NCSC-FI News followup

Daily NCSC-FI news followup 2019-07-03

Facebook says its working to resolve outages across Instagram, WhatsApp, and Messenger Facebook has had problems loading images, videos, and other data across its apps today, leaving some people unable to load photos in the Facebook News Feed, view stories on Instagram, or send messages in WhatsApp. Facebook says it is aware of the issues and working to get things back to normal as quickly as possible.

China’s Border Guards Secretly Installing Spyware App on Tourists’ Phones Chinese authorities are secretly installing surveillance apps on smartphones of foreigners at border crossings in the Xinjiang region who are entering from neighboring Kyrgyzstan, an international investigation revealed.

Bangladesh Cyber Heist 2.0: Silence APT goes global Group-IB, an international company that specializes in preventing cyber attacks, has established that Silence, a Russian-speaking cybercriminal group is likely to be behind the brazen attack on Dutch-Bangla Banks ATMs resulting in the theft of $3 million, the amount reported by the local media.. The actual amount of money stolen could be much higher. This is one of Silences most recent international attacks, which indicates that the gang has expanded its geography and has gone global, focusing now on APAC markets.. see also

NHS warned to act now to keep hackers at bay

US Cyber Command issues alert about hackers exploiting Outlook vulnerability US Cyber Command has issued an alert via Twitter today about threat actors abusing an Outlook vulnerability to plant malware on government networks.. Chronicle links the malware samples to Iran’s APT33 group, which previously developed the infamous Shamoon malware.

Trickbot Trojan Now Has a Separate Cookie Stealing Module Trickbot trojan now comes with a separate module for stealing browser cookies, threat researchers found on Tuesday, marking new progress in the malware’s development.

This hacking gang just switched its malware attacks to a new target One of the world’s most successful cybercriminal groups has altered its tactics and is also distributing a new form of malware as part of its latest campaign, which this time targets bank and financial services employees in the US, the United Arab Emirates and Singapore.. see also

First-ever malware strain spotted abusing new DoH (DNS over HTTPS) protocol Godlua, a Linux DDoS bot, is the first-ever malware strain seen using DoH to hide its DNS traffic.. see also

Public Certificate Poisoning Can Break Some OpenPGP Implementations OpenPGP installations can grind to a halt and fail to verify the authenticity of downloaded packages as the keyserver network has been flooded with bogus extra signatures attesting ownership of a certificate.

17-Year-Old Weakness in Firefox Let HTML File Steal Other Files From Device Except for phishing and scams, downloading an HTML attachment and opening it locally on your browser was never considered as a severe threat until a security researcher today demonstrated a technique that could allow attackers to steal files stored on a victim’s computer.

Breaking & Entering with Zipato SmartHubs During the 0DAYALLDAY Research Event three vulnerabilities were discovered in the ZipaMicro Z-Wave Controller Model #: ZM.ZWUS and the Zipabox Z-Wave Controller Model #: 2AAU7-ZBZWUS. Two vulnerabilities are in the design and implementation of the authentication mechanism in the Zipato Application Programming Interface (API). The third vulnerability is embedded SSH private key for ROOT which isn’t unique and can be extracted.

Vakava varoitus: sotilassatelliitit ovat alttiita hakkeroinnille tehokkaampaa kuin tuhoaminen Tuore Iso-Britannian Royal Institute of International Affairs – -ajatushautomon selvityksen mukaan sotilassatelliitit ovat edelleen haavoittuvaisia hakkeroinneille tai muille häirinnän muodoille, kuten spoofingille, jonka turvin voidaan tuottaa esimerkiksi väärää gps-signaalia.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.