Risks, Ransomware, Data Leaks, Oh My! – PSW #630 | SC Media
Threat hunting

Risks, Ransomware, Data Leaks, Oh My! – PSW #630

December 13, 2019



In the Security News, Reveton ransomware schemer stripped of six years of freedom, £270,000, and Rolex, Web-hosting firm 1&1 hit by almost €10 million GDPR fine over poor security at call centre, iPR Software Exposed Thousands via a Humongous Corporate Data Leak, and how the FBI assesses Russian apps may be counterintelligence threat!

Visit https://www.securityweekly.com/psw for all the latest episodes!

Full Episode Show Notes

To learn more about our sponsors visit: The Security Weekly Sponsor's Page

Risks, Ransomware, Data Leaks, Oh My!

Paul's Stories

  1. Your Smart Christmas Lights Are Safer Than They Were Last Year - There is hope for IoT security! (and I own these lights, and hopefully the new version...or maybe hopefully the old version so I can more easily hack my Christmas tree): The good news is that researchers at Pen Test compared tests they did on the Twinkly lights (from the manufacturer LEDWORKs) last year to the new version of the lights released for the 2019 holiday season and found most of the issues to be solved. LEDWORKS replaced the ESP8266 module with the slightly more secure ESP32, which researchers mentioned in their public research about the security of the lights last year was a better option than the one already in the product.
  2. Exploring Legacy Unix Security Issues | Liquidmatrix Security Digest
  3. Intels SGX coughs up crypto keys when scientists tweak CPU voltage - 'By subtly increasing or decreasing the current delivered to a CPU—operations known as "overvolting" and "undervolting"—a team of scientists has figured out how to induce SGX faults that leak cryptographic keys, break integrity assurances, and potentially induce memory errors that could be used in other types of attacks. The breakthrough leading to these attacks was the scientists' ability to use previous research into the undocumented model-specific register inside the x86 instruction set to abuse the dynamic voltage scaling interface that controls the amount of voltage used by a CPU. Also noteworthy is surgically controlling the voltage in a way that introduces specific types of attacks.
  4. Russian police raid NGINX Moscow office | ZDNet
  5. Reusing Cookies
  6. Consumers not willing to compromise when it comes to IoT security - Help Net Security - It's one thing to say in a survey that you care about the security of your IoT devices, but another when you are actually shopping and realize that a device with the same functionality can be purchased for 75% cheaper than the "secure" one.
  7. AirDoS: Hackers Can Block iPhones, iPads Via AirDrop Attack | SecurityWeek.Com - Annoying: Bagaria discovered that an attacker can use the AirDoS attack to “infinitely spam” all nearby iPhones and iPads with an AirDrop popup. The dialog box will keep appearing on the screen regardless of how many times the user presses the Accept or Decline buttons. The attack will continue even after the user locks and unlocks the device.
  8. Shenzhen's Homegrown Cyborg
  9. How Hackers Are Breaking Into Ring Cameras - Enable two-factor, this is just a password spraying/guessing attack. The tools being traded and sold also sound really lame (and probably have backdoors put in by the authors).
  10. Bloomberg accidentally created an Alexa Fleshlight and oh my gawd - Okay, relax everyone, it's an ear. That's they, er, uh, wrong security hole?
  11. 4 Steps to Communicate Anything Clearly, According to a Scientist Who Teaches Quantum Physics to Kids - I love 1, 2 and 4. #3 would not fly for most audiences we present to, but again depends on the audience.
  12. InfoSec Handlers Diary Blog - Integrating Pi-hole Logs in ELK with Logstash - I mean, because, why not? This is really great.
  13. New PyXie Python RAT targets multiple industries
  14. Use Hash-Identifier to Determine Hash Types for Password Cracking
  15. 20 VPS providers to shut down on Monday, giving customers two days to save their data | ZDNet
  16. Scientists Crack Longest, Most Complex Encryption Key Ever

Jeff's Stories

  1. Lessons from the NSA: Know Your Assets Should be "Lessons from NSA: Know Your Assets" :-)
  2. Windows Security review: There are better options, but not for the 'price'
  3. Cyber Security: Revisiting the Questions the Board Should Ask
  4. Cyber Attack Halts Radiation Treatment By Oahu Cancer Center
  5. 2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

Lee's Stories

  1. Reveton ransomware schemer stripped of six years of freedom, ₤270,000, and Rolex This was malvertizing which loaded fake ransomware which tricked users into making payments via older techniques rather than actually encrypting files. The prosecution estimates he collected closer to £720,000, the court has given him 3 months to collect the fine, or face two years in jail and the fine remains.
  2. Mobile devices blur work and personal privacy increasing Cyber Risks BYOD encapsulates the problem, but this applies to COPE and even personal devices in the workspace. Consider OPSEC - data capture, employee location discovery, business conversations in insecure locations.
  3. These Kids‘ smartwatches have problems as simple as 123 Duiwoim, Jsbaby, and Smarturtle smartwatches being sold on Amazon that could be exploited by attackers to eavesdrop on and track children. Same default password (1213456), Amazon hasn't decided to pull them. Primary difference between the watch models is the box.
  4. Web-hosting firm 1&1 hit by almost €10 million GDPR fine over poor security at call centre Largest GDPR fine so far. Fine being appealed, security approved, initially too easy to obtain other customer data.
  5. iPR Software Exposed Thousands via a Humongous Corporate Data Leak Marketing firm iPR Software exposed thousands of customer records for a month through protected S3 bucket. Organizations affected include General Electric, Dunkin Donuts, CenturyLink, Xerox, Nasdaq, California Courts and Mercury Public Affairs. Bucket open 10/15-11/26/19.
  6. FBI assesses Russian apps may be counterintelligence threat Particular concerns over FaceApp and Russian laws which permit government access to device and user data.


[caption id="attachment_210" align="alignleft" width="120"]Jeff Man Jeff Man - Sr. InfoSec Consultant[/caption] [caption id="attachment_210" align="alignleft" width="120"]Larry Pesce Larry Pesce - Senior Managing Consultant and Director of Research[/caption] [caption id="attachment_210" align="alignleft" width="120"]Lee Neely Lee Neely - Senior Cyber Analyst[/caption] [caption id="attachment_210" align="alignleft" width="120"]Paul Asadoorian Paul Asadoorian - Founder & CTO[/caption] [caption id="attachment_210" align="alignleft" width="120"]Tyler Robinson Tyler Robinson - Managing Director of Network Operations[/caption]



  • We have exciting news about the Security Weekly webcast program: We are now partnered with (ISC)2 as an official CPE provider! If you attend any of our webcasts, you will be receiving 1 CPE credit per webcast! Register for one of our upcoming webcast with Zane Lackey of Signal Sciences, Ian McShane from Endgame, or Stephen Smith and Jeff Braucher of LogRhythm (or all 3!) by going to securityweekly.com/webcasts If you have missed any of our previously recorded webcasts, you can find our on-demand library at securityweekly.com/ondemand

[audio src="http://traffic.libsyn.com/sw-all/PSW_630_-_Security_News-0_converted.mp3"]

prestitial ad