AlienSpy RAT Resurfaces as JSocketMichael Mimoso, Threat Post (Kaspersky Lab Blog)Researchers at Fidelis in April reported on an outbreak of AlienSpy infections moving via phishing messages. .....Selasa, 01 Sep 2015
Credit Card Breach at a Zoo Near YouBrian Krebs, KrebsOnSecurityService Systems Associates, a company that serves gift shops and eateries at zoos and cultural centers across the United States, has acknowledged a breach of its credit and debit card processing systems. ...Jumat, 14 Aug 2015
Darkhotel’s attacks in 2015Kaspersky Labs' Global Research & Analysis Team, Secure ListDarkhotel APT attacks dated 2014 and earlier are characterized by the misuse of stolen certificates, the deployment of .hta files with multiple techniques, and the use of unusual methods like the infiltration of hotel Wi-Fi to place backdoors in targets’ systems. In 2015,Kamis, 13 Aug 2015
Flaw in 802.11n opens wireless networks to remote attacksPierluigi Paganini, Security AffairsResearchers discovered a vulnerability in the 802.11n wireless networking standard that could be exploited by a remote attacker to target wireless networks. ....Kamis, 09 Jul 2015
Unknowns are cloning and booby trapping hundreds of Dark Web sites Pierluigi Paganini, Security AffairsFounder of the ahmia.fi project reported that someone is cloning and booby trapping hundreds of Dark Web sites and is re-writing some of the content. .....Kamis, 09 Jul 2015
Three New Masque Attacks against iOS: Demolishing, Breaking and HijackingZhaofeng Chen, Tao Wei, Hui Xue, Yulong Zhang, Fireeye Inc.In the recent release of iOS 8.4, Apple fixed several vulnerabilities including vulnerabilities that allow attackers to deploy two new kinds of Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). .....Kamis, 09 Jul 2015
Win32/Lethic Botnet AnalysisShaman Vilen, Infosec InstituteLethic is a spam botnet consisting of an estimated 210 000 – 310 000 individual machines which are mainly involved in pharmaceutical and replica spam. At the peak of its existence, the botnet was responsible for 8-10% of all the spam sent worldwide. ...Kamis, 09 Jul 2015
Evasion Techniques Keep Angler EK’s Cryptowall Business ThrivingMichael Mimoso, Threat Post (Kaspersky Lab Blog)The Angler Exploit Kit is turning into a model for malware rapidly integrating new evasion techniques. ....Kamis, 09 Jul 2015
Plex Forums Hacked, Private Messages ExposedIonut Ilascu, SoftpediaCard data not exposed, passwords hashed and salted Registered users of the Plex media server forums have received an email from the company today informing of a breach that exposed private data tied to accounts.Kamis, 09 Jul 2015
SCADA systems available for sale in the UndergroundPierluigi Paganini, Security AffairsThe new Dell Annual Threat Report revealed that the number of attacks against supervisory control and data acquisition (SCADA) systems doubled in 2014 respect the previous year.Rabu, 08 Jul 2015
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: