Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

Alert

NEWS - August 14, 2012

Aug 14, 2012 2:52AM PDT
Citadel Malware Used to Infiltrate Airport VPN

The Citadel Trojan is really starting to become kind of a pain in the neck. Not content to sit by and watch while its more well-known rivals Zeus and SpyEye get all the attention, the Citadel malware has begun showing up in some interesting places, with the latest example being the discovery of the Trojan being used to steal VPN credentials for internal users at a major airport.

The attack is a two-stage operation that is designed to defeat the strong authentication application that the airport had in place. Researchers at Trusteer discovered the attack and notified officials at the unnamed airport, who then disabled employee access through the VPN.

Airports are target-rich environments for attackers, thanks to their open wireless networks and the huge population of transient users who are all too eager to use them. Man-in-the-middle attacks on airports' public networks are common, but this particular attack didn't target the public network or users but instead went after the airport's employees and their remote-access application. Getting access through any corporation's VPN system is a huge win for an attacker, because once she comes in as an authenticated user, she enjoys all of the access ad privileges on the network that the victimized user does.

Continued : https://threatpost.com/en_us/blogs/citadel-malware-used-infiltrate-airport-vpn-081412

Also:
Citadel Trojan Targets Airport Employees with VPN Attack
Citadel Trojan Linked to Attacks on VPN at International Airport
Attack on airport VPN bypassed multi-factor authentication, security firm reports

Discussion is locked

- Collapse -
Researchers Seek Help Cracking Gauss Mystery Payload
Aug 14, 2012 4:11AM PDT

Researchers at Kaspersky Lab in Russia are asking the public for help in cracking an encrypted warhead that gets delivered to infected machines by the Gauss malware toolkit.

The warhead gets decrypted by the malware using a key composed of configuration data from the system it's targeting. But without knowing what systems it's targeting or the configuration on that system, the researchers have been unable to reproduce the key to crack the encryption.

"We are asking anyone interested in cryptology, numerology and mathematics to join us in solving the mystery and extracting the hidden payload," the researchers write in a blog post published Tuesday.

The payload is delivered to machines via an infected USB stick that uses the .lnk exploit to execute the malicious activity. In addition to the encrypted payload, infected USB sticks deliver two other files that also contain encrypted sections that Kaspersky has been unable to crack.

"The code that decrypts the sections is very complex compared to any regular routine we usually find in malware," Kaspersky writes. Kaspersky believes one of these sections may contain data that helps crack the payload.

Last week, Kaspersky disclosed that it had found a http://wired_threatlevel.api.contextly.com/redirect/?id=JszqfLqQeE&click=inbody, apparently designed by the same people behind the http://wired_threatlevel.api.contextly.com/redirect/?id=yETOJ8ZniT&click=inbody, that has infected at least 2,500 machines so far, primarily in Lebanon.

Continued : http://www.wired.com/threatlevel/2012/08/gauss-mystery-payload/

@ the Kaspersky Lab Weblog: The Mystery of the Encrypted Gauss Payload ....

'We are providing the first 32 bytes of encrypted data and hashes from known variants of the modules. If you are a world class cryptographer or if you can help us with decrypting them, please contact us by e-mail: theflame@kaspersky.com.'

- Collapse -
Adobe Patches Critical Flash Bug, Massive Reader Update..
Aug 14, 2012 6:11AM PDT
Adobe Patches Critical Flash Bug, Releases Massive Reader Update

Adobe has issued a fix for a critical Flash vulnerability that attackers already are taking advantage of with targeted attacks. The flaw can allow attackers to get complete control of vulnerable machines, and Adobe said that it's aware of attacks that are going after Flash on Internet Explorer.

The CVE-2012-1535 vulnerability in Flash, when exploited, either will crash the app or it could allow the attacker to run arbitrary code on the machine. Adobe officials are urging users to patch their systems now, especially given the fact that there are attacks targeting the Flash vulnerability.

"There are reports that the vulnerability is being exploited in the wild in limited targeted attacks, distributed through a malicious Word document. The exploit targets the ActiveX version of Flash Player for Internet Explorer on Windows," Adobe said in its advisory.

Continued : https://threatpost.com/en_us/blogs/adobe-patches-critical-flash-bug-releases-massive-reader-update-081412

See Vulnerabilities & Fixes:
Adobe Reader / Acrobat Multiple Vulnerabilities
Adobe Shockwave Player Multiple Vulnerabilities
Adobe Flash Player Unspecified Code Execution Vulnerability
- Collapse -
Wikileaks uncovers TrapWire surveillance: FAQ
Aug 14, 2012 8:20AM PDT

"Wikileaks' latest trove of leaked Stratfor emails details the breadth and potential impact of the TrapWire surveillance system. What is it, and are you affected?"

Wikileaks has released as part of its The Global Intelligence Files series another vast cache of leaked emails from private intelligence firm Stratfor. Brought to the public eye is a system called TrapWire. This previously little known technology may have the ability to impact our everyday lives in the U.S. and abroad.

This serves as an FAQ to what we know so far.

What is TrapWire?

In short, TrapWire is surveillance software used by both private industry and the U.S. government and its allies oversees, allowing both public and private sector users to help in counter-terrorism and anti-crime efforts. The software uses algorithms and data from a variety of surveillance sources -- including CCTV and human-input from spotted 'suspicious' behavior -- to, in essence, 'predict' potentially criminal activity.

One leaked Stratfor-owned document, describes it as follows:

There are a variety of new tools, such as TrapWire, a software system designed to work with camera systems to help detect patterns of pre-operational surveillance, that can be focused on critical areas to help cut through the fog of noise and activity and draw attention to potential threats.

While ordinary CCTV cameras are often 'passive' and monitored by humans, TrapWire-connected cameras, such as 'pan-tilt-zoom' cameras, are able to track people, along with license plate readers, called Automatic Number Plate Recognition (ANPR) from place to place.

Continued : http://www.zdnet.com/wikileaks-uncovers-trapwire-surveillance-faq-7000002513/

Related: WikiLeaks.org is crippled under a massive DDoS. Is the TrapWire leak to blame?

- Collapse -
Oracle releases Java SE 7 update 6, bringing first-class..
Aug 14, 2012 8:20AM PDT
.. support to OS X

Oracle announced on Tuesday that it will start offering direct downloads and auto-updates to Java on OS X beginning with the release of Java Standard Edition 7 Update 6. Users can download the Java Runtime Environment (JRE) directly from Oracle's java.com website "soon," according to Oracle, and will receive auto-updates at the same time as Windows, Linux, and Solaris platforms. The update also fully integrates the JavaFX 2.2 libraries, designed to make the development and deployment of desktop applications easier and faster, and adds OS X support for a new JavaFX user interface development tool.

The latest release of Java SE 7 now makes OS X a fully supported platform. That includes the JRE, which end users install to run Java-based applications; the JDK, which developers use to develop Java applications; and the JavaFX "rich client platform," used to develop GUI desktop applications. Oracle is also releasing an OS X version of its new JavaFX Scene Builder, which allows developers to build user interfaces using drag-and-drop components (similar to Xcode or Visual Studio).

Continued : http://arstechnica.com/apple/2012/08/oracle-releases-java-se-7-update-6-bringing-first-class-support-to-os-x/