Technical details of critical vulnerabilities in Apple Safari web browser and iOS were revealed by a Chinese cybersecurity researcher
Technical details of critical vulnerabilities in Apple Safari web browser and iOS were revealed by a Chinese cybersecurity researcher, which could possibly pave access for a remote attacker to jailbreak and compromise victims using iPhoneX running iOS 12.1.2 and before versions. To do so, all the attacker needs is to deceive iPhoneX users to open a crafted web page through the usage of Safari browser. Moreover, finding flaws and launching an exploit isn’t simple for every iOS hacker. Qixun Zhao of Qihoo 360’s Vulcan team was the first to discover this remote Jailbreak exploit, which is formed by the synthesis of two vulnerabilities, (CVE-2019-6227) in Apple and (CVE-2019-625) in iOS Kernel. The Safari flaw allows the malicious web content to run arbitrary code on the targeted device and then uses the second bug to ascend privileges and to install a malicious application, covertly. Nevertheless, the researcher decides not to publish the malicious code for iOS jailbreak in a bid to prevent malicious attacks against Apple Users. Hence, it is greatly advised for iPhone users to install the latest iOS updates without procrastination, instead of waiting for another jailbreak
Dublin IRISH tram operator ‘Luas’ website is defaced after being targeted by ackers in a crave for bitcoin. Dublin IRISH tram operator ‘Luas’ website is defaced after being targeted by hackers in acrave for bitcoin. The hacker through a message claims to have breached security and to have publish “all data’s” if ransom isn’t paid within 5 days. Luas in a statement has confirmed this morning that their “website is compromised and defaced”. They also said that they will only use twitter for any travel updates in the meantime. They further added that, “Please do not click on Luas website as it is down. We have technicians striving to resolve this issue as fast as possible. For any queries, dial our customer care number on 1850 300 604.”
cybersecurity experts on the sizzling topic, “Is HTTP’s usage favourable (or) software’s that only rely on signature based package verification favourable,
Argument between cybersecurity experts on the sizzling topic, “Is HTTP’s usage favourable (or) software’s that only rely on signature based package verification favourable, as APT on Linux does the same” has been brooding over twitter. Paradoxically, a security nerd exposed the details of a new critical remote code execution flaw in the apt-get utility which can be exploited by Man-In-The-Middle (MITM) attacks that are swift in compromising Linux machines. The error again proves if HTTPS is used for communication, such attacks can be alleviated easily. The vulnerability (CVE-2019-3462) was discovered by Max Justicz and it resides in APT package manager. It is a widely used utility that handles the installation, update and software removal on Debian, Ubuntu and on other Linux distributions. APT HTTP redirect helps Linux machines to automatically find compatible server for downloading software packages when others aren’t available. If 1st server fails, it returns a response from the adjacent server, thus ensuring robustness. No software, platform or server can be tagged with the brand as “100% secure”. Hence, adopting the ideology of a proactive approach towards security with defence-in-depth is always like a “welcoming a blessing”. apt-get update is a part of various Linux distributions that comprises of Debian and Ubuntu. During mire situation, they acknowledge the flaws and release suitable security updates to fix the error. Hence, it is an undeniable indispensability for Linux users to update their systems without excuses.
Two distinctive group of hackers have been busted by the Ukrainian Police for launching DDoS attacks against news agencies and for stealing money from Ukrainian citizensTwo distinctive group of hackers have been busted by the Ukrainian Police for launching DDoS attacks against news agencies and for stealing money from Ukrainian citizens.The arrested two groups contained 4 hackers of 26-30 years whom stole more than 5 million Hryvnia (around 178,380 USD) from the accounts of Ukrainian citizens. The suspects executed their attacks by assessing vulnerable computers, corrupting them through Trojan malwares and using key-logging software technique on infected systems for capturing credentials. Once they gained access to financial data’s, the perpetrators transferred the funds to their own accounts. Perhaps these, they have left a backdoor as a beneficiary for future plans execution. As per authorities, the duo developed a couple of DDoS tools which sends many automatic queries to targets, every second. The duo are facing the brunt of their retrospection deeds, by experiencing 6 years imprisonment under the article 361 of the Criminal Code of Ukraine.
The news “The Shadow Brokers” and “The arrest of a NSA contractor convicted of stealing 50 Terabytes” are storming heavily throughout cosmos. The news “The Shadow Brokers” and “The arrest of a NSA contractor convicted of stealing 50 Terabytes” are storming heavily throughout cosmos. Kaspersky lab-The one banned in US government over human espionage fears is the one who tipped off the U.S government and helped FBI to catch NSA contractor T.Martin 111, post which the U.S government arrested him. The breach is believed to be the largest heist in America’s history, far bigger than Edward Snowden. Martin, who is about to go on trial in June, is currently facing 20 counts of unauthorized and wilful retention of national defence information. Ironically, Martin was arrested when FBI was engaged in an aggressive campaign against Kaspersky Labs in 2016. At the time of his arrest in August 2016, Martin worked for Booz Allen. It’s the same company that exposed the secret surveillance programs carried out by NASA through Edward Snowden.
Millions of sensitive government files of about 3 terabytes, belonging to the Oklahoma Department of Securities (ODS), were left exposed on an unsecured server over a week
Millions of sensitive government files of about 3 terabytes, belonging to the Oklahoma Department of Securities (ODS), were left exposed on an unsecured server over a week (found through Snoden). The unsecured server discovered by Greg Pollock, a researcher of cybersecurity firm ‘UpGuard’ also contained various decades worth of confidential case files, emails, social security numbers, names, addresses and list of PII (Personal Identifiable Information) with all open without password. Post the notification to ODS department by the UpGuard research team, the state agency removed the ‘public access’. It is still hazy about the fact, “Has anyone else accessed it”. If accessed in an unauthorized way, then the loss would be loathsome. The firm also detected that hackers remotely accessed the state agency’s workstations, login information and passwords for several internet services as well as for a popular antivirus software. Regarding to this incident, Oklahoma Department of Securities said,” a vulnerability was discovered and was rapidly secured in the server”. Alongside this, the issue is taken seriously and a forensic investigation is also hired. The department is in a pursuit for remedial action of anyone’s uncertainty over anyone’s information, internal policies and security measures for ensuring the fortification of such incidents in future
Magecart 12- a new subgroup of Magecart, has struck again by compromising 277 e-commerce websites through supply-chain attacks
Magecart 12- a new subgroup of Magecart, has struck again by compromising 277 e-commerce websites through supply-chain attacks, reports security researchers. Magecart are a digital credit card skimmers whom launched attacks against gigantic firms like Ticketmaster, British Airways and Newegg. Magecart hackers compromise e-commerce sites and inflict dreadful JavaScript code that secretly seizes the payment data’s of customers and then send it to the remote server. However, researchers from two firms revealed that Magecart group 12 hacked and infiltrated its skimming code into a 3rd party JavaScript library for enabling websites using that script to load malicious code. The targeted 3rd party library is a French online advertising company called as Adverline, whose service is used by many European e-commerce websites to display ads. Security researcher Yonathan Klijnsma at RiskIQ discovered that Magecart Group 12 shields from deobfuscation and analysis by doing an integrity check on itself twice. If any of infected ones are detected, the script starts to carry out skimming behaviour by copying both from name and values. The pilfered data’s are stored in JavaScript local storage under the key name `Cache’ in Base64 format. Code generates a random number for specifying individual victims which then gets stored into local storage with key name E-tag.
Security researchers have warned people that cyber criminals and emailscammers are being used to bypass security features of Microsoft office 365, including Safe links. Security researchers have warned people that cyber criminals and email scammers are being used to bypass security features of Microsoft office 365, including Safe links. These Safe links are originally designed to protect users from malware and phishing attacks. They are included by Microsoft in Office 365 as an ATP (Advanced Threat Protection). Therefore, every time when users click on the link, Safe links first send them to Microsoft owned domain for checking suspicion. If Microsoft finds something malicious, it warns about it and if ain’t, then it redirects to the original link. Researchers revealed that Safe Links URL protection features have been bypassed using Zero-Width-Spaces (ZWPs). Zero-Width-Spaces are non-printing
Half of the world flight travellers were exposed to a critical vulnerability in an online flight booking system
Half of the world flight travellers were exposed to a critical vulnerability in an online flight booking system which gave access for remote hackers to modify the users travel details and claim their frequent flyer miles. This vulnerability was discovered by an Israel network security researcher named as Noam Rotem, while booking a flight on Israeli airline ELAL, which needed just the victim’s PNR (Passenger Name Record) number. The traveller receives PNR number and a unique link after booking a flight with ELAL which allows the customers for finding their booking status and other information linked with PNR. Rotem revealed that by changing the value of “RULE_SOURCE_1_ID” parameter on that link to someone else PNR number can display the personal and booking-related data’s associated with it. Rotem also revealed that Amadeus portal wasn’t using any brute-force protection through which hackers can figure out all the active PNR numbers of customers linked with Amadeus airline website. As the Amadeus booking system is being used at least by 141 airlines, millions of travellers can be affected. After discovering the vulnerability, Rotem contacted ELAL and suggested airline defensive mechanisms to prevent against brute-force attempts. Post information, Amadeus has immediately fixed the issue. When contacted them, they said “Our technical teams took immediate action, and we can now confirm that the issue is solved."
Check Point researchers discovered many security vulnerabilities in Fortnite
Check Point researchers discovered many security vulnerabilities in Fortnite (a familiar online game played by 80 million users), one of which allowed remote attackers to seize the player accounts by deceiving them to click a suspicious link. The reported Fortnite flaws comprised of SQL injection, cross-site scripting (XSS) bug, a web application firewall and an OAuth account takeover vulnerability. Players can log in to their game accounts using Single Sign-On (SSO) providers like Facebook, Google, Xbox and PlayStation accounts. According to researchers, combination of cross-site scripting (XSS) and malicious redirect issue allowed attackers to steal users authentication token by conjuring them to click on the link. Once data’s are compromised, attacker can access data’s and do whatever they want. One of the Epic Games had a SQL injection and a poorly-configured web application firewall vulnerability. If they were exploited, hackers would compromise it. Both Checkpoint and Epic Games, advise users to enable 2FA (two-factor authentication) for ensuring digital safety.
A California based Voice-Over-IP (VoIP) services provider has accidently left tens of gigabytes of customer data
A California based Voice-Over-IP (VoIP) services provider has accidently left tens of gigabytes of customer data that contains millions of call logs, SMS/MMS messages and plaintext internal system credentials which are publicly accessible by anyone without authentication. Justin Paine, the head of Trust and Safety at CloudFlare found an open ElasticSearch database last week using Shodan search engine. The database contained 6.7 million call logs on July 2017, 6 million SMS/MMS on December 2015 and 1 million logs containing API key. The call logs included timestamp and duration of VOIPO customers. The SMS and MMS included full content of messages. Apart from these, the exposed database had 1 million logs with many data’s. These sensitive data’s were exposed since 3rd June, 2018. The company of VOIPO said this was development server issue. Paine had an estimation that the leaked plaintext credentials were production based. The researcher also notified VOIPO about the unsecured ElasticSearch database on 8th January, 2019. The tragic truth is that, this isn’t the 1st but 2nd time in this month where data exposure has been identified.
Qualys researchers discovered 3 vulnerabilities CVE-2018-16864, CVE- 2018-16865 and CVE-2018-16866 in Systemd. Qualys researchers discovered 3 vulnerabilities CVE-2018-16864, CVE-2018-16865 and
CVE-2018-16866 in Systemd. It is a familiar init system and service manager for most Linux operating systems that allows unprivileged local hackers to gain root access. However, some Linux distros like SUSE Linux Enterprise 15, openSUSE Leap 15.0 and Fedora 28 and 29 aren’t affected as their user space is compiled with GCC’s fstack cash protection. The 1st two flaws are memory rupture issues while the latter is capable of sensitive memory data exposure. To prevent these vulnerabilities from spearheading your Linux system, install the patches and be synchronized with updates, immediately upon their release.
A set of 36 year-old vulnerabilities was uncovered in Secure Copy Protocol (SCP) implementation of various client applications.
A set of 36 year-old vulnerabilities was uncovered in Secure Copy Protocol (SCP) implementation of various client applications. Session Control Protocol (SCP) is a network protocol meant for users to transfer files securely between local host and a remote host using RCP (Remote Copy Protocol) and SSH protocol. It was discovered by Harry Sintonen, one of the F-Secure’s senior Security Consultants saying that vulnerabilities exist due to improper validations. As per the advisory, many vulnerabilities were found in 2018 August which comprised of OpenSSH, Putty and WinSCP. • SCP client improper directory name validation (CVE-2018-20685): A vulnerable SCP allows a remote SCP server to gain access and modify the contents. • SCP client missing received object name validation (CVE-2019-6111): Allows harmful SCP server to overwrite arbitrary files in SCP directory. • SCP client spoofing via object name (CVE-2019-6109): The client output can be tricked in progress display if missing character is encoded during progress display. • SCP client spoofing via stderr (CVE-2019-6110): Allows infected server to alter the client output. Since the vulnerabilities affect the implementation of SCP protocol, the files transferred through it are also affected. If you’re worried of malicious SCP server, use SFTP (Secure FTP), for better safety.
Cybersecurity researcher discovered that more than 202 million citizen’s records of 854.8 gigabytes were accessible to anyone on Internet, Cybersecurity researcher discovered that more than 202 million citizen’s records of 854.8
gigabytes were accessible to anyone on Internet, hosted by an American server hosting company. The compromised database included names, date of birth, phone number, email address, work experience and other personal stuff’s. Bob Dianchenko, director of cyber risk research says that, “Someone could have used an old resume scraping tool called as ‘data-import’ for gleaning these jobseekers resumes, from Chinese websites like
bj.58.com.” ”Diachenko also communicated with BJ.58.com team who told that the leaked data didn’t initiate from its website but from its 3rd party vendor. "We have searched all over the database of us and investigated all the other storage,turned out that the sample data is not leaked from us," BJ.58.com confirmed Diache
A zero day vulnerability, which makes a remote attacker to carry arbitrary codes on Windows machine was detected by and reported to Microsoft security team, by John Pag
A zero day vulnerability, which makes a remote attacker to carry arbitrary codes on Windows machine was detected by and reported to Microsoft security team, by John Page. The vulnerability resides within the processing of a vCard file which is also braced by Microsoft Outlook. According to a researcher, a remote attacker can craft VCard file in zipped format or through drive-by-download techniques. Crafted data in a VCard file can causes Windows for displaying a hazardous hyperlink, researcher said. The user interface fails to give an indication of the hazard and hence, an attacker can use this vulnerability for executing code in the context of current user. The researcher who published the proof-of-concept exploit code has been assigned a CVSS 3.0 score of 7.8.
Presented on oct 2018, Repercussions-US voter records leaked for sale in Hackers Forum.
An unlawful offering of a batch of U.S voter registration records appeared for online sale from 20 states which highlights the lax controls often being induced to voter records.The sinful trading of data’s via web forum was detected and reported by two security companies Anomali labs and Intel 471. The data’s that are least protected are the ones that contain the sensitive personal information which if obtained at the wrong hands might really cause unimaginable mayhem’s. Aetna Hit With More Penalties for two breaches."On Oct. 4, the Department of Defense identified a breach of personally identifiable information of DoD personnel which was identified by the department of defense on Oct 4th that required congressional notification. Lt. Col. Joseph Buccino, a Pentagon spokesman, tells Information Security Media Group,"The department is progressing to accumulate more information about the incident, which involves the possible compromise of personally identifiable information (PII) of DoD personnel, maintained by a single commercial vendor that facilitated travel management services to the department.
One of the familiar company in California Health tech maintained a fax that wasn't properly secured reports a Dubai based cybersecurity Company named as SpiderSilk The fax server was running an Elasticsearch database thatcontained more than 6 million records The server was left unprotected without a password According to HIPAA if any other medical company fails to implement competent security, thefty fine will be levied on them.
800,000 blood donors in Singapore, a Californian medical software company, and electronics smartphone retailer Gearbest, all these three have suffered cyber breaches recently. The cause of breach is due to misconfigured and insecure servers, and fragile security controls. Due to this, many customers data were pilfered. To thwart such attacks, companies must equip flexible and cost effective solutions.
A bug named as JIT was discovered in Tesla Model 3 in a Pwn2Own contest. The hack guys were named as Richard Zhu and Amat Cam. Together, they’re known as Fluoroacetate and triumphantly demonstrated their research one Model 3 internet browser. For their remarkable work, they were gifted with a whopping bounty of $375,000. Just like honey on cream, they were also gifted with a splendid electric sedan vehicle.
Toyota Motor Corporation (TMC), a car company in Japan was affected by a data breach. The breach exposed the personal information of a million Japanese customers. The exposed information encompassed names, dates of birth, occupation, and much more. The little consoling factor was that, no financial information was disclosed. This is the 2nd time Toyota has been hacked. Officials confirmed that they were working on mitigations.