Page 13 - AccumeView June
P. 13

Web / Internet Threats













            Bank-card-slurping malware sneaks into Forbes' mag subscription website - The Magecart credit-card-
            skimming malware that is the bane of internet shoppers has been spotted again, this time on the Forbes
            magazine subscription website. The infection was clocked by net security watcher Troy Mursch at
            around 0400 UTC on Wednesday. It appears hackers unknown somehow installed malicious JavaScript on
            forbesmagazine.com so that any bank card details entered into the site by would-be-subscribers would
            be siphoned off to another web server to be used later by crooks and fraudsters.
                   Source: https://www.theregister.co.uk/2019/05/16/forbes_magecart_infection/



            A cisco router bug has massive global implications - The CISCO 1001-X series router doesn't look much
            like the one you have in your home. It's bigger and much more expensive, responsible for reliable
            connectivity at stock exchanges, corporate offices, your local mall, and so on. The devices play a pivotal
            role at institutions, in other words, including some that deal with hypersensitive information. Now,
            researchers are disclosing a remote attack that would potentially allow a hacker to take over any 1001-X
            router and compromise all the data and commands that flow through it. And it only gets worse from
            there. To compromise the routers, researchers from the security firm Red Balloon exploited two
            vulnerabilities. The first is a bug in Cisco’s IOS operating system which would allow a hacker to remotely
            obtain root access to the devices. The second vulnerability, though, is much more sinister. Once the
            researchers gain root access, they can bypass the router's most fundamental security protection. Known
            as the Trust Anchor, this Cisco security feature has been implemented in almost all of the company’s
            enterprise devices since 2013. The fact that the researchers have demonstrated a way to bypass it in one
            device indicates that it may be possible, with device-specific modifications, to defeat the Trust Anchor on
            hundreds of millions of Cisco units around the world. That includes everything from enterprise routers to
            network switches to firewalls.
                   Source: https://www.wired.com/story/cisco-router-bug-secure-boot-trust-anchor/



            Credential stuffing: Bigger and badder than ever - Credential stuffing has been around since 2014
            enticing cybercriminals with a hefty return on investment and usage has increased of late as even more
            payment account credentials are stolen and sold on the dark web. Recorded Future just issued a report
            that looks at the economic environment surrounding credential stuffing and some of the tools and actors
            behind the activity to help explain its effectiveness and popularity. What has essentially happened over
            the last five years making it such a potentially disastrous situation for the victims is credential stuffing
            has moved from being a somewhat manual, peer-to-peer enterprise to one that is fully automated.
                   Source: https://www.scmagazine.com/home/security-news/cybercrime/credential-stuffing-
                   bigger-and-badder-than-ever/












                                                    www.accumepartners.com
                                                                                                                     13
   8   9   10   11   12   13   14   15   16   17   18