Security News Bytes
BY - APURV SINGH GAUTAM
WireX Android DDoS Botnet
• Security Researchers have uncovered a new, widespread botnet
• WireX detected as “Android Clicker”, includes Android devices running one of the
thousands malicious apps installed from Google Play store
• It is designed to conduct massive application layer DDoS attacks
• It has infected 120,000 Android smartphones by this month.
• Researchers noticed massive DDoS attacks (primarily HTTP GET requests) originated
from more than 70,000 infected mobile devices from over 100 countries
• There are more than 300 malicious apps on Google Play which include the malicious
WireX code.
• You can be protected if you have a newer version of Android that include Google Play’s
Protect feature, the company will automatically remove WireX apps from your device.
• Google removed around 500 Android apps utilising the rogur SDK that secretly
distribute spywares to the users.
Email Address exposed from SpamBot Server
• 630 million email addresses used by a spambot to send large amounts of spam
• Hosted in Netherlands and stored without any access
• Used to send out spam and spread a banking trojan called Ursnif
Wikileaks Website Defaced by OurMine
• The notorious hacking group is known for breaching high-profile figures and companies’
social accounts
• Including Facebook CEO Mark Zuckerberg, Twitter CEO Jack Dorsey, Google CEO Sundar
Pichai, HBO, Game of Thrones, etc.
• There is no sign of WikiLeaks servers and website been compromised instead their
website has been redirected to a hacker-controlled server using DNS poisoning attack.
• Soon WikiLeaks recovered their website.
Security News Bytes (Aug Sept 2017)
Instagram Data Breach
• Hackers gained email addresses and phone numbers of many high-profile users.
• The flaw resides in Instagram’s application programming interface (API), which the
service uses to communicate with other apps.
• The Instagram’s mobile API contains flaw specifically in the password reset option,
which exposed mobile numbers and email addresses of the users in JSON response
• Instagram declined to name the high-profile users targeted in the breach
• The hacker name was unknown
• No account password were exposed
AngelFire CIA Malware
• Used by CIA to gain persistent remote access on Windows
• It does so by modifying its partition boot sector
• It modifies the partition boot sector to load and execute Wolfcreek every time the
system boots up
• It contains a self loading driver that loads other drivers and user-made applications
• It also has a covert file system that attempts to install itself in non-partitioned space
available on the targeted computer
• AngelFire needs administrative privileges on a target computer for successful
installation
• It has variants in 32-bit version as well as 64-bit version
Locky Ransomare
• Emails are being sent containing Locky ransomware
• Around 23 million messages have been sent in 24 hours
• The emails set out in the attack were extremely vague with subjects such as “please
print”, “documents”, “images”, etc.
• The email comes with a zip attachment that contains a Visual Basic Script (VBS) file
need inside a secondary ZIP file
• Once opened the VBS installs the ransomware and encrypts all the files
• The malware displays a ransomware message on the victim's desktop that instructs the
victim to download and install Tor browser and visit the attacker's site for further
instructions and payments
• The ransomware demands sum of 0.5 Bitcoin from victims to pay for a “Locky
decryptor” in order to get their files back.
Tiranga Data Breach
• A popular social networking site geared towards Latin American users (just like Reddit)
• Users create and share thousands of posts every day on general topics like life hacks,
tutorials, recipes, reviews and art
• According to LeakBase (breach notification service), 28,722,877 accounts which
includes usernames, email addresses and hashed passwords for Tiranga was obtained
by hackers
• Hashed passwords use an ageing algorithm called MD5 which is somewhat outdated so
it will be easy for hackers to unhash it.
Security News Bytes (Aug Sept 2017)
Dolphin Attack: Controlling Siri, Alexa and more
• Dolphin attack works by feeding the AI assistants commands in ultrasonic frequencies,
which are too high for humans to hear but are perfectly audible to the microphones
• Cyber criminals can silently whisper commands to hijack Siri or Alexa and could force
them to open malicious apps
• It can be used to visit malicious website, spying, injecting fake information and much
more
Thank You

More Related Content

PDF
NewsByte Mumbai October 2017
PPTX
NewsBytes - Nullhyd
PPTX
DDOS ATTACK - MIRAI BOTNET
PPTX
Null hyderabad - October Newsbytes
PPTX
News Bytes - December 2015
PDF
IoT Lock Down - Battling the Bot Net Builders
PPTX
cyber attacks in May , breaches in May
PPTX
Attack chaining for web exploitation
NewsByte Mumbai October 2017
NewsBytes - Nullhyd
DDOS ATTACK - MIRAI BOTNET
Null hyderabad - October Newsbytes
News Bytes - December 2015
IoT Lock Down - Battling the Bot Net Builders
cyber attacks in May , breaches in May
Attack chaining for web exploitation

What's hot (20)

PPTX
Wirelurker
PPTX
Regin
PDF
Weaponizing Intelligence: Interdiction in Today’s Threat Landscape
PPTX
hacking ,bluetooth
PPTX
How to stay protected against ransomware
PPTX
Hacking by Pratyush Gupta
PPTX
The EU Data Protection Regulation and what it means for your organization
PDF
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
PDF
Ransomware- What you need to know to Safeguard your Data
PPTX
Evolution of ransomware
PDF
Enterprise security: ransomware in enterprise and corporate entities
PPTX
BackDoors Seminar
KEY
Post Apocalyptic Cyber Realism
PPTX
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
PDF
How to Protect Your Organization from the Ransomware Epidemic
PPTX
Newsbytes_NULLHYD_Dec
PPTX
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
PPTX
NormShield Cyber Threat & Vulnerability Orchestration Overview
PPTX
Developing secure mobile apps by Alexandru Catariov Endava
PDF
NTXISSACSC4 - Security for a New World
Wirelurker
Regin
Weaponizing Intelligence: Interdiction in Today’s Threat Landscape
hacking ,bluetooth
How to stay protected against ransomware
Hacking by Pratyush Gupta
The EU Data Protection Regulation and what it means for your organization
Learn Ethical Hacking With Kali Linux | Ethical Hacking Tutorial | Kali Linux...
Ransomware- What you need to know to Safeguard your Data
Evolution of ransomware
Enterprise security: ransomware in enterprise and corporate entities
BackDoors Seminar
Post Apocalyptic Cyber Realism
Dan Catalin Vasile - Defcamp2013 - Does it pay to be a blackhat hacker
How to Protect Your Organization from the Ransomware Epidemic
Newsbytes_NULLHYD_Dec
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
NormShield Cyber Threat & Vulnerability Orchestration Overview
Developing secure mobile apps by Alexandru Catariov Endava
NTXISSACSC4 - Security for a New World
Ad

Similar to Security News Bytes (Aug Sept 2017) (20)

PPTX
Protection from hacking attacks
PPTX
I haz you and pwn your maal
PDF
Hacking your Android (slides)
PDF
Cloud Security Engineering - Tools and Techniques
PPTX
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
PDF
AtlSecCon 2016
PPTX
Botnets Attacks.pptx
PPT
News Bytes June 2012
PPTX
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
PDF
IoT Security, Mirai Revisited
PPTX
Mobile platform security models
PPTX
Meeting02_RoT.pptx
PDF
Cyber espionage - Tinker, taylor, soldier, spy
PPTX
Security Threats and Vulnerabilities-2.pptx
PDF
Hacking your Droid (Aditya Gupta)
PPTX
Ransomware : A cyber crime without solution ? by Prashant Mali
PPTX
Cyber Security Fundamentals and Ethical hackingpptx
PPTX
Information about malwares and Attacks.pptx
PPTX
securing_information_systems_._lec6.pptx
Protection from hacking attacks
I haz you and pwn your maal
Hacking your Android (slides)
Cloud Security Engineering - Tools and Techniques
WiFi Honeypot Detecscfddssdffsedfseztor.pptx
AtlSecCon 2016
Botnets Attacks.pptx
News Bytes June 2012
Private Date and PRYING Eyes - Talking Cybersecurity at After Work Network
IoT Security, Mirai Revisited
Mobile platform security models
Meeting02_RoT.pptx
Cyber espionage - Tinker, taylor, soldier, spy
Security Threats and Vulnerabilities-2.pptx
Hacking your Droid (Aditya Gupta)
Ransomware : A cyber crime without solution ? by Prashant Mali
Cyber Security Fundamentals and Ethical hackingpptx
Information about malwares and Attacks.pptx
securing_information_systems_._lec6.pptx
Ad

More from Apurv Singh Gautam (15)

PPTX
Automating Threat Hunting on the Dark Web and other nitty-gritty things
PDF
Threat Hunting on the Dark Web
PDF
All about Cyber Security - From the perspective of a MS student
PPTX
SIT Summer School (Cyber Security)
PPTX
Cyber Security Seminar Day 2
PPTX
Cyber Security Seminar Day 1
PPTX
Cyber Security Fundamentals
PPTX
Bitcoin Forensics
PDF
Log Out Cyber Awareness
PPTX
Intro to Network Vapt
PPTX
Anonymous traffic network
PPTX
Flexible Displays
PPTX
India against corruption
PPTX
Encrypted database management system
Automating Threat Hunting on the Dark Web and other nitty-gritty things
Threat Hunting on the Dark Web
All about Cyber Security - From the perspective of a MS student
SIT Summer School (Cyber Security)
Cyber Security Seminar Day 2
Cyber Security Seminar Day 1
Cyber Security Fundamentals
Bitcoin Forensics
Log Out Cyber Awareness
Intro to Network Vapt
Anonymous traffic network
Flexible Displays
India against corruption
Encrypted database management system

Recently uploaded (20)

PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
PDF
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Altius execution marketplace concept.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PDF
substrate PowerPoint Presentation basic one
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
A symptom-driven medical diagnosis support model based on machine learning te...
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Introduction to MCP and A2A Protocols: Enabling Agent Communication
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Advancing precision in air quality forecasting through machine learning integ...
giants, standing on the shoulders of - by Daniel Stenberg
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
zbrain.ai-Scope Key Metrics Configuration and Best Practices.pdf
SGT Report The Beast Plan and Cyberphysical Systems of Control
Co-training pseudo-labeling for text classification with support vector machi...
Altius execution marketplace concept.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Data Virtualization in Action: Scaling APIs and Apps with FME
substrate PowerPoint Presentation basic one
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf

Security News Bytes (Aug Sept 2017)

  • 1. Security News Bytes BY - APURV SINGH GAUTAM
  • 2. WireX Android DDoS Botnet • Security Researchers have uncovered a new, widespread botnet • WireX detected as “Android Clicker”, includes Android devices running one of the thousands malicious apps installed from Google Play store • It is designed to conduct massive application layer DDoS attacks • It has infected 120,000 Android smartphones by this month. • Researchers noticed massive DDoS attacks (primarily HTTP GET requests) originated from more than 70,000 infected mobile devices from over 100 countries • There are more than 300 malicious apps on Google Play which include the malicious WireX code.
  • 3. • You can be protected if you have a newer version of Android that include Google Play’s Protect feature, the company will automatically remove WireX apps from your device. • Google removed around 500 Android apps utilising the rogur SDK that secretly distribute spywares to the users.
  • 4. Email Address exposed from SpamBot Server • 630 million email addresses used by a spambot to send large amounts of spam • Hosted in Netherlands and stored without any access • Used to send out spam and spread a banking trojan called Ursnif
  • 5. Wikileaks Website Defaced by OurMine • The notorious hacking group is known for breaching high-profile figures and companies’ social accounts • Including Facebook CEO Mark Zuckerberg, Twitter CEO Jack Dorsey, Google CEO Sundar Pichai, HBO, Game of Thrones, etc. • There is no sign of WikiLeaks servers and website been compromised instead their website has been redirected to a hacker-controlled server using DNS poisoning attack. • Soon WikiLeaks recovered their website.
  • 7. Instagram Data Breach • Hackers gained email addresses and phone numbers of many high-profile users. • The flaw resides in Instagram’s application programming interface (API), which the service uses to communicate with other apps. • The Instagram’s mobile API contains flaw specifically in the password reset option, which exposed mobile numbers and email addresses of the users in JSON response • Instagram declined to name the high-profile users targeted in the breach • The hacker name was unknown • No account password were exposed
  • 8. AngelFire CIA Malware • Used by CIA to gain persistent remote access on Windows • It does so by modifying its partition boot sector • It modifies the partition boot sector to load and execute Wolfcreek every time the system boots up • It contains a self loading driver that loads other drivers and user-made applications • It also has a covert file system that attempts to install itself in non-partitioned space available on the targeted computer • AngelFire needs administrative privileges on a target computer for successful installation • It has variants in 32-bit version as well as 64-bit version
  • 9. Locky Ransomare • Emails are being sent containing Locky ransomware • Around 23 million messages have been sent in 24 hours • The emails set out in the attack were extremely vague with subjects such as “please print”, “documents”, “images”, etc. • The email comes with a zip attachment that contains a Visual Basic Script (VBS) file need inside a secondary ZIP file • Once opened the VBS installs the ransomware and encrypts all the files • The malware displays a ransomware message on the victim's desktop that instructs the victim to download and install Tor browser and visit the attacker's site for further instructions and payments
  • 10. • The ransomware demands sum of 0.5 Bitcoin from victims to pay for a “Locky decryptor” in order to get their files back.
  • 11. Tiranga Data Breach • A popular social networking site geared towards Latin American users (just like Reddit) • Users create and share thousands of posts every day on general topics like life hacks, tutorials, recipes, reviews and art • According to LeakBase (breach notification service), 28,722,877 accounts which includes usernames, email addresses and hashed passwords for Tiranga was obtained by hackers • Hashed passwords use an ageing algorithm called MD5 which is somewhat outdated so it will be easy for hackers to unhash it.
  • 13. Dolphin Attack: Controlling Siri, Alexa and more • Dolphin attack works by feeding the AI assistants commands in ultrasonic frequencies, which are too high for humans to hear but are perfectly audible to the microphones • Cyber criminals can silently whisper commands to hijack Siri or Alexa and could force them to open malicious apps • It can be used to visit malicious website, spying, injecting fake information and much more