Security Bulletin

Security Bulletin #43 (english version)

  • Text Hover
2017 / 30 / 01

  • Text Hover
  • Text Hover

Phishing: PayPal users targeted


After Gmail and Yahoo phishing scams, attackers are now targeting PayPal users that look real and can easily fool victims. Attackers have used legitimate PayPal logo on their email but with grammatical errors hints for a phishing email. If a target clicks on the link, they are presented with a genuine looking login screen with an SSL certificate to make it look real. After the user has entered its details to make the user give out its personal details. Cybercriminals are making effort to make their phishing sites look exactly like the legitimate ones. Make sure to protect yourself from phishing attacks. Do not link on links but instead go on the PayPal website and login to your account to check if there is any issues. Always verify the URL address and if not sure go directly to the page by typing in the address. Introduce the use of a two-factor authentication on user’s smartphone to block unauthorized access.

  • Text Hover
Risks of using VPN on Android

VPN app / Poor security / Privacy
According to researcher, a large number of VPN apps for Android mobile devices are full of malware, spying and code injection. They often contains poor security mechanisms and have some apps engaged in malicious activities. While many VPN apps allows users to hide their identity online, malicious developers develops such apps to steal users’ personal information. Out of 283 apps, 3 apps could intercept bank, messaging and social network traffic and 38% of apps contained malware. Despite the privacy, security and anonymity that VPN claims to be, many users are not aware of the poor security and wrong use of VPN apps. Google should also set stricter limits on what VPN apps can do in Android. Link: http://www.theregister.co.uk/2017/01/28/vpn_on_android_means_voyeuristic_peeper_network/

Phishing: PayPal users targeted

 

Phishing / Emails / PayPal / Personal details

After Gmail and Yahoo phishing scams, attackers are now targeting PayPal users that look real and can easily fool victims. Attackers have used legitimate PayPal logo on their email but with grammatical errors hints for a phishing email. If a target clicks on the link, they are presented with a genuine looking login screen with an SSL certificate to make it look real. After the user has entered its details to make the user give out its personal details. Cybercriminals are making effort to make their phishing sites look exactly like the legitimate ones. Make sure to protect yourself from phishing attacks. Do not link on links but instead go on the PayPal website and login to your account to check if there is any issues. Always verify the URL address and if not sure go directly to the page by typing in the address. Introduce the use of a two-factor authentication on user’s smartphone to block unauthorized access.

Link: http://www.welivesecurity.com/2017/01/27/paypal-users-targeted-sophisticated-new-phishing-campaign/

 

  • Text Hover
Google becomes its own Root Certificate Authority

 

Google / Root Certificate / VPN app / Security
Web

Google has launched its root certificate authority to build a more secure web. During the years, Google has been constantly improving and has been warning users that all HTTP pages are not secure and also give preference to HTTPS over HTTP. Google had been using third party’s certificate but will now be using its own called Google Trust Services that will allow it to issue its own TLS/SSL certificates for securing web traffic via HTTPS. Google Trust Services can be used to sign other certificates to authenticate the identity of other websites. Developers will need to include the new Root certificates into their services.

Link: http://thehackernews.com/2017/01/google-trust-services.html?utm_source=dlvr.it&utm_medium=twitter  

 

CERT-FR Weekly News Alert

CERTFR-2017-ALE-001 : Vulnérabilité dans Cisco WebEx (25 janvier 2017)

Link: http://cert.ssi.gouv.fr/site/CERTFR-2017-ALE-001.pdf  

CERTFR-2016-ALE-007 : Vulnérabilité dans Cisco IOS, IOS XE et IOS XR (19 septembre 2016)

Link: http://cert.ssi.gouv.fr/site/CERTFR-2016-ALE-007.pdf

 CERTFR-2017-ACT-005:

Link : http://cert.ssi.gouv.fr/site/CERTFR-2017-ACT-005.pdf