Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Why you shouldn’t  ...

 Threats

Earlier this month, Kaspersky experts published a detailed report on a threat theyve called OnionPoison. They discovered malicious code being distributed through YouTube video. The video advertised using Tor Browser for private browsing. This browser is a modified version of the Firefox browser — with maximum   show more ...

privacy settings. But its most important feature is that it can redirect all user data through The Onion Router (hence the name Tor) network. Data is transmitted in encrypted form through several layers of server (hence the onion in the name), where its mixed with data of other users of the network. This method ensures privacy: websites see only the address of the last server in the Tor network — the so-called exit node — and cannot see the users real IP address. But thats not all. The Tor network can also be used to bypass restricted access to certain sites. For example, in China, many Western internet resources are blocked, so users turn to solutions such as Tor to access them. Incidentally, YouTube is also officially unavailable in China, so, by definition, the video is aimed at those looking for ways to get round the restrictions. Its likely that this was by no means the only method of distributing the OnionPoison malware, and that other links were placed on resources inside China. Normally, a user can download Tor Browser from the projects official website. However, this site is also blocked in China, so theres nothing unusual about people seeking alternative download sources. The YouTube video itself explains how to hide online activity using Tor, and a link is given in the description. It points to a Chinese cloud file-hosting service. Unfortunately, the version of Tor Browser located there is infected with OnionPoison spyware. So, instead of privacy, the user gets the exact opposite: all their data is revealed. Screenshot of a YouTube video advertising a malicious version of Tor Browser. Source What the infected Tor Browser knows about the user The infected version of Tor Browser lacks a digital signature, which should be a big red flag for the security-minded user. On installing such a program, the Windows operating system displays a warning regarding this. Naturally, the official version of Tor Browser has a digital signature. The distribution contents in the infected package, however, differ very little from the original. But the minor differences are important. For starters, in the infected browser, some important settings have been changed when compared with the original Tor Browser. Unlike the real one, the malicious version remembers the browser history, stores temporary copies of sites on the computer, and automatically saves login credentials and all data entered into forms. Such settings already cause enough damage to privacy as it is, but it only gets worse Download page of Tor Browser infected with OnionPoison spyware. Source One of the key Tor/Firefox libraries was replaced with malicious code. This calls the original library, as required, to keep the browser working. And at startup it also addresses the C2 server, from where it downloads and runs another malicious program. Whats more, this next stage of the attack on the user occurs only if their real IP address points to a location in China. This second stage of the attack furnishes the attack organizers with as much detailed information about the user as possible, in particular: Data about their computer and installed programs. Their browsing history — not only in Tor Browser, but also in other browsers installed in the system, such as Google Chrome and Microsoft Edge. The IDs of Wi-Fi networks they connect to. And lastly, account data in the popular Chinese messengers QQ and WeChat. Such details can be used to associate any online activity with a specific user. Wi-Fi network data can even allow their location to be established rather accurately. Privacy risks OnionPoison is so named because it essentially destroys the privacy provided by The Onion Router software. The consequences are obvious: all attempts to hide your online activity will, on the contrary, reveal it to the attackers. Curiously, unlike most malware of this kind, OnionPoison doesnt bother stealing user passwords. The organizers clearly have no need for them: the sole purpose of the attack is surveillance. Even if you dont have to use Tor Browser to protect your privacy (in most cases, a regular VPN app will suffice), the OnionPoison study offers two useful lessons in safeguarding against malicious activity. First, only download software from official sites. For those who want additional verification, many software developers publish so-called checksums. This is a kind of ID of the real program installer. You can calculate the checksum for the distribution you downloaded to make sure it matches the original. In the case of OnionPoison, users had to download Tor Browser from unofficial sources anyway as the official site was blocked. In such situations, checksum verification is very useful. But, as we mentioned above, the distribution had another red flag: its lack of a legitimate digital signature. If Windows displays such a warning, better to double-check everything before running the program. Or just dont run it at all. The site hosted on the OnionPoison command-and-control server is visually identical to the real www.torproject.org. Source Now for the second lesson, which stems from the first. Never download programs from YouTube links! You might argue that OnionPoison poses a threat only to folks in China, and those in other countries seem unaffected. But in fact, this isnt the only attack that uses social networks as bait to hook gullible users. Another recent Kaspersky report showed how cybercriminals infect gamers devices and steal their data. The attackers in this case also distributed malware through YouTube. Whats more, the malware compromised the victims own YouTube channel, posting there the same video with a malicious link. YouTube-based attacks are partly helped by Googles prioritization of videos in search results. Attacks of this kind are another example of how ordinary, seemingly safe resources can be misused. Even an experienced user cant always distinguish a real link from a malicious one. Such inconveniences of digital life are the best possible argument for installing a high-quality security solution. Even if your natural online caution fails you, security software will identify and block the threat in good time.

image for Transatlantic Cable  ...

 News

Episode 273 of the Transatlantic Cable kicks off with 65,000+ companies data being leaked! As Microsoft confirmed, a server misconfiguration caused the leak. Then, discussion moved on to Netflix. The streaming service is changing its policy on password sharing – and will start charging people to share accounts. You   show more ...

can also now turn your crypto coins into cocktails as the first Metaverse night club opens in Dubai! And finally, concerns rises around TikTok as it denies the rumor that it could be used to track US citizens. If you liked what you heard, please consider subscribing. Microsoft Confirms Server Misconfiguration Led to 65,000+ Companies Data Leak. Netflix will no longer allow you to share passwords for free. Dubai to open worlds first metaverse nightclub. TikTok denies it could be used to track US citizens.

 Expert Blogs and Opinion

The initrd is the "initial RAM disk." It's how Linux distributions cope with the issue of booting a machine on wildly different hardware without building a unique custom kernel for every individual machine.

 Companies to Watch

PreVeil, a Boston, MA-based provider of cloud-based end-to-end encrypted email and file collaboration solutions, raised $20M in Series C funding. The round was led by PSG.

 Malware and Vulnerabilities

Drinik has been circulating in India since 2016, operating as an SMS stealer, but in September 2021, it added banking trojan features that target 27 financial institutes by directing victims to phishing pages.

 Trends, Reports, Analysis

Increasingly, as retail stores are less well protected, they are being seen as an easy way into the computer system of a company. Perhaps the lesson that needs to be learned here is that you should never assume that you won't or can't be attacked.

 Govt., Critical Infrastructure

The Securing Open Source Software Act introduced in the Senate last month is a bipartisan bill that would create a security and risk-mitigation blueprint for the federal government's use of open-source software.

 Breaches and Incidents

"The attack was multi-directional, including from inside the Russian Federation," the Polish Senate said in a statement. The Slovak parliament's deputy speaker Gabor Grendel told AFP: that "Parliament's entire computer network has been paralysed".

 Malware and Vulnerabilities

The vulnerability, caused by an old deserialization bug in an outdated Java library, could be abused to achieve pre-authentication remote code execution (RCE) on the host computer.

 Threat Actors

As per the findings by S2W’s threat research and intelligence center, the three new malware, FastFire, FastViewer, and FastSpy, are masquerading as APKs for three utility tools on Google Play Store.

 Identity Theft, Fraud, Scams

The phishing campaign targeted 500 mailboxes of employees from a national travel organization. The email comes with the subject line - "We noticed some unusual activity" - pretending to be from LinkedIn.

 Feed

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides   show more ...

automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. This is the cross platform package.

 Feed

Ubuntu Security Notice 5705-1 - Chintan Shah discovered that LibTIFF incorrectly handled memory in certain conditions. An attacker could trick a user into processing a specially crafted image file and potentially use this issue to allow for information disclosure or to cause the application to crash. It was discovered   show more ...

that LibTIFF incorrectly handled memory in certain conditions. An attacker could trick a user into processing a specially crafted tiff file and potentially use this issue to cause a denial of service.

 Feed

Debian Linux Security Advisory 5262-1 - Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code.

 Feed

Ubuntu Security Notice 5706-1 - It was discovered that the BPF verifier in the Linux kernel did not properly handle internal data structures. A local attacker could use this to expose sensitive information. It was discovered that an out-of-bounds write vulnerability existed in the Video for Linux 2 implementation in   show more ...

the Linux kernel. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Ubuntu Security Notice 5704-1 - It was discovered that DBus incorrectly handled messages with invalid type signatures. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus was incorrectly validating the length of arrays of fixed-length   show more ...

items. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service. It was discovered that DBus incorrectly handled the body DBus message with attached file descriptors. A local attacker could possibly use this issue to cause DBus to crash, resulting in a denial of service.

 Feed

APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers and TALON TC BACnet Automation Controllers. With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. All versions prior to 3.5 are affected.

 Feed

Five malicious dropper Android apps with over 130,000 cumulative installations have been discovered on the Google Play Store distributing banking trojans like SharkBot and Vultur, which are capable of stealing financial data and performing on-device fraud. "These droppers continue the unstopping evolution of malicious apps sneaking to the official store," Dutch mobile security firm ThreatFabric

 Feed

A recently discovered hacking group known for targeting employees dealing with corporate transactions has been linked to a new backdoor called Danfuan. This hitherto undocumented malware is delivered via another dropper called Geppei, researchers from Symantec, by Broadcom Software, said in a report shared with The Hacker News. The dropper "is being used to install a new backdoor and other tools

 Feed

The increased use of information technology in our everyday life and business has led to cyber-attacks becoming more sophisticated and large-scale. For organizations to thrive in this era of technology, they must develop robust security strategies to detect and mitigate attacks. Defense in depth is a strategy in which companies use multiple layers of security measures to safeguard assets. A

 Feed

Google on Thursday rolled out emergency fixes to contain an actively exploited zero-day flaw in its Chrome web browser. The vulnerability, tracked as CVE-2022-3723, has been described as a type confusion flaw in the V8 JavaScript engine. Security researchers Jan Vojtěšek, Milánek, and Przemek Gmerek of Avast have been credited with reporting the flaw on October 25, 2022. "Google is aware of

 Feed

The Raspberry Robin worm is becoming an access-as-a-service malware for deploying other payloads, including IcedID, Bumblebee, TrueBot (aka Silence), and Clop ransomware. It is "part of a complex and interconnected malware ecosystem, with links to other malware families and alternate infection methods beyond its original USB drive spread," the Microsoft Security Threat Intelligence Center (MSTIC

 Feed

Multiple high-severity security flaws have been disclosed as affecting Juniper Networks devices, some of which could be exploited to achieve code execution. Chief among them is a remote pre-authenticated PHP archive file deserialization vulnerability (CVE-2022-22241, CVSS score: 8.1) in the J-Web component of Junos OS, according to Octagon Networks researcher Paulos Yibelo. "This vulnerability

 Feed

Cloud computing was the lifeline that kept many companies running during the pandemic. But it was a classic case of medicine that comes with serious side effects.  Having anywhere, anytime access to data and apps gives companies tremendous flexibility in a fast-changing world, plus the means to scale and customize IT at will. The cloud is an asset or upgrade in almost every way. With one glaring

2022-10
SAT
SUN
MON
TUE
WED
THU
FRI
OctoberNovemberDecember