Viry a Červi

Facebook password crisis – what to do? [VIDEO]

Sophos Naked Security - 12 hodin 14 min zpět
Watch this special edition of Naked Security Live - we answer the questions people have been asking us, like "Should I stay or should I go?"

Uncle Sam's disaster agency FEMA creates disaster of its own: 2.3 million survivors' personal records spilled

The Register - Anti-Virus - 12 hodin 17 min zpět
Org does to privacy what hurricanes did to your house

Disaster relief org FEMA has admitted, conveniently on a Friday night, to accidentally leaking banking details and other personal information of 2.3 million hurricane and wildfire survivors.…

Kategorie: Viry a Červi

Security storm brewing for Oracle Java-powered smart cards: More than a dirty dozen flaws found, fixes... er, any fixes?

The Register - Anti-Virus - 22 Březen, 2019 - 23:08
Vuln hunters warn malicious applets can bust through protections, snoop on or hijack access gizmos

Bug hunters say Oracle's Java Card platform is host to a dozen and a half security flaws that could place smart-cards and similar embedded devices using the tech at risk of hijacking.…

Kategorie: Viry a Červi

Spycams Secretly Live-Streamed 1,600 Motel Guests

VirusList.com - 22 Březen, 2019 - 22:11
Four have been arrested in the case.
Kategorie: Viry a Červi

Firefox and Edge Fall to Hackers on Day Two of Pwn2Own

VirusList.com - 22 Březen, 2019 - 21:28
Browsers Firefox and Edge take a beating on day two of the Pwn2Own competition.
Kategorie: Viry a Červi

Google Play Touts Certs in Quest For Enterprise Security

VirusList.com - 22 Březen, 2019 - 21:22
Google has snagged three security and privacy certifications for Google Play as it tries to appeal to enterprises despite numerous malicious apps and security issues.
Kategorie: Viry a Červi

Critical DoS Bug Bubbles Up in Facebook Fizz TLS 1.3 Project

VirusList.com - 22 Březen, 2019 - 21:22
Users of the open-source project should upgrade immediately.
Kategorie: Viry a Červi

Analysis: Drone Tech Creates New Type of Blended Threat

VirusList.com - 22 Březen, 2019 - 19:33
Hacked drones are breaching physical and cyberdefenses to cause disruption and steal data, experts warn.
Kategorie: Viry a Červi

Sacked IT guy annihilates 23 of his ex-employer’s AWS servers

Sophos Naked Security - 22 Březen, 2019 - 17:18
He was fired after four weeks, ripped off the credentials of former colleague "Speedy", and will be mulling it all over for two years in jail.

Medtronic Defibrillators Have Critical Flaws, Warns DHS

VirusList.com - 22 Březen, 2019 - 16:07
The unpatched vulnerabilities exist in 20 products made by the popular Medtronics medical device manufacturer, including defibrillators and home patient monitoring systems.
Kategorie: Viry a Červi

BitLocker hacked? Disk encryption – and why you still need it [VIDEO]

Sophos Naked Security - 22 Březen, 2019 - 14:29
Is BitLocker cracked? Is disk encryption still worth it? The answers are "No" and "Yes", and here's why.

250 antivirů pro Android, pravých jen zlomek

VIRY.CZ - 22 Březen, 2019 - 14:14

Na bezpečnosti se dobře vydělává, čehož se chytila i řada pochybných společností. Server AV-Comparatives tak otestoval 250 antivirů (!), které lze stáhnout na Google Play a používat na chytrých telefonech se systémem Android. Výsledek? V řadě případů to jsou podvodné programy, které si na antiviry hrajou…

To, že si autoři těchto děl vybrali zrovna systém Android není náhodný. Při porovnání s Microsoft Windows je Google Android stále mladá záležitost. Navíc díky fungování systému Android je vývoj bezpečnostních řešení jednodušší. Výrobci nemusí řešit tak velký technologický deficit a dohánět velkou časovou ztrátu jako velcí hráči, nebo ti, kteří na trh vstoupili již před lety. Ani havěť nemá za sebou tak dlouhou historii jako na platformě Microsoft Windows a k zajištění zpětné detekce není nutné věnovat tolik času.

Jak to dopadlo?

Takže jak test dopadl? Z 250 antivirů jich jen 80 dokázalo detekovat přes 30% havěti a to bez falešných poplachů. Mezi těmi 80 antiviry lze najít spoustu podprůměrných, ale alespoň mají nějakou „snahu“ (23 z nich dosahovalo 100% detekce). Nicméně onen zbytek, tedy 170 údajných antivirů, to byl jasný odpad. Typickým chováním takových „antivirů“ byl zvýšený výskyt falešných poplachů, kdy označují legitimní aplikace za zavirované a neustále tak obtěžují uživatele. Navíc kvalita detekce byla u těchto 170 kousků pod 30%. Těchto 170 „antivirů“ tak můžeme v klidu zařadit do kategorie podvodných/fake antivirů či do kategorie PUA (potentially unwanted applications).

Další zajímavosti
  • Hodnocení antivirů na Google Play nevypovídá o jejich kvalitně. Většina z testovaných 250 produktů měla 4 hvězd z 5 nebo více, ač stály za prd! Bohužel toto může platit všeobecně pro jakoukoliv aplikaci na Google Play :-/ Podobná je situace s počtem stažení.
  • 15 antivirů z těch 80 používalo shodný antivirový „motor“ OpenAVL a všechny tak skončily na 87,8% kvality detekce.
  • Hodně antivirů běželo i na známém „motoru“ BitDefender. Celkem 7. Některým to stačilo na 100% detekci, některým ne.
  • Mezi těmi nejhoršími 170 kousky bylo evidentní, že často vycházejí ze společného základu, pouze se prezentují v jiných barvách či s jinými texty. Podívejte se třeba na 6 různých fake antivirů níže, asi bratři
  • Některé z nejhorších „antivirů“ pracovaly pouze na principu whitelistu a vše ostatní považovaly za škodlivé. Whitelist byl přitom postaven na názvech balíčků. Takže například všechny názvy balíčků začínající na com.twitter.* byly považovány za čisté, ač pro útočníka není problém pod com.twitter.* vystavit vlastní škodlivý kód. Některé z těch nejdebilnějších „antivirů“ pak na whitelist zapomněly přidat samy sebe, takže samy sebe označovaly za havěť!
  • O podvodných antivirech informoval v minulosti například článek na We Live Security. Perličkou bylo, že když už něco podvodný antivirus opravdu regulérně detekoval jako nebezpečnou aplikaci, tak to byl konkureční podvodný antivirus…
Těchto 6 aušusových antivirů vycházelo evidentně ze společného základu.

Celou zprávu ze serveru AV-Comparatives lze stáhnout přesně zde.

The post 250 antivirů pro Android, pravých jen zlomek appeared first on VIRY.CZ.

Kategorie: Viry a Červi

Microsoft Windows 7 patch warns of coming patchocalypse

Sophos Naked Security - 22 Březen, 2019 - 13:59
Microsoft has issued a patch to remind Windows 7 users that they’ll soon have no patches.

Spycam sex videos of 1,600 motel guests sold to paying subscribers

Sophos Naked Security - 22 Březen, 2019 - 12:57
1,600 guests were filmed with hidden webcams that livestreamed the action. The site also sold videos.

Scammer pleads guilty to fleecing Facebook and Google of $121m

Sophos Naked Security - 22 Březen, 2019 - 12:20
Large, worldly tech companies would never fall for a wire transfer invoice scam, would they?

AZORult++: Rewriting history

Kaspersky Securelist - 22 Březen, 2019 - 12:13

The AZORult Trojan is one of the most commonly bought and sold stealers in Russian forums. Despite the relatively high price tag ($100), buyers like AZORult for its broad functionality (for example, the use of .bit domains as C&C servers to ensure owner anonymity and to make it difficult to block the C&C server), as well as its high performance. Many comment leavers recommend it.

But at the back end of 2018, the main seller, known under the handle CrydBrox, stopped selling the malware:

“All software has a shelf life. It’s run out for AZORult.
It is with joy and sadness that I announce that sales are closed forever.”

Some attribute the move to AZORult 3.2 having become too widely available, likewise the source code of the botnet control panel. This version of the malware spread to other forums where even users without special skills can download and configure it for their own purposes. So the imminent demise of AZORult was apparently down to a lack of regular updates and its overly wide distribution. Yet the story of AZORult does not end there.

In a nutshell

AZORult is a Trojan stealer that collects various data on infected computers and sends it to the C&C server, including browser history, login credentials, cookies, files from folders as specified by the C&C server (for example, all TXT files from the Desktop folder), cryptowallet files, etc.; the malware can also be used as a loader to download other malware. Kaspersky Lab products detect the stealer as Trojan-PSW.Win32.Azorult. Our statistics show that since the start of 2019, users in Russia and India are the most targeted.


Geography of users attacked by Trojan-PSW.Win32.Azorult, 01.01.2019 — 03.18.2019

From Delphi to C++

In early March 2019, a number of malicious files detected by our products caught the eye. Although similar to AZORult already known to us, unlike the original malware, they were written not in Delphi, but in C++. A clear hint at the link between them comes from a section of code left by the developer.

It appears that the acolytes of CrydBrox, the very one who pulled the plug on AZORult, decided to rewrite it in C++; this version we call AZORult++. The presence of lines containing a path to debugging files likely indicates that the malware is still in development, since developers usually try to remove such code as soon as feasible.

AZORult++ starts out by checking the language ID through a call to the GetUserDefaultLangID() function. If AZORult++ is running on a system where the language is identified as Russian, Armenian, Azerbaijani, Belarusian, Georgian, Kazakh, Tajik, Turkmen, or Uzbek, the malware stops executing.

A more detailed analysis reveals that the C++ version is deficient compared to AZORult 3.3, the last iteration to be sold. In particular, there is no loader functionality and no support for stealing saved passwords from many of the browsers supported by AZORult 3.3. At the same time, many signature features of the Delphi-based version 3.3 are present in AZORult++, including the algorithm for communication with the C&C server, the command format, the structure and method of storing harvested data, and encryption keys.

Like AZORult 3.3, AZORult++ uses an XOR operation with a 3-byte key to encrypt data sent to the C&C server. What’s more, this key we had already encountered in various modifications of version 3.3.


Examples of different versions of AZORult in operation (data encrypted using XOR)

The malware collects stolen data in RAM and does not write to the hard drive to keep its actions hidden. A comparison of the data sent in the first packet (the ID of the infected device) shows that AZORult++ uses a shorter string than AZORult 3.3 for identification:

The server response also contains far less data. In version 3.3, the response contained a command in the form “++++-+–+-“, specifying the bot configuration and a link for downloading additional malware, plus several binary files needed for the stealer to work. The string “++++-+–+-” is parsed by the Trojan character-by-character; “+” in a specific position signifies a command to execute certain actions (for example, harvesting of cryptowallet files). The current version of AZORult++ employs a shorter, yet similar command:

It is worth mentioning separately that the resulting configuration string is not processed correctly; the code execution does not depend on the value “+” or “-” in the string, since the characters are checked against \x00 for a match. In other words, the resulting command does not affect the stealer’s behavior:

This seems to be an error on the part of the developer, which suggests again that the project is in the very early stages of development. Going forward, these bugs are expected to be eliminated and the functionality of AZORult++ expanded.

++ up the sleeve

For all its flaws, AZORult++ could actually be more dangerous than its predecessor due to its ability to establish a remote connection to the desktop. To do so, AZORult++ creates a user account using the NetUserAdd() function (username and password are specified in the AZORult++ code), before adding this account to the Administrators group:

Next, AZORult++ hides the newly created account by setting the value of the Software\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist registry key to 0. Likewise, through setting registry key values, a Remote Desktop Protocol (RDP) connection is allowed:

The malicious cherry on the cake is a call to ShellExecuteW() to open a port to establish a remote connection to the desktop:

After that, the infected computer is ready to accept the incoming RDP connection, which allows the cybercriminal — armed with the victim’s IP address and account information — to connect to the infected computer and seize complete control of it.

Conclusion

During development, AZORult underwent several changes related to the expansion of its functionality. Moreover, despite its many flaws, the C++ version is already more threatening than its predecessor due to the ability to establish a remote connection to the desktop. Because AZORult++ is likely still in development, we should expect its functionality to expand and bugs to be eliminated, not to mention attempts to distribute it widely under a name that buyers will recognize.

IoC

C&C servers
http://ravor.ac[.]ug
http://daticho.ac[.]ug

MD5
08EB8F2E441C26443EB9ABE5A93CD942
5B26880F80A00397BC379CAF5CADC564
B0EC3E594D20B9D38CC8591BAFF0148B
FE8938F0BAAF90516A90610F6E210484

Hey, what's Mandarin for 'WTF is going on?' Nokia phones caught spewing device IDs to China, software blunder blamed

The Register - Anti-Virus - 22 Březen, 2019 - 07:56
Maker insists the privacy cock-up has been fixed, mostly

An undisclosed number of Nokia 7 Plus smartphones have been caught sending their identification numbers to a domain owned by a Chinese telecom firm.…

Kategorie: Viry a Červi

Don't have a heart attack but your implanted defibrillator can be hacked over the air (by someone who really wants you dead)

The Register - Anti-Virus - 22 Březen, 2019 - 01:25
US govt sounds alarm over wireless comms, caveats apply

Medical gear maker Medtronic is once again at the center of a hacker panic storm. This time, a number of its heart defibrillators, implanted in patients' chests, can, in certain circumstances, be wirelessly hijacked and reprogrammed, perhaps to lethal effect.…

Kategorie: Viry a Červi

'Sharing of user data is routine, yet far from transparent' is not what you want to hear about medical apps. But 2019 is gonna 2019

The Register - Anti-Virus - 22 Březen, 2019 - 00:23
Study finds Android software slinging deets all over the place

Folks using healthcare-related Android apps: after you've handed over your private details to that software, do you know where it is sending your data? If you don't, nobody should blame you. It turns out it can be a complicated and obfuscated affair.…

Kategorie: Viry a Červi

WordPress Plugin Patched After Zero Day Discovered

VirusList.com - 21 Březen, 2019 - 21:47
The plugin, Social Warfare, is no longer listed after a cross site scripting flaw was found being exploited in the wild.
Kategorie: Viry a Červi
Syndikovat obsah