Kiberni kriminalci izkoriščajo Microsoft Sway za krajo vaših prijavnih podatkov.

Kiberni kriminalci izkoriščajo Microsoft Sway za krajo vaših prijavnih podatkov.

Phishing kampanje, ki ciljajo na poverilnice MS Office, so julija 2024 doživele znaten porast, izkoriščajoč Microsoft Sway za dostavo zlonamernih QR kod, kjer napadalci uporabljajo transparenten phishing in Cloudflare Turnstile, da se izognejo odkrivanju in zaobidejo varnostne ukrepe.

QR kode preusmerjajo uporabnike na phishing strani, pogosto z uporabo mobilnih naprav zaradi njihove potencialne pomanjkljive varnosti, kar naj bi kompromitiralo poverilnice uporabnikov in pridobilo nepooblaščen dostop do občutljivih informacij.

Microsoft Sway, brezplačna aplikacija Microsoft 365, je vse pogosteje zlorabljena s strani napadalcev za distribucijo phishing vsebine. Z izkoriščanjem njene legitimnosti in dostopnosti napadalci ustvarjajo prepričljive phishing strani, ki ciljajo na račune Microsoft 365.

Raziskovalci so julija 2024 opazili znaten porast phishing napadov, ki temeljijo na Sway, kar poudarja naraščajočo grožnjo. Uporabniki naj bodo previdni pri dostopanju do strani Sway, še posebej če so pozvani k prijavi, in naj preverijo format URL-ja, da identificirajo legitimne povezave Sway.

Quishing: Naraščajoča zlonamerna praksa

Quishing, ali QR phishing, je zlonamerna praksa, pri kateri napadalci vdelajo zlonamerne URL-je znotraj QR kod, da preusmerijo nič hudega sluteče žrtve na phishing strani, kar izkorišča množično uporabo QR kod med pandemijo COVID-19.

Z zaobidenjem tradicionalnih email skenerjev in izkoriščanjem pogosto manj varnih okolij mobilnih naprav, lahko napadalci uspešno pretentajo uporabnike, da obiščejo zlonamerne spletne strani.

Analizirane phishing kampanje so uporabljale orodja, kot sta Google Chrome in QR Code Generator PRO, za ustvarjanje teh prevarantskih QR kod, kar predstavlja resno grožnjo spletni varnosti.

Cloudflare Turnstile: Skriti sovoznik napadov

Phishing napadalci izkoriščajo Cloudflare Turnstile kot protiukrep proti statičnim spletnih skenerjem. Z vključitvijo Turnstila v njihove phishing strani, lahko napadalci učinkovito prikrijejo zlonamerno vsebino, kar otežuje, da avtomatska orodja zaznajo in označijo domeno kot zlonamerno.

Ta tehnika prikrivanja pomaga preprečiti, da bi domena pridobila negativni ugled in bila blokirana s strani storitev za filtriranje spleta, s čimer se poveča verjetnost uspešnih phishing napadov.

Attacker-in-the-Middle: Napadi napadalca-v-sredini

Po podatkih Netskope, napadi Attacker-in-the-Middle so izpopolnjena tehnika, ki presega tradicionalne phishing metode z aktivno intervencijo v proces prijave žrtve.

Medtem ko si obe metodi prizadevata za zbiranje uporabniških poverilnic, napadi napadalca-v-sredini ne le prestrezajo posredovane poverilnice, temveč tudi poskušajo prijaviti žrtev v legitimno storitev.

To napadalcu omogoča, da zbere dodatne overitvene faktorje, kot so večfaktorski kodeksi, in pridobi žrtvini sejne tokene ali piškotke, ki se lahko uporabijo za vzdrževanje nepooblaščenega dostopa do računa žrtve, kar potencialno vodi v nadaljnje kršitve podatkov ali goljufive dejavnosti.

AI Unveils Cybercriminals Leveraging Google Sheets for Malware Command in Massive Espionage Operation

Clever Use of Google Sheets in Malware Campaign

In a recent discovery by cybersecurity researchers, a new malware campaign has been unearthed, utilizing an unconventional tactic of using Google Sheets as a command-and-control mechanism. This innovative approach showcases the evolving techniques employed by cybercriminals to evade detection and carry out their malicious activities.

Impersonation of Tax Authorities for Global Targets

The malware campaign, first identified by Proofpoint on August 5, 2024, involves impersonating tax authorities from various governments across Europe, Asia, and the U.S. This deceptive tactic aims to target over 70 organizations worldwide. Through this guise, cybercriminals seek to exploit the trust associated with official government communications to deceive unsuspecting victims.

The Infamous Tool: Voldemort

At the heart of this sophisticated operation lies a bespoke tool named Voldemort. This malicious tool is specifically designed to serve as the backbone of the malware campaign, enabling cybercriminals to orchestrate their attacks with precision and stealth. By leveraging Voldemort, threat actors can maintain control over compromised systems and execute malicious activities without raising suspicions.

This malware campaign underscores the significance of staying vigilant and implementing robust cybersecurity measures to safeguard against evolving threats in the digital landscape. Organizations and individuals alike must remain proactive in fortifying their defenses and staying informed about emerging cyber threats.

Significance of the Google Sheets C2 Mechanism

The utilization of Google Sheets as a command-and-control mechanism in this malware campaign represents a notable shift in tactics by cybercriminals. By utilizing legitimate platforms such as Google Sheets, threat actors can obfuscate their malicious activities and circumvent traditional security measures that may be focused on detecting anomalous network traffic.

Evasion of Detection Through Legitimate Platforms

The choice of Google Sheets as a C2 mechanism allows cybercriminals to blend in with legitimate traffic, making it more challenging for security tools to flag suspicious behavior. This evasion tactic highlights the adaptability of cybercriminals in leveraging commonly used services for nefarious purposes while flying under the radar of conventional security protocols.

As organizations strive to enhance their cybersecurity postures, it is imperative to remain vigilant against emerging threats that exploit unconventional methods and platforms. By understanding the evolving strategies employed by cybercriminals, organizations can better equip themselves to defend against sophisticated attacks and protect their sensitive information.

Protecting Against Emerging Cyber Threats

As the cybersecurity landscape continues to evolve, businesses and individuals must adapt their security practices to combat emerging cyber threats effectively. By prioritizing proactive security measures such as regular security assessments, employee training, and threat intelligence sharing, organizations can bolster their defenses and mitigate the risk of falling victim to malicious activities.

Embracing a Culture of Security Awareness

Promoting a culture of security awareness within organizations is crucial in mitigating the impact of cyber threats. By educating employees about potential risks, encouraging best practices for data protection, and fostering a proactive approach to cybersecurity, businesses can enhance their overall resilience against cyber attacks.

In conclusion, the discovery of the malware campaign utilizing Google Sheets as a C2 mechanism underscores the need for continuous vigilance and proactive security measures in the face of evolving cyber threats. By staying informed, remaining proactive, and fostering a culture of security awareness, organizations can strengthen their defenses and safeguard against malicious activities in an increasingly digital world.

Iranian Hackers Launch Cyber Attack on U.S. Political Campaigns

Cybersecurity Researchers Uncover Iranian Threat Actors’ Network Infrastructure

Cybersecurity researchers at Recorded Future’s Insikt Group recently made a significant discovery in the realm of online security. They stumbled upon a new network infrastructure established by Iranian threat actors aimed at aiding activities connected to the recent targeting of U.S. political campaigns.

Uncovering GreenCharlie:

The Insikt Group has tied this network infrastructure to a threat entity they refer to as GreenCharlie. This particular cyber threat group is closely associated with Iran and is known to have connections with other notorious groups like APT42, Charming Kitten, Damselfly, and Mint Sandstorm (formerly). These groups have been involved in various cyber activities in the past, with a focus on espionage, data theft, and disruption of targeted systems.

Implications for U.S. Political Campaigns:

The discovery of this new infrastructure raises concerns about potential threats to U.S. political campaigns. Given the history of these Iranian threat actors and their affiliations, there is a heightened risk of targeted cyber attacks aimed at influencing or disrupting political processes.

Increased Vigilance and Security Measures:

In light of this revelation, it is essential for organizations, particularly those involved in political campaigns or sensitive operations, to enhance their cybersecurity measures. This includes monitoring network traffic for any suspicious activities, updating security protocols, and educating employees about the risks posed by cyber threats.

The Growing Threat of Ransomware Attacks

Ransomware attacks have been on the rise in recent years, with cybercriminals targeting individuals, businesses, and government entities with increasingly sophisticated tactics. These attacks involve encrypting the victim’s data and demanding a ransom for its release, often in the form of cryptocurrency.

Impact on Organizations:

Organizations that fall victim to ransomware attacks face not only financial losses but also the risk of reputational damage and regulatory penalties. The disruption caused by such attacks can cripple operations and lead to significant downtime, affecting productivity and customer trust.

Preventative Measures:

To protect against ransomware attacks, organizations should implement robust cybersecurity measures, including regular data backups, network segmentation, employee training on phishing awareness, and penetration testing. It is essential to have incident response plans in place to minimize the impact of an attack and facilitate quick recovery.

Law Enforcement and International Cooperation:

Combatting ransomware attacks requires a collaborative effort between law enforcement agencies, cybersecurity experts, and international partners. By sharing information and resources, it is possible to track down and dismantle ransomware operations, ultimately deterring cybercriminals from engaging in such activities.

The Role of Artificial Intelligence in Cybersecurity

Artificial Intelligence (AI) has emerged as a powerful tool in the fight against cyber threats, offering advanced capabilities in threat detection, response automation, and anomaly detection.

Benefits of AI in Cybersecurity:

AI technologies can analyze vast amounts of data in real-time, quickly identifying patterns and anomalies that may indicate a potential security breach. By leveraging machine learning algorithms, AI systems can adapt to evolving threats and improve their performance over time.

Challenges and Considerations:

While AI holds great promise in enhancing cybersecurity practices, there are challenges to overcome, such as data privacy concerns, algorithm bias, and the potential for adversaries to exploit AI systems. It is crucial for organizations to implement AI technologies responsibly and ethically to maximize their effectiveness.

Future Outlook:

As cyber threats continue to evolve in complexity and frequency, the role of AI in cybersecurity will become increasingly important. By harnessing the power of AI-driven solutions, organizations can stay ahead of adversaries and effectively protect their digital assets from potential breaches.

Unmasking the Latest Malware: Palo Alto VPN Impersonator Preying on Middle East Users

Cybersecurity Researchers Uncover Malware Targeting Users in the Middle East

In a recent discovery, cybersecurity researchers have unveiled a new campaign aimed at users in the Middle East. The attack involves malware that masquerades as the Palo Alto Networks GlobalProtect virtual private network (VPN) tool. This deceptive tactic is designed to lure unsuspecting users into installing the malicious software under the guise of a legitimate cybersecurity product.

The Threat Posed by the Malware

The malware in question possesses a range of dangerous capabilities that could compromise the security of affected systems. It has the ability to execute remote PowerShell commands, allowing threat actors to take control of the infected devices. Additionally, the malware can download and exfiltrate files from the compromised systems, potentially exposing sensitive information to cybercriminals.

One of the concerning aspects of this malware is its encryption feature, which can be used to obfuscate malicious activities and communications. By encrypting its actions, the malware can evade detection by traditional security measures, making it a potent threat to organizations and individuals in the targeted region.

Sophisticated Evasion Techniques

Moreover, the malware is equipped with capabilities to bypass sandbox solutions commonly used by cybersecurity professionals to analyze and detect malicious software. This advanced evasion technique enables the malware to avoid being detected and analyzed in a controlled environment, making it challenging for cybersecurity experts to assess and mitigate the threat effectively.

Protecting Against the Threat

To safeguard against this emerging threat, users in the Middle East and beyond are advised to exercise caution when downloading software, even from seemingly reputable sources. It is crucial to verify the authenticity of any software before installation and to ensure that security solutions are up to date to detect and prevent such attacks.

Organizations are encouraged to implement multi-layered security measures that include endpoint protection, network monitoring, and user awareness training to mitigate the risks posed by sophisticated malware campaigns like the one targeting users in the Middle East.

Conclusion

As cyber threats continue to evolve and become more complex, staying vigilant and adopting proactive security practices are essential to protect against malicious actors. By remaining informed about the latest cybersecurity developments and taking steps to enhance security posture, individuals and organizations can reduce the likelihood of falling victim to cyber attacks.

Breaking Down AD CS Vulnerabilities: Insights for InfoSec Professionals

The Unseen Threat

In the vast realm of cybersecurity, lurking beneath the radar is a perilous vulnerability that has the potential to wreak havoc. It’s not the vulnerability that screams for attention with flashing lights and sirens but rather one that quietly waits for an opportune moment to strike. This silent danger, the one you might not have heard of, can be as destructive as its more vocal counterparts.

The Intricate Nature of Vulnerabilities

New vulnerabilities are unearthed with alarming frequency in the cybersecurity landscape. While some vulnerabilities immediately trigger alerts on your security systems, others remain stealthy, their implications not always fully comprehended. It is crucial to recognize that the quiet threats can be just as menacing as the loud ones.

Unveiling the Obscure Vulnerability

Today, we shed light on a particular vulnerability that has been lurking in the shadows, evading the spotlight of widespread awareness. It is essential to understand and address this lesser-known threat before it manifests into a full-blown disaster.

Staying Alert in the Cyber Wilderness

In the ever-evolving world of cybersecurity, vigilance is key. While some vulnerabilities may be glaringly obvious, it is crucial to remain on high alert for the subtle and obscured threats that can potentially cause significant harm. By staying informed and proactive, you can fortify your defenses against both the seen and unseen dangers that lurk in the digital wilderness.

Defending Vital Systems: Securing ICS/OT Environments 2024

Specialized ICS Security Measures in High Demand

In today’s digital age, as cyber threats continue to rise, the need for specialized Industrial Control Systems (ICS) security measures has become more critical than ever. Dean Parsons, an expert in the field, highlights the growing importance of implementing robust security protocols to safeguard ICS infrastructure from malicious attacks.

Rising Threat of Ransomware Attacks on ICS

The year 2023 witnessed a shocking 50% surge in ransomware attacks targeting industrial control systems, posing a significant risk to businesses across various sectors. Recognizing the escalating threat landscape, the SANS Institute has taken proactive steps to address this pressing issue.

New Strategy Guide by SANS Institute

To combat the escalating threat landscape, the SANS Institute has unveiled a groundbreaking strategy guide titled “ICS Is the Business: Why Securing” to help organizations fortify their ICS infrastructure against cyber threats. This comprehensive guide offers practical insights and actionable strategies to enhance the security posture of industrial control systems.

The Importance of Securing Industrial Control Systems

Industrial Control Systems (ICS) play a crucial role in managing essential processes across critical infrastructure sectors such as energy, utilities, manufacturing, and transportation. The increasing digitization and interconnectivity of ICS systems have made them prime targets for cyber adversaries seeking to disrupt operations and inflict financial losses.

Risks Posed by Cyber Attacks on ICS

Cyber attacks on industrial control systems can have devastating consequences, ranging from operational downtime and financial losses to compromised safety and environmental risks. As organizations increasingly rely on interconnected ICS systems to streamline operations, securing these systems against cyber threats has become paramount to ensuring operational resilience and business continuity.

Challenges in Securing ICS

Securing industrial control systems presents unique challenges due to the legacy nature of many ICS components, limited security protocols, and the convergence of operational technology (OT) with information technology (IT) networks. The complexity of ICS environments and the widespread adoption of interconnected devices further magnify the cybersecurity risks faced by organizations.

Key Strategies for Enhancing ICS Security

In response to the evolving threat landscape, organizations can adopt several key strategies to enhance the security of their industrial control systems:

1. Implementing Defense-in-Depth Approach

Deploying a multi-layered defense-in-depth strategy that includes network segmentation, access controls, intrusion detection systems, and regular security assessments can help organizations fortify their ICS infrastructure against cyber threats.

2. Conducting Regular Security Training

Educating employees and personnel on cybersecurity best practices, threat awareness, and incident response protocols can empower organizations to proactively mitigate security risks and enhance the overall cyber resilience of their ICS environment.

3. Leveraging Threat Intelligence

Utilizing threat intelligence feeds and information sharing platforms can provide organizations with valuable insights into emerging cyber threats, vulnerabilities, and attack trends targeting industrial control systems, enabling proactive threat mitigation and response.

Conclusion

As the frequency and sophistication of cyber threats targeting industrial control systems continue to escalate, organizations must prioritize the implementation of robust security measures to safeguard their critical infrastructure and mitigate operational risks. By embracing a proactive approach to ICS security and leveraging industry best practices and guidelines, organizations can enhance their cyber resilience and ensure the uninterrupted operation of essential processes in today’s digitally connected world.

Beware: North Korean Cyber Attack Targets Developers with Malicious npm Packages

Threat Actors from North Korea Target Developers with Malware on npm Registry

Threat actors associated with North Korea have once again flexed their malicious cyber prowess by uploading a series of malevolent packages to the popular npm registry. These actions highlight a worrisome trend of coordinated and persistent efforts to infiltrate developers’ systems, inject malware, and abscond with valuable cryptocurrency assets.

A Coordinated Attack Unveiled

During a recent surge in nefarious activities spanning from August 12 to 27, 2024, these threat actors unleashed a barrage of deceitful packages into the npm registry. Among the insidious titles that developers should be wary of are temp-etherscan-api, etherscan-api, telegram-con, helmet-validate, and…

The intent behind these seemingly innocuous packages is far from benign. Once unsuspecting developers integrate these modules into their projects, the malicious code discreetly executes its sinister agenda, potentially compromising entire systems and putting cryptocurrency assets at grave risk.

Prominent npm Registry Under Scrutiny

The npm registry, a vital repository of JavaScript packages widely utilized by developers worldwide, has unwittingly become the battleground for cyber skirmishes waged by threat actors looking to exploit vulnerabilities and maximize their illicit gains.

As the primary resource for developers to access and integrate essential packages, the npm registry’s pivotal role inadvertently exposes a vast user base to potential cybersecurity threats. This latest incursion by North Korean-affiliated threat actors underscores the critical need for enhanced security measures and heightened vigilance within the developer community.

Safeguarding Against Malicious Campaigns

In light of these unsettling developments, developers are urged to exercise caution and implement robust security protocols to mitigate the risks posed by nefarious actors. Some essential measures that developers can adopt to fortify their defenses include:

1. Code Review and Validation

Thoroughly scrutinize and validate all third-party packages before incorporating them into projects. By examining the source code and assessing the reputation of package maintainers, developers can identify suspicious elements and prevent potential security breaches.

2. Regular Security Audits

Conduct periodic security audits to detect any anomalies or unauthorized access within systems. Proactive monitoring and timely response to security incidents are crucial in safeguarding sensitive data and preventing unauthorized intrusions.

3. Stay Informed and Educated

Remain vigilant and stay abreast of the latest cybersecurity threats and trends. By actively engaging in security forums, attending relevant training sessions, and fostering a cybersecurity-conscious culture, developers can enhance their knowledge and ability…

The Perpetual Battle Against Cyber Threats

The realm of cybersecurity remains an ever-evolving landscape where threat actors continuously devise new tactics to circumvent existing defenses. As demonstrated by the recent malevolent activities on the npm registry, developers must remain steadfast in their commitment to upholding stringent security practices…

By fostering a collaborative and well-informed community, developers can collectively thwart malicious efforts and fortify their defenses against insidious cyber threats. Together, we can cultivate a safer digital environment that preserves the integrity and security of our technological ecosystem.

Atlassian Confluence Vulnerability: How Hackers Are Using It for Crypto Mining

The Confluence Data Center and Server Vulnerability Exploitation for Cryptocurrency Mining

In a concerning turn of events, threat actors have been capitalizing on a critical security flaw in Atlassian’s Confluence Data Center and Confluence Server. Although the vulnerability has been patched, malicious actors have been exploiting it to engage in unauthorized cryptocurrency mining activities on vulnerable instances.

Exploitation Techniques and Methods

The attackers have been executing their nefarious activities through various methods, including the deployment of shell scripts and XMRig miners. They have been specifically targeting SSH endpoints as an entry point to compromise the systems. Additionally, to ensure their mining activities are prioritized, the threat actors have been terminating any competing cryptocurrency mining processes on the compromised servers.

Implications of the Vulnerability

This exploitation of the security flaw not only highlights the importance of promptly applying software patches but also underlines the profitability of cryptocurrency mining for malicious actors. Organizations running vulnerable versions of Atlassian Confluence Data Center and Confluence Server are at risk of having their resources hijacked for mining cryptocurrencies without their consent.

Recommendations for Organizations

In light of these developments, it is crucial for organizations utilizing Atlassian Confluence products to ensure that they have applied the necessary security updates to mitigate the risk of falling victim to such attacks. Regularly monitoring and securing SSH endpoints, as well as implementing robust access controls, can further fortify the defense against unauthorized access and exploitation.

The Ongoing Battle Against Cyber Threats

The exploitation of vulnerabilities for illicit cryptocurrency mining is just one of the many cybersecurity threats that organizations face in today’s digital landscape. Threat actors are constantly evolving their tactics to capitalize on weaknesses in software and systems, underscoring the need for proactive security measures and swift incident response capabilities.

Collaborative Efforts and Information Sharing

To stay ahead of cyber threats, collaboration among industry stakeholders, sharing threat intelligence, and adopting best practices in cybersecurity defense are essential. By fostering a collective defense approach, organizations can better protect themselves and the wider ecosystem from malicious activities like unauthorized cryptocurrency mining.

Conclusion

As the cybersecurity landscape continues to evolve, organizations must remain vigilant and proactive in safeguarding their digital assets against threats such as the exploitation of critical vulnerabilities for illicit purposes. By staying informed, applying security patches promptly, and implementing robust security measures, businesses can better defend themselves against cyber attacks and mitigate the risks associated with unauthorized cryptocurrency mining activities.

Defending Against the Latest Cyber Threat Targeting Chinese-Speaking Businesses

Chinese-Speaking Users Targeted in Sophisticated Cyber Attack Campaign

In a recent study by Securonix researchers Den Iuzvyk and Tim Peck, it was revealed that Chinese-speaking users have become the targets of a highly organized and sophisticated cyber attack campaign. The attackers behind this campaign are using phishing emails as a means to infect Windows systems with Cobalt Strike payloads. These payloads enable the attackers to move laterally within the systems, establish persistence, and remain undetected for an extended period, in this case, more than two weeks.

The Intricacies of the Attack

The attack campaign, aimed at Chinese-speaking users, showcases the level of ingenuity and strategic planning on the part of the cybercriminals. By leveraging phishing emails as the initial attack vector, they manage to gain access to Windows systems and deploy Cobalt Strike payloads. Cobalt Strike is a powerful tool that allows attackers to move laterally within a network, establish a foothold, and blend in with legitimate traffic to avoid detection.

The Significance of Lateral Movement

The ability of the attackers to move laterally within the systems is a crucial aspect of the attack campaign. By doing so, they can explore the network, target high-value assets, and escalate their privileges to gain deeper access. This lateral movement also enables them to establish persistence, ensuring that they can maintain access to the compromised systems over an extended period without being detected.

Understanding the Threat Landscape

In today’s cyber threat landscape, it is evident that cybercriminals are becoming increasingly sophisticated in their attack techniques. The use of phishing emails to deliver malicious payloads, such as Cobalt Strike, highlights the need for organizations and individuals to be vigilant and proactive in their cybersecurity measures. By staying informed about the latest threats and adopting robust security practices, users can better protect themselves against such targeted attacks.

Recommendations for Improving Cybersecurity

To enhance cybersecurity and mitigate the risk of falling victim to sophisticated cyber attack campaigns, users are advised to take the following precautions:

1. **Be Wary of Phishing Emails**: Exercise caution when opening emails from unknown senders or containing suspicious links or attachments. Verify the authenticity of the email before taking any action.

2. **Implement Security Solutions**: Use reputable antivirus software, firewalls, and intrusion detection systems to safeguard your systems against malicious threats.

3. **Educate Users**: Provide cybersecurity awareness training to employees and individuals to educate them about the risks associated with phishing attacks and how to identify them.

4. **Monitor Network Activity**: Regularly monitor network traffic and system logs for any unusual or suspicious behavior that could indicate a security breach.

5. **Keep Systems Updated**: Ensure that software patches and security updates are applied promptly to prevent vulnerabilities that could be exploited by cyber attackers.

By adopting these proactive measures and staying informed about the evolving threat landscape, users can better protect themselves and their organizations from falling victim to sophisticated cyber attacks.

8 aplikacij za Android in iOS, ki so izpostavile puščanje občutljivih podatkov

8 aplikacij za Android in iOS, ki so izpostavile puščanje občutljivih podatkov

Osem aplikacij za Android in iOS predstavlja pomembno varnostno tveganje

Osem aplikacij za Android in iOS predstavlja pomembno varnostno tveganje za uporabnike zaradi njihovega neuspeha pri šifriranju občutljivih podatkov med prenosom. Ugotovljeno je bilo, da pošiljajo nešifrirane informacije, kot so podrobnosti o napravi, podatki o lokaciji in prijavni podatki, prek protokola HTTP namesto varnejšega protokola HTTPS.

To izpostavlja uporabnike morebitnim napadom, kot so kraje podatkov, prisluškovanje in napadi »man-in-the-middle«, saj lahko vsak, ki spremlja omrežje, prestreže in dostopa do nešifriranih podatkov.

Klara Weather

Aplikacija Klara Weather, z več kot milijonom prenosov na Google Play Store, predstavlja pomembno varnostno tveganje za zasebnost uporabnikov. Analiza promet omrežja in pregled kode sta razkrila, da aplikacija pošilja podatke o geolokaciji uporabnikov preko nešifriranih HTTP povezav.

Omrežni promet aplikacije Klara Weather

To pomeni, da lahko vsak, ki ima dostop do omrežja, prestreže in ukrade občutljive podatke o lokaciji. Pomanjkanje šifriranja naredi aplikacijo ranljivo za napade »man-in-the-middle«, kjer lahko zlonamerne osebe enostavno prisluškujejo komunikaciji aplikacije in ogrozijo zasebnost uporabnikov.

MD Date za zmenke v vojski

Aplikacija MD Date za zmenke v vojski za iOS predstavlja pomembno varnostno tveganje zaradi neuspeha pri šifriranju uporabniških podatkov. Analiza promet omrežja in pregled kode sta razkrila, da se občutljivi podatki, kot so uporabniška imena in gesla, prenašajo preko nešifriranih HTTP povezav.

Omrežni promet aplikacije za zmenke v vojski

Sina Finance

Aplikacija Sina Finance za Android, ki ima več kot 100.000 prenosov na Google Play Store, predstavlja pomembno varnostno tveganje zaradi nešifriranega prenosa občutljivih informacij o napravi.

Analiza njenega promet omrežja in kode je pokazala, da aplikacija pušča identifikatorje naprav, vključno z ID-jem naprave, različico SDK in IMEI, preko HTTP, kar naredi te podatke ranljive za prestrezanje in zlorabo, kar izpostavlja uporabnike morebitni kraji identitete, sledenju in nepooblaščenemu dostopu do njihovih naprav.

Dokazi o uporabi HTTP URL v aplikaciji Sina Finance

CP Plus Intelli Serve

Aplikacija CP Plus Intelli Serve Android, ki ima več kot 50.000 prenosov na Google Play Store, predstavlja pomembno varnostno tveganje zaradi nešifriranega prenosa uporabniških podatkov.

Analiza promet omrežja in pregled kode sta potrdila, da se uporabniška imena in gesla pošiljajo nešifrirano preko HTTP, kar jih naredi ranljive za prestrezanje in zlorabo s strani zlonamernih oseb.

Omrežni promet aplikacije CP Plus Intelli Serve

Latvian Post, HaloVPN, i-Boating, Texas Storm Chasers

Aplikacije Latvian Post, HaloVPN, i-Boating in Texas Storm Chasers so bile odkrite, da prenašajo občutljive uporabniške podatke, kot so geolokacija in informacije o napravi, preko nešifriranih HTTP povezav, kar izpostavlja uporabnike tveganjem za zasebnost, saj podatki lahko prestrežejo in zlorabijo zlonamerne osebe.

Analiza promet omrežja in pregled kode sta potrdila prisotnost nešifriranih HTTP zahtevkov v teh aplikacijah, kar kaže na pomanjkanje ustreznih varnostnih ukrepov za zaščito uporabniških podatkov.