article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type. ” reads the analysis published by ESET. ” reads the analysis published by ESET.

Metadata 121
article thumbnail

CDRThief Linux malware steals VoIP metadata from Linux softswitches

Security Affairs

CDRThief specifically targets internal MySQL databases running in the devices to steal call metadata, including IP addresses of the callers, phone numbers, start time and duration of the call, call route, and call type. ” reads the analysis published by ESET. ” reads the analysis published by ESET.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Evaluating the NSA's Telephony Metadata Program

Schneier on Security

Interesting analysis: " Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Act's Metadata Program be Extended? " Abstract: The telephony metadata program which was authorized under Section 215 of the PATRIOT Act, remains one of the most controversial programs launched by the U.S.

article thumbnail

8Base ransomware operators use a new variant of the Phobos ransomware

Security Affairs

Phobos variants are usually distributed by the SmokeLoader , but in 8Base campaigns, it has the ransomware component embedded in its encrypted payloads. 8base” file extension for encrypted documents, a circumstance that suggested a possible link to the 8Base group or the use of the same code-base for their ransomware.

article thumbnail

Now Abyss Locker also targets VMware ESXi servers

Security Affairs

The analysis of the encryptor code revealed that use of the ‘esxcli’ command-line VMware ESXi management tool enumerate virtual machines and terminate them. Once the VM has been terminated, the malicious code can encrypt virtual disks (.vmdk), vmdk), metadata (.vmsd), vmsd), and snapshots (.vmsn).

article thumbnail

National Academy of Sciences Encryption Study

Data Matters

After supporters and opponents of mandated government access to encrypted communications publicly feuded for much of 2016, reprising arguments they’ve had since at least the days of the “Clipper Chip,” these “encryption debates” seemed to quiet down for much of last year. See, e.g., here.) device locking, secure messaging, etc.);

article thumbnail

Facebook Announces Messenger Security Features that Don't Compromise Privacy

Schneier on Security

The feature, which Facebook started rolling out on Android in March and is now bringing to iOS, uses machine learning analysis of communications across Facebook Messenger's billion-plus users to identify shady behaviors. Facebook has said it will eventually roll out that end-to-end encryption to all Messenger chats by default.