Tag Archive for: Contained

FBI says it’s contained an ‘isolated’ IT security breach • The Register


The FBI claims it has dealt with a cybersecurity “incident” that reportedly involved computer systems being used to investigate child sexual exploitation.

“The FBI is aware of the incident and is working to gain additional information,” a spokesperson said in a statement to The Register. “This is an isolated incident that has been contained. As this is an ongoing investigation the FBI does not have further comment to provide at this time.”

The spokesperson declined to answer questions about the IT security breach, including how intruders gained access to the network and what information they accessed.

CNN first reported the intrusion or infiltration on Friday morning, and said it involved something untoward happening with computers in the FBI’s New York field office.

Austin Berglas, a former FBI agent in the Crimes Against Children unit in New York, told The Register the infected or infiltrated devices are likely contained to a forensic analysis network. In other words, it’s doubtful that the network intruders accessed any classified information: they may have only got as far as the systems for studying and sorting files.

These child exploitation investigations usually involve digital evidence: cell phones, computers, external storage and the like. After the FBI seizes suspects’ devices, they are scanned for malware or other malicious files prior to processing data with specialized forensic software which is used to extract information hidden on the devices, Berglas explained.

“Most likely, an infected device (not intentionally by the owner) was seized/collected and then infected the FBI forensic computer after evading malware scans,” Berglas, who is now at security shop BlueVoyant, told The Register. “These devices would never be processed on classified networks.”

New malware appears daily, so sometimes scans fail to identify…

Source…

Chromium source accidentally contained test malware


Google this afternoon alerted Chromium developers about the possibility that they were exposed to malware used for testing due to an internal “oversight.”

The open-source nature of Chromium means that anybody can take the code to create their own browser. That Chromium source code repository from September 9 to November 18 contained “some test Office documents that included some unshielded malware.” Google notified Chromium developers of this error in an email on Friday afternoon.

These samples were inadvertently committed to the repository without obfuscation in the process of testing the security feature to detect the presence of malware distributed through macros in Office documents. These test files were not included in any Chrome release.

Security researchers have a need to use sample malware files for the purposes of automated testing of detection. The best practice in these cases is to obfuscate such files so that they cannot be accidentally opened or executed. In this case, we didn’t do that, potentially exposing Windows developers to accidental infection if they were to open these files themselves (i.e. by browsing to the Chromium source checkout folder and double-clicking on the Office document).

Google explicitly says that users of Chrome and other Chromium-based browsers, e.g. Microsoft Edge, are not impacted. Specifically, “Chromium/Chrome does not, and has never included any of these files, so users of those products are at no risk.”

Rather, the Chromium team made this disclosure for developers. That said, the Windows malware was five years old and the .doc and .docx test files in question have to be manually opened to cause infection.

3. We have confirmed that the malware itself is inactive as of this writing.

4. Tests using these files do not trigger the malware, so incidental infection via running tests would not have occur[r]ed.

5. The Chromium repo synced past Nov 18th, 2021 does not pose a risk to developers. 

As such, the company believes that it’s “exceedingly unlikely that any contributors were infected by this malware” and that there have been no “reports of any contributors being infected by opening these files.”

We…

Source…

Two Android apps used in combat by US troops contained severe vulnerabilities – ZDNet

Two Android apps used in combat by US troops contained severe vulnerabilities  ZDNet

Apps were meant for training, never approved for combat. Whistleblower’s efforts helped shed light on vulnerabilities, despite leadership reprisals.

“android security news” – read more

Apple’s Latest MacOS Security Update Contained Fix for Plug-n-Hack USB Attack

This tool runs automatically whenever users connect a FAT-formatted USB or SD storage device to their Mac. “The vulnerability allows arbitrary code to be executed with system-level privileges, which potentially lets a malicious device (such as the …
mac hacker – read more