Home Tags Internet Protocol (IP)

Tag: Internet Protocol (IP)

Hajime, the mysterious evolving botnet

Hajime (meaning ‘beginning’ in Japanese) is an IoT worm that was first mentioned on 16 October 2016 in a public report by RapidityNetworks.
In this blogpost we outline some of the recent ‘improvements’ to Hajime, some techniques that haven’t been made public, and some statistics about infected IoT devices.

DDoS attacks abusing exposed LDAP servers on the rise

Each DDoS (distributed denial-of-service) attack seem to be larger than the last, and recent advisories from Akamai and Ixia indicate that attackers are stepping up their game.

As attackers expand their arsenal of reflection methods to target CLDAP ...

Moortec and UltraSoC collaborate to enable next-generation "smart" PVT sensors

CAMBRIDGE, United Kingdom, 12th April 2017: UltraSoC and Moortec Semiconductor today announced that they are cooperating on system-on-chip (SoC) monitoring and analytics intellectual property (IP) to enable a new generation of Process, Voltage and Temperature (PVT) sensor sub-systems.

By integrating UltraSoC’s digital monitoring and optimization capabilities, with Moortec’s industry-leading PVT products this enables powerful, chip-wide infrastructure to improve SoC performance and reliability.Moortec’s PVT sensor sub-systems are widely used thoroughout the industy to allow intelligent control... Source: RealWire

TCP/IP headers leak info about what you’re watching on Netflix

Not even HTTPS can hide your secret Gilmore Girls fetish An infosec educator from the United States Military Academy at West Point have taken a look at Netflix's HTTPS implementation, and reckons all he needs to know what programs you like is a bit of passive traffic capture.…

Unraveling the Lamberts Toolkit

The Lamberts is a family of sophisticated attack tools that has been used by one or multiple threat actors against high-profile victims since at least 2008.

The arsenal includes network-driven backdoors, several generations of modular backdoors, harvesting tools, and wipers.

Feds deliver fatal blow to botnet that menaced world for 7...

Alleged Kelihos kingpin arrested while his family traveled from Russia to Spain.

Travel Routers, NAS Devices Among Easily Hacked IoT Devices

A researcher poked holes in seven different IoT devices at last week's Security Analyst Summit, including a host of travel routers, NAS devices, and an IP-enabled camera.

Twitch unleashes scorched-earth attack to unveil malicious spambot creator

PayPal, CloudFlare, Shaw, and Whois “are involved” in attacks, Twitch claims.

Downloads of VPN-equipped Opera browser double after Congress revokes Internet privacy...

Opera Software today boasted that the number of new U.S. users of its namesake browser more than doubled days after Congress voted to repeal restrictions on broadband providers eager to sell customers' surfing history.Opera debuted a VPN -- virtual private network -- a year ago, and finalized the feature in September.

A VPN disguises the actual IP address of the user, effectively anonymizing the browsing, and encrypts the data transmitted to and from sites, creating a secure "tunnel" to the destination.[ Also on InfoWorld: Want privacy? Congress says you'll have to pay for it. |  Read 'em and weep: 5 ways your ISP is screwing you. | 5 more ways your ISP is screwing you. | Cut to the key news in technology trends and IT breakthroughs with the InfoWorld Daily newsletter, our summary of the top tech happenings. ]By using a VPN, U.S. users block their Internet service providers (ISPs) from recording their online activity.To read this article in full or to leave a comment, please click here

Lazarus Under The Hood

Today we'd like to share some of our findings, and add something new to what's currently common knowledge about Lazarus Group activities, and their connection to the much talked about February 2016 incident, when an unknown attacker attempted to steal up to $851M USD from Bangladesh Central Bank.

Penquin’s Moonlit Maze

Moonlight Maze is the stuff of cyberespionage legend.
In 1996, in the infancy of the Internet, someone was rummaging through military, research, and university networks primarily in the United States, stealing sensitive information on a massive scale.

To say that this historic threat actor is directly related to the modern day Turla would elevate an already formidable modern day attacker to another league altogether.

Imagination Technologies’ shares collapse after Apple ditches Brit chip designer

"Apple is developing own chip designs—which might breach Imagination's IP," firm claims.