Password and Credit Card-Stealing Azorult Malware Updated: More Weaponized



Exponentially increasing the potency of the Azorult, its operators configured a new update for the malware which has been stealing passwords, bank card main points, and cryptocurrency since its origination in 2016.
The Azorult malware, more weaponized than ever, leave victims unarmed against the cyber attack which allows fraudsters to steal their credentials including passwords, browsing histories, bank card main point and contents of their cryptocurrency wallets.
Well summarized by the researchers at tech safety corporate Test Level, “Considerably up to date”, is the phrase unanimously devised attempting to describe the degree of update the new model undertook.
“Substantially updated” is how the Check Point viewed it, the tech company says that the updated version is being marketed in an underground forum.
The updated model is equipped with novel features to rob the victims’ wallet off additional forms of cryptocurrency – BitcoinGold, electrumG, btcprivate (electrum-btcp), bitcore and Exodus Eden are the probable targets.
Azorult’s developer boats further enhancements to the cryptocurrency wallet stealer parts and improvements to the loader, this reflects the meteoric emergence of the gray sphere of malware advancements.
As noted by the researchers, the inclusion of a new encryption method to obscure the domain name coupled with a new key for connecting to the command and regulation server makes the malware comparatively deadlier and distinct from the earlier versions.
Azorult made its debut appearance in the market on 4th of the October; it was followed by the online leaks of source code for Azorult versions 3.1 and 3.2.  Check Point noticed, Gazorp (a malware builder that lets users generate a previous model of Azorult at zero expenses) being powered by using free tools.
Remarking the addition as worthwhile, Israel Gubi, a malware researcher at Check Point says "It is plausible that the Azorult's author would like to introduce new features to the malware and make it worthy as a product in the underground market,"
The updated version of Azorult is made to penetrate via the RIG exploit kit, it exploits the vulnerabilities in Internet Explorer and Flash Player to launch JavaScript, Flash, and VBScript-based attacks to deliver malware to users.
 On the protection front, users are advised to ensure that they have all the relevant software updates installed as Azorult is reportedly reliant on vulnerabilities that aren’t the first of their kind.





Over-Hyped libssh vulnerability




A four-year-old vulnerability in libssh, a library used to implement the Secure Shell (SSH) authentication protocol, could allow malicious actors an easy access to servers with full administrative control.

A security consultant Peter Winter-Smith at NCC Group is the first one to discover the authentication bypass flaw (CVE-2018-10933) in libSSH.

Using the vulnerability, the attackers can bypass authentication procedures and gain access to a server enabled with an SSH connection without entering the password.

This could be done by sending the SSH server "SSH2_MSG_USERAUTH_SUCCESS" message instead of the "SSH2_MSG_USERAUTH_REQUEST" message.

Due to a coding error, the message "SSH2_MSG_USERAUTH_SUCCESS" is interpreted as the "authentication has already taken place" and it grants access to the server.

On June this year, he informed the libSSH team about the flaw, and the patch for the vulnerability was coded in mid-September and the update was released Oct. 16.

However, until now there are no signs of any major sites being affected by the flaw. While,  it is reported that Github support libssh, but its security team has clarified that their site is unaffected by the vulnerability.

"We use a custom version of libssh; SSH2_MSG_USERAUTH_SUCCESS with libssh server is not relied upon for pubkey-based auth, which is what we use the library for. Patches have been applied out of an abundance of caution, but [GitHub Enterprise] was never vulnerable to CVE-2018-10933," the company said on Twitter.

"I suspect this will end up being a nomination for the most overhyped bug, since half the people on Twitter seem to worry that it affects OpenSSH and the other half (quite correctly!) worry that GitHub uses libssh, when in fact GitHub isn’t vulnerable," Winter-Smith said.

 “Remove GitHub and my guess is you’ll be left with a small handful of random sftp servers or IoT devices and little else!” he further added.

According to the security researcher, the best way to avoid any kind of flaw is to update the libSSH library to version 0.7.6 or higher.

Here are some of the additional details about the bug as provided by  the researcher Winter-Smith

"The issue is basically a bug in the libssh library, not to be confused with the similarly named libssh2 or OpenSSH projects (especially the latter) which results from the fact that the server uses the same state machine to authenticate clients and servers.

The message dispatching code that processes messages either in client mode or server mode (it’s the same function) doesn’t make sure that the message type received is suitable for the mode it’s running in. So, for example, the server will dispatch messages which are only intended by design for processing client side, even when running in server mode.

The SSH2_MSG_USERAUTH_SUCCESS message is used by the server to inform the client that they were authenticated successfully, it updates the internal libssh state machine to mark the client as being authenticated with the server. What I found was that if the exact same message is sent to the server it updates the state machine to tell the server the client is authenticated.

Technically: I would say that it’s surprising how fairly straightforward bugs with serious consequences can still lurk, and sometimes it pays to take a step back from fuzzing to try to understand how a protocol implementation works."


Russians and Vietnamese Hackers detained in the Czech Republic



The Prosecutor's office in Prague reported the detention of eight citizens of Russia and Vietnam. Hackers are accused of cyber attack on computer networks of the Czech Foreign Ministry.

Hackers are suspected of hacking into the servers of the Ministry of Foreign Affairs of the Czech Republic. According to prosecutors, Russian hackers helped Vietnamese citizens to legalize in the Czech Republic for a fee. It does not specify how many Russian citizens among the suspects.

The Ministry clarified that the detainees are suspected of breaking into the system of issuing residence permits. Four detainees were also charged with money laundering.

According to the Police, attackers could earn tens of millions of dollars.

In turn, Russian blogger Rustem Adagamov, who lives in the Czech Republic, wrote on his Twitter that Russian hackers had hacked the servers of the Czech Foreign Ministry in the interests of the Vietnamese, who can legalize their countrymen’s stay in Europe.


Phishing attack stealing login details, pictures of iPhone users



A new phishing email attack has engulfed Apple users to steal their login information.

The users are taken in the trap through a malicious email hyperlink labeled as ''review your subscription' which appears to be from Spotify. The link takes the users to an official-looking site with identical Apple logos.

The hackers have designed the site to dupe people into submitting their Apple login and password so that they can get an unrestricted access to Apple Pay, pictures, videos, and personal information.



A Reddit user named /u/the101maham was the first one to highlight the iPhone scam. "I saw this email today, I thought the sender looked fishy, so I went in to see if I had bought a year of Spotify Premium.

"I was drinking last night so I had a slight panic and clicked the link.

"But when I saw the Apple page with a random address I immediately knew it was a scam."

Tim Sadler, CEO at security firm Tessian, told The Sun: "This is an example of a classic phishing scam.

"Phishing emails, like spam, are bulk in nature but are often farming for a user's credentials by mimicking the identity of a trusted website or service – in this case, Apple and Spotify.

"Like spam, phishing doesn't discriminate. Anyone, individual or business, can be targeted and easily duped."

Effect Of "Internet Of Things" & Artificial Intelligence On Elections And Others.

Effect Of "Internet Of Things" & Artificial Intelligence On Elections And Others.


Latest technological advancements are beginning to become a point of worry for the election officials as the hackers are targeting the systems using AI.

After social media, phishing attacks and, ransomware, cyber-goons have resorted to Artificial Intelligence for tampering with the election security. The most distressing part is that the attackers are way more powerful than the defenders could ever be, at least in recent times.

The days of slow and tedious cyber-attacks are gone. AI has made the process a lot easier making the number of chances at hacking increase suitably and it is all automatic. Political campaigns and other election systems are suspected to be manipulated quite successfully.
To tackle automated hacks and easily dodge them Google has its own reliable AI system that identifies bot-presence and handles it accordingly after analyzing the attack patterns.

In the list of infiltrated campaigns, one massive name is of the Clinton campaign, where evasive efforts at fooling the chairman were made and the systems were hacked into, to harvest sensitive campaign details.

Political campaigns have been tampered with for years now, password hacking being the most cliché of all. Loads of sensitive information is secured by basic passwords which are effortless to crack by the emerging automated bots that use “Password Stuffing”.

Someone logs into two websites using the same email address and usernames and if any of those websites gets compromised, then the entire set of details gets published on what the researchers like to call the “Dark Web”. So anyone who has ever used the same username or email-id password combination at more than one site is at risk.

Bots use the abstracted passwords and usernames to make incessant login attempts in the accounts of the campaign staffers and election officials using one password combination until one of them works.
Botnets have been the reason behind, more than 250,000 illegitimate attempts at logging in, every hour.

According to sources, a major organization’s technology head alluded that the more data available to AI’s computation the stronger it gets. Hackers live for data, and what better source could there be than the network created by many devices that are interconnected, which goes by the name of “IoT” or “Internet of Things”. IoT encompasses it all, beginning from smart home appliances to smart cars, in fact, monitors for babies and other toys are not left behind either. The online market is brimming with IoT devices which aren’t even secured properly, making them more susceptible to cyber-malice and automated attacks.

Every IoT device must be securely fabricated, safely, used and managed as well, otherwise, the organizations and users would lie naked to great danger.

A botnet had previously wreaked a lot of havoc in 2016 elections in the US. In case it targets IoT devices at the time of the elections the internet would turn inaccessible and the voters’ communication would collapse completely.

The growth and prosperity of AIs are inevitable, but companies and organizations must on their own level take steps to tighten the security.

According to a reputed source, every nook and cranny of the systems concerned must be doubly secured so as to ensure that the attackers can’t find a way to hack into them. Moreover, unique passwords seem to be the only viable solution.