Author Archives: CIRT Team



CIRT Team

in News Clipping

Android Apps Capture Loudspeaker Data Without Any Permission [thehackernews]

Earlier this month, The Hacker News covered a story on research revealing how over 1300 Android apps are collecting sensitive data even when users have explicitly denied the required permissions. The research was primarily focused on how app developers abuse multiple ways around to collect location data, phone identifiers, and MAC addresses of their users by exploiting both covert and side channels. Now, a separate team of...

Read More

0
18 Jul 2019
in News Clipping

EvilGnome: A New Backdoor Implant Spies On Linux Desktop Users [thehackernews]

Security researchers have discovered a rare piece of Linux spyware that’s currently fully undetected across all major antivirus security software products, and includes rarely seen functionalities with regards to most Linux malware, The Hacker News learned. It’s a known fact that there are a very few strains of Linux malware exist in the wild as compared to Windows viruses because of its core architecture and...

Read More

0
18 Jul 2019
in News Clipping

MALWARE ALERT: An ‘Agent Smith’ Virus Has Infected 25 Million Phones

If you own an Android device, it might already be infected with a dangerous malware called Agent Smith, named after the menacing character in The Matrix. The malware’s already infected around 25 million Android devices globally, with thousands in Australia thought to be compromised. Here’s what you need to know. What is Agent Smith? As reported on Checkpoint, Agent Smith has been invading devices via dodgy third-party...

Read More

0
17 Jul 2019
Security Tip (ST19-003) Privacy and Mobile Device Apps
in Articles, English articles, News

Security Tip (ST19-003) Privacy and Mobile Device Apps

What are the risks associated with mobile device apps? Applications (apps) on your smartphone or other mobile devices can be convenient tools to access the news, get directions, pick up a ride share, or play games. But these tools can also put your privacy at risk. When you download an app, it may ask for permission to access personal information—such as email contacts, calendar inputs,...

Read More

0
16 Jul 2019
in Security Advisories & Alerts

Cisco Releases Security Updates for Multiple Products

Description: Cisco has released security updates to address a vulnerability in Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software. A remote attacker could exploit this vulnerability to cause a denial-of-service condition. Impact: A remote attacker could exploit this vulnerability to take control of an affected system. Mitigation: Updates are available. Please see the references or vendor advisory for more information. Reference URL’s: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190710-asa-ftd-dos

0
16 Jul 2019
in Security Advisories & Alerts

Atlassian Releases Security Updates for Jira

Description: Atlassian has released security updates to address a vulnerability affecting Jira Server and Jira Data Center. A remote attacker could exploit this vulnerability to take control of an affected system. Paragraph Impact: A remote attacker could exploit this vulnerability to take control of an affected system. Mitigation: Updates are available. Please see the references or vendor advisory for more information. Reference URL’s: https://confluence.atlassian.com/jira/jira-security-advisory-2019-07-10-973486595.html https://cyber.gc.ca/en/alerts/atlassian-confluence-security-advisory

0
16 Jul 2019
in News Clipping

Hackers Can Manipulate Media Files You Receive Via WhatsApp and Telegram

If you think that the media files you receive on your end-to-end encrypted secure messaging apps can not be tampered with, you need to think again. Security researchers at Symantec yesterday demonstrated multiple interesting attack scenarios against WhatsApp and Telegram Android apps, which could allow malicious actors to spread fake news or scam users into sending payments to wrong accounts. Dubbed “Media File Jacking,” the...

Read More

0
16 Jul 2019
in News Clipping

TA505 begins summer campaigns with a new pet malware downloader, AndroMut

Overview Throughout 2018, Proofpoint researchers observed threat actors increasingly distributing downloaders, backdoors, information stealers, remote access trojans (RATs), and more as they abandoned ransomware as their primary payload. In November 2018, TA505, a prolific actor that has been at the forefront of this trend, began distributing a new backdoor we named “ServHelper”. ServHelper has two variants: one focused on remote desktop functions and a second that...

Read More

0
16 Jul 2019
in Security Advisories & Alerts

DNS Infrastructure Hijacking Campaign

Summary The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolve. This enables the attacker to redirect user traffic to attacker-controlled infrastructure and obtain valid encryption certificates for an...

Read More

0
16 Jul 2019
in News Clipping

[DNSPIONAGE] – FOCUS ON INTERNAL ACTIONS

Recently, we had an incident response involving the malware DNSPIONAGE. At CERT-OPMD, we thought it would be interesting to share our observations. Mainly, we could observe quietly common actions and tools as described in infography below. HOW DNSPIONAGE INFECTS TARGETS In this blogpost, we will not describe and analyse again the dropper, because Talos did a great job here : https://blog.talosintelligence.com/2018/11/dnspionage-campaign-targets-middle-east.html But we will focus in...

Read More

0
16 Jul 2019
Page 42 of 134« First...102030...4041424344...506070...Last »