Category: Network Security Page 5 of 6

Network security is the practice of protecting a computer network from unauthorized access, misuse, and attack. It involves a combination of hardware, software, and procedures to safeguard against threats such as hacking, malware, and phishing. Network security includes protecting against unauthorized access, data breaches, and ensuring the integrity and availability of data and devices on a network.

Cybercriminals Exploit Chinese Surveillance Cameras for Profit

Cybercriminals Exploit Chinese Surveillance Cameras for Financial Gain

A multitude of surveillance cameras, numbering in the tens of thousands, have neglected to address a critical security vulnerability that has persisted for 11 months, consequently leaving numerous organizations susceptible to potential breaches.

Recent research findings reveal that a staggering 80,000 Hikvision surveillance cameras worldwide remain vulnerable to an 11-month-old flaw that enables command injection attacks.

Hikvision, an abbreviation for Hangzhou Hikvision Digital Technology, represents a Chinese government-owned enterprise specializing in the production of video surveillance equipment. Despite the Federal Communications Commission (FCC) denoting Hikvision as “an unacceptable risk to U.S. national security” in 2019, their clientele spans across more than 100 countries, including the United States.

In the autumn of the previous year, the discovery of a command injection vulnerability in Hikvision cameras prompted the assignment of the Common Vulnerabilities and Exposures (CVE) identifier CVE-2021-36260. This particular exploit received a critical severity rating of 9.8 out of 10 from the National Institute of Standards and Technology (NIST).

Alarming as it may be, even after nearly a year has elapsed since the exposure of this vulnerability, a substantial number of affected devices, exceeding 80,000 in quantity, remain unpatched. Disturbingly, researchers have unearthed multiple instances of hackers seeking to collaborate in exploiting the command injection flaw present in Hikvision cameras. These collaborative efforts have predominantly materialized within Russian dark web forums, where leaked credentials associated with the vulnerable devices have been offered for sale.

The full extent of the damage inflicted thus far remains uncertain. The authors of the report could merely speculate that various threat groups originating from China, such as MISSION2025/APT41, APT10, and their affiliates, alongside unidentified Russian threat actors, possess the potential to exploit the vulnerabilities present in these devices for their own objectives, which may include geopolitical considerations.

The Vulnerabilities Inherent in IoT Devices

When confronted with accounts such as this, it is tempting to attribute the negligence of individuals and organizations who fail to patch their software to mere laziness. However, the reality is often far more complex.

According to David Maynor, the senior director of threat intelligence at Cybrary, Hikvision cameras have remained vulnerable due to a multitude of factors, and this susceptibility has persisted for a considerable period. Maynor asserts that the products manufactured by Hikvision contain systemic vulnerabilities that are easily exploitable, or even worse, rely on default credentials. Furthermore, the absence of effective means to conduct forensic analysis or verify the complete removal of an attacker further compounds the security challenges. Significantly, no discernible indication of an enhanced security posture within Hikvision’s development cycle has been observed.

This problem transcends Hikvision alone, afflicting the entire industry. Paul Bischoff, a privacy advocate affiliated with Comparitech, emphasized the inherent difficulties in securing Internet of Things (IoT) devices such as cameras, noting that they do not possess the same ease of securing as applications on mobile phones. Unlike smartphones, which promptly notify users of available updates and often install them automatically upon reboot, IoT devices necessitate manual downloading and installation of updates, a task that many users overlook. Moreover, IoT devices frequently fail to provide any indications of being unsecured or outdated, further exacerbating the issue.

While unsuspecting users remain oblivious, cybercriminals can exploit vulnerable devices by scanning for them using search engines like Shodan or Censys. The problem is further compounded by users’ negligence, as Bischoff highlighted, due to the fact that Hikvision cameras are shipped with a limited set of predetermined passwords, and a significant number of users neglect to modify these default credentials.

what is arkime (moloch)?

Arkime, formerly known as Moloch, is a powerful tool for full packet capture and analysis. It offers a wide range of features that make it a must-have tool for network security professionals. Some of the main features of Arkime include:

  1. Packet capture: Arkime can capture all network traffic passing through a particular network interface, allowing security analysts to analyze the traffic and identify potential threats.
  2. Indexing and search: Arkime uses Elasticsearch to store and index captured packets, which makes it easy for analysts to search for specific packets or packets containing specific patterns or keywords.
  3. Web-based user interface: Arkime includes a powerful web-based user interface that allows analysts to search and analyze captured traffic, as well as visualize network traffic data in real-time. The user interface is highly customizable, and analysts can create custom dashboards and visualizations to meet their specific needs.
  4. Advanced analysis capabilities: Arkime can perform advanced network traffic analysis, including protocol decoding, session reassembly, and file carving. This makes it possible for analysts to detect and investigate a wide range of security threats, including malware, phishing attacks, and data exfiltration.
  5. Support for multiple file formats: Arkime can capture and analyze a wide range of network protocols, including TCP, UDP, HTTP, and SSL. It also supports a variety of file formats, including PCAP, JSON, and ASCII.
  6. Scalability: Arkime is designed to be highly scalable, and it can be deployed in large-scale environments. It can handle large amounts of network traffic data, making it suitable for use in high-bandwidth environments.

Overall, Arkime is a comprehensive tool that offers a wide range of features for full packet capture and analysis. Its advanced analysis capabilities, support for multiple file formats, and scalability make it a must-have tool for any organization that needs to monitor and secure its network.

What is Kali Linux Purple?

Kali Linux 2023.1 is a popular Linux distribution that is used by security professionals and hackers alike to test the security of computer systems and networks. It comes with advanced penetration testing tools and techniques that can help users identify vulnerabilities in their systems.

The new Kali Linux 2023.1 release features a new flavor of the distribution called Kali Linux Purple. This new flavor is focused on purple teaming and defense, rather than just red teaming or offensive security. The Kali Linux Purple distribution aims to provide a security operations center (SOC) all in one great machine.

Kali Linux Purple comes with over a hundred new defensive tools, including Archive for Full Packet Capture, Cyber Chef, Elastic, The Hive, GVM, Malcolm, Suricata, and Zeek. It also includes Cali Autopilot, a tool for automating attacks, and Cali Purple Hub, a platform for the community to share practice packet captures.

To download Kali Linux Purple, you need to create a virtual machine manually from the ISO file which is available for download from the Kali Linux website. The ISO file is about 3.5 GB in size.

The new Kali Linux 2023.1 release features an updated kernel version 6.1.0 and updated desktop environments for XFCE, KDE, and GNOME. It also includes new features and improvements such as new sub-menus for identify, protect, detect, respond and recover.

Kali Linux is an open-source operating system that has been designed to provide users with advanced penetration testing tools and techniques. It is widely used by security professionals and hackers alike to test the security of computer systems and networks.

The new Kali Linux Purple distribution has been specifically designed to help security professionals improve their defensive capabilities by providing them with a range of powerful tools and techniques that can be used to detect and respond to cyber threats.

If you are interested in learning more about Kali Linux or would like to download the latest version of the operating system, you can visit the official Kali Linux website at https://www.kali.org/

MyloBot: The Sophisticated Botnet Affecting Thousands of Systems Worldwide

BitSight, a cybersecurity company, has revealed that a sophisticated botnet called MyloBot has affected thousands of systems across the globe.

Most of the compromised systems are located in India, the United States, Indonesia, and Iran.

MyloBot

BitSight has also found that MyloBot’s infrastructure is linked to a residential proxy service named BHProxies, implying that the compromised machines are being used by the latter.

The botnet was initially observed in 2017 and was first documented in 2018. It is known for its anti-analysis methods and its ability to act as a downloader.

MyloBot has the potential to download any other type of malware that the attacker wants. It also waits for 14 days before attempting to contact the command-and-control (C2) server to avoid detection.

MyloBot receives instructions from C2 and transforms the infected computer into a proxy. The malware has been observed sending extortion emails from hacked endpoints as part of a financially motivated campaign.

MyloBot continues to evolve over time, and BitSight has been sinkholing the botnet since November 2018.

CompTIA Security+ certificate on display, demonstrating mastery of IT security principles and practices.

CompTIA Security+ Certification Preparation

Are you looking to take your IT security career to the next level? Then consider obtaining the CompTIA Security+ certification. This globally recognized certification verifies your foundational knowledge in security and helps validate your ability to secure a network and maintain the confidentiality and integrity of data. In this article, we will provide you with a comprehensive guide on how to prepare for the CompTIA Security+ certification exam.

What is CompTIA Security+?

CompTIA Security+ is a vendor-neutral certification that covers the essential principles for network security and risk management. It covers a wide range of topics, from network security to compliance and operations security. The certification is aimed at IT professionals who are looking to pursue a career in network and information security.

Who Should Consider CompTIA Security+ Certification?

CompTIA Security+ certification is ideal for IT professionals who have a minimum of two years of experience in IT administration with a focus on security. It is also suitable for individuals who are looking to enter the field of IT security, including system administrators, network administrators, security administrators, and security consultants.

What is the CompTIA Security+ Exam Format?

The CompTIA Security+ exam is a 90-minute test consisting of 90 multiple-choice and performance-based questions. The exam is designed to test your knowledge and skills in the following areas:

  • Threats, Attacks, and Vulnerabilities
  • Technologies and Tools
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and Public Key Infrastructure (PKI)

How to Prepare for the CompTIA Security+ Exam

Preparation for the CompTIA Security+ exam requires a combination of hands-on experience, self-study, and training courses. Here are some tips to help you prepare for the exam:

Study CompTIA Security+ Exam Objectives

The first step in preparing for the CompTIA Security+ exam is to study the exam objectives. The exam objectives are published by CompTIA and outline the topics and concepts that will be covered on the exam. By studying the exam objectives, you will have a clear understanding of the areas you need to focus on during your preparation.

Get Hands-On Experience

The CompTIA Security+ exam is designed to test your practical knowledge of security concepts and technologies. To prepare for the exam, you should gain hands-on experience with the technologies and tools that are covered on the exam. This can be done by setting up a virtual lab environment, participating in security-related projects, or seeking out internships or job opportunities in the field.

Use CompTIA Approved Study Materials

CompTIA has approved several study materials, including books, videos, and practice exams, to help you prepare for the CompTIA Security+ exam. These materials are designed to provide you with a comprehensive understanding of the exam objectives and help you identify areas where you need additional study.

Take a CompTIA Approved Training Course

CompTIA has approved several training courses that are designed to help you prepare for the CompTIA Security+ exam. These courses are taught by certified trainers who have real-world experience in the field. By taking a CompTIA-approved training course, you will receive hands-on experience with security concepts and technologies, as well as access to practice exams and study materials.

Conclusion

The CompTIA Security+ certification is a valuable addition to your IT security career. By preparing for the exam using the tips outlined in this article,

well on your way to obtaining this globally recognized certification. Remember, the key to success is to study the exam objectives, gain hands-on experience, use CompTIA approved study materials, and take a CompTIA approved training course. With dedication and hard work, you can successfully pass the CompTIA Security+ exam and take your IT security career to the next level.

Don’t forget to continue to expand your knowledge and skills in the field of IT security even after you receive your certification. Staying current with the latest security threats, technologies, and best practices is crucial in this rapidly evolving industry.

In conclusion, obtaining the CompTIA Security+ certification is a great investment in your IT security career. With the right preparation and dedication, you can successfully pass the exam and achieve the recognition you deserve for your expertise and knowledge in the field.

Page 5 of 6

Powered by WordPress & Theme by Anders Norén