<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security February 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Mon, 20 Apr 2026 04:43:41 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-3/#comment-1583346</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:49:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583346</guid>
		<description><![CDATA[Ali Winston / The Verge: 	
Sources: Palantir has been secretly testing predictive policing technology in New Orleans since 2012 that identifies individuals at risk of committing crime

Palantir has secretly been using New Orleans to test its predictive policing technology
https://www.theverge.com/2018/2/27/17054740/palantir-predictive-policing-tool-new-orleans-nopd

Palantir deployed a predictive policing system in New Orleans that even city council members don’t know about

The program began in 2012 as a partnership between New Orleans Police and Palantir Technologies, a data-mining firm founded with seed money from the CIA’s venture capital firm. According to interviews and documents obtained by The Verge, the initiative was essentially a predictive policing program, similar to the “heat list” in Chicago that purports to predict which people are likely drivers or victims of violence.

The partnership has been extended three times, with the third extension scheduled to expire on February 21st, 2018. The city of New Orleans and Palantir have not responded to questions about the program’s current status.

Predictive policing technology has proven highly controversial wherever it is implemented

More than half a decade after the partnership with New Orleans began, Palantir has patented at least one crime-forecasting system and has sold similar software to foreign intelligence services for predicting the likelihood of individuals to commit terrorism.]]></description>
		<content:encoded><![CDATA[<p>Ali Winston / The Verge:<br />
Sources: Palantir has been secretly testing predictive policing technology in New Orleans since 2012 that identifies individuals at risk of committing crime</p>
<p>Palantir has secretly been using New Orleans to test its predictive policing technology<br />
<a href="https://www.theverge.com/2018/2/27/17054740/palantir-predictive-policing-tool-new-orleans-nopd" rel="nofollow">https://www.theverge.com/2018/2/27/17054740/palantir-predictive-policing-tool-new-orleans-nopd</a></p>
<p>Palantir deployed a predictive policing system in New Orleans that even city council members don’t know about</p>
<p>The program began in 2012 as a partnership between New Orleans Police and Palantir Technologies, a data-mining firm founded with seed money from the CIA’s venture capital firm. According to interviews and documents obtained by The Verge, the initiative was essentially a predictive policing program, similar to the “heat list” in Chicago that purports to predict which people are likely drivers or victims of violence.</p>
<p>The partnership has been extended three times, with the third extension scheduled to expire on February 21st, 2018. The city of New Orleans and Palantir have not responded to questions about the program’s current status.</p>
<p>Predictive policing technology has proven highly controversial wherever it is implemented</p>
<p>More than half a decade after the partnership with New Orleans began, Palantir has patented at least one crime-forecasting system and has sold similar software to foreign intelligence services for predicting the likelihood of individuals to commit terrorism.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583342</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:46:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583342</guid>
		<description><![CDATA[Washington Post: 	
NSA director says Russia hasn&#039;t been dissuaded from meddling in US elections, and Trump hasn&#039;t given him new authority to strike at Russian cyber-operations

Cyber chief says Trump has given him no new authority to strike at Russian interference threat
https://www.washingtonpost.com/world/national-security/cyber-chief-says-trump-has-given-him-no-new-authority-to-strike-at-russian-interference-threat/2018/02/27/41185978-1c24-11e8-ae5a-16e60e4605f3_story.html

The head of U.S. Cyber Command warned lawmakers that penalties and other measures have not “changed the calculus or the behavior” of Russia as it seeks to interfere with this year’s midterm elections.

“We’re taking steps, but we’re probably not doing enough,” Adm. Michael S. Rogers, who also directs the National Security Agency, said in testimony before the Senate Armed Services Committee. Russian President Vladimir Putin, he added, “has clearly come to the conclusion that ‘there’s little price to pay here and therefore I can continue this activity.’ ”

“If we don’t change the dynamic here, this is going to continue,” Rogers said.]]></description>
		<content:encoded><![CDATA[<p>Washington Post:<br />
NSA director says Russia hasn&#8217;t been dissuaded from meddling in US elections, and Trump hasn&#8217;t given him new authority to strike at Russian cyber-operations</p>
<p>Cyber chief says Trump has given him no new authority to strike at Russian interference threat<br />
<a href="https://www.washingtonpost.com/world/national-security/cyber-chief-says-trump-has-given-him-no-new-authority-to-strike-at-russian-interference-threat/2018/02/27/41185978-1c24-11e8-ae5a-16e60e4605f3_story.html" rel="nofollow">https://www.washingtonpost.com/world/national-security/cyber-chief-says-trump-has-given-him-no-new-authority-to-strike-at-russian-interference-threat/2018/02/27/41185978-1c24-11e8-ae5a-16e60e4605f3_story.html</a></p>
<p>The head of U.S. Cyber Command warned lawmakers that penalties and other measures have not “changed the calculus or the behavior” of Russia as it seeks to interfere with this year’s midterm elections.</p>
<p>“We’re taking steps, but we’re probably not doing enough,” Adm. Michael S. Rogers, who also directs the National Security Agency, said in testimony before the Senate Armed Services Committee. Russian President Vladimir Putin, he added, “has clearly come to the conclusion that ‘there’s little price to pay here and therefore I can continue this activity.’ ”</p>
<p>“If we don’t change the dynamic here, this is going to continue,” Rogers said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583336</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:40:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583336</guid>
		<description><![CDATA[Fake ionCube Malware Hits Hundreds of Sites
https://www.securityweek.com/fake-ioncube-malware-hits-hundreds-sites

Hundreds of websites have been infected with malware that masquerades as legitimate ionCube-encoded files, SiteLock warns.

The malicious files were initially discovered in core directories of a WordPress site, featuring naming patterns usually associated with malware, namely “diff98.php” and “wrgcduzk.php.” Because the obfuscated files appear as if they had been encoded with ionCube, the researchers named the threat ionCube malware.

ionCube is an old and powerful PHP obfuscation technology that can be used to scramble text-based PHP files to hide the intellectual property. Due to licensing costs, ionCube isn’t usually used for malicious purposes.]]></description>
		<content:encoded><![CDATA[<p>Fake ionCube Malware Hits Hundreds of Sites<br />
<a href="https://www.securityweek.com/fake-ioncube-malware-hits-hundreds-sites" rel="nofollow">https://www.securityweek.com/fake-ioncube-malware-hits-hundreds-sites</a></p>
<p>Hundreds of websites have been infected with malware that masquerades as legitimate ionCube-encoded files, SiteLock warns.</p>
<p>The malicious files were initially discovered in core directories of a WordPress site, featuring naming patterns usually associated with malware, namely “diff98.php” and “wrgcduzk.php.” Because the obfuscated files appear as if they had been encoded with ionCube, the researchers named the threat ionCube malware.</p>
<p>ionCube is an old and powerful PHP obfuscation technology that can be used to scramble text-based PHP files to hide the intellectual property. Due to licensing costs, ionCube isn’t usually used for malicious purposes.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583335</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:37:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583335</guid>
		<description><![CDATA[Siemens Releases BIOS Updates to Patch Intel Chip Flaws
https://www.securityweek.com/siemens-releases-bios-updates-patch-intel-chip-flaws

Siemens has released BIOS updates for several of its industrial devices to patch vulnerabilities discovered recently in Intel chips, including Meltdown, Spectre and flaws affecting the company’s Management Engine technology.

Following the disclosure of the Meltdown and Spectre attack methods, industrial control systems (ICS) manufacturers immediately started analyzing the impact of the flaws on their products. Advisories have been published by companies such as Siemens, Rockwell Automation, Schneider Electric, ABB, and Pepperl+Fuchs.

Siemens has determined that the security holes expose many of its product lines to attacks, including RUGGEDCOM, SIMATIC, SIMOTION, SINEMA, and SINUMERIK.]]></description>
		<content:encoded><![CDATA[<p>Siemens Releases BIOS Updates to Patch Intel Chip Flaws<br />
<a href="https://www.securityweek.com/siemens-releases-bios-updates-patch-intel-chip-flaws" rel="nofollow">https://www.securityweek.com/siemens-releases-bios-updates-patch-intel-chip-flaws</a></p>
<p>Siemens has released BIOS updates for several of its industrial devices to patch vulnerabilities discovered recently in Intel chips, including Meltdown, Spectre and flaws affecting the company’s Management Engine technology.</p>
<p>Following the disclosure of the Meltdown and Spectre attack methods, industrial control systems (ICS) manufacturers immediately started analyzing the impact of the flaws on their products. Advisories have been published by companies such as Siemens, Rockwell Automation, Schneider Electric, ABB, and Pepperl+Fuchs.</p>
<p>Siemens has determined that the security holes expose many of its product lines to attacks, including RUGGEDCOM, SIMATIC, SIMOTION, SINEMA, and SINUMERIK.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583331</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:34:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583331</guid>
		<description><![CDATA[Russian Hackers Infiltrated German Ministries&#039; Network: Report
https://www.securityweek.com/russian-hackers-infiltrated-german-ministries-network-report

Berlin - Russian hackers have infiltrated Germany&#039;s foreign and interior ministries&#039; online networks, German news agency DPA reported Wednesday quoting unnamed security sources.

The hacker group known as APT28 -- which has been linked to Russia&#039;s GRU military intelligence and accused of attacks on Hillary Clinton&#039;s 2016 presidential campaign -- managed to plant malware in the ministries&#039; networks for possibly as long as a year, the news agency said. 

Top security officials had repeatedly warned during Germany&#039;s 2017 general elections that Russia hackers may seek to disrupt the polls.]]></description>
		<content:encoded><![CDATA[<p>Russian Hackers Infiltrated German Ministries&#8217; Network: Report<br />
<a href="https://www.securityweek.com/russian-hackers-infiltrated-german-ministries-network-report" rel="nofollow">https://www.securityweek.com/russian-hackers-infiltrated-german-ministries-network-report</a></p>
<p>Berlin &#8211; Russian hackers have infiltrated Germany&#8217;s foreign and interior ministries&#8217; online networks, German news agency DPA reported Wednesday quoting unnamed security sources.</p>
<p>The hacker group known as APT28 &#8212; which has been linked to Russia&#8217;s GRU military intelligence and accused of attacks on Hillary Clinton&#8217;s 2016 presidential campaign &#8212; managed to plant malware in the ministries&#8217; networks for possibly as long as a year, the news agency said. </p>
<p>Top security officials had repeatedly warned during Germany&#8217;s 2017 general elections that Russia hackers may seek to disrupt the polls.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583330</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:34:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583330</guid>
		<description><![CDATA[&quot;RedDrop&quot; Mobile Malware Records Ambient Audio
https://www.securityweek.com/reddrop-mobile-malware-records-ambient-audio

A newly detailed mobile malware can do more than steal data from infected devices: it can also record ambient audio and send the recordings to cloud storage accounts controlled by attackers.

Dubbed RedDrop, the malware can also inflict financial costs on victims by sending SMS messages to premium services, security firm Wandera says. The U.K.-based company has discovered 53 malware-ridden apps that are exfiltrating sensitive data from infected devices. 

RedDrop-infected applications are being distributed through a network of more than 4,000 domains and range from tools such as image editors and calculators to recreational apps. Every observed application offers the expected functionality, thus hiding the malicious content stored within.]]></description>
		<content:encoded><![CDATA[<p>&#8220;RedDrop&#8221; Mobile Malware Records Ambient Audio<br />
<a href="https://www.securityweek.com/reddrop-mobile-malware-records-ambient-audio" rel="nofollow">https://www.securityweek.com/reddrop-mobile-malware-records-ambient-audio</a></p>
<p>A newly detailed mobile malware can do more than steal data from infected devices: it can also record ambient audio and send the recordings to cloud storage accounts controlled by attackers.</p>
<p>Dubbed RedDrop, the malware can also inflict financial costs on victims by sending SMS messages to premium services, security firm Wandera says. The U.K.-based company has discovered 53 malware-ridden apps that are exfiltrating sensitive data from infected devices. </p>
<p>RedDrop-infected applications are being distributed through a network of more than 4,000 domains and range from tools such as image editors and calculators to recreational apps. Every observed application offers the expected functionality, thus hiding the malicious content stored within.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583329</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:33:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583329</guid>
		<description><![CDATA[Widespread Vulnerability Found in Single-Sign-On Products
https://www.securityweek.com/widespread-vulnerability-found-single-sign-products

A behavioral quirk in SAML libraries has left many single-sign-on (SSO) implementations vulnerable to abuse. It allows an attacker that has gained any authenticated access to trick the system into granting further access as a different user without knowledge of that user&#039;s password.

Security Assertion Markup Language (SAML) is the underlying protocol used by most SSO implementations. It is what allows authentication to be passed between a company&#039;s identity store and, for example, a third-party service. Typically, a user will log onto the identity store. This contains the credentials that will allow the same user to access other services.

SAML is used to pass authentication, via the browser, from the identity provider to the third-party service, granting access. The flaw lies in how authentication is encoded by SAML in the provider&#039;s &#039;response&#039;. 

Different affected SSOs will have different specific recommendations, and it would be best to refer to them for guidance. Similarly, there are different recommendations for maintainers of identity or service providers, maintainers of SAML processing libraries, and maintainers of XML parsing libraries. One thing that would help, suggest the authors, is the ability to enforce multi-factor authentication, &quot;because this vulnerability would only allow a bypass of a user’s first factor of authentication.&quot; But the authors also warn, &quot;if your IdP is responsible for both first factor and second factor authentication, it’s likely that this vulnerability bypasses both!&quot;

Duo Labs / Feb 27, 2018
Duo Finds SAML Vulnerabilities Affecting Multiple Implementations
https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations]]></description>
		<content:encoded><![CDATA[<p>Widespread Vulnerability Found in Single-Sign-On Products<br />
<a href="https://www.securityweek.com/widespread-vulnerability-found-single-sign-products" rel="nofollow">https://www.securityweek.com/widespread-vulnerability-found-single-sign-products</a></p>
<p>A behavioral quirk in SAML libraries has left many single-sign-on (SSO) implementations vulnerable to abuse. It allows an attacker that has gained any authenticated access to trick the system into granting further access as a different user without knowledge of that user&#8217;s password.</p>
<p>Security Assertion Markup Language (SAML) is the underlying protocol used by most SSO implementations. It is what allows authentication to be passed between a company&#8217;s identity store and, for example, a third-party service. Typically, a user will log onto the identity store. This contains the credentials that will allow the same user to access other services.</p>
<p>SAML is used to pass authentication, via the browser, from the identity provider to the third-party service, granting access. The flaw lies in how authentication is encoded by SAML in the provider&#8217;s &#8216;response&#8217;. </p>
<p>Different affected SSOs will have different specific recommendations, and it would be best to refer to them for guidance. Similarly, there are different recommendations for maintainers of identity or service providers, maintainers of SAML processing libraries, and maintainers of XML parsing libraries. One thing that would help, suggest the authors, is the ability to enforce multi-factor authentication, &#8220;because this vulnerability would only allow a bypass of a user’s first factor of authentication.&#8221; But the authors also warn, &#8220;if your IdP is responsible for both first factor and second factor authentication, it’s likely that this vulnerability bypasses both!&#8221;</p>
<p>Duo Labs / Feb 27, 2018<br />
Duo Finds SAML Vulnerabilities Affecting Multiple Implementations<br />
<a href="https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations" rel="nofollow">https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583327</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:32:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583327</guid>
		<description><![CDATA[Thanatos Ransomware Makes Data Recovery Impossible
https://www.securityweek.com/thanatos-ransomware-makes-data-recovery-impossible

A newly discovered ransomware family is generating a different encryption key for each of the encrypted files but saves none of them, thus making data recovery impossible.

Dubbed Thanatos, the malware was discovered by MalwareHunterTeam and already analyzed by several other security researchers. 

When encrypting files on a computer, the malware appends the .THANATOS extension to them. After completing the encryption, the malware connects to a specific URL to report back, thus allowing attackers to keep track of the number of infected victims. 

The malware also generates an autorun key to open the ransom note every time the user logs in. In that note, the victim is instructed to send $200 to a listed crypto-coin address. Victims are also instructed to contact the attackers via email to receive a decryption program. 

Thanatos’ operators allow victims to pay the ransom in Bitcoin, Ethereum, or Bitcoin Cash, thus becoming the first ransomware to accept Bitcoin Cash payments, Bleeping Computer’s Lawrence Abrams points out.  

The issue with the new ransomware is that it, because it doesn’t save the encryption keys, files cannot be decrypted normally. However, victims don’t know that and might end up paying the ransom in the hope they can recover their files.]]></description>
		<content:encoded><![CDATA[<p>Thanatos Ransomware Makes Data Recovery Impossible<br />
<a href="https://www.securityweek.com/thanatos-ransomware-makes-data-recovery-impossible" rel="nofollow">https://www.securityweek.com/thanatos-ransomware-makes-data-recovery-impossible</a></p>
<p>A newly discovered ransomware family is generating a different encryption key for each of the encrypted files but saves none of them, thus making data recovery impossible.</p>
<p>Dubbed Thanatos, the malware was discovered by MalwareHunterTeam and already analyzed by several other security researchers. </p>
<p>When encrypting files on a computer, the malware appends the .THANATOS extension to them. After completing the encryption, the malware connects to a specific URL to report back, thus allowing attackers to keep track of the number of infected victims. </p>
<p>The malware also generates an autorun key to open the ransom note every time the user logs in. In that note, the victim is instructed to send $200 to a listed crypto-coin address. Victims are also instructed to contact the attackers via email to receive a decryption program. </p>
<p>Thanatos’ operators allow victims to pay the ransom in Bitcoin, Ethereum, or Bitcoin Cash, thus becoming the first ransomware to accept Bitcoin Cash payments, Bleeping Computer’s Lawrence Abrams points out.  </p>
<p>The issue with the new ransomware is that it, because it doesn’t save the encryption keys, files cannot be decrypted normally. However, victims don’t know that and might end up paying the ransom in the hope they can recover their files.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583325</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:31:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583325</guid>
		<description><![CDATA[Memcached Abused for DDoS Amplification Attacks
https://www.securityweek.com/memcached-abused-ddos-amplification-attacks

Malicious actors have started abusing the memcached protocol to launch distributed denial-of-service (DDoS) attacks, Cloudflare and Arbor Networks warned on Tuesday.

Memcached is a free and open source distributed memory caching system designed to work with a large number of open connections. Clients can communicate with memcached servers via TCP or UDP on port 11211.

Cloudflare noticed in recent days that memcached has been abused for DDoS amplification attacks, and so have Arbor Networks and Chinese security firm Qihoo 360. Cloudflare has dubbed this type of attack Memcrashed.]]></description>
		<content:encoded><![CDATA[<p>Memcached Abused for DDoS Amplification Attacks<br />
<a href="https://www.securityweek.com/memcached-abused-ddos-amplification-attacks" rel="nofollow">https://www.securityweek.com/memcached-abused-ddos-amplification-attacks</a></p>
<p>Malicious actors have started abusing the memcached protocol to launch distributed denial-of-service (DDoS) attacks, Cloudflare and Arbor Networks warned on Tuesday.</p>
<p>Memcached is a free and open source distributed memory caching system designed to work with a large number of open connections. Clients can communicate with memcached servers via TCP or UDP on port 11211.</p>
<p>Cloudflare noticed in recent days that memcached has been abused for DDoS amplification attacks, and so have Arbor Networks and Chinese security firm Qihoo 360. Cloudflare has dubbed this type of attack Memcrashed.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/02/01/cyber-security-february-2018/comment-page-2/#comment-1583324</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 01 Mar 2018 12:30:43 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=63063#comment-1583324</guid>
		<description><![CDATA[Ad Network Performs In-Browser Cryptojacking
https://www.securityweek.com/ad-network-performs-browser-cryptojacking

An ad network provider is performing in-browser Coinhive cryptojacking on websites that use its service, 360 Netlab security researchers warn.

The practice has been ongoing since December 2017, several months after the ad network provider, a company called PopAds Publisher, started using domain generation algorithm (DGA) technology to bypass ad blockers, claiming it would allow customers to “monetize traffic that wasn’t monetized before.” 

In mid-2017, the provider started to generate seemingly random domains that would ensure ads can reach end users. By the end of the year, however, these domains, which 360 Netlab refers to as DGA.popad, started participating in cryptojacking activities, all without end-users’ acknowledgement.

Given that many people use ad blockers to prevent sites from displaying ads to them, ad networks often attempt to bypass blockers, and this provider decided to use DGA domains to host its advertisements. With these domains changing daily, it becomes difficult to block the ads, the researchers point out.]]></description>
		<content:encoded><![CDATA[<p>Ad Network Performs In-Browser Cryptojacking<br />
<a href="https://www.securityweek.com/ad-network-performs-browser-cryptojacking" rel="nofollow">https://www.securityweek.com/ad-network-performs-browser-cryptojacking</a></p>
<p>An ad network provider is performing in-browser Coinhive cryptojacking on websites that use its service, 360 Netlab security researchers warn.</p>
<p>The practice has been ongoing since December 2017, several months after the ad network provider, a company called PopAds Publisher, started using domain generation algorithm (DGA) technology to bypass ad blockers, claiming it would allow customers to “monetize traffic that wasn’t monetized before.” </p>
<p>In mid-2017, the provider started to generate seemingly random domains that would ensure ads can reach end users. By the end of the year, however, these domains, which 360 Netlab refers to as DGA.popad, started participating in cryptojacking activities, all without end-users’ acknowledgement.</p>
<p>Given that many people use ad blockers to prevent sites from displaying ads to them, ad networks often attempt to bypass blockers, and this provider decided to use DGA domains to host its advertisements. With these domains changing daily, it becomes difficult to block the ads, the researchers point out.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
