Malware for banking and ATMs, an inspiring SSH study that helped many attackers, and there is also a mention of DoubleLocker, the working Android ransomware.
You do not have much money? Invest in Cutlet Maker. You can get your money back on every corner - this malware toolkit focuses on ATMs of various production. With the Stimulator and COdeccalc programs delivered in the same $ 5,000 package, you first check how much cash is in the ATM and then generate a password to unlock the GUI interface toolkit. Then, at least according to sellers, you will start to take money. Commonly available on every decent criminal forum.
Additionally, malware is unique because its goal is not to misuse customer data, but directly exploits specific APIs without the need to interact with the customer itself. Malware has first discovered by Kaspersky Security Company in May 2017 at AlphaBay (later closed after the FBI raid) and now publishes a complete analysis.
The offer also includes extensive documentation; Instructions for use and access to instructional video tutorials; how to properly use malware - maybe there will be tips on how to make sure that you are not see by a security camera when you go with a sack on to the ATM.
Do you have Lenovo? Update! At the beginning of October 2017, an update was released silently, correcting four vulnerabilities on tablets and phones. Specifically, they refer to the Lenovo Service Framework Factory, through which alerts, bids, and upgrades flow. One of the vulnerabilities, for example, was that the private key to communication between Lenovo devices and servers was found on the Internet as part of the official manufacturer's demo application.
Vulnerability has existed since at least May 2017. If a potential attacker knew it, he would not have to bother up with counting a private key from the public key (as is possible with Infineon cryptographic chips).
A few days ago, Venafi released a study on the use of SSH in company practice. This study has shown many shortcomings. Now it looks like the study has been read by some attackers and they have massively scanned publicly available web folders that could contain SSH keys by keywords like "root", "ssh" or "id_rsa". Wordfence researchers have seen a sharp rise, especially in the hours immediately following the release of the above-mentioned study. Webmasters are particularly encouraged to check if they have accidentally added SSH keys to one of their versioning systems.
The smart watch for kids may not be as clever as it might seem. Watches provide parents with the ability to communicate with their children, including the ability to track their location. Children can also use a special SOS button to automatically call their parents. Unfortunately, some types of watches do not use encrypted communications to transfer and store data. This allows attackers, using simple hacking techniques, to eavesdrop on clock calls, detect or even change the GPS position. Some manufacturers who used unencrypted communications temporarily withdrew their products from the sale. It is beautiful that a lot of devices that have the name "smart" are not always as clever as they would expect.
Google has decided to extend the login security to its services. Google itself also indicated that this safety supplement was created mainly for those who face increased risk for some reason or are more paranoid than other users. When a user decides to use "Advanced Protection", the escaped password may not be a problem. The principle of protection is based on two physical keys - one in the form of USB for computers and one on the principle of Bluetooth for mobile devices. These keys use cryptography and digital signatures to verify for Google that the owner reports to the app. Only knowing the password will be inadequate. Google also announced that Chrome will use antivirus protection from ESET. This is a step that should extend the scope of malware detection through the Chrome Cleanup add-on.
The current version of DoubleLocker malware is targeted at Android phones. After infecting the device, it blocks the device by PIN, encrypts files on your phone, and requires payment in Bitcoines. The required amount is about $ 54 and must be paid within 24 hours. The only way to get rid of the ransomware is to reset it to factory settings. Because the root of the source code is based on a banking trojan, Android may soon get poisonous cocktails that rob the bank, encrypt and change the PIN.
JPY 1,569 / Mo
JPY 9,020 / Mo