Page 11 - Threat Intelligence 8-7-2019
P. 11

Internal Threats
















             Researchers discover new ways to hack WPA3 Protected WiFi Passwords - The same team of
             cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as
             Dragonblood, in the newly launched WPA3 WiFi security standard few months ago has now
             uncovered two more flaws that could allow attackers to hack WiFi passwords. WPA, or WiFi
             Protected Access, is a WiFi security standard that has been designed to authenticate wireless
             devices using the Advanced Encryption Standard (AES) protocol and intended to prevent hackers
             from eavesdropping on your wireless data. The WiFi Protected Access III (WPA3) protocol was
             launched a year ago in an attempt to address technical shortcomings of the WPA2 protocol from the
             ground, which has long been considered to be insecure and found vulnerable to more severe KRACK
             attacks.
                    Source: https://thehackernews.com/2019/08/hack-wpa3-wifi-password.html



             Flaws in Qualcomm chipset expose millions of Android devices to hacking threat - Security
             researchers from Tencent’s Blade Team are warning Android smartphone and tablet users of flaws in
             Qualcomm chipsets, called QualPwn. The bugs collectively allow hackers to compromise Android
             devices remotely simply by sending malicious packets over-the-air – no user interaction required.
             Three bugs make up QualPwn (CVE-2019-10539, CVE-2019-10540 and CVE-2019-10538). The
             prerequisite for the attack is that both the attacker and targeted Android device must be active on
             the same shared Wi-Fi network. “One of the vulnerabilities allows attackers to compromise the
             WLAN and modem, over-the-air. The other allows attackers to compromise the Android kernel from
             the WLAN chip. The full exploit chain allows attackers to compromise the Android kernel over-the-
             air in some circumstances,” wrote researchers.

                    Source: https://threatpost.com/android-phones-qualpwn/146989/



             DMARC Adoption Nonexistent at 80% of Organizations - Standard email authentication to prevent
             spoofing and phishing remains elusive for most. About 80 percent of company web domains don’t
             have standard email authentication protections in place. That’s according to 250ok’s Global DMARC
             Adoption 2019 report, which analyzed 25,700 domains in the education, e-commerce, legal,
             financial services, SaaS and nonprofit sectors, as well as the Fortune 500, U.S. government and
             China Hot 100 sectors. The firm found that the majority lacked Domain-based Message
             Authentication, Reporting and Conformance (DMARC) policies; DMARC is considered the industry
             standard for email authentication to prevent attacks where adversaries are sending mails with
             counterfeit addresses.

                    Source: https://threatpost.com/dmarc-adoption-nonexistent/146751/







                                                    www.accumepartners.com                                           11
   6   7   8   9   10   11   12   13   14   15   16