Breaking News

Pierluigi Paganini October 10, 2016
Breaking the Microsoft JEA technology to hack a system

The security researcher Matt Weeks discovered a way to abuse the Microsoft Just Enough Administration (JEA) technology to escalate user profiles. Just Enough Administration aka JEA is a Microsoft technology that enables the delegated administration for carry on task with PowerShell. With JEA in place, it is possible to properly configure a role for administrators giving […]

Pierluigi Paganini October 10, 2016
The fall of the Encryptor RaaS also thanks to Shodan

Law enforcement and security experts have dismantled the Encryptor RaaS architecture by localizing one of its servers with Shodan. Shodan is a search engine for internet-connected devices, it is a precious instrument for IT experts and hackers that use it to find assess systems exposed on the Internet. The information gathered via Shodan could allow attackers […]

Pierluigi Paganini October 09, 2016
Also Spotify in the list of services victim of a malvertising campaign

The users of the free version of the popular Spotify online music service have been served malicious advertisements. Spotify users have been targeted by a malvertising campaign, the malicious advertising served to the victims could automatically open a web browser and redirect victims websites hosting malware. Spotify is a popular online music service that allows its […]

Pierluigi Paganini October 09, 2016
Security Affairs newsletter Round 81 – News of the week

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. First of all, let me inform you that at the #infosec16 SecurityAffairs was awarded as The Best European Personal Security Blog http://securityaffairs.co/wordpress/48202/breaking-news/securityaffairs-best-european-personal-security-blog.html THANK YOU! DefecTor – Deanonymizing Tor users with the analysis of DNS traffic from Tor exit relays […]

Pierluigi Paganini October 09, 2016
Authorities warn of cyber threat related to malicious ‘Hurricane Matthew’ emails

As the Hurricane Matthew batters the South Carolina coast, authorities are warning of a series of cyber attacks against residents. Cyber criminals have no scruples and are ready to bring in any tragic event in their favor. In the past crooks exploited the media interest in tragic events like the Boston Marathon attack and the […]

Pierluigi Paganini October 09, 2016
Cisco warns of critical vulnerabilities in CISCO Nexus switches

Cisco has rolled out several critical software patches for the CISCO Nexus 7000-series switches and the related NX-OS software. According to the Cisco Security Advisory, an attacker could exploit the vulnerabilities to gain remote access to vulnerable systems and execute code or commands. According to Wednesday’s Cisco Security Advisory, both the Nexus 7000 and 7700 […]

Pierluigi Paganini October 08, 2016
US accuses Russia of attempting to disrupt the US Presidential election

Washington demands a strong response to the alleged Russian attempts to manipulate the Presidential Election 2016 with cyber attacks. US is officially accusing Russia trying to interfere the 2016 US presidential election, announcing it will adopt all necessary countermeasures to defeat the threat. The Office of the Director of National Intelligence and the Department of […]

Pierluigi Paganini October 08, 2016
OilRig campaign, Iran-Linked Hackers Target US Government & Energy Grid

OilRig campaign – An Iran-linked hacker group which previously targeted organizations in Saudi Arabia has now set its sights on other countries. Iranian hackers which previously targeted organizations in Saudi Arabia are now targeting organizations in other countries, including the US, as part of a campaign identified as OilRig campaign. In addition to expanding its reach, the group has been enhancing its malware tools. Researchers at Palo Alto Networks have been monitoring the group for some time and have  reported observing attacks launched by a threat actor against financial institutions and technology  companies in Saudi Arabia and on the Saudi defense industry. This campaign referred to as “OilRig,” by Palo Alto Networks, entails weaponized Microsoft Excel spreadsheets tracked as  “Clayslide” and a backdoor called “Helminth.”   Bank attacks by the Iran-linked group were analyzed and documented by FireEye in May. Security  Week reports that Palo Alto Networks, “discovered that it has also targeted a company in Qatar  and government organizations in the United States, Israel and Turkey.”  Helminth is delivered, by the threat actors behind OilRig, by way of spear-phishing emails and  malicious macro-enabled Excel documents. For instance, in the caseof a Turkish government organization, the Excel file was designed to replicate a login portal for an airline.  There are four variants of the Helminth malware and the threat, capable of communicating with its  command and control (C&C) server over both HTTP and DNS, can gain information on the  infected device and download additional files via a remote server. One type of Helminth malware  relies on VBScript and PowerShell scripts. Another is deployed as an executable file. Delivered by  […]

Pierluigi Paganini October 08, 2016
More than 500,000 IoT devices potentially recruitable in the Mirai Botnet

Security experts have discovered more than 500,000 vulnerable Internet of Things (IoT) devices that could be potentially recruited in the Mirai botnet. In the last weeks, security experts observed two of the powerful DDoS attacks of ever that hit the hosting provider OVH and the websites of the popular security expert Brian Krebs. Malware researchers believe that the […]

Pierluigi Paganini October 07, 2016
Update X.Org libraries to avoid Privilege Escalation and DoS attacks

X.Org released patches and updates to fix several flaws found in many client libraries that could be exploited to cause DoS and escalate privileges. X.Org is a widely used open-source implementation of the X Windows System (aka X11 or X-Windows) that is the graphical windowing system adopted by Unix and Linux operating systems. A set […]