Aggregator
Fake Apps & Banking Trojans Are Cybercriminal Favorites
Today, we are all pretty reliant on our mobile technology. From texting, to voice messaging, to mobile banking, we have...
The post Fake Apps & Banking Trojans Are Cybercriminal Favorites appeared first on McAfee Blog.
Threat Actors Rapidly Adopt New ThinkPHP RCE Exploit to Spread IoT Malware and Deploy Remote Shells
Threat Actors Rapidly Adopt New ThinkPHP RCE Exploit to Spread IoT Malware and Deploy Remote Shells
December 2018 New Zealand Information Security Manual
Inquiry into the use of external security consultants
The Year That Was – Cybersecurity Takeaways From 2018
So, what was 2018 like for you? Just another year, a whirlwind of happiness and heartbreaks, or a momentous one...
The post The Year That Was – Cybersecurity Takeaways From 2018 appeared first on McAfee Blog.
DanaBot November Campaigns Target European Banks and Email Providers
DanaBot November Campaigns Target European Banks and Email Providers
Pass the Cookie and Pivot to the Clouds
An adversary can pivot from a compromised host to Web Applications and Internet Services by stealing authentication cookies from browsers and related processes. At the same time this technique bypasses most multi-factor authentication protocols.
The reason for this is that the final authentication token that the attacker steals is issued after all factors have been validated. Many users persist cookies that are valid for an extended period of time, even if the web application is not actively used. Cookies can be found on disk and also in process memory. Additionally other applications on the targets machine might store sensitive authentication tokens in memory (e.g. apps which authenticate to cloud services). This pivoting technique can be extended to bearer tokens, JWT and the likes. Pass the Cookie is a post-exploitation technique to perform session hijacking.