Friday, August 7, 2009

Around The Horn vol.1,144

Exploit allows Apple keyboard ownage through firmware

By jeff.smykil@gmail.com (Jeff Smykil) on security

One of the Apple-related talks given at this year's Black Hat security conference dealt with keyboard firmware. Given by "KChen," the talk discussed "Reversing and Exploiting an Apple Firmware Update." While it may not seem like much on the surface, the truth quickly becomes apparent: if someone gains access to your keyboard's firmware, there are a multitude of ways in which they can further compromise your machine.

There are two ways in which this exploit can be perpetrated. The first is if someone has physical access to your computer and your administrative password, and the second is if someone has already gained access to a machine remotely through a rootkit hack. Why would an attacker want anything to do with a keyboard when he already has free reign on a system? The answer, as KChen pointed out, is that an affected user can patch the rootkit exploit and even reformat the drive, but the attacker could still have access to the keyboard.

Twitter warms up malware filter

By Vivian Yeo

Twitter's new malware filter is a sign the social media site is stepping up efforts to stem attacks, but the measure has its shortcomings, say security experts.

Twitter's filtering mechanism was highlighted by Mikko Hypponen, chief research officer of F-Secure, in a blog post Monday. When a user ...

Hanging with hackers can make you paranoid

By Elinor Mills

At a hacker conference no one is safe.

When I first went to Defcon in 1995, the halls were mobbed with teenagers and attendees seemed more concerned with freeing Kevin Mitnick ...

Defcon: What to leave at home and other do's and don'ts

By Elinor Mills

Attending Defcon and Black Hat can make you feel a bit like a deer in a forest full of hunters.

New Firefox patches authentication security holes

By Stephen Shankland

Mozilla on Monday released two new versions of Firefox, 3.5.2 and 3.0.13, to patch two critical security holes.

"We strongly recommend that all Firefox users upgrade to this latest release," Mozilla said in a blog posting about the security issue.

The first vulnerability could let an ...

Report: White House acting cyberspace chief resigns

By Michelle Meyers

Melissa Hathaway, acting cyberspace director for the White House's National Security and Homeland Security councils, has resigned from her post, citing personal ...

Using software updates to spread malware

By Elinor Mills

LAS VEGAS--Two researchers from Israeli security firm Radware have figured out a way to trick computers into downloading malware or take over a computer by hijacking the communications during the update process for Skype and other applications.

Normal service will be resumed

By Rik Ferguson on Opinion

Just a quick note to let regular readers know that I may go a little quiet over the next week or so.   I was lucky enough to become a dad again this weekend, so I’ll be spending some time with the family, normal service will be resumed very shortly, never fear.

Dan Kaminsky & Kevin Mitnick Hacked

By Darknet on ~el8

If any of you follow the mailings lists or the ’scene’ as it’s known, you’d be familiar with PHC, Phrack, Gobbles, ~el8, Silvio, gayh1tler and the whole Whitehat Holocaust AKA pr0j3kt m4yh3m. (Back when it went public). The war against whitehats has started up again more vehemently recently with zine known as zero for owned or [...]

Researchers To Release Tool That Silently Hijacks EV SSL Sessions

Black Hat USA session will demonstrate new man-in-the middle attacks on Extended Validation SSL

Tech Insight: It's About DAM Time

Given today's threats to data from targeted attacks and unsavory insiders, it's no longer a question of whether or not to adopt database activity monitoring

DEFCON Attendees Uncover ATM Scams

In Vulnerability Research

Attendees of the DEFCON 17 conference uncovered two malicious ATMs at Las Vegas casinos. It is unclear how long the machines had been there or how many people had been victimized.

Report: White House acting cyberspace chief resigns

Posted by InfoSec News on Aug 4

http://news.cnet.com/8301-13578_3-10302297-38.html

By Michelle Meyers
Politics and Law
CNet News
August 3, 2009

Melissa Hathaway, acting cyberspace director for the White House's National Security and Homeland Security councils, has resigned from her post, citing personal reasons,...

The Best (and Worst) Hacks of Defcon Computer Security Conference 2009

Posted by InfoSec News on Aug 4

http://www.fastcompany.com/blog/kit-eaton/technomix/defcon-computer-security-conference-scary-all-sorts-reasons

By Kit Eaton
Fast Company
August 3, 2009

Computer security is a famously murky world that tends to generate alarmist headlines--like the ones about Apple's vulnerabilities from...

Cyber Terrorism Measures regarding 7.7 DDoS Attack

Posted by InfoSec News on Aug 4

http://www.koreaittimes.com/story/4348/cyber-terrorism-measures-regarding-77-ddos-attack

By Yeon Choul-woong
Korea IT Times
August 3, 2009

According to government sources, the Korean government will work out comprehensive anti-cyber terrorism measures this month to respond to acts like...

Halted 03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk

Posted by InfoSec News on Aug 4

http://www.nytimes.com/2009/08/02/us/politics/02cyber.html

By JOHN MARKOFF and THOM SHANKER
The New York Times
August 1, 2009

It would have been the most far-reaching case of computer sabotage in history. In 2003, the Pentagon and American intelligence agencies made plans for a...

BKIS plans to sue network security agency for defamation

Posted by InfoSec News on Aug 4

http://www.thanhniennews.com/society/?catid=3&newsid=51281

By Truong Son
Thanh Nien News
31 July, 2009

The Vietnam Computer Emergency Response Team (VNCERT) said in a letter that Hanoi-based Bach Khoa Internetwork Security, known as BKIS, had violated international law by...

Security lapse makes GPAs visible

Posted by InfoSec News on Aug 4

http://www.dailyemerald.com/news/security-lapse-makes-gpas-visible-1.236115

By Alex Tomchak Scott
News Editor
Oregon Daily Emerald
August 3, 2009

The University has fixed a security breach in its DuckWeb system after a student used it to look at three other students degree audits.

Desperately seeking cyber skills

Posted by InfoSec News on Aug 4

http://fcw.com/articles/2009/08/03/buzz-cybersecurity-shortage-and-challenge.aspx

By Michael Hardy
FCW.com
July 31, 2009

These days, not all new recruits to national defense need to drop and do a hundred one-armed push-ups on the command of some sadistic drill sergeant. Computer security...

Malicious ATM Catches Hackers

Posted by InfoSec News on Aug 3

http://www.wired.com/threatlevel/2009/08/malicious-atm-catches-hackers/

By Kim Zetter
Threat Level
Wired.com
August 2, 2009

LAS VEGAS  There’s no honor among thieves, nor apparently among hackers.

A malicious ATM kiosk was positioned in the conference center of the Riviera Hotel...

Apple Fixes iPhone SMS Vulnerability Highlighted at Black Hat

Posted by InfoSec News on Aug 3

http://www.eweek.com/c/a/Security/Apple-Fixes-iPhone-SMS-Vulnerability-Highlighted-at-Black-Hat-690423/

By Brian Prince
eWeek.com
2009-07-31

Apple has swatted a bug in the iPhone that security researchers Charlie Miller and Collin Mulliner spotlighted at the Black Hat security conference...

In French Inquiry, a Glimpse at Corporate Spying

Posted by InfoSec News on Aug 3

http://www.nytimes.com/2009/08/01/business/global/01iht-spy.html

By DAVID JOLLY
The New York Times
July 31, 2009

PARIS รข€” The story has the elements of a corporate thriller: a cast of characters that includes former French spies and military men, an American cycling champion, Greenpeace...

Identity theft hackers attack MI5 website

Posted by InfoSec News on Jul 30

http://www.telegraph.co.uk/technology/news/5937833/Identity-theft-hackers-attack-MI5-website.html

By Alastair Jamieson
Telegraph.co.uk
30 July 2009

The security breach could also have enabled the hackers to download viruses onto the machines of anyone using the organisation’s website,...

Details on presidential motorcades, safe house for First Family, leak via P2P

Posted by InfoSec News on Jul 30

http://www.computerworld.com/s/article/9136053/Details_on_presidential_motorcades_safe_house_for_First_Family_leak_via_P2P?taxonomyId=17

By Jaikumar Vijayan
July 29, 2009
Computerworld

Details about a U.S. Secret Service safe house for the First Family -- to be used in a national...

Real Black Hats Hack Security Experts on Eve of Conference

Posted by InfoSec News on Jul 30

http://www.wired.com/threatlevel/2009/07/kaminsky-hacked/

By Kim Zetter
Threat Level
Wired.com
July 29, 2009

LAS VEGAS - Two noted security professionals were targeted this week by hackers who broke into their web pages, stole personal data and posted it online on the eve of the Black...

Black Hat: Android, iPhone SMS Flaws Revealed

Posted by InfoSec News on Jul 30

http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=218800192

By Thomas Claburn
InformationWeek
July 29, 2009 07:08 PM

In a presentation at the Black Hat security conference in Las Vegas on Thursday, security researchers Charlie Miller and Collin...

New tool could help computer forensics move off the disk and into memory

Posted by InfoSec News on Jul 30

http://gcn.com/articles/2009/07/29/black-hat-briefings-memory-forensics.aspx

By William Jackson
GCN.com
July 29, 2009

LAS VEGAS - Tools such as Metasploit’s meterpreter for the automated delivery of stealthy payloads are making it more difficult for researchers to find out after the...

Researchers offer tools for eavesdropping and video hijacking

By Elinor Mills

LAS VEGAS--Showing off technology that James Bond would love, two researchers at Defcon on Friday demonstrated tools that allow people to eavesdrop on video conference calls and intercept surveillance camera video.

An attacker needs to be in the same building as the victims to carry out the man-in-the-middle attacks over ...

Clampi Trojan stealing online bank data from consumers and businesses

By Elinor Mills

LAS VEGAS--Hundreds of thousands of Windows computers are believed to be infected with a Trojan called "Clampi" that has been stealing banking and other ...

Report finds fake antivirus on the rise

By Elinor Mills

Malware posing as antivirus software is spreading fast with tens of millions of computers infected each month, according to a report to be released on Wednesday from PandaLabs.

PandaLabs found 1,000 samples of fake antivirus software in the first quarter of 2008. In a year, that number had grown ...

Microsoft offers patches to ward off ActiveX attacks

By Elinor Mills

Microsoft released an emergency patch on Tuesday to protect Internet Explorer users from a hole in technology used to build ActiveX controls and other Web application components that has been targeted in attacks.

A critical patch for all versions of IE will protect consumers, while a security update for Visual ...

Mozilla patches three public Firefox bugs

Mozilla today patched Firefox 3.5 and Firefox 3.0 to quash three security vulnerabilities, including a pair unveiled last week at Black Hat, and a third Mozilla itself revealed last month.

Security analyst: Las Vegas ATMs may have malware

The U.S. Secret Service said on Monday it is investigating a group of ATM machines in Las Vegas that are debiting people's accounts but not dispensing cash.

Govt pilots anti-cyber bullying project

The Federal Government has announced a new pilot project aimed at curbing cyber bullying in Australian schools.

Vegas ATM Malware Demonstrates Banking Security Woes

Fake ATM machines have taken up residence around Las Vegas.

Report: Chinese hackers deface Melbourne film festival site

The organizer of 2009 Melbourne International Film Festival shuts down online ticket sales after recent attacks from what are alleged to be Chinese hackers after World Uyghur Congress president and Nobel Peace Price nominee Rebiya Kadeer were invited to attend the event, according to a report on Monday from The Standard, one of Hong Kong's English dailies.

Fast-Food FAIL: Drive-Thru Displays Point-of-Sale LAN Info

Rick Lawhorn went to a local fast-food chain one recent evening and found a potential security threat to go with his burger and fries.

Is Your Linksys or Netgear Router Open to Attack?

If you have a Linksys model WRT160N or Netgear RP614v4 router, it may be time to worry a little. At least according to a report out of Defcon from The Register. The vulnerability is based on CSRF, or cross-site request forgery, an issue with the cPanel web-based control software used to administrate the devices.

Twitter now blocking bad URLs, but imperfectly

Hoping to deal with a growing problem, Twitter has quietly introduced a feature to prevent users from posting links to malicious Web sites. But security experts say that it can be easily circumvented.

Kevin Mitnick seeks refuge from hackers

Kevin Mitnick, the ex-hacker turned security consultant, is such a high-profile target himself that the Web-hosting firm he was using finally told him it wouldn't host Web pages for him anymore.

Korean 'journalists' booted from Defcon

Four South Korean journalists were booted from the Defcon hacking conference this week after conference organizers decided their story didn't quite add up.

Fake ATM doesn't last long at hacker meet

Criminals running an ATM card-skimming scam made a big mistake this week: They tried to hit the Defcon hacker conference in Las Vegas.

Defense Department eyes hacker con for new recruits

The U.S. Air Force has found an unlikely source of new recruits: The yearly Defcon hacking conference, which runs Thursday through Sunday in Las Vegas.

MI5 website reportedly hacked

MI5's official website has been hacked in a bid to steal the identities of visitors to the site, according to media reports.

'Ear prints' will stop iPod and iPhone theft

Forget finger prints, scientists have found a way of using the "acoustic fingerprint" of a person's ear to make it possible to prevent other people using your iPod or iPhone.

ID card scheme costs hit £215m

The government has spent £215 million (US$353.7 million) on the national identity scheme, including ID cards and biometric passports.

Report: Apple to patch iPhone SMS bug Saturday

Apple on Saturday will patch a critical vulnerability that lets hackers take control of users' iPhones by sending malicious text messages, according to a report by the BBC.

British hacker's mom wants Obama's help on extradition

Shortly after a British court ruled today that it wouldn't stop the extradition of British hacker Gary McKinnon, the man's mother called on President Barack Obama to stop the legal proceedings.

Security Fixes for Adobe Flash, Reader, Acrobat, AIR

Adobe has issued a range of patches for its most popular software to head off malware-pushing assaults that use poisoned PDF files to trigger a flaw in Flash.

Adobe updates Acrobat, Reader with security improvements

Adobe Systems has updated Acrobat and Reader to version 9.1.3. Both updates are available through the Adobe Updater application or for download through Adobe's Web site.

Enter to win one of 15 copies of 'Practical Intrusion Analysis'

We have 15 copies of 'Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century' to give to 15 lucky readers.Deadline for entries: August 31, 2009.

Mozilla squashes critical bugs in Firefox
SSL spoofing vuln slain

Mozilla on Monday issued an update for Firefox that fixes four critical security bugs in the popular open-source browser, including one exposed last week that could make it easy for attackers to spoof SSL certificates used to secure websites.…

AES encryption not as tough as you think
Cipher attack shaves safety margin

Cryptographers have found a new chink in the widely used AES encryption standard that suggests the safety margin of its most powerful cipher is not as high as previously thought.…

Twitter starts filtering links to malware sites
Block and tackle

Micro-blogging site Twitter has begun filtering links to known malware sites.…

Fake ATM scam rumbled by Defcon hackers
Black hats in Fear & Loathing conference moment

White hat hackers attending the DefCon conference in Vegas last week uncovered the presence of a fake ATM in the show's venue.…

PerlMonks suffers unholy hack
Tidings without comfort or joy

Web developer site PerlMonks is obliging users to change up their passwords, following a successful hacking attack.…

cPanel, Netgear and Linksys susceptible to nasty attack
Unholy trinity

Defcon If you use cPanel to administer your website or certain Linksys or Netgear devices to route traffic over your wireless network, you're susceptible to web-based attacks that could take complete control of your systems, two security researchers said Saturday.…

Switch hardening on your network, (Mon, Aug 3rd)

For many pentesters, myself included, switches and routers are a favourite target when performing in ...(more)...

Website Warnings, (Sat, Aug 1st)

We received an email today from a lady who runs a website that helps to look for and locate missing ...(more)...

Firebird SQL op_connect_request main listener shutdown vulnerability

A remote denial of service vulnerability has been found in Firebird SQL, which can be exploited by a remote attacker to force the server to close the socket where it is listening for incoming connections and to enter an infinite loop, by sending an unexpected 'op_connect_request' message with invalid data to the server.

Cisco Using Microsoft Active Template Libraries Vulnerability

Certain Cisco products that use Microsoft Active Template Libraries (ATL) and headers may be vulnerable to remote code execution. In some instances, the vulnerability may be exploited against Microsoft Internet Explorer to perform kill bit bypass. In order to exploit this vulnerability, an attacker must convince a user to visit a malicious web site.

FreeBSD BIND named(8) Dynamic Update Message Denial of Service Vulnerability

When named(8) receives a specially crafted dynamic update message an internal assertion check is triggered which causes named(8) to exit.

HP ProLiant DL/ML 100 Series G5 G6 Servers Remote Denial of Service

A potential vulnerability has been identified with certain HP ProLiant DL/ML 100 Series G5/G6 Servers with ProLiant Onboard Administrator Powered by LO100i.

Akamai Download Manager Execution of Arbitrary Code

Akamai has become aware of a security vulnerability within the Akamai Download Manager up to and including version 2.2.3.7 of the ActiveX control.

Apple iPhone Arbritary Code Execution

Calling the CSS attr() attribute with a large number leads to memory corruption, heap spraying allows execution of code.

Hathaway Resigns as U.S. Cyber-security Chief

Acting cyber-security chief Melissa Hathaway will reportedly step down Aug. 21. Hathaway, who headed up President Obama's 60-day review on the nation's cyber-infrastructure, says she is leaving for personal reasons.

WatchGuard Buys BorderWare for E-Mail, Web Security

WatchGuard Technologies has purchased BorderWare Technologies to get into the e-mail and Web content security business, the company says. WatchGuard says the move will help it compete against Google and Cisco Systems in the messaging security space. The official announcement will be Aug. 4.

Brief: Defense deputy calls for identity chief

Defense deputy calls for identity chief

Vegas ATM Malware Demonstrates Banking Security Woes (PC World)

In technology

PC World - Fake ATM machines have taken up residence around Las Vegas.

Security Analyst: Las Vegas ATMs May Have Malware (PC World)

In technology

PC World - The U.S. Secret Service said on Monday it is investigating a group of ATM machines in Las Vegas that are debiting people's accounts but not dispensing cash.

Hackers expose weakness in visiting trusted sites (AP)

In technology

AP - A powerful new type of Internet attack works like a telephone tap, except operates between computers and Web sites they trust.

Apple: GarageBand leaks user data to advertisers

By Ryan Naraine on Vulnerability research

Apple today warned that its GarageBand software is leaking users’ Web activity to third parties and advertisers. The company shipped GarageBand 5.1 to plug the hole and advise users to tweak their Safari browser preferences to avoid data leakage.  Here’s the relevant information from Apple’s advisory: CVE-2009-2198: When GarageBand is opened, Safari’s preferences are changed to always [...]

Does Twitter's malware link filter really work?

By Dancho Danchev on Web 2.0

Today, researchers from F-Secure stumbled upon a long-anticipated feature in Twitter’s fight against malicious abuse of its service - a malware URL filter preventing automatically registered or compromised legitimate accounts from tweeting known malicious links. Whenever a Twitter user is attempting to post a link to a known malware/phishing URL, a “Oops! Your tweet contained a [...]

Twitter turns to Google for help with malware attacks

By Ryan Naraine on Web Applications

As it scrambles to cope with a noticeable surge in malware attacks targeting its users, Twitter has found a friend in Google. The popular micro-blogging service has quietly started using the Google Safe Browsing API to block links to known malicious Web sites. [ SEE: Guy Kawasaki's Twitter account hijacked, pushes Windows and Mac malware ] The Safe [...]

Black Hat recap podcast: SSL, SMS, BIOS rootkits

By Ryan Naraine on iPhone

In this podcast, I chat with Threatpost.com co-editor Dennis Fisher about the big news coming out of the Black Hat security conference.  We discuss the attacks using SMS and MMS, rootkits in keyboards and BIOSes, vulnerabilities in SSL and the response from vendors to these problems. Listen here [mp3].

Dead-finger tech: 3G USB Modem, Prestigio Powerbank 501

By Dancho Danchev on Uncategorized

Connectivity is addictive, and in my line of work it’s a prerequisite for timely assessing the latest cybercrime incidents as they emerge in order to properly respond to them. Next to connectivity, I put mobility as the second most important success factor, in particular my ability to increase the average working time for my power-hungry [...]

Mozilla patches 'critical' Firefox flaws

By Ryan Naraine on Zero-day attacks

Mozilla has released two advisories to patch serious security flaws in its flagship Firefox Web browser. The vulnerabilities are rated “critical,” meaning they can be exploited by malicious hackers to run harmful code and install software, requiring no user interaction beyond normal browsing.   These issues were separately discussed at last week’s Black [...]

Hacker demos persistent Mac keyboard attack

By Ryan Naraine on Zero-day attacks

Apple’s sleek $49 Mac keyboards can be hacked and infected with keystroke loggers and impossible-to-detect rootkits, according to a security researcher presenting at this year’s Black Hat/DEFCON conferences. The researcher, known only as “K. Chen,” found a way to reverse engineer and tamper with the keyboard’s firmware upgrade. With the firmware under control, an attacker can [...]

Fake ATM, skimmers found in Las Vegas hotels

By Ryan Naraine on Vulnerability research

A Google security researcher attending the Black Hat/DEFCON conferences in Las Vegas was victimized by a skimming device placed in an ATM at the Rio All-Suite Hotel and Casino. Chris Paget, an RFID security expert who now works on Google’s security team, said he lost $200 to a rigged ATM that also claimed several other victims.   [...]

Apple patches Black Hat SMS attack flaw

By Ryan Naraine on iPhone

On the heels of a Black Hat conference demo of an iPhone hijack via text messages, Apple has shipped an iPhone update with patches for the security flaw. The iPhone OS 3.0.1 update, available only via iTunes, addresses a memory corruption issue in the way the device decodes SMS (text) messages.   Apple warned that a maliciously [...]

SB09-215: Vulnerability Summary for the Week of July 27, 2009

Vulnerability Summary for the Week of July 27, 2009

Cisco Security Center: IntelliShield Cyber Risk Report

July 27-August 2, 2009

Report Highlight: U.S. Government Websites Tracking Policy Proposal

White House cyber adviser Melissa Hathaway resigns

Melissa Hathaway, who led the administration's 60-day review of cyber policy and was considered a candidate for the new White House cyber coordinator position, will resign later this month, according to an article on The Wall Street Journal's Web site.

DOD rethinking social media access

Groups want more input in classification debate

Advocates for open government want to see national security adviser's recommendations for revising government data classification policy before they are sent to President Obama for consideration.

Come join the homeland security review

Starting today people can go online to participate in a wide-ranging review of the Homeland Security Department designed to help shape the department over the coming years.

McNamara: Give info-sharing office more authority

Thomas McNamara said the Program Manager for the Information Sharing Environment should have budgetary authority and the ability to direct policy changes.

DOD may ban Twitter, Facebook, other social media

The military is once again considering blocking social-media sites, for security reasons.

E-Verify could add biometrics

Sen. Charles Schumer (D-N.Y.) has begun laying the groundwork for adding a biometric — most likely a fingerprint — to the E-Verify federal employment verification system

U.K. agency releases 20-page policy for Twitter

In the U.S. and abroad, agencies determine how to deal with YouTube, Twitter and fake agencies.

The great cybersecurity star search

A consortium of private and government organizations has launched a program of competitions and educational opportunities for young people to build the next-generation cybersecurity workforce.

Desperately seeking cyber skills

Efforts to recruit young people into government cybersecurity roles could benefit everyone.

Bill would ban peer-to-peer use in agencies

A House committee chairman who has jurisdiction over some government operations plans to introduce a bill designed to ban the use of peer-to-peer software on government and contractor networks.

Group opposes making contractors use E-Verify

The Professional Services Council opposes Senate legislation would require federal contractors to use the E-Verify system for new and existing employees.

Committee approves bill to strip some IT requirements from Real ID

A bill that would remove costly information technology requirements from a secure identification law has been approved by a Senate committee.

Spires named new CIO at DHS

Richard Spires is the Homeland Security Department's top information technology executive.

OMB evaluates federal Web tracking policies

The Office of Management and Budget is re-evaluating federal policies barring the use of Web tracking tools.

GAO: Details needed on electronic records system

The National Archives and Records Administration's spending plan for its Electronic Records Archive system needs important details, GAO has found.

No comments:

Post a Comment

My Blog List