ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

In this latest In Case You Missed It column, we look at the top stories on SC this week, including the discovery of a new OpenSSL bug and super-stealthy denial of service attack.

ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins
ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

OpenSSL patches 'high severity' bug - but it's no Heartbleed

The OpenSSL group has patched numerous flaws with the release of OpenSSL versions 1.0.2a, 1.0.1m, 1.0.0r and 0.9.8zf, including a 'high severity' bug which, fortunately, is not as serious as Heartbleed or Poodle.

In an advisory notice published on Thursday, the group issued 14 security fixes including two rated as ‘high priority', nine as ‘moderate' and three as ‘low priority'.

The two urgent fixes resolve around a revised fix (CVE-2015-0204) for the Freak SSL flaw, which is more prominent than first thought, as well as a new OpenSSL bug (CVE-2015-0291) which could potentially be exploited by attackers launching DoS attacks to make the servers crash. This was, however, not as bad as had been predicted in the days leading up to the release of the fixes.

Hackers route via Tor for stealthy 'slow-death' DoS attacks

Vigilante hactivists have been taking down pornography, Jihadi and other websites by using a new type of "slow-death" Denial-of-Service (DoS) attack that is virtually undetectable, bypassing some leading security solutions.

Jonathan Davies, director of engineering at Pervade Software, revealed to SCMagazineUK.com how his company had been testing layer 7 DoS techniques in a lab environment prior to noting that hackers named ‘Tor Reaper' and ‘Bitcoin Baron' were using a similar method to hit numerous sites, including child and animal pornography sites, one of which had a membership of more than 39,000 users.

Speaking on the attack, otherwise known as ‘darkreaper',  Davies detailed how DoS and DDoS attacks have developed from the early layer four attacks to layer seven, with the latest technique seeing the Tor Reaper, Bitcoin Baron and others route attacks through the Tor network to hit Apache and IIS servers, both on the Tor network (.onion sites) and the main web.

Tor darknet closes, thieves make off with millions in Bitcoin

Evolution, a drugs and criminal market hosted on the Tor anonymity network, has been closed, with its owners suspected of stealing up to £10 million worth of Bitcoins as part of an exit strategy.

Evolution was founded on January 14 and quickly became a haven for drug lords, gangs, criminals and hackers-for-hire in the wake of the Silk Road shutdown in 2013, and the Silk Road 2.0 takedown last year.

However, it emerged on Tuesday that the site has been closed down with many speculating that the two administrators – bearing the monikers ‘Kimble' and ‘Verto' - have upped and left, stealing around £8 million to £10 million worth of Bitcoins in the process.

Wi-Fi car updates pose security risk

Security concerns have been raised about Wi-Fi updates to car software following Ford Motors' announcement on Tuesday this week that it will use Microsoft to provide cloud-based network services for remote wireless software updates to its cars, including display screen graphics and voice-recognition software.

Ford owners will be asked to give permission for their car to continually monitor the Microsoft Azure cloud service where any software updates will be hosted on Microsoft's global network of data centres. When the vehicle is connected to a Wi-Fi network, any new software would install itself automatically, and notify the driver the next time they start their car – avoiding the need to recall cars for patching or updating.

Ford's cloud connectivity starts its roll-out this year with its Sync3 multimedia system, while electric-car maker Tesla Motors Inc's Model S has already embedded wireless connection to perform updates, and General Motors Co intends to launch 30 plus vehicles with built-in LTE 4G broadband connections.

Firewalls 20 years on: Gil Shwed interview

Mobiles and the cloud may have subverted the idea of perimeter protection, but some 20 years after launching FireWall-1, Check Point founder Gil Shwed tells SC that there's still a security role for the Firewall.

Industry pioneer Gil Shwed got into computers early, aged 10, and by 24 the company he founded, Check Point, launched its industry-changing first product, FireWall-1. Twenty years later, with mobiles and the cloud subverting barrier approaches, and decade-old malware found on hardware, SCMagazineUK.com's Tony Morbin asks Shwed, are firewalls are still working?

SC Webcasts UK

Sign up to our newsletters

FOLLOW US