Security Alerts & News
by Tymoteusz A. Góral

#1431 Modified USB ethernet adapter can steal Windows and Mac credentials
Security researcher Rob Fuller has discovered a unique attack method that can steal PC credentials from Windows and Mac computers, and possibly Linux (currently untested).

Fuller's attack is effective against locked computers on which the user has already logged in.

The researcher used USB-based Ethernet adapters, for which he modified the firmware code to run special software that sets the plug-and-play USB device as the network gateway, DNS, and WPAD servers on the computer it's connected to.

The attack is possible because most computers will automatically install any plug-and-play (PnP) USB device.

"Why does this work? Because USB is Plug-and-Play. This means that even if a system is locked out, the device still gets installed," Fuller explained.

"Now, I believe there are restrictions on what types of devices are allowed to install at a locked out state on newer operating systems (Win10/El Capitan), but Ethernet/LAN is definitely on the white list."
Read more
#1436 Two-thirds of companies pay ransomware demands: But not everyone gets their data back
#1435 Google shuts down potentially massive Android bug
#1434 The missing piece – sophisticated OSX backdoor discovered
#1433 This nasty Android malware tries to bully its way past Marshmallow security features
#1432 Million more devices sharing known private keys for HTTPS, SSH admin
#1431 Modified USB ethernet adapter can steal Windows and Mac credentials
#1430 Critical flaws found in network management systems
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12