This Week in Cybersecurity News
Spy Virus Linked to Israel Targeted Hotels Used for Iran Nuclear Talks by Adam Entous and Danny Yadron, Wall Street Journal
Kaspersky Lab discovered a new version of Duqu, a virus commonly linked to Israel’s intelligence agency on its own network and three luxury European hotels that had hosted nuclear negotiations between Iran and other world powers. The spyware was designed with over 100 discrete modules which allowed the program to compress video feeds, target communications from phones and Wi-Fi networks and take control of elevator microphones and alarm systems.
Memory Scrapping Malware Targets Oracle Micros Point-of-Sale Customer by Lucian Constantin, IDG News Service
Businesses using Oracle Micros point-of-sale systems are being targeted by a new malware program called MalumPoS. The new malware, identified by researchers at TrendMicro looks for payment card track data – the information that’s encoded on the magnetic strip of payment cards – in the memory of processes associated with Oracle Micros.
Adobe, Microsoft Issue Critical Security Fixes by Brian Krebs, KrebsOnSecurity
Adobe released software updates to fix at least 13 security holes in its Flash Player software on June 10. Microsoft also issued patches for at least 36 flaws in Windows and associated software. The majority of Microsoft’s patches addressed issues in Internet Explorer along with Office, Windows OS and Windows Media Player
Serious iOS Bug makes it Easy to Steal Users’ iCloud Passwords by Dan Goodin, Ars Technica
A proof-of-concept attack has been published that exploits a flaw in Mail.app, the default iOS e-mail program which allows attackers to steal iCloud passwords. Since the release of version 8.3 in April, the app has failed to properly strip out potentially dangerous HTML code from incoming e-mail messages which allows for the exploit to download a form from a remote server that looks identical to the legitimate iCloud log-in prompt.
Army Homepage Shut Down Following Hack by Stephanie Kanowitz, FierceGovernmentIT
Hackers tied to Syria have claimed responsibility for an attack on the Army’s homepage on June 8 that led military officials to take the site down. Army officials said that no classified or personally identifiable information was compromised because Army.mil does not have any classified information.
ICYMI Threat Geek Post of the Week: Fidelis Threat Advisory #1017: Phishing in Plain Sight