Blackshades + hacking = prison

NEW YORK – Sending a message intended to deter cybercrime, a judge Tuesday sentenced the co-creator of the Blackshades malware program to nearly five years in prison for running an operation that infected more than a half-million computers worldwide.

Swedish citizen Alex Yücel, 25, asked for leniency and said he felt contrition for marketing the malware to hackers bent on secretly controlling computers so they could steal passwords, owners’ identities and more.

He’s one of roughly 97 suspects arrested last year in a U.S.-led global investigation of a scheme that operated from 2010 to 2013 and marketed Blackshades’ Remote Access Tool — RAT — for $40 per download. The criminal enterprise generated gross sales of roughly $350,000 while spreading electronic havoc.

http://www.usatoday.com/story/money/2015/06/23/blackshades-sentencing-yucel/29175447/

Enterprise Cloud Security Issues

Untitled-1
On an average, companies used 738 cloud services in 2014. The cloud is a transformational shift in technology and has realized greater enterprise usage. Companies have adopted cloud services to grow their business potential and profits. The most popular enterprise cloud services used were Amazon Web Services, Office 365, Sales force, Cisco Webex and Box. Employees bring many consumer apps with them to work. Some popular consumer services include Facebook, Twitter, Apple iCloud, You tube and LinkedIn. The use of consumer and enterprise cloud applications together at the same work platform makes data vulnerable to security breaches. Employees tend to put sensitive data on the cloud such as banking account details, sensitive financial information such as revenue models, pricing models etc and other enterprise intellectual property. Majority of employees set the same passwords for their enterprise accounts as well as consumer accounts which lead to a wider range of security breaches as everything in the cloud is interconnected and accessible. Around 86.5GB of data was uploaded to high-risk malware services by each company last year. These high-risk services include Video Sharing, Photo Sharing, Slide Sharing, Web Conferencing and File Sharing. The info graphic shows the distribution of data uploaded to each service. Due to the ease of accessibility and security issues in the cloud, this sensitive enterprise data has been accessed and violated by 3000 Malware anomalies per day.

Cryptolocker

fin

Spread of Financial Malware

Financial Malwares are malicious softwares designed to steal credit card details and online banking passwords, redirect online banking transactions, extract money and may even take control over your data. CryptoLocker was a popular ransomware, infecting over 250000 systems, encrypts system files and demands a ransom for decrypting them. CryptoLocker is installed by the ZeuS Trojan, which had compromised over 74000 accounts of companies like Bank of America, NASA, Oracle etc. Gameover Zeus was another widespread Trojan which captured banking credentials of over 1 million users worldwide. In June 2014, U.S. Department of Justice announced that it has curbed the Gameover ZeuS infection through Operation Tovar. Yet, these malwares are still propagating through new variants and peer-to-peer connection.

The attackers are demanding a ransom-payment of roughly $300 in a number of different payment methods, including Bitcoin.

For the most part, CryptoLocker is spreading via various phishing campaigns, including some from legitimate businesses, or through phony Federal Express or UPS tracking notifications mostly through emails.

Internet of Things (IoT)

iot

IoT Security Challenges

Virtually, anything from a lightbulb to a car can be connected and operated through the Internet. This phenomenon is being called the Internet of Things (IoT). IoT has seen a rapid growth with major companies implementing IoT connected devices. The number of IoT connected devices is predicted to reach 5 billion by 2020.

Though, IoT increases the number of security risks for consumers and business risks for businesses. More opportunities are being provided to hackers to commit cybercrimes. Google has recently partnered with major automobile industries Audi, General Motors and Honda to put Android-connected cars on the road. This makes it possible to start/turn off your car through your computer or smartphone. As promising as it sounds, the number of Android Malwares are at an all-time high.

Since, IoT’s use embedded operating systems which are exposed to a variety of vulnerabilities. Listed below are seven major IoT security threats which consumers can expect:

1. Disruption and Denial of Service Attacks

2. Understanding the exposure to security threats.

3. Issues in upgrading custom firmware to fix patches

4. Identifying and implementing security controls and monitoring

5. Identify legitimate and malicious data patterns from IoTs

6. Modular hardware and software components

7. Huge Bandwidth requirement.[/wr_column]]

IoT2020
IoT Security Challenges

Virtually, anything from a lightbulb to a car can be connected and operated through the Internet. This phenomenon is being called the Internet of Things (IoT). IoT has seen a rapid growth with major companies implementing IoT connected devices. The number of IoT connected devices is predicted to reach 5 billion by 2020.

Though, IoT increases the number of security risks for consumers and business risks for businesses. More opportunities are being provided to hackers to commit cybercrimes. Google has recently partnered with major automobile industries Audi, General Motors and Honda to put Android-connected cars on the road. This makes it possible to start/turn off your car through your computer or smartphone. As promising as it sounds, the number of Android Malwares are at an all-time high.

Since, IoT’s use embedded operating systems which are exposed to a variety of vulnerabilities. Listed below are seven major IoT security threats which consumers can expect:

1. Disruption and Denial of Service Attacks

2. Understanding the exposure to security threats.

3. Issues in upgrading custom firmware to fix patches

4. Identifying and implementing security controls and monitoring

5. Identify legitimate and malicious data patterns from IoTs

6. Modular hardware and software components

7. Huge Bandwidth requirement.

[/wr_column][/wr_row]

GamaPOS: The New Point-of-Sale Malware Targeting U.S. Companies

A new breed of point-of-sale (PoS) threat currently spreading across the United States and Canada through the Andromeda botnet.

The GamaPoS threat launches a spam campaign to distribute Andromeda backdoors, infects systems with PoS malware, and hopes to catch target PoS systems out of sheer volume. Rough estimates show us that GamaPOS may have only hit 3.8% of those affected by Andromeda.

The systems get infected with the Andromeda backdoor after users either open a malicious attachment or visit a site hosting an exploit kit. Attachments are often disguised as documents needed for PCI DSS compliance or updating the company’s Oracle MICROS platform.The GamaPoS infection starts when victims access malicious emails that contain attachments such as macro-based malware or links to compromised websites hosting exploit kit content. At some point GamaPOS gets launched on users PC.

Once converted into Andromeda bots, the affected machines can now be manipulated via a control panel, letting cyber criminals perform different commands. GamaPoS targets a range of cards, including Visa and Discover, their users are exposed to the risk of hack. Finally, it would attempt to upload the collected data via the command-and-control server

Darkode Malware Marketplace Shut Down

The advertised products included personal information from customers who participated in an automobile auction, personal information of 39,000 people from a database of Social Security numbers and 20 million emails and usernames that could be used to target people for identity theft, phishing emails or other schemes.

The programs for sale included “ransomware,” a virus that can lock a computer or network until a ransom is paid to the hacker who installed it.

Those arrested or searched live in the United States, United Kingdom, Australia, Bosniz-Herzegovina, Brazil, Canada, Colombia, Costa Rica, Croatia, Cyprus, Denmark, Finland, Germany, Israel, Latvia, Macedonia, Nigeria, Romania, Serbia and Sweden. There are victims in all of those countries, and others, authorities said.

Darkode is responsible for hundreds of millions in financial losses, the FBI said. The scale of the investigation, which involved 20 countries, was unprecedented.

CutThePrice-a big nuisance for browsers

CutThePrice is offered as a tool for savings and online shopping. Actually, this program is adware classified as PUP (potentially unwanted program) because it can compromise your security. CutThePrice adware is often deceptively installed with other free programs and updates.

CutThePrice is installed as a Windows application. It is also installed in your web browsers as extension, add-on, or browser helper object.

You will find many folders in program files or program files(X86) location with variations of his produt name such as cuttthePRice, cutthePRICE, cutthepprice..and so on. It brings down many chnage sin your browser home page, search page and makes browsing very slow.

Mobile Exposure to Web Based Threats

Mobile devices are constantly connected to a network. This connectivity exposes them to vulnerabilities and illegitimate access. There are various threats that mobile devices can encounter, namely, application threats, web-based threats, network threats and physical threats. Application threats are software pieces which are downloaded onto your phone usually in the form of an app. They seem to be completely normal but are designed to commit fraud or take over your phone’s resources. Malware, Spyware, Privacy threats and Exposure to Vulnerabilities are some types of application-based threats. Malware eats up your phone’s resources and changes the performance and functionality of your phone for the worse. Spyware and Privacy threats commit security breaches by invading into personal data and transmitting it to the hacker. Some apps may provide access through vulnerabilities which allows hackers to perform undesirable actions on your phone.

WebBasedThreats

Then, there are web-based threats. Since the mobile device is connected to the Internet and are frequently used to access web services, they pose threats such as Phishing scams, Drive-by Downloads and Browser Exploits. Phishing scams deceive you into providing personal and financial information through email, messages, social media etc. Drive-By Downloads automatically downloads a file when you visit a webpage, allowing it access to your device resources. It is seen that around 60% of web-based threats are malicious. They propagate a virus or some kind of malware which depreciates the usage of your phone. 21% of web-based threats are Phishing scams which intend to seize financial information. The remaining 19% consist of Compromised attacks which uses vulnerabilities to stop functioning of an application the way it is supposed to. Even popular applications and OS like Java, Adobe Reader, Windows and Internet Explorer and Android are common targets.