Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for What is a browser-in ...

 Threats

In their relentless pursuit of folks credentials, secret keys and other valuable information, cybercriminals are continually inventing new ways to deceive users. Its worth noting that normally, no matter how sophisticated these schemes become, theyre all aimed at users who drop their guard. If you just pay close   show more ...

attention to a few details — first and foremost, the address of the website where youre being asked to enter your credentials — you wont be a phishing victim. At least, thats almost always the case. But today we want to tell you about an attack that works differently, with the URL looking correct and safe to the victim. Lets walk through it. Why are there errors in the addresses of phishing sites? Every domain address that you see in the address bar is unique and always assigned to its owner. If someone wants to create a website, they first need to contact a special organization that registers domain names. Theyll check an international database to make sure the address isnt already taken. If its available, it gets assigned to the applicant. This means that its impossible to register a fake website with the same address as a real website. However, it is quite possible to create a domain thats very similar to someone elses by choosing a similar domain zone: for example, Colombia (.co) instead of Canada (.ca). But if you look closely at the address, thats easy to spot. This is why instead of registering domains, sophisticated minds came up with the idea to simulate a browser window with a trusted sites address appearing on a page. What is a browser-in-the-browser attack? This type of attack, which has come to be known as a browser-in-the-browser attack was described by an infosec researcher and pentester going by the handle mr.d0x. He noticed that modern means of creating websites (HTML, CSS, and JavaScript tools) have become so advanced they can display practically anything on the page: from fields of any color or shape, to animation that imitates the moving components of the interface. This means that a phisher can also use them to simulate a full-fledged page from a different service inside their own website. For the experiment, mr.d0x looked at pop-up login windows. Youve probably seen them: they appear when you choose an option like Sign in with Google or Continue with Apple instead of creating an account on a website. This option is convenient because you dont need to come up with and remember a new password or wait for confirmation links or codes. Also, this sign-up method is rather safe. When you push the Sign in with button, it opens the page of the relevant service on which you enter your credentials, and the website youre logging in to with this option never receives the password, not even temporarily. This is what a real login window for a third-party service looks like Enter a browser-in-the-browser attack. It works like this: The cybercriminals register a website using the classic phishing technique of making a clone of a legitimate website. Alternatively, they could choose an attractive address and content that may lure victims — such as shopping deals, job opportunities, or news a user might want to comment on. The criminals set things up so that visitors need to sign in if they want to buy something, comment, or access other features that interest them. Then the malefactors add buttons that supposedly permit logging in through the legitimate services they want to harvest passwords from. If victims click on such a button, theyll see a login window theyre familiar with, such as a Microsoft, Google, or Apple prompt, with the correct address, logo, and input fields — in short, all the components of the interface theyre used to seeing. The window can even display correct addresses when users hover the mouse over the Log in button and Forgot password link. The catch is that this isnt actually a separate window — this marvel of deception is scripted to appear right on the page that is trying to trick the user. If you enter your credentials in this window, they wont go to Microsoft, Google, or Apple, but rather straight to the cybercriminals server. Here you can see what this may look like. How can you tell if the login window is fake? Although theres nothing about the bogus login window that looks obviously fake, there are ways to identify it as such. Real login windows are browser windows, and they act that way. You can maximize and minimize them and move them anywhere on the screen. Fake pop-ups are bound to the page where theyre located. They can also move freely and cover buttons and images, but only inside their boundaries — that is, within the browser window. They cannot go outside it. That difference should help you spot them. To check whether the login form on your screen is fake, try the following: Minimize the browser window the form popped up from. If the login form that is supposed to be in a separate window vanishes too, then its fake. A real window should stay on the screen. Attempt to move the login window beyond the parent window border. A real window will easily cross over; a fake one will get stuck. If the window with the login form behaves oddly — it minimizes with the other window, stops under the address bar, or disappears under it — it is fake, and you should not enter your credentials. Is there an easier way to protect myself? The attack is not as dangerous as it might seem at first glance. Although its quite hard for humans to spot a browser-in-the-browser attack, your computer can help you. No matter what is scripted on a dangerous site, the real address remains the same, and thats what matters to a security solution. Make sure to use a password manager for all your accounts. It verifies the pages real address, and it will never enter your credentials into the fields of an unknown site, no matter how legitimate it may look. Install a robust security solution with an anti-phishing module. This solution also verifies the URL for you and will warn you immediately if a page is dangerous. And of course, remember to use two-factor authentication. Enable it wherever you have the option to do so, including on all social networks. Then, even if attackers steal your credentials, they wont be able to access your account without a one-time code, which will be sent to you, not them. If you want more powerful protection for your extra valuable accounts, we recommend that you use U2F hardware tokens (the best known example being YubiKey). This system checks not only a websites address but also if it knows the encryption key. As a result, it is impossible to make it through such an authentication system even if the original site and its twin look identical.

 Malware and Vulnerabilities

A large-scale Monero cryptomining campaign has been targeting Docker APIs on Linux servers. The attacks are launched from the LemonDuck botnet targeting misconfigured Docker systems.

 Incident Response, Learnings

An American respiratory care provider is facing multiple lawsuits over a data breach that allegedly exposed the personal information of more than 300,000 current and former patients.

 Malware and Vulnerabilities

It employs two distinctive anti-analysis techniques. The first is API function hashing, a known trick to obfuscate which functions are called. The second is an opaque predicate, a technique used for control flow obfuscation.

 Trends, Reports, Analysis

In the wake of the digital transformation wave, web APIs have experienced exponential growth as the rise of integrated web and mobile-based offerings requires significantly more data sharing across products.

 Incident Response, Learnings

The U.S. Treasury Department last week tied the North Korean hacking group, Lazarus, to the theft of more than $600 million in cryptocurrency from the Ronin software bridge, which is used by players of Axie Infinity to transfer crypto.

 Malware and Vulnerabilities

Stairwell assesses with medium-high confidence that GOLDBACKDOOR is the successor of, or used in parallel with, the malware BLUELIGHT, attributed to APT37 / Ricochet Chollima.

 Trends, Reports, Analysis

The UK’s education sector continues to be hit by spiraling ransomware attacks, which can cost affected organizations in excess of £2m (~$2.54m) per incident, according to a new Jisc report.

 Trends, Reports, Analysis

Attackers are quick to zero in on zero-days these days. Google’s Project Zero tracked 58 zero-day exploits last year, implying that this is the highest number of zero-days detected.

 Feed

The U.S. Federal Bureau of Investigation (FBI) is sounding the alarm on the BlackCat ransomware-as-a-service (RaaS), which it said victimized at least 60 entities worldwide between as of March 2022 since its emergence last November. Also called ALPHV and Noberus, the ransomware is notable for being the first-ever malware written in the Rust programming language that's known to be memory safe and

 Feed

A new variant of an IoT botnet called BotenaGo has emerged in the wild, specifically singling out Lilin security camera DVR devices to infect them with Mirai malware. Dubbed "Lilin Scanner" by Nozomi Networks, the latest version is designed to exploit a two-year-old critical command injection vulnerability in the DVR firmware that was patched by the Taiwanese company in February 2020. <!-

 Feed

A security vulnerability has been disclosed in the web version of the Ever Surf wallet that, if successfully weaponized, could allow an attacker to gain full control over a victim's wallet. "By exploiting the vulnerability, it's possible to decrypt the private keys and seed phrases that are stored in the browser's local storage," Israeli cybersecurity company Check Point said in a report shared

 Feed

Security researchers have disclosed a security vulnerability in the VirusTotal platform that could have been potentially weaponized to achieve remote code execution (RCE). The flaw, now patched, made it possible to "execute commands remotely within VirusTotal platform and gain access to its various scans capabilities," Cysource researchers Shai Alfasi and Marlon Fabiano da Silva said in a report

2022-04
Aggregator history
Monday, April 25
FRI
SAT
SUN
MON
TUE
WED
THU
AprilMayJune