Exploit

now browsing by tag

 
 

#cybersecurity | #hackerspace | Maze Ransomware Exploiting Exploit Kits

Source: National Cyber Security – Produced By Gregory Evans Cybercrime has never been one to hem in tactics with ideology or rules. Rather, malware operators are known to use what works and then modify code to continue to work. By “work,” we mean that the code does what it is supposed to; for information stealers, […] View full post on AmIHackerProof.com

Hackers #exploit old #flaw to turn #Linux #servers into #cryptocurrency miners

The malicious actors who installed and ran a cryptocurrency mining operation on hacked Tesla ASW servers and Jenkins servers is now targeting servers running Linux and has so far generated more than $74,000 in Monero.

The new campaign uses the legitimate, open-source XMRig cryptominer in conjunction with exploiting the old vulnerability CVE-2013-2618, which is found in Cacti’s Network Weathermap plug-in, according to a Trend Micro Cyber Safety Solutions Team report. The vulnerability is a cross-site scripting vulnerability in editor.php in Network Weathermap before 0.97b and allows remote attackers to inject arbitrary web script or HTML via the map_title parameter.

This active campaign is hitting targets primarily in active campaign, primarily affecting Japan, Taiwan, China, the U.S., and India.

“As to why they’re exploiting an old security flaw: Network Weathermap only has two publicly reported vulnerabilities so far, both from June 2014. It’s possible these attackers are taking advantage not only of a security flaw for which an exploit is readily available but also of patch lag that occurs in organizations that use the open-source tool” the team wrote.

Trend Micro was able to trace the activity back to two usernames associated with two Monero wallets where $74,677 has been deposited as of March 21.

Read More….

advertisement:

The post Hackers #exploit old #flaw to turn #Linux #servers into #cryptocurrency miners appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers #Release #Huawei #Router #Exploit Code Used in #IoT #Botnet

Source: National Cyber Security – Produced By Gregory Evans

Today’s topics include the Huawei router exploit code used in the Satori IoT botnet going public; a rise in GPU sales in 2017; and LinkedIn expanding its job seeker toolkit ahead of the new year.

Researchers at NewSky Security reported Dec. 28 that code from the Satori internet of things botnet that exploits a Huawei router vulnerability has been publicly posted on the internet. The vulnerability, which internet service providers had shut down earlier this month, was discovered by security firm Check Point, which reported the issue to Huawei on Nov. 27.

“An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code,” Huawei said.

Check Point reported that the root cause of the flaw is linked to Huawei’s implementation of the Universal Plug and Play protocol via the TR-064 technical report standard. Huawei implementation allowed remote attackers to inject arbitrary commands, which hackers used to build the Satori botnet.

Maya Horowitz, Threat Intelligence Group Manager at Check Point, said “[Users should] change the default password on their router,” and recommends that end users running Huawei routers behind a firewall or Intrusion Prevention System should configure those devices to block the exploit’s traffic.

Jon Peddie Research released Dec. 29 its annual review of graphics processing unit developments, and the results indicate good things for the year past and for 2018. Despite an overall slowdown in worldwide sales of PCs, PC-based GPU sales have been increasing at the same rate as mobile devices.

Sales in the console market have also increased over the year, where integrated graphics are in every console. The IT business has seen a few new GPUs showing the path for future developments and subsequent applications, and 2017 was a solid year for GPU development driven by games, eSports, artificial intelligence, cryptocurrency mining and simulations.

Autonomous vehicles started to become a reality, as did augmented reality. Mobile GPUs, exemplified by Qualcomm, ARM and Imagination Technologies, introduced some advanced devices with long battery life and screens at or approaching 4K.

Jon Peddie Research said, “2018 is going to be an even more amazing year [for GPUs], with AI being the leading applications that will permeate every sector of our lives.”

LinkedIn, Microsoft’s business-focused social network, has new features to help members land a new job or build the skills required for a career change.

This is just in time for the many people, particularly IT workers, who are considering switching jobs in 2018, according to Spiceworks’ recent 2018 IT Career Outlook survey. Nearly a third of IT workers in North America and Europe plan to look for a new job in 2018 with higher salaries and opportunities to improve their skills sets.

LinkedIn is now issuing monthly notifications alerting users to trending skills among folks with the same job title. If members already possess a given skill, they can add it to their profiles, improving the chances that interested employers will come calling. If they lack the expertise, users can click on a skill to see corresponding LinkedIn Learning courses, along with the organizations that are hiring people with that skill.

The post Hackers #Release #Huawei #Router #Exploit Code Used in #IoT #Botnet appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Mobile #Pwn2Own 2017 #Hackers #Exploit Fully #Patched #Mobile Devices

Source: National Cyber Security – Produced By Gregory Evans

Mobile #Pwn2Own 2017 #Hackers #Exploit Fully #Patched #Mobile Devices

Security researchers demonstrate new zero-day vulnerabilities in fully patched Apple, Samsung and Huawei mobile devices at the Mobile Pwn2Own 2017 security event in Tokyo.

On the first day of the Mobile Pwn2Own 2017 hacking competition in Tokyo, security researchers demonstrated new zero-day attacks against fully patched mobile devices.

On Nov. 1, different groups of security researchers made a total of seven exploit attempts, five of which were successful. Among the successful exploit targets were fully patched Apple iPhone 7, Samsung Galaxy S8 and Huawei Mate9 Pro devices.

Researchers who demonstrated the successful exploits were rewarded with a total of $350,000 in prize money from Trend Micro’s Zero Day Initiative (ZDI), which runs the Pwn2Own contest. All of the flaws discovered at the event are privately reported to the impacted vendors and are subject to the ZDI’s disclosure policy, which provides vendors with 90 days to fix the vulnerabilities before they are publicly 

Three of the five successful exploits were made against Apple devices, including two browser exploits against Safari and one WiFi exploit. Apple just updated iOS to 11.1 on Oct. 31, which is the version the researchers were able to exploit.

“The team updated all devices to the latest OSes prior to the contest kicking off this morning, including iOS 11.1, as late as 5 a.m. this morning, Tokyo time,” Brian Gorenc, director at Trend Micro’s Zero Day Initiative, told eWEEK.

The iOS 11.1 update patches 14 vulnerabilities, including six that were memory corruption issues in Safari’s WebKit browser rending engine. As it turns out, there are apparently still security issues in iOS 11.1 that Apple will need to patch in a future update.

Security researchers from Tencent Keen Security Lab were able to demonstrate multiple exploits against the fully patched iOS 11.1. Among those exploits was an arbitrary code execution, via a WiFi bug, that also provides privilege escalation and can persist through a reboot. The whole exploit chain included four different bugs and resulted in an award of $110,000.

A second exploit attempt by Tencent Keen Security Lab made use of two different bugs, including one in an iOS system service and one in the browser to exploit Safari. That exploit earned an additional $45,000 in awards from ZDI.

Security researcher Richard Zhu, also known by his alias fluorescence, took aim at iOS 11.1 as well and demonstrated two bugs. Zhu’s bugs were able to exploit Safari and escape the iOS system sandbox, enabling him to run arbitrary code. For his efforts, Zhu was awarded $25,000 by ZDI.

Android

Apple wasn’t the only target at Mobile Pwn2Own 2017, with researchers also taking aim at Android devices from multiple vendors.

Researchers from 360 Security were able to demonstrate a chain of flaws on the Samsung Galaxy S8 that led to arbitrary code execution. The exploit chain included a bug in the Samsung internet browser paired with a privilege escalation in a Samsung application that enabled code execution to persist through a reboot. ZDI awarded the 360 Security team $70,000 for its efforts.

Among the most impactful types of mobile device vulnerabilities are cellular baseband flaws. The baseband is the component that manages all the radio functions on a cellular device. Tencent Keen Security Lab was able to successfully demonstrate a baseband exploit using a Huawei Mate9 Pro smartphone that would allow an attacker to spoof the device. ZDI awarded $100,000 to Tencent Keen Security Lab for the baseband exploit.

“The baseband attack was exciting, and we’re looking forward to seeing another attempt in this category tomorrow [Nov. 2],” Gorenc said. “It’s always interesting to see jailbreaks as well, and we saw two today. Also there was persistency demonstrated with three of the attacks, which is impressive.”

The post Mobile #Pwn2Own 2017 #Hackers #Exploit Fully #Patched #Mobile Devices appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers can buy the new ‘Disdain’ exploit kit for as little as £60 on the dark web

Source: National Cyber Security – Produced By Gregory Evans

For just over £60 per day, tech-savvy criminals can now buy access to a new exploit kit (EK) which has been designed to remotely infect computers, experts have warned. Known as “Disdain”, the hacking tool was recently put up for sale on an underground Russian forum hosted on the dark…

The post Hackers can buy the new ‘Disdain’ exploit kit for as little as £60 on the dark web appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Patched ‘KNOXout’ Samsung Exploit Offered Control To Hackers

samsung-galaxy-s7-knox-1600x1067

Source: National Cyber Security – Produced By Gregory Evans

Patched ‘KNOXout’ Samsung Exploit Offered Control To Hackers

Traditionally, one of the bigger benefits of buying a Samsung device was security. This was mostly thanks to the Knox software, a special multi-faceted security suite that included a number of tools to keep Samsung owners from having to feel

The post Patched ‘KNOXout’ Samsung Exploit Offered Control To Hackers appeared first on National Cyber Security.

View full post on National Cyber Security

Google Hacker Finds Way To Exploit Yet Another ‘Stagefright’ Bug

0-1

Source: National Cyber Security – Produced By Gregory Evans

Google Hacker Finds Way To Exploit Yet Another ‘Stagefright’ Bug

More than a year after the original discovery of the infamous Android bugs known as Stagefright, hackers keep finding similar flaws. On Wednesday, Google’s own elite team of hackers released a proof-of-concept hacking technique that some believe could be used

The post Google Hacker Finds Way To Exploit Yet Another ‘Stagefright’ Bug appeared first on National Cyber Security.

View full post on National Cyber Security

Sundown exploit kit authors champions of copy-paste hacking

5a5316fec9823622e185b5956a743d1b

Source: National Cyber Security – Produced By Gregory Evans

Sundown exploit kit authors champions of copy-paste hacking

Authors of the Sundown exploit kit have proven themselves masters of copy and paste, stealing exploits from rivals and borking encryption when they opt for originality.
Exploit kits offer an arsenal of attacks to the unscrupulous and are popular because

The post Sundown exploit kit authors champions of copy-paste hacking appeared first on National Cyber Security.

View full post on National Cyber Security

Using zero-day exploit revealed by professional hackers, FBI reportedly hacked San Bernardino iPhone

2016-04-13-image-6

After several weeks of demands, and on the eve of the trial, the FBI said it no longer required Apple’s help to crack the San Bernardino iPhone last month after the government firm was aided by a “third-party.”
According to the Isreali media, this unnamed entity was Cellebrite, a mobile forensic company based in the Middle Eastern country. But according to a report from the Washington Post, this wasn’t the case.
The site claims that the FBI paid a group of professional hackers for providing information regarding a previously unknown security flaw that helped the government agency break into Syed Rizwan Farook’s iPhone.
The Post claims that the hacking group, which hasn’t been identified, brought the government agency “at least one” zero-day exploit capable of circumventing the iPhone’s brute-force protection features: the automatic wipe function that activates after 10 failed pin entries, and the gradual increase in the delay between pin attempts.
It appears that the vulnerability was specific to the iPhone 5c when running iOS 9, and wouldn’t have worked on later models/operating systems. We don’t know the exact nature of the vulnerability, and the government is still debating whether to reveal it to Apple.
Once the FBI had the new information, it was able to use custom-built hardware to brute-force the four-digit password and access the contents of the phone without the risk of triggering the security measures.
Source:http://www.techspot.com/news/64434-fbi-reportedly-hacked-san-bernardino-iphone-using-zero.html

Related Post

The post Using zero-day exploit revealed by professional hackers, FBI reportedly hacked San Bernardino iPhone appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com

New Russian Hacker Exploit ‘Most Significant Cyber-Espionage Threat’ To US, NATO Partners

Source: National Cyber Security – Produced By Gregory Evans

The Russian hacker group Pawn Storm is using a vulnerability in Adobe Flash Player to install malware on computers belonging to several “foreign ministries,” Trend Micro researchers reported Tuesday. Pawn Storm “is the most significant cyber-espionage threat to the U.S. government and her NATO partners,” Trend Micro’s chief cybersecurity officer, Tom Kellermann, said in an email to The Daily Caller News Foundation. The exploit contains similarities to that which occurred on the White House just months ago, researchers found. That particular score allegedly resulted in a trove of Obama’s “unclassified” emails. Adobe sent out a security advisory bulletin Wednesday warning of a “critical vulnerability” in a recent edition of Adobe Flash Player that affected Windows, Linux, and Macintosh platforms. If hackers successfully exploit the program, the bulletin warned they could cause a “crash and potentially allow an attacker to take control of the affected system.” To breach a target’s security, the hackers would send spear phishing-emails that appeared to be legitimate, including links apparently leading to information about geopolitical events. Source: http://dailycaller.com/2015/10/15/russian-hackers-expose-critical-vulnerability-in-adobe-flash-player/

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post New Russian Hacker Exploit ‘Most Significant Cyber-Espionage Threat’ To US, NATO Partners appeared first on National Cyber Security.

View full post on National Cyber Security