Malware Devil

Wednesday, October 14, 2020

JavaScript Used by Phishing Page to Steal Magento Credentials

Digital attackers created a Magento phishing page that used JavaScript to exfiltrate the login credentials of its victims. Sucuri came across a compromised website using the filename “wp-order.php” during an investigation. This phishing page hosted what appeared to be a legitimate Magento 1.x login portal at the time of discovery. In support of this ruse, […]… Read More

The post JavaScript Used by Phishing Page to Steal Magento Credentials appeared first on The State of Security.

The post JavaScript Used by Phishing Page to Steal Magento Credentials appeared first on Security Boulevard.

Read More

The post JavaScript Used by Phishing Page to Steal Magento Credentials appeared first on Malware Devil.



https://malwaredevil.com/2020/10/14/javascript-used-by-phishing-page-to-steal-magento-credentials/?utm_source=rss&utm_medium=rss&utm_campaign=javascript-used-by-phishing-page-to-steal-magento-credentials

Tuesday, October 13, 2020

Coalition Pokes Five Eyes on Call for Backdoors

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon

Current Issue

imageSpecial Report: Computing’s New NormalThis special report examines how IT security organizations have adapted to the “new normal” of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
image

Flash Poll

How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world — and enterprise computing — on end. Here’s a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2018-20243
PUBLISHED: 2020-10-13

The implementation of POST with the username and password in the URL parameters exposed the credentials. More infomration is available in fineract jira issues 726 and 629.

CVE-2020-13957
PUBLISHED: 2020-10-13

Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that’s uploaded via API without authentication/authorization. The checks in place to prevent such feature…

CVE-2020-15251
PUBLISHED: 2020-10-13

In the Channelmgnt plug-in for Sopel (a Python IRC bot) before version 1.0.3, malicious users are able to op/voice and take over a channel. This is an ACL bypass vulnerability.

CVE-2020-17411
PUBLISHED: 2020-10-13

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within…

CVE-2020-17412
PUBLISHED: 2020-10-13

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the han…

The post Coalition Pokes Five Eyes on Call for Backdoors appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/coalition-pokes-five-eyes-on-call-for-backdoors/?utm_source=rss&utm_medium=rss&utm_campaign=coalition-pokes-five-eyes-on-call-for-backdoors

Demand for Healthcare Data Visualization for Better Protection

The healthcare industry is one of the most heavily regulated in the world due to the volume and sensitivity of the data entrusted to it.  As data protection regulations grow more numerous and more stringent, companies must select and deploy solutions to ensure that they can maintain regulatory compliance and protect their sensitive data from […]

The post Demand for Healthcare Data Visualization for Better Protection appeared first on 1touch.io.

The post Demand for Healthcare Data Visualization for Better Protection appeared first on Security Boulevard.

Read More

The post Demand for Healthcare Data Visualization for Better Protection appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/demand-for-healthcare-data-visualization-for-better-protection/?utm_source=rss&utm_medium=rss&utm_campaign=demand-for-healthcare-data-visualization-for-better-protection

October Patch Tuesday: Microsoft Patches Critical, Wormable RCE Bug

There were 11 critical bugs and six that were unpatched but publicly known in this month’s regularly scheduled Microsoft updates.
Read More

The post October Patch Tuesday: Microsoft Patches Critical, Wormable RCE Bug appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/october-patch-tuesday-microsoft-patches-critical-wormable-rce-bug/?utm_source=rss&utm_medium=rss&utm_campaign=october-patch-tuesday-microsoft-patches-critical-wormable-rce-bug

October Patch Tuesday fixes 87 vulnerabilities, 6 of them publicly disclosed

October Patch Tuesday is here. While the next two weeks are going to be busy for system administrators as they hustle to test and deploy updates, once the cyberthreats are handled, we can all enjoy the fall festivities in peace. …

The post October Patch Tuesday fixes 87 vulnerabilities, 6 of them publicly disclosed appeared first on ManageEngine Blog.

The post October Patch Tuesday fixes 87 vulnerabilities, 6 of them publicly disclosed appeared first on Security Boulevard.

Read More

The post October Patch Tuesday fixes 87 vulnerabilities, 6 of them publicly disclosed appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/october-patch-tuesday-fixes-87-vulnerabilities-6-of-them-publicly-disclosed/?utm_source=rss&utm_medium=rss&utm_campaign=october-patch-tuesday-fixes-87-vulnerabilities-6-of-them-publicly-disclosed

Microsoft Patch Tuesday, October 2020 Edition

It’s Cybersecurity Awareness Month! In keeping with that theme, if you (ab)use Microsoft Windows computers you should be aware the company shipped a bevy of software updates today to fix at least 87 security problems in Windows and programs that run on top of the operating system. That means it’s once again time to backup and patch up.

The post Microsoft Patch Tuesday, October 2020 Edition appeared first on Security Boulevard.

Read More

The post Microsoft Patch Tuesday, October 2020 Edition appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/microsoft-patch-tuesday-october-2020-edition-2/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-patch-tuesday-october-2020-edition-2

Microsoft Patch Tuesday, October 2020 Edition

It’s Cybersecurity Awareness Month! In keeping with that theme, if you (ab)use Microsoft Windows computers you should be aware the company shipped a bevy of software updates today to fix at least 87 security problems in Windows and programs that run on top of the operating system. That means it’s once again time to backup and patch up.

Eleven of the vulnerabilities earned Microsoft’s most-dire “critical” rating, which means bad guys or malware could use them to gain complete control over an unpatched system with little or no help from users.

Worst in terms of outright scariness is probably CVE-2020-16898, which is a nasty bug in Windows 10 and Windows Server 2019 that could be abused to install malware just by sending a malformed packet of data at a vulnerable system. CVE-2020-16898 earned a CVSS Score of 9.8 (10 is the most awful).

Security vendor McAfee has dubbed the flaw “Bad Neighbor,” and in a blog post about it said a proof-of-concept exploit shared by Microsoft with its partners appears to be “both extremely simple and perfectly reliable,” noting that this sucker is imminently “wormable” — i.e. capable of being weaponized into a threat that spreads very quickly within networks.

“It results in an immediate BSOD (Blue Screen of Death), but more so, indicates the likelihood of exploitation for those who can manage to bypass Windows 10 and Windows Server 2019 mitigations,” McAfee’s Steve Povolny wrote. “The effects of an exploit that would grant remote code execution would be widespread and highly impactful, as this type of bug could be made wormable.”

Trend Micro’s Zero Day Initiative (ZDI) calls special attention to another critical bug quashed in this month’s patch batch: CVE-2020-16947, which is a problem with Microsoft Outlook that could result in malware being loaded onto a system just by previewing a malicious email in Outlook.

“The Preview Pane is an attack vector here, so you don’t even need to open the mail to be impacted,” said ZDI’s Dustin Childs.

While there don’t appear to be any zero-day flaws in October’s release from Microsoft, Todd Schell from Ivanti points out that a half-dozen of these flaws were publicly disclosed prior to today, meaning bad guys have jump start on being able to research and engineer working exploits.

Other patches released today tackle problems in Exchange Server, Visual Studio, .NET Framework, and a whole mess of other core Windows components.

For any of you who’ve been pining for a Flash Player patch from Adobe, your days of waiting are over. After several months of depriving us of Flash fixes, Adobe’s shipped an update that fixes a single — albeit critical — flaw in the program that crooks could use to install bad stuff on your computer just by getting you to visit a hacked or malicious website.

Chrome and Firefox both now disable Flash by default, and Chrome and IE/Edge auto-update the program when new security updates are available. Mercifully, Adobe is slated to retire Flash Player later this year, and Microsoft has said it plans to ship updates at the end of the year that will remove Flash from Windows machines.

It’s a good idea for Windows users to get in the habit of updating at least once a month, but for regular users (read: not enterprises) it’s usually safe to wait a few days until after the patches are released, so that Microsoft has time to iron out any chinks in the new armor.

But before you update, please make sure you have backed up your system and/or important files. It’s not uncommon for a Windows update package to hose one’s system or prevent it from booting properly, and some updates even have known to erase or corrupt files.

So do yourself a favor and backup before installing any patches. Windows 10 even has some built-in tools to help you do that, either on a per-file/folder basis or by making a complete and bootable copy of your hard drive all at once.

And if you wish to ensure Windows has been set to pause updating so you can back up your files and/or system before the operating system decides to reboot and install patches on its own schedule, see this guide.

As always, if you experience glitches or problems installing any of these patches this month, please consider leaving a comment about it below; there’s a better-than-even chance other readers have experienced the same and may chime in here with some helpful tips.

Read More

The post Microsoft Patch Tuesday, October 2020 Edition appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/microsoft-patch-tuesday-october-2020-edition/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-patch-tuesday-october-2020-edition

Facebook Bug Bounty Club, Fitbit Spyware, FAA Gets Airline Warning – SWN #73

This week, Dr. Doug talks Facebook Bug Bounty club, Zuck reverses, Trickbot, the FAA gets airline warning, IoT, Zerologon, and Fitbit! Jason Wood returns for Expert Commentary on Office 365: A Favorite for Cyberattack Persistence!
Visit https://www.securityweekly.com/swn for all the latest episodes!
Show Notes: https://securityweekly.com/swn73

The post Facebook Bug Bounty Club, Fitbit Spyware, FAA Gets Airline Warning – SWN #73 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/facebook-bug-bounty-club-fitbit-spyware-faa-gets-airline-warning-swn-73/?utm_source=rss&utm_medium=rss&utm_campaign=facebook-bug-bounty-club-fitbit-spyware-faa-gets-airline-warning-swn-73

Microsoft October 2020 Patch Tuesday, (Tue, Oct 13th)

This month we got patches for 87 vulnerabilities. Of these, 12 are critical, 6 were previously disclosed and none of them are being exploited according to Microsoft.

Amongst critical vulnerabilities, there is a CVSSv3 9.8 remote code execution in Windows TCP/IP stack (CVE-2020-16898) due to the way it improperly handles ICMPv6 Router Advertisement packets. To exploit this vulnerability, an attacker would have to send specially crafted ICMPv6 Router Advertisement packets to a remote Windows host (client or server). Several Windows 10 versions, Windows Server (core installation), and Windows Server 2019 are affected by this vulnerability. There is a workaround for Windows 1709 and above that consists in disabling ICMPV6 RDNSS. For more details, check the vulnerability advisory at https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16898

There is also a remote code execution in Windows Graphics Device Interface (GDI+) (CVE-2020-16911). An attacker could exploit this vulnerability by convincing users to view a specially crafted website or sending them an e-mail attachment with a malicious attachment. The CVSS v3 score for this vulnerability is 8.8.

A third vulnerability worth mentioning is an elevation of privilege affecting Windows Hyper-V (CVE-2020-1080). If successfully exploited, this vulnerability could give an attacker elevated privileges on the target system. The CVSSv3 for this vulnerability is 8.8 as well.

See Renato’s dashboard for a more detailed breakout: https://patchtuesdaydashboard.com

Description
CVE Disclosed Exploited Exploitability (old versions) current version Severity CVSS Base (AVG) CVSS Temporal (AVG)
.NET Framework Information Disclosure Vulnerability
%%cve:2020-16937%% Yes No Less Likely Less Likely Important 4.7 4.2
Azure Functions Elevation of Privilege Vulnerability
%%cve:2020-16904%% No No Less Likely Less Likely Important 5.3 4.8
Base3D Remote Code Execution Vulnerability
%%cve:2020-16918%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-17003%% No No Less Likely Less Likely Critical 7.8 7.0
Dynamics 365 Commerce Elevation of Privilege Vulnerability
%%cve:2020-16943%% No No Less Likely Less Likely Important 6.5 5.9
GDI+ Remote Code Execution Vulnerability
%%cve:2020-16911%% No No Less Likely Less Likely Critical 8.8 7.9
Group Policy Elevation of Privilege Vulnerability
%%cve:2020-16939%% No No Less Likely Less Likely Important 7.8 7.0
Jet Database Engine Remote Code Execution Vulnerability
%%cve:2020-16924%% No No Less Likely Less Likely Important 7.8 7.0
Media Foundation Memory Corruption Vulnerability
%%cve:2020-16915%% No No Less Likely Less Likely Critical 7.8 7.0
Microsoft Dynamics 365 (On-Premise) Cross Site Scripting Vulnerability
%%cve:2020-16956%% No No Less Likely Less Likely Important 5.4 4.9
%%cve:2020-16978%% No No Less Likely Less Likely Important 5.4 4.9
Microsoft Excel Remote Code Execution Vulnerability
%%cve:2020-16929%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16930%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16931%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16932%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft Exchange Information Disclosure Vulnerability
%%cve:2020-16969%% No No Less Likely Less Likely Important 7.1 6.4
Microsoft Graphics Components Remote Code Execution Vulnerability
%%cve:2020-16923%% No No Less Likely Less Likely Critical 7.8 7.0
%%cve:2020-1167%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability
%%cve:2020-16957%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft Office Click-to-Run Elevation of Privilege Vulnerability
%%cve:2020-16928%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16934%% No No Less Likely Less Likely Important 7.0 6.3
%%cve:2020-16955%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft Office Remote Code Execution Vulnerability
%%cve:2020-16954%% No No Less Likely Less Likely Important 7.8 7.0
Microsoft Office SharePoint XSS Vulnerability
%%cve:2020-16945%% No No Less Likely Less Likely Important 8.7 7.8
%%cve:2020-16946%% No No Less Likely Less Likely Important 8.7 7.8
Microsoft Outlook Denial of Service Vulnerability
%%cve:2020-16949%% No No Less Likely Less Likely Moderate 4.7 4.2
Microsoft Outlook Remote Code Execution Vulnerability
%%cve:2020-16947%% No No Less Likely Less Likely Critical 8.1 7.3
Microsoft SharePoint Information Disclosure Vulnerability
%%cve:2020-16941%% No No Less Likely Less Likely Important 4.1 3.7
%%cve:2020-16942%% No No Less Likely Less Likely Important 4.1 3.7
%%cve:2020-16948%% No No Less Likely Less Likely Important 6.5 5.9
%%cve:2020-16953%% No No Less Likely Less Likely Important 6.5 5.9
%%cve:2020-16950%% No No Less Likely Less Likely Important 5.0 4.5
Microsoft SharePoint Reflective XSS Vulnerability
%%cve:2020-16944%% No No Less Likely Less Likely Important 8.7 7.8
Microsoft SharePoint Remote Code Execution Vulnerability
%%cve:2020-16951%% No No Less Likely Less Likely Critical 8.6 7.7
%%cve:2020-16952%% No No Less Likely Less Likely Critical 8.6 7.7
Microsoft Word Security Feature Bypass Vulnerability
%%cve:2020-16933%% No No Less Likely Less Likely Important 7.0 6.3
NetBT Information Disclosure Vulnerability
%%cve:2020-16897%% No No Less Likely Less Likely Important 5.5 5.0
Network Watcher Agent Virtual Machine Extension for Linux Elevation of Privilege Vulnerability
%%cve:2020-16995%% No No Less Likely Less Likely Important 7.8 7.0
October 2020 Adobe Flash Security Update
ADV200012 No No Less Likely Less Likely Critical    
PowerShellGet Module WDAC Security Feature Bypass Vulnerability
%%cve:2020-16886%% No No Less Likely Less Likely Important 5.3 4.8
Visual Studio Code Python Extension Remote Code Execution Vulnerability
%%cve:2020-16977%% No No Less Likely Less Likely Important 7.0 6.3
Win32k Elevation of Privilege Vulnerability
%%cve:2020-16907%% No No More Likely More Likely Important 7.8 7.0
%%cve:2020-16913%% No No More Likely More Likely Important 7.8 7.0
Windows – User Profile Service Elevation of Privilege Vulnerability
%%cve:2020-16940%% No No Less Likely Less Likely Important 7.8 7.0
Windows Application Compatibility Client Library Elevation of Privilege Vulnerability
%%cve:2020-16876%% No No Less Likely Less Likely Important 7.1 6.4
%%cve:2020-16920%% No No Less Likely Less Likely Important 7.8 7.0
Windows Backup Service Elevation of Privilege Vulnerability
%%cve:2020-16976%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16912%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16936%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16972%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16973%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16974%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16975%% No No Less Likely Less Likely Important 7.8 7.0
Windows COM Server Elevation of Privilege Vulnerability
%%cve:2020-16935%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-16916%% No No Less Likely Less Likely Important 7.8 7.0
Windows Camera Codec Pack Remote Code Execution Vulnerability
%%cve:2020-16967%% No No Less Likely Less Likely Critical 7.8 7.0
%%cve:2020-16968%% No No Less Likely Less Likely Critical 7.8 7.0
Windows Elevation of Privilege Vulnerability
%%cve:2020-16877%% No No Less Likely Less Likely Important 7.1 6.4
Windows Enterprise App Management Service Information Disclosure Vulnerability
%%cve:2020-16919%% No No Less Likely Less Likely Important 5.5 5.0
Windows Error Reporting Elevation of Privilege Vulnerability
%%cve:2020-16905%% No No Less Likely Less Likely Important 6.8 6.1
%%cve:2020-16909%% Yes No Less Likely Less Likely Important 7.8 7.0
Windows Error Reporting Manager Elevation of Privilege Vulnerability
%%cve:2020-16895%% No No Less Likely Less Likely Important 7.8 7.0
Windows Event System Elevation of Privilege Vulnerability
%%cve:2020-16900%% No No Less Likely Less Likely Important 7.0 6.3
Windows GDI+ Information Disclosure Vulnerability
%%cve:2020-16914%% No No Less Likely Less Likely Important 5.5 5.0
Windows Hyper-V Denial of Service Vulnerability
%%cve:2020-1243%% No No Less Likely Less Likely Important 7.8 7.0
Windows Hyper-V Elevation of Privilege Vulnerability
%%cve:2020-1047%% No No Less Likely Less Likely Important 7.8 7.0
%%cve:2020-1080%% No No Less Likely Less Likely Important 8.8 7.9
Windows Hyper-V Remote Code Execution Vulnerability
%%cve:2020-16891%% No No Less Likely Less Likely Critical 8.8 7.9
Windows Image Elevation of Privilege Vulnerability
%%cve:2020-16892%% No No Less Likely Less Likely Important 7.8 7.0
Windows Installer Elevation of Privilege Vulnerability
%%cve:2020-16902%% No No Less Likely Less Likely Important 7.8 7.0
Windows Kernel Elevation of Privilege Vulnerability
%%cve:2020-16890%% No No Less Likely Less Likely Important 7.8 7.0
Windows Kernel Information Disclosure Vulnerability
%%cve:2020-16938%% Yes No Less Likely Less Likely Important 5.5 5.0
%%cve:2020-16901%% Yes No Less Likely Less Likely Important 5.0 4.5
Windows KernelStream Information Disclosure Vulnerability
%%cve:2020-16889%% No No Less Likely Less Likely Important 5.5 5.0
Windows NAT Remote Code Execution Vulnerability
%%cve:2020-16894%% No No Less Likely Less Likely Important 7.7 6.9
Windows Network Connections Service Elevation of Privilege Vulnerability
%%cve:2020-16887%% No No Less Likely Less Likely Important 7.8 7.0
Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability
%%cve:2020-16927%% No No Less Likely Less Likely Important 7.5 6.7
Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
%%cve:2020-16896%% No No More Likely More Likely Important 7.5 6.7
Windows Remote Desktop Service Denial of Service Vulnerability
%%cve:2020-16863%% No No Less Likely Less Likely Important 7.5 6.7
Windows Security Feature Bypass Vulnerability
%%cve:2020-16910%% No No Less Likely Less Likely Important 6.2 5.6
Windows Setup Elevation of Privilege Vulnerability
%%cve:2020-16908%% Yes No Less Likely Less Likely Important 7.8 7.0
Windows Spoofing Vulnerability
%%cve:2020-16922%% No No More Likely More Likely Important 5.3 4.8
Windows Storage Services Elevation of Privilege Vulnerability
%%cve:2020-0764%% No No Less Likely Less Likely Important 7.8 7.0
Windows Storage VSP Driver Elevation of Privilege Vulnerability
%%cve:2020-16885%% Yes No Less Likely Less Likely Important 7.8 7.2
Windows TCP/IP Denial of Service Vulnerability
%%cve:2020-16899%% No No More Likely More Likely Important 7.5 6.7
Windows TCP/IP Remote Code Execution Vulnerability
%%cve:2020-16898%% No No More Likely More Likely Critical 9.8 8.8
Windows Text Services Framework Information Disclosure Vulnerability
%%cve:2020-16921%% No No Less Likely Less Likely Important 5.5 5.0
Windows iSCSI Target Service Elevation of Privilege Vulnerability
%%cve:2020-16980%% No No Less Likely Less Likely Important 7.8 7.0


Renato Marinho
Morphus Labs| LinkedIn|Twitter

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Microsoft October 2020 Patch Tuesday, (Tue, Oct 13th) appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/microsoft-october-2020-patch-tuesday-tue-oct-13th/?utm_source=rss&utm_medium=rss&utm_campaign=microsoft-october-2020-patch-tuesday-tue-oct-13th

Akamai Launches New Digital Badge Program for Channel Partners

Partner enablement framework provides capabilities to manage customer lifecycle from prospecting through implementation for Akamai products.

The post Akamai Launches New Digital Badge Program for Channel Partners appeared first on Security Boulevard.

Read More

The post Akamai Launches New Digital Badge Program for Channel Partners appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/akamai-launches-new-digital-badge-program-for-channel-partners/?utm_source=rss&utm_medium=rss&utm_campaign=akamai-launches-new-digital-badge-program-for-channel-partners

Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections

The state of email defenses has a role to play in the US presidential election.

Today’s email attackers are using advanced techniques to supercharge their campaigns. With sophisticated social engineering tactics, automated domain generation, and advanced strains of polymorphic malware, cybercriminals are able to evade traditional detection mechanisms. And with one-quarter of successful phishing breaches executed by state-affiliated actors, politicians and political organizations find themselves targeted by those not only seeking financial reward, but looking to manipulate their targets, spread misinformation, or even influence the course of world politics.

To get a glimpse of the widespread chaos that can stem from compromised emails, we need look no further than the 2016 US presidential election, when leaked communications and other confidential documents from the DNC damaged the reputation of the political party in a capacity that had a significant impact on the election. More recently, the Twitter hack of July 2020 likely used an attack method similar to a phishing attack – resulting in the accounts of prominent organizations and figures such as Apple Inc. and Barack Obama tweeting out fraudulent messages, intending to scam viewers.

As malicious spear-phishing emails continue to slip through legacy security tools, which look for known indicators of threat observed in historical attacks, the state of email defenses could well make an impact on this year’s presidential election. With attackers updating their techniques faster than ever, the average lifespan of an email attack has shrunk to a matter of hours, not days. Soon, the emergence of offensive AI will enable cyber-criminals to launch attacks at a speed and scale previously unimaginable.

Here, we look at three ways email attacks may threaten the very foundations of democracy in this year’s elections.

Leaking sensitive documents

The 33,000 pages of emails leaked on anti-secrecy website WikiLeaks became one of the defining features of the 2016 election, revealing classified communications from within the DNC. Nation-state actors appeared to be behind the attack, which involved sending spear-phishing emails targeting more than 300 individuals affiliated with the party. These emails enabled malware to explore the computer networks of the DNC and harvest tens of thousands of emails and attachments, which were saved and released strategically to distract the public from media events that were either beneficial to the Clinton campaign or harmful to Trump’s.

Since then, spear-phishing attacks have only become more sophisticated and targeted, using information gathered from social media during reconnaissance campaigns to produce a 40-fold higher click-through rate than untargeted attacks. With a high-profile UK politician recently falling victim to an email attack, leading to the release of unclassified trade documents, it is clear that the lessons of 2016 are not yet fully learned.

Direct compromise of voters’ data

In addition to politicians and campaigns, election administrators themselves can become victim to malicious emails seeking to undermine democratic processes. One-hundred days into the 2020 campaign, many election administrators still lacked basic controls to prevent phishing. Attackers will look to capitalize on this, viewing email as the easiest route into the network.

Once a phishing attack is successful, cyber-criminals may wish to harvest voters’ data in preparation for targeted misinformation campaigns, or deploy malware that throws election administration into chaos and undermines the democratic process in general. Ransomware can encrypt critical files at machine speed, with cyber-adversaries demanding payment in bitcoin for their return.

Misinformation campaigns

However, it may not take a high-profile breach for harmful emails to have a significant impact on results – their effect could be more subtle. Advanced spoofing techniques used by attackers can produce legitimate-looking emails supposedly from politicians or political organizations, that are in fact fakes intending to subtly undermine the apparent sender by including controversial or factually incorrect material.

Indeed, the Black Hat 2020 Attendee Survey recently found that 71% of the surveyed security professionals agree that the election will be most greatly impacted by systemic disinformation campaigns designed to smear the reputation of a candidate.

With the onset of the pandemic, 130,000 domains related to COVID or remote working were created, as cyber criminals sought to take advantage of the uncertainty. With the election now in full swing, we can expect to see a similar uptake – many of these being purchased by those with malintent. The reality is that with increasingly sophisticated social engineering tactics – and offensive AI on the horizon – we need an adaptive approach to email security that can react to the threats of today and tomorrow.

Cyber warfare: How AI reveals digital fakes

The vast majority of security tools relied upon today analyze emails in isolation, against a list of “known bad” IPs, domains, and file hashes. This legacy approach routinely fails to spot the subtle indicators of advanced and novel attacks that slip through these filters by design.

Recognizing the widening gap between the sophistication of attackers and traditional defense methods, hundreds of organizations are adopting a fundamentally new approach, and turning to AI to spot the subtle deviations from “normal,” stopping malicious email activity regardless of whether the threat has been seen before. This cyber AI technology works by learning on the job, building a “pattern of life” for every email user, their peers, and the wider organization.

Rather than relying on rules and signatures, the AI analyzes the typical behavior of the sender, the recipient, and thousands of data points around every email to understand whether that particular communication is anomalous and indicative of a cyber threat. Hundreds of organizations, both public and private, now rely on Cyber AI to protect their email and organization as a whole.

With the November election vulnerable to disruption and interference in the cyber realm, organizations must turn to a new approach to email security – with AI augmentation no longer just a “nice to have,” but a necessity in the modern threat landscape.

Based in New York, Dan is the Director of Email Security Products for the Americas. He joined Darktrace’s Technical Team in 2015, helping customers quickly achieve a complete and granular understanding of Darktrace’s world-leading Cyber AI Platform and products. Dan has a particular focus on Antigena Email, ensuring that it is effectively deployed in complex digital environments, and works closely with the development, marketing, sales, and technical teams. Dan holds a Bachelor’s degree in Computer Science from New York University.

Darktrace is the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 3,000 organizations to protect against threats to the cloud, email, IoT, networks, and industrial systems. View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post Phishing in Troubled Waters: 3 Ways Email Attacks May Impact Elections appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/phishing-in-troubled-waters-3-ways-email-attacks-may-impact-elections/?utm_source=rss&utm_medium=rss&utm_campaign=phishing-in-troubled-waters-3-ways-email-attacks-may-impact-elections

Software AG Data Released After Clop Ransomware Strike – Report

The Clop group attacked Software AG, a German conglomerate with operations in more than 70 countries, threatening to dump stolen data if the whopping $23 million ransom isn’t paid.
Read More

The post Software AG Data Released After Clop Ransomware Strike – Report appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/software-ag-data-released-after-clop-ransomware-strike-report-2/?utm_source=rss&utm_medium=rss&utm_campaign=software-ag-data-released-after-clop-ransomware-strike-report-2

Software AG Data Released After Clop Ransomware Strike – Report

The Clop group attacked Software AG, a German conglomerate with operations in more than 70 countries, threatening to dump stolen data if the whopping $23 million ransom isn’t paid.
Read More

The post Software AG Data Released After Clop Ransomware Strike – Report appeared first on Malware Devil.



https://malwaredevil.com/2020/10/13/software-ag-data-released-after-clop-ransomware-strike-report/?utm_source=rss&utm_medium=rss&utm_campaign=software-ag-data-released-after-clop-ransomware-strike-report

Monday, October 12, 2020

Practice Safe SECs: Cyber intelligence experts on building safe operational security and information security practices

Two cybersecurity veterans from Authentic8 and Forrester share real-life stories from their tenures in public and private sector organizations.

The post Practice Safe SECs:
Cyber intelligence experts on building safe operational security and information security practices
appeared first on Security Boulevard.

Read More

The post Practice Safe SECs:
Cyber intelligence experts on building safe operational security and information security practices
appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/practice-safe-secs-cyber-intelligence-experts-on-building-safe-operational-security-and-information-security-practices/?utm_source=rss&utm_medium=rss&utm_campaign=practice-safe-secs-cyber-intelligence-experts-on-building-safe-operational-security-and-information-security-practices

Measuring & Improving Core Web Vitals

Google recently announced a proposed update to its search ranking algorithm: the Page Experience Update. This change, which launches in 2021, includes more performance signals in the ranking algorithm. A subtle but important feature of the update is that AMP will no longer be a requirement for promotion to Top Stories — fast pages are all you need!

The post Measuring & Improving Core Web Vitals appeared first on Security Boulevard.

Read More

The post Measuring & Improving Core Web Vitals appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/measuring-improving-core-web-vitals/?utm_source=rss&utm_medium=rss&utm_campaign=measuring-improving-core-web-vitals

Media Services Live Features Upgrades to Support Modern-Day Live-Streaming Needs

Media Services Live (MSL) is Akamai’s flagship solution for preparing live streams to provide broadcast-grade streaming quality for our live-streaming customers. MSL provides purpose-built key capabilities with liveOrigin, including ingest acceleration to map encoders to optimal entry points on the Akamai cloud, low latency support to reduce the delay between online and broadcast feeds, self-healing capabilities to eliminate single points of failure through redundancy mechanisms, end-to-end SSL support, and enhanced monitoring and alerting. You can find more details on the MSL product page.

The post Media Services Live Features Upgrades to Support Modern-Day Live-Streaming Needs appeared first on Security Boulevard.

Read More

The post Media Services Live Features Upgrades to Support Modern-Day Live-Streaming Needs appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/media-services-live-features-upgrades-to-support-modern-day-live-streaming-needs/?utm_source=rss&utm_medium=rss&utm_campaign=media-services-live-features-upgrades-to-support-modern-day-live-streaming-needs

Making the Edge Come Alive

In April 2019, Netflix viewers streamed 164 million hours of on-demand content per day. Fast forward a year. In April 2020, Twitch streamed 55 million hours per day. The vast majority of that was live.

The post Making the Edge Come Alive appeared first on Security Boulevard.

Read More

The post Making the Edge Come Alive appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/making-the-edge-come-alive/?utm_source=rss&utm_medium=rss&utm_campaign=making-the-edge-come-alive

What’s New in Delivery

Welcome to day two of the Akamai Platform Update!
Today, we’re focusing on Akamai’s edge delivery products as well as other complimentary products that help drive great digital experiences. The last several months have been nothing short of unprecedented as lockdowns, quarantines, and other protective measures enacted by governments and organizations drove a sudden and dramatic shift in user behavior, which in turn has driven enormous traffic levels. Akamai’s importance has never been more evident as companies continue to rely on the intelligent edge platform to maintain business continuity and support the unprecedented traffic demand from online audiences. Regardless of the type of content, be it websites, apps, APIs, video, software, or smaller objects, Akamai’s comprehensive set of content delivery products — including Ion, Adaptive Media Delivery, and Download Delivery — are designed to deliver great digital experiences for every user, regardless of location, device, or network.

The post What’s New in Delivery appeared first on Security Boulevard.

Read More

The post What’s New in Delivery appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/whats-new-in-delivery/?utm_source=rss&utm_medium=rss&utm_campaign=whats-new-in-delivery

Timers, Metrics, and Dimensions: What’s New in mPulse in 2020

The October 2020 release marks the culmination of a large number of updates to mPulse, Akamai’s real user monitoring (RUM) solution:

The post Timers, Metrics, and Dimensions: What’s New in mPulse in 2020 appeared first on Security Boulevard.

Read More

The post Timers, Metrics, and Dimensions: What’s New in mPulse in 2020 appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/timers-metrics-and-dimensions-whats-new-in-mpulse-in-2020/?utm_source=rss&utm_medium=rss&utm_campaign=timers-metrics-and-dimensions-whats-new-in-mpulse-in-2020

Three Cloud-First Akamai Initiatives to Support Your Cloud Journey

61% of organizations plan to focus on cloud migration this year.

93% have a multi-cloud strategy.1

This means that on average your organization is using 2.2 public clouds, multiplying your complexity and your costs.

The post Three Cloud-First Akamai Initiatives to Support Your Cloud Journey appeared first on Security Boulevard.

Read More

The post Three Cloud-First Akamai Initiatives to Support Your Cloud Journey appeared first on Malware Devil.



https://malwaredevil.com/2020/10/12/three-cloud-first-akamai-initiatives-to-support-your-cloud-journey/?utm_source=rss&utm_medium=rss&utm_campaign=three-cloud-first-akamai-initiatives-to-support-your-cloud-journey

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...