Skip to main content

Friday Five: 12/02 Edition

by Ellen Zhang on Friday December 9, 2016

Contact Us
Free Demo

It's Friday! Catch up on the latest infosec headlines with our weekly news roundup.

1. Deutsche Telekom attack part of global campaign on routers by Eric Auchard

Nearly 1 million routers were infected by a cyberattack on Deutsche Telekom, Germany’s largest telecom company. This IoT attack spanned globally and caused internet outages to as many as 900K Deutsche Telekom users. The hackers responsible used IoT botnet Mirai, which was responsible for bringing down Krebs on Security earlier this fall and whose source code was released. This attack once again fuels concerns over the vulnerability of widely used IoT devices such as routers, webcams, video recorders, etc. For more info, read the full article.

2. Gooligan malware snares access to more than 1M Google accounts by Michael Kan

New Android malware, going by the name of Gooligan, has stolen access to over 1 million Google accounts. Older versions of Android, from 4.1 to 5.1 are at risk. The malware disguises itself as legitimate looking apps just like the malware in the fake Pokemon Go apps and attempts to root the device to gain complete access to the device. Gooligan exploits well-known vulnerabilities in these older Android versions that either don’t have available patches or have patches that were never installed by the user. The majority of victims are located in Asia. Needless to say, don’t download apps from third party sites. Head to Computer World for more info.

3. Rule 41 – FBI Gets Expanded Power to Hack Any Computer in the World by Swati Khandelwal

Changes to Rule 41 of the Federal Rules of Criminal Procedure by the U.S. Department of Justice came into effect on Thursday, December 1 after efforts to block them failed. The FBI now has expanded powers to hack into any computer within the country with just one warrant authorized by any US judge (even if it is outside their jurisdiction). The changes were initially approved in April; however, Senator Ron Wyden attempted to block the changes. Privacy advocates say that these changes could allow the FBI to carry out international hacking operations with less barriers or hack innocent users. The DOJ argues that it’ll allow the FBI to more easily carry out investigations against hackers using Tor or VPN to hide their locations. Either way, the expansion of powers could be a first step down a dangerous road. Read the full article on The Hacker News.

4. Fatal flaws in ten pacemakers make for Denial of Life attacks by Darren Pauli

The healthcare sector continues to be a prime target for hackers. Hacks on IT infrastructures of hospitals, insurance firms, and other healthcare providers happen all too often. To tack on additional worry, a research team examined implantable medical devices such as pacemakers to see if they could hack them and found exploits that would allow wireless remote attackers to kill the user. In addition, hackers could gain access to location history, treatments, as well as the patient’s current state of health. Their findings show a gaping security hole in these medical devices that needs to be repaired. For more, read the full article on The Register.

5. Avalanche Botnet Comes Tumbling Down In Largest-Ever Sinkholing Operation by Sara Peters

Since 2009, the Avalanche botnet has been responsible for ransomware, RATs, and banking Trojans, involving up to 500,000 active infected devices on a daily basis. It has cost German banks $6.4 million and hosted 17 of the worst malware families. But starting this past Wednesday, law enforcement around the world collaborated in a successful international takedown of Avalanche. 800,000 domains were seized, sinkholed or blocked and five people were arrested. Over 130 TB of data were captured and German officials were able to identify the server structure of the botnet. For more info, head to Dark Reading.

Tags:  Security News

Recommended Resources

The Definitive Guide to DLP

All the essential information you need about DLP in one eBook.

The Ultimate Guide to Data Protection

Everything you need to know about data protection but were afraid to ask.