New Plundervolt attack impacts Intel CPUs SGX

Academics from three universities across Europe have disclosed today a new attack that impacts the integrity of data stored inside Intel SGX, a highly-secured area of Intel CPUs. The attack, which researchers have named Plundervolt, exploits the interface through which an operating system can control an Intel processor’s voltage and frequency — the same interface Read more about New Plundervolt attack impacts Intel CPUs SGX[…]

Budget Energy and NLE leak 29000 customer records – names, adresses, possibly phone numbers and bank accounts

De persoonsgegevens van mogelijk 29.000 klanten van energiebedrijven Budget Energie en NLE liggen op straat. Naast namen en adressen is er kans dat er ook telefoonnummers en bankrekeningnummers zijn gelekt. De data is niet per ongeluk gelekt, het gaat volgens het bedrijf om een moedwillige diefstal. Moederbedrijf Nuts Groep heeft klanten van Budget Energie en NLE Read more about Budget Energy and NLE leak 29000 customer records – names, adresses, possibly phone numbers and bank accounts[…]

Vulnerability in fully patched Android phones under active attack by bank thieves – watch out for permissions being asked from apps you have installed

A vulnerability in millions of fully patched Android phones is being actively exploited by malware that’s designed to drain the bank accounts of infected users, researchers said on Monday. The vulnerability allows malicious apps to masquerade as legitimate apps that targets have already installed and come to trust, researchers from security firm Promon reported in Read more about Vulnerability in fully patched Android phones under active attack by bank thieves – watch out for permissions being asked from apps you have installed[…]

TrueDialog leaks tens of millions of US SMS messages and user data

Led by Noam Rotem and Ran Locar, vpnMentor’s research team discovered a breached database belonging to the American communications company, TrueDialog. TrueDialog provides SMS texting solutions to companies in the USA and the database in question was linked to many aspects of their business. This was a huge discovery, with a massive amount of private Read more about TrueDialog leaks tens of millions of US SMS messages and user data[…]

SMS Replacement is Exposing Users to Text, Call Interception Thanks to Sloppy Telecos

A standard used by phone carriers around the world can leave users open to all sorts of attacks, like text message and call interception, spoofed phone numbers, and leaking their coarse location, new research reveals. The Rich Communication Services (RCS) standard is essentially the replacement for SMS. The news shows how even as carriers move Read more about SMS Replacement is Exposing Users to Text, Call Interception Thanks to Sloppy Telecos[…]

NextCry Ransomware Targets NextCloud Linux Servers and Remains Undetected Features

The ransom note that NextCry victims receive reads ““READ_FOR_DECRYPT”, and demands 0.025 BTC for a victim’s files to be unlocked. One NextCloud user, xact64, shared his experience with the malware on a Bleeping Computer forum in an effort to find a way to decrypt personal files which had been instantaneously locked in a NextCry attack: Read more about NextCry Ransomware Targets NextCloud Linux Servers and Remains Undetected Features[…]

1.2 Billion Records Found Exposed Online in a Single Server, contain social media profiles

In October, dark web researcher Vinny Troia found one such trove sitting exposed and easily accessible on an unsecured server, comprising 4 terabytes of personal information—about 1.2 billion records in all. While the collection is impressive for its sheer volume, the data doesn’t include sensitive information like passwords, credit card numbers, or Social Security numbers. Read more about 1.2 Billion Records Found Exposed Online in a Single Server, contain social media profiles[…]

Monero Wallet downloads compromised for 35 minutes

Some users noticed the hash of the binaries they downloaded did not match the expected one: https://github.com/monero-project/monero/issues/6151 It appears the box has been indeed compromised and different CLI binaries served for 35 minutes. Downloads are now served from a safe fallback source. Always check the integrity of the binaries you download! If you downloaded binaries Read more about Monero Wallet downloads compromised for 35 minutes[…]

Android Users: Check Now to See If a Rogue App Can Control Your Phone’s Camera

According to an investigation by Checkmarx security researchers, some Android devices may have an unpatched security flaw that an app could use to record you without your knowledge using your device’s camera and mic. No attacks that exploit the bug have been reported so far, thankfully. Still, the Checkmarx researchers were able to successfully create Read more about Android Users: Check Now to See If a Rogue App Can Control Your Phone’s Camera[…]

Shopped online at Macy’s last month? Might want to toss, or at least check, that card

A notice (PDF) posted by the long-operating department store chain said that, between October 7 and October 15 of this year, a Magecart script was running on the checkout page of its retail website. The script was able to capture payment card details in two different ways: as it was being entered through the checkout Read more about Shopped online at Macy’s last month? Might want to toss, or at least check, that card[…]

Half of Oracle E-Business customers open to months-old bank fraud flaw

Security company Onapsis estimates that roughly half of all companies using the Oracle EBS software have not yet patched CVE-2019-2648 and CVE-2019-2633, despite Big Red having pushed out fixes for both bugs back in April. The two vulnerabilities are found in the Thin Client Framework API and are described as reflected SQL injections. An attacker Read more about Half of Oracle E-Business customers open to months-old bank fraud flaw[…]

Lessons from the cyberattack on India’s largest nuclear power plant – Bulletin of the Atomic Scientists

Indian officials acknowledged on October 30th that a cyberattack occurred at the country’s Kudankulam nuclear power plant. An Indian private cybersecurity researcher had tweeted about the breach three days earlier, prompting Indian authorities to initially deny that it had occurred before admitting that the intrusion had been discovered in early September and that efforts were Read more about Lessons from the cyberattack on India’s largest nuclear power plant – Bulletin of the Atomic Scientists[…]

Intels’ Trusted Platform Module can’t be trusted. TPM-FAIL

Trusted Platform Module (TPM) serves as a root of trust for the operating system. TPM is supposed to protect our security keys from malicious adversaries like malware and rootkits. Most laptop and desktop computers nowadays come with a dedicated TPM chip, or they use the Intel firmware-based TPM (fTPM) which runs on a separate microprocessor Read more about Intels’ Trusted Platform Module can’t be trusted. TPM-FAIL[…]

Your Apple Mac Makes Plain-Text Copies of Your Encrypted Emails. Here’s how to stop it.

IT guru Bob Gendler took to Medium last week to share a startling discovery about Apple Mail. If you have the application configured to send and receive encrypted email—messages that should be unreadable for anyone without the right decryption keys—Apple’s digital assistant goes ahead and stores your emails in plain text on your Mac’s drive. Read more about Your Apple Mac Makes Plain-Text Copies of Your Encrypted Emails. Here’s how to stop it.[…]

Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?

Ubiquiti Networks is fending off customer complaints after emitting a firmware update that caused its UniFi wireless routers to quietly phone HQ with telemetry. It all kicked off when the US-based manufacturer confirmed that a software update released this month programmed the devices to establish secure connections back to Ubiquiti servers and report information on Read more about Sure, we made your Wi-Fi routers phone home with telemetry, says Ubiquiti. What of it?[…]

Amazon Ring doorbells exposed home Wi-Fi passwords over cleartext

Security researchers have discovered a vulnerability in Ring doorbells that exposed the passwords for the Wi-Fi networks to which they were connected. Bitdefender said the Amazon-owned doorbell was sending owners’ Wi-Fi passwords in cleartext as the doorbell joins the local network, allowing nearby hackers to intercept the Wi-Fi password and gain access to the network Read more about Amazon Ring doorbells exposed home Wi-Fi passwords over cleartext[…]

A network of ‘camgirl’ sites exposed millions of users and sex workers data

A number of popular “camgirl” sites have exposed millions of sex workers and users after the company running the sites left the back-end database unprotected. The sites, run by Barcelona-based VTS Media, include amateur.tv, webcampornoxxx.net, and placercams.com. Most of the sites’ users are based in Spain and Europe, but we found evidence of users across Read more about A network of ‘camgirl’ sites exposed millions of users and sex workers data[…]

Use a laser to command voice assistants such as lexa, google assistant, siri

Light Commands is a vulnerability of MEMS microphones that allows attackers to remotely inject inaudible and invisible commands into voice assistants, such as Google assistant, Amazon Alexa, Facebook Portal, and Apple Siri using light. In our paper we demonstrate this effect, successfully using light to inject malicious commands into several voice controlled devices such as Read more about Use a laser to command voice assistants such as lexa, google assistant, siri[…]

Android bug lets hackers plant malware via NFC beaming

Google patched last month an Android bug that can let hackers spread malware to a nearby phone via a little-known Android OS feature called NFC beaming. NFC beaming works via an internal Android OS service known as Android Beam. This service allows an Android device to send data such as images, files, videos, or even Read more about Android bug lets hackers plant malware via NFC beaming[…]

Facebook, Mozilla, and Cloudflare announce new TLS Delegated Credentials standard

The new standard will work as an extension to TLS, a cryptographic protocol that underpins the more widely-known HTTPS protocol, used for loading websites inside browsers via an encrypted connection. The TLS Delegate Credentials extension was specifically developed for large website setups, such as Facebook, or for website using content delivery networks (CDNs), such as Read more about Facebook, Mozilla, and Cloudflare announce new TLS Delegated Credentials standard[…]

NordVPN users’ passwords exposed in mass credential-stuffing attacks

As many as 2,000 users of NordVPN, the virtual private network service that recently disclosed a server hack that leaked crypto keys, have fallen victim to credential-stuffing attacks that allow unauthorized access to their accounts. In recent weeks, credentials for NordVPN users have circulated on Pastebin and other online forums. They contain the email addresses, Read more about NordVPN users’ passwords exposed in mass credential-stuffing attacks[…]

xHelper Android Malware Can Survive a Factory Reset

Though this somewhat-new “xHelper” malware has affected a low number of Android users so far (around 45,000, estimates Symantec), the fact that nobody has any clear advice on how to remove it is a worrisome fact. While the odds are good that you won’t get hit with this malware, given its low installation rate so Read more about xHelper Android Malware Can Survive a Factory Reset[…]

NHS Pagers Are Leaking Sensitive Medical Data – wait, pagers still exist?

Pagers used within the United Kingdom’s National Health Service are leaking sensitive patient information, and an amateur radio enthusiast has been broadcasting some of that medical data on a webcam livestream, a security researcher has found. TechCrunch reports that Florida-based security researcher Daley Borda stumbled upon the strange confluence of archaic tech that flowed together Read more about NHS Pagers Are Leaking Sensitive Medical Data – wait, pagers still exist?[…]

Government officials around the globe targeted for hacking through WhatsApp – FB fingers Israeli NSO group

WASHINGTON (Reuters) – Senior government officials in multiple U.S.-allied countries were targeted earlier this year with hacking software that used Facebook Inc’s (FB.O) WhatsApp to take over users’ phones, according to people familiar with the messaging company’s investigation. Sources familiar with WhatsApp’s internal investigation into the breach said a “significant” portion of the known victims Read more about Government officials around the globe targeted for hacking through WhatsApp – FB fingers Israeli NSO group[…]

Open database leaked 179GB in customer, US government, and military records

An open database exposing records containing the sensitive data of hotel customers as well as US military personnel and officials has been disclosed by researchers. On Monday, vpnMentor’s cybersecurity team, led by Noam Rotem and Ran Locar, said the database belonged to Autoclerk, a service owned by Best Western Hotels and Resorts group. Autoclerk is Read more about Open database leaked 179GB in customer, US government, and military records[…]