PINDROP BLOG

Category: Device Security

November 3, 2016
Attackers Using Mirai Botnet to Target Liberia’s Internet Connection
One of the pieces of the fragmented Mirai botnet is using its massive capacity to attack telecom providers in the small African country of Liberia and the attacks are strong enough to cause intermittent loss of connectivity inside the country, researchers say. The attacks against Liberia have been going on for at least week and…
Read More →
November 1, 2016
IoTSeeker Scanner Finds Smart Devices With Dumb Credentials
With the Mirai botnet still wreaking havoc, and other IoT botnets appearing, security researchers are looking for ways to discover the insecure devices that are being targeted by attackers before they can be compromised. One such effort is a new scanner that will check networks for devices that are using default credentials, which often are exploited…
Read More →
November 1, 2016
Pair of Bugs Can Disconnect Schneider HMI Gear From SCADA Networks
Researchers have discovered a pair of serious vulnerabilities in several ICS products made by Schneider Electric that can allow an attacker to freeze the control panel of vulnerable devices and force them to disconnect from a SCADA network. The vulnerabilities affect seven different Magelis products from Schneider, which are used for remote management and monitoring…
Read More →
October 28, 2016
On the Wire Podcast: Ronnie Tokazowski
For a youngster, the Mirai botnet has gotten more than its share of attention in its short life. The botnet first came to prominence when researchers discovered it was used in an attack on Brian Krebs’s site several weeks ago, and later on a hosting provider. It gained more fame because it’s made up of compromised…
Read More →
October 26, 2016
Senator Asks FCC Whether ISPs Can Block Insecure IoT Devices
Sen. Mark Warner on Tuesday sent a letter to the chairman of the FCC expressing concern about the emergence of the Mirai botnet and asking whether ISPs should have the ability to prevent compromised IoT devices from connecting to their networks. In his letter, Warner (D-Va.) said that the weak security of many embedded devices…
Read More →
October 25, 2016
Malicious JPEG Can Lead to Code Execution on iPhones
Apple has patched several vulnerabilities in iOS that could lead to arbitrary code execution, including a handful of memory corruption bugs and a flaw that enables an attacker to use a malicious JPEG file to run arbitrary code. The release of iOS 10.1 includes patches for 13 vulnerabilities, many of which can be used for arbitrary…
Read More →
October 24, 2016
The Short Dumb Life Of the Internet of Things
We knew it was coming, we knew it would be bad, and we also knew it would be stupid. But just how bad and stupid the Internet of Things has become in its short life has surpassed even the most outrageously pessimistic predictions. Anyone who has been paying any kind of attention to IoT security, such…
Read More →
October 24, 2016
Drammer Attack Gives Root Privileges on Many Android Devices
A new hardware-based attack that allows adversaries to get root privileges on target devices threatens the security of many popular Android handsets, including the LG Nexus 5, the Samsung Galaxy S5, and Galaxy S6. The new attack is an extension of a technique known as Rowhammer in which an attacker repeatedly accesses specific areas of…
Read More →
October 21, 2016
Ancient Privilege Escalation Bug Haunts Linux
Researchers are warning about a serious vulnerability in the Linux kernel that affects essentially all of the current versions of the operating system in use right now. The vulnerability is a local privilege-escalation flaw, which isn’t normally cause for much concern, because an attacker needs local access to a vulnerable device in order to exploit…
Read More →
October 18, 2016
LockyDump Tool Helps Track Ransomware Configurations and Variants
The group behind the Locky ransomware has continued to update and improve the malware its distributing, and security researchers have been racing to keep up with the changes. The Talos research team at Cisco is part of that effort and the group has released a new tool that can dump all of the configuration information…
Read More →