Mobile Office——SMS phishing
January 18, 2019
Case Analysis
This story starts from an SMS message and ends with financial loss, sounding just like an ordinary telecom fraud. But it is distinctive in that a malicious link and a web page that contains a trojan are leveraged, indicating that the attacker is quite tech-savvy. After the mobile phone is infected with the trojan, the hacker can listen for and intercept SMS verification codes in the background. By using such information and the user’s ID card number and bank account information previously collected, the perpetrator can sign up for the quick pay service.
The Daily Briefing
January 18, 2019
CyberWire – Yesterday Troy Hunt announced, to considerable éclat, the discovery of a large trove of credentials for sale in a dark web souk. He calls it “Collection #1.” The hood offering the material for sale goes by the nom-de-hack of “Sanixer.” KrebsOnSecurity contacted Sanixer and concluded that the material is relatively old, gleaned from […]
NSFOCUS Detects Two Satan Variants Targeting Financial Sector
January 17, 2019
In early November of 2018, NSFOCUS spotted the first variant of Satan malware that targets Linux and Windows systems and spreads by exploiting various application vulnerabilities. A few weeks later, NSFOCUS came across a second variant of this Satan, capable of self-propagation via Windows and Linux platforms. These two variant detections are just another […]
NSFOCUS Identifies IP Chain-Gangs in New Cybersecurity Insights Report
January 17, 2019
Report Studies and Analyzes DDoS Attacks as Coordinated Gang-Activities SANTA CLARA, Calif., January 17, 2019 – NSFOCUS, a leader in holistic hybrid security solutions, today released its Behavior Analysis of IP Chain-Gangs report, a follow up to their H1 Cybersecurity Insights report, which found that more than 27 million attack sources detected by NSFOCUS, 25 […]
ThinkPHP 5.0.* Remote Code Execution Vulnerability Handling Guide
January 17, 2019
1 Vulnerability Overview
Recently, ThinkPHP 5.0.* is prone to a remote code execution vulnerability that has been officially fixed. All related users should stay wary and take precautions as soon as possible. (more…)
Morning Cybersecurity: Cyberattacks could cost trillions globally
January 17, 2019
POLITICO – OUCH! CYBERCRIME LOSSES WILL STING — Research out today from Accenture found that cyberattacks could cost companies worldwide some $5.2 trillion over five years. That’s according to more than 1,700 CEOs and C-suite executives in Accenture’s first survey of business leaders on the financial toll from criminal hackers. High tech is expected take […]
ThinkPHP 5 Remote Code Execution Vulnerability Threat Alert
January 16, 2019
Overview
On January 11, ThinkPHP addressed a remote code execution vulnerability. This vulnerability stems from the Request class’s (thinkphp/library/think/Request.php) lack of sufficient input validation when handling requests, which finally leads to remote code execution. (more…)
Technical Report on Container Security (IV)-3
January 16, 2019
Container Security Protection – Host Security Host Security Hardening of Basic Host Security Containers share the operating system kernel with the host. Therefore, host configuration determines whether containers can be executed in a secure manner. For example, vulnerable software puts the host at risk of arbitrary code execution; opening ports at will exposes the host […]
Microsoft’s January 2019 Patch Fixes 51 Security Vulnerabilities Threat Alert
January 15, 2019
Overview
Microsoft released the January 2019 security patch on Tuesday that fixes 51 vulnerabilities ranging from simple spoofing attacks to remote code execution in various products, including .NET Framework, Adobe Flash Player, Android App, ASP.NET, Internet Explorer, Microsoft Edge, Microsoft Exchange Server, Microsoft JET Database Engine, Microsoft Office, Microsoft Office SharePoint, Microsoft Scripting Engine, Microsoft Windows, Microsoft XML, Servicing Stack Updates, Visual Studio, Windows COM, Windows DHCP Client, Windows Hyper-V, Windows Kernel, and Windows Subsystem for Linux. (more…)
IP Reputation Report-01112019
January 11, 2019
Top 10 countries in attack counts: The above diagram shows the top 10 regions with the most malicious IP addresses from the NSFOCUS IP Reputation databases at January 11, 2019. Top 10 countries in attack percentage: From the diagram above, we can see the region Palestinian Territory has the biggest percentage of malicious IPs. The […]