Author Archives: CIRT Team



CIRT Team

in News Clipping

A cryptocurrency platform exposed sensitive data of 25,000 users [source: hackread]

Bezop, a cryptocurrency startup exposed highly personal details of more than 25,000 of its investors online which were publicly accessible to anyone with an Internet connection. The platform which is supported by John McAfee left the personal details exposed due to an unprotected MongoDB database. The exposed data included full names, email addresses, physical addresses, wallet information, encrypted passwords, copies driver’s license and passports. The database was discovered...

Read More

0
03 May 2018
in News Clipping

WannaCry Dominates as Ransomware Declines in 2017 [source: infosecurity-magazine]

WannaCry accounted for 90% of ransomware detections last year, with activity among other families declining as cyber-criminals gradually lost interest, according to new research from F-Secure. The Finnish security vendor’s latest report, The Changing State of Ransomware, revealed that aside from the notorious crypto-worm, Locky, Mole, Cerber, and Cryptolocker were also popular ransomware families in 2017. However, despite attacks increasing 415% on 2016 figures, and detections of...

Read More

0
03 May 2018
in News Clipping

APT28 Hackers Caught Hijacking Legitimate LoJack Software [source: bleepingcomputer]

Security researchers have found tainted versions of the legitimate LoJack software that appeared to have been sneakily modified to allow hackers inside companies that use it. Researchers say domains found inside the tainted LoJack instances have been previously tied to other hacking operations carried out by APT28, a codename used to describe a nation-state-backed cyber-espionage group located in Russia, with ties to the company’s military intelligence. APT28...

Read More

0
03 May 2018
in News Clipping

Dangers of Public WiFi: What You Need to Know [source: cloudwards]

Free WiFi is available nearly everywhere these days, giving us the ability to work remotely in hotels, coffee shops, restaurants and public parks. It’s convenient and liberating, but potentially unsafe. Connecting to a public network requires little authentication — at best you’ll be greeted by a captive portal and have to check a box agreeing to the terms of service (ToS), or ask an employee for the...

Read More

0
03 May 2018
in Security Advisories & Alerts

OpenSSL CVE-2018-0739 Denial of Service Vulnerability

Description: Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe Impact: An attacker can exploit this issue to cause denial-of-service conditions. OpenSSL...

Read More

0
03 May 2018
in Security Advisories & Alerts

Linux Kernel CVE-2017-7518 Privilege Escalation Vulnerability

Description: A flaw was found in the way the Linux KVM module processed the trap flag(TF) bit in EFLAGS during emulation of the syscall instruction, which leads to a debug exception(DB) being raised in the guest stack. A user/process inside a guest could use this flaw to potentially escalate their privileges inside the guest. Impact: An attacker can leverage this issue to gain elevated privileges...

Read More

0
03 May 2018
in Security Advisories & Alerts

Cisco Secure Access Control System Remote Code Execution Vulnerability

Description: A vulnerability in the ACS Report component of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected system. Commands executed by the attacker are processed at the targeted user’s privilege level. The vulnerability is due to insufficient validation of the Action Message Format (AMF) protocol. An attacker could exploit this vulnerability by sending a...

Read More

0
03 May 2018
in Security Advisories & Alerts

Cisco Wireless LAN Controller 802.11 Management Frame Denial of Service Vulnerability

Description: A vulnerability in the 802.11 frame validation functionality of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of certain 802.11 management information element frames that an affected device receives from wireless clients. An attacker could exploit...

Read More

0
03 May 2018
in Security Advisories & Alerts

Cisco Aironet 1800, 2800, and 3800 Series Access Points Secure Shell Privilege Escalation Vulnerability

Description: A vulnerability in the assignment and management of default user accounts for Secure Shell (SSH) access to Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running Cisco Mobility Express Software could allow an authenticated, remote attacker to gain elevated privileges on an affected access point. Impact: The vulnerability exists because the Cisco Mobility Express controller of the affected software configures the...

Read More

0
03 May 2018
in News Clipping

GandCrab Ransomware V2 Released With New .Crab Extension [source: bleepingcomputer]

Last week, security firm Bitdefender, the Romanian Police, and Europol allegedly gained access to the GandCrab Ransomware’s Command & Control servers, which allowed them to recover some of the victim’s decryption keys. This allowed Bitdefender to release a tool that could decrypt some victim’s files. After this breach, the GandCrab developers stated that they would release a second version of GandCrab that included a more secure command & control server in order...

Read More

0
26 Apr 2018
Page 70 of 134« First...102030...6869707172...8090100...Last »