Oct 24, 2018

Daily brief for 2018-10-23

ASIA

  1. FireEye links Russia-owned lab to Trisis developers
  2. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  3. Chinese Cyber Espionage Group using Datper Trojan
  4. Saudi Investment Site Defaced After Journalist’s Murder
  5. NSA Tools Used to Attack Nuclear Energy Firms
  6. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  7. libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
  8. WebLogic Remote Code Execution Vulnerability(CVE-2018-3191)Threat Alert
  9. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  10. Hacking operations with DarkPulsar and other tools developed by the NSA
  11. Can Cybercriminals Hack Blockchain?

WORLD

  1. When Ransomware Stopped Working Harder and Started Working Smarter
  2. Experts advocate for 'ATT&CK' as go-to framework to share threat intel
  3. FireEye links Russia-owned lab to Trisis developers
  4. Triton Malware Linked to Russian Government Research Institute
  5. FireEye links Russian research lab to Triton ICS malware attacks
  6. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  7. Securing Government Operations with Cloud-based Malware Analysis
  8. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  9. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  10. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  11. Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk
  12. Phishing attacks becoming more targeted, phishers love Microsoft the most
  13. Indiana National Guard hit by ransomware
  14. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  15. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  16. Saudi Investment Site Defaced After Journalist’s Murder
  17. NSA Tools Used to Attack Nuclear Energy Firms
  18. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  19. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  20. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
  21. Morrisons loses appeal over data breach
  22. Hacking operations with DarkPulsar and other tools developed by the NSA
  23. Can Cybercriminals Hack Blockchain?

ATTACKS

  1. Case Study: Protecting PII
  2. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  3. Top 10 security steps in Microsoft 365 that political campaigns can take today
  4. Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
  5. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  6. Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
  7. Identify when your data is exposed, your brand is abused, or your company is mentioned on the dark web. Test
  8. Phishing is still the most commonly used attack on organizations, survey says
  9. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  10. How sophisticated phishing grants attackers total control of your computer
  11. How sophisticated phishing grants attackers total control of your computer
  12. Thousands of Applications Vulnerable to RCE via jQuery File Upload
  13. Facebook has seen several data breaches in the last few months, leading the company to look into acquiring a
  14. 5 Ways #Cybercriminals Can Access Your Emails Without Phishing [Infographic]:
  15. Phishing attacks becoming more targeted, phishers love Microsoft the most
  16. Police have issued a fresh warning concerning Fortnite and players giving out their personal details online. Cheshire Police posted on Facebook,
  17. Adult websites shuttered after 1.2 million user details exposed
  18. #sLoad and #Ramnit pairing in sustained personalized campaigns against UK and Italy
  19. Learn how hackers launched #phishing attacks against @netflix users with expert Michael Cobb of @thehairyITdog
  20. jQuery? More like preyQuery: File upload tool can be exploited to hijack at-risk websites
  21. "Advanced attacks, spear-phishing and data breaches are the norm, instead of the exception. We need to address these issues with
  22. “We’re less likely to be caught up in a massive breach of highly available PII or financial data that gets
  23. Phishing Report Shows Microsoft, Paypal, & Netflix as Top Targets
  24. A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
  25. Morrisons loses appeal over data breach
  26. 4 suggerimenti per utilizzare al meglio il vostro #password manager e generare password davvero efficaci. Ebbene sì, repetita juvant :)
  27. Morrisons loses appeal against data breach liability ruling
  28. A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may

THREATS

  1. DHS warns of another dangerous flaw in Advantech WebAccess SCADA software
  2. Burned malware returns, according to Cylance: is Hacking Team responsible?
  3. Microsoft Windows zero-day disclosed on Twitter, again
  4. AWS FreeRTOS Riddled with Security Vulnerabilities | Avast
  5. When Ransomware Stopped Working Harder and Started Working Smarter
  6. City Pays $2K in Ransomware, Stirs ‘Never Pay’ Debate
  7. Status of Today’s Email as a Malware Vector
  8. Case Study: Destructive Malware
  9. Case Study: Ransomware
  10. Banking Trojan Infections Persist Throughout the State
  11. Triton Malware Linked to Russian Government Research Institute
  12. Why the blockchain is not secure
  13. FireEye links Russian research lab to Triton ICS malware attacks
  14. Securing Government Operations with Cloud-based Malware Analysis
  15. How RATs infect computers with malicious software
  16. This is how government spyware StrongPity uses security researchers' work against them
  17. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  18. Indiana National Guard Suffers Ransomware Attack
  19. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  20. Critical vulnerabilities in FreeRTOS allowed for IoT device compromise
  21. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  22. Grave TCP/IP Flaws In FreeRTOS Leave IoT Gear Open To Mass Hijacking
  23. Malicious actors attacked a back-end insurance system and the resulting @HealthCareGov #breach exposed an unknown amount of data on 75,000
  24. Trade.io Cold Wallet Hacked Losing 50 Million TIO Tokens – TIO Coin To Be Forked
  25. H-Worm and jRAT Malware: Two RATs are Better than One
  26. Patch now! Multiple serious flaws found in Drupal
  27. How RATs infect computers with malicious software
  28. Quantifying Vulnerability Risk: How to Quickly Calculate and Prioritize Risk
  29. What do you think the combination of the #TrickBot banking Trojan to #IcedID means for the future of banking #Trojans?
  30. Indiana National Guard hit by ransomware
  31. Amazon Patched Multiple IoT Vulnerabilities Affecting Its Smart Devices
  32. Updated Azorult malware for sale on the Dark Web
  33. Amazon patches IoT and critical infrastructure security flaws
  34. Why is Elon Musk promoting this Bitcoin scam? (He’s not)
  35. UK and US sign military Cyber Accord to dominate cyber domain - with help from business
  36. Chinese Cyber Espionage Group using Datper Trojan
  37. Patch me, if you can: Grave TCP/IP flaws in FreeRTOS leave IoT gear open to mass hijacking
  38. Several vulnerabilities were found in controllers made by @Universal_Robot. Discover what these #robot controllers are used for and how
  39. Burned malware returns, says Cylance report: Is Hacking Team responsible?
  40. How do newly found flaws affect robot controllers?
  41. Firmware zero-day leaves 2m storage devices open to RCE
  42. Report: Cryptocurrency hackers earned $20M with 51-percent attacks in 2018
  43. A flaw in @Google Firebase #DatabaseSecurity allowed hackers to bypass security and leak data. Learn more about this #SecurityFlaw and
  44. CyberSecurity Asean security alert on Multiple Vulnerabilities in Cisco WebEx Network Recording Player for Advanced Recording Format Files Could Allow for Arbitrary Code Execution
  45. Bug Spells Doom for Nearly-Vacant Google+ Network
  46. The fix for the DOM-based XSS in Branch.io introduced a new XSS flaw
  47. libssh Server-Side Identity Authentication Bypass Vulnerability (CVE-2018-10933)Threat Alert
  48. Have you ever wondered why #ransomware attacks happen on the Friday before a long weekend? We've teamed up with @SentinelOne
  49. WebLogic Remote Code Execution Vulnerability(CVE-2018-3191)Threat Alert
  50. Different Vendors Confirm The Impact Of LibSSH Flaw On Their Products
  51. Apple has launched its university ID Cards feature in Wallet. Students at three universities can now access their student ID
  52. FreeRTOS IoT OS Critical Vulnerabilities Affected Million of Smart Home & Critical Infrastructure Based IoT Devices
  53. LIVE555 Streaming library affected by remote code execution vulnerability
  54. Can Cybercriminals Hack Blockchain?
  55. A Beginner’s Guide to Bitcoin Mining (Bitcoin Mining 101)
  56. Windows 10 1809 Zip Extraction Bug Overwrites Files without Confirmation
  57. A #ZeroDay in the popular #jQuery File Upload plugin could affect thousands of projects and the jQuery #plugin vulnerability may

CRIME

  1. Inside Safari Extensions | Malicious Plugins Remain on Mojave
  2. Thousands of applications affected by a zero-day issue injQuery File Upload plugin
  3. H-Worm and jRAT Malware: Two RATs are Better than One
  4. New Phishing Attack That Uses Multiple Replica Sign-In Pages
  5. Why is Elon Musk promoting this Bitcoin scam? (He’s not)
  6. Morrisons loses appeal over data breach
  7. North Korean Hackers Stole $571 Million Worth of CryptoCoins in Less Than 24 Months
  8. Can Cybercriminals Hack Blockchain?

POLITICS

  1. An ISP Left Corporate Passwords, Keys, and All its Data Exposed on the Internet
  2. Top 10 security steps in Microsoft 365 that political campaigns can take today
  3. Russian Malware Was Apparently Used in an Attempt to Sabotage a Saudi Petrol Plant
  4. TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
  5. Chinese Cyber Espionage Group using Datper Trojan
  6. Saudi Investment Site Defaced After Journalist’s Murder
  7. NSA Tools Used to Attack Nuclear Energy Firms