{"id":21652,"date":"2017-06-09T00:45:09","date_gmt":"2017-06-09T06:45:09","guid":{"rendered":"https://www.webroot.com/blog/?p=21652"},"modified":"2018-01-15T20:03:29","modified_gmt":"2018-01-16T03:03:29","slug":"cyber-news-rundown-edition-6917","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/06\/09\/cyber-news-rundown-edition-6917\/","title":{"rendered":"Cyber News Rundown: Edition 6\/9\/17"},"content":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask.<\/p>\n<h6>Internet Cameras Showcase Major Security Flaws<\/h6>\n<p>Researchers recently <a href=\"https:\/\/arstechnica.com\/security\/2017\/06\/internet-cameras-expose-private-video-feeds-and-remote-controls\/\">discovered as many as 18 different vulnerabilities<\/a> with Foscam cameras. Among the exploits are several methods of gaining remote access to the cameras, as well as viewing active feeds, and searching through locally stored files. Although the researchers reported these issues months ago, the manufacturer has not yet addressed the issues. Unfortunately for consumers, Foscam makes devices for at least 14 different brands, all of which come with the same security risks.<\/p>\n<h6>EternalBlue Exploit Port to Windows 10<\/h6>\n<p>The notorious EternalBlue exploit, which was used in the WannaCry attacks, has been <a href=\"https:\/\/threatpost.com\/nsas-eternalblue-exploit-ported-to-windows-10\/126087\/\">ported to Windows 10<\/a>, which means all current versions of Windows are susceptible to the exploit, if not properly patched. In addition to the port, another exploit module was created, which slims down network traffic and allows the infection to remain undetected by current detection criteria. While researchers are still learning and understanding the full capabilities of EternalBlue, it has also opened the door for less skilled hackers to modify the otherwise well-written exploit for their own purposes.<\/p>\n<h6>Car Owner Database Publicly Available<\/h6>\n<p>In the last week, researchers <a href=\"https:\/\/www.helpnetsecurity.com\/2017\/06\/07\/database-car-vin\/\">found a publicly-facing database<\/a> containing the customer and vehicle information for nearly 10 million cars in the US. The database, which had been actively available for around four months, has no known owner, though several dealerships named in the database have been contacted with inquiries. Unauthorized access to the information could give criminals more than enough information to have extra keys made for the vehicles, and could even lead to identity theft issues.<\/p>\n<h6>Turla Hacking Group Changing Methods of Attack<\/h6>\n<p>The cybercriminal group Turla has executed numerous cyberattacks on major corporations and government agencies over the last few years. Now, however, they&#8217;ve <a href=\"https:\/\/www.helpnetsecurity.com\/2017\/06\/07\/instagram-cc\/\">switched their focus<\/a> to individual attacks, typically using Firefox browser extensions to create backdoors into personal systems. The attacks are coordinated by placing comments on highly-trafficked Instagram pages and pictures. The browser extension hashes the comment values until the malicious hash is discovered, at which point it contacts a C&amp;C server for instructions. Fortunately for many social media users, the APIs used to create the malicious extension will be phased out in future versions of Firefox.<\/p>\n<h6>Edmodo Data Breach Confirmed<\/h6>\n<p>Officials at Edmodo, an education technology company that works with K-12 schools and teachers, have been working to <a href=\"https:\/\/medium.com\/4iqdelvedeep\/deep-dive-into-the-edmodo-data-breach-f1207c415ffb\">discover the source of a breach<\/a> that affects over 77 million individual accounts. The majority of affected users were children who used various Edmodo programs for school, as well as educators across the country. Although the freshness of the data would indicate that the breach occurred very recently, and Edmodo did attempt to notify its users quickly, not all users received word that their accounts had been breached. Thankfully, the company used strong encryptions to protect passwords, so it\u2019s unlikely that attackers will invest the time and effort necessary to decrypt them to access accounts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber News Rundown brings you the latest happenings in cyber news weekly. Who am I? I\u2019m Connor Madsen, a Webroot Threat Research Analyst, and a guy with a passion for all things security. Any more questions? Just ask. Internet Cameras Showcase Major Security Flaws Researchers recently discovered as many as 18 different vulnerabilities with [&hellip;]<\/p>\n","protected":false},"author":47,"featured_media":21943,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5079,3959,3565,9105,4959,4969,21019,21021,21017,4905,3557,5285,4801,20611,7771,3479,3529,3471,3951,19143],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/21652"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/47"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=21652"}],"version-history":[{"count":5,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/21652\/revisions"}],"predecessor-version":[{"id":21728,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/21652\/revisions\/21728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/21943"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=21652"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=21652"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=21652"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=21652"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}