Monthly Archives: April 2015
Cisco Troubleshooting Feature Allows For Data-Slurp Abuse
Oracle Issues 98 Security Fixes Including 14 For Java
Simda Botnet Hackers Will Return With A Vengeance
Lawyer claims police placed malware on requested external hard drive
A lawyer in Arkansas is claiming that police planted three different pieces of malware on an external hard drive in a controversial whistleblower case against the police force, reports 5 News Online.
The post Lawyer claims police placed malware on requested external hard drive appeared first on We Live Security.
![]()
Kaspersky Lab Announces Office Opening in Singapore
TA15-105A: Simda Botnet
Original release date: April 15, 2015
Systems Affected
Microsoft Windows
Overview
The Simda botnet – a network of computers infected with self-propagating malware – has compromised more than 770,000 computers worldwide [1].
The United States Department of Homeland Security (DHS), in collaboration with Interpol and the Federal Bureau of Investigation (FBI), has released this Technical Alert to provide further information about the Simda botnet, along with prevention and mitigation recommendations.
Description
Since 2009, cyber criminals have been targeting computers with unpatched software and compromising them with Simda malware [2]. This malware may re-route a user’s Internet traffic to websites under criminal control or can be used to install additional malware.
The malicious actors control the network of compromised systems (botnet) through backdoors, giving them remote access to carry out additional attacks or to “sell” control of the botnet to other criminals [1]. The backdoors also morph their presence every few hours, allowing low anti-virus detection rates and the means for stealthy operation [3].
Impact
A system infected with Simda may allow cyber criminals to harvest user credentials, including banking information; install additional malware; or cause other malicious attacks. The breadth of infected systems allows Simda operators flexibility to load custom features tailored to individual targets.
Solution
Users are recommended to take the following actions to remediate Simda infections:
- Use and maintain anti-virus software – Anti-virus software recognizes and protects your computer against most known viruses. It is important to keep your anti-virus software up-to-date (see Understanding Anti-Virus Software for more information).
- Change your passwords – Your original passwords may have been compromised during the infection, so you should change them (see Choosing and Protecting Passwords for more information).
- Keep your operating system and application software up-to-date – Install software patches so that attackers cannot take advantage of known problems or vulnerabilities. Many operating systems offer automatic updates. If this option is available, you should enable it (see Understanding Patches for more information).
- Use anti-malware tools – Using a legitimate program that identifies and removes malware can help eliminate an infection. Users can consider employing a remediation tool (examples below) that will help with the removal of Simda from your system.
Kaspersky Lab : http://www.kaspersky.com/security-scan
Microsoft: http://www.microsoft.com/security/scanner/en-us/default.aspx
Trend Micro: http://housecall.trendmicro.com/
- Check to see if your system is infected – The link below offers a simplified check for beginners and a manual check for experts.
Cyber Defense Institute: http://www.cyberdefense.jp/simda/
The above are examples only and do not constitute an exhaustive list. The U.S. government does not endorse or support any particular product or vendor.
References
- [1] INTERPOL Coordinates Global Operation to Take Down Simda Botnet
- [2] Microsoft partners with Interpol, industry to disrupt global malware attack affecting more than 770,000 PCs in past six mo
- [3] Botnet that Enslaved 770,000 PCs Worldwide Comes Crashing Down
Revision History
- April 15, 2015: Initial Release
This product is provided subject to this Notification and this Privacy & Use policy.
CESA-2015:0807 Important CentOS 5java-1.7.0-openjdk Security Update
CentOS Errata and Security Advisory 2015:0807 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0807.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 0cf980fd7fde5bd25a6fb47174ee5418c6db9c2b13f50df5f70a36788575c441 java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.i386.rpm a3861c84ddfc2b19b985dedb13c7bee8f7bbbb900b0546a861bebff9ec8cf747 java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.2.el5_11.i386.rpm 95949dd1a55f4f33634aa1077a24707d0123a45368c4a49c7f5fba2f3867a29b java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.2.el5_11.i386.rpm da1f1afd73c0b67eb42b20134b41118ea16abbb20016ce20cffa787cae9c7985 java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.2.el5_11.i386.rpm 5dd41c0ac127a765a14fd18eb20f56d368845a73ed110b874a00cfd62a5e8bc1 java-1.7.0-openjdk-src-1.7.0.79-2.5.5.2.el5_11.i386.rpm x86_64: 18c0fc5ac390ff7b933656678bdcfadeda579d912c7e58ddd042df08160a7978 java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm c2c6e7f7e5182d03197bd6a162e9f6765aa46105e9776809b835bbe4669152d0 java-1.7.0-openjdk-demo-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm aa5554836ea4b60cf21121be73eab015f4c563d061af1dc202f9adbc833738e6 java-1.7.0-openjdk-devel-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm 89c80eb2e2e3f41c170909af41f6d90b4c3aa64c7b4c9e34392bbad077502226 java-1.7.0-openjdk-javadoc-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm 4042cd5dca28a2a032e487236e82d9f1f73310f1d7304f1c6c4dbe99288e7288 java-1.7.0-openjdk-src-1.7.0.79-2.5.5.2.el5_11.x86_64.rpm Source: ec9d5e133bcd36fa3e26e5723804bf4619fc8c0815313fe66284ac2abfde0de0 java-1.7.0-openjdk-1.7.0.79-2.5.5.2.el5_11.src.rpm
CEBA-2015:0812 CentOS 6 krb5-auth-dialogFASTTRACK BugFix Update
CentOS Errata and Bugfix Advisory 2015:0812 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0812.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 8c6823f3927e853f1cf9823081c76ce21b12978a95b68417f28a8df6542af76b krb5-auth-dialog-0.13-5.el6.i686.rpm x86_64: cffdcacbc4b7dcdea35916388adf0ea43b77a57fc7721c60fd08a4c9043a57c1 krb5-auth-dialog-0.13-5.el6.x86_64.rpm Source: 5364d927d948a242603be645f251deb739fe513d59adcb4681014709df8e508c krb5-auth-dialog-0.13-5.el6.src.rpm