Sponsor

2013/11/19

| 11.19.13 | Cybercrime is big business; Re-engineered Google Play apps steal data

If you are unable to see the message below, click here to view.

Editor's Corner:
Cybercrime is big business

What's New:
1. Re-engineered Google Play apps steal data, warns BitDefender
2. vBulletin admits network was breached, personal information of users stolen
3. A majority of IT pros are frustrated with their current BYOD security product, survey says
4. Infographic: Most US travelers use public Wi-Fi without protecting their data
5. Increasing cyber threats spurring 29.4 percent CAGR in smart grid cybersecurity market, says TechNavio

Spotlight:
Adobe ColdFusion is vulnerable to cross-site scripting attack, warns CERT

Also Noted:
Yahoo to encrypt data traffic; Google upgrades SSL certificates; Much more...

News From The Fierce Network:
1. Most enterprise mobile apps are vulnerable to common exploits, warns HP
2. Pfizer looks to cut its dosage of BlackBerry
3. Your employees probably hate your mobile apps, study finds

FierceITSecurity

November 19, 2013

Subscribe | Website
Refer FierceITSecurity to a Colleague

Follow @fierceitsec on Twitter


Editor's Corner

Cybercrime is big business

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

While other parts of the economy are stagnating, cybercrime is booming, according to research conducted by Joe Stewart, Dell SecureWorks' director of malware research for the Counter Threat Unit, and independent researcher David Shear.

They found that the underground market for stolen credentials and hacker services is thriving. Credit card information is always a popular item in this marketplace.

Want to set up your own botnet? No problem. You can buy malware-infected computers for between $20 and $250, depending on how many bots are on the computer.

In addition, exploit kits are available--for the right price. The Sweet Orange exploit kit can be leased at a sweet $450 per week or $1,800 per month.

Would you like a website hacked and data stolen? No problem, just pay a hacker a couple hundred dollars and you'll have your data.

Want to launch a distributed denial of service attack against your bitter rival? No problem. That can be had for $3 to $5 per hour, $90-$100 per day or $400-$600 per week.

You can even hire a hacker to engage in "doxing" for between $25 and $100. What is doxing, you ask? Elizabeth Clarke, with Dell SecureWorks, explains: "Doxing is when a hacker is hired to get all the information they can about a target victim. Their methods include searching public information sites, social media sites, as well as manipulating the victim via social engineering and infecting them with an information-stealing Trojan."

Clarke adds: "For the most part, it does not appear that the types of hacker services and stolen data for sell on the hacker underground have changed dramatically in the past several years. The only noticeable difference is the drop in price for online bank account credentials and the drop in price for Fullz or Personal Credentials."  

That's the marketplace at work: an abundance of stolen credentials means that cyber criminals need to drop their prices to compete.

Laissez-faire economics at its best (or worst). - Fred

Read more about: cybercrime, stolen credit cards

Marketplace

> IT Made Easy with ManageEngine ServiceDesk Plus
> eBook: Making BYOD Work

What's New

1. Re-engineered Google Play apps steal data, warns BitDefender

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

Around 5,077 applications, or 1.2 percent, of 420,646 Google Play apps analyzed by security firm Bitdefender are stolen from other developers and re-engineered to steal data and perform other malicious activities, related Loredana Botezatu, e-threat analyst for Bitdefender, in a blog.

The survey shows that applications uploaded by 2,140 verified developers are over 90 percent identical, not including the library code (code that can be used by multiple developers), to the work of other developers on Google Play.

"These duplicates or repackaged applications should not be mistaken with different versions of an app. Here, it's about a publisher who takes an application, reverse-engineers its code, adds aggressive advertising SDKs [software development kits] or other beacons, then repackages and distributes it as his own," explained Bitdefender Chief Security Strategist Catalin Cosoi.

Some of these duplicates are able to access location information on the Android device, leak the device ID, or connect to social media platforms without the user's knowledge.

"By design, Android applications can be disassembled, modified and reassembled to provide new functionalities. This way an attacker can easily rip an APK off the Play Store, turn it into program code, modify it and distribute it as its own," wrote Botezatu.

"Most modifications add a new Advertising SDK in the repackaged app or change the Advertiser ID from the original app so revenue obtained through ad platforms gets diverted from the original developer to the individual who plagiarizes their work," she added.

Bitdefender advised Android users "to exercise extreme caution" when installing Google Play apps and to review app permission requests carefully.

For more:
- read Botezatu's blog

Related Articles:
Trend Micro: Android malware threats, high-risk apps eclipse 1M mark
Symantec uncovers 1,200 malicious apps on Google Play this year

Read more about: Google Play
back to top


2. vBulletin admits network was breached, personal information of users stolen

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

Online forum software maker vBulletin has admitted that its network was breached and that personal information of users was stolen.

"Very recently, our security team discovered sophisticated attacks on our network, involving the illegal access of forum user information, possibly including your password. Our investigation currently indicates that the attackers accessed customer IDs and encrypted passwords on our systems," explained Wayne Luke, vBulletin lead technical support, in a forum post on Friday.

vBulletin said it reset passwords for account users. "Please choose a new password and do not use the same password you used with us previously. We also highly recommend that you chose a password that you are not using on any other sites," Luke advised.

Hacker group Inj3ct0r Team took credit for the hack, as well as a hack of MacRumors.com. The group said it discovered a zero-day hole in vBulletin's forum software.

"We got shell database and root server. We wanted to prove that nothing in this world is not safe [sic]. We found a critical vulnerability in vBulletin all versions 4.x.x and 5.?.x. We've got upload shell in vBulletin server, download database and got root," the group explained in a Facebook post.

According to security researcher Brian Krebs, the hackers used a "clever cross-site-scripting attack" to hack into MacRumors, which runs vBulletin software.

"Interestingly, several individuals appear to be selling what they claim are zero-day exploits in vBulletin 4.x and 5.x," explained Krebs. Inj3ct0r "advertised a copy of the supposed exploit for $7,000, available for payment via virtual currencies Bitcoin and WebMoney," he added.

However, vBulletin said that it is not aware of any zero-day holes in current versions of its software. "Given our analysis of the evidence provided by the Inject0r team, we do not believe that they have uncovered a 0-day vulnerability in vBulletin," Luke wrote.

"These hackers were able to compromise an insecure system that was used for testing vBulletin mobile applications. The best defense against potential compromises is to keep your system running on the very latest patch release of the software," he added.

For more:
- see vBulletin's advisory
- check out Inj3ct0r Team's post
- read Krebs' blog

Related Articles:
Enterprise users make up majority of mobile security client software market
Microsoft warns about zero-day hole that impacts Windows, Office and Lync

Read more about: Brian Krebs, network breach
back to top


3. A majority of IT pros are frustrated with their current BYOD security product, survey says

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

A majority of IT professionals said their companies are dissatisfied with their current BYOD security product and want to replace it, according to a survey of 895 IT and IT security professionals by the Ponemon Institute on behalf of email security firm Zix Corp.

More than 60 percent of respondents said their companies support BYOD, yet 46 percent of those companies do not have tools or policies in place to secure corporate data.

More than two in five respondents said their companies have limited BYOD deployment due to employee resistance to putting security tools on personal devices and inadequate security tools.

"The speed at which BYOD took hold of the business community is unlike any technology trend we've seen before," commented Larry Ponemon, chairman and founder of the Ponemon Institute.

"Companies are swiftly adopting BYOD to enable work productivity and create efficiencies but are hitting significant road bumps in cost, security and employee concerns. The evolution of BYOD solutions to overcome these challenges is necessary for full adoption across companies and among the entire employee base," he added.

In addition, more than one-third of respondents said their companies only use mobile device password policies for security.

"Understanding the current state of BYOD and companies' goals and concerns will enable the market to develop innovative answers that advance BYOD to its full potential. Securely streaming corporate data to mobile devices instead of controlling the devices themselves is one approach that meets both company needs and employee demands," added Zix Chairman and CEO Rick Spurr.

For more:
- see the Zix release

Related Articles:
BYOD is 'an unregulated mess,' says IT security expert
Most companies fail to explain BYOD policies, study finds

Read more about: BYOD, Ponemon Institute
back to top


4. Infographic: Most US travelers use public Wi-Fi without protecting their data

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

A full 84 percent of U.S. travelers admit that they are not protecting their data when they connect to public Wi-Fi networks, according to a survey of 2,200 U.S. adults by PhoCusWright on behalf of Wi-Fi hotspot VPN provider AnchorFree.

While not taking measures to protect their data, most of these travelers are concerned about personal data theft when using public Wi-Fi.

The top three concerns cited when using public Wi-Fi are the possibility of someone stealing personal information when engaging in banking or financial sites (51 percent), making online purchases that require a credit or debit card (51 percent) and making purchases using an account that has payment information stored (45 percent).

"In the age of tablets, smartphones and ubiquitous hotspots, many travelers don't realize that they are unsuspectingly sharing sensitive information with others on public Wi-Fi," said David Gorodyansky, founder and CEO of AnchorFree.

Check out AnchorFree's full-size infographic on the survey results here.

Read more about: personal data theft, WiFi Hotspot
back to top


5. Increasing cyber threats spurring 29.4 percent CAGR in smart grid cybersecurity market, says TechNavio

By Fred Donovan Comment | Forward | Twitter | Facebook | LinkedIn

Increasing cyber threats are fueling growth in the smart grid cybersecurity market, which is forecast by TechNavio to increase at a 29.4 percent compound annual growth rate through 2016.

Key vendors in the market are BAE Systems, Cisco, IBM, Industrial Defender, IOActive, Lockheed Martin, McAfee, Siemens, Symantec and ViaSat.

Market growth is being spurred on by increasing cyber threats against the smart grid infrastructure, as well as new sources of vulnerabilities. TechNavio estimates that close to 4,400 new smart grid vulnerabilities were detected during 2010.

The research firm identified a number of different components within smart grids that are vulnerable: "IT systems such as computers, servers, databases, and web services; communications networks such as Ethernet, Wi-Fi, and ZigBee; operational technologies such as supervisory control and data acquisition, power line communications, energy management systems, and intelligent electronic devices; end access points such as smart meters, smartphones, and other mobile devices; and human influences such as lack of training and misuse of universal serial bus drives."

A major challenge to market growth is the lack of disclosure mechanisms. Power utilities are reluctant to disclose the occurrence of smart grid cyber attacks because of the fear that more grid vulnerabilities will be exposed, which could reduce customer loyalty.

Last month, the National Institute for Standards and Technology announced that it was updating its smart grid cybersecurity guidelines to incorporate technology and legal changes since the guidelines were first issued in 2010.

"Millions of smart meters are in use around the country now, and as the smart grid is implemented we have gained more knowledge that required minor tweaks to the existing document. There also have been legislative changes in states such as California and Colorado concerning customer energy usage data, and we have made revisions to the volume on privacy based on the changing regulatory framework," said NIST computer scientist Tanya Brewer.

NIST is seeking public comment on the revisions until Christmas Eve.

For more:
- check out TechNavio's stats
- see NIST's announcement

Related Articles:
Big data's impact on utilities: from smart grid to soft grid
Security vulnerabilities threaten growth of M2M market, warns Juniper

Read more about: cybersecurity
back to top


Also Noted

TODAY'S SPOTLIGHT... Adobe ColdFusion is vulnerable to cross-site scripting attack, warns CERT

Adobe ColdFusion 10 update 10 and earlier versions are vulnerable to a cross-site scripting attack that could enable an attacker to inject arbitrary HTML content in the logviewer directory, warned CERT on Monday. ColdFusion is an application server that enables development and maintenance of Internet apps. "A remote authenticated attacker can conduct a cross-site scripting attack, which may be used to result in information leakage, privilege escalation, and/or denial of service. A remote, unauthenticated attacker may also be able to utilize the directory traversal vulnerability to download the configuration files of the software such as /etc/passwd or boot.ini and obtain administrative credentials," CERT explained in a Vulnerability Note. Adobe has posted a hotfix for the vulnerability. Read more

> Yahoo will encrypt between data centers, use SSL for all sites. Article (Ars Technica)
> Google completes upgrade of its SSL certificates to 2048-bit RSA. Blog (Threatpost)
> Netflix members at risk from Silverlight exploit. Article (Infosecurity Magazine)
> Google, Nokia, Ericsson, Samsung clueless on NSA's phone stalking. Article (ZDNet)
> Hackers actively exploiting JBoss vulnerability to compromise servers, researchers say. Article (IDG News Service)

And Finally… Now if predictive security could just predict the score. Blog (Core Security)

Marketplace

> IT Made Easy with ManageEngine ServiceDesk Plus

ManageEngine ServiceDesk Plus is an ITIL-Ready Help Desk Software with integrated asset and project management. True to our tagline, "IT Made Easy", ServiceDesk Plus wins hands down when it comes to ease of use, out of the box settings and integration. Visit http://www.servicedeskplus.com/ to check out the list of features that come at just $995 and to download a 30-Day Free Trial!

> eBook: Making BYOD Work

Chief information officers and enterprise IT departments face a myriad of challenges when allowing employees to bring their own mobile devices into the work environment. FierceMobileIT explores how BYOD can work best for your enterprise to solve these problems. Download for free today.


©2013 FierceMarkets This email was sent to ignoble.experiment@arconati.us as part of the FierceITSecurity email list which is administered by FierceMarkets, 1900 L Street NW, Suite 400, Washington, DC 20036, (202) 628-8778.
Refer FierceITSecurity to a Colleague

Contact Us

Editor: Fred Donovan. VP sales and business development: Jack Fordi. Publisher: Ron Lichtinger.

Advertise

General advertising: Jack Fordi. Press releases: Fred Donovan. Request a media kit.

Email Management

Manage your subscription

Change your email address

Unsubscribe from FierceITSecurity

No comments:

Post a Comment

Keep a civil tongue.

Label Cloud

Technology (1464) News (793) Military (646) Microsoft (542) Business (487) Software (394) Developer (382) Music (360) Books (357) Audio (316) Government (308) Security (300) Love (262) Apple (242) Storage (236) Dungeons and Dragons (228) Funny (209) Google (194) Cooking (187) Yahoo (186) Mobile (179) Adobe (177) Wishlist (159) AMD (155) Education (151) Drugs (145) Astrology (139) Local (137) Art (134) Investing (127) Shopping (124) Hardware (120) Movies (119) Sports (109) Neatorama (94) Blogger (93) Christian (67) Mozilla (61) Dictionary (59) Science (59) Entertainment (50) Jewelry (50) Pharmacy (50) Weather (48) Video Games (44) Television (36) VoIP (25) meta (23) Holidays (14)

Popular Posts