Hacker shows he can locate, unlock and remote start GM vehicles

carhacker1

Wow another automobile attack! This time the hacker can abuse anybody using the OnStar RemoteLink mobile app. In summary, don’t use the OnStar RemoteLink app until a patch is available or you may find one day that somebody has been joy riding in your car.

Samy Kamkar posted about this vulnerability on Computerworld including a video demonstrating his tool built to abuse this vulnerability in the app. The original post and video can be found HERE. He will be talking more about this next week at the Blackhat/DEFCON conferences.  Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Cisco 2015 Midyear Security Report is now Available

Cisco Security Report

Cisco Systems just released the 2015 Midyear Security Report found HERE. This report provides an overview of major threats observed in the first half of 2015. There are also parts that look at future trends and offers for small, midsize and enterprise organizations. Topics on the latest threats include exploit kits, Microsoft office exploits, malware research, java exploits and so on. Its free to download. Check it out.

Here are some highlights from the report.  Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Hackers threaten to leak Ashley Madisons 37 million clients

ashleymadison-580x370

Krebsonsecurity.com posted about how AshleyMadison, a site dedicated to affairs, is being threatened by hackers to shut down or they will leak a bunch of nude photos and sexual fantasies of the site’s clients. The original post can be found HERE. This could get ugly … no pun intended.

Large caches of data stolen from online cheating site AshleyMadison.com have been posted online by an individual or group that claims to have completely compromised the company’s user databases, financial records and other proprietary information. The still-unfolding leak could be quite damaging to some 37 million users of the hookup service, whose slogan is “Life is short. Have an affair.” Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Zero Days Documentary – Security Leaks For Sale Video

VPRO International created a interesting documentary on Zero Day exploits. There is a lot of Blackhat / Defcon footage for those waiting for this years conference T minus two weeks from now. The video can be found below. It is work the watch. Enjoy Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

Ding! Your RAT has been delivered

padlock-security-

Cisco Talos wrote a awesome post following a attack campaign that leveraged malware using RAT capabilities. They cover research on how the malware is delivered using phishing via SPAM, what happens when the malware is executed and what they found as they monitored the malware installed in their lab / sandbox systems. I have wrote about another remote access tool (RAT) in the past here here and love how Talos included details on the tool DarkKomet used for this particular campaign. The original post can be found  HERE. Its a little longer than the usual posts on here but worth the read.

Talos is constantly observing malicious spam campaigns delivering various different types of payloads. Common payloads include things like Dridex, Upatre, and various versions of Ransomware. One less common payload that Talos analyzes periodically are Remote Access Trojans or RATs. A recently observed spam campaign was using freeware remote access trojan DarkKomet (a.k.a DarkComet). This isn’t a novel approach since threat actors have been leveraging tools like DarkKomet or Hawkeye keylogger for quite sometime. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

OPM Director Katherine Archuleta Resigns After Massive Personnel Data Hack

OfficeHack2

Well it has been a tough time for Katherine Archuleta. With the recent cyber breach and other pressures, she has decided to step down. The Wall Street Journal wrote a great post on this HERE. You can learn more about the breach on datalossdb.org. Below is taken from the Wall Street Journal post.

WASHINGTON— Katherine Archuleta, the embattled director of the Office of Personnel Management, resigned Friday after her office this week disclosed new details on the hacking of millions of federal employee records, telling President Barack Obama it was best for her to step aside and allow the office to move forward with new leadership. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Analyze Malware With Cuckoo Sandbox

cuckooPeople have asked me to recommend a tool that can be used to analyze files for viruses that does more than standard anti-virus. Usually the need is to prove something being flagged by a security product is actually malicious verses a false positive alert. There are enterprise level sandbox solutions such as Cisco’s ThreatGRID sandbox that offer this (more on this found HERE) however one very popular open source free option is Cuckoo. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Talos on Phishing: Hook, Line and Sinker: Catching Unsuspecting Users Off Guard

phishing-attack

Cisco’s research team Talos wrote a interesting article on their research on Phishing. The original post can be found HERE. For those that don’t know what Phishing is, its the cyber attack where a malicious party pretends to be a legitimate source with the goal to trick a victim into clicking a email, accessing a website, or just giving up sensitive data. Here is the Talos article.  Continue reading

VN:F [1.9.22_1171]
Rating: 3.0/5 (1 vote cast)