NCSC-FI News followup

Daily NCSC-FI news followup 2020-08-14

NSA and FBI Cybersecurity Advisory – Russian GRU 85th GTsSS Deploys Previously Undisclosed Drovorub Malware Drovorub is a Linux malware toolset consisting of an implant coupled with a kernel module rootkit, a file transfer and port forwarding tool, and a Command and Control (C2) server. When deployed on a victim machine, the Drovorub implant (client) provides the capability for direct communications with actorcontrolled C2 infrastructure; file download and upload capabilities; execution of arbitrary commands as “root”; and port forwarding of network traffic to other hosts on the network.

Australian government wants power to run cyber-response for businesses under attack Ponders giving ’em immunity too for countermeasures up to hacking back. Australia’s government has proposed giving itself the power to take over private enterprises’ response to cyber-attacks on critical infrastructure.

CactusPete APT group’s updated Bisonal backdoor CactusPete (also known as Karma Panda or Tonto Team) is an APT group that has been publicly known since at least 2013. Some of the group’s activities have been previously described in public by multiple sources. We have been investigating and privately reporting on this group’s activity for years as well. Historically, their activity has been focused on military, diplomatic and infrastructure targets in Asia and Eastern Europe. This is also true of the group’s latest activities. A new CactusPete campaign, spotted at the end of February 2020 by Kaspersky, shows that the group’s favored types of target remain the same. The victims of the new variant of the Bisonal backdoor, according to our telemetry, were from financial and military sectors located in Eastern Europe. Our research started from only one sample, but by using the Kaspersky Threat Attribution Engine (KTAE) we found 300+ almost identical samples. All of them appeared between March 2019 and April 2020. This underlines the speed of CactusPete’s development more than 20 samples per month. The target location forced the group to use a hardcoded Cyrillic codepage during string manipulations. This is important, for example, during remote shell functionality, to correctly handle the Cyrillic output from executed commands. Once the malware starts it tries to reach a hardcoded C2. The communication takes place using the unmodified HTTP-based protocol, the request and response body are RC4-encrypted, and the encryption key is also hardcoded into the sample. As the result of the RC4 encryption may contain binary data, the malware additionally encodes it in BASE64, to match the HTTP specification.

IoT Security: 7 Essential Must-Knows Today’s enterprises are moving at great speed towards transformation, and the definition of their network is constantly changingwith hybrid clouds, IoT devices, and now home offices. With an expanding network edge comes increased cyber riskinseparably linking businesses to frequent, severe and sophisticated cyberattacks.

Tor and anonymous browsing just how safe is it? Loosely speaking, that strapline implies that if you visit a website using Tor, typically in the hope of remaining anonymous and keeping away from unwanted surveillance, censorship or even just plain old web tracking for marketing purposes. then one in four of those visits (perhaps more!) will be subject to the purposeful scrutiny of cybercriminals.

NHS Test and Trace app security redux NCSC Technical Director Dr Ian Levy and the NHS Test and Trace App acting CISO Stuart H explain how security and privacy have been approached in the new version of the app.

USA:n vaatimus huolestuttaa perustelee koronavirusta vastaan taistelemisella Yhdysvallat toivoo pääsevänsä käsiksi ihmisten paikkatietoihin, nimettömät lähteet paljastavat.

Phishing Emails Used to Deploy KONNI Malware The Cybersecurity and Infrastructure Security Agency (CISA) has observed cyber actors using emails containing a Microsoft Word document with a malicious Visual Basic Application (VBA) macro code to deploy KONNI malware. KONNI is a remote administration tool (RAT) used by malicious cyber actors to steal files, capture keystrokes, take screenshots, and execute arbitrary code on infected hosts.

Mac malware spreads through Xcode projects, abuses WebKit, Data Vault vulnerabilities Xcode projects are being exploited to spread a form of Mac malware specializing in the compromise of Safari and other browsers.

Mekotio: These arent the security updates youre looking for Another in our occasional series demystifying Latin American banking trojans

300,000 links taken down in crackdown on investment scams with bogus celebrity endorsements NCSC issues warning to criminals stealing money from people with the promise of get-rich-quick schemes from phoney celebrity testimonials that cost victims hundreds of millions a year.

Microsoft Defender casts a jaundiced eye over Citrix, slams services in quarantine on suspicion of being malware You say broker, I say trojan, let’s call the whole thing off

Critical Flaws in WordPress Quiz Plugin Allow Site Takeover The recently patched flaws could be abused by an unauthenticated, remote attackers to take over vulnerable websites.

Instagram Retained Deleted User Data Despite GDPR Rules The photo-sharing app retained peoples photos and private direct messages on its servers even after users removed them.

Chrome extensions that lie about their permissions Recently, we came across a family of search hijackers that are deceptive about the permissions they are going to use in their install prompt.

Google resumes its attack on the URL bar, hides full addresses on Chrome 86 Google has tried on and off for years to hide full URLs in Chrome’s address bar, because apparently long web addresses are scary and evil. Despite the public backlash that came after every previous attempt, Google is pressing on with new plans to hide all parts of web addresses except the domain name in Chrome 86, this time accompanied by an admittedly hover animation.

How Your Unemployment Checks Are At Risk From Russian Cyber Thieves American unemployment checks have become the latest target for cyber thieves who have lurched from one scam to another as the world battles the coronavirus pandemic.

A simple telephony honeypot received 1.5 million robocalls across 11 months Researchers say that most campaigns take place in short-burst storms and that answering a robocall doesn’t mean you’ll be targeted more often in the future.

Alexa vulnerability is a reminder to delete your voice history The one-click hack could’ve let an attacker view all the conversations you’ve had with Amazon’s voice assistant.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.