Security-Portal.cz je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.

Kategorie

Bad Code Library Triggers Devil’s Ivy Vulnerability in Millions of IoT Devices

Threatpost - 19 Červenec, 2017 - 12:00
Tens of millions of products ranging from airport surveillance cameras, sensors, networking equipment and IoT devices are vulnerable to a flaw that allows attackers to remotely gain control over devices or crash them.
Kategorie: Hacking & Security

FBI varuje před špehujícími hračkami. Nahrávají vše, co dítě dělá

Zive.cz - bezpečnost - 19 Červenec, 2017 - 11:32
V dnešní době už nelze věřit ničemu. Ani hračkám. Americký Federální úřad pro vyšetřování (FBI) vydal urgentní varování pro rodiče, ve kterém upozorňuje na hračky, které špehují své majitele, informuje agentura Reuters. Určité hračky jsou podle úřadu doslova narvané senzory, kamerami a ...
Kategorie: Hacking & Security

The NukeBot banking Trojan: from rough drafts to real threats

Kaspersky Securelist - 19 Červenec, 2017 - 11:20

This spring, the author of the NukeBot banking Trojan published the source code of his creation. He most probably did so to restore his reputation on a number of hacker forums: earlier, he had been promoting his development so aggressively and behaving so erratically that he was eventually suspected of being a scammer. Now, three months after the source code was published, we decided to have a look at what has changed in the banking malware landscape.

NukeBot in the wild

The publication of malware source code may be nothing new, but it still attracts attention from across the IT community and some of that attention usually goes beyond just inspecting the code. The NukeBot case was no exception: we managed to get our hands on a number of compiled samples of the Trojan. Most of them were of no interest, as they stated local subnet addresses or ‘localhost/127.0.0.1’ as the C&C address. Far fewer samples had ‘genuine’ addresses and were ‘operational’. The main functionality of this banking Trojan is to make web injections into specific pages to steal user data, but even from operational servers we only received ‘test’ injections that were included in the source code as examples.

Test injections from the NukeBot source code

The NukeBot samples that we got hold of can be divided into two main types: one with plain text strings, and the other with encrypted strings. The test samples typically belong to type 1, so we didn’t have any problems extracting the C&C addresses and other information required for analysis from the Trojan body. It was a bit more complicated with the encrypted versions – the encryption keys had to be extracted first and only after that could the string values be established. Naturally, all the above was done automatically, using scripts we had developed. The data itself is concentrated in the Trojan’s one and only procedure that is called at the very beginning of execution.

A comparison of the string initialization procedure in plain text and with encryption.

Decryption (function sub_4049F6 in the screenshot) is performed using XOR with a key.

Implementation of string decryption in Python

In order to trigger web injections, we had to imitate interaction with C&C servers. The C&C addresses can be obtained from the string initialization procedure.

When first contacting a C&C, the bot is sent an RC4 key which it uses to decrypt injections. We used this simple logic when implementing an imitation bot, and managed to collect web injections from a large number of servers.

Initially, the majority of botnets only received test injects that were of no interest to us. Later, however, we identified a number of NukeBot’s ‘combat versions’. Based on an analysis of the injections we obtained, we presume the cybercriminals’ main targets were French and US banks.

Example of ‘combat-grade’ web injections

Of all the Trojan samples we obtained, 2-5% were ‘combat-grade’. However, it is still unclear if these versions were created by a few motivated cybercriminals and the use of NukeBot will taper off soon, or if the source code has fallen into the hands of an organized group (or groups) and the number of combat-grade samples is set to grow. We will continue to monitor the situation.

We also managed to detect several NukeBot modifications that didn’t have web injection functionality, and were designed to steal mail client and browser passwords. We received those samples exclusively within droppers: after unpacking, they downloaded the required utilities (such as ‘Email Password Recovery’) from a remote malicious server.

Kaspersky Lab products detect the banking Trojans of the NukeBot family as Trojan-Banker.Win32.TinyNuke. Droppers containing this banking Trojan were assigned the verdict Trojan-PSW.Win32.TinyNuke.

MD5

626438C88642AFB21D2C3466B30F2312
697A7037D30D8412DF6A796A3297F37E
031A8139F1E0F8802FF55BACE423284F
93B14905D3B8FE67C2D552A85F06DEC9
A06A16BD77A0FCB95C2C4321BE0D2B26
0633024162D9096794324094935C62C0
9E469E1ADF9AAE06BAE6017A392B4AA9
078AA893C6963AAC76B63018EE4ECBD3
44230DB078D5F1AEB7AD844590DDC13E
FAF24FC768C43B95C744DDE551D1E191
8EBEC2892D033DA58A8082C0C949C718
6DC91FC2157A9504ABB883110AF90CC9
36EB9BDEFB3899531BA49DB65CE9894D
D2F56D6132F4B6CA38B906DACBC28AC7
79E6F689EECB8208869D37EA3AF8A7CA
9831B1092D9ACAEB30351E1DB30E8521

Let's harden Internet crypto so quantum computers can't crack it

LinuxSecurity.com - 19 Červenec, 2017 - 10:45
LinuxSecurity.com: In case someone manages to make a general purpose quantum computer one day, a group of IETF authors have put forward a proposal to harden Internet key exchange.
Kategorie: Hacking & Security

New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices

The Hacker News - 19 Červenec, 2017 - 10:23
Remember SambaCry? Almost two months ago, we reported about a 7-year-old critical remote code execution vulnerability in Samba networking software, allowing a hacker to remotely take full control of a vulnerable Linux and Unix machines. We dubbed the vulnerability as SambaCry, because of its similarities to the Windows SMB vulnerability exploited by the WannaCry ransomware that wreaked havoc
Kategorie: Hacking & Security

Oracle Releases Biggest Update Ever: 308 Vulnerabilities Patched

Threatpost - 18 Červenec, 2017 - 22:47
Oracle's July Critical Patch Update included fixes for 308 vulnerabilities, 165 of which are remotely exploitable.
Kategorie: Hacking & Security

Oracle E-Business Suite Flaw Allows Downloads of Documents

Threatpost - 18 Červenec, 2017 - 21:45
Oracle today in its Critical Patch Update addressed a critical vulnerability in its Oracle E-Business Suite of business applications that allows for the download of business documents.
Kategorie: Hacking & Security

CoinDash Hacked During its ICO

Threatpost - 18 Červenec, 2017 - 21:02
Hackers hijacked CoinDash’s initial coin offering Monday, stealing $7.7 million in cryptocurrency from the nascent trading platform.
Kategorie: Hacking & Security

Privacy Activists Suffer Legal Setback In National Security Letter Case

Threatpost - 18 Červenec, 2017 - 20:34
Cloudflare and network operator Credo Mobile suffered a legal defeat when U.S. appeals court ruled to uphold a gag order on FBI surveillance data.
Kategorie: Hacking & Security

Remotely Exploitable Flaw Puts Millions of Internet-Connected Devices at Risk

The Hacker News - 18 Červenec, 2017 - 20:28
Security researchers have discovered a critical remotely exploitable vulnerability in an open-source software development library used by major manufacturers of the Internet-of-Thing devices that eventually left millions of devices vulnerable to hacking. The vulnerability (CVE-2017-9765), discovered by researchers at the IoT-focused security firm Senrio, resides in the software development
Kategorie: Hacking & Security

Security experts from Google, Facebook, Crowdstrike want to save US elections

Ars Technica - 18 Červenec, 2017 - 19:25

Enlarge / Eric Rosenbach, who served as the chief of staff to the secretary of defense from 2015 until 2017, seen here in 2014. (credit: Center for Strategic & International Studies)

A new group at Harvard University staffed by the former campaign managers of the Hillary Clinton and Mitt Romney campaigns, along with other top security experts, have banded together to help mitigate various types of online attacks that threaten American democracy.

The initiative, dubbed "Defending Digital Democracy," will be run by former chief of staff for the secretary of defense, Eric Rosenbach.

"Americans across the political spectrum agree that political contests should be decided by the power of ideas, not the skill of foreign hackers," Rosenbach said in a Tuesday statement. "Cyber deterrence starts with strong cyber defense—and this project brings together key partners in politics, national security, and technology to generate innovative ideas to safeguard our key democratic institutions."

Read 3 remaining paragraphs | Comments

Kategorie: Hacking & Security

News in brief: laptop ban curtailed; robot meets a soggy end; Dow Jones leaks 2.2m customers’ data

Sophos Naked Security - 18 Červenec, 2017 - 18:44
Your daily round-up of some of the other stories in the news

Black Hat USA 2017: what’s on the agenda in Las Vegas

Sophos Naked Security - 18 Červenec, 2017 - 18:34
We'll be at Black Hat with talks and a shirt giveaway if you give us the right passphrase - come and say hi; we'd love to see you

Over 70,000 Memcached Servers Still Vulnerable to Remote Hacking

The Hacker News - 18 Červenec, 2017 - 17:52
Nothing in this world is fully secure, from our borders to cyberspace. I know vulnerabilities are bad, but the worst part comes in when people just don't care to apply patches on time. Late last year, Cisco's Talos intelligence and research group discovered three critical remote code execution (RCE) vulnerabilities in Memcached that exposed major websites including Facebook, Twitter, YouTube,
Kategorie: Hacking & Security

Google wants you to bid farewell to SMS authentication

Sophos Naked Security - 18 Červenec, 2017 - 17:39
Google's shift to a more secure option is welcome, but also adds to the confusion of the post-password world

Hacked drones flying up, up and away over geofencing restrictions

Sophos Naked Security - 18 Červenec, 2017 - 16:37
Error or brilliant marketing ploy? Either way, drone owners have been able to override geofencing restrictions

Access all areas – but for how long after you’ve left the company?

Sophos Naked Security - 18 Červenec, 2017 - 14:33
How quickly do you push the big red Delete button on someone's access after they leave?

When good extensions go bad: buyer turns Particle into adware

Sophos Naked Security - 18 Červenec, 2017 - 13:21
The tale of what happened when the Particle extension was sold and turned by its buyer into adware is a reminder that it's a good idea to keep an eye on what you've added to your browser

Hacker Uses A Simple Trick to Steal $7 Million Worth of Ethereum Within 3 Minutes

The Hacker News - 18 Červenec, 2017 - 11:21
All it took was just 3 minutes and 'a simple trick' for a hacker to steal more than $7 Million worth of Ethereum in a recent blow to the crypto currency market. The heist happened after an Israeli blockchain technology startup project for the trading of Ether, called CoinDash, launched an Initial Coin Offering (ICO), allowing investors to pay with Ethereum and send funds to token sale's smart
Kategorie: Hacking & Security

IBM's Plan To Encrypt Unthinkable Amounts of Sensitive Data

LinuxSecurity.com - 18 Červenec, 2017 - 11:13
LinuxSecurity.com: Data breaches and exposures all invite the same lament: if only the compromised data had been encrypted. Bad guys can only do so much with exfiltrated data, after all, if they can't read any of it.
Kategorie: Hacking & Security
Syndikovat obsah