Twitter Malware: Spreading More Than Just Ideas

Dana Tamir

https://www.trusteer.com/blog/twitter-malware-spreading-more-than-just-ideas

 

Excerpt:

 

“Trusteer researcher Tanya Shafir has recently identified an active configuration of financial malware targeting Twitter users. The malware launches a Man-in-the-Browser (MitB) attack through the browser of infected PCs, gaining access to the victim’s Twitter account to create malicious tweets. The malware, which has been used as a financial malware to gain access to user credentials and target their financial transactions, now has a new goal: to spread malware using the online social networking service. At this time the attack is targeting the Dutch market.”

 

 

 


Japanese police target users of Tor anonymous network

 

http://www.bbc.co.uk/news/technology-22248692

 

Excerpt:

 

“Japanese people who "abuse" the Tor anonymous browsing network could be blocked from using it. The recommendation was made in a report drawn up for the National Police Agency (NPA) in Japan by a panel of technology experts. The panel was formed to help decide how to tackle crimes committed with the aid of the Tor network.”

 

 

 


Australia charges man claiming to be LulzSec leader

 

Jeremy Kirk

https://www.computerworld.com.au/article/459964/australia_charges_man_claiming_lulzsec_leader/

 

Excerpt:

 

“Australia has charged a 24-year-old man who allegedly defaced a government website earlier this month and claims to be the leader of LulzSec, a rogue inactive hacking group. The man, from Point Clare about 50 miles north of Sydney, was charged with two counts of unauthorized modification of data and one count of unauthorized access. He could face up to 12 years”

 

 

 

 

 

 


Cambridge Uni spin-off targets banking malware with image-based security system

 

Matthew Finnegan

http://www.computerworld.com.sg/resource/industries/cambridge-uni-spin-off-targets-banking-malware-with-image-based-security-system/

 

Excerpt:

 

“A Cambridge University spin-off has developed a new method of protection against 'man-in-the-browser' Trojan malware attacks on online bank customers, using a mobile device-based visual image security system to improve authentication and reduce the risk of fraud.”

 

 


“ransomware” Trojan, a new malware targeting Qatar

 

Q-CERT

https://docs.google.com/file/d/0B4PG-OqLcJv4cm4yRGRMTXllTmM/edit?pli=1

 

Excerpt:

 

“Q-CERT team is tracking activities regarding a known “ransomware” Trojan targeting Qatar users. More than 25 cases have been detected until the date of writing this advisory. The “ransomware” takes a picture of the victim using the victim’s webcam, then locks the screen with a panic message pretending to be from the local police, asking for money transfer to unlock the computer.”

 

 

 


Healthcare Information: the New Terrorist Target

 

Julie Knudson

http://www.fortherecordmag.com/archives/0413p10.shtml

 

Excerpt:

 

“A cyberattack on the healthcare system may sound like a Hollywood movie plot, but Rick Kam, president and cofounder of ID Experts, says the threat is anything but fiction. “We’re anticipating that 2013 will be the year of a major breach in healthcare,” he says, adding that the expectation is very large numbers of records to be compromised this year alone. Other industries already have fallen victim, and healthcare’s enormous volume of sensitive data makes it a fruit ripe for the picking, Kam says.”

 

 


Every nation is engaging in cyber attacks, says News International CISO

 

Danny Palmer

http://www.computing.co.uk/ctg/news/2262221/every-nation-is-engaging-in-cyber-attacks-says-news-international-ciso

 

Excerpt:

 

“Almost all nation states are either carrying out cyber attacks or funding organisations to engage in cyber warfare on their behalf. That's according to News International chief information security officer (CISO) Amar Singh, who says this is a common belief among security professionals.”

 

 

 


 

Massive Spam and Malware Campaign Following the Boston Tragedy

Craig Williams

http://blogs.cisco.com/security/massive-spam-and-malware-campaign-following-the-boston-tragedy/

 

Excerpt:

 

“On April 16th at 11:00pm GMT, the first of two botnets began a massive spam campaign to take advantage of the recent Boston tragedy. The spam messages claim to contain news concerning the Boston Marathon bombing. The spam messages contain a link to a site that claims to have videos of explosions from the attack. Simultaneously, links to these sites were posted as comments to various blogs.”

 

 


 

8 Steps To Secure Your WordPress Blog

Marko Saric

http://www.howtomakemyblog.com/wordpress/7-simple-steps-to-make-your-wordpress-blog-more-secure/

 

Excerpt:

 

“Wordpress blogs are regular targets to brute force attacks, there is one large attack going onright now. These attacks are automated across all the hosting platforms and attempt to find bloggers that are using default usernames, weak passwords and outdated WordPress installations. Most bloggers aren’t aware of the threat posed by hackers and may not even know that a successful attack has taken place so it is important to keep your blog safe. These are the simple security measures that any blogger can implement today to make their blogs more secure and be protected against these types of attacks…”

 

 


 

 

Hackers could start abusing electric car chargers to cripple the grid, researcher says

Loek Essers

https://www.networkworld.com/news/2013/041113-hackers-could-start-abusing-electric-268644.html

 

Excerpt:

 

“Hackers could use vulnerable charging stations to prevent the charging of electric vehicles in a certain area, or possibly even use the vulnerabilities to cripple parts of the electricity grid, a security researcher said during the Hack in the Box conference in Amsterdam.”

 

 


 

 

Major brute force attack against WordPress under way

John Kennedy

http://www.siliconrepublic.com/strategy/item/32269-massive-brute-force-attack/

 

Excerpt:

 

“A large distributed brute force attack against WordPress sites is understood to be occurring. A large botnet with more than 90,000 servers is attempting to log in by cycling through different usernames and passwords. A study of various attack patterns has led to security software firm Sucuri concluding that the number of brute force attacks against WordPress has trebled in recent months and that reports of attacks are accurate.”

 

 


 

 

 

No, That German Hacker Probably Can't Hijack an Airplane with Software

Adam Clark Estes

http://news.yahoo.com/no-german-hacker-probably-cant-hijack-airplane-software-000005290.html

 

Excerpt:

 

“An alarming dispatch from the Hack In The Box security conferencein Amsterdam arrived on Wednesday: a hacker says he's found a way to take over airplane controls. That's probably not true. At least according to the Federal Aviation Administration (FAA), the European Aviation Safety Administration (EASA) and Honeywell, the maker's of the cockpit software, it's not. The FAA, for one, says, "The described technique cannot engage or control the aircraft's autopilot system using the FMS or prevent a pilot from overriding the autopilot." The agency assures America that this hack "does not pose a flight safety concern because it does not work on certified flight hardware."

 

 


 

Researcher hacks aircraft controls with Android smartphone

Iain Thomson

http://www.theregister.co.uk/2013/04/11/hacking_aircraft_with_android_handset/

 

Excerpt:

 

“A presentation at the Hack In The Box security summit in Amsterdam has demonstrated that it's possible to take control of aircraft flight systems and communications using an Android smartphone and some specialized attack code. Hugo Teso, a security researcher at N.Runs and a commercial airline pilot, spent three years developing the code, buying second-hand commercial flight system software and hardware online and finding vulnerabilities within it. His presentation will cause a few sleepless nights among those with an interest in aircraft security.”

 

 


 

 

Ransomware: The cybercrime money machine of 2013

Will Dalton

http://www.itproportal.com/2013/04/10/ransomware-the-cybercrime-money-machine-of-2013/

 

Excerpt:

 

“Towards the end of last year, when the major security firms were compiling their customary run-downs of the biggest threats expected to emerge in 2013, ransomware figured prominently as an ominous ‘one to watch’. This breed of malicious software owes its name to the way in which it attacks a computer, quite literally holding it ransom by paralysing the device and demanding payment for it to be unlocked.”

 

 


 

 

UK to host global cybersecurity centre

http://www.bbc.co.uk/news/technology-22078755

 

Excerpt:

 

“Foreign Secretary William Hague has announced that a global centre for cybersecurity will be opened at the University of Oxford. The Global Centre for Cyber Security and Capacity Building will work to help countries develop comprehensive plans to deal with online threats. The government will provide £1m to fund the centre for the next two years.”

 

 


 

 

Three LulzSec hackers pleads guilty To NHS, Sony Attacks

Wang Wei

http://thehackernews.com/2013/04/three-lulzsec-hackers-pleads-guilty-to.html

 

Excerpt:

 

“Three members of the high profile internet hacktivist group LulzSec have admitted to their parts in a series of cyber attacks against the NHS, Sony and News International. Ryan Ackroyd, Jake Davis and Mustafa Al-Bassam, pleaded guilty to one charge of carrying out an unauthorized act to impair the operation of a computer, contrary to the Criminal Law Act 1977.”

 


 

 

Control system hack at manufacturer raises red flag

John P. Mello, Jr.

http://www.csoonline.com/article/731495/control-system-hack-at-manufacturer-raises-red-flag

 

Excerpt:

 

“An unreported attack on the energy management system of a New Jersey manufacturer has been revealed by the U.S. Cyber Emergency Response Team (US-CERT). Intruders successfully exploited a credential storage vulnerability in the manufacturer's Tridium energy management software made by Honeywell and identified all the company's Internet facing devices, the agency reported in the latest edition of its quarterly ICS-CERT Monitor. The New Jersey incident occurred around the same time that an intruder exploited the Tridium software at a state government facility and change the system's temperature settings.”

 

 


 

Top Banks Offer New DDoS Details

Tracy Kitten

http://www.bankinfosecurity.com/top-banks-offer-new-ddos-details-a-5667/op-1

 

Excerpt:

"Increasingly, U.S. banking institutions are reluctant to acknowledge - much less discuss - the ongoing distributed-denial-of-service attacks against their online services. Perhaps that's because they're concerned that consumers will panic or that revealing too much about the attacks could give hacktivists information they could use to enhance their DDoS abilities."


 

UK cyber security efforts called 'embarrassing'

Dan Raywood

http://www.scmagazineuk.com/uk-cyber-security-efforts-called-embarrassing/article/288190/

 

Excerpt:

"The UK's investment in cyber security has been branded as ‘embarrassing' by the former US cyber intelligence officer at the department of defence."


 

Ransomware: The cybercrime money machine of 2013

Will Dalton

http://www.itproportal.com/2013/04/10/ransomware-the-cybercrime-money-machine-of-2013/

 

Excerpt:

"Towards the end of last year, when the major security firms were compiling their customary run-downs of the biggest threats expected to emerge in 2013, ransomware figured prominently as an ominous ‘one to watch’. This breed of malicious software owes its name to the way in which it attacks a computer, quite literally holding it ransom by paralysing the device and demanding payment for it to be unlocked."


 

Seoul Probe Finds North Korea Responsible for Cyber Attack

Dow Jones

http://www.nasdaq.com/article/seoul-probe-finds-north-korea-responsible-for-cyber-attack-20130410-00146#.UWtcebVTA-I

 

Excerpt:

"A study of the cyber-attacks on March 20, which paralyzed computer systems at major television networks and banks, showed the hallmarks of previous hacking attacks attributed to North Korea, investigators said."


 

Checklist To Prepare Yourself In Advance of a DDoS Attack

http://www.securitypark.co.uk/checklist-to-prepare-yourself-in-advance-of-a-ddos-attack/

 

Excerpt:

"Many people are discussing the latest attacks that have been causing intermittent outages all over the Internet. Unfortunately, distributed denial of service (DDoS) causes massive congestion; and without something upstream close to the attacking machines in question, it can be very difficult to stop the attack."


 

Masters of the cyber-universe

http://www.economist.com/news/special-report/21574636-chinas-state-sponsored-hackers-are-ubiquitousand-totally-unabashed-masters

 

Excerpt:

"What distinguishes Chinese cyber-attacks, on anything from governments to Fortune 500 companies, defence contractors, newspapers, think-tanks, NGOs, Chinese human-rights groups and dissidents, is their frequency, ubiquity and sheer brazenness. This leads to an unnerving conclusion."


 

How Attackers Choose Which Vulnerabilities To Exploit

http://www.darkreading.com/vulnerability-management/167901026/security/news/240152229/how-attackers-choose-which-vulnerabilities-to-exploit

 

Excerpt:

"It's an old but true adage: To protect yourself against a criminal, you have to think like a criminal. This certainly applies to IT security professionals working to keep their organizations' systems and data safe: To protect against a cyber attacker, you have to think like a cyber attacker."


 

Gas Refinery Attack in Algeria: The Lessons Learned

Joseph Trindal

http://www.domesticpreparedness.com/Infrastructure/Building_Protection/Gas_Refinery_Attack_in_Algeria:_The_Lessons_Learned/

 

Excerpt:

"In the early morning hours of 16 January 2013, a coordinated band of terrorists attacked a convoy of gas refinery workers as they departed the housing area of the In Amenas Gas Refinery in eastern Algeria. The attack was described in a 25 January 2013 article – in Chronicles: A Magazine of American Culture – as the “most elaborate” to date on the African continent."


 

State-backed cyberattacks now aim at destruction, not just spying

Nicole Perlroth & David E Sanger

http://articles.timesofindia.indiatimes.com/2013-03-29/security/38124796_1_attacks-cyber-fighters-american-express

 

Excerpt:

"American Express customers trying to gain access to their online accounts on Thursday were met with blank screens or an ominous ancient type face. The company confirmed that its website had come under attack."


 

Spam war caused failure at critical internet exchange center

Russell Brandom

http://www.theverge.com/2013/3/28/4156570/Dutch-spamhaus-DDoS-took-down-london-internet-exchange

 

Excerpt:

"The dust is settling from this week's Dutch DDoS attacks — by some accounts, the largest denial-of-service action ever mounted, channeling 300 gigabits of junk traffic to the web's weakest spots. For the most part, our tubes performed admirably. Most web users didn't see anything more than a mild slowdown."


 

Global internet slows after 'biggest attack in history'

Dave Lee

http://www.bbc.co.uk/news/technology-21954636

 

Excerpt:

"A row between a spam-fighting group and hosting firm has sparked retaliation attacks affecting the wider internet. Experts worry that the row could escalate to affect banking and email systems. Five national cyber-police-forces are investigating the attacks."