Spicing up phishing attacks
An posting form Nakcd Secutiy on phishing Attacks: Phishing is often regarded as old hat. From a technical perspective, it’s a case of ‘been there, done that’.
Sometimes however, we come across attacks that are just a little bit more interesting (or at least different) from the norm. In this post I am going to take a quick look at one of the techniques used in some phishing attacks we have seen in recent months.
To read more click here:
Critical Flaw Threatens Millions of BIND Servers
An posting in Threat post on a flaws that my blind severs: There is a critical vulnerability in several current versions of the BIND nameserver software that could allow an attacker to knock vulnerable DNS servers offline or compromise other applications running on those machines. The bug is present in several versions of the ubiquitous BIND software and the maintainers of the application have released a patch for it that they recommend users install as soon as possible.
The vulnerability is in BIND 9.7, 9.8, and 9.9 for Unix systems, but Windows versions are not affected. The problem lies in the way that the software handles certain regular expressions, and an attacker who exploits the vulnerability could not only cause a denial-of-service condition on the server but also could potentially compromise other software on the machine.
To read more click here:
DDOS attack brings the Internet to its knees
An article from Ehacking about DDOS: The reason behind the attack is that Spamhaus added the IP addresses of cyberbunker to its “spam” list due to Cyberbunker allowing almost any sort of content to be hosted hence also maybe the source for spam. So Cyberbunker attacked back and this attack also affected normal internet users.
The attack was possible because of the large number of vulnerable DNS servers that allow open DNS resolving.Simply put an attack exploiting this type of vulnerability makes use of the vulnerability of the DNS server to increase the intensity of the attack 100 fold.
To read more click here:
VSkimmer trojan steals card data on point-of-sale systems
An posting from SC Magazine on VSkimmer Trojan:
Researchers have discovered a new trojan capable of stealing credit card data from point-of-sale (POS) systems, and it appears to be an updated version of Dexter, similar malware targeting card-swiping devices.
On Thursday, Chintan Shah, a security researcher for McAfee Labs, blogged about VSkimmer, which is capable of grabbing data – account numbers, expiration dates and service code numbers – stored on the magnetic strip of credit cards.
To read more click here:
Spear Phishing Cause of South Korean Cyber Attack
An article from Threat Post on Spear Phishing:
It appears that a spear phishing campaign was the genesis for the wiper malware infections that ultimately knocked several prominent South Korean banks and broadcasters offline last week, according to a malware analysis performed by researchers from the Finnish cybersecurity firm F-Secure.
The South Korean NSHC Red Alert Team mentioned a number of malicious hashes in its official report [pdf] analyzing the incident, suggesting that these attacks were part of a larger campaign consisting of multiple operations.
to read more click here:
Korean Mystery Malware Wiped Unix, Windows Machines
An article from Tech New Daily about a malwere wiped unix windows machines: The malware that hit South Korean banks and broadcasters yesterday (March 20) was a wrecking machine, deleting core files on both Windows and Unix-based machines and rendering them inoperable, researchers have found.
Analysis by security
firms AlienVault, McAfee, Sophos, Symantec and Trend Micro showed that the Trojan, which Sophos dubbed “DarkSeoul” and Symantec called “Jokra,” overwrites the Master Boot Record (MBR) that loads Windows upon startup, and then reboots the machines into oblivion.
To read more click here:
