Malware Devil

Thursday, February 25, 2021

Thousands of VMware Servers Exposed to Critical RCE Bug

Register for Dark Reading Newsletters

Subscribe to Newsletters

White Papers

Video

Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
image
Latest Comment: This comment is waiting for review by our moderators.
image

Current Issue

image2021 Top Enterprise IT TrendsWe’ve identified the key trends that are poised to impact the IT landscape in 2021. Find out why they’re important and how they will affect you today!
image

Flash Poll

Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
image

Twitter Feed

Dark Reading - Bug Report

Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database
CVE-2021-20203
PUBLISHED: 2021-02-25

An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS s…

CVE-2021-3406
PUBLISHED: 2021-02-25

A flaw was found in keylime 5.8.1 and older. The issue in the Keylime agent and registrar code invalidates the cryptographic chain of trust from the Endorsement Key certificate to agent attestations.

CVE-2021-20327
PUBLISHED: 2021-02-25

A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node….

CVE-2021-20328
PUBLISHED: 2021-02-25

Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte…

CVE-2020-27543
PUBLISHED: 2021-02-25

The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.

The post Thousands of VMware Servers Exposed to Critical RCE Bug appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/thousands-of-vmware-servers-exposed-to-critical-rce-bug/?utm_source=rss&utm_medium=rss&utm_campaign=thousands-of-vmware-servers-exposed-to-critical-rce-bug

BSides Calgary 2020 – Bhupinder Kaur’s ‘Ransomware Analysis By Using Machine Learning Classifiers And Flare Vm’

Our thanks to BSides Calgary and Conference Speakers for publishing their outstanding presentations; which originally appeared at the group’s BSides Calgary 2020 Conference, and on the Organization’s YouTube Channel. Enjoy!

Permalink

The post BSides Calgary 2020 – Bhupinder Kaur’s ‘Ransomware Analysis By Using Machine Learning Classifiers And Flare Vm’ appeared first on Security Boulevard.

Read More

The post BSides Calgary 2020 – Bhupinder Kaur’s ‘Ransomware Analysis By Using Machine Learning Classifiers And Flare Vm’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/bsides-calgary-2020-bhupinder-kaurs-ransomware-analysis-by-using-machine-learning-classifiers-and-flare-vm/?utm_source=rss&utm_medium=rss&utm_campaign=bsides-calgary-2020-bhupinder-kaurs-ransomware-analysis-by-using-machine-learning-classifiers-and-flare-vm

New Lacework CEO Takes the Helm

Lacework

Lacework this week named David “Hat” Hatfield as CEO as part of an effort to accelerate adoption of a platform that unified runtime threat detection, behavioral anomaly detection and cloud compliance. Most recently, Hatfield was vice chairman of Pure Storage, Inc. Lacework’s previous CEO, Dan Hubbard, is now serving as the company’s chief product officer,..

The post New Lacework CEO Takes the Helm appeared first on Security Boulevard.

Read More

The post New Lacework CEO Takes the Helm appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/new-lacework-ceo-takes-the-helm-4/?utm_source=rss&utm_medium=rss&utm_campaign=new-lacework-ceo-takes-the-helm-4

New Lacework CEO Takes the Helm

Lacework

Lacework this week named David “Hat” Hatfield as CEO as part of an effort to accelerate adoption of a platform that unified runtime threat detection, behavioral anomaly detection and cloud compliance. Most recently, Hatfield was vice chairman of Pure Storage, Inc. Lacework’s previous CEO, Dan Hubbard, is now serving as the company’s chief product officer,..

The post New Lacework CEO Takes the Helm appeared first on Security Boulevard.

Read More

The post New Lacework CEO Takes the Helm appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/new-lacework-ceo-takes-the-helm-3/?utm_source=rss&utm_medium=rss&utm_campaign=new-lacework-ceo-takes-the-helm-3

New Lacework CEO Takes the Helm

Lacework

Lacework this week named David “Hat” Hatfield as CEO as part of an effort to accelerate adoption of a platform that unified runtime threat detection, behavioral anomaly detection and cloud compliance. Most recently, Hatfield was vice chairman of Pure Storage, Inc. Lacework’s previous CEO, Dan Hubbard, is now serving as the company’s chief product officer,..

The post New Lacework CEO Takes the Helm appeared first on Security Boulevard.

Read More

The post New Lacework CEO Takes the Helm appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/new-lacework-ceo-takes-the-helm-2/?utm_source=rss&utm_medium=rss&utm_campaign=new-lacework-ceo-takes-the-helm-2

New Lacework CEO Takes the Helm

Lacework

Lacework this week named David “Hat” Hatfield as CEO as part of an effort to accelerate adoption of a platform that unified runtime threat detection, behavioral anomaly detection and cloud compliance. Most recently, Hatfield was vice chairman of Pure Storage, Inc. Lacework’s previous CEO, Dan Hubbard, is now serving as the company’s chief product officer,..

The post New Lacework CEO Takes the Helm appeared first on Security Boulevard.

Read More

The post New Lacework CEO Takes the Helm appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/new-lacework-ceo-takes-the-helm/?utm_source=rss&utm_medium=rss&utm_campaign=new-lacework-ceo-takes-the-helm

🔴 LIVE: Paul’s Security Weekly #684

This week, first we welcome Peter Warmka, Founder of the Counterintelligence Institute, then we are joined by Bryan Seely, the Senior Security Architect & Evangelist of Cyemptive Technologies, and we wrap up the show with the Security News!

→Full Show Notes: https://securityweekly.com/psw684
→Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4
→Visit our website: https://www.securityweekly.com
→Follow us on Twitter: https://www.twitter.com/securityweekly

The post 🔴 LIVE: Paul’s Security Weekly #684 appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/%f0%9f%94%b4-live-pauls-security-weekly-684/?utm_source=rss&utm_medium=rss&utm_campaign=%25f0%259f%2594%25b4-live-pauls-security-weekly-684

Critical RCE and SLP Protocol Vulnerabilities in VMWare

The post Critical RCE and SLP Protocol Vulnerabilities in VMWare appeared first on Fidelis Cybersecurity.

The post Critical RCE and SLP Protocol Vulnerabilities in VMWare appeared first on Security Boulevard.

Read More

The post Critical RCE and SLP Protocol Vulnerabilities in VMWare appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/critical-rce-and-slp-protocol-vulnerabilities-in-vmware-2/?utm_source=rss&utm_medium=rss&utm_campaign=critical-rce-and-slp-protocol-vulnerabilities-in-vmware-2

Critical RCE and SLP Protocol Vulnerabilities in VMWare

The post Critical RCE and SLP Protocol Vulnerabilities in VMWare appeared first on Fidelis Cybersecurity.

The post Critical RCE and SLP Protocol Vulnerabilities in VMWare appeared first on Security Boulevard.

Read More

The post Critical RCE and SLP Protocol Vulnerabilities in VMWare appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/critical-rce-and-slp-protocol-vulnerabilities-in-vmware/?utm_source=rss&utm_medium=rss&utm_campaign=critical-rce-and-slp-protocol-vulnerabilities-in-vmware

Announcing the First-Ever Veracode Hacker Games

???Destroying things is much easier than making them.??? This quote from The Hunger Games rings true in software; developers spend months perfecting their innovative applications only to see it all crumble at the nimble fingers of a speedy cyberattacker. So how do you beat them? Improve your secure coding know-how early on and keep it sharp. ツ?

More than half of organizations in North America provide developers with some level of security training annually, or less often. A lack of consistent, accessible, and meaningful developer training can easily cause roadblocks as you???re asked to shift security left and write more secure code earlier in your workflow.

And as most coders graduate from college without foundational secure coding knowledge, it???s increasingly important that developers (and developers-in-training) can access effective educational platforms throughout their careers to keep up with changes in vulnerabilities and coding best practices.

That???s why, to inspire the next generation of coders, we???re excited to announce the Veracode Hacker Games!

Hacker Games???

The newly-launched competition from Veracode brings together students from top universities in the U.S. and the U.K. over the course of two weeks to test their secure coding skills. Packed with real-world challenges, the games will be hosted using Veracode Security Labs, and will challenge the teams to quickly solve as many labs as possible to rack up points for their teams.

Over the course of two weeks, contestants will explore vulnerabilities and threats that they???ll face on the job, learning how a cyberattacker might exploit an application and then discovering how to fix and prevent those flaws in the future. It???s practical training and valuable experience that they can take with them through their studies and beyond.

Because it???s no easy feat to beat a serious flaw, we didn???t skimp on the prizes. We???re giving away over $15,000 overall, including a $10,000 donation to the first-place school and a $5,000 donation to the second-place school. We???re also offering generous monetary prizes for individual contestants, and complimentary Veracode scanning software for participating universities so that students can continue refining their skills even after the games are over.ツ?

Which schools are in? Here???s a list of the universities participating in the inaugural Veracode Hacker Games:

  • University of Virginia
  • Stonehill College
  • Queen???s University Belfast
  • Northeastern University
  • University of Warwick
  • Tufts University
  • Indiana University
  • University of Birmingham

While winning students might not get to take a lap around Victor???s Village like in The Hunger Games, they???ll walk away with bragging rights and some fresh secure coding skills to take with them into their careers.

If you missed the signup for this competition, don???t worry! You can reach out to us here and let us know that you???re interested in getting your school involved. Start practicing early in the complimentary version of Veracode Security Labs.

You can also track progress during the challenge by following #VeracodeHackerGames on social, and perusing our leaderboard for updates. Check back on March 26th to see who wins!

The post Announcing the First-Ever Veracode Hacker Games appeared first on Security Boulevard.

Read More

The post Announcing the First-Ever Veracode Hacker Games appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/announcing-the-first-ever-veracode-hacker-games-4/?utm_source=rss&utm_medium=rss&utm_campaign=announcing-the-first-ever-veracode-hacker-games-4

Announcing the First-Ever Veracode Hacker Games

???Destroying things is much easier than making them.??? This quote from The Hunger Games rings true in software; developers spend months perfecting their innovative applications only to see it all crumble at the nimble fingers of a speedy cyberattacker. So how do you beat them? Improve your secure coding know-how early on and keep it sharp. ツ?

More than half of organizations in North America provide developers with some level of security training annually, or less often. A lack of consistent, accessible, and meaningful developer training can easily cause roadblocks as you???re asked to shift security left and write more secure code earlier in your workflow.

And as most coders graduate from college without foundational secure coding knowledge, it???s increasingly important that developers (and developers-in-training) can access effective educational platforms throughout their careers to keep up with changes in vulnerabilities and coding best practices.

That???s why, to inspire the next generation of coders, we???re excited to announce the Veracode Hacker Games!

Hacker Games???

The newly-launched competition from Veracode brings together students from top universities in the U.S. and the U.K. over the course of two weeks to test their secure coding skills. Packed with real-world challenges, the games will be hosted using Veracode Security Labs, and will challenge the teams to quickly solve as many labs as possible to rack up points for their teams.

Over the course of two weeks, contestants will explore vulnerabilities and threats that they???ll face on the job, learning how a cyberattacker might exploit an application and then discovering how to fix and prevent those flaws in the future. It???s practical training and valuable experience that they can take with them through their studies and beyond.

Because it???s no easy feat to beat a serious flaw, we didn???t skimp on the prizes. We???re giving away over $15,000 overall, including a $10,000 donation to the first-place school and a $5,000 donation to the second-place school. We???re also offering generous monetary prizes for individual contestants, and complimentary Veracode scanning software for participating universities so that students can continue refining their skills even after the games are over.ツ?

Which schools are in? Here???s a list of the universities participating in the inaugural Veracode Hacker Games:

  • University of Virginia
  • Stonehill College
  • Queen???s University Belfast
  • Northeastern University
  • University of Warwick
  • Tufts University
  • Indiana University
  • University of Birmingham

While winning students might not get to take a lap around Victor???s Village like in The Hunger Games, they???ll walk away with bragging rights and some fresh secure coding skills to take with them into their careers.

If you missed the signup for this competition, don???t worry! You can reach out to us here and let us know that you???re interested in getting your school involved. Start practicing early in the complimentary version of Veracode Security Labs.

You can also track progress during the challenge by following #VeracodeHackerGames on social, and perusing our leaderboard for updates. Check back on March 26th to see who wins!

The post Announcing the First-Ever Veracode Hacker Games appeared first on Security Boulevard.

Read More

The post Announcing the First-Ever Veracode Hacker Games appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/announcing-the-first-ever-veracode-hacker-games-3/?utm_source=rss&utm_medium=rss&utm_campaign=announcing-the-first-ever-veracode-hacker-games-3

Announcing the First-Ever Veracode Hacker Games

???Destroying things is much easier than making them.??? This quote from The Hunger Games rings true in software; developers spend months perfecting their innovative applications only to see it all crumble at the nimble fingers of a speedy cyberattacker. So how do you beat them? Improve your secure coding know-how early on and keep it sharp. ツ?

More than half of organizations in North America provide developers with some level of security training annually, or less often. A lack of consistent, accessible, and meaningful developer training can easily cause roadblocks as you???re asked to shift security left and write more secure code earlier in your workflow.

And as most coders graduate from college without foundational secure coding knowledge, it???s increasingly important that developers (and developers-in-training) can access effective educational platforms throughout their careers to keep up with changes in vulnerabilities and coding best practices.

That???s why, to inspire the next generation of coders, we???re excited to announce the Veracode Hacker Games!

Hacker Games???

The newly-launched competition from Veracode brings together students from top universities in the U.S. and the U.K. over the course of two weeks to test their secure coding skills. Packed with real-world challenges, the games will be hosted using Veracode Security Labs, and will challenge the teams to quickly solve as many labs as possible to rack up points for their teams.

Over the course of two weeks, contestants will explore vulnerabilities and threats that they???ll face on the job, learning how a cyberattacker might exploit an application and then discovering how to fix and prevent those flaws in the future. It???s practical training and valuable experience that they can take with them through their studies and beyond.

Because it???s no easy feat to beat a serious flaw, we didn???t skimp on the prizes. We???re giving away over $15,000 overall, including a $10,000 donation to the first-place school and a $5,000 donation to the second-place school. We???re also offering generous monetary prizes for individual contestants, and complimentary Veracode scanning software for participating universities so that students can continue refining their skills even after the games are over.ツ?

Which schools are in? Here???s a list of the universities participating in the inaugural Veracode Hacker Games:

  • University of Virginia
  • Stonehill College
  • Queen???s University Belfast
  • Northeastern University
  • University of Warwick
  • Tufts University
  • Indiana University
  • University of Birmingham

While winning students might not get to take a lap around Victor???s Village like in The Hunger Games, they???ll walk away with bragging rights and some fresh secure coding skills to take with them into their careers.

If you missed the signup for this competition, don???t worry! You can reach out to us here and let us know that you???re interested in getting your school involved. Start practicing early in the complimentary version of Veracode Security Labs.

You can also track progress during the challenge by following #VeracodeHackerGames on social, and perusing our leaderboard for updates. Check back on March 26th to see who wins!

The post Announcing the First-Ever Veracode Hacker Games appeared first on Security Boulevard.

Read More

The post Announcing the First-Ever Veracode Hacker Games appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/announcing-the-first-ever-veracode-hacker-games-2/?utm_source=rss&utm_medium=rss&utm_campaign=announcing-the-first-ever-veracode-hacker-games-2

Announcing the First-Ever Veracode Hacker Games

???Destroying things is much easier than making them.??? This quote from The Hunger Games rings true in software; developers spend months perfecting their innovative applications only to see it all crumble at the nimble fingers of a speedy cyberattacker. So how do you beat them? Improve your secure coding know-how early on and keep it sharp. ツ?

More than half of organizations in North America provide developers with some level of security training annually, or less often. A lack of consistent, accessible, and meaningful developer training can easily cause roadblocks as you???re asked to shift security left and write more secure code earlier in your workflow.

And as most coders graduate from college without foundational secure coding knowledge, it???s increasingly important that developers (and developers-in-training) can access effective educational platforms throughout their careers to keep up with changes in vulnerabilities and coding best practices.

That???s why, to inspire the next generation of coders, we???re excited to announce the Veracode Hacker Games!

Hacker Games???

The newly-launched competition from Veracode brings together students from top universities in the U.S. and the U.K. over the course of two weeks to test their secure coding skills. Packed with real-world challenges, the games will be hosted using Veracode Security Labs, and will challenge the teams to quickly solve as many labs as possible to rack up points for their teams.

Over the course of two weeks, contestants will explore vulnerabilities and threats that they???ll face on the job, learning how a cyberattacker might exploit an application and then discovering how to fix and prevent those flaws in the future. It???s practical training and valuable experience that they can take with them through their studies and beyond.

Because it???s no easy feat to beat a serious flaw, we didn???t skimp on the prizes. We???re giving away over $15,000 overall, including a $10,000 donation to the first-place school and a $5,000 donation to the second-place school. We???re also offering generous monetary prizes for individual contestants, and complimentary Veracode scanning software for participating universities so that students can continue refining their skills even after the games are over.ツ?

Which schools are in? Here???s a list of the universities participating in the inaugural Veracode Hacker Games:

  • University of Virginia
  • Stonehill College
  • Queen???s University Belfast
  • Northeastern University
  • University of Warwick
  • Tufts University
  • Indiana University
  • University of Birmingham

While winning students might not get to take a lap around Victor???s Village like in The Hunger Games, they???ll walk away with bragging rights and some fresh secure coding skills to take with them into their careers.

If you missed the signup for this competition, don???t worry! You can reach out to us here and let us know that you???re interested in getting your school involved. Start practicing early in the complimentary version of Veracode Security Labs.

You can also track progress during the challenge by following #VeracodeHackerGames on social, and perusing our leaderboard for updates. Check back on March 26th to see who wins!

The post Announcing the First-Ever Veracode Hacker Games appeared first on Security Boulevard.

Read More

The post Announcing the First-Ever Veracode Hacker Games appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/announcing-the-first-ever-veracode-hacker-games/?utm_source=rss&utm_medium=rss&utm_campaign=announcing-the-first-ever-veracode-hacker-games

5 Key Steps Schools Can Take to Defend Against Cyber Threats

Educational institutions have become prime targets, but there are things they can do to stay safer.

The education sector has benefited significantly from digital transformation, enabling learning to take place anytime, anywhere. The advent of these remote learning capabilities, however, has also eroded the security perimeter, introducing a host of cyber-hygiene challenges. Schools are a prime target as they face budgetary cuts and insufficient cybersecurity awareness. So, how can we go about resolving this issue?

Understand the Rules and Their Limits
To build a comprehensive security program, it’s essential that educational institutions understand the rules and regulations by which they must abide. Schools are uniquely positioned to face regulations that are specific to their industry. For example, the Family Education Rights and Privacy Act (FERPA) determines how student records are handled. The Children’s Internet Protection Act (CIPA) demands that K-12 schools and libraries apply Internet filters to safeguard children from adult content and other potentially harmful information. There are also state-specific regulations, such as California’s Student Online Personal Information Protection Act (SOPIPA).

Yet many of these regulations hardly provide guidance on how to balance compliance and security, leaving many schools in the lurch regarding how to prioritize and build. It is important to understand that these rules and regulations are built to ensure that schools are aware of their responsibilities and the consequences. They should help prioritize security controls put in place; disregarding these standards puts schools at greater risk of reputational damage, substantial fines, or a loss of funding from their governing bodies. However, it should not be the sole driver of their cybersecurity efforts.

According to Red Canary’s annual “Threat Detection Report,” the top three techniques that adversaries used to attack education organizations in 2019 were process injection, Windows admin shares, and scheduled tasks. The prevalence of these techniques doesn’t seem to have been changed by the shift to remote learning due to COVID, and they still offer adversaries a way to infiltrate, spread, and remain within an environment, persisting on machines even when powered off. It’s possible that the move to remote learning has made the initial attack vectors of phishing (targeting administrative credentials) and targeting Web-facing administrative protocols such as Remote Desktop Protocol (RDP) easier, as attackers leverage the pressure and chaos of transitioning a school to remote learning to their advantage.

These top three techniques continue to succeed, largely because they exploit legitimate features of the Windows operating system. Because these techniques rely heavily on trickery, they’re more likely to remain unnoticed in a remote environment. Discovering these techniques requires a healthy dose of self-awareness and knowledge of what is legitimate activity and what is not. Maintaining a baseline of legitimate system activities and processes won’t be easy, especially if you’ve made sacrifices to support your remote teachers and staff through local administrative privileges, adjustments to permitted software, and adjusted content controls. School technology staff should remain vigilant and still strive to understand their adversaries’ techniques. Educational organizations can tackle these threats with mitigating security controls and improved cyber hygiene. With this knowledge, schools can re-evaluate their tools, technology, training, personnel, and processes to gauge if they are adequately prepared.

Build the Barricades: 5 Steps
Armed with intelligence about the regulations, threats, and shortcomings in their environment, schools can now work on building their defenses. Here are five key steps:

  1. Limit administrative access: Offering end users administrative privileges they don’t need is tantamount to giving cybercriminals the keys to the kingdom. Schools should adhere to the principle of least privilege, restricting users’ rights and permissions to their specific job duties.
  2. Administer security awareness training: Cybersecurity awareness training is key in helping end users identify cyber threats and manage them appropriately.
  3. Implement network segmentation: This breaks up the network into chunks that can be more easily managed and limits an adversary’s visibility of your network and assets. Each of these segments should be protected with firewalls, and network traffic should be limited to these divisions as well. By restricting the ports and protocols that each system on the network is serving and restricting those services solely to the endpoints and networks that require them, the spread of an attack can be curbed significantly.
  4. Implement vulnerability management: Schools should conduct frequent inventory checks, stay abreast of the latest patch releases, and, if possible, adopt an automatic patch deployment schedule.
  5. Ensure visibility: Ideally, schools should employ tools which offer a deep analysis of their systems and automatically tackle threats as they appear.

In the end, we need to applaud the teachers and academic staff working hard to support students in these extraordinary times. This effort should not go to waste for lack of cybersecurity readiness. Fortunately, the foundations of achieving good cyber hygiene are not ground-breaking, nor are they unattainable. If academic organizations can check these boxes, they’re positioning themselves in good stead against any future threats.

Chris Abbey is an experienced cybersecurity leader and analyst with a penchant for following his heart in volunteering and mentoring. His diverse background includes work in the federal, public, and financial services sectors, where he has honed skills in threat and … View Full Bio

Recommended Reading:

Comment |

Email This |

Print |

RSS

More Insights

The post 5 Key Steps Schools Can Take to Defend Against Cyber Threats appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/5-key-steps-schools-can-take-to-defend-against-cyber-threats/?utm_source=rss&utm_medium=rss&utm_campaign=5-key-steps-schools-can-take-to-defend-against-cyber-threats

Joy Of Tech® ‘Talking Parachute’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech® !

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®!

Permalink

The post Joy Of Tech® ‘Talking Parachute’ appeared first on Security Boulevard.

Read More

The post Joy Of Tech® ‘Talking Parachute’ appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/joy-of-tech-talking-parachute/?utm_source=rss&utm_medium=rss&utm_campaign=joy-of-tech-talking-parachute

Scammers, profiteers, and shady sites? It must be tax season

US tax season is upon us, a time of the year when a special kind of vermin comes crawling out of the woodwork: tax scammers! Not that their goals are any different from any other scammers. They want your hard-earned dollars in their pockets.

Most of the tax-related attacks follow a few tried and true methods: A phishing email or scam call from someone purporting to be from the IRS, or an accountant offering to help you get a big refund. With all the financial and personal data to be had, it’s a time to keep a close eye on who you give your details to.

Below you is a real example you can use as a guide to the things you need to consider if you decide to use an online tax filing service.

Online tax services

This blogpost was triggered by a web push notification I got from a search hijacker from the SearchDimension family I was investigating. Many search hijackers in this family also use notifications, which qualifies them as adware.

web push notification

It’s not that I recognized the form displayed in the notifications, but I knew the notification would likely be aimed at US users of the extension I was investigating since I had set my VPN to New York.

Malwarebytes Privacy

Anyway, the thought of someone providing their financial status and personal data to a website that was advertized in this manner gave me the creeps.

The website

The full URL behind the “Click Here” field was:

https://www.e-file.com/offer.php?utm_medium=affiliate&utm_source=cake&utm_campaign=intango&utm_content=2648&pid=&utm_term=84733016804____&utm_medium=affiliate&lctid=&lcid=

The items after the question mark are Google Analytics campaign tracking parameters that help a website understand where its traffic is coming from. In this case the site appears to be using them so it can attribute traffic to different affiliates (presumably so the site knows how much to pay them).

A click on that link in the notification brought me to this site:

e-file.com website

Note that I went from free to a 30% discount in just one click. A bad start! Some digging revealed that the domain e-file.com originally belonged to a record shop called “Vinyl Junkie.” The internet archive has a first snapshot dating back to October of 2000. In 2005 the domain had switched to an outfit selling software to organize and store files. The first snapshot promoting an online tax filing service shows up in 2010.

Phishing sites tend not to hang around that long, so while the domain’s history is certainly interesting, it is not in itself a bad sign.

Affiliates

Another interesting piece of information can be found in the page about their affiliate program.

e-file.com affiliates program

There is no indication that e-file is using search hijackers itself. In this case it seems as if an affiliate is, and e-file may not know that it has an affiliate doing that. But offering the most aggressive payouts (“double what many of our competitors pay!”), even when the customer does not spend any money, is exactly what attracts the most obnoxious advertisers on the web.

We asked Dr. Fou of FouAnalytics to have a look at the affiliate program details and the notification I clicked on, and this is what he told us:

Anyone running or using affiliate programs to drive more leads and sales should carefully review who is sending the links, leads, and sales. This is clearly an example of scammers taking advantage of an affiliate program and using shady techniques to get paid. They are trading off of your good name, and consumers will think you scammed them. This is just like malvertising that happens on mainstream publishers’ sites; the consumers think the publisher compromised their device because they didn’t realize the malicious code came in through an ad served into the page.

Reviews

One way to find out more information about a company or site is to look for reviews from other users. When we did this for e-file.com and found many complaints that might indicate that their services are not always as free as they claim.

e-file.com review

Other reviews speak of missed opportunities for a refund and a lack of service. Bad reviews aren’t proof of wrong doing though, and you may say: “OK, what did you expect from a free service?” If a service is offered for free, but it still promises to pay its affiliates high rates, that money is coming from somewhere.

Speaking for myself, I am not sure a free service is how I would try to save money in tax season.

ID theft

We are not accusing e-file of being up to no good, but one of its affiliates is. And they are not the only ones trying to make a quick buck from you in tax season. Chief among them are ID thieves.

Scammers like tax season because people don’t like tax, many are baffled by it, lots of people will be in a hurry or looking for ways to make it easier, and in they end they will have to hand over a lot of personal information.

For those that have no idea what information you do (and don’t) need to provide when you file your taxes, here is a pretty extensive list. Remember that a social security number, birth date, and a bank account number is all the information a cyber-criminal needs to perform identity theft. And the consequences of that theft can be devastating. Identity theft is not to be taken lightly. It can take years to recover from and be very costly. A good resource for information about it is the ITRC.

So, it is wise to do some research before you trust any website with your personal details (and not just those that help with your tax).

And even if a service is legitimate, you should consider how secure your data will be if you entrust it to them. If the data gets exposed in a breach, the result for you is practically the same as if it had been sold anyway.

You can find more general tips to stay safe in tax season in our blogpost Coughing in the face of scammers: security tips for the 2020 tax season.

Stay safe, everyone!

The post Scammers, profiteers, and shady sites? It must be tax season appeared first on Malware Devil.



https://malwaredevil.com/2021/02/25/scammers-profiteers-and-shady-sites-it-must-be-tax-season-2/?utm_source=rss&utm_medium=rss&utm_campaign=scammers-profiteers-and-shady-sites-it-must-be-tax-season-2

Cybersecurity Threats on the Rise

Cybersecurity Threats on the Rise

The cyber world has faced unprecedented challenges and changes within the last year. It has shown a need for increased visibility within the cybersecurity landscape as blended threats and vulnerabilities become the new normal for threat responders to combat.  In the interview below, Myla Pilao, head of security research communications for TrendLabs at Trend Micro,..

The post Cybersecurity Threats on the Rise appeared first on Security Boulevard.

Read More

The post Cybersecurity Threats on the Rise appeared first on Malware Devil.



https://malwaredevil.com/2021/02/24/cybersecurity-threats-on-the-rise-8/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-threats-on-the-rise-8

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...