Exploit Kits, Which Seemed Nearly Dormant Last Year Following the Demise of Illicit Cryptocurrency Mining, the Hot New Thing in 2018, Appear to Be Making a Comeback
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
2020 Sonicwall Cyber Threat Report
2020 SONICWALL CYBER THREAT REPORT sonicwall.com I @sonicwall TABLE OF CONTENTS 3 A NOTE FROM BILL 4 CYBERCRIMINAL INC. 11 2019 GLOBAL CYBERATTACK TRENDS 12 INSIDE THE SONICWALL CAPTURE LABS THREAT NETWORK 13 KEY FINDINGS FROM 2019 13 SECURITY ADVANCES 14 CRIMINAL ADVANCES 15 FASTER IDENTIFICATION OF ‘NEVER-BEFORE-SEEN’ MALWARE 16 TOP 10 CVES EXPLOITED IN 2019 19 ADVANCEMENTS IN DEEP MEMORY INSPECTION 23 MOMENTUM OF PERIMETER-LESS SECURITY 24 PHISHING DOWN FOR THIRD STRAIGHT YEAR 25 CRYPTOJACKING CRUMBLES 27 RANSOMWARE TARGETS STATE, PROVINCIAL & LOCAL GOVERNMENTS 31 FILELESS MALWARE SPIKES IN Q3 32 ENCRYPTED THREATS GROWING CONSISTENTLY 34 IOT ATTACK VOLUME RISING 35 WEB APP ATTACKS DOUBLE IN 2019 37 PREPARING FOR WHAT’S NEXT 38 ABOUT SONICWALL 2 A NOTE FROM BILL The boundaries of your digital empire are In response, SonicWall and our Capture Labs limitless. What was once a finite and threat research team work tirelessly to arm defendable space is now a boundless organizations, enterprises, governments and territory — a vast, sprawling footprint of businesses with actionable threat devices, apps, appliances, servers, intelligence to stay ahead in the global cyber networks, clouds and users. arms race. For the cybercriminals, it’s more lawless And part of that dedication starts now with than ever. Despite the best intentions of the 2020 SonicWall Cyber Threat Report, government agencies, law enforcement and which provides critical threat intelligence to oversight groups, the current cyber threat help you better understand how landscape is more agile than ever before. cybercriminals think — and be fully prepared for what they’ll do next. -
Alcatel-Lucent Security Advisory Sa0xx
Alcatel-Lucent Security Advisory No. SA0053 Ed. 04 Information about Poodle vulnerability Summary POODLE stands for Padding Oracle On Downgraded Legacy Encryption. The POODLE has been reported in October 14th 2014 allowing a man-in-the-middle attacker to decrypt ciphertext via a padding oracle side-channel attack. The severity is not considered as the same for Heartbleed and/or bash shellshock vulnerabilities. The official risk is currently rated Medium. The classification levels are: Very High, High, Medium, and Low. The SSLv3 protocol is only impacted while TLSv1.0 and TLSv1.2 are not. This vulnerability is identified CVE- 2014-3566. Alcatel-Lucent Enterprise voice products using protocol SSLv3 are concerned by this security alert. Openssl versions concerned by the vulnerability: OpenSSL 1.0.1 through 1.0.1i (inclusive) OpenSSL 1.0.0 through 1.0.0n (inclusive) OpenSSL 0.9.8 through 0.9.8zb (inclusive) The Alcatel-Lucent Enterprise Security Team is currently investigating implications of this security flaw and working on a corrective measure, for OpenTouch 2.1.1 planned in Q4 2015, to prevent using SSLv3 that must be considered as vulnerable. This note is for informational purpose about the padding-oracle attack identified as “POODLE”. References CVE-2014-3566 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566 Advisory severity CVSS Base score : 4.3 (MEDIUM) - AV:N/AC:M/Au:N/C:P/I:N/A:N https://www.openssl.org/news/secadv_20141015.txt https://www.openssl.org/~bodo/ssl-poodle.pdf Description of the vulnerabilities Information about Poodle vulnerability (CVE-2014-3566). -
Igloosec Security Report
Monthly Security Report 2019 June Cyber attack prevention and detection automation using CTI & vulnerability assessment result CVE-2019-0708 (BlueKeep) Advanced social engineering hacking technique, aimed at people. This report is based on the data collected through the SIEM solution at IGLOO Security’s Security Operation Center (SOC). IGLOO Security continuously strives to achieve a 24/7 safe cyber environment throughout the year. -2 - MONTHLY SECURITY REPORT 201906 Cover Story 1. Monthly Security Issues - Monthly security issues 2. IGLOO Statistics - Monthly Attack Service and Trend Analysis - Detailed Analysis According to Different Patterns 3. SIEM Guide (SPiDER TM V5.x) 4. Tech Note - CVE-2019-0708 (BlueKeep) 5. Special Column - Advanced social engineering hacking techniques, aimed at people 6. Focus On IGLOO Security - Participation in the 2019 Defense Security Conference Information Security Product Exhibition -3 - MONTHLY SECURITY REPORT 201906 CHAPTER 1 Monthly Security Issues 1. Monthly security issues -4 - MONTHLY SECURITY REPORT 201906 1 Monthly Security Issues ‘For the next generation’… Gand Crab Ransomware creator announces discontinuation of Gand Crab • GandCrab Ransomware creator has earned $ 2 billion. Now attracting attention by announcing that it will no longer produce a service-oriented Ransomware (RaaS). • GandCrab Ransomware, which was first unveiled in January 2018, has recently appeared in the 5.2 version and produced a lot of damage. • According to the blip computer, the creator has invested in legitimate businesses by cashing in revenues from the company. The creator are expected to delete the entire cryptographic key along with the release of the Ransomware, and victims who want to retrieve the files encrypted by Gandcrab are prompted to pay for the decryption quickly. -
Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE of CONTENTS 2016 Internet Security Threat Report 2
Internet Security Threat Report VOLUME 21, APRIL 2016 TABLE OF CONTENTS 2016 Internet Security Threat Report 2 CONTENTS 4 Introduction 21 Tech Support Scams Go Nuclear, 39 Infographic: A New Zero-Day Vulnerability Spreading Ransomware Discovered Every Week in 2015 5 Executive Summary 22 Malvertising 39 Infographic: A New Zero-Day Vulnerability Discovered Every Week in 2015 8 BIG NUMBERS 23 Cybersecurity Challenges For Website Owners 40 Spear Phishing 10 MOBILE DEVICES & THE 23 Put Your Money Where Your Mouse Is 43 Active Attack Groups in 2015 INTERNET OF THINGS 23 Websites Are Still Vulnerable to Attacks 44 Infographic: Attackers Target Both Large and Small Businesses 10 Smartphones Leading to Malware and Data Breaches and Mobile Devices 23 Moving to Stronger Authentication 45 Profiting from High-Level Corporate Attacks and the Butterfly Effect 10 One Phone Per Person 24 Accelerating to Always-On Encryption 45 Cybersecurity, Cybersabotage, and Coping 11 Cross-Over Threats 24 Reinforced Reassurance with Black Swan Events 11 Android Attacks Become More Stealthy 25 Websites Need to Become Harder to 46 Cybersabotage and 12 How Malicious Video Messages Could Attack the Threat of “Hybrid Warfare” Lead to Stagefright and Stagefright 2.0 25 SSL/TLS and The 46 Small Business and the Dirty Linen Attack Industry’s Response 13 Android Users under Fire with Phishing 47 Industrial Control Systems and Ransomware 25 The Evolution of Encryption Vulnerable to Attacks 13 Apple iOS Users Now More at Risk than 25 Strength in Numbers 47 Obscurity is No Defense -
Sonicwall Cyber Threat Report a Note from Bill
2 0 SONICWALL 2 1 CYBER THREAT REPORT Cyber threat intelligence for navigating the new business reality sonicwall.com | @sonicwall Table of Contents A Note From Bill 3 Ransomware by Region 37 Introduction 4 Ransomware by Signature 38 2020 Global Cyberattack Trends 5 Ransomware by Industry 42 Top Data Exposures of 2020 6 Intrusion Attempts 44 Power Shifts Changing Future of Cybersecurity 7 Top Intrusion Attacks 46 Published CVEs Nearly Triple Since 2015 10 Intrusion Attempts by Region 47 Top 8 CVEs Exploited in 2020 10 Capture ATP and RTDMI 48 2020 Zero-Day Vulnerabilities 12 ‘Never-Before-Seen’ Malware 50 COVID Threats: Exploiting a Pandemic 13 Malicious Office and PDF Files 51 COVID-19-Related Attacks by Industry 14 Cryptojacking 52 2020’s Biggest Cybersecurity Events 16 Cryptojacking Attempts by Industry 56 Key Findings from 2020 19 IoT Malware Attacks 58 Malware Attempts 21 A Year in IoT Malware Attacks 62 Malware Spread 22 IoT Malware Attacks by Industry 64 Malware Risk by Country 24 Non-Standard Ports 66 Malware Spread by Country 30 Conclusion 67 Malware Attempts by Industry 31 About the SonicWall Capture Labs Threat Network 68 Encrypted Attacks 33 Featured Threat Researchers 69 Ransomware 35 About SonicWall 70 2 | 2021 SonicWall Cyber Threat Report A Note From Bill The World Economic Forum asked respondents in a recent Cyber-resiliency means expanding your focus beyond study which dangers will pose the largest threat to the world simply securing your network and your data, to ensuring over the next two years. business continuity in the event of an attack or some other Unsurprisingly for a pandemic year, “infectious diseases” unforeseen event. -
Combat Top Security Vulnerabilities: HPE Tippingpoint Intrusion
Business white paper Combat top security vulnerabilities HPE TippingPoint intrusion prevention system Business white paper Page 2 The year 2014 marked a new pinnacle for hackers. Vulnerabilities were uncovered in some of the most widely deployed software in the world—some of it in systems actually intended to make you more secure. HPE TippingPoint next-generation intrusion prevention system (IPS) and next-generation firewall (NGFW) customers rely on us to keep their networks safe. And when it comes to cyber threats, every second matters. So how did HPE TippingPoint do? This brief highlights the top security vulnerabilities of 2014—the ones that sent corporate security executives scrambling to protect their businesses. And it describes how HPE TippingPoint responded to keep our customers safe. Heartbleed—HPE TippingPoint intrusion prevention system stops blood flow early Any vulnerability is concerning, but when a vulnerability is discovered in software designed to assure security, it leaves businesses exposed and vulnerable. That was the case with the Heartbleed vulnerability disclosed by the OpenSSL project on April 7, 2014. They found the vulnerability in versions of OpenSSL—the open-source cryptographic library widely used to encrypt Internet traffic. Heartbleed grew from a coding error that allowed remote attackers to read information from process memory by sending heartbeat packets that trigger a buffer over-read. As a demonstration of the vulnerability, the OpenSSL Project created a sample exploit that successfully stole private cryptography keys, user names and passwords, instant messages, emails, and business-critical documents and communications. We responded within hours to protect TippingPoint customers. On April 8, we released a custom filter package to defend against the vulnerability. -
Catalogue Formations (PDF)
Page 2 L’intégrale VERISAFE Véritable cursus de formation en Cybersécurité : 120 heures de formation, 850 vidéos & 4200 slides La cybercriminalité fait peser une menace grandissante sur tous les organismes (privés ou pu- blics) et sur chaque citoyen. Pour lutter efficacement contre ce fléau, il est important de bien comprendre le phénomène et de l’anticiper. Illustrée par des exemples réels, cette formation détaille le monde cybercriminel (organisation, acteurs, motivations, techniques d’attaques, moyens financiers et humains,…). Elle présente également les acteurs et les dispositifs juri- diques pour lutter contre les cybercriminels au niveau national comme au niveau international. Face une véritable pénurie en matière de compétences en matière de sécurité Cloud, la certifi- cation CCSK de la Cloud Security Alliance est devenue la certification internationale la plus re- cherchée et se place désormais à la 1er place en matière de rémunération (Source : Certificate Magazine). Cette formation intensive a été spécialement conçue pour préparer et obtenir cette certification en 30 jours. Ransomware, espionnage économique ou scientifique, fuites de données à caractère person- nel,… le nombre de cyberattaques ne cesse d’augmenter en France et dans le monde. La ques- tion n’est donc pas de savoir si votre organisme sera attaqué mais plutôt comment répondre efficacement à ces attaques. Cette formation répond à toutes les préoccupations actuelles et dresse l’état de l’art en matière de cybersécurité à destination des entreprises et des adminis- trations. C’est la formation Cybersécurité le plus suivie en France avec 18 sessions en présentiel et plus de 316 participants en 2019. Cette formation intensive permet d’acquérir toutes les compétences nécessaires pour devenir un professionnel de la cybersécurité reconnu sur le marché. -
IBM X-Force Threat Intelligence Quarterly, 1Q 2015
IBM Security Systems March 2015 IBM X-Force Threat Intelligence Quarterly, 1Q 2015 Explore the latest security trends—from “designer vulns” to mutations in malware— based on 2014 year-end data and ongoing research 2 IBM X-Force Threat Intelligence Quarterly 1Q 2015 Contents Executive overview 2 Executive overview When we look back in history to review and understand the past year, you can be assured it will be remembered as a year of 4 Roundup of security incidents in 2014 significant change. 11 Citadel, the financial malware that continues to adapt In early January 2014, companies large and small scrambled to Are mobile application developers for Android putting their 14 better understand and analyze a major retail breach that left users at risk? them asking whether or not their own security measures would 17 Shaking the foundation: Vulnerability disclosures in 2014 survive the next storm. Before spring was barely in motion, we had our first taste of the “designer vuln”—a critical 21 About X-Force vulnerability that not only proved lethal for targeted attacks, 22 Contributors but also had a cleverly branded logo, website and call-name (or handle) that would forever identify the disclosure. 22 For more information 23 Footnotes These designer vulns appeared within long-held foundational frameworks used by the majority of websites, and they continued throughout 2014, garnering catchy name after catchy name—Heartbleed, Shellshock, POODLE, and into 2015, Ghost and FREAK. This in and of itself raises the question of what it takes for a vulnerability to merit a marketing push, PR and logo design, while the other thousands discovered throughout the year do not. -
TLS Attacks & DNS Security
IAIK TLS Attacks & DNS Security Information Security 2019 Johannes Feichtner [email protected] IAIK Outline TCP / IP Model ● Browser Issues Application SSLStrip Transport MITM Attack revisited Network Link layer ● PKI Attacks (Ethernet, WLAN, LTE…) Weaknesses HTTP TLS / SSL FLAME FTP DNS Telnet SSH ● Implementation Attacks ... ● Protocol Attacks ● DNS Security IAIK Review: TLS Services All applications running TLS are provided with three essential services Authentication HTTPS FTPS Verify identity of client and server SMTPS ... Data Integrity Detect message tampering and forgery, TLS e.g. malicious Man-in-the-middle TCP IP Encryption Ensure privacy of exchanged communication Note: Technically, not all services are required to be used Can raise risk for security issues! IAIK Review: TLS Handshake RFC 5246 = Establish parameters for cryptographically secure data channel Full handshake Client Server scenario! Optional: ClientHello 1 Only with ServerHello Client TLS! Certificate 2 ServerKeyExchange Certificate CertificateRequest ClientKeyExchange ServerHelloDone CertificateVerify 3 ChangeCipherSpec Finished ChangeCipherSpec 4 Finished Application Data Application Data IAIK Review: Certificates Source: http://goo.gl/4qYsPz ● Certificate Authority (CA) = Third party, trusted by both the subject (owner) of the certificate and the party (site) relying upon the certificate ● Browsers ship with set of > 130 trust stores (root CAs) IAIK Browser Issues Overview Focus: Relationship between TLS and HTTP Problem? ● Attacker wants to access encrypted data ● Browsers also have to deal with legacy websites Enforcing max. security level would „break“ connectivity to many sites Attack Vectors ● SSLStrip ● MITM Attack …and somehow related: Cookie Stealing due to absent „Secure“ flag… IAIK Review: ARP Poisoning How? Attacker a) Join WLAN, ● Sniff data start ARP Poisoning ● Manipulate data b) Create own AP ● Attack HTTPS connections E.g. -
The Software Vulnerability Ecosystem: Software Development in the Context of Adversarial Behavior
University of Pennsylvania ScholarlyCommons Publicly Accessible Penn Dissertations 2016 The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior Saender Aren Clark University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/edissertations Part of the Databases and Information Systems Commons, and the Engineering Commons Recommended Citation Clark, Saender Aren, "The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior" (2016). Publicly Accessible Penn Dissertations. 2233. https://repository.upenn.edu/edissertations/2233 This paper is posted at ScholarlyCommons. https://repository.upenn.edu/edissertations/2233 For more information, please contact [email protected]. The Software Vulnerability Ecosystem: Software Development In The Context Of Adversarial Behavior Abstract Software vulnerabilities are the root cause of many computer system security fail- ures. This dissertation addresses software vulnerabilities in the context of a software lifecycle, with a particular focus on three stages: (1) improving software quality dur- ing development; (2) pre- release bug discovery and repair; and (3) revising software as vulnerabilities are found. The question I pose regarding software quality during development is whether long-standing software engineering principles and practices such as code reuse help or hurt with respect to vulnerabilities. Using a novel data-driven analysis of large databases of vulnerabilities, I show the surprising result that software quality and software security are distinct. Most notably, the analysis uncovered a counterintu- itive phenomenon, namely that newly introduced software enjoys a period with no vulnerability discoveries, and further that this “Honeymoon Effect” (a term I coined) is well-explained by the unfamiliarity of the code to malicious actors. -
Bluekeep Vulnerability
Monthly Cybersecurity Newsletter June 2019 Issue Enterprise Security and Risk Management Office (ESRMO) From the Desk of the State Chief Risk Officer – Maria Thompson BlueKeep Vulnerability The National Security Agency (NSA) has released a cybersecurity advisory for a vulnerability (CVE-2019-0708) called “BlueKeep” that affects several old versions of the Microsoft Windows operating system. The BlueKeep vulnerability allows for an unauthenticated attacker to connect to a vulnerable system using the Remote Desktop Protocol (RDP) – formerly known as Terminal Services – and send specially crafted requests without user interaction. An attacker who successfully exploits this vulnerability could then install programs; view, change, or delete data; or create new accounts with full user rights on the vulnerable machine. Microsoft warns that the vulnerability is also “wormable,” meaning it can potentially spread from system to system without user interaction. The “BlueKeep” vulnerability is present in Windows 7, Windows XP, and Server 2003 and 2008. Windows 8 and Windows 10 are not currently vulnerable. Although Microsoft has issued a patch for this vulnerability, potentially millions of machines are still vulnerable. Microsoft strongly recommends installing the updates for this vulnerability as soon as possible, after appropriate testing. The update addresses the vulnerability by correcting how Remote Desktop Services (RDS) handles connection requests. In addition to installing the patch, the following steps may also help reduce the risk of this vulnerability. • Disable RDS if it is not required. Disabling unused and unneeded services reduces exposure to security vulnerabilities. • Enable Network Level Authentication (NLA) on systems running supported Windows editions. With NLA turned on, an attacker would first need to authenticate to RDS with a valid account on the target system before exploiting the vulnerability. -
Chrome's Root Program
Security Now! Transcript of Episode #791 Page 1 of 27 Transcript of Episode #791 Chrome's Root Program Description: This week we examine a serious newly revealed Windows zero-day flaw, a public service reminder from Microsoft, Google's newly announced plan to get into the VPN service business, CERT's unappealing plan for automatic vulnerability naming, and a real mess that WordPress just made of an incremental security update to 455 million sites. Then we'll close a loop, I'll update about SpinRite, and we'll finish by examining Google's new plan to go their own way with a new Chromium browser certificate Root Store. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-791.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-791-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson is here. Coming up in just a little bit a new Windows zero-day that's been around since Windows 7. A screw-up in patching for WordPress, you're going to want to know about that. And Steve's Dumb Idea of the Week. All I can say is stay tuned. Security Now! is coming up next. Leo Laporte: This is Security Now! with Steve Gibson, Episode 791, recorded Tuesday, November 3rd, 2020: Google's Root Program. It's time for Security Now!, and I mean right now, with this guy right here, Steve. Well, there is an exclamation mark in the title. That means it's definitely Security Now!.