ITsecurity
twitter facebook rss

ITsecurity Daily News: 08/29/2014

Posted by on August 29, 2014.

The ITsecurity daily security briefing: Friday, August 29, 2014.
If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com.

News Papers/Reports WebThings Events M&A Alerts

line

News

Someone is telling porkies

Source: Family Guy

Source: Family Guy

Bloomberg followed up its first story on US bank breaches with: “Russian hackers attacked JPMorgan Chase & Co. (JPM) and at least four other banks this month in a coordinated assault that resulted in the loss of gigabytes of customer data, according to two people familiar with the investigation. At least one of the banks has linked the breach to Russian state-sponsored hackers, said one of the people.” Notice the ‘sensational’ elements: gigabytes of customer data and Russian state hackers.
But within hours, Reuters reported that the banks’ own alerting service said ‘nothing to see here, guys’. “An influential U.S. financial services industry group that shares information about cyber threats has said it is unaware of any “significant” cyber attacks, downplaying concerns about possible breaches at JPMorgan Chase & Co and other banks…. ‘There are no credible threats posed to the financial services sector at this time,’ the group said in an email to its members.”
Bloomberg: http://www.bloomberg.com/news/2014-08-28/russian-hackers-said-to-loot-gigabytes-of-big-bank-data.html
Reuters: http://www.reuters.com/article/2014/08/29/us-jpmorgan-cybersecurity-idUSKBN0GS1CO20140829

BIFROSE Now More Evasive Through Tor, Used for Targeted Attack
Trend Micro has discovered the BIFROSE malware being used in a new targeted attack. “Since this variant uses Tor in communicating with its C&C server, being able to detect Tor activity within a network will help identify potential attacks within the network, among others.” Since it is unlikely that a company would sanction the use of Tor by its staff, Tor usage detection is a valuable tool in detecting potential infections by the increasing number of bots that hide behind The Onion Router.
Trend Micro:
http://blog.trendmicro.com/trendlabs-security-intelligence/bifrose-now-more-evasive-through-tor-used-for-targeted-attack/

Researchers Cracked the ‘Great Firewall’ in China
Researchers from Harvard and the University of California San Diego have monitored China’s national firewall by creating their own social network, posting a variety of messages, and noting what happens to them. Surprisingly, you seem able to criticize government officials, but you are not allowed to incite protest. “While the study has found some interesting details, it may be some time before the true extent of the firewall is understood.”
SocialTimes:
http://socialtimes.com/researchers-cracked-great-firewall-china_b202736

“Crypto Ransomware” CTB-Locker (Critroni.A) on the rise
Security researcher Kafeine has a detailed analysis of the Critroni cryptolocker. Although it was originally targeted against Russian users, it now seems more widely used; so although not new, it is a new threat to most of us.
Malware do not need Coffee:
http://malware.dontneedcoffee.com/2014/07/ctb-locker.html

Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks
“A few days ago we detected a watering hole campaign in a website owned by one big industrial company. The website is related to software used for simulation and system engineering in a wide range of industries, including automotive, aerospace, and manufacturing. The attackers were able to compromise the website and include code that loaded a malicious Javascript file from a remote server.” This watering hole attack is targeting a wide range of industries including automotive, aerospace and manufacturing.
AlienVault:
http://www.alienvault.com/open-threat-exchange/blog/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks/

line

Whitepapers and Reports

Kaspersky Lab has a detailed analysis of Spam in July
The analysis shows the incidence of spam (it increased by 2.2% from June to 67% of all email traffic in July); the sources of spam (USA, Russia and China, in that order, are the leading sources); the malware contained in malicious spam (top villain was the Dofoil downloader); incidence of phishing (Kaspersky registered 20,157,877 detections in July); and much more. It is well worth a read to see if you are a likely target in the future.
SecureList:
https://securelist.com/analysis/monthly-spam-reports/66297/spam-in-july-2014/

How Google handles your data
This is Google’s own analysis of its behaviour. Privacy experts may disagree. “Google works hard to earn and keep [your] trust, and we want you to be aware of our achievements and commitments in each of these areas. To help answer some of the many questions we receive, we have created this FAQ. Be sure to check our pages on reliability, security, privacy, compliance and transparency.”
Google:
https://support.google.com/enterprisehelp/answer/6057301

PITOU: The “silent” resurrection of the notorious Srizbi kernel spambot
F-Secure has published a report and analysis on PITOU/Srizbi. “We began monitoring the development of a mysterious malware that first emerged in early April 2014 when we noticed some intriguing features in the threat’s technical aspects. Further analysis revealed a close link to an old threat known as Srizbi, which infected machines and used them to send out spam email messages (in other words, a spambot).”
F-Secure:
http://www.f-secure.com/static/doc/labs_global/Whitepapers/pitou_whitepaper.pdf

line

Webcasts and Webinars

line

Events

ICS Amsterdam 2014
SANS’ 2014 European ICS Security Summit will be held in Amsterdam, Netherlands on September 21st and 22nd. The Summit is followed by a week of in-depth, hands-on training courses running from September 23rd – 27th including SANS’ new specialist ICS course, ICS410.
Amsterdam, Netherlands | Sun, Sep 21 – Sat, Sep 27, 2014
SANS:
http://www.sans.org/event/sans-ics-amsterdam-2014/

line

Mergers and Acquisitions

line

Alerts

Not all scams are cyber – this is phone
“Your caller ID says ‘FTC’ or ‘IRS,’ and the phone number has the ‘202’ Washington, DC area code. You might even look the number up and see that it’s a real government phone number. But the person calling isn’t really from the FTC, IRS, or any other agency. It’s a government imposter whose goal is to convince you to send money before you figure out it’s a scam.”
FTC:
http://www.consumer.ftc.gov/blog/can-you-spot-government-imposter


Share This:
Facebooktwittergoogle_plusredditpinterestlinkedinmail

Leave a Reply

Your email address will not be published. Required fields are marked *

Submitted in: News, News_malware | Tags: , , , , , , , , ,