Connect with us

Press Release

To avoid sanctions, Russia establishes its own TLS certificate authority.

Published

on

To avoid sanctions, Russia establishes its own TLS certificate authority.

To avoid sanctions, Russia establishes its own TLS certificate authority.
TLS certificates assist the web browser in verifying that a domain is associated with a recognised organisation and that information being transmitted between the user and the server is encrypted.

The inability of signing authorities situated in nations that have placed sanctions on Russia to accept fees for their services prevents numerous websites from being able to renew their expired certificates.

Web browsers including Google Chrome, Safari, Microsoft Edge, and Mozilla Firefox will display full-page warnings that the pages are vulnerable after a certificate expires, which may cause many users to leave the website.

a national authority
For the independent issuance and renewal of TLS certificates, the Russian government has envisioned a domestic certificate authority as a potential solution.

If the foreign security certificate is revoked or expires, it will be replaced with this one. A complimentary domestic analogue will be offered by the Ministry of Digital Development. According to the Russian public services web Gosuslugi, the service is offered to legal entities – site owners upon request and is delivered within 5 working days (translated).

However, it can take a while for new Certificate Authorities (CA) to pass scrutiny from various businesses before being trusted by web browsers.

The Yandex browser and Atom products from Russia are the only web browsers that now acknowledge Russia’s new CA as reliable, so Russian consumers are advised to use these rather than Chrome, Firefox, Edge, etc.

Sberbank, VTB, and the Russian Central Bank are among the websites that have already obtained and are presently utilising these state-provided certifications.

A list of 198 domains with a notification to use the local TLS certificate has purportedly been distributed in Russian media, but its usage is not now required.

A questionable proposition
Users of other browsers can manually apply the new Russian root certificate to keep accessing Russian websites that use the state-issued certificate. Examples of these browsers include Chrome and Firefox.

However, this raises fears that Russia might misuse its CA root certificate to carry out man-in-the-middle attacks and intercept HTTPS data.

The new root certificate would eventually be added to the list of certificates that have had their validity revoked as a result of this misuse (CRL).
As a result, Chrome, Edge, and Firefox will prohibit access to any websites utilising these domestic certificates, rendering them invalid.

All parties are obliged to trust certificate authorities. However, it is unlikely that the main browser vendors will add Russia to their root certificate stores given that it does not already have any level of trust.

To mitigate the negative effects of Western sanctions on its economy, Russia has taken some extreme steps. Many have assumed that the time has come to shut off communication with the world internet and move its users to the “Runet.”

In a statement distributed to local news agencies in reaction to these claims, the Russian Ministry for Digital Technologies categorically denied that there is a plan to turn off the internet from within.

Continue Reading

Press Release

MICROSOFT IS IN TERMS TO BUY SPEECH TECHNOLOGY COMPANY NUANCE COMMUNICATIONS FOR ABOUT $16 BILLION, OR $56 A SHARE, A 23% OVERPAYMENT TO NUANCE’S FRIDAY CLOSE, According to Sources (BLOOMBERG)

Published

on

MICROSOFT IS IN TERMS TO BUY SPEECH TECHNOLOGY COMPANY

Bloomberg:

According to sources, Microsoft is in advanced talks to acquire Nuance Communications, a provider of speech technology, for about $16 billion, or $56 per share, a 23% premium to Nuance’s Friday close. The proposed price would value Nuance at $56 per share. This week could see the announcement of a deal.

Continue Reading

Press Release

After taking data, the Android spyware BRATA wipes your smartphone.

Published

on

After taking data, the Android spyware BRATA wipes your smartphone.

The most recent version of the Android malware known as BRATA now includes several new and dangerous features, such as GPS tracking, the ability to use numerous communication channels, and a tool that wipes all evidence of malicious activity from the device by performing a factory reset.

Kaspersky originally identified BRATA as an Android RAT (remote access tool) in 2019 that mostly targeted Brazilian users.

A Cleafy report from December 2021 highlighted the malware’s appearance in Europe, where it was observed to target customers of online banking services and steal their credentials with the help of con artists posing as bank customer support representatives.

Cleafy analysts kept an eye out for new features in BRATA, and in a new research released today, they show how the malware is still evolving.

versions with modifications for various audiences
The most recent iterations of the BRATA malware currently target e-banking users in China, Latin America, the UK, Poland, Italy, and Spain.

With various overlay sets, languages, and even different apps to target particular populations, each version focuses on a different bank.

In all versions, the developers employ comparable obfuscation strategies, such as enclosing the APK file in an encrypted JAR or DEX package.

The VirusTotal scan below shows how effectively this obfuscation avoids antivirus detections.

On that front, before moving on to the data exfiltration process, BRATA now actively looks for indicators of AV presence on the device and tries to erase the discovered security tools.

 

New capabilities
The keylogging functionality, which is a new feature in the most recent BRATA versions, was discovered by Cleafy researchers and adds to the existing screen capturing capabilities.

All new variations also include GPS monitoring, however analysts are unsure of its precise function.

The performing of factory resets, which the actors do in the following circumstances, is the scariest of the new malevolent features.

The fraudulent transaction has been successfully finished after the compromise (i.e. credentials have been exfiltrated).
It has been discovered by the programme that it operates in a virtual environment, perhaps for analysis.
The kill switch used by BRATA is a factory reset, which wipes the device and increases the risk of a victim experiencing an unexpected and permanent loss of data.

Finally, BRATA now supports HTTP and WebSockets and has provided new channels for data exchange with the C2 server.

 

A direct, low-latency route that is perfect for in-the-moment communication and live manual exploitation is provided by the choice of WebSockets for the actors.

Additionally, because WebSockets don’t need to send headers with each connection, less suspicious network traffic is generated, which reduces the likelihood of being discovered.

Basic safety precautions
BRATA is only one of several sneaky RATs and Android banking trojans that target users’ banking credentials that are out there.

Installing apps from the Google Play Store, avoiding APKs from dubious websites, and always scanning them with an AV programme before opening them are the best strategies to prevent being infected by Android malware.

Pay close attention to the permissions that are requested during installation and don’t allow those that don’t seem necessary for the app’s primary functions.

Finally, keep an eye on your battery life and network traffic levels to spot any sudden spikes that can be caused by malicious processes that are running in the background.

Continue Reading

Press Release

Record: hackers scraped information of 500M LinkedIn customers and published it available online; LinkedIn validates the dataset includes publicly viewable details from its site (Katie Canales/Insider).

Published

on

hackers scraped information

ReporReport: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site (Katie Canales/Insider)

Katie Canales / Insider:
Report: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site — – Personal data from 500 million LinkedIn users has been scraped and is reportedly for sale on a hacking forum.t: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site (Katie Canales/Insider)

Katie Canales / Insider:
Report: hackers scraped data of 500M LinkedIn users and posted it for sale online; LinkedIn confirms the dataset includes publicly viewable info from its site — – Personal data from 500 million LinkedIn users has been scraped and is reportedly for sale on a hacking forum.

Continue Reading

Trending