web analytics

Sprawling Sathurbot Takes Aim at WordPress, Movie Pirates

6th April 2017 By Tara Seals   Movie piracy is alive and well—as are the bad actors that look to prey on the pirates.   ESET has uncovered a new ecosystem for the Sathurbot backdoor Trojan, consisting of more than 20,000 infected computers. This iteration has been active since at least June 2016, and is… Continue reading Sprawling Sathurbot Takes Aim at WordPress, Movie Pirates

PLCs From Several Vendors Vulnerable to Replay Attacks

By Eduard Kovacs on April 06, 2017   Programmable logic controllers (PLCs) from several major vendors are affected by implementation flaws that can be exploited by attackers to execute arbitrary commands on the vulnerable devices, researchers warned. The vulnerabilities, identified by ICS security firm CRITIFENCE, are related to the Modbus communications protocol, which is often… Continue reading PLCs From Several Vendors Vulnerable to Replay Attacks

Triada Android spyware evades anti-virus detection by using DroidPlugin sandbox

See Also – Tried-and-true Triada supplants Hummingbad as top mobile malware   Nothing new to see here!   David Bisson | April 6, 2017   An Android spyware family is using the DroidPlugin open-source sandbox to evade detection by anti-virus software installed on infected devices.   The offending trojan, which goes by the name Triada,… Continue reading Triada Android spyware evades anti-virus detection by using DroidPlugin sandbox

Diamond Fox – part 2: let’s dive in the code

See also – Diamond Fox – part 1: introduction and unpacking   April 6, 2017 by Malwarebytes Labs   In a previous post we made an initial analysis of a Diamond Fox bot delivered by the Nebula Exploit Kit (more about the campaign can be found here). We described the way to unpack the protection… Continue reading Diamond Fox – part 2: let’s dive in the code

Microsoft reveals what data Windows 10 collects from you

In an effort to be more transparent, Microsoft revealed more about what data Windows 10 Creators Update will collect from users’ PCs and clarified what the privacy settings mean.                                       By Darlene Storm, Computerworld | Apr 5, 2017   Microsoft has been under fire for its privacy practices since Windows… Continue reading Microsoft reveals what data Windows 10 collects from you

Scottrade Bank data breach exposes 20,000 customer records

60GB MSSQL database contained customer records and other sensitive data                                     By Steve Ragan, Senior Staff Writer, CSO | Apr 5, 2017   Scottrade Bank, a subsidiary of Scottrade Financial Services, Inc., recently secured a MSSQL database containing sensitive information on at least 20,000 customers that was inadvertently left exposed to… Continue reading Scottrade Bank data breach exposes 20,000 customer records

Critical Xen hypervisor flaw endangers virtualized environments

The vulnerability allows attackers with access to a guest OS to read the host’s memory                                        By Lucian Constantin IDG News Service | Apr 5, 2017 A critical vulnerability in the widely used Xen hypervisor allows attackers to break out of a guest operating system running inside a virtual machine and access the… Continue reading Critical Xen hypervisor flaw endangers virtualized environments

Online Trust Alliance merges with Internet Society

Two become one                                     5 Apr 2017 at 10:03, John Leyden   Key internet standards-making body the Internet Society (ISOC) and security and privacy org the Online Trust Alliance (OTA) are merging.   The move, announced Wednesday, sees an important standards-driver combining with an org that has guided best practices… Continue reading Online Trust Alliance merges with Internet Society

ClearEnergy ransomware aim to destroy process automation logics in critical infrastructure

April 5, 2017  By Pierluigi Paganini   Schneider Electric, Allen-Bradley, General Electric (GE) and more vendors are vulnerable to ClearEnergy ransomware.                          Researchers at CRITIFENCE® Critical Infrastructure and SCADA/ICS Cyber Threats Research Group have demonstrated this week a new strain of ransomware attack aiming to erase (clear) the ladder logic diagram in Programmable Logic Controllers… Continue reading ClearEnergy ransomware aim to destroy process automation logics in critical infrastructure

Project Zero uncovers a nasty Wi-Fi chip exploit

4th April 2017 by Kate Conger                                                    Google’s Project Zero has been on a roll lately, unveiling sophisticated bugs in Cloudflare, LastPass and now Broadcom, a Wi-Fi chip supplier whose product is found in iPhones, Nexuses and Samsung devices.   Apple patched the bug in a security update yesterday… Continue reading Project Zero uncovers a nasty Wi-Fi chip exploit