Oct 12, 2018

Daily brief for 2018-10-11

ASIA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. What would happen if an attack interrupted a country’s power supply?
  4. Reaper Group Uses New Malware to Deploy RAT
  5. Threats in the Netherlands

WORLD

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  3. The Reality of Self-Driving Cars and the Regulatory Hurdles
  4. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  5. Talos: Android trojan resembling Play Store installs sophisticated spyware
  6. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  7. The EU and the US have investigated on data breaches on the Google+
  8. Researchers link tools used in NotPetya and Ukraine grid hacks
  9. What would happen if an attack interrupted a country’s power supply?
  10. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  11. Reaper Group Uses New Malware to Deploy RAT
  12. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  13. Defending Against Business Email Compromise Attacks
  14. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  15. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  16. Threats in the Netherlands
  17. New Gallmaker APT group eschews malware in cyber espionage campaigns
  18. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  19. GPlayed Trojan - .Net playing with Google Market
  20. Ghostdns Attack Compromised Over 100K Routers
  21. Canada-Based Restaurant Chain Hit with Malware Attack

ATTACKS

  1. The BEC List: Helping Thwart Business Email Compromise through Collaboration
  2. Personal data for coffee. What’s the risk? | Avast
  3. California Bill Increases Default Password Security
  4. The EU and the US have investigated on data breaches on the Google+
  5. FitMetrix user data exposed via passwordless ElasticSearch server cluster
  6. Apple has formed a partnership with lyrics database provider Genius
  7. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  8. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  9. Defending Against Business Email Compromise Attacks
  10. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  11. Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
  12. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  13. A new database with information on every shooting at a school in the last 50 years is now available publicly
  14. New Gallmaker APT group eschews malware in cyber espionage campaigns
  15. Ghostdns Attack Compromised Over 100K Routers
  16. A simple videocall could compromise your WhatsApp account
  17. Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
  18. Mingis on Tech: Data breaches in a world of 'surveillance capitalism'
  19. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  20. AVG 2019 now includes enhanced phishing threat detection

THREATS

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
  3. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  4. Senate seeks internal memo on Google+ vulnerability
  5. XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
  6. Slow disclosure of Google+ flaw draws attention of senators
  7. Hackers Exploit Drupalgeddon2 to Install Backdoor
  8. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  9. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  10. Talos: Android trojan resembling Play Store installs sophisticated spyware
  11. Most Malware Arrives Via Email
  12. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  13. Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
  14. Network Time Protocol Bugs Sting Juniper Operating System
  15. Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
  16. Audit Finds No Critical Flaws in Firefox Update System
  17. Fake Adobe Flash Updates Hide Malicious Crypto Miners
  18. [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
  19. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  20. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  21. GPlayed trojan – .Net playing with Google Market
  22. Cryptomining malware discovered masquerading as Flash updates
  23. This cryptojacking mining malware pretends to be a Flash update
  24. Fake Flash Updaters Push Cryptocurrency Miners
  25. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  26. Reaper Group Uses New Malware to Deploy RAT
  27. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  28. Exaramel Malware Reinforces Link Between Industroyer and NotPetya
  29. A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
  30. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  31. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  32. New Android Trojan Gplayed Adapts to Attacker's Needs
  33. Juniper fixes 30+ vulnerabilities in its routing, switching devices
  34. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  35. Adobe patches critical flaws in many of its software offerings
  36. Update now! Microsoft fixes 49 bugs, 12 are critical
  37. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  38. Qihoo 360’s precise analysis of ransomware for September
  39. Costly cryptojacking overtakes ransomware in the enterprise threat stakes
  40. Crypto-mining malware poses as Flash updates
  41. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  42. Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
  43. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  44. VMware issues advisory for a DoS vulnerability
  45. .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
  46. New Backdoor Ties NotPetya and Industroyer to TeleBots Group
  47. Juniper Patches Serious Flaws in Junos OS
  48. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  49. .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
  50. "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
  51. The attached file promptly infects Peter’s laptop with the RAT, remote access trojan. It only takes about an hour from
  52. New Gallmaker APT group eschews malware in cyber espionage campaigns
  53. GPlayed Trojan - .Net playing with Google Market
  54. Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )
  55. Canada-Based Restaurant Chain Hit with Malware Attack
  56. Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
  57. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
  58. Four Critical Flaws Patched In Adobe Digital Edition
  59. How to Defeat Malicious Everything as-a-Service

CRIME

  1. The BEC List: Helping Thwart Business Email Compromise through Collaboration
  2. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  3. The EU and the US have investigated on data breaches on the Google+
  4. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  5. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  6. Defending Against Business Email Compromise Attacks
  7. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  8. Threats in the Netherlands

POLITICS

  1. What would happen if an attack interrupted a country’s power supply?
  2. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  3. Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
  4. Threats in the Netherlands
  5. New Gallmaker APT group eschews malware in cyber espionage campaigns
  6. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  7. A simple videocall could compromise your WhatsApp account
  8. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  9. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript