Malware Devil

Monday, May 10, 2021

Colonial Pipeline Ransomware Attack

One of the nation’s largest fuel pipelines has been forced to shut down after being affected by a ransomware cyberattack.  Ransomware is a form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

The post Colonial Pipeline Ransomware Attack first appeared on SecurityOrb.com.

The post Colonial Pipeline Ransomware Attack appeared first on Security Boulevard.

Read More

The post Colonial Pipeline Ransomware Attack appeared first on Malware Devil.



https://malwaredevil.com/2021/05/10/colonial-pipeline-ransomware-attack/?utm_source=rss&utm_medium=rss&utm_campaign=colonial-pipeline-ransomware-attack

ISC Stormcast For Monday, May 10th, 2021 https://isc.sans.edu/podcastdetail.html?id=7492, (Mon, May 10th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, May 10th, 2021 https://isc.sans.edu/podcastdetail.html?id=7492, (Mon, May 10th) appeared first on Malware Devil.



https://malwaredevil.com/2021/05/10/isc-stormcast-for-monday-may-10th-2021-https-isc-sans-edu-podcastdetail-htmlid7492-mon-may-10th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-may-10th-2021-https-isc-sans-edu-podcastdetail-htmlid7492-mon-may-10th

Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks

Read More

The post Exploiting Vulnerabilities in Deep Neural Networks: Adversarial and Fault-Injection Attacks appeared first on Malware Devil.



https://malwaredevil.com/2021/05/10/exploiting-vulnerabilities-in-deep-neural-networks-adversarial-and-fault-injection-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=exploiting-vulnerabilities-in-deep-neural-networks-adversarial-and-fault-injection-attacks

Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group

Read More

The post Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group appeared first on Malware Devil.



https://malwaredevil.com/2021/05/10/subfield-algorithms-for-ideal-and-module-svp-based-on-the-decomposition-group/?utm_source=rss&utm_medium=rss&utm_campaign=subfield-algorithms-for-ideal-and-module-svp-based-on-the-decomposition-group

Sunday, May 9, 2021

Network Security News Summary for Monday May 10th, 2021

Research Scans; tsuNAME and Cyclehunter; Foxit Patches; Hypocrit Patch Research Investigation

Who is Probing the Internet for Research Purposes
https://isc.sans.edu/forums/diary/Who+is+Probing+the+Internet+for+Research+Purposes/27400/

Cycle Hunter and tsuNAME DDoS Attack
https://github.com/SIDN/CycleHunter
https://tsuname.io/tech_report.pdf

Foxit Reader / Phantom PDF Vulnerabilities
https://www.foxitsoftware.com/support/security-bulletins.html?Security+updates+available+in+Foxit+Reader+10.1.4+and+Foxit+PhantomPDF+10.1.42021-05-06

Hypocrit Patches Reviewed By Linux Foundation
https://lore.kernel.org/lkml/202104221451.292A6ED4@keescook/

keywords: hypocrit patches; linux foundation; umn; foxit; reader; phantom pdf; cycle hunter; tsuname; researchers

The post Network Security News Summary for Monday May 10th, 2021 appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/network-security-news-summary-for-monday-may-10th-2021/?utm_source=rss&utm_medium=rss&utm_campaign=network-security-news-summary-for-monday-may-10th-2021

[U.S. General Services Administration] high – TAMS registration details API for admins open at https://tamsapi.gsa.gov/user/tams/api/usermgmnt/pendingUserDetails/

Read More

The post [U.S. General Services Administration] high – TAMS registration details API for admins open at https://tamsapi.gsa.gov/user/tams/api/usermgmnt/pendingUserDetails/ appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/u-s-general-services-administration-high-tams-registration-details-api-for-admins-open-at-https-tamsapi-gsa-gov-user-tams-api-usermgmnt-pendinguserdetails-2/?utm_source=rss&utm_medium=rss&utm_campaign=u-s-general-services-administration-high-tams-registration-details-api-for-admins-open-at-https-tamsapi-gsa-gov-user-tams-api-usermgmnt-pendinguserdetails-2

[Sifchain] critical – Exposed Openapi Token

Read More

The post [Sifchain] critical – Exposed Openapi Token appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/sifchain-critical-exposed-openapi-token-2/?utm_source=rss&utm_medium=rss&utm_campaign=sifchain-critical-exposed-openapi-token-2

[Sifchain] critical – Private KEY of crypto wallet

Read More

The post [Sifchain] critical – Private KEY of crypto wallet appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/sifchain-critical-private-key-of-crypto-wallet-2/?utm_source=rss&utm_medium=rss&utm_campaign=sifchain-critical-private-key-of-crypto-wallet-2

[Slack] high – Team members can trigger arbitrary code execution in Slack Desktop Apps via HTML Notifications

Read More

The post [Slack] high – Team members can trigger arbitrary code execution in Slack Desktop Apps via HTML Notifications appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/slack-high-team-members-can-trigger-arbitrary-code-execution-in-slack-desktop-apps-via-html-notifications-2/?utm_source=rss&utm_medium=rss&utm_campaign=slack-high-team-members-can-trigger-arbitrary-code-execution-in-slack-desktop-apps-via-html-notifications-2

CPDP 2021 – Moderator: Robin Pierce ‘Privacy In Automated And Connected Vehicles’

Speakers: Ian Oliver, Gergely Biczok, Juha Röning, Jean-Loup Dépinay, Florian Stahl

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel. Enjoy!

Permalink

The post CPDP 2021 – Moderator: Robin Pierce ‘Privacy In Automated And Connected Vehicles’ appeared first on Security Boulevard.

Read More

The post CPDP 2021 – Moderator: Robin Pierce ‘Privacy In Automated And Connected Vehicles’ appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/cpdp-2021-moderator-robin-pierce-privacy-in-automated-and-connected-vehicles/?utm_source=rss&utm_medium=rss&utm_campaign=cpdp-2021-moderator-robin-pierce-privacy-in-automated-and-connected-vehicles

Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 328’

via the respected security expertise of Robert M. Lee and the superlative illustration talents of Jeff Haas at Little Bobby Comics

Permalink

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 328’ appeared first on Security Boulevard.

Read More

The post Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 328’ appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/robert-m-lees-jeff-haas-little-bobby-comics-week-328/?utm_source=rss&utm_medium=rss&utm_campaign=robert-m-lees-jeff-haas-little-bobby-comics-week-328

CPDP 2021 – Moderator: Pieter Van Cleynenbreugel ‘Automated Decision-Making: Towards Effective Remedies In A Changing World?’

Speakers: Sarah Eskens, Hans Ingels, Julia Reda, Alexandre Biard

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel. Enjoy!

Permalink

The post CPDP 2021 – Moderator: Pieter Van Cleynenbreugel ‘Automated Decision-Making: Towards Effective Remedies In A Changing World?’ appeared first on Security Boulevard.

Read More

The post CPDP 2021 – Moderator: Pieter Van Cleynenbreugel ‘Automated Decision-Making: Towards Effective Remedies In A Changing World?’ appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/cpdp-2021-moderator-pieter-van-cleynenbreugel-automated-decision-making-towards-effective-remedies-in-a-changing-world/?utm_source=rss&utm_medium=rss&utm_campaign=cpdp-2021-moderator-pieter-van-cleynenbreugel-automated-decision-making-towards-effective-remedies-in-a-changing-world

Who is Probing the Internet for Research Purposes?, (Sat, May 8th)

Shodan[1] is one of the most familiar site for research on what is on the internet. In Oct 2020 I did a diary on Censys [2][3], another site collecting similar information like Shodan. The next two sites are regularly scanning the internet for data which isn’t shared with the security community at large.

Net Systems Research [4] probe the internet for research, but none of the data is accesible or published on the site. This is part of the message About Us: “Net Systems Research was founded in 2015 by a group of security data researchers who wanted to utilize a global view of the internet to study these difficult and emerging internet security challenges and understand the resulting implications.”

Security IPIP [5] has no information beside a banner: “Our company engaged in the researching and data collecting of IP location, internet infrastructure and network security, we need to detect the internet (Ping/ Traceoute Mainly); For network security research, we need to obtain the IP location Banner and fingerprint information, we detecting the common port openly or not by ZMap, and collecting opened Banner data by our own code. Any questions please do not hesitate to contact with us: frk@ipip.net.”

Over the past 3 years, my honeypot has logged information at various point in times from these 4 different research organizations. Here are some typical logs and their top 10 IPs. Shodan uses IP range 71.6.128.0-71.6.255.255 to run its scans but unlike other scanners, it doesn’t include a banner in the captured logs.

Activity first noticed 4 June 2018. This is a sample log:

20210507-171447: 192.168.25.9:80-71.6.158.166:34476 data
GET / HTTP/1.1
Accept-Encoding: identity
Host: xxxxxx.xxx.ca
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36

Activity first noticed 19 Aug 2020. This is a sample log:

20210506-011443: 192.168.25.9:80-162.142.125.38:46726 data
GET / HTTP/1.1
Host: 70.55.XX.XXX:8080
User-Agent: Mozilla/5.0 (compatible; CensysInspect/1.1; +https://about.censys.io/)
Accept: */*
Accept-Encoding: gzip

Activity first noticed 15 Feb 2019. This is a sample log:

20210506-013155: 192.168.25.9:8443-92.118.160.5:47195 data
GET / HTTP/1.1
Host: 70.55.XX.XXX:8443
User-Agent: NetSystemsResearch studies the availability of various services across the internet. Our website is netsystemsresearch.com

Activity first noticed 14 Oct 2018 data. This is a sample log:

20210506-082116: 192.168.25.9:81-172.104.67.101:42966
GET / HTTP/1.1
Host: 70.55.XX.XXX:81
User-Agent: HTTP Banner Detection (https://security.ipip.net)
Connection: close

Since the data is already out there, why not use Shodan or Censys to explore what services a home router is sharing to the internet. Here is an example of list of services recorded and audited by Shodan which also includes SSL certificate information, banner version, etc.

 

[1] https://www.shodan.io
[2] https://censys.io/ipv4
[3] https://isc.sans.edu/forums/diary/An+Alternative+to+Shodan+Censys+with+UserAgent+CensysInspect11/26718
[4] http://www.netsystemsresearch.com
[5] https://security.ipip.net/
[6] https://isc.sans.edu/ipinfo.html?ip=71.6.158.166 (Shodan RESEARCHER: THIS IP IS USED FOR INTERNET WIDE RESEARCH SCANS)

———–
Guy Bruneau IPSS Inc.
My Handler Page
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Who is Probing the Internet for Research Purposes?, (Sat, May 8th) appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/who-is-probing-the-internet-for-research-purposes-sat-may-8th/?utm_source=rss&utm_medium=rss&utm_campaign=who-is-probing-the-internet-for-research-purposes-sat-may-8th

Using the new Plot Javascript Exploratory Visualization Library Sans-Observable

The fine folks over at @ObservableHQ released a new javascript exploratory visualization library called Plot last week with great fanfare. It was primarily designed to be used in Observable notebooks and I quickly tested it out there (you can find them at my Observable landing page: https://observablehq.com/@hrbrmstr). {Plot} doesn’t require Observable, however, and I threw… Continue reading

The post Using the new Plot Javascript Exploratory Visualization Library Sans-Observable appeared first on Security Boulevard.

Read More

The post Using the new Plot Javascript Exploratory Visualization Library Sans-Observable appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/using-the-new-plot-javascript-exploratory-visualization-library-sans-observable/?utm_source=rss&utm_medium=rss&utm_campaign=using-the-new-plot-javascript-exploratory-visualization-library-sans-observable

[Slack] high – Team members can trigger arbitrary code execution in Slack Desktop Apps via HTML Notifications

Google Chrome


Download latest

Mozilla Firefox


Download latest

Opera


Download latest

Apple Safari


Upgrade your OS

Microsoft Internet Explorer


Download latest

Read More

The post [Slack] high – Team members can trigger arbitrary code execution in Slack Desktop Apps via HTML Notifications appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/slack-high-team-members-can-trigger-arbitrary-code-execution-in-slack-desktop-apps-via-html-notifications/?utm_source=rss&utm_medium=rss&utm_campaign=slack-high-team-members-can-trigger-arbitrary-code-execution-in-slack-desktop-apps-via-html-notifications

Ransomware Cyber Attack Forced the Largest U.S. Fuel Pipeline to Shut Down

Colonial Pipeline, which carries 45% of the fuel consumed on the U.S. East Coast, on Saturday said it halted operations due to a ransomware attack, once again demonstrating how infrastructure is vulnerable to cyberattacks.
“On May 7, the Colonial Pipeline Company learned it was the victim of a cybersecurity attack,” the company said in a statement posted on its website. “We have since determined
Read More

The post Ransomware Cyber Attack Forced the Largest U.S. Fuel Pipeline to Shut Down appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/ransomware-cyber-attack-forced-the-largest-u-s-fuel-pipeline-to-shut-down/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-cyber-attack-forced-the-largest-u-s-fuel-pipeline-to-shut-down

Protecting Collaboration Channels for Remote Work

In a recent article for Security Boulevard, Ossi Tiainen identified 15 high-potential companies in the cybersecurity space…and Ermetic is included! Ossi posits that securing collaboration and communication apps is more important than ever because of the recent huge shift to remote work. Even before 2020 and the age of COVID-19, enterprises had shifted from email […]

The post Protecting Collaboration Channels for Remote Work appeared first on Ermetic.

The post Protecting Collaboration Channels for Remote Work appeared first on Security Boulevard.

Read More

The post Protecting Collaboration Channels for Remote Work appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/protecting-collaboration-channels-for-remote-work-2/?utm_source=rss&utm_medium=rss&utm_campaign=protecting-collaboration-channels-for-remote-work-2

Top US Oil & Gas Supplier: Colonial Pipeline, Allegedly Hit by Eastern European Ransomware Attack.

Initial reports indicate that European criminal gang DarkSide undertook the attack against Colonial Pipeline, taking 5,500 miles of pipeline off-line and stopping the distribution of 100 million gallons of fuel per day.

The post Top US Oil & Gas Supplier: Colonial Pipeline, Allegedly Hit by Eastern European Ransomware Attack. appeared first on Security Boulevard.

Read More

The post Top US Oil & Gas Supplier: Colonial Pipeline, Allegedly Hit by Eastern European Ransomware Attack. appeared first on Malware Devil.



https://malwaredevil.com/2021/05/08/top-us-oil-gas-supplier-colonial-pipeline-allegedly-hit-by-eastern-european-ransomware-attack/?utm_source=rss&utm_medium=rss&utm_campaign=top-us-oil-gas-supplier-colonial-pipeline-allegedly-hit-by-eastern-european-ransomware-attack

Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast

Colonial Pipeline reported a cyber-attack that resulted in a halting of their fuel pipeline operations to the East Coast per sources including this Bloomberg article originally posted on May 8, 2021. Just days before the U.S. National Security Agency (NSA) called for a review of operational technology (OT) security in U.S. critical infrastructure operations.

“President Joe Biden, who’s spending the weekend at Camp David, was briefed on the incident Saturday morning, the White House said,” per the Bloomberg article. “Hacking threats to critical infrastructure have been growing, prompting the White House to respond last month with a plan to try to increase the security of utilities and their suppliers. Pipelines are a specific concern because they play a central role in so many parts of the U.S. economy.”

“Colonial is a key artery for the eastern half of the U.S. It’s the main source of gasoline, diesel and jet fuel for the East Coast with its system from Houston as far as North Carolina, and New York.”

The largest in the U.S., Colonial Pipeline transports 2.5 million barrels or 100 million gallons per day of refined petroleum products or nearly half of the East Coast’s fuel supplies. Per Bloomberg, Colonial Pipeline reported its 5,500-mile pipeline operation was at a standstill.

The post Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast appeared first on Security Boulevard.

Read More

The post Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/ransomware-attack-shuts-down-fuel-pipeline-supplying-the-east-coast-4/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-attack-shuts-down-fuel-pipeline-supplying-the-east-coast-4

Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast

Colonial Pipeline reported a cyber-attack that resulted in a halting of their fuel pipeline operations to the East Coast per sources including this Bloomberg article originally posted on May 8, 2021. Just days before the U.S. National Security Agency (NSA) called for a review of operational technology (OT) security in U.S. critical infrastructure operations.

“President Joe Biden, who’s spending the weekend at Camp David, was briefed on the incident Saturday morning, the White House said,” per the Bloomberg article. “Hacking threats to critical infrastructure have been growing, prompting the White House to respond last month with a plan to try to increase the security of utilities and their suppliers. Pipelines are a specific concern because they play a central role in so many parts of the U.S. economy.”

“Colonial is a key artery for the eastern half of the U.S. It’s the main source of gasoline, diesel and jet fuel for the East Coast with its system from Houston as far as North Carolina, and New York.”

The largest in the U.S., Colonial Pipeline transports 2.5 million barrels or 100 million gallons per day of refined petroleum products or nearly half of the East Coast’s fuel supplies. Per Bloomberg, Colonial Pipeline reported its 5,500-mile pipeline operation was at a standstill.

The post Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast appeared first on Security Boulevard.

Read More

The post Ransomware Attack Shuts Down Fuel Pipeline Supplying the East Coast appeared first on Malware Devil.



https://malwaredevil.com/2021/05/09/ransomware-attack-shuts-down-fuel-pipeline-supplying-the-east-coast-3/?utm_source=rss&utm_medium=rss&utm_campaign=ransomware-attack-shuts-down-fuel-pipeline-supplying-the-east-coast-3

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...