Wednesday, 31 July 2019

Alphabet researchers have discovered 7 serious security breaches on the iPhone

Alphabet researchers have discovered seven serious security breaches on the iPhone
The company's Zero team discovered software deficiencies that allowed the cellular code to run maliciously without the user having to click on a link or take any special action. Cyber experts have estimated the value of these black market loopholes for tens of millions of dollars.

Project members Zero, Alphabet's information security venture, discovered seven serious security breaches on the iPhone that allowed device penetration and information theft through Apple's iMessage app. Of those, six have already been fixed in iOS 12.4 update released last week. The seventh has not yet been fixed, and therefore the researchers refrain from presenting its details.

According to the researchers who found the deficiencies, four of the breaches were extremely severe and allowed the execution of malicious code on the iPhone without the user being required to take action like clicking on an infected link, for example. This is the worst kind of loopholes, because there is really no way of defending them. All it takes from a hacker is to send an engineered message and as soon as the user opens it in the app - the damage is activated.

The two additional loopholes are also dangerous and allow you to scan the device memory and read files, even from a remote device. The availability of the feasibility proofs of the six loopholes released by Zero is another important reminder to those who have not yet updated their device, and it would be better for Almond to do so.

The breach package was estimated to be about $ 5 million to $ 10 million, according to a price list published by Zerodium, the hacker's hacking dealership in French Carrer. Another company, Crowdfense, estimated the breaches at an even higher price of between $ 20 and $ 24 million. These are loopholes that many would love to put their hands on. Using them allows access to new iPhones even in the latest versions of Apple's operating system.

source: https://www.calcalist.co.il/internet/articles/0,7340,L-3767458,00.html

Crypto Trap

Banks in Israel refuse to accept money invested on crypto exchanges, due to money laundering concerns. At the same time, the tax authority is demanding that Israelis who invest in crypto pay capital gains tax. If you cannot transfer the funds you cannot pay the tax.

The trend of the large crypto currencies has led masses of investors, even in Israel, to believe that they can get rich quick. For some, this has also worked, but when they realize the profits, they find that the Israeli authorities have put them in a trap, with no way out.

This situation was created by a lethal combination between a legal buyer and a lack of coordination between regulators. In the case of the crypto, this combination also turns thousands of Israelis into potential tax evaders and criminals and also causes a loss of state income that already reaches at least NIS 200 - 300 million - a huge sum, especially at a time when the deficit was cut and not stopped.

The root of the problem is the refusal of Israeli banks to receive money invested on currencies in the world, due to the fear of money laundering - although in many cases the money path can be easily shown and disproved. On the other hand, the tax authority, which receives information from Israeli stock exchanges from Israeli stock exchanges, requires them to pay for their capital gains, along with a voluntary disclosure process.

Naturally, if the funds cannot be transferred, the tax cannot be paid, and the voluntary disclosure process cannot be started.

Source: https://www.calcalist.co.il/local/articles/0,7340,L-3767322,00.html

Monday, 20 March 2017

Disable Telnet On Vulnerable Models — Patch is not Available Yet!

Cisco is warning of a new critical zero-day IOS / IOS XE vulnerability that affects more than 300 of its switch models.

The company identified this highest level of vulnerability in its product while analyzing "Vault 7" — a roughly 8,761 documents and files leaked by Wikileaks last week, claiming to detail hacking tools and tactics of the Central Intelligence Agency (CIA).

The vulnerability resides in the Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software.
Read more http://thehackernews.com/2017/03/cisco-network-switch-exploit.html?m=1

Monday, 8 August 2016

Delta Air Lines Flights Grounded World-Wide on Computer Outage - again !

The No. 2 U.S. carrier by traffic said “our systems are down everywhere”. Computer failure expected to lead to worldwide delays.

In a statement confirming the outage, the airline said: “Delta has experienced a computer outage that has impacted flights scheduled for this morning.

“Flights awaiting departure are currently delayed. Flights en route are operating normally. Delta is advising travelers to check the status of their flights this morning while the issue is being addressed.”

Less than a month ago, in July , A 16-year-old boy has been found guilty of Delta and American airlines cyber attacks.
http://www.bbc.com/news/uk-england-devon-36725822

Previously, on Feb. 22 , Delta Air Lines delayed boarding for about two dozen flights as a result of a brief outage in its software that powers ground operations, a spokesman said.
http://www.reuters.com/article/us-delta-air-lines-outages-idUSKCN0VB242

Thursday, 4 August 2016

3.7 Million Exposed in Banner Health

Breach Banner Health is warning 3.7 million patients, staff and food and beverage customers that their personal data may have been stolen during a security breach traced back to June 23. Headquartered in Arizona, Banner is one of the largest non-profit healthcare systems in the US. It owns and operates 29 acute-care hospitals and numerous health-related services. read more http://www.securityweek.com/37-million-exposed-banner-health-breach#noredirect Powered by Como: http://www.como.com

Wednesday, 8 June 2016

New Angler Malware Cheats Microsoft EMET Security

FireEye spots the bad guys beating Microsoft's zero-day exploit protection tool for the first time -- and spreading ransomware as well.
New exploits discovered in the Angler Exploit Kit crimeware can bypass Microsoft’s vaunted Enhanced Mitigation Experience Toolkit (EMET) and then drop ransomware.
The finding by FireEye is the first time that EMET, Microsoft’s free tool that prevents malware from running on a Windows machine, has been unable to catch real malware. Researchers have hacked at EMET over the years looking for weaknesses—with some success--but until now there had been no real signs of bad guys abusing it.
The new exploits utilize vulnerable versions of the Adobe Flash and Microsoft Silverlight running on Windows 7, so keeping those application up-do-date with patches will prevent attacks on systems with EMET 5.5, the latest version of Microsoft’s tool. EMET is often relied upon to thwart zero-day attacks until patches get rolled out in organizations, so the new Angler feature would render that defense useless, according to FireEye.
“Nobody foresaw this coming,” says Raghav Pande, a research scientist with FireEye. Pande, who works on FireEye product security, says Angler and other malware typically look for EMET and if they find it, shut down and give up on an EMET-protected target. But this new variant “completely changed the dynamic” because it is able to bypass EMET detection, he says.
Microsoft, meanwhile, said this via a spokesperson: “EMET is designed to make it more difficult, expensive, and time-consuming, and therefore less likely, for attackers to exploit a system. With no one tool capable of preventing all attacks, Microsoft’s free security software detects and helps remove malware, including Angler.”
But the new EMET-bypass features in Angler demonstrate a growing sophistication of the malware kit’s developers as as well as their ability to target more security-savvy organizations: EMET is an open-source tool used as an extra layer by more advanced security teams.
“EMET is a great tool great tool to provide additional security to a system. Base security should be patching, which will neuter the attack in an even earlier stage. I have to say I am very impressed with the Angler engineering team: earlier this year, the 0-days, [and] now EMET bypass. This means they are targeting well-run organizations,” says Wolfgang Kandek, CTO of Qualys.
FireEye’s Pande says FireEye first spotted code in Angler for bypassing EMET back in March, but it’s now officially operational. The researchers didn’t witness any actual attacks, but were able to test the malware.
Bromium Labs in 2014 demonstrated how it could bypass several key defenses in EMET 4.1, specifically cheating EMET’s stack pivot protection and Export Address Table Filtering features by disabling them. Microsoft later that week released EMET 5.0, which hardened EAF and added Attack Surface Reduction, where organizations can selectively enable Flash, Java, and other third-party plugins.
Angler doesn’t use ROP to evade Data Execution Prevention; instead, it exploits Flash and Silverlight flaws.
In FireEye’s test of the malware, it saw that the exploit shellcode runs TeslaCrypt ransomware when infecting files. And “the attacker has full control over shellcode and it can pretty much execute anything it wants without EMET doing anything,” FireEye said in a new blog post with technical details and screenshots of the new Angler feature in action on Windows 7.
Pande says it’s possible the attack will work on Windows 8 machines as well, but FireEye has only tested Windows 7. Windows 10 would be immune due to the operating system’s ability to control app installation, he says.
Meanwhile, the new Angler features demonstrate just how far its creators have come. “If you compare past years’ attacks," Angler was rebundling exploits, Pande says. "It seemed they didn’t have the guys to tinker or play around with the exploit that much ... Right now, we’re seeing a change in the internal code and structure” of Angler, however, he says.
Patching Flash, Web browsers, and Java, can mitigate the EMET bypass, as can disabling Flash and Silverlight browser plug-ins, according to FireEye.
Michael Gorelik, vice president of R&D at Morphisec, says the Angler attack basically makes half of Windows users "defenseless" to ransomware. "The Angler Exploit Kit is already the preferred weapon of hackers to deliver their malware, and we predict that with this vulnerability, the prominence of Angler will further increase. This time the payload was TeslaCrypt Ransomware, but there is no limitation to what payload can be delivered," he says.
Taken from darkreadingKelly Jackson Higgins