Video Screencast Help
Cyber Security Group
Showing posts in English
MSS Global Threat Response | 24 Feb 2014 | 0 comments


On February 20th 2014, Symantec published a blog on a new zero-day vulnerability in Adobe Flash (CVE-2014-0502) being exploited in the wild. Adobe has released security updates for Adobe Flash Player and earlier versions for Windows and Macintosh and Adobe Flash Player and earlier versions for Linux in Adobe Security Bulletin APSB14-07. These updates address vulnerabilities that could potentially allow an attacker to take control of the affected system. 

This Adobe Flash zero-day, Adobe Flash Player and AIR CVE-2014-0502 Remote Code Execution Vulnerability (CVE-2014-0502), is being used in a watering hole attack. This new attack has...

Kevin Haley | 20 Feb 2014 | 0 comments

It’s hard to think of a time when IT Security didn’t feel overburdened, but it’s only going to get worse. As mobile devices and the Internet of Things force their way into corporate structures, the number of risks that IT Security must account for is increasing substantially.

End-users have invaded corporate networks with mobile devices.  These devices have clear advantages for productivity and end-user happiness, but allowing mobile devices to be used for business creates new ways for employees to walk out of the corporation with corporate data, and new ways to walk in with malware.

To compound this potential for additional vulnerability, very few of these end-users realize the risks around these devices.  Research from a Norton Report shows that mobile device users engaged in risky behaviors at a much higher rate than when using a PC.  Many people...

Jeannie Warner | 19 Feb 2014 | 0 comments

I’m excited to see so many changes going on in the areas of cyber security. Our leadership recognizes the future trend of organizations needing to drive intelligent security instead of the older concept of just layering products to address individual issues, which I think responds well to a world where people are realizing that there’s no single solution or product, no ‘silver bullet’ that will keep their organization safe. Even the threats themselves are evolving, with malware coders actively adjusting their attacks with every patch and signature the good guys put out. We’ve built this awareness into our whole security strategy at Symantec, and as our fiscal year comes to a close I can look back on what we’ve done and where we’re going with real enthusiasm.

Looking backward, in the last 12 months in Managed Security Services we’ve re-architected how we handle and process big data to provide a...

MSS Global Threat Response | 19 Feb 2014 | 0 comments


FireEye published a blog on a new unpatched vulnerability in Microsoft Internet Explorer 10 (CVE-2014-0322) being exploited in the wild on 2/14/2014. The compromised website (vwg[.]org) was injected with an iframe that redirects the user to the attacker’s malicious page, which then runs a Flash file. The Flash file contains shell code and it downloads a PNG file from a remote site upon successful execution of the IE vulnerability. The PNG file has a DLL and EXE embedded at the bottom. The DLL launches the EXE which is the payload.

Data uncovered during Symantec investigation suggests a connection between this attack and the malicious actors known to Symantec as Hidden Lynx. The data indicates the same infrastructure is being leveraged as found in a previous attack by this group who used...

MSS Global Threat Response | 10 Feb 2014 | 0 comments


Credit and debit card data theft is one of the earliest forms of cybercrime and persists today. Cybercrime gangs organize sophisticated operations to steal vast amounts of data before selling it in underground marketplaces. Criminals can use the data stolen from a card’s magnetic strip to create clones. It’s a potentially lucrative business with individual cards selling for up to $100.

There are several routes attackers can take to steal this data. One option is to gain access to a database where card data is stored.  Another option is to target the point at which a retailer first acquires that card data – the Point of Sale (POS) system.

Modern POS systems are specially configured computers with sales software installed and are equipped with a card reader. Card data can be stolen by installing a device onto the card reader which can read the data off the card’s magnetic strip. This is a process known as “skimming”. As...

Vince Kornacki | 10 Feb 2014 | 4 comments

In previous installments we constructed our mobile development toolchain and cross compiled, installed, and executed TCPDUMP on our CyanogenMod Mobile Device. Now it's time to complete our mission by forwarding packets captured by TPCDUMP on our CyanogenMod Mobile Device to Wireshark on our Debian Workstation in order to conduct realtime mobile device network traffic monitoring within a slick GUI interface. First we'll need to download Netcat, the network Swiss army knife. And of course we'll need to cross compile Netcat for ARM processors. I sure hope you were paying attention in the previous installments! First unpack Netcat:

root@debian $ tar zxvf netcat-0.7.1.tar.gz

Then move into the newly created Netcat directory and set the "CC" environment variable to specify the ARM C compiler and the "LDFLAGS" environment...

Vince Kornacki | 10 Feb 2014 | 0 comments

TCPDUMP is extremely useful for monitoring network traffic when debugging applications and performing penetration tests. Unfortunately Android mobile devices do not include the TCPDUMP program. However, do not despair. This blog series will provide step-by-step instructions for cross compiling, installing, and running TCPDUMP on Android mobile devices. As Michael Buffer would say right before Hulk Hogan brings the smack down, "Let’s get ready to rumblllllllllllle!"

First things first. You'll need to root your Android device in order to run TCPDUMP. For the purposes of this blog series we’ll use CyanogenMod 11 (based on Android 4.4 KitKat) on our mobile device and Debian Jessie (the current Testing release) on our workstation. CyanogenMod is mobile device firmware based on the open-source Android operating...

Stuart.Broderick | 03 Feb 2014 | 0 comments

This quotation is very appropriate when we consider protecting information against cyber threats. Putting this quote into context, means that as the maturity of an organizations Information Security Management System (ISMS) increases; the organization becomes less susceptible to successful cyber threats and, in many cases, prevents those threats from causing damage to the organization.

To eliminate any confusion in this blog, let’s define what we mean by “maturity” in this context. Maturity is not about the age of the ISMS program. Although many successful mature ISMSs have been developed and used over multiple years, it’s about the degree or extent of integration between the information security policy, standards and processes together with inter-dependence of associated technologies used to affect the security controls. Additionally, the maturity of the ISMS is also about how well integrated and supportive the program is with the overall goals and objectives of the...

Vince Kornacki | 29 Jan 2014 | 0 comments

Bob Shaker's compelling "Consider Security Before Building Your Nest" blog post got me thinking about Internet of Things (IoT) security. In case you've been on the moon, earlier this month Google announced the acquisition of home automation company Nest Labs for $3.2 billion, thrusting the Internet of Things into the spotlight. According to Gartner the Internet of Things will include 26 billion devices by 2020. 26 billion! Attackers are likely salivating over such an incredible number of devices just waiting to be hacked. So let's ride the trending wave and consider Nest Labs, a representative sample of Internet of Things technology.

Nest Labs currently offers two lines of smart home devices: thermostats and smoke / carbon monoxide detectors. Nest devices include super cool self-learning...

Vince Kornacki | 16 Jan 2014 | 0 comments

In the last installment we planned the vertical password guessing attack and optimized our wordlist. Now let's get our hands dirty! Attackers utilize a variety of tools to automate password guessing attacks, including Hydra, Nmap in conjunction with the http-form-brute script, and homegrown scripts. However, for the purposes of this exercise we'll use Burp Suite Pro, the Swiss Army Knife of web application penetration testing. We'll leverage Burp Intruder functionality to launch the password guessing attack. Note that Burp Intruder functionality is only available within the commercial Burp Suite Pro, not the free Burp Suite. However, at only $299 per user per year, Burp...