โ Monday review โ the hot 28 stories of the week โ
๐ Read
via "Naked Security".
From the DNS outage that deleted users' Azure data to the Nest security cam hijacker, and everything in between. It's weekly roundup time.๐ Read
via "Naked Security".
Naked Security
Monday review โ the hot 28 stories of the week
From the DNS outage that deleted usersโ Azure data to the Nest security cam hijacker, and everything in between. Itโs weekly roundup time.
โ Selling fake likes and follows is illegal, rules New York โ
๐ Read
via "Naked Security".
A groundbreaking settlement in New York finds that selling fake likes and followers is illegal.๐ Read
via "Naked Security".
Naked Security
Selling fake likes and follows is illegal, rules New York
A groundbreaking settlement in New York finds that selling fake likes and followers is illegal.
โ FBI burrowing into North Koreaโs big bad botnet โ
๐ Read
via "Naked Security".
The FBI revealed that it joined the Joanap botnet and started chewing it up from the inside.๐ Read
via "Naked Security".
Naked Security
FBI burrowing into North Koreaโs big bad botnet
The FBI revealed that it joined the Joanap botnet and started chewing it up from the inside.
โ Chromeโs hidden lookalike detection feature battles URL imposters โ
๐ Read
via "Naked Security".
Chrome now checks for misspellings of popular URLs and will display a link to the site that it thinks the user might have wanted to visit.๐ Read
via "Naked Security".
Naked Security
Chromeโs hidden lookalike detection feature battles URL imposters
Chrome now checks for misspellings of popular URLs and will display a link to the site that it thinks the user might have wanted to visit.
โ Security weaknesses in 5G, 4G and 3G could expose usersโ locations โ
๐ Read
via "Naked Security".
Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a user's location.๐ Read
via "Naked Security".
Naked Security
Security weaknesses in 5G, 4G and 3G could expose usersโ locations
Researchers have discovered security holes in 5G, 4G and 3G telephony protocols, which can expose a userโs location.
โ SpeakUp Linux Backdoor Sets Up for Major Attack โ
๐ Read
via "Threatpost | The first stop for security news".
Armed with an impressive bag of exploits and other tricks for propagation, researchers believe the new trojan could be the catalyst for an upcoming, major cyber-offensive.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
SpeakUp Linux Backdoor Sets Up for Major Attack
Armed with an impressive bag of exploits and other tricks for propagation, researchers believe the new trojan could be the catalyst for an upcoming, major cyber-offensive.
๐ด IoT Security's Coming of Age Is Overdue ๐ด
๐ Read
via "Dark Reading: ".
The unique threat landscape requires a novel security approach based on the latest advances in network and AI security.๐ Read
via "Dark Reading: ".
Darkreading
IoT Security's Coming of Age Is Overdue
The unique threat landscape requires a novel security approach based on the latest advances in network and AI security.
โ โCollection #1โ Data Dump Hacker Identified โ
๐ Read
via "Threatpost | The first stop for security news".
Despite several threat actors stating they are behind a massive 773M credential dump, researchers believe they have found the real distributor.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
โCollection #1โ Data Dump Hacker Identified
Despite several threat actors stating they are behind a massive 773M credential dump, researchers believe they have found the real distributor.
๐ 3 ways state actors target businesses in cyber warfare, and how to protect yourself ๐
๐ Read
via "Security on TechRepublic".
State-sponsored groups are leveraging weaknesses in IoT devices to build botnets, and attacking private industry and public infrastructure in attacks, according to a Booz Allen report.๐ Read
via "Security on TechRepublic".
TechRepublic
3 ways state actors target businesses in cyber warfare, and how to protect yourself
State-sponsored groups are leveraging weaknesses in IoT devices to build botnets, and attacking private industry and public infrastructure in attacks, according to a Booz Allen report.
๐ด Facebook Struggles in Privacy Class-Action Lawsuit ๐ด
๐ Read
via "Dark Reading: ".
Facebook's privacy disclosures "are quite vague" and should have been made more prominent, a federal judge argued.๐ Read
via "Dark Reading: ".
Dark Reading
Facebook Struggles in Privacy Class-Action Lawsuit
Facebook's privacy disclosures are quite vague and should have been made more prominent, a federal judge argued.
โ Spy Campaign Spams Pro-Tibet Group With ExileRAT โ
๐ Read
via "Threatpost | The first stop for security news".
Referencing the Dalai Lama, the spam campaign is targeting recipients of a mailing list run by the Central Tibetan Administration.๐ Read
via "Threatpost | The first stop for security news".
Threat Post
Spy Campaign Spams Pro-Tibet Group With ExileRAT
Referencing the Dalai Lama, the spam campaign is targeting recipients of a mailing list run by the Central Tibetan Administration.
๐ด Researchers Devise New Method of Intrusion Deception for SDN ๐ด
๐ Read
via "Dark Reading: ".
Team from University of Missouri take wraps off Dolus, a system 'defense using pretense' which they say will help defend software-defined networking (SDN) cloud infrastructure.๐ Read
via "Dark Reading: ".
Dark Reading
Researchers Devise New Method of Intrusion Deception for SDN
Team from University of Missouri take wraps off Dolus, a system 'defense using pretense' which they say will help defend software-defined networking (SDN)
cloud infrastructure.
cloud infrastructure.
<b>⌨ Crooks Continue to Exploit GoDaddy Hole ⌨</b>
<code>Godaddy.com, the worldโs largest domain name registrar, recently addressed an authentication weakness that cybercriminals were using to blast out spam through legitimate, dormant domains. But several more recent malware spam campaigns suggest GoDaddyโs fix hasnโt gone far enough, and that scammers likely still have a sizable arsenal of hijacked GoDaddy domains at their disposal.</code><code>Media</code><code>On January 22, KrebsOnSecurity published research showing that crooks behind a series of massive sextortion and bomb threat spam campaigns throughout 2018 โ an adversary thatโs been dubbed โSpammy Bearโ โ achieved an unusual amount of inbox delivery by exploiting a weakness at GoDaddy which allowed anyone to add a domain to their GoDaddy account without validating that they actually owned the domain.</code><code>Spammy Bear targeted dormant but otherwise legitimate domains that had one thing in common: They all at one time used GoDaddyโs hosted Domain Name System (DNS) service. Researcher Ron Guilmette discovered that Spammy Bear was able to hijack thousands of these dormant domains for spam simply by registering free accounts at GoDaddy and telling the companyโs automated DNS service to allow the sending of email with those domains from an Internet address controlled by the spammers.</code><code>Very soon after that story ran, GoDaddy said it had put in place a fix for the problem, and had scrubbed more than 4,000 domain names used in the spam campaigns that were identified in my Jan. 22 story. But on or around February 1, a new spam campaign that leveraged similarly hijacked domains at GoDaddy began distributing Gand Crab, a potent strain of ransomware.</code><code>As noted in a post last week at the blog MyOnlineSecurity, the Gand Crab campaign used a variety of lures, including fake DHL shipping notices and phony AT&T e-fax alerts. The domains documented by MyOnlineSecurity all had their DNS records altered between Jan. 31 and Feb. 1 to allow the sending of email from Internet addresses tied to two ISPs identified in my original Jan. 22 report on the GoDaddy weakness.</code><code>โWhat makes these malware laden emails much more likely to be delivered is the fact that the sending domains all have a good reputation,โ MyOnlineSecurity observed. โThere are dozens, if not hundreds of domains involved in this particular campaign. Almost all the domains have been registered for many years, some for more than 10 years.โ</code><code>Media</code><code>A โpassive DNSโ lookup shows the DNS changes made by the spammers on Jan. 31 for one of the domains used in the Gand Crab spam campaign documented by MyOnlineSecurity. Image: Farsight Security.</code><code>In a statement provided to KrebsOnSecurity, GoDaddy said the company was confident the steps it took to address the problem were working as intended, and that GoDaddy had simply overlooked the domains abused in the recent GandCrab spam campaign.</code><code>โThe domains used in the Gand Crab campaign were modified before then, but we missed them in our initial sweep,โ GoDaddy spokesperson Dan Race said. โWhile we are otherwise confident of the mitigation steps we took to prevent the dangling DNS issue, we are working to identify any other domains that need to be fixed.โ</code><code>โWe do not believe it is possible for a person to hijack the DNS of one or more domains using the same tactics as used in the Spammy Bear and Gand Crab campaigns,โ Race continued. โHowever, we are assessing if there are other methods that may be used to achieve the same results, and we continue our normal monitoring for account takeover. We have also set up a reporting alias at dns-spam-concerns@godaddy.com to make it easier to report any suspicious activity or any details that might help our efforts to stop this kind of abuse.โ</code><code>That email address is likely to receive quite a few tips in the short run. Virus Bulletin editorโฆ
<code>Godaddy.com, the worldโs largest domain name registrar, recently addressed an authentication weakness that cybercriminals were using to blast out spam through legitimate, dormant domains. But several more recent malware spam campaigns suggest GoDaddyโs fix hasnโt gone far enough, and that scammers likely still have a sizable arsenal of hijacked GoDaddy domains at their disposal.</code><code>Media</code><code>On January 22, KrebsOnSecurity published research showing that crooks behind a series of massive sextortion and bomb threat spam campaigns throughout 2018 โ an adversary thatโs been dubbed โSpammy Bearโ โ achieved an unusual amount of inbox delivery by exploiting a weakness at GoDaddy which allowed anyone to add a domain to their GoDaddy account without validating that they actually owned the domain.</code><code>Spammy Bear targeted dormant but otherwise legitimate domains that had one thing in common: They all at one time used GoDaddyโs hosted Domain Name System (DNS) service. Researcher Ron Guilmette discovered that Spammy Bear was able to hijack thousands of these dormant domains for spam simply by registering free accounts at GoDaddy and telling the companyโs automated DNS service to allow the sending of email with those domains from an Internet address controlled by the spammers.</code><code>Very soon after that story ran, GoDaddy said it had put in place a fix for the problem, and had scrubbed more than 4,000 domain names used in the spam campaigns that were identified in my Jan. 22 story. But on or around February 1, a new spam campaign that leveraged similarly hijacked domains at GoDaddy began distributing Gand Crab, a potent strain of ransomware.</code><code>As noted in a post last week at the blog MyOnlineSecurity, the Gand Crab campaign used a variety of lures, including fake DHL shipping notices and phony AT&T e-fax alerts. The domains documented by MyOnlineSecurity all had their DNS records altered between Jan. 31 and Feb. 1 to allow the sending of email from Internet addresses tied to two ISPs identified in my original Jan. 22 report on the GoDaddy weakness.</code><code>โWhat makes these malware laden emails much more likely to be delivered is the fact that the sending domains all have a good reputation,โ MyOnlineSecurity observed. โThere are dozens, if not hundreds of domains involved in this particular campaign. Almost all the domains have been registered for many years, some for more than 10 years.โ</code><code>Media</code><code>A โpassive DNSโ lookup shows the DNS changes made by the spammers on Jan. 31 for one of the domains used in the Gand Crab spam campaign documented by MyOnlineSecurity. Image: Farsight Security.</code><code>In a statement provided to KrebsOnSecurity, GoDaddy said the company was confident the steps it took to address the problem were working as intended, and that GoDaddy had simply overlooked the domains abused in the recent GandCrab spam campaign.</code><code>โThe domains used in the Gand Crab campaign were modified before then, but we missed them in our initial sweep,โ GoDaddy spokesperson Dan Race said. โWhile we are otherwise confident of the mitigation steps we took to prevent the dangling DNS issue, we are working to identify any other domains that need to be fixed.โ</code><code>โWe do not believe it is possible for a person to hijack the DNS of one or more domains using the same tactics as used in the Spammy Bear and Gand Crab campaigns,โ Race continued. โHowever, we are assessing if there are other methods that may be used to achieve the same results, and we continue our normal monitoring for account takeover. We have also set up a reporting alias at dns-spam-concerns@godaddy.com to make it easier to report any suspicious activity or any details that might help our efforts to stop this kind of abuse.โ</code><code>That email address is likely to receive quite a few tips in the short run. Virus Bulletin editorโฆ
๐ด 6 Security Tips Before You Put a Digital Assistant to Work ๐ด
๐ Read
via "Dark Reading: ".
If you absolutely have to have Amazon Alexa or Google Assistant in your home, heed the following advice.๐ Read
via "Dark Reading: ".
Dark Reading
6 Security Tips Before You Put a Digital Assistant to Work
If you absolutely have to have Amazon Alexa or Google Assistant in your home, heed the following advice.
ATENTIONโผ New - CVE-2016-1000276
๐ Read
via "National Vulnerability Database".
Audacity version 2.1.2 is vulnerable to DLL Hijack, it tries to load avformat-55.dll without supplying the absolute path, thus relying upon the presence of such DLL on the system directory. This behavior results in an exploitable DLL Hijack vulnerability, even if the SafeDllSerchMode flag is enabled.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2016-1000271
๐ Read
via "National Vulnerability Database".
Joomla extension DT Register version before 3.1.12 (Joomla 3.x) / 2.8.18 (Joomla 2.5) contains an SQL injection in "/index.php?controller=calendar&format=raw&cat[0]=SQLi&task=events". This attack appears to be exploitable if the attacker can reach the web server.๐ Read
via "National Vulnerability Database".
๐ด New Botnet Shows Evolution of Tech and Criminal Culture ๐ด
๐ Read
via "Dark Reading: ".
Cayosin brings together multiple strands of botnet tech and hacker behavior for a disturbing new threat.๐ Read
via "Dark Reading: ".
Darkreading
New Botnet Shows Evolution of Tech and Criminal Culture
Cayosin brings together multiple strands of botnet tech and hacker behavior for a disturbing new threat.
๐ด Exposed Consumer Data Skyrocketed 126% in 2018 ๐ด
๐ Read
via "Dark Reading: ".
The number of data breaches dropped overall, but the amount of sensitive records exposed jumped to 446.5 million last year, according to the ITRC.๐ Read
via "Dark Reading: ".
Darkreading
Exposed Consumer Data Skyrocketed 126% in 2018
The number of data breaches dropped overall, but the amount of sensitive records exposed jumped to 446.5 million last year, according to the ITRC.
โ Kidsโ GPS watches are still a security โtrain wreckโ โ
๐ Read
via "Naked Security".
Anyone could have accessed the entire database, including a child's location, on Gator watches and other models that share its back end.๐ Read
via "Naked Security".
Naked Security
Kidsโ GPS watches are still a security โtrain wreckโ
Anyone could have accessed the entire database, including a childโs location, on Gator watches and other models that share its back end.
ATENTIONโผ New - CVE-2017-18362
๐ Read
via "National Vulnerability Database".
ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.๐ Read
via "National Vulnerability Database".
โ Crypto exchange in limbo after founder dies with password โ
๐ Read
via "Naked Security".
The only person who knew the password is dead, leaving customers unable to access around $190million in fiat and virtual currency.๐ Read
via "Naked Security".
Naked Security
Crypto exchange in limbo after founder dies with password
The only person who knew the password is dead, leaving customers unable to access around $190million in fiat and virtual currency.