In The Wild: Google Can’t Close the Door on Android MalwareOren Koriat, Security Insights (Check Point Blog)Mobile Security Observations from the Check Point Research Team After its presentations about “SideStepper” and trends in mobile attacks in BlackHat Asia, the Check Point mobile research team wasn’t surprised to find that the trends it pointed out continue -----Selasa, 31 May 2016
SS7 Attack Leaves WhatsApp and Telegram Encryption UselessCatalin Cimpanu, SoftpediaThe researchers, using their Linux laptop, spoofed a mobile network node and intercepted the initial phase of a chat between two users of an encrypted app ....Selasa, 31 May 2016
To make Tor work better on the web, we need to be honest about itMartijn Grooten, Virus Bulletin BlogApparently, 94% of the requests CloudFlare sees through the Tor network are malicious. .....Selasa, 31 May 2016
The Scariest Hack So Far Jane Brown, Lane Powell PC - Intellectual Property Law BlogWire Swiss GmbH (Wire Swiss) is currently seeking a declaratory judgment and alleges civil extortion against its competitor, Quiet Riddle Ventures dba Open Whisper Systems, and Moxie Marlinspike.[3] The litigants develop end-to-end encrypted messaging software. Wire Swiss claims the defendants threatened to accuse Wire Swiss of infringing on copyrighted software code and publicize “vulnerabilities” in the security of Wire Swiss’ encryption software. Wire Swiss’ payment of a $2 million licensing fee would prevent the threatened action. ...Selasa, 31 May 2016
Yeabests[.]cc: A fileless infection using WMI to hijack your BrowserLawrence Abrams, Bleeping ComputerWindows comes with a tool called the Windows Management Instrumentation, or WMI, that can be used by system administrators to receive information and notifications from Windows. ....Kamis, 26 May 2016
Windows GodMode Abused by MalwareCatalin Cimpanu, SoftpediaGodMode consists of a piece of code that Microsoft left inside Windows since Vista that allows users to create a folder, give it a specific name, and automatically transforming it into a container that lists all the shortcuts to all the Control Panel settings. ....Kamis, 26 May 2016
TrueCrypter Ransomware accepts payment in Bitcoins or Amazon Gift CardLawrence Abrams, Bleeping ComputerYesterday, a new ransomware called TrueCrypter was discovered by AVG malware analyst Jakub Kroustek. This ransomware encrypts your data using AES-256 encryption and then demands either .2 bitcoins or $115 USD in Amazon gift cards. When encrypting your data, TrueCrypter will append the .enc extension to all encrypted files. It is unsure if the sample that we looked at is a hoax, a test ransomware, or just a buggy program as it will automatically decrypt your files by simply clicking on the Pay button. ...Kamis, 26 May 2016
Time Is Money: GozNym Launches Redirection Attacks in PolandLimor Kessem, Security Intelligence (IBM Blog)The GozNym banking malware, a Trojan hybrid discovered by IBM X-Force in early April, isn’t wasting any time. ...Kamis, 26 May 2016
Team Cymru Blog: GOZNYM MALWARETeam Cymru"ARTICLE OVERVIEW: - Antivirus software detects GozNym hybrid as Nymaim variant - GozNym samples resolve domains, do not connect to IPs returned. ....Kamis, 26 May 2016
Security Alert: Citadel Trojan Resurfaces as Atmos, Carries on the ZeuS LegacyAndra Zaharia, Heimdal Security BlogMore than 6 months after its creator was sentenced to prison, the infamous Citadel malware resurges in a modified form, called Atmos. The new strain is currently targeting banks in France and it was also spotted being delivered with Teslacrypt. Here’s the full story. ...Kamis, 26 May 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: