Certificates employed in malware campaign
Cyber criminals are using free certificates in order to conduct malvertising attacks, says a recent Trend Micro report.
Encryption expert Let’s Encrypt has seen its charity been subject to abuse, with hackers employing this latest tactic to trick unsuspecting users.
Trend Micro identified malicious websites using a Let’s Encrypt certificate in December, with web traffic coming from Japan. Micro believes that the con is only a part of a larger one that it discovered in September, where 3,000 websites in Japan were affected and close to 500,000 users were subjected to the campaign.
This particular con results in the users being a victim of the Angler Exploit Kit, well-known malware named after an ugly fish.
Trend Micro I.T. security consultant Bharat Mistry told SCMagazineUK.com how the certificates could be distributed while undetected. Mistry said:
“The hackers created a sub-domain for which they requested a new Lets Encrypt certificate – and because there is no stringent checking of the certificate requester, Lets Encrypt has generated and supplied a new certificate.”
The subdomain certificate is then employed in encrypting any traffic between the online user and the ad.
Both individual users and businesses need to be savvier in the current climate where we are seeing more advanced campaigns attempting to mislead users. Businesses, at least, are in a position to do more about it by posting information security jobs to professionals trained in recognising and combatting such attacks. With many firms maintaining large files of user data, they would be encouraged to take such action.
Salary: $85,000.00 to $105,000.00 per year
Location: New York, NY
Post Date: January 15, 2016
Employment Type: Full Time
Industry: Professional Services
Job Order Number: 04860-9832769
****For expedient consideration, candidates should email their resumes to Adam Miller at [email protected]****
Due to growth, our global IT security practice is looking for multiple senior IT security consultants throughout North America. Successful consultants will have a clearly defined career progression, exceptional compensation and benefits, and the opportunity to use cutting edge technology to protect the information of some of the world’s most reputable companies.
ABOUT THE ROLE:
The Senior Consultant has primary responsibility for direct supervision of Consultants in developing and executing Information Security project work plans. The Senior Consultant has direct, client-facing engagement responsibilities. Serving as both role model and trainer, the Senior Consultant demonstrates the attributes of excellent client service and assists team members in developing technical and professional competency. The Senior Consultant learns to identify areas of IT risk in the client environment and opportunities to help them to improve information security, and business processes.
GENERAL KNOWLEDGE AND SKILLS:
Prior project management and supervisory skills ideal.
Ability to work in a team environment and foster client relationships.
Understanding of the importance of business ethics.
Sound job administration skills.
Above-average written and verbal communication skills, including documentation of findings and recommendations.
Ability to handle highly confidential information in a strictly professional manner.
Ability to maintain professional demeanor in times of high stress.
Apply understanding of business processes and technical skills to successful completion of projects.
Develop understanding of project requirements and clients business.
TECHNICAL KNOWLEDGE AND SKILLS:
Proficiency in utilization of information security tools such as Nessus, Kismet, Airsnort, NMAP, Ethereal, WebInspect and Nikto, and manual techniques to exploit vulnerabilities in the OWASP top 10 including but not limited to cross-site scripting, SQL injections, session hi-jacking and buffer overflows to obtain controlled access to target systems.
Ability to perform network traffic forensic analysis, utilizing packet capturing software, to isolate malicious network behavior, inappropriate network use or identification of insecure network protocols.
3+ years hands on experience in one or more of the following Operating Systems: Windows Server 2012/200x, Linux and UNIX.
3+ years practical experience in TCP/IP Networking.
A diverse skill base in both Information Systems and Information Security which address organizational structure and administration practices, system development and maintenance procedures, system software and hardware controls, security and access controls, computer operations, environmental protection and detection, and backup and recovery procedures.
Knowledge of Industry Standards, e.g., ISO 2700x series, NIST Publications and other Industry Related Security Standards
Attack and Penetration experience in testing of Internet infrastructure and Web-based applications utilizing manual and automated tools.
Knowledge of information system architecture and security controls (i.e. firewall and border router configurations, operating systems configurations, wireless architectures, databases, specialized appliances and information security policies and procedures).
EDUCATION AND CREDENTIALS:
+ Bachelors degree in a relevant discipline (Computer Information Systems, Information System Technologies, Management Information Systems).
Minimum GPA 3.0.
+ 3+ years in a related field, preferably in professional services and/or industry.
+ Professional Certification such as CISSP, CISM, GSEC, GIAC, CEH, CPT are strongly preferred.
With more than 100 locations worldwide, Robert Half Technology is a leading provider of IT professionals on a project and full-time basis for initiatives ranging from web development and systems integration to network security and technical support. Through our alliances with industry-leading organizations such as HDI® and the Microsoft® Partner program, we have access to client companies that other staffing firms don’t. In addition to our free job search services, we provide our candidates with access to free online technical training and a competitive benefits and compensation package.
In 2015, our company once again was named to FORTUNE® magazine’s list of “World’s Most Admired Companies.” (March 1, 2015).
Apply for this job now or contact our branch office at 1.800.793.5533 to learn more about this position.
All applicants applying for U.S. job openings must be authorized to work in the United States. All applicants applying for Canadian job openings must be authorized to work in Canada.
Equal Opportunity Employer M/F/Disability/Vet
200 E Campus View
Columbus, OH 43235