Inside | Real news, curated by real humans
Inside Security

Inside Security (Sep 14th, 2018)

Today’s premium story is about polymorphic malware and defenses that are constructed from the same techniques.

If you would like to subscribe and receive this content, it will cost you $10/month for my newsletter or $25/month for unlimited subscriptions to multiple newsletters, with corporate discounts available. The premium stories will have more depth and my analysis, and you will also get your newsletters without any ads. Click on this link here to upgrade your account.  -- David Strom

  • Email gray
  • Permalink gray

1. While cold boot attacks aren’t new, researchers have figured out ways around the trusted firmware protections in most current PCs that enable a new attack vector.  Microsoft, Intel and Apple are working on fixes. -- F-SECURE BLOG

  • Email gray
  • Permalink gray

2. Osiris is a descendant from the Zeus banking Trojan with new features, including using the TOR network for command and control, keylogging, and remote control via VNC. It even has a reseller option. It has surfaced in various network scans. --  SECURONIX

  • Email gray
  • Permalink gray

See it. Secure it. Halo Cloud Secure eliminates your public cloud blind spots.

Halo Cloud Secure is an automated public cloud infrastructure security solution that delivers comprehensive visibility, protection, and continuous compliance monitoring for compute, storage, database, networking, and identity services to reduce cyber risk. Check your AWS accounts for FREE right now.

3. A researcher has found a new bug found in both Edge and Safari browsers. It allows javascript to update the address bar while a page was still loading, making these pages vulnerable to exploits. Microsoft has fixed this in the latest version of Edge, Apple will have theirs soon.-- RAFAY BALOCH BLOG

  • Email gray
  • Permalink gray

4. A new kind of phishing attack leverages free trial Office 365 accounts. The attacker creates a phony OneDrive login screen to steal users’ credentials. It is called PhishPoint and quite clever at avoiding most malware screening tools.-- AVANAN BLOG

  • Email gray
  • Permalink gray

5. At least three infected repositories of the streaming media player Kodi add-ons have been uncovered. These versions have helped spread a malware strain that secretly mined cryptocurrency on users' computers. The code has been infected since the beginning of the year, and both Linux and Windows versions are at risk and should update their software -- WE LIVE SECURITY (ESET)  

  • Email gray
  • Permalink gray

6. Malware can have adverse effects on people’s lives, as this Tweet stream illustrates with links to various sad stories from around the world. -- STRUPPIGEL @ TWITTER

7. The latest Watchguard Internet report shows that half of all government and military employee LinkedIn passwords were weak enough to be cracked in less than two days. Mimikatz was the most prevalent malware found in its scans and cryptominers continue to dominate the threat list. -- WATCHGUARD REPORT

8. Speaking of Mimikatz, this blog post shows you how you can use their endpoint defense tool to protect your PCs against this attack. -- VERODIN BLOG

9. The CoolWallet S offers offline private key cold storage, cryptocurrency exchange capabilities, and free over-the-air updates for future coin, token, ICO, or exchange support. It uses MetaCert's code and connects to both iOS and Android devices and sells for $99.

10. The North Korean government  flatly denied it had anything to do with the 2104 Sony incident and WannaCry virus. They also claim the person indicted by the DoJ, Park Jin Hyok, doesn’t even exist. -- TAMPA BAY TIMES

  • Email gray
  • Permalink gray

Polymorphic malware has been around for a few years, and can be a difficult beast to remove from your networks. Polymorphic malware is nasty stuff. It adapts to a variety of conditions, operating systems and circumstances and tries to evade whatever security scans and protection products to infect your endpoints. This piece looks at how it can be also use to defend networks by the good guys.

Content for premium users only

I have had a few of these myself. -- REDDIT

  • Email gray
  • Permalink gray

This newsletter is written and curated by David Strom. I live in St. Louis MO and have covered the infosec industry for decades. I also ran editorial operations for various B2B IT publications including Network Computing (USA), Tom’s Hardware and ReadWrite.com’s business websites. You can find me at @dstrom or my personal site.

Finally, we note our editing team: Lon Harris (editor-in-chief at Inside.com, game-master at Screen Junkies), Krystle Vermes (Breaking news editor at Inside, B2B marketing news reporter, host of the "All Day Paranormal" podcast), and Susmita Baral (editor at Inside, recent bylines in NatGeo, Teen Vogue, and Quartz. Runs the biggest mac and cheese account on Instagram).

  • Email gray
  • Permalink gray

Many thanks to Inside Security's corporate supporters.  Please go check them out!

Endgame

Endgame's endpoint security platform protects the world’s largest organizations from targeted attacks, eliminating the time & cost associated with incident response. Learn more

 

Nok Nok Labs has the ambition to transform authentication, by unifying it into one standard protocol, giving business the control they need. Learn more

 
   
   

Gain cybersecurity expertise from Harvard's VPAL in 8 weeks. Learn More.

HackerOne is the #1 hacker-powered security platform for finding critical vulnerabilities.

 

[YOUR LOGO HERE – click for details]

Subscribe to Inside Security

MORE NEWSLETTERS

Tracking trends, news, and analysis around Bitcoin and cryptocurrencies

Inside Bitcoin

Tracking trends, news, and analysis around Bitcoin and cryptocurrencies

DAILY
Tracking trends, news, and analysis around Bitcoin and cryptocurrencies

Inside Bitcoin

DAILY

SUBSCRIBED!

Share via

A hand-picked selection of products, deals, and ways to save money.

Inside Deals

A hand-picked selection of products, deals, and ways to save money.

DAILY
A hand-picked selection of products, deals, and ways to save money.

Inside Deals

DAILY

SUBSCRIBED!

Share via

For those in the business of buying, selling, and developing real estate.

Inside Real Estate

For those in the business of buying, selling, and developing real estate.

DAILY
For those in the business of buying, selling, and developing real estate.

Inside Real Estate

DAILY

SUBSCRIBED!

Share via

Facebook's mission is to connect the world's people. Ours is to keep an eye on them.

Inside Facebook

Facebook's mission is to connect the world's people. Ours is to keep an eye on them.

TWICE WEEKLY
Facebook's mission is to connect the world's people. Ours is to keep an eye on them.

Inside Facebook

TWICE WEEKLY

SUBSCRIBED!

Share via