Oct 12, 2018

Threat report for 2018-10-11

DATA BREACH & DATA LOSS

  1. The BEC List: Helping Thwart Business Email Compromise through Collaboration
  2. Personal data for coffee. What’s the risk? | Avast
  3. The EU and the US have investigated on data breaches on the Google+
  4. FitMetrix user data exposed via passwordless ElasticSearch server cluster
  5. Apple has formed a partnership with lyrics database provider Genius
  6. Defending Against Business Email Compromise Attacks
  7. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  8. Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
  9. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  10. A new database with information on every shooting at a school in the last 50 years is now available publicly
  11. New Gallmaker APT group eschews malware in cyber espionage campaigns
  12. Ghostdns Attack Compromised Over 100K Routers
  13. A simple videocall could compromise your WhatsApp account
  14. Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
  15. Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

DENIAL-OF-SERVICE

Nil

MALVERTISING

Nil

PHISHING

  1. California Bill Increases Default Password Security
  2. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  3. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  4. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  5. AVG 2019 now includes enhanced phishing threat detection

WEB DEFACEMENT

  1. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites

BOTNET

Nil

RANSOMWARE

  1. Qihoo 360’s precise analysis of ransomware for September
  2. Costly cryptojacking overtakes ransomware in the enterprise threat stakes

CRYPTOMINING & CRYPTOCURRENCIES

  1. XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
  2. Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
  3. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  4. Cryptomining malware discovered masquerading as Flash updates
  5. Fake Flash Updaters Push Cryptocurrency Miners
  6. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  7. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  8. Crypto-mining malware poses as Flash updates
  9. Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )

MALWARE

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  3. Hackers Exploit Drupalgeddon2 to Install Backdoor
  4. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  5. Talos: Android trojan resembling Play Store installs sophisticated spyware
  6. Most Malware Arrives Via Email
  7. Fake Adobe Flash Updates Hide Malicious Crypto Miners
  8. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  9. GPlayed trojan – .Net playing with Google Market
  10. Cryptomining malware discovered masquerading as Flash updates
  11. This cryptojacking mining malware pretends to be a Flash update
  12. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  13. Reaper Group Uses New Malware to Deploy RAT
  14. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  15. Exaramel Malware Reinforces Link Between Industroyer and NotPetya
  16. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  17. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  18. New Android Trojan Gplayed Adapts to Attacker's Needs
  19. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  20. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  21. Crypto-mining malware poses as Flash updates
  22. Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
  23. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  24. New Backdoor Ties NotPetya and Industroyer to TeleBots Group
  25. .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
  26. "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
  27. The attached file promptly infects Peter’s laptop with the RAT, remote access trojan. It only takes about an hour from
  28. New Gallmaker APT group eschews malware in cyber espionage campaigns
  29. GPlayed Trojan - .Net playing with Google Market
  30. Canada-Based Restaurant Chain Hit with Malware Attack
  31. Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
  32. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
  33. How to Defeat Malicious Everything as-a-Service

EXPLOIT

  1. Hackers Exploit Drupalgeddon2 to Install Backdoor
  2. PoC Code Available for Microsoft Edge Remote Code Execution Bug

VULNERABILITY

  1. Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
  2. Senate seeks internal memo on Google+ vulnerability
  3. Slow disclosure of Google+ flaw draws attention of senators
  4. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  5. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  6. Network Time Protocol Bugs Sting Juniper Operating System
  7. Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
  8. Audit Finds No Critical Flaws in Firefox Update System
  9. [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
  10. A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
  11. Juniper fixes 30+ vulnerabilities in its routing, switching devices
  12. Adobe patches critical flaws in many of its software offerings
  13. Update now! Microsoft fixes 49 bugs, 12 are critical
  14. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  15. VMware issues advisory for a DoS vulnerability
  16. .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
  17. Juniper Patches Serious Flaws in Junos OS
  18. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  19. Four Critical Flaws Patched In Adobe Digital Edition