{"id":3735,"date":"2014-08-01T12:30:44","date_gmt":"2014-08-01T16:30:44","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3735"},"modified":"2020-02-26T18:58:56","modified_gmt":"2020-02-26T14:58:56","slug":"news_previewing_black_hat_2014","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/news_previewing_black_hat_2014\/3735\/","title":{"rendered":"A Week in the News: Previewing Black Hat, DEF CON"},"content":{"rendered":"<p>Two of the world\u2019s premier hacking and security conferences take place next week in Las Vegas, Nevada: Black Hat and DEF CON. In this week\u2019s recap, we\u2019ll look forward to those events but also back on the week\u2019s news.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/08\/05111538\/hat.min_-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-5593 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/08\/05111538\/hat.min_-1.png\" alt=\"hat.min\" width=\"640\" height=\"480\"><\/a><\/p>\n<p><strong>Hacker Conference Previewing<\/strong><\/p>\n<p>The Black Hat and DEF CON security conferences begin next week, so we\u2019ll begin our weekly news recap by looking forward:<\/p>\n<p>Briefings to look forward to include Kaspersky Lab security expert Vitaly\u00a0Kamluk\u2019s\u00a0talk, in which he will revisit the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/sas-day-one-kaspersky-showcases-company-industry-talent\/\" target=\"_blank\" rel=\"noopener nofollow\">Absolute\u00a0Computrace\u00a0vulnerability<\/a>, which we wrote about during the Security Analysts Summit back in February.<\/p>\n<p>Security researcher Joshua Drake will present on a tool he\u2019s built that could revolutionize the study of Android security. The tool essentially\u00a0<a href=\"https:\/\/threatpost.com\/harnessing-the-power-of-an-android-cluster-for-security-research\/107460\" target=\"_blank\" rel=\"noopener nofollow\">clusters together as many different Android devices<\/a>\u00a0\u2013 each with\u00a0it\u2019s\u00a0own slightly different propriety operating system \u2013 as he could find. In this way, he believes, security researchers will have a more complete view of the vast Android operating system. Another interesting Android briefing will be that of\u00a0Bluebox\u00a0Security\u2019s Jeff\u00a0Forristal, whose research suggests that there is a<a href=\"https:\/\/threatpost.com\/critical-android-fakeid-bug-allows-attackers-to-impersonate-trusted-apps\/107462\" target=\"_blank\" rel=\"noopener nofollow\">\u00a0critical vulnerability in millions of Android devices<\/a>\u00a0that allows a malicious app to impersonate a trusted application, enabling an attacker to insert malicious code into legit apps or even wrest control of an affected device.<\/p>\n<p>As for DEF CON, they\u2019ll be hosting\u00a0<a href=\"https:\/\/threatpost.com\/def-con-hosting-soho-wireless-router-hacking-contest\/107463\" target=\"_blank\" rel=\"noopener nofollow\">a router hacking contest\u00a0<\/a>at this year\u2019s event. The router to be hacked is the SOHO Wi-Fi router. The rules are listed on the\u00a0SOHOpelessly\u00a0Broken website. Contestants must identify and demonstrate their zero-day exploit during DEF CON. Prizes will be awarded, but we aren\u2019t sure what they are yet.<\/p>\n<p><strong>Trouble for the World\u2019s Largest Social Network<\/strong><\/p>\n<p>Back to the news that\u2019s already happened: Facebook had its good and bad this week.<\/p>\n<p>First, on Monday, a conglomeration of privacy advocates in the U.S. and Europe requested that\u00a0<a href=\"https:\/\/threatpost.com\/consumer-groups-urge-ftc-to-halt-facebook-data-collection-program\/107478\" target=\"_blank\" rel=\"noopener nofollow\">Facebook be made to hold off on the implementation of its new targeted advertisement policy<\/a>. In the past, Facebook\u2019s advertisements were based almost entirely on the pages its users liked. Last month, the social network made a puzzling announcement, saying they would give users more control over the ads they see while also beginning to collect information about their users\u2019 broader Web-surfing behavior.<\/p>\n<p>The groups that issued the complaint to the FTC are hoping to delay or altogether stop Facebook\u2019s move toward mining information from users outside Facebook\u2019s domain. The groups are saying that Facebook\u2019s program \u201cdirectly contradicts its previous statements\u201d about privacy and user tracking and that the network misled users last month when it said they would be able to control which ads they would see.<\/p>\n<div class=\"pullquote\">The attack was so serious the organization is being forced to rebuild its entire system.<\/div>\n<p>The next day,\u00a0<a href=\"https:\/\/threatpost.com\/trio-of-flaws-fixed-in-facebook-android-app\/107512\" target=\"_blank\" rel=\"noopener nofollow\">per\u00a0Threatpost<\/a>, Facebook fixed\u00a0a vulnerability\u00a0in its Android app that could have allowed an attacker to cause a denial-of-service condition on a device or run up the victim\u2019s mobile bill by transferring large amounts of data to and from the device. So, if you run Facebook on Android, make sure you install the latest update if you haven\u2019t done so already.<\/p>\n<p>It also turns out that the mobile version of Facebook\u2019s wildly popular photo-sharing service Instagram doesn\u2019t deploy full encryption. Because of this, users are at risk of exposing their browsing behavior and having their session cookies stolen, which could ultimately lead to account hijacks on both Android and iOS. Facebook and Instagram are aware of the issue and say they will fix the problem, but have not yet committed to a date for that fix. Read more at\u00a0<a href=\"https:\/\/threatpost.com\/facebook-plans-to-fix-instagram-mobile-session-hijack-eventually\/107518\" target=\"_blank\" rel=\"noopener nofollow\">Threatpost<\/a>\u00a0and on the\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/instagram_mobile_lacks_encryption\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Daily<\/a>.<\/p>\n<p><strong>Advanced Persistent Threats<\/strong><\/p>\n<p>It also emerged this week that Chinese advanced persistent threat (APT) hackers set their sights on defense contractors involved in the development of Israel\u2019s notorious \u201cIron Dome\u201d missile defense system. They\u00a0<a href=\"https:\/\/threatpost.com\/missile-defense-plans-hacked-from-israeli-contractors\/107466\" target=\"_blank\" rel=\"noopener nofollow\">reportedly<\/a>\u00a0stole detailed schematics for a particular type of anti-ballistic missile, information about rockets, and pages upon pages of other mechanical documents from a trio of Israeli defense contractors between 2011 and 2012.<\/p>\n<p>Another allegedly Chinese APT group\u00a0<a href=\"https:\/\/threatpost.com\/canadas-national-research-council-hit-by-apparent-chinese-cyber-attack\/107524\" target=\"_blank\" rel=\"noopener nofollow\">hacked into one of Canada\u2019s premier research and technology organizations<\/a>, forcing them offline.\u00a0Threatpost\u2019s\u00a0Chris Brook writes that the attack was so serious that the organization is being forced to rebuild its entire system. Canada is not yet saying when the attack took place nor is it divulging what was taken.<\/p>\n<p><strong>In Other News<\/strong><\/p>\n<p>Senator Patrick\u00a0Leahy\u00a0(D-VT)\u00a0<a href=\"https:\/\/threatpost.com\/leahy-introduces-bill-to-end-bulk-call-record-collection\/107490\" target=\"_blank\" rel=\"noopener nofollow\">introduced a bill<\/a>\u00a0that aims to curtail\u00a0NSA\u00a0surveillance power by ending the bulk collection of\u00a0metadata\u00a0and placing more oversight on the Foreign Intelligence Surveillance Court.\u00a0WhisperSystems\u00a0released Signal, an iPhone app that will let users make\u00a0<a href=\"https:\/\/threatpost.com\/new-signal-app-brings-encrypted-calling-to-iphone\/107491\" target=\"_blank\" rel=\"noopener nofollow\">free\u00a0encrypted phone calls<\/a>. Last but not least, for a little more than six months, attackers were on the Tor network trying to\u00a0<a href=\"https:\/\/threatpost.com\/tor-sniffs-out-attacks-trying-to-deanonymize-hidden-services-users\/107514\" target=\"_blank\" rel=\"noopener nofollow\">de-anonymize\u00a0users who operate or use Tor hidden services<\/a>.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Looking forward to #BlackHat\u00a0and #DEFCON and looking back at the\u00a0weeks\u00a0#security news<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FMfs6&amp;text=Looking+forward+to+%23BlackHat%C2%A0and+%23DEFCON+and+looking+back+at+the%C2%A0weeks%C2%A0%23security+news\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>In the news this week: more APT campaigns, a look forward at the DEF CON and Black Hat Hacker conferences, and good and bad news for Facebook.<\/p>\n","protected":false},"author":42,"featured_media":3736,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[477,740,741,20,709,43,97,738],"class_list":{"0":"post-3735","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apt","9":"tag-black-hat","10":"tag-def-con","11":"tag-facebook","12":"tag-nsa","13":"tag-privacy","14":"tag-security-2","15":"tag-surveillance"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/news_previewing_black_hat_2014\/3735\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/news_previewing_black_hat_2014\/3836\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/news_previewing_black_hat_2014\/4225\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/news_previewing_black_hat_2014\/4482\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/news_previewing_black_hat_2014\/5592\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/news_previewing_black_hat_2014\/4420\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/news_previewing_black_hat_2014\/5592\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/news_previewing_black_hat_2014\/5592\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/apt\/","name":"APT"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3735","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3735"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3735\/revisions"}],"predecessor-version":[{"id":15886,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3735\/revisions\/15886"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3736"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3735"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3735"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3735"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}