From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 352 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1271 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 715 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 687 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 1909 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1399 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 1838 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 1603 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1611 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116256 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87104 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 81639 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80001 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70418 times Read more...
Displaying items by tag: Botnet
Crypto Mining Malware Targeting Linux and Linux Based IoT Devices Show How Little we have Progressed in IoT Security
IoT (Internet of Things) devices have long been a source of security concerns. Back in 2012-2014 we wrote a series of articles following the comedy of errors that is the IoT market. At the time I dubbed it the Internet of Fails simply because the companies making these internet connected devices were leaving them so open to compromise. Everything from a lack of encrypted communication with cloud services, to no passwords on administrative functions, to using images that had open files and folders in the firmware were found in popular connected products that were shipped to customers. Supply chain compromises were also found in generous quantities, making the mad rush to connect everything a serious concern.
Shellshock used to spread botnet through SMTP
There appear to be developments in the way that Shellshock is used to push malware around. According to new information the Bash Bug is now being used to send malware out through the use of compromised SMTP gateways. The clever attackers are trying to use altered headers (from, to, subject) to force the SMTP gateway to pull down additional code that contains the Shellshock attack.
New Mac Botnet Uses Reddit To Hand out C&C Server IPs
The Mac world had an unsettling wakeup call today as it found out what most people have known for years: Macs are no more secure than any other PC. This wakeup call is not the first of its kind and it is certainly not going to be the last, we just wonder if anyone will actually listen or if Apple PR will continue to claim Macs cannot get malware.
New Botnet Targeting POS Terminals with Simple Passwords
Point of Sale Terminals are a new target for malicious individuals. At least this is a trend that many security researchers are seeing over the last few months. These systems can be a treasure trove of information for someone looking to make some quick money. On top of that most are designed with simple and generic logons to make use easier. This is a common flaw with many Windows based POS systems, yet the trend continues.
New Malware Pandemiya Comes with 25k Lines of New Code
Nothing makes a Friday fun like hearing about a brand new form of Malware. Well that is what we have for you on today. It seems that an RSA researcher was picking around the darker places on the Internet and stumbled upon a new bit of malware that, if real, could be a serious problem in the near future. RSA researcher Eli Marcus is calling the new malware Pandemiya and claims that it is 25,000 lines of previously unused code.
Joomla, WordPress and Datalife Engine Targeted In New Botnet Campaign
As the world of blogging continues to grow the popularity of content management systems like WordPress, Drupal, Joomla and many more grow as well. These systems on their own have become more robust and secure (considering). However what they cannot do is protect user when they chose to use weak passwords for their administration interfaces or for their connection to the content database. It is these weak links that hackers are now using in an attempt to incorporate personal (and in some cases professional) blogs into their botnets.
Microsoft Links Malware and Piracy To Close Down Nitol Botnet
There is nothing like buy a brand new PC complete with Malware designed to steal your personal information. Unfortunately that is exactly what has happened in a few stores in China. Microsoft conducted an investigation into the Nitol Botnet and during this investigation delved into some of the supply chain to Chinese retailers. What they found was that many computers are infected before they leave the factories. According to Microsoft the bought 20 computers from different locations in China and out of the twenty only 4 were found to be infected with Malware.
A Microsoft Engineer Claims There is an Android Botnet; The Proof Is A Little Thin
Hearing about a flaw in one product from a competitor in a product is sort of like asking your dog what food he likes best. You know you are not going to get a good answer and, of course, the dog is only going to stare at you and eat pretty much anything (including a bug…). So when we heard that a Microsoft Anti-Spam Engineer was reporting a new Android based email spam botnet we took it with a grain of salt (remember Microsoft has a new Phone OS coming out soon).
Apple Finally Releases a Patch for the Flashback Trojan After 600,000 Macs are Infected
There is nothing like a botnet to remind us all that there is truly no such thing as a “secure” operating system. For years Apple presented the Mac as impervious to viruses and Malware. They had commercials stating “Macs do not get viruses” and continued this mythology despite many Java, Flash and other attacks that existed in the wild. The fact that many of these were centered on pirated software or required user interaction did not deter the myth. Now with Flashback things have gotten very real very quickly.