Bash bug allows code injection attack
This is interesting. A recently discovered bug [http://arstechnica.com/security/2014/09/bug-in-bash-shell-creates-big-security-hole-on-anything-with-nix-in-it/] in the bash shell (which is common on a lot of *nix systems) allows code injection via specially crafted environment variables. As in the linked articles, you can test if your version of Bash is vulnerable by running something like: $ env… Read more
Sample DNS Hijack against an unsecured router
As a follow up to the last article about exposed home routers / CPE, here’s a sample, very simple DNS hijack attack using a spare router I have (just in case anyone didn’t believe me). Given that almost every home router I have ever come across allows the user to set the WAN DNS… Read more
Credential Dump: 5 Million Google accounts
This [http://www.inforisktoday.co.uk/5-million-google-passwords-leaked-a-7299] is interesting, supposedly 5,000,000 Google usernames and passwords have been posted on a Russian bitcoin forum, however the list seems to have come not from a compromise of Google’s systems, but a large database collected from Malware, Phishing, etc. Google has posted a response [http:… Read more
Interesting paper on Mac OS security
I read a a rather interesting paper last night: Inside Mac Security by Ben Knowles. Many people view OS X as a ‘black box’ with a shiny GUI (Which, lets be honest, is one of its key selling points), the paper gives an overview of some of the key security features Apple have bundled into… Read more
Monday Malware Analysis #2: Upatre
In this week’s Monday Malware Analysis, we look at another piece of malware (Another Trojan) that was delivered to me via Phishing email. This one was once again delivered as a zip attachment under the guise of a payment receipt – Meaning I had to open up the attachment to open the receipt and figure… Read more