Weekly Infosec News Brief: 18-24 April

"RansomWhere?" Tool Released to Detect and Halt Ransomware on Mac Computers

Patrick Wardle, a leading researcher in Apple Mac vulnerabilities and security measures, released a tool called "RansomWhere?" last week to halt ransomware infections on Mac computers. Though ransomware has not been a widespread issue on Macs to this point, the tool's operational concept is interesting. It watches users' home folders (and their sub-folders), where the vast majority of documents are stored locally, for rapid write operations being performed on many files and suspends the responsible process. To avoid false positives, RansomWhere? catalogs all the programs running at the time it is installed, and it will never alert on actions taken by those programs; for this reason it is not effective if installed on a computer with ransomware already present. The technique is not insurmountable, but a similar tool on Windows PCs would likely stop the majority of existing ransomware families.
http://www.csoonline.com/article/3060056/data-breach/this-tool-can-block-ransomware-on-mac-os-x-for-now.html


New Powershell-Based Malware Discovered in the Wild

A new malware strain known as "FAREIT" leverages Windows PowerShell to steal usernames and passwords and other information from victims' computers. PowerShell is an enhanced command line and scripting environment that became standard with Windows 7 and newer. PowerShell is a great tool for admins, but has increasingly been abused by intruders and malware. Sean Metcalf gave a great talk this weekend at the BSides conference in Baltimore on steps to securing PowerShell.
http://blog.trendmicro.com/trendlabs-security-intelligence/new-fareit-strain-delivered-abusing-powershell/


"Panama Papers" Breach Against Mossack Fonseca Firm Holds Valuable Lessons

The "Panama Papers" made big news a couple of weeks ago, but for IT leaders the real news is the way in which the data was obtained. It appears that attackers exported a well-known vulnerability in a plugin on a WordPress-based website hosted on the firm's network. The vulnerability was disclosed 18 months ago, and a patch has been available since that time, but Mossack Fonseca's site was not patched. Furthermore, the web server was not isolated from other systems, making it very easy for attackers to move from that server to other internal systems.
http://inhomelandsecurity.com/cybersecurity-lessons-learned-from-panama-papers-breach/

Comments

Popular posts from this blog

Weekly Infosec News Brief: 14-20 March

Weekly Infosec News Brief 20-26 July

Weekly Infosec News Brief: 22-28 February