CEO Fraud

CEO Fraud / BEC is a type of targeted attack. It commonly involves a cyber criminally pretending to be your boss, then tricking or fooling you into sending the criminal highly sensitive information or initiating a wire transfer. Be highly suspicious of any emails demanding immediate action and/or asking you to bypass any security procedures.

from SANS Institute Security Awareness Tip of the Day https://ift.tt/2M1Crmw
via IFTTT

Would You Have Fallen for This Phone Scam?

You may have heard that today’s phone fraudsters like to use use caller ID spoofing services to make their scam calls seem more believable. But you probably didn’t know that these fraudsters also can use caller ID spoofing to trick your bank into giving up information about recent transactions on your account — data that can then be abused to make their phone scams more believable and expose you to additional forms of identity theft.

Last week, KrebsOnSecurity told the harrowing tale of a reader (a security expert, no less) who tried to turn the tables on his telephonic tormentors and failed spectacularly. In that episode, the people impersonating his bank not only spoofed the bank’s real phone number, but they were also pretending to be him in a separate call at the same time with his bank.

This foiled his efforts to make sure it was really his bank that called him, because he called his bank with another phone and the bank confirmed they currently were in a separate call with him discussing fraud on his account (however, the other call was the fraudster pretending to be him).

Shortly after that story ran, I heard from another reader — we’ll call him “Jim” since he didn’t want his real name used for this story — whose wife was the target of a similar scam, albeit with an important twist: The scammers were armed with information about a number of her recent financial transactions, which he claims they got from the bank’s own automated phone system just by spoofing her phone number.

“When they originally called my wife, there were no fraudulent transactions on her account, but they were able to specify the last three transactions she had made, which combined with the caller-ID had mistakenly earned her trust,” Jim explained. “After we figured out what was going on, we were left asking ourselves how the crooks had obtained her last three transactions without breaking into her account online. As it turned out, calling the phone number on the back of the credit card from the phone number linked with the card provided the most recent transactions without providing any form of authentication.”

Jim said he was so aghast at this realization that he called the same number from his phone and tried accessing his account, which is also at Citi but wholly separate from his spouse’s. Sure enough, he said, as long as he was calling from the number on file for his account, the automated system let him review recent transactions without any further authentication.

“I confirmed on my separate Citi card that they often (but not quite always) were providing the transaction details,” Jim said. “I was appalled that Citi would do that. So, it seemed the crooks would spoof caller ID when calling Citibank, as well as when calling the target/victim.

The incident Jim described happened in late January 2020, and Citi may have changed its procedures since then. The company has not yet responded to requests for comment.

But in a phone interview with KrebsOnSecurity earlier this week, Jim made a call to Citi’s automated system from his mobile phone on file with the bank, and I could hear Citi’s systems asking him to enter the last four digits of his credit card number before he could review recent transactions.

The request for the last four of the customer’s credit card number was consistent with my own testing, which relied upon on a caller ID spoofing service advertised in the cybercrime underground and aimed at a Citi account controlled by this author.

In one test, the spoofed call let KrebsOnSecurity hear recent transaction data — where and when the transaction was made, and how much was spent — after providing the automated system the last four digits of the account’s credit card number. In another test, the automated system asked for the account holder’s full Social Security number.

PREGNANT PAUSES AND BULGING EMAIL BOMBS

Jim said the fraudster who called his wife clearly already knew her mailing and email addresses, her mobile number and the fact that her card was an American Airlines-branded Citi card. The caller said there had been a series of suspicious transactions, and proceeded to read back details of several recent transactions to verify if those were purchases she’d authorized.

A list of services offered by one of several underground stores that sell caller ID spoofing and email bombing services.

Jim’s wife quickly logged on to her Citi account and saw that the amounts, dates and places of the transactions referenced by the caller indeed corresponded to recent legitimate transactions. But she didn’t see any signs of unauthorized charges.

After verifying the recent legitimate transactions with the caller, the person on the phone asked for her security word. When she provided it, there was a long hold before the caller came back and said she’d provided the wrong answer.

When she corrected herself and provided a different security word, there was another long pause before the caller said the second answer she provided was correct. At that point, the caller said Citi would be sending her a new card and that it had prevented several phony charges from even posting to her account.

She didn’t understand until later that the pauses were points at which the fraudsters had to put her on hold to relay her answers in their own call posing as her to Citi’s customer service department.

Not long after Jim’s spouse hung up with the caller, her inbox quickly began filling up with hundreds of automated messages from various websites trying to confirm an email newsletter subscription she’d supposedly requested.

As the recipient of several of theseemail bombing” attacks, I can verify that crooks often will use services offered in the cybercrime underground to flood a target’s inbox with these junk newsletter subscriptions shortly after committing fraud in the target’s name when they wish to bury an email notification from a target’s bank.

‘OVERPAYMENT REIMBURSEMENT’

In the case of Jim’s wife, the inbox flood backfired, and only made her more suspicious about the true nature of the recent phone call. So she called the number on the back of her Citi card and was told that she had indeed just called Citi and requested what’s known as an “overpayment reimbursement.” The couple have long had their credit cards on auto-payment, and the most recent payment was especially high — nearly $4,000 — thanks to a flurry of Christmas present purchases for friends and family.

In an overpayment reimbursement, a customer can request that the bank refund any amount paid toward a previous bill that exceeds the minimum required monthly payment. Doing so causes any back-due interest on that unpaid amount to accrue to the account as well.

In this case, the caller posing as Jim’s wife requested an overpayment reimbursement to the tune of just under $4,000. It’s not clear how or where the fraudsters intended this payment to be sent, but for whatever reason Citi ended up saying they would cut a physical check and mail it to the address on file. Probably not what the fraudsters wanted, although since then Jim and his wife say they have been on alert for anyone suspicious lurking near their mailbox.

“The person we spoke with at Citi’s fraud department kept insisting that yes, it was my wife that called because the call came from her mobile number,” Jim said. “The Citi employee was alarmed because she didn’t understand the whole notion of caller ID spoofing. And we both found it kind of disturbing that someone in fraud at such a major bank didn’t even understand that such a thing was possible.”

SHOPPING FOR ‘CVVs’

Fraud experts say the scammers behind the types of calls that targeted Jim’s family are most likely fueled by the rampant sale of credit card records stolen from hacked online merchants. This data, known as “CVVs” in the cybercrime underground, is sold in packages for about $15 per record, and very often includes the customer’s name, address, phone number, email address and full credit or debit card number, expiration date, and card verification value (CVV) printed on the back of the card.

A screen shot from an underground store selling CVV records. Note that all of these records come with the cardholder’s address, email, phone number and zip code. Click to enlarge. Image: Gemini Advisory.

Dozens of cybercrime shops traffic in this stolen data, which is more traditionally used to defraud online merchants. But such records are ideally suited for criminals engaged in the type of phone scams that are the subject of this article.

That’s according to Andrei Barysevich, CEO and co-founder of Gemini Advisory, a New York-based company that monitors dozens of underground shops selling stolen card data.

“If the fraudsters already have the target’s cell phone number, in many cases they already have the target’s credit card information as well,” Barysevich said.

Gemini estimates there are currently some 13 million CVV records for sale across the dark web, and that more than 40 percent of these records put up for sale over the past year included the cardholder’s phone number.

Data from recent financial transactions can not only help fraudsters better impersonate your bank, it can also be useful in linking a customer’s account to another account the fraudsters control. That’s because PayPal and a number of other pure-play online financial institutions allow customers to link accounts by verifying the value of microdeposits.

For example, if you wish to be able to transfer funds between PayPal and a bank account, the company will first send a couple of tiny deposits — a few cents, usually — to the account you wish to link. Only after verifying those exact amounts will the account-linking request be granted.

JUST HANG UP

Both this and last week’s story illustrate why the only sane response to a call purporting to be from your bank is to hang up, look up your bank’s customer service number from their Web site or from the back of your card, and call them back yourself.

Meanwhile, fraudsters who hack peoples’ finances with nothing more than a telephone have been significantly upping the volume of attacks in recent months, new research suggests. Fraud prevention company Next Caller said this week it has tracked “massive increases in call volumes and high-risk calls across Fortune 500 companies as a result of COVID-19.”

Image: Next Caller.

“After a brief reprieve in Week 4 (April 6-12), Week 5 (April 13-19) saw call volume across Next Caller’s clients in the telecom and financial services sectors spike 40% above previous highs,” the company found. “Particularly worrisome is the activity taking place in the financial services sector, where call traffic topped previous highs by 800%.”

Next Caller said it’s likely some of that increase was due to numerous online and mobile app outages for many major financial institutions at a time when more than 80 million Americans were simultaneously trying to track the status of their stimulus deposits. But it said that surge also brought with it an influx of fraudsters looking to capitalize on all the chaos.

“High-risk calls to financial services surged to 50% above pre-COVID levels, with one Fortune 100 bank suffering a high-risk increase of 60% during Week 5,” the company wrote in a recent report.

from Krebs on Security https://ift.tt/35evJ7L
via IFTTT

CentOS 7.8 llega con nuevas herramientas, Wayland de forma predeterminada y más

Se dio a conocer la liberación de una nueva versión de la rama 7.x de CentOS, siendo la nueva versión “CentOS 7.8” en la cual se presentan algunas nuevas herramientas, la sesión con Wayland de forma predeterminada, actualizaciones y más.

Para quienes desconocen de CentOS (Community ENTerprise Operating System) deben saber que es una distribución de Linux de código abierto y gratuito diseñado para computadoras de escritorio y servidores. Este sistema siempre se basa en las últimas versiones de Red Hat Enterprise Linux, pues es una bifurcación a nivel binario de la distribución Linux Red Hat Enterprise Linux “RHEL”, compilado por voluntarios a partir del código fuente publicado por Red Hat, siendo la principal diferencia con este la eliminación de todas las referencias a las marcas y logos propiedad de Red Hat.

Es un sistema operativo tiene el objetivo es ofrecer al usuario un software de “clase empresarial” gratuito. Ademas de que se define como robusto, estable y fácil de instalar y utilizar.

Principales novedades de CentOS 7.8

Esta nueva versión de CentOS 7.8 llega con base en la rama de RHEL 7.8 y con la cual muchas de las características de esta rama se integran en esta nueva versión del sistema.

Por la parte de los cambios implementados podremos encontrar una nueva herramienta llamada “Convert2RHEL” la cual se ha agregado al sistema con la finalidad de ofrecer una opción para convertir a sistemas RHEL utilizando distribuciones similares a RHEL como CentOS y Oracle Linux.

La sesión de GNOME de Wayland está habilitada de forma predeterminada para sistemas con múltiples GPU (anteriormente X11 se usaba en sistemas con gráficos híbridos) y se ha agregado un perfil de seguridad que cumple con las recomendaciones de DISA STIG (Agencia de Sistemas de Información de Defensa).

Otro cambio importante es la adición de la una nueva utilidad “oscap-podman” la cual está destinada para escanear el contenido de los contenedores para el uso de versiones vulnerables de programas.

En cuanto a las actualizaciones de los controladores, se destacan los de los gráficos actualizados que admiten Intel Comet Lake H y U (HD Graphics 610, 620, 630), Intel Ice Lake U (HD Graphics 910, Iris Plus Graphics 930, 940, 950), AMD Navi 10, Nvidia Turing TU116.

De los demás cambios que se mencionan en el lanzamiento de Centos 7.8:

  • Se agregó el parámetro mem_encrypt para controlar la inclusión de extensiones AMD SME (Secure Memory Encryption).
  • Se agregó el parámetro cpuidle.governor para seleccionar el procesador de estado inactivo del procesador (gobernador cpuidle).
  • Se agregó la opción /proc/sys/kernel/panic_print para configurar la información que se muestra en caso de un bloqueo del sistema (estado de pánico).
  • Se agregó el parámetro /proc/sys/kernel/threads-max para determinar la cantidad máxima de hilos que fork () puede crear. Se agregó la opción /proc/sys/net/bpf_jit_enable para controlar la inclusión del compilador JIT para BPF.
  • Los paquetes de Red Hat Enterprise Linux 8 rpm se distribuyen a través del repositorio CentOS Git (La rama RHEL 8.x será compatible hasta al menos 2029).

Finalmente si quieres conocer más al respecto sobre los cambios implementados en esta nueva versión, puedes consultar los detalles en el siguiente enlace.

Descargar y obtener CentOS 7.8 (2003)

Si te ha interesado la nueva versión de la distribución y quieres probarla en tu ordenador o bajo una máquina virtual. Puedes dirigirte a la página web oficial del proyecto en la cual podrás obtener el enlace de descarga de la imagen del sistema.

Las versiones de CentOS 7.8 (2003) están preparadas en imágenes ISO de DVD de 4.7 GB y arranque en red de 595 MB para las arquitecturas x86_64, Aarch64 (ARM64) y ppc64le. Aun que también se ofrece una imagen mínima de 1 GB.

La imagen del sistema puede ser grabada con Etcher (una herramienta multipltaforma) en una memoria USB.

Los paquetes SRPMS, en base a los cuales se ensamblaron los archivos binarios y debuginfo están disponibles en vault.centos.org.

Ahora es indispensable saber los requisitos del sistema para poder ejecutar el sistema sin problemas o atascos en el rendimiento:

  • 2 GB de RAM
  • Procesador de 2 GHz o superior
  • 20 GB de disco duro
  • Sistema x86 de 64 bits

from Linux Adictos https://ift.tt/2SdBInZ
via IFTTT

Red Hat Enterprise Linux 8.2 llega con herramientas mejoradas y más

Los desarrolladores de Red Hat han dado a conocer el lanzamiento de la nueva versión de su distribución “Red Hat Enterprise Linux 8.2” la cual inicialmente se publicó la semana pasada, pero el anuncio fue prematuro y los repositorios para instalar actualizaciones aún no estaban listos con lo cual el lanzamiento termino por darse el día de hoy.

La rama 8.x se está desarrollando de acuerdo con un nuevo ciclo de desarrollo predecible, lo que implica la formación de lanzamientos cada seis meses en un momento predeterminado. El nuevo ciclo de desarrollo de productos RHEL abarca varios niveles, incluido Fedora, CentOS Stream (para acceder a los paquetes formados para la próxima versión intermedia de RHEL), una imagen base universal minimalista (UBI, Imagen base universal) para ejecutar aplicaciones en contenedores aislados y RHEL Developer Subscription para el uso gratuito de RHEL en el proceso de desarrollo.

Principales novedades de Red Hat Enterprise Linux 8.2

En la nueva version se proporcionó soporte completo para la gestión de recursos utilizando la jerarquía unificada cgroups v2, que anteriormente estaba en la etapa de capacidades experimentales. Cgroups v2 se puede usar, por ejemplo, para limitar el consumo de memoria, recursos de CPU y I/O.

Se agregó la capacidad de personalizar las políticas de todo el sistema de subsistemas criptográficos, que cubren los protocolos TLS, IPSec, SSH, DNSSec y Kerberos. El administrador ahora puede definir su propia política o cambiar ciertos parámetros de los existentes. Se agregaron dos paquetes nuevos, setools-gui y setools-console-analysis, para analizar las políticas de SELinux e inspeccionar los flujos de datos.

Se ha agregado una nueva utilidad llamada Healthcheck a las herramientas de administración de identificación para identificar problemas en entornos IdM (Identity Management) y que ademas proporciona soporte para roles y módulos Ansible para simplificar la instalación y administración de IdM.

Se ha cambiado el diseño de la consola web, que se ha cambiado para usar la interfaz PatternFly 4, similar al diseño de la interfaz OpenShift 4, se añadió un tiempo de espera de inactividad del usuario, después de lo cual se termina la sesión con la consola web y también se añadió soporte para autenticación usando un certificado de cliente.

La interfaz para cambiar los escritorios virtuales en el entorno GNOME Classic se ha cambiado, el botón para cambiar se ha movido a la esquina inferior derecha y está diseñado como una tira con miniaturas.

El subsistema de gráficos DRM (Direct Rendering Manager) está sincronizado con el kernel de Linux versión 5.1.

Se agregó soporte para nuevos parámetros del kernel de Linux relacionados con el control de la inclusión de protección contra nuevos ataques en el mecanismo de ejecución especulativo de la CPU: mds, tsx, mitigaciones.

Se modificó el algoritmo para iniciar dnf-automatic.timer para llamar al proceso de instalación de actualización automática. En lugar de usar un temporizador monótono, que conduce a la activación en un momento impredecible después de la carga, la unidad especificada ahora comienza entre las 6 y las 7 de la mañana. Si en este momento el sistema está apagado, pero el arranque se lleva a cabo dentro de una hora después de encenderlo.

Se agregaron módulos con nuevas ramas de Python 3.8 (era 3.6) y Maven 3.6 al repositorio de AppStream. Paquetes actualizados con GCC 9.2.1, Clang / LLVM 9.0.1, Rust 1.41 y Go 1.13.

Versiones actualizadas de paquetes: powertop 2.11, opencv 3.4.6, rsyslog 8.1911.0, auditoría 3.0-0.14, fapolicyd 0.9.1-2, sudo 1.8.29- 3.el8, firewalld 0.8, tpm2-tools 3.2.1, mod_md (con soporte ACMEv2), grafana 6.3.6, pcp 5.0.2, elfutils 0.178, SystemTap 4.2, 389-ds-base 1.4.2.4, samba 4.11.2.

El servidor DNS BIND se actualizó a la versión 9.11.13 y se convirtió para usar la base para vincular direcciones a la ubicación GeoIP2 en el formato libmaxminddb en lugar del GeoIP obsoleto, que ahora ya no es compatible. Se agregó la configuración serve-stale (stale-answer), que le permite devolver registros DNS obsoletos si no es posible obtener nuevos.

Los usuarios restringidos por SELinux tienen la capacidad de administrar servicios asociados con una sesión de usuario.

En las reglas para firewalld, ahora puede usar controladores para monitorear conexiones para servicios que se ejecutan en puertos de red no estándar.

LVM agrega soporte para el método de almacenamiento en caché dm-writecache además del dm-cache previamente disponible. Dm-cache almacena en caché las operaciones de escritura y lectura más utilizadas, y dm-writecache almacena en caché solo operaciones de escritura, colocándolas primero en medios SSD o PMEM rápidos y luego transfiriéndolas a un disco lento en segundo plano.

from Linux Adictos https://ift.tt/3aM9YNU
via IFTTT