Oct 28, 2018

Threat report for 2018-10-27

DATA BREACH & DATA LOSS

Nil

DENIAL-OF-SERVICE

  1. DDoS and Ransomware Tools Used by Cyber Criminals Discovered
  2. A few dollars to bring down sites with new Bushido-based DDoS-for-hire service
  3. Hackers Offering DDoS-for-Hire Service Powered by Bushido Botnet in Dark Web Markets

MALVERTISING

Nil

PHISHING

Nil

WEB DEFACEMENT

Nil

BOTNET

  1. Hackers Offering DDoS-for-Hire Service Powered by Bushido Botnet in Dark Web Markets

RANSOMWARE

  1. DDoS and Ransomware Tools Used by Cyber Criminals Discovered
  2. Decrypt files attacked with the latest versions of GandCrab ransomware

CRYPTOMINING & CRYPTOCURRENCIES

  1. Sorry friends, I'm afraid I just can't quite afford the Bitcoin to stop that vid from leaking everywhere
  2. Australian Cryptocurrency Theft Highlights Security Mistakes

MALWARE

  1. .@FireEye researchers have attributed the #Triton #malware -- used in an attack on an industrial control system in Saudi Arabia
  2. Bankbot/Anubis downloader hits #1 trending at finance @ThreatFabric @
  3. Twelve malicious Python libraries found and removed from PyPI
  4. The forensics analysts log the adversaries’ actions and every network packet the hackers send. The adversaries use a process running
  5. Executable Formats and How To Exploit Them
  6. Unpatched Critical Bug in Microsoft Word Online Video Feature Allow Attacker to Deliver Powerful Malware
  7. New malware attacks targeting voters in key states in the 2018 US midterm elections
  8. Two hours after the deadline, the forensics team notices someone accessing the MES system server using domain administrator credentials through

EXPLOIT

  1. Executable Formats and How To Exploit Them

VULNERABILITY

  1. Researchers recently found vulnerabilities within the robot controllers from @Universal_Robot. Learn what these #robot controllers are used for and how
  2. In this week's Risk & Repeat podcast, editors discuss the #GAOreport on vulnerabilities and weaknesses in military weapons systems and
  3. The LibSSH Security Bug in the Nutshell
  4. The Pentagon expands the scope of its vulnerability bounty program
  5. Unpatched Critical Bug in Microsoft Word Online Video Feature Allow Attacker to Deliver Powerful Malware
  6. Cisco launches patches for vulnerabilities in WEBEX Meetings app
  7. A #RemoteCodeExecution flaw in @Cisco Webex -- called WebExec -- could be an easy vector for insider attacks, and the