CyberSecurity Pulse 2017-09-18

CyberSecurity Pulse 2017-09-18

“You never fail until stop trying.”
Albert Einstein

Analyst Insight

Kaspersky Against American Institutions to Defend Its Products

The Kremlin believes that the US decision to stop using Kaspersky Lab products in state organizations casts a shadow over Washington as a partner. "This, in general, [casts] a shadow over the image of our American counterparts as reliable partners," Kremlin Press Secretary Dmitry Peskov told reporters, commenting on refusal of the US authorities to use the Russian company’s products.

CyberSecurity Pulse 2017-09-18"The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies, and requirements under Russian law that allow Russian intelligence agencies to request or compel assistance from Kaspersky and to intercept communications transiting Russian networks," according to a DHS statement issued Wednesday.

Kaspersky Lab said Russian laws and policies, which it said were being misinterpreted, applied to telecom companies and internet service providers (ISPs) and not to Kaspersky since it didn't offer communication services. "Kaspersky Lab has never helped, nor will help, any government in the world with its cyberespionage or offensive cyber efforts, and it's disconcerting that a private company can be considered guilty until proven innocent, due to geopolitical issues," the statement said. "The company looks forward to working with DHS, as Kaspersky Lab ardently believes a deeper examination of the company will substantiate that these allegations are without merit".

Without any doubt, we are in front of a new branch of the espionage events of the last months. The arising of new suspicious between the parts involved is still to be resolved, but a solution seems to be even further with the passage of the time.

» More information at Tass


Top Stories

Critical Bluetooth Vulnerability Puts Billions of Devices at Risk

CyberSecurity Pulse 2017-09-18Security researchers have just discovered total 8 zero-day vulnerabilities in Bluetooth protocol that impact more than 5.3 billion devices from Android, iOS, Windows and Linux to the Internet of things (IoT) devices using the short-range wireless communication technology. Using these vulnerabilities, security researchers at IoT security firm Armis have devised an attack, dubbed BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a man-in-the-middle connection to gain access to devices' critical data and networks without requiring any victim interaction.

» More information at The Hacker News
 

Some States Return to Paper Ballots Following 2016 Election Hacks

CyberSecurity Pulse 2017-09-18The Virginia Board of Elections announced last Friday that it will stop using electronic voting machines in the state. The board’s action is the latest sign that state and local election agencies are trying to address growing concerns that the nation's election infrastructure is vulnerable to hacking. In this sense, the hacking collective Chaos Computer Club (CCC) has uncovered a selection of serious vulnerabilities in some of Germany’s voting software. "We could have changed every single submitted result," Linus Neumann, a CCC spokesperson. Neumann explained that the researchers were able to take over the server that provides software updates to PC-Wahl and insert a malicious program that manipulates the votes.

» More information at GovTech and The Daily Beast


Rest of the Week´s News

Equifax CEO Formally Called to Testify Before Congress

The CEO of the credit reporting company Equifax has been called to testify before congressional lawmakers at the beginning of October. Republicans on the House Energy and Commerce Committee sent a letter to Equifax CEO Richard Smith on Wednesday formally requesting his testimony before members of the committee on October 3.

» More information at The Hill
 

Apache Struts Vulnerability Affects Versions Since 2008

Man Yue Mo, a researcher that has disclosed the remotely executable Apache Struts vulnerability said that it was "a result of unsafe deserialization in Java" and could lead to arbitrary code execution. Mo originally disclosed the issue to Apache on July 17, 2017. The flaw allows miscreants to inject malicious code into any server running a Struts application that uses the popular REST communication method, and execute it.

» More information at The Register
 

CCleaner Supply Chain Compromised to Distribute Malware

According to researchers, the version 5.33 that was available for download between August 15 and September 12 was modified to include the Floxif malware. The Floxif malware downloader is used to gathers information (computer name, a list of installed applications, a list of running processes, MAC addresses for the first three network interfaces) about infected systems and to download and run other malicious binaries.

» More information at Security Affairs


Further Reading

Hackers Can Bypass New Protections in MacOS High Sierra

» More information at SC Magazine
 

Samsung Launches Bug Bounty Program

» More information at The Hacker News
 

Zerodium Offers $1 Million for Tor Browser 0-Days

» More information at The Hacker News


facebooktwitterlinkedinmail