Malware Used in Aramco Attack Likely Work of Amateurs

wiredmikey writes with this excerpt from Security Week: “The Disttrack/Shamoon malware, while destructive, appears to be the work of amateurs and not elite and sophisticated developers, according to the latest analysis. The malware proved that it was possible for developers to subvert legitimate kernel-mode applications for malicious purposes, but it appears that the malware could have been even more destructive and dangerous, if it had not been for a series of programming mistakes in the code, according to recent analysis from Kaspersky Lab. Other suggestions that the developers behind the Shamoon malware are not high-profile programmers include that the command-and-control server is hard-coded as two addresses, which limits the tool since if the address ever changes, the infected machine can no longer receive instructions. The developers were most likely motivated by political reasons, as the malware overwrote existing files with a fragment of an image of a burning American flag. The Malware has also been reported to be linked to the recent Saudi Aramco attack, which some reports have suggested that insiders may have been partly involved. Saudi Aramco hasn’t officially said what type of malware hit its systems.”


Share on Google+

Read more of this story at Slashdot.


Written by: Unknown Lamer at https://news.slashdot.org/story/12/09/12/158219/malware-used-in-aramco-attack-likely-work-of-amateurs?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

Ankit Fadia site again Hacked and Suspended by Hosting provider

Another Funny news, today India’s most popular but Self Claimed Hacker – Ankit Fadia’s website just got hacked by a 17 Year old kid Kul Verma. His official Website https://ankitfadia.in/ got hacked and seems like his Hosting Provider has suspended his website on noticing something not correct with his site.<!– adsense –>
Hacker hacked by a kid, this Questions the capability of Mr. Ankit Fadia


Written by: noreply@blogger.com (Mohit Kumar) at https://thehackernews.com/2012/09/ankit-fadia-site-again-hacked-and.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Daily+Cyber+News+Updates%29

Top 7 Tech-Related Amul Banners Of 2012

A tribute to Dr Verghese Kurien: memorable one-liners from the Amul girl.

The Milk Man of India, Dr Verghese Kurien, started the White Revolution in the country in the 1950s. Dr Kurian passed away on September 9th. Amul was originally an acronym for Anand Milk Union Limited, which finds its roots in the tiny village of Anand in Gujarat.

The Amul girl highlights the country’s plight every week with witty one-liners, as you’re probably aware. As a tribute to Dr Kurien, we look back at seven of the best hoardings from this year.
 


Written by: kamakshi at https://da.feedsportal.com/c/33242/f/556609/s/234c538c/l/0L0Stechtree0N0Ccontent0Cfeatures0C18510Ctop0E70Eamul0Ebanners0E20A120Bhtml/ia1.htm

Security firm notes sharp increase in SMS phishing attacks

https://www.flickr.com/photos/erikschlange/3515786155/

As more users turn to their mobile devices to conduct business, researchers are tracking a significant uptick in SMS phishing attacks that can lead to financial and identity theft.

The scams work by sending victims text messages that direct them to call spurious numbers thought to be banking institutions, credit card services or even government agencies.

Tags: 


Written by: l33tdawg at https://news.hitb.org/content/security-firm-notes-sharp-increase-sms-phishing-attacks

MarkMonitor Releases Q2 2012 Fraud Intelligence Report

The MarkMonitor Fraud Intelligence Report for the second quarter of 2012 is now available. According to the report, Phish attack volume rose 7% from the previous quarter to 177,369 attacks. A four-quarter rising trend has resulted in an 82% increase from Q2 2011.

Quarterly Trend of Phish Attacks – Q2 2011 to Q2 2012

Other findings reported:

Growth in Targeted Brands Continues – The number of targeted brands increased 2% from the first quarter to 601. This extends a growth trend over three quarters.

Attacks per Brand Also Continued to Grow Over the Last Four Quarters – Attacks per brand volume grew 4% from Q1 2012 to 295. A rising trend over four quarters has resulted in a 51% increase from Q2 2011.

Payment Services Gaining on Financial Sector as Most Popular Phishing Sector – The Financial sector continued to be the most phished industry, accounting for 34% of phish attacks, but the Payment Services sector came in a close second with 32% of attacks. Payment Services phish continued its sharp rise from Q4 2011, growing 59% in Q2 2012 to 56,937 attacks, 138% above its level a year earlier.

ISP and Government Phish on the Rise – ISP phish continued a four quarter growth trend, increasing 24% in Q2 2012 to 10,315 attacks for year-over-year growth of 470%. Government sector phish continued its growth from Q4 2011, increasing 43% from the previous quarter to 3,210 attacks and was 77% above its level from a year ago.

Brands from Five Countries are Targeted by Almost 90% of Phish Attacks – The top five targeted brand countries in Q2 2012 were the U.S., China, the U.K., Brazil and Italy, which together accounted for 89% of phishing attacks. Phishing attacks targeting American brands continued to increase their share, growing to 66% from 59% in the previous quarter, while attacks targeting Chinese brands continued to decrease their share, declining to 8% from 13%.

Five Countries Host Almost 70% of Phishing Attacks – The top five phish-hosting countries — the U.S., Germany, the U.K., Canada and Brazil — accounted for 69% of phishing sites this quarter.

For more detail, download the report here:

MarkMonitor Fraud Intelligence Report, Q2 2012


Written by: (author unknown) at https://www.circleid.com/posts/20120911_markmonitor_releases_q2_2012_fraud_intelligence_report/

The more they happen, the more they remain the same.

UBS reported a rogue trader attack and informed losses to the extent of over USD 2.3 Billion.

 

Links to the story can be found at

https://www.ft.com/intl/cms/s/0/d5547ba0-e05b-11e0-ba12-00144feabdc0.html#axzz1ZhGoMU1H
https://www.ubs.com/1/e/media_overview/media_global/releases.html?newsId=195150

As is customary nowadays, any incident is reported as effect of rogue trade. Banks in a momentary lapse of concentration fail to dwell on how a back office trader can run losses of over USD 2 billion, which in effect means unauthorised trades of many more billions.

Coming closely on the heels of the Socgen rogue trade, there is not much information yet on the modus operandi for the UBS scandal, but initial reports suggest a very similar methodology between Socgen and UBS such as dealing in complex financial instruments, exceeding authorisations and so on.

The initial disclosure by UBS indicates that the “positions had been offset in our systems with fictitious, forward-settling, cash ETF positions, allegedly executed by the trader”, which means that there was an individual who had complete access to the back office as well as the dealing room, or can only be attributed to a complete . This would mean that the fundamentals of investment banking which requires that back office be as distinct from front office and mid office was by passed. It is early days yet and only a full investigation will reveal the whole truth.

Till then do we blame the rogue trader or the Frankenstien that created the rogue trader.