{"id":4875,"date":"2014-05-23T12:30:35","date_gmt":"2014-05-23T16:30:35","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=4875"},"modified":"2020-02-27T03:42:56","modified_gmt":"2020-02-26T16:42:56","slug":"ebay_hacker_ie_vulnerable","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/ebay_hacker_ie_vulnerable\/4875\/","title":{"rendered":"A Week in the News: eBay Hacked, Internet Explorer Vulnerable"},"content":{"rendered":"<p>This week wasn\u2019t an overly busy one in terms of security news. However, yesterday\u2019s announcement that attackers breached a server containing user passwords at the online retail and auction giant eBay has to be the biggest story of the week. Closely behind that \u2013 in terms of importance \u2013 was the emergence of yet another zero-day in Microsoft\u2019s very widely used Internet Explorer Browser. Stepping away from bad news, Samsung is going beyond fingerprints, identifying new ways of biometric authentication. And, as always, we have some patches to mention, if only in passing.<\/p>\n<p style=\"text-align: center\">\n<\/p><p><b>eBay Compromised<\/b><\/p>\n<p>eBay announced yesterday through its corporate website (eBay Inc.) that <a href=\"https:\/\/www.kaspersky.com.au\/blog\/ebay-data-breach-exposes-passwords\/\" target=\"_blank\" rel=\"noopener\">attackers compromised a database<\/a> containing customer names, encrypted passwords, email addresses, physical addresses, phone numbers, and dates of birth. Because encrypted passwords were stored in the breached server, eBay will be forcing users to change passwords in the coming days and weeks. When and if you go to change your eBay password, make sure you navigate directly to the eBay website rather than following email or social media links.<\/p>\n<p>The reason you don\u2019t want to follow links from email or social sites is that the sensitive information stored on the server could give attackers enough information for them to perform phishing attacks. Attackers often use this sort of information to craft phishing emails that claim to come from eBay (or other legitimate online services). These emails generally present users with links leading to legitimate looking malicious sites. The purpose of those sites is to trick users into handing over login credentials.<\/p>\n<p>As always, if you\u2019ve been sharing passwords, you will need to change your passwords to any online accounts on which you may have used the same password that you used to lock your eBay account.<\/p>\n<p>Interestingly enough, this incident follows news from earlier in the week that retailers have decided to forge <a href=\"https:\/\/threatpost.com\/retailers-form-isac-to-share-threat-data\/106144\" target=\"_blank\" rel=\"noopener nofollow\">threat-data sharing partnerships<\/a> in the wake of the Target data breach. In other words, they\u2019re going to talk to each other about the kinds of attacks they face so that \u2013 collectively \u2013 retailers can better protect themselves. Later in the week, a study came out suggesting that <a href=\"https:\/\/threatpost.com\/companies-better-at-containing-data-breaches\/106192\" target=\"_blank\" rel=\"noopener nofollow\">companies are getting better at containing data breaches<\/a>. It will be interesting to see if the scope of the eBay breach, which was enabled by some compromised employee credentials, ends up validating or contradicting that point.<\/p>\n<p><b>IE Zero-Day<\/b><\/p>\n<p>The good news in this situation is that the flaw only affects IE 8, an old version of the browser. The bad news is that <a href=\"https:\/\/threatpost.com\/microsoft-working-on-patch-for-ie-8-zero-day\/106247\" target=\"_blank\" rel=\"noopener nofollow\">Microsoft is not sure when there will be an update available<\/a> the mitigates this issue. However, the computer giant has acknowledged the serious vulnerability and is working on a fix for it.<\/p>\n<p>Without getting too technical, but probably still getting more technical than is necessary, <a href=\"https:\/\/threatpost.com\/another-internet-explorer-zero-day-surfaces\/106223\" target=\"_blank\" rel=\"noopener nofollow\">the Internet Explorer 8 zero day<\/a> could enable an attacker to run malicious codes on vulnerable machines using an attack called a \u2018drive-by download\u2019 or by planting malicious attachments in email messages. A drive-by download is essentially a sort of attack where the attacker embeds malware on a website. When a user happens upon that website using a vulnerable browser, that user\u2019s machine becomes infected with malware.<\/p>\n<p>What can normal computer users do about this other than update to Internet Explorer\u2019s more recent version 10? Not a whole lot; three things, really: Be careful where you browse, be careful with email attachments, and make sure you install the next Microsoft security patches as soon as they come along (if you get your updates automatically then you don\u2019t need to worry about this last bit). In fact, this advice should just be followed by everyone.<\/p>\n<p><b>Iris Recognition<\/b><\/p>\n<p>Not to let gloom and doom rule the weekly recap, Samsung announced this week that it plans to incorporate <a href=\"https:\/\/threatpost.com\/samsung-eyeing-iris-recognition-for-new-phones\/106222\" target=\"_blank\" rel=\"noopener nofollow\">biometric sensors<\/a> such as eye scanners into more of its products in the future. The company claims these features would even be available on their less expensive offerings.<\/p>\n<p>The move would bolster security on Samsung devices and reportedly could wind up tying into in the company\u2019s security-conscious <a href=\"https:\/\/www.kaspersky.com.au\/blog\/understanding-samsung-knox\/\" target=\"_blank\" rel=\"noopener\">Knox<\/a> system at some point.<\/p>\n<p>It will be interesting to see whether iris scanning is more or less resilient to potential attack than <a href=\"https:\/\/www.kaspersky.com.au\/blog\/fingerprint-scanner-iphone-5s\/\" target=\"_blank\" rel=\"noopener\">fingerprint authentication<\/a>.<\/p>\n<p><b>Breaking<\/b><\/p>\n<p>As I write, reports began emerging that the Android Outlook application contains an encryption issue that could expose user emails and the attachments therein. <a href=\"https:\/\/threatpost.com\/android-outlook-app-could-expose-emails-attachments\/106250\" target=\"_blank\" rel=\"noopener nofollow\">Read more here<\/a>, and we\u2019ll surely discuss this issue in the monthly news podcast.<\/p>\n<p><b>Patches Per Usual<\/b><\/p>\n<p>As always, we have some patches you should look out for. This week it\u2019s Google, which fixed 23 security vulnerabilities in Chrome, including three high-risk flaws. So, if you use Chrome and don\u2019t let the browser install updates automatically then you should go ahead and install these updates as soon as possible.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>eBay user passwords compromised in data breach; another Internet Explorer zero-day for Microsoft; Samsung eyes iris authentication; and patches from Chrome.<\/p>\n","protected":false},"author":42,"featured_media":4876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1232,673,671,674,25,457,636],"class_list":{"0":"post-4875","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-biometrics","9":"tag-chrome-update","10":"tag-ebay-data-breach","11":"tag-fingerprint","12":"tag-internet-explorer","13":"tag-samsung","14":"tag-zero-days"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ebay_hacker_ie_vulnerable\/4875\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ebay_hacker_ie_vulnerable\/3502\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ebay_hacker_ie_vulnerable\/3391\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ebay_hacker_ie_vulnerable\/3817\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ebay_hacker_ie_vulnerable\/3971\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ebay_hacker_ie_vulnerable\/4875\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ebay_hacker_ie_vulnerable\/3742\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ebay_hacker_ie_vulnerable\/4875\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/biometrics\/","name":"biometrics"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=4875"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4875\/revisions"}],"predecessor-version":[{"id":26329,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/4875\/revisions\/26329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/4876"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=4875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=4875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=4875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}