Skip to content

Gotham Security Daily Threat Alerts

by on December 10, 2014

December 9, Securityweek – (International) Newly discovered ‘Turla’ malware targets Linux systems. Kaspersky Lab researchers identified a piece of malware targeting Linux systems associated with the Turla advanced persistent threat (APT) group (also known as Uroburos or Snake) that is based on the cd00r proof-of-concept backdoor and is capable of hidden network communications, remote management, and arbitrary remote command execution. Previous versions of Turla malware have targeted Windows systems in government agencies, military groups, educational institutions, pharmaceutical companies, and other targets in more than 45 countries. Source: http://www.securityweek.com/newly-discovered-turla-malware-targets-linux-systems

December 9, Reuters – (International) Fraud from bots represents a loss of $6 bln in digital advertising. The Association of National Advertisers and researchers with White Ops released a report December 9 which found that around 25 percent of video ads and 11 percent of display ads online are viewed by automated bots set up by cyber criminals to inflate Web site audiences. The researchers stated that such fraud could cost advertisers an estimated $6.3 billion in the next year. Source: http://www.reuters.com/article/2014/12/09/advertising-fraud-study-idUSL1N0TS19220141209

December 9, Softpedia – (International) POODLE attack also affects some TLS implementations. A researcher with Google reported that certain implementations of Transport Layer Security (TLS) with an SSL 3.0 decoding function can be exploited through POODLE attacks to decrypt sensitive information. The researcher identified the vulnerability in older versions of Network Security Services (NSS) as well as in Web sites administered by Bank of America with load balancing devices from A10 Networks and F5 Networks. Source: http://news.softpedia.com/news/POODLE-Attack-Also-Affects-Some-TLS-Implementations-466944.shtml

December 9, Help Net Security – (International) Info on millions of AliExpress customers could have been harvested due to site flaw. A security researcher identified and reported a flaw in the AliExpress online marketplace that could have allowed a logged-in user to exploit an insecure direct object reference vulnerability to view other users’ names, addresses, and phone numbers. Alibaba, parent company of AliExpress, closed the vulnerability after the researcher’s report. Source: http://www.net-security.org/secworld.php?id=17741

December 8, Softpedia – (International) Yik Yak flaw de-anonymizes user, allows control over account. SilverSky researchers identified and reported a vulnerability in the Yik Yak anonymous social media platform for iOS that could allow an attacker to discover the identity of a user and take over their account due to the Flurry advertising tool sending the app’s secure ID used by the app in the place of a password without encryption. The researchers reported the issue to Yik Yak and a patch was released in December. Source: http://news.softpedia.com/news/Yik-Yak-Flaw-De-anonymizes-User-Allows-Control-Over-Account-466877.shtml

December 8, Securityweek – (International) Google App Engine plagued by tens of vulnerabilities: Researchers. Security Explorations researchers reported identifying several vulnerabilities in the Google App Engine platform-as-a-service (PaaS) product, including issues that could be used to achieve a complete sandbox escape. Google confirmed that it received the researchers’ report and was analyzing the reported issues. Source: http://www.securityweek.com/google-app-engine-plagued-tens-vulnerabilities-researchers

December 8, IDG News Service – (International) Attackers knock PlayStation Network offline for hours. Sony Computer Entertainment America acknowledged that some users of its Sony Playstation Network (PSN) were unable to access the service for several hours December 7 due to an apparent attack. Attackers identifying themselves as the Lizard Squad group claimed credit for the disruption. Source: http://www.networkworld.com/article/2856673/attackers-knock-playstation-network-offline-for-hours.html

December 8, Securityweek – (International) New variant of Neverquest banking trojan targets North America. Researchers with IBM Trusteer reported December 5 that they have observed a new variant of the Neverquest banking trojan being used predominantly against financial institutions in North America, with some additional targets in the media, gaming, and social networking industries. The malware has been distributed by drive-by downloads using exploit kits as well as by the Chaintor and Zemot trojan downloaders. Source: http://www.securityweek.com/new-variant-neverquest-banking-trojan-targets-north-america

December 8, Tampa Tribune – (Florida) Fugitive arrested in Tampa credit-card fraud ring. Federal authorities announced December 8 that the alleged leader of a payment card skimming and fraud ring in Tampa that stole more than $650,000 from financial institutions by using keyloggers on point of sale terminals was arrested after more than a year as a fugitive. Several co-conspirators were previously convicted and sentenced for their roles in the fraud ring. Source: http://tbo.com/news/crime/fugitive-arrested-in-tampa-credit-card-fraud-ring-20141208/

From → Security

Comments are closed.

%d bloggers like this: