Security Flash News from 27th of November to 1st of December, 2017

-
 0

On Monday (27th of November), we reported more news about a ransomware infection called Scarab. The infection raged across the world with a massive spam campaign. The campaign was possible due to participation of the infamous Necurs botnet which managed the distribution of 2 million malware-laden letters per hour. The total duration of the infamous campaign was six hours. In that time, botnet managed to send 12.5 million letters. In the email message, users were instructed to download a .zip file which would later on turn out to be malicious. The subject of the letter was fluctuating but based on this phrase “Scanned From [name of a company]”. More at: 2-viruses.com. 

Also on Monday it was reported that Justice Department of united States charged citizens of China for hacking into big companies (such as Siemens or Trimble) and stealing a lot of very sensitive information. These 3 men used to work for a cyber security company located in China, thus they have a strong knowledge in the field, which was used for unfair purposes. They have attacked corporations with phishing emails and infected computers of workers with malware, then stole various important data. More at: Justice.gov

On Tuesday (28th of November), we wrote about a rather random but serious vulnerability in the popular social networking platform of Facebook. The grand industry leader was determined to be flawed by a researcher named Pouya Darabi. He published an article, explaining that polling feature in Facebook allows users to delete photos from accounts that do not belong to them. While this is not extremely severe or high-risk, it is a violation of users’ rights. Not a single Facebook user would be pleased with a sudden deletion of their uploaded content. However, this is no longer a headache for members of this massive social club. Facebook has solved this flaw and rewarded Darabi with a bounty reward of $10,000. More at: 2-viruses.com

All users of macOS should listen up because following information is very important – especially if you have updated your system to the newest High Sierra version. It features a bug which allows anyone to gain root access, without using any passwords. This flaw was discovered by Apple Software Craftsman and developer Lemi Orhan Ergin. So basically all it takes to get a root access to your Mac is a physical ability to get to the computer. Instead of entering user name, you have to type in ‘root’ and leave the password field blank – that’s it, your’e inside as an administrator of the computer. Luckily, Apple reacted to this problem really quick and the patch is already out. More at: Twitter.com

Security Flash News

On Wednesday (29th of November), we were analyzing an unwelcome guest in the Google Play Store. A Tizi Android spyware threat was indicated to have targeted African countries. Infected victims would have become victims of an intense monitoring. Once Tizi spyware was inside a mobile device, hackers received permissions to record real-life and phone conversations, steal data from social networks, take screenshots, access contact lists, root devices through a number of vulnerabilities and much more. According to the calculations, most of the victims were from Kenya, Nigeria and Tanzania. More at: 2-viruses.com

Back in 2014 two Russian intelligence officers and two hackers from Russia were charged for hacking into Yahoo databases and breaching tons of data, affecting more than 3 billion private accounts. However, only one of the criminals was arrested – Karim Baratov, which was living in Toronto, Canada, at the time. 3 other suspects are in Russia and extradition is unlikely. Baratov admitted his guilt and also revealed that he was receiving orders from Russian government. Baratov is facing from 94 to 111 months in prison. More at: Justice.gov

On Thursday (30th of November), we paid attention to a very relevant issue of crypto-miners. These infections over-utilize users’ CPU or GPU, and can even be the reason for bigger electrical bills. This article focused on the common belief that crypto-mining stops when browsers are closed. However, security researchers determined that this is not always the case. Some miners can create a fake browser which won’t be visible to most users. It will be hidden behind the clock, the one found at the right corner. As crypto-jacking is becoming one of the biggest issues, it is recommended that users take advantage of reliable AdBlockers or appropriate security programs. More at: 2-viruses.com

There are also some good news in the cyber security field – online retail credit card fraud drops whooping 29 percent (from 59 to 42), comparing holiday week in 2016 and 2017. It is all due to the awareness of cyber security threats and enhanced technologies used by e-commerce retailers to ensure safety of their customers. More at:  GlobalNewsWire.com

On Friday (1st of December), we were delighted to announce some upcoming changes in Google. The corporation has explained that it will no longer accept applications that display lock-screen ads. Applications that work as lock-screens are going to be allowed. In addition to this unexpected decision, Google has also opted to prevent third-party code injection into Chrome browsers. As this modification can take time, Google itself a year to pursue its goal. The code-injection block is expected to be fully functional by 2019. The entire operation is divided into 3 phases. More at: 2-viruses.com

 

About the author

 - Main Editor

I have started 2-viruses.com in 2007 after wanting to be more or less independent from single security program maker. Since then, we kept working on this site to make internet better and safer place to use.

 
 
 

Leave a Reply

Your email address will not be published. Required fields are marked *