{"id":3647,"date":"2014-07-11T10:00:10","date_gmt":"2014-07-11T14:00:10","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3647"},"modified":"2017-05-19T04:27:52","modified_gmt":"2017-05-19T08:27:52","slug":"news_week_patches_world_cup","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/news_week_patches_world_cup\/3647\/","title":{"rendered":"A Week in the News: Patch Tuesday and World Cup Scams"},"content":{"rendered":"<p>In the news this week: we\u2019ll revisit the Microsoft-NoIP takedown situation, discuss the week\u2019s most important security updates, take a look at a new World Cup themed scam, and check in on the world of Android Vulnerabilities.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05111439\/scam-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5386\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05111439\/scam-1.png\" alt=\"scam\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><strong>Microsoft V. NoIP<\/strong><\/p>\n<p>As we wrote in last week\u2019s Friday news round-up, Microsoft filed a temporary restraining order against a small hosting company called No-IP, which allowed them to seize control of just fewer than two dozen domains registered with that company. Microsoft alleged that the company was profiting by allowing criminals to host malware-laced domains and botnet infrastructure on the sites they controlled. No-IP and a number of folks in the security industry contested the move quite strongly, though the takedown had its proponents as well. If you want a bit of background covering all sides of the incident, Costin Raiu, the director of Kaspersky Lab\u2019s Global Research and Analysis Team, wrote an article about the takedown on Securelist and Dennis Fisher wrote a report on Threatpost.<\/p>\n<p>Unfortunately for the Redmond, Washington-based computer giant, the lawsuit and seizure were only the beginning of their latest takedown saga. On Monday, Microsoft returned all 23 seized domains to Vitalwerks, the company that owns No-IP. Shortly after returning the domains to No-IP, Microsoft said it was working with the company to better determine which specific domains were acting maliciously.<\/p>\n<p>However, later in the week, Microsoft released a joint statement announcing that they had reached a settlement deal with Vitalwekrs and admitting that the company \u201cwas not knowingly involved with the subdomains used to support malware.\u201d In the end, the two companies worked together to identify and disable the offending domains.<\/p>\n<div class=\"pullquote\">If you haven\u2019t already, you\u2019re going to want to go ahead and install those updates from Microsoft and Adobe.<\/div>\n<p><strong>Patch Tuesday and Other Fixes<\/strong><\/p>\n<p>If you haven\u2019t already, you\u2019re going to want to go ahead and install those updates from Microsoft and Adobe. Microsoft shipped six bulletins addressing a total of 29 security vulnerabilities.<\/p>\n<p>Only one of Microsoft\u2019s bulletins warrants a mention here: the cumulative update for Internet Explorer. Kurt Baumgartner, Kaspersky Lab\u2019s principle security researcher, wrote in his analysis of the patches that the 23 Internet Explorer remote code execution bugs fixed by this update require immediate attention.<\/p>\n<p>In other patching news, Yahoo fixed some nasty bugs in its Mail and Messaging services as well as the photo sharing service it owns, Flickr. Before Yahoo shipped the fix, the three remotely exploitable vulnerabilities in its services could have given attackers the ability to inject malicious script, which in turn could have led to session hijacking, phishing, and more.<\/p>\n<p><strong>Hanging Up on Android<\/strong><\/p>\n<p>Researchers from Curesec published a blog detailing a pair of interesting vulnerabilities that could be exploited toward a number of interesting, albeit malicious ends. The bugs could essentially let an attacker subvert the Android permission model with malicious or rogue application to make or end calls or send unstructured supplementary service data (USSD) codes on a vulnerable device.<\/p>\n<p>These bugs could be of interest for a few reasons. An attacker could make money by compelling an Android device to make phone calls to premium rate numbers under his or her control, charging the owners of the devices in question for making such calls. On the point of USSD codes, the researchers explained these codes serve a long list of utilities and could give attackers the ability to set up call forwarding rules, disable SIM cards, and more.<\/p>\n<p><strong>World Cup Scams<\/strong><\/p>\n<p>I\u2019m not really sure I understand why a petition to reinstate a grown man that bit another man in what is supposed to be the world\u2019s grandest spectacle of global sportsmanship would be an effective phishing lure, but what do I know?<\/p>\n<p>If you\u2019re a bit lost, I\u2019ll fill you in: Luis Suarez, the forward on the Uruguayan national soccer (football) team and one of the most talented goal scorers in the world was banned form the World Cup this year. He was banned for biting Italian defender Giorgio Chiellini. Oddly enough, this isn\u2019t the first or even the second time Suarez has used his teeth to attack another player.<\/p>\n<p>At any rate, as scammers love to do with any event garnering heavy media attention, phishers created a fake webpage which purported to be a petition to reinstate Suarez. Visitors to the fake site, which masqueraded as the legit FIFA website, were asked to sign the petition and fill in their names, countries of residence, email addresses and mobile numbers.<\/p>\n<p>This is just one of many ongoing World Cup themed scams.<\/p><blockquote class=\"twitter-pullquote\"><p>A week in the news with the @Kaspersky Daily discusses #WorldCup scams and #PatchTuesday:<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fow2c&amp;text=A+week+in+the+news+with+the+%40Kaspersky+Daily+discusses+%23WorldCup+scams+and+%23PatchTuesday%3A\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishers exploit global World Cup interest with a campaign disguised as a petition to reinstate Luis Suarez. Microsoft patched 29 security vulnerabilities.<\/p>\n","protected":false},"author":42,"featured_media":3648,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[105,38,710,570,528,711],"class_list":{"0":"post-3647","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-android","9":"tag-microsoft","10":"tag-noip","11":"tag-patch-tuesday","12":"tag-world-cup","13":"tag-yahoo-security"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/news_week_patches_world_cup\/3647\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/news_week_patches_world_cup\/3746\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/news_week_patches_world_cup\/4122\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/news_week_patches_world_cup\/4374\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/news_week_patches_world_cup\/5385\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/news_week_patches_world_cup\/4229\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/news_week_patches_world_cup\/5385\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/news_week_patches_world_cup\/5385\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/android\/","name":"Android"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3647"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3647\/revisions"}],"predecessor-version":[{"id":6875,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3647\/revisions\/6875"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3648"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}