Internet threat news

Microsoft’s Call to Stop Tech Support Scams

In the realm of cybersecurity, good news or even slightly positive news is rare. The community as a whole moves from crisis to crisis, malware variant to malware variant. There was perhaps more than a little surprise within the community when Microsoft published a veritable call to arms for teaming up with key players to put an end to the problem of tech support scams. All too often the Redmond tech giant is criticised for putting profit ahead of security, however, in recent months Microsoft has been working hard to correct this reputation. The latest article can be seen as a step in the right direction for the often criticised company.

   
IoT Botnet begins Drupalgeddon 2 Campaign

A sizable botnet made up of servers and numerous smart devices have begun the mass exploitation of a severe Drupal CMS vulnerability. Drupal is an open source Content Management System (CMS) often used in the creation and modification of digital content. Drupal is often used in the creation and management of web pages and is a popular tool used by web developers. What makes this new botnet campaign interesting, although becoming increasingly less novel, is the way it searches for and infects new machines. Such behavior is generally a characteristic of worms rather than traditional botnet campaigns.

The botnet is currently exploiting CVE-2018-7600, often referred to as Drupalgeddon 2 by the Drupal community after the Drupalgeddon security bug, CVE-2014-3704 disclosed in 2014 that led to numerous Drupal sites getting hacked for years afterward. CVE-2018-7600 if exploited correctly allows an attacker to run any code he desires against the CMS' core component, effectively taking over the site. What made the above-mentioned vulnerability deserving of more attention was that to exploit it the attacker does not need to be registered or authenticated on the targeted site, and all the attacker must do is simply access a URL.

   
Over 48 Million Users Information Accessible

Given the recent Facebook and Cambridge Analytica scandal users of social media platforms, not just Facebook, should be considering what information they are allowing corporations access to. If those self-same users are still wondering about what information is left online the article that follows may help in their decision.

In an article published by ZDNet it was revealed that information concerning 48 million users was left publicly accessible. The information was publicly accessible via an Amazon Web Services (AWS) S3 bucket, according to an UpGuard security researcher who discovered the data on February 28. The company responsible for the potential oversight is LocalBlox, a company that scrapes data from public web profiles. The company quickly corrected the oversight once contacted by the UpGuard researcher.

   
Researchers Sink 52,000 Compromised Servers

In a collaborative effort between researchers working at Abuse.ch, BrillantIT, and Proofpoint have managed to sinkhole the command and control infrastructure behind EITest. What has been referred to as the “King of Traffic Distribution” EITest is a network of hacked servers abused by cyber-criminals to redirect users to malware, exploits kits, and tech support scams. This collection of compromised servers is used by cybercriminals to siphon off legitimate traffic from these sites and redirect users to malicious web pages. This is done by hackers installing backdoors on the servers. This type of malicious activity is called “traffic distribution” within the infosec community. It has become a major source of income for cybercriminals and those involved have gone so far as to build such botnets of hacked sites and then rent them out as a service to fellow crooks. They then do with them as they please.

   
Mobile Phishing Attacks Surge in Number

Security firm Lookout has released a report which shows an alarming increase in the rate at which users are receiving and clicking on phishing URLs on their mobile devices. The firm witnessed an average rate of 85% per year increase since 2011. What is perhaps more worrying is that 56% of users received and clicked on a phishing URL that bypasses existing layers of defense, the security firm says. On average, a user clicked on a mobile phishing URL six times per year.

The security company set out with the aim of analyzing the mobile phishing threat landscape, the company found that attackers are successfully circumventing existing phishing protections to target the mobile devices. This circumvention of existing protections allows the attacker to expose sensitive data and personal information relatively easily. With over 66% of emails first opened on a mobile device and email arguably the first point of attack for a phishing campaign, unprotected emails on a mobile device are becoming the chosen attack vector for many such campaigns.

   
Iran and Russia Hit by Hacktivist Group

Late on April 7, reports began emerging that a significant number of Cisco switches located in Iran and Russia were being hijacked. The attack appears to have been done by a hacktivist group calling themselves “JHT” and may be in response to and in protest to election-related hacking. Cisco switches are network switches sold by the company. A network switch connects computers, printers, phones, cameras, lights, and servers in an office building or campus for example. A switch serves as a controller, enabling networked devices to talk to each other efficiently as opposed to a router which allows for connection to a particular network. The attack targeted internet service providers, data centers, and in turn some websites within Iran and Russia. It is yet unclear on how exactly the attack was carried out but it is believed the attacks involve a recently disclosed vulnerability (CVE-2018-0171).

   
US Gas Pipelines Hit by Cyberattack

While the Facebook and Cambridge Analytica saga still dominates most infosec headlines with an estimated 87 million user’s data exploited rather than the initial 50 million, those behind cyber attacks are still active. On April 4, Bloomberg reported that at least four U.S. pipeline companies have seen their electronic systems for communicating with customers shut down over the last few days. Three of those companies report that the shutdown was as a result of a cyber attack.  On Tuesday, Oneok Inc., which operates natural gas pipelines in the Permian Basin in Texas and the Rocky Mountains region, said it disabled its system as a precaution after determining that a third-party provider was the “target of an apparent cyber attack.” Previously, Energy Transfer Partners LP, Boardwalk Pipeline Partners LP, and Chesapeake Utilities Corp.’s Eastern Shore Natural Gas reported communications breakdowns, with Eastern Shore saying its outage occurred on March 29.

   
AutoHotKey Used in Malware Creation

Based on several reports from research firms it would appear that AutoHotKey is been used in the creation of malware. AutoHotKey, often simply referred to as AHK, is an open-source scripting language developed for the Microsoft Windows operating system back in 2003. AHK was born when its creator tried and failed to add support for keyboard shortcuts (hotkeys) in AutoIt, a similar Windows scripting language. Since its creation, it has become a major Windows scripting language. Besides original support for remapping keyboard shortcuts, AutoHotKey is now a powerful system that can now interact with the local file system, monitor or close programs, set up scheduled tasks, but also important for the novice hacker it can automate repetitive operations inside third-party software packages. Added to that obvious advantage for the novice, AHK scripting language uses a simple syntax that even non-technical users can understand.

Based on the languages ease of use, ease of understanding, and the ability to automate repetitive operations AHK historically has been used by gamers to create aimbots, an auto-aim cheating tool used in first-person shooters. While being abused by gamers to try and get an edge a few have been at work subverting the language for hacking purposes. Researchers believe this may be the start of a new trend in malware development. This would certainly be the case when considering the recently published reports by Ixia and Cybereason.

   
Boeing Hit by WannaCry Attack

Readers would be forgiven for thinking this an old news story from last year. However, as of Wednesday, March 28, 2018, the Seattle Times reported that Boeing, a world leader in aircraft design and their sales, was experiencing a WannaCry attack. The same WannaCry ransomware that made international headlines the year before.In May 2017 reports began surfacing of a ransomware worm that spread rapidly across numerous networks. The ransomware was dubbed WannaCry and once it infected a Windows-based system it encrypts files on the PC's hard drive, making them impossible for users to access, then demands a ransom payment in bitcoin in order to decrypt them. Based on that one would think it was just a run of the mill ransomware. There were, however, a few factors that made the new ransomware strain noteworthy. It struck a number of important and high-profile systems, including many in Britain's National Health Service; it exploited a Windows vulnerability that was suspected to have been first discovered by the United States National Security Agency; and it was tentatively linked by Symantec and other security researchers to the Lazarus Group, a cybercrime organization that may be connected to the North Korean government. All this combined made the attack a perfect cybercrime storm.

   
The Facebook-Cambridge Analytica Scandal: The Plot Thickens

Since news broke surrounding the whole scandal involving Cambridge Analytica and their misuse of data provided by Facebook the story has evolved somewhat. The excellent work of investigative journalists who published the initial shocking report on the matter has now come to head with many vocal voices demanding the truth and eventually, justice for the betrayal of what they hoped was private. It is also felt that such abuse of the democratic principles held dear by many western governments needs to be bolstered to prevent such abuse in future. The article which follows details events in line with the public demanding answers to such questions as well as further details on how Facebook manages your data.

   
The Facebook and Cambridge Analytica Saga: Where it currently stands

Since the dawn of social media platforms privacy rights experts have been warning the public as to the dangers such platforms may have. These warnings tend to be summarily ignored till now. Facebook is not immune to scandal and has successfully navigated a few to become the behemoth of social media platforms. In all likelihood, it will limp through this latest scandal where data was abused by Cambridge Analytica in an attempt to swing both the last US Election as well as the Brexit referendum. The story that has erupted since Christopher Wylie revealed to the press that the data from 50 million individual Facebook users were used to influencing elections has snowballed since the beginning. The article that follows attempts to summarise what has happened so far and what is known.

   
Leviathan Targeting Engineering and Maritime Industries

It is believed that a Chinese-linked espionage group is currently increasing its activity in targeting foreign engineering and maritime companies. This is according to a report recently published by FireEye, a well-respected cybersecurity firm known for its nation-state threat intelligence. The Chinese-linked espionage group has been called Leviathan by researchers and analyst. The group also goes by the name TEMP.Periscope and have been active for over a decade. The group has been historically interested in targets connected to the South China Sea geographical and political issues that have affected the region for China and its neighbors. These targets include research institutes, academic organizations, and private firms in the United States. Over the years the group has also shown interest in professional/consulting services, high-tech industry, healthcare, and media/publishing. Most of the identified victims were in the United States, with some located in Europe and at least one in Hong Kong.

   
Massive Dofoil Outbreak Caused by Backdoored Torrent Client

On March 7, Microsoft released a report detailing that Windows Defender AV detected and thwarted a massive outbreak of the Dofoil, sometimes referred to as Smoke Loader, trojan. The campaign attempted to infect over 400,000 users in a 12-hour window. The campaign targeted mainly Russian users but instances were detected in the Ukraine and Turkey. Russia made up the vast majority of detected instances with 73% followed by Turkey which accounted for 18% and Ukraine on 4%. On March 13, Microsoft released a follow-up report explaining that the attack was caused by backdoored Russian-based BitTorrent client named MediaGet.

   
Public Vulnerability Database Altered

It would appear that Chinese Intelligence Agencies are altering the Chinese National Vulnerabilities Database (CNNVD) in an attempt to hide security flaws that government hackers might have an interest in. This is the conclusion made by Recorder Future, a US-based security firm, in a recently published report. Recorded Future has developed a reputation for tracking and revealing Chinese state-sponsored cyber spying. According to the latest report published by the firm, the firm noticed in recent months mass edits to the CNNVD website. This would imply that CNNVD operators have been backdating the publication dates for hundreds of vulnerabilities.

In November 2017, Recorded Future published a report examining the publication speed of the CNNVD. The report concluded that China had a process for evaluating whether high-threat vulnerabilities had operational utility in intelligence operations before publishing them to the publicly accessible CNNVD webpage. The firm wished to revisit the analysis in an attempt to further confirm their allegations only to find that CNNVD had altered their initial vulnerability publication dates. It is assumed this was done to cover up any evidence of wrongdoing.

   

Page 4 of 21

<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>