{"id":24191,"date":"2022-09-07T08:13:13","date_gmt":"2022-09-07T12:13:13","guid":{"rendered":"https:\/\/www.thundercloud.net\/infoave\/new\/?p=24191"},"modified":"2022-09-07T08:13:13","modified_gmt":"2022-09-07T12:13:13","slug":"wednesday-newsbytes-new-hacking-tool-steals-your-logins-false-positives-for-microsoft-defender-botnet-attacks-d-link-routers-site-reviews-products-after-they-break-and-more","status":"publish","type":"post","link":"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-new-hacking-tool-steals-your-logins-false-positives-for-microsoft-defender-botnet-attacks-d-link-routers-site-reviews-products-after-they-break-and-more\/","title":{"rendered":"Wednesday Newsbytes: New Hacking Tool Steals Your Logins,\u00a0 False Positives for Microsoft Defender, Botnet Attacks D-Link Routers, Site Reviews Products After They Break&#8230; and more!"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Wednesday Newsbytes: New Hacking Tool Steals Your Logins,\u00a0 False Positives for Microsoft Defender, Botnet Attacks D-Link Routers<\/span><\/strong><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">, Site Reviews Products After They Break&#8230; and more!<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday, we feature some news articles that grabbed our attention over the past week. We hope you find this week&#8217;s\u00a0 &#8216;Wednesday Newsbytes&#8217; informative and interesting!<\/span><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.techradar.com\/news\/this-brutal-hacking-tool-could-steal-literally-all-of-your-logins\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">This brutal hacking tool could steal virtually all of your logins<\/span><\/strong><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">New EvilProxy platform can reportedly topple MFA on popular sites<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A new hacking tool can supposedly beat any security protections set up to prevent cyberattacks, and gain access to some of the world&#8217;s most popular websites, reports suggest.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The operator behind the EvilProxy tool says it is able to steal the authentication tokens needed to bypass the multi-factor authentication (MFA) systems used by the likes of Apple, Google, Facebook, Microsoft, and Twitter.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The service is particularly concerning as it promises to make such attacks available to all hackers, even those who may not have the precise skills or knowledge needed to attack such prominent targets.<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Phishing threat<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The tool was discovered by security firm Resecurity (opens in new tab), which notes that EvilProxy (also known as Moloch) is a reverse-proxy Phishing-as-a-Service (PaaS) platform being advertised on the dark web.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">It offers to steal usernames, passwords, and session cookies, for a cost of $150 for ten days, $250 for 20 days, or $400 for a month-long campaign &#8211; although attacks against Google attacks will cost more, coming in at $250, $450 and $600 respectively.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Reverse proxies typically sit between a website and some form of online authentication endpoint such as a login page. EvilProxy tricks its victims using phishing lures, taking them to a legitimate page where they are asked to enter login credentials and MFA information. This data is then sent to the intended, legitimate website, logging them in, and also generating a session cookie containing an authentication token, which is sent to the victim.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.techradar.com\/news\/this-brutal-hacking-tool-could-steal-literally-all-of-your-logins\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"text-decoration: underline; font-size: 18pt;\">Read more at Techradar<\/span><\/strong><\/span><\/a><\/p>\n<blockquote>\n<hr \/>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-defender-falsely-detects-win32-hivezy-in-google-chrome-electron-apps\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Microsoft Defender falsely detects Win32\/Hive.ZY in Google Chrome, Electron apps<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">A bad Microsoft Defender signature update mistakenly detects Google Chrome, Microsoft Edge, Discord, and other Electron apps as &#8216;Win32\/Hive.ZY&#8217; each time the apps are opened in Windows.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The issue started Sunday morning when Microsoft pushed out Defender signature update 1.373.1508.0 to include two new threat detections, including Behavior:Win32\/Hive.ZY.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">&#8216;This generic detection for suspicious behaviors is designed to catch potentially malicious files. If you downloaded a file or received it through email, ensure that it is from a reliable source before opening it,&#8217; reads the Microsoft detection page for Win32\/Hive.ZY.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">According to BornCity, the false positive is widespread, with users reporting on BleepingComputer, Twitter, and Reddit that the detections appear each time they open their browser or an Electron app.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Even though Microsoft Defender will continuously display these detections when apps are opened, it is important to note that this is a false positive, and your device is mistakenly being detected as infected.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Microsoft has since released two new Microsoft Defender security intelligence updates, the latest being 1.373.1518.0.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">While this signature update does not display Win32\/Hive.ZY detections in BleepingComputer&#8217;s tests, other users report that they continue to receive false positives.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-defender-falsely-detects-win32-hivezy-in-google-chrome-electron-apps\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><span style=\"font-family: helvetica, arial, sans-serif;\"><strong><span style=\"font-size: 18pt;\">Read more at Bleeping Computer<\/span><\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/lifehacker.com\/this-site-reviews-products-after-they-break-1849500233\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">This Site Reviews Products After They Break<\/span><\/strong><\/a><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Don&#8217;t rely on the opinions of people who just opened the box.<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">We\u2019ve come to rely on reviews when researching what products to buy. After all, everything\u2019s getting more expensive (or getting smaller), and you want to be sure the purchases you make are smart. Reviews offer you real-life experience from someone who bought the item you\u2019re looking at, and help inform you whether or not it\u2019s worth the money. That said, they often suck.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">Traditional reviews aren\u2019t thorough enough<\/span><\/strong><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Reviews, as we\u2019ve come to know them, are inherently flawed. When reliable, they\u2019re a great measure of a customer\u2019s enjoyment of the product as new, or within a recent timeframe, but most fail to advise us on how that product handles down the road. If you\u2019re someone who writes reviews, you\u2019re usually inspired to share your thoughts shortly after experiencing the product for the first time. You open the box, and the item either meets your expectations, surpasses them, or falls short. In any case, you have thoughts right away, and you\u2019re ready to share them.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/lifehacker.com\/this-site-reviews-products-after-they-break-1849500233\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\">Read more at<\/span><span style=\"text-decoration-line: underline; font-family: helvetica, arial, sans-serif; font-size: 18pt;\"> Lifehacker<\/span><\/strong><span style=\"font-family: helvetica, arial, sans-serif; font-size: 18pt;\"><strong>.<\/strong><\/span><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/moobot-botnet-is-coming-for-your-unpatched-d-link-router\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">Moobot botnet is coming for your unpatched D-Link router<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The Mirai malware botnet variant known as \u2018MooBot\u2019 has re-emerged in a new attack wave that started early last month, targeting vulnerable D-Link routers with a mix of old and new exploits.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">MooBot was discovered by analysts at Fortinet in December 2021, targeting a flaw in Hikvision cameras to spread quickly and enlist a large number of devices into its DDoS (distributed denial of service) army.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Today, the malware has refreshed its targeting scope, which is typical for botnets looking for untapped pools of vulnerable devices they can ensnare.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">According to a report compiled by Palo Alto Network\u2019s Unit 42 researchers, MooBot is now targeting the following critical vulnerabilities in D-Link devices:<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">CVE-2015-2051: D-Link HNAP SOAPAction Header Command Execution Vulnerability<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">CVE-2018-6530: D-Link SOAP Interface Remote Code Execution Vulnerability<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">CVE-2022-26258: D-Link Remote Command Execution Vulnerability<\/span><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">CVE-2022-28958: D-Link Remote Command Execution Vulnerability<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The vendor has released security updates to address these flaws, but not all users have applied the patches yet, especially the last two, which became known in March and May this year.<\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/moobot-botnet-is-coming-for-your-unpatched-d-link-router\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline; font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><strong>Read more at Bleeping Computer.<\/strong><\/span><\/a><\/p>\n<hr \/>\n<blockquote><p><a href=\"https:\/\/didyouknowfacts.com\/what-do-most-people-not-realize-is-illegal-heres-how-people-responded\/\" target=\"_blank\" rel=\"noopener\"><strong><span style=\"font-size: 24pt; font-family: helvetica, arial, sans-serif;\">What Do Most People Not Realize Is Illegal? Here\u2019s How People Responded.<\/span><\/strong><\/a><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">The world is full of strange laws.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">And a lot of those strange laws are specific to a town, or a state, or a country.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">And today we\u2019re gonna learn about a whole bunch of them!<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">People on AskReddit talked about what most folks don\u2019t even know is illegal.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Let\u2019s have a look.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">1. Down South.<\/span><\/strong><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In Louisiana, if you bite someone with your natural teeth, that\u2019s simple battery. But if you bite someone with false teeth, it\u2019s aggravated battery.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">2. Come on, Nevada!<\/span><\/strong><\/span><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Double stops at stop signs is illegal in Nevada. If you roll forward and stop again, you broke a law.<\/span><\/p>\n<p><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">This is frustrating because they put stop signs really far back from the street in Nevada, so it is nearly impossible to safely turn without making a double stop.<\/span><\/p>\n<p><span style=\"font-size: 18pt;\"><strong><span style=\"font-family: helvetica, arial, sans-serif;\">3. It\u2019s good for everyone.<\/span><\/strong><\/span><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">Vermont has a law on the books (1999) that a \u201cGood Faith\u201d effort must be put in to serve apple pie with either a scoop of ice cream, cold milk, or a slice of cheddar cheese no less than 0.5oz.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">4. Stay away.<\/span><\/strong><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">It is illegal to initiate contact with a manatee, but you\u2019re allowed to touch them as long as they touched you first.<\/span><\/p>\n<p><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\">5. That\u2019s weird.<\/span><\/strong><br \/>\n<span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">In Scotland, you cannot pick up roadkill that you killed with your own car. <\/span><span style=\"font-size: 14pt; font-family: helvetica, arial, sans-serif;\">However, the car behind you can pick it up and do whatever with it.<\/span><\/p><\/blockquote>\n<p><span style=\"text-decoration: underline;\"><strong><span style=\"font-size: 18pt; font-family: helvetica, arial, sans-serif;\"><a href=\"https:\/\/didyouknowfacts.com\/what-do-most-people-not-realize-is-illegal-heres-how-people-responded\/\" target=\"_blank\" rel=\"noopener\">Read more at DidYouKnowFacts.com<\/a><br \/>\n<\/span><\/strong><\/span><\/p>\n<hr \/>\n<p><span style=\"color: #339966; font-family: helvetica, arial, sans-serif;\"><strong><em><span style=\"font-size: 18pt;\">Thanks for reading this week&#8217;s Wednesday Newbytes. We hope you found these articles informative, interesting, fun, and\/or helpful. Darcy &amp; TC<\/span><\/em><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Wednesday Newsbytes: New Hacking Tool Steals Your Logins,\u00a0 False Positives for Microsoft Defender, Botnet Attacks D-Link Routers, Site Reviews Products After They Break&#8230; and more! Every day we scan the tech world for interesting news in the world of technology and sometimes from outside the world of technology. Every Wednesday, we feature some news articles that\u2026 <span class=\"read-more\"><a href=\"https:\/\/www.thundercloud.net\/infoave\/new\/wednesday-newsbytes-new-hacking-tool-steals-your-logins-false-positives-for-microsoft-defender-botnet-attacks-d-link-routers-site-reviews-products-after-they-break-and-more\/\">Read More &raquo;<\/a><\/span><\/p>\n","protected":false},"author":1,"featured_media":23363,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2247,2509,1,1426,2942,3590,1670,1656,4372],"tags":[],"_links":{"self":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24191"}],"collection":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/comments?post=24191"}],"version-history":[{"count":3,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24191\/revisions"}],"predecessor-version":[{"id":24194,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/posts\/24191\/revisions\/24194"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media\/23363"}],"wp:attachment":[{"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/media?parent=24191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/categories?post=24191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thundercloud.net\/infoave\/new\/wp-json\/wp\/v2\/tags?post=24191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}