{"id":283,"date":"2019-06-05T18:43:00","date_gmt":"2019-06-05T16:43:00","guid":{"rendered":"http:\/\/www.iicrai.org\/en\/?p=283"},"modified":"2019-06-09T18:51:23","modified_gmt":"2019-06-09T16:51:23","slug":"press-review-june-5th-2019","status":"publish","type":"post","link":"https:\/\/www.iicrai.org\/fr\/press-review-june-5th-2019\/","title":{"rendered":"Revue de presse Cybers\u00e9curit\u00e9 05 Juin 2019"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div style=\"border: none; border-top: solid #BFBFBF 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Contexte\" style=\"text-align: center;\"><strong>Actualit\u00e9 de la Cybers\u00e9curit\u00e9<\/strong><\/p>\n<\/div>\n<p class=\"DR-Objet\" style=\"text-align: center;\"><strong>Revue de presse<\/strong><\/p>\n<p class=\"DR-Emetteur\" style=\"text-align: center;\"><strong>CSIRT IICRAI<\/strong><\/p>\n<p class=\"DR-Date\" style=\"text-align: center;\"><strong><span lang=\"EN-HK\">Mercredi 05 juin 2019<\/span><\/strong><\/p>\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">CYBERCRIME<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">The Australian National University suffered a major, sophisticated attack<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">The Australian National University suffered a vast hack carried out by a \u201csophisticated operator\u201d who gained access to 19 years of sensitive data.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/securityaffairs.co\/wordpress\/86625\/data-breach\/australian-national-university-hack.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Securityaffairs.co<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Norsk Hydro Q1 2019 Profits Sank Following Ransomware Attack<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">The first quarter profits for Norsk Hydro sank after the Norwegian aluminum and renewable energy company fell victim to a ransomware attack.<br \/>\nAccording to Reuters, Norsk Hydro\u2019s gains fell to 559 million Norwegian crowns (approximately $64.3 million at the time of reporting) in the first quarter of 2019. That number is down from 3.15 billion crowns a year earlier, constituting a drop of 82 percent.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/securityboulevard.com\/2019\/06\/norsk-hydro-q1-2019-profits-sank-following-ransomware-attack\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Securityboulevard.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">An Inside Look at the Evolution of a West African Cybercriminal Startup Turned BEC Enterprise<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Following an unsuccessful business email compromise (BEC) attack against a security firm, researchers have used active defense techniques to gain unprecedented insight into a Nigerian scamming group. The initial attack purported to be an email from the firm&rsquo;s CEO asking the CFO to instigate \u00ab\u00a0a domestic wire transfer to a vendor.\u00a0\u00bb<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.securityweek.com\/inside-operations-west-african-cybercrime-group\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Securityweek.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">MALWARE<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><strong><em><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">HiddenWasp : un programme malveillant d\u00e9tect\u00e9 sur Linux, capable de contr\u00f4ler totalement les machines infect\u00e9es<\/span><\/em><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Les chercheurs d&rsquo;Intezer ont d\u00e9couvert la semaine derni\u00e8re une porte d\u00e9rob\u00e9e sous Linux surnomm\u00e9e HiddenWasp. Selon les chercheurs, cette porte d\u00e9rob\u00e9e est une suite de programmes comprenant un cheval de Troie, un rootkit et un script de d\u00e9ploiement initial.<br \/>\n<i>En compl\u00e9ment de la revue de presse du 31\/05\/2019<\/i><\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/linux.developpez.com\/actu\/264108\/HiddenWasp-un-programme-malveillant-detecte-sur-Linux-capable-de-controler-totalement-les-machines-infectees\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Linux.developpez.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Platinum is back<\/span><\/strong><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">In June 2018, Kaspersky came across an unusual set of samples spreading throughout South and Southeast Asian countries targeting diplomatic, government and military entities. The campaign, which may have started as far back as 2012, featured a multi-stage approach and was dubbed EasternRoppels. The actor behind this campaign, believed to be related to the notorious PLATINUM APT group, used an elaborate, previously unseen steganographic technique to conceal communication.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/securelist.com\/platinum-is-back\/91135\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Securelist.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Magecart skimmers found on Amazon CloudFront CDN<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Late last week, MalwareBytes observed a number of compromises on Amazon CloudFront \u2013 a Content Delivery Network (CDN) \u2013 where hosted JavaScript libraries were tampered with and injected with web skimmers.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/06\/magecart-skimmers-found-on-amazon-cloudfront-cdn\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Blog.malwarebytes.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">HACK<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">How Hackers Use Social Media To Profile Targets<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">As cybercrime is all about monetary gain, attackers know that the more intelligence they gather about their targets the easier it is to achieve a compromise. On the other hand, most people voluntarily share large amounts of personal information on social networks without fully appreciating the risks. In this post, we\u2019ll find out how hackers use social media to profile targets and how you can protect yourself and your business.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.sentinelone.com\/blog\/how-hackers-use-social-media-profile-targets\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Sentinelone.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Newly Discovered Tap \u2019n Ghost Attack Let Hackers to Remotely Control Android Smartphones<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">A new attack dubbed Tap \u2018n Ghost targets NFC enabled Android smartphones, let attackers to trigger malicious events on the victim\u2019s smartphone and to take control over the smartphone remotely.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/gbhackers.com\/tap-n-ghost-attack-remotely-smartphones\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Gbhackers.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">VULNERABILITIES<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Even the NSA is urging Windows users to patch BlueKeep (CVE-2019-0708)<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">After Microsoft warned Windows users on two separate occasions to patch a severe security flaw known as BlueKeep, now, the US National Security Agency has echoed the OS maker&rsquo;s warning in the hopes of avoiding another WannaCry-like incident.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.zdnet.com\/article\/even-the-nsa-is-urging-windows-users-to-patch-bluekeep-cve-2019-0708\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Zdnet.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Unpatched Bug Let Attackers Bypass Windows Lock Screen On RDP Sessions<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">A security researcher today revealed details of a newly unpatched vulnerability in Microsoft Windows Remote Desktop Protocol (RDP).<br \/>\nTracked as CVE-2019-9510, the reported vulnerability could allow client-side attackers to bypass the lock screen on remote desktop (RD) sessions.<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/thehackernews.com\/2019\/06\/rdp-windows-lock-screen.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Thehackernews.com<\/span><\/a><\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/kb.cert.org\/vuls\/id\/576688\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Kb.cert.org<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">PRIVACY<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Protecting Yourself from Identity Theft<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">I don&rsquo;t have a lot of good news for you. The truth is there&rsquo;s nothing we can do to protect our data from being stolen by cybercriminals and others.<br \/>\n<i>il faut partir du principe que nos donn\u00e9es ont probablement d\u00e9j\u00e0 \u00e9t\u00e9 vol\u00e9es plusieurs fois et que la meilleure option consiste \u00e0 s\u2019assurer qu\u2019elles ne soient pas utilis\u00e9es contre nous!<\/i><\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.schneier.com\/blog\/archives\/2019\/05\/protecting_your_2.html\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Schneier.com<\/span><\/a><\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.ledecodeur.ch\/2019\/05\/15\/se-proteger-du-vol-didentite\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Ledecodeur.ch<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">REPORTS &#038; WHITE PAPERS<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Wajam: From start-up to massively-spread adware<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">How a Montreal-made \u00ab\u00a0social search engine\u00a0\u00bb application has managed to become a widely-spread adware, while escaping consequences<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.welivesecurity.com\/2019\/06\/05\/wajam-startup-massively-spread-adware\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Welivesecurity.com<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\">\n<p class=\"DR-Catgorie\"><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">BUZZ<\/span><\/strong><\/p>\n<\/div>\n<p class=\"DR-Titre\"><em><strong><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">La France bannit les IA de pr\u00e9diction des comportements des juges<\/span><\/strong><\/em><\/p>\n<p class=\"DR-Paragraphe\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\">Les technologies de justice pr\u00e9dictive sont-elles une menace pour la soci\u00e9t\u00e9 ?<\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/intelligence-artificielle.developpez.com\/actu\/264160\/La-France-bannit-les-IA-de-prediction-des-comportements-des-juges-les-technologies-de-justice-predictive-sont-elles-une-menace-pour-la-societe\/\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Intelligence-Artificielle.developpez.com<\/span><\/a><\/span><\/p>\n<p class=\"DR-Lien\"><span class=\"author-a-z90znz78zirz66zz75zoz80zh36f54z90z\"><a href=\"https:\/\/www.legifrance.gouv.fr\/eli\/loi\/2019\/3\/23\/2019-222\/jo\/article_33\" target=\"blank\" rel=\"noopener noreferrer\"><span lang=\"EN-HK\">Legifrance.gouv.fr<\/span><\/a><\/span><\/p>\n<div style=\"padding: 6.0pt 0cm 0cm 0cm;\">\n<div style=\"border: none; border-top: solid #D0CECE 1.0pt; padding: 6.0pt 0cm 0cm 0cm;\"><\/div>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Actualit\u00e9 de la Cybers\u00e9curit\u00e9 Revue de presse CSIRT IICRAI Mercredi 05 juin 2019 CYBERCRIME The Australian National University suffered a major, sophisticated attack The Australian National University suffered a vast hack carried out by a \u201csophisticated operator\u201d who&#8230;<\/p>\n","protected":false},"author":2,"featured_media":279,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-press-review"],"_links":{"self":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts\/283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":8,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/posts\/283\/revisions\/292"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/media\/279"}],"wp:attachment":[{"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iicrai.org\/fr\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}