Stop me if you’ve heard this one before: You should use unique, complex passwords for every login you have to manage, and you should employ a password management utility to keep track of it all. That is the prevailing advice, but a couple Microsoft researchers have come to the conclusion that it might be the wrong approach.
At face value, the guidance makes sense. If you use strong, complex passwords composed of random strings of characters for your logins, and you use a unique password for each site or service, the odds of a password getting cracked or compromised are greatly diminished, and the potential fallout of a password compromise would be limited to that one site or service. It is difficult to remember 10 or 20 or more random strings of complex characters, so using a password vault or password management utility lets you keep track of them all. Simple enough.
In early June the U.S. Department of Justice revealed that the Gameover Zeus (GOZ) botnet had been disabled thanks to the success of a joint effort dubbed “Operation Tovar.” The celebration appears to have been premature, though, as security researchers have already discovered a resurgence of Gameover malware infections.
While the Gameover botnet has lain dormant since the takedown, a new massive spam campaign has Sophos Labs researcher James Wyke concerned the threat has returned. A blog post reveals details of why it seems to be part of the same malware family.
As predicted last week, Microsoft published six new security bulletins for the July Patch Tuesday, and only two of them are rated as Critical. There are also three Important, and one Moderate security bulletin this month. The two Critical security bulletins are a cumulative update for Internet Explorer and a patch for an issue with Windows Journal that could allow an attacker to execute malicious code remotely on the vulnerable system. The Important security bulletins address flaws with the on-screen keyboard, ancillary function driver (AFD) and DirectShow, and the Moderate security bulletin deals with a potential denial of service vulnerability in Microsoft Service Bus.
As much of the workforce in the United States coasts through the rest of the day looking forward to an extended weekend to grill hot dogs and drink beer—I mean, celebrate the nation’s independence—Microsoft released its advance notification for next week’s Patch Tuesday. The six security bulletins include two ranked Critical, three Important, and one listed merely as Moderate.
Six security bulletins is fewer than usual—with 106 security bulletins in 2013, the average has been just under nine security bulletins per month. But it’s still enough to keep IT admins busy.
One of the two Critical security bulletins is related to Internet Explorer. It is most likely a new cumulative update patch. Ross Barrett, senior manager of security engineering at Rapid7, said, “It will be interesting to see just how many CVEs are in this round after the 59 patched in MS14-035. Rather than 59 being the new normal, I expect this round will return to the 8-12 CVEs addressed per IE patch standard.”
All malware is bad, but some malware is more insidious than others. That seems to be the case with CosmicDuke. According to a new white paper from F-Secure, CosmicDuke meshes elements of two notorious malware threats—MiniDuke and Cosmu—to form a potent new attack.
MiniDuke is an APT (advanced persistent threat) Trojan that was uncovered in early 2013. It was used in targeted attacks against NATO and various European government agencies.
According to a blog post from F-Secure, researchers found a variant in April of this year that used some of the same code as Cosmu—a malware known for stealing sensitive information. The resulting threat is a combination of the loader from MiniDuke and the payload from Cosmu, creating an APT Trojan designed to steal sensitive login information that F-Secure dubbed CosmicDuke.