Sep 28, 2018

Daily brief for 2018-09-27

ASIA

  1. APT10 Targeting Japanese Corporations Using Updated TTPs
  2. New Torii Botnet uncovered, more sophisticated than Mirai | Avast
  3. “Disturbing plans” in China revealed by a former Google employee

WORLD

  1. Russians' stealthy 'LoJax' malware can infect on the firmware level
  2. DEF CON report finds decade-old flaw in widely used ballot-counting machine
  3. Russian Cyberspies Use UEFI Rootkit in Attacks
  4. Threat-group Magecart - More Victims
  5. Russian Sednit APT used the first UEFI rootkit of ever in attacks in the wild
  6. GDPR: Data Breach Class Action Lawsuits Come to Europe
  7. SheIn Data Breach Exposed Personal Details 6.4 Million Customers To Hackers
  8. Norwegian state discusses vulnerabilities with IT sector
  9. Seven additional modules make Fancy Bear's VPNFilter malware even more versatile
  10. You should prepare for the next mega data breach
  11. Uber agrees to pay $148 million in massive 2016 data breach settlement
  12. VPNFilter Router Malware Adds 7 New Network Exploitation Modules
  13. “Disturbing plans” in China revealed by a former Google employee

ATTACKS

  1. Hide and Seek (HNS) IoT Botnet targets Android devices with ADB option enabled
  2. Android password managers not as secure as desktop counterparts
  3. Hide and seek Iot botnet updates include new Android ADB exploit
  4. Twitter Bug May Have Exposed Millions of DMs
  5. New "Torii" Botnet's Sophisticated Techniques Set It Apart From Mirai
  6. DDoS attack on education vendor hinders access to districts’ online portals
  7. Boffins bypass password protection with pilfering by phony programs
  8. GDPR: Data Breach Class Action Lawsuits Come to Europe
  9. Fancy Bear LoJax campaign reveals first documented use of UEFI rootkit in the wild
  10. New Torii Botnet uncovered, more sophisticated than Mirai | Avast
  11. SheIn Data Breach Exposed Personal Details 6.4 Million Customers To Hackers
  12. Hide and seek Iot botnet updates include new Android ADB exploit
  13. United Nations data found exposed on web: researcher
  14. New GootKit Campaigns Target European Banks with Reconnaissance Attacks
  15. Uber to Pay $148 Million as a Settlement for Data Breach Cover
  16. Uber fined $148m for data breach cover-up
  17. New "Torii" Botnet's Sophisticated Techniques Set It Apart From Mirai
  18. You should prepare for the next mega data breach
  19. Uber agrees to pay $148 million in massive 2016 data breach settlement
  20. Are long passphrases the answer to password problems?
  21. Chrome 70 will resolve cookies and login privacy issues
  22. Endace launches petabyte network recording appliance

THREATS

  1. APT Group Uses Dangerous LoJax Malware That Can Survive After OS Re-installation and Hard Disk Replacement
  2. Russians' stealthy 'LoJax' malware can infect on the firmware level
  3. CCSP Exam Details and Process
  4. CCSP: Overview of Domains
  5. Ransomware Attack Hits Port of San Diego
  6. The PowerShell Boogeyman: How to Defend Against Malicious PowerShell Attacks
  7. Chronicle Unveils VirusTotal Enterprise
  8. Crooks turn to Delphi packers to evade malware detection
  9. Chronicle announces VirusTotal Enterprise with greater search and analysis capabilities
  10. Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV
  11. Local-Privilege Escalation Flaw in Linux Kernel Allows Root Access
  12. Alphabet launches VirusTotal Enterprise
  13. DEF CON report finds decade-old flaw in widely used ballot-counting machine
  14. Twitter fixes API bug that shared data with wrong developers
  15. Is There Such a Thing as a Malicious PowerShell Command?
  16. New KONNI Malware attacking Eurasia and Southeast Asia
  17. New KONNI Malware attacking Eurasia and Southeast Asia
  18. How to Keep Up Security in a Bug-Infested World
  19. Pirated Game of Thrones episodes most popular TV bait for malware
  20. Seven additional modules make Fancy Bear’s VPNFilter malware even more versatile
  21. Hide and seek Iot botnet updates include new Android ADB exploit
  22. Twitter Bug May Have Exposed Millions of DMs
  23. Russian Cyberspies Use UEFI Rootkit in Attacks
  24. Dirhunt – Search and Analyze Target Domain Directories
  25. Port of San Diego Affected by a Ransomware Attack
  26. Developers focus on wrong open source software vulnerabilities, research says
  27. Phorpiex worm pivots to infect the enterprise with GandCrab ransomware
  28. Security Flaw Found in Apple Mobile Device Enrollment Program
  29. Crooks turn to Delphi packers to evade malware detection
  30. Russian Sednit APT used the first UEFI rootkit of ever in attacks in the wild
  31. LoJax: First-ever UEFI rootkit detected in a cyberattack
  32. DanaBot trojan sets sights on Europe, new features
  33. SC Media September Product Reviews: Threat Intelligence DomainTools Iris Investigation Platform l
  34. #Malware classifcation, which encompasses both the identification and attribution of code, has the power to unlock many clues that aid
  35. New VirusTotal Enterprise Offers Private Graphs, Faster Searches
  36. Alphabet's Chronicle Releases VirusTotal Enterprise
  37. Cisco Releases Alerts for 14 High Severity Bugs
  38. Apple DEP vulnerability lets attackers access orgs’ resources, info
  39. Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now
  40. Malware steals personal information from 6.4M SheIn customers
  41. How automakers are tackling connected vehicle vulnerability management
  42. Malware hits fashion giant SHEIN; 6.42 million online shoppers affected
  43. Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild
  44. Emergence of new ransomware variants feature names of popular politicians
  45. Now that Office 365 has become one of Microsoft's fastest-growing revenue streams, it has become a primary target for #ransomware.
  46. Fancy Bear LoJax campaign reveals first documented use of UEFI rootkit in the wild
  47. Tripwire Patch Priority Index for September 2018
  48. Researchers find vulnerability in Apple's MDM DEP process
  49. GNOME 3.30.1 released: bugfixes
  50. Norwegian state discusses vulnerabilities with IT sector
  51. Seven additional modules make Fancy Bear's VPNFilter malware even more versatile
  52. Hide and seek Iot botnet updates include new Android ADB exploit
  53. Cloudflare Becomes a Registrar, Sells Domains At Cost
  54. APT28 Uses LoJax, First UEFI Rootkit Seen in the Wild
  55. Mutagen Astronomy Linux Kernel vulnerability affects Red Hat, CentOS, and Debian distros
  56. Alphabet's Chronicle Security Business Launches VirusTotal Enterprise
  57. VPNFilter Router Malware Adds 7 New Network Exploitation Modules
  58. Malware in the Cloud: What You Need to Know
  59. KDE Plasma 5.12.7 LTS releases: fix bugs
  60. Discover how Tripwire Malware Detection... - Protects against zero-day exploits and other known threats. - Offers an enterprise view of suspicious malware objects across all monitored systems. - Protects from repeat #malware attacks. Learn more here:
  61. Malware in the Cloud: What You Need to Know
  62. ex-NSA Hacker Discloses macOS Mojave 10.14 Zero-Day Vulnerability

CRIME

  1. Russians' stealthy 'LoJax' malware can infect on the firmware level
  2. Threat-group Magecart - More Victims
  3. New GootKit Campaigns Target European Banks with Reconnaissance Attacks

POLITICS

  1. DEF CON report finds decade-old flaw in widely used ballot-counting machine
  2. Russian Cyberspies Use UEFI Rootkit in Attacks
  3. APT10 Targeting Japanese Corporations Using Updated TTPs
  4. APT28 Uses LoJax, First UEFI Rootkit Seen in the Wild