Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Unwanted Bot Traffic ...

 Security

More and more businesses are infiltrated by malicious and increasingly difficult to detect bots, according to Cybernews. This is particularly affecting retailers who had to expand their online presence to meet the needs of their customers. According to Netacea, a company that specializes in detecting and mitigating   show more ...

bot activity on websites, approximately 500 businesses based in the United States and the United Kingdom from various industries, including travel, entertainment, e-commerce, financial services, and telecommunications, were evaluated. The businesses that took part in the poll had revenues ranging from $350 million to over $7 billion. Two-thirds of businesses realized their websites were attacked by automated bots. Approximately 46%... (read more)

image for Microsoft Warns of N ...

 Security

Following the patch released just two days ago, Microsoft disclosed another vulnerability in the Windows Print Spooler component, but promised to fix the problem future security update, according to The Hacker News.  Recently, the previously unknown vulnerability, identified as CVE-2021-36958, was added to the list   show more ...

of vulnerabilities known as PrintNightmare. The vulnerability was first discovered in December 2020 by Victor Mata from FusionX, Accenture Security.  Microsoft explained everything in a bulletin with a particular emphasis on the recently identified issue CVE-2021-34481. According to the company, a remote code execution vulnerabil... (read more)

image for Hackers Steal Over $ ...

 Security

In what is being referred to as one of the largest hacks in the digital asset business, threat actors stole $611 million in cryptocurrency from a blockchain-based banking network, according to The Hacker News. Cross-chain decentralized finance (DeFi) platform Poly Network publicly reported that unknown threat actors    show more ...

exploited a flaw in the system and grabbed a large number of digital tokens, including Ether. The exploited weakness enabled hackers to steal a massive quantity of cryptocurrency and was related to contract calls. The event is believed to be more serious than previous hacks at other cryptocurrency exchanges, like Mt. Gox and Coincheck. Security researchers at the company claim that the stolen funds were traded for MATIC, ETH, and other crypto coins, rather than remaining in their original form as Monero.  Poly Network's team notes that "The amo... (read more)

image for DBREACH: New Attack  ...

 Security

Infosecurity Magazine reports a new sort of database attack that may lead to data leakage and loss at the Black Hat US 2021 hybrid event on August 5. The attack is called DBREACH and it involves exfiltration and reconnaissance from databases using Adaptive Compression Heuristics.  A modern database can use   show more ...

compression and encryption together to save money on storage, according to Mathew Hogan. Although this may be advantageous in certain cases, there is also a risk of being exploited by a class of vulnerabilities known as side-channel attacks.  DBREACH attacks can be carried out in a variety of ways, says Hogan who explained their methods in an extensive presentation with 121 slides. In t... (read more)

image for New Anti Anti-Money  ...

 Web Fraud 2.0

A new dark web service is marketing to cybercriminals who are curious to see how their various cryptocurrency holdings and transactions may be linked to known criminal activity. Dubbed “Antinalysis,” the service purports to offer a glimpse into how one’s payment activity might be flagged by law   show more ...

enforcement agencies and private companies that try to link suspicious cryptocurrency transactions to real people. Sample provided by Antinalysis. “Worried about dirty funds in your BTC address? Come check out Antinalysis, the new address risk analyzer,” reads the service’s announcement, pointing to a link only accessible via Tor. “This service is dedicated to individuals that have the need to possess complete privacy on the blockchain, offering a perspective from the opponent’s point of view in order for the user to comprehend the possibility of his/her funds getting flagged down under autocratic illegal charges.” The ad continues: Some people might ask, why go into all that? Just cash out in XMR and be done with it. The problem is, cashing out in Monero raises eyebrows on exchanges and mail by cash method is sometimes risky as well. If you use BTC->XMR->BTC method, you’ll still get flagged down by our services labelled as high risk exchange (not to mention LE and exchanges). Our service provides you with a view from LE/exchange’s perspective of things (with similar accuracy, but quite different approach) that provides you with basic knowledge of how “clean” your address is.” Tom Robinson, co-founder of blockchain intelligence firm Elliptic, said Antinalysis is designed to help crypto money launderers test whether their funds will be identified as proceeds of crime by regulated financial exchanges. “Cryptoassets have become an important tool for cybercriminals,” Robinson wrote. “The likes of ransomware and darknet markets rely on payments being made in Bitcoin and other cryptocurrencies. However, laundering and cashing-out these proceeds is a major challenge.” Cryptocurrency exchanges make use of blockchain analytics tools, he said, to check customer deposits for links to illicit activity. By tracing a transaction back through the blockchain, these tools can identify whether the funds originated from a wallet associated with ransomware or any other criminal activity. “The launderer therefore risks being identified as a criminal and being reported to law enforcement whenever they send funds to a business using such a tool,” Robinson said. “Antinalysis seeks to help crypto launderers to avoid this, by giving them a preview of what a blockchain analytics tool will make of their bitcoin wallet and the funds it contains.” Each lookup at Antinalysis costs roughly USD $3, with a minimum $30 purchase. Other plans go as high as $6,000 for 5,000 requests. Robinson says the creator of Antinalysis is also one of the developers of Incognito Market, a darknet marketplace specializing in the sale of narcotics. “Incognito was launched in late 2020, and accepts payments in both Bitcoin and Monero, a cryptoasset offering heightened anonymity,” he wrote. “The launch of Antinalysis likely reflects the difficulties faced by the market and its vendors in cashing out their Bitcoin proceeds.” Elliptic wasn’t impressed with the quality of the intelligence provided by Antinalysis, saying it performs poorly on detecting links to major darknet markets and other criminal entities. But with countless criminals now making millions from ransomware, there is certainly a vast, untapped market for services that help those folks improve their operational security. “It is also significant because it makes blockchain analytics available to the public for the first time,” Robinson wrote. “To date, this type of analysis has been used primarily by regulated financial service providers.” That may not be entirely true. Nick Bax is an independent expert in tracing cryptocurrency transactions, and he said it appears Antinalysis may be little more than a clone of AMLBot, an anti- anti-money laundering intelligence service that first came online in 2019. AMLBot’s user interface. “It looks almost identical to the cheap version of AMLBot,” Bax told KrebsOnSecurity. “My guess is they’re just white-labeling that.” Bax said a lookup at AMLBot on the virtual currency address used in the sample provided by Antinalysis shows a near identical result. Here’s AMLBot’s result for the same crypto analysis performed by Antinalysis in the screenshot at the top of this story: AMLBot’s response for the same cryptocurrency address provided as an example by Antinalysis. “If you look at the breakdown the percentages are all almost identical,” Bax said. “I use AMLBot occasionally for good and righteous purposes. And it could also be useful for people who are just selling stuff online to make sure they aren’t receiving tainted funds.” Update, 1:42 p.m. ET: Corrected the story to note that AMLBot has been around since 2019. Update, 1:52 p.m. ET: Elliptic updated its blog post to confirm the connection between Antinanlysis and AMLBot, noting that AMLBot itself is a reseller of yet another service: “As first suggested in an article by Brian Krebs, we can now confirm that the results provided by Antinalysis are identical to those provided by AMLBot. It is therefore likely that Antinalysis makes use of the AMLBot API. AMLBot is itself a reseller for Crystal Blockchain, an analytics provider.”

 Trends, Reports, Analysis

While ransomware has been around for a long time, it has evolved over time as attackers have improved and refined their tactics. We have seen a shift away from random, speculative attacks.

 Trends, Reports, Analysis

Lack of awareness and knowledge gaps are a weak link for leadership who are responsible for strategic planning of cyber defenses, leaving organizations exposed to risks, a Ponemon survey reveals.

 Malware and Vulnerabilities

Researchers at Sucuri have discovered five backdoor methods to access Adobe's Magento e-commerce platform, potentially enabling capture of credit card details or administrator login credentials.

 Govt., Critical Infrastructure

The U.S. government needs to do more to protect critical infrastructure from attacks and create public-private partnerships to improve national security, the CSC notes in a report published Thursday.

 Companies to Watch

A boutique cybersecurity firm that provides the financial, health care and retail sectors with custom security services has been acquired by technology security firm GoVanguard.

 Malware and Vulnerabilities

SentinelOne warned against a new AdLoad malware variant that bypasses Apple's YARA signature-based XProtect built-in antivirus tech to infect macOS. Hundreds of unique samples of AdLoad adware were found circulating in the wild that remained undetected for almost ten months. Researchers emphasize the need for additional layers of security to protect Mac devices.

 Malware and Vulnerabilities

Palo Alto disclosed that a new eCh0raix variant is now capable of encrypting both QNAP and Synology Network-Attached Storage (NAS) devices. Therefore, researchers recommend updating device firmware as the first step of defense. Also, it is recommended to create complex passwords and limit connections to SOHO-connected devices.

 Trends, Reports, Analysis

A new malware named Chaos has been discovered on an underground forum claiming to be a ransomware but, an analysis by researchers suggests it is a wiper under development. It has been in development since June and could become a serious and dangerous threat for organizations in near future.

 Breaches and Incidents

The campaign, which began in early July, uses spoofed email addresses appearing to originate with legitimate customers of the manufacturers, signaling that it was the work of Aggah, researchers noted.

 Feed

Ubuntu Security Notice 5039-1 - Andy Nguyen discovered that the netfilter subsystem in the Linux kernel contained an out-of-bounds write in its setsockopt implementation. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5038-1 - It was discovered that the PostgresQL planner could create incorrect plans in certain circumstances. A remote attacker could use this issue to cause PostgreSQL to crash, resulting in a denial of service, or possibly obtain sensitive information from memory. This issue only affected   show more ...

Ubuntu 20.04 LTS and Ubuntu 21.04. It was discovered that PostgreSQL incorrectly handled certain SSL renegotiation ClientHello messages from clients. A remote attacker could possibly use this issue to cause PostgreSQL to crash, resulting in a denial of service. Various other issues were also addressed.

 Feed

RATES SYSTEM version 1.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Original discovery of SQL injection in this version is attributed to Halit Akaydin in August of 2021.

 Feed

Threat actors are actively carrying out opportunistic scanning and exploitation of Exchange servers using a new exploit chain leveraging a trio of flaws affecting on-premises installations, making them the latest set of bugs after ProxyLogon vulnerabilities were exploited en masse at the start of the year. The remote code execution flaws have been collectively dubbed "ProxyShell." At least

 Feed

Ransomware operators such as Magniber and Vice Society are actively exploiting vulnerabilities in Windows Print Spooler to compromise victims and spread laterally across a victim's network to deploy file-encrypting payloads on targeted systems. "Multiple, distinct threat actors view this vulnerability as attractive to use during their attacks and may indicate that this vulnerability will

 Feed

Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every 37 days on average, including relying on Morse code, in an attempt to cover their tracks and surreptitiously harvest user credentials. The phishing attacks take the form of invoice-themed lures mimicking financial-related

 Feed

The U.S. is presently combating two pandemics--coronavirus and ransomware attacks. Both have partially shut down parts of the economy. However, in the case of cybersecurity, lax security measures allow hackers to have an easy way to rake in millions. It's pretty simple for hackers to gain financially, using malicious software to access and encrypt data and hold it hostage until the victim pays

2021-08
Aggregator history
Friday, August 13
SUN
MON
TUE
WED
THU
FRI
SAT
AugustSeptemberOctober