Sunday, May 24, 2020

The new phishing scam redirects users multiple times and also uses CAPTCHA before stealing credentials.

Since the advent of phishing in itself, different types of scams have existed ranging from one-fits-all emails to targeted spearphishing campaigns. One such type happens to fall into the category of subpoena themed emails in which the attacker claiming to be an authority, tries to convince the victim into falling for their trap.
These although not so common have occurred from time to time. An
example is of November last year when malicious actors targeted users posing as the UK’s Ministry of Justice and tried to infect them with a malware named “Predator the Thief .
Similarly, just a couple of days ago, Armorblox – an email protection company – has released a report on how this time threat actors are sending fake emails purportedly from the UK’s supreme court.
Here is a screenshot of the phishing email:
Image: Armorblox

To make sure, it evades regular security filters, the attackers only send the email to specific users instead of bulk-messaging which ensures that it isn’t “caught in the bulk email filters of Exchange Online Protection (EOP).”
For the unacquainted, EOP is Microsoft’s own email protection service aimed towards removing malicious content from email messages & even filtering spam. Therefore, by employing this low quantity technique, the phishers are able to stay under the radar.
Coming to the emails themselves, they contain a “ zero-day link ” that redirects the user through a series of steps in a bid to increase the apparent legitimacy of the message. This first involves going through a typical captcha.
According to an in-depth blog post published Armorblox,

"The inclusion of CAPTCHA also makes it harder for security technologies relying just on URL redirection abilities to follow the URL to its final destination."

A few anomalies are present in the captcha here but nonetheless, no user really has the time to scrutinize them which lowers its detection rate. For example, the text above the captcha states, “Kindly verify you human” which being grammatically wrong would clearly not be the work of a Supreme court-based page.
Moreover, the researchers add by stating that the “master domain of the pages is ‘docketsender[.]com’ that, while not malicious, doesn’t seem like a legitimate domain.”
Then moving on, at the very end, a
Microsoft Office 365 page is presented which asks the user of their credentials. Located at an attacker owned domain name, invoicesendernow[.]com, it would be discernible to any user paying attention but again, quite a lot of times, users seldom care to double-check.
Here are the screenshots of the phishing scam:

How Armorblox detected this campaign was through a series of monitoring techniques which include analyzing the tone of email messages, the frequency of the email addresses’ communication in the past with the receiver, and if only specific users instead of the entire company were being emailed which would ring some spearphishing alarms.
To conclude, as a user to remain safe from such attacks, no rocket science is needed. A few simple precautions would suffice:
Carefully check the sender’s email address once you receive an email as the name can be easily impersonated as it was done in this case.
If it seems necessary to open a link contained within the email, check the domain names of the redirected pages carefully.
If you’re unsure about the legitimacy of a certain email, don’t take risks. It is better to consult an IT professional in your organization or perhaps an outside one.

Be careful with job applications over the internet! Indian job seekers data is being downloaded by threat actors worldwide.

The trove of Indian job seekers data is being downloaded by threat actors worldwide.
India has a huge job market and the same goes for those seeking jobs. Now, hackers have taken advantage of the opportunity and leaked a treasure trove of data belong to millions of Indian job seekers.
The data was identified by Cyble, a cyber threat intelligence company, and noted personal details of around 29 million job-seeking Indians from different states dumped on the dark web and hacker forms for anyone to download.
Screenshot of the leaked data (Image: Cyble)

The original leak, according to Cyble, appears to be from a resume (CV) aggregator service that collects data from different job portals in India.
In its official press release , Cyble stated that a threat actor has posted approximately 2.3 GB of data in a zipped file on a hacking forum operating on the dark web, and this particular file belongs to the resume aggregator service.
According to the company, the data contains sensitive data of Indian job seekers including personal details like educational qualification, email IDs, phone numbers, work experience, and home address, etc. Here are some of the screenshots acquired from the leaked data:

Threat actors playing around Indian data is nothing new. In October 2019, more than 1.3 million credit and debit cards were dumped online. The data almost entirely (98%) belonged to Indian banking customers while the rest of the data belongs to banks in Columbia.
In February 2020, hackers were offering more than 461,976 payment card records stolen from some of the largest banks in India. Each card was being sold for just $9.

As for the current story, the incident is developing news and an in-depth investigation of the matter is ongoing. This article will be updated with new information. 

Misconfigured Elasticsearch server leds to exposure of Facebook user's personal data

The leak came after a misconfigured Elasticsearch server exposed Facebook users’ data involved in a previous breach.
For the last few years I have been complaining about guarantee of the security of personal data of Ugandans/Africans using Facebook and other social media platforms, Facebook has been embroiled in a range of controversies ranging from the social network’s hegemony over the internet to scandals like that of Cambridge Analytica in 2018. Not to forget just a few weeks ago a hacker was found selling personal data of 267 million Facebook users .
To tackle these, the company claims to take certain measures but despite that, slips here and there have continued to occur.
The latest in this episode was reported by Safety Detectives whose research team headed by Anurag Sen discovered that the data of 12 million Facebook users based in Vietnam has been leaked.
According to the researchers, the data was found on an Elasticsearch server and includes records found in a previous breach of Vietnamese users in January 2020.
However, not all of it is from Facebook and multiple sources are believed to be at play. Further, the details of how the perpetrators managed to scrape such a large amount are not known yet.
Amounting to over 3GB, most of the data includes personally identifiable information (PII) with the following records:
Full name

  1. Hometown location
  2. Current location
Education detail
Birthdates
  1. GPS coordinates
  2. Email addresses
  3. Facebook usernames and IDs
  4. Profile scores
  5. Facebook usernames and IDFamily relations with other Facebook users

Here is a preview of the leaked data shared by Safety Detectives:

In their blog post , Safety Detectives raised concerns on the data breach saying that,

"Facebook decided to lock down some of its API functions, including data scraping, in order to make this practice more difficult to conduct and blocked users from using its reverse search tool. […] Clearly, there are still data-scraping vulnerabilities that can be exploited, especially where there is a mismatch of security protocols being implemented by third-party websites and Facebook."

All of these can have significant repercussions such as the attackers
blackmailing the victims with personal details, conducting sophisticated phishing attacks aided by social engineering, spamming users with both marketing and malicious messages.
But, that’s not it, even physically endangering someone’s security through the GPS coordinates revealed if they represent enough interest to the attackers.
To conclude, for the time being, the server has been taken down. Currently, we believe that Facebook yet again needs to ramp up its pen-testing capabilities and do a review of the data it allows third parties to access even for legitimate purposes.
As users, we can limit the type of information we share with any website considering that everything is hackable. Moreover, we are yet to hear Facebook’s reaction to these latest revelations and will keep on updating you.

DRCGovernment reports South Sudan military incursions into Upper Uélé and Ituri

The Government of the Democratic Republic of the Congo took stock of the situation at the borders at the 32th meeting of the Council of Ministers chaired by the head of state Félix Antoine Tshisekedi tshilombo on 22 May 2020 by video conference ..
And in this respect, the national executive has reported South Sudan military incursions into the Ituri and Haut-Uélé provinces.
According to the record of the said council signed by the government spokesperson David-jolino Makelele, the services concerned were told to react "strongly" to these movements.
The Government of the Republic has also noted the continued evictions of Congolese from Angola via the city of Tshikapa in the province of Kasai.
With regard to militias at the border with Zambia (KALUBAMBA and KIBANGA), the Government has said that Congolese troops remain alert to deal with the threat in case negotiations under the aegis of the CFDC do not stop ..
The National Executive has also reported that the Southern African Development Community has finally accepted the setting up of an ad hoc committee on this.

When general maheshe of north Kivu surrendered to DRC gorvenment





Surrender of the leader of the  Armed group of Mr. MAHESHE with 120 of his militia men and 20 weapons thanks to the work of the  Provincial administration and the MONUSCO. No more rebel activities will he   operate on the Ngweshe-Walungu axis. The people of south kivu aspire to attaining peace and security. Calling on other rebellious groups to follow President Félix tshilombo's call.

116 new cases of covid-19 confirmed in the DRC (2141 total)


The of-19 pandemic that shakes the world continues to gain ground in the Democratic Republic of the Congo.
116 new cases have been confirmed, including 112 in Kinshasa and 4 in Haut-Katanga for the only day of 23 May 2020 according to the newsletter of the technical secretary of the multisectoral response committee.
Since the official statement of this pandemic in rd Congo on March 10th, 2141 cases have been confirmed, including 2140 confirmed and 1 likely.
In addition, the Technical Secretariat reports that 5 new people have been healed from the-19, bringing the total healings to 317

At least 5 dead in an alleged ADF rebel trap in Irumu


At least 5 civilians killed, a burned vehicle and property looted in a tense ambush on the evening of Friday, 22 May 2020 by alleged ADF rebels at Byane-Mufutabangi, a village located about 4 kilometers of Ndalya on National Route number 4, in the territory of Irumu, Ituri province.
According to John Mabelle president of the civil society of Ndalya who delivers the news to 7,. CD this Saturday, the attackers attacked the village around 17 p. m local time, in heavy rain and barricaded the road.
On the spot, they burned a car leaving Komanda (Ituri) for the city of Beni (North Kivu) before killing civilians.
A woman, alleged to have been captured by FARDC elements that intervened to limit the damage.
" We cannot leave the region to leave space for the enemy, we are determined to accompany the FARDC elements as long as peace returns here. We call on the government to strengthen the military force in the city ", said a civil society actor.
Just before this attack, rebels had just made an foray into the village of Eringeti in Kasana, North Kivu province, during the day in which A civilian was shot.