Articles for November 2016

Google Clamps Down on Sneaky Malicious Sites


Sites that repeatedly violate Google’s safe browsing policies will be classified as repeat offenders, the company said. A small number of websites take corrective actions after Google displays alerts on their landing pages warning visitors that they’re harmful. However, they typically revert to violating the policies after Google verifies that they’re safe and removes the warnings.

Source: Google Clamps Down on Sneaky Malicious Sites

Loading

Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack

Yes, you only need a single laptop with a decent internet connection, rather a massive botnet, to launch overwhelming denial of service (DoS) attacks in order to bring down major Internet servers and modern-day firewalls.

Researchers at TDC Security Operations Center have discovered a new attack technique that lone attackers with limited resources (in this case, a laptop and at least 15Mbps of bandwidth) can use to knock large servers offline.

Dubbed a BlackNurse attack or the low-rate “Ping of Death” attack, the technique can be used to launch several low-volume DoS attacks by sending specially formed Internet Control Message Protocol (ICMP) packets, or ‘pings’ that overwhelm the processors on server protected by firewalls from Cisco, Palo Alto Networks, among others.

ICMP is a protocol used by routers and other networking devices to send and receive error messages.

Source: Even A Single Computer Can Take Down Big Servers Using BlackNurse Attack

Loading

Warning: Beware of Post-Election Phishing Emails Targeting NGOs and Think Tanks

Just a few hours after Donald Trump won the 2016 US Presidential Election, a hacking group launched a wave of cyber attacks targeting U.S.-based policy think-tanks with a new spear phishing campaign designed to fool victims into installing malware.

The group of nation-state hackers, also known as Cozy Bear, APT29, and CozyDuke, is the one of those involved in the recent data breach of the Democratic National Committee (DNC) and is allegedly tied to the Russian government.

Source: Warning: Beware of Post-Election Phishing Emails Targeting NGOs and Think Tanks

Loading

Critical Flaws in MySQL Give Hackers Root Access to Server (Exploits Released)


Over a month ago we reported about two critical zero-day vulnerabilities in the world’s 2nd most popular database management software MySQL:

  • MySQL Remote Root Code Execution (CVE-2016-6662)
  • Privilege Escalation (CVE-2016-6663)

At that time, Polish security researcher Dawid Golunski of Legal Hackers who discovered these vulnerabilities published technical details and proof-of-concept exploit code for the first bug only and promised to release details of the second bug (CVE-2016-6663) later.

Source: Critical Flaws in MySQL Give Hackers Root Access to Server (Exploits Released)

Loading