Yet another potentially breaking change on the web. This time round it involves cookie handling (in the upcoming Chrome 80). The objective is to close off a class of attacks known as CSRF (cross-site request forgery). Expect other browsers to follow suit.
… any websites you’re responsible for that are passing cookies around cross domain by POST request and don’t already have a SameSite policy are going to start misbehaving pretty quickly
Source: Troy Hunt: Promiscuous Cookies and Their Impending Death via the SameSite Policy
An inside look into the workings of a cybercrime organization. For an organization that purportedly develops sophisticated malware to steal banking credentials, the lack of basic cyber hygiene led to much info being extracted about their dealings. The irony.
The $5 million reward is being offered for 32 year-old Maksim V. Yakubets, who the government says went by the nicknames “aqua,” and “aquamo,” among others. The feds allege Aqua led an elite cybercrime ring with at least 16 others who used advanced, custom-made strains of malware known as “JabberZeus” and “Bugat” (a.k.a. “Dridex“) to steal banking credentials from employees at hundreds of small- to mid-sized companies in the United States and Europe.
Source: Inside ‘Evil Corp,’ a $100M Cybercrime Menace — Krebs on Security
This is a simple but brilliantly executed heist. Pretend to be the sender by sending from a similar looking domain.
One of the domains was a look-alike of the Chinese investment company’s domain; the other was a spoof of the Israeli firm’s domain. In both instances, the threat actors simply added an “s” to the end of the original domain name.
The next phase of the scam involved the attackers sending two emails with the same subject header as the original email thread about the planned seed funding.
Money meant to fund an Israeli startup wound up directly deposited to the scammers.
Source: How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC
If you ever wondered how you can get Wifi on airplanes – massive objects flying at nearly 600mph at altitudes of more than 35000 feet – it is a feat of engineering explained by this article.
How we browse the internet at 35,000 feet
Source: The Magical Science of Wi-Fi on Airplanes – OneZero
Another data leak, this time involving, let’s see, 1.2 billion people. This was found by security researchers in an unsecured ElasticSearch server – the server is now down. According to analysis, the data most likely comes from data enrichment companies.
A total count of unique people across all data sets reached more than 1.2 billion people, making this one of the largest data leaks from a single source organization in history. The leaked data contained names, email addresses, phone numbers, LinkedIN and Facebook profile information.
For a very low price, data enrichment companies allow you to take a single piece of information on a person (such as a name or email address), and expand (or enrich) that user profile to include hundreds of additional new data points of information.
Source: 1.2 billion people exposed in data leak includes personal info, LinkedIN, Facebook
ICANN lifts price caps on .org registry. PE firm acquires .org registry. PE firm appoints former ICANN executives to top positions. Does something seem fishy here? How much does companies like Wikipedia have to pay to keep their .org domain from now on?
Ethos Capital is a new private equity firm lead by Erik Brooks. Brooks was at Abry Partners until earlier this year. Abry Partners acquired Donuts and installed former ICANN President of Global Domains Akram Atallah in the top spot there.
Source: Breaking: Private Equity company acquires .Org registry – Domain Name Wire | Domain Name News
(Edit) 2019-11-23: You can sign up to reject the sale.
Worryingly, attacks on critical infrastructure is becoming more and more common.
After initial denial, company says report of “malware in system” is correct.
Source: Indian nuclear power plant’s network was hacked, officials confirm
It is reminiscent of the days of CD-ROM attacks, when your computer will auto-run the contents of a CD-ROM, even when the account is locked.
Source: Samy Kamkar: PoisonTap – exploiting locked computers over USB
This is the right strategy against ransomware. Backup, backup and backup. At the first sign of any ransomware attack it is important to isolate affected machines immediately and contact a cybersecurity professional to mitigate and prevent further infection.
The US city of New Bedford, Massachusetts, rejected a ransom demand of $5.3 million and came back with a counter-offer of $400,000, while restoring encrypted data from backup.
Source: US City Rejects $5.3 Million Ransom Demand and Restores Encrypted Files from Backup (SecAlerts)
When what you can remotely exploit, you can remotely remove.
In a rare feat, French police have hijacked and neutralized a massive cryptocurrency mining botnet controlling close to a million infected computers. The notorious Retadup malware infects computers and starts mining cryptocurrency by sapping power from a computer’s processor. Although the malware was used to generate money, the malware operators easily could have run other […]
Source: Police hijack a botnet and remotely kill 850,000 malware infections – TechCrunch