Tag spam

InfoSec Week 3, 2018

Notoriously known Necurs spam botnet is sending millions of spam emails that are pumping shitcoin cryptocurrency named Swisscoin. Attackers are probably invested and are expecting to do pump-and-dump scheme.
https://www.bleepingcomputer.com/news/cryptocurrency/worlds-largest-spam-botnet-is-pumping-and-dumping-an-obscure-cryptocurrency/

Nice article on Russia's hacking capabilities against the foreign critical infrastructure.
https://www.fastcompany.com/40515682/the-other-scary-foreign-hacking-threat-trump-is-ignoring

Taiwanese police has handed malware-infected USB sticks as prizes for cybersecurity quiz. The malware was some old sample trying to communicate with non-existing C&C server in Poland. The thumb drives were infected by third-party contractor.
https://www.theregister.co.uk/AMP/2018/01/10/taiwanese_police_malware/

New research is analyzing usage of the Certificate Authority Authorization (CAA) DNS records. CAA records enable domain owners to explicitly tell which certificate authority may issue digital certificates for their domain. Only 4 of the large DNS operators that dominate the Internet’s DNS infrastructure enabled their customers to configure CAA records, but things are getting better after this audit.
https://caastudy.github.io/

Lenovo engineers have discovered a backdoor affecting RackSwitch and BladeCenter switches running ENOS (Enterprise Network Operating System). The company already released firmware updates.
The backdoor was added to the source code in 2004 when it was maintained by Nortel.
https://www.bleepingcomputer.com/news/security/lenovo-discovers-and-removes-backdoor-in-networking-switches/

Nice technical report about PowerStager, Python / C / PowerShell malware used in the Pyeongchang Olympic themed spear phishing attack.
https://researchcenter.paloaltonetworks.com/2018/01/unit42-powerstager-analysis/

InfoSec Week 3, 2017

Trustwave released the Carbanak gang campaign threat report called "Operation Grand Mars". The paper explains the modus operandi of the Carbanak group, malware distribution techniques, attack vectors. The interesting point is that the group uses Google Apps, Sheets and Forms as a part of their Command & Control infrastructure. But Trustware is not the only one reporting about this.
https://www2.trustwave.com/rs/815-RFM-693/images/Operation%20Grand%20Mars.pdf https://blogs.forcepoint.com/security-labs/carbanak-group-uses-google-malware-command-and-control

After unsecured MongoDB, cyber-criminals have taken control of and wiped the data from CouchDB and Hadoop databases as well.
https://www.bleepingcomputer.com/news/security/database-ransom-attacks-hit-couchdb-and-hadoop-servers/

Xylitol malware researcher discovered new Ransomware as a Service platform named Satan. Satan admin page is a Tor hidden service accepting Bitcoins. The administration panel also contains Droppers section, where the affiliates can create malicious Microsoft Word macros or CHM installers.
https://www.bleepingcomputer.com/news/security/new-satan-ransomware-available-through-a-ransomware-as-a-service-/ https://twitter.com/Xylit0l/status/821757718885236740

Blog post about the Ursnif banking trojan recent email campaign. It pretends to be DHL package notification email.
https://benkowlab.blogspot.ch/2017/01/a-journey-inside-ursnif-campaign.html

Proofpoint researchers discovered infection technique which is trying to trick users into downloading a font update package - malware - for their browser.
https://www.proofpoint.com/us/threat-insight/post/EITest-Nabbing-Chrome-Users-Chrome-Font-Social-Engineering-Scheme

Members of the Hamas Palestinian militant group have posed as women and tricked Israeli soldiers into installing malware on their phones.
https://www.bleepingcomputer.com/news/government/israeli-military-tricked-into-installing-malware-by-hamas-agents-posing-as-women/

Brian Krebs links young man named Paras Jha, owner of a distributed denial-of-service (DDoS) attack mitigation company ProTraf Solutions, to the Anna-Senpai pseudonym, creator and admin of the Mirai IoT worm.
https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/

Iranian OilRig malware is using digitally signed malware and fake University of Oxford domains targeting government agencies, financial institutions and technology companies in Saudi Arabia, Israel, the United Arab Emirates, Lebanon, Kuwait and Qatar, the United States, and Turkey.
http://securityaffairs.co/wordpress/55145/apt/oilrig-apt-itan.html