News – March 2019


  • NSA releases Ghidra, a free software reverse engineering toolkit

    March 6, 2019

    At the RSA security conference today, the National Security Agency, released Ghidra, a free software reverse engineering tool that the agency had been using internally for well over a decade. The tool is ideal for software engineers, but will be especially useful for malware analysts first and foremost. The NSA’s general plan was to release Ghidra so ...

  • Google reveals Chrome zero-day under active attacks

    March 6, 2019

    Google revealed yesterday that a patch for Chrome last week was actually a fix for a zero-day that was under active attacks. The attacks exploited CVE-2019-5786, a security flaw and the only patch included in the Chrome 72.0.3626.121 version, released last Friday, March 1, 2019. According to an update to its original announcement and a tweet from Google Chrome’s security lead, ...

  • Data-Wiping Cyberattacks Plague Financial Firms

    March 6, 2019

    Over a quarter of surveyed financial institutions reported that they were targeted by destructive cyberattacks over the past year, bent on completely destroying data. That’s according to a new Carbon Black report unveiled at RSA this year. The report, “Modern Bank Heists: The Bank Robbery Shifts to Cyberspace,” outlines the top attacks that financial firms are facing ...

  • Hide yo’ kids, hide yo’ clouds: Zerodium offering big bucks for cloud zero-days

    March 5, 2019

    Exploit vendor Zerodium announced today plans to pay a whopping $500,000 for zero-days in popular cloud technologies like Microsoft’s Hyper-V and (Dell) VMware’s vSphere. Both Hyper-V and vSphere are what experts call virtualization software, also called hypervisors –software that lets a single “host” server create and run one or more virtual “guest” operating systems. Virtualization software is ...

  • Saudi app used to track women ‘not against’ Google rules

    March 4, 2019

    Google has remained silent over reports it told a US congresswoman that a controversial app was not in breach of its terms and conditions. Saudi app Absher can be used by men to track women and prevent them from travelling. The office of Jackie Speier confirmed to the BBC that a verbal conversation took place with Google ...

  • IoT Devices Under Constant Attack

    March 4, 2019

    ‘Secure your IoT devices’ is the message from security specialist Cyxtera Technologies, after research found that IoT devices are now under constant attack. The research was conducted jointly by Cyxtera threat researcher Martin Ochoa and researchers from the Singapore University of Technology and Design. They detected more than 150 million connection attempts to 4,642 distinct IP addresses ...

  • Fileless Banking Trojan Targeting Brazilian Banks Downloads Possible Botnet Capability, Info Stealers

    March 4, 2019

    Trend Micro analyzed a fileless malware with multiple .BAT attachments and a batch file from IoCs reported by researchers online that was capable of opening an IP address, downloading a PowerShell with a banking trojan payload, and installing a hack tool and an information stealer. Looking further, we observed it stealing machine information and user ...

  • Researchers Link ‘Sharpshooter’ Cyber Attacks to North Korean Hackers

    March 4, 2019

    Security researchers have finally, with “high confidence,” linked a previously discovered global cyber espionage campaign targeting critical infrastructure around the world to a North Korean APT hacking group. Thanks to the new evidence collected by researchers after analyzing a command-and-control (C2) server involved in the espionage campaign and seized by law enforcement. Dubbed Operation Sharpshooter, the cyber espionage ...

  • How the Dark Web Data Bazaar Fuels Enterprise Attacks

    March 3, 2019

    It seems every aspect of our lives is available to be found somewhere on the internet. And the information available isn’t simply embarrassing browsing histories but ranges from our medical histories to the logon credentials we use to access many of our online services. This is certainly a privacy concern, but it’s also increasingly an enterprise ...

  • New exploit lets attackers take control of Windows IoT Core devices

    March 2, 2019

    Speaking at a conference today, a security researcher has revealed a new exploit impacting the Windows IoT Core operating system that gives threat actors full control over vulnerable devices. The vulnerability, discovered by Dor Azouri, a security researcher for SafeBreach, impacts the Sirep/WPCon communications protocol included with Windows IoT operating system. Azouri said the vulnerability only impacts Windows ...

  • Necurs Botnet Evolves to Hide in the Shadows, with New Payloads

    March 1, 2019

    Necurs, the prolific and globally dispersed spam and malware distribution botnet, has been spotted using a fresh hiding technique to avoid detection while quietly adding more bots to its web. According to research from Black Lotus Labs, which is telecom and ISP provider CenturyLink’s network security arm, Necurs last year began implementing regular, sustained downtime segments ...

  • RSA Security Conference: The race to plug a $6 trillion security hole

    March 1, 2019

    More than 50 thousand of the world’s top computer security professionals will be in San Francisco this week for the RSA Conference. While they talk, the hole in the cybersecurity world is getting bigger every year and is on track to swallow $6 trillion in annual damages by 2021 — a doubling from $3 trillion in ...