Tag Archive for: fools

New exploit fools users into thinking their hacked iPhone is safe


Lockdown Mode



If an iPhone has already been infected with malware, Jamf has shown how an attacker can trick the user into believing Lockdown Mode is active when it isn’t.

Despite popular belief, iPhones can get infected with malware — but it is rare. Attackers taking advantage of zero-day vulnerabilities and zero-click exploits can infect a user’s device — though these sophisticated attacks are often expensive and difficult to execute.

Jamf Threat Labs has worked out a proof-of-concept post-exploitation tampering technique that makes an iPhone behave like it is in Lockdown Mode when it isn’t. The user can toggle Lockdown Mode and will see visual cues, like an apparent device restart and warnings in Safari that trick the user into a false sense of security.

This isn’t a flaw with Lockdown Mode, iPhone security, or the operating system. The tampering technique only works on devices that have already been infected with malware.

Jamf researched this proof-of-concept to emphasize that Lockdown Mode has limitations. It is a shield that reduces the attack surface on an iOS device, not anti-malware that detects infections and ejects them.

Lockdown Mode is most effective when used on a device before an attack occurs. It reduces the number of entry points available for an attacker.

Warnings tell the user Lockdown Mode is being activated

Warnings tell the user Lockdown Mode is being activated

A system reboot can help stop malware from monitoring the user, but Jamf found a way to force a userspace reboot instead of a system reboot. That way, the injected code can maintain adaptable control over Lockdown Mode.

Lockdown Mode performs several actions, most of which are invisible to the user.

  • Messages — Most message attachments are blocked, and some features are unavailable.
  • FaceTime — Incoming FaceTime calls from people you have not previously called are blocked.
  • Web Browsing — Some web technologies and browsing features are blocked.
  • Shared Albums — Shared albums will be removed from the Photos app, and new Shared Albums invitations will be blocked.
  • Device Connections…

Source…

SophosEncrypt Ransomware Fools Security Researchers


The SophosEncrypt ransomware-as-a-service (RaaS) threat has emerged, after flying under the radar by impersonating cybersecurity vendor Sophos.

The incident was discovered by MalwareHunterTeam (@malwrhunterteam), which posted a series of four images on Twitter with the caption “‘### Encryption program -SOPHOS ###’ Sophos ransomware?” In response, Sophos (@SophosXOps) tweeted back: “Thanks @malwrhunterteam for the heads up, we found this on [VirusTotal] VT earlier and have been investigating.”

Because of the operators using the vendor’s name and disguising the malware’s true identity, security researchers originally believed that the ransomware was part of a red-team exercise conducted by Sophos itself. Now that the truth is revealed and an investigation is underway, Sophos has begun working on “targeted detection rule for Sophos endpoint security products.”

In its report, Sophos also noted that the ransomware executable is a bit dated in regard to its functionality and acts more as a “general-purpose remote access trojan (RAT)” that also has the “capacity to encrypt files and generate these ransom notes.” The ransomware encryptor is written in Rust, has multiple references to a Tor website that leads to an affiliate panel for the ransomware operation, and has a command-and-control server (C2) that is linked to Cobalt Strike C2 servers that have been used in past attacks.

Keep up with the latest cybersecurity threats, newly-discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

Source…

Smashing Security podcast #222: Facebook, deepfakes, and April Fools scandals


While remote work has been on the rise for years now, the recent rapid expansion of work-from-home culture presents new security challenges. Duo Security makes application access more secure for organizations of all sizes. Its modern access security is designed to safeguard all users, devices, and applications – so you can stay focused on what you do best.

Proactively reduce the risk of a data breach, verify users’ identities, gain visibility into every device and enforce polices to secure access to every application. Give your organization the peace-of-mind that only complete device visibility can bring. Visit Duo.com to sign-up for a free 30 day trial.

Source…

Computer scientists’ new tool fools hackers into sharing keys for better cybersecurity

UT Dallas researchers presented a paper on their work, “Improving Intrusion Detectors by Crook-Sourcing,” at the annual Computer Security Applications Conference in December in Puerto Rico. They …
computer security – read more