What’s so bad about a web page going fullscreen without warning you first?
from Naked Security https://ift.tt/EZSx05n
via IFTTT
What’s so bad about a web page going fullscreen without warning you first?
from Naked Security https://ift.tt/EZSx05n
via IFTTT
A financial cybercrime group calling itself the Disneyland Team has been making liberal use of visually confusing phishing domains that spoof popular bank brands using Punycode, an Internet standard that allows web browsers to render domain names with non-Latin alphabets like Cyrillic and Ukrainian.
The Disneyland Team’s Web interface, which allows them to interact with malware victims in real time to phish their login credentials using phony bank websites.
The Disneyland Team uses common misspellings for top bank brands in its domains. For example, one domain the gang has used since March 2022 is ushank[.]com — which was created to phish U.S. Bank customers.
But this group also usually makes use of Punycode to make their phony bank domains look more legit. The U.S. financial services firm Ameriprise uses the domain ameriprise.com; the Disneyland Team’s domain for Ameriprise customers is https://www.xn--meripris-mx0doj%5B.%5Dcom [brackets added to defang the domain], which displays in the browser URL bar as ạmeriprisẹ.com.
Look carefully, and you’ll notice small dots beneath the “a” and the second “e”. You could be forgiven if you mistook one or both of those dots for a spec of dust on your computer screen or mobile device.
This candid view inside the Disneyland Team comes from Alex Holden, founder of the Milwaukee-based cybersecurity consulting firm Hold Security. Holden’s analysts gained access to a Web-based control panel the crime group has been using to keep track of victim credentials (see screenshot above). The panel reveals the gang has been operating dozens of Punycode-based phishing domains for the better part of 2022.
Have a look at the Punycode in this Disneyland Team phishing domain: https://login2.xn--mirtesnbd-276drj%5B.%5Dcom, which shows up in the browser URL bar as login2.ẹmirạtesnbd[.]com, a domain targeting users of Emirates NBD Bank in Dubai.
Here’s another domain registered this year by the Disneyland Team: https://xn--clientchwb-zxd5678f%5B.%5Dcom, which spoofs the login page of financial advisor Charles Schwab with the landing page of cliẹntșchwab[.]com. Again, notice the dots under the letters “e” and “s”. Another Punycode domain of theirs sends would-be victims to cliẹrtschwạb[.]com, which combines a brand misspelling with Punycode.
We see the same dynamic with the Disneyland Team Punycode domain https://singlepoint.xn--bamk-pxb5435b%5B.%5Dcom, which translates to singlepoint.ụșbamk[.]com — again phishing U.S. Bank customers.
What’s going on here? Holden says the Disneyland Team is Russian-speaking — if not also based in Russia — but it is not a phishing gang per se. Rather, this group uses the phony bank domains in conjunction with malicious software that is already secretly installed on a victim’s computer.
Holden said the Disneyland Team domains were made to help the group steal money from victims infected with a powerful strain of Microsoft Windows-based banking malware known as Gozi 2.0/Ursnif. Gozi specializes in collecting credentials, and is mainly used for attacks on client-side online banking to facilitate fraudulent bank transfers. Gozi also allows the attackers to connect to a bank’s website using the victim’s computer.
In years past, crooks like these would use custom-made “web injects” to manipulate what Gozi victims see in their Web browser when they visit their bank’s site. These web injects allowed malware to rewrite the bank’s HTML code on the fly, and copy and/or intercept any data users would enter into a web-based form, such as a username and password.
Most Web browser makers, however, have spent years adding security protections to block such nefarious activity. As a result, the Disneyland Team simply tries to make their domains look as much like the real thing as possible, and then funnel victims toward interacting with those imposter sites.
“The reason that it is infeasible for them to use in-browser injects include browser and OS protection measures, and difficulties manipulating dynamic pages for banks that require multi-factor authentication,” Holden said.
In reality, the fake bank website overlaid by the Disneyland Team’s malware relays the victim’s browser activity through to the real bank website, while allowing the attackers to forward any secondary login requests from the bank, such as secret questions or multi-factor authentication challenges.
The Disneyland Team included instructions for its users, noting that when the victim enters their login credentials, he sees a 10-second spinning wheel, and then the message, “Awaiting back office approval for your request. Please don’t close this window.”
A fake PNC website overlay or “web inject” displaying a message intended to temporarily prevent the user from accessing their account.
The “SKIP” button in the screenshot above sends the user to the real bank login page, “in case the account is not interesting to us,” the manual explains. “Also, this redirect works if none of our operators are working at the time.”
The “TAKE” button in the Disneyland Team control panel allows users or affiliates to claim ownership over a specific infected machine or bot, which then excludes other users from interacting with that victim.
In the event that it somehow takes a long time to get the victim (bot) connected to the Disneyland Team control panel, or if it is necessary to delay a transaction, users can push a button that prompts the following message to appear on the victim’s screen:
“Your case ID number is 875472. An online banking support representative will get in touch shortly. Please provide your case ID number, and DO NOT close this page.”
The Disneyland user manual explains that the panel can be used to force the victim to log in again if they transmit invalid credentials. It also has other options for stalling victims whilst their accounts are drained. Another fake prompt the panel can produce shows the victim a message saying, “We are currently working on updating our security system. You should be able to log in once the countdown timer expires.”
The user manual says this option blocks the user from accessing their account for two hours. “It is possible to block for an hour with this button, in this case they get less frustrated, within the hours ddos will kill their network.”
Cybercrime groups will sometimes launch distributed denial-of-service (DDoS) attacks on the servers of the companies they’re trying to rob — which is usually intended to distract victims from their fleecing, although Holden said it’s unclear if the Disneyland Team employs this tactic as well.
For many years, KrebsOnSecurity tracked the day-to-day activities of a similar malware crew that used web injects and bots to steal tens of millions of dollars from small- to mid-sized businesses across the United States.
At the end of each story, I would close with a recommendation that anyone concerned about malware snarfing their banking information should strongly consider doing their online banking from a dedicated, security-hardened system which is only used for that purpose. Of course, the dedicated system approach works only if you always use that dedicated system for managing your account online.
Those stories also observed that since the vast majority of the malicious software used in cyberheists is designed to run only on Microsoft Windows computers, it made sense to pick a non-Windows computer for that dedicated banking system, such as a Mac or even a version of Linux. I still stand by this advice.
In case anyone is interested, here (PDF) is a list of all phishing domains currently and previously used by the Disneyland Team.
from Krebs on Security https://ift.tt/vq9OSNU
via IFTTT

By BY KATE CONGER
Mr. Musk said workers would need to answer through an online form by late Thursday and those who stayed would be “working long hours at high intensity.”
Published: November 16, 2022 at 10:15AM
from NYT Technology https://ift.tt/NzEImAs
via IFTTT
We tried out the gadgets that kept showing up in our feeds. Here are the ones that deserve the hype—and would make awesome presents.
from Gear Latest https://ift.tt/TtyX7O9
via IFTTT
Five down-on-their-luck strangers must band together to steal back winning lottery tickets worth millions from a wicked mafia boss.
from New On Netflix USA https://ift.tt/HomU5r4
via IFTTT
In a fit of desperation, a down-and-out single mother suits up and attempts to ski Vasaloppet with her (not-so-perfect) perfectionist brother.
from New On Netflix USA https://ift.tt/HF8GSRe
via IFTTT
Armed with music and a message, influential hip-hop group Racionais MC’s turned their street poetry into a powerful movement in Brazil and beyond.
from New On Netflix USA https://ift.tt/niP4yLZ
via IFTTT

(adsbygoogle = window.adsbygoogle || []).push({});
Al igual que sucedió este año, el nombre de Ubuntu 23.04, la primera versión del año próximo podría llevarnos al fondo del mar. Se llamará Lunar Lobster o, Langosta Lunar en el idioma de Cervantes.
Atrás quedaron los tiempos en que Mark Shuttleworth explicaba en su blog cuál era el nombre elegido y que características de ese nombre trataban de transmitirse a la versión. En la actualidad supongo que solo se limitan a elegir un animal y un adjetivo al azar dependiendo de la letra del alfabeto que le toque.
En realidad, todo se trata de una especulación de medios especializados. En la cuenta oficial de Ubuntu se ve un tweet con un emoticon de luna y otro de langosta y un proyecto en Launchpad (La plataforma de desarrollo colaborativo de Canonical) con el título de Lunar y la aclaración de que es la próxima versión de Ubuntu en la descripción.
(adsbygoogle = window.adsbygoogle || []).push({});
La descripción biológica de la langosta no parece aportar demasiada información de por qué fue elegido el nombre, más allá de que comienza por L. Se trata de un crustáceo decápodo que vive en fondos rocosos no demasiado profundos y se esconde entre las rocas.
Tampoco lo de lunar aporta demasiadas pistas. Define a lo relativo a la luna o lo influenciado por ella.
Sin embargo, los seguidores del Tarot tienen algo más que aportar. Hay una carta muy conocida que representa a un crustáceo de diez patas (Dependiendo del diseño puede ser una langosta, un cangrejo o un bogavante). Parece haber varias interpretaciones de su significado. Para algunos la luna representa la búsqueda y el crustáceo el encargado de devorar lo transitorio. Otros lo relacionan con la emoción o la intuición.
(adsbygoogle = window.adsbygoogle || []).push({});
No creo en esas cosas, pero, ojalá signifique que tendremos, después de mucho tiempo, una versión interesante.
De todas formas, todo son especulaciones.
Por el momento lo único que sabemos seguro es que la fecha de liberación será el 27 de abril del 2023 y, como corresponde a los años impares tendrá soporte durante nueve meses. Comparando los respectivos calendarios de desarrollo no parece que GNOME 44 esté listo a tiempo por lo que posiblemente venga con alguna actualización de la rama 43.
from Linux Adictos https://ift.tt/suTaAM4
via IFTTT
These wirefree earbuds from the Swedish brand have a comfy fit and great sound, plus they don’t cost an arm and a leg.
from Gear Latest https://ift.tt/Kh4pQZr
via IFTTT