Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 268 of the Transatlantic Cable kicks off with a rather bizarre (and thats putting it lightly) story about a chess master tournament, cheating and beads that go where the sun dont shine, so to speak. Lets just say if you want to learn more, check the link below. Following that bombshell, discussion returns to   show more ...

familiar ground, this time talking about the Grand Theft Auto VI hack and subsequent data breach. After all of that, David sat down with Evgenia Ponomareva from the Kaspersky Operating System team to talk about KOS and the automotive industry – specifically how KOS can integrate into the rapidly digitizing automotive market. To wrap up, they discussed how anti-vax groups are going underground and using carrot emojis in order to evade censorship. The final story looks at a hack of the IHG hotel chain and how the hackers ended up deploying a wiper for fun. If you liked what you heard, please do consider subscribing. Following Anal Bead Scandal, Chess Master Rematch Ends in Resignation GTA 6 source code and videos leaked after Rockstar Games hack Anti-vax groups use carrot emojis to hide Facebook posts IHG hack: Vindictive couple deleted hotel chain data for fun

image for The Harly Trojan sub ...

 Threats

Its common to find all sorts of malware lurking under what seem to be harmless apps on the official Google Play store. Unfortunately, even if the platform is policed carefully, moderators cant always catch these apps before theyre posted. One of the most popular variations of this kind of malware is Trojan   show more ...

subscribers, which sign up for paid services without the users knowledge. Weve previously written about the most common families of this kind of Trojans. Here well tell you about another. Its similar to the Jocker Trojan subscriber — thats why its called Harly, the (slightly altered) name of the sidekick of a well-known comic book villain. The two Trojans probably have common origins. The lowdown on Harly Trojans Since 2020 more than 190 apps infected with Harly have been found on Google Play. A conservative estimate of the number of downloads of these apps is 4.8 million, but the actual figure may be even higher. Examples of apps on Google Play that contain Harly malware Just like the Jocker Trojans, Trojans in the Harly family imitate legitimate apps. So how does it work? The scammers download ordinary apps from Google Play, insert malicious code into them, then upload them to Google Play under a different name. The apps may still have the features that are listed in the description, so the users may not even suspect a threat. More examples of apps on Google Play that contain Harly malware Most members of the Jocker family are multi-staged downloaders — they receive the payload from the scammers C&C servers. Trojans in the Harly family, on the other hand, contain the whole payload within the app and use different methods to decrypt and launch it. Reviews by users complaining about charges How Harly Trojan subscriber works Lets take as an example an app called com.binbin.flashlight (md5: 2cc9ab72f12baa8c0876c1bd6f8455e7), a flashlight app that has had more than 10,000 downloads from Google Play. An app infected with the Harly Trojan When the app is launched, a dodgy library is loaded: A dodgy library The library decrypts the file from the app resources. Decryption of a file from the app resources Interestingly, the malware creators learned how to use the Go and Rust languages, but for now their skills are limited to decrypting and loading the malicious SDK. Like other Trojans subscribers, Harly collects information about the users device, and particularly about the mobile network. The users phone switches to a mobile network and then the Trojan asks the C&C server to configure the list of subscriptions that must be signed up for. This particular Trojan works only with Thai operators, so first it checks the MNCs (mobile network codes) — the unique identifiers of network operators to make sure theyre Thai: Checking the MNCs However, as a test MNC it uses China Telecoms code — 46011. This and other clues suggest that the malware developers are located in China. Test MNC The Trojan opens the subscription address in an invisible window, and by injecting JS scripts enters the users phone number, taps the required buttons, and enters the confirmation code from a text message. The result is that the user gets a paid subscription without realizing it. Another notable feature of this Trojan is that it can subscribe not only when the process is protected by a text message code, but also when it is protected by a phone call: in this case the Trojan makes a call to specific number and confirms the subscription. Our products detect the harmful apps we have described here as Trojan.AndroidOS.Harly and Trojan.AndroidOS.Piom. How to protect yourself from Trojan subscribers The official app stores are continually combating the spread of malware but, as we see, theyre not always successful. Before you install an app, you should first read the user reviews and check its rating on Google Play. Of course, keep in mind that reviews and ratings may be inflated. To cover all your bases so you can avoid falling prey to this kind of malware, we recommend that you install a reliable security solution.

 Trends, Reports, Analysis

The FBI published an alert about threat actors targeting healthcare payment processors to transfer funds to their bank accounts. They have already stolen $4.6 million, this year alone. Between February and April, threat actors used a variety of techniques to steal $3.1 million. $700,000, and $840,000 from three different healthcare companies.

 Companies to Watch

The round was led by Craft Ventures with participation from Martin Casado, Frederic Kerrest, Anne Raimondi, Iman Abuzeid, and Dev Nag. The company intends to use the funds to accelerate product development, and continue to invest in its solution.

 Breaches and Incidents

Russian state-sponsored hacker group Sandworm appears to have been involved in targeting Ukrainian entities with malware by masquerading as telecommunication providers. In the attack campaign, attackers used domains pretending to belong to Ukrainian telecom companies Datagroup, Kyivstar, and EuroTransTelecom.

 Breaches and Incidents

The hackers who targeted the Los Angeles Unified School District have made a ransom demand, officials confirmed Tuesday, indicating that the attackers have extracted sensitive data or believe they can bluff the district into thinking that they have.

 Security Tips and Advice

The guidance emphasizes the need to add extra layers of security on top of passwords – such as multi-factor authentication (MFA), OAuth 2.0 or single sign-on, FIDO2, or one-time passcodes.

 Trends, Reports, Analysis

The findings from a new study underscore a convergence in security with networking, which IT decision-makers now view as the missing strategy that will improve security response, automate compliance tasks, and better manage processes and outcomes.

 Malware and Vulnerabilities

HelpSystems, the developer of Cobalt Strike, issued an out-of-band security update to address a cross-site scripting vulnerability in the popular penetration testing suite.

 Expert Blogs and Opinion

The lack of communication, along with many bad cybersecurity practices, undermines cybersecurity and data protection in Nigeria, and creates a severe lack of trust and capacity, says Confidence Staveley, executive director of Cybersafe Foundation.

 Malware and Vulnerabilities

The multi-stage malware attack chain hijacks the browser and redirects targets to advertising sites, for the threat actors to generate revenue from ad clicks and views. 

 Breaches and Incidents

Hackers are relentlessly targeting the gaming sector. In less than a month, hackers have carried out five major attacks on gamers and gaming platforms; 2K Games became the recent victim. The gaming industry has been a bastion for cyberattackers, owing to its exponential growth over the years, and it might be worth $326 billion by 2026. 

 Breaches and Incidents

MFA Fatigue is coming out as a new technique for cybercriminals excelling in social engineering attacks. They are targeting big firms to obtain corporate credentials. This method is turning out to be more successful as it does not need malware or phishing infrastructure.

 Feed

Various versions of Bitbucket Server and Data Center are vulnerable to an unauthenticated command injection vulnerability in multiple API endpoints. The /rest/api/latest/projects/{projectKey}/repos/{repositorySlug}/archive endpoint creates an archive of the repository, leveraging the git-archive command to do so.   show more ...

Supplying NULL bytes to the request enables the passing of additional arguments to the command, ultimately enabling execution of arbitrary commands.

 Feed

Ubuntu Security Notice 5628-1 - It was discovered that etcd incorrectly handled certain specially crafted WAL files. An attacker could possibly use this issue to cause a denial of service. It was discovered that etcd incorrectly handled directory permissions when trying to create a directory that exists already. An   show more ...

attacker could possibly use this issue to obtain sensitive information. It was discovered that etcd incorrectly handled endpoint setup. An attacker could possibly use this issue to cause a denial of service.

 Feed

Ubuntu Security Notice 5627-1 - It was discovered that PCRE incorrectly handled memory when handling certain regular expressions. An attacker could possibly use this issue to cause applications using PCRE to expose sensitive information.

 Feed

Red Hat Security Advisory 2022-6681-01 - Red Hat OpenShift Virtualization release 4.9.6 is now available with updates to packages and images that fix several bugs and add enhancements. Red Hat Product Security has rated this update as having a security impact of Important.

 Feed

Ubuntu Security Notice 5626-2 - USN-5626-1 fixed several vulnerabilities in Bind. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Yehuda Afek, Anat Bremler-Barr, and Shani Stajnrod discovered that Bind incorrectly handled large delegations. A remote attacker could possibly use this issue to reduce performance, leading to a denial of service.

 Feed

Red Hat Security Advisory 2022-6535-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.11.5.

 Feed

Red Hat Security Advisory 2022-6536-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.11.5.

 Feed

Red Hat Security Advisory 2022-6531-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.10.33.

 Feed

A now-patched critical security flaw affecting Atlassian Confluence Server that came to light a few months ago is being actively exploited for illicit cryptocurrency mining on unpatched installations. "If left unremedied and successfully exploited, this vulnerability could be used for multiple and more malicious attacks, such as a complete domain takeover of the infrastructure and the deployment

 Feed

As many as 350,000 open source projects are believed to be potentially vulnerable to exploitation as a result of a security flaw in a Python module that has remained unpatched for 15 years. The open source repositories span a number of industry verticals, such as software development, artificial intelligence/machine learning, web development, media, security, IT management. The shortcoming,

 Feed

Last month Tech Crunch reported that payment terminal manufacturer Wiseasy had been hacked. Although Wiseasy might not be well known in North America, their Android-based payment terminals are widely used in the Asia Pacific region and hackers managed to steal passwords for 140,000 payment terminals. How Did the Wiseasy Hack Happen? Wiseasy employees use a cloud-based dashboard for remotely

 Feed

Researchers have disclosed a new severe Oracle Cloud Infrastructure (OCI) vulnerability that could be exploited by users to access the virtual disks of other Oracle customers. "Each virtual disk in Oracle's cloud has a unique identifier called OCID," Shir Tamari, head of research at Wiz, said in a series of tweets. "This identifier is not considered secret, and organizations do not treat it as

 Feed

A new wave of a mobile surveillance campaign has been observed targeting the Uyghur community as part of a long-standing spyware operation active since at least 2015, cybersecurity researchers disclosed Thursday. The intrusions, originally attributed to a threat actor named Scarlet Mimic back in January 2016, is said to have encompassed 20 different variants of the Android malware, which were

 Feed

A malicious NPM package has been found masquerading as the legitimate software library for Material Tailwind, once again indicating attempts on the part of threat actors to distribute malicious code in open source software repositories. Material Tailwind is a CSS-based framework advertised by its maintainers as an "easy to use components library for Tailwind CSS and Material Design." "The

 Data loss

Can negotiating your firm’s ransomware payment actually be fun? Well, if it’s a game rather than the real thing then yes! The inventive bods at the Financial Times have created an imaginative ransomware negotiation simulator which lets you imagine you’re in the hot seat at a hacked company, trying to   show more ...

stop cybercriminals from releasing sensitive … Continue reading "How to have fun negotiating with a ransomware gang"

 Data loss

Researchers reveal how your eyeglasses could be leaking secrets when you’re on video conferencing calls, we take a look at the recent data breaches involving Uber and Grand Theft Auto 6, and we cast an eye at what threats may be around the corner… All this and much much more is discussed in the latest edition of   show more ...

the “Smashing Security” podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Register’s Iain Thomson. Plus – don’t miss our featured interview with Sal Aurigemma, the faculty director of the Master of Science in Cyber Security program at the University of Tulsa.

2022-09
Aggregator history
Thursday, September 22
THU
FRI
SAT
SUN
MON
TUE
WED
SeptemberOctoberNovember