iGaming Business magazine iGB 112 Sept/Oct 2018 | Page 19

Tech & Innovation released security updates for a long list of processors going back to 2015. The new attack dubbed Foreshadow by researchers is similar in make up to Meltdown and Spectre. Intel has named them L1 Terminal Fault (L1TF) bugs. Fixes for the bugs should be sought through hardware and software suppliers and should be applied as soon as possible. The fixes involve disabling some of the chip’s features, in much the same way as speculative operations were disabled to mitigate prior chip flaws. There should be little discernible impact on performance for any tasks outside of extreme data centre type loads but bear in mind that the features were introduced to increase performance in the first place. Note that all OS instances on cloud and virtual machines need to have the patches applied to fully protect the underlying hardware. Intel is expected to release a new range of silicon that does not suffer from the flaws discovered over the last few months a little later in 2018. Cisco has released three patches preventing denial of service attacks in some of its product range. Two of the patches cover a reload condition that can be executed in Cisco AsyncOS Software for Cisco Web Security Appliances and Cisco Adaptive Security Appliances. The third issue affects XCP Router service of the Cisco Unified Communications Manager IM and Presence Service and the Cisco TelePresence Video Communication Server and Expressway. If exploited a malicious actor could cause a temporary service outage. Malware AZORult Stealer has received an update and is once again proving to be a problem. The malware is regularly altered, which is one of the reasons why it is so persistent. The latest variant seems to be targeting a North American audience at present and typically delivers a password protected Word document. Once the doc is opened using the password contained in the email and the macros are enabled, the AZORult payload is downloaded. The malware collects information and can also be used in ransomware attacks. Emails typically come out within a day of the malware being updated. Naturally any unsolicited email (or emails with attachments in general) should be treated with caution. These latest AZORult mails seem to be on an employment-related theme, containing resumes and job candidate type attachments. Marap is a new downloader malware being delivered through the Necurs botnet. Recently discovered from researchers at Proofpoint, the malware currently contains fingerprinting modules, which look for information such as username, domain name, IP address and so on – common fingerprinting information that could be used in future attacks. The researchers warn us that Marap is capable of delivering additional payloads in the future. In the news Def Con 2018 has thrown up some interesting developments, from the smartphones that ship with malware out of the box through to an attack on Amazon Echo and the first concept piece of malware powered by artificial intelligence. DeepLocker is a truly worrying piece of research brought to us by the people at IBM Research. The researchers have designed malware powered by artificial intelligence, creating what they call a “highly targeted and evasive” piece of malicious code. DeepLocker can leverage several attributes to identify its target, including visual, audio, geolocation and system-level features. In an example given by the researchers these triggers could be set to only deliver the malicious payload to a specific individual that the malware recognises through facial recognition. For example, it could bury itself in video conferencing code and compare the feed to publicly available images of the targeted individual before unleashing the malware. DeepLocker is extremely difficult for analysts to detect as it does not reveal what kind of target it is looking for: a person or organisation, or indeed who the target is if it is a person. Finally, as the attack remains fully encrypted until the target is found it is impossible for analysts to figure out how the attack will be executed. Phones shipping with malware out of the box are always a aconcern. Security researchers from US Mobile and IoT security firm Kryptowire have highlighted some 25 Android phones that they discovered had shipped with malware in their default applications. The researchers presented a list of these devices at DefCon. They were predominately lesser-known models, though devices from LG, Nokia and Sony were on the list. Amazon Echo was shown to be compromised by security researchers Wu Hui Yu and Qian Wenxiang. The pair demonstrated how the Echo could be used to eavesdrop on conversations without users knowing the device was recording. Echo owners shouldn’t panic just yet, however, as the researchers have already passed their findings to Amazon. Furthermore, the attack also requires the attacker to have compromised the WiFi network that the Echo is on. As always please stay vigilant, apply patches and updates vigorously and, above all, stay safe. i GamingBusiness | Issue 112 | September/October 2018 17