Cyber Attacks
Cyber Attacks
John the Ripper or Johnny is one of the powerful tools to set a brute-force
attack and it comes bundled with the Kali distribution of Linux.
If the attacker new the cipher text only, then a brute force attack would
reveal the following.
This report contains the top attacking IPs for the month of March and their
details. It also includes charts of brute force attack activity for the period.
We also include the countries generated the most attacks for the period.
Brute force attacks are login guessing attacks. What we refer to as ‘complex’
attacks are attacks that were blocked by a rule in the Wordfence firewall.
The hostname included is the PTR record (reverse DNS record) that the IP
address owner created for their IP, so this is not reliable data but we include
it for interest. For example, we have seen PTR records that claim the IP is a
Tor exit node, but it is clearly not, based on traffic.]
The top two attacking IPs are in Russia and Ukraine respectively. Both of
them are only launching complex attacks on WordPress. Our top IP has
doubled its attacks from 7 million to 15 million attacks. The second place IP
went from 7 million to 12 million attacks per month.
The total number of complex attacks from the top 25 IPs went from 63
million in February to 85 million in March. The total brute force attacks from
the top 25 IPs increased from 18 million in February to 32 million in March.
This indicates an increase in how aggressively these top 25 IPs are attacking
sites.
The “walled garden” paradigm is outdated. Nearly all operators now admit
that attackers have penetrated SS7 (Signaling System 7) networks by
exploiting a whole range of signaling network vulnerabilities. The SS7
signaling system is often called the nervous system of a phone network.
Before the invention of SS7, service commands for subscriber connection
and data packet delivery were transferred via a speaking channel. This
approach was upgraded and replaced with the global signaling system (SS7)
over 30 years ago. Today the SS7 standard determines the procedures and
data exchange protocols across network devices of telecom companies. SS7
serves as a base for a signaling infrastructure in local, national, international,
and wireless networks.
• Attackers can gain access to the SS7 based core network using other
Internet protocols.
• Once they are inside the core network, they can exploit the routing layer
to map the periphery of the network, scan for open ports and send hostile
communication messages.
• Since there is no authentication check or any other cryptographic
protection within the network, the attackers can impersonate as the network
internal nodes and query for subscriber information from other nodes.
For calls, using a service that carries voice over data rather than through the
voice call network will help prevent your calls from being snooped on.
Messaging services including WhatsApp permit calls. Silent Circle’s end-to-
end encrypted Phone service or the open-source Signal app also allow secure
voice communications.
Your location could be being tracked at any stage when you have your mobile
phone on. The only way to avoid it is to turn off your phone or turn off its
connection to the mobile phone network and rely on Wi-Fi instead
Security researchers have been warning for years about critical security
holes in the Signaling System 7 (SS7)that could allow hackers to listen in
private phone calls and read text messages on a potentially vast scale,
despite the most advanced encryption used by cellular networks.
Cellular networks, on the other hand, have consistently been ignoring this
serious issue, saying that it is a very low risk for most people, as
the exploitation of the SS7 flaws requires significant technical and financial
investment.
But some unknown hackers have just proved them wrong by recently
exploiting the design flaws in the SS7 to drain victims' bank accounts,
according to a report published by German-based newspaper Süddeutsche
Zeitung.
Germany's O2 Telefonica has confirmed that the same SS7 weaknesses have
recently been exploited by cybercriminals to bypass two-factor
authentication (2FA) banks used to prevent unauthorized withdrawals from
users bank accounts.
But what prevented the attackers from making money transfers is the one-
time password the bank sent via a text message to its online banking
customers in order to authorize the transfer of funds between accounts.
To overcome this issue, the cyber crooks then purchased the access to a
fake telecom provider and set-up a redirect for the victim's phone number
to a handset controlled by them. Specifically, they used SS7 to redirect the
SMSes containing OTPs sent by the bank.
Next, the attackers logged into victims' online bank accounts and transferred
money out, because as soon as the authorization codes were sent by the
bank, instead of designated account holders, they were routed to numbers
controlled by the attackers, who finalized the transaction.
This latest SS7 attack once again shed light on the insecurity by design and
lack of privacy in the global telephone network protocol, making it clear
that real-world SS7 attacks are possible. And since the SS7 network is used
worldwide, the issue puts billions of users in danger.
Although the network operators are unable to patch the hole anytime soon,
there is little the smartphone users can do. Avoid using two-factor
authentication via SMS texts for receiving OTP codes. Instead, rely on
cryptographically-based security keys as a second authentication factor.
CopyCat Malware Attack
CopyCat is a sophisticated form of mobile malware that has infected more
than 14 million Android devices, according to some sources. The fully
developed malware was discovered and named CopyCat by Check Point
mobile threat researchers as a result of the malware taking credit (and
generating revenue) for Android installations it didn't create.
The CopyCat malware roots, or gains access to key subsystems of
the Android mobile operating system, more than half of the mobile devices it
infects, which helped enable the hackers that created the malware to
generate more than $1.5 million in revenues from fake ads over the first two
months of CopyCat's release into the wild.
The mobile malware spread through five exploits that hit devices running
Android 5.0 and earlier and had been discovered and patched more than two
years ago. Android users on older devices are still vulnerable to the attack,
if they're downloading apps off third-party markets.
While the majority of victims of CopyCat are in Asia, more than 280,000
Android devices in the US have been hit by the attack. Therefore, no
matter where you are, it’s important to start thinking of how to protect
your Android device from this attack.
To do just that, follow these tips:
-Always use legitimate app stores. Many victims of CopyCat were
infected by downloading apps from third-party stores unaffiliated with
Google Play. It’s crucial users only download applications from official stores,
like Google Play or the Apple App store, to ensure they don’t become part of
larger malware schemes like CopyCat.
-Keep your software updated. Even if you do avoid third-party app
stores, remember that CopyCat can still spread through phishing scams.
Therefore, to protect your devices from the attack, ensure all software is up-
to-date, as updates typically include additional protection against emerging
malware strains, such as CopyCat.
-Use a mobile security solution. As malware and adware campaigns
continue to infect mobile applications, make sure your mobile devices are
prepared for any threat coming their way. To do just that, cover these
devices with a mobile security solution, such as McAfee Mobile Security.