Infosec News 20200514

  • Publicado: Qui, 14/05/2020 - 11:17

Top News


  • Info on NHS Coronavirus app leaks out via Google Drive snafu

"Wired reports that sensitive documents about the UK’s Coronavirus-tracing app have been carelessly leaked via a publicly accessible Google Drive link."

Link

TLP1 : Green

  • New US Electronic Warfare Platform

"The military wants to move away from traditional high-powered jamming, which filled the frequencies the enemy used with blasts of static, to precisely targeted techniques, designed to subtly disrupt the enemy's communications and radar networks without their realizing they're being deceived."

Link

TLP1 : Green

  • New Ramsay malware allows exfiltrating files from air-gapped computers

"Experts discovered a new strain of malware dubbed Ramsay that can infect air-gapped computers and steal sensitive data, including Word, PDF, and ZIP files."

Link

TLP1 : Green

Cybersecurity State: Surveillance, Cyberwarfare, Cybercriminality and Hacktivism


  • Court Upholds Public Right of Access to Court Documents

"We are grateful to the First Amendment Clinic for their help in vindicating the public’s right to know. And we hope this case will serve as a reminder to judges and litigants to take that right seriously in the future."

Link

TLP1 : Green

  • Criminal forum trading stolen data suffers ironic data breach

"Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on."

Link

TLP1 : Green

  • RevenueWire to pay $6.7 million to settle FTC charges

"What can you do as a scammer when no legitimate payment provider wants to process your payments anymore?"

Link

TLP1 : Green

Breaches: Data Breaches and Hacks


  • Texas Courts Won’t Pay Up in Ransomware Attack

"Texas appellate courts and judicial agencies’ websites and computer servers were shut down after a ransomware attack."

Link

TLP1 : Green

Vulnerabilities: Vulnerability Advisories, Zero-Days,Patches and Exploits


  • Vulnerability of HTTP/2: multiple vulnerabilities

"An attacker can use several vulnerabilities of HTTP/2."

Link

TLP1 : Green

  • YouTube Account Recovery Phishing

"The phishing campaign, which was initially discovered on a compromised WordPress website, is made up of two pages responsible for harvesting and sending along the victim’s stolen username, password, and recovery phone number."

Link

TLP1 : Green

Incident Response: Infrastructure, Training, SIEM and Incident Handling


  • Manage All the Things: Unified Endpoint Management (UEM) and the Expanding IoT

"From the position of IT, many organizations see UEM as a key technology for controlling and managing this new wave of workspace IoT gear."

Link

TLP1 : Green

Technical Articles: Forensics, Reverse Engineering, Malware, Phishing, Pentesting, Software Security and Cryptography


  • Saycheese - Grab Target'S Webcam Shots By Link

"The tool generates a malicious HTTPS page using Serveo or Ngrok Port Forwarding methods, and a javascript code to cam requests using MediaDevices.getUserMedia."

Link

TLP1 : Green

  • Kernel Debugging macOS with SIP

"This blog post will describe a couple of setups that allow you to have SIP enabled while debugging."

Link

TLP1 : Green

  • Shellerator - Simple CLI Tool For The Generation Of Bind And Reverse Shells In Multiple Languages

"Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages (Bash, Powershell, Java, Python...)."

Link

TLP1 : Green

 

 

1Traffic Light Protocol (TLP) [1] for information sharing:

 

 

  • Red:Not for disclosure, restricted to participants only.
  • Amber: Limited disclosure, restricted to participants organizations.
  • Green: Limited disclosure, restricted to the community.

 


[1]https://www.first.org/tlp