je internetový portál zaměřený na počítačovou bezpečnost, hacking, anonymitu, počítačové sítě, programování, šifrování, exploity, Linux a BSD systémy. Provozuje spoustu zajímavých služeb a podporuje příznivce v zajímavých projektech.


Critical MobileIron RCE Flaw Under Active Attack

Threatpost - 25 Listopad, 2020 - 17:55
Attackers are targeting the critical remote code-execution flaw to compromise systems in the healthcare, local government, logistics and legal sectors, among others.
Kategorie: Hacking & Security

How to Update Your Remote Access Policy – And Why You Should Now

Threatpost - 25 Listopad, 2020 - 16:25
Reducing the risks of remote work starts with updating the access policies of yesterday.
Kategorie: Hacking & Security

Laser-Based Hacking from Afar Goes Beyond Amazon Alexa

Threatpost - 25 Listopad, 2020 - 15:40
The team that hacked Amazon Echo and other smart speakers using a laser pointer continue to investigate why MEMS microphones respond to sound.
Kategorie: Hacking & Security

Stantinko's Linux malware now poses as an Apache web server> - 25 Listopad, 2020 - 14:50
The eight-year-old Stantinko botnet has updated its Linux malware - now posing as an Apache web server.
Kategorie: Hacking & Security

Špión, který vám možná uklízí byt. LIDAR v robotickém vysavači se dá zneužít k odposlechu - bezpečnost - 25 Listopad, 2020 - 13:54
Robotické vysavače se postupem času prosazují ve stále větším počtu domácností. Jejich hlavními devizami jsou úspora času, automatizace práce a v případě kvalitních modelů i slušná úroveň úklidu. Přístroj, který si pustíte do bytu, však může nejen zajišťovat prakticky permanentní pořádek, ale i ...
Kategorie: Hacking & Security

Průšvih: populární aplikace pro posílání zpráv Go SMS Pro zveřejňovala odeslané soubory - bezpečnost - 25 Listopad, 2020 - 08:45
** Aplikaci Go SMS Pro si nainstalovaly desítky milionů lidí ** Kromě SMS uměla posílat také obrázky, videa a další soubory ** Odeslané soubory byly veřejně dostupné v nešifrované podobě
Kategorie: Hacking & Security

2-Factor Authentication Bypass Flaw Reported in cPanel and WHM Software

The Hacker News - 25 Listopad, 2020 - 08:14
cPanel, a provider of popular administrative tools to manage web hosting, has patched a security vulnerability that could have allowed remote attackers with access to valid credentials to bypass two-factor authentication (2FA) protection on an account. The issue, tracked as "SEC-575" and discovered by researchers from Digital Defense, has been remedied by the company in versions,
Kategorie: Hacking & Security

Jak proniknout do Tesly Model X během 90 sekund? Pomocí Bluetooth - bezpečnost - 25 Listopad, 2020 - 07:55
Bezpečnostní odborníci z Belgie přišli na způsob jak proniknout do Tesly Model X přepsáním firmwaru FOB klíče pomocí bezdrátového připojení Bluetooth. Upozornil na to Wired. Lennert Wouters z KU Leuven prohlásil, že zloděj, který by tento hack znal, by mohl získat přístup do Modelu X za pouhých 90 ...
Kategorie: Hacking & Security

Post-Breach, Peatix Data Reportedly Found on Instagram, Telegram

Threatpost - 24 Listopad, 2020 - 22:02
Events application Peatix this week disclosed a data breach, after user account information reportedly began circulating on Instagram and Telegram.
Kategorie: Hacking & Security

‘Minecraft Mods’ Attack More Than 1 Million Android Devices

Threatpost - 24 Listopad, 2020 - 21:04
Fake Minecraft Modpacks on Google Play deliver millions of abusive ads and make normal phone use impossible.
Kategorie: Hacking & Security

Gift card hack exposed – you pay, they play

Sophos Naked Security - 24 Listopad, 2020 - 20:58
These crooks hacked into a network hoping to get everyone in the company to buy them gift cards.

Smart Doorbells on Amazon, eBay, Harbor Serious Security Issues

Threatpost - 24 Listopad, 2020 - 18:46
Matt Lewis, with NCC Group, talks to Threatpost about a slew of security and privacy issues found in smart doorbells that are being sold on Amazon and eBay.
Kategorie: Hacking & Security

Baidu Apps in Google Play Leak Sensitive Data

Threatpost - 24 Listopad, 2020 - 18:36
Cyberattackers could use the information to track users across devices, disable phone service, or intercept messages and phone calls.
Kategorie: Hacking & Security

Blackrota Golang Backdoor Packs Heavy Obfuscation Punch

Threatpost - 24 Listopad, 2020 - 16:57
Blackrota is targeting a security bug in Docker, but is nearly impossible to reverse-analyze.
Kategorie: Hacking & Security

Stantinko Botnet Now Targeting Linux Servers to Hide Behind Proxies

The Hacker News - 24 Listopad, 2020 - 15:56
An adware and coin-miner botnet targeting Russia, Ukraine, Belarus, and Kazakhstan at least since 2012 has now set its sights on Linux servers to fly under the radar. According to a new analysis published by Intezer today and shared with The Hacker News, the trojan masquerades as HTTPd, a commonly used program on Linux servers, and is a new version of the malware belonging to a threat actor
Kategorie: Hacking & Security

OctopusWAF: A Customizable Open-Source WAF for High Performance Applications> - 24 Listopad, 2020 - 14:18
Mainstream web application firewalls (WAFs) can be very difficult to understand, with thousands of lines of code and obscure plugins. This complexity makes it challenging for developers to modify code to block specific anomalies and secure their applications. But OctopusWAF is different - the open-source WAF is customizable, user-friendly and optimized for a large number of parallel connections - making it ideal for high performance Asynchronous JavaScript and XML (AJAX) applications.
Kategorie: Hacking & Security

Tesla Hacked and Stolen Again Using Key Fob

Threatpost - 24 Listopad, 2020 - 13:59
Belgian researchers demonstrate third attack on the car manufacturer’s keyless entry system, this time to break into a Model X within minutes.
Kategorie: Hacking & Security

Why You Should Trust Open Source Software Security> - 24 Listopad, 2020 - 13:50
Some people still think that open-source software security is inferior. However, security experts feel that it sets the bar for what computing security should be. "Open source is inherently more secure for the reason that patches, fixes and updates come immediately, and sometimes from competing sources."
Kategorie: Hacking & Security

Lookalike domains and how to outfox them

Kaspersky Securelist - 24 Listopad, 2020 - 11:00

Our colleagues already delved into how cybercriminals attack companies through compromised email addresses of employees, and how to protect against such attacks using SPF, DKIM and DMARC technologies. But despite the obvious pluses of these solutions, there is a way to bypass them that we want to discuss.

But let’s start from a different angle: how relevant is email these days? After all, this year saw a sharp rise in the popularity of video-conferencing tools, preceded by several years of healthy growth in the use of instant messengers, in particular, WhatsApp and Telegram. Nevertheless, email is still the main means of online communication, at least in the business world. Indirect confirmation of this is the increase in the number and quality of Business Email Compromise (BEC) attacks. According to data from the US Internet Crime Complaint Center (IC3), the financial damage from such attacks has risen sevenfold in the past five years.

!function(e,i,n,s){var t="InfogramEmbeds",d=e.getElementsByTagName("script")[0];if(window[t]&&window[t].initialized)window[t].process&&window[t].process();else if(!e.getElementById(n)){var o=e.createElement("script");o.async=1,,o.src="",d.parentNode.insertBefore(o,d)}}(document,0,"infogram-async");

Financial damage from BEC attacks, 2015–2019 (download)

Data for 2020 has not yet been published, but given the COVID-19 pandemic and the mass shift of employees to remote working, it is safe to assume that the number of BEC attacks will only grow. Initial threat landscape studies also point to this.

Lookalike domains in BEC

A feature of BEC is the emphasis not on the technical side (cybercriminals’ options are rather limited when it comes to email), but on social engineering. Typically, attacks of this kind combine technical and social techniques to achieve greater efficiency. The three protection technologies mentioned above cope with most combinations well enough. But there is one exception: lookalike-domain attacks. The method is simple in essence: the cybercriminals register a domain that looks very similar to that of the target company or a partner firm. Messages sent from this domain sail through Sender Policy Framework (SPF) authentication, possess a DomainKeys Identified Mail (DKIM) cryptographic signature, and generally do not arouse the suspicions of security systems. The snag is that these emails are phishing. And if written believably enough — with a corporate template, stressing the urgency of the matter, etc. — they will likely fool the victim.

Here are some examples of fake domain names:

Original domain Fake domain

As you can see, the fake differs from the original by only one letter added (or removed) so that a closer look is required to spot it.

For an overview of the use of fake domains, we compiled statistics on lookalike spoofing for Q3 2020. Having analyzed the data, we concluded that this year’s pandemic has significantly changed the direction of cybercriminal activity. Whereas before, the focus of such attacks was the financial sector, now the service sector is in the firing line, including various e-commerce services: food delivery, online shopping, buying air tickets, etc. Domains related to this sector accounted for 34.7% of the total number of attacks in Q3.

!function(e,i,n,s){var t="InfogramEmbeds",d=e.getElementsByTagName("script")[0];if(window[t]&&window[t].initialized)window[t].process&&window[t].process();else if(!e.getElementById(n)){var o=e.createElement("script");o.async=1,,o.src="",d.parentNode.insertBefore(o,d)}}(document,0,"infogram-async");

Distribution of detected lookalike domains by category, Q3 2020 (download)

Also note the rise in the IT sector’s share in 2020: up from 17.9% in Q1 to 22.2% in Q3. This is to be expected, since the mass transition to remote working was bound to impact the overall situation.

A word about lookalikes

Unlike spam mailings, which tend to be large in both scale and duration, attacks involving lookalike domains, like any BEC attack, target a specific victim (or group of victims). Consequently, emails are few and well thought out, and the domains are extremely short lived. We see that half of all fake domains are used only once, and in 73% of cases the domain is only active for just one day. This renders traditional signature-based anti-spam solutions (detect an attack, create a rule) effectively useless, thus the need arises for proactive protection. There are two common and at the same time simple methods available to companies keen to guard at least in some measure against lookalike and other such attacks.

The first is for the company itself to register domains with typos, and set up redirects to its official domain. This reduces cybercriminals’ ability to register a plausible fake, but does not nullify it completely or prevent counterfeiting of domains belonging to partners, contractors and other organizations which the company deals with.

The second is to compile lists of plausible fake names for both the company’s domain and those of partners and contractors. Next, the list is loaded into the anti-spam solution, which preemptively blocks all messages arriving from the fakes. The main drawback of this method is the same as before: it is impossible to cover all possible fake domains, especially if the company works with many counterparties. Plus, there is the ever-present human factor — one typo in the list of tens or hundreds of domain names can lead to a security breach or the filtering out of emails from a legitimate domain instead of a fake one, causing additional headaches for business units.

When simple solutions no longer suited our clients, they came to us for something more complex. The result was a method that requires no user interaction. In a nutshell, it automatically compiles a global list of legitimate domains that could potentially be faked, on which basis it analyzes and blocks messages from lookalike domains. In essence, it is proactive.

How it works

Protection against lookalike-domain attacks is three-pronged: client-side processing; domain reputation check in Kaspersky Security Network; infrastructure-side processing. The general principle is shown schematically below:

In practice, it goes as follows. On receiving an email, the technology forwards the sender domain to Kaspersky Security Network (KSN), which matches it against the list of lookalike domains already known to us. If the sender domain is found, the message is instantly blocked (steps 1 to 3). If there is no information about it, the email is quarantined for a short fixed period (step 4). This gives time for the technology to check the domain according to the set algorithm, and, if it recognizes it as fake, to add it to the list of lookalike domains in KSN. After the email leaves quarantine, it is rescanned (step 9) and blocked, since by then the list of lookalike domains has been updated.

Let’s take a look at how sender verification works and how the list of lookalike domains gets updated. Information about quarantined messages is sent to the KSN database together with additional metadata, including the sender domain (step 5). At the first stage of analysis, the domain undergoes a “suspiciousness” check based on a wide range of criteria, such as Whois data, DNS records, certificates, and so on; the purpose of this stage is to quickly sift out domains that are clearly legitimate, but not yet known to our system. Henceforth, emails from these domains are no longer quarantined, because KSN now has information about them. At the second stage, the system compares the similarity of suspicious domains and addresses in our global list of legitimate domains (step 7), which includes the domains of our clients and their counterparties. This list is generated automatically based on an assessment of the frequency with which legitimate messages are sent from the domain and the uniformity of the mail flow over time. The extent to which the overall picture matches the behavior of employees in terms of business correspondence determines the reputation of the domain (step 6). If the resemblance of the scammer’s domain to a legitimate address is high, the sender domain too is added to the list of lookalike domains and all messages sent from it are blocked.

Our approach is more complex than simply registering lookalike domains to the company and enables real-time blocking of attacks that use such domains as soon as they appear. In addition, the human factor is eliminated, and the global list of legitimate domains stays current thanks to automatic updates.

Critical Unpatched VMware Flaw Affects Multiple Corporates Products

The Hacker News - 24 Listopad, 2020 - 08:08
VMware has released temporary workarounds to address a critical vulnerability in its products that could be exploited by an attacker to take control of an affected system. "A malicious actor with network access to the administrative configurator on port 8443 and a valid password for the configurator admin account can execute commands with unrestricted privileges on the underlying operating
Kategorie: Hacking & Security
Syndikovat obsah