Security Alerts & News
by Tymoteusz A. Góral

History
#651 4U Storage Pods offer 240TB of storage for 3.6¢/GB
For the last few years, we've looked at the hard disk reliability numbers from cloud backup and storage company Backblaze, but we've not looked at the systems it builds to hold its tens of thousands of hard disks. In common with some other cloud companies, Backblaze publishes the specs and designs of its Storage Pods, 4U systems packed with hard disks, and today it announced its sixth generation design, which bumps up the number of disks (from 45 to 60) while driving costs down even further.
#650 Active drive-by exploits critical Android bugs, care of Hacking Team
An ongoing drive-by attack is forcing ransomware onto Android smartphones by exploiting critical vulnerabilities in older versions of Google's mobile operating system still in use by millions of people, according to research scheduled to be published Monday.

The attack combines exploits for at least two critical vulnerabilities contained in Android versions 4.0 through 4.3, including an exploit known as Towelroot, which gives attackers unfettered "root" access to vulnerable phones. The exploit code appears to borrow heavily from, if not copy outright, some of these Android attack scripts, which leaked to the world following the embarrassing breach of Italy-based Hacking Team in July. Additional data indicates devices running Android 4.4 may also be infected, possibly by exploiting a different set of vulnerabilities.
#649 Threat spotlight: Exploit Kit goes international hits 150+ countries
Talos is constantly monitoring the threat landscape and exploit kits are a constantly evolving component of it. An ongoing goal of Talos is to expose and disrupt these kits to protect the average internet user being targeted and compromised. We were able to gain unprecedented insight into Angler exploit kit and reveal details of the activity that were previously unknown. Now we have focused our attention on the Nuclear exploit kit with similar results.

Nuclear exploit kit has been steadily compromising users for years and has been effective in evolving as well as adding new exploits to their arsenal. However, it has been operating largely off the radar compared to some of the more prolific kits that are active today. This lack of deep visibility was one of the driving forces behind the deep investigation into its activity. What we found was a sophisticated threat that has been successfully targeting and compromising users in more than 10,000 different cities in more than 150 countries.

We continued digging through our data and wound up with a list of 10-15 IP's that were hosting the Nuclear EK. This allowed us to focus on the providers hosting the activity. At this point the first key piece was identified: DigitalOcean. We were able to determine that practically all the Nuclear activity we were tracking was being hosted by DigitalOcean. Talos established contact with DigitalOcean and notified them of the activity and the details associated with the threat. DigitalOcean's security team validated the malicious nature of the hosts and collaborated with Talos to provide valuable intel, during the take down, to help expose how the kit operates.
#648 Opera is doubling the server capacity after the built-in VPN launch
The U.S. was the country with the biggest number of users followed by Russia, the U.K., Germany, France and Poland. This clearly shows that online privacy is gaining importance in all over the world.
History
2017: 01 02 03 04 05
2016: 01 02 03 04 05 06 07 08 09 10 11 12