Nov 2, 2018

Threat report for 2018-11-01

DATA BREACH & DATA LOSS

  1. Australian defence contractor Austal hit by data breach
  2. Radisson discloses data breach impacting rewards customers
  3. 22,000 Records Exposed by JoomlArt in Jira Ticket
  4. ‘Aaron Smith’ Sextortion scam campaigns hit tens of thousands of individuals
  5. New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points
  6. Customer Information Stolen in Radisson Hotel Group Data Breach
  7. British Airways data breach bigger than originally thought
  8. Where Is the Consumer Outrage about Data Breaches?
  9. Eurostar Resets Passwords of Customers After Data Breach
  10. Radisson Hotel Group suffers data breach, customer info leaked
  11. Radisson Rewards Program Targeted in Data Breach
  12. "If the schemas prove not to be compatible, a backup of the previous version of a database must be used
  13. Emotet Malware – Mass-Harvesting millions of Emails in secret Campaign
  14. Last year the @USAgov required agencies to implement #DMARC records and policies by October 2018. Learn just how hard DMARC
  15. New Ramnit Campaign Spreads Azorult Malware
  16. #NetSpectre leaks data remotely via side-channel attacks. Learn from expert Michael Cobb of @thehairyITdog why data from #microprocessors is not
  17. Phishing Attacks Breach 20,000 Patient Records of Catawba Valley Medical Center
  18. Radisson Hotel Group Data Breach Exposed Customer’s Personal Data
  19. Beware !! Square & PayPal Mobile Point of Sales (POS) Devices Are Extremely Vulnerable to Credit/Debit Card Data Theft

DENIAL-OF-SERVICE

  1. Cisco ups the ante for 400G Ethernet with big-bandwidth data-center switches

MALVERTISING

  1. Bad ads: Publishers look to stop malvertising for good

PHISHING

  1. How phishing is evolving to outpace awareness
  2. Going with what works: The state of phishing
  3. October may be over – but phishing attacks never stop. Here’s how to make security awareness successful all year round.
  4. Trickbot Shows Off New Trick: Password Grabber Module
  5. Expert Insights Names Barracuda’s AI powered Sentinel Top Phishing protection product
  6. Phishing Attacks Breach 20,000 Patient Records of Catawba Valley Medical Center

WEB DEFACEMENT

Nil

BOTNET

  1. Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol
  2. Defending your pumpkin from tracker zombies
  3. Necurs Botnet Distributing Sextortion Email Scams
  4. The Russian built #VPNFilter #botnet was taken down by the @FBI after over 500,000 routers were infected. However, VPNFilter is

RANSOMWARE

  1. Ransomware and Back-Up Plans
  2. Healthcare Industry Continues To Be the Favourite for Ransomware
  3. SamSam Attackers Have Hit 67 Ransomware Targets
  4. Nice work if you can get it: GandCrab ransomware nets millions even though it has been broken
  5. Crypto-Locking Kraken Ransomware Looms Larger

CRYPTOMINING & CRYPTOCURRENCIES

  1. Experts presented BOTCHAIN, the first fully functional Botnet built upon the Bitcoin Protocol
  2. UK considers banning cryptocurrencies for their lack of “intrinsic value”
  3. Crypto-Locking Kraken Ransomware Looms Larger
  4. Crypto Micropayments: an Exciting Future for Blockchain Transactions

MALWARE

  1. 2018’s worst malware revealed in report
  2. Trickbot Malware Now Also Steals Passwords From Apps, Web Browsers
  3. Emotet Malware, the Most Probable Malware of the Year
  4. USB Drives Deliver Dangerous Malware to Industrial Facilities: Honeywell
  5. More Typo-Squatting Malware Found on PyPI
  6. Employee used US government network for adult websites, infected infrastructure with Russian malware
  7. Government employee who used to watch porn at work alleged guilty of infecting with malware a network
  8. Malware Analysis for Blue Teams
  9. Emotet Malware – Mass-Harvesting millions of Emails in secret Campaign
  10. Hackers Drops New Emotet Malware to Perform Mass Email Exfiltration From Victims Email Client
  11. New Ramnit Campaign Spreads Azorult Malware
  12. Perl-Based Shellbot Looks to Target Organizations via C&C
  13. IKARUS Security Software partners with PolySwarm to advance early malware detection
  14. Pdgmail – Forensic Tool to Analysis Process Memory Dump

EXPLOIT

  1. PoC Exploit Compromises Microsoft Live Accounts via Subdomain Hijacking
  2. 0x20k of Ghost Squad Hackers Releases ODay Exploit Targeting Apache Hadoop
  3. Hackers Exploit Cisco Zero Day Vulnerability in Wild Resulting in DoS Condition

VULNERABILITY

  1. Yi IoT Home Camera Riddled with Code-Execution Vulnerabilities
  2. BLEEDINGBIT Bluetooth flaws in TI chips expose enterprises to remote attacks
  3. New Bluetooth Vulnerabilities Exposed in Aruba, Cisco, Meraki Access Points
  4. Windows Defender Bug Needs a Restart, Not Shutdown, To Enable Sandbox
  5. Bluetooth Chip Flaws Expose Enterprises to Remote Attacks
  6. Two Zero-Day Bugs Open Millions of Wireless Access Points to Attack
  7. Cisco says a flaw in its Adaptive Security Appliance allows remote attacks
  8. Talos Vulnerability Deep Dive – TALOS-2018-0636 / CVE-2018-3971 Sophos HitmanPro.Alert vulnerability
  9. Security researchers find flaws in chips used in hospitals, factories and stores
  10. Bleedingbit: Critical vulnerabilities in BLE chips expose millions of access points to attack
  11. Bleedingbit zero-day chip flaws may expose majority of enterprises to remote code execution attacks
  12. Cisco Zero-Day Exploited In The Wild To Crash And Reload Devices
  13. Zero-Day RCE Vulnerabilities Expose Millions of BLE-Enabled Devices to Attacks
  14. Hackers Exploit Cisco Zero Day Vulnerability in Wild Resulting in DoS Condition
  15. New BLEEDINGBIT Vulnerabilities Affect Widely-Used Bluetooth Chips
  16. Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks
  17. .@Siemens disclosed six SICLOCK flaws that were found within its central plant clocks. Discover why three flaws have been rated
  18. Our fabulous @5ean5ullivan explains to @CyberSauna listeners how the multiple vulnerabilities in the US electoral system may be^H^H^H^H^H^Hare being exploited.
  19. Bleedingbit Bluetooth Vulnerabilities Expose WiFi APs to Risk
  20. Talos Vulnerability Deep Dive - TALOS-2018-0636 / CVE-2018-3971 Sophos HitmanPro.Alert vulnerability
  21. Cisco Warns of Zero-Day Vulnerability in Security Appliances
  22. Cisco zero-day exploited in the wild to crash and reload devices