Oct 18, 2018

Threat report for 2018-10-17

DATA BREACH & DATA LOSS

  1. Tumblr Patches Security Issue that Would Leak Emails, Hashed-Salted Passwords
  2. MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry
  3. Redis 5.0 release, High-performance key-value database
  4. Information of 396K Users Exposed in Facepunch Data Breach
  5. 35 Million US Voter Registration Records Found for Sale on Dark Web
  6. Phishers target book publishers in new campaign
  7. Pentagon Disclosed Data Breach At Department Of Defense Affecting 30,000 Workers
  8. 35 million US voter records up for sale on the dark web
  9. Who is to blame for the majority of data breaches?
  10. GreyEnergy: New malware campaign targets critical infrastructure companies
  11. Tumblr Patches A Flaw That Could Have Exposed Users’ Account Info
  12. Anthem pays out record $16m over data breach
  13. SEO Poisoning Campaign Targeting U.S. Midterm Election Keywords
  14. .@Google Firebase #DatabaseSecurity proved insufficient when bypassed by hackers to leak data. Learn more about this #SecurityFlaw from expert Michael
  15. 35 million voter records from 19 US states for sale
  16. Alphabet in the soup for keeping quiet about Google+ data leak bug
  17. Anthem Mega-Breach: Record $16 Million HIPAA Settlement
  18. US Voter Records for Sale on Hacker Forum
  19. Millions of US Voter Records for Sale
  20. 35 Million U.S Voter Records Selling in Popular Dark web Hacking Forum from $150 USD to $12,500 USD
  21. Travel data for about 30,000 individuals was exposed in a Pentagon #DataBreach and experts expect that the information could be

DENIAL-OF-SERVICE

  1. Brazil expert discovers Oracle flaw that allows massive DDoS attacks

MALVERTISING

Nil

PHISHING

  1. FBI Releases Document with Measures for Defending Against Payroll Phishing Scams
  2. How Office 365 learned to reel in phish
  3. Another Phishing Scam is Appearing in Small Business Inboxes
  4. Is this the simple solution to password re-use?
  5. Public Cloud Phishing
  6. Learn how hackers used TLS certificates to launch @netflix #phishing attacks from expert Michael Cobb of @thehairyITdog
  7. "Attackers have expanded [phishing attacks] significantly into SMS and social media, and are displaying a preference for targeting personal email
  8. Faculties and Staff of Chapman got Affected by the ‘Critical’ Phishing Attack
  9. LibSSH Flaw Allows Hackers to Take Over Servers Without Password

WEB DEFACEMENT

Nil

BOTNET

Nil

RANSOMWARE

  1. Podcast: A Utility Ransomware Attack, Post-Hurricane
  2. Ransomware attack hits North Carolina water utility following hurricane
  3. A crippling ransomware attack hit a water utility in the aftermath of Hurricane Florence

CRYPTOMINING & CRYPTOCURRENCIES

  1. AISA 2018: Japan's journey from a cryptocurrency hack to better regulation
  2. .@alienvault researchers recently discovered #MassMiner, a #cryptocurrency mining #malware that has the ability to infect systems across the web. Discover
  3. How Blockchain Is Making it Easier for Fintech Companies to Scale Up
  4. Im Interview erläutert Georgeta Toth, Regional Director bei dem Security-Spezialisten #Proofpoint, den Einfluss der Crypto-Mining-#Malware auf Endgeräte in Unternehmen.
  5. Android Apps claim to mine unminable cryptocurrency, just show ads
  6. #GroupIB has estimated that cryptocurrency exchanges suffered a total loss of $882 mln due to targeted attacks in 2017 and

MALWARE

  1. LuminosityLink RAT Author Sentenced to 30 Months in Prison
  2. MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry
  3. .@alienvault researchers recently discovered #MassMiner, a #cryptocurrency mining #malware that has the ability to infect systems across the web. Discover
  4. A hacker who used fake advertisements placed on local newspaper websites to spread malware has been sentenced to 33 months
  5. Im Interview erläutert Georgeta Toth, Regional Director bei dem Security-Spezialisten #Proofpoint, den Einfluss der Crypto-Mining-#Malware auf Endgeräte in Unternehmen.
  6. GreyEnergy: New malware campaign targets critical infrastructure companies
  7. Insult to injury: Malware menace soaks water-logged utility ravaged by Hurricane Florence
  8. How does #FacexWorm #malware use @Facebook Messenger to spread? Learn more about this new malware with expert @lewisnic.
  9. New GreyEnergy Malware Targets ICS, Tied with BlackEnergy and TeleBots
  10. How does #MassMiner #malware infect systems across the web?
  11. Avast scores high in malware protection | Avast
  12. Sony has solved the crash of PS4 receiving malicious message
  13. Abandoned Tweet Counter Hijacked With Malicious Script
  14. 21-year-old Hacker Sentenced to 30 Months Prison for Creating Popular Hacking Tool LumunosityLink RAT
  15. The attackers learn that due to the complexity and fluctuations of the pulping process, any changes could take up to

EXPLOIT

Nil

VULNERABILITY

  1. Cisco Patches Remotely Exploitable High Risk Security Bugs in Multiple Products
  2. Libssh Vulnerability Exposes Servers to Attacks
  3. Chrome 70 Updates Sign-In Options, Patches 23 Flaws
  4. VoiceOver iOS 12 Bug Creates Lock Screen Bypass Exposing User Photos
  5. Tumblr discloses vulnerability but says 'no evidence that this bug was abused'
  6. Oracle Fixes 301 Flaws in October Critical Patch Update
  7. Serious SSH bug lets crooks log in just by asking nicely
  8. Oracle Patched Over 300 Vulnerabilities in Its Q3 2018 Critical Patch Update
  9. LibSSH Flaw Leaves Thousands Of Servers At Risk Of Hijacking
  10. CVE-2018-10933: Libssh Server Side Authentication Bypass Vulnerability Alert
  11. Thousands of servers easy to hack due to a LibSSH Flaw
  12. Take a Bite out of the Vulnerability Remediation Backlog with InsightVM
  13. WhiteSource raises $35 million for open source flaw detection platform
  14. CVE-2018-3211: Java Usage Tracker Local Elevation of Privilege on Windows
  15. Oracle CPU October 2018: 301 vulnerabilities patched
  16. Thousands Of Servers Vulnerable To Hacking Due To libssh Flaw
  17. Critical Vulnerabilities Allow Takeover of D-Link Routers
  18. Tumblr Patches A Flaw That Could Have Exposed Users’ Account Info
  19. Remote Code Implantation Flaw Found in Medtronic Cardiac Programmers
  20. Alphabet in the soup for keeping quiet about Google+ data leak bug
  21. Hacker: I'm logged in. New LibSSH Vulnerability: OK! I believe you.
  22. Brazil expert discovers Oracle flaw that allows massive DDoS attacks
  23. Endpoint security solutions challenged by zero-day and fileless attacks
  24. VMware addressed Code Execution Flaw in its ESXi, Workstation, and Fusion products
  25. Flaws in Branch.io Affected Over 685 Million Users
  26. Security flaw in libssh leaves thousands of servers at risk of hijacking
  27. Oracle patches 301 vulnerabilities, including 46 with a 9.8+ severity rating
  28. VMware Patches Code Execution Flaw in Virtual Graphics Card
  29. CVE-2018-3245: Weblogic Remote Code Execution Vulnerability Alert
  30. Oracle releases Critical Patch Update Advisory – October 2018: fix 301 security bugs
  31. Git RCE Vulnerability (CVE-2018-17456)Security Advisory
  32. LibSSH Flaw Allows Hackers to Take Over Servers Without Password
  33. Vulnerability in voting machines has not been corrected after 11 years
  34. Vulnerability in Apple VoiceOver allows hackers access to user photos
  35. Google Chrome 70.0.3538.67 releases: fix multiple high-risk vulnerabilities
  36. The Qihoo @360CoreSec team found a @Microsoft vulnerability -- named Double Kill -- that affects applications through #MicrosoftOffice documents. Learn