28-05-202030-05-2020

Security daily (29-05-2020)

AWS Shield Threat Landscape report is now available

AWS Shield is a managed threat protection service that safeguards applications running on AWS against exploitation of application vulnerabilities, bad bots, and Distributed Denial of Service (DDoS) attacks. The AWS Shield Threat Landscape Report (TLR) provides you with a summary of threats detected by AWS Shield. This report is curated by the AWS Threat Response […] (AWS Security Blog)

How GitHub untangled itself from the ‘Octopus’ malware that infected 26 software projects

For GitHub, not all reports about malicious software on its platform are of equal importance. The company behind the popular software repository, where developers often share code rather than building it from scratch, revealed this week that attackers were trying to exploit the open-source nature of the site to distribute malware. A hacking tool was designed to spread through software projects, then leave a “backdoor” that could offer hackers persistent access to the software. By infiltrating open-source software, hackers could have given themselves a foothold in code that was later included in corporate apps or websites. Open-source websites continue to represent valuable targets for hackers hoping that technology companies will adopt compromised tools to build their own software. (GitHub claims the site has tens of millions of users.) In this case, the malicious code — which spread to 26 different GitHub projects — is an example of the potentially insidious nature of open-source supply chain compromises. Dubbed Octopus Scanner, […] The post How GitHub untangled itself from the ‘Octopus’ malware that infected 26 software projects appeared first on CyberScoop. (CyberScoop)

New York man nabbed for carrying computers with stolen credit card details through JFK, feds say

A New York City man caught carrying multiple computers containing thousands of stolen credit card numbers has been charged with an array of hacking-related crimes, U.S. prosecutors announced. Vitalii Antonenko was charged in Massachusetts on multiple counts of conspiracy – to commit computer hacking, launder money and traffic in stolen payment card numbers – in connection with a scheme to sell stolen data on cybercriminal markets. The U.S. Department of Justice announced on Wednesday that Antonenko, 28, was apprehended in March upon his arrival at John F. Kennedy Airport from Ukraine. He was charged Tuesday. Attorneys representing Antonenko did not immediately respond to a request for comment Friday. Antonenko, along with two unidentified co-conspirators, offered stolen data for sale on multiple carding websites dating back to 2012, according to a complaint. Law enforcement officials working undercover on the unnamed website spent more than two years, from June 2015 through September […] The post New York man nabbed for carrying computers with stolen credit card details through JFK, feds say appeared first on CyberScoop. (CyberScoop)

Pablo Escobar’s brother says FaceTime flaw revealed his address, sues Apple for a publicity stunt (and $2.6 billion)

As YouTubers warn the public not to buy smartphones from Escobar Inc, the notorious drug lord’s brother orchestrates a publicity stunt. Read more in my article on the Hot for Security blog. (Graham Cluley)

OPSEC fail! “Super-hacker” accidentally outs himself through careless clues left on social media

Hacker VandaTheGod didn’t realise he was leaving clues scattered across Facebook and Twitter that helped security researchers uncover his true identity. (Graham Cluley)

Clearview AI facial recogition sued again – this time by ACLU

Clearview AI, the company that's scraped billions of images to build a facial recognition system, is getting sued again. (Naked Security)

COVID-19 tests, PPE and antivirual drugs find a home on the dark web

COVID-19 testing kits, Hydroxychloroquine and PPE - it's all for sale on the dark web. (Naked Security)

Windows 10 adds new security and privacy features in May update

Windows 10 release 2004 is out, with a slew of new features, including several updates to its security and privacy. (Naked Security)

Google sued by Arizona for tracking users’ locations in spite of settings

Maps, weather, searches et al. suck up location data in the background, even if Tracking is turned off. Arizona says it's consumer fraud. (Naked Security)

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

You may be familiar with image-based or audio-based steganography, the art of hiding messages or code inside of pictures, but that's not the only way to conceal secret communications. With zero-width characters, we can use text-based steganography to stash hidden information inside of plain text, and we can even figure out who's leaking documents online.

Image- and audio-based steganography has been covered several times on Null Byte, which involves changing the least significant digit of individual pixels on a photo or audio file. While plain text characters don't have a least significant... more (Null Byte « WonderHowTo)

New Trickbot Malware Update Makes It Even Harder To Detect

(News ≈ Packet Storm)

Test Platform Leaks Bank Of America's Clients' Covid-19 PPP Loan Applications

(News ≈ Packet Storm)

ACLU Sues Clearview AI Over Faceprint Collection, Sale

(News ≈ Packet Storm)

Twitter Hides White House Tweet Calling For Killings Of Protestors

(News ≈ Packet Storm)

Steganography Anchors Pinpoint Attacks on Industrial Targets

Ongoing spear-phishing attacks aim at stolen Windows credentials for ICS suppliers worldwide. (Threatpost)

NTT Communications Data Breach Affects Customers, Threatens Supply Chain

Attackers managed to compromise NTT Communication’s Active Directory server and a construction information management server. (Threatpost)

NSA Warns of Sandworm Backdoor Attacks on Mail Servers

The Russian spy group, a.k.a. BlackEnergy, is actively compromising Exim mail servers via a critical security vulnerability. (Threatpost)

‘Hack-For-Hire’ Firms Spoof WHO To Target Google Credentials

Google TAG report reveals that "hack for hire" firms are tapping into the coronavirus pandemic via WHO phishing lures. (Threatpost)

ACLU Sues Clearview AI Over Faceprint Collection, Sale

Watchdog group said company has violated the Illinois BIPA and ‘will end privacy as we know it’ without intervention. (Threatpost)

28-05-202030-05-2020

/security-daily/ 30-05-2020 23:44:21