Secjuice Squeeze Volume 24

Welcome to the 24th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, and upcoming events–lovingly prepared for you every week.

Secjuice Squeeze Volume 24

Welcome to the 24th edition of the Secjuice Squeeze, a curated selection of interesting security articles and infosec news that you may have missed, lovingly prepared for you every week. This week's volume compiled by Secjuice writers Sinwindie, Mike Peterson, Thunder-Son, jtc94, Miguel Calles, and Hartoyo Wahyu.

Articles

Supercomputers hacked across Europe to mine cryptocurrency

Confirmed infections have been reported in the UK, Germany, and Switzerland. Another suspected infection was reported in Spain.

Source: zdnet.com
Curator: Mike Peterson

Innovative Spy Trojan Targets European Diplomatic Targets

A fresh malware trojan has emerged, built from the same code base as the stealthy COMPFun remote access trojan (RAT). The malware is using spoofed visa applications to hit diplomatic targets in Europe and may be the work of the Turla APT.

Source: https://threatpost.com/innovative-spy-trojan-european-diplomatic-targets/155763/
Curator: Mike Peterson

6 Serverless Security Mistakes You Should Never Make

By, Hillel Sollow, Serverless Security R&D, published May 15, 2020 Securing your serverless application can feel overwhelming, especially when there

Source: checkpoint.com
Curator: Miguel Calles

Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks

ESET researchers have discovered Ramsay, a previously unreported cyber-espionage framework that is tailored for collection and exfiltration of sensitive documents and is capable of operating within air-gapped networks.

Source: welivesecurity.com
Curator: Sinwindie

Russian hacker group using HTTP status codes to control malware implants

New Turla cyber-espionage operation targets diplomatic entities in Europe with new COMpfun malware.

Source: zdnet.com
Curator: Sinwindie

Air Force to Host Satellite Hacking Event Virtually

The Air Force will host a virtual satellite hacking challenge this summer to expose cybersecurity issues and vulnerabilities in space assets and ground control systems, a top service official said May 14.

Source: nationaldefensemagazine.org
Curator: Sinwindie

New Apple Security Blow: If You Have An iPhone, Look Away Now

Apple had been hoping to move past its recent run of dire security warnings—no such luck.

Source: forbes.com
Curator: Thunder-Son

Hackers Say They Have Trump's 'Dirty Laundry' and Want $42 Million to Keep It Secret

The anonymous hackers this week crippled the computer systems of high-profile celebrity law firm Grubman Shire Meiselas & Sacks claiming to have stolen 756GB of highly-confidential documents.

Source: vice.com
Curator: Sinwindie

Senate Votes to Allow FBI to Look at Your Web Browsing History Without a Warrant

The government just got even more power to spy on your internet habits as millions remain quarantined at home.

Source: vice.com
Curator: jtc94

DHS CISA and FBI share list of top 10 most exploited vulnerabilities

Office is the most exploited technology, followed by Apache Struts.

Source: zdnet.com
Curator: Hartoyo Wahyu

Interpol Teams Up With Kaspersky to Declare ‘Anti-Ransomware Day’

Both parties agreed to increase awareness of the ongoing threat of ransomware attacks across the globe.

Source: cointelegraph.com
Curator: Sinwindie

Criminal forum trading stolen data suffers ironic data breach

Someone on the dark web is touting for sale an unusual database a lot of people might pay handsomely to get their hands on.

Source: sophos.com
Curator: Sinwindie

Thunderbolt Flaws Expose Millions of PCs to Hands-On Hacking

The so-called Thunderspy attack takes less than five minutes to pull off with physical access to a device, and it affects any PC manufactured before 2019.

Source: wired.com
Curator: Sinwindie

Hackers are impersonating Zoom, Microsoft Teams, and Google Meet for phishing scams

Hackers have registered domains posing as Zoom, Microsoft Teams, and Google Meet-related URLs, according to a new report from Check Point Research. As significantly more people are using these videoconferencing services during the COVID-19 pandemic, the domains could be used to pose as official links, potentially tricking people into downloading malware or accidentally giving a bad actor access to personal information.

Source: theverge.com
Curator: Sinwindie

The Confessions of the Hacker Who Saved the Internet

At 22, Marcus Hutchins put a stop to the worst cyberattack the world had ever seen. Then he was arrested by the FBI. This is his untold story.

Source: wired.com
Curator: Mike Peterson

Leaked NHS Docs Reveal Roadmap, Concerns Around Contact-Tracing App

Future features include plenty of self-reporting options, and officials' fears the data could be misused.

Source: https://threatpost.com/leaked-nhs-docs-roadmap-concerns-contact-tracing-app/155719/
Curator: Mike Peterson

STAMINA, a new approach to malware detection by Microsoft, Intel

Microsoft and Intel have devised a new approach to malware detection, dubbed STAMINA, that involves deep learning and the representation of malware as images. STAtic Malware-as-Image Network Analysis (STAMINA) is a new approach to malware detection proposed by Microsoft and Intel.

Source: https://securityaffairs.co/wordpress/103043/malware/stamina-malware-detection.html
Curator: Thunder-Son

Upcoming Events, Webcasts, Conferences, etc.

Infosec Rock Star 2020: How to Accelerate Your Career

When: May 18, 2020 at 1:00 PM EDT (2020-05-18 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

Attack Simulation: Docker Application

When: May 19, 2020 at 3:30 PM EDT (2020-05-19 19:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

Tech Tuesday Workshop - O Hacker, Where Art Thou?: A Hands-On Python Workshop for Geolocating Attackers

When: May 19, 2020 at 1:00 PM EST (2020-05-19 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

10 Measures and KPIs for ML Success

When: May 20, 2020 @ 01:00 PM in Eastern Time (05:00 PM UTC)
Location: Online
Source: zoom.us
Curator: Miguel Calles

How to manage access control with Zero Trust

When: May 20, 2020 @ 12:00 PM in Central Time (05:00 PM UTC)
Location: Online
Source: cybersecurity.att.com
Curator: Miguel Calles

SANS @MIC Talk - Find_Evil - Threat Hunting

When: May 20, 2020. 1pm Hong Kong, 3pm Sydney.
Location: Online
Source: sans.org
Curator: Miguel Calles

SANS @MIC Talk - Moving Past Just Googling It: Harvesting and Using OSINT

When: May 20, 2020 at 8:30 PM EDT (2020-05-21 00:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

Five Ways To Cut Costs in Your SOC

When: May 21, 2020 at 3:30 PM EDT (2020-05-21 19:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

Open Season: Building a Threat Hunting Program with Open Source Tools

When: May 22, 2020 at 10:30 AM EDT (2020-05-22 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

DockerCon LIVE 2020 with theCUBE

When: May 28, 2020 @ 09:00 AM - 05:00 PM Pacific (04:00 PM to 12:00 AM UTC)
Location: Online
Source: cube365.net
Curator: Hartoyo Wahyu

Zero Trust: Fast forwarding into working without boundaries

When: May 29, 2020 at 10:30 AM EDT (2020-05-29 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

The State of AI in Financial Services

When: Jun 2, 2020 @ 01:00 PM in Eastern Time (05:00 PM UTC)
Location: Online
Source: zoom.us
Curator: Miguel Calles

Winning in the Dark - Defending Serverless Infrastructure in the Cloud

When: June 03, 2020 at 10:30 AM EDT (2020-06-03 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

Shift Left: Integrate security in your DevOps lifecycle

When: June 04, 2020 at 1:00 PM EDT (2020-06-04 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

CSA EU Summit 2020

When: June 9-12, 2020
Location: Online
Source: cvent.com
Curator: Miguel Calles

Putting Your SOC to the Test

Source: June 10, 2020 at 10:30 AM EDT (2020-06-10 14:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

SANS@MIC - Shellcode Analysis 101

Source: June 10, 2020 at 3:30 PM EDT (2020-06-10 19:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

SANS@MIC - Leveraging Telegram for OSINT purposes

Source:  June 10, 2020 at 8:30 PM EDT (2020-06-11 00:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

DevSecCon24

When: June 15-16, 2020
Location: Online
Source: devseccon.com
Curator: Miguel Calles

You Can Write an Infosec Book!

When: June 15, 2020 at 1:00 PM EDT (2020-06-15 17:00:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

SANS@MIC - The 14 Absolute Truths of Security

When: July 06, 2020 at 8:30 PM EDT (2020-07-07 00:30:00 UTC)
Location: Online
Source: sans.org
Curator: Miguel Calles

Ai4 2020

When: September 1-2, 2020
Location: MGM Grand, Las Vegas
Cost: $595 (early registration)
Source: ai4.io
Curator: Miguel Calles

Open Source Digital Forensics Conference

When: October 20-22, 2020
Location: Herndon, VA
Cost: $0-$350 + $499 optional training
Source: osdfcon.org
Curator: Hartoyo Wahyu

The awesome image in this article is called "Young chemist" and was created by Anton Fritsler (kit8)