Internet threat news

All is not fair in Love and Cyber War

Last week it was reported that it appeared that a Russian state-sponsored hacker group was potentially gearing up for an attack on Ukraine. Due to the work of numerous security researchers and the US Federal Bureau of Investigation (FBI) the attackers' plans were foiled somewhat. Such events will inevitably raise questions on how to sufficiently deal with such threats. These discussions, as with discussions surrounding conventional warfare, can tread some morally murky water. A UK official has sought to clarify that country’s position with regard to responding to cyber warfare. In a speech issued by Air Marshall Phil Osbourne look to present a possible solution for his countries defense. The position that could be adopted according to Air Marshall Osbourne should be, “…to understand first, to decide first, and then if necessary to act first, across the physical and virtual, to secure decision advantage and then operational advantage, seeking swift yet controlled exploitation of vulnerabilities and the proactive denial of opportunities.”

Over 500,000 Routers Hacked in Attempt to Target Ukraine

On May 23, 2018, researchers at Cisco Talos published a report detailing their discovery of a giant botnet of hacked routers that appears to be preparing for a cyber-attack on Ukraine. Researchers say that the botnet has been created by infecting home routers with a new malware strain named VPNFilter. It is widely believed within the InfoSec community and other nation states that Russia, in particular, the nation-state group APT28, are behind the botnet and malware creation. This has been done to target Ukraine according to experts.

According to Cisco, this new malware variant is incredibly complex, especially when compared with other IoT botnets. VPNFilter comes with support for boot persistence, only the second IoT malware to do so seen in the wild to do so, scanning for SCADA components, and a firmware wiper function to incapacitate affected devices. SCADA, or otherwise known as supervisory control and data acquisition, are commonly seen as control system architecture that uses computers, networked data communications and graphical user interfaces for high-level process supervisory management. All this is combined to assist in the management of industrial machinery and factory processes. Searching for and targeting such components has become a favorite of nation-state groups.

200 Million Rows of Information Stolen from Japanese Companies

On May 18, various cyber news sources began reporting that a data set containing 200 million rows of personally identifiable information (PII) has been made available on an underground Chinese marketplace. Articles surfaced on Security Week, and Dark Reading, amongst others. All reported that the source of the information of the exposed data came directly from cybersecurity firm FireEye’s iSight Intelligence division. What is considered PII can vary widely from country to country and is dependent on the regions privacy and information security laws; in general PII can be seen as information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. FireEye has stated that the leaked data, in this case, does not contain incredibly sensitive information but it can be used to facilitate identity theft, spam, malware propagation, and fraud.

Hackers Reveal Fully Operational Zero-Day Vulnerabilities

There is very little that can be considered more frustrating than realizing all your hard work has been made useless because of a silly mistake. This is probably what a group of hackers must be feeling at the moment. In this instance, the hackers appeared to have accidentally exposed two fully-working zero-days when they uploaded a weaponized PDF file to a public malware scanning engine. Unfortunately for the hackers, but fortunately for almost everyone else, security researchers at ESET discovered the potentially damaging zero-days and reported them. The first vulnerability affected Adobe’s PDF viewer and has been assigned the following Common Vulnerability and Exposure (CVE) number CVE-2018-4990 and has been patched. The second vulnerability, CVE-2018-8120, which if exploited targeted the Win32k component of Windows and was also recently patched.

Warning Issued over Netflix Email Scam

The Grand Rapids Police Department of Michigan, USA, has issued a warning via Facebook warning Netflix users of an email scam currently underway. Netflix also issued a statement intended to help users determine what is a scam or not and hopefully prevent users from handing over important information such as information pertaining to credit and debit cards.

Netflix, the incredibly popular subscription-based streaming service, currently boasts nearly 118 million users globally. This popularity, while what the business strives for, unfortunately, comes with a downside. That being it makes it a target for scams which cybercriminals will try to exploit this popularity to the best of their ability. The latest scam takes the form of a phishing email campaign. Simply put a phishing campaign relies on the criminal sending out emails to a massive amount of recipients with the hope of getting the recipient to do what the email instructs. These campaigns rely on social engineering to get the user who received the email to do something. This may involve the user from mistakenly handing over bank details or other such important information. Social engineering can be defined as an attack that relies heavily on human interaction in order to steal confidential information. Due to this reliance on human interaction phishing is one of the easiest forms of cyber attack for a criminal to carry out. Through merely sending out an email which links to a fake website a victim can provide these crooks with everything they need to infiltrate every aspect of their targets' personal and working lives. Such attacks are commonly used in identity theft cases which can severely impact the life of the victim.

Trump’s Actions Lead to Cyber Security Fears

Much of the world, particularly those living in the Middle East, are collectively holding their breaths hoping a storm may pass. One May 8 US President Donald Trump announced his country would be withdrawing from the Iranian nuclear deal. The president claimed that there is Israeli intelligence proving Iran is not in compliance with the agreement thus providing the reason to withdraw without alliance partner’s support. The move by President Trump sparked fears that the region would further be destabilized. As if to prove the point news broke early on May 10 about Iran using missiles to strike Israeli positions in the Golan Heights and with Israel responding in kind. While there appear to be legitimate fears of a further destabilized geopolitical landscape, there are also many fears regarding a cyber retaliation from Iran.

Russia Vs Telegram: VPN’s and Proxies Blocked

The battle between the Russian Government and Telegram, a popular instant messaging service, continues to be a long drawn out affair. Russia’s telecommunications watchdog Roskomnadzor seems to be determined to stamp out the offending app once and for all. At the center of the battle between the government and the company is due to Telegram declining  to provide customer encryption keys to Russian intelligence agency FSB so that investigators could decrypt encrypted conversations during investigations. The latest news coming out of Russia is that Roskomnadzor, blocked last week on May 3, 2018, access to over 50 VPN and proxy services. This according to Russian news agency TASS who initially published the story.

According to Russian authorities, the banning of approximately 50 VPN and proxy servers was done because users were utilizing these tools to skirt a nation-wide ban on Telegram. The nationwide ban occurred on April 13, when the Russian courts ruled in the Governments favor to ban the popular messaging service. The court hearing lasted a total of 18 minutes ensuring that justice was indeed swift in this case if you believe the action of banning Telegram is in the interests of justice. Prior to the court ruling which confirmed the government’s permission the company had been fined approximately 14,000 USD for failing to comply with a government order that required the company to provide access to encrypted conversations to Russian intelligence agency FSB. Since these events Telegram has lodged an appeal with the European Court of Human Rights (ECHR) against the 14,000 USD fine.

MassMiner: Cyber Crime’s Swiss Army Knife

Malware designed to mine cryptocurrency using a victim’s server or computer is an ever increasing popular choice. Often called crypto jackers or simply miners, many malware authors have seen their potential to make more than a quick buck and are often included in other types of malware packages. Researchers at AlienVault have discovered a new miner, which they have dubbed MassMiner. In a report published by the company, it was revealed that MassMiner employs a who’s who of recent exploits that led to many sleepless nights and loss of earnings in 2017.

As mentioned above MassMiner uses a number of exploits to infect systems in order to mine the cryptocurrency Monero. Those exploits include the following: CVE-2017-10271 ( (Oracle WebLogic), CVE-2017-0143 (Windows SMB), and CVE-2017-5638 (Apache Struts). Each one of the above-mentioned vulnerabilities has become the equivalent of cyber celebrities in their own right and have become infamous for different reasons.

Microsoft on a Mission to Secure IoT Devices

Following from Microsoft’s announcement that it will be looking to build better partnerships with other industry-leading companies to prevent tech support scams the Redmond giant has made another important announcement. While much of the tech industry was looking at the release of the new Windows 10 update, at the Hannover Messe 2018, an industrial trade show, Microsoft announced plans to secure both IoT (Internet of Things) devices and ICS (Industrial Control Systems) operations. The new project has been codenamed Trusted Cyber-Physical Systems or TCPS for short.

According to Microsoft, TCPS systems are designed to utilize three elements to catch and block intrusions. The first being is a hardware-level Trusted Execution Environments (TEEs). Simply put a TEE is a secure area of the main processor. It guarantees code and data loaded inside to be protected from attacks. Such systems were designed to process highly-sensitive information, information hackers are always trying to get at. The reason for this is that many low-level IoT or ICS systems lack a hardware level TEE making them incredibly vulnerable to attack. For such systems Microsoft will be able to provide what they term is a “brownfield gateway,” which operates as an intermediary point that funnels all commands from upstream equipment to IoT devices, sensors, actuators, or safety control systems through one server/host thus supporting a TEE.

Microsoft’s Call to Stop Tech Support Scams

In the realm of cybersecurity, good news or even slightly positive news is rare. The community as a whole moves from crisis to crisis, malware variant to malware variant. There was perhaps more than a little surprise within the community when Microsoft published a veritable call to arms for teaming up with key players to put an end to the problem of tech support scams. All too often the Redmond tech giant is criticised for putting profit ahead of security, however, in recent months Microsoft has been working hard to correct this reputation. The latest article can be seen as a step in the right direction for the often criticised company.

IoT Botnet begins Drupalgeddon 2 Campaign

A sizable botnet made up of servers and numerous smart devices have begun the mass exploitation of a severe Drupal CMS vulnerability. Drupal is an open source Content Management System (CMS) often used in the creation and modification of digital content. Drupal is often used in the creation and management of web pages and is a popular tool used by web developers. What makes this new botnet campaign interesting, although becoming increasingly less novel, is the way it searches for and infects new machines. Such behavior is generally a characteristic of worms rather than traditional botnet campaigns.

The botnet is currently exploiting CVE-2018-7600, often referred to as Drupalgeddon 2 by the Drupal community after the Drupalgeddon security bug, CVE-2014-3704 disclosed in 2014 that led to numerous Drupal sites getting hacked for years afterward. CVE-2018-7600 if exploited correctly allows an attacker to run any code he desires against the CMS' core component, effectively taking over the site. What made the above-mentioned vulnerability deserving of more attention was that to exploit it the attacker does not need to be registered or authenticated on the targeted site, and all the attacker must do is simply access a URL.

Over 48 Million Users Information Accessible

Given the recent Facebook and Cambridge Analytica scandal users of social media platforms, not just Facebook, should be considering what information they are allowing corporations access to. If those self-same users are still wondering about what information is left online the article that follows may help in their decision.

In an article published by ZDNet it was revealed that information concerning 48 million users was left publicly accessible. The information was publicly accessible via an Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28. The company responsible for the potential oversight is LocalBlox, a company that scrapes data from public web profiles. The company quickly corrected the oversight once contacted by the UpGuard researcher.

Researchers Sink 52,000 Compromised Servers

In a collaborative effort between researchers working at, BrillantIT, and Proofpoint have managed to sinkhole the command and control infrastructure behind EITest. What has been referred to as the “King of Traffic Distribution” EITest is a network of hacked servers abused by cyber-criminals to redirect users to malware, exploits kits, and tech support scams. This collection of compromised servers is used by cybercriminals to siphon off legitimate traffic from these sites and redirect users to malicious web pages. This is done by hackers installing backdoors on the servers. This type of malicious activity is called “traffic distribution” within the infosec community. It has become a major source of income for cybercriminals and those involved have gone so far as to build such botnets of hacked sites and then rent them out as a service to fellow crooks. They then do with them as they please.

Mobile Phishing Attacks Surge in Number

Security firm Lookout has released a report which shows an alarming increase in the rate at which users are receiving and clicking on phishing URLs on their mobile devices. The firm witnessed an average rate of 85% per year increase since 2011. What is perhaps more worrying is that 56% of users received and clicked on a phishing URL that bypasses existing layers of defense, the security firm says. On average, a user clicked on a mobile phishing URL six times per year.

The security company set out with the aim of analyzing the mobile phishing threat landscape, the company found that attackers are successfully circumventing existing phishing protections to target the mobile devices. This circumvention of existing protections allows the attacker to expose sensitive data and personal information relatively easily. With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing campaign, unprotected emails on a mobile device are becoming the chosen attack vector for many such campaigns.


Page 2 of 19

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>