Oct 3, 2018

Threat report for 2018-10-02

DATA BREACH

  1. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  2. Financial Sector Data Breaches Soar Despite Heavy Security Spending
  3. TA18-275A: HIDDEN COBRA – FASTCash Campaign
  4. Gwinnett Medical Center investigating possible data breach
  5. Fortnite gamers targeted by data theft malware
  6. Nielsen warns of Chinese influence campaign, but not with midterms
  7. Apollo Data Breach Leads To More Than 200 Million Contact Records Stolen
  8. The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
  9. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  10. UK Conservative Party Conference dedicated app leaks attendee data
  11. Breaking bank security: Record theft rises to new heights
  12. Facebook could face $1.63bn fine under GDPR over latest data breach
  13. How #livechatsoftware leaked
  14. UN Sensitive Information Exposed Publicly Due to Neglected Security Settings
  15. #DanaBot Gains Popularity and Targets US Organizations in Large Campaigns. http://ow.ly/mJza50jiHdI via the Threat Insight research
  16. Facebook Hacked: 50 Million Users' Data Exposed
  17. #SecurityNews: #Tory App Snafu exposes Ministers’ personal info including phone numbers and other personal details of Cabinet ministers, as the
  18. Telegram vulnerability causes IP address leaking
  19. Facebook may be fined up to $1.63 billion due to data breach
  20. Wait, this isn't The Onion... "FBI fitness app asks users to agree to 'all of their activities monitored and recorded'"
  21. #Video: Bringing all of your #data together under a single management portfolio, under a single #database, allows your organization to

DENIAL-OF-SERVICE

  1. Torii botnet, probably the most sophisticated IoT botnet of ever
  2. California Governor Signs Bill Requiring Bots to Disclose Their True Identity
  3. Rarely a week goes by without reports of a large and damaging #DDoS attack against a major business. Techniques are
  4. Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai
  5. Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation
  6. Torii malware could be gateway to more sophisticated IoT botnet attacks

MALVERTISING

Nothing to report

PHISHING

  1. Cyber criminals using lookalike online shopping domains to phish buyers
  2. Nearly 50% of businesses have yet to take control of password security - report
  3. Sophisticated Voice Phishing Scams
  4. WifiPhisher – WiFi Crack and Phishing Framework
  5. Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
  6. Hackers can use Microsoft Sway to carry out phishing attacks 'without fear of detection'
  7. ThreatList: Password Hygiene Remains Lackluster in Global Businesses
  8. Boffins Tricks Password Protection Using Imposter Apps
  9. Strengthen your security with Avast password generator | Avast
  10. Researchers use Android password managers to make phishing attacks more practical
  11. Vulnerable Android password managers make phishing attacks easier
  12. True password behaviors in the workplace revealed
  13. Sites that use Facebook login could be affected by hack
  14. ​NZ customs can now demand phone or laptop passwords
  15. When you need to make a new #Password, what do you do? The easiest and most secure way is to
  16. At #MSIgnite, @Microsoft declared "an end to era of passwords" with an update to its Authenticator app, which will allow

WEB DEFACEMENT

  1. Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
  2. Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements

MALWARE

  1. Cyber criminals using lookalike online shopping domains to phish buyers
  2. Canadian restaurant chain suffers country-wide outage after malware outbreak
  3. Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
  4. Researchers Link New NOKKI Malware to North Korean Actor
  5. NOKKI Malware Sports Mysterious Link to Reaper APT Group
  6. Malware 101: The Malware Tools That Attackers Use
  7. Following a Trail of Confusion: PowerShell in Malicious Office Documents
  8. Google taking new steps to prevent malicious Chrome extensions
  9. AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
  10. Enabling Enterprise-Grade Hybrid Cloud Data Processing with SAP and Cisco – Part 2
  11. A remote access #Trojan -- dubbed #GravityRAT -- was discovered by Cisco Talos (@TalosSecurity) to be checking for #antimalware sandboxes.
  12. Danabot Banking Malware Now Targeting Banks in the U.S.
  13. Dogcall Rat links NOKKI malware with Reaper group - indicators provided
  14. The MITRE ATT&CK Framework: Command and Control
  15. Ransomware attacks via RDP on the rise | Avast
  16. Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
  17. Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
  18. World Cup may have distracted malware hackers
  19. Microsoft Detection Tools Sniff Out Fileless Malware
  20. Google Cracks Down on Malicious Chrome Extensions in Major Update
  21. Fortnite gamers targeted by data theft malware
  22. Windows Defender exclusions reek of malware
  23. DanaBot Observed in Large Campaign Targeting U.S. Organizations
  24. Report: Zoho's domain regularly exploited to move keylogger data
  25. A Staggering Amount of Stolen Data is Heading to Zoho Domains
  26. AV-TEST Rates Check Point’s SandBlast Agent as a Top Product in Corporate Endpoint Protection
  27. Malware Less Common in Q2, Still Top Attack Method
  28. Malware Less Common in Q2, Still Top Attack Method
  29. Alphabet's @chroniclesec unveiled #VirusTotal Enterprise, a new version of the file scanning service designed specifically for enterprise customers. By @RobWright22
  30. Fruitfly Mac malware creator used it to spy on minors; FBI discloses technique
  31. CVE-2018-8373: Hackers’ best partner to spread Trojans
  32. Desktop Telegram users showing off not only their silly selfies but also their IP addresses
  33. New Type of Malware Developed by Russian Hackers Eludes Discovery
  34. The Army is working toward a cyber domain doctrine
  35. The MITRE ATT&CK Framework: Command and Control
  36. Improving #mobilesecurity programs to detect
  37. Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
  38. A group of #malware was discovered targeting public SSH servers. However, certain #IPaddresses are avoided. Discover how this is possible
  39. Telegram vulnerability causes IP address leaking
  40. Hackers use malicious content delivery system to target iOS device
  41. Torii malware could be gateway to more sophisticated IoT botnet attacks

EXPLOIT

  1. .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
  2. Report: Zoho's domain regularly exploited to move keylogger data
  3. Facebook Breach: Attackers Exploited Privacy Feature
  4. SQL injection explained: How these attacks work and how to prevent them

VULNERABILITY

  1. PDF patch time: fixes land for over 100 flaws in Adobe's and Foxit's PDF software
  2. Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws
  3. Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
  4. Google Patches Critical Vulnerabilities in Android OS
  5. Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
  6. Foxit Reader Update Patches Over 100 Vulnerabilities
  7. Use Windows, macOS? Don’t be hacked by PDF, patch these critical Adobe flaws now
  8. New study finds 5 of every 6 routers are inadequately updated for security flaws
  9. .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
  10. Adobe Releases Updates For 85 PDF Related CVEs
  11. Nine NAS Bugs Open LenovoEMC, Iomega Devices To Attack
  12. Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
  13. Cisco Talos discloses serious vulnerabilities in Foxit PDF Reader
  14. Adobe fixes 47 critical flaws in Acrobat and Reader
  15. 86 Vulnerabilities Fixed with Adobe Security Updates for Adobe Acrobat and Reader
  16. Use Windows, macOS? Don't be hacked by PDF, patch these critical Adobe flaws now
  17. CVE-2018-8373: Hackers’ best partner to spread Trojans
  18. Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
  19. Adobe Patches 86 Vulnerabilities in Acrobat Products
  20. Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
  21. Telegram vulnerability causes IP address leaking
  22. Security Update for Foxit PDF Reader Fixes 118 Vulnerabilities
  23. Adobe Releases Security Updates for Acrobat that Fix 86 Vulnerabilities