• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Main Content

Spear-phishing Attack on Companies Involved in Covid-19 Vaccine Distribution

December 7, 2020 By Vraj Patel Leave a Comment

Hackers are targeting companies that are involved in distributing an Covid-19 Vaccines. Accordingly to a new research the attackers are performing an spear-phishing attack the organizations that are distributing Covid-19 vaccines since September 2020. IBM Security X-Force researchers said that the attacks are being aimed at vaccine cold chain. The companies are responsible for storing and delivering vaccines at a safe temperatures.

The US Cybersecurity and Infrastructure Security Agency (CISA) has also issued an alert informing an organizations that are involved in storing and delivering Covid-19 vaccines to review the indicator of compromise and increase their defenses.  It has been unclear if there were any of the phishing attacks were successful.  IBM has said that the attackers are trying to steal an credential for the companies to get access of their network and get unauthorized access to the sensitive information regarding to the Covid-19 vaccines.

 

References:

Lakshmanan, R. 2020. Hackers Targeting Companies Involved in Covid-19 Vaccine Distribution. Retrieved from: https://thehackernews.com/2020/12/hackers-targeting-companies-involved-in.html

New Week 14 Presentation

December 7, 2020 By Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-14 new

Week 14: In the News

December 6, 2020 By Kyuande Johnson Leave a Comment

Millions of Hotel Guests Worldwide Caught Up in Mass Data Leak

Due to a cloud misconfiguration users of a popular reservation platform threaten travelers with identity theft, scams, credit-card fraud and vacation-stealing. The misconfigured Amazon Web Services S3 bucket. Revealed the records include sensitive data and credit-card details. The Prestige Software’s “Cloud Hospitality” is used by hotels to integrate their reservation systems with online booking websites like Expedia and Booking.com.
The company was storing years of credit-card data from hotel guests and travel agents without any protection in place, putting millions of people at risk of fraud and online attacks, “The S3 bucket contained over 180,000 records from August 2020 alone. Many of them related to hotel reservations being made on numerous websites, despite global hotel bookings being at an all-time low for this period.”

Vulnerabilities in Apple’s web Domain

October 10, 2020 by Vraj Patel Leave a Comment

Researcher at Apple has discovered 55 vulnerabilities in Apple’s web domain (Haworth, 2020). Research spent three months at Apple to discover the vulnerabilities and during the research they have found 11 critical bugs, 29 high severity, 13 medium, and 2 low severities bugs. The most critical bug that was found was able to executed remotely. It was also capable of storing a cross-site scripting that would have compromised customer’s iCloud accounts. Researcher were able to also access Apple’s internal projects sources codes. Accordingly to the article, most of the majority bugs has been fixed by the Apple (Haworth, 2020). The research were able to compromise the Apple Distinguished Educator (ADE) program using the bug that was able to executed remotely. The ADE program assigned an default password which then was used to perform an brutal force attack on other accounts and research were able to get access to an admin account. Which allowed them an access to the Apple’s network.

 

 

References:

Haworth, J. 2020. Researchers discover scores of security bugs in Apple’s stem and core. Retrieved from: https://portswigger.net/daily-swig/researchers-discover-scores-of-security-bugs-in-apples-stem-and-core

Filed Under: Week 06: More Metasploit Tagged With:

In the News: Ransomware Disrupts COVID-19 Medical Trials

October 5, 2020 by Mei X Wang Leave a Comment

On September 20, eResearch Technology (ERT) was attacked, this company specializes in clinical services, they collect, analyze, and distribute electronic patient-reported outcomes. Many companies were using this technology to track clinical trials on Covid-19 treatments. Due to the attack, the researchers had to revert to pen and paper, to track the outcomes and caused delays in trials conducted. Other healthcare companies affected by ransomware attacks are IQVIA(hired to assist AstraZeneca’s COVID Vaccine Trials) and Bristol-Myers Squibb(Drug manufacturers). Since then, the company has taken its systems offline and the incident has been reported to the FBI. However, the perpetrators have not even linked yet, and there isn’t conclusive information about whether or not the ransom was met, or how much they asked for.

 

https://www.infosecurity-magazine.com/news/ransomware-disrupts-covid19/

Filed Under: Uncategorized Tagged With:

Week 6 Presentation

October 5, 2020 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-6 (1)

Filed Under: Week 06: More Metasploit Tagged With:

Week 6 In the News: New ransomware vaccine kills programs wiping Windows shadow volumes

October 5, 2020 by Anthony Messina Leave a Comment

A new type of vaccine has been created to help defend against ransomware called raccine.exe. The program will not stop ransomware from being installed on a PC, but it can help with the recovery process. This vaccine will terminate any processes that try to delete the shadow copies volume on a windows machine. Windows creates daily backups of your system and data files (when activated) and stores them as snapshots in Shadow Volume Copy. These snapshots are useful for recovering files if they are accidentally changed or deleted.

Many ransomware programs do not want their victims to use this feature as it can aid them in recovering their files for free. One of the first things most ransomware programs do is to delete all Shadow Volume copies on the computer. This generally executed by the command “vssadmin delete shadows /all /quiet.” The new vaccine is an executable that is a debugger for vssadmin.exe. Anytime vssadmin is executed on a computer raccine.exe will launch as well and check to see if vssadmin is trying to delete shadow copies and terminate the process.

 

https://www.bleepingcomputer.com/news/security/new-ransomware-vaccine-kills-programs-wiping-windows-shadow-volumes/

Filed Under: Uncategorized Tagged With:

Facebook Grant Scam

October 5, 2020 by Akshay Shendarkar Leave a Comment

Cyber criminals are exploiting Facebook’s offering of $100 million in cash grants to businesses affected by the coronavirus pandemic.
Potential victims see an article seemingly from CNBC, a world leader in business news with a monthly audience in the hundreds of millions, saying Facebook is giving grants to users hit by COVID-19 and including a link to apply for a grant. The grammar should give away the game, and the URL, which does not start with cnbc.com, is another suspicious element.
Those who turn a blind eye to the clumsy English and wrong URL are taken to another portal that bears more than a striking resemblance to the official site of Mercy Corps, a charity that helps victims of natural disasters and armed conflicts. However, the only topic on this one is Facebook grants, and the victim is asked to specify how many years they have been a user of the social network. Victims are asked for their Facebook username and password credentials which go straight to the cybercriminals. Then, to accept the application, the site requires a lot more information, supposedly to verify your account: your address, social security number (for US citizens), and even a scan of both sides of your ID. No fields can be left blank, and the site diligently prompts you about any omissions.

Reference: https://www.kaspersky.com/blog/facebook-grants/37181/?web_view=true

Filed Under: Uncategorized Tagged With:

Facebook unpatched Apache library

September 29, 2020 by Vraj Patel Leave a Comment

One of the research was able to access the Facebook internal system by exploiting a vulnerability (Haworth, 2020). The research able to find an vulnerability within the Mobile Device Management (MDM) software and used that to gain access to the Facebook internal system. The researcher had find a bug within the MDM in 2018 which he reported and used that same bug to gain access to the Facebook system. MDM company was using older version of Apache Groovy library. This was a critical vulnerability since the research was able to gain access remotely. The researcher has reported this finding and MDM company has patched this issue.

References:

Haworth, J. 2020. Internal Facebook systems exposed via unpatched Apache library. Retrieved from: https://portswigger.net/daily-swig/internal-facebook-systems-exposed-via-unpatched-apache-library

Filed Under: Week 05: Metasploit Tagged With:

Week 5 Presentation

September 28, 2020 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-5

Filed Under: Week 05: Metasploit Tagged With:

Week 5: Reading

September 28, 2020 by Kyuande Johnson Leave a Comment

Netcat is a utility capable of establishing a TCP or UDP connection between two computers, meaning it can write and read through an open port. Network and System Administrators need to be able to quickly identify how their network is performing and what type of activity is occurring so NetCat is a great tool for that. Netcat is suitable for interactive use or as a network-connected back end for other tools.

Filed Under: Week 05: Metasploit Tagged With:

Netcat: New Attack lets hackers remotely steal data

September 28, 2020 by Brian Schneider Leave a Comment

This article, from 2019, shows a major flaw in the intel CPU’s that allow them to be exploited remotely overt the networks without requiring the attacker to have physical access or any malware installed on the target computer. The attacker works by using Netcat to sniff out sensitive data from intels cpu cache. It works by sending specially crafted network packets to a target computer that has the remote direct memory access feature enabled. RDMA allows attackers to spy on remote peripherals such as network cards in order to observe the timing difference between a network packet that is served from the remote processor cache versus a packet served from memory. By measuring the inter-arrival timing of packets, Netcat is able to use keystroke timing attack to leak what you type. The keystroke attack is correct about 85% of the time as of the writing of this article.

 

“NetCAT: New Attack Lets Hackers Remotely Steal Data From Intel CPUs.” The Hacker News, 11 Sept. 2019, thehackernews.com/2019/09/netcat-intel-side-channel.html?m=1.

Filed Under: Week 05: Metasploit Tagged With:

Reading Week 5 Netcat

September 28, 2020 by Brian Schneider 1 Comment

Netcat is an extremely powerful tool that security professionals use to do many things s when it comes to targeting networks and client machines. Some of the potential uses of Netcat is to scan all ports and connect to ones that are widely used to hide itself. Conduct file transfers back and forth across the network. Another important use for the tool is that it allows individuals to test their servers and firewalls. Also it can be used to test network performance. Sending commands back and forth using Netcat allows individuals to send commands back and forth across the network to client machines.

 

1. What ways can Netcat be used to transfer information back and forth across the network?

2. How does Netcat sneak into well known and used ports without being detected?

Filed Under: Uncategorized, Week 05: Metasploit Tagged With:

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Interim pages omitted …
  • Page 13
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in