Security daily (28-08-2020)

How to use trust policies with IAM roles

AWS Identity and Access Management (IAM) roles are a significant component in the way customers operate in Amazon Web Service (AWS). In this post, I’ll dive into the details on how Cloud security architects and account administrators can protect IAM roles from misuse by using trust policies. By the end of this post, you’ll know […] (AWS Security Blog)

Elon Musk confirms that attempted Russian ransomware attack was aimed at Tesla

Well, that mystery is solved. Tesla chief executive Elon Musk said in a tweet Thursday night that the company was targeted by a “serious” ransomware attack that was thwarted by the FBI. The U.S. Department of Justice on Wednesday announced that police had arrested a Russian man accused of offering $1 million to an unnamed person to hack their employer. The plan was to infect the company’s factory, based in Sparks, Nevada, with malware, then direct a distributed denial-of-service attack against its services, knocking it offline. When the victim ultimately paid an extortion fee, attackers’ logic went, hackers would split the proceeds with the inside source. And the hackers might have gotten away with it, too, if it wasn’t for that meddling employee. Multiple Tesla-focused blogs reported Thursday that the firm was the intended victim of the scheme, though the reporting wasn’t confirmed until Musk’s tweet. Much appreciated. This was a […] The post Elon Musk confirms that attempted Russian ransomware attack was aimed at Tesla appeared first on CyberScoop. (CyberScoop)

Fake Android notifications – first Google, then Microsoft affected

Were you woken up by a bogus Android notification from Google or Microsoft this week? (Naked Security)

Learn Java with This Best-Selling Bundle for Just $36

If you're an aspiring or even well-established web or app developer, the good news is that there's a virtually limitless number of lucrative opportunities waiting for you, regardless of whether you're looking to work for a company or as a freelancer.

The bad news is that competition for the best positions in this field is fierce, and if you want to stand out from the crowd, you need to have a wide range of programming languages and platforms in your coding toolkit.

But not all programming languages have the same impact when it comes to being a successful web and app developer, and if you... more (Null Byte « WonderHowTo)

Academics Bypass PINs For Visa Contactless Payments

(News ≈ Packet Storm)

Trojan Infects NCR, Posing Risk To Supply Chain

(News ≈ Packet Storm)

Elon Musk To Show Off Working Brain Hacking Device

(News ≈ Packet Storm)

Tesla Was The Target Of Failed Cyberattack, Elon Musk Confirms

(News ≈ Packet Storm)

Persistent WordPress User Injection

Our team recently stumbled across an interesting example of malicious code used to add an arbitrary user inside WordPress. The following code was detected at the bottom of the theme’s functions.php. It uses internal WordPress functions like wpcreateuser() and add_role() to create a new user and elevate its role to “administrator:”

The most interesting component of this sample is that the init (initialization) hook called from addaction() triggers the prefixadd_user() every time the Website finishes loading. Continue reading Persistent WordPress User Injection at Sucuri Blog. (Sucuri Blog)

Iranian Hackers Pose as Journalists to Trick Victims Into Installing Malware

An Iranian cyberespionage group known for targeting government, defense technology, military, and diplomacy sectors is now impersonating journalists to approach targets via LinkedIn and WhatsApp and infect their devices with malware.

Detailing the new tactics of the "Charming Kitten" APT group, Israeli firm Clearsky said, "starting July 2020, we have identified a new TTP of the group, (The Hacker News)

Instagram ‘Help Center’ Phishing Scam Pilfers Credentials

Researchers warn that a phishing scam is targeting Instagram users via direct messages on the app. (Threatpost)

Elon Musk Confirms, Tesla Factory a Target of Foiled Cyberattack

A Tesla employee was reportedly approached by a Russian national and asked to install malware on the company's systems. (Threatpost)

DoJ Aims to Seize 280 Cryptocurrency Accounts Used by Hackers

Complaint details collaboration with China to funnel $250m in stolen funds as part of state-sponsored attacks. (Threatpost)


/security-daily/ 29-08-2020 23:44:23