Oct 30, 2018

Threat report for 2018-10-29

DATA BREACH & DATA LOSS

  1. Girl Scouts Issues Data Breach Warning to 2,800 Members
  2. Cathay Pacific Suffers World’s Largest Airline Data Breach
  3. sLoad and Ramnit Campaign Against UK and Italy
  4. Secret Service Confirms Focus on Email Compromise Cybercrimes Worth $12 Billion
  5. Girl Scouts Alerted to Possible Data Breach
  6. 'Narwhal Spider' group's spam campaign targets Japanese recipients with URLZone malware
  7. DDoS and ransomware tools for starter and experienced cybercriminals exposed
  8. Biggest Manufacturing Data Breaches of the 21st Century
  9. The Worst Data Breach till Now 2018, and What It Means
  10. Crooks continue to abuse exposed Docker APIs for Cryptojacking
  11. IoT users uncertain if personal data is shared across multiple devices
  12. Hackers Breach System of Healthcare.Gov Exposing Personal Data of 75,000 Users
  13. Hackers steal personal data of up to 9.4 million Cathay Pacific passengers
  14. Leaked: iOS 12.1 will be released on October 30th
  15. 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy | Read the details here:

DENIAL-OF-SERVICE

  1. Remote Denial of Service Vulnerability Patched in Squid Proxy Cache Server
  2. Man Ordered to Pay $8.6 Million for Launching DDoS Attacks against Rutgers University
  3. Mirai Author Gets House Arrest for DDoS Attacks on University
  4. DDoS and ransomware tools for starter and experienced cybercriminals exposed

MALVERTISING

Nil

PHISHING

  1. Phishing spikes as private health continues to be most breached sector in Australia
  2. Nation-State Phishing: A Country-Sized Catch
  3. A new phishing report reveals Microsoft, Paypal, and Netflix are among the top brands impersonated by phishing attacks. Attackers tend to
  4. This is getting worse and worse. And is going to normalize and lead to much more successful phishing through SMS
  5. League of Legends Gamers Targeted by Phishing Scam | Avast
  6. What can we do to tackle today’s phishing epidemic?
  7. Das Geschäft mit gestohlenen Login-Daten von Privatnutzern und Unternehmensanwendern boomt. US-Journalist Brian Krebs beziffert die "Ausbeute" bei mehreren 100.000 US-Dollar
  8. 19% still save their password on a piece of paper
  9. Vulnerability In Microsoft Word Online Video Feature Allows for Phishing

WEB DEFACEMENT

  1. Future Investment Initiative Conference Website, Defaced, Now Restored

BOTNET

  1. Mirai Botnet Operator Ordered to Pay $8.6 Million
  2. ‘DemonBot' Botnet Targets Hadoop Servers
  3. Rise of the Bots

RANSOMWARE

  1. The Ransomware Attack on a North Carolina Water Utility May Not Have Been What it Seemed
  2. Ransomware and the enterprise: A new white paper
  3. DDoS and ransomware tools for starter and experienced cybercriminals exposed
  4. #Antivirus SW alone can't stop new #malware or #ransomware. by @MariaKorolov -
  5. Have you ever wondered why #ransomware attacks happen on the Friday before a long weekend? We've teamed up with @SentinelOne

CRYPTOMINING & CRYPTOCURRENCIES

  1. Mac CryptoCurrency Price Tracker Caught Installing Backdoors
  2. Mac cryptocurrency ticker app installs backdoors
  3. Call of Duty players caught up in cryptocurrency theft racket
  4. Cyber-criminals exploit misconfigured container to deliver cryptominer
  5. Crooks continue to abuse exposed Docker APIs for Cryptojacking
  6. Revolutionary Blockchain 3.0 Under CSE Platform

MALWARE

  1. Videos and MS Office documents - ingredients for a malware attack
  2. Word documents seemingly carrying videos can deliver malicious code instead
  3. Downloading Google Chrome via Microsoft Edge Endangered by Malware
  4. Windows 10 UWP Bug Could Give Malicious Devs Access To All Your Files
  5. Advanced Malware Protection Affected by Bug That Can Inhibit Intrusion Detection
  6. Windows 10 UWP bug could give malicious devs access to all your files
  7. Malware That Accompanies Google Chrome Download Detected
  8. 'Narwhal Spider' group's spam campaign targets Japanese recipients with URLZone malware
  9. Vulnerability found in Sophos anti-malware product
  10. Privacy concerns cooling #InternetOfThings adoption in US & Europe, with consumers concerned about #DataLeaks, malware and product security (via @FSecure)
  11. Same Old yet Brand-new: New File Types Emerge in Malware Spam Attachments
  12. #Antivirus SW alone can't stop new #malware or #ransomware. by @MariaKorolov -
  13. Beware! Downloader Malware Disguised as Game Apps Found On Google Play with More Than 51,100 Installations
  14. Microsoft Bing Delivered Dangerous Malware When You Try to Download Google Chrome

EXPLOIT

  1. Researchers exploit Microsoft Word through embedded video
  2. Cyber-criminals exploit misconfigured container to deliver cryptominer
  3. Our adventures at @thezdi Pwn2Own Desktop 2018 for Apple Safari exploit whitepaper (https://labs.mwrinfosecurity.com/assets/BlogFiles/apple-safari-pwn2own-vuln-write-up-2018-10-29-final.pdf …) and @t2.fi slides release (https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-t2-big-game-fuzzing-pwn2own-safari-final.pdf …)

VULNERABILITY

  1. SandboxEscaper expert is back and disclosed a new Windows Zero-Day
  2. IoT Flaw Allows Hijacking of Connected Construction Cranes
  3. Remote Denial of Service Vulnerability Patched in Squid Proxy Cache Server
  4. X.Org Flaw Allows Privilege Escalation in Linux Systems
  5. X.Org Flaw Exposes Unix-Like OSes to Attacks
  6. Windows 10 UWP Bug Could Give Malicious Devs Access To All Your Files
  7. X.org Bug Bites OpenBSD And Other Big Operating Systems
  8. If your company uses Windows 10, watch out: there are new vulnerabilities about
  9. Advanced Malware Protection Affected by Bug That Can Inhibit Intrusion Detection
  10. Logical Bug in Microsoft Word's 'Online Video' Allows Code Execution
  11. Windows 10 UWP bug could give malicious devs access to all your files
  12. Windows 10 Bug Allowed UWP Apps Full Access to File System
  13. Magecart Exploits Zero Day Vulnerabilities
  14. Serious Vulnerability Discovered In X.Org Server Affects Major Linux and BSD Variants
  15. Security Vulnerability in Internet-Connected Construction Cranes
  16. Systemd flaw could cause the crash or hijack of vulnerable Linux machines
  17. Pentagon’s big audit will inspect for cybersecurity flaws, comptroller says
  18. Vulnerability found in Sophos anti-malware product
  19. Flaws in brain stimulation tech could let hackers erase or hold memories for ransom
  20. Cisco patched a command injection vulnerability in Webex Meetings
  21. Vulnerability In Microsoft Word Online Video Feature Allows for Phishing