Cyber security expert and Ethical Hacker needed for ongoing ID Theft, Harassment – Freelance Job in Information Security – Less than 30 hrs/week – 1 to 3 months
Willing to consider multiple security solutions. Communication and…
Willing to consider multiple security solutions. Communication and…
Defense
Heidi Shyu on a 2015 visit to Ft. Bliss. (DOD photo by Sgt. Jessica Littlejohn)
President Joe Biden has nominated Heidi Shyu, former assistant secretary of the Army for acquisition, logistics and technology, to lead the Defense Department’s tech investments as undersecretary for research and engineering.
Shyu chairs the board for manufacturing company Plasan North America, leads her own consulting firm and has held several executive positions at Raytheon.
As the Army’s acquisition executive, Shyu worked to streamline the Army’s program executive offices, especially around cybersecurity.
“Cyber cuts across every single one of my programs,” Shyu previously said. “It’s not stove-piped. You don’t want … Cyber Command to talk to every single PEO individually – that’s just stupid.”
The White House also nominated former Defense Department acquisition chief, Frank Kendall, to be secretary of the Air Force.
Kendall, who was most recently an independent consultant and a senior fellow for the think-tank Center for American Progress, served as DOD’s acquisition chief during the Obama administration and the deputy director of defense research and engineering for tactical warfare programs.
Previously, he was also the vice president of engineering for major defense contractor Raytheon. He also sits on the board of directors for Leidos, another major defense technology contractor.
Gina Ortiz Jones, an experienced Air Force intelligence officer and former special advisor to the Defense Intelligence Agency’s deputy director, was also nominated to be the Air Force’s number two. In addition to her military experience, Ortiz Jones was the investment director for the Committee on Foreign Investment in the United States (CFIUS) portfolio.
The White House also nominated Thomas Monheim to be the inspector general for the intelligence community. Monheim is currently acting in the role and…
New Delhi: Cybercriminals are hiding malware in fake LinkedIn job offers, according to a new report by security firm eSentire. The company’s threat response unit (TRU) has discovered that hackers are hiding malicious zip files in fake job offers on the professional social media platform, in a new form of spearphishing attack.
“For example, if the LinkedIn member’s job is listed as Senior Account Executive—International Freight the malicious zip file would be titled Senior Account Executive—International Freight position (note the “position” added to the end). Upon opening the fake job offer, the victim unwittingly initiates the stealthy installation of the fileless backdoor, more_eggs,” the company said in a blog post.
Also Read | How India’s banking model has changed
According to eSentire’s TRU, the malware installs a “sophisticated backdoor” that can provide hackers access to the victim’s computer. They sell these backdoors as a malware-as-a-service (MaaS) to other cybercriminals, who can use it to steal user data. Once the malware is on a victim’s computer, it can allow cybercriminals to install ransomware, credential stealers, banking malware, or another backdoor on the affected computer.
The malware presents a decoy Word document to the victim, which looks like an employment application but serves “no functional purpose”. It does so while hijacking legitimate Windows processes that give the malware access to the victim’s computer. “It is merely used to distract the victim from the ongoing background tasks of more_eggs,” the firm said.
Robb McLeod, senior director at the TRU, said the malware poses a “formidable threat to businesses and business professionals”. It’s not picked up by regular anti-virus software and security solutions since it uses normal Windows processes. Users are also more likely to download the malware since it’s hidden inside a job posting that they are already interested in. “It is a perfect time to take advantage of job seekers who are desperate to find employment,” the firm said. “Thus, a customised job lure is even more enticing during these troubled times,” it…
(Subscribe to our Today’s Cache newsletter for a quick snapshot of top 5 tech stories. Click here to subscribe for free.)
A hacking group is spear phishing business professionals on LinkedIn with fake job offers to get remote control over the victim’s computer, according to researchers at eSentire.
Spear phishing is an email or electronics communications scam in which a victim receives an email that leads them to a fake website infected with malware. The aim of the attack is to steal data or install malware on victims’ device.
According to researchers, hackers are spear phishing with a malicious zip file using the job position listed on the target’s LinkedIn profile. For instance, if the LinkedIn member’s job is listed as Senior Account Executive—International Freight, the malicious zip file would be titled Senior Account Executive—International Freight position.
Once a users open the fake job offer, they initiate the installation of file-less backdoor, titled ‘more_eggs’. Once loaded, the backdoor trojan can download additional malicious plugins and provide hands-on access to the victim’s computer.
Besides, it can infect the system with any type of malware including ransomware, credential stealers, banking malware, or simply use the backdoor as a foothold into the victim’s network so as to exfiltrate data.
More_eggs possess a significant threat to business as it uses normal Windows processes to run, meaning it is not going to typically be picked up by anti-virus and automated security solutions.
Cybercriminals are taking advantage of the rising unemployment rates since the COVID pandemic. Luring job seekers is more enticing in these times.