• Log In
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ryan Trapp

FBI spams thousands with fake infosec advice after ‘software misconfiguration’

November 15, 2021 by Ryan Trapp Leave a Comment

In what is one of the bigger news items of the week, the FBI has had one of their servers compromised and fake emails sent out from it. Since the emails were sent from one of the FBI’s servers they appeared legitimate in nature, as they actually came from their domain. The emails that were sent out were a false warning that the FBI had detected a chain attack and that the company’s virtual servers had been exfiltrated. It also laid blame for the attack at Vinny Troia’s feet, who is the founder of infosec firms Shadow Byte Cyber and Night Lion Security. It does not appear that this is the case. In total about 100,000 of these emails were able to be sent out before the campaign was stopped.

 

https://www.theregister.com/2021/11/15/fbi_fake_emails/

Tagged With: Uncategorized

Reward! Uncle Sam promises $10m for info about DarkSide ransomware gang chiefs

November 8, 2021 by Ryan Trapp 1 Comment

It appears the US is going hard after the DarkSide ransomware group. This is the group that attacked the colonial pipeline which lead to the weeks long shutdown of their vital east coast pipe. The US is offering a large bounty for information on the gang and for information leading to any  individuals conspiring to participate in a future DarkSide variant ransomware incidents. The group has allegedly released a statement saying that they are ceasing operation for now due to pressure from the authorities but it is unlikely that this is the end for this ransomware group. In more positive news, there is also a note in the article at the bottom about Interpol, with the aid of Ukrainian and South Korean police forces were able to arrest half a dozen individuals on suspicion of being part of the Cl0p ransomware group. This was a 30 month investigation that ultimately lead to the arrest of these individuals. This highlights the ability of different agencies to relentlessly pursue the individuals responsible for these global ransomware attacks, hopefully sending an impactful message (but probably not).

 

https://www.theregister.com/2021/11/05/us_darkside_ransomware_10m_bounty/

Tagged With: Week 11

‘Trojan Source’ Bug Threatens the Security of All Code

November 1, 2021 by Ryan Trapp 1 Comment

Krebs has a write up on this discovery of the “Trojan Source” vulnerability. What makes this vulnerability unique is that it affects most computer code compilers and many SDEs. This is due to the issue lying with the Unicode encoding standard. This is the standard that translates characters regardless of language used to facilitate communication between computers. The problem was discovered with the bi-directional override that is used to display the order in which the characters appear. This override exists for switching the order of characters when going from a left-to-right reading language to a right-to-left, such as English to Arabic. These Bidi overrides can be used in comments and strings, which is a problem because most programming languages allow comments which all text within is ignored by the compilers. And most languages allow string literals that can contain special or control characters. As quoted from the research paper, “Therefore, by placing Bidi override characters exclusively within comments and strings, we can smuggle them into source code in a manner that most compilers will accept. Our key insight is that we can reorder source code characters in such a way that the resulting display order also represents syntactically valid source code”. This research paper highlights this issue for almost all computer languages and makes it a great opportunity for vendors to get ahead of this issue before it becomes a problem.

 

 

https://krebsonsecurity.com/2021/11/trojan-source-bug-threatens-the-security-of-all-code/#more-57367

Tagged With: Week 10

Facebook sues scraper who sold 178 million phone numbers and user IDs

October 25, 2021 by Ryan Trapp 2 Comments

I found this article interesting purely based on the hypocrisy of Facebook being upset at user data being sold. It is alleged that this individual used virtual android devices to perform phone number enumeration scraping. He then assembled a database of user IDs and phone numbers which he put up for sale on a known marketplace for questionably obtained data. Facebook is now suing this person for violation of their terms of service. I guess Facebook is the only one that is allowed to sell their users information.

 

 

https://www.theregister.com/2021/10/25/facebook_sues_man_for_scraping/

Tagged With: Uncategorized, Week 9

Attackers Behind Trickbot Expanding Malware Distribution Channels

October 19, 2021 by Ryan Trapp 1 Comment

The bad actors behind the infamous Trickbot malware have resurfaced in an attempt to expand their distribution channels. Their new goal appears to be the deployment of ransomware. The Tickbot malware itself has evolved from a banking Trojan to a modular windows-based crimeware solution. They are moving away from sending out phishing emails with excel documents to a more diversified delivery methods.

 

 

 

https://thehackernews.com/2021/10/attackers-behind-trickbot-expanding.html

Filed Under: Week 8 Tagged With:

Apache Warns of Zero-Day Exploit in the Wild — Patch Your Web Servers Now!

October 11, 2021 by Ryan Trapp 1 Comment

This week there was a zero day discovered in Apache HTTP Server 2.4.49. This vulnerability can allow attackers to map URLs to files outside of  the expected document root on the server. However, it has subsequently been discovered that the zero-day flaw is worse than originally thought due to a new proof of concept that demonstrates the vulnerability can lead to remote code execution. This vulnerability only affects the 2.4.49 version of Apache but it is extremely severe in nature and something that you would want to patch immediately if one of your servers was running this.

 

https://thehackernews.com/2021/10/apache-warns-of-zero-day-exploit-in.html

Filed Under: Week 7 Tagged With:

A New APT Hacking Group Targeting Fuel, Energy, and Aviation Industries

October 4, 2021 by Ryan Trapp 3 Comments

My article this week is one that highlights the emergence of a new APT group targeting the fuel, energy, and aviation industries. This new group is disguising their malware under legitimate services of companies such as Microsoft, TrendMicro, McAfee, IBM, and Google. I find this interesting due to the recent pipeline hack. It seems that these sectors are some that have not been targeted very much so far but could be the focus of a lot of future attacks. This could be the beginning of a trend for the cybersecurity industry. The consequences for attacking these industries are severe in terms of financial and data loss.

 

https://thehackernews.com/2021/10/a-new-apt-hacking-group-targeting-fuel.html

Filed Under: Week 6 Tagged With:

New Android Malware Steals Financial Data from 378 Banking and Wallet Apps

September 27, 2021 by Ryan Trapp 1 Comment

This article details a new mobile malware built off of a previous infamous piece of malware. This Trojan named ERMAC targets users financial data. It steals users contact info, text messages, open arbitrary applications, and also triggers and overly for a multitude of financial apps to steal the login credentials. The roots of the malware are suspected to stem from the Cerberus malware, which was another banking Trojan that affected users not too long ago.

 

 

https://thehackernews.com/2021/09/new-android-malware-steals-financial.html

Filed Under: Week 5 Tagged With:

Google to Auto-Reset Unused Android App Permissions for Billions of Devices

September 20, 2021 by Ryan Trapp 1 Comment

This article touches on some new app permissions Google is pushing out. They are making it so apps that haven’t been used in months will auto-reset their permissions. This is a step in the correct direction for user privacy and security, as app permission can be overreaching often times. And usually it is the apps that are forgotten about and left on the phone that are the ones with too much access. Resetting the permissions makes it so the user is more in control of what permission they are allowing apps, and for how long.

 

 

https://thehackernews.com/2021/09/google-to-auto-reset-unused-android-app.html

Tagged With: Week 4

McDonald’s Email Blast Includes Password to Monopoly Game Database

September 13, 2021 by Ryan Trapp 2 Comments

I found this article very entertaining because it is hard to believe such simple mistakes are made like this. Emails were blasted out to the winners of McDonald’s Monopoly game last week and within those emails contained userID and passwords that had access to a server containing the information for the game. McDonald’s has since stated that the passwords were changed and the initial email was due to a human error. It is just another example that no matter how robust the security of an organization is that the human element is always the most dangerous and unpredictable.

McDonald’s Email Blast Includes Password to Monopoly Game Database

Tagged With: Week 3

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (1)
  • Week 1 (1)
  • Week 10 (1)
  • Week 11 (1)
  • Week 12 (2)
  • Week 2 (2)
  • Week 3 (1)
  • Week 4 (2)
  • Week 5 (3)
  • Week 6 (0)
  • Week 6 (2)
  • Week 7 (5)
  • Week 8 (5)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in