Security Leftovers
-
Tom's Hardware ☛ Apartment buildings broken into with phone in minutes — IoT-connected intercoms using default creds vulnerable to anyone with Google
The Internet of Things has firmly rooted itself into modern building security systems, including modern apartment complexes looking to use something more secure or modern than phone lines to regulate access to secure entryways. In the case of Hirsch-made Mesh systems, an online portal monitors and records all key fob used across a building and can be used to access locked doors remotely.
Unfortunately, the same website and its default login are readily available in the instruction manual for the system, which is trivial to find with a Google search. Daigle, while waiting at a bus stop, was able to Google the product name of a nearby apartment security terminal, find its manual, and determine a means to break into the building within minutes.
-
North Korean hackers behind largest ever financial theft
The Pyongyang-backed Lazarus Group is believed by experts to have stolen $1.5 billion.
-
Tom's Hardware ☛ FBI identifies North Korea as source of $1.5 billion ByBit hack
The FBI has traced the ByBit crypto exchange hack to a group of North Korean hackers.
-
Security Week ☛ FBI Says North Korea Hacked Bybit as Details of $1.5B Heist Emerge
The FBI has attributed the Bybit hack to a North Korean group named TraderTraitor as more technical details of the attack have come to light.
-
Wilkens: Open source tech shouldn't open doors to cyberattacks
Cybersecurity isn’t just a technical issue; it’s a fundamental business concern. The same characteristics that make Linux powerful also make it a target.
-
IT Pro Today ☛ Top 5 Linux Security Best Practices Every Admin Must Know
This tutorial by Grant Knoetze highlights essential Linux security best practices that every administrator should follow. Knoetze emphasizes proactive security measures, such as securing remote access, keeping software up to date, and enforcing strict access controls to minimize risk. Additionally, he underscores the importance of firewalls and continuous monitoring through logging and auditing tools. By implementing these best practices, admins can strengthen their system's resilience against cyberattacks.
-
Information Security Buzz ☛ ‘Auto-Color’ Linux Malware Uses Advanced Stealth Tactics to Evade Detection
Researchers at Palo Alto Networks have identified a new Linux malware strain dubbed Auto-Color, which uses cunning, advanced stealth techniques to slip through the security nets and maintain persistence on compromised systems.
The malware, first detected in early November last year, mainly targets universities and government offices across North America and Asia.
Auto-Color hides its presence by using benign-sounding file names, such as door or egg, and uses an advanced method for hiding command and control (C2) connections—similar to the tactics used by the Symbiote malware family. It also uses proprietary encryption algorithms to obfuscate communication and configuration details.
-
Dark Reading ☛ Stealthy Linux 'Auto-color' Backdoor Paints US Institutions With Malware
Attackers are using a novel malware that takes on different file names each time it's deployed; it also boasts an anti-removal mechanism to target universities and government offices.
-
OpenSSF sets baseline security standards for Linux-based software
The Open Source Security Foundation (OpenSSF) on Feb. 25 released a three-tiered set of guidelines that aims for developers to build in a minimum level of security for open source Linux software.