Threat report for 2018-11-12
DATA BREACH & DATA LOSS
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- StatCounter Compromise
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- 2018 On Track to Be One of the Worst Ever for Data Breaches
- U.S. Chip Cards Are Being Compromised in the Millions
- Third-party data breach exposes info of Alabama hospital job applicants
- Small number of HSBC customer accounts compromised in data breach.
Often hackers will make use of user names and passwords compromised
- Popular Data Storage Devices Compromised Due to Flawed Security
- U.S. Chip Cards Are Being Compromised in the Millions:
- What is behind the growing trend of business email compromise attacks? Learn more from expert Michael Cobb of @thehairyITdog.
- The History of Data Breaches
- Cisco Inadvertently Leaked In-House Dirty COW Exploit Code In Its Software
- Emotet Campaign Ramps Up with Mass Email Harvesting Module
- Reported breaches in the first 9 months of 2018 exposed 3.6 billion records
- ADHA privacy boss reportedly quits as My Health Record faces first big test
DENIAL-OF-SERVICE
Nil
MALVERTISING
Nil
PHISHING
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- Avast Improves Phishing Detection | Avast
- Phishing Training is a Tool, Not a Solution
WEB DEFACEMENT
Nil
BOTNET
- Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor
- Botnet pwns 100,000 routers using ancient security flaw
RANSOMWARE
- #SamSam #ransomware targeted 67 organizations in 2018, according to @symantec research. By @MaddieBacon11
- Ransomware Assault Strikes Toronto Company, which Sells Data Belonging to Ontario Residents
- Unearthing Ransomware Characteristics Using Classification Taxonomy
CRYPTOMINING & CRYPTOCURRENCIES
- How CIOs can manage blockchain security: 4 tips
- Unable to remember his password, man sent letter bomb to Bitcoin exchange
- A new malware that targets #cryptocurrency investors through #MacOS and chat platforms was recently discovered. Learn how this #malware works
- Cryptomining malware using Windows Installer to remain hidden
- Chinese Head Fired After Cryptomining at School
- Elon Musk BITCOIN Twitter scam, a simple and profitable fraud for crooks
MALWARE
- Cylance: Spy campaign targeting Pakistani officials installs malware, then surrenders
- Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware
- Hacking the hackers – IOT botnet author adds his own backdoor on top of a ZTE router backdoor
- Malware-Laced App Lurked on Google Play For a Year
- Malware of the 90s: Remembering the Michelangelo and Melissa viruses
- A new malware that targets #cryptocurrency investors through #MacOS and chat platforms was recently discovered. Learn how this #malware works
- Hide and Script: Inserted Malicious URLs within Office Documents’ Embedded Videos
- Google’s data charts path to avoiding malware on Android
- U.S. Cyber Command #malware samples will be shared to #VirusTotal by the Cyber National Mission Force and one expert said
- Cryptomining malware using Windows Installer to remain hidden
- An #Android app booby-trapped with #malware was recently taken down from Google Play — after being available for download for
- How does new MacOS malware target users through chat?
- How does your enterprise ensure a secure #ApplicationSecurityTesting process?
- Happy #Monday, #CyberSecurity folks! Catch up on the #blog, and discover how fileless #malware is changing how organizations treat
- Overt Command and Control is now live! Check out @william_knows & @nmonkee's talk at this year's #BlueHatv18 exploring the reality
EXPLOIT
- How to Perform Manual SQL Injection With Error Based String Method
- Cisco Inadvertently Leaked In-House Dirty COW Exploit Code In Its Software
- Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress
VULNERABILITY
- Hackers Abuse Critical Bug in Microsoft Office Online Video Feature To Deliver Malware
- DJI Drone Web App Security Flaw Could Let Attackers Take Over Drones
- CVE-2018-6981, CVE-2018-6982: uninitialized stack memory usage vulnerabilities on VMware ESXi, Workstation, and Fusion
- Flaw in WordPress plugin allowed unauthorized admin access, backdoors
- Steam Bug Allowed Unlimited Free Downloads
- Steam bug exposes license keys for every game available on platform
- Botnet pwns 100,000 routers using ancient security flaw
- Used Data Storage Devices Have Security Flaws
- Patched-up Adobe ColdFusion vulnerability exploited by hackers
- A critical flaw in GDPR compliance plugin for WordPress exploited in the wild
- New Acunetix Build Adds Detection for CSP, SRI, Node.js, and Ghostscript RCE Vulnerabilities
- Cisco ASA Security Product Denial-of-Service Vulnerability (CVE-2018-15454) Threat Alert
- Norway’s IT industry must tackle security vulnerabilities
- In this week’s ShadowTalk, the team debates the benefits/drawbacks of bug bounty programs, how you should consider operational value when
- Hackers Exploit Flaw in GDPR Compliance Plugin for WordPress
- Multiple Vulnerabilities Discovered In Roche Handheld Medical Devices
- DOD file sharing tool disabled due to vulnerability