ISC StormCast for Monday, October 31st 2011 http://isc.sans.edu/podcastdetail.html?id=2098, (Mon, Oct 31st)
Updated: 2011-10-31 02:23:47
...(more)...
The past week's leading IT security news included more Mac malware, denial-of-service attack tools, and more details about various cyber-attacks around the world. -
Mac malware dominated the news this week, as security researchers uncovered a new Trojan capable of hijacking Mac OS X systems and launching denial-of-service attacks on another server, downloading additional malware on the infected system and providing attackers with remote access on to the comp...
Cyber-attacker are already targeting the country's financial services, transportation and other critical infrastructure and have come close to crashing portions of them. - Cyber-attacks have already come close several times to
shutting down parts of the country's critical infrastructure, according to the U.S.
Department of Homeland Security Secretary.
The number of cyber-attacks on financial systems,
transportation and other networks is growing, Secretary Janet Na...
Two new security features, App Passwords and Trusted Friends are designed to help Facebook users regain control over their accounts even if they are compromised and protect themselves from malicious third-party apps - Facebook is testing out two new security features to help
users protect their accounts from being compromised by malicious third-party
apps or hackers.
In an Oct. 26 blog post, the social networking giant
unveiled the quot;trusted friends quot; feature to help users regain control
of their acc...
A draft report from the U.S. China Economic and Security Review Commission said attackers had interfered with two U.S. satellites. The report strongly hinted there was a China connection. - Cyber-attackers interfered
with two U.S. government satellites several times over a two-year period,
according to an upcoming report from a congressional commission.
The intrusions on the
satellite occurred four times in 2007 and 2008, according to a draft of a
report from the U.S.-China Econom...
Symantec uncovered a spam gang that launched its own URL-shortening Websites to generate links to pharmaceutical spam sites instead of relying on popular services. - Spammers have found a way to
circumvent security measures at URL-shortening Websites that detect and remove
malicious links. They are creating their own services on the .info domain,
Symantec researchers found.
Symantec has identified more
than 80 sites set up by spammers to shorten Website ad...
Formerly a Linux backdoor, the Tsunami Trojan targets Macs to launch denial-of-service attacks. Attackers can download additional malware and remotely access infected Macs. - Malware authors have ported
a Trojan originally written for Linux systems to hijack Mac OS X systems,
security researchers found. Once compromised, the Macs could be used to launch
denial-of-service attacks.
The Tsunami Trojan works by
latching onto a host. Tsunami appears to be derived from K...
Symantec posted strong fiscal second-quarter results based on continuing demand for security and storage products despite weak PC demand and an uncertain economy. - Fear
of cyber-threats and ongoing demand for digital information boosted Symantec's
second-quarter performance as enterprises and consumers continued to buy its
security and backup products, the company said.
The
company reported fiscal second-quarter revenue of $1.68 billion, a 14 percent
in...
News Analysis: Hackers have rewritten old Linux code to create a Trojan called Tsunami that attacks Apple Mac OS X computers. It's time to accept the fact that any operating system can be attacked by malware. - We've
been hearing the stories for years about how Apple's Macintosh is immune to
malware. For years I've heard the smug claims from Mac owners about how it's
too bad that Windows users have to load their computers with antivirus software
to be safe, but Mac owners don't. For years I've known it...
A month after Mitsubishi Heavy Industries said there was "no possibility" that data was stolen after cyber-attackers infected 83 servers, the company now reports it's "possible." - Mitsubishi
Heavy Industries, Japan's largest defense contractor, said it is possible that
attackers who had breached its networks and infected several machines with
malware had also stolen some sensitive information.
While
it fell short of an outright admission, the company's statement was a s...
According to an inspector general report, the U.S. Department of Energy continues to have serious network security issues for the second year in a row and is regularly hit by cyber-attackers. - The Department of Energy has
been hit by multiple cyber-attacks in the past year, costing the federal
government over $2 million to recover, according to a recent audit report.
An annual review of the
Department of Energy's unclassified networks revealed a number of security
issues, including ...
Google Oct. 25 paid out over $26,000 to security researchers who found 18 flaws in Chrome 15, including several high-risk issues. Chrome 15 includes a new New Tab page, too. -
Google (NASDAQ:GOOG) launched its latest Chrome 15
browser to the stable channel and shelled out $26,511 for 18 security flaw
discoveries,
shattering the previous payout record of $17,000 set in August.
Some $12,174 of that total was paid to Sergey
Glazunov for finding five high-risk, cross...
In this article, the author walks you through some of the features and capabilities of Forefront Identity Manager (FIM) to help you decide if it's the right platform for your company.
A hacker group has released a proof-of-concept tool that exploits how encryption keys can be renegotiated to launch a distributed denial of service attack against Secure Sockets Layer servers. -
A tool designed to launch denial of service attacks can bring down
Secure Sockets Layer servers using just a laptop computer and a
standard DSL connection.
Developed by a German group called The Hacker's Choice,
THC-SSL-DOS tool is intended to be a proof-of-concept to disclose
quot;fishy s...
A majority of businesses do not have Internet usage policies that clarify which Websites and services employees can use. - The majority of small business owners believe Internet security is
critical to their success and that their companies are safe from
ever-increasing cyber-security threats even as many fail to take
fundamental precautions, according to a survey of U.S. small businesses
sponsored by Symantec and t...
A flaw in XML Encryption leaves major Web services vulnerable to potential attack unless Apache, Red Hat, IBM, Microsoft and other major XML framework providers adopt a new standard. - Security
researchers have cracked the major XML framework used to encrypt data in major
Web applications.
Two
researchers from Germany's Ruhr-University demonstrated a practical attack
against XML's cipher block chaining module at the ACM Conference on Computer
and Communications Security in ...
News Analysis: While it's true that a totally secure alternate Internet will protect against hackers and terrorists, by the time it's expanded to cover everybody it won't be secure for anybody. - When
Shawn Henry, FBI executive assistant director, suggested during a
conference in Baltimore that a second, secure Internet be created to protect
critical infrastructure against increasingly sophisticated attacks, he made a
good point. A separate secure network could help reduce serious attack...
More and more organizations are implementing virtualized solutions to reduce cost and gain strategic flexibility. As such, eEye continues to enhance Retina’s virtualized scanning capabilities to provide insight over the risks these assets raise for the business. It’s always been such that Retina can scan hypervisors (VMware, Microsoft, and XEN based) and virtualized machines. In [...]
This third and last installment in the series will cover how to use Process Monitor for detecting changes to the registry and file system that may be made by malware.