Data Security News Headlines 26th July 2017

  1. Experts Unveil Cyber Espionage Attacks by CopyKittens Hackers

The Security researchers have discovered a new, massive cyber espionage campaign that mainly targets people working in government, defense and academic organizations in various countries. According to the researchers CopyKittens (aka Rocket Kittens), the cyber espionage group has been active since at least 2013 and has targeted organizations and individuals, including diplomats and researchers, in Israel, Saudi Arabia, Turkey, the United States, Jordan, and Germany. The group targeting users by using watering hole attacks, wherein JavaScript code is inserted into compromised websites to distribute malicious exploits. Besides water hole attacks, CopyKittens also used other methods to deliver malware, including: Emailed links to malicious websites controlled by attackers, Weaponized Office documents exploiting recently discovered flaw (CVE-2017-0199), Web servers exploitation using vulnerability scanner and SQLi tools like Havij, sqlmap, and Acunetix, Fake social media entities to build trust with targets and potentially spread malicious links.

Cyber Security Tips:  Users are strongly recommended to enable two-factor authentication in order to protect their webmail accounts from being compromise, avoid opening any spam mails, avoid clicking on malicious links, keep yourself safe while browsing, and keep your systems up to date.

  1. Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers

MAC is one the most secure operating system, but according to the latest report, MAC users are at risk. According to Patrick Wardle, an ex-NSA hacker and now chief security researcher at security firm Synack discovered around 400 Mac computers infected with the newer strain of the FruitFly malware (FruitFly 2) in the wild.  According to the researcher malware that can remotely take control of webcams, screen, mouse, keyboards, and install additional malicious software has been infecting hundreds of Mac computers for more than five years—and it was detected just a few months back. FruitFly is surveillance malware that’s capable of executing shell commands, moving and clicking a mouse cursor, capturing webcam, killing processes, grabbing the system’s uptime, retrieving screen captures, and even alerting the hacker when victims are again active on their Mac. Fruitfly could likely infect Macs either through an infected website delivering the infection or via phishing emails or a booby-trapped application.

Cyber Security Tips: MAC users are recommended that avoid to visit malicious websites, avoid opening spam mails, avoid clicking on any links, keep the system up-to-date and installed updated antivirus.

  1. Casino Becomes Victim of Data Hack—courtesy Fish Tank

The soaring number of internet connected devices has made it easier for cyber-criminals to fulfill their malicious objectives without much do. Phishing is a well-known term in the cyber-security community, and it has got nothing to do with fishing. According to the latest report, hackers found a way to use an Internet connected fish tank to steal data from a North America based casino. The fish tank was connected to the internet and hackers managed to bypass the security. Hacker has successfully managed internet connected fish tank to steal data. The stolen data was sent to a device based in Finland. Eventually, the attack was identified and thwarted. The fish tank was linked with the internet to feed fishes automatically and maintain a comfortable environment inside the tank. Hacker able to steal data due to vulnerabilities in internet connected fish tank.

Cyber Security Tips: To prevent from such hacks you are strongly recommended that keep your systems up-to date, secure your network with the security product, keep monitoring your network, do vulnerability assessment and penetration testing.

 

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: