UNM4SK3D: Equifax, Bluetooth, and Zerodium

Clearing the Certification isn’t considered to be that much easy, you have to go through rigorous training and lots of AWS SOA-C01 Certified SysOps Administrator Dumps would be needed to go through unless you have some expertise training courses like such offered at the ITCertDumps.

#hacked- big time. ?

Chances are you’ve heard about the Equifax breach, which led to the compromise of 143 million US consumer’s data including the names, social security numbers, dates of birth, addresses, and in some cases, drivers license numbers. In the wake of the breach, we’ve heard stories of corrupt Equifax executives selling their stock prior to the publication of the hack and previously disclosed security holes resurfacing, but now we have more context to this massive security blunder.?Equifax, one of the three largest consumer credit reporting agencies in the United States,?handles data on more than 820 million customers and 91 million businesses worldwide. Comforting. In a statement released September 7th, the company disclosed that cyber criminals managed to gain access to sensitive data in their systems from mid-May through July. We now know they were able to do so using?an Apache Struts vulnerability exploited in the wild, apparently discovered by financial services firm Baird. “An?update?posted by Equifax on Wednesday to the website dedicated by the company to the cyber security incident confirms that CVE-2017-5638 was the Apache Struts 2 flaw exploited by attackers.”This means the breach was possible due to the Equifax’s failure to patch a critical vulnerability more than two months after its disclosure. Since this incident,?others have highlighted holes in the company’s security, including unpatched?cross-site scripting (XSS) vulnerabilities?reported more than one year ago, and the heinous lack of many basic protections. On Tuesday, security blogger Brian Krebs reported that an Equifax Argentina employee portal?exposed 14,000 records, including employee credentials and consumer complaints. Additionally, Equifax has admitted ‘limited’ personal information belonging to UK and Canadian residents were also accessed. 40 states, including New York and Illinois, have launched a formal investigation. In the wake of this terrible breach,?Equifax shares?have fallen more than 30%, wiping roughly $5.3 billion of their market capitalization.

Equifax has been intensely investigating the scope of the intrusion with the assistance of a leading, independent cyber security firm to determine what information was accessed and who have been impacted. -Equifax official statement

What can organizations learn from this critical breach? Read the ‘Top 5’ list to find out.

#vulnerability ?

Bluetooth users beware. It seems you’re at risk for malware attacks that can be carried out remotely, taking over your device without any user permissions.Security researchers from Armis Labs recently discovered 8 zero-day vulnerabilities in a Bluetooth protocol that impacts more than 5.3 billion, yes billion, Android, iOS, Windows, Linux, and Internet of things (IoT) devices using the short-range wireless communication technology. The researchers then?devised an attack, dubbed ‘BlueBorne,’ which gives attackers complete access to Bluetooth-enabled devices, allowing them to spread malware, or even establish a ‘man-in-the-middle’ connection to gain access to devices’ data and networks without requiring any user interaction. Successful exploitation requires that Bluetooth is enabled, of course, and that the attacker is in close proximity to the victim.Ben Seri, head of research team at Armis Labs, claims that during an experiment in the lab, “his team was able to create a botnet network and install ransomware using the ‘BlueBorne’ attack.” This could mean that?the ‘BlueBorne’ attack has the potential to spread like the wormable ‘WannaCry.’ ?

We would be discussing the ways for clearing. I would suggest you focus on the below-mentioned resources and also check out the AWS ANS-C00 Certified Advanced Networking Dumps offered at the ITCertDumps, they are the best when it comes to Certifications Vendor.

ccnp exam

Armis responsibly disclosed the vulnerabilities to all the major affected companies a few months ago. Those companies include Google, Apple, Microsoft, Samsung and the Linux Foundation, of which Google and Microsoft have already made patches available.

Unfortunately, this set of capabilities is extremely desireable to a hacker. BlueBorne can serve any malicious objective, such as cyber espionage, data theft, ransomware, and even creating large botnets out of IoT devices like the Mirai Botnet or mobile devices as with the recent?WireX Botnet. -Armis researchers

Interested in a BlueTooth testing and research tool? Check out Ubertooth One.

#tor ?

Looks like zero-days are all the rage this week, including Tor-browser exploits. So much so that Zerodium is willing to pay one million dollars or more per exploit.?You may recall Zerodium as the?company that specializes in acquiring and reselling zero-day exploits. It seems they’ve turned their attention to Tor, a software that protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world. This news should come as a warning for Tor users, specifically, those who?use Tails OS to protect their privacy. Zerodium has already published?rules and payout details on their website regarding their new program. The company specified that the payout for Tor exploits with no JavaScript will be double than exploits with JavaScript enabled. Additional criteria include?”that the exploit must leverage remote code execution vulnerability, the initial attack vector should be a web page, and it should work against the latest version of Tor Browser.”Historically the zero-day market has been a lucrative business, but Zerodium says it plans to resell the Tor browser exploits to law enforcement agencies, helping them combat crime. In response,?Tor Project notes that breaching the anonymity of the browser may put user lives at risk, including human rights defenders, activists, lawyers, and researchers, who use it. It should be noted that Tor does currently offer a bug bounty program where?researchers and hackers are encouraged to responsibly disclose vulnerabilities. A Tor spokesperson was quoted as saying,?”We think the amount of the bounty is a testament to the security we provide. We think it’s in the best interest of all Tor users, including government agencies, for any vulnerabilities to be disclosed to us through our own bug bounty.”

In many cases, [Tor] used by ugly people to conduct activities such as drug trafficking or child abuse. We have launched this special bounty for Tor Browser zero-days to help our government customers fight crime and make the world a better and safer place for all. -statement from Zerodium

Learn the basics of zero-days. Read ‘An Introduction to Ethical Hacking.’?


According to a survey from Barkly, ‘Security Confidence Headed Into 2017,’ 52% of organizations that suffered successful cyber attacks in 2016 aren’t making any changes to their security in 2017.?Olivia Lynch?(@Cybrary_Olivia)?is the Marketing & Communications Manager at Cybrary. Like many of you, she is just getting her toes wet in the infosec field and is working to make cyber security news more interesting. A firm believer that the pen is mightier than the sword, Olivia considers corny puns and an honest voice essential to any worthwhile blog.

Acquiring the certification isn’t going to be an easy task, but if you have the expertise help of the AWS SAA-C02 Solution Architect Associate Dumps offered at the ITCertDumps, you would be able to achieve it in a single attempt.

Be the first to reply

Leave a Reply

Your email address will not be published.