Oct 19, 2018

Threat report for 2018-10-18

DATA BREACH & DATA LOSS

  1. 35 Million Records Of US Voters Data For Sale On The Dark Web
  2. Thousands of Neoflam Clients Had Their Data Leaked After Buying Frying Pans
  3. Tracking Tick Through Recent Campaigns Targeting East Asia
  4. Cyber Espionage Campaign Reuses Code from China's APT1
  5. The #NetSpectre vulnerability could enable a slow leak of data remotely via side channels. Expert Michael Cobb of @thehairyITdog explains
  6. Tumblr Privacy Bug Could Have Exposed Sensitive Account Data
  7. Apple to US users: Here's how you can now see what personal data we hold on you
  8. Open source web hosting software compromised with DDoS malware
  9. Anthem Settles with OCR for $16M for 2015 Data Breach
  10. Card Factory Exposed Customers Photos Publicly Due To A Website Flaw
  11. Hackers can use legitimate #AdminTools to compromise networks. Learn more about "living off the land" attacks from expert Michael Cobb
  12. Tumblr patches bug that could have exposed user data
  13. 12.5 Million Email Archives Exposed - Why would #cybercriminals go to a #darkweb market and pay for access when they
  14. #NetSpectre exploits leak data remotely via side-channel attacks. Learn how to use #ThreatModeling to stop speculative execution from expert Ed
  15. Tracking Tick Through Recent Campaigns Targeting East Asia
  16. McAfee researchers uncover ‘significant’ espionage campaign
  17. Apple to US users: Here's how you can now see what personal data we hold on you
  18. Tumblr Fixes Security Bug that Leaked Private Account Info
  19. Tumblr fixed a #vulnerability that could have exposed sensitive account #data, including usernames/passwords and individual IP addresses. But the company
  20. The #TLBleed vulnerability uses @Intel's HTT chip feature to leak data. Learn about how hackers could use #malware to launch
  21. VestaCP compromised in a new supply-chain attack
  22. VestaCP compromised in a new supply-chain attack
  23. Anthem to pay record £12M for 2015 data breach
  24. Around 600 Computers of Anne Arundel County Public Library have been Exposed to Emotet Virus
  25. In the wake of numerous high-profile data breaches and privacy incidents, consumers are more aware and concerned than ever about
  26. Senate inquiry recommends locking down My Health Record by default
  27. Tumblr Vulnerability Exposed User Account Information
  28. The Equifax Hack Uploaded Files the Right Way
  29. Bug Trio Affecting Eight D-Link Models Leads to Full Compromise
  30. SEO pollution campaign affects web searches related to EU midterm elections

DENIAL-OF-SERVICE

  1. Open source web hosting software compromised with DDoS malware
  2. Who and Why Make DDoS Attacks on The Site of Colleges and Universities ?
  3. A10 Networks provides cloud, Internet and gaming providers with 1 RU DDoS defense appliance

MALVERTISING

Nil

PHISHING

  1. The libssh “login with no password” bug – what you need to know [VIDEO]

WEB DEFACEMENT

Nil

BOTNET

  1. After an attempted comeback by the Russian built #VPNFilter #botnet, home #networkdevices are at risk. Learn how this #malware targets
  2. How does the resurgent VPNFilter botnet target victims?

RANSOMWARE

  1. 7 best practices for negotiating ransomware payments

CRYPTOMINING & CRYPTOCURRENCIES

  1. Fake Adobe Flash update hides cryptocurrency malware
  2. Crooks are attempting to spread their cryptojacking malware to unsuspecting victims by disguising it as an update for Flash. The malicious
  3. Top 10 Blockchain Development Companies
  4. Crypto Mining Malware Runs on iPhone
  5. Cryptocurrency Miners Hiding As Flash Updates
  6. Cryptomining Malware Attacks On iPhones Grew By 400%
  7. Hacking Attacks On Cryptocurrency Exchanges Resulted in a Loss of $882 Million
  8. RAT author jailed for 30 months, ordered to hand over $725k worth of Bitcoin
  9. RAT author jailed for 30 months, ordered to hand over $725k worth of Bitcoin
  10. LuminosityLink spyware mastermind gets 30 months in the clink, forfeits $725k in Bitcoin
  11. Researcher Livestreams 51% Attack on Altcoin Blockchain
  12. Cryptojacking: A hidden cost for your company
  13. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers

MALWARE

  1. Fake Adobe Flash update hides cryptocurrency malware
  2. After an attempted comeback by the Russian built #VPNFilter #botnet, home #networkdevices are at risk. Learn how this #malware targets
  3. Open source web hosting software compromised with DDoS malware
  4. LuminosityLink Spyware Mastermind Gets 30 Months In The Clink
  5. Crooks are attempting to spread their cryptojacking malware to unsuspecting victims by disguising it as an update for Flash. The malicious
  6. Crypto Mining Malware Runs on iPhone
  7. GPlayed Trojan - .Net Playing with Google Market
  8. Cryptomining Malware Attacks On iPhones Grew By 400%
  9. RAT author jailed for 30 months, ordered to hand over $725k worth of Bitcoin
  10. RAT author jailed for 30 months, ordered to hand over $725k worth of Bitcoin
  11. LuminosityLink spyware mastermind gets 30 months in the clink, forfeits $725k in Bitcoin
  12. The #TLBleed vulnerability uses @Intel's HTT chip feature to leak data. Learn about how hackers could use #malware to launch
  13. XBash Malware Security Advisory
  14. The author of the LuminosityLink RAT sentenced to 30 Months in Prison
  15. Stegware: How is #malware using #steganography techniques to avoid detection?
  16. Around 600 Computers of Anne Arundel County Public Library have been Exposed to Emotet Virus
  17. In order to distribute the attack payload, the code needs to be downloaded onto the PLCs & safety controllers. This

EXPLOIT

Nil

VULNERABILITY

  1. GitHub now warns devs about bugs that led to Equifax breach
  2. Flaws in telepresence robots allow hackers access to pictures, video feeds
  3. Branch.io Flaws may have affected as many as 685 million individuals
  4. Critical Remote Code Execution Vulnerabilities Patched by Drupal
  5. Code Execution Vulnerability Patched in Library Used by VLC, Other Media Players
  6. Flaws Open Telepresence Robots to Prying Eyes
  7. [SingCERT] Alert on Multiple Security Vulnerabilities in Oracle's Enterprise Products
  8. The #NetSpectre vulnerability could enable a slow leak of data remotely via side channels. Expert Michael Cobb of @thehairyITdog explains
  9. A newly disclosed #libSSH vulnerability could allow an attacker #AdminAccess to a server with little effort. By @MT_Heller
  10. Drupal addresses multiple critical flaws with latest release
  11. Tumblr Privacy Bug Could Have Exposed Sensitive Account Data
  12. CVE-2018-8460: Exposing a Double Free in Internet Explorer for Code Execution
  13. Wapiti – The Black Box Vulnerability Scanner for Web Applications
  14. Vulnerability Spotlight: Live Networks LIVE555 streaming media RTSPServer code execution vulnerability
  15. The libssh “login with no password” bug – what you need to know [VIDEO]
  16. Card Factory Exposed Customers Photos Publicly Due To A Website Flaw
  17. How Shodan helps identify ICS cybersecurity vulnerabilities
  18. Oracle extends its thanks to Qihoo 360 for fixing the vulnerabilities of Weblogic
  19. Tumblr patches bug that could have exposed user data
  20. [SingCERT] Alert on Linksys E Series Routers Vulnerabilities (CVE-2018-3953, CVE-2018-3954, and CVE-2018-3955)
  21. Apache Access Vulnerability Could Affect Thousands of Applications
  22. Last year, D-Link flubbed a router bug-fix, so it's back with total pwnage
  23. Party like it's 1989... SVGA code bug haunts VMware's house, lets guests flee to host OS
  24. Oracle Patches 301 Vulnerabilities in October Update
  25. Tumblr Fixes Security Bug that Leaked Private Account Info
  26. Ruby 2.4.5 released: 40 bug fixes
  27. Tumblr fixed a #vulnerability that could have exposed sensitive account #data, including usernames/passwords and individual IP addresses. But the company
  28. The #TLBleed vulnerability uses @Intel's HTT chip feature to leak data. Learn about how hackers could use #malware to launch
  29. New libSSH vulnerability gives root access to servers
  30. A 4-year-old #libSSH vulnerability can allow attackers to easily log in to servers with full administrative control, but it is
  31. The implications of the NetSpectre vulnerability
  32. #Shodan can be a helpful tool for security professionals to locate #ICSsecurity vulnerabilities. Expert Ernie Hayden explains how Shodan works
  33. Oracle security updates contains 45 critical-rated vulnerability
  34. A #libSSH vulnerability that went undisclosed for almost five years could allow an attacker easy #AdminAccess to servers, @0xAmit said
  35. Vulnerability Spotlight: Live Networks LIVE555 streaming media RTSPServer code execution vulnerability
  36. Chaining three critical vulnerabilities allows takeover of D-Link routers
  37. Tumblr Fixes Critical Security Bug That Exposes User Account Details
  38. Tumblr Vulnerability Exposed User Account Information
  39. Bug Trio Affecting Eight D-Link Models Leads to Full Compromise