Daily NCSC-FI news followup 2019-09-06

Critical Exim TLS Flaw Lets Attackers Remotely Execute Commands as Root

www.bleepingcomputer.com/news/security/critical-exim-tls-flaw-lets-attackers-remotely-execute-commands-as-root/ The bug allows local or unauthenticated remote attackers to execute programs with root privileges on servers that accept TLS connections.

Metasploit team releases BlueKeep exploit

www.zdnet.com/article/metasploit-team-releases-bluekeep-exploit/ Metasploit BlueKeep module can achieve code execution, is easy to use.. BlueKeep, also known as CVE-2019-0708, is a vulnerability in the Remote Desktop Protocol (RDP) service in older versions of the Windows operating system (Windows XP, Windows 2003, Windows 7, Windows Server 2008, and Windows Server 2008 R2).

GootKit Malware Bypasses Windows Defender by Setting Path Exclusions

www.bleepingcomputer.com/news/security/gootkit-malware-bypasses-windows-defender-by-setting-path-exclusions/ As Windows Defender matures and becomes tightly integrated into Windows 10, malware writers are creating techniques to evade its detection. Such is the case with the GootKit banking Trojan, which use a UAC bypass and WMIC commands to exclude the malware executable from being scanned by Windows Defender Antivirus.

Lilocked Ransomware Actively Targeting Servers and Web Sites

www.bleepingcomputer.com/news/security/lilocked-ransomware-actively-targeting-servers-and-web-sites/ A relatively new ransomware named Lilocked by researchers and Lilu by the developers is actively targeting servers and encrypting the data located on them. All of the known infected servers are web sites, which is causing the encrypted files to show up in Google search results.

Ransomware Protection Strategies

www.us-cert.gov/ncas/current-activity/2019/09/06/ransomware-protection-strategies The Cybersecurity and Infrastructure Security Agency (CISA) has observed an increase in ransomware attacks across the Nation. Helping organizations protect themselves from ransomware is a chief priority for CISA. Organizations are encouraged to review the following resources to help prevent, mitigate, and recover against ransomware

Over $37 Million Lost by Toyota Boshoku Subsidiary in BEC Scam

www.bleepingcomputer.com/news/security/over-37-million-lost-by-toyota-boshoku-subsidiary-in-bec-scam/ Toyota Boshoku Corporation, a car components manufacturer member of the Toyota Group, announced today that one of its European subsidiaries lost more than $37 million following a business email compromise (BEC) attack.

China hacked Asian telcos to spy on Uighur travelers: sources

www.reuters.com/article/us-china-cyber-uighurs-idUSKCN1VQ1A5 Hackers working for the Chinese government have broken into telecoms networks to track Uighur travelers in Central and Southeast Asia, two intelligence officials and two security consultants who investigated the attacks told Reuters.

Belarusian police shut down notorious hacking forum

www.zdnet.com/article/belarusian-police-shut-down-notorious-hacking-forum/ XakFor served as a cybercrime hub for Russian-speaking criminals since 2012.

Facebook, Microsoft: We’ll pay out $10m for tech to spot deepfake videos

www.zdnet.com/article/facebook-microsoft-well-pay-out-10m-for-tech-to-spot-deepfake-videos/ Facebook will create its own deepfake videos to help build a system that can detect them.

FunkyBot Malware Intercepts Android Texts, 2FA Codes

threatpost.com/funkybot-malware-intercepts-android-texts-2fa-codes/148059/ The spyware poses as a legitimate application, spreading via SMS messages to victims contact lists.

Chinas APT3 Pilfers Cyberweapons from the NSA

threatpost.com/chinas-apt3-pilfers-cyberweapons-nsa/148086/ Large portions of APT3s remote code-execution package were likely reverse-engineered from prior attack artifacts.

600,000 GPS trackers left exposed online with a default password of ‘123456’

www.zdnet.com/article/600000-gps-trackers-left-exposed-online-with-a-default-password-of-123456/ At least 600,000 GPS trackers manufactured by a Chinese company are using the same default password of “123456,” security researchers from Czech cyber-security firm Avast disclosed today.

Malware Classification with Graph Hash, Applied to the Orca Cyberespionage Campaign

blog.trendmicro.com/trendlabs-security-intelligence/malware-classification-with-graph-hash-applied-to-the-orca-cyberespionage-campaign/ Our research, which weve named Graph Hash, builds on the advantages of these two approaches by calculating the hash of executable files using a graph view, which would help in classifying malware more consistently and efficiently. Our research aims to provide a viable approach to malware classification, which, in turn, can help in the sharing of actionable threat intelligence beyond simple checksums, such as MD5s and secure hash algorithm (S

You might be interested in …

Daily NCSC-FI news followup 2020-02-11

Will an immobilizer save your car from being stolen? www.kaspersky.com/blog/36c3-immobilizers/32419/ Automobiles are getting ever smarter, and cracking them with a crowbar and a screwdriver is getting ever more difficult. Statistics back up that assumption: According to research from Jan C. van Ours and Ben Vollaard highlighting car theft and recovery data, vehicle theft decreased by […]

Read More

Daily NCSC-FI news followup 2019-06-19

Apu: Kyberhyökkäys tietoverkkoihin voisi pimentää Suomen oletko varautunut? www.apu.fi/artikkelit/kyberhyokkays-tietoverkkoihin-voisi-pimentaa-suomen Kiinan tiedustelupalvelu värvää vakoilijoita LinkedInissä myös suomalaisia ulkopolitiikan asiantuntijoita lähestytty yle.fi/uutiset/3-10838995 Raportin on laatinut Ulkopoliittisen instituutin ohjelmajohtaja Mika Aaltola. Quick Detect: Exim “Return of the Wizard” Attack isc.sans.edu/forums/diary/Quick+Detect+Exim+Return+of+the+Wizard+Attack/25052/ =Thanks to our reader Alex for sharing some of his mail logs with the latest attempts to exploit […]

Read More

Daily NCSC-FI news followup 2019-09-04

Satori IoT Botnet Operator Pleads Guilty krebsonsecurity.com/2019/09/satori-iot-botnet-operator-pleads-guilty/ A 21-year-old man from Vancouver, Wash. has pleaded guilty to federal hacking charges tied to his role in operating the Satori botnet, a crime machine powered by hacked Internet of Things (IoT) devices that was built to conduct massive denial-of-service attacks targeting Internet service providers, online gaming platforms […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.