Malware Devil

Tuesday, February 2, 2021

BSidesSF 2020 – Jay Jacobs’s ‘Visualizing Security’

Our thanks to BSidesSF and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s BSidesSF 2020 Conference, and on the Organization’s YouTube Channel. Additionally, the BSidesSF 2021 Conference will take place on March 6 – 9, 2021 – with no cost to participate. Enjoy!

Permalink

The post BSidesSF 2020 – Jay Jacobs’s ‘Visualizing Security’ appeared first on Security Boulevard.

Read More

The post BSidesSF 2020 – Jay Jacobs’s ‘Visualizing Security’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/bsidessf-2020-jay-jacobss-visualizing-security/?utm_source=rss&utm_medium=rss&utm_campaign=bsidessf-2020-jay-jacobss-visualizing-security

It’s Time to Understand Risk in The Software Supply Chain

By now, everyone has heard about the malicious December 2020 attack on SolarWinds’ Orion software platform, which affected…

The post It’s Time to Understand Risk in The Software Supply Chain appeared first on ZeroNorth.

The post It’s Time to Understand Risk in The Software Supply Chain appeared first on Security Boulevard.

Read More

The post It’s Time to Understand Risk in The Software Supply Chain appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/its-time-to-understand-risk-in-the-software-supply-chain/?utm_source=rss&utm_medium=rss&utm_campaign=its-time-to-understand-risk-in-the-software-supply-chain

Black Hat Europe

The post Black Hat Europe appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/black-hat-europe-2/?utm_source=rss&utm_medium=rss&utm_campaign=black-hat-europe-2

Using the Full Power of SmartResponse Automation

Mitigating identified threats is necessary to prevent any breach. Are you wondering how to respond to alerts provided by the LogRhythm NextGen SIEM Platform for identified threats? Analysts can use SmartResponse™ automation to initiate preventive actions such as blocking, blacklisting, and…

The post Using the Full Power of SmartResponse Automation appeared first on LogRhythm.

The post Using the Full Power of SmartResponse Automation appeared first on Security Boulevard.

Read More

The post Using the Full Power of SmartResponse Automation appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/using-the-full-power-of-smartresponse-automation/?utm_source=rss&utm_medium=rss&utm_campaign=using-the-full-power-of-smartresponse-automation

🔴 LIVE: Security Weekly News #97

This week, Dr. Doug talks TikTok, Sonic Wall, NSA, BigNox, Slipstreaming, ESET, and Jason Wood delivers the Expert Commentary on the Security Weekly News!

→Full Show Notes: https://securityweekly.com/swn97

→Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly

The post 🔴 LIVE: Security Weekly News #97 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/%f0%9f%94%b4-live-security-weekly-news-97/?utm_source=rss&utm_medium=rss&utm_campaign=%25f0%259f%2594%25b4-live-security-weekly-news-97

Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges

Feds charged California-based private detective for stealing $11M from investors, with help from actor Steven Seagal.
Read More

The post Crypto Crook Hired Steven Seagal to Promote Scam, Now Faces Charges appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/crypto-crook-hired-steven-seagal-to-promote-scam-now-faces-charges/?utm_source=rss&utm_medium=rss&utm_campaign=crypto-crook-hired-steven-seagal-to-promote-scam-now-faces-charges

RF Enables Takeover of Hostile Drones

Tempting as it may be to blast drones out of the sky, a less aggressive approach may yield better data about attackers – and keep bystanders safe.

The post RF Enables Takeover of Hostile Drones appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/rf-enables-takeover-of-hostile-drones/?utm_source=rss&utm_medium=rss&utm_campaign=rf-enables-takeover-of-hostile-drones

Tiny Kobalos Malware Bedevils Supercomputers to Steal Logins

The sophisticated backdoor steals SSH credentials for servers in academic and scientific high-performance computing clusters.
Read More

The post Tiny Kobalos Malware Bedevils Supercomputers to Steal Logins appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/tiny-kobalos-malware-bedevils-supercomputers-to-steal-logins/?utm_source=rss&utm_medium=rss&utm_campaign=tiny-kobalos-malware-bedevils-supercomputers-to-steal-logins

Zscaler Internet Access Prioritized for FedRAMP Joint Authorization Board Certification at High Impact Level

Zscaler Internet Access – Core of the Zscaler Zero Trust Exchange – Prioritized for Authorization to Secure the Government’s Most Sensitive, Unclassified Data in Cloud Environments by FedRAMP Connect SAN JOSE, Calif., Feb. 02, 2021 (GLOBE NEWSWIRE) — Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced that Zscaler Internet Access (ZIA) has been selected..

The post Zscaler Internet Access Prioritized for FedRAMP Joint Authorization Board Certification at High Impact Level appeared first on Security Boulevard.

Read More

The post Zscaler Internet Access Prioritized for FedRAMP Joint Authorization Board Certification at High Impact Level appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/zscaler-internet-access-prioritized-for-fedramp-joint-authorization-board-certification-at-high-impact-level/?utm_source=rss&utm_medium=rss&utm_campaign=zscaler-internet-access-prioritized-for-fedramp-joint-authorization-board-certification-at-high-impact-level

‘ValidCC,’ a Major Payment Card Bazaar and Looter of E-Commerce Sites, Shuttered

ValidCC, a dark web bazaar run by a cybercrime group that for more than six years hacked online merchants and sold stolen payment card data, abruptly closed up shop last week. The proprietors of the popular store said their servers were seized as part of a coordinated law enforcement operation designed to disconnect and confiscate its infrastructure.

ValidCC, circa 2017.

There are dozens of online shops that sell so-called “card not present” (CNP) payment card data stolen from e-commerce stores, but most source the data from other criminals. In contrast, researchers say ValidCC was actively involved in hacking and pillaging hundreds of online merchants — seeding the sites with hidden card-skimming code that siphoned personal and financial information as customers went through the checkout process.

Russian cybersecurity firm Group-IB published a report last year detailing the activities of ValidCC, noting the gang behind the crime shop was responsible for plundering nearly 700 e-commerce sites. Group-IB dubbed the gang “UltraRank,” which it said had additionally compromised at least 13 third-party suppliers whose software components are used by countless online stores across Europe, Asia, North and Latin America.

Group-IB believes UltraRank is responsible for a slew of hacks that other security firms previously attributed to at least three distinct cybercrime groups.

“Over five years….UltraRank changed its infrastructure and malicious code on numerous occasions, as a result of which cybersecurity experts would wrongly attribute its attacks to other threat actors,” Group-IB wrote. “UltraRank combined attacks on single targets with supply chain attacks.”

ValidCC’s front man on multiple forums — a cybercriminal who uses the hacker handle “SPR” — told customers on Jan. 28 that the shop would close for good following what appeared to be a law enforcement takedown of its operations. SPR claims his site lost access to a significant inventory — more than 600,000 unsold stolen payment card accounts.

“As a result, we lost the proxy and destination backup servers,” SPR explained. “Besides, now it’s impossible to open and decrypt the backend. The database is in the hands of the police, but it’s encrypted.”

ValidCC had thousands of users, some of whom held significant balances of bitcoin stored in the shop when it ceased operations. SPR claims the site took in approximately $100,000 worth of virtual currency deposits each day from customers.

Many of those customers took to the various crime forums where the shop has a presence to voice suspicions that the proprietors had simply decided to walk away with their money at a time when Bitcoin was near record-high price levels.

SPR countered that ValidCC couldn’t return balances because it no longer had access to its own ledgers.

“We don’t know anything!,” SPR pleaded. “We don’t know users’ balances, or your account logins or passwords, or the [credit cards] you purchased, or anything else! You are free to think what you want, but our team has never conned or let anyone down since the beginning of our operations! Nobody would abandon a dairy cow and let it die in the field! We did not take this decision lightly!”

Group-IB said ValidCC was one of many cybercrime shops that stored some or all of its operational components at Media Land LLC, a major “bulletproof hosting” provider that supports a vast array of phishing sites, cybercrime forums and malware download servers.

Assuming SPR’s claims are truthful, it could be that law enforcement agencies targeted portions of Media Land’s digital infrastructure in some sort of coordinated action. However, so far there are no signs of any major uproar in the cybercrime underground directed at Yalishanda, the nickname used by the longtime proprietor of Media Land.

ValidCC’s demise comes close on the heels of the shuttering of Joker’s Stash, by some accounts the largest underground shop for selling stolen credit card and identity data. On Dec. 16, 2020, several of Joker’s long-held domains began displaying notices that the sites had been seized by the U.S. Department of Justice and Interpol. Less than a month later, Joker announced he was closing the shop permanently.

And last week, authorities across Europe seized control over dozens of servers used to operate Emotet, a prolific malware strain and cybercrime-as-service operation. While there are no indications that action targeted any criminal groups apart from the Emotet gang, it is often the case that multiple cybercrime groups will share the same dodgy digital infrastructure providers, knowingly or unwittingly.

Gemini Advisory, a New York-based firm that closely monitors cybercriminal stores, said ValidCC’s administrators recently began recruiting stolen card data resellers who previously had sold their wares to Joker’s Stash.

Stas Alforov, Gemini’s director of research and development, said other card shops will quickly move in to capture the customers and suppliers who frequented ValidCC.

“There are still a bunch of other shops out there,” Alforov said. “There’s enough tier one shops out there that sell card-not-present data that haven’t dropped a beat and have even picked up volumes.”

Read More

The post ‘ValidCC,’ a Major Payment Card Bazaar and Looter of E-Commerce Sites, Shuttered appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/validcc-a-major-payment-card-bazaar-and-looter-of-e-commerce-sites-shuttered-2/?utm_source=rss&utm_medium=rss&utm_campaign=validcc-a-major-payment-card-bazaar-and-looter-of-e-commerce-sites-shuttered-2

‘ValidCC,’ a Major Payment Card Bazaar and Looter of E-Commerce Sites, Shuttered

ValidCC, a dark web bazaar run by a cybercrime group that for more than six years hacked online merchants and sold stolen payment card data, abruptly closed up shop last week. The proprietors of the popular store said their servers were seized as part of a coordinated law enforcement operation designed to disconnect and confiscate its infrastructure.

ValidCC, circa 2017.

There are dozens of online shops that sell so-called “card not present” (CNP) payment card data stolen from e-commerce stores, but most source the data from other criminals. In contrast, researchers say ValidCC was actively involved in hacking and pillaging hundreds of online merchants — seeding the sites with hidden card-skimming code that siphoned personal and financial information as customers went through the checkout process.

Russian cybersecurity firm Group-IB published a report last year detailing the activities of ValidCC, noting the gang behind the crime shop was responsible for plundering nearly 700 e-commerce sites. Group-IB dubbed the gang “UltraRank,” which it said had additionally compromised at least 13 third-party suppliers whose software components are used by countless online stores across Europe, Asia, North and Latin America.

Group-IB believes UltraRank is responsible for a slew of hacks that other security firms previously attributed to at least three distinct cybercrime groups.

“Over five years….UltraRank changed its infrastructure and malicious code on numerous occasions, as a result of which cybersecurity experts would wrongly attribute its attacks to other threat actors,” Group-IB wrote. “UltraRank combined attacks on single targets with supply chain attacks.”

ValidCC’s front man on multiple forums — a cybercriminal who uses the hacker handle “SPR” — told customers on Jan. 28 that the shop would close for good following what appeared to be a law enforcement takedown of its operations. SPR claims his site lost access to a significant inventory — more than 600,000 unsold stolen payment card accounts.

“As a result, we lost the proxy and destination backup servers,” SPR explained. “Besides, now it’s impossible to open and decrypt the backend. The database is in the hands of the police, but it’s encrypted.”

ValidCC had thousands of users, some of whom held significant balances of bitcoin stored in the shop when it ceased operations. SPR claims the site took in approximately $100,000 worth of virtual currency deposits each day from customers.

Many of those customers took to the various crime forums where the shop has a presence to voice suspicions that the proprietors had simply decided to walk away with their money at a time when Bitcoin was near record-high price levels.

SPR countered that ValidCC couldn’t return balances because it no longer had access to its own ledgers.

“We don’t know anything!,” SPR pleaded. “We don’t know users’ balances, or your account logins or passwords, or the [credit cards] you purchased, or anything else! You are free to think what you want, but our team has never conned or let anyone down since the beginning of our operations! Nobody would abandon a dairy cow and let it die in the field! We did not take this decision lightly!”

Group-IB said ValidCC was one of many cybercrime shops that stored some or all of its operational components at Media Land LLC, a major “bulletproof hosting” provider that supports a vast array of phishing sites, cybercrime forums and malware download servers.

Assuming SPR’s claims are truthful, it could be that law enforcement agencies targeted portions of Media Land’s digital infrastructure in some sort of coordinated action. However, so far there are no signs of any major uproar in the cybercrime underground directed at Yalishanda, the nickname used by the longtime proprietor of Media Land.

ValidCC’s demise comes close on the heels of the shuttering of Joker’s Stash, by some accounts the largest underground shop for selling stolen credit card and identity data. On Dec. 16, 2020, several of Joker’s long-held domains began displaying notices that the sites had been seized by the U.S. Department of Justice and Interpol. Less than a month later, Joker announced he was closing the shop permanently.

And last week, authorities across Europe seized control over dozens of servers used to operate Emotet, a prolific malware strain and cybercrime-as-service operation. While there are no indications that action targeted any criminal groups apart from the Emotet gang, it is often the case that multiple cybercrime groups will share the same dodgy digital infrastructure providers, knowingly or unwittingly.

Gemini Advisory, a New York-based firm that closely monitors cybercriminal stores, said ValidCC’s administrators recently began recruiting stolen card data resellers who previously had sold their wares to Joker’s Stash.

Stas Alforov, Gemini’s director of research and development, said other card shops will quickly move in to capture the customers and suppliers who frequented ValidCC.

“There are still a bunch of other shops out there,” Alforov said. “There’s enough tier one shops out there that sell card-not-present data that haven’t dropped a beat and have even picked up volumes.”

Read More

The post ‘ValidCC,’ a Major Payment Card Bazaar and Looter of E-Commerce Sites, Shuttered appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/validcc-a-major-payment-card-bazaar-and-looter-of-e-commerce-sites-shuttered/?utm_source=rss&utm_medium=rss&utm_campaign=validcc-a-major-payment-card-bazaar-and-looter-of-e-commerce-sites-shuttered

What is Cloud Identity Management?

There’s been a movement in the past few years to innovate the identity management space. Most of that innovation has been around cloud identity management.

The post What is Cloud Identity Management? appeared first on JumpCloud.

The post What is Cloud Identity Management? appeared first on Security Boulevard.

Read More

The post What is Cloud Identity Management? appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/what-is-cloud-identity-management/?utm_source=rss&utm_medium=rss&utm_campaign=what-is-cloud-identity-management

Joy Of Tech® ‘Facebook’s Got A Pop-Up Problem!’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® !

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®!

Permalink

The post Joy Of Tech® ‘Facebook’s Got A Pop-Up Problem!’ appeared first on Security Boulevard.

Read More

The post Joy Of Tech® ‘Facebook’s Got A Pop-Up Problem!’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/02/joy-of-tech-facebooks-got-a-pop-up-problem/?utm_source=rss&utm_medium=rss&utm_campaign=joy-of-tech-facebooks-got-a-pop-up-problem

Monday, February 1, 2021

Data on 1.4 Million Washington State Residents Breached

Unemployment data exposed via third-party software attack.

The post Data on 1.4 Million Washington State Residents Breached appeared first on Malware Devil.



https://malwaredevil.com/2021/02/01/data-on-1-4-million-washington-state-residents-breached-3/?utm_source=rss&utm_medium=rss&utm_campaign=data-on-1-4-million-washington-state-residents-breached-3

Unlocking the Mysteries of the Fed’s New CMMC Requirement

There’s a lot of uncertainty around the Cybersecurity Maturity Model Certification (CMMC). In this episode of Security on Cloud, Tony Bai, Director of Federal Practice Lead at A-LIGN, joined us to explain the CMMC framework, its importance, and why it’s being introduced. Tony shares insight on how CMMC applies to Controlled Unclassified Information (CUI) and the […]

The post Unlocking the Mysteries of the Fed’s New CMMC Requirement appeared first on Anitian.

The post Unlocking the Mysteries of the Fed’s New CMMC Requirement appeared first on Security Boulevard.

Read More

The post Unlocking the Mysteries of the Fed’s New CMMC Requirement appeared first on Malware Devil.



https://malwaredevil.com/2021/02/01/unlocking-the-mysteries-of-the-feds-new-cmmc-requirement/?utm_source=rss&utm_medium=rss&utm_campaign=unlocking-the-mysteries-of-the-feds-new-cmmc-requirement

Data on 1.4 Million Washington State Residents Breached

Unemployment data exposed via third-party software attack.

The post Data on 1.4 Million Washington State Residents Breached appeared first on Malware Devil.



https://malwaredevil.com/2021/02/01/data-on-1-4-million-washington-state-residents-breached-2/?utm_source=rss&utm_medium=rss&utm_campaign=data-on-1-4-million-washington-state-residents-breached-2

Data on 1.4 Million Washington State Residents Breached

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest

Current Issue

image2020: The Year in SecurityDownload this Tech Digest for a look at the biggest security stories that – so far – have shaped a very strange and stressful year.
image

Flash Poll

Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today’s Enterprises
COVID-19 has created a new IT paradigm in the enterprise — and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2020-28493
PUBLISHED: 2021-02-01

This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDOS vulnerability of the regex is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and lim…

CVE-2020-20290
PUBLISHED: 2021-02-01

Directory traversal vulnerability in the yccms 3.3 project. The delete, deletesite, and deleteAll functions’ improper judgment of the request parameters, triggers a directory traversal vulnerability.

CVE-2020-20294
PUBLISHED: 2021-02-01

An issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands.

CVE-2020-20295
PUBLISHED: 2021-02-01

An issue was found in CMSWing project version 1.3.8. Because the updateAction function does not check the detail parameter, malicious parameters can execute arbitrary SQL commands.

CVE-2020-20296
PUBLISHED: 2021-02-01

An issue was found in CMSWing project version 1.3.8, Because the rechargeAction function does not check the balance parameter, malicious parameters can execute arbitrary SQL commands.

The post Data on 1.4 Million Washington State Residents Breached appeared first on Malware Devil.



https://malwaredevil.com/2021/02/01/data-on-1-4-million-washington-state-residents-breached/?utm_source=rss&utm_medium=rss&utm_campaign=data-on-1-4-million-washington-state-residents-breached

WallStreetBets – Hacking the Hedge Funds – BSW #204

Everyone has heard the GameStop frenzy by now, but what’s it all about. How did a group of Reddit users hack the financial system and squeeze the hedge funds? We’re going to discuss the details behind r/wallstreetbets and how they hacked the hedge funds.
Visit https://www.securityweekly.com/bsw for all the latest episodes!
Show Notes: https://securityweekly.com/bsw204

The post WallStreetBets – Hacking the Hedge Funds – BSW #204 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/01/wallstreetbets-hacking-the-hedge-funds-bsw-204/?utm_source=rss&utm_medium=rss&utm_campaign=wallstreetbets-hacking-the-hedge-funds-bsw-204

Wind River Security Incident Affects SSNs, Passport Numbers

Wind River Systems is warning of a ‘security incident’ after one or more files was downloaded from its network.
Read More

The post Wind River Security Incident Affects SSNs, Passport Numbers appeared first on Malware Devil.



https://malwaredevil.com/2021/02/01/wind-river-security-incident-affects-ssns-passport-numbers/?utm_source=rss&utm_medium=rss&utm_campaign=wind-river-security-incident-affects-ssns-passport-numbers

Security Money – The Index Is on the Rise – BSW #204

It’s time for our quarterly segment to review the money of security, including public companies, IPOs, funding rounds and acquisitions from Q4 2020. We’ll also update you on our own index that tracks public security companies called, Security Weekly 25.

Visit https://www.securityweekly.com/bsw for all the latest episodes!

Show Notes: https://securityweekly.com/bsw204

The post Security Money – The Index Is on the Rise – BSW #204 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/01/security-money-the-index-is-on-the-rise-bsw-204/?utm_source=rss&utm_medium=rss&utm_campaign=security-money-the-index-is-on-the-rise-bsw-204

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...