Threat report for 2018-10-04
DATA BREACH
- UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
- .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
- Campaign 2018: Cyberattacks on infrastructure could suppress voter turnout
- Sony accidentally leaked November's PS Plus free games
- US charges Russian military officers over international hacking and disinformation campaigns
- Burgerville Customer Credit Card Info Stolen In Data Breach
- HIDDEN COBRA – FASTCash Campaign
- Database of 200 Million Records Stolen from Apollo in Data Breach
- Irish Data Regulator Likely to Fine Facebook for Data Breach
- 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
- The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
- Burgerville customer credit card info stolen in data breach laid at Fin7's feet
- How #livechatsoftware leak personal #employeedata?
- Democratic congressional intern arrested for doxing GOP senators during Kavanaugh hearing
- Business Email Compromise: When You Don’t Need to Phish.
- Business email compromise made easy for cyber criminals
- In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
- Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
- UK and allies accuse Russia of cyber attack campaign
- Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
- U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
DENIAL-OF-SERVICE
- California bill bans bots during elections
- Why It’s Time to Nuke the Password
- Why It’s Time to Nuke the Password
MALVERTISING
Nothing to report
PHISHING
- Exclusive: Moving away from passwords to two-factor authentication
- Block Blocking Login Items
- Business Email Compromise: When You Don’t Need to Phish.
- Hackers Selling Facebook Account Logins Details On Dark Web For $3
- Experts recommend avoiding single step logins
- Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
- Why It’s Time to Nuke the Password
- Why It’s Time to Nuke the Password
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
WEB DEFACEMENT
- Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
- Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
MALWARE
- Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
- .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
- China allegedly infiltrated US companies through implanted hardware backdoors
- Researchers at the 2018 @RSAConference discussed #stegware: @malware that uses #steganography. Discover how this works with expert @lewisnic.
- Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
- Avast AV reclassifies cryptominers | Avast
- Researchers at Cisco Talos (@TalosSecurity) recently discovered #GravityRAT, a remote access #Trojan. Discover how this RAT can check for
- This is also a good time to remind that bugdoors are far more scary than backdoors.
- Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
- Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
- Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
- Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
- Tearing Apart the Undetected (OSX)Coldroot RAT
- Mac Malware of 2017
- WTF is Mughthesec!? poking on a piece of undetected adware
- OSX/MacRansom; analyzing the latest ransomware to target macs
- Mac Malware of 2016
- Towards Generic Ransomware Detection
- Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
- Analyzing the Anti-Analysis Logic of an Adware Installer
- Monitoring Process Creation via the Kernel (Part III)
- Monitoring Process Creation via the Kernel (Part II)
- Monitoring Process Creation via the Kernel (Part I)
- More on, "Adware for OS X Distributes Trojans"
- LoJax: First UEFI Malware seen in the Wild
- Virus Bulletin 2018: Attack velocity ramps up
- More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
- Malicious remote admin tool seemingly linked to KONNI malware, North Korea
- Betabot trojan packed with anti-malware evasion tools
- How is Android Accessibility Service affected by a banking Trojan?
- How does stegware malware exploit steganography techniques?
- .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- A new group of #malware -- dubbed #GoScanSSH -- was recently discovered by researchers. Learn how this malware works and
- Seriously if I could make evil semiconductors I would just replace one which is already present rather than adding it.
Show
- WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
- New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
- Researchers found that cheap Android devices were shipped pre-installed backdoors
- Google opened the .page domain
- Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
- Zoho Heavily Used by Keyloggers to Transmit Stolen Data
- Network Outage at Some Recipe Unlimited Locations Caused by Malware
- DanaBot Observed in Large Campaign Targeting U.S. Organizations
EXPLOIT
- Google Project Zero drops macOS exploit, calls out Apple for silent patching
- CVE-2018-8373 Exploit Spotted
- Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
- Remote Mac Exploitation Via Custom URL Schemes
- How does stegware malware exploit steganography techniques?
- Secure encrypted #virtualization: How is this technology exploited?
VULNERABILITY
- Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
- CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
- macOS Flaw Allows Attackers To Hijack Installed Apps
- ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
- CVE-2018-8373 Exploit Spotted
- Vulnerability Scanning vs. Penetration Testing by @TripwireInc
- This is also a good time to remind that bugdoors are far more scary than backdoors.
- A Remote iOS Bug
- An Unpatched Kernel Bug
- From the Top to the Bottom; Tracking down CVE-2017-7149
- Two Bugs, One Func(), part three
- Two Bugs, One Func(), part two
- Two Bugs, One Func(), part one
- CVE-2015-3673: Goodbye Rootpipe...(for now?)
- Cisco: Two critical bugs in DNA network software need these urgent patches
- Paper over the Kracks: New techniques can bypass WPA2 flaw mitigations
- Hackers Earn $150,000 in Marine Corps Bug Bounty Program
- Cisco plugs critical flaws in DNA Center and Prime Infrastructure
- Marine Corps bug bounty program finds 150 vulnerabilities
- Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
- Foxit PDF Reader fixes serious remote code execution vulnerability
- A Google bug breaks the search results in Safari
- Hacking for good uncovers over 150 Marine Corps web vulnerabilities