2015/05/16

Cool News Story Bro! Week of 05-15-2015

by Otakun
Categories: News
Tags: No Tags
Comments: Leave a Comment

Hey All!

Another busy news week is upon us, got some interesting stuff as usual so let’s get going!

  1. New GPU-based Linux Rootkit and Keylogger with Excellent Stealth and Computing Power

    1. First story of the week is about a few pieces of “Proof of Concept” malware that runs ont he GPU instead of the CPU. This gives it additional stealth capabilities as well as excellent computing power associated with today’s graphics cards. Even though this is merely a poc to show this is possible, it’s an interesting read.
    2. Read More @ http://thehackernews.com/2015/05/gpu-rootkit-linux-Keylogger.html
  2. Woman sues employer for firing her after she disabled 24×7 monitoring app

    1. Next, a privacy related story about a California women that was supposedly fired for uninstalled a tracking application from her company issued iPhone. The app supposedly kept track of her location 24/7, not just while on the clock, even if she closed the app. Pretty damn invasive if you ask me. I know I wouldn’t be comfortable with that level of tracking by my employer.
    2. Read More @ https://nakedsecurity.sophos.com/2015/05/13/woman-sues-employer-for-firing-her-after-she-disabled-24×7-monitoring-app
  3. Bigger than Heartbleed, ‘Venom’ security vulnerability threatens most datacenters

    1. Next, another fairly significant vulnerability has been discovered, this time it’s a Virtual Machine escape vulnerability. The bug is in the open source QEMU emulator software, in a virtual floppy disk controller software. While the bug is significant, I don’t necessarily believe it’s anywhere near as significant as something like HeartBleed, but it seems like these days every bug has to be the end of the world.
    2. Read More @ http://www.zdnet.com/article/venom-security-flaw-millions-of-virtual-machines-datacenters/
  4. Angler Exploit Kit Pushing New, Unnamed Ransomware

    1. Next, the obligatory Exploit Kit related story. This time it’s in regards to Angler Exploit Kit pushing a new, as of yet unknown, ransomware which seems to be a variant of “TeslaCrypt”. Ransomware is all the rage these days so be on the lookout and keep your files backed up.
    2. Read More @ https://threatpost.com/angler-exploit-kit-pushing-new-unnamed-ransomware/112751
  5. Hiding in Plain Sight: FireEye and Microsoft Expose Chinese APT Group’s Obfuscation Tactic

    1. Next, some news from FireEye on a new APT campaign from the “APT17”, “DeputyDog” group. One of their recent campaigns used a fairly interesting obfuscation tactic, by leveraging Microsoft Technet for Command and Control traffic.
    2. Read More @ https://www.fireeye.com/blog/threat-research/2015/05/hiding_in_plain_sigh.html
  6. House of Representatives passes USA Freedom Act

    1. Next, some news on the privacy end. The U.S House of Representatives has passed the “USA Freedom Act” which will curb some of the NSA metadata collection efforts, while also extending some of the provisions of the “Patriot Act”.  So, mixed news on this one as extending any surveillance portions of the “Patriot Act” is a bad idea.
    2. Read More @ http://www.scmagazine.com/the-us-house-of-representatives-passes-the-usa-freedom-act/article/414587/
  7. APT28 orchestrated attacks against global banking sector, firm finds

    1. More on APT based news, a Colorado based security firm has found evidence of the “APT28” group targeting the financial sector. APT28 are believed to be Russian based, and in course of an investigation they found evidence of malware and server infrastructure associated with the group targeting a financial firm.
    2. Read More @ http://www.scmagazine.com/cycyberespionage-group-apt28-expands-sights-beyond-govt-military-orgs/article/414586/
  8.  The Naikon APT Tracking Down Geo-Political Intelligence Across APAC, One Nation at a Time

    1. Busy week for APT news, and we have another one. Kaspersky takes a look at the Naikon APT group, that mainly operates against targets in southeast Asia. They have been active for at least 5 years against targets in that region of the world. Fantastic read and analysis as always.
    2. Read More @ https://securelist.com/analysis/publications/69953/the-naikon-apt/
Otakun
– Otakun –

Leave a Reply

Your email address will not be published. Required fields are marked *



Today is Friday
2018/02/23