Malware Devil

Sunday, May 23, 2021

CPDP 2021 – Moderator: Seda Gürses ‘Connecting The Dots: Privacy, Data, Racial Justice’

Speakers: Yasmine Boudiaf, Sarah Chander, Nakeema Stefflbauer, Nani Jansen Reventlow, Seeta Peña Gangadharan

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel. Enjoy!

Permalink

The post CPDP 2021 – Moderator: Seda Gürses ‘Connecting The Dots: Privacy, Data, Racial Justice’ appeared first on Security Boulevard.

Read More

The post CPDP 2021 – Moderator: Seda Gürses ‘Connecting The Dots: Privacy, Data, Racial Justice’ appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/cpdp-2021-moderator-seda-gurses-connecting-the-dots-privacy-data-racial-justice/?utm_source=rss&utm_medium=rss&utm_campaign=cpdp-2021-moderator-seda-gurses-connecting-the-dots-privacy-data-racial-justice

5 Growing Trends to Watch in Banking Cybersecurity

As Cybercrime against the Financial Sector Jumps by 238%, What Can Banks Do to Address the Risk? The rise of cybercrime in 2020 was widely reported, but did you realize how much of the threat was targeted at the financial sector? 80% of financial institutions have reported a rise in cyberattacks over the past 12 […]

The post 5 Growing Trends to Watch in Banking Cybersecurity appeared first on CybeReady.

The post 5 Growing Trends to Watch in Banking Cybersecurity appeared first on Security Boulevard.

Read More

The post 5 Growing Trends to Watch in Banking Cybersecurity appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/5-growing-trends-to-watch-in-banking-cybersecurity/?utm_source=rss&utm_medium=rss&utm_campaign=5-growing-trends-to-watch-in-banking-cybersecurity

Insurance Firm CNA Financial Reportedly Paid Hackers $40 Million in Ransom

U.S. insurance giant CNA Financial reportedly paid $40 million to a ransomware gang to recover access to its systems following an attack in March, making it one of the most expensive ransoms paid to date.

The development was first reported by Bloomberg, citing “people with knowledge of the attack.” The adversary that staged the intrusion is said to have allegedly demanded $60 million a week after the Chicago-based company began negotiations with the hackers, culminating in the payment two weeks following the theft of company data.

In a statement shared on May 12, CNA Financial said it had “no evidence to indicate that external customers were potentially at risk of infection due to the incident.”

The attack has been attributed to a new ransomware called ‘Phoenix CryptoLocker,’ according to a March report from Bleeping Computer, with the strain believed to be an offshoot of WastedLocker and Hades, both of which have been utilized by Evil Corp, a Russian cybercrime network notorious for launching ransomware attacks against several U.S. entities, including Garmin, and deploying JabberZeus, Bugat and Dridex to siphon banking credentials.

In December 2019, U.S. authorities sanctioned the hacking group and filed charges against Evil Corp’s alleged leaders Maksim Yakubets and Igor Turashev for developing and distributing the Dridex banking Trojan to plunder more than $100 million over a period of 10 years. Law enforcement agencies also announced a reward of up to $5 million for providing information that could lead to their arrest. Both the individuals remain at large.

The development comes amid a sharp uptick in ransomware incidents, in part fueled by the pandemic, with the average ransom payment witnessing a massive 171% gain year-over-year from $115,123 in 2019 to $312,493 in 2020. Last year also saw the highest ransomware demand growing to $30 million, not to mention the total amount paid by victims skyrocketing to $406 million, based on conservative estimates.

CNA Financial’s $40 million ransom only shows that 2021 continues to be a great year for ransomware, potentially emboldening cybercriminal gangs to seek bigger payouts and advance their illicit aims.

According to an analysis by ransomware recovery firm Coveware, the average demand for a digital extortion payment shot up in the first quarter of 2021 to $220,298, up 43% from Q4 2020, out of which 77% of the attacks involved the threat to leak exfiltrated data, an increasingly prevalent tactic known as double extortion.

While the U.S. government has routinely advised against paying ransoms, the high stakes associated with data exposure have left victims with little choice but to settle with their attackers. In October 2020, the Treasury Department issued a guidance warning of penalties against companies making ransom payments to a sanctioned person or group, prompting ransomware negotiation firms to avoid cutting a deal with blocked groups such as Evil Corp to evade legal action.

“Companies that facilitate ransomware payments to cyber actors on behalf of victims, including financial institutions, cyber insurance firms, and companies involved in digital forensics and incident response, not only encourage future ransomware payment demands but also may risk violating [Office of Foreign Assets Control] regulations,” the department said.

The surge in ransomware attacks has also had an impact on the cyber insurance industry, what with AXA announcing earlier this month that it will stop reimbursing clients in France should they opt to make any extortion payments to ransomware cartels, underscoring the dilemma that “insurance firms grapple with successfully underwriting ransomware policies while confronted with rising payout costs that threaten profitability.”

Indeed, a report released by the U.S. Government Accountability Office (GAO) on Thursday revealed that the soaring demand for cyber insurance has driven insurers to raise premiums and limit coverage. The amount of total direct premiums written jumped by 50% between 2016 and 2019, from $2.1 billion to $3.1 billion. Higher insurer losses stemming from debilitating ransomware attacks are also a factor, the agency said.

“The continually increasing frequency and severity of cyberattacks, especially ransomware attacks, have led insurers to reduce cyber coverage limits for certain riskier industry sectors, such as health care and education, and for public entities and to add specific limits on ransomware coverage,” the government watchdog noted in the report.

To defend against ransomware attacks, it’s recommended to secure all modes of initial access exploited by threat actors to infiltrate networks, maintain periodic data backups, and keep an appropriate recovery process in place.

“Organizations should maintain user awareness and training for email security as well as consider ways to identify and remediate malicious email as soon as it enters an employee’s mailbox,” Palo Alto Networks’ Unit 42 researchers said.

“Organizations should also ensure they conduct proper patch management and review which services may be exposed to the internet. Remote desktop services should be correctly configured and secured, using the principle of least privilege wherever possible, with a policy in place to detect patterns associated with brute-force attacks.”

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read More

The post Insurance Firm CNA Financial Reportedly Paid Hackers $40 Million in Ransom appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/insurance-firm-cna-financial-reportedly-paid-hackers-40-million-in-ransom-3/?utm_source=rss&utm_medium=rss&utm_campaign=insurance-firm-cna-financial-reportedly-paid-hackers-40-million-in-ransom-3

[VK.com] critical – CSRF ?? ????????? ????? ????? ? ????????.

Google Chrome


Download latest

Mozilla Firefox


Download latest

Opera


Download latest

Apple Safari


Upgrade your OS

Microsoft Internet Explorer


Download latest

Read More

The post [VK.com] critical – CSRF ?? ????????? ????? ????? ? ????????. appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/vk-com-critical-csrf/?utm_source=rss&utm_medium=rss&utm_campaign=vk-com-critical-csrf

[Ubiquiti Inc.] high – Web Server Predictable Session ID on EdgeSwitch

Read More

The post [Ubiquiti Inc.] high – Web Server Predictable Session ID on EdgeSwitch appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/ubiquiti-inc-high-web-server-predictable-session-id-on-edgeswitch-2/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-web-server-predictable-session-id-on-edgeswitch-2

[Ubiquiti Inc.] high – Readonly to Root Privilege Escalation on EdgeSwitch

Read More

The post [Ubiquiti Inc.] high – Readonly to Root Privilege Escalation on EdgeSwitch appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/ubiquiti-inc-high-readonly-to-root-privilege-escalation-on-edgeswitch-2/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-readonly-to-root-privilege-escalation-on-edgeswitch-2

[Ubiquiti Inc.] high – SNMP Community String Disclosure to ReadOnly Users on EdgeSwitch

Read More

The post [Ubiquiti Inc.] high – SNMP Community String Disclosure to ReadOnly Users on EdgeSwitch appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/ubiquiti-inc-high-snmp-community-string-disclosure-to-readonly-users-on-edgeswitch-2/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-snmp-community-string-disclosure-to-readonly-users-on-edgeswitch-2

[Ubiquiti Inc.] high – View Only to Root Privilege Escalation on UniFi Protect

Read More

The post [Ubiquiti Inc.] high – View Only to Root Privilege Escalation on UniFi Protect appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/ubiquiti-inc-high-view-only-to-root-privilege-escalation-on-unifi-protect-2/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-view-only-to-root-privilege-escalation-on-unifi-protect-2

Video: Making Sense Of Encrypted Cobalt Strike Traffic, (Sun, May 23rd)

Brad posted another malware analysis with capture file of Cobalt Strike traffic.

The traffic is encrypted and the key is unknown. While it’s impossible to determine what exact commands were executed in this case, it is still possible to determine if commands were send by the C2 and if results were sent back.

I explain how in this video.

If you have proxy logs in stead of a packet capture, it’s possible to do the same analysis, provided that the proxy logs report how much data (size of HTTP headers and size of data) was exchanged.

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com DidierStevensLabs.com

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post Video: Making Sense Of Encrypted Cobalt Strike Traffic, (Sun, May 23rd) appeared first on Malware Devil.



https://malwaredevil.com/2021/05/23/video-making-sense-of-encrypted-cobalt-strike-traffic-sun-may-23rd/?utm_source=rss&utm_medium=rss&utm_campaign=video-making-sense-of-encrypted-cobalt-strike-traffic-sun-may-23rd

Saturday, May 22, 2021

[QIWI] critical – SSRF ?? https://qiwi.com ? ??????? “Prerender HAR Capturer” (1500.00USD)

Google Chrome


Download latest

Mozilla Firefox


Download latest

Opera


Download latest

Apple Safari


Upgrade your OS

Microsoft Internet Explorer


Download latest

Read More

The post [QIWI] critical – SSRF ?? https://qiwi.com ? ??????? “Prerender HAR Capturer” (1500.00USD) appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/qiwi-critical-ssrf-https-qiwi-com-prerender-har-capturer-1500-00usd/?utm_source=rss&utm_medium=rss&utm_campaign=qiwi-critical-ssrf-https-qiwi-com-prerender-har-capturer-1500-00usd

[Ubiquiti Inc.] high – View Only to Root Privilege Escalation on UniFi Protect

Google Chrome


Download latest

Mozilla Firefox


Download latest

Opera


Download latest

Apple Safari


Upgrade your OS

Microsoft Internet Explorer


Download latest

Read More

The post [Ubiquiti Inc.] high – View Only to Root Privilege Escalation on UniFi Protect appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/ubiquiti-inc-high-view-only-to-root-privilege-escalation-on-unifi-protect/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-view-only-to-root-privilege-escalation-on-unifi-protect

[Ubiquiti Inc.] high – Readonly to Root Privilege Escalation on EdgeSwitch

Google Chrome


Download latest

Mozilla Firefox


Download latest

Opera


Download latest

Apple Safari


Upgrade your OS

Microsoft Internet Explorer


Download latest

Read More

The post [Ubiquiti Inc.] high – Readonly to Root Privilege Escalation on EdgeSwitch appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/ubiquiti-inc-high-readonly-to-root-privilege-escalation-on-edgeswitch/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-readonly-to-root-privilege-escalation-on-edgeswitch

[Ubiquiti Inc.] high – SNMP Community String Disclosure to ReadOnly Users on EdgeSwitch

Google Chrome


Download latest

Mozilla Firefox


Download latest

Opera


Download latest

Apple Safari


Upgrade your OS

Microsoft Internet Explorer


Download latest

Read More

The post [Ubiquiti Inc.] high – SNMP Community String Disclosure to ReadOnly Users on EdgeSwitch appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/ubiquiti-inc-high-snmp-community-string-disclosure-to-readonly-users-on-edgeswitch/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-snmp-community-string-disclosure-to-readonly-users-on-edgeswitch

[Ubiquiti Inc.] high – Web Server Predictable Session ID on EdgeSwitch

Google Chrome


Download latest

Mozilla Firefox


Download latest

Opera


Download latest

Apple Safari


Upgrade your OS

Microsoft Internet Explorer


Download latest

Read More

The post [Ubiquiti Inc.] high – Web Server Predictable Session ID on EdgeSwitch appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/ubiquiti-inc-high-web-server-predictable-session-id-on-edgeswitch/?utm_source=rss&utm_medium=rss&utm_campaign=ubiquiti-inc-high-web-server-predictable-session-id-on-edgeswitch

Default Windows Font May Change With Windows 10 Update

Microsoft has a history of being notoriously slow to change.

Just to cite one example, the company’s venerable “Paint” application has been in the mix since the earliest days of Windows. Although it was relatively feature-poor and under-powered even back when it was introduced, the company never made any effort to improve on it.

They only recently gave it a face lift with the development of Paint 3D, which itself was relatively poorly received.

With that in mind, it’s big news when the company recently announced that they were changing the default Windows font. The new font, available for a sneak peak right now via the Windows 10 Insider Build #21376 is called Segoe UI Variable.

Naturally, given that it’s Microsoft, this is more of an incremental change, rather than a fundamental one. The company has, after all, been using a different font from the Segoe UI font family in all of their branding and marketing materials, and in the other applications they have developed. So, while it’s a change, it’s actually a rather smallish one. Nonetheless, for a company that has a history of reluctance on that front, even a smallish change is significant.

As to the reasons why, according to the Windows Insider build release notes:

“We are introducing Segoe UI Variable which includes an optical axis so that font outlines can scale seamlessly from small to larger display sizes. Segoe UI Variable is a refreshed take on the classic Segoe, now with improved legibility at small sizes, and much improved outlines at display sizes.”

And there you have it. The Segoe UI Variable font dynamically scales, and does so without seriously impacting font legibility.

While it’s certainly noteworthy, by itself, that wouldn’t be enough to rush out and grab the latest Windows Insider build to play around with. Naturally though, the latest build comes with a raft of enhancements and bug fixes, and taken together, it’s well worth a look.

Used with permission from Article Aggregator

Read More

The post Default Windows Font May Change With Windows 10 Update appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/default-windows-font-may-change-with-windows-10-update/?utm_source=rss&utm_medium=rss&utm_campaign=default-windows-font-may-change-with-windows-10-update

CPDP 2021 – Moderator: Samson Esayas ‘Global AI Governance: Perspectives From Four Continents’

Sofia Ranchordas (European Union Perspective), Adam Nagy (US Perspective), Angela Daly (Australian and Asia Pacific Perspective), Celina Bottino Beatriz (Latin America Perspective)

Our sincere thanks to CPDP 2021 – Computers, Privacy & Data Protection Conference for publishing their well-crafted videos on the organization’s YouTube channel. Enjoy!

Permalink

The post CPDP 2021 – Moderator: Samson Esayas ‘Global AI Governance: Perspectives From Four Continents’ appeared first on Security Boulevard.

Read More

The post CPDP 2021 – Moderator: Samson Esayas ‘Global AI Governance: Perspectives From Four Continents’ appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/cpdp-2021-moderator-samson-esayas-global-ai-governance-perspectives-from-four-continents/?utm_source=rss&utm_medium=rss&utm_campaign=cpdp-2021-moderator-samson-esayas-global-ai-governance-perspectives-from-four-continents

The Joy of Tech® ‘The New Cigarettes!’

via the Comic Noggins of Nitrozac and Snaggy at The Joy of Tech®!

Permalink

The post The Joy of Tech® ‘The New Cigarettes!’ appeared first on Security Boulevard.

Read More

The post The Joy of Tech® ‘The New Cigarettes!’ appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/the-joy-of-tech-the-new-cigarettes/?utm_source=rss&utm_medium=rss&utm_campaign=the-joy-of-tech-the-new-cigarettes

FBI Warns Conti Ransomware Hit 16 U.S. Health and Emergency Services

The adversary behind Conti ransomware targeted no fewer than 16 healthcare and first responder networks in the U.S. within the past year, totally victimizing over 400 organizations worldwide, 290 of which are situated in the country.

That’s according to a new flash alert issued by the U.S. Federal Bureau of Investigation (FBI) on Thursday.

“The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers, and municipalities within the last year,” the agency said.

Ransomware attacks have worsened over the years, with recent targets as varied as state and local governments, hospitals, police departments, and critical infrastructure. Conti is one of many ransomware strains that have capitulated on that trend, commencing its operations in July 2020 as a private Ransomware-as-a-Service (RaaS), in addition to jumping on the double extortion bandwagon by launching a data leak site.

Based on an analysis published by ransomware recovery firm Coveware last month, Conti was the second most prevalent strain deployed, accounting for 10.2% of all the ransomware attacks in the first quarter of 2021.

Infections involving Conti have also breached the networks of Ireland’s Health Service Executive (HSE) and Department of Health (DoH), prompting the National Cyber Security Centre (NCSC) to issue an alert of its own on May 16, stating that “there are serious impacts to health operations and some non-emergency procedures are being postponed as hospitals implement their business continuity plans.”

Conti operators are known for infiltrating enterprise networks and spreading laterally using Cobalt Strike beacons prior to exploiting compromised user credentials to deploy and execute the ransomware payloads, with the encrypted files renamed with a “.FEEDC” extension. Weaponized malicious email links, attachments, or stolen Remote Desktop Protocol (RDP) credentials are some of the tactics the group used to gain an initial foothold on the target network, the FBI said.

“The actors are observed inside the victim network between four days and three weeks on average before deploying Conti ransomware,” the agency noted, adding the ransom amounts are tailored to each victim, with recent demands ratcheting up to as high as $25 million.

The alert also comes amid a proliferation of ransomware incidents in recent weeks, even as extortionists continue to seek exorbitant prices from companies in hopes of landing a huge, quick payday. Insurance major CNA Financial is said to have paid $40 million, while Colonial Pipeline and Brenntag have each shelled out nearly $4.5 million to regain access to their encrypted systems.

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read More

The post FBI Warns Conti Ransomware Hit 16 U.S. Health and Emergency Services appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/fbi-warns-conti-ransomware-hit-16-u-s-health-and-emergency-services-2/?utm_source=rss&utm_medium=rss&utm_campaign=fbi-warns-conti-ransomware-hit-16-u-s-health-and-emergency-services-2

FBI Warns Conti Ransomware Hit 16 U.S. Health and Emergency Services

The adversary behind Conti ransomware targeted no fewer than 16 healthcare and first responder networks in the U.S. within the past year, totally victimizing over 400 organizations worldwide, 290 of which are situated in the country.
That’s according to a new flash alert issued by the U.S. Federal Bureau of Investigation (FBI) on Thursday.
“The FBI identified at least 16 Conti ransomware attacks
Read More

The post FBI Warns Conti Ransomware Hit 16 U.S. Health and Emergency Services appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/fbi-warns-conti-ransomware-hit-16-u-s-health-and-emergency-services/?utm_source=rss&utm_medium=rss&utm_campaign=fbi-warns-conti-ransomware-hit-16-u-s-health-and-emergency-services

Air India Hack Exposes Credit Card and Passport Info of 4.5 Million Passengers

India’s flag carrier airline, Air India, has disclosed a data breach affecting 4.5 million of its customers over a period stretching nearly 10 years after its Passenger Service System (PSS) provider SITA fell victim to a cyber attack earlier this year.

The breach involves personal data registered between Aug. 26, 2011 and Feb. 3, 2021, including details such as names, dates of birth, contact information, passport information, ticket information, Star Alliance, and Air India frequent flyer data as well as credit card data. But Air India said neither CVV/CVC numbers associated with the credit cards nor passwords were affected.

The airline had previously acknowledged the breach on March 19, stating that “its Passenger Service System provider has informed about a sophisticated cyber attack it was subjected to in the last week of February 2021.”

In March, Swiss aviation information technology company SITA disclosed it suffered a “highly sophisticated attack” on its servers located in Atlanta, leading to a compromise of passenger data stored in its PSS system. SITA PSS is used by many carriers for processing airline passenger data as part of their frequent flyer programs.

With the latest development, Air India joins a long list of airlines, such as Lufthansa, Cathay Pacific, Air New Zealand, Singapore Airlines, Scandinavian Airlines (SAS), Finnair, Malaysia Airlines, South Korea’s Jeju Air, American Airlines, and United Airlines that have been impacted by the data security incident.

As part of its investigation into the event, Air India said it engaged external specialists and that it notified credit card issuers of the issue, besides resetting passwords of its frequent flyer program. The airline is also urging users to change passwords wherever applicable to thwart potential unauthorized attempts and ensure the safety of their personal data.

Found this article interesting? Follow THN on Facebook, Twitter and LinkedIn to read more exclusive content we post.

Read More

The post Air India Hack Exposes Credit Card and Passport Info of 4.5 Million Passengers appeared first on Malware Devil.



https://malwaredevil.com/2021/05/22/air-india-hack-exposes-credit-card-and-passport-info-of-4-5-million-passengers-2/?utm_source=rss&utm_medium=rss&utm_campaign=air-india-hack-exposes-credit-card-and-passport-info-of-4-5-million-passengers-2

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...