Securing SSH

Print Friendly, PDF & Email

SSH is a software package that enables system administrators to securely  administer their systems from a remote network with user authentication, commands, output, and file transfers being encrypted to protect against attacks in the network. While it is much more secure than common login services such as telnet, ftp, rlogin, rsh, and rcp, its  default installation isn’t hardened. This advisory covers some of the hardening measures you can take to secure ssh. For details visit: Securing SSH

 The  memcached Reflection/Amplification DDoS Attack

Print Friendly, PDF & Email

Description Memcache is temporary data storage service used to  improve the overall performance of the website by storing chunks of data in a cache. If misconfigured memcached on port 11211 UDP & TCP is used to cause reflection DOS attack (send a spoofed packet to a device and have it reflected back). Memcached allows access to the data stored in the cache without any form of authentication and the attacker can easily access data in the corresponding caches and even modify them. How to Fix: Bind the Memcache server to a particular Source IP Only. Don’t expose this service in the […]

Safer Internet Day 2018

Print Friendly, PDF & Email

Tuesday 6th of February 2018 is globally marked as Safer Internet Day 2018 with the theme: ” Create, Connect and Share Respect: A better Internet starts with you“ . Every individual internet user has a role to play in making the internet a safer space. BtCIRT encourages  everyone to review following advisories at BtCIRT website and remember simple steps you as an individual cyber citizen can take to secure internet world. Protecting-Privacy-on-the-internet Browser Security Protection from Phishing Mobile Security We also recommend you to visit  childnet-safer-internet-day and https://www.saferinternet.org.uk/safer-internet-day/2018 to gain insight on how to be safer online.

Money Muling

Print Friendly, PDF & Email

Money Mules are people who consciously or innocently  serve as intermediaries  to move stolen/illegal money using  their bank account(s) on behalf of criminals/fraudsters. While we have known of only rare cases in Bhutan, lots of these are happening around the globe. How does it happen: The criminal will get in touch with the victim via email, instant messaging apps, job website, blogs or even phone calls. They will  convince the victim into providing their bank account details  with either an attractive job , commissions or by seeking sympathy. The Fraudsters will transfer an amount into the victims account. Then the […]

Meltdown and Spectre Vulnerability

Print Friendly, PDF & Email

A vulnerability named Meltdown and Spectre is known to affect modern computer processors, whether it is computers, routers,firewalls, servers or mobile devices and its  exploitation would allow an attacker to gain access to confidential information such a system password. Systems Affected: While Meltdown vulnerability affects operating systems running Intel CPUs only, the Spectre vulnerabilities affect operating systems running Intel, AMD and ARM CPUs. Mitigation: Please visit following sources for the list of vendors who resolved the vulnerabilities and apply necessary patches: https://www.us-cert.gov/ncas/alerts/TA18-004A https://www.thaicert.or.th/alerts/user/2018/al2018us001.html Patch and be protected