11-06-202013-06-2020

Security daily (12-06-2020)

Palo Alto Networks reveals D-Link home router vulnerabilities

Taiwanese consumer technology manufacturer D-Link has issued security fixes for a series of bugs that, if exploited, could have enabled hackers to steal passwords and other sensitive data from home internet routers during the coronavirus pandemic. If used in concert, the vulnerabilities would have allowed attackers to scan network traffic to steal session cookies, and upload or download sensitive files, Palo Alto Networks’ Unit 42 researchers said in findings published Friday. In some cases, the vulnerabilities could have helped attackers to conduct denial of service attacks. While D-Link has released a security update for the flaws in question, the advisory offers a reminder that home internet routers represent targets for hackers aiming to take advantage of the increased number of people around the world teleworking as a result of the coronavirus. Hackers seized the moment early during the coronavirus pandemic, messing with Domain Name System settings in home routers in the U.S. and in multiple European […] The post Palo Alto Networks reveals D-Link home router vulnerabilities appeared first on CyberScoop. (CyberScoop)

Zoom apologizes for disabling US accounts commemorating Tiananmen Square anniversary

Video conferencing service Zoom has apologized for yielding to Chinese government pressure and suspending U.S.-based user accounts that commemorated the anniversary of the Tiananmen Square massacre in China. The apology comes after an uproar from human rights activists and U.S. lawmakers for Zoom’s role in suppressing dissent outside of mainland China. At the request of the Chinese government, Zoom shut down three video meetings marking the anniversary. Some of the meeting organizers were based in the U.S. and in Hong Kong. “Recent articles in the media about adverse actions we took toward [those commemorating Tiananmen] have some calling into question our commitment to being a platform for an open exchange of ideas and conversations,” Zoom said in a blog post Thursday.  “Going forward Zoom will not allow requests from the Chinese government to impact anyone outside of mainland China.” The Zoom users were marking 31 years since Chinese troops fired on pro-democracy […] The post Zoom apologizes for disabling US accounts commemorating Tiananmen Square anniversary appeared first on CyberScoop. (CyberScoop)

Twitter nabs a network of Chinese accounts demonizing pro-democracy protests, spinning coronavirus news

Just because Twitter is banned in mainland China doesn’t mean Beijing won’t use it to influence public opinion around the world. Twitter announced Thursday it removed 23,750 accounts linked to Chinese-backed propaganda campaigns. Those accounts made up the core of the effort, the company said, while another 150,000 sought to amplify the content on those core accounts. Much of the activity was aimed at undermining pro-democracy protests in Hong Kong, the coronavirus pandemic and discrediting Chinese dissidents, researchers found. Researchers from Stanford University’s Internet Observatory determined that the Twitter activity focused on COVID-19 accelerated in January and peaked in March. Often, the accounts would praise the Chinese government’s response to the pandemic, call for global unity on the issue and bristle at the notion that Taiwan’s government responded to the health crisis in an effective manner. The themes echo prior propaganda in other suspected Chinese social media operations and official […] The post Twitter nabs a network of Chinese accounts demonizing pro-democracy protests, spinning coronavirus news appeared first on CyberScoop. (CyberScoop)

Despite resolution not to give in to hackers’ ransom demands, some cities are still paying up after attacks

The City of Florence in northern Alabama has agreed to pay a ransom of US $300,000 worth of Bitcoin to hackers who compromised its computer systems and deployed ransomware. And they’re not the only US city finding themselves dealing with the aftermath of a ransomware outbreak this week… Read more in my article on the Hot for Security blog. (Graham Cluley)

Suspicious wife fails to get good password advice from The Guardian

The Guardian offers relationship advice over an unwise password choice, but fails to give any good password advice. (Graham Cluley)

Intel patches chip flaw that could leak your cryptographic secrets

Intel chip features that were intended to help you do cryptography better could have leaked your inner secrets. (Naked Security)

Facebook paid for a 0-day to help FBI unmask child predator

A third-party cybersecurity firm were paid to drill a hole in a Tor-reliant operating system to uncover a man who spent years sextorting young girls. (Naked Security)

Twitter wants to know if you meant to share that article

In a bid to stop the spread of fake news Twitter has launched a test feature to remind users to read articles before retweeting them. (Naked Security)

This Extensive Python Training Is Under $40 Today

Choosing which programming language to learn next can seem like a nearly impossible task, regardless of whether you're a novice developer or a seasoned coding pro with years of experience creating apps and websites. But if you haven't already learned Python, look no further.

We've already established why Python is an excellent programming language for penetration testers, white-hat hackers, and those in cybersecurity, so we won't repeat ourselves. Instead, check out our post on the benefits of Python for hacking to read more about why you need to hone your Python skills.

In general, Python... more (Null Byte « WonderHowTo)

How to Program an ESP8266 or ESP32 Microcontroller Over Wi-Fi with MicroPython

The only thing better than programming MicroPython is programming MicroPython over Wi-Fi. So once you set up MicroPython on a microcontroller and have it on its own power source, you won't need to use a data cable to connect to it whenever you need to interact with it, program it, upload files, or grab data.

The MicroPython REPL interface is very simple, which makes it an attractive option for an ESP8266 or EP32 board, and the WebREPL interface is even more convenient. After setting everything up initially, you can connect and control the board over its Wi-Fi access point, then program or... more (Null Byte « WonderHowTo)

Italian Company Exposed As A Front For Malware Operations

(News ≈ Packet Storm)

Microsoft Outlook Users Targeted By Gamaredon’s New VBA Macro

(News ≈ Packet Storm)

Congress Wants To Know What Commercial Spyware Other Countries Are Using

(News ≈ Packet Storm)

Twitter Deletes 170k Accounts Linked To China Influence Campaign

(News ≈ Packet Storm)

What is the Gibberish Hack?

Discovering some random folder with numbers and letters you don’t remember on your website would make any website owner put on their detective cap. At first, you may think, “Did I leave my FTP client open and my cat ran across the keyboard?” But when you open the folder, you find a series of HTML files, each named with some kind of nonsensical phrases like “cheap-cool-hairstyles-photos.html.” If you open one of these files on the browser, you’ll likely be redirected to something you’re not expecting, such as a suspicious ecommerce site or an error page. Continue reading What is the Gibberish Hack? at Sucuri Blog. (Sucuri Blog)

Knoxville Ransomware Attack Leads to IT Network Shutdown

The ransomware attack hit the Tennessee city of Knoxville this week, causing disruptions in various services. (Threatpost)

Microsoft Joins Ban on Sale of Facial Recognition Tech to Police

Microsoft has joined Amazon and IBM in banning the sale of facial recognition technology to police departments and pushing for federal laws to regulate the technology. (Threatpost)

Android ‘ActionSpy’ Malware Targets Turkic Minority Group

Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages. (Threatpost)

11-06-202013-06-2020

/security-daily/ 13-06-2020 23:44:23