HackDig : Dig high-quality web security articles for hackers

Dragonfly 2.0: the sophisticated attack group is back with destructive purposes

While the first Dragonfly campaigns appear to have been a more reconnaissance phase, the Dragonfly 2.0 campaign seems to have destructive purposes. Symantec has spotted a new wave of cyber attacks against firms in the energy sector powered by the notorious Dragonfly group. The Dragonfly group, also known as Energetic Bear, has been active since at least 2011
Publish At:2017-09-07 16:19 | Read:4533 | Comments:0 | Tags:APT Breaking News Hacking critical infrastructure Dragonfly

The Evolution of Digital Certificates

In the early days of the internet, one of the first functional problems users faced was how to verify that entities on the other end of a connection were who they said they were. At first, the nebulous nature of online transactions inhibited e-commerce, since buyers feared that their payment information might be hijacked. This lack of trust precipitated the
Publish At:2017-07-25 11:50 | Read:4486 | Comments:0 | Tags:Fraud Protection Identity & Access Authentication Certificat

Who is the GovRAT Author and Mirai Botmaster ‘Bestbuy’?

In February 2017, authorities in the United Kingdom arrested a 29-year-old U.K. man on suspicion of knocking more than 900,000 Germans offline in an attack tied to Mirai, a malware strain that enslaves Internet of Things (IoT) devices like security cameras and Internet routers for use in large-scale cyberattacks. Investigators haven’t yet released the
Publish At:2017-07-05 22:10 | Read:5180 | Comments:0 | Tags:Other BestBuy Binaryvision.co.il BlueCoat danielkaye02@gmail

‘Petya’ Ransomware Outbreak Goes Global

A new strain of ransomware dubbed “Petya” is worming its way around the world with alarming speed. The malware is spreading using a vulnerability in Microsoft Windows that the software giant patched in March 2017 — the same bug that was exploited by the recent and prolific WannaCry ransomware strain. The ransom note that gets displayed on s
Publish At:2017-06-28 06:00 | Read:4139 | Comments:0 | Tags:Other Bitcoin DLA Piper Eternal Blue Group-IB ICSI ISACA Leg

eBay Asks Users to Downgrade Security

Last week, KrebsOnSecurity received an email from eBay. The company wanted me to switch from using a hardware key fob when logging into eBay to receiving a one-time code sent via text message. I found it remarkable that eBay, which at one time was well ahead of most e-commerce companies in providing more robust online authentication options, is now essential
Publish At:2017-03-23 08:00 | Read:4509 | Comments:0 | Tags:Other eBay 2FA eBay security eBay two-factor authentication

Already on probation, Symantec issues more illegit HTTPS certificates

reader comments 43 Share this story A security researcher has unearthed evidence showing that three browser-trusted certificate authorities (CAs) owned and operated by Symantec improperly issued more than 100 unvalidated transport layer security certificates. In some cases, those certificates made it possible to spoof HTTPS-protected w
Publish At:2017-01-21 11:20 | Read:7503 | Comments:0 | Tags:Law & Disorder Risk Assessment certificate authorities PKI P

Critical vulnerabilities open Symantec customers to remote hack

Symantec has fixed dozens of critical vulnerabilities affecting its solutions that can be exploited by remote attackers for arbitrary code execution. The popular Google Project Zero hacker Tavis Ormandy last month reported a number of critical security issues in Symantec solutions, and this is the good news. The bad news is that Symantec promptly fixed one o
Publish At:2016-06-29 13:30 | Read:3859 | Comments:0 | Tags:Breaking News Hacking buffer overflow Google integer overflo

High-severity bugs in 25 Symantec/Norton products imperil millions

Much of the product line from security firm Symantec contains a raft of vulnerabilities that expose millions of consumers, small businesses, and large organizations to self-replicating attacks that take complete control of their computers, a researcher warned Tuesday."These vulnerabilities are as bad as it gets," Tavis Ormandy, a researcher with Google's Pro
Publish At:2016-06-29 09:35 | Read:3937 | Comments:0 | Tags:Risk Assessment Technology Lab exploits malware Symantec vul

What Symantec’s acquisition of Blue Coat says about the CASB market

Symantec’s surprise announcement this week that it had agreed to acquire Blue Coat Systems for a whopping $4.65 billion in cash led to much discussion about how the purchase will affect the beleaguered antivirus giant, which has experienced well-documented struggles and setbacks in recent years. But there’s been much less focus on Blue Coat ̵
Publish At:2016-06-17 19:50 | Read:4113 | Comments:0 | Tags:Blue Coat CASB Symantec

Spammers Abusing Trust in US .Gov Domains

Spammers are abusing ill-configured U.S. dot-gov domains and link shorteners to promote spammy sites that are hidden behind short links ending in”usa.gov”. Spam purveyors are taking advantage of so-called “open redirects” on several U.S. state Web sites to hide the true destination to which users will be taken if they click the link.
Publish At:2016-03-18 20:45 | Read:4848 | Comments:0 | Tags:A Little Sunshine Web Fraud 2.0 1.usa.gov bit.ly malwaredoma

Still fuming over HTTPS mishap, Google makes Symantec an offer it can’t refuse

Google has given Symantec an offer it can't refuse: give a thorough accounting of its ailing certificate authority process or risk having the world's most popular browser—Chrome—issue scary warnings when end users visit HTTPS-protected websites that use Symantec credentials.The ultimatum, made in a blog post published Wednesday afternoon, came five weeks aft
Publish At:2015-10-29 12:25 | Read:4479 | Comments:0 | Tags:Risk Assessment Technology Lab certificate authorities googl

Duuzer, a data stealer Trojan targets South Korean organizations

Researchers at Symantec uncovered bad actors that have been using a backdoor Trojan dubbed Duuzer to target organizations in South Korea and elsewhere. According to Symantec, threat actors have been using a data stealer Trojan dubbed Duuzer to target organizations mainly located in South Korea. The bad actors conducted targete
Publish At:2015-10-27 10:20 | Read:4130 | Comments:0 | Tags:Breaking News Cyber Crime Malware Duuzer malware South Korea

Android.Fakelogin Trojan Targeting Banking Apps with Customized Phishing Pages

Researchers have identified a new Trojan that targets mobile banking apps with customized phishing pages in an attempt to steal users’ login credentials.According to a blog post recently published by security firm Symantec, the Trojan, which has been named “Android.Fakelogin”, is targeting primarily Russian mobile users. The malware comes i
Publish At:2015-10-23 14:30 | Read:3855 | Comments:0 | Tags:Latest Security News Android.Fakelogin banking Dridex Phishi

Security Slice: Beneficial Botnets?

Symantec recently discovered a new strain of malware, dubbed “Linux.Wifatch,” which has already infected more than 10,000 IoT devices. The malware’s author says Linux.Wifatch is actually beneficial because it removes a malicious backdoor and encourages users to update weak passwords.Do the ends of vigilante-style malware and beneficial botnets li
Publish At:2015-10-22 02:30 | Read:3694 | Comments:0 | Tags:Security Slice botnets Craig Young IoT Linux.Wifatch malware

The mystery behind the Internet-of-Things vigilante malware

A new strain of malware identified by Symantec as the Vigilante malware, aka Wifatch, has infected tens of thousands of IoT devices across the world. Who is infecting thousands of IoT devices across the world, and why? A new strain of malware, identified by Symantec as Linux.Wifatch has infected tens of thousands of IoT device
Publish At:2015-10-02 09:10 | Read:3998 | Comments:0 | Tags:Breaking News Hacking Malware Security IoT malware security

Tools

Tag Cloud