Security: Linux/UNIX Updates, Ztorg malware, Let's Encrypt, CIA Windows Exploits, Windows Compromised and Source Code Leaked

-
Security updates for Thursday
-
Security updates for Friday
-
Stack Clash Bug Could Compromise Linux and Unix Defenses
-
Ztorg malware hid in Google Play to send premium-rate SMS texts, delete incoming SMS messages
-
The Stack Clash Vulnerabilities Mitigated in Container Linux
Security researchers at Qualys recently disclosed new techniques to exploit stack allocations on several operating systems, even in the face of a number of security measures. Qualys was able to find numerous local-root exploits — exploits which allow local users of a system to gain root privileges — by applying stack allocation techniques against various pieces of userspace software.
-
Let's Encrypt ACME Certificate Protocol Set for Standardization
The open-source Let's Encrypt project has been an innovating force on the security landscape over the last several years, providing millions of free SSL/TLS certificates to help secure web traffic. Aside from the disruptive model of providing certificates for free, Let's Encrypt has also helped to pioneer new technology to help manage and deliver certificates as well, including the Automated Certificate Management Environment (ACME).
-
How the CIA infects air-gapped networks
Documents published Thursday purport to show how the Central Intelligence Agency has used USB drives to infiltrate computers so sensitive they are severed from the Internet to prevent them from being infected.
More than 150 pages of materials published by WikiLeaks describe a platform code-named Brutal Kangaroo that includes a sprawling collection of components to target computers and networks that aren't connected to the Internet. Drifting Deadline was a tool that was installed on computers of interest. It, in turn, would infect any USB drive that was connected. When the drive was later plugged into air-gapped machines, the drive would infect them with one or more pieces of malware suited to the mission at hand. A Microsoft representative said none of the exploits described work on supported versions of Windows.
-
WikiLeaks Publishes CIA Documents Detailing “Brutal Kangaroo” Tool and LNK Exploits
On June 22, 2017, WikiLeaks released a new cache of documents detailing four tools allegedly used by the CIA as part of its ongoing “Vault 7” campaign. The leaked tools are named “EzCheese,” “Brutal Kangaroo,” “Emotional Simian,” and “Shadow.” When used in combination, these tools can be used to attack systems that are air-gapped by using weaponized USB drives as an exfiltration channel. Per the documentation, deployment of the tool takes place by unwitting targets; however, the use of such tools could also easily be deployed purposefully by complicit insider actors.
[...]
This exploit works against Windows 7, 8, and 8.1; the current CVEs surrounding this technique are currently unknown.
-
Microsoft says 'no known ransomware' runs on Windows 10 S — so we tried to hack it
-
32TB of Windows 10 internal builds, core source code leak online
A massive trove of Microsoft's internal Windows operating system builds and chunks of its core source code have leaked online.
The data – some 32TB of installation images and software blueprints that compress down to 8TB – were uploaded to betaarchive.com, the latest load of files provided just earlier this week. It is believed the data has been exfiltrated from Microsoft's in-house systems since around March.
The leaked code is Microsoft's Shared Source Kit: according to people who have seen its contents, it includes the source to the base Windows 10 hardware drivers plus Redmond's PnP code, its USB and Wi-Fi stacks, its storage drivers, and ARM-specific OneCore kernel code.
Anyone who has this information can scour it for security vulnerabilities, which could be exploited to hack Windows systems worldwide. The code runs at the heart of the operating system, at some of its most trusted levels.
-
If these universities had run an ad blocker they might have been saved from ransomware attack
Earlier this month a number of British universities, including University College London and Ulster University reported that their systems had been hit hard by a ransomware attack.
Although initially it was thought likely that the attacks had entered the universities' servers via poisoned emails (it's very normal to see ransomware being spread via malicious email attachments), it transpires that the actual vector for infection was malvertising instead.
More details can be found in this technical article by researchers at Proofpoint, who believe that an AdGholas drive-by malvertising campaign helped infect the universities with the Mole ransomware, taking advantage of an exploit kit.
-
- Login or register to post comments
Printer-friendly version
- 4985 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
digiKam 7.7.0 is released
After three months of active maintenance and another bug triage, the digiKam team is proud to present version 7.7.0 of its open source digital photo manager. See below the list of most important features coming with this release.
| Dilution and Misuse of the "Linux" Brand
|
Samsung, Red Hat to Work on Linux Drivers for Future Tech
The metaverse is expected to uproot system design as we know it, and Samsung is one of many hardware vendors re-imagining data center infrastructure in preparation for a parallel 3D world.
Samsung is working on new memory technologies that provide faster bandwidth inside hardware for data to travel between CPUs, storage and other computing resources. The company also announced it was partnering with Red Hat to ensure these technologies have Linux compatibility.
| today's howtos
|
Recent comments
48 weeks 5 hours ago
48 weeks 6 hours ago
48 weeks 7 hours ago
48 weeks 17 hours ago
48 weeks 17 hours ago
48 weeks 20 hours ago
48 weeks 20 hours ago
48 weeks 1 day ago
48 weeks 1 day ago
48 weeks 1 day ago