Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

Alert

NEWS - January 24, 2013

Jan 24, 2013 1:36AM PST
Sony Fined £250,000 By UK Over Failures in PlayStation Network Breach

Nearly two years after attackers began what turned out to be a long series of intrusions at Sony, most notably with the PlayStation Network data breach, authorities in the U.K. have fined the company the equivalent of almost $400,000 for not being careful enough with customer data.

The Sony PSN data breach unfolded over the course of several weeks in the spring of 2011 after attackers compromised one of the company's databases and were able to access what turned out to be data belonging to 77 million PSN customers. Sony had to shut down PSN, the company's online gaming community, for a couple of weeks while it investigated the breach and tried to work out what had happened and what data was taken.

In early May 2011, the chairman of Sony sent a letter to the U.S. House Commerce Committee, saying that the company had been the victim of a highly sophisticated attack.

Continued : https://threatpost.com/en_us/blogs/sony-fined-250000-uk-over-failures-playstation-network-breach-012413

Also:
Sony fined £250,000 after hackers gained access to millions of gamers' details
Sony fined £250,000 for 2011 PlayStation Network breach - Update
Sony Fined in Britain for Massive 2011 Data Breach

Discussion is locked

- Collapse -
Backdoors Found in Barracuda Networks Gear
Jan 24, 2013 1:38AM PST

A broad variety of the latest firewall, spam filter and VPN appliances sold by Campbell, Calif. based Barracuda Networks Inc. contain undocumented backdoor accounts, the company disclosed today. Worse still, while the backdoor accounts are apparently set up so that they would only be accessible from Internet addresses assigned to Barracuda, they are in fact accessible to potentially hundreds of other companies and network owners.

Barracuda's hardware devices are broadly deployed in corporate environments, including the Barracuda Web Filter, Message Archiver, Web Application Firewall, Link Balancer, and SSL VPN. Stefan Viehbock, a security researcher at Vienna, Austria-based SEC Consult Vulnerability Lab., discovered in November 2012 that these devices all included undocumented operating system accounts that could be used to access the appliances remotely over the Internet via secure shell (SSH).

Viehbock found that the username "product" could be used to login and gain access to the device's MySQL database (root@localhost) with no password, which he said would allow an attacker to add new users with administrative privileges to the appliances. SEC Consult found a password file containing a number of other accounts and hashed passwords, some of which were uncomplicated and could be cracked with little effort.

Continued : http://krebsonsecurity.com/2013/01/backdoors-found-in-barracuda-networks-gear/

Also:
Backdoors in many Barracuda appliances
Barracuda Networks confirms exploitable backdoors in its appliances

- Collapse -
Fake Adobe Flash Updates Resurface on the Web
Jan 24, 2013 2:25AM PST

From the GFI Labs blog:

Following the return of fake Google Chrome browser updates almost two weeks ago, online criminals are now banking on fake Adobe Flash Player updates to lure the unwary user into downloading malware onto their system.

Matthew and Robert, two of our researchers in the AV Labs, discovered this upon digging deeper into spam emails claiming to be from the Better Business Bureau (BBB) and eFax Corporate. Complete email details of these spam have documented in our GFI Software Tumblr site.

The BBB email contains an attachment that is found to be a Pony downloader that, once opened, downloads a variant of the ZeuS banking Trojan onto the affected user's system. The said downloader also steals various passwords related to FTP sites.

Continued : http://www.gfi.com/blog/fake-adobe-flash-updates-resurfaces-in-the-web/

- Collapse -
Phishing Scam Spreads via Facebook PM
Jan 24, 2013 2:25AM PST

From the GFI Labs blog:

We've seen a number of cases wherein phishers have used compromised Twitter accounts to send direct messages (DMs) to their followers. We're now beginning to see this same tactic used in Facebook in the form of private messages (PMs), and this isn't just some spam mail in your inbox claiming you have received a "private message".

As of writing, the PM looks like this: [Screenshot]

WARNING: Your account is reported to have violated the policies that are considered annoying or insulting Facebook users.system will disable your account within 24 hours if you do not do the reconfirmation. Please confirm your Facebook account below:



Recipients can act on this message in two ways: they can click the link to confirm their account, or simply ignore the message and delete it from their message inbox. Users who do the latter are guaranteed to be safe from this sort of scam. Users who do the former, however, are led to a single site where they can enter all personal information asked from them. Below are screenshots of the pages in the order of how they will appear to users:

Continued : http://www.gfi.com/blog/phishing-scam-spreads-via-facebook-pm/

- Collapse -
Open Letter to Skype' demands Microsoft come clean about ..
Jan 24, 2013 3:20AM PST
... user privacy

In an "Open Letter to Skype," more than 100 Internet activists and digital rights groups have demanded that the Microsoft-owned VoIP service become transparent about user privacy.

How private is Skype? We don't know, and that's a serious problem.

This is the message put forth in an "Open Letter to Skype," which was published today and carries the signatures of more than 100 Internet activists, companies, and organizations. The signatories hope the letter will urge Microsoft, Skype's parent company, to issue bi-annual Skype "transparency reports" similar to those published by Google, Twitter, and Sonic.net.

"Many of its users rely on Skype for secure communications - whether they are activists operating in countries governed by authoritarian regimes, journalists communicating with sensitive sources, or users who wish to talk privately in confidence with business associates, family, or friends," the letter reads. "It is unfortunate that these users, and those who advise them on best security practices, work in the face of persistently unclear and confusing statements about the confidentiality of Skype conversations, and in particular the access that governments and other third parties have to Skype user data and communications."

Continued : http://www.digitaltrends.com/web/open-letter-to-skype-microsoft-privacy/

Also:
Microsoft Needs To Come Clean On Skype Privacy
Groups raise questions about privacy on Skype
Skype urged to come clean over 'eavesdropping'
- Collapse -
Massive Android Botnet Built on Backscript Trojan
Jan 24, 2013 4:46AM PST

Researchers at Symantec say a massive botnet impacting Google Android users in China is built on a new, sophisticated variant of the Backscript Trojan.

Last week, researchers at Kingsoft Security identified the MDK botnet, which they stated has infected up to one million devices. According to Symantec, an analysis of the code of MDK has shown strong similarities to Android.Backscript, and they use the same certificate to sign APKs (Android Application Packages). Unlike previous versions of the malware however, this new variant uses an Advanced Encryption Standard (AES) algorithm to encrypt data in a new file.

"Once installed, the Trojan enables the attacker to remotely control users' devices, consequently allowing the attacker to harvest user data, download additional APKs, and generate nuisance adware," blogged Symantec researcher Flora Liu.

The server app.looking3g.com is used to download scripts and additional APKs, according to Liu.

Continued : http://www.securityweek.com/massive-android-botnet-built-backscript-trojan

Also: Android MDK Trojan Found Lurking in 11K Apps, Using AES Encryption

- Collapse -
Arsenal Lotto scam spammed out via PowerPoint file
Jan 24, 2013 4:46AM PST

The scammers must be getting more and more desperate to get their claws on our money.

Their criminal business model is messed up somewhat by anti-spam filters blocking their fraudulent messages from reaching potential victims.

What's a bad guy to do?

Well, they could do what this scammer has done - wrap their scam email up into a format that anti-spam software might not look at so closely.

Subject: Please quote your !
From: Arsenal <notification@hqsportslottery.com>
Attached file: Arsenal.ppt

Message body:
Please find attachement


The scammer doesn't give away much information in the email itself, but only the attachment (a PowerPoint file) and you'll read that Arsenal Football Club have awarded you a £2,350,000 prize in their lottery. [Screenshot]

All you have to do is contact their representative in China, a Dr Cheng Dingxiang, with your personal information (presumably he will request your bank information soon and an administration fee) and before you know it riches will be yours!

Continued : http://nakedsecurity.sophos.com/2013/01/24/arsenal-lotto-powerpoint-scam/