A Phishing Season is Open

image

It seems, that the guys at the Anti-Phishing Working Group (APWG) were busy little bees. They gave us some cold shower data for the first quarter of this year. The phishing activities have apparently reached the 10% increase in this period. Have not we thought something out of it?

The business is going well for the phishing industry. What do you know they have even decided to spread their activities. For some time, we thought that the phishing targets will only be major financial and bank related websites. Unfortunately, nowadays you can easily get caught on some grocery chain’s website.

There is one more intriguing fact in this story. More than one half of all phishing websites in the world are located in the USA. On the other hand, the absolute majority of all victims comes from the USA, as well. Do not get the wrong idea that the phishing is mainly the US domestic problem.

New problems definitely ask for new genuine solutions. We should do something about it, but what exactly? That is not quite sure for the moment. Here is a challenge worth accepting for the IT security industry. We need a hero, who will bring down the phishing threat to zero.

The “CosmicDuke” Hits Like A Nuke

image

What do you know even the viruses have to be updated every now and then. It seems that the “white software” rules apply more or less in the same way for the “black software”. So, what happened? Well, the former MiniDuke has evolved into a CosmicDuke. And, that is only the beginning of this story.

According to the findings of Kaspersky Lab experts, we can expect improved features of this espionage Trojan. In addition, for these particular purposes hackers were willing to cooperate and even share the source codes among themselves. Apparently the CosmicDuke has borrowed, some things from an older malware guy called Cosmu.

This malware has a remarkable one.decade long history. It definitely has some useful materials to contribute in CosmicDuke’s unlawful quest. The funny thing about this one, though, is that the priorities have changed. While MiniDuke was targeted specifically the governments, its younger version CosmicDuke has different objectivess.

As a matter of fact, the CosmicDuke has a specific target group, which includes people involved in the distribution of hormones and steroids. Therefore, there are some rumors that a pharmaceutical industry is responsible for the very birth of the CosmicDuke. How about that for a change?

High-level Talks. High-level Hacking.

image

Well, when it comes to this one we are not surprised at all. For the next high-level talks between the USA and China the issues associated with the IT security will not be treated as the secondary ones. It seems that the time has finally come to treat IT security with some decent respect it truly deserves.

So, what seems to be the problem here? Maybe it is better to ask, are there any areas which are not under the heavy burden of extremely compromised IT security? Hacking, Internet censorship, corporate data theft, cyber espionage, and you name it, they certainlyy have on their list.

So, what can we expect? Well, if you think that the Chinese are going to apologize and correct all consequences of their previous wrongful doings, then you are at least saying naive. China is the only country in the entire world, which has the capacity to run an entirely independent Internet of their own.

Let us be realistic about this one for a change, shall we? To recognize these problems and give them a top priority shoulder to shoulder with other sensitive political, economy, and military related problems is undoubtedly an impressive achievement. Let us hope they can do a little bit more than just talking and smiling for the cameras.

Hackers Hollywood

image

How real and accurate are the Hollywood movies about hackers and hacking? What is your favorite one? Here are some interesting choices and recommendations mentioned by Dark Reading, which specializes for the security issues and news. It is not only enough to mention hacking, the whole movie has to be about it.

Disney’s Tron and Tron Legacy were definitely all about it. Although, we have to add, this was rather a simplified and romantic story about cyber pirates of the modern age. There is one move worth of our attention in this matter. Swordfish with John Travolta. Nevertheless, this movie was not about him at all from the IT perspective.

With all due respect to IT experts all over the world Hugh Jackman was too good looking for a hacker. You simply do not have computer gigs, who look like models. For what is worth, the timeless classic WarGames is still the number one representative for Hackers Hollywood. Its story is far from outdated, as well.

Last but not least, there are so many documentaries, which do not fit strictly into this category, but provide a nice inside view into the world of hackers. For the time being, Hollywood has some troubles of its own. They are still making a movie about online piracy, if you know what we mean.

The Heartbleed Still Bleeds

2177_imela_7

Just when you thought that we are done with the Heartbleed threat, there is some bad news to spoil the mood. As you remember, this was the most serious OpenSSL vulnerability, we have ever seen. The funny thing about it, though, is that we had 600,000 servers potentially jeopardized at the beginning of this unusual crisis. What is the situation right now?

Well, for what is worth, two months after the bug was discovered, we still have more than 300,000 servers left with no appropriate protection. Two months we had to deal with this trouble. And what have we done? We only cut it in half. This is a fantastic example, how we treat our security seriously. We are being ironic on this one. We hope that is obvious.

The trouble with the curve in this matter is that the knowledge about the potential security threat is not enough to eliminate it quickly and efficiently. How much more time do we need to eliminate the Heartbleed completely? Two more months, or maybe two more years? Yes, our dear friends, this is the reality we are living in.

The Heartbleed still bleeds, and there is nothing we can do about it. Can we? It seems that the pressure was not strong enough to make IT security experts do something seriously and quickly about it. Or, maybe we are exaggerating. Maybe, it is too much to ask while demanding to clean 600,000 servers in 6 weeks. Either way, we lose, for sure.

KitKat Security Smart

2177_imela_5

According to the most recent findings of IBM security experts, it seems that KitKat and other newer Android versions have a serious security flaw. The main focus of their report was the KeyStore segment of the Android OS. The things could not get worse in this matter for Android, could they? How are we to interpret these findings?

Well, this is definitely a bad news for all Android users. KeyStore is the most important and sensitive component for the proper security functioning of any system. It would be very interesting to see how Google will react about this one. We are also not sure whether or not the IBM can claim the bug bounty, in the first place?

For what is worth, being the number one platform for mobile devices in the world, certainly draws a lot of attention both positive and negative one. Living under the spotlights is definitely not an easy thing. However, Google has probably gotten used to it by now. What about the signature of these findings?

Well, we sure hope that Microsoft or Apple signatures are completely eliminated in these cases. Who is who’s best friend in this story is a question worth million dollars. It comes without saying that Android has been extremely successful. We sure hope that they will be dedicated enough to security issues solving, as well.

Korben’s Report

2177_imela_6

It seems that one French blogger was a busy little bee. He had apparently discovered one, at least to say quite a bizarre security flaw associated with the MediaTek chips. So, let us see what has our friend Korben discovered and why it is so important from the security point of view? Should we hate or adore him for what he had done?

Here is the funny part of this intriguing story. Korben has figured it out, that when you send “=” through an SMS to some smartphones, which uses MediaTek chips, the following happens. Your smartphone restarts automatically after receiving this message. Really disturbing, isn’t it? What can we do about it?

Well, you have two options. Either you will acquire a new smartphone without these chips, or hope that your friends will not kill your phone with these “=” SMS. How can this happen and be possible in the first place, is yet unknown. What we need to know to eliminate this trouble, is also unknown.

We do not have to guess twice what is happening in your head as you read this post, do we? You are probably wondering, what can happen if you try some other symbols for these MediaTek related SMS? How thin is a borderline between restarting and hacking a smartphone? Well, we hope youwillnot be the one to find out.

The Blind Man Who Taught Himself How To Hack

2177_imela_4

Although, you may find this story hard to believe, we are actually referring to a true event, which took place in Zambia. Believe it or nor, a blind hacker is facing a two years imprisonment for his crimes. Yes, you got that one right. He is a blind person. He lives in one of the last countries you could possibly expect for a hacking to occur.

And yes, he was able to successfully hack one of the leading Zambian telecommunication companies. In addition, this extraordinary hacker was able to ensure access to mobile phones used by the Zambian minister of defense and minister of foreign affairs. So, what was the damage caused by his hacking activities?

Well, no more than $4,000 for the period of four years. Pay attention, only for the phone bills on the “borrowed” phones. For what is worth, we do not favor or support crime in any form or situation. However, this remarkable individual, who was able to overcome his disability, definitely deserves a better fate than a jail time.

At least what Zambian government can do in his case, is to offer him a well-paid full-time job in either some telecommunication department or in the police. He has proven his talents already, hasn’t he? A man like him you definitely need to have as your most trusted ally. Never as your worst enemy. Right?

E-mail Untold

2177_imela_3

There are so many things your e-mail can tell about you, which are beyond your control or influence. The very first thing is your location. Your e-mail comes with your IP address. Almost anyone can learn more about your location with the use of the following link: http://www.yougetsignal.com/tools/visual-tracert/. And, that is not all.

People, who have received your email, can easily run it through various social networks. This is a simple way to determine for which apps your e-mail has been used for registration purposes. All they have to do is to identify your Facebook profile with the help of your e-mail. What possibly more they could have asked for?

Here is one extremely useful site, which can be used to list all networks and websites your e-mail has gone through for the registration purposes: knowem.com. Here is an appropriate word of advice in this matter. Create two e-mails. One for communication and the other for registration purposes. Even a couple of them, if necessary.

Some people have even found a way to make money out of these situations. On http://www.spokeo.com for a few bucks per month you can get a detailed report about an e-mail of your greatest interest. What is the moral of this educational story? The worst enemy, when it comes to your IT security, are you yourself. Think about it.

Look There’s Luuuk!

2177_imela_2

The guys from the Kaspersky Lab were busy little bees, as usual. This time they have discovered a fraud scheme, which seriously crippled one of the major European banks. We are talking about an impressive amount of more than $500,000, which went into the wrong, but extremely skillful hands of hackers. Are you eager to find out more about this unlawful profitable scheme?

Well, first things first. Let us start with the C&C server and Zeus malware software. Although, it is not quite sure which form of the Zeus malware was used for this particular purpose (Citadel, Spy Eye, IceIX, etc.), the fake banking experts obviously knew which one to choose in order to achieve their financial goals. They also knew how to successfully cover all of their tracks.

Here is the most interesting part of this extremely indicative crime story. The money itself was not transferred to hackers’ bank accounts. Actually, they were able to use temporary accounts and pick up the money by using the ATMs. In addition, they even used various teams to withdraw different amounts of money. Really impressive indeed.

So what is the moral of this story? Well, this does not necessarily mean that you have to run for help and assistance from the Kaspersky Lab Team. You simply have to be aware of the following fact. The bigger you become, it does not mean you will become invulnerable by default. This is a signal for all kinds of thieves out there to keep their eyes on you and your clients. Think about it!