{"id":14959,"date":"2014-05-30T17:13:53","date_gmt":"2014-05-30T17:13:53","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1946"},"modified":"2020-02-26T10:50:59","modified_gmt":"2020-02-26T15:50:59","slug":"information-security-digest-may-14","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/information-security-digest-may-14\/14959\/","title":{"rendered":"Information security digest: May&#8217;14"},"content":{"rendered":"<p>May 2014 proves to be extremely stormy and volatile in regards to information security: still overshadowed by Heartbleed and Windows XP \u201cofficial demise\u201d from April, it has brought a lot of troubles on its own.<\/p>\n<p><strong>Backbones tapped<\/strong><\/p>\n<p>Probably the most serious incident disclosed late in May came from eBay, Inc. They acknowledged its database had been compromised two months prior to the announcement, and that they had only discovered that break-in a week before.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Attacks on eBay and PayPal \u2013 backbones of the world\u2019s e-commerce \u2013 are always worrisome.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FaX2Y&amp;text=Attacks+on+eBay+and+PayPal+%26%238211%3B+backbones+of+the+world%26%238217%3Bs+e-commerce+%26%238211%3B+are+always+worrisome.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>eBay insisted financial data had not been compromised. Still, intruders have hauled away personal data. The situation had been described in detail in our blog <a href=\"https:\/\/business.kaspersky.com\/a-confirmed-ebay-leak-another-password-alert\/\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p>It\u2019s important to mention that this disclosure coincided with another announcement from eBay-owned PayPal (and somewhat overshadowed it). PayPal <a href=\"http:\/\/www.net-security.org\/secworld.php?id=16904\" target=\"_blank\" rel=\"noopener nofollow\">reported<\/a>\u00a0they have finally plugged the hole in its Manager portal. The bug could have made it easy for an attacker to hijack an admin\u2019s account, change their password, and steal their personal information \u2014 not to mention their savings.<\/p>\n<p style=\"text-align: center\">\n<\/p><p>\u00a0<\/p>\n<p>Manager is a feature of the service that allows users to manage their Payflow account, the company\u2019s name for the gateway \u00a0merchants use to take payments from customers. The bug\u2019s detailed description is available <a href=\"https:\/\/threatpost.com\/paypal-fixes-serious-account-hijacking-bug-in-manager\/106117\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>, and potentially it\u2019s very dangerous.<\/p>\n<p>To a high degree both eBay and PayPal (especially PayPal) are backbones of the world\u2019s e-commerce. Even if hackers fail to retrieve financial data, any degree of success with attacks against them is always troubling. If their defenses are penetrated, then how secure are other e-commerce providers and portals?<\/p>\n<p><strong>Microsoft\u2019s bugfest<\/strong><\/p>\n<p>Microsoft is still in hot water after Windows XP support had been cut off in April.<\/p>\n<p style=\"text-align: left\">It didn\u2019t take long for cybercriminals to find and start using a new zeroday in Internet Explorer, which affected all of the browsers\u2019 versions since IE 6 and all of the Windows including XP. After some considerations Microsoft did make a tough decision to issue a patch for IE for Windows XP remaining users too, \u201cas an exception\u201d. Which was met with, let\u2019s say, <a href=\"https:\/\/business.kaspersky.com\/ie-0day-and-windows-xp-microsofts-tough-decision\/\" target=\"_blank\" rel=\"noopener nofollow\">\u201cmixed reviews\u201d.<\/a> Some view this step as a reluctance of private and business users to move away from an antique and insecure (even though much loved) operational system, still used by millions around the world. A handful of attacks involving new exploits targeting Windows XP users had been reported. This might have influenced Microsoft decision to make \u201can exception\u201d.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020014\/ie-1.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1948\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020014\/ie-1.png\" alt=\"ie\" width=\"800\" height=\"600\"><\/a><\/p>\n<p>A week after Microsoft bulk-patched an entirety of 13 security issues in Internet Explorer and Sharepoint Server, along with Windows, Office and its .NET Framework. It was the largest patch package of 2014 so far,\u00a0<a href=\"https:\/\/threatpost.com\/microsoft-adobe-issue-critical-fixes-for-may-2014-patch-tuesday\/106062\" target=\"_blank\" rel=\"noopener nofollow\">covering some very serious issues<\/a> \u2013 and how can they be not-so-serious given the world-dominant position of Microsoft Windows, Office and ubiquitousness of .NET?<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Given the Microsoft software\u2019s dominant position, its security issues affect many people.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FaX2Y&amp;text=Given+the+Microsoft+software%26%238217%3Bs+dominant+position%2C+its+security+issues+affect+many+people.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Unfortunately, less than two weeks later Microsoft was <a href=\"https:\/\/threatpost.com\/another-internet-explorer-zero-day-surfaces\/106223\" target=\"_blank\" rel=\"noopener nofollow\">badly hit with a disclosure of IE8 zeroday vulnerability made by HP\u2019s Zero Day Initiative<\/a>. The vulnerability could enable an attacker to run arbitrary code on vulnerable machines via drive-by downloads or malicious attachments in email messages. ZDI reported the bug to Microsoft quite long ago: according to its own policy, it discloses vulnerability details after 180 days if the vendor hasn\u2019t produced a patch. And the vendor hasn\u2019t.<\/p>\n<p>For some reason Microsoft remained tight-lipped even after the public disclosure. It acknowledged the problem, saying that some fixes are more complex than the rest, said the problem is being dealt with, but provided no details on how soon it is patched. This led to a well-expected slamfest over the Web: The vulnerability has gone without a patch for a little too long.<\/p>\n<p><strong>Bitly beetled<\/strong><\/p>\n<p>The link-shortening service Bitly <a href=\"https:\/\/threatpost.com\/bitly-compromised-users-urged-to-change-passwords\/106006\" target=\"_blank\" rel=\"noopener nofollow\">announced<\/a> that it\u2019s ramping up its development of two-factor authentication following a compromise that leaked user information.<\/p>\n<p>The breach, first <a href=\"http:\/\/blog.bitly.com\/post\/85169217199\/urgent-security-update-regarding-your-bitly-account\" target=\"_blank\" rel=\"noopener nofollow\">discovered in mid-May<\/a>, spilled users\u2019 email addresses, encrypted (salted and hashed) passwords, API keys and OAuth tokens.<\/p>\n<p>The service invalidated those credentials shortly after discovering the compromise Thursday, meaning that if users used either Facebook or Twitter to share shortened URLs, they\u2019ll have to reconnect them the next time they log in if they want to publish through them.<\/p>\n<p>Bitly is a good and widely used tool to save on links\u2019 length (which is especially relevant in Twitter with its 140 symbols limit), which ensures its popularity. According to some data, Bitly shortens more than one billion links per month. It doesn\u2019t charge its users for the services it provides, so there were no risks of direct financial loss. Still, identifiable personal data are in high demand among cybercriminals plotting phishing campaigns, so by no means was this incident \u201charmless\u201d.<\/p>\n<p><strong>Apple Ransompie<\/strong><\/p>\n<p style=\"text-align: left\">A number of iPhone, iPad and Mac users, largely confined to Australia, discovered their devices had been \u201ctaken hostage\u201d late in May with someone under alias \u201cOleg Pliss\u201d demanding money for the unlocking code. At first this might look ridiculous: iOS based devices and ransomware, closely associated with PC and Android?<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020013\/ios-1.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1949\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020013\/ios-1.png\" alt=\"ios\" width=\"800\" height=\"531\"><\/a><\/p>\n<p>Well, actually it seems there wasn\u2019t any real ransomware infecting the devices. Someone abused Find My Phone function using stolen credentials of the end-users. It\u2019s unclear, where have those credentials come from. Most likely the source is hacked or social-engineered iCloud accounts. Apple was quick to acknowledge the problem with remote lockings but denied that it has anything to do with iCloud:<\/p>\n<p><em>\u201cApple takes security very seriously and iCloud was not compromised during this incident. Impacted users should change their Apple ID password as soon as possible and avoid using the same user name and password for multiple services. Any users who need additional help can contact AppleCare or visit their local Apple Retail Store.\u201d<\/em> (<a href=\"http:\/\/www.zdnet.com\/icloud-not-compromised-in-apple-id-attack-apple-7000029914\/\" target=\"_blank\" rel=\"noopener nofollow\">via ZDNet<\/a>).<\/p>\n<p>Kaspersky Lab Expert Christian Funk said that criminals have been deploying phishing attacks to compromise Apple IDs for a couple of years now. Last year,\u00a0<a href=\"https:\/\/www.securelist.com\/en\/blog\/8108\/Apple_of_discord\" target=\"_blank\" rel=\"noopener nofollow\">Securelist released a research article<\/a> in which another Kaspersky Lab researcher explained attackers could launch ransomware campaigns against iOS and Mac devices by accessing iCloud accounts.<\/p>\n<p>Increasing number of attacks against iOS-based devices is an unpleasant but not entirely unexpected development: They are popular enough to attract criminals, and at the same time iOS is still considered safe from malware. Actually it is indeed safer from the common PC and tablet\/phones threats, it is not entirely immune. The incidents described above proves it.<\/p>\n<p><strong>Alone on Spotify<\/strong><\/p>\n<p style=\"text-align: left\">Spotify reported a security breach and requested the users of its Android app change their passwords. Spotify\u2019s CTO Oskar Stal wrote on the company\u2019s <a href=\"https:\/\/support.spotify.com\/us\/problems\/#!\/article\/downloading-android-update\" target=\"_blank\" rel=\"noopener nofollow\">website<\/a> that the company is investigating unauthorized access to its systems and internal company data. He also wrote that certain users will be asked to reset their passwords.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020013\/spotify-1.png\"><img decoding=\"async\" class=\"alignnone size-full wp-image-1950\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/05\/06020013\/spotify-1.png\" alt=\"spotify\" width=\"800\" height=\"606\"><\/a><\/p>\n<p style=\"text-align: center\"><a href=\"http:\/\/www.shutterstock.com\/gallery-809503p1.html?cr=00&amp;pl=edit-00\" target=\"_blank\" rel=\"noopener nofollow\">Twin Design<\/a> \/ <a href=\"http:\/\/www.shutterstock.com\/?cr=00&amp;pl=edit-00\" target=\"_blank\" rel=\"noopener nofollow\">Shutterstock.com<\/a><\/p>\n<p><em>\u201cOur evidence shows that only one Spotify user\u2019s data has been accessed and this did not include any password, financial or payment information\u2026 We have contacted this one individual. Based on our findings, we are not aware of any increased risk to users as a result of this incident,\u201d <\/em>Stal wrote.<\/p>\n<p style=\"text-align: left\">Spotify is limiting updates to only its Android users and is not recommending any action for iOS and Windows Phone users. Moreover, it preferred not to disclose anything further. This led to an \u201ceducated guess\u201d from the experts that there must have been some sort of a proof-of-concept attack demonstrated to Spotify teams, prompting them to take wider-than-expected action. If so, this is a good example of responsible reaction to a problem. Then again, it\u2019s all guesswork so far. Spotify decided to not disclose any details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>May 2014 appears to be very stormy and volatile in regards to information security. Still overshadowed by Heartbleed and Windows XP &#8220;official demise&#8221; from April, it has brought a lot of troubles on its own.<\/p>\n","protected":false},"author":209,"featured_media":16136,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[251,93,282,2101,25,38,104,97,686],"class_list":{"0":"post-14959","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-corporate-security","10":"tag-cybercriminals","11":"tag-cybersecurity","12":"tag-ebay-breach","13":"tag-internet-explorer","14":"tag-microsoft","15":"tag-paypal","16":"tag-security-2","17":"tag-spotify"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/information-security-digest-may-14\/14959\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/information-security-digest-may-14\/14959\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/information-security-digest-may-14\/14959\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/corporate-security\/","name":"corporate security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=14959"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14959\/revisions"}],"predecessor-version":[{"id":33155,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/14959\/revisions\/33155"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16136"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=14959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=14959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=14959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}