Infosec News 20200827

  • Publicado: Qui, 27/08/2020 - 11:43

Top News


  • A quarter of the Alexa Top 10K websites are using browser fingerprinting scripts

"A browser fingerprinting script is a piece of JavaScript code that runs inside a web page and works by testing for the presence of certain browser features"

Link

TLP1 : Green

  • QakBot Banking Trojan Returned With New Sneaky Tricks to Steal Your Money

"A notorious banking trojan aimed at stealing bank account credentials and other financial information"

Link

TLP1 : Green

  • Authorities dismantle online piracy hackers network Sparks Group

"A criminal network of copyright and infringing hackers called the Sparks Group has been dismantled by US authorities, Europol and Eurojust"

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • As Classes Resume, Schools Face Ransomware Risk

"Cybersecurity professionals expect a spike in ransomware attacks against school districts and universities this fall as new hybrid learning environments go online and unpatched equipment that has spent months in the homes of students and faculty is reconnected to school networks"

Link

TLP1 : Green

  • Russian Arrested After Offering $1 Million to U.S. Company Employee for Planting Malware

"Hackers always find a way in, even if there's no software vulnerability to exploit"

Link

TLP1 : Green

  • Malware Attack Stifles Philadelphia Area Transit Agency

"A malware attack two weeks ago continues to stifle the Southeastern Pennsylvania Transit Authority"

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Vulnerability Spotlight: Use-after-free vulnerability in Google Chrome WebGL could lead to code execution

"The Google Chrome web browser contains a use-after-free vulnerability in its WebGL component"

Link

TLP1 : Green

  • New Research: 2020 Vulnerabilities Are on Target to Match or Exceed Last Year

"Today we released our 2020 Mid Year Vulnerability QuickView Report"

Link

TLP1 : Green

  • Mozilla Products Multiple Vulnerabilities

"Multiple vulnerabilities were identified in Mozilla Firefox"

Link

TLP1 : Green

  • Mercenary Cyberspies Used Autodesk 3ds Max Exploits in Attacks

"A sophisticated hack-for-hire group specializing in industrial espionage exploited the Autodesk 3ds Max modeling and animation software in an attack aimed at a company involved in luxury real estate projects, cybersecurity firm Bitdefender reported on Wednesday."

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • SIEM: Log Monitoring Lab Setup with Splunk

"Splunk Inc. is an American public multinational corporation based in San Francisco, California, that produces software for searching, monitoring, and analyzing machine-generated big data via a Web-style interface."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • Hack-Tools - The All-In-One Red Team Extension For Web Pentester

"The all-in-one Red Team browser extension for Web Pentesters"

Link

TLP1 : Green

  • Defense Evasion: Alternate Data Streams

"Alternate Data Stream is an artifact of New Technology File system (NTFS) which was introduced by Windows. It was traditionally introduced so that it could provide compatibility for file sharing with the older Hierarchical File system (HFS) of Macintosh systems where the data could be forked into different resources and to store additional data of a file which is called as metadata."

Link

TLP1 : Green

  • Deep Fake: Setting the Stage for Next-Gen Social Engineering

"Humans are susceptible to normalcy bias, which may leave us vulnerable to disinformation that reinforces our beliefs"

Link

TLP1 : Green

  • PurpleSharp : C# Adversary Simulation Tool That Executes Adversary Techniques

"PurpleSharp is an open source adversary simulation tool written in C# that executes adversary techniques within Windows Active Directory environments.
The resulting telemetry can be leveraged to measure and improve the efficacy of a detection engineering program."

Link

TLP1 : Green

  • ADBSploit - A Python Based Tool For Exploiting And Managing Android Devices Via ADB

"A python based tool for exploiting and managing Android devices via ADB"

Link

TLP1 : Green

 

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp