Sep 21, 2018

Threat report for 2018-09-20

DATA BREACH

  1. 14 million customer records exposed in GovPayNow leak
  2. State Department email breach leaks employee PII
  3. Magecart data breach possibly avoidable -magecart-data-breach-possibly-avoidable/ …
  4. Adams County clerk resigns over role in data breach
  5. ICO to Fine Equifax £500,000 for 2017 Data Breach   via
  6. Pegasus spyware spotted in 45 countries, many with questionable human rights records
  7. State Department: Some Employee Info Possibly Exposed in Security Incident   via
  8. This breach is a great example of how CT logs can be useful as an early indicator of an ongoing attack campaign. Orgs should be monitoring CT for certificates issued to look-alike domains to improve their situational awareness. -magazine.com/news/magecart-skimmed-newegg-cards/ …
  9. Data commissioner fines Equifax £500,000 for US data breach affecting UK customers
  10. Newegg Electronic Retailers Suffered a Data Breach and Hackers Stole Customers Credit Card Data
  11. LG V40 ThinQ Alleged Specifications Sheet Leaked; Reveals 8GB RAM Model With a 6.4-Inch Display, but No Triple-Rear-Camera
  12. ICO to Fine Equifax £500,000 for 2017 Data Breach   via
  13. UK organisations’ email accounts used in mass phishing campaigns
  14. Threat Spotlight: Barracuda study finds account takeover incidents widespread, most commonly used for phishing campaigns
  15. 7GB of Medical Data Publicly Exposed Thanks to Misconfigured AWS S3 Bucket
  16. The public's trust, politics and race, and dignity for the LGBT community: MP Murali Pillai goes On the Record
  17. US State Department confirms data breach to unclassified email system
  18. Researcher discovers buffer overflow vulnerability in Microsoft's JET Database Engine
  19. HMRC Tax Refund Scam via Phishing Campaign
  20. China Arrests Suspect for Customer Data Leak at Accor Partner
  21. State Department Email Breach Exposed Personal Data Of Employees
  22. Equifax fined £500,000 over customer data breach
  23. Privacy advocates have failed to engage on My Health Record
  24. UK Regulator Fines Equifax £500,000 Over 2017 Data Breach
  25. GovPayNow Leak of 14M+ Records The All Time Low in Processing
  26. State Department: Some Employee Info Possibly Exposed in Security Incident   via

DENIAL-OF-SERVICE

  1. Snap! Adobe patches, sneaky Android botnets, Alexa invasion, robot skins
  2. The makers of the Mirai IoT-hijacking botnet are sentenced   via
  3. 3 Drivers Behind the Increasing Frequency of DDoS Attacks
  4. New XBash malware combines features from ransomware, cryptocurrency miners, botnets, and worms
  5. : The 3 people suspected of the have escaped jail after agreeing to provide “substantial assistance” to the in ongoing cases. Read more about this story here:   .twitter.com/Yzb9wM7KzU
  6. 3 Drivers Behind the Increasing Frequency of DDoS Attacks
  7. This Russian botnet mimics your click to prevent Android device factory resets
  8. FBI wants to keep “helpful” Mirai botnet authors around
  9. The makers of the Mirai IoT-hijacking botnet are sentenced   via
  10. Mirai botnet developers collaborate with the FBI
  11. Identifying botnets before an attack: The new DARPA challenge
  12. US Signal partners with Cloudflare to deliver DDoS protection service

MALVERTISING

Nothing to report

DATA LEAK

  1. Hackers Uploaded Fake Apps into Google Play Store to Steal Credit card details and Login Credentials

PHISHING

  1. Account Takeover Attacks Become a Phishing Fave
  2. Account Takeover Attacks Result in Phishing Scams  pic.twitter.com/hR2kSqlpCN
  3. Malicious Login Attempts Spike in Finance, Retail  pic.twitter.com/OQPWqymDRB
  4. Account Takeover Attacks Result in Phishing Scams -magazine.com/news/account-takeover-attacks-result-in?utm_source=twitterfeed&utm_medium=twitter …
  5. Malicious Login Attempts Spike in Finance, Retail -magazine.com/news/malicious-login-attempts-spike-in?utm_source=twitterfeed&utm_medium=twitter …
  6. Account Takeover Attacks Become a Phishing Fave
  7. : malware detections have soared 273% since 2017 according to new stats from . The most popular way to spread is brute-forcing of passwords, used in 93% of detected attacks. Read more here:   .twitter.com/Ct8Z7qckRC
  8. UK organisations’ email accounts used in mass phishing campaigns
  9. Threat Spotlight: Barracuda study finds account takeover incidents widespread, most commonly used for phishing campaigns
  10. Hackers Uploaded Fake Apps into Google Play Store to Steal Credit card details and Login Credentials
  11. HMRC Tax Refund Scam via Phishing Campaign
  12. Phishing finance apps make way back into Google Play
  13. Manipulation tactics that you fall for in phishing attacks

WEB DEFACEMENT

Nothing to report

MALWARE

  1. US authorities Have Pardoned Authors of Mirai Ransomware in Return For Government “Cooperation”
  2. Domain Joined Outlook 2016 Issues - 0x8004011D
  3. Report: Cryptomining malware detections up more than 459 percent since 2017
  4. Bad actors are sizing up systems via lightweight recon before attack, researchers at Proofpoint said:
  5. The rate at which new threats appear now requires a much greater reliance on threat intelligence. Learn more about its opportunities and challenges in our .  pic.twitter.com/bEh9MKP6nS
  6. Malicious Login Attempts Spike in Finance, Retail  pic.twitter.com/OQPWqymDRB
  7. Malicious Login Attempts Spike in Finance, Retail -magazine.com/news/malicious-login-attempts-spike-in?utm_source=twitterfeed&utm_medium=twitter …
  8. New XBash malware combines features from ransomware, cryptocurrency miners, botnets, and worms
  9. Pegasus spyware spotted in 45 countries, many with questionable human rights records
  10. Book Review: Malware Data Science
  11. Increased Use of a Delphi Packer to Evade Malware Classification
  12. Hundreds of Indian Government Websites Hit with Cryptojacking Malware
  13. This breach is a great example of how CT logs can be useful as an early indicator of an ongoing attack campaign. Orgs should be monitoring CT for certificates issued to look-alike domains to improve their situational awareness. -magazine.com/news/magecart-skimmed-newegg-cards/ …
  14. Mitigate Risk From Malicious and Accidental Insiders
  15. : malware detections have soared 273% since 2017 according to new stats from . The most popular way to spread is brute-forcing of passwords, used in 93% of detected attacks. Read more here:   .twitter.com/Ct8Z7qckRC
  16. Sustes Malware: CPU for Monero
  17. Report: Cryptomining malware detections up more than 459 percent since 2017
  18. Threats posed by using RATs in ICS
  19. Report Reveals Widespread Use of Pegasus Spyware
  20. GovPayNow Leak of 14M+ Records The All Time Low in Processing
  21. Evil Clone Attack – Hackers Injecting Crypto-mining Malware into Legitimate PDF Software
  22. Newegg hacked: The new victim of Magecart malware
  23. How to detect and remove a virus from your Android phone | Avast

EXPLOIT

  1. : Hackers say and have been the easiest attack vectors to exploit this year. 56% of said that social engineering is the fastest account seizing technique to use on them. Read more here:   .twitter.com/e5ogD8VYWT
  2. Researcher discovers buffer overflow vulnerability in Microsoft's JET Database Engine

VULNERABILITY

  1. Android bug bounty tops $3m in third year, but pay flattens out
  2. Facebook Bug Bounty opens to reward access token exposure
  3. Bug hunters fail third year in a row to get top prize in Android hacking program
  4. Cisco Issues New Warning for 6-Month-Old Critical Bug in IOS XE
  5. Guarding the Gate: Cybersecurity De-Mystified
  6. Researcher discovers buffer overflow vulnerability in Microsoft's JET Database Engine
  7. Interview with Daniel Stenberg: His thoughts on the Curl Bug Bounty Program
  8. Western Digital goes quiet on unpatched MyCloud flaw
  9. CVE-2018-0150: Cisco IOS XE Software Static Credential Vulnerability
  10. Adobe releases patch out of schedule to squash critical code execution bug
  11. Cisco IOS XE Software Static Credential Vulnerability
  12. Adobe issued a critical out-of-band patch to address CVE-2018-12848 Acrobat flaw
  13. Ubuntu Released Security Updates & Fixed Multiple Critical Vulnerabilities
  14. Vulnerability in My cloud devices exposes sensitive information
  15. Western Digital My Cloud vulnerability, let’s hacker gives full access
  16. Guarding the Gate: Cybersecurity De-Mystified