Thursday, 1 March 2018

Russia behind compromise of seven states' voter registration systems

During the waning days of his administration after he'd order a probe into election interference, the intelligence community reportedly told former President Barack Obama that Russian hackers had compromised voter registration systems or websites in seven states and, though the states were told of the breaches, the administration didn't divulge who had orchestrated them. 
While at least two of the states compromised - Wisconsin and Florida - voted for Trump by slim margins, one and 1.2 percent, respectively, NBC News cited three intelligence officials as saying that no votes had been altered nor had anyone been deleted from voter rolls. 
The other states affected were California, Arizona, Illinois, Alaska and Texas. Obama's had ordered the top secret report as his administration drew to a close.
“Russia – or any bad actor - only needs to find one open door to get into a state's network. Considering how complex these networks are – with employees on mobile devices, working remotely, etc. – it's no wonder they snuck in," said RedSeal CEO Ray Rothrock, author of the book “Digital Resilience: Is Your Company Ready for the Next Cyber Threat?”
Rothrock said, "It's time for state and local officials to take a page from the Department of Defense's core cyber philosophy: identify and protect high value assets in order to successfully defeat the bad guys once they're inside the network. We've learned that we can't stop every intrusion, that the bad guys are always poking and probing our networks, and will eventually get in."
Calling Trump's May Executive Order on Cyber. which "tasked efforts for focus on risk management - putting a higher priority on managing rather than thwarting cyber-attacks" a clear "step in the right direction," Rothrock said, "Only when states, or any organization really, understand how their networks are configured and operated, can they keep the bad guys away from high-value local and national assets. This strategy of digital resilience gives every organization — from utilities to elections — a real chance of winning against the intrusion and disruption.”

Saturday, 17 February 2018

Apple Rushes Fix for Latest ‘Text Bomb’ Bug As Abuse Spreads

Apple said it is working on a fix for the latest text bomb bug that crashes a number of iOS and Mac apps that display specific Telugu language characters.
The bug, first reported by Italian Blog Mobile World, impacts a wide range of Apple apps running on iOS and macOS. While some iPhone users are reporting system crashes, others are reporting cases where the specially crafted message disables access to Apple’s iMessage and other apps such as WhatsApp, Facebook Messenger, Outlook and Gmail running on the latest version of Apple’s operating system (iOS 11.2.5).

Apple declined to comment, however confirmed to Threatpost a fix would be available soon and that publicly available beta versions of iOS, tvOS, macOS and watchOS are not impacted by the bug.
This most recent text bomb bug is triggered when someone sends two Unicode symbols using the Indian language (Telugu) characters to iOS and macOS apps using Apple’s default San Francisco font. When the message is received Apple’s home screen manager called Springboard hiccups resulting in apps freezing. In other reported instances devices crash and require a restart. In many cases, users can’t reopen affected apps and are forced to delete and reinstall the affected application.
Knowledge of the bug has motivated a wide range of malicious or prank attacks on Twitter. According reports, not only are some sending Telugu text bomb’s as private messages, but also using social media platforms such as Twitter.
“A Twitter user with the symbol in their screenname ‘liked’ one of my tweets late on Thursday night. Shortly after the notification popped into my feed, my Twitter app on iOS became briefly unresponsive before crashing,” described Motherboard contributor Joseph Cox in post Thursday.
In addition, Cox pointed out a post by security researcher Darren Martyn that showed how people could crash Apple’s networking application simply by putting the symbol in the name to the Wi-Fi network.

Apple is no stranger to text bombs. In January, Apple dealt with a similar iOS headache tied to a specific URL. In that case, when the URL (iabem97[.]github[.]io/chaiOS/) was sent to the iPhone, iPad or Mac’s Messages app it brought it to a grinding halt. In 2016, another malicious URL crashed iPhones and the Safari browser.
The flaw was reported to Open Radar, an Apple community bug reporting site, on Monday. According to the report, impacted Apple operating systems include iOS, MacOS and watchOS.