<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Cyber Security December 2018</title>
	<atom:link href="http://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 07 Apr 2026 17:25:16 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Durgesh</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1625871</link>
		<dc:creator><![CDATA[Durgesh]]></dc:creator>
		<pubDate>Sat, 16 Feb 2019 04:38:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1625871</guid>
		<description><![CDATA[Bypassing Duo Two-Factor Authentication (Fail Open)
Often times whereas performing arts penetration tests it should be useful to attach to a system via the Remote Desktop Protocol (RDP). I usually use rdesktop or xfreerdp to attach to host once I actually have obtained credentials to try to to all types of things like use Active Directory Users and Computers or SQL Management Studio. one in every of the roadblocks I even have saw is that my consumer is protective access to RDP on Windows with couple. this could be a true pain, particularly once port 3389 is that the solely port open on the jump box that i want to be ready to pivot to a different network. Last time this happened I found a writing by Alex Lomas on Pen take a look at Partners that careful the ways that you simply will use to bypass this.

These attack ways ar valid presumptuous that the target had designed their couple implementation to “fail open”. this can be really quite common, because it is that the default setting.  If a system has couple 2FA designed to fail closed and that they lose net property or have problems with DNS, they get utterly barred out of their workstations/servers. this can be not acceptable for about many organizations and so fail open is that the commonest selection.]]></description>
		<content:encoded><![CDATA[<p>Bypassing Duo Two-Factor Authentication (Fail Open)<br />
Often times whereas performing arts penetration tests it should be useful to attach to a system via the Remote Desktop Protocol (RDP). I usually use rdesktop or xfreerdp to attach to host once I actually have obtained credentials to try to to all types of things like use Active Directory Users and Computers or SQL Management Studio. one in every of the roadblocks I even have saw is that my consumer is protective access to RDP on Windows with couple. this could be a true pain, particularly once port 3389 is that the solely port open on the jump box that i want to be ready to pivot to a different network. Last time this happened I found a writing by Alex Lomas on Pen take a look at Partners that careful the ways that you simply will use to bypass this.</p>
<p>These attack ways ar valid presumptuous that the target had designed their couple implementation to “fail open”. this can be really quite common, because it is that the default setting.  If a system has couple 2FA designed to fail closed and that they lose net property or have problems with DNS, they get utterly barred out of their workstations/servers. this can be not acceptable for about many organizations and so fail open is that the commonest selection.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: pentesteracademy</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1622532</link>
		<dc:creator><![CDATA[pentesteracademy]]></dc:creator>
		<pubDate>Thu, 24 Jan 2019 16:51:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1622532</guid>
		<description><![CDATA[top 5 Web_Server_Exploitation for penetration testers
Arachni could be a feature-full, modular, superior Ruby framework aimed towards serving to penetration testers and directors valuate the protection of net applications.
It is sensible, it trains itself by watching and learning from the net application&#039;s behavior throughout the scan method and is ready to perform meta-analysis employing a range of things in order to properly assess the trustiness of results and showing intelligence determine (or avoid) false-positives.]]></description>
		<content:encoded><![CDATA[<p>top 5 Web_Server_Exploitation for penetration testers<br />
Arachni could be a feature-full, modular, superior Ruby framework aimed towards serving to penetration testers and directors valuate the protection of net applications.<br />
It is sensible, it trains itself by watching and learning from the net application&#8217;s behavior throughout the scan method and is ready to perform meta-analysis employing a range of things in order to properly assess the trustiness of results and showing intelligence determine (or avoid) false-positives.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619741</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 05 Jan 2019 11:26:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619741</guid>
		<description><![CDATA[China&#039;s APT10
https://www.schneier.com/blog/archives/2018/12/chinas_apt10.html

Wired has an excellent article on China&#039;s APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers&#039; networks.

HOW CHINA’S ELITE HACKERS STOLE THE WORLD’S MOST VALUABLE SECRETS
https://www.wired.com/story/doj-indictment-chinese-hackers-apt10/

the country’s elite APT10—short for “advanced persistent threat”—hacking group decided to target not just individual companies in its long-standing efforts to steal intellectual property, but instead focus on so-called managed service providers. They’re the businesses that provide IT infrastructure like data storage or password management. Compromise MSPs, and you have a much easier path into all these clients. They&#039;re the super.

“MSPs are incredibly valuable targets. They are people that you pay to have privileged access to your network,” says Benjamin Read, senior manager for cyberespionage analysis at FireEye. “It’s a potential foothold into hundreds of organizations.”]]></description>
		<content:encoded><![CDATA[<p>China&#8217;s APT10<br />
<a href="https://www.schneier.com/blog/archives/2018/12/chinas_apt10.html" rel="nofollow">https://www.schneier.com/blog/archives/2018/12/chinas_apt10.html</a></p>
<p>Wired has an excellent article on China&#8217;s APT10 hacking group. Specifically, on how they hacked managed service providers in order to get to their customers&#8217; networks.</p>
<p>HOW CHINA’S ELITE HACKERS STOLE THE WORLD’S MOST VALUABLE SECRETS<br />
<a href="https://www.wired.com/story/doj-indictment-chinese-hackers-apt10/" rel="nofollow">https://www.wired.com/story/doj-indictment-chinese-hackers-apt10/</a></p>
<p>the country’s elite APT10—short for “advanced persistent threat”—hacking group decided to target not just individual companies in its long-standing efforts to steal intellectual property, but instead focus on so-called managed service providers. They’re the businesses that provide IT infrastructure like data storage or password management. Compromise MSPs, and you have a much easier path into all these clients. They&#8217;re the super.</p>
<p>“MSPs are incredibly valuable targets. They are people that you pay to have privileged access to your network,” says Benjamin Read, senior manager for cyberespionage analysis at FireEye. “It’s a potential foothold into hundreds of organizations.”</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619716</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 05 Jan 2019 09:57:56 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619716</guid>
		<description><![CDATA[https://jyripaasonen.fi/yksityisen-turvallisuusalan-toimijoiden-nakemyksia-alan-lakiuudistuksesta/]]></description>
		<content:encoded><![CDATA[<p><a href="https://jyripaasonen.fi/yksityisen-turvallisuusalan-toimijoiden-nakemyksia-alan-lakiuudistuksesta/" rel="nofollow">https://jyripaasonen.fi/yksityisen-turvallisuusalan-toimijoiden-nakemyksia-alan-lakiuudistuksesta/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619369</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Jan 2019 13:50:46 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619369</guid>
		<description><![CDATA[‘Roma225’ campaign targets companies in the Italian automotive sector 
https://securityaffairs.co/wordpress/79324/malware/roma225-campaign-italian-automotive.html

The malware was spread through well-written phishing email trying to impersonate a senior partner of one of the major Brazilian business law firms: “Veirano Advogados”.]]></description>
		<content:encoded><![CDATA[<p>‘Roma225’ campaign targets companies in the Italian automotive sector<br />
<a href="https://securityaffairs.co/wordpress/79324/malware/roma225-campaign-italian-automotive.html" rel="nofollow">https://securityaffairs.co/wordpress/79324/malware/roma225-campaign-italian-automotive.html</a></p>
<p>The malware was spread through well-written phishing email trying to impersonate a senior partner of one of the major Brazilian business law firms: “Veirano Advogados”.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619368</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Jan 2019 13:50:24 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619368</guid>
		<description><![CDATA[Hackers Make a Fake Hand to Beat Vein Authentication
https://motherboard.vice.com/en_us/article/59v8dk/hackers-fake-hand-vein-authentication-biometrics-chaos-communication-congress

Security researchers disclosed new work at the Chaos Communication Congress showing how hackers can bypass vein based authentication.

Devices and security systems are increasingly using biometric authentication to let users in and keep hackers out, be that fingerprint sensors or perhaps the iPhone’s FaceID. Another method is so-called ‘vein authentication,’ which, as the name implies, involves a computer scanning the shape, size, and position of a users’ veins under the skin of their hand.

But hackers have found a workaround for that, too. On Thursday at the annual Chaos Communication Congress hacking conference in Leipzig, Germany, security researchers described how they created a fake hand out of wax to fool a vein sensor.]]></description>
		<content:encoded><![CDATA[<p>Hackers Make a Fake Hand to Beat Vein Authentication<br />
<a href="https://motherboard.vice.com/en_us/article/59v8dk/hackers-fake-hand-vein-authentication-biometrics-chaos-communication-congress" rel="nofollow">https://motherboard.vice.com/en_us/article/59v8dk/hackers-fake-hand-vein-authentication-biometrics-chaos-communication-congress</a></p>
<p>Security researchers disclosed new work at the Chaos Communication Congress showing how hackers can bypass vein based authentication.</p>
<p>Devices and security systems are increasingly using biometric authentication to let users in and keep hackers out, be that fingerprint sensors or perhaps the iPhone’s FaceID. Another method is so-called ‘vein authentication,’ which, as the name implies, involves a computer scanning the shape, size, and position of a users’ veins under the skin of their hand.</p>
<p>But hackers have found a workaround for that, too. On Thursday at the annual Chaos Communication Congress hacking conference in Leipzig, Germany, security researchers described how they created a fake hand out of wax to fool a vein sensor.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619366</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Jan 2019 13:49:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619366</guid>
		<description><![CDATA[18 Months Later, WannaCry Still Lurks on Infected Computers
https://www.bleepingcomputer.com/news/security/18-months-later-wannacry-still-lurks-on-infected-computers/]]></description>
		<content:encoded><![CDATA[<p>18 Months Later, WannaCry Still Lurks on Infected Computers<br />
<a href="https://www.bleepingcomputer.com/news/security/18-months-later-wannacry-still-lurks-on-infected-computers/" rel="nofollow">https://www.bleepingcomputer.com/news/security/18-months-later-wannacry-still-lurks-on-infected-computers/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619365</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Jan 2019 13:48:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619365</guid>
		<description><![CDATA[How Facebook Tracks Non-Users via Android Apps
https://threatpost.com/how-facebooks-tracks-non-users-via-android-apps/140436/

If you quit Facebook or never joined because of its data collecting practices the odds are good the social network is still tracking you – despite your protest.

Facebook collects data of non-users of its social network via dozens of mainstream Android apps that send tracking and personal information back to the social network. Some of the dozens of apps sharing data with Facebook include Kayak, Yelp and Shazam, according a report presented by Privacy International on Saturday here at 35C3.]]></description>
		<content:encoded><![CDATA[<p>How Facebook Tracks Non-Users via Android Apps<br />
<a href="https://threatpost.com/how-facebooks-tracks-non-users-via-android-apps/140436/" rel="nofollow">https://threatpost.com/how-facebooks-tracks-non-users-via-android-apps/140436/</a></p>
<p>If you quit Facebook or never joined because of its data collecting practices the odds are good the social network is still tracking you – despite your protest.</p>
<p>Facebook collects data of non-users of its social network via dozens of mainstream Android apps that send tracking and personal information back to the social network. Some of the dozens of apps sharing data with Facebook include Kayak, Yelp and Shazam, according a report presented by Privacy International on Saturday here at 35C3.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619364</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Jan 2019 13:48:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619364</guid>
		<description><![CDATA[Ransomware vs. printing press? US newspapers face “foreign cyberattack”
https://www.welivesecurity.com/2018/12/31/ransomware-printing-press-newspapers/

Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk ransomware. Plus, advice on defending your organization against such attacks.]]></description>
		<content:encoded><![CDATA[<p>Ransomware vs. printing press? US newspapers face “foreign cyberattack”<br />
<a href="https://www.welivesecurity.com/2018/12/31/ransomware-printing-press-newspapers/" rel="nofollow">https://www.welivesecurity.com/2018/12/31/ransomware-printing-press-newspapers/</a></p>
<p>Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk ransomware. Plus, advice on defending your organization against such attacks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2018/12/01/cyber-security-december-2018/comment-page-10/#comment-1619363</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 02 Jan 2019 13:48:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=179896#comment-1619363</guid>
		<description><![CDATA[Ryuk Ransomware Involved in Cyberattack Stopping Newspaper Distribution
https://www.bleepingcomputer.com/news/security/ryuk-ransomware-involved-in-cyberattack-stopping-newspaper-distribution/

A cyberattack reportedly bearing the signature of Ryuk ransomware caused disruption over the weekend in printing and delivery of major newspapers in the US from Tribune Publishing and Los Angeles Times.

Among the publications affected by the attack include the Wall Street Journal, New York Times, Los Angeles Times, Chicago Tribune, and Baltimore Sun, Lake County News-Sun, Post-Tribune, Hartford Courant, Capital Gazette, and Carroll County Times.

Ryuk ransomware strain came to attention in August 2018 when it was reported to have made over $640,000 in Bitcoin to the group behind it. It is typically used in targeted attacks carried out through phishing, but it could also be planted through insecure remote desktop connections.

An analysis from security company Check Point shows code similarities with Hermes, a ransomware strain attributed to the North Korean hacker group Lazarus.

A statement explaining the incident from Los Angeles Times informs that it was caused by a computer breakdown.

The publication offered more details in a later article where it says that the outage was due to a &quot;malware attack, which appears to have originated from outside the United States and hobbled computer systems and delayed weekend deliveries of the Los Angeles Times and other newspapers across the country.&quot;

Malware attack disrupts delivery of L.A. Times and Tribune papers across the U.S.
https://www.latimes.com/local/lanow/la-me-ln-times-delivery-disruption-20181229-story.html]]></description>
		<content:encoded><![CDATA[<p>Ryuk Ransomware Involved in Cyberattack Stopping Newspaper Distribution<br />
<a href="https://www.bleepingcomputer.com/news/security/ryuk-ransomware-involved-in-cyberattack-stopping-newspaper-distribution/" rel="nofollow">https://www.bleepingcomputer.com/news/security/ryuk-ransomware-involved-in-cyberattack-stopping-newspaper-distribution/</a></p>
<p>A cyberattack reportedly bearing the signature of Ryuk ransomware caused disruption over the weekend in printing and delivery of major newspapers in the US from Tribune Publishing and Los Angeles Times.</p>
<p>Among the publications affected by the attack include the Wall Street Journal, New York Times, Los Angeles Times, Chicago Tribune, and Baltimore Sun, Lake County News-Sun, Post-Tribune, Hartford Courant, Capital Gazette, and Carroll County Times.</p>
<p>Ryuk ransomware strain came to attention in August 2018 when it was reported to have made over $640,000 in Bitcoin to the group behind it. It is typically used in targeted attacks carried out through phishing, but it could also be planted through insecure remote desktop connections.</p>
<p>An analysis from security company Check Point shows code similarities with Hermes, a ransomware strain attributed to the North Korean hacker group Lazarus.</p>
<p>A statement explaining the incident from Los Angeles Times informs that it was caused by a computer breakdown.</p>
<p>The publication offered more details in a later article where it says that the outage was due to a &#8220;malware attack, which appears to have originated from outside the United States and hobbled computer systems and delayed weekend deliveries of the Los Angeles Times and other newspapers across the country.&#8221;</p>
<p>Malware attack disrupts delivery of L.A. Times and Tribune papers across the U.S.<br />
<a href="https://www.latimes.com/local/lanow/la-me-ln-times-delivery-disruption-20181229-story.html" rel="nofollow">https://www.latimes.com/local/lanow/la-me-ln-times-delivery-disruption-20181229-story.html</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
