{"id":221,"date":"2019-06-06T02:56:19","date_gmt":"2019-06-06T00:56:19","guid":{"rendered":"http:\/\/www.iicrai.org\/en\/?p=221"},"modified":"2019-06-09T18:40:11","modified_gmt":"2019-06-09T16:40:11","slug":"press-review-mars","status":"publish","type":"post","link":"https:\/\/www.iicrai.org\/fr\/press-review-mars\/","title":{"rendered":"Revue de presse Cybers\u00e9curit\u00e9 06 Juin 2019"},"content":{"rendered":"<p class=\"DR-Logo\">\n<div style=\"border: none; border-top: solid #BFBFBF 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Contexte\" style=\"text-align: center;\"><strong>Actualit\u00e9 de la Cybers\u00e9curit\u00e9<\/strong><\/p>\n<\/div>\n<p class=\"DR-Objet\" style=\"text-align: center;\"><strong>Revue de presse<\/strong><\/p>\n<p class=\"DR-Emetteur\" style=\"text-align: center;\"><strong>CSIRT IICRAI<\/strong><\/p>\n<p class=\"DR-Date\" style=\"text-align: center;\"><strong><span lang=\"EN-HK\">Jeudi 06 juin 2019<\/span><\/strong><\/p>\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">CYBERCRIME<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Cryptojacking campaign uses Shodan to scan for Docker hosts to hack<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">A new cryptojacking campaign was spotted by experts at Trend Micro, crooks are using Shodan to scan for Docker hosts with exposed APIs.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/securityaffairs.co\/wordpress\/86417\/malware\/cryptojacking-campaign-docker.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Securityaffairs.co<\/span><\/a><\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/infected-cryptocurrency-mining-containers-target-docker-hosts-with-exposed-apis-use-shodan-to-find-additional-victims\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Blog.trendmicro.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><em><strong>Romanian National Sentenced to 65 Months in Federal Prison for Multi-State ATM Card Skimming Scheme<\/strong><\/em><\/span><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Scheme caused over $868,000 in losses from over 530 individual accounts in three states<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.justice.gov\/usao-ma\/pr\/romanian-national-sentenced-65-months-federal-prison-multi-state-atm-card-skimming-scheme\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Justice.gov<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">CYBERWARFARE<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">The EU\u2019s Embassy In Russia Was Hacked But The EU Kept It A Secret<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">An ongoing \u201csophisticated cyber espionage event\u201d was discovered in April, just weeks before the European Parliament elections \u2014 but the European External Action Service (EEAS), the EU\u2019s foreign and security policy agency, did not disclose the incident publicly.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.buzzfeednews.com\/article\/albertonardelli\/eu-embassy-moscow-hack-russia\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Buzzfeednews.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">CRYPTO-CURRENCY<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">New Evidence Suggests Satoshi Nakamoto Is Paul Solotshi, The Creator of Encryption Software E4M and TrueCrypt<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Paul Solotshi Calder Le Roux, a 46-year old criminal mastermind, is the creator of encryption software E4M and TrueCrypt (the cryptography encryption software Satoshi Nakamoto likely used to lock up his 1 million BTC), and author of an uncannily similar manifesto to the one in Bitcoin\u2019s whitepaper in 1998.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.investinblockchain.com\/new-evidence-suggests-satoshi-nakamoto-is-paul-solotshi-the-creator-of-encryption-software-e4m-and-truecrypt\/amp\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Investinblockchain.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">HACK<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Bypassing Root CA checks in Flutter based apps on Android<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">I recently started looking at Android apps based on the Flutter framework, I\u2019d not come across any before and after a pub discussion about something entirely unrelated managed to find one to break.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/orangewirelabs.wordpress.com\/2019\/06\/04\/bypassing-root-ca-checks-in-flutter-based-apps-on-android\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Orangewirelabs.wordpress.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">VULNERABILITIES<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Patch Android! June 2019 update fixes eight critical flaws<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Despite the modest vulnerability count, the fact that 8 are marked \u2018critical\u2019 and 14 \u2018high\u2019 is good enough reason to want them as soon as possible, with 2 of the criticals (CVE-2019-2094 and CVE-2019-2095) affecting only version 9.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/nakedsecurity.sophos.com\/2019\/06\/05\/patch-android-june-2019-update-fixes-eight-critical-flaws\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Nakedsecurity.sophos.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Unit 42 Discovers Vulnerabilities in Adobe Acrobat and Reader and Foxit Reader, Shares Threat Research at Microsoft BlueHat Shanghai 2019<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">As part of ongoing threat research, Palo Alto Networks Unit 42 threat researchers have discovered 28 new vulnerabilities addressed by the Adobe Product Security Incident Response Team (PSIRT) as part of their May Adobe Security Bulletin APSB19-18<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/unit42.paloaltonetworks.com\/unit-42-discovers-vulnerabilities-in-adobe-acrobat-and-reader-and-foxit-reader-shares-threat-research-at-microsoft-bluehat-shanghai-2019\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Unit42.paloaltonetworks.com<\/span><\/a><\/span><\/p>\n<p class=\"DR-Lien\"><strong><em>Expert developed a MetaSploit module for the BlueKeep flaw<\/em><\/strong><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">The vulnerability, tracked as CVE-2019-0708, impacts the Windows Remote Desktop Services (RDS) and was addressed by Microsoft with May 2019 Patch Tuesday updates. BlueKeep is a wormable flaw that can be exploited by malware authors to create malicious code with WannaCry capabilities.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/securityaffairs.co\/wordpress\/86612\/breaking-news\/metasploit-module-bluekeep.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Securityaffairs.co<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Avoiding the DoS: How BlueKeep Scanners Work<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">On May 21, @JaGoTu and I released a proof-of-concept for CVE-2019-0708. This vulnerability has been nicknamed \u00ab\u00a0BlueKeep\u00a0\u00bb. Instead of causing code execution or a blue screen, our exploit was able to determine if the patch was installed.Now that there are public denial-of-service exploits, I am willing to give a quick overview of the luck that allows the scanner to avoid a blue screen and determine if the target is patched or not.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/zerosum0x0.blogspot.com\/2019\/05\/avoiding-dos-how-bluekeep-scanners-work.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Zerosum0x0.blogspot.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">PRIVACY<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Firefox bloque les traqueurs et cookies publicitaires<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Les traqueurs et les cookies tiers permettant la collecte de donn\u00e9es utilisateurs \u00e0 des fins de ciblage publicitaire ne sont plus en odeur de saintet\u00e9 chez Firefox. La fonction Facebook Container, permettant d&rsquo;isoler la navigation du r\u00e9seau social dans un onglet de Firefox, est par ailleurs renforc\u00e9e.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.lemondeinformatique.fr\/actualites\/lire-firefox-bloque-les-traqueurs-et-cookies-publicitaires-75530.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Lemondeinformatique.fr<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">PHISHING<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Phishing attacks that bypass 2-factor authentication are now easier to execute<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Penetration testers and attackers have a new tool in their arsenal that can be used to automate phishing attacks in a way that defeats two-factor authentication (2FA) and is not easy to detect and block. The tool makes such attacks much easier to deploy, so organizations should adapt their anti-phishing training accordingly.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.csoonline.com\/article\/3399858\/phishing-attacks-that-bypass-2-factor-authentication-are-now-easier-to-execute.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Csoonline.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">REPORTS &#038; WHITE PAPERS<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Iranian APT group \u2018MuddyWater\u2019 Adds Exploits to Their Arsenal<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">In recent months, there has been considerable unrest in the Iranian cyber sphere. Highly sensitive data about Iranian APT groups was leaked, exposing abilities, strategies, and attack tools. The main medium for this leak was a telegram channel.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.clearskysec.com\/muddywater2\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Clearskysec.com<\/span><\/a><\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.clearskysec.com\/wp-content\/uploads\/2019\/06\/Clearsky-Iranian-APT-group-%E2%80%98MuddyWater%E2%80%99-Adds-Exploits-to-Their-Arsenal.pdf\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Rapport_pdf<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\"><\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Actualit\u00e9 de la Cybers\u00e9curit\u00e9 Revue de presse CSIRT IICRAI Jeudi 06 juin 2019 CYBERCRIME Cryptojacking campaign uses Shodan to scan for Docker hosts to hack A new cryptojacking campaign was spotted by experts at Trend Micro, crooks are using Shodan&#8230;<\/p>\n","protected":false},"author":1,"featured_media":279,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press-review"],"_links":{"self":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts\/221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":16,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts\/221\/revisions"}],"predecessor-version":[{"id":280,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts\/221\/revisions\/280"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/media\/279"}],"wp:attachment":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/categories?post=221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/tags?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}