Oct 25, 2018

Threat report for 2018-10-24

DATA BREACH & DATA LOSS

  1. Cathay Pacific breach leaks personal data on 9.4 million people
  2. Cathay Pacific data breach hits 9.4 million people
  3. Hacker Guccifer, who exposed Clinton private email server, ready for US prison sentence
  4. Democratic Fundraising Firm Leaks Voter Database, Clients, Fundraisers
  5. Cathay Pacific Hit by Data Leak Affecting 9.4M Passengers
  6. Supermarket told it must compensate 100,000 workers after payroll data deliberately leaked by rogue employee
  7. Information-Stealing Malware Campaign Evades Anti-Virus Detection
  8. Cathay Pacific Suffers Data Breach Impacting 9.4 Million Passengers
  9. Pocket iNet Leaves 73 GB of Sensitive Data Exposed
  10. Yahoo to pay up to $85m to settle data breach lawsuit
  11. Tim Cook Blasts Weaponization Of Personal Data And Praises GDPR
  12. Pocket iNet Left All Of Its Corporate Passwords, Keys, And Data Exposed
  13. Apple's Tim Cook: Our personal data is 'weaponized against us' by you-know-who
  14. A #ZeroDay in #jQuery File Upload could affect thousands of projects because the jQuery #plugin vulnerability has existed for eight
  15. Last year the @USAgov required agencies to implement #DMARC records and policies by October 2018. Learn just how hard DMARC
  16. Discover how #NetSpectre attacks leak data remotely via side-channels with Michael Cobb of @thehairyITdog.
  17. Yahoo Agrees to Pay $50 Million in Damages to Settle Data Breach Lawsuit
  18. Business Email Compromise: Gift Cards
  19. US government medical website was hacked that 75,000 personal data was stolen
  20. Morrisons supermarket: We're taking payroll leak liability fight to UK Supreme Court
  21. Pocket iNet ISP exposed 73GB of data including secret keys, plain text passwords
  22. Weekly Threat Briefing: HealthCare.gov Suffered Data Breach As Hackers Stole 75,000 Records
  23. Yahoo agrees to pay $50 million to settle data breach lawsuit
  24. My Health Record opt-outs now sit at over 1.1 million
  25. ISP Provider Exposed 73 Gigabytes of Highly Sensitive Data Including To The Internet
  26. South Korea Seems Chief Target of the ‘Operation Oceansalt’ Campaign
  27. Again Hacker Exposed New Microsoft Unpatched Zero-day Bug In Twitter With PoC
  28. Yahoo to pay at least $85m for data breach settlement
  29. Survey: Nearly Half of U.S. Adults Experienced a Data Breach in the Past Three Years
  30. A recent @HealthCareGov #breach exposed unknown types of data on 75,000 people, but a lack of information in the disclosure

DENIAL-OF-SERVICE

  1. This botnet snares your smart devices to perform DDoS attacks with a little help from Mirai

MALVERTISING

Nil

PHISHING

  1. Phishing Attack Tip 1: Beware of Unsettling Content An email containing unsettling, startling, or urgent content that requires immediate action on
  2. The Enduring Password Conundrum
  3. Phishing for knowledge
  4. Phishing attacks: Why is email still such an easy target for hackers?
  5. Office 365 for Business - from May to September - has been Recorded Lowest Phish Miss Rate Versus Rivals
  6. Area 1 Security releases Pay-Per-Phish, the performance-based cybersecurity solution

WEB DEFACEMENT

Nil

BOTNET

  1. Poorly secured SSH servers targeted by Chalubo botnet
  2. This botnet snares your smart devices to perform DDoS attacks with a little help from Mirai
  3. "The resurgence of #VPNFilter #botnet appears to be limited to the Ukraine, but given the ease of infecting targeted systems,
  4. Chalubo, a new IoT botnet emerges in the threat landscape

RANSOMWARE

  1. ThreatList: Ransomware, EKs and Trojans lead the Way in Q3 Malware Trends
  2. Join us, and @SentinelOne Nov 29, as we discuss fast acting #ransomware remediation, threat hunting, and #AI that stops incongruous
  3. How Microsoft's Controlled Folder Access can help stop ransomware

CRYPTOMINING & CRYPTOCURRENCIES

  1. ​Australian woman arrested over AU$450,000 Ripple theft
  2. Warning: More iOS Devices Are Infected by Cryptocurrency Mining Malware
  3. Meet Cryptojacking, the (not so) new kid on the block
  4. FBI: Call of Duty gamers helped steal $3.3 million in cryptocurrency hacking scheme
  5. Crytojacking 101; why cryptojacking is bad for business
  6. China asks blockchain-based service providers to control user information
  7. A Digital Currency for Everyone: 5 Easy Way Steps to Follow for Buying Bitcoin
  8. Securing Blockchain with Privileged Access Management

MALWARE

  1. Warning: More iOS Devices Are Infected by Cryptocurrency Mining Malware
  2. Russia Behind Triton Malware? A Cybersecurity Consulting Firm Confirms
  3. Information-Stealing Malware Campaign Evades Anti-Virus Detection
  4. New Malware Targets Industrial Control Systems
  5. FlawedAmmyy Remote Access Trojan
  6. Meet the malware which turns your smartphone into a mobile proxy
  7. sLoad Banking Trojan Downloader Displays Sophisticated Recon and Targeting
  8. ThreatList: Ransomware, EKs and Trojans lead the Way in Q3 Malware Trends
  9. Beers with Talos EP40: BWT XL feat. SuperMicro, Giant Patches, and More Mobile Malware
  10. Mac malware intercepts encrypted web traffic for ad injection
  11. Russian Malware Used In An Attempt To Sabotage Saudi Petrol Plant
  12. Malware Targeting Brazil Uses Legitimate Windows Components WMI and CertUtil as Part of its Routine
  13. LuminosityLink RAT author sentenced to 2.5 years in jail
  14. Deadly Malware That Attacked Saudi Industrial Plant Came From Russia
  15. Beyond Your Bank Account: Ten Astounding Finds Uncovered by Financial Malware
  16. FireEye: Russian Research Lab Aided the Development of TRITON Industrial Malware

EXPLOIT

  1. Exploit for New Windows Zero-Day Published on Twitter
  2. Exploit kits: fall 2018 review
  3. New Windows Zero-Day Bug Helps Delete Any File, Exploit Available
  4. Siemens Siclock: How do threat actors exploit these devices?
  5. Magecart Attackers Exploit Magento Zero-Days
  6. Hacker Discloses New Windows Zero-Day Exploit On Twitter

VULNERABILITY

  1. Windows ‘Deletebug’ Zero-Day Allows Privilege Escalation, Destruction
  2. Vulnerabilities in Linksys Routers May Grant Attackers Full Control
  3. Exploit for New Windows Zero-Day Published on Twitter
  4. Cisco Patches Local WebEx Vulnerability, Remotely Exploitable in AD Deployments
  5. CVE-2018-4338: Triggering an Information Disclosure on macOS Through a Broadcom AirPort Kext
  6. Another Windows 0-day flaw has been published on Twitter
  7. .@Siemens disclosed six SICLOCK flaws that were found within its central plant clocks. Discover why three flaws have been rated
  8. SandboxEscaper expert is back and disclosed a new Windows Zero-Day
  9. Pentagon Launches Continuous Bug Bounty Program
  10. [SingCERT] Alert on Drupal Critical Vulnerabilities
  11. A Windows 0day vulnerability was made public on Twitter
  12. Organizations with strong DevSecOps find flaws 11x faster than those without
  13. New Microsoft Windows Zero-Day Dropped on Twitter, Micropatch Available
  14. A #ZeroDay in #jQuery File Upload could affect thousands of projects because the jQuery #plugin vulnerability has existed for eight
  15. Most enterprise vulnerabilities remain unpatched a month after discovery
  16. WizCase Found Critical Firmware Vulnerabilities In Leading NAS Devices
  17. New Windows Zero-Day Bug Helps Delete Any File, Exploit Available
  18. Twitter User Discloses Second Microsoft Zero-Day
  19. Firefox 63 Released with Enhanced Tracking Protection and Fixes 14 Security Vulnerabilities
  20. Most applications 'suffer from information leakage bugs'
  21. DoD bug bounty program to expand to more sensitive systems
  22. 3-year-old jQuery plugin vulnerability finally patched
  23. US Department of Defense Expands Bug Bounty Efforts
  24. The Qihoo @360CoreSec team found a @Microsoft vulnerability -- named Double Kill -- that affects applications through #MicrosoftOffice documents. Learn
  25. Good initiative. Would be even better if you would pay bounties for the bugs, too.
  26. Learn about the #NetSpectre vulnerability and the benefits of #ThreatModeling for cloud deployments from expert Ed Moyle of @securitycurve.
  27. A summer intern took a look at tinc VPN, they found some nice authentication bypass and message tampering flaws
  28. Again Hacker Exposed New Microsoft Unpatched Zero-day Bug In Twitter With PoC
  29. Marine diesel engines software developed by Auto Maskin has serious vulnerabilities
  30. Drupal Remote Code Execution Vulnerability Threat Alert
  31. Hacker Discloses New Windows Zero-Day Exploit On Twitter