Threat report for 2018-10-02
DATA BREACH
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
- Financial Sector Data Breaches Soar Despite Heavy Security Spending
- TA18-275A: HIDDEN COBRA – FASTCash Campaign
- Gwinnett Medical Center investigating possible data breach
- Fortnite gamers targeted by data theft malware
- Nielsen warns of Chinese influence campaign, but not with midterms
- Apollo Data Breach Leads To More Than 200 Million Contact Records Stolen
- The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
- UK Conservative Party Conference dedicated app leaks attendee data
- Breaking bank security: Record theft rises to new heights
- Facebook could face $1.63bn fine under GDPR over latest data breach
- How #livechatsoftware leaked
- UN Sensitive Information Exposed Publicly Due to Neglected Security Settings
- #DanaBot Gains Popularity and Targets US Organizations in Large Campaigns. http://ow.ly/mJza50jiHdI via the Threat Insight research
- Facebook Hacked: 50 Million Users' Data Exposed
- #SecurityNews: #Tory App Snafu exposes Ministers’ personal info including phone numbers and other personal details of Cabinet ministers, as the
- Telegram vulnerability causes IP address leaking
- Facebook may be fined up to $1.63 billion due to data breach
- Wait, this isn't The Onion...
"FBI fitness app asks users to agree to 'all of their activities monitored and recorded'"
- #Video: Bringing all of your #data together under a single management portfolio, under a single #database, allows your organization to
DENIAL-OF-SERVICE
- Torii botnet, probably the most sophisticated IoT botnet of ever
- California Governor Signs Bill Requiring Bots to Disclose Their True Identity
- Rarely a week goes by without reports of a large and damaging #DDoS attack against a major business. Techniques are
- Torii Botnet – A New Sophisticated IoT Botnet Attack in Wide – More Powerful Than Mirai
- Stop DDoS Attacks In 10 Seconds – Organization’s Most Important Consideration for DDOS Attack Mitigation
- Torii malware could be gateway to more sophisticated IoT botnet attacks
MALVERTISING
Nothing to report
PHISHING
- Cyber criminals using lookalike online shopping domains to phish buyers
- Nearly 50% of businesses have yet to take control of password security - report
- Sophisticated Voice Phishing Scams
- WifiPhisher – WiFi Crack and Phishing Framework
- Ignite 2018 highlights: passwordless sign-in, confidential computing, new threat protection, and more
- Hackers can use Microsoft Sway to carry out phishing attacks 'without fear of detection'
- ThreatList: Password Hygiene Remains Lackluster in Global Businesses
- Boffins Tricks Password Protection Using Imposter Apps
- Strengthen your security with Avast password generator | Avast
- Researchers use Android password managers to make phishing attacks more practical
- Vulnerable Android password managers make phishing attacks easier
- True password behaviors in the workplace revealed
- Sites that use Facebook login could be affected by hack
- NZ customs can now demand phone or laptop passwords
- When you need to make a new #Password, what do you do? The easiest and most secure way is to
- At #MSIgnite, @Microsoft declared "an end to era of passwords" with an update to its Authenticator app, which will allow
WEB DEFACEMENT
- Case involving 'AlfabetoVirtual' website defacements ends in guilty plea
- Hacker 'AlfabetoVirtual' Pleads Guilty to NYC Comptroller, West Point Website Defacements
MALWARE
- Cyber criminals using lookalike online shopping domains to phish buyers
- Canadian restaurant chain suffers country-wide outage after malware outbreak
- Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
- Researchers Link New NOKKI Malware to North Korean Actor
- NOKKI Malware Sports Mysterious Link to Reaper APT Group
- Malware 101: The Malware Tools That Attackers Use
- Following a Trail of Confusion: PowerShell in Malicious Office Documents
- Google taking new steps to prevent malicious Chrome extensions
- AR18-275A: MAR-10201537 – HIDDEN COBRA FASTCash-Related Malware
- Enabling Enterprise-Grade Hybrid Cloud Data Processing with SAP and Cisco – Part 2
- A remote access #Trojan -- dubbed #GravityRAT -- was discovered by Cisco Talos (@TalosSecurity) to be checking for #antimalware sandboxes.
- Danabot Banking Malware Now Targeting Banks in the U.S.
- Dogcall Rat links NOKKI malware with Reaper group - indicators provided
- The MITRE ATT&CK Framework: Command and Control
- Ransomware attacks via RDP on the rise | Avast
- Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
- Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
- World Cup may have distracted malware hackers
- Microsoft Detection Tools Sniff Out Fileless Malware
- Google Cracks Down on Malicious Chrome Extensions in Major Update
- Fortnite gamers targeted by data theft malware
- Windows Defender exclusions reek of malware
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
- Report: Zoho's domain regularly exploited to move keylogger data
- A Staggering Amount of Stolen Data is Heading to Zoho Domains
- AV-TEST Rates Check Point’s SandBlast Agent as a Top Product in Corporate Endpoint Protection
- Malware Less Common in Q2, Still Top Attack Method
- Malware Less Common in Q2, Still Top Attack Method
- Alphabet's @chroniclesec unveiled #VirusTotal Enterprise, a new version of the file scanning service designed specifically for enterprise customers. By @RobWright22
- Fruitfly Mac malware creator used it to spy on minors; FBI discloses technique
- CVE-2018-8373: Hackers’ best partner to spread Trojans
- Desktop Telegram users showing off not only their silly selfies but also their IP addresses
- New Type of Malware Developed by Russian Hackers Eludes Discovery
- The Army is working toward a cyber domain doctrine
- The MITRE ATT&CK Framework: Command and Control
- Improving #mobilesecurity programs to detect
- Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
- A group of #malware was discovered targeting public SSH servers. However, certain #IPaddresses are avoided. Discover how this is possible
- Telegram vulnerability causes IP address leaking
- Hackers use malicious content delivery system to target iOS device
- Torii malware could be gateway to more sophisticated IoT botnet attacks
EXPLOIT
- .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
- Report: Zoho's domain regularly exploited to move keylogger data
- Facebook Breach: Attackers Exploited Privacy Feature
- SQL injection explained: How these attacks work and how to prevent them
VULNERABILITY
- PDF patch time: fixes land for over 100 flaws in Adobe's and Foxit's PDF software
- Foxit PDF Reader Fixes High-Severity Remote Code Execution Flaws
- Foxit Reader 9.3 addresses 118 Vulnerabilities, 18 of them rated as critical
- Google Patches Critical Vulnerabilities in Android OS
- Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
- Foxit Reader Update Patches Over 100 Vulnerabilities
- Use Windows, macOS? Don’t be hacked by PDF, patch these critical Adobe flaws now
- New study finds 5 of every 6 routers are inadequately updated for security flaws
- .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
- Adobe Releases Updates For 85 PDF Related CVEs
- Nine NAS Bugs Open LenovoEMC, Iomega Devices To Attack
- Rep. Speier: Congress needs a hack demo to understand election vulnerabilities
- Cisco Talos discloses serious vulnerabilities in Foxit PDF Reader
- Adobe fixes 47 critical flaws in Acrobat and Reader
- 86 Vulnerabilities Fixed with Adobe Security Updates for Adobe Acrobat and Reader
- Use Windows, macOS? Don't be hacked by PDF, patch these critical Adobe flaws now
- CVE-2018-8373: Hackers’ best partner to spread Trojans
- Vulnerability Spotlight: Adobe Acrobat Reader DC Collab reviewServer Remote Code Execution Vulnerability
- Adobe Patches 86 Vulnerabilities in Acrobat Products
- Adobe security updates for Acrobat fix 86 Vulnerabilities, 46 rated as critical
- Telegram vulnerability causes IP address leaking
- Security Update for Foxit PDF Reader Fixes 118 Vulnerabilities
- Adobe Releases Security Updates for Acrobat that Fix 86 Vulnerabilities