CyberSecurity Pulse 2017-09-18
|“You never fail until stop trying.”|
Kaspersky Against American Institutions to Defend Its Products
"The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies, and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks," according to a DHS statement issued Wednesday.
Kaspersky Lab said Russian laws and policies, which it said were being misinterpreted, applied to telecom companies and internet service providers (ISPs) and not to Kaspersky since it didn't offer communication services. "Kaspersky Lab has never helped, nor will help, any government in the world with its cyberespionage or offensive cyber efforts, and it's disconcerting that a private company can be considered guilty until proven innocent, due to geopolitical issues," the statement said. "The company looks forward to working with DHS, as Kaspersky Lab ardently believes a deeper examination of the company will substantiate that these allegations are without merit".
Without any doubt, we are in front of a new branch of the espionage events of the last months. The arising of new suspicious between the parts involved is still to be resolved, but a solution seems to be even further with the passage of the time.
Critical Bluetooth Vulnerability Puts Billions of Devices at Risk
Security researchers have just discovered total 8 zero-day vulnerabilities in Bluetooth protocol that impact more than 5.3 billion devices from Android, iOS, Windows and Linux to the Internet of things (IoT) devices using the short-range wireless communication technology. Using these vulnerabilities, security researchers at IoT security firm Armis have devised an attack, dubbed BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a man-in-the-middle connection to gain access to devices' critical data and networks without requiring any victim interaction.
Some States Return to Paper Ballots Following 2016 Election Hacks
The Virginia Board of Elections announced last Friday that it will stop using electronic voting machines in the state. The board’s action is the latest sign that state and local election agencies are trying to address growing concerns that the nation's election infrastructure is vulnerable to hacking. In this sense, the hacking collective Chaos Computer Club (CCC) has uncovered a selection of serious vulnerabilities in some of Germany’s voting software. "We could have changed every single submitted result," Linus Neumann, a CCC spokesperson. Neumann explained that the researchers were able to take over the server that provides software updates to PC-Wahl and insert a malicious program that manipulates the votes.
Rest of the Week´s News
Equifax CEO Formally Called to Testify Before Congress
The CEO of the credit reporting company Equifax has been called to testify before congressional lawmakers at the beginning of October. Republicans on the House Energy and Commerce Committee sent a letter to Equifax CEO Richard Smith on Wednesday formally requesting his testimony before members of the committee on October 3.
Apache Struts Vulnerability Affects Versions Since 2008
Man Yue Mo, a researcher that has disclosed the remotely executable Apache Struts vulnerability said that it was "a result of unsafe deserialization in Java" and could lead to arbitrary code execution. Mo originally disclosed the issue to Apache on July 17, 2017. The flaw allows miscreants to inject malicious code into any server running a Struts application that uses the popular REST communication method, and execute it.
CCleaner Supply Chain Compromised to Distribute Malware
According to researchers, the version 5.33 that was available for download between August 15 and September 12 was modified to include the Floxif malware. The Floxif malware downloader is used to gathers information (computer name, a list of installed applications, a list of running processes, MAC addresses for the first three network interfaces) about infected systems and to download and run other malicious binaries.