{"id":14890,"date":"2013-09-05T16:41:28","date_gmt":"2013-09-05T16:41:28","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1002"},"modified":"2021-03-01T11:58:02","modified_gmt":"2021-03-01T16:58:02","slug":"information-security-digest-july-august-2013","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/information-security-digest-july-august-2013\/14890\/","title":{"rendered":"Information security digest: July 18 &#8211; August 18, 2013"},"content":{"rendered":"<p><b>Apple Developer Center down for a week<\/b><\/p>\n<p>It took Apple about a week to restore the functions of the <a href=\"http:\/\/developer.apple.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Apple Developer Center<\/a> following its crash on July 18. After about three days, Apple officially acknowledged that the site might have been hacked, and then, Turkish network security expert Ibrahim Balic, announced that he might have been the cause of it going down. He had found several serious vulnerabilities in the Apple iAD Workbench advertising system, and by exploiting them, managed to get the personal data of 100,000 registered users of Apple services. He immediately notified the company about the vulnerabilities and likely became the reason for the weeklong outage of the site.<\/p>\n<p>Developers received a letter from Apple, which stated that the architecture of the Apple Developer Center was being completely overhauled.<\/p>\n<p><a href=\"https:\/\/business.kaspersky.com\/a-strange-hack-at-apples-developer-center\/\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>All forums closed<\/b><\/p>\n<p>Future Publishing shut down all of its editions\u2019 forums after detecting an attack aimed at PC Gamer\u2019s forums.<\/p>\n<p>\u201cLast week on July 19, 2013 we discovered that the PC Gamer\u2019s vBulletin-powered forum had been the target of a malicious attack. Immediate action was taken to shut down the forum, which blocked the attack. We have since been thoroughly investigating the damage done and how this attack took place.<\/p>\n<p>We have no evidence that any of the PC Gamer\u2019s users\u2019 details were stolen. However, we feel it is safest to keep the forum closed until we are satisfied that the security vulnerability in the software is fixed. Information on the progress of this will be communicated via the PCGamer site.\u201d \u2013 <a href=\"http:\/\/mos.futurenet.com\/forum\/\" target=\"_blank\" rel=\"noopener nofollow\">said the web page text<\/a>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015838\/2-1024x764.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1005\" alt=\"2\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015838\/2.png\" width=\"734\" height=\"432\"><\/a><\/p>\n<p><b>No brakes<\/b><\/p>\n<p>Shortly before Defcon two, IT specialists (i.e. hackers) Charlie Miller and Chris Valasek showed the Forbes\u2019 editor how to disable the Ford Escape\u2019s brakes by using a laptop connected to the car\u2019s dashboard. The Ford Escape, like many other modern cars, is packed with computers and, where there are computers, there are vulnerabilities to be found.<\/p>\n<p>Miller and Valasek managed to reverse-engineer enough of the software of the Escape and the Toyota Prius and found a lot of unpleasant surprises that can play a variety of dirty tricks: everything from annoyances like uncontrollably blasting the horn, to serious hazards like slamming on the Prius\u2019 brakes at high speeds. They sent commands from their laptops that killed power steering, spoofed the GPS and made pathological liars out of speedometers and odometers.<\/p>\n<p><a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/07\/24\/hackers-reveal-nasty-new-car-attacks-with-me-behind-the-wheel-video\/\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>Down with passwords?<\/b><\/p>\n<p>A <a href=\"http:\/\/www.petitionagainstpasswords.com\/\" target=\"_blank\" rel=\"noopener nofollow\">campaign against passwords<\/a> was launched on the Internet. The initiators of the campaign demanded the IT industry develop \u201ca safe and convenient alternative\u201d to the current way of authorization, i.e. one that would not require memorizing anything.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015837\/3-1-1024x768.png\"><img decoding=\"async\" class=\"aligncenter  wp-image-1006\" alt=\"3 (1)\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/11\/06015837\/3-1.png\" width=\"901\" height=\"428\"><\/a><\/p>\n<p>Passwords are one of the weakest spots in data security. For better memorization, users often use simple combinations that are easy to hack \u2013 which has clear consequences.<\/p>\n<p>There are alternatives to passwords, actually. But as mentioned above, passwords are familiar to most users and bad habits tend to endure, even with current offered alternatives.<\/p>\n<p><a href=\"http:\/\/www.darkreading.com\/vulnerability\/campaign-launched-to-kill-off-the-passwo\/240158879\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>There would be a reason<\/b><\/p>\n<p>The birth of the heir to the British throne, the disaster in Spain, the nearing release of the next series of Plants vs. Zombies: all of these events have aroused a dramatic increase in the activities of malware writers and spammers\u2019 who are trying to exploit public interest. In some cases, there were Chinese detected attempts at using the newly discovered <a href=\"https:\/\/business.kaspersky.ru\/android-masterkey\/\" target=\"_blank\" rel=\"noopener nofollow\">master key vulnerability in Android<\/a> (bug #9695860). Spammers and virus writers will really try to exploit any newsbreak that attracts massive interest.<\/p>\n<p><a href=\"http:\/\/www.securelist.com\/en\/blog\/9115\/Royal_Baby_lures_to_Blackhole_Site\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>160 million credit cards<\/b><\/p>\n<p>Five men from Russia and the Ukraine have been indicted in the U.S. for hacking into computers at NASDAQ, 7-Eleven, Carrefour, JCP, Hannaford, Heartland, Wet Seal, Commidea, Dexia, JetBlue, Dow Jones, Euronet, Emerging Markets Payments, Global Payment, Diners Singapore and Ingenicard.<\/p>\n<p>Most of the breaches began with SQL injection attacks on the victims\u2019 databases; once inside, the attackers planted backdoor malware to retain a foothold in the networks, from which they pilfered some 160 million credit card accounts, amounting to hundreds of millions of dollars in financial losses, according to the U.S. Attorney\u2019s Office in New Jersey. Three of the victim companies reported $300 million in losses.<\/p>\n<p>The two instigators of those \u201coperations\u201d were Vladimir Drinkman, 32, of Syktyykar and Moscow, Russia, and Alexandr Kalinin, 26, of St. Petersburg, Russia.<\/p>\n<p><a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/feds-indict-five-in-massive-credit-card\/240158980\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>Battle recon<\/b><\/p>\n<p>Praetorian Co. announced the launch of a special resource for system administrators that allows them to \u201caudit\u201d (essentially) passwords used in the corporate network. The cloud service <a href=\"http:\/\/pwaudit.com\/\" target=\"_blank\" rel=\"noopener nofollow\">PWAudit.com<\/a> tries to automatically crack weak passwords with the help of several different techniques.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020120\/4-1.png\"><img decoding=\"async\" class=\"aligncenter  wp-image-1007\" alt=\"4 (1)\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/09\/06020120\/4-1.png\" width=\"819\" height=\"426\"><\/a><\/p>\n<p><a href=\"http:\/\/www.darkreading.com\/management\/new-free-service-cracks-weak-passwords\/240159192\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>It should be noted that Kaspersky Lab has its own product that tests the effectiveness of a password\u2019s resistance to brute force attacks (and by botnets, too) \u2013 <a href=\"http:\/\/password.social-kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Secure Password Checker.<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>BlackHat USA 2013<\/b><\/p>\n<p>The conference BlackHat 2013 saw many enthralling reports about various incidents that occured last year, as well as serious vulnerabilities that have been detected in recent months.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020151\/5-1.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1008\" alt=\"5 (1)\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/10\/06020151\/5-1.png\" width=\"993\" height=\"206\"><\/a><\/p>\n<p>Most people\u2019s attention was drawn to the reports on critical vulnerabilities like the master key to Android (described in our publications last week \u2013 [<a href=\"https:\/\/business.kaspersky.com\/master-keys-android-vulnerabilities-allow-applications-to-bypass-the-system-check\/\" target=\"_blank\" rel=\"noopener nofollow\">1<\/a>], [<a href=\"https:\/\/business.kaspersky.com\/master-key-vulnerabilities-in-android-countermeasures-and-attempts-to-exploit\/\" target=\"_blank\" rel=\"noopener nofollow\">2<\/a>] ), and the cracking of SIM cards (details <a href=\"https:\/\/business.kaspersky.com\/sim-cards-encryption-vulnerability-the-scope-of-the-problem\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>).<\/p>\n<p>These attacks cracked Apple iOS by means of <a href=\"https:\/\/threatpost.com\/apple-to-fix-fake-usb-charger-flaw-in-ios-7\/101554\" target=\"_blank\" rel=\"noopener nofollow\">fake chargers<\/a>, a rated method of forming malicious botnets <a href=\"https:\/\/threatpost.com\/new-attack-leverages-mobile-ad-network-to-deliver-android-malware\/101956\" target=\"_blank\" rel=\"noopener nofollow\">via banner networks<\/a> and the opportunity for attacking Smart TVs with a possible leak of personal data (if there is any stored on the device).<\/p>\n<p>Two SCADA experts <a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/scada-experts-simulate-catastrophic-atta\/240159333\" target=\"_blank\" rel=\"noopener nofollow\">simulated a catastrophic attack<\/a> on an oil well pumping station\u2019s controllers, showing this type of attack could lead to disaster. No specific software vulnerabilities or bugs were required for this attack: it came down to a lack of security in the serial Modbus\/TCP protocol, a networking protocol that dates back to the 1970s. There is no authentication or security designed into it at all.<\/p>\n<p>The representatives of Trend Micro discussed the incident with the well-known hacker group APT1\/Comment Crew, which iss allegedly linked to the Chinese government. For a long time those hackers tried to hack the system of a single water supply plant in the United States. Amongst doing other things, the hackers tried to steal documents and reset the pumps.<\/p>\n<p>Although it turned out the pumping station was an intricate honeypot specifically designed for \u201clive baiting\u201d hackers. According to the Trend Micro\u2019s Kyle Wilhoit, \u201c<a href=\"http:\/\/www.technologyreview.com\/news\/517786\/chinese-hacking-team-caught-taking-over-decoy-water-plant\/\" target=\"_blank\" rel=\"noopener nofollow\">it was 100 percent clear they knew what they were doing<\/a>.\u201d The decoy water plant was not a random target.<\/p>\n<p><a href=\"https:\/\/www.blackhat.com\/us-13\/briefings.html\" target=\"_blank\" rel=\"noopener nofollow\">Reports on the Black Hat USA 2013<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>Tor hammered<\/b><\/p>\n<p>By the request of U.S. law enforcement, Eric Eoin Marques was arrested in Ireland. Marques is the creator of the hosting company, Freedom House, and the encrypted communication protocol, Tor. In the U.S. he is accused of aiding and abetting in the distribution of child pornography. Immediately after the arrest, <a href=\"http:\/\/www.reddit.com\/r\/onions\/comments\/1jmrta\/founder_of_the_freedom_hosting_arrested_held\/\" target=\"_blank\" rel=\"noopener nofollow\">reports<\/a> surfaced about a malicious JavaScript code on websites that used the services of Tor hosting.<\/p>\n<p>The attack was a success because of a vulnerability found in Mozilla Firefox 17, which is the operating base of the Tor Browser. The vulnerability itself <a href=\"https:\/\/www.mozilla.org\/security\/announce\/2013\/mfsa2013-53.html\" target=\"_blank\" rel=\"noopener nofollow\">was eliminated in June.<\/a><\/p>\n<p>Either way, the future of Tor looks very hazy.<\/p>\n<p><a href=\"http:\/\/boingboing.net\/2013\/08\/04\/anonymous-web-host-shut-down.html\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>Bruteforcing WordPress<\/b><\/p>\n<p>Unidentified attackers launched another massive attack on WordPress powered websites. A large botnet tried to bruteforce usernames and passwords. <a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/fort-disco-botnet-behind-attack-campaign\/240159627\" target=\"_blank\" rel=\"noopener nofollow\">Later it became clear<\/a> that the attack was also done against Joomla and Datalife Engine, and the botnet Fort Disco consisting of about 25,000 infected computers was the organizer of the attack. The attack greatly hampered the functionality of the victimized resources without mentioning the threat, if they were successful, to the companies whose websites use these engines. If the administrator password is weak enough to yield to brute force, the attackers gain control of the entire resource to do with as they please: steal other people\u2019s personal information, change settings, embed malicious codes and so on.<\/p>\n<p>A similar situation was observed in April 2013 when WordPress powered sites became the targets of an attack.<\/p>\n<p><a href=\"http:\/\/www.darkreading.com\/attacks-breaches\/fort-disco-botnet-behind-attack-campaign\/240159627\" target=\"_blank\" rel=\"noopener nofollow\">Read more\u2026<\/a><\/p>\n<p>\u00a0<\/p>\n<p><b>Ten gangs<\/b><\/p>\n<p>At DEFCON, there was a report that stated the members of ten Russian cybercriminal gangs were the main suppliers of malicious mo software for Android, the victims of which were residents of Russia and Eastern Europe. About 60% of malware for the world\u2019s most popular mobile operating systems is written by this group, and they are behind most cases of frauds via SMS.<\/p>\n<p>The full report is <a href=\"https:\/\/www.lookout.com\/resources\/reports\/dragon-lady\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>\u00a0<\/p>\n<p><b>One is enough<\/b><\/p>\n<p>Another noteworthy DEFCON report describes a vulnerability found in Google Android, capable of allowing the unauthorized entry into the corporate network via Google Apps. The problem lies in the Android web login function; just one hacked device is sufficient to access Google Apps.<\/p>\n<p>Google received the notice long ago, so there is hope that the necessary measures will be taken in due course.<\/p>\n<p>The slides of the report are <a href=\"http:\/\/secur3.us\/DC21Slides.pdf\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple Developer Center down for a week It took Apple about a week to restore the functions of the Apple Developer Center following its crash on July 18. After about<\/p>\n","protected":false},"author":209,"featured_media":16364,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2029,961],"class_list":{"0":"post-14890","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-business-news","10":"tag-leaks"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/information-security-digest-july-august-2013\/14890\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/information-security-digest-july-august-2013\/14890\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/information-security-digest-july-august-2013\/14890\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/business-news\/","name":"Business News"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14890"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14890\/revisions"}],"predecessor-version":[{"id":38872,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14890\/revisions\/38872"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16364"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}