Skip to main content

Posts

Showing posts from December 28, 2019

Unpatched Dropbox for Windows Zero-Day Bug Let Hackers get SYSTEM Privileges

A zero-day vulnerability in Dropbox for Windows allows attackers to escalate privileges from simple windows users privilege to the reserved SYSTEM privilege. The vulnerability resides in the  DropBoxUpdater service , which is responsible for keeping the client application up to date. Dropbox Updater Vulnerability The vulnerability was discovered by security researcher Decoder and  Chris Danieli  and they have created a  PoC  to test the vulnerability. The DropBoxUpdater is the component of the Dropbox Client Software suite, the updater installed as a service and keeps 2 scheduled tasks running with SYSTEM permissions. Dropboxupdate writes the log files in the directory “c:\ProgramData\Dropbox\Update\Log”, any users can access the directories or to add, delete the files. Another notable thing is that SetSecurity call made through SYSTEM privileges on the files, this allows an attacker to exploit via  hardlink . “But we have a problem here, we have to “guess” the l

Worst Passwords Used in 2019 – Here is the List of Top 50 Common Passwords

Despite the importance of setting strong passwords, users continue to setup week passwords which are easy to guess for an attacker. A strong password is key to protect your digital assets. Here is the list of  Worst Passwords 2019 Memorizing strong separate passwords for each account is also a difficult task,  password managers  are the solution for this problem. Worst Passwords 2019 Nordpass  compiled  a list of 200 most popular passwords that were leaked in data breaches just this year. The analysis shows that still people using weak passwords. The bad news is that when compared to  2018 leaked passwords  nothing changed, “12345”, “123456” and “123456789” remains at the top spot. Following that “test1” and “password” remain popular. If you have a weak password then it is a cakewalk for hackers, they can gain access to your account easily by using brute force techniques. A strong password should have at least six characters that include a combination of upper and lower

4.6 Million Android Devices Affected by 100+ Malicious Apps on Google Play

Researchers discovered over 100 malicious apps from Google play store that downloaded by more than 4.6 android users around the globe. Most of the malicious apps are commits ad fraud, and the app malicious apps are using the same common code package dubbed “Soraka” ( com.android.sorakalibrary.* ). “GBHackers on Security” reported  several adware incidents  in the past few months, and it’s rapidly growing to exclusively target the Android users to generate millions of dollars revenue. Malware, Spyware, and Adware can accompany them, become a parasite in user’s systems resulting in unnecessary disruptions, and breaches of the personal data in your Android devices. In addition to the Soraka code package, Researchers also discovered, in some of the apps, a variant with similar functionality which we dubbed “Sogo” ( com.android.sogolibrary.* ): Some of The Malicious Apps Activities An app called “ Best Fortune Explorer App ” published under the publisher JavierGentry80 comm