InfoSec News 20190703

  • Publicado: Qua, 03/07/2019 - 10:03

Top News


  • China's Border Guards Secretly Installing Spyware App on Tourists' Phones

"Chinese authorities are secretly installing surveillance apps on smartphones of foreigners at border crossings in the Xinjiang region who are entering from neighboring Kyrgyzstan, an international investigation revealed."

Link

TLP1 : Green

  • IBM Patches Critical, High-Severity Flaws in Spectrum Protect

"IBM has disclosed critical and high-severity vulnerabilities in Spectrum Protect, Big Blue’s security tool under the umbrella of its Spectrum data storage software branding. The most severe of these flaws could cause a remote attacker to execute arbitrary code on impacted systems."

Link

TLP1 : Green

  • New Dridex Variant Slips By Anti-Virus Detection

"Researchers have spotted a variant of the Dridex banking trojan with new obfuscation capabilities that help it skirt anti-virus detection."

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • Superannuation accounts a rich target for cyber-crime

"The superannuation industry has the highest frequency of material cyber incidents but the lowest preparedness for cyber-crime related incidents, according to Deloitte."

Link

TLP1 : Green

  • How a grim Eurovision Song Contest cyber attack was prevented at last second

"As millions of people around the world tuned into this year’s Eurovision Song Contest final in Tel Aviv, little did they know they were within one second of witnessing a grim cyber attack.
Foreign hackers infiltrated the system broadcasting the event globally online and tried to insert a disturbing video into the live feed.
Yigal Unna, Director General of the Israeli National Cyber Directorate, told Nine News the attack was stopped in the nick of time."

Link

TLP1 : Green

  • US Cyber Command warns of nation-state hackers exploiting Outlook

"The recent surge in state-backed hacking campaigns isn't dying down any time soon. US Cyber Command has reported that unnamed state actors are making "active malicious use" of a 2017-era Outlook vulnerability (long since patched) to escape the email..."

Link

TLP1 : Green

Breaches: Data Breaches and Hacks


  • Ransomware rakes in $1 million in a week

"In other Florida news, two municipalities were forced to pay over $1 million to recover from devastating ransomware attacks that sent their city infrastructure back to the stone age. The 911 response systems went down, payroll staff wrote checks by hand, citizens could not pay their water bills, and (of course) no proper backups were in place. In all, attackers earned $1.13 million for the cost of sending out a few emails to unsuspecting city workers."

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Mac Malware Pushed via Google Search Results, Masquerades as Flash Installer

" Never-before-seen Mac malware, dubbed OSX/CrescentCore, has been discovered in the wild. The trojan, spotted on various websites masquerading as an Adobe Flash Player installer, drops malicious applications and browser extensions on victims’ systems when downloaded. "

Link

TLP1 : Green

  • LooCipher: The New Infernal Ransomware

"A new Ransomware began to threats the digital world. This time using a nice but scary name: LooCipher. The name is at the same time an allusion to its capabilities (thank to the term “Cipher”) and to the popular religious figure, Lucifer. Despite its evocative nickname, the functionalities of this malware are pretty straight forward, not very different from those belonging to many other ransomware families, but digging into its internals we also found elements suggesting its operators could be able to run large scale campaigns. "

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • Cybersecurity analyst degree requirements, certifications and skill sets

"The main objective of a cybersecurity analyst is to analyze the security measures of an organization and conclude how effective they are. Their most important task is to be focused on protecting sensitive data. They identify security weaknesses and make recommendations to improve these flaws."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • SQLMap v1.3.7 - Automatic SQL Injection And Database Takeover Tool

"SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections."

Link

TLP1 : Green

  • Black Hat Survey Reveals Cyber Concerns

"Based on survey responses from conference attendees, the report, Consumers in the Crosshairs, looks at consumer concerns about their personal data potentially ending up in the hands of criminals as well as the ways in which security will affect the 2020 US presidential election."

Link

TLP1 : Green

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp