Oct 5, 2018

Daily brief for 2018-10-04

ASIA

  1. Should You Worry About Software Supply Chain Attacks?
  2. .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
  3. Shedding Skin – Turla’s Fresh Faces
  4. China allegedly infiltrated US companies through implanted hardware backdoors
  5. Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
  6. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  7. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  8. A Remote iOS Bug
  9. APT38 is behind financially motivated attacks carried out by North Korea
  10. Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined

WORLD

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
  3. Should You Worry About Software Supply Chain Attacks?
  4. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  5. China allegedly infiltrated US companies through implanted hardware backdoors
  6. US charges Russian military officers over international hacking and disinformation campaigns
  7. LoJack for computers used to attack European government bodies
  8. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  9. Justice Department charges 7 Russian intelligence officers
  10. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  11. Russian Fancy Bear APT Linked To Earworm Hacking Group
  12. ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
  13. HIDDEN COBRA – FASTCash Campaign
  14. Pacific Northwest burger chain hit by FIN7
  15. Irish Data Regulator Likely to Fine Facebook for Data Breach
  16. Russian Fancy Bear APT linked to Earworm hacking group
  17. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  18. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  19. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  20. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  21. LoJax: First UEFI Malware seen in the Wild
  22. Hackers Earn $150,000 in Marine Corps Bug Bounty Program
  23. APT38 is behind financially motivated attacks carried out by North Korea
  24. UK and allies accuse Russia of cyber attack campaign
  25. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  26. Experts recommend avoiding single step logins
  27. U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
  28. DanaBot Observed in Large Campaign Targeting U.S. Organizations

ATTACKS

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
  3. Campaign 2018: Cyberattacks on infrastructure could suppress voter turnout
  4. Sony accidentally leaked November's PS Plus free games
  5. US charges Russian military officers over international hacking and disinformation campaigns
  6. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  7. Burgerville Customer Credit Card Info Stolen In Data Breach
  8. Exclusive: Moving away from passwords to two-factor authentication
  9. HIDDEN COBRA – FASTCash Campaign
  10. Database of 200 Million Records Stolen from Apollo in Data Breach
  11. Irish Data Regulator Likely to Fine Facebook for Data Breach
  12. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  13. The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
  14. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  15. Block Blocking Login Items
  16. How #livechatsoftware leak personal #employeedata?
  17. Democratic congressional intern arrested for doxing GOP senators during Kavanaugh hearing
  18. California bill bans bots during elections
  19. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
  20. Business Email Compromise: When You Don’t Need to Phish.
  21. Business email compromise made easy for cyber criminals
  22. In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
  23. Hackers Selling Facebook Account Logins Details On Dark Web For $3
  24. Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
  25. UK and allies accuse Russia of cyber attack campaign
  26. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
  27. Experts recommend avoiding single step logins
  28. Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
  29. Why It’s Time to Nuke the Password
  30. Why It’s Time to Nuke the Password
  31. U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
  32. DanaBot Observed in Large Campaign Targeting U.S. Organizations

THREATS

  1. Google Project Zero drops macOS exploit, calls out Apple for silent patching
  2. Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
  3. .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
  4. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  5. China allegedly infiltrated US companies through implanted hardware backdoors
  6. Researchers at the 2018 @RSAConference discussed #stegware: @malware that uses #steganography. Discover how this works with expert @lewisnic.
  7. Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
  8. Avast AV reclassifies cryptominers | Avast
  9. Researchers at Cisco Talos (@TalosSecurity) recently discovered #GravityRAT, a remote access #Trojan. Discover how this RAT can check for
  10. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  11. macOS Flaw Allows Attackers To Hijack Installed Apps
  12. ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
  13. CVE-2018-8373 Exploit Spotted
  14. Vulnerability Scanning vs. Penetration Testing by @TripwireInc
  15. This is also a good time to remind that bugdoors are far more scary than backdoors.
  16. Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
  17. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  18. Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
  19. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  20. Remote Mac Exploitation Via Custom URL Schemes
  21. A Remote iOS Bug
  22. Tearing Apart the Undetected (OSX)Coldroot RAT
  23. An Unpatched Kernel Bug
  24. Mac Malware of 2017
  25. From the Top to the Bottom; Tracking down CVE-2017-7149
  26. WTF is Mughthesec!? poking on a piece of undetected adware
  27. OSX/MacRansom; analyzing the latest ransomware to target macs
  28. Two Bugs, One Func(), part three
  29. Two Bugs, One Func(), part two
  30. Two Bugs, One Func(), part one
  31. Mac Malware of 2016
  32. Towards Generic Ransomware Detection
  33. Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
  34. Analyzing the Anti-Analysis Logic of an Adware Installer
  35. Monitoring Process Creation via the Kernel (Part III)
  36. Monitoring Process Creation via the Kernel (Part II)
  37. Monitoring Process Creation via the Kernel (Part I)
  38. CVE-2015-3673: Goodbye Rootpipe...(for now?)
  39. More on, "Adware for OS X Distributes Trojans"
  40. LoJax: First UEFI Malware seen in the Wild
  41. Cisco: Two critical bugs in DNA network software need these urgent patches
  42. Virus Bulletin 2018: Attack velocity ramps up
  43. Paper over the Kracks: New techniques can bypass WPA2 flaw mitigations
  44. Hackers Earn $150,000 in Marine Corps Bug Bounty Program
  45. More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
  46. Malicious remote admin tool seemingly linked to KONNI malware, North Korea
  47. Betabot trojan packed with anti-malware evasion tools
  48. Cisco plugs critical flaws in DNA Center and Prime Infrastructure
  49. Marine Corps bug bounty program finds 150 vulnerabilities
  50. How is Android Accessibility Service affected by a banking Trojan?
  51. How does stegware malware exploit steganography techniques?
  52. .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
  53. Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
  54. A new group of #malware -- dubbed #GoScanSSH -- was recently discovered by researchers. Learn how this malware works and
  55. Secure encrypted #virtualization: How is this technology exploited?
  56. Seriously if I could make evil semiconductors I would just replace one which is already present rather than adding it. Show
  57. WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
  58. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  59. Foxit PDF Reader fixes serious remote code execution vulnerability
  60. A Google bug breaks the search results in Safari
  61. Researchers found that cheap Android devices were shipped pre-installed backdoors
  62. Google opened the .page domain
  63. Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
  64. Zoho Heavily Used by Keyloggers to Transmit Stolen Data
  65. Hacking for good uncovers over 150 Marine Corps web vulnerabilities
  66. Network Outage at Some Recipe Unlimited Locations Caused by Malware
  67. DanaBot Observed in Large Campaign Targeting U.S. Organizations

CRIME

  1. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  2. Shedding Skin – Turla’s Fresh Faces
  3. Avast AV reclassifies cryptominers | Avast
  4. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  5. Justice Department charges 7 Russian intelligence officers
  6. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  7. Burgerville Customer Credit Card Info Stolen In Data Breach
  8. HIDDEN COBRA – FASTCash Campaign
  9. Pacific Northwest burger chain hit by FIN7
  10. Database of 200 Million Records Stolen from Apollo in Data Breach
  11. Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
  12. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  13. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  14. Remote Mac Exploitation Via Custom URL Schemes
  15. How is Android Accessibility Service affected by a banking Trojan?
  16. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
  17. Business Email Compromise: When You Don’t Need to Phish.
  18. Business email compromise made easy for cyber criminals
  19. APT38 is behind financially motivated attacks carried out by North Korea
  20. In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
  21. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
  22. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  23. Experts recommend avoiding single step logins

POLITICS

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. Justice Department charges 7 Russian intelligence officers
  3. APT28 turns away from election hacking and back to cyberespionage
  4. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  5. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
  6. APT38 is behind financially motivated attacks carried out by North Korea