Oct 5, 2018

APT report for 2018-10-04

TRANSNATIONAL / UNKNOWN

  1. Formjacking attacks spike as Magecart sets sites on ecommerce
  2. Pacific Northwest burger chain hit by FIN7
  3. Burgerville customer credit card info stolen in data breach laid at Fin7's feet

CHINA

Nothing to report

INDIA

Nothing to report

NORTH KOREA

  1. HIDDEN COBRA – FASTCash Campaign
  2. APT38 is behind financially motivated attacks carried out by North Korea

PAKISTAN

Nothing to report

VIETNAM

Nothing to report

IRAN

Nothing to report

LEBANON

Nothing to report

PALESTINE

Nothing to report

SAUDI ARABIA

Nothing to report

UNITED ARAB EMIRATES

Nothing to report

RUSSIA

  1. Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
  2. Should You Worry About Software Supply Chain Attacks?
  3. Shedding Skin – Turla’s Fresh Faces
  4. LoJack for computers used to attack European government bodies
  5. Justice Department charges 7 Russian intelligence officers
  6. APT28 turns away from election hacking and back to cyberespionage
  7. Russian Fancy Bear APT Linked To Earworm Hacking Group
  8. Russian Fancy Bear APT linked to Earworm hacking group
  9. LoJax: First UEFI Malware seen in the Wild

UKRAINE

Nothing to report

Platform report for 2018-10-04

WINDOWS

  1. Shedding Skin – Turla’s Fresh Faces
  2. LoJack for computers used to attack European government bodies
  3. CVE-2018-8373 Exploit Spotted
  4. LoJax: First UEFI Malware seen in the Wild
  5. Foxit PDF Reader fixes serious remote code execution vulnerability

LINUX

  1. LoJack for computers used to attack European government bodies

UNIX

Nothing to report

ANDROID

  1. .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
  2. How is Android Accessibility Service affected by a banking Trojan?
  3. .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
  4. Researchers found that cheap Android devices were shipped pre-installed backdoors

IOS

  1. A Remote iOS Bug

MACOS

  1. Google Project Zero drops macOS exploit, calls out Apple for silent patching
  2. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  3. macOS Flaw Allows Attackers To Hijack Installed Apps
  4. Tearing Apart the Undetected (OSX)Coldroot RAT
  5. An Unpatched Kernel Bug
  6. OSX/MacRansom; analyzing the latest ransomware to target macs
  7. Two Bugs, One Func(), part three
  8. Two Bugs, One Func(), part two
  9. Two Bugs, One Func(), part one
  10. Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
  11. More on, "Adware for OS X Distributes Trojans"
  12. A Google bug breaks the search results in Safari

Threat report for 2018-10-04

DATA BREACH

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
  3. Campaign 2018: Cyberattacks on infrastructure could suppress voter turnout
  4. Sony accidentally leaked November's PS Plus free games
  5. US charges Russian military officers over international hacking and disinformation campaigns
  6. Burgerville Customer Credit Card Info Stolen In Data Breach
  7. HIDDEN COBRA – FASTCash Campaign
  8. Database of 200 Million Records Stolen from Apollo in Data Breach
  9. Irish Data Regulator Likely to Fine Facebook for Data Breach
  10. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  11. The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
  12. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  13. How #livechatsoftware leak personal #employeedata?
  14. Democratic congressional intern arrested for doxing GOP senators during Kavanaugh hearing
  15. Business Email Compromise: When You Don’t Need to Phish.
  16. Business email compromise made easy for cyber criminals
  17. In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
  18. Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
  19. UK and allies accuse Russia of cyber attack campaign
  20. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
  21. U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
  22. DanaBot Observed in Large Campaign Targeting U.S. Organizations

DENIAL-OF-SERVICE

  1. California bill bans bots during elections
  2. Why It’s Time to Nuke the Password
  3. Why It’s Time to Nuke the Password

MALVERTISING

Nothing to report

PHISHING

  1. Exclusive: Moving away from passwords to two-factor authentication
  2. Block Blocking Login Items
  3. Business Email Compromise: When You Don’t Need to Phish.
  4. Hackers Selling Facebook Account Logins Details On Dark Web For $3
  5. Experts recommend avoiding single step logins
  6. Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
  7. Why It’s Time to Nuke the Password
  8. Why It’s Time to Nuke the Password
  9. DanaBot Observed in Large Campaign Targeting U.S. Organizations

WEB DEFACEMENT

  1. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  2. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center

MALWARE

  1. Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
  2. .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
  3. China allegedly infiltrated US companies through implanted hardware backdoors
  4. Researchers at the 2018 @RSAConference discussed #stegware: @malware that uses #steganography. Discover how this works with expert @lewisnic.
  5. Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
  6. Avast AV reclassifies cryptominers | Avast
  7. Researchers at Cisco Talos (@TalosSecurity) recently discovered #GravityRAT, a remote access #Trojan. Discover how this RAT can check for
  8. This is also a good time to remind that bugdoors are far more scary than backdoors.
  9. Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
  10. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  11. Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
  12. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  13. Tearing Apart the Undetected (OSX)Coldroot RAT
  14. Mac Malware of 2017
  15. WTF is Mughthesec!? poking on a piece of undetected adware
  16. OSX/MacRansom; analyzing the latest ransomware to target macs
  17. Mac Malware of 2016
  18. Towards Generic Ransomware Detection
  19. Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
  20. Analyzing the Anti-Analysis Logic of an Adware Installer
  21. Monitoring Process Creation via the Kernel (Part III)
  22. Monitoring Process Creation via the Kernel (Part II)
  23. Monitoring Process Creation via the Kernel (Part I)
  24. More on, "Adware for OS X Distributes Trojans"
  25. LoJax: First UEFI Malware seen in the Wild
  26. Virus Bulletin 2018: Attack velocity ramps up
  27. More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
  28. Malicious remote admin tool seemingly linked to KONNI malware, North Korea
  29. Betabot trojan packed with anti-malware evasion tools
  30. How is Android Accessibility Service affected by a banking Trojan?
  31. How does stegware malware exploit steganography techniques?
  32. .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
  33. Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
  34. A new group of #malware -- dubbed #GoScanSSH -- was recently discovered by researchers. Learn how this malware works and
  35. Seriously if I could make evil semiconductors I would just replace one which is already present rather than adding it. Show
  36. WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
  37. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  38. Researchers found that cheap Android devices were shipped pre-installed backdoors
  39. Google opened the .page domain
  40. Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
  41. Zoho Heavily Used by Keyloggers to Transmit Stolen Data
  42. Network Outage at Some Recipe Unlimited Locations Caused by Malware
  43. DanaBot Observed in Large Campaign Targeting U.S. Organizations

EXPLOIT

  1. Google Project Zero drops macOS exploit, calls out Apple for silent patching
  2. CVE-2018-8373 Exploit Spotted
  3. Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
  4. Remote Mac Exploitation Via Custom URL Schemes
  5. How does stegware malware exploit steganography techniques?
  6. Secure encrypted #virtualization: How is this technology exploited?

VULNERABILITY

  1. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  2. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  3. macOS Flaw Allows Attackers To Hijack Installed Apps
  4. ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
  5. CVE-2018-8373 Exploit Spotted
  6. Vulnerability Scanning vs. Penetration Testing by @TripwireInc
  7. This is also a good time to remind that bugdoors are far more scary than backdoors.
  8. A Remote iOS Bug
  9. An Unpatched Kernel Bug
  10. From the Top to the Bottom; Tracking down CVE-2017-7149
  11. Two Bugs, One Func(), part three
  12. Two Bugs, One Func(), part two
  13. Two Bugs, One Func(), part one
  14. CVE-2015-3673: Goodbye Rootpipe...(for now?)
  15. Cisco: Two critical bugs in DNA network software need these urgent patches
  16. Paper over the Kracks: New techniques can bypass WPA2 flaw mitigations
  17. Hackers Earn $150,000 in Marine Corps Bug Bounty Program
  18. Cisco plugs critical flaws in DNA Center and Prime Infrastructure
  19. Marine Corps bug bounty program finds 150 vulnerabilities
  20. Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
  21. Foxit PDF Reader fixes serious remote code execution vulnerability
  22. A Google bug breaks the search results in Safari
  23. Hacking for good uncovers over 150 Marine Corps web vulnerabilities

Region brief for 2018-10-04

ASIA

  1. Should You Worry About Software Supply Chain Attacks?
  2. .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
  3. Shedding Skin – Turla’s Fresh Faces
  4. China allegedly infiltrated US companies through implanted hardware backdoors
  5. Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
  6. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  7. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  8. A Remote iOS Bug
  9. APT38 is behind financially motivated attacks carried out by North Korea
  10. Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined

OCEANIA

  1. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures

NORTH AMERICA

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  3. China allegedly infiltrated US companies through implanted hardware backdoors
  4. US charges Russian military officers over international hacking and disinformation campaigns
  5. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  6. Justice Department charges 7 Russian intelligence officers
  7. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  8. ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
  9. HIDDEN COBRA – FASTCash Campaign
  10. Pacific Northwest burger chain hit by FIN7
  11. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  12. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  13. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  14. LoJax: First UEFI Malware seen in the Wild
  15. Hackers Earn $150,000 in Marine Corps Bug Bounty Program
  16. APT38 is behind financially motivated attacks carried out by North Korea
  17. U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
  18. DanaBot Observed in Large Campaign Targeting U.S. Organizations

SOUTH AMERICA

  1. APT38 is behind financially motivated attacks carried out by North Korea

EUROPE

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
  3. Should You Worry About Software Supply Chain Attacks?
  4. US charges Russian military officers over international hacking and disinformation campaigns
  5. LoJack for computers used to attack European government bodies
  6. Justice Department charges 7 Russian intelligence officers
  7. Russian Fancy Bear APT Linked To Earworm Hacking Group
  8. Pacific Northwest burger chain hit by FIN7
  9. Irish Data Regulator Likely to Fine Facebook for Data Breach
  10. Russian Fancy Bear APT linked to Earworm hacking group
  11. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  12. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  13. LoJax: First UEFI Malware seen in the Wild
  14. UK and allies accuse Russia of cyber attack campaign
  15. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  16. Experts recommend avoiding single step logins

AFRICA

Nothing to report

Sector brief for 2018-10-04

HEALTHCARE

  1. Justice Department charges 7 Russian intelligence officers
  2. Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers

TRANSPORT

  1. Shedding Skin – Turla’s Fresh Faces

BANKING & FINANCE

  1. Should You Worry About Software Supply Chain Attacks?
  2. China allegedly infiltrated US companies through implanted hardware backdoors
  3. Burgerville Customer Credit Card Info Stolen In Data Breach
  4. HIDDEN COBRA – FASTCash Campaign
  5. Pacific Northwest burger chain hit by FIN7
  6. Database of 200 Million Records Stolen from Apollo in Data Breach
  7. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  8. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  9. Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
  10. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  11. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  12. How is Android Accessibility Service affected by a banking Trojan?
  13. APT38 is behind financially motivated attacks carried out by North Korea
  14. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
  15. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures

INFORMATION & TELECOMMUNICATION

  1. Google Project Zero drops macOS exploit, calls out Apple for silent patching
  2. .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
  3. Shedding Skin – Turla’s Fresh Faces
  4. ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
  5. CVE-2018-8373 Exploit Spotted
  6. Irish Data Regulator Likely to Fine Facebook for Data Breach
  7. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  8. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  9. More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
  10. Business Email Compromise: When You Don’t Need to Phish.
  11. In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
  12. Hackers Selling Facebook Account Logins Details On Dark Web For $3
  13. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
  14. WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
  15. Experts recommend avoiding single step logins
  16. A Google bug breaks the search results in Safari
  17. Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
  18. Google opened the .page domain
  19. Why It’s Time to Nuke the Password
  20. Why It’s Time to Nuke the Password

FOOD

Nothing to report

WATER

Nothing to report

ENERGY

  1. Should You Worry About Software Supply Chain Attacks?
  2. Shedding Skin – Turla’s Fresh Faces
  3. Justice Department charges 7 Russian intelligence officers
  4. Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers

GOVERNMENT & PUBLIC SERVICE

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. Justice Department charges 7 Russian intelligence officers
  3. APT28 turns away from election hacking and back to cyberespionage
  4. Irish Data Regulator Likely to Fine Facebook for Data Breach

Daily brief for 2018-10-04

ASIA

  1. Should You Worry About Software Supply Chain Attacks?
  2. .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
  3. Shedding Skin – Turla’s Fresh Faces
  4. China allegedly infiltrated US companies through implanted hardware backdoors
  5. Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
  6. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  7. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  8. A Remote iOS Bug
  9. APT38 is behind financially motivated attacks carried out by North Korea
  10. Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined

WORLD

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
  3. Should You Worry About Software Supply Chain Attacks?
  4. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  5. China allegedly infiltrated US companies through implanted hardware backdoors
  6. US charges Russian military officers over international hacking and disinformation campaigns
  7. LoJack for computers used to attack European government bodies
  8. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  9. Justice Department charges 7 Russian intelligence officers
  10. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  11. Russian Fancy Bear APT Linked To Earworm Hacking Group
  12. ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
  13. HIDDEN COBRA – FASTCash Campaign
  14. Pacific Northwest burger chain hit by FIN7
  15. Irish Data Regulator Likely to Fine Facebook for Data Breach
  16. Russian Fancy Bear APT linked to Earworm hacking group
  17. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  18. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  19. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  20. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  21. LoJax: First UEFI Malware seen in the Wild
  22. Hackers Earn $150,000 in Marine Corps Bug Bounty Program
  23. APT38 is behind financially motivated attacks carried out by North Korea
  24. UK and allies accuse Russia of cyber attack campaign
  25. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  26. Experts recommend avoiding single step logins
  27. U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
  28. DanaBot Observed in Large Campaign Targeting U.S. Organizations

ATTACKS

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. .@FireEye researchers tracked an aggressive #cybertheft campaign -- attributed to North Korean #APT38 -- in which threat actors attempted to
  3. Campaign 2018: Cyberattacks on infrastructure could suppress voter turnout
  4. Sony accidentally leaked November's PS Plus free games
  5. US charges Russian military officers over international hacking and disinformation campaigns
  6. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  7. Burgerville Customer Credit Card Info Stolen In Data Breach
  8. Exclusive: Moving away from passwords to two-factor authentication
  9. HIDDEN COBRA – FASTCash Campaign
  10. Database of 200 Million Records Stolen from Apollo in Data Breach
  11. Irish Data Regulator Likely to Fine Facebook for Data Breach
  12. 5,000 UK firms' financial details exposed in data breaches, finds @digitalshadows
  13. The @UN accidentally exposed credentials on public @trello boards. Plus, #Uber is set to pay $148 million settlement following its
  14. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  15. Block Blocking Login Items
  16. How #livechatsoftware leak personal #employeedata?
  17. Democratic congressional intern arrested for doxing GOP senators during Kavanaugh hearing
  18. California bill bans bots during elections
  19. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
  20. Business Email Compromise: When You Don’t Need to Phish.
  21. Business email compromise made easy for cyber criminals
  22. In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
  23. Hackers Selling Facebook Account Logins Details On Dark Web For $3
  24. Security Investigator who Compromised Hotel Wi-Fi, Shared Pass-Codes Online, is Fined
  25. UK and allies accuse Russia of cyber attack campaign
  26. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
  27. Experts recommend avoiding single step logins
  28. Phishing Attacks Distributed Through CloudFlare's IPFS Gateway
  29. Why It’s Time to Nuke the Password
  30. Why It’s Time to Nuke the Password
  31. U.S. Capitol Police Arrest Suspect for Doxing U.S. Senators
  32. DanaBot Observed in Large Campaign Targeting U.S. Organizations

THREATS

  1. Google Project Zero drops macOS exploit, calls out Apple for silent patching
  2. Virus Bulletin 2018: Turla APT Changes Shape with New Code and Targets
  3. .@ThreatFabric researchers uncovered an #Android malware, #MysteryBot, which uses overlay attacks to avoid detection. Learn how this #malware affects @Google's
  4. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  5. China allegedly infiltrated US companies through implanted hardware backdoors
  6. Researchers at the 2018 @RSAConference discussed #stegware: @malware that uses #steganography. Discover how this works with expert @lewisnic.
  7. Report: In Huge Hack, Chinese Manufacturer Sneaks Backdoors Onto Motherboards
  8. Avast AV reclassifies cryptominers | Avast
  9. Researchers at Cisco Talos (@TalosSecurity) recently discovered #GravityRAT, a remote access #Trojan. Discover how this RAT can check for
  10. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  11. macOS Flaw Allows Attackers To Hijack Installed Apps
  12. ICYMI - CISO @rickhholland joins @drshellface and @mazzazone in this week's ShadowTalk episode: Security Flaws Affect 50 Million Facebook Accounts
  13. CVE-2018-8373 Exploit Spotted
  14. Vulnerability Scanning vs. Penetration Testing by @TripwireInc
  15. This is also a good time to remind that bugdoors are far more scary than backdoors.
  16. Fallout Exploit Kit Now Installing the Kraken Cryptor Ransomware
  17. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  18. Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
  19. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  20. Remote Mac Exploitation Via Custom URL Schemes
  21. A Remote iOS Bug
  22. Tearing Apart the Undetected (OSX)Coldroot RAT
  23. An Unpatched Kernel Bug
  24. Mac Malware of 2017
  25. From the Top to the Bottom; Tracking down CVE-2017-7149
  26. WTF is Mughthesec!? poking on a piece of undetected adware
  27. OSX/MacRansom; analyzing the latest ransomware to target macs
  28. Two Bugs, One Func(), part three
  29. Two Bugs, One Func(), part two
  30. Two Bugs, One Func(), part one
  31. Mac Malware of 2016
  32. Towards Generic Ransomware Detection
  33. Analysis of an Intrusive Cross-Platform Adware; OSX/Pirrit
  34. Analyzing the Anti-Analysis Logic of an Adware Installer
  35. Monitoring Process Creation via the Kernel (Part III)
  36. Monitoring Process Creation via the Kernel (Part II)
  37. Monitoring Process Creation via the Kernel (Part I)
  38. CVE-2015-3673: Goodbye Rootpipe...(for now?)
  39. More on, "Adware for OS X Distributes Trojans"
  40. LoJax: First UEFI Malware seen in the Wild
  41. Cisco: Two critical bugs in DNA network software need these urgent patches
  42. Virus Bulletin 2018: Attack velocity ramps up
  43. Paper over the Kracks: New techniques can bypass WPA2 flaw mitigations
  44. Hackers Earn $150,000 in Marine Corps Bug Bounty Program
  45. More than 4,000 ransomware attacks occur every day. Secure your company & build your network at #RiskSec with promo code
  46. Malicious remote admin tool seemingly linked to KONNI malware, North Korea
  47. Betabot trojan packed with anti-malware evasion tools
  48. Cisco plugs critical flaws in DNA Center and Prime Infrastructure
  49. Marine Corps bug bounty program finds 150 vulnerabilities
  50. How is Android Accessibility Service affected by a banking Trojan?
  51. How does stegware malware exploit steganography techniques?
  52. .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
  53. Cisco Talos spotted 18 vulnerabilities in Foxit PDF Reader, 8 in Atlantis World Processor
  54. A new group of #malware -- dubbed #GoScanSSH -- was recently discovered by researchers. Learn how this malware works and
  55. Secure encrypted #virtualization: How is this technology exploited?
  56. Seriously if I could make evil semiconductors I would just replace one which is already present rather than adding it. Show
  57. WATCH: Top 5 Viruses of All Time by Security Expert @mikko Hyppönen
  58. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  59. Foxit PDF Reader fixes serious remote code execution vulnerability
  60. A Google bug breaks the search results in Safari
  61. Researchers found that cheap Android devices were shipped pre-installed backdoors
  62. Google opened the .page domain
  63. Most Advanced Backdoor Obfuscation and Evasion Technique That used by Hackers
  64. Zoho Heavily Used by Keyloggers to Transmit Stolen Data
  65. Hacking for good uncovers over 150 Marine Corps web vulnerabilities
  66. Network Outage at Some Recipe Unlimited Locations Caused by Malware
  67. DanaBot Observed in Large Campaign Targeting U.S. Organizations

CRIME

  1. Bug bounty scheme uncovers 150 vulnerabilities in US Marine Corps websites
  2. Shedding Skin – Turla’s Fresh Faces
  3. Avast AV reclassifies cryptominers | Avast
  4. Hacker Pleads Guilty of Defacing 11,000 Websites, Could Get up to 20 Years
  5. Justice Department charges 7 Russian intelligence officers
  6. CVE-2018-4251 – Apple did not disable Intel Manufacturing Mode in its laptops
  7. Burgerville Customer Credit Card Info Stolen In Data Breach
  8. HIDDEN COBRA – FASTCash Campaign
  9. Pacific Northwest burger chain hit by FIN7
  10. Database of 200 Million Records Stolen from Apollo in Data Breach
  11. Researchers from @proofpoint have announced the discovery of a remote access trojan, and an upgraded version of an old banking
  12. Canadian restaurant chain Recipe suffered a network outage, is it a ransomware attack?
  13. Burgerville customer credit card info stolen in data breach laid at Fin7's feet
  14. Remote Mac Exploitation Via Custom URL Schemes
  15. How is Android Accessibility Service affected by a banking Trojan?
  16. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
  17. Business Email Compromise: When You Don’t Need to Phish.
  18. Business email compromise made easy for cyber criminals
  19. APT38 is behind financially motivated attacks carried out by North Korea
  20. In manufacturing, almost half – 47 percent – of breaches involve the theft of intellectual property to gain competitive advantage.
  21. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials found openly
  22. New DanaBot Banking Malware Attack in Various Countries with Stealer and Remote Access Futures
  23. Experts recommend avoiding single step logins

POLITICS

  1. UK pins ‘reckless campaign of cyber attacks’ on Russian military intelligence
  2. Justice Department charges 7 Russian intelligence officers
  3. APT28 turns away from election hacking and back to cyberespionage
  4. Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report
  5. Hacktivist pleads guilty to defacing websites for NYC comptroller, Combating Terrorism Center
  6. APT38 is behind financially motivated attacks carried out by North Korea