Security News > 2020 > October

Ttint Botnet Targets Zero-Day Vulnerabilities in Tenda Routers
2020-10-05 18:23

A new Mirai-based botnet is targeting zero-day vulnerabilities in Tenda routers, according to researchers at 360 Netlab, a unit of Chinese cybersecurity company Qihoo 360. In order to circumvent detection of typical traffic generated by Mirai botnets, Ttint uses the WSS protocol for communication with the command and control server, and also uses encryption.

Top 5 things to know about Confidential Computing
2020-10-05 18:22

The Confidential Computing Consortium, formed under The Linux Foundation, could revolutionize the way companies share data. Tom Merritt lists five things to know about Confidential Computing.

Top 5 things to know about Confidential Computing
2020-10-05 18:01

The Confidential Computing Consortium, formed under The Linux Foundation, could revolutionize the way companies share data. Tom Merritt lists five things to know about Confidential Computing.

Malware Families Turn to Legit Pastebin-Like Service
2020-10-05 17:58

Cybercriminals are increasingly turning to a legitimate, Pastebin-like web service for downloading malware - such as AgentTesla and LimeRAT - in spear-phishing attacks. More malware and ransomware families are starting to utilize another service, with the domain Paste.

Rare Bootkit Malware Targets North Korea-Linked Diplomats
2020-10-05 17:12

Kaspersky observed several dozen victims who received components from the MosaicRegressor framework between 2017 and 2019 - all of whom had ties to North Korea. "UEFI firmware makes for a perfect mechanism of persistent malware storage," Kaspersky researchers explained.

Hackers can rip open your company with AI… But AI can help you fight back
2020-10-05 17:05

Consider a world where cyber-attackers are using AI to refine, control and scale up their attacks. There is no need to stretch your imagination: sophisticated hackers are using AI techniques today to manage botnets, mount attacks, and cover up their traces, as well as to help them understand the context they're operating in, and, naturally, increase profitability.

On Risk-Based Authentication
2020-10-05 16:47

Abstract: Risk-based Authentication is an adaptive security measure to strengthen password-based authentication. RBA monitors additional features during login, and when observed feature values differ significantly from previously seen ones, users have to provide additional authentication factors such as a verification code.

What a Hancock-up: Technical issue around 'case uploads' smacks Britain as second wave spikes
2020-10-05 16:25

As the UK heads into a troubling second wave of coronavirus cases, those in contact with thousands of people who just tested positive for COVID-19 in England went about their lives for up to a week unaware they had rubbed shoulders with a carrier. The under-reporting was widely reported to be down to the use of Microsoft's Excel spreadsheet program in transferring test results from labs to the health service to total up.

Tenda Router Zero-Days Emerge in Spyware Botnet Campaign
2020-10-05 15:15

Two former Tenda router zero-days are anchoring the spread of a Mirai-based botnet called Ttint. For one, on the RAT front, researchers said that it implements 12 remote access functions, that combine with custom command-and-control server commands to carry out tasks like setting up a Socket5 proxy for router devices, tampering with router DNS, setting iptables and executing custom system commands.

Ransomware Vaccine Intercepts Requests to Erase Shadow Copies
2020-10-05 14:59

A newly released "Vaccine" can prevent certain ransomware families from erasing shadow copies to prevent data recovery. Dubbed "Raccine" and released by security researchers Florian Roth and Ollie Whitehouse, the vaccine targets ransomware families that leverage vssadmin.