Security Leftovers

-
Open-source code from Mars rover used in espionage campaign targeting Indian government
Two open-source code libraries used in the development of the historic Mars rover have been exploited by cybercriminals and moulded into an effective espionage tool that is being used to target high-level officials in the Indian government.
First exposed by security researchers at Palo Alto Networks, the malware, now dubbed Rover, was found in a malicious phishing email received by India's ambassador to Afghanistan that was made to look like it was sent from India's defence minister which, if opened, would have installed a slew of vicious exploits on the computer system.
Upon analysis, the experts found the malware, which contained code that attacked a flaw in Office XP, boasted a range of spying features including the ability to hijack computer files, launch a keylogger, take screenshots and even record audio and video in real-time. All of the data compromised would be sent straight to the malware creator's command and control (C&C) server.
-
Open Source Code Of Mars Rover Being Used To Create Malware To Target Indian Government
Last year on December 24, 2015, a potential online target was identified which was delivered via an email to a high profile Indian diplomat, an Ambassador to Afghanistan. The email was spoofed and crafted as if it was sent by the current defence minister of India, Mr. Manohar Parikar. The mail commended the Ambassador to Afghanistan on his contributions and success.
-
Report: 3.5 Million HTTPS Servers Vulnerable to DROWN
A report released Tuesday on the DROWN vulnerability raises concerns about possible attacks that could expose encrypted communications. DROWN is a serious vulnerability that affects HTTPS and other services using SSL version 2, according to the team of security researchers who compiled the report. The protocols affected are some of the essential cryptographic protocols for Internet security. An attack could decrypt secure HTTPS communications, such as passwords or credit card numbers, within minutes.
-
OpenSSL update fixes Drown vulnerability
-
HTTPS DROWN flaw: Security bods' hearts sink as tatty protocols wash away web crypto
DROWN (aka Decrypting RSA with Obsolete and Weakened eNcryption) is a serious design flaw that affects HTTPS websites and other network services that rely on SSL and TLS – which are core cryptographic protocols for internet security. As previously reported, about a third of all HTTPS servers are vulnerable to attack, the computer scientists behind the discovery of the issue warn.
-
- Login or register to post comments
Printer-friendly version
- 1183 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
today's howtos
| LINMOB.net - Weekly GNU-like Mobile Linux Update (26/2022): Plasma Mobile Gear 22.06, Ubuntu Touch OTA-23 and the MNT Pocket ReformExtensions coming to GNOME Web, some new Sailfish OS Community News, NOKIA causes a naming dispute and more!
|
The Best Desktop Environments of 2022
As Linux users, we’re often spoiled for choice when it comes to software. There are some basic programs that we keep coming back to that are so integrated into the stack that we forget they’re even there. However, when it comes to things like desktop environments, it can be hard to determine the best option for exactly what you’re going to use it for. We have reviewed different Linux Desktop Environments, and there’s a lot of overlap between use cases. Here we show you the best Linux Desktop Environments for your particular use case.
| Porteus 5.0 is released!
Team Porteus is finally able to announce the immediate availability of Porteus-v5.0 final in EIGHT desktop flavours.
|
Recent comments
6 hours 36 min ago
6 hours 38 min ago
6 hours 39 min ago
6 hours 42 min ago
6 hours 52 min ago
6 hours 53 min ago
10 hours 44 min ago
14 hours 46 min ago
15 hours 22 min ago
17 hours 10 min ago