{"id":906,"date":"2013-07-23T16:40:24","date_gmt":"2013-07-23T16:40:24","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=906"},"modified":"2020-02-26T10:41:30","modified_gmt":"2020-02-26T15:41:30","slug":"information-security-digest-24-06-12-07","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/information-security-digest-24-06-12-07\/906\/","title":{"rendered":"Information security digest 24.06-12.07"},"content":{"rendered":"<p><b>Every fifth attack, every third bank<\/b><\/p>\n<p>Every fifth phishing attack over the past year focused on banking and financial institutions. These results come out of a study published by Kaspersky Lab in late June. According to the data from <a href=\"https:\/\/www.kaspersky.com\/images\/KESB_Whitepaper_KSN_ENG_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Network<\/a> 20,64% of phishing threats registered between May 2012 and April 2013 were targeted at different kinds of financial institutions.<\/p>\n<p>The fact that the attackers are particularly interested in banks is indirectly confirmed by other studies. According to the global survey by B2B International and Kaspersky Lab, about 37% of all banks suffered at least once from phishing attacks in one way or another over the past twelve months.<\/p>\n<p>Find more on the new study <a href=\"https:\/\/www.kaspersky.com\/about\/news\/virus\/2013\/1_in_5_phishing_attacks_target_banks_and_other_financial_organizations\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n<p><b>Showdown<\/b><\/p>\n<p>Network security experts ambiguously reacted to the emergence of <a href=\"http:\/\/www.darkreading.com\/endpoint\/carberp-source-code-leak-likely-to-spawn\/240157400\" target=\"_blank\" rel=\"noopener nofollow\">Trojan Carberp\u2019s source code<\/a> on the Web. Carberp is a banking Trojan used to steal money. In March 2013, Russian police detained a group of hackers who had stolen about 60 million rubles with the help of Carberp and Backdoor.Win32.Shiz. But this arrest does not mean that the \u201cuniversal bankbot\u201d threat was eliminated for good. Firstly, the offers to buy Carberp did not stop appearing on the Web, and secondly, the \u201caffiliates\u201d that have previously been reported for spreading the Trojan are still working. Furthermore, on the very day the arrest of the criminals was announced three new test servers for Carberp <a href=\"http:\/\/www.securelist.com\/en\/blog\/694\/Carberp_its_not_over_yet\" target=\"_blank\" rel=\"noopener nofollow\">appeared<\/a>, all of them with German IP addresses.<\/p>\n<p>And then the source code of the infamous Trojan \u201cleaked.\u201d As mentioned above, the reaction to this event was ambiguous. On the one hand, security experts got the opportunity to thoroughly study this malware. On the other hand, the virus writers obviously have continued doing their business, and the new derivatives are expected soon enough.<\/p>\n<p><b>Facebook hijacked in sixty seconds<\/b><\/p>\n<p>The Facebook administration awarded British information security researcher John Whitton (aka fin1te) when he detected a serious vulnerability that could let an attacker access any Facebook account via SMS. John Whitton discovered the bug in late May and immediately notified Facebook about the flaw. A few days later administrators fixed the issue, but until recently there was no word about the $20,000 reward assigned to that bug.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/02\/06051657\/facebook.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-907\" alt=\"facebook\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2013\/02\/06051657\/facebook.png\" width=\"800\" height=\"357\"><\/a><\/p>\n<p>Whitton\u2019s exploit took advantage of Facebook\u2019s mechanism for activating and using mobile texts with the social network. <a href=\"http:\/\/blog.fin1te.net\/post\/53949849983\/hijacking-a-facebook-account-with-sms\" target=\"_blank\" rel=\"noopener nofollow\">More details<\/a> on the bug in Whitton\u2019s blog.<\/p>\n<p><b>Hit and run<\/b><\/p>\n<p>The famous video game developer Ubisoft was hit by hackers who managed to steal usernames, email addresses and encrypted passwords from the company\u2019s server.<\/p>\n<p>The company\u2019s official blog <a href=\"http:\/\/blog.ubi.com\/security-update-for-all-ubisoft-account-holders\/\" target=\"_blank\" rel=\"noopener nofollow\">assured<\/a> that personal payment information was safe from the intrusion. Nevertheless, all users were advised to change their passwords on Ubi.com as well as on any other resources where the same or similar passwords could be used.<\/p>\n<p><b>No spies allowed!<\/b><\/p>\n<p>One of the Pirate Bay co-founders Peter Sunde <a href=\"http:\/\/gigaom.com\/2013\/07\/09\/the-pirate-bay-founder-is-raising-money-for-spy-proof-messaging-app\/\" target=\"_blank\" rel=\"noopener nofollow\">announced<\/a> that he was raising money for the development of a spy-proof messaging application for iOS and Android. Sunde explained that the application, which his under the working title <a href=\"https:\/\/heml.is\/\" target=\"_blank\" rel=\"noopener nofollow\">Hemlis<\/a> (Swedish for \u201csecret\u201d), would utilize end-to-end encryption to ensure that only the two people carrying on the text conversation would have access to its data.<\/p>\n<p>Sunde got the idea to create such an app because of the NSA scandal with the U.S. global cyber espionage program PRISM. Since the topic of security services surveillance is hyped again, there are going to be many people who would like to take advantage of it. The point is to identify the real purposes of those people and the efficiency of spy-proof applications.<\/p>\n<p><b>A volley of Microsoft security bulletins<\/b><\/p>\n<p>Microsoft released seven security bulletins (MS13-52 \u2013 MS13058), describing a number of vulnerabilities in the company\u2019s products. Six of them are assigned \u201ccritical\u201d. Serious flaws were found in Internet Explorer and DirectShow.<\/p>\n<p>There was also another problem detected while processing TrueType fonts, affecting Microsoft Office, Visual Studio, .NET, Silverlight, Lync and some components of Windows. Technical details on that vulnerability were described in three bulletins.<\/p>\n<p><a href=\"https:\/\/securelist.com\/microsoft-updates-july-2013-2\/35949\/\" target=\"_blank\" rel=\"noopener\">More information<\/a> can be found on our blog at Securelist.<\/p>\n<p><b>What the misuse costs you<\/b><\/p>\n<p>According to surveys from <a href=\"http:\/\/www.europeanceo.com\/home\/featured\/2013\/04\/9120\/\" target=\"_blank\" rel=\"noopener nofollow\">Europe<\/a> and the <a href=\"http:\/\/www.salary.com\/2013-wtaw-infographic\/\" target=\"_blank\" rel=\"noopener nofollow\">United States<\/a> employees spend up to 30% of their work time on personal issues. By multiplying the spent time with the average cost of a working hour, analysts estimate the amount of damage as millions of dollars a year. Indirect losses may be even larger. Employees use desktops for social networking, sharing links to entertaining content, and downloading files from suspicious sources. At the same time, hackers actively exploit social networks for phishing and malware distribution, many personal blogs, entertainment sites, file sharing sites, torrent trackers and downloaded files are contaminated, and passwords to email accounts get regularly cracked or stolen.<\/p>\n<p>Securelist published an <a href=\"https:\/\/securelist.com\/security-policies-misuse-of-resources\/35945\/\" target=\"_blank\" rel=\"noopener\">article<\/a> by Kaspersky Lab\u2019s expert Kirill Kruglov, concerning incidents that may come as a result of the improper use of computers at work, and provided some recommendations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every fifth attack, every third bank Every fifth phishing attack over the past year focused on banking and financial institutions. These results come out of a study published by Kaspersky<\/p>\n","protected":false},"author":209,"featured_media":16429,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2029,278],"class_list":{"0":"post-906","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-business-news","10":"tag-security-research"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/information-security-digest-24-06-12-07\/906\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/information-security-digest-24-06-12-07\/906\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/information-security-digest-24-06-12-07\/906\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/business-news\/","name":"Business News"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=906"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/906\/revisions"}],"predecessor-version":[{"id":32842,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/906\/revisions\/32842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16429"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=906"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}