Thousands of ATMs Go Down in Indonesia After Satellite Problems

Thousands of ATMs and electronic card payment machines in Indonesia went offline over the weekend, and it might take two more weeks before full service is restored, after an outage from a satellite belonging to state-controlled telecom giant PT Telekomunikasi Indonesia (Telkom). From a report: Around 15,000 ground sites across Indonesia were affected by the problem on the ‘Telkom-1’ satellite, whose service is used by government agencies, banks, broadcasters and other corporations, Telkom’s president director Alex Sinaga told reporters on Monday. A shift in the direction of the satelliteâ(TM)s antenna, which was first detected last Friday, had disrupted connectivity. Bank Central Asia (BCA), Indonesia’s largest bank by market value, had around 5,700 of its ATMs affected by the outage, or 30 percent of the total operated by the bank, BCA chief executive Jahja Setiaatmadja told reporters. The Internet connection in some remote BCA branches were also affected, he said.



Share on Google+

Read more of this story at Slashdot.

Read the Full Article here: >Slashdot: News for nerds, stuff that matters

FIR (Fast Incident Response) – Cyber Security Incident Management Platform

FIR (Fast Incident Response) is a cyber security incident management platform designed for agility and speed. It allows for easy creation, tracking, and reporting of cybersecurity incidents.

FIR (Fast Incident Response) - Cyber Security Incident Management Platform

In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions.

Source: Wikipedia

FIR is for anyone needing to track cyber security incidents (CSIRTs, CERTs, SOCs, etc.). It’s was tailored to suit our needs and our team’s habits, but we put a great deal of effort into making it as generic as possible before releasing it so that other teams around the world may also use it and customize it as they see fit.

You can also check out Fully Integrated Defense Operation (FIDO) – Automated Incident Response and FastIR Collector – Windows Incident Response Tool.

FIR Cyber Security Incident Management Features

Here are the available fields:

  • Subject: short description of your incident. The one that will appear on event tables.
  • Business Lines: entities concerned by this incident. You choose what you make of business lines: internal department, customers, etc.
  • Category: category of the incident (ex: phishing, malware). Categories are also customizable in the admin panel.
  • Status: can take three values: Open, Closed and Blocked. These are all labels defined in the admin panel
  • Detection: how the incident was detected. Default values: CERT, External, Poleand Group. These values can be changed in the admin panel in the labels section
  • Severity: from 1 to 4.
  • Date / Time: date and time of the incident
  • Is an incident: differentiates between an event and an incident
  • Description: free-form text describing the event

When you are dealing with cybersecurity incident management, the following additional fields are available. These fields are only used for display and statistics:

  • Actor: who is the leader on this incident management? Default values are CERT and Entity
  • Plan: what is the named remediation plan used?
  • Confidentiality: from C0 to C3

You can download FIR for cyber security incident management here:

FIR-master.zip

Or read more here.

Read the Full Article here: >Darknet – The Darkside

Simple Exploit Allows Attackers to Modify Email Content — Even After It’s Sent!

Security researchers are warning of a new, easy-to-exploit email trick that could allow an attacker to turn a seemingly benign email into a malicious one after it has already been delivered to your email inbox.

Dubbed Ropemaker (stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky), the trick was uncovered by the researchers at email and cloud security firm Mimecast.

A successful exploitation of the Ropemaker attack could allow an attacker to remotely modify the content of an email sent by the attacker itself, for example swapping a URL with the malicious one.

This can be done even after the email has already been delivered to the recipient and made it through all the necessary spam and security filters, without requiring direct access to the recipient’s computer or email application, exposing hundreds of millions of desktop email client users to malicious attacks.

Ropemaker abuses Cascading Style Sheets (CSS) and Hypertext Markup Language (HTML) that are fundamental parts of the way information is presented on the Internet.

“The origin of Ropemaker lies at the intersection of email and Web technologies, more specifically Cascading Style Sheets (CSS) used with HTML,” Mimecast’s Senior Product Marketing Manager Matthew Gardiner writes in a blog post.


“While the use of these web technologies has made email more visually attractive and dynamic relative to its purely text-based predecessor, this has also introduced an exploitable attack vector for email.”

Since CSS is stored remotely, researchers say an attacker can change the content of an email through remotely initiated changes made to the desired ‘style’ of the email that is then retrieved remotely and presented to the user, without the recipient, even tech savvy users, knowing about it.

According to the researchers, the Ropemaker attack could be leveraged depending upon the creativity of the threat actors.

For instance, attackers could replace a URL that originally directed the user to a legitimate website by a malicious one that sends the user to a compromised site designed to infect users with malware or steal sensitive info, such as their credentials and banking details.

While some systems are designed to detect the URL switch preventing users from opening up the malicious link, other users could be left at a security risk.

Another attack scenario, called “Matrix Exploit” by the Mimecast, is more sophisticated than the “Switch Exploit”, and therefore much harder to detect and defend against.

In a Matrix Exploit attack, attackers would write a matrix of text in an email and then use the remote CSS to selectively control what is displayed, allowing the attacker to display whatever they want—including adding malicious URLs into the body of the email.

This attack is harder to defend against because the initial email received by the user does not display any URL, most software systems will not flag the message as malicious.

“Since the URL is rendered post-delivery, an email gateway solution such as Mimecast cannot find, rewrite, or inspect the destination site on-click, because at the time of delivery there would be no URL to detect,” the report reads. “To do so would require the interpretation of CSS files, which is beyond the scope of current email security systems.”

Although the security firm has not detected the Ropemaker attack in the wild, it believes that this doesn’t mean for sure the attack is “not being used somewhere outside the view of Mimecast.”

According to the security firm, Ropemaker could be used by hackers to bypass most common security systems and trick even the tech savvy users into interacting with a malicious URL.

To protect themselves from such attacks, users are recommended to rely on web-based email clients like Gmail, iCloud and Outlook, which aren’t affected by Ropemaker-style CSS exploits, according to Mimecast.

However, email clients like the desktop and mobile version of Apple Mail, Microsoft Outlook, and Mozilla Thunderbird are all vulnerable to the Ropemaker attack.

Read the Full Article here: >The Hacker News [ THN ]

NoSQLMap – Automated NoSQL Exploitation Tool

NoSQLMap is an open source Python-based automated NoSQL exploitation tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses in NoSQL databases. It is also intended to attack web applications using NoSQL in order to disclose data from the database.

NoSQLMap - Automated NoSQL Exploitation Tool

Presently the tool’s exploits are focused around MongoDB, but additional support for other NoSQL based platforms such as CouchDB, Redis, and Cassandra are planned in future releases.

A NoSQL (originally referring to “non SQL”, “non-relational” or “not only SQL”) database provides a mechanism for storage and retrieval of data which is modelled by means other than the tabular relations used in relational databases. Such databases have existed since the late 1960s, but did not obtain the “NoSQL” moniker until a surge of popularity in the early twenty-first century, triggered by the needs of Web 2.0 companies such as Facebook, Google, and Amazon.com.

NoSQL databases are increasingly used in big data and real-time web applications. NoSQL systems are also sometimes called “Not only SQL” to emphasize that they may support SQL-like query languages.

Requirements

On a Debian or Red Hat based system, the setup.sh script may be run as root to automate the installation of NoSQLMap’s dependencies.

Varies based on features used:

  • Metasploit Framework,
  • Python with PyMongo,
  • httpslib2,
  • and urllib available.
  • A local, default MongoDB instance for cloning databases to

There are some various other libraries required that a normal Python installation should have readily available. Your milage may vary, check the script.

Usage Options

  1. Set target host/IP-The target web server (i.e. www.google.com) or MongoDB server you want to attack.
  2. Set web app port-TCP port for the web application if a web application is the target.
  3. Set URI Path-The portion of the URI containing the page name and any parameters but NOT the host name (e.g. /app/acct.php?acctid=102).
  4. Set HTTP Request Method (GET/POST)-Set the request method to a GET or POST; Presently only GET is implemented but working on implementing POST requests exported from Burp.
  5. Set my local Mongo/Shell IP-Set this option if attacking a MongoDB instance directly to the IP of a target Mongo installation to clone victim databases to or open Meterpreter shells to.
  6. Set shell listener port-If opening Meterpreter shells, specify the port.
  7. Load options file-Load a previously saved set of settings for 1-6.
  8. Load options from saved Burp request-Parse a request saved from Burp Suite and populate the web application options.
  9. Save options file-Save settings 1-6 for future use.

You can download NoSQLMap here:

NoSQLMap-0.5.zip

Or read more here.

Read the Full Article here: >Darknet – The Darkside

Network forensics tool NetworkMiner 2.2 released

NetworkMiner is a popular network forensics tool that can parse pcap files as well as perform live sniffing of network traffic. It collects data about hosts on the network rather than to collect data regarding the traffic on the network.

NetworkMiner forensics tool

In NetworkMiner 2.2, the PCAP parsing speed has more than doubled and even more details are now extracted from analyzed packet capture files.

User interface improvements

The keyword filter available in the Files, Messages, Sessions, DNS and Parameters tabs has been improved so that the rows now can be filtered on a single column of choice by selecting the desired column in a drop-down list. There is also an “Any column” option, which can be used to search for the keyword in all columns.

The Messages tab now allows the filter keyword to be matched against the text in the message body as well as email headers when the “Any column” option is selected.

Time stamps are now instead shown using the yyyy-MM-dd HH:mm:ss format with time zone explicitly stated.

Protocol parsers

The latest version comes with an RDP parser, which is primarily used in order to extract usernames from RDP cookies and show them on the Credentials tab. Version 2.2 also comes with better extraction of SMB1 and SMB2 details, such as NTLM SSP usernames.

NetworkMiner moved to .NET Framework 4.0. This move doesn’t require any special measures to be taken for most Microsoft Windows users since the 4.0 Framework is typically already installed on these machines. If you’re running NetworkMiner in Linux, you might wanna check out an updated blog post on how to install NetworkMiner in Linux.

The developers have also added an automatic check for new versions of NetworkMiner, which runs every time the tool is started.

Read the Full Article here: >Help Net Security – News

Network Segmentation Could Save Your Small Business Millions in a Cyber Attack

For small businesses that rely on websites, smartphones and even connected devices, security is quickly becoming one of the top, if not the top priority in the digital ecosystem where they operate. An infographic from network security company Tufin titled, "Making Security Manageable Through Network Segmentation," will introduce you to a security feature you might not be aware of, network segmentation.

Read the Full Article here: >Computer Security News

Microsoft unveils ‘Minecraft’ edition Xbox One S

How devoted are you to Minecraft? Devoted enough that you want your console to be a living, breathing representation of the construction game? If so, you’re in luck. Microsoft has unveiled a limited edition Minecraft Xbox One S that drapes the entire console in Mojang’s blocky art style. There’s a grass block on the front, a transparent, redstone-laced bottom and a Creeper-themed green controller (there’s an optional pink, pig-themed gamepad). Naturally, it’ll include a copy of Minecraft (with the Better Together update).

The system arrives on October 3rd. Microsoft hasn’t detailed pricing or regional availability as we write this, but it’ll ship with a 1TB hard drive. We wouldn’t expect it to carry a significant premium over a plain Xbox One S with a bundled game, but don’t be surprised if this becomes the system to get among Minecraft players… well, those who don’t want to play in 4K, at least.

Source: Xbox Wire

Read the Full Article here: >Engadget

Sebi to chart out long term cyber security plans for markets

Sebi will deliberate with its board members next month on putting in place a long term cyber security framework for markets amid concerns over malicious software script targeting systems and possible data breaches. With technology-based platforms and high speed algorithmic systems becoming key fulcrums for trading activities, the regulatory focus is on bolstering the existing framework and ensure a robust firewall is in place to thwart possible cyber attacks.

Read the Full Article here: >Computer Security News

Hacking smartphones with malicious replacement parts

Smartphone users can now add a new entry to the list of things they need to worry about: their phones being compromised via replacement parts.

A group of researchers from Ben-Gurion University of the Negev has demonstrated that hardware replacements – e.g. touchscreens, NFC readers, wireless charging controllers, and so on – can be equipped with a chip that is capable of manipulating the device’s communication.

smartphones malicious replacement parts

And even though they haven’t gone through the trouble of doing so, they say that the whole setup can easily be made to be small enough to fit into the device, making it practically impossible for the user to discover that something is amiss.

In fact, even the person that repairs the device could be in the dark about the modification, as the replacement parts are often produced by third-party manufacturers, and are not usually checked for tampering before being installed.

Successful attacks

“Hardware replacement is traditionally considered a strong attack model, under which almost any attack is possible,” the researchers noted. But their research focused on the feasibility of attacks that depend on only one “malicious” component with an extremely limited hardware interface.

They tested three different attacks, using an experimental setup based on a low-cost micro-controller embedded in-line with the touch controller communication bus.

In the first one, they managed to impersonate the user by injecting touch events into the communication bus. This allows the installation of software, the modification of the device configuration, etc.

VIDEO

In the second one, they demonstrated that an attacker can log touch events related to sensitive operations (lock screen patterns, credentials, passwords).

In the third one, they proved that by sending crafted data to the phone over the touch controller in- terface, an attacker can exploit vulnerabilities within the device driver and gain kernel execution capabilities.

smartphones malicious replacement parts

They tested the attacks on a Huawei Nexus 6P smartphone and a LG G Pad 7.0 tablet (both running Android), but it’s likely that they would also work against devices running iOS.

Possible protection

The researchers believe that threat of a malicious peripheral existing inside consumer electronics should not be taken lightly.

“A well motivated adversary may be fully capable of mounting such attacks in a large scale or against specific targets. System designers should consider replacement components to be outside the phone’s trust boundary, and design their defenses accordingly.”

In this particular case (they tested the attacks by using a malicious replacement screen), a good way to prevent compromises would be a I2C interface proxy firewall – a low-cost, hardware-based solution.

“Such a firewall can monitor the communication of the I2C interfaces and protect the device from attacks originating from the malicious screen. Placing this device on the motherboard means that it will not be affected by malicious component replacement. The use of a hardware countermeasure allows for protection against both added malicious components and modified firmware attacks. It may also detect malicious behavior of firmware code that was modified by an insider and may be officially signed or encrypted,” they pointed out.

The final reason why it would be the perfect solution is that it does not require any changes on the CPU or component side.

Read the Full Article here: >Help Net Security – News

FBI reportedly advising companies to ditch Kaspersky apps

Kaspersky Lab’s tussle with the US government could have ramifications for its dealings with the private sector. A new report claims the FBI has been meeting with companies to warn them of the threat posed by the cybersecurity firm. The briefings are the latest chapter in an ongoing saga concerning the use of Kaspersky’s products by government agencies. Officials claim the company is a Russian stooge that can’t be trusted with protecting America’s critical infrastructure. The company denies these claims — its CEO Eugene Kaspersky has even offered up its source code in a bid to clear his firm’s name.

It appears that olive branch went unnoticed. Throughout the year, the FBI has been meeting with US firms to convince them to remove Kaspersky Lab’s tools from their systems, according to officials that spoke to CyberScoop. In view of the cyberattacks that crippled Ukraine’s power grid in 2016, the FBI has reportedly focussed its briefings on companies in the energy sector. Although, it has also supposedly met with major tech firms too.

The law enforcement agency has apparently been sharing its threat assessment with the companies, including Kaspersky Lab’s alleged deep ties with Russian intelligence. However, the meetings have reportedly yielded mixed results. Whereas firms in the energy sector have been quick to cooperate, tech giants have resisted taking swift action, claims CyberScoop.

The revelations follow a wave of allegations against Kaspersky Lab by the US government. As recently as June, a draft version of a Senate bill proposed barring the Defense Department from doing business with the company. Then, in July, a Congressional panel ordered multiple government agencies to hand over their documents and communications about the cybersecurity software provider.

In a statement released last month, the firm said: "Kaspersky Lab, and its executives, do not have inappropriate ties with any government." It’s a stance the company has reiterated multiple times to no avail.

Source: CyberScoop

Read the Full Article here: >Engadget