These days, spying on people has gotten far too easy. Anyone can buy stalkerware apps, which can look like parental control software or a smartphone antitheft solution. The classification may help developers avoid legal trouble; the software’s real purpose is to collect a great deal of highly sensitive show more ...
information from devices without their users’ knowledge. Although the legal status of stalkerware is gray, the use of such apps is not only unethical but also dangerous. We believe in countering the threat, in particular by raising awareness about it and any protective measures available to concerned citizens. The scale of the scourge Stalkerware apps’ features vary, but most enable total surveillance of the victim’s smartphone. Moreover, to install the app on the target device, the attacker simply needs to gain physical access to it once. Many people trust their partners enough to give them that access. Among other things, stalkerware users can, without alerting their target in any way: Track a victim’s location; Read messages in messaging apps and social networks; View photos, videos, and other files on the device; Eavesdrop on telephone conversations; See everything typed on the keypad, including passwords and two-factor authentication codes. Stalkerware typically hides itself from the list of installed programs and does not display any activity notifications. Knowing their victim’s every move, an attacker can control, threaten, and psychologically pressure them. According to a 2017 report by the European Institute for Gender Equality (EIGE), seven of ten women affected by online stalking have experienced physical violence, sexual violence, or both at the hands of the perpetrator. The scale of the problem continues to grow. For example, an Australian study on technology abuse and domestic violence showed that, since 2015, attackers have become far more likely to track the locations of current and former partners, and almost twice as likely to monitor them with cameras. The Centre Hubertine Auclert in France reports that one in five victims of relationship violence has encountered spyware. Germany also notes a rise in the use of stalkerware in recent years. 54,000 stalkerware victims in 2020 What has changed since 2019, when we teamed up with like-minded companies and nonprofits in the fight against stalkerware? Data from Kaspersky Security Network indicates almost 54,000 users worldwide were affected by stalkerware apps in 2020. Is that high or low? The figure in 2018 was almost 40,000, but in 2019 it topped 67,000. Unique users worldwide affected by stalkerware, 2018–2020. Source This much is clear: The fight against online stalking is far from won. First, when it comes to threats of violence, 54,000 is a big number, however you slice it. Second, the pandemic and its consequences are factors, holding people house-bound in 2020 — and household members (spouses, roommates) are by far the most likely to use stalkerware apps. Isolation is likely to skew the numbers; with a victim stuck at home, a stalker may not monitor their smartphone’s whereabouts. With that in mind, it is unsurprising that the yearly curve of users affected by stalkerware globally shows a decline in reports from March to June 2020. That period coincides with the beginning of worldwide lockdowns. Later, when many countries around the world began to ease restrictions, the numbers began to rebound and stabilize. As for geography, our solutions most often detected stalkerware in Russia, Brazil, and the US, all of which landed in the Top 5 in 2019 as well. Among Asian countries, the problem was most acute in India, and the hardest hit in Europe were Germany, Italy, and the UK. 2020’s most common stalkerware families As for stalkerware apps, the most common specimen in 2020 was the one our solutions call Monitor.AndroidOS.Nidb.a. Its developers allow the app to be resold under other names, so it is prominent in the market. The iSpyoo, TheTruthSpy, and Copy9 apps, for example, are all Nidb. Interestingly, until just a year ago, this stalkerware family was only the third most prevalent. Another very popular piece of spyware is Cerberus, which is sold as antitheft smartphone protection and hides itself to avoid notice. What’s more, like genuine phone-finding apps, Cerberus has access to geolocation, can take photos and screenshots, and records sound. Other high-ranking stalking apps include Track My Phone (which our solutions detect as Agent.af), MobileTracker (which enables remote control of the victim’s device), and the stalkerware program Alnost. The latter, like Cerberus, appears to be an antitheft tool, but it’s available on Google Play, which declared war on stalkerware last year, because it meets the store’s requirements. How to detect stalkerware One of the main problems with stalkerware is that it can’t just be found and removed. Removing stalkerware could alert an abuser that the victim is aware of being spied on. Some of the samples actually send a notification to the stalker, in which case deleting the app could escalate conflict and further endanger the victim. But stalkerware can, and must, be detected — for starters, knowing you are being watched can lead you to take precautions or seek help. There are several ways to sniff out a spy. Keep an eye on battery and mobile data usage. Stalkerware runs in the background, sending constant streams of data to its server and eating up resources; Check which apps have been given dangerous permissions such as geolocation access or Accessibility (a set of Android features that lets an app control phone settings, read on-screen text, and more). If an unfamiliar app is using such permissions, it is likely to be stalkerware; Use a security solution that identifies and warns you about stalkerware. However, bear in mind that some types of stalkerware notify their operators if their target installs antivirus protection; Use TinyCheck, a solution designed to find stalkerware without its operator knowing. You can learn more about the tools and techniques mentioned above and how effective they are on our blog. How to reduce the risk of stalkerware infection You can reduce the risk of someone sneaking stalkerware onto your devices, too: Never give your phone to anyone and, if possible, don’t even leave it unattended; Protect your device with a strong alphanumeric password that you never share with anyone; Block the installation of apps from third-party sources in your device settings, and use only the official app stores; Protect your device with a reliable mobile antivirus utility that detects and warns you about stalkerware.
The PlayStation 5 console went on sale last November, but many hopeful shoppers are still empty-handed. Sony, suffering a chip shortage as a result of COVID-associated supply restrictions, cannot keep pace with demand. Meanwhile, scammers are moving in to take advantage of the hype by offering the chance to win a PS5. show more ...
Win a PS5 from a pharmaceutical company As with most phishing, a careful look reveals trouble. For example, although the scam e-mails in this campaign contain no glaring errors, the sender’s name — India Pharma in this case, an actual organization — is not affiliated with any gaming giveaways. Phishing e-mail offering the chance to win a PlayStation 5. It is not clear who is behind this display of wondrous generosity What’s also suspicious is that the terms and conditions (the very small print at the bottom of the message that most people don’t read) mention an entirely different company: toleadoo GmbH. It too exists. It’s based in Germany and is the subject of numerous user complaints. The small print also mentions certain “competition T&Cs,” but there is no link to them. Again, we’re looking for suspicious elements, and inconsistencies in legal language are very suspicious. In any case, to try your luck, the organizers ask you to register your e-mail address. The scammers just need your e-mail address to get started The next step opens a website bearing the Amazon logo, although with a URL that looks nothing like amazon.com. The page ramps up the phishing pressure, saying you’re one of ten lucky visitors who can win the coveted console this week, but you have to act in the next minute and 18 seconds — just enough time to complete the short survey and enter the drawing. This, of course, is another example of a pretty effective phishing tactic: Ramp up the pressure with an artificial time constraint and people will panic and rush instead of slowing down to apply critical thinking. The clock is ticking! Wheel of Fortune If you complete the survey and check the rest of the boxes, a dozen identical gift boxes appear on the screen, one of which is the winner. Spoiler alert: You win the prize! Can’t believe your good luck? Well, below are fake reviews from past “winners” to stoke your excitement and keep your vigilance nice and low. Positive reviews promote the scam Now comes the catch. A payment of £1 (one pound sterling — around $1.40 at the time of writing) is required to claim the prize. The organizers give no reason for the payment — but in comparison with the price of the console, it’s peanuts. In addition, they promise to cover all postage costs and deliver the shiny PS5 in just one week. You won! Now pay Next comes a request for address, ZIP code, phone number, and (again) e-mail, most of which makes perfect sense in the context of arranging prize delivery. However, at this point, the required payment jumps from £1 to £1.78; again, with no explanation. The payment magically increases from £1 to £1.78 The last step is to provide your banking details. The princely sum of £1.78 won’t make the cybercriminals rich, but your card details — in particular the CVV2/CVC2 code — might. One last step to giving the scammers your money Keep a cool head To avoid such pitfalls, don’t believe the hype. If you receive a tempting offer, keep your head, and always follow these simple guidelines to help guard against phishing: Check information about giveaways and other promos on the organizer’s website; Do not follow links in e-mails. Instead, enter the URL manually if you know it, or use a search engine to get there (after making sure the link is not an ad); Be very wary if getting a prize requires paying a fee, even if the amount is small. You risk losing more than just the amount requested; Guard your personal data carefully, and if you have any doubts about a website, do not enter your contact details on it; Use a reliable security solution that warns you when you are about to visit a fraudulent website.
In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. The post Episode 207: Sara Tatsis of Blackberry on finding and show more ...
Keeping Women in Cyber...Read the whole entry... » Related StoriesEncore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent PipelineEpisode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber RiskEpisode 203: Don’t Hack The Water and Black Girls Hack Founder Tennisha Martin
In this week’s episode of the podcast (#207) we speak with Sara Tatsis of the firm Blackberry about her 20 year career at the legendary mobile device maker and the myriad challenges attracting women to- and keeping them in the information security field. The post Episode 207: Sarah Tatsis of BlackBerry on finding show more ...
and Keeping Women in Cyber...Read the whole entry... » Related StoriesEncore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent PipelineEpisode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber RiskEpisode 203: Don’t Hack The Water and Black Girls Hack Founder Tennisha Martin
Distribution systems’ vulnerability is increasing due to their industrial control systems, which have increasingly been incorporating remote access. This can give bad actors access to them.
An authenticated remote code execution (RCE) vulnerability was discovered in WP Super Cache that could allow an adversary to upload and execute malicious code to gain control of the site.
The keys, which can clip onto a keychain and plug into a mobile device, are intended to serve as two-factor authentication method to make it much more difficult for hackers to gain access to accounts.
In June 2020, the trend of moving away from their typical infection chain continued, and INDRIK SPIDER began using fake browser updates to deliver the Cobalt Strike red-teaming tool.
Some surgeries were canceled at Eastern Health facilities in Victoria, following a "cyber incident" late Tuesday. Eastern Health said it took many of its systems offline in response to the incident.
Line, which has 186 million users worldwide - of which just under half are in Japan - has since blocked access to user data at the Chinese affiliate, the company spokesman said.
A pair of critical vulnerabilities in a popular bulletin board software called MyBB could have been chained together to achieve remote code execution (RCE) without access to a privileged account.
Cylera announced the company secured $10 million in Series A funding, led by Concord Health Partners and Maverick Ventures. This brings the company’s total funding to $17 million.
The tax season is now upon us and as US residents file their returns ahead of a deadline in April, this is also a prime time for cybercriminals to launch campaigns tailored to take advantage of it.
VMware on Thursday announced it plans to acquire Mesh7, a company that secures cloud-native applications and miroservices by monitoring application behavior at the API layer.
Researchers from cybersecurity firm SentinelOne have discovered a malicious version of the legitimate iOS TabBarInteraction Xcode project being distributed in a supply-chain attack.
The Copperstealer malware attempts to steal the account passwords to Facebook, Instagram, Google, and other sites, according to Proofpoint. Stolen passwords are used to run malicious ads for profit.
Fiserv, a multi-billion-dollar cybersecurity tech provider for financial institutions, forgot to buy the domain used as a default in their systems’ email communications, according to a report.
One interesting technique researchers have come across in recent months leverages the Telegram API to exfiltrate stolen data and send it in a private message to a bot under the attacker's control.
Russian national Egor Igorevich Kriuchkov has pleaded guilty to recruiting a Tesla employee to plant malware designed to steal data within the network of Tesla's Nevada Gigafactory.
Disguised as the (non-existent) Android version of the invitation-only audio chat app, the malicious package is served from a website that has the look and feel of the genuine Clubhouse website.
CISA Hunt and Incident Response Program (CHIRP), the new forensics collection tool, is a Python-based tool that helps detect SolarWinds malicious activity IOCs on Windows operating systems.
A sophisticated and highly targeted Microsoft Office 365 phishing campaign is being aimed at C-suite executives, executive assistants, and financial departments across numerous industries.
The company is announcing it has raised $18 million at Series A, led by Kleiner Perkins and with participation from Gradient Ventures and Base10 Partners, which led its $4.5 million seed round.
Police in Wales have issued a warning to residents about a new phone scam, in which fraudsters are impersonating Tesco, telling them an order has been placed and that ~$487 will be debited.
A glitch in the current version of Zoom could inadvertently leak users’ data to other meeting participants on a call. However, the data is only leaked briefly, making a potential attack difficult.
Security researchers at Avast have discovered that more than 30 hacker groups have been using a malware crypter dubbed OnionCrypter to use encryption and obfuscation to make detection more difficult.
Researchers from Sucuri recently discovered a tactic, practiced by Magecart groups, to hide malicious activity by saving stolen credit card data into a JPEG file.
Google released a Proof-of-Concept on Spectre side-channel vulnerability for web app developers, highlighting the importance of deploying application-level mitigations to stay secure.
Victimizing at least nine organizations across Africa, Europe, Mexico, and the U.S in the past two weeks, the REvil gang is probably showing off its Gootloader malware loader.
The ransomware gang announced they had breached Acer and shared some images of allegedly stolen files as proof, including financial spreadsheets, bank balances, and bank communications.
According to a report published on March 16 by PrivacySavvy, many travel companies expose users’ data through their booking apps which could impact up to 105 million users.
Attackers are mimicking the names of existing packages on public registries in hopes that users or developers will accidentally download these malicious packages instead of legitimate ones.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers an insufficient session expiration. This occurs when the web application permits an attacker to reuse old session credentials or session IDs for authorization. Insufficient session expiration increases the device's exposure to attacks that can steal or reuse user's session identifiers.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from a privilege escalation vulnerability. The non-privileged default user (user:user123) can elevate his/her privileges by sending a HTTP GET request to the configuration export endpoint and disclose the admin password. Once authenticated as admin, an attacker will be granted access to the additional and privileged pages.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 is susceptible to an unauthenticated configuration disclosure when direct object reference is made to the export_settings.cgi file using an HTTP GET request. This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 allows unauthenticated attackers to restart the device with an HTTP GET request to /goform/RestartDevice page.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 allows unauthenticated attackers to visit the unprotected /goform/LoadDefaultSettings endpoint and reset the device to its factory default settings. Once the GET request is made, the device will reboot with its default settings allowing the attacker to bypass authentication and take full control of the system.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 has an unprotected web management server that is vulnerable to sensitive information disclosure vulnerability. An unauthenticated attacker can visit the syslog page and disclose the webserver's log file containing system information running on the device.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 has several backdoors and hidden pages that allow for remote code execution, overwriting of the bootrom, and enabling debug mode.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 utilizes hard-coded credentials within its Linux distribution image. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the router.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from an authentication bypass vulnerability. An unauthenticated attacker can disclose sensitive and clear-text information resulting in authentication bypass by downloading the configuration of the device and revealing the admin password.
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the pingAddr HTTP POST parameter bypassing the injection protection filter.
A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of NT AUTHORITYSYSTEM. The flaw exists in how the WndExtra field of a window can be manipulated into being treated as an offset despite being populated by an attacker-controlled value. This can be leveraged to achieve an out of bounds write operation, eventually leading to privilege escalation.
This Metasploit module exploits an unauthenticated log file upload within the log_upload_wsgi.py file of VMWare View Planner 4.6 prior to 4.6 Security Patch 1. Successful exploitation will result in remote code execution as the apache user inside the appacheServer Docker container.
The web control panel SOYAL Biometric Access Control System version 5.0 uses a weak set of default administrative credentials (no password) that can be easily guessed in remote password attacks.
The controller in SOYAL Biometric Access Control System version 5.0 suffers from a cleartext transmission of sensitive information. This allows interception of the HTTP traffic and disclose the Master code and the Arming code via a man-in-the-middle attack. An attacker can obtain these codes to enter into the controller's Programming mode and bypass physical security controls in place.
Ubuntu Security Notice 4882-1 - It was discovered that the Ruby JSON gem incorrectly handled certain JSON files. If a user or automated system were tricked into parsing a specially crafted JSON file, a remote attacker could use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu show more ...
18.04 LTS. It was discovered that Ruby incorrectly handled certain socket memory operations. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Various other issues were also addressed.
Red Hat Security Advisory 2021-0940-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
Cybersecurity researchers on Thursday disclosed a new attack wherein threat actors are leveraging Xcode as an attack vector to compromise Apple platform developers with a backdoor, adding to a growing trend that involves targeting developers and researchers with malicious attacks. Dubbed "XcodeSpy," the trojanized Xcode project is a tainted version of a legitimate, open-source project available
A newly discovered glitch in Zoom's screen sharing feature can accidentally leak sensitive information to other attendees in a call, according to the latest findings. Tracked as CVE-2021-28133, the unpatched security vulnerability makes it possible to reveal contents of applications that are not shared, but only briefly, thereby making it harder to exploit it in the wild. It's worth pointing out
The U.S. Department of Justice yesterday announced updates on two separate cases involving cyberattacks—a Swiss hacktivist and a Russian hacker who planned to plant malware in the Tesla company. A Swiss hacker who was involved in the intrusion of cloud-based surveillance firm Verkada and exposed camera footage from its customers was charged by the U.S. Department of Justice (DoJ) on Thursday
The hacker who claimed responsibility for breaching the live video streams of 150,000 CCTV cameras at police departments, hospitals, and well-known businesses has been charged by the US Department of Justice with hacking more than 100 companies. Read more in my article on the Hot for Security blog.