Oct 4, 2018

Threat report for 2018-10-03

DATA BREACH

  1. FakeSpy Is Back as Part of New SmiShing Campaign, Adds New Features
  2. The ultimate fallout from the Facebook data breach could be massive
  3. Gwinnett Medical Center Investigates Possible Data Breach
  4. Gwinnett Medical Center investigates possible data breach
  5. GhostDNS hijacking campaign steps up attacks on Brazilians; 100K+ devices compromised
  6. #DanaBot Observed in Large Campaign Targeting U.S. Organizations
  7. Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
  8. Facebook Reveals That Trio of Bugs Led to Data Breach
  9. Vietnam-Born Worker in U.S Intelligence Ordered Prison over Data Theft and Leakage
  10. New Danabot Banking Malware campaign now targets banks in the U.S.
  11. Zoho domains central to keylogger, data theft campaigns worldwide
  12. 100,000-Plus Home Routers Hijacked in Campaign to Steal Banking Credentials
  13. .@Lookout’s @VijayaKaza is at @FedNewsRadio’s studio recording with @gschumm!
  14. How Ashley Madison Recovered From Its Massive Data Breach
  15. An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
  16. New Betabot campaign under the microscope
  17. CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
  18. Facebook faces legal actions after data breach
  19. Norton by Symantec Urges Consumers to Help Protect Their Personal Data
  20. DanaBot Observed in Large Campaign Targeting U.S. Organizations

DENIAL-OF-SERVICE

  1. Torii Botnet - Definitely Not a Mirai Wannabe
  2. Instagram Used as Marketplace to Sell Stolen Fortnite Accounts and Botnets
  3. Hacked Fortnite accounts and rent-a-botnet being pushed on Instagram
  4. Hackers Use Instagram For Selling Stolen ‘Fortnite’ Accounts And Botnets
  5. Enormous botnet used to hijack traffic destined for Brazilian banks
  6. BYOB – Build Your Own Botnet
  7. The @activereach guide to #DDoS, is aimed at technically aware business people who do not necessarily have a background in

MALVERTISING

Nothing to report

PHISHING

  1. Phishing 101: Protection for Everyone
  2. How to use the Firefox Master Password
  3. Phishing gets more complex as decoy PDF pops up with Microsoft-issued SSL certificate
  4. LastPass study shines new light on global password security practices
  5. Do you know the top myths and facts of #mobile #phishing? If not, don't worry, we've compiled a list of
  6. Phishing Attack Impersonates Law Firm
  7. Phishing Attack Uses Azure Blob Storage to Impersonate Microsoft
  8. Phishing Attack Impersonates Law Firm
  9. Password-sharing is still prevalent in the workplace – although 45 percent of businesses do now use multifactor authentication:
  10. GhostDNS hijacked 100,000 router traffic directed to phishing sites
  11. Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
  12. An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
  13. What is the future of authentication? Hint: It’s not passwords, passphrases or MFA
  14. 100,000 routers hijacked by GhostDNS, traffic directed to phishing sites

WEB DEFACEMENT

  1. Hacker Faces Jail Time After Defacing West Point, NYC Sites
  2. Hacker Defacing 11,000 US Websites Faces 10 Years behind Bars
  3. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
  4. Hacker faces jail time after defacing US military academy, NYC sites

MALWARE

  1. Windows 10 October 2018 Update refines ransomware protection
  2. Virus Bulletin 2018: macOS Flaw Allows Attackers to Hijack Installed Apps
  3. Virus Bulletin 2018: Microsoft’s Lambert on How Cloud is Changing Security
  4. Malware Outbreak Causes Disruptions, Closures at Canadian Restaurant Chain
  5. Betabot - An Example of Cheap Modern Malware Sophistication
  6. Instagram accounts frozen with ransomware | Avast
  7. Instagram accounts frozen with ransomware | Avast
  8. Did you know that 1 in 131 emails contains malware? In honor of #NCSAM, secure your spot for #RiskSec, expand
  9. New KONNI Malware Attacking Eurasia and Southeast Asia
  10. Google Taking New Steps To Prevent Malicious Chrome Extensions
  11. 3 types of attacks with ransomware: Cyber-theft, extortion, and sabotage
  12. Network Outage at Some Recipe Unlimited Locations Caused by Malware
  13. Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware
  14. Banking trojans, not #ransomware, are the biggest threat to the enterprise now.
  15. Labeless Part 5: How to Decrypt Strings in Boleto Banking Malware Without Reconstructing Decryption Algorithm.
  16. Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
  17. Ransomware operators breach 40.000+ records from Fetal Diagnostic Institute of the Pacific
  18. New Danabot Banking Malware campaign now targets banks in the U.S.
  19. Zoho domains central to keylogger, data theft campaigns worldwide
  20. Recipe Unlimited denies ransomware attack, despite alleged ransom note
  21. Dark Web Malware Builder Allow Attackers To Create Malware That Steals Passwords & Credit Card Data
  22. IDG Contributor Network: Will your company be valued by its price-to-data ratio?
  23. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  24. Introducing... THE HUNT: A Cyber Attack in the Process Industry
  25. Researchers associated the recently discovered NOKKI Malware to North Korean APT
  26. Changes to #Sanny #malware delivery method attacks were recently discovered by @FireEye researches. Learn who is at risk and how
  27. Ransomware Hits Port of San Diego
  28. An extremely high number of keylogger #phishing campaigns have been seen tied to the Zoho online office suite software:
  29. Z-LAB Report – Analyzing the GandCrab v5 ransomware
  30. Preventing and Detecting Malicious Insiders
  31. In 1999, AV-TEST reported that there were 98,428 total unique malware samples. Today, AV-TEST registers over 350,000 new pieces of
  32. Cheap Android Phones and Poor Quality Control Leads to Malware Surprise
  33. DanaBot Observed in Large Campaign Targeting U.S. Organizations

EXPLOIT

  1. TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers
  2. TA18-276A: Using Rigorous Credential Control to Mitigate Trusted Network Exploitation
  3. Heipparallaa! Uudessa jaksossamme sivuutamme ajankohtaiset aiheet ja keskitymme puhumaan @japi999 ja @ekoivune kanssa tietoturva-asiantuntijuudesta. Bonusvieraana tällä kertaa OpSecin sijaan @Larppa1337!

VULNERABILITY

  1. Virus Bulletin 2018: macOS Flaw Allows Attackers to Hijack Installed Apps
  2. [SingCERT] Alert on 47 Critical Vulnerabilities in Adobe Acrobat and Adobe Reader
  3. Mozilla Firefox Releases 62.0.3 & Security Updates for 2 High Critical Vulnerabilities
  4. Women in Information Security: Pam Armstrong
  5. Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
  6. Foxit patches 118 vulnerabilities in popular PDF reader
  7. Experts found 9 NAS flaws that expose LenovoEMC, Iomega Devices to hack
  8. The one serious MacBook Pro security flaw that nobody is talking about
  9. Update now: Adobe fixes 85 serious flaws in Acrobat and Reader
  10. 18 Vulnerabilities Found in Foxit PDF Reader
  11. 18 Vulnerabilities Found in Foxit PDF Reader
  12. Marine Corps bug bounty program finds 150 vulnerabilities
  13. TP-Link router vulnerable to remote takeover flaw
  14. Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
  15. Adobe update cleans up 86 bugs in Acrobat and Reader, many critical
  16. Facebook Reveals That Trio of Bugs Led to Data Breach
  17. TP-Link router vulnerable to remote takeover flaw
  18. Adobe update cleans up 86 bugs in Acrobat and Reader, many critical
  19. The Intel Management Engine exposes a new vulnerability
  20. How an improper #authentication flaw affects
  21. Vulnerability Spotlight: Google PDFium JBIG2 Image ComposeToOpt2WithRect Information Disclosure Vulnerability
  22. CyberSecurity Asean security alert on A Vulnerability in Microsoft Windows JET Database Engine Could Allow for Remote Code Execution
  23. Vulnerabilities expose Iomega and LenovoEMC NAS devices to attacks
  24. Estonia sues Gemalto for €152M for the flaws in the identification cards issued by the company
  25. Scanning for OWASP Top 10 Vulnerabilities with Metasploit for the Web(w3af)
  26. Mozilla Firefox 62.0.3 releases: Fixed hangs on macOS Mojave & security bugs
  27. Apple iOS 12 Texting Bug Sends Messages To Wrong Contacts