowing. You can learn more about the tools and techniques mentioned above and how effective they are on our blog. How to reduce the risk of stalkerware infection You can reduce the risk of someone sneaking stalkerware onto your devices, too: Never give your phone to anyone and, if possible, don’t even leave it unattended; Protect your device with a strong alphanumeric password that you never share with anyone; Block the installation of apps from third-party sources in your device settings, and use only the official app stores; Protect your device with a reliable mobile antivirus utility that detects and warns you about stalkerware.

image for New phishing scam pr ...

 Threats

The PlayStation 5 console went on sale last November, but many hopeful shoppers are still empty-handed. Sony, suffering a chip shortage as a result of COVID-associated supply restrictions, cannot keep pace with demand. Meanwhile, scammers are moving in to take advantage of the hype by offering the chance to win a PS5.   show more ...

Win a PS5 from a pharmaceutical company As with most phishing, a careful look reveals trouble. For example, although the scam e-mails in this campaign contain no glaring errors, the sender’s name — India Pharma in this case, an actual organization — is not affiliated with any gaming giveaways. Phishing e-mail offering the chance to win a PlayStation 5. It is not clear who is behind this display of wondrous generosity What’s also suspicious is that the terms and conditions (the very small print at the bottom of the message that most people don’t read) mention an entirely different company: toleadoo GmbH. It too exists. It’s based in Germany and is the subject of numerous user complaints. The small print also mentions certain “competition T&Cs,” but there is no link to them. Again, we’re looking for suspicious elements, and inconsistencies in legal language are very suspicious. In any case, to try your luck, the organizers ask you to register your e-mail address. The scammers just need your e-mail address to get started The next step opens a website bearing the Amazon logo, although with a URL that looks nothing like amazon.com. The page ramps up the phishing pressure, saying you’re one of ten lucky visitors who can win the coveted console this week, but you have to act in the next minute and 18 seconds — just enough time to complete the short survey and enter the drawing. This, of course, is another example of a pretty effective phishing tactic: Ramp up the pressure with an artificial time constraint and people will panic and rush instead of slowing down to apply critical thinking. The clock is ticking! Wheel of Fortune If you complete the survey and check the rest of the boxes, a dozen identical gift boxes appear on the screen, one of which is the winner. Spoiler alert: You win the prize! Can’t believe your good luck? Well, below are fake reviews from past “winners” to stoke your excitement and keep your vigilance nice and low. Positive reviews promote the scam Now comes the catch. A payment of £1 (one pound sterling — around $1.40 at the time of writing) is required to claim the prize. The organizers give no reason for the payment — but in comparison with the price of the console, it’s peanuts. In addition, they promise to cover all postage costs and deliver the shiny PS5 in just one week. You won! Now pay Next comes a request for address, ZIP code, phone number, and (again) e-mail, most of which makes perfect sense in the context of arranging prize delivery. However, at this point, the required payment jumps from £1 to £1.78; again, with no explanation. The payment magically increases from £1 to £1.78 The last step is to provide your banking details. The princely sum of £1.78 won’t make the cybercriminals rich, but your card details — in particular the CVV2/CVC2 code — might. One last step to giving the scammers your money Keep a cool head To avoid such pitfalls, don’t believe the hype. If you receive a tempting offer, keep your head, and always follow these simple guidelines to help guard against phishing: Check information about giveaways and other promos on the organizer’s website; Do not follow links in e-mails. Instead, enter the URL manually if you know it, or use a search engine to get there (after making sure the link is not an ad); Be very wary if getting a prize requires paying a fee, even if the amount is small. You risk losing more than just the amount requested; Guard your personal data carefully, and if you have any doubts about a website, do not enter your contact details on it; Use a reliable security solution that warns you when you are about to visit a fraudulent website.

image for Episode 207: Sara Ta ...

 Blackberry

In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. The post Episode 207: Sara Tatsis of Blackberry on finding and   show more ...

Keeping Women in Cyber...Read the whole entry... » Related StoriesEncore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent PipelineEpisode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber RiskEpisode 203: Don’t Hack The Water and Black Girls Hack Founder Tennisha Martin

image for Episode 207: Sarah T ...

 Blackberry

In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. The post Episode 207: Sarah Tatsis of BlackBerry on finding   show more ...

and Keeping Women in Cyber...Read the whole entry... » Related StoriesEncore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent PipelineEpisode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber RiskEpisode 203: Don’t Hack The Water and Black Girls Hack Founder Tennisha Martin

 Govt., Critical Infrastructure

Distribution systems’ vulnerability is increasing due to their industrial control systems, which have increasingly been incorporating remote access. This can give bad actors access to them.

 Malware and Vulnerabilities

The Copperstealer malware attempts to steal the account passwords to Facebook, Instagram, Google, and other sites, according to Proofpoint. Stolen passwords are used to run malicious ads for profit.

 Trends, Reports, Analysis

Fiserv, a multi-billion-dollar cybersecurity tech provider for financial institutions, forgot to buy the domain used as a default in their systems’ email communications, according to a report.

 Threat Actors

One interesting technique researchers have come across in recent months leverages the Telegram API to exfiltrate stolen data and send it in a private message to a bot under the attacker's control.

 Malware and Vulnerabilities

Security researchers at Avast have discovered that more than 30 hacker groups have been using a malware crypter dubbed OnionCrypter to use encryption and obfuscation to make detection more difficult.

 Trends, Reports, Analysis

Researchers from Sucuri recently discovered a tactic, practiced by Magecart groups, to hide malicious activity by saving stolen credit card data into a JPEG file.

 Malware and Vulnerabilities

Google released a Proof-of-Concept on Spectre side-channel vulnerability for web app developers, highlighting the importance of deploying application-level mitigations to stay secure.

 Trends, Reports, Analysis

Victimizing at least nine organizations across Africa, Europe, Mexico, and the U.S in the past two weeks, the REvil gang is probably showing off its Gootloader malware loader. 

 Trends, Reports, Analysis

Attackers are mimicking the names of existing packages on public registries in hopes that users or developers will accidentally download these malicious packages instead of legitimate ones.

 Feed

KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from a privilege escalation vulnerability. The non-privileged default user (user:user123) can elevate his/her privileges by sending a HTTP GET request to the configuration export endpoint and disclose the admin password. Once authenticated as admin, an attacker will be granted access to the additional and privileged pages.

 Feed

KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 allows unauthenticated attackers to visit the unprotected /goform/LoadDefaultSettings endpoint and reset the device to its factory default settings. Once the GET request is made, the device will reboot with its default settings allowing the attacker to bypass authentication and take full control of the system.

 Feed

A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of NT AUTHORITYSYSTEM. The flaw exists in how the WndExtra field of a window can be manipulated into being treated as an offset despite being populated by an attacker-controlled value. This can be leveraged to achieve an out of bounds write operation, eventually leading to privilege escalation.

 Feed

This Metasploit module exploits an unauthenticated log file upload within the log_upload_wsgi.py file of VMWare View Planner 4.6 prior to 4.6 Security Patch 1. Successful exploitation will result in remote code execution as the apache user inside the appacheServer Docker container.

 Feed

The controller in SOYAL Biometric Access Control System version 5.0 suffers from a cleartext transmission of sensitive information. This allows interception of the HTTP traffic and disclose the Master code and the Arming code via a man-in-the-middle attack. An attacker can obtain these codes to enter into the controller's Programming mode and bypass physical security controls in place.

 Feed

Ubuntu Security Notice 4882-1 - It was discovered that the Ruby JSON gem incorrectly handled certain JSON files. If a user or automated system were tricked into parsing a specially crafted JSON file, a remote attacker could use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu   show more ...

18.04 LTS. It was discovered that Ruby incorrectly handled certain socket memory operations. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Various other issues were also addressed.

 Feed

Red Hat Security Advisory 2021-0940-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.

 Feed

Cybersecurity researchers on Thursday disclosed a new attack wherein threat actors are leveraging Xcode as an attack vector to compromise Apple platform developers with a backdoor, adding to a growing trend that involves targeting developers and researchers with malicious attacks. Dubbed "XcodeSpy," the trojanized Xcode project is a tainted version of a legitimate, open-source project available

 Feed

A newly discovered glitch in Zoom's screen sharing feature can accidentally leak sensitive information to other attendees in a call, according to the latest findings. Tracked as CVE-2021-28133, the unpatched security vulnerability makes it possible to reveal contents of applications that are not shared, but only briefly, thereby making it harder to exploit it in the wild. It's worth pointing out

 Feed

The U.S. Department of Justice yesterday announced updates on two separate cases involving cyberattacks—a Swiss hacktivist and a Russian hacker who planned to plant malware in the Tesla company. A Swiss hacker who was involved in the intrusion of cloud-based surveillance firm Verkada and exposed camera footage from its customers was charged by the U.S. Department of Justice (DoJ) on Thursday

2021-03
Aggregator history
Friday, March 19
MON
TUE
WED
THU
FRI
SAT
SUN
MarchAprilMay