'

Zero Day Weekly: Superfish attacks, FBI GameoverZeus bounty, Komodia in Lavasoft

A collection of notable security news items for the week ending February 27, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.

Zero Day Weekly

Welcome to Zero Day's Week In Security, our roundup of notable security news items for the week ending February 27, 2015. Covers enterprise, controversies, reports and more.

  • Meanwhile, Superfish and other software containing the same HTTPS-breaking code (Komodia) may have posed more than a merely theoretical danger to Internet users. Researchers have uncovered evidence suggesting the critical weakness may have been exploited against real people visiting real sites, including Gmail, Amazon, eBay, Twitter, and Gpg4Win.org, to name just a few.
  • Al-Jazeera has obtained hundreds of confidential "spy cables" from some of the world's top intelligence agencies (as recent as 2014), in what the news channel is calling "the largest intelligence leak since Snowden." Documents from Britain's MI6 and Israel's Mossad are included, along with the Russian FSB, South African SSA and the Australian ASIO. (No American intelligence agencies appear to be included.) Al-Jazeera is publishing the leaks in conjunction with the Guardian, promising that they will provide "an unprecedented insight into operational dealings of the shadowy and highly politicised realm of global espionage."
  • The Ramnit botnet has been disrupted in a joint operation of law enforcement agencies led by Europol. Europol's European Cybercrime Centre (EC3) and law enforcement agencies from Germany, Italy, the Netherlands, and the United Kingdom have completed an operation to take down the botnet, which is believed to have infected 3.2 million computers around the globe. The successful project, revealed on Tuesday by Europol, involved taking down the botnet with the help of Microsoft, Symantec and AnubisNetworks.
  • D-Link remote access vulnerabilities remain unpatched: D-Link routers have several unpatched vulnerabilities, the worst of which could allow an attacker to gain total control over a device, according to a systems engineer in Canada.