Oct 20, 2018

Daily brief for 2018-10-19

ASIA

  1. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  2. The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  5. Secret Comment Crew Code Spotted in New Attack
  6. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  7. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands

WORLD

  1. Small or Big Business, Malware Hits Everyone
  2. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  3. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  4. GreyEnergy
  5. Onslow County Utility Hit with Ransomware Attack
  6. America’s First: US Leads in Global Malware C2 Distribution
  7. AISA 2018: Hunting for phishing kits
  8. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  9. US Voter Leak Hits Tea Party Organization
  10. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
  11. Secret Comment Crew Code Spotted in New Attack
  12. #GroupIB is a platinum sponsor @Gartner_inc Security & Risk Management Summit (Dubai, UAE, 22-23 October 2018) Visit us at Stand
  13. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  14. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  15. Inside Safari Extensions | Malware’s Golden Key to User Data
  16. Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
  17. ADHA's non-process for releasing My Health Record data revealed
  18. Three critical vulnerabilities can be chained to take full control of D-Link routers
  19. Authorities seize properties of creators of “Infamous” cheat code, for GTA V
  20. Canberra competence shines in day of PM domain lapses and tortured analogies
  21. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'

ATTACKS

  1. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  2. Campaign 2018: Artificial intelligence is automating attacks on political campaigns
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. A Pentagon #DataBreach exposed data on at least 30,000 individuals, but other details about the incident are still scarce. By
  5. Password and credit card-stealing Azorult malware adds new tricks
  6. Campaign 2018: Artificial Intelligence Is Automating Attacks On Political Campaigns
  7. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  8. AISA 2018: Hunting for phishing kits
  9. Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
  10. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  11. US Voter Leak Hits Tea Party Organization
  12. VestaCP users warned about possible server compromise
  13. jQuery File Upload Plugin Vulnerable for 8 Years and Only Hackers Knew
  14. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  15. Campaign launched to protect ethical hackers in the Americas
  16. #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.
  17. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  18. Facepunch 2016 breach exposed 343,000 users
  19. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  20. ADHA's non-process for releasing My Health Record data revealed
  21. MikroTik routers targeted by cryptomining campaign | Avast
  22. Vulnerability in Tumblr could have compromise users’ account data
  23. Poor security practices and access to hacking services are making it easy for #cybercriminals to compromise business email, research reveals:

THREATS

  1. libssh Vulnerability: Is WatchGuard Affected?
  2. 0-Day in jQuery Plugin Impacts Thousands of Applications
  3. Small or Big Business, Malware Hits Everyone
  4. Fixing a CSRF Vulnerability
  5. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  6. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  7. City Pays $2,000 in Computer Ransomware Attack
  8. Drupal dev team fixed Remote Code Execution flaws in the popular CMS
  9. Water Utility ONWASA Hit by Ransomware Attack
  10. Madison County Computer Systems Face a Ransomware Attack
  11. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  12. The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
  13. Top 4 tips to avoid getting hit by ransomware
  14. Flaw in Libssh Grants Admin Control to Servers
  15. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  16. FreeRTOS Vulnerabilities Expose Many Systems to Attacks
  17. Linksys E Series Vulnerabilities
  18. Password and credit card-stealing Azorult malware adds new tricks
  19. SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload
  20. Google warns Apple: Missing bugs in your security bulletins are 'disincentive to patch'
  21. Onslow County Utility Hit with Ransomware Attack
  22. jQuery Zero-Day Was Exploited For At Least Three Years
  23. New DDoS Malware Infects Open-Source Web Hosting Software
  24. A Serious Security Flaw Found in LibSSH
  25. America’s First: US Leads in Global Malware C2 Distribution
  26. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  27. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  28. Splunk addressed several vulnerabilities in Enterprise and Light products
  29. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  30. Serious D-Link router security flaws may never be patched
  31. Scams and flaws: Why we get duped
  32. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
  33. Remote Code Execution Flaws Patched in Drupal
  34. The Golden Age of Malware
  35. Tumblr bug bounty program detects flaw, no user info lost
  36. LuminosityLink RAT author sentenced to 30 years in prison
  37. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  38. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  39. Critical Flaw Found in Streaming Library Used by VLC and Other Media Players
  40. Drupal Remote Code Execution Vulnerability Alert
  41. Inside Safari Extensions | Malware’s Golden Key to User Data
  42. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  43. Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
  44. Splunk Patches Several Flaws in Enterprise, Light Products
  45. ADHA's non-process for releasing My Health Record data revealed
  46. MikroTik routers targeted by cryptomining campaign | Avast
  47. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands
  48. Fraudster Targets Cryptocurrency Wallets with a Variety of Info Stealers
  49. Vulnerability in Tumblr could have compromise users’ account data
  50. Three critical vulnerabilities can be chained to take full control of D-Link routers
  51. Zero-day in popular jQuery plugin actively exploited for at least three years
  52. Tumblr serious vulnerability can reveal everyone information
  53. Critical Flaws Found in Amazon FreeRTOS IoT Operating System
  54. Canberra competence shines in day of PM domain lapses and tortured analogies

CRIME

  1. NSA-Linked 'DarkPulsar' Exploit Tool Detailed
  2. Small or Big Business, Malware Hits Everyone
  3. Madison County Computer Systems Face a Ransomware Attack
  4. America’s First: US Leads in Global Malware C2 Distribution
  5. Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
  6. Scams and flaws: Why we get duped
  7. #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.
  8. Secret Comment Crew Code Spotted in New Attack
  9. LuminosityLink RAT author sentenced to 30 years in prison
  10. #GroupIB is a platinum sponsor @Gartner_inc Security & Risk Management Summit (Dubai, UAE, 22-23 October 2018) Visit us at Stand
  11. "World-renowned cybersecurity unit #GroupIB is prepping to release its annual report on trends in hi-tech cybercrime...Group-IB expects the number of
  12. Authorities seize properties of creators of “Infamous” cheat code, for GTA V

POLITICS

  1. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  2. GreyEnergy
  3. US Voter Leak Hits Tea Party Organization
  4. Secret Comment Crew Code Spotted in New Attack
  5. LuminosityLink RAT author sentenced to 30 years in prison
  6. Attackers behind Operation Oceansalt reuse code from Chinese Comment Crew
  7. Latest Hacking News Podcast