Nov 15, 2018

Daily brief for 2018-11-13

ASIA

  1. Premier Media Conglomerate of Malaysia, Falls for Ransomware Infection
  2. Scare Force: Pakistan military hit by Operation Shaheen malware
  3. Pakistan Military Hit By Operation Shaheen Malware
  4. Sophisticated cyber-espionage campaign targeting Pakistani government and air force
  5. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  6. It’s Amateur Hour in the World of Spyware and Victims Will Pay the Price
  7. Using Machine Learning to Cluster Malicious Network Flows From Gh0st RAT Variants
  8. Google Services down due to BGP leak, traffic hijacked through Russia, China, and Nigeria
  9. Sophisticated Campaign Targets Pakistan's Air Force
  10. Google Services Inaccessible Due to BGP Leak

WORLD

  1. Cathay Pacific In Hot Water: Data Breach Started March 2018, Not October 2018
  2. Premier Media Conglomerate of Malaysia, Falls for Ransomware Infection
  3. The Cybersecurity Tech Accord endorses the Paris Call
  4. That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards
  5. Target and other high profile Twitter accounts exploited for cryptocurrency scams
  6. The Ontario Cannabis Store has reported a data breach that took place Nov. 1 through the Canada Post and affected
  7. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  8. What’s on Our Minds for 2019? Key Themes from the RSA Speaker Selection Process
  9. It’s Amateur Hour in the World of Spyware and Victims Will Pay the Price
  10. Inside Magecart: RiskIQ and Flashpoint Release Comprehensive Report on the Assault on E-Commerce
  11. The Tactic Cybercriminals Use to Steal Bitcoin
  12. Attacker hijacks Elon Musk Twitter account to implement fake bitcoin fraud
  13. U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
  14. Google Services down due to BGP leak, traffic hijacked through Russia, China, and Nigeria
  15. Google Services Inaccessible Due to BGP Leak
  16. Check Point Researchers Reported Vulnerabilities in Market-Leading Drone Platform, Enabling Manufacturer to Bolster Security
  17. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  18. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  19. Zero Day vulnerability in VirtualBox is disclosed
  20. Compromised security in millions of cards in the US

ATTACKS

  1. Cathay Pacific In Hot Water: Data Breach Started March 2018, Not October 2018
  2. Cathay Says 'Most Intense' Period of Data Breach Lasted Months
  3. Nordstrom Reveals Data Breach, Sensitive Employee Information Exposed
  4. Nordstrom Data Breach Exposes Employee Information
  5. Nordstrom Quick to Tell Employees of a Data Breach
  6. Former Employee Accessed Medical Records For Nearly a Year
  7. Why Gen Z has the most dangerous password practices
  8. Sophisticated cyber-espionage campaign targeting Pakistani government and air force
  9. Dropbox Account Phishing Campaign
  10. The Ontario Cannabis Store has reported a data breach that took place Nov. 1 through the Canada Post and affected
  11. Another Facebook Bug Could Have Exposed Your Private Information
  12. Malvertising is what happens when attackers buy ad space in popular, legit websites and load them with ads infected by
  13. Password manager: 85% want their password to be protected against hackers
  14. Google Services down due to BGP leak, traffic hijacked through Russia, China, and Nigeria
  15. Sophisticated Campaign Targets Pakistan's Air Force
  16. How did @Google eliminate successful #PhishingAttacks? Learn how employees used U2F authentication and physical #SecurityKeys to defend against phishing from
  17. Google Services Inaccessible Due to BGP Leak
  18. To help you rule out the worst password ideas, FrontNet has put together a list of the 25 words passwords
  19. Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments
  20. Compromised security in millions of cards in the US
  21. Leak: Windows 10 October Update will be re-launched tomorrow

THREATS

  1. What MSPs can learn from Datto’s Channel Ransomware Report
  2. Triton ICS Malware
  3. Microsoft’s Patch Tuesday updates for November 2018 fix actively exploited Windows flaw
  4. Microsoft Patches Zero-Day Bug in Win7, Server 2008 and 2008 R2
  5. Fake Crypto Wallet Apps Discovered in Google Play, Built Using Drag-n-Drop
  6. Microsoft Patches Actively Exploited Windows Vulnerability
  7. Fixed Facebook Privacy Bug Could Have Allowed Bad Actors to Steal Personal Info
  8. Microsoft patches Windows zero-day used by multiple cyber-espionage groups
  9. Adobe Patches Disclosed Acrobat Vulnerability
  10. Premier Media Conglomerate of Malaysia, Falls for Ransomware Infection
  11. Scare Force: Pakistan military hit by Operation Shaheen malware
  12. SAP Patches Critical Vulnerability in HANA Streaming Analytics
  13. Facebook flaw opened your profile to data thieves
  14. Adobe Releases Security Update for Acrobat Vulnerability with Public PoC
  15. Unpatched Android OS Flaw Allows Adversaries to Track User Location
  16. Microsoft Patch Tuesday Recap: 12 Critical Bugs Fixed
  17. Adobe Fixes Acrobat and Reader Flaw With Publicly-Available PoC
  18. Facebook Patches Another User Data Harvesting Bug
  19. Pakistan Military Hit By Operation Shaheen Malware
  20. That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards
  21. XSS Vulnerability in Evernote Allows Local File Execution
  22. Vulnerabilities in Solid-State Drives Can Be Exploited to Decrypt Data
  23. Side-Channel Vulnerability Could Be Exploited to Steal Data
  24. Zero-Day Vulnerability in Cisco Products Could Cause DoS Condition
  25. Attackers exploit flaw in GDPR-themed WordPress plugin to hijack websites
  26. Facebook Bug Let Websites Access Private User Data
  27. Microsoft November 2018 Patch Tuesday Fixes 12 Critical Vulnerabilities
  28. Target and other high profile Twitter accounts exploited for cryptocurrency scams
  29. Facebook patches another bug that could have allowed mass-harvesting of user data
  30. What’s on Our Minds for 2019? Key Themes from the RSA Speaker Selection Process
  31. It’s Amateur Hour in the World of Spyware and Victims Will Pay the Price
  32. Why WannaCry ransomware is still a threat to your PC
  33. Cryptocurrency Mining Malware uses Various Evasion Techniques.
  34. Call Recorder App on Google Play with Over 5,000 Installs Contains Hidden Malware Dropper
  35. Ransomware no. 1 cyberthreat to SMBs, and the average attack costs $47K
  36. Microsoft Patch Tuesday — November 2018: Vulnerability disclosures and Snort coverage
  37. The Tactic Cybercriminals Use to Steal Bitcoin
  38. Another Facebook Bug Could Have Exposed Your Private Information
  39. New #spam #botnet infected over 100,000 home routers through a UPnP vulnerability, according to researchers at @360Netlab. By @MaddieBacon11
  40. #Gallmaker eschews custom malware, uses living off the land and publicly available #hack tools. Find out more:
  41. Ransomware Attack on City of Muscatine Shutdown Several Servers
  42. Using Machine Learning to Cluster Malicious Network Flows From Gh0st RAT Variants
  43. How is Plead #malware used for #cyberespionage attacks? Learn more with Michael Cobb of @thehairyITdog.
  44. Attacker hijacks Elon Musk Twitter account to implement fake bitcoin fraud
  45. U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
  46. Microsoft Word Doc bug using online video feature found in wild
  47. Check Point Researchers Reported Vulnerabilities in Market-Leading Drone Platform, Enabling Manufacturer to Bolster Security
  48. Beware !! Worlds Most Active Malware Emotet Launching New Campaign With Malicious Word and PDF Attachments
  49. Data61 and CBA demonstrate blockchain welfare payments
  50. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  51. WebCobra Malware Uses Victims’ Computers to Mine Cryptocurrency
  52. 12 Warning Signs That Help Identify Malware Infection
  53. Zero Day vulnerability in VirtualBox is disclosed
  54. Illegal cryptocurrency mining
  55. Twitter grapples with fake Elon Musk accounts promoting bitcoin scams

CRIME

  1. Premier Media Conglomerate of Malaysia, Falls for Ransomware Infection
  2. Magecart Cybercrime Groups Mass Harvest Payment Card Data
  3. Seven Hacking Groups Operate Under “Magecart” Umbrella, Analysis Shows
  4. That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards
  5. Nordstrom Quick to Tell Employees of a Data Breach
  6. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  7. Inside Magecart: RiskIQ and Flashpoint Release Comprehensive Report on the Assault on E-Commerce
  8. ‘Inside Magecart’ Exposes the Operation Behind the Web’s Biggest E-Commerce Scourge
  9. The Tactic Cybercriminals Use to Steal Bitcoin
  10. How is Plead #malware used for #cyberespionage attacks? Learn more with Michael Cobb of @thehairyITdog.
  11. Attacker hijacks Elon Musk Twitter account to implement fake bitcoin fraud
  12. Compromised security in millions of cards in the US

POLITICS

  1. Microsoft patches Windows zero-day used by multiple cyber-espionage groups
  2. Sophisticated cyber-espionage campaign targeting Pakistani government and air force
  3. Chinese Threat Actor TEMP.Periscope Targets UK-Based Engineering Company Using Russian APT Techniques
  4. It’s Amateur Hour in the World of Spyware and Victims Will Pay the Price
  5. How is Plead #malware used for #cyberespionage attacks? Learn more with Michael Cobb of @thehairyITdog.
  6. Sophisticated Campaign Targets Pakistan's Air Force
  7. Illegal cryptocurrency mining