Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Transatlantic Cable  ...

 News

Episode 279 of the Transatlantic Cable kicks off with a troubling story about purported Chinese hacker group, APT41 attacking and stealing U.S. Covid relief payments, to the cool tune of $20 million. Whilst details are thin, concerns are being raised around just how much of the nearly $800 billion was actually used by   show more ...

people in need. From there, the team move on to discussions around North Koreas Lazarus group, with details around a malicious app designed to siphon off peoples cryptocurrency. After that, discussion moves to concerns that independent journalists in El Salvador are looking to sue the NSO Group for spying. The final story looks at news around LastPass and its recent data breach. If you liked what you heard, please do consider subscribing. Hackers linked to Chinese government stole millions in Covid benefits Hackers use new, fake crypto app to breach networks, steal cryptocurrency Pegasus spyware was used to hack reporters phones LastPass says it was breached — again

image for Is Avast safe to use ...

 Products

Now part of the multinational company Gen Digital, Avast has reputation for making effective security solutions to combat viruses and other threats. But how safe and reliable are they? In this post we examine why some users are suspicious of Avast, and whether you can still trust this developers products. Is Avast   show more ...

safe? Avast solutions are popular with millions of users worldwide. Independent experts rate them highly too: in the SE Labs test for Q2 2022, for instance, Avast software detected 98% of threats — only slightly worse than both Kaspersky and McAfee, which shared the top spot (100% of threats). That said, over the years Avast has had its fair share of unpleasant incidents, which make many users and experts question how safe their products really are. Avast security issues Avast has let its users down many a time. In 2017, more than two million people downloaded a malware-infected version of CCleaner — one of the companys solutions. Even more unfortunate for Avast was 2019. That year, the company reported that its internal network had been compromised by intruders, whose goal was most likely gaining access to that selfsame CCleaner. But the companys problems in 2019 didnt end there. A short while later, independent experts revealed that Avast browser extensions collect users data without their knowledge — far more than is necessary for protection. And in the beginning of 2020 it was reported that Avast was sharing users data with its subsidiary, Jumpshot, which then sold it to large corporations. To work effectively, antivirus software needs full access to the given device and its operating system (otherwise it cannot detect and neutralize viruses and other threats). It also has to be in constant contact with the servers to keep the databases up to date. Thus, when choosing an antivirus, its important to pay attention to its reputation. Once installed, Avast has access to huge amounts of user data. And while to date theres no evidence of unscrupulous behavior on the companys part or insecurity of its products, more than a few incidents over the years may make users wonder if Avast solutions can be trusted. Malicious code in CCleaner In July 2017, Avast bought the British company Piriform, developer of the above-mentioned CCleaner — a popular PC optimization and maintenance solution with a total of two billion downloads (as of 2016). Shortly afterward, on August 15 and 24, new versions of the product were released: CCleaner 5.33.6162 and CCleaner Cloud 1.7.0.3191. And as early as September, Cisco Talos and Morphisec experts found malicious code in the installers of this software. The infected solutions were signed with valid digital certificates and hosted directly on the official CCleaner server. Further investigation showed the attack to be sophisticated, and consisting of at least three stages. In stage one, the infected CCleaner was downloaded by more than two million users. Next, a script running on the command-and-control server selected devices with domain names that suggested their owners work for large IT companies. This way, in stage two, 40 computers were selected. From these 40 devices, the cybercriminals (probably manually this time) picked out the four targets of most interest to them. Stage three: on these four devices they then installed a modified version of ShadowPad. This malware covertly gave the attackers remote control over their victims devices. Experts later suggested that the Chinese group Axiom (aka APT17) was behind the attack. Whats important to mention is that the first traces of cybercriminal activity on Piriforms servers date back to April 2017, three months before it was acquired by Avast. After the attack was detected, Avast promptly released an update for the utility, revoked the malicious versions certificate, and contacted everyone affected by stage two of the attack. Attack through a neglected VPN In May 2019, unknown criminals infiltrated Avasts internal network using a temporary VPN profile that didnt have two-factor authentication. Four months later, Avasts experts detected suspicious activity in the corporate network and sounded the alarm. The company immediately contacted law enforcement and launched an investigation. It was revealed that the cybercriminals had tried to connect to the companys network through a VPN using the (presumably stolen) credentials of different users. The compromised account that eventually delivered access to the network lacked domain administrator privileges, but the intruders were able to elevate their rights to that level. On the back of the investigation, Avast pointed the finger at CCleaner as the likely target — as it had been two years earlier. And it turned out that the repeat attack had been made possible by the temporary VPN profile having been left active by mistake. Avast suspended the release of CCleaner updates after detection of the attack. A little less than a month later, the company released a clean update of the solution signed with a new certificate, and revoked the certificate used for signing previous versions. Avast claims that no harm was caused to users as a result of the incident. Overly curious extensions Unfortunately, Avast has suffered some unpleasant incidents in relation not only to security, but also to user data privacy. In 2019, cybersecurity expert Vladimir Palant argued that Avast Online Security, Avast SafePrice, as well as AVG Online Security and AVG SafePrice extensions (made by another Czech antivirus developer bought by Avast several years earlier) collect and forward to the companys servers volumes of data about users online activity that were clearly way over and above what is needed. The information collected by the company was sufficient to determine which sites users visited and what they searched for online. Palant also reported that this data could be used to establish how much time users spent viewing a site, what they clicked on, and when they switched to another browser window. Palants revelation provoked much public outcry, leading to Avast extensions being removed from the Chrome, Opera, and Firefox official stores as a result. However, after the company started warning users about its data harvesting, and significantly reduced the amount of information it collected, Avast extensions were allowed back into the stores. Sale of user data In early 2020, Avast found itself at the heart of another scandal related to user data privacy. This time, a joint investigation by PCMag and Motherboard based on documents leaked online accused Avast of harvesting users browser history and selling it on to large corporations through its subsidiary Jumpshot. The user dossiers seen by PC Mag and Motherboard included: Google search history; Google Maps search history (locations, GPS coordinates); YouTube videos; Porn site visits. Also the date and time of users visits to sites like YouPorn and PornHub could be determined using the collected data, and in some cases even search-keywords and videos watched. PC Mag noted that the collected data contained neither names, e-mails, nor IP addresses. However, each user was assigned an ID, which was retained until Avast was removed from their device. Armed with this ID and the data sold by Jumpshot, large corporations like Amazon could easily de-anonymize users. The scandal wiped 9% off Avasts share price. To its credit, the company accepted it was in the wrong and announced the closure of Jumpshot. What is Avast Premium Antivirus? Avast Premium Antivirus is a cybersecurity solution developed by Avast, which is headquartered in Prague, the Czech Republic. As the name would suggest, Avast Premium Antivirus offers users protection against viruses, as well as all-round security. Avast Premium Antivirus is designed to remove malware, defend against ransomware, and block hacking attempts on Windows, Mac, Android, and iOS devices. About Avast Avast was founded in 1988 in Czechoslovakia by Pavel Baudiš and Eduard Kucera. Over its 30-year-plus history, it has grown into one of the largest players in the antivirus market. Avast solutions regularly receive awards from independent industry expert companies. Avast at a glance: Industry Information technology, antivirus software Founded Prague, Czechoslovakia, 1988 Founders Eduard Kucera Pavel Baudiš Notable products Avast Free Antivirus Avast Premium Antivirus Avast Ultimate Historical events 1991 — The company Awil is transformed from a cooperative into a partnership 2010 — Awil is renamed Avast 2016 — Avast acquires AVG 2017 — Avast acquires Piriform (developer of CCleaner) 2018 — Avast floats on the London Stock Exchange 2022 — Avast merges with NortonLifeLock Can Avast be trusted? Avast products are generally held in high esteem: they perform well in independent tests and effectively neutralize threats. Unfortunately, however, a string of unpleasant incidents has left a question mark hanging over the company. Some experts have even gone so far as to stop recommending it. For its part, Avast has stated that all the above-mentioned issues have been fixed. Currently theres no information of any security risk associated with use of its products. However, if youre not quite ready to take a leap of faith, you could always choose a top-quality alternative — for example, from Kaspersky, a company with deep understanding of the current cybersecurity landscape. Choose security software you can truly trust Kaspersky has always championed cybersecurity without borders. Our products detect and neutralize threats of any origin. Kaspersky experts continuously monitor the security landscape, find and investigate new threats, and share their findings with clients and competitors alike. We do not collect user data beyond what is necessary for protection. As part of our Global Transparency Initiative, Kaspersky has opened a network of Transparency Centers to provide partners and clients with information about how we handle user data. The Centers also allow our partners and clients to verify that Kaspersky solutions contain no hidden or malicious functionality. Kaspersky products regularly take first place in independent tests. More than 400 million users and counting place their trust in us, and numerous independent audits continue to prove the effectiveness of our solutions against all kinds of threats.

 Emerging Threats

For even the most skilled hackers, it can take at least an hour to write a script to exploit a software vulnerability and infiltrate their target. Soon, a machine may be able to do it in mere seconds.

 Incident Response, Learnings

It is alleged they conspired to break into US companies' servers, steal people's personally identifiable information (PII), use that info to file fraudulent tax returns to Uncle Sam, and collect victims' tax refunds.

 Govt., Critical Infrastructure

Secretary of Homeland Security Alejandro Mayorkas said national security and homeland security are now more interconnected than ever before, largely driven by the fact that U.S. adversaries can execute attacks “with a keystroke.”

 Malware and Vulnerabilities

Hackers were found abusing the open-source Linux PRoot utility in Bring Your Own Filesystem (BYOF) attacks to offer a constant repository for malicious tools compatible with Linux distributions. Researchers reported one sample malicious filesystem packaged with masscan, Nmap, XMRig cryptominer, and the related configuration files.

 Breaches and Incidents

A new report found Russian hackers compromising the networks of 15 healthcare organizations, a dam monitoring system, and others in the U.K and the U.S. to launch cyberattacks against Ukraine. They were seen boosting selected narratives online through state-affiliated media outlets and social media accounts to amplify the intensity of popular dissent over energy and inflation across Europe.

 Trends, Reports, Analysis

Despite fears of a looming recession, SMBs in the U.S. are spending more on software in 2023, according to Capterra’s 2023 SMB Software Buying Trends Survey. 75% of U.S. SMBs estimate they’ll spend more on software in 2023 compared to 2022.

 Govt., Critical Infrastructure

The White House held two international ransomware summits in the past two years, the first took place in 2021 and included 30 nations, plus the EU. The second summit took place from October 31 to November 1, 2022, with 36 countries plus the EU.

 Breaches and Incidents

Researchers uncovered a persistent SIM swapping act by Scattered Spider to pilfer user credentials employed at telecoms and Business Process Outsourcing (BPO) firms. In all the attacks, the group used a multitude of ISP and VPN providers to gain access to Google Workspace environments, on-premise infrastructure, and AzureAD.

 Incident Response, Learnings

"The deputy head of Fars news agency, Abbas Darvish Tavanger, has been arrested for falsifying news," state broadcaster IRIB said late Monday. He would remain in custody during the investigation, it added.

 Identity Theft, Fraud, Scams

Instead of leveraging the typical base64 encoding to evade detection, the attacker was adding variations of a PHP function to normal plugin files which decoded hex2dec from a second file containing a hexadecimal payload.

 Govt., Critical Infrastructure

The state of Maryland banned the use of TikTok and other Chinese and Russian products by state agencies, citing reporting by NBC News about hackers linked to the Chinese government stealing millions in Covid benefits from U.S. state governments.

 Incident Response, Learnings

New Zealand's Privacy Commission has signaled it may open an investigation into local managed services provider Mercury IT, which serves many government agencies and businesses and has been hit by ransomware.

 Trends, Reports, Analysis

A report by Accenture’s Cyber Threat Intelligence Team (ACTI) shed light on the higher demand for infostealer malware in underground forums and laid bare the lucrative factors supporting it. RedLine dominated the underground forums and was used in 56% of data breaches. Having threat intelligence on the latest   show more ...

tactics, techniques, and procedures relating to this malware can also help stay ahead of the latest threats in this sphere.

 Incident Response, Learnings

Meta is expected to face another large fine after Europe's data watchdog on Tuesday imposed binding decisions concerning the treatment of personal data by the owner of Facebook, Instagram and WhatsApp.

 Companies to Watch

Founded in 2010 and having a market presence in over 55 countries, the Sao Paulo-based privileged access management (PAM) vendor officially launched its North American operations in August this year.

 Expert Blogs and Opinion

The routing system security is critical to maintaining privacy online and ensuring information isn’t hijacked by malicious actors and that the information an organization sends — and receives — is trustworthy.

 Feed

A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr versions 0.20.0 and earlier allows attackers to read arbitrary files on the local machine via a malicious 7z file extraction.

 Feed

Red Hat Security Advisory 2022-8880-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP20. Issues addressed include a randomization vulnerability.

 Feed

Red Hat Security Advisory 2022-8876-01 - AMQ Broker is a high-performance messaging implementation based on ActiveMQ Artemis. It uses an asynchronous journal for fast message persistence, and supports multiple languages, protocols, and platforms. This release of Red Hat AMQ Broker 7.10.2 includes security and bug   show more ...

fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a denial of service vulnerability.

 Feed

Ubuntu Security Notice 5763-1 - It was discovered that NumPy did not properly manage memory when specifying arrays of large dimensions. If a user were tricked into running malicious Python file, an attacker could cause a denial of service. This issue only affected Ubuntu 20.04 LTS. It was discovered that NumPy did not   show more ...

properly perform string comparison operations under certain circumstances. An attacker could possibly use this issue to cause NumPy to crash, resulting in a denial of service.

 Feed

Red Hat Security Advisory 2022-8831-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include an out of bounds write vulnerability.

 Feed

Red Hat Security Advisory 2022-8832-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.

 Feed

Red Hat Security Advisory 2022-8833-01 - Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Issues addressed include a denial of service vulnerability.

 Feed

Debian Linux Security Advisory 5296-1 - Robin Peraglie and Johannes Moritz discovered an argument injection bug in the xfce4-mime-helper component of xfce4-settings, which can be exploited using the xdg-open common tool. Since xdg-open is used by multiple standard applications for opening links, this bug could be   show more ...

exploited by an attacker to run arbitrary code on an user machine by providing a malicious PDF file with specifically crafted links.

 Feed

A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security vulnerabilities in the internet of things (IoT) devices and other software. The botnet "contains several modules, including self-replication, attacks for different protocols, and self-propagation," Fortinet FortiGuard Labs researcher Cara Lin said. "It also

 Feed

Cryptocurrency investment companies are the target of a developing threat cluster that uses Telegram groups to seek out potential victims. Microsoft's Security Threat Intelligence Center (MSTIC) is tracking the activity under the name DEV-0139, and builds upon a recent report from Volexity that attributed the same set of attacks to North Korea's Lazarus Group. "DEV-0139 joined Telegram groups

 Feed

Critical infrastructure is important for societal existence, growth, and development. Societies are reliant on the services provided by critical infrastructure sectors like telecommunication, energy, healthcare, transportation, and information technology. Safety and security are necessary for the optimal operation of these critical infrastructures. Critical infrastructure is made up of digital

 Feed

The China-linked nation-state hacking group referred to as Mustang Panda is using lures related to the ongoing Russo-Ukrainian War to attack entities in Europe and the Asia Pacific. That's according to the BlackBerry Research and Intelligence Team, which analyzed a RAR archive file titled "Political Guidance for the new EU approach towards Russia.rar." Some of the targeted countries include

 Feed

A state-sponsored hacking group with links to Russia has been linked to attack infrastructure that spoofs the Microsoft login page of Global Ordnance, a legitimate U.S.-based military weapons and hardware supplier. Recorded Future attributed the new infrastructure to a threat activity group it tracks under the name TAG-53, and is broadly known by the cybersecurity community as Blue Callisto,

 Feed

The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and surpassing other ransomware families like LockBit, BlackCat, BianLian, and Hive. Other prominent industry verticals targeted include healthcare, governments, manufacturing, retail, and legal services, according to an analysis of leak site data by Palo Alto Networks

2022-12
Aggregator history
Wednesday, December 07
THU
FRI
SAT
SUN
MON
TUE
WED
DecemberJanuaryFebruary