<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security July 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sun, 19 Apr 2026 21:53:56 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599665</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 10 Aug 2018 15:13:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599665</guid>
		<description><![CDATA[What Drives a Ransomware Criminal? CoinVault Developers Convicted in Dutch Court
https://securingtomorrow.mcafee.com/mcafee-labs/what-drives-a-ransomware-criminal-coinvault-developers-convicted-in-dutch-court/

How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of McAfee’s Advanced Threat Research team recently did, as they attended a court case against two cybercriminal brothers.]]></description>
		<content:encoded><![CDATA[<p>What Drives a Ransomware Criminal? CoinVault Developers Convicted in Dutch Court<br />
<a href="https://securingtomorrow.mcafee.com/mcafee-labs/what-drives-a-ransomware-criminal-coinvault-developers-convicted-in-dutch-court/" rel="nofollow">https://securingtomorrow.mcafee.com/mcafee-labs/what-drives-a-ransomware-criminal-coinvault-developers-convicted-in-dutch-court/</a></p>
<p>How often do we get a chance to learn what goes on in the minds of cybercriminals? Two members of McAfee’s Advanced Threat Research team recently did, as they attended a court case against two cybercriminal brothers.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599660</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 10 Aug 2018 15:07:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599660</guid>
		<description><![CDATA[Passwords for Tens of Thousands of Dahua Devices Cached in IoT Search Engine
https://www.bleepingcomputer.com/news/security/passwords-for-tens-of-thousands-of-dahua-devices-cached-in-iot-search-engine/

Login passwords for tens of thousands of Dahua devices have been cached inside search results returned by ZoomEye, a search engine for discovering Internet-connected devices (also called an IoT search engine).

People are still running DVRs with ancient firmware

This vulnerability is CVE-2013-6117, discovered and detailed by Jake Reynolds, a security researcher with Depth Security.

According to the researcher&#039;s blog post and to Anubhav, who explained the exploitation process to Bleeping Computer yesterday, an attacker can initiate a raw TCP connection on a Dahua DVR on port 37777 to sent a special payload.

Once a Dahua device receives this payload, it responds with DDNS credentials for accessing the device, and other data, all in plaintext.

The vulnerability has been known since 2013 and has been since patched, but many Dahua device owners have failed to update their equipment, and even to this day have continued to deploy DVRs running the antiquated firmware online.]]></description>
		<content:encoded><![CDATA[<p>Passwords for Tens of Thousands of Dahua Devices Cached in IoT Search Engine<br />
<a href="https://www.bleepingcomputer.com/news/security/passwords-for-tens-of-thousands-of-dahua-devices-cached-in-iot-search-engine/" rel="nofollow">https://www.bleepingcomputer.com/news/security/passwords-for-tens-of-thousands-of-dahua-devices-cached-in-iot-search-engine/</a></p>
<p>Login passwords for tens of thousands of Dahua devices have been cached inside search results returned by ZoomEye, a search engine for discovering Internet-connected devices (also called an IoT search engine).</p>
<p>People are still running DVRs with ancient firmware</p>
<p>This vulnerability is CVE-2013-6117, discovered and detailed by Jake Reynolds, a security researcher with Depth Security.</p>
<p>According to the researcher&#8217;s blog post and to Anubhav, who explained the exploitation process to Bleeping Computer yesterday, an attacker can initiate a raw TCP connection on a Dahua DVR on port 37777 to sent a special payload.</p>
<p>Once a Dahua device receives this payload, it responds with DDNS credentials for accessing the device, and other data, all in plaintext.</p>
<p>The vulnerability has been known since 2013 and has been since patched, but many Dahua device owners have failed to update their equipment, and even to this day have continued to deploy DVRs running the antiquated firmware online.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599638</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 10 Aug 2018 14:41:45 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599638</guid>
		<description><![CDATA[Security Gap Grows
https://semiengineering.com/security-gap-grows/

Concerns about breaches is up, but the number of attacks is still rising.

There is far more talk about security in designs these days, and far more security features being added into chips and systems. So why isn’t it making a dent in the number of cyberattacks?

According to the Online Trust Alliance, there were 159,700 cyber incidents in 2017 around the globe. But the group notes that because most incidents are not reported, the real number could be twice as large. This is about twice what it was in 2016, with the biggest increase due to ransom-based attacks. Also of note, 93% were avoidable, the agency said.]]></description>
		<content:encoded><![CDATA[<p>Security Gap Grows<br />
<a href="https://semiengineering.com/security-gap-grows/" rel="nofollow">https://semiengineering.com/security-gap-grows/</a></p>
<p>Concerns about breaches is up, but the number of attacks is still rising.</p>
<p>There is far more talk about security in designs these days, and far more security features being added into chips and systems. So why isn’t it making a dent in the number of cyberattacks?</p>
<p>According to the Online Trust Alliance, there were 159,700 cyber incidents in 2017 around the globe. But the group notes that because most incidents are not reported, the real number could be twice as large. This is about twice what it was in 2016, with the biggest increase due to ransom-based attacks. Also of note, 93% were avoidable, the agency said.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599637</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 10 Aug 2018 14:40:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599637</guid>
		<description><![CDATA[One-Third of Businesses Lack a Cybersecurity Expert
https://www.darkreading.com/threat-intelligence/one-third-of-businesses-lack-a-cybersecurity-expert/d/d-id/1332317

Alarming, yes, but it&#039;s actually an improvement over past years, a new Gartner survey of more than 3,000 CIOs reveals.]]></description>
		<content:encoded><![CDATA[<p>One-Third of Businesses Lack a Cybersecurity Expert<br />
<a href="https://www.darkreading.com/threat-intelligence/one-third-of-businesses-lack-a-cybersecurity-expert/d/d-id/1332317" rel="nofollow">https://www.darkreading.com/threat-intelligence/one-third-of-businesses-lack-a-cybersecurity-expert/d/d-id/1332317</a></p>
<p>Alarming, yes, but it&#8217;s actually an improvement over past years, a new Gartner survey of more than 3,000 CIOs reveals.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599465</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Aug 2018 15:12:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599465</guid>
		<description><![CDATA[Business E-mail Compromise The 12 Billion Dollar Scam 
https://www.ic3.gov/media/2018/180712.aspx

This Public Service Announcement (PSA) is an update and companion to Business E-mail Compromise (BEC) PSA 1-050417-PSA posted on www.ic3.gov. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data for the time frame October 2013 to May 2018. 

DEFINITION

Business E-mail Compromise (BEC)/E-mail Account Compromise (EAC) is a sophisticated scam targeting both businesses and individuals performing wire transfer payments.

The scam is frequently carried out when a subject compromises legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.

The scam may not always be associated with a request for transfer of funds. A variation of the scam involves compromising legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees.]]></description>
		<content:encoded><![CDATA[<p>Business E-mail Compromise The 12 Billion Dollar Scam<br />
<a href="https://www.ic3.gov/media/2018/180712.aspx" rel="nofollow">https://www.ic3.gov/media/2018/180712.aspx</a></p>
<p>This Public Service Announcement (PSA) is an update and companion to Business E-mail Compromise (BEC) PSA 1-050417-PSA posted on <a href="http://www.ic3.gov" rel="nofollow">http://www.ic3.gov</a>. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data for the time frame October 2013 to May 2018. </p>
<p>DEFINITION</p>
<p>Business E-mail Compromise (BEC)/E-mail Account Compromise (EAC) is a sophisticated scam targeting both businesses and individuals performing wire transfer payments.</p>
<p>The scam is frequently carried out when a subject compromises legitimate business e-mail accounts through social engineering or computer intrusion techniques to conduct unauthorized transfers of funds.</p>
<p>The scam may not always be associated with a request for transfer of funds. A variation of the scam involves compromising legitimate business e-mail accounts and requesting Personally Identifiable Information (PII) or Wage and Tax Statement (W-2) forms for employees.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599455</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Aug 2018 15:02:52 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599455</guid>
		<description><![CDATA[How Can an ISAC Improve Cybersecurity and Resilience?
https://securityintelligence.com/how-can-an-isac-improve-cybersecurity-and-resilience/

Sharing computer security threat information is now an established practice in IT. Whether automatically or manually, the primary motivator to pool resources is to improve your own capabilities and those of your peers for responding to security threats and incidents.

Another factor that can significantly improve your ability is sharing knowledge and experiences. As it happens, there are organizations designed explicitly for that: information sharing and analysis centers (ISACs).]]></description>
		<content:encoded><![CDATA[<p>How Can an ISAC Improve Cybersecurity and Resilience?<br />
<a href="https://securityintelligence.com/how-can-an-isac-improve-cybersecurity-and-resilience/" rel="nofollow">https://securityintelligence.com/how-can-an-isac-improve-cybersecurity-and-resilience/</a></p>
<p>Sharing computer security threat information is now an established practice in IT. Whether automatically or manually, the primary motivator to pool resources is to improve your own capabilities and those of your peers for responding to security threats and incidents.</p>
<p>Another factor that can significantly improve your ability is sharing knowledge and experiences. As it happens, there are organizations designed explicitly for that: information sharing and analysis centers (ISACs).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599454</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Aug 2018 15:02:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599454</guid>
		<description><![CDATA[Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems
https://www.bleepingcomputer.com/news/security/researchers-mount-successful-gps-spoofing-attack-against-road-navigation-systems/

Academics say they&#039;ve mounted a successful GPS spoofing attack against road navigation systems that can trick humans into driving to incorrect locations.

The research is of note because previous GPS spoofing attacks have been unable to trick humans, who, in past experiments, often received malicious driving instructions that didn&#039;t make sense or were not in sync with the road infrastructure —for example taking a left on a straight highway.

To perform the attack researchers developed an algorithm that works in near real-time, along with a portable GPS-spoofing device that costs about $223, which can be easily attached to a car or put on a vehicle tailing the target&#039;s car at distances of up to 50 meters.

Researchers say their algorithm allows an attacker to select an area where they could lure victims.

&quot;The algorithm crafts the GPS inputs to the target device such that the triggered navigation instruction and displayed routes on the map
remain consistent with the physical road network,&quot; researchers say. &quot;In the physical world, the victim who follows the instruction would be led to a wrong route (or a wrong destination). &quot;

Attack worked on 95% of human testers

Academics said they tested their algorithm with traffic simulators but also in the real world, in China and the US.]]></description>
		<content:encoded><![CDATA[<p>Researchers Mount Successful GPS Spoofing Attack Against Road Navigation Systems<br />
<a href="https://www.bleepingcomputer.com/news/security/researchers-mount-successful-gps-spoofing-attack-against-road-navigation-systems/" rel="nofollow">https://www.bleepingcomputer.com/news/security/researchers-mount-successful-gps-spoofing-attack-against-road-navigation-systems/</a></p>
<p>Academics say they&#8217;ve mounted a successful GPS spoofing attack against road navigation systems that can trick humans into driving to incorrect locations.</p>
<p>The research is of note because previous GPS spoofing attacks have been unable to trick humans, who, in past experiments, often received malicious driving instructions that didn&#8217;t make sense or were not in sync with the road infrastructure —for example taking a left on a straight highway.</p>
<p>To perform the attack researchers developed an algorithm that works in near real-time, along with a portable GPS-spoofing device that costs about $223, which can be easily attached to a car or put on a vehicle tailing the target&#8217;s car at distances of up to 50 meters.</p>
<p>Researchers say their algorithm allows an attacker to select an area where they could lure victims.</p>
<p>&#8220;The algorithm crafts the GPS inputs to the target device such that the triggered navigation instruction and displayed routes on the map<br />
remain consistent with the physical road network,&#8221; researchers say. &#8220;In the physical world, the victim who follows the instruction would be led to a wrong route (or a wrong destination). &#8221;</p>
<p>Attack worked on 95% of human testers</p>
<p>Academics said they tested their algorithm with traffic simulators but also in the real world, in China and the US.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599453</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Aug 2018 15:01:00 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599453</guid>
		<description><![CDATA[Analysis of the DHCP Client Script Code Execution Vulnerability (CVE-2018-1111)
https://researchcenter.paloaltonetworks.com/2018/07/unit42-analysis-dhcp-client-script-code-execution-vulnerability-cve-2018-1111/

In May 2018, a command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in multiple versions of Red Hat Enterprise Linux (CVE-2018-1111), which has since been patched. An attacker could attack this vulnerability either through the use of a malicious DHCP server, or malicious, spoofed DHCP responses on the local network. A successful attack could execute arbitrary commands with root privileges on systems using NetworkManager with DHCP configured.

This vulnerability poses a serious threat to individuals or organizations running vulnerable instance of Red Hat Enterprise Linux versions 6 or 7 and patches should be applied immediately.]]></description>
		<content:encoded><![CDATA[<p>Analysis of the DHCP Client Script Code Execution Vulnerability (CVE-2018-1111)<br />
<a href="https://researchcenter.paloaltonetworks.com/2018/07/unit42-analysis-dhcp-client-script-code-execution-vulnerability-cve-2018-1111/" rel="nofollow">https://researchcenter.paloaltonetworks.com/2018/07/unit42-analysis-dhcp-client-script-code-execution-vulnerability-cve-2018-1111/</a></p>
<p>In May 2018, a command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in multiple versions of Red Hat Enterprise Linux (CVE-2018-1111), which has since been patched. An attacker could attack this vulnerability either through the use of a malicious DHCP server, or malicious, spoofed DHCP responses on the local network. A successful attack could execute arbitrary commands with root privileges on systems using NetworkManager with DHCP configured.</p>
<p>This vulnerability poses a serious threat to individuals or organizations running vulnerable instance of Red Hat Enterprise Linux versions 6 or 7 and patches should be applied immediately.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599452</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Aug 2018 15:00:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599452</guid>
		<description><![CDATA[Time to Yank Cybercrime into the Light
Too many organizations are still operating blindfolded, research finds.
https://www.darkreading.com/attacks-breaches/time-to-yank-cybercrime-into-the-light/a/d-id/1332231

At a time when the public and governments are watching their every move, today&#039;s organizations are up against an unprecedented wave of crime and fraud-related risks that affect their internal and external relationships, regulatory status, and reputation. Unfortunately, not enough companies are truly aware of the fraud threats they face.

According to PricewaterhouseCooper&#039;s 2018 Global Economic Crime and Fraud (GECF) Survey, a poll of some 7,200 respondents across 123 different countries, 49% say their companies had been victimized by fraud or economic crime, up from 36% in 2016. This uptick can be attributed to a greater global awareness of fraud, more survey responses, and better understanding of what constitutes &quot;fraud.&quot; But every company — no matter how vigilant — can have blind spots.

Some 44% of poll respondents indicate that they intend to increase spending in the next two years. Great — but where? These days, organizations are harnessing some seriously powerful technology and data analytics tools to battle the fraudsters. On top of these tech-based controls, many firms are also expanding whistleblower programs and taking care to keep leadership informed about real and potential breaches.]]></description>
		<content:encoded><![CDATA[<p>Time to Yank Cybercrime into the Light<br />
Too many organizations are still operating blindfolded, research finds.<br />
<a href="https://www.darkreading.com/attacks-breaches/time-to-yank-cybercrime-into-the-light/a/d-id/1332231" rel="nofollow">https://www.darkreading.com/attacks-breaches/time-to-yank-cybercrime-into-the-light/a/d-id/1332231</a></p>
<p>At a time when the public and governments are watching their every move, today&#8217;s organizations are up against an unprecedented wave of crime and fraud-related risks that affect their internal and external relationships, regulatory status, and reputation. Unfortunately, not enough companies are truly aware of the fraud threats they face.</p>
<p>According to PricewaterhouseCooper&#8217;s 2018 Global Economic Crime and Fraud (GECF) Survey, a poll of some 7,200 respondents across 123 different countries, 49% say their companies had been victimized by fraud or economic crime, up from 36% in 2016. This uptick can be attributed to a greater global awareness of fraud, more survey responses, and better understanding of what constitutes &#8220;fraud.&#8221; But every company — no matter how vigilant — can have blind spots.</p>
<p>Some 44% of poll respondents indicate that they intend to increase spending in the next two years. Great — but where? These days, organizations are harnessing some seriously powerful technology and data analytics tools to battle the fraudsters. On top of these tech-based controls, many firms are also expanding whistleblower programs and taking care to keep leadership informed about real and potential breaches.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/07/02/cyber-security-july-2018/comment-page-4/#comment-1599451</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Aug 2018 14:59:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=178429#comment-1599451</guid>
		<description><![CDATA[Why Malware as a Business is on the Rise
We might not have asked for a malware market, but it’s alive and growing every day.
https://heimdalsecurity.com/blog/the-malware-economy/

The alarming growth of malware attacks in the last years should concern each of us, but what is more important, should make us AWARE of the risks and consequences. Taking action and preventing these malicious activities operated by cybercriminals has to be a top priority IF we want to stay safe online.

The reality is that cyber attackers now use different strains of malware, much more sophisticated and agile that prove to be effective and successful, challenging us to build a stronger defense against them.

Malware evolves at a rapid pace because of advanced malware mastering the art of evasion. Thus, traditional antivirus engines find it difficult to detect attacks in the first stages. Malware is getting bigger and bigger. It fuels growth, innovation and encourages malicious actors to easily reach their goals.]]></description>
		<content:encoded><![CDATA[<p>Why Malware as a Business is on the Rise<br />
We might not have asked for a malware market, but it’s alive and growing every day.<br />
<a href="https://heimdalsecurity.com/blog/the-malware-economy/" rel="nofollow">https://heimdalsecurity.com/blog/the-malware-economy/</a></p>
<p>The alarming growth of malware attacks in the last years should concern each of us, but what is more important, should make us AWARE of the risks and consequences. Taking action and preventing these malicious activities operated by cybercriminals has to be a top priority IF we want to stay safe online.</p>
<p>The reality is that cyber attackers now use different strains of malware, much more sophisticated and agile that prove to be effective and successful, challenging us to build a stronger defense against them.</p>
<p>Malware evolves at a rapid pace because of advanced malware mastering the art of evasion. Thus, traditional antivirus engines find it difficult to detect attacks in the first stages. Malware is getting bigger and bigger. It fuels growth, innovation and encourages malicious actors to easily reach their goals.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
