NCSC-FI News followup

Daily NCSC-FI news followup 2019-07-19

Security Lessons From a New Programming Language A security professional needed a secure language for IoT development. So he wrote his own, applying learned lessons about memory and resources in the process.

It’s never good when ‘Magecart’ and ‘bulletproof’ appear in the same sentence, but here we are Researchers with security shop Malwarebytes say that the data-exfiltration and hosting servers used by Magecart operations to collect harvested card details have been traced to the Ukrainian city of Luhansk, located in an area contested by pro-European and pro-Russian forces.

BitPaymer Ransomware Operators Wage Custom, Targeted Attacks Researchers from Morphisec say they have observed the tactic being used against numerous public and private sector organizations across the US over the last three months.

One Thousand Misspelled Security Headers On a client engagement, my security tooling was notifying me of a missing “X-XSS-Protection” header on the client’s website. A quick manual inspection showed that the site was seemingly setting the header, but a second look showed that the site had actually set an “X-XXS-Protection” header. This typo results in a missing additional security control. This made me wonder, “Who else is fat-fingering their security headers?”

Fileless Malware Advisory The Cyber Centre has become aware of a fileless malware campaign affecting Microsoft Windows users that is currently gaining traction. The Astaroth malware, a notorious info-stealing malware known for stealing sensitive information like credentials, keystrokes, and other data, resides solely in memory and is much more difficult to detect than traditional malware.

Elusive MegaCortex Ransomware Found – Here is What We Know When Sophos analyzed the vicitm’s computers, they found that the attackers were gaining access to a network and then compromising the Windows domain controller. Once the domain controller was compromised the attackers would install Cobalt Strike in order to open a reverse shell back to the attackers.. Now that the attackers had full access to the network, they would use PsExec to distribute a batch file and the ransomware named as winnit.exe to the rest of the computers on the network. It would then execute this batch file in order to encrypt the various compromised workstations.

Huawei says Hongmeng operating system not for smartphones, intends to continue with Android When FireEye had visibility on the CnC server, we saw the attackers engage in post-compromise information gathering and lateral movement on the target network, where upon FireEye immediately contacted the relevant authorities and began the notification process.. BRUSSELS, July 18 (Xinhua) — Huawei board member and senior Vice President Catherine Chen said here on Thursday that the company’s Hongmeng operating system is not for smartphones and the company intends to continue to use Google’s Android operating system for its smartphones.

To foil hackers, this chip can change its code in the blink of an eye The aim is to make it incredibly difficult for hackers to exploit key software that helps govern the chip’s operation. Morpheus does this by repeatedly randomizing elements of the code that attackers need access to in order to compromise the hardware. This can be achieved without disrupting the software applications that are powered by the processor.. [UMich] Austin said a prototype has already resisted every known variant of a widely-used hacking technique known as a control-flow attack

Mozilla Distrusts Certinomis Issued Certificates Certinomis, a French certification authority, is being removed from browsers due to repeated violations of certificate validation rules. A Certification Authority (CA) is an organization that browser vendors trust to issue certificates to websites. Unfortunately, a lot of times these organizations, due to various reasons, misissue certificates that violate the requirements set by the CA/Browser forum (for short CABForum).

Old Tools for New Money: URL Spreading Shellbot and XMRig Using 17-year old XHide One of our honeypots detected a threat that propagates by scanning for open ports and brute forcing weak credentials, installing a Monero cryptocurrency miner and a Perl-based IRC backdoor as the final payload. The miner process is hidden using XHide Process Faker, a 17-year old open source tool used to fake the name of a process. According to our analysis, we found the attacker issuing commands to the vulnerable machine that will download and install the backdoor and miner. The backdoor called Shellbot, and is capable of scanning for open ports, downloading files, executing UDP floods, and remotely executing shell commands

With FaceApp in the spotlight, new scams emerge ESET researchers discover fraudulent schemes piggybacking on the popularity of the face-modifying tool FaceApp, using a fake Pro version of the application as a lure. The FaceApp application, which offers various face-modifying filters, is available for both Android and iOS. While the app itself is free, some features, marked as PRO, are paid. Recent concerns about FaceApp privacy issues have generated a huge wave of media attention. Scammers have been trying, to various ends, to exploit this wave of interest, using a fake Pro yet free version of the application as a lure. The fraudsters have also made an effort to spread the word about this fictitious version of the currently-viral app at the time of writing this blogpost, a Google search for FaceApp Pro returns some 200,000 articles

Kazakhstan Begins Intercepting HTTPS Internet Traffic Of All Citizens Forcefully If you are in Kazakhstan and unable to access the Internet service without installing a certificate, you’re not alone. The Kazakhstan government has once again issued an advisory to all major local Internet Service Providers (ISPs) asking them to make it mandatory for all their customers to install government-issued root certificates on their devices in order to regain access to the Internet services. The root certificate in question, labeled as “trusted certificate” or “national security certificate,” if installed, allows ISPs to intercept and monitor users’ encrypted HTTPS and TLS connections, helping the government spy on its citizens and censor content

Bug in NVIDIAs Tegra Chipset Opens Door to Malicious Code Execution Researcher creates Selfblow proof-of-concept attack for exploiting a vulnerability that exists in every single Tegra device released so far. A flaw impacting millions of mobile and internet of things (IoT) devices running NVIDIAs Tegra processor opens the door for a variety of attacks, including device hijacking or siphoning of data. The warning comes from researcher Triszka Balázs, who discovered the flaw and asserts that the bug affects every single Tegra device released so far. He also created a proof-of-concept (PoC), called Selfblow, to exploit the vulnerability. On Thursday, NVIDIA released a patch for the bug (CVE20195680) via a security bulletin

Onko kyberaseista vanhan ajan ydinpelotteen korvaajiksi? Kyberiskut ovat halpoja ja aseet lähes kaikkien saatavilla. Koska tässä “tylsässä vanhassa maailmassa” riittää aina vain konflikteja, turvallisuutta hakevien valtioiden kannattaisi edes harkita kyberaseiden sijasta kunnon pelotteita eli ydinaseita rauhan takeeksi, eräs Australian johtavista strategeista vertailee erilaisia uhkakuvia

4 miljoonan ihmisen tiedot kaupan netissä 6 selainlaajennukselle kenkää The Washington Post löysi kuusi häijyä selainlaajennusta Chrome- ja Firefox-selaimista. Ongelma on kuitenkin paljon tätä suurempi. Googlen Chrome-selainta ja Mozillan Firefox-selainta on usein mukava ja hyödyllistäkin höystää niin sanotuilla laajennuksilla ohjelmilla, jotka lisäävät selaimeen uusia toimintoja. Käyttäjät saattavat pitää laajennuksia tarjoavia virallisia kauppoja turvallisina, mutta niihin livahtaa silti myös haitallisia laajennuksia, kuten vaikkapa Androidin Google Play -kauppaan

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.