Friday, July 31, 2015
Fresh Attack Vectors Found for Stagefright Android Flaw
from http://ift.tt/1IejGnr
IC3 Issues Alert on DDoS Extortion Campaigns
The Internet Crime Complaint Center (IC3) has issued an alert to U.S. businesses about a rise in extortion campaigns. In a typical incident, a business receives an e-mail threatening a Distributed Denial of Service (DDoS) attack to its website unless it pays a ransom. Businesses are warned against communicating directly with attackers and advised to use DDoS mitigation techniques instead.
Users and administrators are encouraged to review the IC3 Alert for details and US-CERT Security Tip ST04-015 for more information on DDoS attacks.
This product is provided subject to this Notification and this Privacy & Use policy.
from US-CERT: The United States Computer Emergency Readiness Team http://ift.tt/1KFisaG
Sophos Reports $113.3Mn in Revenue for FY Q1
from http://ift.tt/1M24Lmq
1.5Mn Affected In Medical Information Engineering Hack
from http://ift.tt/1LVo8w3
How blockchain is likely to transform IT and business
Federal Court's data breach decision shows new tilt toward victims, class-action lawsuits
U.S. District Judge rules mobile-phone tracking does require a warrant
Your Files Are Encrypted with a “Windows 10 Upgrade”
from Cisco Blog » Security http://ift.tt/1I7N9S6
Bugtraq: phpFileManager 0.9.8 Remote Command Execution
from SecurityFocus Vulnerabilities http://ift.tt/1UcK34B
This Week in Security News
Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
The Show Goes On—More “Stagefright” Horrors with Auto-Play Videos
Our researchers have now disclosed additional details about one of the vulnerabilities (CVE-2015-3824) in the so-called “Stagefright” cluster affecting Android users. The “Stagefright” vulnerability is actually a marketing label for a cluster seven individual vulnerabilities.
Today’s Russian Underground has Automized Infrastructure and Sophisticated Tools
Our research paper offers a look into a mature ecosystem with an increasingly professional underground infrastructure for the sale and trade of malicious goods and services. It also discusses the growing competition, process automation, the introduction of new attack avenues, and its community’s underground activities.
Compromised TV and Government-Related Sites Lead to PoisonIvy
A recent campaign compromised Taiwan and Hong Kong sites to deliver Flash exploits related to Hacking Team and eventually download PoisonIvy and other payloads in user systems. This campaign started on July 9, a few days after the Hacking Team announced it was hacked.
We Discovered a Vulnerability That Renders Android Devices Silent
We have discovered a vulnerability in Android that can render a phone apparently dead – silent, unable to make calls, with a lifeless screen. This vulnerability is present from Android 4.3 (Jelly Bean) up to the current version, Android 5.1.1 (Lollipop).
Windows 10’s New Browser Microsoft Edge is Improved, but also Brings New Risks
Last week we discussed how Microsoft Edge, the new browser in Windows 10, represented a significant increase in the security over Internet Explorer. However, there are also new potential threat vectors that aren’t present in older versions.
The Government is Headed Back to the Drawing Board over Controversial Cybersecurity Export Rules
The cybersecurity industry and the government have been struggling over proposed export rules that researchers say could end up making the Internet less safe. And now the government says it will try again and give the public another chance to weigh in.
Know the 4 Takeaways from Ponemon’s 2015 Healthcare Security Report
A shockingly high 91% of respondents reported falling victim to at least one data breach in the last 2 years. The majority of respondents had suffered 11 or more incidents. Healthcare IT teams understand that these percentages are unacceptable, but until now have largely failed to effectively mitigate data breach threats.
The FBI is Facing Challenges with its Cybersecurity Program
A government watchdog has discovered several roadblocks preventing the FBI from fully implementing a cybersecurity initiative aimed at thwarting threats to the United States.
Cybersecurity Worries Among Executives Have Risen Sharply, According to New Survey
Of the executives surveyed from U.S. companies, law enforcement, government agencies, other organizations and other security experts, 75% said they were more concerned about cybersecurity threats this year than in the past 12 months.
Cybersecurity Research Institute Receives $1.73B in DOD Funding
The Defense Department announced Monday that it has renewed its contract with the Software Engineering Institute at Carnegie Mellon University, a federally funded research and development center chartered to study cybersecurity and software engineering.
Please add your thoughts in the comments below or follow me on Twitter; @GavinDonovan.
from Trend Micro Simply Security http://ift.tt/1MXI6oC
via IFTTT
Changing the Way We Deliver Vulnerability and Threat Intelligence
from Cisco Blog » Security http://ift.tt/1eGo2uT
Windows 10 Wi-Fi Sense Explained: Actual Security Threat You Need to Know
from The Hacker News http://ift.tt/1JVFHYn
Revealing Widespread Gas Station Cyber Attacks at Black Hat
At Trend Micro it’s always been our job to work out where the next threat is coming from, so we can offer the best protection possible to our customers. Sometimes people listen to us at shows and say: “Seriously? That’s never happened to us.” But that’s the point. It hasn’t … yet. Who would have thought gas pump monitoring systems in the US were a target for hackers?
The truth is they are, and at Black Hat next week we’ll tell you exactly how and why.
Times have changed
We’re no longer faced with bedroom-bound enthusiasts releasing potent but relatively innocuous viruses into the wild. Today’s threat landscape is about highly motivated, well resourced, agile and covert cybercriminals – many of whom know exactly how to stay hidden long enough to exfiltrate your most sensitive corporate data. It’s also about nation state actors on the prowl for anything which is economically or geopolitically advantageous. And it’s about hacktivists – many of whom hail from within our borders – who want to make a moral point by attacking organizations and exposing sensitive data to the public.
What this means practically speaking is that virtually every organization is a potential target. Whether you’re a government agency harboring state secrets, a business with credit card data sitting in your servers, or an organization that has somehow offended the hacktivist community.
Gas pumps exposed
Trend Micro’s senior threat researcher, Kyle Wilhoit, along with Stephen Hilt, first discovered an attack on the Guardian AST Monitoring System for internet-facing gas pumps earlier this year. On that occasion the attackers merely changed the name of a pump from “DIESEL” to “WE_ARE_LEGION” – the tag line for hacktivist collective Anonymous.
Now, that attack was pretty innocuous. But given that these systems typically monitor inventory, pump levels, and other key aspects of gas pumping systems, the potential is there for severe disruption of services. Empty tank values could be altered to display as full, leading to gas stations with no fuel. Kyle found more than 1,500 internet-facing pumps lacking adequate security to keep the bad guys out.
Read more here about Kyle’s presentation at Black Hat next week.
See you at Black Hat
The problem the good guys have is being able to share threat intelligence quickly enough and with the right people to make a difference. Trend Micro is fortunate in having great relationships with law enforcement agencies around the globe. But conferences like Black Hat are also a vital platform. They let us share intelligence and research that help us expand our parameters and come together as a community in a way that proves we’re greater than the sum of our parts.
That’s why Trend Micro is delighted to be presenting our research on attacks against gas tank monitoring systems at the show. Our very own Kyle Wilhoit and Stephen Hilt will be presenting their ground-breaking research on 5 August in the Jasmine Ballroom at 4.20pm: The Little Pump Gauge That Could: Attacks Against Gas Pump Monitoring Systems. And we’ll also be releasing a new free tool, Gaspot, to enable researchers and operators to set up their own virtual monitoring systems to track attempted attacks.
That’s not all. Senior malware scientist Sean Park will be discussing evasion techniques used against financial institutions in his not-to-be-missed talk at 11.30pm in Mandalay Bay GH: Winning the Online Banking War.
But we’re also looking forward to a fascinating few days of presentations on everything from mPOS flaws to targeted takedowns; and cloning 4G SIMs to IoT attacks.
The bad guys are pretty good at sharing intelligence, so let’s make sure we are too. See you in Vegas on August 5.
from Trend Micro Simply Security http://ift.tt/1LURJWq
via IFTTT
Tor connection vulnerability uncloaks hidden web services
Zero Day Weekly: Wassenaar backpedaling, rifle hacking, Stagefright, Wi-Fi Sense hysteria
IBM Security Bulletin: Vulnerability in IBM Java SDK Version 7.0 Service Refresh 8 Fix Pack 10 affects Host On-Demand (CVE-2015-2590)
from IBM Product Security Incident Response Team http://ift.tt/1Iu93fv
IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK and IBM® Java Runtime, affect IBM Endpoint Manager for Remote Control and Tivoli Endpoint Manager for Remote Control
from IBM Product Security Incident Response Team http://ift.tt/1Iu98Qc
IBM Security Bulletin: PowerKVM is affected by two Qemu vulnerabilities
from IBM Product Security Incident Response Team http://ift.tt/1Iu93fn
IBM Security Bulletin: PowerKVM is affected by Linux Kernel vulnerabilities (multiple CVEs)
from IBM Product Security Incident Response Team http://ift.tt/1SnKI5U
IBM Security Bulletin: PowerKVM is affected by cups vulnerabilities (multiple CVEs)
from IBM Product Security Incident Response Team http://ift.tt/1SnKGec
IBM Security Bulletin: An unspecified vulnerability could cause a denial of service for WebSphere DataPower XC10 Appliance Version 2.5 (CVE-2015-4936)
from IBM Product Security Incident Response Team http://ift.tt/1Iu98Q4
IBM Security Bulletin: An unspecified vulnerability could cause a denial of service for WebSphere eXtreme Scale 8.6 (CVE-2015-4936)
from IBM Product Security Incident Response Team http://ift.tt/1Iu92YZ
IBM Security Bulletin: PowerKVM is affected by OpenSSL vulnerabilities (multiple CVEs)
from IBM Product Security Incident Response Team http://ift.tt/1SnKHPn
IBM Security Bulletin: Vulnerabilities in Open SSL affect Power Hardware Management Console (CVE-2015-4000)
from IBM Product Security Incident Response Team http://ift.tt/1Iu95Uw
IBM Security Bulletin: Vulnerability with Diffie-Hellman ciphers may affect IBM Infosphere BigInsights (CVE-2015-4000)
from IBM Product Security Incident Response Team http://ift.tt/1M1iKcb
IBM Security Bulletin: WebSphere DataPower XC10 Appliance does not provide a means of overwriting the SSD when an appliance is to be discarded ( CVE-2015-1970)
from IBM Product Security Incident Response Team http://ift.tt/1OF4VOj
IBM Security Bulletin: Vulnerabilities in glibc affect Power Hardware Management Console ( CVE-2015-1781)
from IBM Product Security Incident Response Team http://ift.tt/1OF4VOg
IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Identity Governance Appliance
from IBM Product Security Incident Response Team http://ift.tt/1OF4Ud6
IBM Security Bulletin: IBM QRadar SIEM can be affected by Multiple Vulnerabilities in the IBM Java Runtime Environment. (CVE-2015-0478, CVE-2015-0488, CVE-2015-1916, CVE-2015-2613, CVE-2015-2601, CVE-2015-4749, CVE-2015-2625, CVE-2015-1931)
from IBM Product Security Incident Response Team http://ift.tt/1M1iM3Y
IBM Security Bulletin: Vulnerabilities in Java affect Power Hardware Management Console (CVE-2015-0480, CVE-2015-0486, CVE-2015-0488, CVE-2015-0478, CVE-2015-0477, CVE-2015-1916)
from IBM Product Security Incident Response Team http://ift.tt/1M1iM3U
Bugtraq: HP ArcSight Logger provides incorrect/invalid/incomplete results for queries with boolean operators
from SecurityFocus Vulnerabilities http://ift.tt/1IxFa2h
The Show Goes On—More “Stagefright” Horrors with Auto-Play Videos
Trend Micro researchers are now disclosing additional details about one of the vulnerabilities (CVE-2015-3824) in the so-called “Stagefright” cluster affecting Android users.
The “Stagefright” vulnerability is actually a marketing label for a cluster seven individual vulnerabilities. One of the vulnerabilities in this cluster, CVE-2015-3824, was independently discovered by Trend Micro’s research team at the same time as other security researchers. This is actually a common occurrence in vulnerability research. For instance, we and other researchers found, and were credited for, the vulnerability that Microsoft recently fixed out-of-band with MS15-078.
Like others in the industry, our researcher team found the multimedia message system (MMS) attack vector for this vulnerability. However, they also found two additional vectors that can be used to successfully exploit it. After discussions with Google, we can now disclose what we’ve found.
The first additional attack vector is delivered via malicious video files on a website. This is nearly as dangerous as the MMS attack, since many videos now auto-play, especially on mobile devices. This vulnerability also enables attackers to bypass the disabling of auto-play videos in Chrome. This means an attacker would only need to convince a user to visit a posted video, enabling complete control the device after it’s played.
The second attack is made possible through malicious apps or MP4 files designed to exploit the vulnerability. Once a user downloads and runs it, the attacker would have full control over the device.
The recommendation to disable MMS will NOT protect against these two new attack vectors. However, it is still effective against one of the three attack vectors, and is a good idea generally if that feature is unused.
While there are no known mitigations for web-based video attack vectors, web reputation services like Trend Micro’s Web Reputation Services can help protect against known malicious sites. To help protect against malicious apps or MP4 files, be cautious about downloads. As malicious apps are discovered, mobile security solutions like Trend Micro Mobile Security can provide protection.
The best solution, of course, is to apply updates that fix the vulnerability. Unless you have a Nexus phone, you will get security fixes from your carrier, or the maker of your device.
Unfortunately, many of the 89 percent of Android users at-risk because will never be able to fix this vulnerability due to the age of their devices or their carriers and/or handset makers not making fixes available. These users are running “unpatchable Android” and can only fully protect themselves by getting a new device.
You can get more technical details on this at the Security Intelligence blog posting here.
Our research teams are monitoring this situation carefully and we will update you with any new information.
Please add your thoughts in the comments below or follow me on Twitter; @ChristopherBudd.
from Trend Micro Simply Security http://ift.tt/1IOs9mK
via IFTTT
Bugtraq: [SECURITY] [DSA 3321-1] xmltooling security update
from SecurityFocus Vulnerabilities http://ift.tt/1JAhwCW
Most Vulnerable Smart Cities to Cyber Attack on Internet of Things (IoT)
from The Hacker News http://ift.tt/1M15OTQ
SANS Announces Recruitment Fair for Top Infosec Candidates
from http://ift.tt/1JAetKY
Negligent Employees Cost Firms $1.5m – Report
from http://ift.tt/1DV9oH3
Blackphone 2 Boosts Enterprise Credentials with Android for Work Support
from http://ift.tt/1My4s1Q
Personal Devices and Corporate Secrets: Only 11% of People Worry about Keeping Work Files Safe on Mobile Devices, Kaspersky Lab Survey Shows
from http://ift.tt/1gsCDvV
Thursday, July 30, 2015
Should we let cyber espionage victims hack back?
Mega denies claims by Kim Dotcom of NZ government control of company
USN-2701-1: Linux kernel (Trusty HWE) vulnerabilities
Ubuntu Security Notice USN-2701-1
30th July, 2015
linux-lts-trusty vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 LTS
Summary
Several security issues were fixed in the kernel.
Software description
- linux-lts-trusty - Linux hardware enablement kernel from Trusty
Details
Andy Lutomirski discovered a flaw in the Linux kernel's handling of nested
NMIs (non-maskable interrupts). An unprivileged local user could exploit
this flaw to cause a denial of service (system crash) or potentially
escalate their privileges. (CVE-2015-3290)
Andy Lutomirski discovered a flaw that allows user to cause the Linux
kernel to ignore some NMIs (non-maskable interrupts). A local unprivileged
user could exploit this flaw to potentially cause the system to miss
important NMIs resulting in unspecified effects. (CVE-2015-3291)
Andy Lutomirski and Petr Matousek discovered that an NMI (non-maskable
interrupt) that interrupts userspace and encounters an IRET fault is
incorrectly handled by the Linux kernel. An unprivileged local user could
exploit this flaw to cause a denial of service (kernel OOPs), corruption,
or potentially escalate privileges on the system. (CVE-2015-5157)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 12.04 LTS:
- linux-image-3.13.0-61-generic 3.13.0-61.100~precise1
- linux-image-3.13.0-61-generic-lpae 3.13.0-61.100~precise1
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References
CVE-2015-3290, CVE-2015-3291, CVE-2015-5157
from Ubuntu Security Notices http://ift.tt/1DU8yub
USN-2700-1: Linux kernel vulnerabilities
Ubuntu Security Notice USN-2700-1
30th July, 2015
linux vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in the kernel.
Software description
- linux - Linux kernel
Details
Andy Lutomirski discovered a flaw in the Linux kernel's handling of nested
NMIs (non-maskable interrupts). An unprivileged local user could exploit
this flaw to cause a denial of service (system crash) or potentially
escalate their privileges. (CVE-2015-3290)
Andy Lutomirski discovered a flaw that allows user to cause the Linux
kernel to ignore some NMIs (non-maskable interrupts). A local unprivileged
user could exploit this flaw to potentially cause the system to miss
important NMIs resulting in unspecified effects. (CVE-2015-3291)
Andy Lutomirski and Petr Matousek discovered that an NMI (non-maskable
interrupt) that interrupts userspace and encounters an IRET fault is
incorrectly handled by the Linux kernel. An unprivileged local user could
exploit this flaw to cause a denial of service (kernel OOPs), corruption,
or potentially escalate privileges on the system. (CVE-2015-5157)
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 14.04 LTS:
- linux-image-3.13.0-61-generic-lpae 3.13.0-61.100
- linux-image-3.13.0-61-lowlatency 3.13.0-61.100
- linux-image-3.13.0-61-powerpc-e500mc 3.13.0-61.100
- linux-image-3.13.0-61-powerpc64-emb 3.13.0-61.100
- linux-image-3.13.0-61-powerpc64-smp 3.13.0-61.100
- linux-image-3.13.0-61-powerpc-e500 3.13.0-61.100
- linux-image-3.13.0-61-generic 3.13.0-61.100
- linux-image-3.13.0-61-powerpc-smp 3.13.0-61.100
To update your system, please follow these instructions: http://ift.tt/17VXqjU.
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed. If
you use linux-restricted-modules, you have to update that package as
well to get modules which work with the new kernel version. Unless you
manually uninstalled the standard kernel metapackages (e.g. linux-generic,
linux-server, linux-powerpc), a standard system upgrade will automatically
perform this as well.
References
CVE-2015-3290, CVE-2015-3291, CVE-2015-5157
from Ubuntu Security Notices http://ift.tt/1DU8zye