IT Security Newsletter - 08/25/2020
Three places for early warning of ransomware and breaches that aren't the dark web
For better or worse, a lot of cybercrime sleuthing and forecasting tends to focus on various underground sites and forums across the deep and dark web corners of the Internet. Whenever a report cites passwords, contraband or fraud kits trafficked in these underground dens, it makes elusive fraudsters and extortion players sound tangible. People instinctively want to infiltrate these spaces to see if their own company and data are up for sale. For time-strapped security professionals. READ MORE...
New attack vectors make securing virtual companies even more challenging
As organizations are settling into long-term remote working, new attack vectors for opportunistic cyberattackers-and new challenges for network administrators have been introduced, Nuspire reveals. Now six months into the pandemic, attackers pivoted away from COVID-19 themes, instead utilizing other prominent media themes like the upcoming U.S. election to wreak havoc. Increase in both botnet and exploit activity. There was an increase in both botnet and exploit activity over the course of Q2 2020. READ MORE...
Police investigators blame Algerian for coronavirus-themed phishing attacks
An Algerian web developer who claims to have "a demonstrated history of working in the internet industry" has launched coronavirus-themed email scams and helped build other hacking tools, according to a police intelligence report. Samir Djelal, who allegedly used the internet alias Cazanova Haxor, developed malicious software that was used in a phishing attack aimed at California city accounts in March 2020, states an internal report from the California Cyber Security Integration Center. READ MORE...
"DeathStalker" hackers are (likely) older and more prolific than we thought
Before "Powersing," hacker-for-hire mercenaries likely used 2 other malware pieces. In 2018, researchers from security firm Kaspersky Lab began tracking "DeathStalker," their name for a hacker-for-hire group that was employing simple but effective malware to do espionage on law firms and companies in the financial industry. Now, the researchers have linked the group to two other pieces of malware including one that dates back to at least 2012. DeathStalker came to Kaspersky's attention for its use of malware. READ MORE...
North Korean hackers pwned cryptocurrency sysadmin with GDPR-themed LinkedIn lure, says F-Secure
Infosec biz F-Secure has uncovered a North Korean phishing campaign that targeted a sysadmin with a fake Linkedin job advert using a General Data Protection Regulation (GDPR) themed lure. The sysadmin worked for a cryptocurrency business, said the threat intel firm, which made him a ripe target for the money-hungry state hackers Lazarus Group, aka APT38, supposedly backed by North Korea. "Our research, which included insights from our incident response, managed detection and response. READ MORE...
Large Ad Network Collects Private Activity Data, Reroutes Clicks
A Chinese mobile advertising firm has modified code in the software development kit included in more than 1,200 apps, maliciously collecting user activity and performing ad fraud, says Snyk, a software security firm. More than 1,200 applications - exceeding 300 million collective monthly downloads - have incorporated a software development kit (SDK) from Chinese advertising service Mintegral that has malicious code to spy on user activity and steal potential revenue from competitors. READ MORE...
Cyber Command deploys abroad to fend off foreign hacking ahead of the 2020 election
The Department of Defense has sent personnel abroad to hunt for malicious software that adversaries may be using against U.S. voting infrastructure or networks prior to Election Day. Gen. Paul Nakasone announced Tuesday in a Foreign Affairs editorial that Cyber Command personnel would be deployed as part of a plan to allow defensive cyber-operators from the Pentagon to identify malware targeting other countries' networks and systems. Similar attacks could later be used for attempted intrusions aimed. READ MORE...
Unpatched Safari Vulnerability Allows Theft of Local Files
A researcher has disclosed the details of an unpatched vulnerability in Apple's Safari web browser that can be exploited to steal files from a targeted user's system. The issue was discovered in April by Pawel Wylecial, a Poland-based security researcher and founder of cybersecurity services companies REDTEAM.PL and BlackOwlSec. Apple said at the time that it had started investigating the issue, but the tech giant told Wylecial in mid-August that it would only address it with a security update in the spring of 2021. READ MORE...
How to secure your TikTok account
TikTok, one of the most recent additions to the roster of major social media platforms, has been enjoying immense popularity since its debut three years ago. The app is available across more than 150 countries and has hundreds of millions of active users worldwide. Millions of people create, share, and watch videos, as well as engage with each other on a daily basis, with some doing for it fun, while others are trying to make a career out of it hoping to be the next big influencer. READ MORE...
- ...in 1910, Walden W. Shaw and John D. Hertz formed the Walden W. Shaw Livery Company, which later became the Yellow Cab Company.
- ...in 1944, after more than four years of Nazi occupation, Paris is liberated by the U.S. 4th Infantry Division.
- ...in 1985, New York Mets pitcher Dwight Gooden becomes the youngest 20-game winner in Major League Baseball history.
- ...in 1989, NASA scientists receive stunning photographs of Neptune and its moons from Voyager 2.