<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<rss version="2.0" 
  xmlns:content="http://purl.org/rss/1.0/modules/content/" 
  xmlns:dc="http://purl.org/dc/elements/1.1/" 
  xmlns:atom="http://www.w3.org/2005/Atom" 
  xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" 
  xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>2015 on Untrusted Network</title>
    <link>https://untrustednetwork.net/en/category/2015/</link>
    <description>Recent content in 2015 on Untrusted Network</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>&amp;copy; Jan Kopriva 2015 - {year}</copyright>
    <lastBuildDate>Wed, 11 Nov 2015 21:14:53 +0100</lastBuildDate>
    <sy:updatePeriod>weekly</sy:updatePeriod>
    <sy:updateFrequency>weekly</sy:updateFrequency>
    
        <atom:link href="https://untrustednetwork.net/en/category/2015/index.xml" rel="self" type="application/rss+xml" />
    
    
    

      
      <item>
        <title>Looking back at October 2015</title>
        <link>https://untrustednetwork.net/en/2015/11/11/looking-back-at-october-2015/</link>
        <pubDate>Wed, 11 Nov 2015 21:14:53 +0100</pubDate>
        
        <atom:modified>Wed, 11 Nov 2015 21:14:53 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/11/11/looking-back-at-october-2015/</guid>
        <description>October was named European Month of Cyber Security and because of that, many events intended to raise cyber security awareness (such as Security Fest in Prague) were held during the 30 day period. Unfortunately, October has seen just as many new developments on the proverbial &amp;ldquo;dark side&amp;rdquo; of cyber security.
One of these was a widely followed theft of personal data (including credit card numbers) of up to four milion customers of a British telecommunication service provider TalkTalk.</description>
        <content:encoded>&lt;p&gt;October was named &lt;a href=&#34;https://cybersecuritymonth.eu/&#34;&gt;European Month of Cyber Security&lt;/a&gt; and because of that, many events intended to raise cyber security awareness (such as &lt;a href=&#34;https://www.cesnet.cz/sdruzeni/akce/security-fest/&#34;&gt;Security Fest&lt;/a&gt; in Prague) were held during the 30 day period. Unfortunately, October has seen just as many new developments on the proverbial &amp;ldquo;dark side&amp;rdquo; of cyber security.&lt;br /&gt;
One of these was a widely followed theft of personal data (including credit card numbers) of up to &lt;a href=&#34;http://www.zdnet.com/article/talktalk-hack-hits-up-to-4-million-in-unencrypted-data-theft/&#34;&gt;four milion&lt;/a&gt; customers of a British telecommunication service provider TalkTalk. Russian hacker group has claimed responsibility for the attack, however the end of the month has seen &lt;a href=&#34;http://www.v3.co.uk/v3-uk/news/2431859/talktalk-ceo-receives-ransom-note-following-significant-and-sustained-cyber-attack&#34;&gt;arrest&lt;/a&gt; of a small number of young men in Great Britain in connection with the theft.&lt;br /&gt;
The &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/&#34;&gt;Stagefright&lt;/a&gt; vulnerability in the Android operating system has seen a new development with the discovery of a new vulnerability dubbed &lt;a href=&#34;http://www.androidcentral.com/what-you-need-know-about-stagefright-20&#34;&gt;Stagefright 2.0&lt;/a&gt;. The vulnerability is due to a fault in a code used for accessing multimedia files and enables a potential attacker to execute arbitrary code on the affected device. According to &lt;a href=&#34;http://arstechnica.com/security/2015/10/a-billion-android-phones-are-vulnerable-to-new-stagefright-bugs/&#34;&gt;some sources&lt;/a&gt;, the vulnerability might affect up to one bilion devices. Google has already published a patch for Stagefright 2.0, however since an update can not be provided for all Android-based devices, the vulnerability might provide to be an interesting vector of attack in the future.&lt;br /&gt;
A good final topic for &amp;ldquo;Looking back&amp;rdquo; dedicated to European Cyber Security Month might be the discovery of a new &amp;ldquo;malware&amp;rdquo; named &lt;a href=&#34;http://www.securityweek.com/tens-thousands-routers-ip-cams-infected-vigilante-malware&#34;&gt;Linux.Wifatch&lt;/a&gt;. It spreads by usual network vectors to vulnerable devices running Linux operating system and changes their configuration in a way which makes them harder for other malware to attack. The interesting point is that Wifatch performed no malicious actions on infected devices, as is documented by an &lt;a href=&#34;http://www.forbes.com/sites/thomasbrewster/2015/10/06/mystery-white-team-vigilante-hackers-speak-out/&#34;&gt;interview with its authors&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Android</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Ransomware</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at September 2015</title>
        <link>https://untrustednetwork.net/en/2015/10/18/looking-back-at-september-2015/</link>
        <pubDate>Sun, 18 Oct 2015 16:13:47 +0100</pubDate>
        
        <atom:modified>Sun, 18 Oct 2015 16:13:47 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/10/18/looking-back-at-september-2015/</guid>
        <description>Information concerning number of devices vulnerable to Heartbleed vulnerability has appeared in the news during September. Given that the existence of Heartbleed was made public almost a year and a half ago it may be surprising that the number of vulnerable devices exceeds 200.000.
Affair concerning the Stagefright vulnerability (which was mentioned in the last Looking back) continued in September when Zimperium – the company which discovered Stagefright – released a proof-of-concept code which exploits the vulnerability.</description>
        <content:encoded>&lt;p&gt;Information concerning number of devices &lt;a href=&#34;http://www.theinquirer.net/inquirer/news/2426409/heartbleed-still-affects-200-000-devices-because-vendors-are-lazy-maybe&#34;&gt;vulnerable to Heartbleed&lt;/a&gt; vulnerability has appeared in the news during September. Given that the existence of Heartbleed was made public almost a year and a half ago it may be surprising that the number of vulnerable devices exceeds 200.000.&lt;br /&gt;
Affair concerning the Stagefright vulnerability (which was mentioned in the &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/&#34;&gt;last Looking back&lt;/a&gt;) continued in September when Zimperium – the company which discovered Stagefright – &lt;a href=&#34;http://arstechnica.com/security/2015/09/attack-code-exploiting-androids-critical-stagefright-bugs-is-now-public/&#34;&gt;released&lt;/a&gt; a proof-of-concept code which exploits the vulnerability.&lt;br /&gt;
A stealth malware hidden in modified Cisco IOS images and named &lt;a href=&#34;http://arstechnica.com/security/2015/09/malicious-cisco-router-backdoor-found-on-79-more-devices-25-in-the-us/&#34;&gt;SYNful knock&lt;/a&gt; has been discovered on tens of Cisco routers around the world. The malware functions as a backdoor and besides the (persistent) IOS-embedded main component uses tens of modules which provide further functionality which it loads into volatile memory.&lt;br /&gt;
It should be mentioned that Google, Microsoft and Mozzila made a &lt;a href=&#34;http://threatpost.com/google-mozilla-microsoft-to-sever-rc4-support-in-early-2016/114498/&#34;&gt;press release&lt;/a&gt; announcing that their browsers will stop supporting the RC4 encryption algorithm early next year.&lt;br /&gt;
One final piece of interesting news we will mention has been the discovery of a malware targeted at online poker players. The trojan horse is named &lt;a href=&#34;http://www.welivesecurity.com/2015/09/17/the-trojan-games-odlanor-malware-cheats-at-poker/&#34;&gt;Odlanor&lt;/a&gt; and captures screenshots of applications used for playing poker online and then sends them to the attacker.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Heartbleed</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Cisco</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Mozzila</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at August 2015</title>
        <link>https://untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/</link>
        <pubDate>Tue, 08 Sep 2015 17:06:42 +0100</pubDate>
        
        <atom:modified>Tue, 08 Sep 2015 17:06:42 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/09/08/looking-back-at-august-2015/</guid>
        <description>One of the most important information related to cyber security pertains to August release of a patch for the Stagefright vulnerability, to which almost all versions of the Android OS from versions 2.2 to version 5.1 are vulnerable. The existence of Stagefright had been made public at the end of July and it is estimated that vulnerable device number in hundreds of millions. The vulnerability enables the attacker to cause arbitrary code execution by sending a specially crafted MMS.</description>
        <content:encoded>&lt;p&gt;One of the most important information related to cyber security pertains to August release of a patch for the Stagefright vulnerability, to which almost all versions of the Android OS from versions 2.2 to version 5.1 are vulnerable. The existence of Stagefright had been made public at the end of July and it is estimated that vulnerable device number in hundreds of millions. The vulnerability enables the attacker to cause arbitrary code execution by sending a specially crafted MMS. The released patch has unfortunately been shown to be incomplete, the result of which is that even updated devices are &lt;a href=&#34;http://www.theregister.co.uk/2015/08/17/botched_google_stagefright_fix_wont_be_resolved_until_september/&#34;&gt;still vulnerable&lt;/a&gt;.&lt;br /&gt;
Another interesting vulnerability which also affects a mobile platform (in this case iOS) is called &lt;a href=&#34;http://www.v3.co.uk/v3-uk/news/2423493/apple-ios-ins0mnia-flaw-that-hides-malicious-apps-revealed-by-fireeye&#34;&gt;Ins0mnia&lt;/a&gt;. The vulnerability enables malicious applications to circumvent OS security controls and run in the background without users knowledge (and – for example – collect sensitive information). Ins0mnia affects even non-jailbroken devices and has been patched in the iOS 8.4.1 update.&lt;br /&gt;
One further August news story has been connected to Apple products – creation of the &lt;a href=&#34;http://www.wired.com/2015/08/researchers-create-first-firmware-worm-attacks-macs/&#34;&gt;Thunderstrike 2.0&lt;/a&gt; proof-of-concept worm which is able to &lt;a href=&#34;https://www.untrustednetwork.cz/en/2015/07/18/looking-back-at-june-2015/&#34;&gt;infect firmware of Macs&lt;/a&gt;. Given the location of infected memory, it is highly problematic to detect the infection from the OS and removal of the worm requires firmware to be re-flashed.&lt;br /&gt;
Another newly discovered (however 18 years old) attack vector also exploits vulnerability connected to computer hardware. A vulnerability in &lt;a href=&#34;http://www.computerworld.com/article/2962325/computer-processors/design-flaw-in-intel-chips-opens-door-to-rootkits.html&#34;&gt;Intel&lt;/a&gt; x86 processors enables an attacker to install rootkit into memory location used by SMM (System Management Mode – a privileged mode used outside of normal OS execution).&lt;br /&gt;
One final interesting news comes from the Czech Republic and concerns signing of a &lt;a href=&#34;https://drive.google.com/file/d/0B1nMeoUI7ko4Q3dTbkVyN2RsbWs/view&#34;&gt;sectoral agreement&lt;/a&gt; about cyber security education between commercial and governmental entities.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Android</category>
            
          
            
              <category>Apple</category>
            
          
            
              <category>Intel</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Government</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at July 2015</title>
        <link>https://untrustednetwork.net/en/2015/08/05/looking-back-at-july-2015/</link>
        <pubDate>Wed, 05 Aug 2015 10:27:36 +0100</pubDate>
        
        <atom:modified>Wed, 05 Aug 2015 10:27:36 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/08/05/looking-back-at-july-2015/</guid>
        <description>The most important IT security-related news in July has definitely been the affair surrounding a theft of data from the Hacking Team – company, which develops commercial spyware intended for use by police departments and other security agencies. More than 400 GB of stolen data were made public and afterwards analyzed by IT security specialists, leading to discovery of a large number (still growing) of zero-day vulnerabilities which were used in Hacking Team’s products.</description>
        <content:encoded>&lt;p&gt;The most important IT security-related news in July has definitely been the affair surrounding a &lt;a href=&#34;http://www.tripwire.com/state-of-security/latest-security-news/hacking-team-breach-reveals-nation-state-corporate-customers/&#34;&gt;theft&lt;/a&gt; of data from the Hacking Team – company, which develops commercial spyware intended for use by police departments and other security agencies. More than 400 GB of stolen data were made public and afterwards analyzed by IT security specialists, leading to discovery of a large number (still growing) of zero-day vulnerabilities which were used in Hacking Team’s products.&lt;br /&gt;
An interesting news appeared also in connection with vehicle security. Two researchers managed to leverage a vulnerability in a wirelessly accessible on-board entertainment system of a Jeep Cherokee which enabled them to remotely &lt;a href=&#34;http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/&#34;&gt;control&lt;/a&gt; some of the vehicle’s functions and components, including transmission. Fiat Chrysler has responded to publication of the vulnerability by a &lt;a href=&#34;http://www.bbc.com/news/technology-33650491&#34;&gt;recall&lt;/a&gt; of 1.4 million of affected vehicles. Similar action in connection with software bugs/vulnerabilities was also taken by &lt;a href=&#34;http://www.bbc.com/news/technology-33506486&#34;&gt;Land Rover&lt;/a&gt; and &lt;a href=&#34;http://www.theregister.co.uk/2015/07/08/ford_car_software_recall_analysis/&#34;&gt;Ford&lt;/a&gt;.&lt;br /&gt;
A mention should be made of a press release by &lt;a href=&#34;https://www.europol.europa.eu/content/cybercriminal-darkode-forum-taken-down-through-global-action&#34;&gt;Europol&lt;/a&gt;, made in the middle of the month, regarding a successful operation to take down the Darkode cybercriminal forum. Although 28 users and administrators were arrested in, the forum &lt;a href=&#34;http://www.theregister.co.uk/2015/07/28/darkode_returns/&#34;&gt;resumed&lt;/a&gt; its operation only two weeks later.&lt;br /&gt;
Another vulnerability has also been discovered in OpenSSL, which enables an attacker to potentially use &lt;a href=&#34;http://www.theinquirer.net/inquirer/news/2416825/high-severity-bug-found-in-openssl-raises-fears-of-another-heartbleed&#34;&gt;invalid&lt;/a&gt; certificate as a valid one. A fix for the vulnerability was released only few days after its publication.&lt;br /&gt;
An interesting new &lt;a href=&#34;http://www.wired.com/2014/11/airhopper-hack/&#34;&gt;attack&lt;/a&gt; which could lead to extraction of data from an air-gapped system has also been made public. It is based on transmitting a radio signal generated by the computer using a video card bus as an antenna and received by a nearby mobile phone.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Hacking Team</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>TLS/SSL</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at June 2015</title>
        <link>https://untrustednetwork.net/en/2015/07/18/looking-back-at-june-2015/</link>
        <pubDate>Sat, 18 Jul 2015 17:29:33 +0100</pubDate>
        
        <atom:modified>Sat, 18 Jul 2015 17:29:33 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/07/18/looking-back-at-june-2015/</guid>
        <description>Probably the most interesting of security-related news in June has been an announcement by OPM (Office of Personnel Management of United States), organization which is responsible for HR services and administration of US federal employees, about an attack which exposed records for approximately four million current and past employees. The breach has apparently been active for some time before it was discovered using a special IDS called Einstein. Anonymous US officials attributed the attack to China.</description>
        <content:encoded>&lt;p&gt;Probably the most interesting of security-related news in June has been an &lt;a href=&#34;http://arstechnica.com/security/2015/06/federal-agency-hit-by-chinese-hackers-around-4-million-employees-affected/&#34;&gt;announcement&lt;/a&gt; by OPM (Office of Personnel Management of United States), organization which is responsible for HR services and administration of US federal employees, about an attack which exposed records for approximately four million current and past employees. The breach has apparently been active for some time before it was &lt;a href=&#34;http://arstechnica.com/security/2015/06/why-the-biggest-government-hack-ever-got-past-opm-dhs-and-nsa/&#34;&gt;discovered&lt;/a&gt; using a special IDS called Einstein. Anonymous US officials attributed the attack to &lt;a href=&#34;http://www.forbes.com/sites/katevinton/2015/06/11/federal-union-says-opm-data-breach-hit-every-single-federal-employee/&#34;&gt;China&lt;/a&gt;.&lt;br /&gt;
Information about a &lt;a href=&#34;http://www.tripwire.com/state-of-security/latest-security-news/hackers-steal-over-a-million-japanese-citizens-personal-data-in-targeted-attack/&#34;&gt;similar&lt;/a&gt; attack in Japan has been made available in June. Personal information about approximately 1.25 million citizens was stolen during the attack. Primary attack vector appears to have been a malicious e-mail attachment.&lt;br /&gt;
For owners and users of Apple products might be interesting news about discovery of a &lt;a href=&#34;http://arstechnica.com/security/2015/06/new-remote-exploit-leaves-most-macs-vulnerable-to-permanent-backdooring/&#34;&gt;vulnerability&lt;/a&gt;, which enables attacker to rewrite FW in older (devices shipped before the second half of 2014) Macs. The vulnerability enables the attacker to make changes in BIOS when the device is waking up from sleep (when the FLOCKDN protection which should ensure that some parts of the system are accesible in read-only mode is disabled) which may be used to gain root privileges.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Apple</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Government</category>
            
          
            
              <category>PII</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at May 2015</title>
        <link>https://untrustednetwork.net/en/2015/06/05/looking-back-at-may-2015/</link>
        <pubDate>Fri, 05 Jun 2015 00:00:57 +0100</pubDate>
        
        <atom:modified>Fri, 05 Jun 2015 00:00:57 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/06/05/looking-back-at-may-2015/</guid>
        <description>May has been at least as rich on cybersecurity incidents and events as any of the previous months of the year. Some of the more important are described in the following text.
The VENOM (Virtual Environment Neglected Operations Manipulation) vulnerability may be considered to be a very significant one. VENOM is a vulnerability in the code of a virtual floppy drive which is used by some of the virtualization platforms (QEMU, KVM, Xen).</description>
        <content:encoded>&lt;p&gt;May has been at least as rich on cybersecurity incidents and events as any of the previous months of the year. Some of the more important are described in the following text.&lt;br /&gt;
The &lt;a href=&#34;http://venom.crowdstrike.com/&#34;&gt;VENOM&lt;/a&gt; (Virtual Environment Neglected Operations Manipulation) vulnerability may be considered to be a very significant one. VENOM is a vulnerability in the code of a virtual floppy drive which is used by some of the virtualization platforms (QEMU, KVM, Xen). It enables the attacker to access underlying hypervisor from a virtualized OS using a buffer overflow attack. Since the vulnerability is non OS specific its impact is fairly high.&lt;br /&gt;
A mention should also be made of another of the TLS/SSL protocol implementation vulnerabilities, the so-called &lt;a href=&#34;https://weakdh.org/&#34;&gt;Logjam&lt;/a&gt;. Using Logjam, a downgrade of encryption is possible in man in the middle attacks on connections which use Diffie Hellman key exchange algorithm and support its export version.&lt;br /&gt;
Finally, it is noteworthy that the government has ratified an Action plan for National Cyber Security Strategy 2015 – 2020. Further information (in Czech) may be found &lt;a href=&#34;http://www.govcert.cz/cs/informacni-servis/akce-a-udalosti/vlada-schvalila-akcni-plan-k-narodni-strategii-kyberneticke-bezpecnosti-ceske-republiky-pro-pristich-pet-let-a-zpravu-o-stavu-kyberneticke-bezpecnosti-ceske-republiky-2014/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>TLS/SSL</category>
            
          
            
              <category>Virtualization</category>
            
          
            
              <category>Government</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at April 2015</title>
        <link>https://untrustednetwork.net/en/2015/05/09/looking-back-at-april-2015/</link>
        <pubDate>Sat, 09 May 2015 20:51:28 +0100</pubDate>
        
        <atom:modified>Sat, 09 May 2015 20:51:28 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/05/09/looking-back-at-april-2015/</guid>
        <description>During April, we have witnessed - among others - a discovery of an 18 years old &amp;ldquo;Redirect to SMB&amp;rdquo; vulnerability which can be used to attack all versions of Windows released since then. The vulnerability can be exploited in cases when attacker has some control over the network, enabling him to gain user login information by redirecting of network traffic to a malicious SMB (server message block) server. The server forces the target to automatic authorization process during which the target sends users login, domain and hashed password.</description>
        <content:encoded>&lt;p&gt;During April, we have witnessed - among others - a discovery of an 18 years old &lt;a href=&#34;https://autoblog.postblue.info/autoblogs/lamaredugoffrblog_a1de86d064e376dc283723997fd86bde6ba2d492/media/44593e6c.RedirectToSMB_public_whitepaper.pdf&#34;&gt;&amp;ldquo;Redirect to SMB&amp;rdquo;&lt;/a&gt; vulnerability which can be used to attack all versions of Windows released since then. The vulnerability can be exploited in cases when attacker has some control over the network, enabling him to gain user login information by redirecting of network traffic to a malicious SMB (server message block) server. The server forces the target to automatic authorization process during which the target sends users login, domain and hashed password.&lt;br /&gt;
Next to this vulnerability an April &lt;a href=&#34;https://blog.trendmicro.com/trendlabs-security-intelligence/enterprises-hit-by-bartalex-macro-malware-in-recent-spam-outbreak/&#34;&gt;discovery of a modern macro malware BALTEX&lt;/a&gt;. It spreads using phishing messages with a link to a page containing an infected Word document and instructions to enable macros. After the downloaded document is opened, the macro downloads a variant of DYRE banking malware.&lt;br /&gt;
It is also worth mentioning that the &lt;a href=&#34;http://www.rsaconference.com/&#34;&gt;RSA conference&lt;/a&gt; was held at the end of April.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Microsoft</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Malware</category>
            
          
            
              <category>RSA</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Looking back at March 2015</title>
        <link>https://untrustednetwork.net/en/2015/04/01/looking-back-at-march-2015/</link>
        <pubDate>Wed, 01 Apr 2015 00:00:24 +0100</pubDate>
        
        <atom:modified>Wed, 01 Apr 2015 00:00:24 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/04/01/looking-back-at-march-2015/</guid>
        <description>Looking back at March, probably the most important information security news has been discovery of a significant vulnerability (which could be exploited using a FREAK attack) in some TLS/SSL implementations, including the ones used by Windows operating systems.
Another worth while news has been a discovery of a new campaign aimed at energy sector companies in the Middle East. Trojan Laizok - a reconnaissance malware for gathering information about infected systems - has been used in the campaign, along with other malicious programs which have been modified for specific systems based on the information gathered by Laizok.</description>
        <content:encoded>&lt;p&gt;Looking back at March, probably the most important information security news has been &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls-ssl/&#34;&gt;discovery&lt;/a&gt; of a significant vulnerability (which could be exploited using a FREAK attack) in some TLS/SSL implementations, including the ones used by Windows operating systems.&lt;br /&gt;
Another worth while news has been a discovery of a new campaign aimed at energy sector companies in the Middle East. Trojan Laizok - a reconnaissance malware for gathering information about infected systems - has been used in the campaign, along with other malicious programs which have been modified for specific systems based on the information gathered by Laizok.&lt;br /&gt;
A mention should also be made about two very powerful DDoS attacks made during the second half of the month - first one was targeted at Greatfire.org and the second one at GitHub. According to &lt;a href=&#34;http://www.tripwire.com/state-of-security/latest-security-news/github-hit-with-massive-ddos-attack-china-allegedly-involved/&#34;&gt;published analysis&lt;/a&gt; China was the source of both attacks.&lt;br /&gt;
Finally, at the end of &amp;ldquo;Looking back&amp;rdquo; we shoud mention that in course of March the &lt;a href=&#34;https://www.untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/&#34;&gt;Rowhammer&lt;/a&gt; attack was made public. It is based on changing specific bits in memory by exploiting a weakness in DDR3 memories which leads to priviledge escalation.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Microsoft</category>
            
          
            
              <category>Rowhammer</category>
            
          
            
              <category>Windows</category>
            
          
            
              <category>Malware</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      
      <item>
        <title>Rowhammer - an attack which uses a weakness in DDR3 memory</title>
        <link>https://untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/</link>
        <pubDate>Tue, 10 Mar 2015 13:57:46 +0100</pubDate>
        
        <atom:modified>Tue, 10 Mar 2015 13:57:46 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/10/rowhammer-an-attack-which-uses-a-weakness-in-ddr3-memory/</guid>
        <description>Researchers from Google&amp;rsquo;s Project Zero have released information about a new attack based on flipping bits in DDR3 memory. The attack uses approach called Rowhammer which was devised last year by a team from Carnegie Mellon University and Intel Labs. It is based on repeated writing to and reading from a part of memory in a very short time which causes flipping values of bits in adjacent memory (the flipping is made possible by interaction between adjacent memory cells caused by their close proximity).</description>
        <content:encoded>&lt;p&gt;Researchers from Google&amp;rsquo;s Project Zero have released &lt;a href=&#34;http://googleprojectzero.blogspot.cz/2015/03/exploiting-dram-rowhammer-bug-to-gain.html&#34;&gt;information&lt;/a&gt; about a new attack based on flipping bits in DDR3 memory. The attack uses approach called Rowhammer which was &lt;a href=&#34;http://users.ece.cmu.edu/~yoonguk/papers/kim-isca14.pdf&#34;&gt;devised&lt;/a&gt; last year by a team from Carnegie Mellon University and Intel Labs. It is based on repeated writing to and reading from a part of memory in a very short time which causes flipping values of bits in adjacent memory (the flipping is made possible by interaction between adjacent memory cells caused by their close proximity).&lt;br /&gt;
Using the described principle, researchers from Project Zero created two exploits which they used to successfully elevate user privileges on a x86-64 Linux system where they achieved unrestricted access to the entire physical memory by flipping bits in page table entries (PTEs). In their announcement, they reported that the described approach was successfully used on machines with DDR3 memory without ECC (error correcting code). Flipping of bits has not been seen on machines with ECC memories. Source codes for the test program used to determine if a machine is vulnerable to Rowhammering have been released by the authors and may be found &lt;a href=&#34;https://github.com/google/rowhammer-test&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Rowhammer</category>
            
          
            
              <category>Vulnerability</category>
            
          
            
              <category>Project Zero</category>
            
          
            
              <category>Linux</category>
            
          
            
              <category>Hardware</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2015</category>
            
          
        
        
      </item>
      
      <item>
        <title>FREAK - a high impact vulnerability in TLS/SSL</title>
        <link>https://untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls/ssl/</link>
        <pubDate>Wed, 04 Mar 2015 10:06:49 +0100</pubDate>
        
        <atom:modified>Wed, 04 Mar 2015 10:06:49 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/04/freak-a-high-impact-vulnerability-in-tls/ssl/</guid>
        <description>An international research team has devised attack called FREAK (Factoring attack on RSA Export Keys) with which it is possible to lower the level of encryption used in SSL connections. Attack is based on forcing server and client to use legacy (the vulnerability has been present for a long time) weak cryptographic suites which are still supported by some of the mainstream browsers (Safari and OpenSSL-based Android browser among others) and servers.</description>
        <content:encoded>&lt;p&gt;An international research team has devised attack called &lt;a href=&#34;https://www.smacktls.com/#freak&#34;&gt;FREAK&lt;/a&gt; (Factoring attack on RSA Export Keys) with which it is possible to lower the level of encryption used in SSL connections. Attack is based on forcing server and client to use legacy (the vulnerability has been present for a long time) weak cryptographic suites which are still supported by some of the mainstream browsers (Safari and OpenSSL-based Android browser among others) and servers. After a key has been factored a man-in-the-middle attack may be launched by attacker against encrypted connection between a server and a browser. The aformentioned legacy cryptographic suites have been added to SSL implementations at a time when export regulations for cryptographic material were in effect in USA and only specific (weak) cryptographic suites were legally allowed to be exported. A link to a page containing further information about potentially vulnerable sites and a test for vulnerability on the client side may be found &lt;a href=&#34;https://freakattack.com/&#34;&gt;here&lt;/a&gt;.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>TLS/SSL</category>
            
          
            
              <category>Cryptography</category>
            
          
            
              <category>Vulnerability</category>
            
          
        
        
          
            
              <category>News</category>
            
          
            
              <category>2015</category>
            
          
        
        
      </item>
      
      <item>
        <title>Looking back at February 2015</title>
        <link>https://untrustednetwork.net/en/2015/03/03/looking-back-at-february-2015/</link>
        <pubDate>Tue, 03 Mar 2015 09:58:57 +0100</pubDate>
        
        <atom:modified>Tue, 03 Mar 2015 09:58:57 +0100</atom:modified>
        <guid>https://untrustednetwork.net/en/2015/03/03/looking-back-at-february-2015/</guid>
        <description>Dramatic information security incidents and news were unfortunately fairly common in February – we will shortly remember three of the most interesting ones.
Most attention was probably gained by a story about an alleged theft of massive amount of encryption keys used in mobile communication from the network of Dutch company Gemalto (a major SIM card supplier) by NSA and GCHQ. The keys could be used to decrypt live communication and also, for example, remotely inject malicious code into end devices.</description>
        <content:encoded>&lt;p&gt;Dramatic information security incidents and news were unfortunately fairly common in February – we will shortly remember three of the most interesting ones.&lt;/p&gt;
&lt;p&gt;Most attention was probably gained by a story about an alleged theft of massive amount of encryption keys used in mobile communication from the network of Dutch company Gemalto (a major SIM card supplier) by NSA and GCHQ. The keys could be used to decrypt live communication and also, for example, remotely inject malicious code into end devices. Source of the story has been The Intercept, citing a &lt;a href=&#34;https://firstlook.org/theintercept/document/2015/02/19/cne-access-core-mobile-networks-2/&#34;&gt;document&lt;/a&gt; from 2010 which was acquired by Edward Snowden, formerly from the NSA. After the news went public Gemalto stock took a &lt;a href=&#34;http://www.theregister.co.uk/2015/02/20/gemalto_sim_surveillance_fallout/&#34;&gt;serious hit&lt;/a&gt;. The company responded couple of days later by a &lt;a href=&#34;http://www.gemalto.com/press/Pages/Gemalto-presents-the-findings-of-its-investigations-into-the-alleged-hacking-of-SIM-card-encryption-keys.aspx&#34;&gt;press release&lt;/a&gt; admitting that operation by NSA and GCHQ resulting in penetration of internal company network probably happened, but emphasizing that the penetration “could not have led to a massive theft of encryption keys”. Gemalto further stated that “in the case of eventual key theft, the intelligence services would only be able to spy on second generation 2G mobile network” since “3G and 4G networks are not vulnerable to this type of attack”.&lt;/p&gt;
&lt;p&gt;Another high impact February news has been that the Superfish adware (which is used to inject ads into viewed web pages based on analysis of viewed pictures) which Lenovo used to &lt;a href=&#34;http://www.theregister.co.uk/2015/02/19/superfish_lenovo_spyware/&#34;&gt;preinstall&lt;/a&gt; on their laptops installed a self-signed root certificate. Using that, the adware could generate certificates for web pages which user viewed using encrypted connections, replacing the legitimate certificates and compromising security of communication between the user and the web page. Superfish was then able to analyze and alter the SSL encrypted communication. Furthermore, since the root certificated seems to have been always the same and itself &lt;a href=&#34;http://www.tripwire.com/state-of-security/security-data-protection/superfish-lenovo-adware-faq/&#34;&gt;not very secure&lt;/a&gt;, its presence in a system constitutes a vulnerability which can be used quite easily by a potential attacker. Since discovering this, &lt;a href=&#34;http://www.cnet.com/news/lenovo-hit-by-lawsuit-over-superfish-adware/&#34;&gt;lawsuits&lt;/a&gt; have been filed against Lenovo and web pages of the company have been &lt;a href=&#34;http://www.v3.co.uk/v3-uk/news/2397144/lizard-squad-hackers-attack-lenovo-after-superfish-scandal&#34;&gt;defaced&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;It should also be noted that in the course of February, after being criticized by Microsoft (among others), Google decided to &lt;a href=&#34;http://www.infosecurity-magazine.com/news/google-blinks-first-with-project/&#34;&gt;change&lt;/a&gt; the policy of its Project Zero – an initiative which, after a vulnerability has been discovered in an application, gave 90-day deadline to its developers to work on a patch. After the deadline has passed the vulnerability was made public regardless of existence of a patch or its planed later release. This has been the case for Microsoft and a vulnerability in Windows 8.1 when the 90-day deadline ended &lt;a href=&#34;http://blogs.technet.com/b/msrc/archive/2015/01/11/a-call-for-better-coordinated-vulnerability-disclosure.aspx&#34;&gt;two days&lt;/a&gt; before planned release of a patch during Patch Tuesday, regular release of updates and patches by Microsoft. Google now grants developers up to 2 weeks reprieve after the deadline has passed, provided they are actively working on patching the vulnerability.&lt;/p&gt;
</content:encoded>
        <dc:creator>Jan Kopriva</dc:creator>
        
        
        
        
          
            
              <category>Gemalto</category>
            
          
            
              <category>NSA</category>
            
          
            
              <category>GCHQ</category>
            
          
            
              <category>Snowden</category>
            
          
            
              <category>Lenovo</category>
            
          
            
              <category>Adware</category>
            
          
            
              <category>Google</category>
            
          
            
              <category>Microsoft</category>
            
          
            
              <category>Project Zero</category>
            
          
        
        
          
            
              <category>2015</category>
            
          
        
        
          
            
              <category>Looking back</category>
            
          
        
      </item>
      

    
  </channel>
</rss>