USB Thief, new USB-based data stealing malware

usbthiefThreat: USB Thief, new USB-based data stealing malware.
Solution: Disable USB ports were possible and have AUP which enforce care in their use.
URL: http://www.welivesecurity.com/2016/03/23/eset-discovers-new-usb-based-data-stealing-malware/

USB Thief is a new USB-based data stealing malware that only uses USB devices for propagation. The malware also uses multi-stage encryption to hide its tracks and make it very difficult to detect. The malware is written in a way that each install is bound to each device, making it difficult to copy and analyze.

USB Thief is ideal for attacking isolated (Air-gapped) networks that are not vulnerable to other internet based attacks. It seems this malware has been designed for targeted attacks against specific networks. It is highly advised that staff at all levels undergo cyber security training.

USB Thief, new USB-based data stealing malware Read Post »

New Desktop Purchase

I’ve had my old system for over six years now and I felt it might finally be time for an upgrade. So I have been searching NewEgg and doing a few test builds for what hardware I might want at the right price. Today the stars aligned and a few components came on sale at the same time. I like to keep a low budget yet have a system capable of doing all the tasks I need. So that influenced some of my decisions.

For the processor I liked the price and multitasking of this:
AMD FX-8300 Vishera 8-Core Socket AM3+ 95W FD8300WMHKBOX Desktop Processor
processor

For the motherboard I liked the price and features of:
MSI 970A-G46-R AM3+ AMD 970 + SB950
mobo

For memory I decided to go with:
G.SKILL Ripjaws X Series 16GB (2 x 8GB)
memory

I also decided to get a new case:
DEEPCOOL TESSERACT WH Mid Tower Computer Case
case

I’ll reuse the video card that I recently upgraded my old system with:
MSI Computer Video Graphics Cards N730K-2GD5LP/OC
gpu

I’ll also reuse the power supply and SSD from that system.

All the new components for the system cost me $247. So that will be $2 than my old build that also reused parts, though not the same reused ones.

New Desktop Purchase Read Post »

Rogue access points and Evil Twins pose risks on open networks.

wireless-conferenceThreat: Rogue access points and Evil Twins pose risks on open networks.
Solution: Users: disable automatic connection to wifi networks. Businesses: use network segmentation and devices that provide intrusion and malware detection.
URL: https://www.helpnetsecurity.com/2016/03/14/rogue-access-point-rsa-conference/

In this article the authors set up an open access point at RSA Conference configured to use some common SSID’s. Interestingly enough they 2,456 devices connect to the access points. These access points could have easily been configured as evil twins to snoop the network traffic of attendees that came to the conference. Luckily for the attendees this was just a test and their devices were just served the internet without bad intentions.

As a user there are several ways to protect against this type of attack. The first step would be to disable automatic connection to wifi networks. This would stop your device from connecting to an evil twin without your knowledge. As a business owner there are also several options to protect customers you want to provide access to wifi. Network segmentation and devices that offer other network protections are a good start. In addition, providing security such as WPA2 is another good option.

Rogue access points and Evil Twins pose risks on open networks. Read Post »

Multiple Passcode Bypass Vulnerabilities Discovered in iOS 9

Threat: Multiple Passcode Bypass Vulnerabilities Discovered in iOS 9
Solution: Disable the Siri module and Events Calendar without passcode, along with the public Control Panel with the timer and world clock. Users should also activate the weather app to prevent the redirect.
URL: http://www.securityweek.com/multiple-passcode-bypass-vulnerabilities-discovered-ios-9

This is a pretty big vulnerability that requires very little technical knowledge to exploit. The last vulnerability of this type I remember only allowed access to pictures and contacts.

I also wonder if the FBI could could explot this to unlock the iPhone they want from Syed Farook and the few hundred ones they have from other suspects for lesser crimes.

In addition as I look at the steps needed to completely disable this exploit, I hope Apple pushes out a security update soon. I can’t imagine many users actually taking the steps to disable everything necessary to protect against this.

Multiple Passcode Bypass Vulnerabilities Discovered in iOS 9 Read Post »