AirDroid Patches Web App Hijacking Vulnerability

Researchers at Bishop Fox disclose details on a patched authentication vulnerability in the AirDroid web application that could give attackers remote control over Android devices.

TA15-105A: Simda Botnet

Original release date: April 15, 2015

Systems Affected

Microsoft Windows

Overview

The Simda botnet – a network of computers infected with self-propagating malware – has compromised more than 770,000 computers worldwide [1].

The United States Department of Homeland Security (DHS), in collaboration with Interpol and the Federal Bureau of Investigation (FBI), has released this Technical Alert to provide further information about the Simda botnet, along with prevention and mitigation recommendations.

Description

Since 2009, cyber criminals have been targeting computers with unpatched software and compromising them with Simda malware [2]. This malware may re-route a user’s Internet traffic to websites under criminal control or can be used to install additional malware. 

The malicious actors control the network of compromised systems (botnet) through backdoors, giving them remote access to carry out additional attacks or to “sell” control of the botnet to other criminals [1]. The backdoors also morph their presence every few hours, allowing low anti-virus detection rates and the means for stealthy operation [3].    

Impact

A system infected with Simda may allow cyber criminals to harvest user credentials, including banking information; install additional malware; or cause other malicious attacks. The breadth of infected systems allows Simda operators flexibility to load custom features tailored to individual targets.

Solution

Users are recommended to take the following actions to remediate Simda infections:

  • Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
  • Change your passwords – Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
  • Keep your operating system and application software up-to-date – Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
  • Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (examples below) that will help with the removal of Simda from your system.

          Kaspersky Lab : http://www.kaspersky.com/security-scan

          Microsoft: http://www.microsoft.com/security/scanner/en-us/default.aspx

          Trend Micro: http://housecall.trendmicro.com/

  • Check to see if your system is infected – The link below offers a simplified check for beginners and a manual check for experts.

          Cyber Defense Institute:  http://www.cyberdefense.jp/simda/

The above are examples only and do not constitute an exhaustive list. The U.S. government does not endorse or support any particular product or vendor.

References

Revision History

  • April 15, 2015: Initial Release

This product is provided subject to this Notification and this Privacy & Use policy.

CESA-2015:0807 Important CentOS 5java-1.7.0-openjdk Security Update

CentOS Errata and Security Advisory 2015:0807 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0807.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
0cf980fd7fde5bd25a6fb47174ee5418c6db9c2b13f50df5f70a36788575c441  java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.i386.rpm
a3861c84ddfc2b19b985dedb13c7bee8f7bbbb900b0546a861bebff9ec8cf747  java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.2.el5_11.i386.rpm
95949dd1a55f4f33634aa1077a24707d0123a45368c4a49c7f5fba2f3867a29b  java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.2.el5_11.i386.rpm
da1f1afd73c0b67eb42b20134b41118ea16abbb20016ce20cffa787cae9c7985  java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.2.el5_11.i386.rpm
5dd41c0ac127a765a14fd18eb20f56d368845a73ed110b874a00cfd62a5e8bc1  java-1.7.0-openjdk-src-1.7.0.79-2.5.5.2.el5_11.i386.rpm

x86_64:
18c0fc5ac390ff7b933656678bdcfadeda579d912c7e58ddd042df08160a7978  java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm
c2c6e7f7e5182d03197bd6a162e9f6765aa46105e9776809b835bbe4669152d0  java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm
aa5554836ea4b60cf21121be73eab015f4c563d061af1dc202f9adbc833738e6  java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm
89c80eb2e2e3f41c170909af41f6d90b4c3aa64c7b4c9e34392bbad077502226  java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm
4042cd5dca28a2a032e487236e82d9f1f73310f1d7304f1c6c4dbe99288e7288  java-1.7.0-openjdk-src-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm

Source:
ec9d5e133bcd36fa3e26e5723804bf4619fc8c0815313fe66284ac2abfde0de0  java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.src.rpm



CEBA-2015:0812 CentOS 6 krb5-auth-dialogFASTTRACK BugFix Update

CentOS Errata and Bugfix Advisory 2015:0812

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0812.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
8c6823f3927e853f1cf9823081c76ce21b12978a95b68417f28a8df6542af76b  krb5-auth-dialog-0.13-5.el6.i686.rpm

x86_64:
cffdcacbc4b7dcdea35916388adf0ea43b77a57fc7721c60fd08a4c9043a57c1  krb5-auth-dialog-0.13-5.el6.x86_64.rpm

Source:
5364d927d948a242603be645f251deb739fe513d59adcb4681014709df8e508c  krb5-auth-dialog-0.13-5.el6.src.rpm