from a ‘ legitimate and trusted organisation ’ such as a bank , the police , a utility company or a government department . These scams typically involve the fraudster contactingAttack.Phishingthe customer through a phone call , text message or email . Often the fraudster will claimAttack.Phishingthere has been suspicious activity on an account , ask the individual to verify or update their account details , or claimAttack.Phishingthey are due a refund . The criminal then attempts to trickAttack.Phishingthe target into giving away their personal or financial information , such as passwords , payment card details or bank account information . Financial Fraud Action UK – which represents banks - said its intelligence suggests criminals have also recently increased their focus on ‘ phishing ’ emails claiming to beAttack.Phishingfrom major online retailers and internet companies . It warned these emails are an ‘ increasingly sophisticated ’ attempt to trickAttack.Phishingrecipients into giving away personal and financial details , or into downloading malware software which hacks into their computers . Several banks have been targeted by high profile cyber attacks that have attempted to exploit weaknesses in their IT systems . Last November criminals launched an online attack against Tesco Bank that resulted in the loss of £2.5million from 9,000 accounts . Others to have been targeted include Royal Bank of Scotland and NatWest , Lloyds and HSBC . The threat to Britain ’ s financial infrastructure from persistent cyber-attacks prompted chancellor Philip Hammond to commit an extra £1.9billion in the autumn statement to boost Britain ’ s defences against the growing online threat .
High street banks are losing the battle against fraud as criminals switch tactics to directly target customers . Efforts by lenders to bolster their IT defences against hackers have simply encouraged fraudsters to bombard individual customers with scams , according to Financial Fraud Action UK . Despite investing millions in tackling fraud , losses from fraud rose last year as banks became less effective at preventing scams . Financial Fraud Action UK said this was ‘ largely due to criminals shifting their methods away from using malware attacks on online banking systems , which bank security processes identified ’ . Increasingly , it said , fraudsters are focussing on targeting individuals directly , which is harder for banks to stop . The report said the main ploy used by criminals is the ‘ impersonation and deception scam ’ whereby they pretend to beAttack.Phishingfrom a ‘ legitimate and trusted organisation ’ such as a bank , the police , a utility company or a government department . These scams typically involve the fraudster contactingAttack.Phishingthe customer through a phone call , text message or email . Often the fraudster will claimAttack.Phishingthere has been suspicious activity on an account , ask the individual to verify or update their account details , or claimAttack.Phishingthey are due a refund . The criminal then attempts to trickAttack.Phishingthe target into giving away their personal or financial information , such as passwords , payment card details or bank account information . Financial Fraud Action UK – which represents banks - said its intelligence suggests criminals have also recently increased their focus on ‘ phishing ’ emails claiming to beAttack.Phishingfrom major online retailers and internet companies . It warned these emails are an ‘ increasingly sophisticated ’ attempt to trickAttack.Phishingrecipients into giving away personal and financial details , or into downloading malware software which hacks into their computers . Several banks have been targeted by high profile cyber attacks that have attempted to exploit weaknesses in their IT systems . Last November criminals launched an online attack against Tesco Bank that resulted in the loss of £2.5million from 9,000 accounts . Others to have been targeted include Royal Bank of Scotland and NatWest , Lloyds and HSBC . The threat to Britain ’ s financial infrastructure from persistent cyber-attacks prompted chancellor Philip Hammond to commit an extra £1.9billion in the autumn statement to boost Britain ’ s defences against the growing online threat .
A severe WordPress vulnerability which has been left a year without being patchedVulnerability-related.PatchVulnerabilityhas the potential to disrupt countless websites running the CMS , researchers claimVulnerability-related.DiscoverVulnerability. At the BSides technical cybersecurity conference in Manchester on Thursday , Secarma researcher Sam Thomas saidVulnerability-related.DiscoverVulnerabilitythe bug permits attackers to exploit the WordPress PHP framework , resulting in a full system compromise . If the domain permits the upload of files , such as image formats , attackers can upload a crafted thumbnail file in order to trigger a file operation through the `` phar : // '' stream wrapper . In turn , the exploit triggers eXternal Entity ( XXE -- XML ) and Server Side Request Forgery ( SSRF ) flaws which cause unserialization in the platform 's code . While these flaws may only originally result in information disclosure and may be low risk , they can act as a pathway to a more serious remote code execution attack . The security researcher saysVulnerability-related.DiscoverVulnerabilitythe core vulnerability , which is yet to receive a CVEVulnerability-related.DiscoverVulnerabilitynumber , is within the wp_get_attachment_thumb_file function in /wpincludes/post.php and when attackers gain control of a parameter used in the `` file_exists '' call , '' the bug can be triggered . Unserialization occurs when serialized variables are converted back into PHP values . When autoloading is in place , this can result in code being loaded and executed , an avenue attackers may exploit in order to compromise PHP-based frameworks . `` Unserialization of attacker-controlled data is a known critical vulnerability , potentially resulting in the execution of malicious code , '' the company says . The issue of unserialization was first uncoveredVulnerability-related.DiscoverVulnerabilityback in 2009 , and since then , vulnerabilities have been recognizedVulnerability-related.DiscoverVulnerabilityin which the integrity of PHP systems can be compromised , such as CVE-2017-12934 , CVE-2017-12933 , and CVE-2017- 12932 . The WordPress content management system ( CMS ) is used by millions of webmasters to manage domains , which means the vulnerability potentially has a vast victim pool should the flaw being exploitedVulnerability-related.DiscoverVulnerabilityin the wild . `` I 've highlighted that the unserialization is exposed to a lot of vulnerabilities that might have previously been considered quite low-risk , '' Thomas explainde . `` Issues which they might have thought were fixedVulnerability-related.PatchVulnerabilitywith a configuration change or had been considered quite minor previously might need to be reevaluated in the light of the attacks I demonstrated . '' According to Secarma , the CMS provider was made awareVulnerability-related.DiscoverVulnerabilityof the security issue in February 2017 , but `` is yet to take action . '' TechRepublic : The need for speed : Why you should optimize your CMS Technical details have been provided in a white paper ( .PDF ) . `` This research continues a worrying recent trend , in demonstrating that object ( un ) serialization is an integral part of several modern languages , '' Thomas said . `` We must constantly be aware of the security impact of such mechanisms being exposed to attackers . '' No reports have been received which suggest the exploit is being actively used in the wild . The vulnerability was originally reportedVulnerability-related.DiscoverVulnerabilitythrough the WordPress HackerOne bug bounty program last year . The issue was confirmedVulnerability-related.DiscoverVulnerabilityafter several days and Thomas was credited for his findings . However , a Secarma spokesperson told ZDNet that while there was `` some attempt to fixVulnerability-related.PatchVulnerabilitythe issue '' in May 2017 , this did not addressVulnerability-related.PatchVulnerabilitythe problem . `` Communication then went dead for a number of months and has only recently begun again , '' the spokesperson added . ZDNet has reached out to WordPress and will update if we hear back .
An unpatched vulnerability in the Magento e-commerce platform could allow hackers to upload and execute malicious code on web servers that host online shops . The flaw was discoveredVulnerability-related.DiscoverVulnerabilityby researchers from security consultancy DefenseCode and is located inVulnerability-related.DiscoverVulnerabilitya feature that retrieves preview images for videos hosted on Vimeo . Such videos can be added to product listings in Magento . The DefenseCode researchers determined that if the image URL points to a different file , for example a PHP script , Magento will download the file in order to validate it . If the file is not an image , the platform will return a `` Disallowed file type '' error , but wo n't actually remove it from the server . An attacker with access to exploit this flaw could achieve remote code execution by first tricking Magento to download an .htaccess configuration file that enables PHP execution inside the download directory and then downloading the malicious PHP file itself . Once on the server , the PHP script can act as a backdoor and can be accessed from an external location by pointing the browser to it . For example , attackers could use it to browse the server directories and read the database password from Magento 's configuration file . This can expose customer information stored in the database , which in the case of online shops , can be very sensitive . The only limitation is that this vulnerability can not be exploitedVulnerability-related.DiscoverVulnerabilitydirectly because the video-linking functionality requires authentication . This means attackers need to have access to an account on the targeted website , but this can be a lower-privileged user and not necessarily an administrator . The authentication obstacle can also be easily overcome if the website does n't have the `` Add Secret Key to URLs '' option turned on . This option is intended to prevent cross-site request forgery ( CSRF ) attacks and is enabled by default . CSRF is an attack technique that involves forcing a user ’ s browser to perform an unauthorized request on a website when visiting a different one . `` The attack can be constructed as simple as < img src=… in an email or a public message board , which will automatically trigger the arbitrary file upload if a user is currently logged into Magento , '' the DefenseCode researchers said in an advisory . `` An attacker can also entice the user to open a CSRF link using social engineering . '' This means that by simply clicking on a link in an email or by visiting a specifically crafted web page , users who have active Magento sessions in their browser might have their accounts abused to compromise websites . The DefenseCode researchers claimVulnerability-related.DiscoverVulnerabilitythat they 've reportedVulnerability-related.DiscoverVulnerabilitythese issues to the Magento developers back in November , but received no information regarding patching plansVulnerability-related.PatchVulnerabilitysince then . Several versions of the Magento Community Edition ( CE ) have been released since November , the most recent one being 2.1.6 on Tuesday . According to DefenseCode , all Magento CE versions continue to be vulnerableVulnerability-related.DiscoverVulnerability, which is what prompted them to go publicVulnerability-related.DiscoverVulnerabilityabout the flaw . “ We have been actively investigatingVulnerability-related.DiscoverVulnerabilitythe root cause of the reported issue and are not aware of any attacks in the wild , ” Magento , the company that oversees development of the e-commerce platform , said in an emailed statement . “ We will be addressingVulnerability-related.PatchVulnerabilitythe issue in our next patch release and continue to consistently work to improve our assurance processes. ” `` All users are strongly advised to enforce the use of 'Add Secret Key to URLs ' which mitigates the CSRF attack vector , '' the DefenseCode researchers said . `` To prevent remote code execution through arbitrary file upload the server should be configured to disallow .htaccess files in affected directories . '' Magento is used by over 250,000 online retailers , making it an attractive target for hackers . Last year , researchers found thousands of Magento-based online shops that had been compromisedAttack.Databreachand infected with malicious code that skimmedAttack.Databreachpayment card details .
Security researchers from Neseso are sounding the alarm on a vulnerability they 've discoveredVulnerability-related.DiscoverVulnerabilityin Samsung smart TVs that Samsung declined to fixVulnerability-related.PatchVulnerability. The security flaw affectsVulnerability-related.DiscoverVulnerabilityWi-Fi Direct , a Wi-Fi standard that enables devices to connect with each other without requiring a wireless access point . Smasung uses Wi-Fi Direct with its smart TVs to allow TV owners to connect to the TV via their phones , laptops , or tablets , directly , and not through the local access point . Neseso researchers claimVulnerability-related.DiscoverVulnerabilitythat Samsung has failedVulnerability-related.DiscoverVulnerabilityin the implementation of this standard , as Samsung TVs only use MAC addresses to authenticate users . Other vendors use more solid authentication systems based on a Push-Button or PIN . Because anyone can sniff and spoof MAC addresses , this vulnerability opens the user 's TV to getting hacked by anyone in the range of the TV 's Wi-Fi Direct coverage . `` Once connected , the attacker has access to all the services provided by the TV , such as remote control service or DNLA screen mirroring , '' Neseso researchers wrote in their report . The dangers are palpable for companies , as most have smart TVs in their offices , employee lounges , customer waiting rooms , or board rooms . Worse is that the Samsung smart TV Wi-Fi Direct feature is enabled by default every time the device boots up . Users are notified on screen when a whitelisted device connects to the TV via Wi-Fi Direct , but those warnings could be misinterpreted by TV owners , or missed altogether if nobody 's watching the TV . Contacted by Neseso in mid-March , Samsung answered it does n't view this feature as a security risk and declined to provideVulnerability-related.PatchVulnerabilitya firmware update , telling Neseso they do n't view this issue as a `` security threat . '' Researchers tested their attack on Samsung UN32J5500 Firmware version 1480 , but say that other versions are most likely vulnerableVulnerability-related.DiscoverVulnerabilityas well . There is currently no workaround for protecting against attacks via Wi-Fi Direct except turning off the feature every time you boot/reboot your device . Earlier this month , at the Security Analyst Summit 2017 , security expert Amihai Neiderman disclosedVulnerability-related.DiscoverVulnerabilityabout the presence of 40 zero-day vulnerabilities in Tizen , the operating system that runs on Samsung smart TVs . The flaws were all unpatchedVulnerability-related.PatchVulnerabilityat the time they were reportedVulnerability-related.DiscoverVulnerability.
Hundreds of thousands of internet gateway devices around the world , primarily residential cable modems , are vulnerableVulnerability-related.DiscoverVulnerabilityto hacking because of a serious weakness in their Simple Network Management Protocol implementation . SNMP is used for automated network device identification , monitoring and remote configuration . It is supported and enabled by default in many devices , including servers , printers , networking hubs , switches and routers . Independent researchers Ezequiel Fernandez and Bertin Bervis recently foundVulnerability-related.DiscoverVulnerabilitya way to bypass SNMP authentication on 78 models of cable modems that ISPs from around the world have provided to their customers . Their internet scans revealedVulnerability-related.DiscoverVulnerabilityhundreds of thousands of devices whose configurations could be changed remotely through the SNMP weakness that they foundVulnerability-related.DiscoverVulnerabilityand dubbed StringBleed . The leakingAttack.Databreachof sensitive configuration data through the default `` public '' SNMP community string is a known problem that has affectedVulnerability-related.DiscoverVulnerabilitymany devices over the years . The two researchers first locatedVulnerability-related.DiscoverVulnerabilitya small number of vulnerable devices , including the Cisco DPC3928SL cable modem that 's now part of Technicolor 's product portfolio following the company 's acquisition of Cisco 's Connected Devices division in 2015 . The researchers claimVulnerability-related.DiscoverVulnerabilitythat when they reportedVulnerability-related.DiscoverVulnerabilitythe issue to Technicolor , the company told them that it was the result of an access misconfiguration by a single ISP in Mexico rather than a problem with the device itself . This prompted the researchers to perform a wider internet scan that resulted in the discoveryVulnerability-related.DiscoverVulnerabilityof 78 vulnerable cable modem models from 19 manufacturers , including Cisco , Technicolor , Motorola , D-Link and Thomson . Regardless of the cause , the problem is serious , as attackers could exploit this flaw to extract administrative and Wi-Fi passwords or to hijack devices by modifying their configurations . There 's not much that users can do if their ISP supplied them with a vulnerable device , other than ask for a different model or install their own modem . Unfortunately , not many ISPs allow their residential customers to use their own gateway devices , because they want uniformity and remote management capabilities on their networks . Determining if a particular device is vulnerableVulnerability-related.DiscoverVulnerabilityto this issue is possible , but requires a bit of work . An online port scanner like ShieldsUp can be used to determine if the device responds to SNMP requests over its public IP address . If SNMP is open , a different online tool can be used to check if the device 's SNMP server returns valid responses when the `` public '' or random community strings are used . At the very least this would indicate an information leak problem .