Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for How to shop safely o ...

 Tips

Online shopping is a part of all our lives, and many can no longer imagine their daily routine without it. A couple of clicks, and a delivery guy is already bringing pizza or dog food straight to your door, while movie tickets arrive straight into your inbox. This calls for more, not less vigilance: its not only   show more ...

online stores and services that are after your money, but scammers forever scheming how to pick your pocket. Today we talk about cybercriminal tricks and how to protect your funds when shopping online. Account theft Attackers are constantly on the lookout for user accounts in services related to online commerce. Why? Sometimes its all very simple: they want to gain access to payment cards linked to the account and go on a spree at your expense. There are no two ways about it: account hijacking can cause direct monetary losses. There are, of course, more complex cases when hacked accounts are used in various fraudulent schemes to scam other users or online services, as well as to launder and cash out stolen funds. That is, if your hacked account is used for some illegal activity, it wont necessarily result in immediate money losses. However, you might have the police knocking on your door eventually, with all the unpleasantness that entails. Lets take a closer look at how exactly someone might hijack your accounts. Phishing Received an e-mail about a giveaway or a scary notification about a suspended account? Whatever you do, dont click anything: it might be scammers hunting for your credentials. For example, heres how cybercriminals lured Amazon users to phishing pages using bonus points that had to be cashed out immediately. If the user clicked the link and entered their personal data, these went straight to the scammers. Malware Phishing is not the only way to steal accounts and personal data. Using banking Trojans, cybercriminals can spoof the login screen and find out your credentials, or redirect you to a fake site that hands over everything you enter. Public Wi-Fi In todays world, you can shop online anywhere. Its not uncommon, for example, for people to go to the mall to try on a product in person, then order it online at a lower price. Whats more, they can place an order using that same malls free Wi-Fi. This is when scammers pounce on the bargain hunters. The fact is that when you buy online, you send and receive a wealth of valuable information, including account details. Anyone with the right skills and access to the same network can snoop on this data. In the case of free Wi-Fi at the mall, there could be tens, if not hundreds of strangers connected to the same network, some of whom might be there for something a lot less innocent than shopping. But even on your home Wi-Fi, your security remains an issue — especially if youve never changed the router password and arent sure which encryption protocol your network uses. All this leaves the door open to cybercriminals. Online store leaks Sadly, there are yet more ways to lose your data. Online stores are not watertight, and sometimes leak databases of user accounts. For fraudsters, such data is gold dust. And if you happen to use the same password for different services, attackers will have access to all of them. Fake websites Especially creative scammers make their own sites that mimic those of real online shopping services. Some of these fakes are scams used to take money from the victim without delivering the promised goods or services. And as an added bonus, they might steal payment card data too. So how to shop safely? Here are some simple tips to help protect your data and money when shopping online. 1. Use strong passwords Sure, hardly anyone brute-forces passwords these days by entering them one by one. But even with modern methods of cracking, shorter and less complex passwords are more vulnerable. So, the rule still stands: the longer your combination is, the less likely cybercriminals will grab it. We advise using at least 10 characters — even for accounts of little importance. And for accounts you really care about, better to make the password twice as long. Another dangerous habit is to use the same passwords for multiple sites. Having grabbed the credentials for one account, cybercriminals are unlikely to stop there and will try to log in to other services with the stolen username and password. You can devise your own password creation system, or use a password generator to come up with strong random combinations. And so as not to forget them, you can store your credentials in a password manager, which also includes a password generator as a rule. 2. Use a VPN to connect to public networks A secure connection encrypts all traffic and therefore prevents attackers from intercepting your login credentials and payment details. Check here for how to choose the best VPN app. 3. Dont link bank cards to online shopping accounts Most of all, attackers love stealing accounts that are rarely used — this way their actions go unnoticed for longer. Therefore, its worth linking a bank card only to online stores that you regularly visit, and make sure that your account is not hijacked and that no suspicious transactions appear in your purchase history. In other cases, its safer to decline the remember card option and enter the numbers manually. That way, youll be less likely to lose money through a long-abandoned account with, lets say, some online pet store where you once bought hamster food. 4. If possible, pay with payment services Payment services, such as Google Play or PayPal, store your data in encrypted form on secure servers. The merchant you buy from receives only the virtual account number assigned to the card by the service. Because your card data is not seen by the merchant, this keeps your finances safer from unscrupulous sellers, data leaks from the site, and data interception during transmission over the internet. 5. Get a separate card for online shopping Get a separate card for online purchases, and keep minimal funds on it. Even if attackers find out the details of this card, they still wont get their hands on your main money source. Its best to top up the card immediately before making a purchase and only by the amount you intend to spend. 6. Keep track of your payment history Set up transaction notifications, and check your payment history regularly. If you spot something suspicious, call your bank immediately. Any unexpected debit, even of a tiny amount, should ring an alarm bell, because it may be scammers floating a trial balloon, or the first automatic payment for a subscription you didnt ask for. 7. Use reliable protection These simple rules to protect your data and money will make your online shopping experience safe and secure. To avoid cybercriminal tricks, read our post on how to spot scammers online. And use a reliable security solution that automatically detects and blocks phishing sites.

 Malware and Vulnerabilities

LodaRAT is written in AutoIt, a well-known scripting language typically used to automate administrative tasks in Windows. AutoIt scripts can be compiled into standalone binaries.

 Identity Theft, Fraud, Scams

The SEO poisoning attack analyzed by BleepingComputer uses Google's datastudio.google.com subdomain to lend credibility to malicious domains. The campaign uses the keyword stuffing technique to boost the rankings of these illicit domains.

 Incident Response, Learnings

The charged individuals allegedly recruited money mules to transfer money and used spoofed email addresses, bank account takeovers, and similar fraudulent methods designed to deceive victims into believing that they were making legitimate payments.

 Identity Theft, Fraud, Scams

In this campaign, attackers use legitimate and trusted systems management tools to interact directly with a victim’s computer, to manually exfiltrate data to be used for extortion.

 Malware and Vulnerabilities

When files are downloaded from an untrusted remote location, such as the Internet or an email attachment, Windows add a special attribute to the file called the Mark of the Web. However, this attack bypasses the security warning.

 Feed

This Metasploit module exploits the logic in the CartView.php page when crafting a draft email with an attachment. By uploading an attachment for a draft email, the attachment will be placed in the /tmp_attach/ folder of the ChurchInfo web server, which is accessible over the web by any user. By uploading a PHP   show more ...

attachment and then browsing to the location of the uploaded PHP file on the web server, arbitrary code execution as the web daemon user (e.g. www-data) can be achieved.

 Feed

This Metasploit module exploits a cross-site request forgery (CSRF) vulnerability in F5 Big-IP's iControl interface to write an arbitrary file to the filesystem. While any file can be written to any location as root, the exploitability is limited by SELinux; the vast majority of writable locations are unavailable.   show more ...

By default, we write to a script that executes at reboot, which means the payload will execute the next time the server boots. An alternate target - Login - will add a backdoor that executes next time a user logs in interactively. This overwrites a file, but we restore it when we get a session Note that because this is a CSRF vulnerability, it starts a web server, but an authenticated administrator must visit the site, which redirects them to the target.

 Feed

Debian Linux Security Advisory 5286-1 - Greg Hudson discovered integer overflow flaws in the PAC parsing in krb5, the MIT implementation of Kerberos, which may result in remote code execution (in a KDC, kadmin, or GSS or Kerberos application server process), information exposure (to a cross-realm KDC acting maliciously), or denial of service (KDC or kadmind process crash).

 Feed

Ubuntu Security Notice 5733-1 - It was discovered that FLAC was not properly performing memory management operations, which could result in a memory leak. An attacker could possibly use this issue to cause FLAC to consume resources, leading to a denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.   show more ...

04 ESM and Ubuntu 18.04 LTS. It was discovered that FLAC was not properly performing bounds checking operations when decoding data. If a user or automated system were tricked into processing a specially crafted file, an attacker could possibly use this issue to expose sensitive information or to cause FLAC to crash, leading to a denial of service. This issue only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM, Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.

 Feed

Red Hat Security Advisory 2022-8543-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Issues addressed include bypass and use-after-free vulnerabilities.

 Feed

Ubuntu Security Notice 5729-2 - It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service. Hsin-Wei Hung discovered that the BPF subsystem in the Linux kernel contained an out-of-bounds read   show more ...

vulnerability in the x86 JIT compiler. A local attacker could possibly use this to cause a denial of service or expose sensitive information.

 Feed

Ubuntu Security Notice 5686-3 - USN-5686-1 fixed vulnerabilities in Git. This update provides the corresponding updates for Ubuntu 22.10. Cory Snider discovered that Git incorrectly handled certain symbolic links. An attacker could possibly use this issue to cause an unexpected behaviour.

 Feed

Red Hat Security Advisory 2022-8545-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Issues addressed include bypass and use-after-free vulnerabilities.

 Feed

David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. David Bouman and Billy Jheng Bing Jhong discovered that a race condition existed in the   show more ...

io_uring subsystem in the Linux kernel, leading to a use- after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. Various other issues were also addressed.

 Feed

Gentoo Linux Security Advisory 202211-4 - Multiple vulnerabilities have been found in PostgreSQL, the worst of which could result in remote code execution. Versions greater than or equal to 10.22:10 are affected.

 Feed

Ubuntu Security Notice 5728-2 - Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure reuse. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was   show more ...

discovered that a race condition existed in the memory address space accounting implementation in the Linux kernel, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service or possibly execute arbitrary code.

 Feed

Red Hat Security Advisory 2022-8547-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 102.5.0. Issues addressed include bypass and use-after-free vulnerabilities.

 Feed

Ubuntu Security Notice 5727-2 - It was discovered that a race condition existed in the instruction emulator of the Linux kernel on Arm 64-bit systems. A local attacker could use this to cause a denial of service. It was discovered that the KVM implementation in the Linux kernel did not properly handle virtual CPUs   show more ...

without APICs in certain situations. A local attacker could possibly use this to cause a denial of service.

 Feed

Google Cloud last week disclosed that it identified 34 different hacked release versions of the Cobalt Strike tool in the wild, the earliest of which shipped in November 2012. The versions, spanning 1.44 to 4.7, add up to a total of 275 unique JAR files, according to findings from the Google Cloud Threat Intelligence (GCTI) team. The latest version of Cobalt Strike is version 4.7.2. Cobalt

 Feed

Google has won a lawsuit filed against two Russian nationals in connection with the operation of a botnet called Glupteba, the company said last week. The U.S. District Court for the Southern District of New York imposed monetary sanctions against the defendants and their U.S.-based legal counsel. The defendants have also been asked to pay Google's attorney fees. The defendants' move to press

 Feed

[Want Bob to stop complaining? Change your practices.] [Don't delay change – it can cost you] ["Always done it that way"? Think again.] [Why you should think again about doing it the old way] [Why you should think again about doing it the same old way] As IT professionals, we all reach a certain point in our IT career where we realize that some of our everyday tasks are done the same way year

 Feed

The cybercrime group called Daixin Team has leaked sample data belonging to AirAsia, a Malaysian low-cost airline, on its data leak portal. The development comes a little over a week after the company fell victim to a ransomware attack on November 11 and 12, per DataBreaches.net. The threat actors allegedly claim to have obtained the personal data associated with five million

 Feed

The notorious Emotet malware has returned with renewed vigor as part of a high-volume malspam campaign designed to drop payloads like IcedID and Bumblebee. "Hundreds of thousands of emails per day" have been sent since early November 2022, enterprise security company Proofpoint said last week, adding, "the new activity suggests Emotet is returning to its full functionality acting as a delivery

2022-11
Aggregator history
Monday, November 21
TUE
WED
THU
FRI
SAT
SUN
MON
NovemberDecemberJanuary