CyberSecurity Pulse 2017-09-04

CyberSecurity Pulse 2017-09-04

“If you want to be the best, you’ve got to work harder than anyone else.”
Sammy Davis Jr.

Analyst Insight

The New China Measure Against Anonymity

At the end of August, the Cyberspace Administration of China (CAC) published a new regulation aimed at clarifying the criteria for publishing content on the Internet. In that document, which is conceived to be applicable on October 1, the Chinesse Administration has implemented a regulation aimed at ensuring that internet users operating on country platforms to be fully identified, relegating anonymity to the network to a purely clandestine layer.

CyberSecurity Pulse 2017-09-04The initiative is committed to exert greater pressure on the administrators of forums and Internet platforms so that these are assumed by their obligation to verify the real identity of their own users. Their obligations will include taking the appropriate measures to provide adequate protection to the data collected while ensuring at the same time the non-disclosure of any kind of data provided by users or their use for purposes other than the identification of users.

The initiative of the Chinese administration is the most recent but will not be the last. In late July, Russian President Vladimir Putin signed a law to ban the use of virtual private networks (VPNs), proxies and other technologies aimed at surfing the internet anonymously. Undoubtedly, bad times are running for those who want to remain anonymous on the network.

» More information at The Hacker News

Top Stories

Hidden Cobra: North Korea's DDoS Botnet Infrastructure

CyberSecurity Pulse 2017-09-04The new Joint Technical Alert (TA) released by the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) provides technical details of the tools and infrastructure used by cyberactors of the North Korean government to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally. DHS and FBI identified Internet Protocol (IP) addresses associated with a malware variant, known as DeltaCharlie, used to manage North Korea’s distributed denial-of-service (DDoS) botnet infrastructure.

» More information at U.S. CERT

Locating Suspect Via Stingray in United States Definitely Requires a Warrant

CyberSecurity Pulse 2017-09-04A federal judge in Oakland, California has ruled against the suppression of evidence derived from warrantless use of a cell-site simulator. The simulator, a device often referred to as a stingray, was used to locate the lead defendant in an ongoing attempted murder case. In the 39-page ruling, US District Judge Phyllis Hamilton notably found that the use of stingray to find a man named Purvis Ellis was a "search" under the Fourth Amendment and therefore required a warrant. However, in this case, the judge also agreed with the government's assertion that there were exigent circumstances, along with the "good faith exception" to the warrant requirement. In other words, use of the stingray was wholly justified.

» More information at McAfee

Rest of the Week´s News

Chrome Adds Warning for When Extensions Take Over Your Internet Connection

Google engineers have added two neat features to the Chrome browser that will alert users of extensions that hijack proxy settings or the new tab page. The changes, spotted in Google Chrome Canary builds (v62.x), are in the form of popups that appear to the right side of the screen, near the Chrome dropdown menu.

» More information at Bleeping Computer

CIA Used the AngelFire Implant Infect Systems Running Windows OS

A new batch of documents from Vault 7 leaks revealed details about a new implant, dubbed AngelFire that was used by CIA agents to infect systems running Windows OS. The documents describe the AngelFire framework implants as a persistent backdoor that infects the partition Boot Sector. According to the user manual leaked by WikiLeaks, AngelFire requires administrative privileges to compromise the target system.

» More information at Wikileaks

Google Accidentally Shuts Down Internet in Japan

Google has introduced a security defence for it's over a billion users that will help users weed out phishing emails from their Gmail inbox. The company has rolled out new anti-phishing security checks for its Gmail app for iPhone users that will display a warning about potential phishing attempts when users click on a suspicious link from within the app on their iPhone or iPad.

» More information at The Register

Further Reading

A Company Offers $500,000 For Secure Messaging Apps Zero-Day Exploit

» More information at The Hacker News

Hackers Exploited an Instagram Flaw Access Celebrity Profile Data

» More information at Security Affairs

Expert Discovered Bitcoin Miners Left Exposed on the Internet

» More information at Security Affairs