Hackin9

InfoSec News

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Twin probes into possible irregularities in the awarding of contracts worth hundreds of thousands of dollars during the tenure of Regina Dugan at the Defense Advanced Research Projects Agency (DARPA) will continue even though Dugan has left the agency for a position at Google.
 


Exploit authors sometimes like to be cute:

A Java archive called fun.jar containing an evilcode.class file that runs as an applet of 1x1 pixels size ... well, this can't be anything good. And it indeed isn't. This code snippet was lurking on quite a few web sites over the past days.
Sending fun.jar to Virustotal shows that only 10 of 43 anti-virus tools actually recognize the exploit code, whereas 27/43 recognize the d.exe malware file that the exploit currently downloads and runs.
Evilcode.class exploits the Java Rhino Engine vulnerability (CVE2011-3544), published back in October 2011 and affecting all Java Runtime Engines up to JRE 1.6_27. The exploit still seems to work well enough for the bad guys that they don't see any need to re-tool to newer exploits. In slight modification of Oracle's own words:

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
 
RedHack have been a lot more public in recent weeks and one of the latest attacks is on emniyetyurdu.pol.tr a Turkish based police website which is for "Security General Directorate of Higher Education Student Dormitories." when poorly translated.


 
Google has released Chrome from the penalty box and reinstated the browser's PageRank after a 60-day self-imposed sentence over a rule-breaking marketing campaign.
 
Internet Storm Center Infocon Status