Netsec – Telegram
Netsec
7.4K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Cybereason/siofra - Automated DLL hijacking vulnerability scanner and PE infector tool
http://ift.tt/2xZWVZv

Submitted October 04, 2017 at 06:40PM by petermal67
via reddit http://ift.tt/2yI4Rvq
The Stuxnet of Mobile Malware (for Android)
http://ift.tt/2xV3XwJ

Submitted October 04, 2017 at 08:00PM by Mi3Security
via reddit http://ift.tt/2yq7w0E
Privacy implications of email tracking
http://ift.tt/2fTcYym

Submitted October 04, 2017 at 08:05PM by tamir777
via reddit http://ift.tt/2koeIV2
Never before seen virus behaviour(?)
So I was looking to download an application called "iso2eboot" but every link I found did not work. So when I went to google it, the first suggestion was "iso2eboot v3 download" and so I clicked it and the first result was "http://ift.tt/2gbFRGl". I entered the website and at first I thought it's one of those websites that have downloads named after the program you're looking for but actually end up giving you a suspicious looking installer with a very generic icon on it. Anyway, the website itself wasn't at all related to the program I was looking for, and I thought it could just be a website that you can upload stuff but it looked like whatever I searched for in that website I would just find a fake upload that is just a virus(Virustotall says it's clean). So this file I found was a .zip named after the program I'm looking for. I opened it and inside it there was another .zip file (with the same name) instead of another folder (which is most common with archived folders). So I thought it was probably archived twice so that Antiviruses can't detect it. Anyways I extracted the .zip as a folder and the application had RAR Installer icon. I opened the app and it was some sort of installer and I noticed it said somewhere "Source:" and some long name like "torrentz-something". And I know that what I'm looking for doesn't have ANYTHING to do with torrenting. So I just closed the application, and then shortcuts from my desktop started disappearing. I noticed it was all the Google Chrome shortcuts (Chrome itself and two other website shortcuts with the icons of the websites) and soon after the two website shortcuts where "replaced" by two other shortcuts named exactly the same as the original ones but had and outdated version of the Chrome logo. I can't recall the Chrome browser shortcut being replaced another one other than the website shortcuts. My antivirus later found the threat and the shortcuts disappeared, I later checked on avast and the virus it found was a "component.exe" in my user Temp folder. The taskbar shortcut for Google Chrome was also missing it's icon. I tried creating the desktop icon for Chrome again and it said the shortcut already existed. I later chose the option on Windows Explorer to view hidden items and guess what? All my original shortcuts were hidden on my desktop with the appropriate icons, so I moved them to their original position.Was it some sort of hijacker that tried to make me click on the fake browser shortcuts? If so then why would it "hide" the original Icon's instead of just erase them entirely? I have past experience with web-browser hijackers and none of them worked like that, they all just somehow added a toolbar on your browser. What type of virus this one is, I don't know.

Submitted October 04, 2017 at 10:10PM by Mighty-Pirate
via reddit http://ift.tt/2xZ0zlS
Uncommon virus behaviour(?)
So I was looking to download an application called "iso2eboot" but every link I found did not work. So when I went to google it, the first suggestion was "iso2eboot v3 download" and so I clicked it and the first result was "http://ift.tt/2gbFRGl". I entered the website and at first I thought it's one of those websites that have downloads named after the program you're looking for but actually end up giving you a suspicious looking installer with a very generic icon on it. Anyway, the website itself wasn't at all related to the program I was looking for. I thought it could just be a file-hosting website, and it probably is but I'm not at all familiar with it (Virustotall says it's clean). So this file it got from there was a .zip named after the program I'm looking for. I opened it and inside it there was another .zip file (with the same name). So I thought it was probably archived twice so that Antiviruses can't detect it. Anyways I extracted the .zip as a folder and the application had a RAR Installer icon. I opened the app and it was some sort of installer and I noticed it said somewhere 'Source: torrentz' and something like a long URL. And I know that what I'm looking for doesn't have ANYTHING to do with torrenting. So I just closed the application, and then shortcuts from my desktop started disappearing. I noticed it was all the Google Chrome shortcuts (Chrome itself and two other website shortcuts with the icons of the websites) and soon after the shortcuts were "replaced" by other shortcuts named exactly the same as the original ones but had an outdated version of the Chrome logo as an icon. My antivirus later found the threat and the shortcuts disappeared, I later checked on Avast and the virus it found was a "component.exe" in my user Temp folder. The taskbar shortcut for Google Chrome was also missing it's icon. I tried creating the desktop icon for Chrome again and it said the shortcut already existed. I later chose the option on Windows Explorer to view hidden items and guess what? All my original shortcuts were hidden on my desktop with the appropriate icons, so I moved them to their original position. Was it some sort of hijacker that tried to make me click on the fake browser shortcuts? If so then why would it "hide" the original Icon's instead of just erase them entirely? I have past experience with web-browser hijackers and none of them worked like that, they all just somehow added a toolbar on your browser. What type of virus this one is, I don't know.

Submitted October 04, 2017 at 10:29PM by Mighty-Pirate
via reddit http://ift.tt/2yJ3Enw
RE: Attivo
I ran a full assessment with them against 4 other competitors and found them to be the best of breed and most innovative. The others I had seen all used the same Cloud-Hosted model (READ: does not work on isolated systems ie SCADA) the platform worked very well and was able to be used on Enterprise Networks as well as isolated networks.Some things that were unexpected: - traffic flow and isolation, A LOT OF IT that we had not previously seen (its almost like a lightweight Solarwinds tool) - identity use, we were able to identify which accounts were over used in the environment. - lateral movement (east/west), this was interesting because when combined with the behavior analytics and NAC appliance we detected insider threats. -native SCADA integrationCons:
- the interface was not as flashy as Illusives or Darktrace but then again, unlike those platforms - it actually worked. - does not track exfil from mobile devicesThe final selling points to us was the ease of adoption in the enterprise, the total cost of ownership and the availability of support.

Submitted October 05, 2017 at 02:04AM by rainmaker206
via reddit http://ift.tt/2xiDiI8
Can metal detectors detect Only large metal objects like guns?
I understand that having someone wand every person in a large crowd would be impossible. But how about a large crowd walking through a large gate that has a sensor that only set off if there was a substantial metal object... in which case maybe someonne monitoring it could pick out the person and... well you know

Submitted October 05, 2017 at 04:05AM by bolognawindup
via reddit http://ift.tt/2hQecOz