Feed aggregator

Backdoors Found Leveraging Pastebin

Threatpost for B2B - Wed, 01/07/2015 - 14:12
Instead of relying on their own sites to host malware, hackers are using a series of strings of malicious backdoor code on Pastebin sites and calling upon it to execute malware.

Dridex Banking Trojan Spreading Via Office Macros

Threatpost for B2B - Wed, 01/07/2015 - 13:15
Spam campaigns in the U.K. are using Office macros to spread the Dridex banking Trojan, researchers at Trustwave report.

New Emomet Variant Targets Banking, Email Credentials

Threatpost for B2B - Wed, 01/07/2015 - 11:35
Security researchers are tracking a new version of the Emomet malware that is targeting users’ banking credentials and also has the ability to steal email usernames and passwords, which are then used to send spam from compromised accounts. The new variant of Emomet has mostly been seen targeting users in Germany, but researchers at Microsoft […]

The second round of CODE BLUE in Japan

Secure List feed for B2B - Wed, 01/07/2015 - 01:33

CODE BLUE@TOKYO, a cutting-edge IT security conference, was held from 18th -19th December. It was the second round, following its first occurrence in February 2014.

More than 400 people came together from all around the world, including one remotely participating in the conference via a drone. Heated discussions took place among researchers and engineers during intervals, lunchtime and coffee breaks - some were too enthusiastic they almost missed the next presentation (I admit I was one of them).

The concept of the meeting is "an international conference where the world's top class information security specialists gather to give cutting edge talks, and is a place for all participants to exchange information and interact beyond borders and languages." As this states, all the presentations were of high-quality technical research selected from topics submitted from researchers around the world. The security topics include: embedded technologies, penetration testing, vulnerabilities, malware, programming and more. It would be perfect if I could cover all the presentations, but to save my time and yours, I would like to pick up five of them.

  1. A security assessment study and trial of Tricore-powered automotive ECU

Dennis Kengo Oka (ETAS) and Takahiro Matsuki (FFRI) analyzed the behavior of ECU software running on TriCore, to attempt to verify the possibilities of attacks against it. Although they were not able to obtain the actual software itself for their testing, they created a test program on their own to show that the control system of TriCore was at risk of attack. There was a return address in a certain part of memory, and it was possible to transfer processing of the program to an arbitrary address if this was successfully overwritten. They proved the vulnerability by means of four demos, using an evaluation board. They said that they would need to obtain the ECU software actually used by TriCore in order to investigate whether or not the vulnerability could be a real threat.

  1. Physical [In]Security: It's not ALL about Cyber

Inbar Raz (Check Point) presented risks in cinema-ticketing machines, PoS machines and TVs in hospitals. Such devices have USB/LAN ports; and inserting USB keyboards or flash drives with LiveOS into those ports and booting them makes it possible to extract data stored on these devices. Since these devices often store credit card information or private keys for communications, this may pose risks. Through the presentation, Raz pointed out that special devices commonly used in public often lack protection against inappropriate access and could give away confidential data to malicious third parties.

 

  1. The story of IDA Pro

The keynote for Day 2, by Ilfak Guilfanov, was about the history of IDA from ver. 0.1 to IDA Pro. He outlined how IDA was created; which functionalities had been implemented; what issues have been resolved; and the existence of a pirated version of IDA Pro. Besides the future landscape of IDA Pro, the identity of the icon-lady was also revealed.

IDA Pro is widely used among engineers and malware researchers in their analysis of programs; I am not an exception.

 

  1. Drone attack by malware and network hacking

Dongcheol Hong (SEWORKS) pointed out the inadequate security settings of a drone system and showed that it was easy to hijack a drone. In his video he demonstrated experiments of malware infection via a smartphone app and an attack from an infected drone to a clean drone. At the end of the presentation, he warned that drones could possibly pose threats to other systems, since it may be possible to conduct a remote attack through PC, AP, or smart devices.

 

  1. Embedded Security in The Land of the Rising Sun

Ben Schmidt (Narf Industries) and Paul Makowski (Narf Industries) focused on routers commonly used in Japan, outlined which part of their code was vulnerable and demonstrated an attack on a router. According to them, there are a lot of home routers worldwide, which allow access to HTTP and UPnP ports from a WAN – Japan was number four on their worldwide list. They further pointed out that at the time of their presentation there were ~200,000 vulnerable routers which allowed HTTP and UPnP access from a WAN in Japan. Schmidt and Makowski sent me some additional comments after their presentation. They said: "Japanese embedded devices are attractive targets because Japanese Internet links are high bandwidth and low latency." They also emphasized the importance of quick patching of embedded devices.

David Jacoby from Kaspersky Lab GReAT was also a speaker at CODE BLUE. His presentation, entitled "How I Hacked My Home" ,was about the results of him hacking his own devices at home. His blog post is available in Securelist.

Kaspersky Lab Japan was Emerald Sponsor of CODE BLUE, as it had been for the first round.

 

Morgan Stanley Insider Theft Affects Tenth of Wealth Management Clients

Threatpost for B2B - Tue, 01/06/2015 - 17:19
Morgan Stanley says it has fired an employee who allegedly stole information from 10 percent of the firm's wealth management clients with the intent of selling that data online.

Malvertising Campaign Uses AOL Ad Network, Leads to Exploit Kit

Threatpost for B2B - Tue, 01/06/2015 - 15:25
Researchers have detected a malvertising campaign running on a pair of sites owned by Huffington Post that is using ads distributed through an AOL ad network. The attack is sending victims through a series of redirects that eventually brings them to a landing page that is running an exploit kit.

Inside Cryptowall 2.0 Ransomware

Threatpost for B2B - Tue, 01/06/2015 - 14:36
An analysis of Cryptowall 2.0 reveals that the ransomware relies on complex encryption routines and sandbox detection capabilities to survive. It also uses Tor for command and control, and can execute on 32- and 64-bit systems.

Users Report Malicious Ads in Skype

Threatpost for B2B - Tue, 01/06/2015 - 12:01
Some Skype users have reported seeing malicious ads inside their Skype clients in recent days that lead to a site that tries to download a fake Adobe or Java update.

Moonpig API Vulnerability Exposes Payment Card Data

Threatpost for B2B - Tue, 01/06/2015 - 11:32
A researcher has called out U.K.-based personalized greeting card vendor Moonpig for a 17-month-old vulnerability that puts customer and payment card data at risk.

CERT Warns of UEFI Hardware Vulnerabilities

Threatpost for B2B - Mon, 01/05/2015 - 17:11
The CERT Coordination Center at the Software Engineering Institute at Carnegie Mellon University issued three advisories today warning of serious UEFI vulnerabilities.

Microsoft Reports Massive Increase in Macros-Enabled Threats

Threatpost for B2B - Mon, 01/05/2015 - 15:46
Microsoft is warning of a significant uptick in threats tricking users to enable macros and then infecting them with malicious macros files.

Wifiphisher Wi-Fi Hacking Tool Automates Phishing Attacks

Threatpost for B2B - Mon, 01/05/2015 - 14:34
A new Wi-Fi hacking tool, called wifiphisher, automates phishing attacks over WPA networks.

Bitcoin Exchange Bitstamp Offline Following Apparent Compromise

Threatpost for B2B - Mon, 01/05/2015 - 13:47
Bitstamp, a Bitcoin exchange based in the United Kingdom, remains offline this morning following what appears to have been a compromise over the weekend.

Openwall 3.1 Released With Fixes for Shellshock, POODLE Attack

Threatpost for B2B - Mon, 01/05/2015 - 12:42
The maintainers of the Openwall security enhanced Linux distribution have released a new stable version, which includes fixes for a number of serious vulnerabilities, such as the Shellshock Bash bug and the flaw in SSLv3 that leads to the POODLE attack. Openwall is designed to be a small, compact Linux distribution for servers, appliances and […]

U.S. Sanctions North Korea Defense Agencies, Individuals in Sony Hack

Threatpost for B2B - Fri, 01/02/2015 - 16:39
President Obama signed an Executive Order sanctioning three North Korea defense agencies and 10 individuals for the country's alleged role in the Sony hack.

Unpatched Windows Privilege Elevation Vulnerability Details Disclosed

Threatpost for B2B - Fri, 01/02/2015 - 12:40
Google's Project Zero disclosed details of a Windows privilege elevation vulnerability. Google said it reported the to Microsoft but it has yet to be patched.

WordPress Symposium Plug-In Plagued by File Upload Vulnerability

Threatpost for B2B - Wed, 12/31/2014 - 12:23
Researchers warn that since public disclosure of a file-upload vulnerability in the WordPress Symposium plug-in and the availability of proof-of-concept exploit code, scans and exploit attempts are on the rise.
Syndicate content