UNM4SK3D: Dropbox, Russia, and Google Play

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

UNM4SK3D: Dropbox, Russia, and Google Play

Author: Olivia | Published on January 27, 2017 | Views: 3056

unm4sk3d_blog

#filesharing

Recently, Dropbox earned itself a new nickname, ‘Dropbug,’ also synonymous with ‘restore files.’ The crowd-favorite file sharing company implemented a bug fix which had corrupted the metadata of their files. This resulted in the files being “quarantined” rather than deleted. 

So while you may have thought your folder containing embarrassing love letters to an ex was gone, not the case. Several Dropbox users have said folders they deleted as far back as 2009 reappeared on their devices. According to Dropbox’s privacy policy, ” the company permanently erases data from its servers 60 days after a customer deletes them.” Many who noticed the reappearance of their deleted files sounded the alarm that the company may have been hacked.

That’s when a Dropbox customer service representative, ‘Ross S’ took to forums, stating “while fixing the bug, we inadvertently restored the impacted files and folders to those users’ accounts. This was our mistake; it wasn’t due to a third party and you weren’t hacked.” Phew.. that’s good. But wait, this bug has been around for a bit, so why wasn’t it fixed sooner? Seems to be another question for another day.

500 Million people use Dropbox, according to their site

If this story raises Dropbox trust issues, this podcast featuring Dropbox Chief of Trust and Security, Patrick Heim, may help.

#treason

2 Cyber Security Intelligence Officials were arrested by Russia in December on charges of treason, a recent report acknowledged. The first charged is the head of Kapersky lab’s computer incidents investigations team,  Ruslan Stoyanov and the other, is Sergei Mikhailov, deputy chief of the Federal Security Service (FSB)’s Center for Information Security. Nyet good!

“News of the arrests comes as U.S. intelligence agencies continue investigating the degree to which Russian government-backed hackers penetrated computer servers and e-mail accounts belonging to the political party officials, first and foremost, the Democratic Party,” reports RadioLiberty. And while the FSB has refused to comment, Kapersky Labs has denied their knowledge in the case, saying that their employee’s activities pre-date his employment.

The connection between the Stoyanov and Mikhailov comes from the speculation that Stoyanov was “seen as a sort of broker” between Mikhailov. So, the treason charges could have been a result of him facilitating foreign access to someone with a Russian secuirty clearance. It’s alleged that Stoyanov received money from foreign companies or entities, but according to Mark Galeotti, a senior research fellow specializing in Russian security affairs at the Institute of International Relations Prague, treason charges in Russia are not a rarity.

It [the arrests] destroys a system that has been 20 years in the making, the system of relations between intelligence agencies and companies like Kaspersky -Andrei Soldatov, Russian security services expert

To weigh in on Russia’s current state of affairs, join this forum discussing the 10 Year Prison Sentence for Russian Hackers and Malware Authors.

#hummingwhale

There’s an animal we never thought we’d hear of.  It’s all too familiar cousin, HummingBad, an Android malware that was discovered in February 2016 infected as many as 10 million devices. Now, it’s resurfaced as HummingWhale. 

Unfortunately the zoo isn’t answering our call, but researchers at CheckPoint are. They say the new malware has several new features allowing it to perform ad fraud even more efficiently than its predecessor. Luckily, they spotted a malicious app that shared many of the same attributes of the original HummingBad malware, so they were able to make a connection between the two samples. HummingWhale was hiding in plain sight, being distributed via 20 camera, music, flashlight and adult apps on Google Play. Those apps have since been removed from the marketplace after CheckPoint reported the malware.

Looking back at Hummingbad, the side business of a legitimate Chinese advertising analytics firm, YingMob, it’s frightening to see the damage malware can do. By the first half of 2016, HummingBad had grown so prevalent the malware represented 72 percent of mobile attacks, according to researchers, and was bringing in $300,000 a month. From a current count, HummingWhale had yet to grow to this extensive of a reach, but is still said to have affected between 2 and twelve million devices.

It was probably only a matter of time before HummingBad evolved and made its way onto Google Play again -Oren Koriat, CheckPoint mobile cyber security analyst

If you’re not entirely certain how malware works, read ‘How to Identify Malware/Sypware Attacks’.

#factbyte

Houston, Texas leads the nation in the number of computer and mobile devices infected with malware, or software that can damage or disable those devices, according to technology firm Webroot.

#jobspotlight

Probably one of the most sought after jobs being discussed on Cybrary is ‘Pentration Tester.’ That is, a person who practices testing a computer system, network, or web application to find vulnerabilities that an attacker could exploit.

From the perspective of DarkReading.com, “Penetration testers must have an innate curiosity of how networked systems work coupled with a solid understanding of IT operations. It also helps to be able to think like an attacker.”

If this sounds like your ideal career, there’s a few steps you can take to move towards that ‘dream job.’ Gaining experience and certifications are a great place to start. Among the skills needed by a pen tester, perhaps most important is their ability to accurately asses an environment. That’s where the Security Asseessment and Testing Skill Certification comes into play.

Focused on a managerial level approach, the Security Assessment and Testing Skill Certification teaches how to manage risks involved in developing, operating and sustaining systems and capabilities. You will learn verification vs. validation, log management, and security solutions such as: IDS/IPS, web proxies, routers, and firewalls.

olivia2Olivia Lynch (Cybrary_Olivia) is the Marketing Manager at Cybrary. Like many of you, she is just getting her toes wet in the field of cyber security. A firm believer that the pen is mightier than the sword, Olivia considers corny puns and an honest voice essential to any worthwhile blog.

Still Reading Big Magic: Creative Living Beyond Fear by Elizabeth Gilbert

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel