Security daily (29-01-2021)

Pro-Huawei influence campaign exploits AI, fake content to prop up firm

A pro-Huawei network of inauthentic Twitter accounts began a campaign last month railing against Belgium’s recent decision to limit 5G technology vendors it deems “high-risk,” according to Graphika research published Friday. Belgium’s plan on 5G vendors, which seeks to limit vendors that are “subject to interference from a non-EU country,” is widely believed to act as a curb on Chinese companies such as Huawei and ZTE. Governments around the world, including the U.S., have suggested that Beijing could force Huawei to comply with the Chinese government’s requests. The network of 14 accounts has been online since 2017, but only kicked into gear last year when they began tweeting about how Belgium’s plan is bad and how Huawei is a good business partner, according to the Graphika research. The campaign didn’t gain a lot of attention, according to the research. But for Graphika researcher Ben Nimmo, the campaign represents a new […] The post Pro-Huawei influence campaign exploits AI, fake content to prop up firm appeared first on CyberScoop. (CyberScoop)

After SolarWinds breach, lawmakers ask NSA for help in cracking Juniper cold case

As the U.S. investigation into the SolarWinds hacking campaign grinds on, lawmakers are demanding answers from the National Security Agency about another troubling supply chain breach that was disclosed five years ago. A group of lawmakers led by Sen. Ron Wyden, D-Ore., is asking the NSA what steps it took to secure defense networks following a years-old breach of software made by Juniper Networks, a major provider of firewall devices for the federal government. Juniper revealed its incident in December 2015, saying that hackers had slipped unauthorized code into the firm’s software that could allow access to firewalls and the ability to decrypt virtual private network connections. Despite repeated inquiries from Capitol Hill— and concern in the Pentagon about the potential exposure of its contractors to the hack — there has been no public U.S. government assessment of who carried out the hack, and what data was accessed. Lawmakers are […] The post After SolarWinds breach, lawmakers ask NSA for help in cracking Juniper cold case appeared first on CyberScoop. (CyberScoop)

Emotet, NetWalker and TrickBot have taken big blows, but will it be enough?

A trio of operations meant to disrupt ransomware outfits in recent months — two of which came to light this week — could have lasting impacts even if they stop short of ending the threat, security experts say. Researchers are still sizing up the effects of recent busts of the Emotet and NetWalker gangs, but those operations have the potential to be more potent than last fall’s maneuvers against the TrickBot ransomware. In research out Friday, Menlo Security — echoing similar conclusions from other cyber firms — said it saw signs of TrickBot recovering, but the rebound has amounted to just a “trickle.” U.S. Cyber Command and Microsoft had led separate efforts to disrupt the hacking infrastructure of TrickBot, a massive army of zombified computers. The fear was that the botnet could be used to carry out ransomware attacks afflicting the November elections. This week’s two operations might be more promising […] The post Emotet, NetWalker and TrickBot have taken big blows, but will it be enough? appeared first on CyberScoop. (CyberScoop)

The mystery of the missing Perl website

A long-running domain supporting the popular programming language Perl has suddenly vanished. We don't yet know how or why. (Naked Security)

Create a Mouse Jiggler with a Digispark & Arduino to Keep a Target Computer from Falling Asleep

While obvious, it's a lot more difficult to hack into a locked computer than an unlocked computer. As a white-hat hacker, pentester, cybersecurity specialist, or someone working in digital forensics, there's an easy solution — make it so that the computer won't fall asleep and lock automatically in the first place.

One way to stop a laptop or desktop computer from sleeping into a locked state is to use a mouse jiggler. It's a tactic used frequently by law enforcement to avoid having to get a password for the account later when examining the data for evidence. The suspect will likely not give... more (Null Byte « WonderHowTo)

Rocke Group's Malware Now Has Worm Capabilities

(News ≈ Packet Storm)

Bitcoin Soars 14% After Elon Musk Namecheck On Twitter

(News ≈ Packet Storm)

Google Bans Another Misbehaving CA From Chrome

(News ≈ Packet Storm)

Apple Comes Out Swinging Against Facebook Over Data Privacy

(News ≈ Packet Storm)

WordPress Pop-Up Builder Plugin Flaw Plagues 200K Sites

The flaw could have let attackers send out custom newsletters and delete newsletter subscribers from 200,000 affected websites. (Threatpost)

Microsoft 365 Becomes Haven for BEC Innovation

Two new phishing tactics use the platform's automated responses to evade email filters. (Threatpost)

Industrial Gear at Risk from Fuji Code-Execution Bugs

Fuji Electric’s Tellus Lite V-Simulator and V-Server Lite can allow attackers to take advantage of operational technology (OT)-IT convergence on factory floors, at utility plants and more. (Threatpost)

Apple iOS 14 Thwarts iMessage Attacks With BlastDoor System

Apple has made structural improvements in iOS 14 to block message-based, zero-click exploits. (Threatpost)

Lazarus Affiliate ‘ZINC’ Blamed for Campaign Against Security Researcher

New details emerge of how North Korean-linked APT won trust of experts and exploited Visual Studio to infect systems with ‘Comebacker’ malware. (Threatpost)


/security-daily/ 30-01-2021 23:44:23