Quantcast
Channel: BOT24
Viewing all 8064 articles
Browse latest View live

One-Man PoS Malware Operation Captures 22,000 Credit Card Details in Brazil

$
0
0
We have been able to identify a new point-of-sale (PoS) malware family that has affected more than 100 victim organizations in Brazil. We have dubbed this new malware family as “FighterPOS”. (This name is derived from BRFighter, the tool used by the author to create this new threat.) This one-man operation has been able to steal more than 22,000 unique credit card numbers.

more here.........http://blog.trendmicro.com/trendlabs-security-intelligence/fighterpos-fighting-a-new-pos-malware-family/

HP Support Solutions Framework Security Issue

$
0
0
After discovering the flaw in Dell's System Detect software I looked into other similar software for issues. This post details two issues I found with the HP Product Detection software and explores the protections HP put in place. I'm also going to explain how they could be easily bypassed to allow an attacker to force files to be downloaded, read arbitrary data, registry keys and system information through the users browser with little or no interaction.

more here........http://tomforb.es/hp-support-solutions-framework-security-issue

CONIKS

$
0
0
CONIKS is an end-user key verification service capable of integration in end-to-end encrypted communication systems.

With CONIKS, users can be sure that their communication remains secure while not needing to worry about encryption keys because the CONIKS client will efficiently monitor their account on their behalf. The CONIKS client also audits the communication service providers of interest to the user to ensure that these are presenting consistent views of their contact' accounts.

more here with tech paper included.....http://www.coniks.org/more-info

Hard Disk Firmware Hacking

$
0
0
I've not been doing much in the windows malware world for a while now, because quite frankly I've run out of ideas and I'm totally bored. Recently I decided to take the jump into electronics / hardware hacking and people have suggested I post some of that here.

A couple of years ago I started looking into BIOS rootkits (back before (U)EFI was mainstream). I was aware that most hardware had a BIOS type setup that is usually initialized during the POST phase of the boot process, so I was looking into the possibility of modifying  firmware to work in the same way as a BIOS rootkit would. My two main candidates were the GPU and Hard Disk, which I began looking into (but was mostly sandbagged by my lack of reverse engineering knowledge at the time).

My current project is on hold while I await the arrival of some expensive hardware which will allow me to overcome a setback (the manufacture disabled the JTAG interface prior to shipping), so I decided to have a play with something I saw on spritesmods in 2013 (Hard disk hacking).



Challenging CoinVault – it's time to free those files

$
0
0
Some months ago we wrote a blog post about CoinVault. In that post we explained how we tore the malware apart in order to get to its original code and not the obfuscated one.

So when were contacted recently by the National High Tech Crime Unit (NHTCU) of the Netherlands' police and the Netherlands' National Prosecutors Office, who had obtained a database from a CoinVault command & control server (containing IVs, Keys and private Bitcoin wallets), we were able to put our accumulated insight to good use and accelerate the creation of a decryption tool.

more here........https://securelist.com/blog/69595/challenging-coinvault-its-time-to-free-those-files/

Analyzing Gootkit's persistence mechanism (new ASEP inside!)

Analysis of Adobe Flash Player shared ByteArray Use-After-Free Vulnerability

$
0
0
In February, just a few days after CVE-2015-0311 was found being exploited in the wild, a new Adobe Flash Player vulnerability popped up.

Trend Micro and SpiderLabs have already published their analysis of the bug, but I thought it would be worth providing my own analysis, which I carried out in order to create a reliable exploit from scratch for our products Core Impact Pro and Core Insight.

We’ll go through the avmplus source code and IDA in order to fully understand the root cause of the vulnerability here.........https://blog.coresecurity.com/2015/04/13/analysis-of-adobe-flash-player-shared-bytearray-use-after-free-vulnerability/

Booby-trapped Hugo Boss Advert Spreads Cryptowall Ransomware


SPEAR - Redirect to SMB

$
0
0
We’ve uncovered a new technique for stealing sensitive login credentials from any Windows PC, tablet or server, including ones running previews of the yet-to-be-released Windows 10 operating system. Software from at least 31 companies including Adobe, Apple, Box, Microsoft, Oracle and Symantec can be exploited using this vulnerability, which we have dubbed Redirect to SMB.  Carnegie Mellon University CERT disclosed the vulnerability to the public today (#VU672268), following six weeks of working with vendors to help them mitigate the issue.

more here.......http://blog.cylance.com/redirect-to-smb

Yara Rule to detect Backspace Malware

Zero Access Malware

$
0
0
The Zero Access trojan (Maxx++, Sierief, Crimeware) has affected millions of computers worldwide, and it is the number one cause of cyber click fraud and Bitcoin mining on the Internet. Once the trojan has been delivered into the system, it begins to download many other types of malware that can each cause a great deal of damage to an organization.

The trojan’s primary infection vector is spam mail and exploits kits, but it can also be distributed by P2P file sharing services and fake cracks and keygens. The trojan is unique in the fact that it connects to a P2P botnet chain that makes it very difficult to dismantle the botnet as a whole.

more here......http://resources.infosecinstitute.com/zero-access-malware/

Paper: A Comparative Study of Email Forensic Tools

$
0
0
Abstract
Over the last decades, email has been the major carrier for transporting spam and malicious contents
over the network. Email is also the primary source of numerous criminal activities on the
Internet. Computer Forensics is a systematic process to retain and analyze saved emails for the
purpose of legal proceedings and other civil matters. Email analysis is challenging due to not only
various fields that can be forged by hackers or malicious users, but also the flexibility of composing,
editing, deleting of emails using offline (e.g., MS Outlook) or online (e.g., Web mail) email applications.
Towards this direction, a number of open source forensics tools have been widely used
by the practitioners. However, these tools have been developed in an isolated manner rather than
a collaborative approach. Given that email forensic tool users need to understand to what extent a
tool would be useful for his/her circumstances and conducting forensic analysis accordingly. In
this paper, we examine a set of common features to compare and contrast five popular open
source email forensic tools. The study finds that all email forensic tools are not similar, offer diverse
types of facility. By combining analysis tools, it may be possible to gain detailed information
in the area of email forensic.

more here........http://www.forensicmag.com/sites/forensicmag.com/files/JIS_2015041015341322.pdf?

Metasploit: Apple OS X Rootpipe Privilege Escalation

A Tale of Two Exploits

$
0
0
CVE-2015-0336 is a type confusion vulnerability in the AS2 NetConnection class. I reported this issue in January and soon wrote a proof-of-concept exploit for the bug. The issue was patched by Adobe in March and less than a week later, in what was likely a case of bug collision, it was found in two exploit kits in the wild. This created an interesting opportunity to compare a real exploit to a theoretical one and better understand how attackers exploit Flash vulnerabilities.

more here.........http://googleprojectzero.blogspot.com/2015/04/a-tale-of-two-exploits.html

Last-minute tax declarations lead to IRS-themed Ransomware

$
0
0
Oh, how procrastination gets all of us! April 15th is the U.S. tax deadline and it looks like most of us will be coming down to the wire on declaring our taxes and holding our collective breath in expectation of that sweet, sweet refund. Sadly, our malware writing friends are aware of this and their discipline has proven far superior. Knowing that many are on the lookout for emails from the Internal Revenue Service concerning pending refunds, criminals have crafted some of their own.

more here...........http://securelist.com/blog/research/69605/your-tax-refund-with-a-data-kidnapping-twist/

ASN.1 vs DER vs PEM vs x509 vs PKCS#7 vs

Prosecutors suspect man hacked lottery computers to score winning ticket

Exploits for CVE-2015-1318 and CVE-2015-1862 which are bugs in Apport (Ubuntu) and Abrt (Fedora)

$
0
0

In Apport, an unprivileged user can use a namespace-based attack because 
there is an execveby root after a chroot into a user-specified 
directory
Apport/Abrt Vulnerability Demo Exploit here......https://gist.github.com/taviso/0f02c255c13c5c113406
and in ABRT, an unprivileged user can use a namespace-based attack because 
there is an execve by root after a chroot into a user-specified directory.
Abrt also suffers from race conditions and symlink problems as quoted by 
Kurt Seifried of RedHat.
 
A race condition exploit for CVE-2015-1862, targeting Fedora here....https://gist.github.com/taviso/fe359006836d6cd1091e
Additionally some bugs in crash analysis frameworks on Ubuntu/Fedora/Others here....http://www.openwall.com/lists/oss-security/2015/04/14/4


The Two CVE bugs were reported by Tavis Ormandy

Attacker controlled HTTP statuscode + HTML Entity Encoded payload = XSS

IDA: What's new in 6.8

$
0
0
This is mainly a maintenance release, so our focus was on fixing bugs. However, there are some improvements too:
Support for long names. In previous versions of IDA names were limited to 511 bytes. This was causing problems, especially with long mangled C++ names (e.g. boost names). We removed this limitation in many places of IDA. The work is not complete, there are still some areas where the limitation exists but overall the listings are more readable now.
Dalvik: added support for OAT files
PPC: support for Power ISA 2.07
Better analysis of prolog code; better register tracking, especially for ARM
Lots of vulnerabilities fixed thanks to the submissions to our bug bounty program

more here.......https://www.hex-rays.com/products/ida/6.8/index.shtml
Viewing all 8064 articles
Browse latest View live