InfoSec Week 51, 2016

Posted on 24 December 2016
SUBSCRIBE TO A WEEKLY NEWSLETTER!

Russian hackers tracked Ukrainian artillery units using Android implant
https://www.crowdstrike.com/blog/danger-close-fancy-bear-tracking-ukrainian-field-artillery-units/

UK nuclear submarines are running Windows for Submarines (customized Win XP). It should be noted that the Windows operating system probably doesn't control the nuclear launch operations itself.
http://www.newyorker.com/news/news-desk/world-war-three-by-mistake

McAfee VirusScan Enterprise for Linux can be remotely compromised. Some of these vulnerabilities can be chained together to allow remote code execution as root.
https://nation.state.actor/mcafee.html

Trend Micro analysed very lightweight ATM malware called Alice (BKDR_ALICE.A). Its only purpose is to empty the ATM safe.
http://blog.trendmicro.com/trendlabs-security-intelligence/alice-lightweight-compact-no-nonsense-atm-malware/

Veles: Nice open source tool for binary data visualization and analysis.
https://codisec.com/veles/

Noriben is a Python-based script that works in conjunction with Sysinternals Procmon to automatically collect, analyze, and report on runtime indicators of malware.
https://n0where.net/portable-malware-analysis-sandbox-noriben/


Comments !