DRIDEX Spam Runs Resurface Against US Targets
DRIDEX is steadily regaining its footing in the US just over a month after its takedown orchestrated by US and UK law enforcement agencies. Taking down servers is a significant step in crippling botnets, but unless all infrastructure are destroyed and all threat actors are caught, threats like DRIDEX are bound to resurface. As such, it […] more…Siri’s Flaw: Apple’s Personal Assistant Leaks Personal Data
Siri for iOS devices has made everyday tasks easier; whether it is getting directions to the nearest gas station or staying in contact with growing social media networks. iOS users can just call out a contact’s name and the device will populate with a telephone number and email address. However, convenience comes with a price: personal information. What […] more…3Q 2015 Security Roundup: Current Threats Forecast Impending Attack Scenarios
When experts call on people to brace for disaster, it’s always based on signs that point to impending events. This quarter, we saw numerous signposts pointing to hazards to sensitive data that could lead to damages to individuals’ personal lives and organizations’ operations. The high-profile breaches, vulnerability exploits, and other attacks we saw this past […] more…Resolved: Sporadic Login Issues with Yammer
A number of users are reporting difficulties logging in to Yammer. At the moment, ITS is still trying to determine the cause. If you are experiencing log in issues, please contact the ITS Service Desk with the following information so our Yammer second-level support can troubleshoot this issue: 1) Your location (if on-campus, the building […] more…Sporadic Login Issues with Yammer
A number of users are reporting difficulties logging in to Yammer. At the moment, ITS is still trying to determine the cause. If you are experiencing log in issues, please contact the ITS Service Desk with the following information so our Yammer second-level support can troubleshoot this issue: 1) Your location (if on-campus, the building […] more…Setting the Record Straight on Moplus SDK and the Wormhole Vulnerability
A vulnerability known as Wormhole that reportedly affected the software development kit (SDK), Moplus by Baidu is making waves due to the severity of the impact once successfully exploited. The said vulnerability was discovered by WooYun.og, a vulnerability reporting platform in China. However, as our investigation on this security bug unfolded, we found out that […] more…FBI, Security Vendors Partner for DRIDEX Takedown in the US
Multiple command-and-control (C&C) servers used by the DRIDEX botnet in the US have been taken down as a result of a joint effort by the Federal Bureau of Investigation (FBI) and security researchers from Trend Micro and other security vendors. Earlier, the National Crime Agency (NCA) in the UK has also taken similar steps against […] more…FBI, Security Vendors Partner for DRIDEX Takedown
Multiple command-and-control (C&C) servers used by the DRIDEX botnet have been taken down as part of a joint effort by the Federal Bureau of Investigation (FBI), security researchers from Trend Micro, and other security vendors. Earlier, the National Crime Agency (NCA) in the UK has also taken similar steps against C&C servers used by DRIDEX. […] more…Japanese Cybercriminals New Addition To Underground Arena
Younger and smaller than its counterparts, the cybercrime underground marketplace in Japan imports cybercrime tools, uses secret jargon, and has a distinct focus on fake passports, firearms, and child pornography. Japan is no stranger to cyber attacks and malware-related incidents—from recent malvertising attacks in early October to EMDIVI malware targeting Japan companies, and even to banking […] more…Two Games Released in Google Play Can Root Android Devices
By Wish Wu, Ecular Xu Android malware creators have recently been mixing business with play. We found two malicious gaming apps that were published on Google Play and are capable of rooting Android devices. If the apps Brain Test and RetroTetris ring a bell, better check your devices. RetroTetris can be installed in Android versions starting from […] more…Nigerian Cuckoo Miner Campaign Takes Over Legitimate Inboxes, Targets Banks
By Jay Yaneza and Erika Mendoza (Threats Analyst) When it comes to threat investigations, we often treat the malicious binary as the smoking gun or the crown jewel of the investigation. However, examining the other components can produce the bigger picture that will be far more detailed than simply focusing on the binary. By looking […] more…New “Ghost Push” Variants Sport Guard Code; Malware Creator Published Over 600 Bad Android Apps
By Yang Yang, Jordan Pan Halloween is still a month from now and yet Android users are already being haunted by the previously reported “Ghost Push” malware, which roots devices and makes them download unwanted ads and apps. The malware is usually packaged with apps that users may download from third-party app stores. Further investigation of GhostPush […] more…Moving Forward with EMV and Other Payment Technologies
October 1st ushers in a significant shift for merchants, banks, and consumers. It is deadline day for merchants in the United States to switch to EMV technology. EMV stands for Europay, MasterCard, and Visa, the three companies that created the EMV consortium in 1994 to develop new technologies to counteract payment card fraud. With this […] more…"File thingie" ~ Deface & Shell Upload vulnerability
Hello to all Devil’s Cafe Members !! A few things you might want to try with Google:Hand type the following prefixes and note their utility:link:url Shows other pages with links to that url.related:url same as “what’s related” on serps.site:domain restricts search results to the given domain.allinurl: shows only pages with all terms in the url.inurl: like allinurl, but only […] more…Two New PoS Malware Affecting US SMBs
Following the seemingly quiet state of point-of-sale (PoS) malware these past few months, we are now faced with two new PoS malware named Katrina and CenterPoS now available to cybercriminals. In our 2Q Security Roundup released in August, we reported new PoS malware discoveries, namely FighterPoS in April, MalumPoS in June, and GamaPoS a month […] more…5 takeaways from Adobe Flash’s death march
Rumors of the demise of Flash have been greatly exaggerated, to paraphrase Mark Twain. The multimedia and software platform’s days may well be numbered, but today it’s still alive, even if its kicks are not exactly vigorous. It’s now five years since the late Steve Jobs published his famous Thoughts on Flash memo, in which […] more…More information
- WorldPay hacker sentenced to 11 years for role in $9.4M scheme
- Black Hat Europe: IoT devices can hack phones
- Facebook wants you to know that Messenger is not spying on you
- Miksi VPN-yhteyden käyttö kannattaa?
- IBM’s security acquisition worth $1b
- Why blockchain isn’t always the answer
- Intezer Raises $33M to Extend AI-Powered SOC Platform
- Doomsday malware: It’s only a matter of time
- Shamoon Attacks Possibly Aided by Greenbug Group
- Linux Foundation Tackles Financial Fraud With Open Source Platform