Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for It Takes an Average  ...

 Security

According to a new WhiteHat Security research, more than 66% of all utility programs had at least one exploitable vulnerability exposed on a yearly basis. Many of these vulnerabilities are "pedestrian," meaning they require little effort or skill to discover. The report, titled AppSec Stats Flash, shows that   show more ...

utility companies have the widest exposure in their applications vulnerabilities. This underscores an issue that made national headlines last week, namely that more than 50,000 water treatment plants in the United States lack adequate cybersecurity.   In addition to an attack on a Florida water treatment plant earlier this year, the study revealed that there had been lots of unreported attacks on utility companies.  According to Setu Kulkarni, vice president of WhiteHat Security, more than 66% of apps in the manufacturing business had a 365-day window of exposure. In... (read more)

image for New ChaChi Trojan Ta ...

 Security

BlackBerry Threat Research and Intelligence revealed Wednesday that a new ChaChi Trojan is being used as a critical component in executing ransomware operations against government organizations and U.S. schools, says ZDNet.  The original version of the Remote Access Trojan (RAT), identified in the first half of 2020,   show more ...

was linked to cyberattacks against French local governments, as listed in the Compromise Indicators (IoC) report from CERT France. The FBI has previously warned of a considerate rise in PYSA attacks on schools, both in the United Kingdom and the United States.  The new ChaChi has evolved from the earlier variant, that had drawbacks such as poor obfuscation and low-level capabilities. The new malware type is capable of performing traditional RAT actions such as data exfiltration, backdoor creation, and credential dumping from the Wi... (read more)

image for New Ransomware Uses  ...

 Security

Cybercriminals are running more and more malicious payloads via Virtual Machines, according to Symantec Threat Hunter Team. Help Net Security investigated an attempted ransomware attack that was executed via a VirtualBox Virtual Machine created on some compromised computers. Unlike the documented RagnarLocker attacks   show more ...

using Virtual Machines with Windows XP, the new threat seems to be running Windows 7. Moreover, according to Dick O'Brien of the Symantec Threat Hunter Team, the VM was deployed via a malicious executable that was pre-installed during the reconnaissance and lateral movement phases of operations.  So far, the researchers were unable to determine whether the payload in the VM was Mount Locker or Conti ransomware. The later ... (read more)

image for Cybercriminal Are No ...

 Security

As ransomware attacks have become more sophisticated, Microsoft cybersecurity researchers are now on the hunt for BazarCall, cybercriminal call centers that manage to spread BazarLoader malware, according to ZDNet. BacarCall, also known as Bazacall, is a cybercriminal gang that has been active since January this year.   show more ...

Their way of tricking victims is different from other cybercrime groups as they use call center operators to do so. The attack typically starts with phishing e-mails telling the victim that a subscription has expired and that a monthly fee is charged automatically unless a number is called to cancel the trial subscription.  Brad Duncan from Palo Alto Networks explained the gang's attack method in a blog post: "After a client is infected, criminals use this backdoor access to send follow-up malware... (read more)

image for Cybersecurity in Mid ...

 Special Projects

A couple of years ago, we reviewed the “Ring of Power” botnet created by famous cybercriminal Sauron (aka Annatar, aka Mairon, aka Necromancer). However, reports by famous cybersecurity expert J. R. R. Tolkien contain much more than just descriptions of the botnet’s modules. For example, Tolkien   show more ...

frequently returns to information technology and security systems in discussions of the various races of Middle-earth. In particular, he describes several dwarven systems in detail. The “Doors of Durin” backdoor In the time of The Lord of the Rings, the ancient dwarven stronghold of Moria is deeply under the control of Evil. At some point, the dwarves became obsessed with mining Mithril (obviously a local cryptocurrency), let their guard down, and accidently unzipped and launched an ancient rootkit named Balrog. The rootkit, a part of an APT campaign, had remained in the depths under the mountains since the time of Melkor, a famous hacker and former leader of the group in which the abovementioned Sauron started his criminal career. The group may also have had some interest in Mithril (the Balrog rootkit and the dwarven mining operation didn’t end up in the same place by coincidence), but that’s not explicitly mentioned. Anyway, dwarves built every bit of Moria’s infrastructure, including the western backdoor called Durin’s Door, also known as the Elven Gate. But after years of abandonment, no one remembered the password that granted access through the gate. Tolkien presented the process of Durin’s Door opening humorously: Gandalf, having arrived at the gates with the Fellowship of the Ring, reads the inscription, “Speak, friend, and enter.” Naturally, the password is friend. In other words, the dwarves made the same mistake as many modern office workers do, and left a sticky note with the password right on the computer. The password strength is barely worth a sneer; imagine how well that would stand up to a simple brute-force attack. It is especially funny that the inscription tells us exactly who screwed up: “I, Narvi, made them. Celebrimbor of Hollin drew these signs.” In other words, the inscription contains not only the password but also a couple of logins that clearly belong to privileged users. Many people use the same passwords for accounts in different systems, and one can assume the practice is not alien to other races. It’s likely someone could use these logins and password for deeper penetration into Moria’s systems. It is not clear who made the mistake — dwarf developers or the Celebrimbor, a user — after all, the “doors”­ were made for trade and cooperation between dwarves and elves. I lean toward the second version; dwarves tend to have much better security practices. Steganography in a Thrór’s Map Tolkien describes one interesting example of dwarven defense technology implementation in The Hobbit: When advanced persistent threat Smaug infected and overtook Erebor (Lonely Mountain), he forced the dwarves to flee their homes (again). Thror, king of the Durin Folk, left his descendants a map with instructions for accessing Erebor’s systems through the backdoor (literally called the Back Door). He hoped that one day a team of security experts could eradicate the dragon infestation. The map’s implementation is very interesting from a cybersecurity point of view. Thror wrote the instructions to gain access to the backdoor on the map, but to keep it secret he not only used Angerthas Erebor (and the dwarves were very reluctant to share their language even with allies), but also used the extremely complex moon-letters method for the inscription. This dwarven technology allows writers to inscribe secret text visible only in the light of the moon — and not only the moon in general, but the moon either in the same phase as on the day of writing, or at the same time of the year. In other words, Thror used some form of steganography, placing secret information on a picture so as to make it not only unreadable but also undetectable to outsiders. The Lonely Mountain backdoor The Back Door’s protection mechanism is no less interesting. To open it, you need a “curious silver key with a long barrel and intricate wards.” However, according to instructions from Thror’s map, the timing is also key: “Stand by the grey stone when the thrush knocks, and the setting sun with the last light of Durin’s Day will shine upon the key-hole.” How the dwarves implemented the thrush part of the technology is unknown — Tolkien didn’t go into the details of the biotech — but what we have here is multifactor authentication, and cleverly implemented at that. Indeed, on Durin’s Day, in the evening, the thrush knocked, the last ray of sunset touched the door, and a fragment of stone broke off, revealing the keyhole. In this case, the calendar was an additional security factor; on the wrong day, even having the key wouldn’t have helped . Alas, Tolkien did not describe the mechanism for returning the breakaway piece to the door. Maybe the thrush took care of that part.   Of course, Tolkien allegorically depicted many more cybersecurity and information technologies in his books. As readers rightly pointed out after the first part, analyzing the telecommunication protocol of the infamous palantirs would also be interesting. Unfortunately, the professor did not leave detailed instructions, and scraps of information from his published drafts leave us with more questions than answers. Nevertheless, we will try to talk about them in an upcoming post on elvish IT.

image for Transatlantic Cable  ...

 News

Welcome to the 207th edition of the Kaspersky Transatlantic Cable podcast! This week, Dave, Ahmed, and I chat about a number of topics — and we also have some changes to our big board of quiz points. We kick things off with a pair of stories about AI and surveillance. The first is from the UK, where AI can now tell   show more ...

authorities if people were adhering to social distancing guidelines. The next is about a Chinese company using smile recognition for employees entering the office. Smile for the camera. After a short break for a tip from Ahmed, we’re on to the first round of the week’s quiz game. I won’t spoil it here, but let’s just say there is a bit of a shocker. Following the fun, we get back to business, discussing recent APT activity from the Persian-speaking Ferocious Kitten group with researchers Mark Lechtik and Aseel Kayal. After the interview, we look at the insecurity of America’s water facilities before wrapping up with a discussion of consent and the COVID-19 app in Massachusetts. If you liked what you heard, please consider subscribing and sharing with your friends. For more information on the stories we covered, see the links below: AI cameras introduced in London to monitor social distancing and lockdown restrictions Canon put AI cameras in its Chinese offices that only let smiling workers inside 50,000 security disasters waiting to happen: The problem of America’s water supplies Google force installs Massachusetts MassNotify Android COVID app

image for Episode 218: Denial  ...

 Agriculture

Forget about Colonial Pipeline and JBS. A coordinated cyber attack on U.S. agriculture could, in short order, lead to foot shortages and hunger in the U.S. and abroad. And history has shown us that when food gets scarce, things get ugly - fast. How likely is such an attack? More likely than you might think, says Rob   show more ...

Wood of NCC Group, our guest on...Read the whole entry... » Related StoriesEpisode 214: Darkside Down: What The Colonial Attack Means For The Future of RansomwareDeere John: Researcher Warns Ag Giant’s Site Provides a Map to Customers, EquipmentEpisode 217: What Fighting Pirates Teaches Us About Ransomware

 Malware and Vulnerabilities

In mid-March 2021, Kaspersky researchers observed two new spam campaigns. The messages in both cases were written in English and contained ZIP attachments or links to ZIP files.

 Trends, Reports, Analysis

Manufacturers are still pelted by cyberattacks left, right, and center. A survey published by Morphisec has found that one in five manufacturing companies in the sector has been compromised in a cyber incident. 

 Malware and Vulnerabilities

Experts analyzed a Linux version of the DarkSide ransomware, the group responsible for the Colonial Pipeline attack, and claimed that it targeted VMware virtual machines. Though DarkSide has purportedly shut down its operations, organizations are recommended to implement adequate security measures to stay protected against ransomware infections.

 Feed

This Metasploit module allows an attacker with a privileged rConfig account to start a reverse shell due to an arbitrary file upload vulnerability in /lib/crud/vendors.crud.php.

 Feed

Ubuntu Security Notice 5004-1 - It was discovered that RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 16.04 ESM and Ubuntu 18.04 LTS. Jonathan Knudsen discovered RabbitMQ incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service.

 Feed

Red Hat Security Advisory 2021-2543-01 - Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project, tailored for installation into an on-premise OpenShift Container Platform installation. Issues addressed include code execution and denial of service vulnerabilities.

 Feed

Controversial mogul and antivirus pioneer John McAfee on Wednesday died by suicide in a jail cell in Barcelona, hours after reports that he would be extradited to face federal charges in the U.S. McAfee was 75. He is said to have died by hanging "as his nine months in prison brought him to despair," according to McAfee's lawyer Javier Villalba, Reuters reported. Security personnel at the Brians

 Feed

VMware has rolled out security updates to resolve a critical flaw affecting Carbon Black App Control that could be exploited to bypass authentication and take control of vulnerable systems. The vulnerability, identified as CVE-2021-21998, is rated 9.4 out of 10 in severity by the industry-standard Common Vulnerability Scoring System (CVSS) and affects App Control (AppC) versions 8.0.x, 8.1.x,

 Feed

Cybersecurity researchers on Thursday disclosed a chain of vulnerabilities affecting the BIOSConnect feature within Dell Client BIOS that could be abused by a privileged network adversary to gain arbitrary code execution at the BIOS/UEFI level of the affected device. "As the attacker has the ability to remotely execute code in the pre-boot environment, this can be used to subvert the operating

 Feed

Enterprise applications used to live securely in data centers and office employees connected to internal networks using company-managed laptops or desktops. And data was encircled by a walled perimeter to keep everything safe. All that changed in the last 18 months. Businesses and employees had to adapt quickly to cloud technology and remote work. The cloud gave businesses the agility to respond

 Feed

Cybersecurity researchers on Wednesday disclosed critical flaws in the Atlassian project and software development platform that could be exploited to take over an account and control some of the apps connected through its single sign-on (SSO) capability. "With just one click, an attacker could have used the flaws to get access to Atlassian's publish Jira system and get sensitive information,

 Law & order

We take a look at why Peloton is being accused of ransomware-like behaviour, how one man lost $250,000 in a romance scam, and how a chap called Weiner has found himself in a political pickle. All this and much more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer   show more ...

security veterans Graham Cluley and Carole Theriault, joined this week by Host Unknown's Andrew Agnês.

2021-06
Aggregator history
Thursday, June 24
TUE
WED
THU
FRI
SAT
SUN
MON
JuneJulyAugust