Next Page: 10000

           Russian hacker behind massive botnet pleads guilty       Cache   Translate Page      
A Russian hacker who at one time gained control over as many as 100,000 computers globally via botnets he created pleaded guilty Wednesday in a Connecticut...
           Russian pleads guilty in U.S. to operating Kelihos botnet       Cache   Translate Page      
Sept 12 (Reuters) - A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation...
          Russian spam master pleads guilty to operating Kelihos botnet      Cache   Translate Page      

Read Full Article at RT.com
          Notorious Russian Hacker Pleads Guilty In U.S. Court      Cache   Translate Page      
A Russian man considered to be one of the world's most notorious hackers has pleaded guilty to U.S. charges stemming from his operation of the Kelihos botnet, the Justice Department says.
          Trend Micro Research ajuda fabricantes de dispositivos IoT a enfrentar desafios dia zero      Cache   Translate Page      
Trend Micro Research ajuda fabricantes de dispositivos IoT a enfrentar desafios dia zero

A Trend Micro Incorporated, líder global em soluções de cibersegurança, reafirma o seu compromisso com a segurança da Internet das Coisas (IoT) através de um novo programa desenhado para aproveitar a liderança mundial da sua divisão Zero Day Initiative (ZDI) com o objetivo de minimizar o impacto das vulnerabilidades associadas ao desenvolvimento de produtos inteligentes.

A Trend Micro convida os fabricantes a que enviem os seus dispositivos para receber ajuda no processo de avaliação de possíveis vulnerabilidades antes de lançá-los ao mercado, tarefa que será executada pelas principais equipas de investigação da empresa.

Segundo a Gartner, "O uso do IoT Industrial (IIoT) em instalações e o rápido crescimento do número de dispositivos conectados significa que com maior frequência os eventos no mundo digital podem ter um efeito no mundo físico. A Gartner prevê que em 2021 haverá aproximadamente 25.000 milhões de dispositivos IoT conectados, valores que continuarão a aumentar num futuro próximo. Mesmo que apenas uma percentagem muito limitada desses dispositivos sejam IIoT que controlem ou supervisionem processos industriais, como o fabrico, a mera quantidade e omnipresença de IIoT provavelmente levará a um aumento dos incidentes de segurança."

Os dispositivos inseguros estão a alimentar inadvertidamente uma série de ameaças emergentes, incluindo roubo de dados corporativos e intrusões de rede, interrupções relacionadas com ransomware, sabotagem de equipamentos industriais e ataques DDoS causados por botnets e mineração de cripto moedas.

"Como demonstrado pelo sucesso do Mirai, Brickerbot e outros ataques, os cibercriminosos e os agentes dos estados nação prestam cada vez mais atenção à exploração das vulnerabilidades dos dispositivos IoT", explica Eva Chen, CEO da Trend Micro. "O problema aqui é que corrigir e reparar falhas após a descoberta é altamente problemático. É possível que muitos fabricantes não disponham de um mecanismo de atualização de software e, mesmo que os patches possam ser disponibilizados, os clientes podem ter dificuldade em aplicá-los, especialmente em grandes empresas com milhares de endpoints IoT executados em ambientes de missão crítica."

A ZDI da Trend Micro é um programa de investigação de vulnerabilidades que tem uma grande reputação no setor e ajudou as organizações a tornarem-se mais seguras nos últimos 13 anos. Até ao momento, gere o maior programa de recompensas para a identificação de vulnerabilidades para fornecedores independentes no mundo, com mais de 3.500 investigadores externos que complementam os esforços e o trabalho da equipa interna.

Só no primeiro semestre de 2018, a ZDI publicou 600 avisos, 33% mais em comparação com o mesmo período de 2017. As vulnerabilidades do SCADA e do IoT Industrial (IIoT) foram responsáveis por cerca de 30% dos comunicados até ao momento este ano, sendo o ICS-CERT o fornecedor número um de falhas nos sistemas SCADA / ICS para ZDI.

Graças ao nosso novo programa, os fabricantes de dispositivos têm acesso imediato a amplas e relevantes pesquisas sobre IoT, contam com ajuda para avaliar possíveis vulnerabilidades antes de lançar os seus dispositivos no mercado e implementam um processo de tratamento e gestão de vulnerabilidades que lhes permite seguir em frente", continua Eva Chen. "É possível que muitos fabricantes de IoT possam estar a lutar para ocupar posições-chave com profissionais de segurança qualificados na empresa, por isso faz sentido trabalhar com especialistas para que os seus produtos saiam da linha de fábrica o mais robustos e resilientes possível."

A Trend Micro Research e a ZDI são apenas um elemento de foco do ecossistema da Trend Micro para proteger a Internet das Coisas (IoT). Além da pesquisa contínua sobre ameaças emergentes em âmbitos como das alto-falantes conectados, sistemas robóticos, gestão do tráfego e carros conectados, a Trend Micro trabalha com empresas de telecomunicações, clientes corporativos, developers de sistemas informáticos integrados e outros parceiros chave.

A Trend Micro Deep Security oferece proteção completa no centro de dados de back-end, enquanto que as appliances de prevenção de intrusões Trend Micro Tipping Point e de deteção de lacunas Deep Discovery, melhoram a segurança na capa de rede. A Trend Micro Safe Lock aproveita o software de segurança de bloqueio para proteger aplicações específicas ou terminais com sistemas operativos (OS) herdados em ambientes de IIoT.

A Trend Micro está plenamente comprometida em estender o seu conhecimento e liderança para compreender e assegurar os riscos associados ao crescente mercado da segurança de IoT através do investimento em investigação e desenvolvimento.

 


          Russian pleads guilty in U.S. to operating Kelihos botnet      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement.

          La France a été la troisième région source d'attaques DDoS au 2T18 d'après un rapport, qui souligne le rôle joué par les appareils IdO non sécurisés      Cache   Translate Page      
La France a été la troisième région source d'attaques DDoS au 2T18 d'après un rapport,
qui souligne le rôle joué par les appareils IdO non sécurisés

NexusGuard, une entreprise spécialisée dans l'atténuation des attaques DDoS, a publié un rapport qui montre que les attaques par déni de service (DDoS) ont considérablement augmenté au cours des deux premiers trimestres de 2018 par rapport à 2017. L'augmentation des attaques est attribuée aux botnets à grande échelle que les acteurs malveillants obtiennent...
          Russian pleads guilty in U.S. to operating Kelihos botnet      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement.

          Russian pleads guilty in U.S. to operating Kelihos botnet      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement.

          Russian hacker behind massive botnet pleads guilty      Cache   Translate Page      
A Russian hacker who at one time gained control over as many as 100,000 computers globally via botnets he created pleaded guilty Wednesday in a Connecticut court to computer crimes and identity theft.
          Russian Peter Yuryevich Levashov Extradited From Spain, Pleads Guilty To US Election Hacking      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement. Peter Yuryevich Levashov, 38, used the Kelihos botnet – a global network of tens of thousands of infected computers – to harvest login
          DDoS attackers are increasingly using public cloud services to boost attacks      Cache   Translate Page      
DDoS attackers are turning to public cloud services to launch attacks, according to new research from Link11. Data from Link11's Security Operation Center (LSOC) shows that a quarter of all DDoS attacks in Europe in the 12 months from July 2017 to June 2018 used public cloud server-based botnets, compared to 18.5 percent in the previous 12 months: a 35 percent increase.
          Hillicon Valley: Trump signs off on sanctions for election meddlers | Russian hacker pleads guilty over botnet | Reddit bans QAnon forum | FCC delays review of T-Mobile, Sprint merger | EU approves controversial copyright law      Cache   Translate Page      
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivi...
          Hillicon Valley: Trump signs off on sanctions for election meddlers | Russian hacker pleads guilty over botnet | Reddit bans QAnon forum | FCC delays review of T-Mobile, Sprint merger | EU approves controversial copyright law      Cache   Translate Page      
Welcome to Hillicon Valley, The Hill's newsletter detailing all you need to know about the tech and cyber news from Capitol Hill to Silicon Valley.Welcome! Follow the cyber team, Olivia Beavers (@olivia_beavers) and Jacqueline Thomsen (@jacq_thomsen...
          Blog Post: Russian Cybercriminal Pleads Guilty To Operating Botnet      Cache   Translate Page      
...read more
          Botnets IoT deixaram os ataques DDoS quase cinco vezes mais poderosos      Cache   Translate Page      
Botnets IoT deixaram os ataques DDoS quase cinco vezes mais poderosos

Em um relatório, a NexusGuard Botnets IoT deixaram os ataques DDoS quase cinco vezes mais poderosos. Confira os detalhes do anúncio e entenda.

Leia o restante do texto "Botnets IoT deixaram os ataques DDoS quase cinco vezes mais poderosos"

O post Botnets IoT deixaram os ataques DDoS quase cinco vezes mais poderosos apareceu primeiro em Blog do Edivaldo.


          Frequency of DDoS Attacks Risen by 40% While Duration of Attacks Decrease      Cache   Translate Page      

The frequency of DDoS attacks has risen by 40% year on year while the duration of attacks decreased with 77% lasting ten minutes or less, according to a new report released by Corero Network Security. The report warns one in five organizations will be targeted again within 24 hours. Other key highlights from the report: Low volume, sub-saturating attacks continue to dominate (94% less than 5Gbps); Whilst still infrequent, attacks over 10Gbps have doubled; Organisations faced an average of 8 attacks per day in Q2 2018, an increase of 40% compared to the same quarter in 2017.

Increase in DDoS attacks attributed to IoT Botnets: In another report from security firm NexusGuard also released today, the company warns the increase in attacks and their sizes is the result of attackers amassing giant botnets using insecure IoT devices. "Attackers are using vulnerabilities in these devices to rapidly build large botnets ... at one point the Mirai Satori botnet was seen from over 280,000 IP addresses over a 12 hour period and the newer Anarchy botnet was able to amass over 18,000 routers in a single day."


          Russian pleads guilty in U.S. to operating Kelihos botnet      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement.

          Russian pleads guilty in US to operating Kelihos botnet      Cache   Translate Page      
REUTERS: A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement. Peter Yuryevich Levashov, 38, used the Kelihos botnet - a global network of tens ...
          Nexusguard research reveals 500 percent increase in average DDoS attack size      Cache   Translate Page      
(MENAFN Editorial) Nexusguard research reveals 500 percent increase in average DDoS attack size Cybersecurity researchers recommend bandwidth protection against IoT botnets ...
          Blog Post: Russian Cybercriminal Pleads Guilty To Operating Botnet      Cache   Translate Page      
...read more
          Episode 134: Drone Sweaters      Cache   Translate Page      
This week Dave and Gunnar talk about holding your TV for ransom, unwitting cryptocurrency miners, writing email with military precision.     Cutting Room Floor   We Give Thanks
          Episode 128: #128: State-Sponsored Cleaning Lady      Cache   Translate Page      

This week Dave and Gunnar talk about: DDoS attack on DynDNS, DDoS Coin, and a USB killstick.

ship-it

Cutting Room Floor

 

We Give Thanks

  • The D&G Show Slack Clubhouse for the discussion topics!
#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
          Russiche 'spamkoning' die Kelihos-botnet beheerde bekent schuld      Cache   Translate Page      
De Rus Pyotr Levashov, die in april 2017 werd gearresteerd in Spanje, heeft in een Amerikaanse rechtbank bekend schuldig te zijn aan onder andere hacken en identiteitsdiefstal. De man gebruikte daarvoor het Kelihos-botnet.
          Russian pleads guilty in U.S. to operating Kelihos botnet      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement.

          Russian man pleads guilty, admits he ran notorious Kelihos botnet      Cache   Translate Page      
Peter Yuryevich Levashov was first indicted relating to the Storm botnet back in 2009.
          Russian pleads guilty in U.S. to operating Kelihos botnet      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement.

          PreSales Security Expert 3 (CASL140) - Fortinet - Montréal, QC      Cache   Translate Page      
Routing, Switching, VPN, LAN, WAN, Network Security, Stateful Firewalling, NGFW, Firewall policies, Identity based policies, NAT, IPS, AntiMalware, Botnet,...
From Fortinet - Wed, 12 Sep 2018 06:40:14 GMT - View all Montréal, QC jobs
          Nytt angrepp slår mot IoT och Linux      Cache   Translate Page      

Palo Alto Networks rapporterar nu att de upptäckt ett nytt angrepp mot IoT-enheter och Linuxdatorer. Det handlar om nya varianter av de sedan tidigare kända Mirai och Gafgyt, som är botnets som använts för överbelastningsattacker med hjälp av främst IoT. ... Read More

The post Nytt angrepp slår mot IoT och Linux appeared first on .


          PreSales Security Expert 3 (CASL140) - Fortinet - Montréal, QC      Cache   Translate Page      
Routing, Switching, VPN, LAN, WAN, Network Security, Stateful Firewalling, NGFW, Firewall policies, Identity based policies, NAT, IPS, AntiMalware, Botnet,...
From Fortinet - Wed, 12 Sep 2018 06:40:14 GMT - View all Montréal, QC jobs
          Kelihos Botnet Author Pleads Guilty in U.S. Court      Cache   Translate Page      

Peter Yuryevich Levashov, a 38-year-old Russian national accused of operating the notorious Kelihos botnet, pleaded guilty on Wednesday to computer crime, fraud, conspiracy and identity theft charges.

read more


          سیستمی که بدافزار را پیش از حمله شناسایی می‌کند      Cache   Translate Page      
"آژانس پروژه‌های تحقیقاتی پیشرفته دفاعی آمریکا" یا "دارپا" (DARPA) قصد دارد ابزاری برای مقابله با دشمنان اینترنتی ارائه دهد.این آژانس، در حال سرمایه‌گذاری روی سیستم‌هایی است که می‌توانند "بات‌نت‌ها" (botnets) را شناسایی کرده و از بین ببرند تا هکرها نتوانند از آنها برای آسیب زدن به وب‌سایت‌ها، شرکت‌ها یا حتی کشورها استفاده کنند.
          Russian hacker Peter Levashov, who was arrested by Spanish authorities last year, pleads guilty in a US District Court for his involvement in the Kelihos botnet (Olivia Beavers/The Hill)      Cache   Translate Page      

Olivia Beavers / The Hill:
Russian hacker Peter Levashov, who was arrested by Spanish authorities last year, pleads guilty in a US District Court for his involvement in the Kelihos botnet  —  A renowned Russian hacker on Wednesday pleaded guilty in a U.S. District Court for his involvement in the Kelihos botnet …


          A question of security: What is obfuscation and how does it work?      Cache   Translate Page      

Every day, new malware samples are uncovered ranging from zero-day exploits to ransomware variants.

With malware now so common and successful cyberattacks offering potentially high -- albeit criminal -- returns, there is little need for garden-variety hackers to learn how to develop exotic, custom malicious code.

Instead, off-the-shelf malware can be purchased easily by anyone. While some of the most sophisticated forms of malware out there can fetch prices of$7,000 and more, it is also possible to pick up exploit kits and more for far less,or even for free.

The problem with this so-called "commodity" malware is that antivirus companies are well aware of their existence and so prepare their solutions accordingly with signatures that detect the malware families before they can cause damage.

So, how do threat actors circumvent such protection?

This is known as obfuscation.

The goal of obfuscation is to anonymize cyberattackers, reduce the risk of exposure, and hide malware by changing the overall signature and fingerprint of malicious code -- despite the payload being a known threat.

In a Threat Intelligence Bulletin , cybersecurity firm Cylance has explained how the technique works.

"The signature is just a hash," the researchers note. "In this context, a hash refers to a unique, alphanumeric representation of a piece of malware. Signatures very often are hashes, but they can also be some other brief representation of a unique bit of code inside a piece of malware."

CNET: Apple is building an online portal for police to make data requests

Rather than attempt to create a new signature through changing malware itself, obfuscation instead focuses on delivery mechanisms in an attempt to dupe antivirus solutions which rely heavily on signatures. (In comparison to the use of machine learning, predictive analytics, and AI to bolster AV, some researchers argue this has the potential to become obsolete.)

See also: Mirai, Gafgyt IoT botnets stab systems with Apache Struts, SonicWall exploits

Obfuscation can include a variety of techniques to hide malware, creating layers of obscurity which Cylance compares to "nested figures in a Russian doll."

These techniques include:

Packers: These software packages will compress malware programs to hide their presence, making original code unreadable. Crypters: Crypters may encrypt malware programs, or portions of software, to restrict access to code which could alarm an antivirus product to familiar signatures. Dead code insertion: Ineffective, useless code can be added to malware to disguise a program's appearance. Instruction changes: Threat actors may alter instruction codes in malware from original samples that end up changing the appearance of the code -- but not the behavior -- as well as change the order and sequence of scripts. Exclusive or operation (XOR): This common method of obfuscation hides data so it cannot be read unless trained eyes apply XOR values of 0x55 to code. ROT13: This technique is an ASM instruction for "rotate" which substitutes code for random letters.

TechRepublic: Why higher education is one of the worst industries at handling cyberattacks

"While some antivirus products search for common obfuscating techniques so that they too may be blacklisted, this practice is not nearly as well established as the blacklisting of malware payload signatures," the researchers say.

In one interesting example of obfuscation which has recently come under the radar, Cylance found that a Microsoft windows tool called PowerShell is being abused by attackers.

A malware sample obtained by the company was a .ZIP file containing a PDF document and VBS script which used rudimentary Base64 encoding to obfuscate one layer.

This was followed by the use of string splitting, tick marks, and random letter capitalizations to split and alter the signature.

One particular file in the package, 1cr.dat, revealed the use of another obfuscation method. This was a string encryption setup, called SecureString, which is commonly used by legitimate applications to encrypt sensitive strings of code within applications using Microsoft's built-in DPAPI.

The payload also contained instructions to avoid sandboxes, which are used by security researchers to unpack and analyze malware.

At the time of discovery, only three antivirus signature engines detected the attempt at obfuscation and only two registered the malware at first deployment. This has now increased to 18 products.

For as long as malware exists, so too will obfuscation. While there is little that everyday users can do about the attack method, cybersecurity firms are taking notice -- as now, it is not just zero-days which are of concern, but the increasing use of common malware in creative ways.

Cylance said:

"Threat actors are increasingly using obfuscation techniques in combination with commodity malware. This trend runs counter to a widely-held assumption in the information security space which holds that highly customized malware paired with zero-day exploits are deserving of the most attention. And while use of those tools is concerning and should be monitored, attention should not be completely divested from those threat actors - including advanced threat actors - who are succeeding right now at bypassing antivirus products with tools that are not "zero- day" but "every day."


          Kelihos botnet operator jailed for account theft, ID trading in the Dark Web      Cache   Translate Page      
Prosecutors say the man lived comfortably by selling stolen credentials harvested through the botnet's activities.
          California Eyes Questionable Legislation In Bid To Fix The Internet Of Broken Things      Cache   Translate Page      

If you hadn't noticed, the much-hyped internet of things is comically broken. WiFi connected Barbies that spy on your kids, refrigerators that cough up your Gmail credentials, and "smart" televisions that watch you as often as you watch them are all now the norm. And while this has all been the focus of a lot of humor (like the Internet of shit Twitter feed), security experts have been warning for a while about how introducing millions of security flaws into millions of homes and businesses is, sooner or later, going to come back and bite us all on the ass.

As security analysts like Bruce Schneier have pointed out, few people in this dance of dysfunction really care, so things tend to not improve. Customers often aren't even aware (or don't care) that their device has been compromised and hijacked into a DDOS attacking botnet, and hardware vendors tend to prioritize sales of new devices over securing new (and especially older) gear.

Efforts to regulate the problem away are the option for many. That's what California lawmakers are considering with the recent passage of SB-327, which was introduced in February of last year, passed the California Senate on August 29, and now awaits signing from California Governor Jerry Brown. If signed into law, it would take effect in early 2020, and mandates that "a manufacturer of a connected device shall equip the device with a reasonable security feature or features," while also taking aim at things like default login credentials by requiring devices auto-prompt users to change their usernames and passwords.

But as you might expect, critics of the bill state it's not likely to actually fix the problem, in part because Chinese gearmakers (a major source of the problem) can just ignore the law. Others state California's solution is superficial at best, given that just "adding security features" doesn't really help if the technology is just fundamentally unsecure on the skeletal level:

"It’s based on the misconception of adding security features. It’s like dieting, where people insist you should eat more kale, which does little to address the problem you are pigging out on potato chips. The key to dieting is not eating more but eating less. The same is true of cybersecurity, where the point is not to add “security features” but to remove “insecure features”. For IoT devices, that means removing listening ports and cross-site/injection issues in web management. Adding features is typical “magic pill” or “silver bullet” thinking that we spend much of our time in infosec fighting against."

So if legislation isn't the solution, what is? Some believe transparency is a better bet, as exemplified by the Princeton computer science department's IOT Inspector, which aims to better educate users as to what their devices are actually doing on the internet. Others, like Consumer Reports, have been pushing to include privacy and security issues as standard operating procedure in hardware reviews. Both could go a long way toward making it much clearer as to what kind of product you're actually buying and what it's doing, since many vendors (and their user interfaces) refuse to.

Whatever the solution, it's going to likely require a coordinated response by consumers, hardware vendors, governments, and security professionals alike. While there have been some scattered efforts around the world on this front, as a whole that's generally not yet happening. As folks like Schneier continue to argue, it's likely going to require IOT devices causing massive damage and a potential loss of life (say, via attacks on core infrastructure) before the willpower for such a super-union truly materializes.



Permalink | Comments | Email This Story

          Kelihos Botnet Author Pleads Guilty in U.S. Court      Cache   Translate Page      
Peter Yuryevich Levashov, a 38-year-old Russian national accused of operating the notorious Kelihos botnet, pleaded guilty on Wednesday to computer crime, fraud, conspiracy and identity theft charges. read more Source link
          Blog Post: Russian Cybercriminal Pleads Guilty To Operating Botnet      Cache   Translate Page      
...read more
          280 mil roteadores foram invadidos para minerar criptomoeda, a maioria no Brasil      Cache   Translate Page      

Você sabe o que é Criptojacking? É uma tática que rouba, sorrateiramente, o domínio sobre um computador para minerar criptomoedas na máquina. A estratégia vem sendo bastante usada pelos invasores de diversas maneiras e, nos últimos dias, pesquisadores descobriram que 3.700 roteadores estavam executando silenciosamente programas maliciosos de criptografia. O número de dispositivos comprometidos detectados é de mais de 280.000, sendo a maioria localizada no Brasil.

Para efeito de comparação, o aumento é de 80.000 em pouco mais de 30 dias. O ataque maciço começou no início de agosto, quando cibercriminosos conseguiram comprometer mais de 200 mil roteadores MicroTik, explorando suas vulnerabilidades, até então não descobertas.

Os roteadores foram injetados com o CoinHive, um código que permite que os navegadores minerem criptomoedas. Até então, estima-se que mais de US$ 250.000 em moedas virtuais são gerados por esse botnet todos os meses. Então, caso tenha um roteador da MicroTik em casa, vale atualiza-lo imediatamente com o patch oficial mais recente disponível no site da fabricante.

Além do CoinHive, há ainda um perigoso cavalo de Tróia conhecido como Android Banker. Ele foi descoberto em janeiro deste ano e é direcionado a quase 200 aplicativos bancários. Se o aparelho for invadido por esta ameaça, os nomes de usuários e senhas podem ser comprometidos, já que o vírus pode conseguir identificar a autenticação de dois fatores para roubar os dados da pessoa.

Além dos app bancários, serviços de criptomoedas populares como o Bitfinex e o Blockfolio também podem ser comprometidos pelo Android Banker. Essa ameaça já foi, inclusive, notificada pelo pesquisador de segurança Lukas Stefanko, que destacou que “serviços financeiros ou de criptografia dedicados poderiam ser alterados dinamicamente e customizados para a vítima em particular”.

Vale tomar extremo cuidado, pois o Android Banker é distribuído principalmente por meio de versões falsas do Adobe Flash Player. Para se proteger de ameaça, nunca baixe aplicativos de fontes desconhecidas e proteja o dispositivo móvel com um bom programa de segurança.


          California Eyes Questionable Legislation In Bid To Fix The Internet Of Broken Things      Cache   Translate Page      

If you hadn't noticed, the much-hyped internet of things is comically broken. WiFi connected Barbies that spy on your kids, refrigerators that cough up your Gmail credentials, and "smart" televisions that watch you as often as you watch them are all now the norm. And while this has all been the focus of a lot of humor (like the Internet of shit Twitter feed), security experts have been warning for a while about how introducing millions of security flaws into millions of homes and businesses is, sooner or later, going to come back and bite us all on the ass.

As security analysts like Bruce Schneier have pointed out, few people in this dance of dysfunction really care, so things tend to not improve. Customers often aren't even aware (or don't care) that their device has been compromised and hijacked into a DDOS attacking botnet, and hardware vendors tend to prioritize sales of new devices over securing new (and especially older) gear.

Efforts to regulate the problem away are the option for many. That's what California lawmakers are considering with the recent passage of SB-327, which was introduced in February of last year, passed the California Senate on August 29, and now awaits signing from California Governor Jerry Brown. If signed into law, it would take effect in early 2020, and mandates that "a manufacturer of a connected device shall equip the device with a reasonable security feature or features," while also taking aim at things like default login credentials by requiring devices auto-prompt users to change their usernames and passwords.

But as you might expect, critics of the bill state it's not likely to actually fix the problem, in part because Chinese gearmakers (a major source of the problem) can just ignore the law. Others state California's solution is superficial at best, given that just "adding security features" doesn't really help if the technology is just fundamentally unsecure on the skeletal level:

"It’s based on the misconception of adding security features. It’s like dieting, where people insist you should eat more kale, which does little to address the problem you are pigging out on potato chips. The key to dieting is not eating more but eating less. The same is true of cybersecurity, where the point is not to add “security features” but to remove “insecure features”. For IoT devices, that means removing listening ports and cross-site/injection issues in web management. Adding features is typical “magic pill” or “silver bullet” thinking that we spend much of our time in infosec fighting against."

So if legislation isn't the solution, what is? Some believe transparency is a better bet, as exemplified by the Princeton computer science department's IOT Inspector, which aims to better educate users as to what their devices are actually doing on the internet. Others, like Consumer Reports, have been pushing to include privacy and security issues as standard operating procedure in hardware reviews. Both could go a long way toward making it much clearer as to what kind of product you're actually buying and what it's doing, since many vendors (and their user interfaces) refuse to.

Whatever the solution, it's going to likely require a coordinated response by consumers, hardware vendors, governments, and security professionals alike. While there have been some scattered efforts around the world on this front, as a whole that's generally not yet happening. As folks like Schneier continue to argue, it's likely going to require IOT devices causing massive damage and a potential loss of life (say, via attacks on core infrastructure) before the willpower for such a super-union truly materializes.



Permalink | Comments | Email This Story

          DDoS napadi sve jači zbog IoT botnet mreža      Cache   Translate Page      
Prema tvrtki NexusGuard u drugom kvartalu godine dogodio se znatan rast jačine DDoS napada ponajviše zahvaljujući sve češćoj uporabi botnet mreža sastavljenih od IoT uređaja
          Russian pleads guilty in U.S. to operating Kelihos botnet      Cache   Translate Page      
A Russian man pleaded guilty on Wednesday in U.S. federal court in Connecticut to criminal hacking charges stemming from his operation of the Kelihos botnet, the U.S. Justice Department said in a statement.

          Security: Back Doors, Russian Botnet/Botmaster and Tesla's Utter Fail      Cache   Translate Page      
  • California Eyes Questionable Legislation In Bid To Fix The Internet Of Broken Things

    If you hadn't noticed, the much-hyped internet of things is comically broken. WiFi connected Barbies that spy on your kids, refrigerators that cough up your Gmail credentials, and "smart" televisions that watch you as often as you watch them are all now the norm. And while this has all been the focus of a lot of humor (like the Internet of shit Twitter feed), security experts have been warning for a while about how introducing millions of security flaws into millions of homes and businesses is, sooner or later, going to come back and bite us all on the ass.

    As security analysts like Bruce Schneier have pointed out, few people in this dance of dysfunction really care, so things tend to not improve. Customers often aren't even aware (or don't care) that their device has been compromised and hijacked into a DDOS attacking botnet, and hardware vendors tend to prioritize sales of new devices over securing new (and especially older) gear.

    Efforts to regulate the problem away are the option for many. That's what California lawmakers are considering with the recent passage of SB-327, which was introduced in February of last year, passed the California Senate on August 29, and now awaits signing from California Governor Jerry Brown. If signed into law, it would take effect in early 2020, and mandates that "a manufacturer of a connected device shall equip the device with a reasonable security feature or features," while also taking aim at things like default login credentials by requiring devices auto-prompt users to change their usernames and passwords.

  • Labor unwilling to commit either way on encryption bill

    The Australian Labor Party appears to be hesitant about ruling out support for the government's Assistance and Access Bill, a draft of which was put up for comment on 14 August.

  • Russian man pleads guilty, admits he ran notorious Kelihos botnet

    The 38-year-old Russian’s botnet, which dated back to 2010, spanned more than 10,000 machines, and was primarily used to send out spam, steal logins, distribute ransomware, and more. Federal authorities shut it down in 2017.

  • 2-bit punks' weak 40-bit crypto didn't help Tesla keyless fobs one bit

          Russian Hacker Pleads Guilty to Operating Kelihos Botnet      Cache   Translate Page      
The Russian man who was accused of operating the infamous Kelihos botnet has finally pleaded guilty in a U.S. federal court. Peter Yuryevich Levashov, 38, of St. Petersburg, Russia, pleaded guilty on Wednesday in U.S. federal court in Connecticut to computer crime, wire fraud, conspiracy and identity theft charges. Levashov, also known by many online aliases including Peter Severa, Petr

          Russian Man Pleads Guilty To Running Kelihos Botnet      Cache   Translate Page      
none
          Laying down the law on IoT security      Cache   Translate Page      

IoT device security vaulted into the public consciousness in recent years. Media coverage of successful attacks against IoT devices and supporting systems, botnets powered by compromised devices, and a range of other security issues have raised public concern.

But now California is on the verge of enacting the first actual law in the US to mandate IoT device security.

Unfortunately, according to some in the industry, the bill now awaiting the governor’s signature will do little in its present form to improve the security of IoT, or the companies deploying it, or the people using it.
 
 


          L'arme la plus puissante d’internet s'est réveillée à nouveau      Cache   Translate Page      
Afin d’attaquer les grands réseaux d’entreprises, Mirai et Gafgyt, les deux botnets les plus célèbres au monde, ont mis à jour leurs outils dévastateurs.
          Russische 'spamkoning' die Kelihos-botnet beheerde bekent schuld      Cache   Translate Page      
De Rus Pyotr Levashov, die in april 2017 werd gearresteerd in Spanje, heeft in een Amerikaanse rechtbank bekend schuldig te zijn aan onder andere hacken en identiteitsdiefstal. De man gebruikte daarvoor het Kelihos-botnet.
          Kelihos botnet operator pleads guilty to hacking and fraud charges      Cache   Translate Page      
The Kelihos botnet story appears to be winding to a close. Russian Peter Levashov has pleaded guilty to charges relating his operation of the botnet, including intentional damage to a computer, wire fraud, conspiracy and identity theft. He reported...

          Cloud-Native Applications at Risk From Zero Touch Attacks      Cache   Translate Page      
Twistlock set up a honeypot with vulnerable applications to see what would happen and was quickly attacked by automated botnets looking to exploit unpatched vulnerabilities.
          INFORMATION SECURITY ANALYST - VeriSign - Reston, VA      Cache   Translate Page      
Recognizing common attack vectors such as, recon scans, botnet, malware, command and control activity (C2), worms, trojans, and viruses....
From VeriSign - Sat, 25 Aug 2018 15:22:18 GMT - View all Reston, VA jobs
          Kelihos Botnet Operator Pleads Guilty in Federal Court      Cache   Translate Page      
The 38-year-old Russian national operated several botnets and infected thousands of systems with malware.
          Kelihos botnet operator pleads guilty to hacking and fraud charges      Cache   Translate Page      
The Kelihos botnet story appears to be winding to a close. Russian Peter Levashov has pleaded guilty to charges relating his operation of the botnet, including intentional damage to a computer, wire fraud, conspiracy and identity theft. He reported...


Next Page: 10000

Site Map 2018_01_14
Site Map 2018_01_15
Site Map 2018_01_16
Site Map 2018_01_17
Site Map 2018_01_18
Site Map 2018_01_19
Site Map 2018_01_20
Site Map 2018_01_21
Site Map 2018_01_22
Site Map 2018_01_23
Site Map 2018_01_24
Site Map 2018_01_25
Site Map 2018_01_26
Site Map 2018_01_27
Site Map 2018_01_28
Site Map 2018_01_29
Site Map 2018_01_30
Site Map 2018_01_31
Site Map 2018_02_01
Site Map 2018_02_02
Site Map 2018_02_03
Site Map 2018_02_04
Site Map 2018_02_05
Site Map 2018_02_06
Site Map 2018_02_07
Site Map 2018_02_08
Site Map 2018_02_09
Site Map 2018_02_10
Site Map 2018_02_11
Site Map 2018_02_12
Site Map 2018_02_13
Site Map 2018_02_14
Site Map 2018_02_15
Site Map 2018_02_15
Site Map 2018_02_16
Site Map 2018_02_17
Site Map 2018_02_18
Site Map 2018_02_19
Site Map 2018_02_20
Site Map 2018_02_21
Site Map 2018_02_22
Site Map 2018_02_23
Site Map 2018_02_24
Site Map 2018_02_25
Site Map 2018_02_26
Site Map 2018_02_27
Site Map 2018_02_28
Site Map 2018_03_01
Site Map 2018_03_02
Site Map 2018_03_03
Site Map 2018_03_04
Site Map 2018_03_05
Site Map 2018_03_06
Site Map 2018_03_07
Site Map 2018_03_08
Site Map 2018_03_09
Site Map 2018_03_10
Site Map 2018_03_11
Site Map 2018_03_12
Site Map 2018_03_13
Site Map 2018_03_14
Site Map 2018_03_15
Site Map 2018_03_16
Site Map 2018_03_17
Site Map 2018_03_18
Site Map 2018_03_19
Site Map 2018_03_20
Site Map 2018_03_21
Site Map 2018_03_22
Site Map 2018_03_23
Site Map 2018_03_24
Site Map 2018_03_25
Site Map 2018_03_26
Site Map 2018_03_27
Site Map 2018_03_28
Site Map 2018_03_29
Site Map 2018_03_30
Site Map 2018_03_31
Site Map 2018_04_01
Site Map 2018_04_02
Site Map 2018_04_03
Site Map 2018_04_04
Site Map 2018_04_05
Site Map 2018_04_06
Site Map 2018_04_07
Site Map 2018_04_08
Site Map 2018_04_09
Site Map 2018_04_10
Site Map 2018_04_11
Site Map 2018_04_12
Site Map 2018_04_13
Site Map 2018_04_14
Site Map 2018_04_15
Site Map 2018_04_16
Site Map 2018_04_17
Site Map 2018_04_18
Site Map 2018_04_19
Site Map 2018_04_20
Site Map 2018_04_21
Site Map 2018_04_22
Site Map 2018_04_23
Site Map 2018_04_24
Site Map 2018_04_25
Site Map 2018_04_26
Site Map 2018_04_27
Site Map 2018_04_28
Site Map 2018_04_29
Site Map 2018_04_30
Site Map 2018_05_01
Site Map 2018_05_02
Site Map 2018_05_03
Site Map 2018_05_04
Site Map 2018_05_05
Site Map 2018_05_06
Site Map 2018_05_07
Site Map 2018_05_08
Site Map 2018_05_09
Site Map 2018_05_15
Site Map 2018_05_16
Site Map 2018_05_17
Site Map 2018_05_18
Site Map 2018_05_19
Site Map 2018_05_20
Site Map 2018_05_21
Site Map 2018_05_22
Site Map 2018_05_23
Site Map 2018_05_24
Site Map 2018_05_25
Site Map 2018_05_26
Site Map 2018_05_27
Site Map 2018_05_28
Site Map 2018_05_29
Site Map 2018_05_30
Site Map 2018_05_31
Site Map 2018_06_01
Site Map 2018_06_02
Site Map 2018_06_03
Site Map 2018_06_04
Site Map 2018_06_05
Site Map 2018_06_06
Site Map 2018_06_07
Site Map 2018_06_08
Site Map 2018_06_09
Site Map 2018_06_10
Site Map 2018_06_11
Site Map 2018_06_12
Site Map 2018_06_13
Site Map 2018_06_14
Site Map 2018_06_15
Site Map 2018_06_16
Site Map 2018_06_17
Site Map 2018_06_18
Site Map 2018_06_19
Site Map 2018_06_20
Site Map 2018_06_21
Site Map 2018_06_22
Site Map 2018_06_23
Site Map 2018_06_24
Site Map 2018_06_25
Site Map 2018_06_26
Site Map 2018_06_27
Site Map 2018_06_28
Site Map 2018_06_29
Site Map 2018_06_30
Site Map 2018_07_01
Site Map 2018_07_02
Site Map 2018_07_03
Site Map 2018_07_04
Site Map 2018_07_05
Site Map 2018_07_06
Site Map 2018_07_07
Site Map 2018_07_08
Site Map 2018_07_09
Site Map 2018_07_10
Site Map 2018_07_11
Site Map 2018_07_12
Site Map 2018_07_13
Site Map 2018_07_14
Site Map 2018_07_15
Site Map 2018_07_16
Site Map 2018_07_17
Site Map 2018_07_18
Site Map 2018_07_19
Site Map 2018_07_20
Site Map 2018_07_21
Site Map 2018_07_22
Site Map 2018_07_23
Site Map 2018_07_24
Site Map 2018_07_25
Site Map 2018_07_26
Site Map 2018_07_27
Site Map 2018_07_28
Site Map 2018_07_29
Site Map 2018_07_30
Site Map 2018_07_31
Site Map 2018_08_01
Site Map 2018_08_02
Site Map 2018_08_03
Site Map 2018_08_04
Site Map 2018_08_05
Site Map 2018_08_06
Site Map 2018_08_07
Site Map 2018_08_08
Site Map 2018_08_09
Site Map 2018_08_10
Site Map 2018_08_11
Site Map 2018_08_12
Site Map 2018_08_13
Site Map 2018_08_15
Site Map 2018_08_16
Site Map 2018_08_17
Site Map 2018_08_18
Site Map 2018_08_19
Site Map 2018_08_20
Site Map 2018_08_21
Site Map 2018_08_22
Site Map 2018_08_23
Site Map 2018_08_24
Site Map 2018_08_25
Site Map 2018_08_26
Site Map 2018_08_27
Site Map 2018_08_28
Site Map 2018_08_29
Site Map 2018_08_30
Site Map 2018_08_31
Site Map 2018_09_01
Site Map 2018_09_02
Site Map 2018_09_03
Site Map 2018_09_04
Site Map 2018_09_05
Site Map 2018_09_06
Site Map 2018_09_07
Site Map 2018_09_08
Site Map 2018_09_09
Site Map 2018_09_10
Site Map 2018_09_11
Site Map 2018_09_12
Site Map 2018_09_13