Test your web browser’s cryptojacking protection

Cryptojacking is a relatively new threat on the Internet. It refers to websites abusing computing resources of visitors to mine cryptocurrency.

Internet users notice that something is wrong when the computer they use slows down to a crawl suddenly and when fans speed up in an attempt to cool down components of the device that get hammered.

The main issue with cryptojacking is that it is done behind the backs of users. Sites load cryptomining scripts on load to mine cryptocurrency using the resources of the computer of the user visiting the site. There is no opt-in process or information on what is going on.

Sites run these scripts to generate revenue. One of the advantages of running mining operations in the browser is that it happens in the background. It does not interfere with the site’s layout or content.

Browser extensions may load crypto mining scripts as well. These work in the background just like scripts loaded by sites.

Cryptojacking Test

cryptojacking test

Opera Software was the first browser-making company that implemented anti-crypto mining protections in the browser natively.

While Opera was the first browser, content-blocking lists added cryptomining scripts before Opera did so.

Opera Software engineers created a site that you may visit to test whether you are protected against cryptojacking.

Visit the website and click on the start button on it to run the test. It won’t take longer than a couple of seconds to complete and the result is either that the browser that you are using is protected or unprotected.

Opera Software displays aggregate ratings on the site as well. 73.6% of all users are protected from cryptojackingat the time of writing according to the statistics on the page.

Users who run browsers that are not protected have several options at their disposal to protect their browsers against crypto mining attacks.

  1. Use a browser extension that protects against JavaScript mining scripts.
  2. Use the Opera browser with ad-blocking enabled.
  3. Use a security software that protects against mining scripts.
  4. Install an anti-mining browser extension.
  5. Disable JavaScript on untrusted sites.

Closing Words

Opera tests the protection against a Coin Hive script only which leaves the possibility that the browser is vulnerable to these scripts. It is only a matter of time usually before new scripts or URLs do get blocked though.

Now You: Did you run into cryptomining sites in the past?

Related articles

Summary

Article Name

Test your web browser’s cryptojacking protection

Description

Cryptojacking is a new threat on the Internet. It refers to sites loading scripts that mine cryptocurrency using visitor’s devices. Take the Cryptojacking Test to find out if you are protected.

Author

Martin Brinkmann

Publisher

Ghacks Technology News

Logo

Read the Full Article here: >Top 100 Network Security Tools

USBPcap – USB Packet Capture For Windows

USBPcap is an open-source USB Packet Capture tool for Windows that can be used together with Wireshark in order to analyse USB traffic without using a Virtual Machine.

USBPcap - USB Packet Capture For Windows

Currently, the live capture can be done on “standard input” capture basis: you write a magic command in cmd.exe and you get the Wireshark to capture raw USB traffic on Windows.

USBPcapDriver has three “hats”:

  • Root Hub (USBPCAP_MAGIC_ROOTHUB
  • Control (USBPCAP_MAGIC_CONTROL)
  • Device (USBPCAP_MAGIC_DEVICE)

What you won’t see using USBPcap

As USBPcap captures URBs passed between functional device object (FDO) and physical device object (PDO) there are some USB communications elements that you will notice only in hardware USB sniffer.

These are:

  • Bus states (Suspended, Power ON, Power OFF, Reset, High Speed Detection Handshake)
  • Packet ID (PID)
  • Split transactions (CSPLIT, SSPLIT)
  • Duration of bus state and time used to transfer packet over the wire
  • Transfer speed (Low Speed, Full Speed, High Speed)

Moreover, you won’t see complete USB enumeration. You will only see the USB control transfer send to device after the device has been assigned its address.

There is also this to check out:

SnoopyPro – Windows USB Sniffer Tool

You can download USBPcap here:

Windows: USBPcapSetup-1.2.0.3.exe
Source: USBPcap-1.2.0.3.zip

Or read more here.

Read the Full Article here: >Darknet – The Darkside

Organizations could face up to $19 billion in losses if a cloud provider is hacked

If a hacker were to gain control of a cloud provider for over three days, businesses could face losses up to a whopping $19 billion, with SMBs carrying the largest economic and insurance losses, according to a new report. In partnership with the American Institutes for Research , insurance market Lloyd’s of London is unveiling a new report detailing the financial impact of a cyberattack on a US cloud provider.

Start the conversation, or Read more at BetaNews.

Read the Full Article here: >Computer Security News

Canadian university scammed out of $11.8 million

MacEwan University in Edmonton, Alberta, is the latest confirmed victim of scammers.

university scam

“On Wednesday, August 23, MacEwan University discovered it had been the victim of a phishing attack. A series of fraudulent emails convinced university staff to change electronic banking information for one of the university’s major vendors. The fraud resulted in the transfer of [Canadian] $11.8 million to a bank account that staff believed belonged to the vendor,” the Canadian university shared.

After the fraud was discovered, the university conducted an audit of business processes through its internal audit group and with the help of outside experts.

“Preliminary assessment has determined that controls around the process of changing vendor banking information were inadequate, and that a number of opportunities to identify the fraud were missed,” they noted.

Since them, additional controls were put in place to prevent further incidents.

Once the fraud was discovered after the real vendor complained of non-payment, the accounts to which the funds were sent were traced to Canada and Hong Kong, and local law enforcement agencies were contacted.

Corporate security units of banks involved with the e-transfers were also notified, and they managed to freeze the funds. The university is working with legal counsel in Montreal, London and Hong Kong to pursue civil action to recover the money.

No further details about the phishing attack were revealed, but it’s obvious this is a variant of the business email compromise (BEC) scam: the so-called “payment instruction switch” or “the supplier swindle.”

“There is never a good time for something like this to happen,” said university spokesman David Beharry, “but as our students come back to start the new academic year, we want to assure them and the community that our IT systems were not compromised during this incident. Personal and financial information, and all transactions made with the university are secure. We also want to emphasize that we are working to ensure that this incident will not impact our academic or business operations in any way.”

Read the Full Article here: >Help Net Security – News

Oops! WikiLeaks Website Defaced By OurMine

OurMine is in headlines once again—this time for defacing

WikiLeaks

website.

The notorious hacking group, OurMine, is known for breaching into high-profile figures and companies’ social media accounts, including Facebook CEO

Mark Zuckerberg

, Twitter CEO

Jack Dorsey

, Google CEO

Sundar Pichai

,

HBO

,

Game of Thrones

and Sony’s

PlayStation Network

(PSN).

According to screenshots circulating on

Twitter

, the official website of WikiLeaks has reportedly been defaced by the OurMine hacking group, who left a message on the site, as shown above.

WikiLeaks is a whistleblowing website that since March, has been revealing top CIA hacking secrets under

Vault 7

, including the agency’s ability to break into

different mobile

and

desktop platforms

, security camera

live video streams

,

air-gap computers

and many more.

There is no indication of WikiLeaks servers and website been compromised, instead it seems their website has been redirected to a hacker-controlled server using DNS poisoning attack.

In DNS poisoning attack, also known as DNS spoofing, an attacker gets control of the DNS server and changes a value of name-servers in order to divert Internet traffic to a malicious IP address.

Shortly after the defacement, the site administrators regained access to their DNS server and at the time of writing, the WikiLeaks website is back online from its official legitimate servers.

OurMine is a Saudi Arabian group of hackers which claims to be a “white hat” security firm.

The group markets itself by taking over social media accounts of high-profile targets and then encourages them to contact the hacking group to buy its IT security service in an effort to protect themselves from future cyber attacks.

Read the Full Article here: >The Hacker News [ THN ]

SAP point-of-sale systems were totally hackable with $25 kit

https://ift.tt/2wewKgm

Point-of-Sale systems from SAP had a vulnerability that allowed them to be hacked using a $25 Raspberry Pi or similar device, according to research unveiled at the Hack in the Box conference in Singapore last week.

Critical vulnerabilities in SAP’s POS – since resolved – created a means for hackers not only to steal customers’ card data but to gain unfettered control over the server, enabling them to change prices of goods with the help of a simple device, according to ERPScan.

Read the Full Article here: >Hack In The Box

Hacking a Phone Through a Replacement Touchscreen

Researchers demonstrated a really clever hack: they hid malware in a replacement smart phone screen. The idea is that you would naively bring your smart phone in for repair, and the repair shop would install this malicious screen without your knowledge. The malware is hidden in touchscreen controller software, which is trusted by the phone.

The concern arises from research that shows how replacement screens — one put into a Huawei Nexus 6P and the other into an LG G Pad 7.0 — can be used to surreptitiously log keyboard input and patterns, install malicious apps, and take pictures and e-mail them to the attacker. The booby-trapped screens also exploited operating system vulnerabilities that bypassed key security protections built into the phones. The malicious parts cost less than $10 and could easily be mass-produced. Most chilling of all, to most people, the booby-trapped parts could be indistinguishable from legitimate ones, a trait that could leave many service technicians unaware of the maliciousness. There would be no sign of tampering unless someone with a background in hardware disassembled the repaired phone and inspected it.

Academic paper. BoingBoing post.

Read the Full Article here: >Schneier on Security: Cybercrime Paper

FIR (Fast Incident Response) – Cyber Security Incident Management Platform

FIR (Fast Incident Response) is a cyber security incident management platform designed for agility and speed. It allows for easy creation, tracking, and reporting of cybersecurity incidents.

FIR (Fast Incident Response) - Cyber Security Incident Management Platform

In the fields of computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions.

Source: Wikipedia

FIR is for anyone needing to track cyber security incidents (CSIRTs, CERTs, SOCs, etc.). It’s was tailored to suit our needs and our team’s habits, but we put a great deal of effort into making it as generic as possible before releasing it so that other teams around the world may also use it and customize it as they see fit.

You can also check out Fully Integrated Defense Operation (FIDO) – Automated Incident Response and FastIR Collector – Windows Incident Response Tool.

FIR Cyber Security Incident Management Features

Here are the available fields:

  • Subject: short description of your incident. The one that will appear on event tables.
  • Business Lines: entities concerned by this incident. You choose what you make of business lines: internal department, customers, etc.
  • Category: category of the incident (ex: phishing, malware). Categories are also customizable in the admin panel.
  • Status: can take three values: Open, Closed and Blocked. These are all labels defined in the admin panel
  • Detection: how the incident was detected. Default values: CERT, External, Poleand Group. These values can be changed in the admin panel in the labels section
  • Severity: from 1 to 4.
  • Date / Time: date and time of the incident
  • Is an incident: differentiates between an event and an incident
  • Description: free-form text describing the event

When you are dealing with cybersecurity incident management, the following additional fields are available. These fields are only used for display and statistics:

  • Actor: who is the leader on this incident management? Default values are CERT and Entity
  • Plan: what is the named remediation plan used?
  • Confidentiality: from C0 to C3

You can download FIR for cyber security incident management here:

FIR-master.zip

Or read more here.

Read the Full Article here: >Darknet – The Darkside

Simple Exploit Allows Attackers to Modify Email Content — Even After It’s Sent!

Security researchers are warning of a new, easy-to-exploit email trick that could allow an attacker to turn a seemingly benign email into a malicious one after it has already been delivered to your email inbox.

Dubbed Ropemaker (stands for Remotely Originated Post-delivery Email Manipulation Attacks Keeping Email Risky), the trick was uncovered by the researchers at email and cloud security firm Mimecast.

A successful exploitation of the Ropemaker attack could allow an attacker to remotely modify the content of an email sent by the attacker itself, for example swapping a URL with the malicious one.

This can be done even after the email has already been delivered to the recipient and made it through all the necessary spam and security filters, without requiring direct access to the recipient’s computer or email application, exposing hundreds of millions of desktop email client users to malicious attacks.

Ropemaker abuses Cascading Style Sheets (CSS) and Hypertext Markup Language (HTML) that are fundamental parts of the way information is presented on the Internet.

“The origin of Ropemaker lies at the intersection of email and Web technologies, more specifically Cascading Style Sheets (CSS) used with HTML,” Mimecast’s Senior Product Marketing Manager Matthew Gardiner writes in a blog post.


“While the use of these web technologies has made email more visually attractive and dynamic relative to its purely text-based predecessor, this has also introduced an exploitable attack vector for email.”

Since CSS is stored remotely, researchers say an attacker can change the content of an email through remotely initiated changes made to the desired ‘style’ of the email that is then retrieved remotely and presented to the user, without the recipient, even tech savvy users, knowing about it.

According to the researchers, the Ropemaker attack could be leveraged depending upon the creativity of the threat actors.

For instance, attackers could replace a URL that originally directed the user to a legitimate website by a malicious one that sends the user to a compromised site designed to infect users with malware or steal sensitive info, such as their credentials and banking details.

While some systems are designed to detect the URL switch preventing users from opening up the malicious link, other users could be left at a security risk.

Another attack scenario, called “Matrix Exploit” by the Mimecast, is more sophisticated than the “Switch Exploit”, and therefore much harder to detect and defend against.

In a Matrix Exploit attack, attackers would write a matrix of text in an email and then use the remote CSS to selectively control what is displayed, allowing the attacker to display whatever they want—including adding malicious URLs into the body of the email.

This attack is harder to defend against because the initial email received by the user does not display any URL, most software systems will not flag the message as malicious.

“Since the URL is rendered post-delivery, an email gateway solution such as Mimecast cannot find, rewrite, or inspect the destination site on-click, because at the time of delivery there would be no URL to detect,” the report reads. “To do so would require the interpretation of CSS files, which is beyond the scope of current email security systems.”

Although the security firm has not detected the Ropemaker attack in the wild, it believes that this doesn’t mean for sure the attack is “not being used somewhere outside the view of Mimecast.”

According to the security firm, Ropemaker could be used by hackers to bypass most common security systems and trick even the tech savvy users into interacting with a malicious URL.

To protect themselves from such attacks, users are recommended to rely on web-based email clients like Gmail, iCloud and Outlook, which aren’t affected by Ropemaker-style CSS exploits, according to Mimecast.

However, email clients like the desktop and mobile version of Apple Mail, Microsoft Outlook, and Mozilla Thunderbird are all vulnerable to the Ropemaker attack.

Read the Full Article here: >The Hacker News [ THN ]