Nov 3, 2018

Threat report for 2018-11-02

DATA BREACH & DATA LOSS

  1. Two botnets are fighting over control of thousands of unsecured Android devices
  2. Joshua Adam Schulte, ex CIA employee, accused of continuing leaks from prison
  3. Spam campaign targets Exodus Mac Users
  4. 120 Million Facebook Accounts Compromised, Private Messages of 81,000 for Sale
  5. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  6. 85 Millions of voter records available for sale ahead of the 2018 US Midterm Elections
  7. ePHI of 8,000 Patients Exposed in Health Plan Breach
  8. Facebook has experienced a number of security-related issues lately, but it doesn't appear to be at fault for the leak
  9. This Week in Security News: Spam Campaigns and Vulnerable Infrastructures
  10. Russian hackers compromise 120 million Facebook accounts; private messages on sale online
  11. SamSam ransomware campaigns continue to target U.S. in 2018
  12. Feds Accuse Ex-CIA Employee of Continuing Leaks From Prison
  13. Radisson Hotel Group Hit by Data Breach
  14. Spam campaign targets Exodus Mac Users
  15. Shipbuilder, defense contractor Austal reveals data breach
  16. Data theft at Radisson Hotel Group
  17. 85 million voter records on sale
  18. Iran has become victim of a cyberattack campaign
  19. Apache HBase 2.1.1 release, distributed database
  20. FIFA admits hack and braces for new leaks

DENIAL-OF-SERVICE

  1. ThreatList: Fewer Big DDoS Attacks in Q3, Overall Rate Holds Steady
  2. Bushido Botnet and DDoS-for-Hire

MALVERTISING

Nil

PHISHING

  1. SMS Phishing + Cardless ATM = Profit
  2. "While most phishing attacks on desktop and laptop computers come via email... a mobile device attack vector can be in
  3. #Phishing targets data that lives outside your enterprise perimeter—putting your entire enterprise at risk. Learn how post-perimeter security enables you
  4. How to password protect a folder or file in Windows | Avast
  5. Just half of Fortune 500 companies have installed DMARC, a tool that guards against email phishing scams, according to new
  6. Multiple #phishing pages on multiple domains targeting Canadian citizens posing as Canadian Revenue Agency, Interac, and others 192.99.86.132 (@OVH) cc: @cybercentre_ca
  7. YAPBS – Yet Another Password Breach Scam

WEB DEFACEMENT

Nil

BOTNET

  1. Shellbot Variant Used in New Botnet, Spreads Using IoT and Linux Vulnerabilities
  2. Bushido Botnet and DDoS-for-Hire
  3. Outlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C Server
  4. BCMUPnP_Hunter: 100,000-node botnet is abusing routers for spam
  5. 'Outlaw' threat actor uses Shellbot variant to form new botnet

RANSOMWARE

  1. New Ransomware using DiskCryptor With Custom Ransom Message
  2. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  3. Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
  4. SamSam ransomware campaigns continue to target U.S. in 2018
  5. Kraken ransomware gets packaged into Fallout EK
  6. Giant ransomware bundle threatens to make malware attacks easier for crooks

CRYPTOMINING & CRYPTOCURRENCIES

  1. Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
  2. Kraken ransomware gets packaged into Fallout EK
  3. Blockwatch: The aeternity Blockchain
  4. Trading with cryptocurrencies without losing self control
  5. EY launches the world's first secure private transactions over the Ethereum public blockchain
  6. Another packed room for .@idefense analyst Mei Nelson discussing China and cryptocurrency. #codeblue_jp @AccentureSecure @AccentureJPNews

MALWARE

  1. Facebook Blames Malicious Extensions in Breach of 81K Private Messages
  2. ​The day computer security turned real: The Morris Worm turns 30
  3. Worst Malware and Threat Actors of 2018
  4. Adversaries Distribute Malware Via Rarely Used Extensions
  5. Can you spot a malicious email? Take the quiz at
  6. Antimalware Day: The evolution of malicious code
  7. Outlaw Hacking Group Using Command Injection Flow To Attack Organizations Network using Botnet via C&C Server
  8. Beware this malware: it can even survive operating systems being reinstalled
  9. Emotet Trojan Changes Tactics…Again
  10. Giant ransomware bundle threatens to make malware attacks easier for crooks
  11. If you think you have been hacked or got #malware installed, disconnect the internet, leave your device running and connected
  12. U.S. Geological Survey Network got Infected with Malware
  13. Search for “Installing Chrome” on Bing can lead to malicious content
  14. Previous malware attacks: When more than 7,5000 of the #Mikrotik routes were reportedly being spied on by attackers

EXPLOIT

  1. Kraken ransomware gets packaged into Fallout EK
  2. How to Perform Manual SQL Injection With Double quotes Error Based String Method
  3. Researchers recently found vulnerabilities in #robot controllers from @Universal_Robot. Learn what these robot controllers do and how #ThreatActors exploit these

VULNERABILITY

  1. Shellbot Variant Used in New Botnet, Spreads Using IoT and Linux Vulnerabilities
  2. Cisco Security Appliance Zero-Day Found Actively Exploited in the Wild
  3. BLEEDINGBIT – Two Zero Day Vulnerabilities Affecting Wireless Access Point Bluetooth Chips
  4. Hackers actively exploiting vulnerabilities in Cisco security appliances
  5. Cisco fixed the high-risk security vulnerabilities in variant products
  6. Bluetooth Bugs Speak to Lack of Security in DevOps
  7. Sauter Quickly Patches Flaw in Building Automation Software
  8. Bleedingbit vulnerabilities put Wi-Fi access points at risk
  9. Test IO introduces Bug Fix Confirmation, leveraging network of software testers to verify bug fixes
  10. Flaw in Sophos HitmanPro.Alert could enable hackers to gain privileges over systems
  11. Intel CPUs impacted by new PortSmash side-channel vulnerability
  12. CISCO warn of a zero-day DoS flaw that is being actively exploited in attacks
  13. Systemd Vulnerability In Linux Could Trigger Remote Attacks And System Crashes
  14. .@ArmisSecurity researchers discovered two chip-level #Bluetooth vulnerabilities -- dubbed #Bleedingbit -- that could allow pseudo #RemoteCodeExecution on wireless access points.
  15. Cisco Reports SIP Inspection Vulnerability
  16. Mozilla exorcises five bugs on Halloween
  17. Researchers recently found vulnerabilities in #robot controllers from @Universal_Robot. Learn what these robot controllers do and how #ThreatActors exploit these
  18. BLEEDINGBIT – Two Bluetooth Chip-level Vulnerabilities Affected Millions of Enterprise Wi-Fi Access Point Devices
  19. GNOME 3.30.2 released: bugs fix
  20. Attackers Use Zero-Day That Can Restart Cisco Security Appliances