Threat report for 2018-09-27
DATA BREACH
- Twitter Bug May Have Exposed Millions of DMs
- GDPR: Data Breach Class Action Lawsuits Come to Europe
- Fancy Bear LoJax campaign reveals first documented use of UEFI rootkit in the wild
- SheIn Data Breach Exposed Personal Details 6.4 Million Customers To Hackers
- United Nations data found exposed on web: researcher
- New GootKit Campaigns Target European Banks with Reconnaissance Attacks
- Uber to Pay $148 Million as a Settlement for Data Breach Cover
- Uber fined $148m for data breach cover-up
- You should prepare for the next mega data breach
- Uber agrees to pay $148 million in massive 2016 data breach settlement
- Endace launches petabyte network recording appliance
DENIAL-OF-SERVICE
- Hide and Seek (HNS) IoT Botnet targets Android devices with ADB option enabled
- Hide and seek Iot botnet updates include new Android ADB exploit
- New "Torii" Botnet's Sophisticated Techniques Set It Apart From Mirai
- DDoS attack on education vendor hinders access to districts’ online portals
- New Torii Botnet uncovered, more sophisticated than Mirai | Avast
- Hide and seek Iot botnet updates include new Android ADB exploit
- New "Torii" Botnet's Sophisticated Techniques Set It Apart From Mirai
MALVERTISING
Nothing to report
PHISHING
- Android password managers not as secure as desktop counterparts
- Boffins bypass password protection with pilfering by phony programs
- Are long passphrases the answer to password problems?
- Chrome 70 will resolve cookies and login privacy issues
WEB DEFACEMENT
Nothing to report
MALWARE
- APT Group Uses Dangerous LoJax Malware That Can Survive After OS Re-installation and Hard Disk Replacement
- Russians' stealthy 'LoJax' malware can infect on the firmware level
- CCSP Exam Details and Process
- CCSP: Overview of Domains
- Ransomware Attack Hits Port of San Diego
- The PowerShell Boogeyman: How to Defend Against Malicious PowerShell Attacks
- Chronicle Unveils VirusTotal Enterprise
- Crooks turn to Delphi packers to evade malware detection
- Chronicle announces VirusTotal Enterprise with greater search and analysis capabilities
- Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV
- Alphabet launches VirusTotal Enterprise
- Is There Such a Thing as a Malicious PowerShell Command?
- New KONNI Malware attacking Eurasia and Southeast Asia
- New KONNI Malware attacking Eurasia and Southeast Asia
- Pirated Game of Thrones episodes most popular TV bait for malware
- Seven additional modules make Fancy Bear’s VPNFilter malware even more versatile
- Russian Cyberspies Use UEFI Rootkit in Attacks
- Dirhunt – Search and Analyze Target Domain Directories
- Port of San Diego Affected by a Ransomware Attack
- Phorpiex worm pivots to infect the enterprise with GandCrab ransomware
- Crooks turn to Delphi packers to evade malware detection
- Russian Sednit APT used the first UEFI rootkit of ever in attacks in the wild
- LoJax: First-ever UEFI rootkit detected in a cyberattack
- DanaBot trojan sets sights on Europe, new features
- SC Media September Product Reviews: Threat Intelligence
DomainTools Iris Investigation Platform l
- #Malware classifcation, which encompasses both the identification and attribution of code, has the power to unlock many clues that aid
- New VirusTotal Enterprise Offers Private Graphs, Faster Searches
- Alphabet's Chronicle Releases VirusTotal Enterprise
- Malware steals personal information from 6.4M SheIn customers
- Malware hits fashion giant SHEIN; 6.42 million online shoppers affected
- Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild
- Emergence of new ransomware variants feature names of popular politicians
- Now that Office 365 has become one of Microsoft's fastest-growing revenue streams, it has become a primary target for #ransomware.
- Fancy Bear LoJax campaign reveals first documented use of UEFI rootkit in the wild
- Researchers find vulnerability in Apple's MDM DEP process
- Seven additional modules make Fancy Bear's VPNFilter malware even more versatile
- Cloudflare Becomes a Registrar, Sells Domains At Cost
- APT28 Uses LoJax, First UEFI Rootkit Seen in the Wild
- Alphabet's Chronicle Security Business Launches VirusTotal Enterprise
- VPNFilter Router Malware Adds 7 New Network Exploitation Modules
- Malware in the Cloud: What You Need to Know
- Discover how Tripwire Malware Detection...
- Protects against zero-day exploits and other known threats.
- Offers an enterprise view of suspicious malware objects across all monitored systems.
- Protects from repeat #malware attacks.
Learn more here:
- Malware in the Cloud: What You Need to Know
EXPLOIT
- Hide and seek Iot botnet updates include new Android ADB exploit
- Hide and seek Iot botnet updates include new Android ADB exploit
- VPNFilter Router Malware Adds 7 New Network Exploitation Modules
- Discover how Tripwire Malware Detection...
- Protects against zero-day exploits and other known threats.
- Offers an enterprise view of suspicious malware objects across all monitored systems.
- Protects from repeat #malware attacks.
Learn more here:
VULNERABILITY
- Local-Privilege Escalation Flaw in Linux Kernel Allows Root Access
- DEF CON report finds decade-old flaw in widely used ballot-counting machine
- Twitter fixes API bug that shared data with wrong developers
- How to Keep Up Security in a Bug-Infested World
- Twitter Bug May Have Exposed Millions of DMs
- Developers focus on wrong open source software vulnerabilities, research says
- Security Flaw Found in Apple Mobile Device Enrollment Program
- Cisco Releases Alerts for 14 High Severity Bugs
- Apple DEP vulnerability lets attackers access orgs’ resources, info
- Cisco unearths 13 'High Impact' IOS vulnerabilities you need to patch now
- How automakers are tackling connected vehicle vulnerability management
- Tripwire Patch Priority Index for September 2018
- Researchers find vulnerability in Apple's MDM DEP process
- GNOME 3.30.1 released: bugfixes
- Norwegian state discusses vulnerabilities with IT sector
- Mutagen Astronomy Linux Kernel vulnerability affects Red Hat, CentOS, and Debian distros
- KDE Plasma 5.12.7 LTS releases: fix bugs
- Discover how Tripwire Malware Detection...
- Protects against zero-day exploits and other known threats.
- Offers an enterprise view of suspicious malware objects across all monitored systems.
- Protects from repeat #malware attacks.
Learn more here:
- ex-NSA Hacker Discloses macOS Mojave 10.14 Zero-Day Vulnerability