Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for What is NoReboot and ...

 Threats

To be absolutely sure your phone isnt tracking you or listening in on any conversations, you might turn it off. It seems logical; that way, even if the phone is infected with serious spyware, it cant do anything. In addition, turning off or restarting a smartphone is one of the most reliable ways to fight such   show more ...

infections; in many cases, spyware lives only until the next reboot because it cannot gain a permanent foothold in the operating system. At the same time, the vulnerabilities that allow malware to work even after a reboot are rare and expensive to exploit. However, this tactic might not work forever. Researchers have come up with a technique to bypass it using a method they have named NoReboot. In essence, this attack is a fake restart. What is NoReboot, and how does the attack work? We want to note right off the bat that NoReboot is not a feature of any real spyware in use by attackers; rather, its a so-called proof of concept that researchers demonstrated under laboratory conditions. At this point it is hard to say whether the method will actually gain traction. For the demonstration, the researchers used an iPhone they infected beforehand. Unfortunately, they havent shared the technical details. Heres what happens in the demonstration: The spy malware, which transfers the image from the camera, runs on the iPhone; The user tries to shut off the phone the usual way, using the power and volume buttons; The malware takes control and shows a perfect fake instead of the standard iOS shutdown screen; After the user drags the power-off slider, which also looks perfectly normal, the smartphones screen goes dark and the phone no longer responds to any of the users actions; When the user presses the power button again, the malware displays a perfect replica of the iOS boot animation. During the entire process, the phone is continually transferring the image from the phones front camera to another device without the users knowledge. As is often the case, seeing is believing, and we recommend checking out the researchers video: How to protect yourself against NoReboot Again, at least for now NoReboot is only a demonstration of the feasibility of an attack. The attack is alarming, to be sure, but dont forget that malware needs to get onto a smartphone before it can do any damage. Here are some tips to help you prevent that from happening: Keep in mind that its much harder for attackers to infect a smartphone remotely than if they have physical access to it. Be careful not to let someone else get hold of your smartphone — especially for a long period of time — and install a reliable device lock. People most often install malware on their smartphones on their own, voluntarily. Be careful about what you download and avoid installing unnecessary apps — that is, those you can easily live without — as a general rule. Dont root or jailbreak your smartphone (at least if you havent been using *nix systems for many years). Superuser rights make malwares work exponentially easier. If you have an Android device, we recommend installing an antivirus solution — to block Trojans from penetrating the system. Let your smartphone die a natural death from time to time — that is, wait for the charge to run out completely. The phone will then most certainly restart without any fakes, and theres an excellent chance that spies will disappear from the system. You can speed up the process by using a resource-hungry app, such as a game or benchmark-test utility.

 Trends, Reports, Analysis

Phishing designed to obtain credentials for retail brands or markets can contain very different stages compared to phishing designed to obtain online banking or credit card information from victims.

 Malware and Vulnerabilities

The Malsmoke hacking group attacked over 2,100 victims worldwide in a new Zloader campaign by abusing a bug in Microsoft’s e-signature verification tool. Though it couldn't be confirmed, experts believe the group uses spear-phishing emails or pirated software resources to infect victims. Such attacks seem to be highly targeted in nature and may cause severe damage.

 Feed

haveged is a daemon that feeds the /dev/random pool on Linux using an adaptation of the HArdware Volatile Entropy Gathering and Expansion algorithm invented at IRISA. The algorithm is self-tuning on machines with cpuid support, and has been tested in both 32-bit and 64-bit environments. The tarball uses the GNU build mechanism, and includes self test targets and a spec file for those who want to build an RPM.

 Feed

Ubuntu Security Notice 5212-2 - USN-5212-1 fixed several vulnerabilities in Apache. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that the Apache HTTP Server incorrectly handled certain forward proxy requests. A remote attacker could use this issue to cause   show more ...

the server to crash, resulting in a denial of service, or possibly perform a Server Side Request Forgery attack.

 Feed

Threat hunters have shed light on the tactics, techniques, and procedures embraced by an Indian-origin hacking group called Patchwork as part of a renewed campaign that commenced in late November 2021, targeting Pakistani government entities and individuals with a research focus on molecular medicine and biological science. "Ironically, all the information we gathered was possible thanks to the

 Feed

A study of 16 different Uniform Resource Locator (URL) parsing libraries has unearthed inconsistencies and confusions that could be exploited to bypass validations and open the door to a wide range of attack vectors. In a deep-dive analysis jointly conducted by cybersecurity firms Claroty  and Synk, eight security vulnerabilities were identified in as many third-party libraries written in C,

 Feed

New research into the infrastructure behind an emerging DDoS botnet named Abcbot has uncovered links with a cryptocurrency-mining botnet attack that came to light in December 2020. Attacks involving Abcbot, first disclosed by Qihoo 360's Netlab security team in November 2021, are triggered via a malicious shell script that targets insecure cloud instances operated by cloud service providers such

 Feed only

Graham Cluley Security News is sponsored this week by the folks at HYPR. Thanks to the great team there for their support! A new guide by the analysts at The Cyber Hut looks at how Zero Trust increases business agility and provides practical guidance for eliminating passwords to accelerate your Zero Trust strategy.   show more ...

Passwordless MFA … Continue reading "Free guide: “A Journey to Zero Trust With Zero Passwords”"

2022-01
Aggregator history
Monday, January 10
SAT
SUN
MON
TUE
WED
THU
FRI
JanuaryFebruaryMarch