Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

Alert

NEWS - March 12, 2014

Mar 12, 2014 7:48AM PDT
Experian Lapse Allowed ID Theft Service Access to 200 Million Consumer Records

In October 2013, KrebsOnSecurity published an exclusive story detailing how a Vietnamese man running an online identity theft service bought personal and financial records on Americans directly from a company owned by Experian, one of the three major U.S. credit bureaus. Today's story looks deeper at the damage wrought in this colossal misstep by one of the nation's largest data brokers.

Last week, Hieu Minh Ngo, a 24-year-old Vietnamese national, pleaded guilty to running an identity theft service out of his home in Vietnam. Ngo was arrested last year in Guam by U.S. Secret Service agents after he was lured into visiting the U.S. territory to consummate a business deal with a man he believed could deliver huge volumes of consumers' personal and financial data for resale. Screenshot http://krebsonsecurity.com/wp-content/uploads/2013/10/ngohalfpass-285x146.png

But according to prosecutors, Ngo had already struck deals with one of the world's biggest data brokers: Experian. Court records just released last week show that Ngo tricked an Experian subsidiary into giving him direct access to personal and financial data on more than 200 million Americans.

Continued: http://krebsonsecurity.com/2014/03/experian-lapse-allowed-id-theft-service-to-access-200-million-consumer-records/

Related:
200M consumer records exposed in Experian security lapse
Experian ID Theft Exposed 200M Consumer Records

For those interested: KrebsOnSecurity.com Wins Awards

Discussion is locked

- Collapse -
Apple iOS 7.1 Fixes More Than 20 Code-Execution Flaws
Mar 12, 2014 8:14AM PDT

Apple has fixed a slew of vulnerabilities that could lead to code execution on the iPhone, along with a number of other security vulnerabilities in the latest version of its mobile operating system, iOS 7.1. The new release comes just a little more than two weeks after Apple released iOS 7.06 to fix the SSL certificate validation error.

Unlike that release, which fixed just the one vulnerability, significant though it was, iOS 7.1 is a major security release containing patches for a large number of vulnerabilities in a bunch of different components. Webkit, the framework underlying Safari, got a major security upgrade in iOS 7.1, with Apple fixing 19 separate memory corruption issues. Nearly half of those vulnerabilities were discovered by the Google Chrome security team, and many of the 19 bugs were identified last year.

Among the code-execution vulnerabilities patched in the new release are a pair of buffer overflows in ImageIO, a library that enables the reading and writing of multiple image formats. Apple also fixed a code-execution flaw in the kernel caused by an out of bounds memory access issue in the ARM ptmx_get_ioctl function. There also is a fix for a vulnerability in the way that Office Viewer handled certain Microsoft Word documents.

Continued : http://threatpost.com/apple-ios-7-1-fixes-more-than-20-code-execution-flaws/104705

Related: iOS 7.1 released, patching bugs and fixing the White Screen of Death

See Vulnerabilities / Fixes: Apple iOS Multiple Vulnerabilities

- Collapse -
NSA pretended to be Facebook in its effort to infect ..
Mar 12, 2014 8:14AM PDT
.. 'millions' of computers

Well, this is just special. As part of its efforts to install malware on "millions" of computers worldwide, the National Security Agency impersonated Facebook to trick targets into downloading malicious code.

"In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target's computer and exfiltrate files from a hard drive," reports The Intercept in its latest on top-secret documents obtained by Edward Snowden. "In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer's microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites."

Continued: http://www.digitaltrends.com/web/nsa-pretended-facebook-spread-malware/

Related: The NSA Uses Automated Tools to Plant Malware on Millions of Computers
- Collapse -
Attackers trick 162,000 WordPress sites into launching ..
Mar 12, 2014 8:14AM PDT
.. DDoS attack

"Technique allows lone attacker hidden in the shadows to wage crippling attacks."

Security researchers have uncovered a recent distributed denial-of-service (DDoS) attack that used at least 162,000 WordPress-powered websites to knock another site offline.

The technique made it possible for an attacker with modest resources to greatly amplify the bandwidth at its disposal. By sending spoofed Web requests in a way that made them appear to come from the target site, the attacker was able to trick the WordPress servers into bombarding the target with more traffic than it could handle. Besides causing such a large number of unsuspecting sites to attack another one, the attack is notable for targeting XML-RPC, a protocol the sites running WordPress and other Web applications use to provide services such as pingbacks, trackbacks, and remote access to some users.

Researchers from security firm Sucuri recently counted more than 162,000 legitimate WordPress sites hitting a single customer website. They suspect they would have seen more if they hadn't ended the attack by blocking the requests.

Continued : http://arstechnica.com/security/2014/03/more-than-162000-legit-wordpress-sites-abused-in-powerful-ddos-attack/

Related:
Over 162,000 WordPress sites exploited in DDoS attack
Over 160,000 WordPress Sites Used In DDoS Attacks
MUM's WordPress recipe blog USED AS ZOMBIE in DDoS attacks
- Collapse -
Adobe, Microsoft Push Security Updates
Mar 12, 2014 8:15AM PDT
Adobe and Microsoft today each released software updates to fix serious security flaws in their products. Adobe pushed an update that plugs a pair of holes in its Flash Player software. Microsoft issued five updates, including one that addresses a zero-day vulnerability in Internet Explorer that attackers have been exploiting of late.

Microsoft's five bulletins address 23 distinct security weaknesses in Microsoft Windows, Internet Explorer and Silverlight. The Internet Explorer patch is rated critical for virtually all supported versions of IE, and plugs at least 18 security holes, including a severe weakness in IE 9 and 10 that is already being exploited in targeted attacks.

Microsoft notes that the exploits targeting the IE bug seen so far appear to perform a check for the presence of Microsoft's Enhanced Mitigation Experience Toolkit (EMET); according to Microsoft, the exploits fail to proceed if EMET is detected. I've recommended EMET on several occasions, and would encourage any Windows users who haven't yet deployed this tool to spend a few minutes reading this post and consider taking advantage of it to further harden their systems. The latest version - 4.1 - is available at this link and requires Microsoft's .NET Framework 4 platform. For those of you who don't mind beta-testing software, Microsoft has released a preview version of the next generation of EMET - EMET 5.0 Technical Preview.

Continued : http://krebsonsecurity.com/2014/03/adobe-microsoft-push-security-updates/

Related:
Critical Internet Explorer zero-day vulnerability patched by Microsoft
Five Bulletins for March 2014 Patch Tuesday, Including One for Mac Users

Also see:
Microsoft Security Bulletin Summary for March 2014
Security Updates for Adobe Flash Player (APSB14-0Cool
- Collapse -
ATMs will still run Windows XP -- but a bigger shift in...
Mar 12, 2014 8:15AM PDT
.. security looms

"Banks caught in a major transition to embedded chip cards are sticking with XP and uninterested in upgrading to Windows 8"

The vast majority of bank ATMs around the world currently run on Windows XP. Come April 8, when Microsoft cuts off support for Windows XP, the vast majority of those bank ATMs will still be running XP. While there's some cause for concern, it's much too early to cut up your debit card. That said, Microsoft's hell-bent determination to kill off the operating system will encourage many banks to consider non-Windows solutions.
In January there was a rash of hand-wringing stories about the coming demise of Windows XP and how that would affect the many hundreds of thousands of ATMs -- somewhere between 80 percent and 95 percent of all ATMs, depending on what source you believe -- still running XP and being swapped out at a snail's pace. Lately I've seen more articles that raise red flags. For example, CNN Money says:

Continued: http://www.infoworld.com/t/microsoft-windows/atms-will-still-run-windows-xp-bigger-shift-in-security-looms-237981

Related: 95% of bank ATMs face end of security support
- Collapse -
It's already happening
Mar 12, 2014 8:20AM PDT

I have a friend that is working for a company that's been changing over the operating systems for several well known banks here in Chicago . They're installing Red Hat.

Digger

- Collapse -
New fear: Worm that ransacked US military PCs was ..
Mar 12, 2014 9:47AM PDT
.. blueprint for spies' super-malware

A mystery worm that burrowed into US military computers to steal secrets six years ago may have inspired the development of subsequent government-grade malware Red October, Turla, Flame and Gauss.

Researchers at Kaspersky Lab reached this conclusion after finding similarities between Agent.btz - the worm that attacked in 2008 - and Turla, a powerful computer espionage tool that was only discovered last month.

Agent.btz infected the network of the US Central Command in the Middle East. Military officials at the time described it as the "worst breach of US military computers in history." The worm spread after a USB drive containing the software nasty was plugged into a PC.

It took specialists at the Pentagon 14 months to completely disinfect Agent.btz from Uncle Sam's networks. The outbreak led to the creation of the US Cyber Command. The worm, thought to have been created around 2007, had the ability to scan computers for sensitive information and send that top-secret data to a remote command-and-control server.

Continued: http://www.theregister.co.uk/2014/03/12/cyber_espionage_daddy/

Related:
Agent.btz Malware May Have Served as Starting Point for Red October, Turla
Turla, Red October and Flame cyberweapons preyed on earlier Agent.btz worm
Kaspersky Lab Details Connections Between 'Snake' and Agent.BTZ Malware
- Collapse -
BB10's 'dated' crypto lets snoops squeeze the juice from ..
Mar 12, 2014 9:47AM PDT
.. your BlackBerry - researcher

"BEAST will attack your sensitive web traffic, warns poster"

BlackBerry BB10 OS uses dated protocols that leave users at risk to known cryptographic attacks, according to a security researcher.

The latest version of the smartphone maker's operating system, BlackBerry 10, uses TLS 1.0, while competitors use TLS 1.2. According to the researcher, this leaves BlackBerry fans using BB10 at risk of being attacked by BEAST, a cryptographic attack developed in 2011 that's capable of decrypting sensitive web traffic protected by the ubiquitous secure sockets layer protocol.

Supported protocols for devices running BB10 include "cipher suites containing dangerous, treacherous or weak algorithms" such as RC4, ECDSA (NIST curves, owned by BlackBerry) and SHA1, according to the prolific forum member at CrackBerry. By contrast, more robust ciphers such as AES GCM and SHA2 are not supported, according to a post on the CrackBerry Forum. The poster argues that this leaves both business and consumer users of BlackBerry more open to government snooping.

Continued: http://www.theregister.co.uk/2014/03/12/bb10_dated_crypto/
- Collapse -
Criminals rush to exploit IE 0-day before the announced fix
Mar 12, 2014 9:48AM PDT

Last week Microsoft has announced that today's Patch Tuesday will include a fix for the critical IE zero-day vulnerability that was found exploited in watering hole attacks earlier this year - and none too soon, as a number of bad actors have been using the same exploit code in other similar attack since then.

Initially, the exploit was used to compromise the visitors of a fake French aerospace association GIFAS site and the legitimate but compromised website of the US Veterans of Foreign Wars. Seculert researchers believe that the two attacks weren't executed by the same group, but that the two groups bought the attack code from the same black market seller.

But in the last month or so, Websense has detected three more websites compromised to either redirect to the exploit or to serve it, as the exploit code has obviously ended up in the public domain.

Continued : http://www.net-security.org/secworld.php?id=16503

Related: Hackers Milk IE Zero Day Before Patch

* * * * * * * * * * * * * *

Critical Internet Explorer zero-day vulnerability patched by Microsoft

Graham Cluley @ ESET's' "We Live Security" Blog:

For this month's Patch Tuesday, Microsoft has released five bulletins, tackling a total of 23 different security holes in Microsoft Windows, Internet Explorer and Silverlight.

The most important security update is undoubtedly the one for Internet Explorer, applicable for virtually all versions of the browser, which includes a fix for a zero-day vulnerability (CVE-2014-0322) that has already been exploited by hackers in targeted attacks against some organisations.

Last month, Microsoft released a temporary fix it tool for the problem, so a proper patch has been keenly anticipated.

Details of how to take advantage of the security weakness have already been publicised on the net, increasing the chances of further attacks if computer owners do not take action.

So, what's the danger if you leave your computer unpatched?

Continued : http://www.welivesecurity.com/2014/03/12/critical-internet-explorer-zero-day/

- Collapse -
NoMoreRack.com Probes Possible Card Breach
Mar 12, 2014 9:48AM PDT

For the second time since Aug. 2013, online retailer NoMoreRack.com has hired a computer forensics team after being notified by Discover about a potential breach of customer card data, KrebsOnSecurity has learned.
Over the past several weeks, a number of banks have shared information with this reporter indicating that they are seeing fraud on cards that were all recently used by nomorerack.com customers. Turns out, nomorerack.com has heard this as well, and for the second time in the last seven months has called in outside investigators to check for signs of a digital break-in.

Vishal Agarwal, director of business development for the New York City-based online retailer, said the company was first approached by Discover Card back in August 2013, when the card association said it had isolated nomorerack.com as a likely point-of-compromise.

"They requested then that we go through a forensics audit, and we did that late October by engaging with Trustwave," Agarwal said. "Trustwave came out with a report at end of October saying there was no clear cut evidence that our systems had been compromised. There were a few minor bugs reported, but not conclusive evidence of anything that caused a leakage in our systems."

Continued: http://krebsonsecurity.com/2014/03/nomorerack-com-probes-possible-card-breach/

- Collapse -
Hackers steal 12 million customer records from South Korean
Mar 12, 2014 9:48AM PDT
.. phone giant

The South Korean government announced on Thursday that it was launching an investigation after yet another enormous breach drained data from citizens - this time, from 12 million customers of the South Korean telecom company KT Corp.

Yonhap, a South Korean news agency, reports that three men were arrested last week over the hack, which compromised data for three-quarters of the company's customers.

According to The Register, at least one of the arrested men is suspected of being a hacker who siphoned the customer data out of KT's servers.

Continued : http://nakedsecurity.sophos.com/2014/03/10/hackers-steal-12-million-customer-records-from-south-korean-phone-giant/

Related: Twelve million hit as Korea suffers ANOTHER massive data breach
- Collapse -
Malicious Messages Foray Facebook
Mar 12, 2014 9:49AM PDT

"Malwarebytes Unpacked" Blog:

In yet another method for cyber criminals to utilize the world's most popular social networks for their own nefarious purposes, it appears a trojan is circulating through Facebook, stealing accounts and (probably) taking creds.

Thanks to the vigilant mind of Malwarebytes User, Showbizz, we were able to take a look at this new threat and what it could mean for the rest of the net.

Here is how it works:

1, User gets a Facebook instant message from a friend of their's, which includes the words 'lol' and a file waiting to be downloaded.
2. The user downloads the file because they can assume it can be trusted. The filename matches the usual filename of a photo: 'IMG_xxxx'.zip.

Continued : http://blog.malwarebytes.org/security-threat/2014/03/malicious-messages-foray-facebook/

- Collapse -
Critical crypto flaw in Facebook's WhatsApp for Android
Mar 12, 2014 10:02AM PDT
.. exposes chats

"Message history is wide open to theft and decryption by rogue apps, consultant says. - [Screenshot]

The Android version of WhatsApp, the cross-platform instant messaging app purchased by Facebook for $16 billion, has a loophole that leaves chat histories wide open to other apps installed on the same smartphone, a security consultant says.

Consultant, system administrator, and entrepreneur Bas Bosschert documented the vulnerability in a blog post published Tuesday. It includes proof-of-concept code a rogue app requires to stealthily upload the chat history to an attacker-controlled server and, when working with newer versions of WhatsApp, to decrypt the file. The exploit is premised on the victim installing a malicious app that contains a game or some other useful feature and in the background accessing the database WhatsApp stores on the secure digital (SD) card of an Android device.

Continued : http://arstechnica.com/security/2014/03/critical-crypto-flaw-in-facebooks-whatsapp-for-android-exposes-chats/

Related:
WhatsApp user chats on Android liable to theft due to file system flaw
Hackers Can Steal Private WhatsApp Chats with Other Android Apps
- Collapse -
Malware found in Google Play Store
Mar 12, 2014 11:25AM PDT

"Malwarebytes Unpacked" Blog:

Most experts agree the best way to stay safe from Android malware is to stick to trusted sources-specifically the Play Store.

Unfortunately, those sources can sometimes be compromised. In the last week there have been two malware families found in Google's Play Store.

Dendroid

The first one, found by Lookout Security, is a remote administration tool called Dendroid. This particular malware is a variant of the publicly available remote tool AndroRAT.

Dendroid was advertised as "Parental Control" in the Play Store, which is a surprising name as they aren't really hiding the RAT functionality. There were minimal installs, less than 50, and is the only app-to date discovered in the Play Store with the Dendroid functionality. [Screenshot]

This Play Store version of Dendroid was discovered only a couple of days after Dendroid was uncovered from the underworld by Symantec, which means Google was unaware of the malicious code at the time of it being uploaded to the Play Store.

Continued : http://blog.malwarebytes.org/mobile-2/2014/03/malware-found-in-google-play-store/