CyberSecurity Pulse 2016-10-20
|“Whoever is careless with the truth in small matters cannot be trusted with important matters.”|
Senior Turkish Government Officials Affected by Advanced Malware
Traditional security solutions are not enough to tackle samples which are very fresh and which could be related to targeted attacks, since they are unlikely to be found on black lists. However, defense technology against advanced malware can be the solution to threats that pose a significant probability of being implemented in all kinds of entities, both corporate and governmental.
Google Updates Its Stats about Governamental Requests
Google has just updated its transparency report on government requests for users’ data. Globally, the company has received 44,943 government requests for information regarding 76,713 different accounts during the first half of 2016. Google has confirmed that it has provided user information in response to 64% of those requests, a number which remains unchanged from the previous reporting period. The company has also pinpointed in this version of the report that this period has been the first one in which they receive requests from several countries such as Algeria, Belarus, Cayman Islands, El Salvador, Fiji, or Saudi Arabia.
WikiLeaks Confirms Ecuador Cut Julian Assange’s Internet Access After Clinton Leak
Early Monday, whistleblowing site WikiLeaks tweeted that the internet connection of its co-founder, Julian Assange, was intentionally cut down, for which it blamed an unidentified state party. WikiLeaks has confirmed that its founder Julian Assange’s Internet access was cut down in its London embassy by the government of Ecuador on Saturday. Assange has been living in Ecuador’s London embassy since June 2012, when he was granted asylum by the Ecuador government after a British court ordered his extradition to Sweden to face questioning on a rape allegation.
Rest of the Week´s News
Ethereum Network Is Strengthened Against DDoS Attacks with Its First Hard-fork
The first of two hard-forks scheduled to run on the network Ethereum was held last October 20. In this first fork, the objectives are to modify the transaction costs and the execution of intelligent contracts to provide further protection against denial of service attacks (DDoS) such as the ones received by the network since September.
An Interesting Technique To Exfiltrate Data From Magento Platforms
Cybercriminals have been using image files to store and exfiltrate payment card data stolen from the target website. This last wave of attacks targeted over 100 online shops running on Magento, Powerfront CMS and OpenCart e-commerce platforms.
The New TrickBot Banking Trojan Seems To Have Been Developed by Dyre Authors
In November 2015, Dyre activity ceased. But now security experts at Fidelis Cybersecurity believe that the evolution of the TrickBot malware has a strong connection to Dyre banking trojan. The code of the new banking Trojan seems to have been rewritten with a different coding style, but maintaining many functionalities.