Oct 20, 2018

Threat report for 2018-10-19

DATA BREACH & DATA LOSS

  1. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  2. Campaign 2018: Artificial intelligence is automating attacks on political campaigns
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. A Pentagon #DataBreach exposed data on at least 30,000 individuals, but other details about the incident are still scarce. By
  5. Campaign 2018: Artificial Intelligence Is Automating Attacks On Political Campaigns
  6. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  7. Did you know? Corporate email accounts can be compromised for as little as $150. Read more key findings from our
  8. US Voter Leak Hits Tea Party Organization
  9. VestaCP users warned about possible server compromise
  10. jQuery File Upload Plugin Vulnerable for 8 Years and Only Hackers Knew
  11. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  12. Campaign launched to protect ethical hackers in the Americas
  13. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  14. Facepunch 2016 breach exposed 343,000 users
  15. Today we're explaining #Canada's Data Breach Regulations on the #blog. Jet on over to find out if your organization complies
  16. ADHA's non-process for releasing My Health Record data revealed
  17. MikroTik routers targeted by cryptomining campaign | Avast
  18. Vulnerability in Tumblr could have compromise users’ account data
  19. Poor security practices and access to hacking services are making it easy for #cybercriminals to compromise business email, research reveals:

DENIAL-OF-SERVICE

  1. New DDoS Malware Infects Open-Source Web Hosting Software
  2. Lawfare editor on persistent DDoS attack: 'We wish they'd knock it off'
  3. DDoS Attack Prevention Method on Your Enterprise’s Systems – A Detailed Report

MALVERTISING

Nil

PHISHING

  1. Password and credit card-stealing Azorult malware adds new tricks
  2. AISA 2018: Hunting for phishing kits
  3. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  4. Recent phishing campaign against the Office of the First Deputy Prime Minister - Kingdom of Bahrain. Targeting Aysha Bukhelli, spoofed
  5. #HurricaneMichael #phishing schemes leverage Azure blob storage to rake in credentials. http://ow.ly/J6m850js1sk via the @threatinsight research team.

WEB DEFACEMENT

Nil

BOTNET

  1. Ok now, which one of you is running this Twitter botnet of fake infosec professionals?

RANSOMWARE

  1. City Pays $2,000 in Computer Ransomware Attack
  2. Water Utility ONWASA Hit by Ransomware Attack
  3. Madison County Computer Systems Face a Ransomware Attack
  4. The Week in Ransomware - October 19th 2018 - GandCrab, Birbware, and More
  5. Top 4 tips to avoid getting hit by ransomware
  6. Onslow County Utility Hit with Ransomware Attack

CRYPTOMINING & CRYPTOCURRENCIES

  1. Report: Cryptocurrency Exchanges Lost $882 Million to Hackers
  2. MikroTik routers targeted by cryptomining campaign | Avast
  3. Fraudster Targets Cryptocurrency Wallets with a Variety of Info Stealers

MALWARE

  1. Small or Big Business, Malware Hits Everyone
  2. Kaspersky says it detected infections with DarkPulsar, alleged NSA malware
  3. Chinese Hackers Use 'Datper' Trojan in Recent Campaign
  4. Password and credit card-stealing Azorult malware adds new tricks
  5. SettingContent-ms can be Abused to Drop Complex DeepLink and Icon-based Payload
  6. New DDoS Malware Infects Open-Source Web Hosting Software
  7. America’s First: US Leads in Global Malware C2 Distribution
  8. New RTF-based Campaign Distributing Agent Tesla and Loki Malware
  9. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  10. The Golden Age of Malware
  11. LuminosityLink RAT author sentenced to 30 years in prison
  12. Inside Safari Extensions | Malware’s Golden Key to User Data
  13. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  14. ADHA's non-process for releasing My Health Record data revealed
  15. APT Group Uses Datper Malware To Launch Cyber Attack on Asia Countries by Executing Shell Commands
  16. Canberra competence shines in day of PM domain lapses and tortured analogies

EXPLOIT

  1. NSA-Linked 'DarkPulsar' Exploit Tool Detailed

VULNERABILITY

  1. libssh Vulnerability: Is WatchGuard Affected?
  2. 0-Day in jQuery Plugin Impacts Thousands of Applications
  3. Fixing a CSRF Vulnerability
  4. This Week in Security News: Apex One™ Release and Java Usage Tracker Flaws
  5. AWS FreeRTOS Bugs Allow Compromise of IoT Devices
  6. Drupal dev team fixed Remote Code Execution flaws in the popular CMS
  7. Flaw in Libssh Grants Admin Control to Servers
  8. FreeRTOS Vulnerabilities Expose Many Systems to Attacks
  9. Linksys E Series Vulnerabilities
  10. Google warns Apple: Missing bugs in your security bulletins are 'disincentive to patch'
  11. jQuery Zero-Day Was Exploited For At Least Three Years
  12. A Serious Security Flaw Found in LibSSH
  13. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  14. Splunk addressed several vulnerabilities in Enterprise and Light products
  15. Serious D-Link router security flaws may never be patched
  16. Scams and flaws: Why we get duped
  17. Remote Code Execution Flaws Patched in Drupal
  18. Tumblr bug bounty program detects flaw, no user info lost
  19. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  20. The blogging site Tumblr has disclosed and fixed a security flaw that could have exposed sensitive account information.
  21. Critical Flaw Found in Streaming Library Used by VLC and Other Media Players
  22. Drupal Remote Code Execution Vulnerability Alert
  23. Business emails could represent a major security flaw for UK companies, after it was revealed millions of account details are
  24. Splunk Patches Several Flaws in Enterprise, Light Products
  25. Vulnerability in Tumblr could have compromise users’ account data
  26. Three critical vulnerabilities can be chained to take full control of D-Link routers
  27. Zero-day in popular jQuery plugin actively exploited for at least three years
  28. Tumblr serious vulnerability can reveal everyone information
  29. Critical Flaws Found in Amazon FreeRTOS IoT Operating System