05-08-202007-08-2020

Security daily (06-08-2020)

Hackers can still steal wads of cash from ATMs. Here's the vulnerabilities that could let them in.

Thanks to a pair of zero-day vulnerabilities in a popular ATM, hackers could be pilfering off customers’ sensitive banking information or withdrawing hefty wads of cash, according to research from New York-based Red Balloon Security. If exploited properly, one of the vulnerabilities the researchers found in Nautilus Hyosung America ATMs would allow attackers to essentially empty the machines of cash, the researchers, Brenda So and Trey Keown, told CyberScoop. The root of the vulnerability lies in the way Nautilus implemented eXtensions for Financial Services, the software used to dispense money. The other vulnerability would allow attackers to execute malicious code in the the ATM’s remote administration interface, which normally allows ATM owners to check the amount of cash available in their machines. In experimenting with the flaw, So and Keown wrote shell code and sent a malicious payload to the ATM. Hackers that are able to do the same could point […] The post Hackers can still steal wads of cash from ATMs. Here's the vulnerabilities that could let them in. appeared first on CyberScoop. (CyberScoop)

Hacking group has hit Taiwan's prized semiconductor industry, Taiwanese firm says

Taiwan’s semiconductor industry, a centerpiece of the global supply chain for smartphones and computing equipment, was the focus of a hacking campaign targeting corporate data over the last two years, Taiwan-based security firm CyCraft Technology claimed Thursday. The hackers went after at least seven vendors in the semiconductor industry in 2018 and 2019, quietly scouring networks for source code and chip-related software, CyCraft said. Analysts say the campaign, which reportedly hit a sprawling campus of computing firms in northwest Taiwan, shows how the tech sector’s most prized data is sought out by well-resourced hacking groups. “They’re choosing the victims very precisely,” C.K. Chen, senior researcher at CyCraft, said of the hackers. “They attack the top vendor in a market segment, and then attack their subsidiaries, their competitors, their partners and their supply chain vendors.” It was unclear which companies were targeted; CyCraft declined to name them. It was also unclear who was responsible for the […] The post Hacking group has hit Taiwan's prized semiconductor industry, Taiwanese firm says appeared first on CyberScoop. (CyberScoop)

Gigabytes of 'sensitive' internal Intel documents dumped online

Chip giant Intel is investigating the leak of what appears to be a 20 GB cache of internal documents, some of which are marked “confidential,” after it appeared on various messaging platforms and data hosting sites. An Intel spokesperson told CyberScoop that the data looks to be from the company’s Resource and Design Center, which hosts information for customers, partners and other external parties that have access. “We believe an individual with access downloaded and shared this data,” a spokesperson told CyberScoop. The cache, dubbed “Intel exconfidential Lake,” is mostly comprised of training manuals and other technical documents for various software and firmware development kits. However, a section marked “Intel Restricted Secret” contains data on a March 2020 version of Intel’s 2016 Kaby Lake Platforms Silicon Initialization Code, which works with Intel BIOS. A post in a Telegram channel highlighted some of the other contents in the cache: It is […] The post Gigabytes of 'sensitive' internal Intel documents dumped online appeared first on CyberScoop. (CyberScoop)

A scam letter! Warn your vulnerable loved ones to be on their guard

The good news is that if scammers are having to use techniques like this to get in front of potential victims, anti-spam defences and user awareness about email scams must be better than ever. The bad news is that if such letters continue to be sent, someone somewhere obviously thinks scams like this can still make them a tidy profit. (Graham Cluley)

Prioritize alerts and jump-start your investigations with Recorded Future’s free browser extension. Sign up now.

Graham Cluley Security News is sponsored this week by the folks at Recorded Future. Thanks to the great team there for their support! Drowning in alerts from many different sources and systems? Spending too much valuable time researching potential threats and vulnerabilities? You need Recorded Future Express, a new browser extension from the experts at […] (Graham Cluley)

Porn-wielding Zoom bombers disrupt Twitter hack court hearing

Uh-oh… someone didn’t lock their Zoom meeting down properly. That’s probably particularly important when the person charged is an alleged hacker. (Graham Cluley)

Smashing Security podcast #190: Twitter hack arrests, email bad behaviour, and Fawkes vs facial recognition

Special guest Geoff White can’t resist using the podcast to promote his new book, “Crime Dot Com”, but other than that we also discuss the creepy (and apparently legal) way websites can find out your email and postal address even if you don’t give it to them, take a look at how the alleged Twitter hackers were identified, and learn about Fawkes – the technology fighting back at facial recognition. (Graham Cluley)

Porn blast disrupts bail hearing of alleged Twitter hacker

An alleged hacker's bail hearing held online via Zoom with screen sharing enabled... what could possibly go wrong? (Naked Security)

Harness the Power of Big Data with This 10-Course Bundle

You don't need to work as an executive at Google to understand and appreciate the importance of large-scale data analytics in today's world. Whether you're interested in joining the ranks of a major tech firm or want to improve your company's marketing campaigns through consumer analysis, knowing how to work with large sets of complex data is paramount.

Regardless of your experience in this increasingly important field, the Ultimate Data & Project Management Certification Bundle will get you up to speed with the most important programming languages and platforms in the industry, and it's on... more (Null Byte « WonderHowTo)

Black Hat 2020: Using Botnets To Manipulate Energy Markets For Big Profits

(News ≈ Packet Storm)

Ex-NSA Hacker Finds A Way To Hack Mac Users Via Microsoft Office

(News ≈ Packet Storm)

Twitter Hack: Hearing Zoombombed With Porn

(News ≈ Packet Storm)

Arrested Pen Testers Push For Good Samaritan Law

(News ≈ Packet Storm)

Intel, ARM, IBM, AMD Processors Vulnerable to New Side-Channel Attacks

It turns out that the root cause behind several previously disclosed speculative execution attacks against modern processors, such as Meltdown and Foreshadow, was misattributed to 'prefetching effect,' resulting in hardware vendors releasing incomplete mitigations and countermeasures.

Sharing its findings with The Hacker News, a group of academics from the Graz University of Technology and (The Hacker News)

Zoom Bug Allowed Snoopers Crack Private Meeting Passwords in Minutes

Popular video conferencing app Zoom recently fixed a new security flaw that could have allowed potential attackers to crack the numeric passcode used to secure private meetings on the platform and snoop on participants.

Zoom meetings are by default protected by a six-digit numeric password, but according to Tom Anthony, VP Product at SearchPilot who identified the issue, the lack of rate (The Hacker News)

Black Hat 2020: Mercedes-Benz E-Series Rife with 19 Bugs

Researchers went into detail about the discovery and disclosure of 19 security flaws they found in Mercedes-Benz vehicles, which have all been fixed. (Threatpost)

Canon Admits Ransomware Attack in Employee Note, Report

The consumer-electronics giant has suffered partial outages across its U.S. website and internal systems reportedly, thanks to the Maze gang. (Threatpost)

Black Hat 2020: Satellite Comms Globally Open to $300 Eavesdropping Hack

Attackers can listen in on internet traffic for high-value targets a continent away, like shipping fleets and oil installations, using some basic home-television gear. (Threatpost)

High-Severity Cisco DoS Flaw Plagues Small-Business Switches

Cisco recently patched the high-severity flaw, which could allow remote, unauthenticated attackers to launch DoS attacks against its popular small business switches. (Threatpost)

05-08-202007-08-2020

/security-daily/ 07-08-2020 23:44:21