Saturday, May 31, 2014

Countries and systems compromised

"For any nation would dare to say that 100% is prepared for an attack, but Brazil is prepared to respond to cyber threats more likely". Article started on Saturday with the words of General Jose Carlos Dos Santos, head of the division of military cyber command in Brazil, in response to the question I did a few months ago at the press conference on the strategy of the World Cup in Fútbol.

Words unfortunately after learning that the system of internal communications of the Ministry of External Relations of the country has been committed. The method of attack, a classic among classics: Social engineering and phishing coupled in order to obtain access credentials of any of the 1,500 Brazilian diplomats worldwide. And the cup, still unknown, but between the union fears "be facing a new Wikileaks".

From Brazil to El Salvador, where these days the government warned of a new campaign, this time addressed to the ordinary citizen, and is passed by the Treasury to install a data-stealing Trojan. By WeLiveSecurity echo of the tools used and the inner workings of this malware are made.

Because in the world of cyber initiative and invention is the order of the day. And it just ask the guys at Trusteer, IBM company dedicated to security, and have played the role of priest in baptizing a new Trojan, which stems from two well known parents in the sector: Zbot, a management botnets crimepack, and Carberp, the darling of bank fraud. The "baby" calls Zberp and is going strong with the very best of each parent, threatening in life leading to over 450 financial institutions.

And we end with a threat to consider for all users of the new versions of Windows. UEFI interface, BIOS replace, and that already in his day was criticized for compulsory managing certificates OS boot (which was side by many Linux distributions), back in the news after the close Hack in the Box 2014. And is that allowing each manufacturer implement its own UEFI has allowed the emergence of several possible exploits that to seize control system start, with the danger that entails (autoloading infected boot leader, unable to boot, firmware infection, ...). As in most cases, having the data encrypted, using security tools in the boot and a strong password greatly hinder any possible attack.

If you've come to the end, remember that you can rate and comment our posts, or follow our social profiles whose links you will find at the sidebar, as usual.


Post a Comment