A new malware campaign has been uncovered on Facebook which not only steals account credentials but also installs scripts for covert cryptocurrency mining.
Cybersecurity firm Radware said in a blog post on Thursday that Nigelthorn is a new campaign which focuses on the Facebook social network. The malware is so called due to the abuse of a legitimate Google Chrome extension called "Nigelify," which replaces images displayed on a web page with pictures of Nigel Thornberry, a cartoon character from the television show The Wild Thornberrys.Read more
ZTE is ending “major operating activities,” the company announced today, as its conditions worsen under a US ban on exports to the Chinese phone maker. ZTE says in a filing that it has enough cash to stay afloat while pausing operations for the time being. While the news doesn’t mean ZTE is completely dead, things aren’t looking good for the phone maker.
The company says it’s in talks with the US about how to reverse or modify the Department of Commerce’s April decision to ban exports and “forget a positive outcome in the development of matters.” American companies like Dolby and Qualcomm can’t export parts to ZTE for up to seven years.Read more
An advanced type of malware can spy on nearly every Android smartphone function and steal passwords, photos, video, screenshots and data from WhatsApp, Telegram and other apps. "ZooPark" targets subjects in the Middle East and was likely developed by a state actor, according to Kaspersky Lab, which first spotted and identified it.
ZooPark has evolved over four generations, having started as simple malware that could "only" steal device account details and address book contacts. The last generation, however, can monitor and exfiltrate keylogs, clipboard data, browser data.Read more
A bug that Oracle recently patched broke the main functionality of Oracle Access Manager (OAM), which should only give authorized users access to protected enterprise data.
OAM provides an authentication function for web applications based on Oracle Fusion Middleware. It can be used to provide and block access to external mobile and cloud applications. However, researchers at Austrian security firm SEC-Consult found a flaw in OAM's cryptographic format that allowed them to create session tokens for any user, which the attacker could use to impersonate any legitimate user and access web apps that OAM should be protecting.Read more
The Trump administration is considering executive action that would restrict some Chinese companies’ ability to sell telecommunications equipment in the U.S., based on national-security concerns, said several people familiar with the matter.
The move, if it happens, would represent a significant escalation of a growing feud between the U.S. and China over tech and telecommunications. The affected firms likely would include Huawei Technologies Co. and ZTE Corp. , two of the world’s leading telecommunications equipment makers. They have found themselves increasingly in an international crossfire.Read more
The National Security Agency collected 534 million records of phone calls and text messages of Americans last year, more than triple gathered in 2016.
The sharp increase from 151 million occurred during the second full year of a new surveillance system established at the spy agency after U.S. lawmakers passed a law in 2015 that sought to limit its ability to collect such records in bulk. The spike in collection of call records coincided with an increase reported on Friday across other surveillance methods, raising questions from some privacy advocates who are concerned about potential government overreach and intrusion into the lives of U.S. citizens.Read more
Russia's Fancy Bear APT group is likely behind the malicious command and control domains found in Lojack agents, according to the Arbor Security Engineering & Response Team.
LoJack, a popular laptop recovery solution, “makes an excellent double-agent due to appearing as legit software while natively allowing remote code execution,” researchers said, noting that while “the initial intrusion vector for this activity remains unknown, Fancy Bear often utilizes phishing email to deliver payloads.” Because many antivirus programs don't flag the malware as a concern, it's largely able to do its dirty work without detection.Read more
GitHub has said a bug exposed some user passwords -- in plaintext. The code repository site, with more than 27 million users as of last year, sent an email to affected users Tuesday.
"During the course of regular auditing, GitHub discovered that a recently introduced bug exposed a small number of users' passwords to our internal logging system," said the email, received by some users. The email said that a handful of GitHub staff could have seen those passwords -- and that it's "unlikely" that any GitHub staff accessed the site's internal logs. "We have corrected this, but you'll need to reset your password to regain access to your account," the email added.Read more
Twitter Inc. sold data access to the Cambridge University academic who also obtained millions of Facebook Inc. users’ information that was later passed to a political consulting firm without the users’ consent.
Aleksandr Kogan, who created a personality quiz on Facebook to harvest information later used by Cambridge Analytica, established his own commercial enterprise, Global Science Research (GSR). That firm was granted access to large-scale public Twitter data, covering months of posts, for one day in 2015, according to Twitter. “In 2015, GSR did have one-time API access to a random sample of public tweets from a five-month period from December 2014 to April 2015,” Twitter said.Read more
U.S. prosecutors in New York have been investigating whether Chinese tech company Huawei violated U.S. sanctions in relation to Iran, according to sources familiar with the situation.
Since at least 2016, U.S. authorities have been probing Huawei’s alleged shipping of U.S.-origin products to Iran and other countries in violation of U.S. export and sanctions laws, two of the sources said. News of the Justice Department probe follows a series of U.S. actions aimed at stopping or reducing access by Huawei and Chinese smartphone maker ZTE Corp to the U.S. economy amid allegations the companies could be using their technology to spy on Americans.Read more