Security Loop- Understand The Security

Post Top Ad

Wednesday, December 13, 2017

Again Malicious apps detected in Google play

December 13, 2017 0

It's not over . Malicious are again making debut in Google Play Again & Again.Recently, Report Published by Kaspersky Lab Claimed they found Some Malicious apps on Google . They are developed to steal  credential for VK.com
Some other popular apps among them too -Seven apps has 10,000-100,000 installations from Google play and nine apps has 1,000-10,000 installations

These apps has been published on Google play with out Code it's just GAME. Later Cyber criminals updated these apps with Malicious Version in OCT 2017, have waited 7 months to do so.


Sure, such apps need a user to login into an account – that’s why they didn’t look suspicious. The only apps whose functionality was not VK-related were game apps. Because VK is popular mostly in CIS countries, cyber criminals checked the device language and asked for VK credentials only from users with certain languages – Russian, Ukrainian, Kazakh, Armenian, Azerbaijani, Belarusian, Kyrgyz, Romanian, Tajik, and Uzbek.

Some apps are using API from Coinhive.com to mine Cypto-Currency.

APPSSOURCE : KASPERSKYLAB

Package nameMD5
com.parmrp.rumpF5F8DF1F35A942F9092BDE9F277B7120
com.weeclient.clientold6B55AF8C4FB6968082CA2C88745043A1
com.anocat.stelthC70DCF9F0441E3230F2F338467CD9CB7
com.xclient.old6D6B0B97FACAA2E6D4E985FA5E3332A1
com.junglebeat.musicplayer.offmus238B6B7069815D0187C7F39E1114C38
com.yourmusicoff.yourmusickoff1A623B3784256105333962DDCA50785F
com.sharp.playerru1A7B22616C3B8223116B542D5AFD5C05
com.musicould.close053E2CF49A5D818663D9010344AA3329
com.prostie.dvijenija2B39B22EF2384F0AA529705AF68B1192
com.appoffline.musicplayer6974770565C5F0FFDD52FC74F1BCA732
com.planeplane.paperplane6CBC63CBE753B2E4CB6B9A8505775389


HOW CAN YOU STAY SAFE ?
  • Turn On verify app for Seetings
  • Before downloading Read reviews about apps 
  • Do not download Unofficial Clients of any apps.
  • Keep a strong anti virus that detect  Malwares
  • Keep your device up to date.

Source : Secure list
Read More

Monday, December 11, 2017

What is Virus Total ? Is it useful for Us

December 11, 2017 0

May you have been heard of VirustTotal. Virust Total is website that scans Your Files, Suspicious urls . It scans for Worms, Trojans , malwares and Viruses .

There are Three options where you can scan Files, Url, and search. Let me describe below.

1. File Scan 

You can manually Scan Files from your pc by uploading them to site. And wait some seconds, minutes it depends upon your file size. After analyzing result looks like down below 
Detail of  File which in image : Click here [Opens in new window]
2. Url Scan.

You can scan suspicious url's  by copying their Link or typing there link in scan bar .And wait for some seconds when Virustotal analyze your url. 

3. Search 

You can manually search for Ip's, domains or scan own ip if the network as any threats . This is good for developers, researchers and we too. 
Ip i scanned Click here [opens new window]

Download browser Extension of VirusTotal. Avilable on Firefox, Chrome & Internet explorer  : Click here to download

Mobile app is also avilable for android Download From Google Play

Hence , Bloggers like me I always scan external url from virus total before uploading to this website.


 Thankyou , Suggestions, advice  Post in comments please
 



Read More

Wednesday, December 6, 2017

What is mailspolit ? and How it works

December 06, 2017 0


What is mailsploit ?
Mailsploit is a collection of bugs in email clients that allow effective sender spoofing and code injection attacks. The spoofing is not detected by Mail Transfer Agents (MTA) aka email servers, therefore circumventing spoofing protection mechanisms such as DMARC (DKIM/SPF) or spam filters.
According to mailspolit.com Bugs were found more than 30 applications, including  prominent one like apple mail ( all os's) , mozilla, thunderbird, microsoft email clients, yahoo mail, protonmail and others

How it is done?
Mailsploit is a new way to easily spoof email addresses. It allows the attacker to display an arbitrary sender email address to the email recipient. In the following demo I use potus@whitehouse.gov but any other email address could be used.

And this is how it works: In an email, all headers must only contain ASCII characters, including the “From” header.

The trick resides in using RFC-1342 (from 1992!), a recommendation that provides a way to encode non-ASCII chars inside email headers in a such way that it won't confuse the MTAs processing the email.

Unfortunately, most email clients and web interfaces don’t properly sanitize the string after decoding which leads to this email spoofing attack.

Here is what it looks like:

=?utf-8?b?[BASE-64]?=

=?utf-8?Q?[QUOTED-PRINTABLE]?=

Either base64 or the quoted printable representation can be used.

Using a combination of control characters such as new lines or null-byte, it can result in hiding or removing the domain part of the original email, allowing us to replace it. Here is why:

    iOS is vulnerable to null-byte injection

    macOS is vulnerable to “email(name)” injection

Mixing both of them turns out to work perfectly on both OSs:

From: =?utf-8?b?${base64_encode('info@nepal.gov.np')}?==?utf-8?Q?=00?==?utf-8?b?${base64_encode('(info@nepal.gov.np)')}?=@mailsploit.com


Which becomes:

From: =?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?==?utf-8?Q?=00?==?utf-8?b?cG90dXNAd2hpdGVob3VzZS5nb3Y=?=@mailsploit.com

Which, once decoded by Mail.app, becomes:

From: info@nepal.gov.np\0(info@nepal.gov.np)@mailsploit.com

Using this payload, both macOS and iOS will show that the email comes from potus@whitehouse.gov and not …@mailsploit.com:

    iOS will discard everything after the null-byte

    macOS ignores the null-byte but will stop after the first valid email it sees (due to a bug in the parser)

In order to avoid that the victim sees a glitch when trying to reply to the email, it is enough to add a “Reply-to” field:

Reply-To: info@nepal.gov.np
DEMONSTRATION 


Solutions?
-Always update your e-mail clients
-Update your browsers
-If you must stick with emails then use PGP/GPG to verify the identities and encrypt email contents.
-Think before clicking ,Governemt , industry wouldn't send you unless if you haven't done or contacted to them

or use Encrypted messenger for personal conversation .
Compare messengers from here https://www.securemessagingapps.com/

Try  demo How it actually works :
Click here


Credit : Sabri  
More details :  https://www.mailsploit.com/index







Read More

Tuesday, December 5, 2017

Tizi a New Malware detected by google

December 05, 2017 0
 https://securityillusion.files.wordpress.com/2017/11/androidmalware.jpeg?w=266
After many efforts by google removing malwares from Playstore. Recently google has detected a new malware
What is Tizi?
Tizi is a fully featured backdoor that installs spyware to steal sensitive data from popular social media apps. Google has discovered this family in September 2017 when device scan found an app with rooting capabilities that exploited vulnerabilities .
Tizi infected apps has been widely advertised in web

Scope of Tizi?

 Diagram Of tizi Infected . Mostly this malware is Found on African countries. (c) Google[/caption]
How tizi works ?
After gaining to root , it steals sensitive data from popular social media apps like Facebook, twitter, whatsapp, viber, skype and more.
It usually first contacts its command-and-control servers by sending an SMS with the device's GPS coordinates to a specific number. Subsequent command-and-control communications are normally performed over regular HTTPS, though in some specific versions, Tizi uses the MQTT messaging protocol with a custom server. The backdoor contains various capabilities common to commercial spyware, such as recording calls from WhatsApp, Viber, and Skype; sending and receiving SMS messages; and accessing calendar events, call log, contacts, photos, Wi-Fi encryption keys, and a list of all installed apps. Tizi apps can also record ambient audio and take pictures without displaying the image on the device's screen.
 
Tizi can root the device by exploiting one of the following local vulnerabilities:
  • CVE-2012-4220
  • CVE-2013-2596
  • CVE-2013-2597
  • CVE-2013-2595
  • CVE-2013-2094
  • CVE-2013-6282
  • CVE-2014-3153
  • CVE-2015-3636
  • CVE-2015-1805
Most of these vulnerabilities target older chipsets, devices, and Android versions. All of the listed vulnerabilities are fixed on devices with a security patch level of April 2016 or later, and most of them were patched considerably prior to this date. Devices with this patch level or later are far less exposed to Tizi's capabilities. If a Tizi app is unable to take control of a device because the vulnerabilities it tries to use are are all patched, it will still attempt to perform some actions through the high level of permissions it asks the user to grant to it, mainly around reading and sending SMS messages and monitoring, redirecting, and preventing outgoing phone calls.
 
What should I do to Prevent ?
Here are some few measures to prevent from it.
  • Turn on Verify apps from Seeting
  • Don't install software from unknown Sites
  • Turn off Unknown Sources if it is not in use.
  • Protect your device with pin and passwords
  • Encrypt your device
  • Always install new-updates
Sources : Google Security Blog
Read More

Chrome is Blocking Third party Software from Injceting code in to Browser

December 05, 2017 0

 https://securityillusion.files.wordpress.com/2017/12/chrome-broken-1024x576-1024x576.jpg?w=266


Bored of Chrome Crashing , Slowing  Down your system.   Don't worry Google has solution .
From 2018, chrome will no longer allow outside application to run Code in Browser.
Many third party software injects codes in your browser . For example Antivirus software inject codes fro control on your online activities and Offering additional feature.
screenshot-2017-11-30-at-8-27-03-am
The blocking process Takes 3 steps :
1. April 2018- With the release of Chrome66, Google will begin informing users if code injection causes their browser to crash, alerting them with the name of the Responsible application and a guide to update or remove it.
2.July 2018- Chrome 68 will start blocking third party software from injecting code.
3.January 2019- Chrome will completely block code injcetion by any third party software's.

These measures cause Less crashes and More user happy.
So ,Coders you have time 13 months times to re code . Google is encouraging developers to use Chrome beta Channel and test their code.
Sources : Chromium Blog
Read More