Security daily (22-04-2020)

Crown Sterling and Black Hat settle lawsuit, promise to never speak of it again

A lawsuit filed in the wake of a controversial cybersecurity presentation last year has ended with a whimper. Crown Sterling, which described itself as an “emerging digital cryptography” company, has entered into a confidential settlement with the company behind the Black Hat security conference. In a lawsuit filed last year, the vendor had accused Black Hat, owned by Informa Tech Holdings, of breach of contract after its content was pulled from the conference website in the aftermath of a sponsored presentation that saw independent cybersecurity researchers heckle Crown Sterling’s CEO. During Crown Sterling’s session at Black Hat on Aug. 8, CEO Robert Grant claimed his company had created an innovative new tool that would set a new standard in encryption with “quasi prime numbers” and “infinite wave conjugations.” Dan Guido, CEO of the consultancy firm Trail of Bits, told Grant he “should be ashamed” for selling technology that other technologists […] The post Crown Sterling and Black Hat settle lawsuit, promise to never speak of it again appeared first on CyberScoop. (CyberScoop)

Hackers have been exploiting two zero-days to break into iPhones and iPads

A zero-day vulnerability in Apple’s Mail application for iOS has been used to target high-profile victims around the world for more than two years, according to ZecOps research published Wednesday. The flaw, which ZecOps uncovered through conducting a routine digital forensics and incident response investigation, is triggered by sending emails that consume a “significant amount” of a device’s memory. From there, hackers could gain access to email accounts via Mail, gaining the ability to leak, modify, or delete emails. If the attackers want to cause additional harm and gain further access to victim devices, it “would require an additional infoleak bug [and] a kernel bug afterwards,” the researchers write in a blog that details their findings. ZecOps assesses with “high confidence” that individuals at a U.S. company in the Fortune 500, managed security service providers from Saudi Arabia and Israel, an executive in Japan, a journalist in Europe, and a […] The post Hackers have been exploiting two zero-days to break into iPhones and iPads appeared first on CyberScoop. (CyberScoop)

FBI enlists internet domain registries in fight against coronavirus scams

The U.S. Department of Justice is expanding its efforts to counteract a huge surge in internet scams related to the coronavirus pandemic. Federal officials announced Wednesday that ongoing cooperation between the government and a range of technology companies has resulted in the removal of hundreds of websites that included “coronavirus,” “covid19” and related phrases in their names. The goal, the Justice Department said, is to curb fraudulent sites that prey on pandemic anxieties to distribute malware, solicit donations or steal personal data. The FBI has received and reviewed more than 3,600 complaints related to coronavirus scams, mostly in connection with fake cures and fraudulent vaccines, the Justice Department said in a press release. Bureau officials previously estimated that the Internet Crime Complaint Center receives between 3,000 and 4,000 complaints per day, up from a prior average roughly 1,000 per day, though not all alerts are regarding the pandemic. “For cybercriminals there was […] The post FBI enlists internet domain registries in fight against coronavirus scams appeared first on CyberScoop. (CyberScoop)

Zoom bolsters software security in latest move to reassure users

Zoom, the videoconferencing service whose popularity has soared during the coronavirus pandemic, on Wednesday said it was adding security measures to its software following scrutiny from independent researchers. The next version of Zoom, to be released this week, will have stronger encryption for data sent between participants in a meeting to prevent tampering, the Silicon Valley-based company said. The software will also allow Zoom account administrators to choose which parts of the world they route their data through. The upgrade follows a report from the University of Toronto’s Citizen Lab that found Zoom routed some meeting encryption keys through China. The updates are an effort to adapt to the unprecedented amount of people using Zoom as they work from home during the COVID-19 pandemic. Some 200 million people used the software on a daily basis in March, and the Silicon Valley company at first appeared unprepared for the privacy and […] The post Zoom bolsters software security in latest move to reassure users appeared first on CyberScoop. (CyberScoop)

This Zoom trick would have spared swearing politician’s blushes

The Welsh Assembly had a Zoom meeting today to discuss the government’s response to the Coronavirus pandemic. It… err.. didn’t go entirely to plan. See what happened and how you can prevent it from happening to you. (Graham Cluley)

How to protect your Nintendo account from hackers with two-step verification (2SV)

Nintendo, like many other companies, offers two-step verification (2SV) to help users protect their online accounts from hackers. Here’s what you need to know. (Graham Cluley)

Porn scammers making $100,000 a month from sextortion emails

SophosLabs worked through five months’ worth of “porn scam” emails and followed the money. Learn what they found... (Naked Security)

309 million Facebook users’ phone numbers found online

First, 267m records were exposed & sold for 0.0002 cents each on the Dark Web. It was taken down but got reposted with yet more records. (Naked Security)

Gaming company targeted by Chinese Winnti hackers

Far from pausing operations during the COVID-19 pandemic, China’s notorious Winnti hacking group has been busy launching new attacks on targets, researchers say. (Naked Security)

How to Hunt Down Wi-Fi Devices with a Directional Antenna

If you've ever wanted to track down the source of a Wi-Fi transmission, doing so can be relatively easy with the right equipment.

Using a directional Wi-Fi antenna and Wireshark, we can create a display filter to target any device in range to plot the signal strength on a graph. By sweeping the antenna back and forth, we can easily discover which direction the signal is coming from by looking for spikes in signal strength on the graph.

Uses for Wi-Fi Signal Hunting

If you've ever seen a Wi-Fi network that doesn't belong, you might wonder if there is a way to track down where it's coming... more (Null Byte « WonderHowTo)

Here's Why You Need to Add Python to Your Hacking & Programming Arsenal

Choosing which programming language to learn next can be a truly daunting task. That's the case regardless of whether you're a Null Byter just beginning a career in development and cybersecurity or you're a seasoned ethical hacking and penetration tester with years of extensive coding experience under your belt. On that note, we recommend Python for anyone who hasn't mastered it yet.

Languages like Python are so universal and versatile that they've become essential tools for anyone serious about development and ethical hacking. Python, specifically, is a multipurpose language that allows you... more (Null Byte « WonderHowTo)

Hackers Have Breached 60 Ad Servers To Load Their Own Malicious Ads

(News ≈ Packet Storm)

Small Businesses Tapping COVID-19 Loans Hit With Data Exposure

(News ≈ Packet Storm)

Coronavirus: Health Leaders Credentials Dumped Online

(News ≈ Packet Storm)

Vietnam-Linked Hackers Targeted Chinese Government

(News ≈ Packet Storm)

PinnacleCart Server-Side Skimmers and Backdoors

While open-source ecommerce platforms are the most common targets for web skimmers, hackers also target paid-for software — especially if it’s used on high-profile online stores with large user-bases. This time, our analysts Kara Federow and Keith Petkus found malware on a website powered by PinnacleCart, a webstore solution used by a large number of popular websites with hundreds of thousands of monthly visitors. By default, PinnacleCart offers to host new stores, but they also allow users to purchase a license and install the software separately on an independent server. Continue reading PinnacleCart Server-Side Skimmers and Backdoors at Sucuri Blog. (Sucuri Blog)

Zero-Day Warning: It's Possible to Hack iPhones Just by Sending Emails

Watch out Apple users!

The default mailing app pre-installed on millions of iPhones and iPads has been found vulnerable to two critical flaws that attackers are exploiting in the wild, at least, from the last two years to spy on high-profile victims.

The flaws could eventually let remote hackers secretly take complete control over Apple devices just by sending an email to any targeted (The Hacker News)