In the light of the new Whatssapp Facebook privacy threat,
read: https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2016/08/statement-on-changes-to-whatsapp-and-facebook-s-handling-of-personal-data/

and then what ico should look into- the data farcebook sits on and their dealings both with commerce and state surveillance: http://www.zdnet.com/article/firm-facebooks-shadow-profiles-are-frightening-dossiers-on-everyone/

Hope Big Brother will not turn angry on us, frightening spying and data-slurping.
Who will check them eventually?

polonus

CrowdStrike Machine Learning and VirusTotal
https://www.crowdstrike.com/blog/crowdstrike-machine-learning-virustotal/

CrowdStrike detection example (First submission 2016-08-26 06:24:22 UTC ( 1 day, 3 hours ago ))
https://www.virustotal.com/en/file/f7a4a9b58e9935d28dc69f7905b4bc6b41e3d2e08d62c9ffb1d37b316d3a2eaf/analysis/

also see > https://ctovision.com/2015/10/does-next-generation-anti-virus-solve-the-fatal-flaws-of-anti-virus/

also see > https://labsblog.f-secure.com/2016/08/26/whats-the-deal-with-machine-learning/

Opera server breach incident
https://www.opera.com/blogs/security/2016/08/opera-server-breach-incident/

RIPPER ATM MALWARE AND THE 12 MILLION BAHT JACKPOT

https://www.fireeye.com/blog/threat-research/2016/08/ripper_atm_malwarea.html

Watch out for this Phishing email

http://screencast-o-matic.com/screenshots/u/Lh/1472589695444-64005.png

http://screencast-o-matic.com/screenshots/u/Lh/1472589505788-34522.png

http://screencast-o-matic.com/screenshots/u/Lh/1472589853992-81721.png

I’ve receive the same email for Walmart, Walgreen, BurgerKing,McDonalds, Sams, Choice Home Warranty, etc., etc., etc.

Big mal-ad campaign halted: http://blog.talosintel.com/2016/09/shadowgate-takedown.html

pol

After Chrome 53 browser update, some extensions became corrupted and no longer functioned, like e.g. https everywhere.
Try to reinstall and repair, if this does not work use this as an alternative: https://chrome.google.com/webstore/detail/kb-ssl-enforcer/flcpelgcagfhfoegekianiofphddckof/related

polonus

Pokémon-themed Umbreon Linux Rootkit Hits x86, ARM Systems

http://blog.trendmicro.com/trendlabs-security-intelligence/pokemon-themed-umbreon-linux-rootkit-hits-x86-arm-systems/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+(Trendlabs+Security+Intelligence+Blog)

CSP often wrongly configured in the live website theater, it often can be circumvented in over 94% of cases.

Read: https://speakerdeck.com/mikispag/making-csp-great-again-michele-spagnuolo-and-lukas-weichselbaum?slide=9

Content Security Policy is a web platform mechanism designed to mitigate cross-site scripting (XSS), the top security vulnerability in modern web applications. In this paper, we take a closer look at the practical benefits of adopting CSP and identify significant flaws in real-world deployments that result in bypasses in 94.72% of all distinct policies. We base our Internet-wide analysis on a search engine corpus of approximately 100 billion pages from over 1 billion hostnames; the result covers CSP deployments on 1,680,867 hosts with 26,011 unique CSP policies – the most comprehensive study to date. We introduce the security-relevant aspects of the CSP specification and provide an in-depth analysis of its threat model, focusing on XSS protections. We identify three common classes of CSP bypasses and explain how they subvert the security of a policy. We then turn to a quantitative analysis of policies deployed on the Internet in order to understand their security benefits. We observe that 14 out of the 15 domains most commonly whitelisted for loading scripts contain unsafe endpoints; as a consequence, 75.81% of distinct policies use script whitelists that allow attackers to bypass CSP. In total, we find that 94.68% of policies that attempt to limit script execution are ineffective, and that 99.34% of hosts with CSP use policies that offer no benefit against XSS. Finally, we propose the ’strict-dynamic’ keyword, an addition to the specification that facilitates the creation of policies based on cryptographic nonces, without relying on domain whitelists. We discuss our experience deploying such a nonce-based policy in a complex application and provide guidance to web authors for improving their policies.

Source: https://research.google.com/pubs/pub45542.html
Complete article: https://static.googleusercontent.com/media/research.google.com/nl//pubs/archive/45542.pdf

polonus

on circumvention techniques: http://webcache.googleusercontent.com/search?q=cache:7dHCHaXZa94J:https://coolaj86.com/articles/how-to-get-around-latest-browser-security-measures/&num=1&hl=nl&gl=pl&strip=0&vwsrc=1 source AJoNeal (for security researchers only, else do not visit).

D

Dridex Banking Trojan Will Soon Target Crypto-Currency Wallets
http://news.softpedia.com/news/dridex-banking-trojan-will-soon-target-crypto-currency-wallets-508041.shtml

http://i1-news.softpedia-static.com/images/news2/dridex-banking-trojan-will-soon-target-crypto-currency-wallets-508041-3.png

Rambler was hacked
https://www.leakedsource.com/blog/rambler

10(!) year old leak in Windows Media Player again used to spread malware :
http://blog.cyren.com/articles/windows-media-player-drm-feature-used-for-malware-delivery-again.html

DRM is supposed to let people only play legally obtained songs/movies.
It is a totally useless system if it can be used to spread illegal (malicious) content.

Cryptocurrency Mining Malware Discovered Targeting Seagate NAS Hard Drives

http://news.softpedia.com/news/cryptocurrency-mining-malware-discovered-targeting-seagate-nas-hard-drives-508119.shtml?utm_content=buffer23663&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer

The French Dark Net Is Looking for Grammar Police
http://blog.trendmicro.com/trendlabs-security-intelligence/the-french-dark-net-is-looking-for-grammar-police/

Everyone worldwide that uses tor or VPN or unwillingly is part of a botnet could now be hacked by the FBI,
according to procedural changes to rule 41: https://blog.torproject.org/blog/fbis-quiet-plan-begin-mass-hacking: https://www.eff.org/deeplinks/2016/06/help-us-stop-updates-rule-41

polonus

Armada Collective DDoS Extortion Group Now Threatens Ransomware Infections
http://news.softpedia.com/news/armada-collective-ddos-for-bitcoin-group-now-threatens-ransomware-infections-508248.shtml :o

BkSoD by Ransomware:
HDDCryptor Uses Commercial Tools to Encrypt Network Shares and Lock HDDs

http://blog.trendmicro.com/trendlabs-security-intelligence/bksod-by-ransomware-hddcryptor-uses-commercial-tools-to-encrypt-network-shares-and-lock-hdds/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+(Trendlabs+Security+Intelligence+Blog)

Adobe Security Bulletin
https://helpx.adobe.com/security/products/flash-player/apsb16-29.html

September Patch Tuesday: Browser, Exchange, Office Bugs Dominate
http://blog.trendmicro.com/trendlabs-security-intelligence/september-patch-tuesday-browser-exchange-office-bugs-dominate/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+(Trendlabs+Security+Intelligence+Blog)

Microsoft Patches IE/Edge Zero-day Used in AdGholas Malvertising Campaign
http://blog.trendmicro.com/trendlabs-security-intelligence/microsoft-patches-ieedge-zeroday-used-in-adgholas-malvertising-campaign/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+(Trendlabs+Security+Intelligence+Blog)

Finnish police: Keep your car keys in the fridge
http://yle.fi/uutiset/finnish_police_keep_your_car_keys_in_the_fridge/9166149

https://labsblog.f-secure.com/2016/09/15/seriously-put-away-the-foil/