Oct 12, 2018

APT report for 2018-10-11

TRANSNATIONAL / UNKNOWN

  1. Magecart Card-Stealing Gang Hits 'Shopper Approved' Plug-In
  2. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  3. New Gallmaker APT group eschews malware in cyber espionage campaigns

CHINA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. Threats in the Netherlands

INDIA

  1. The Reality of Self-Driving Cars and the Regulatory Hurdles

NORTH KOREA

  1. Reaper Group Uses New Malware to Deploy RAT
  2. Threats in the Netherlands

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

  1. Threats in the Netherlands

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Researchers link tools used in NotPetya and Ukraine grid hacks
  3. What would happen if an attack interrupted a country’s power supply?
  4. Threats in the Netherlands

SERBIA

Nil

UKRAINE

  1. Threats in the Netherlands

Platform report for 2018-10-11

WINDOWS

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  3. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  4. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  5. Researchers link tools used in NotPetya and Ukraine grid hacks
  6. Fake Flash Updaters Push Cryptocurrency Miners
  7. Adobe patches critical flaws in many of its software offerings
  8. Qihoo 360’s precise analysis of ransomware for September
  9. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  10. New Gallmaker APT group eschews malware in cyber espionage campaigns
  11. GPlayed Trojan - .Net playing with Google Market
  12. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  13. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

LINUX

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. Adobe patches critical flaws in many of its software offerings
  4. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

UNIX

Nil

ANDROID

  1. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  2. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  3. Talos: Android trojan resembling Play Store installs sophisticated spyware
  4. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  5. GPlayed trojan – .Net playing with Google Market
  6. New Android Trojan Gplayed Adapts to Attacker's Needs
  7. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  8. GPlayed Trojan - .Net playing with Google Market
  9. A simple videocall could compromise your WhatsApp account

IOS

  1. Talos: Android trojan resembling Play Store installs sophisticated spyware
  2. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  3. A simple videocall could compromise your WhatsApp account

MACOS

  1. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  2. Adobe patches critical flaws in many of its software offerings

Threat report for 2018-10-11

DATA BREACH & DATA LOSS

  1. The BEC List: Helping Thwart Business Email Compromise through Collaboration
  2. Personal data for coffee. What’s the risk? | Avast
  3. The EU and the US have investigated on data breaches on the Google+
  4. FitMetrix user data exposed via passwordless ElasticSearch server cluster
  5. Apple has formed a partnership with lyrics database provider Genius
  6. Defending Against Business Email Compromise Attacks
  7. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  8. Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
  9. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  10. A new database with information on every shooting at a school in the last 50 years is now available publicly
  11. New Gallmaker APT group eschews malware in cyber espionage campaigns
  12. Ghostdns Attack Compromised Over 100K Routers
  13. A simple videocall could compromise your WhatsApp account
  14. Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
  15. Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

DENIAL-OF-SERVICE

Nil

MALVERTISING

Nil

PHISHING

  1. California Bill Increases Default Password Security
  2. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  3. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  4. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  5. AVG 2019 now includes enhanced phishing threat detection

WEB DEFACEMENT

  1. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites

BOTNET

Nil

RANSOMWARE

  1. Qihoo 360’s precise analysis of ransomware for September
  2. Costly cryptojacking overtakes ransomware in the enterprise threat stakes

CRYPTOMINING & CRYPTOCURRENCIES

  1. XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
  2. Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
  3. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  4. Cryptomining malware discovered masquerading as Flash updates
  5. Fake Flash Updaters Push Cryptocurrency Miners
  6. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  7. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  8. Crypto-mining malware poses as Flash updates
  9. Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )

MALWARE

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  3. Hackers Exploit Drupalgeddon2 to Install Backdoor
  4. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  5. Talos: Android trojan resembling Play Store installs sophisticated spyware
  6. Most Malware Arrives Via Email
  7. Fake Adobe Flash Updates Hide Malicious Crypto Miners
  8. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  9. GPlayed trojan – .Net playing with Google Market
  10. Cryptomining malware discovered masquerading as Flash updates
  11. This cryptojacking mining malware pretends to be a Flash update
  12. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  13. Reaper Group Uses New Malware to Deploy RAT
  14. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  15. Exaramel Malware Reinforces Link Between Industroyer and NotPetya
  16. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  17. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  18. New Android Trojan Gplayed Adapts to Attacker's Needs
  19. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  20. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  21. Crypto-mining malware poses as Flash updates
  22. Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
  23. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  24. New Backdoor Ties NotPetya and Industroyer to TeleBots Group
  25. .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
  26. "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
  27. The attached file promptly infects Peter’s laptop with the RAT, remote access trojan. It only takes about an hour from
  28. New Gallmaker APT group eschews malware in cyber espionage campaigns
  29. GPlayed Trojan - .Net playing with Google Market
  30. Canada-Based Restaurant Chain Hit with Malware Attack
  31. Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
  32. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
  33. How to Defeat Malicious Everything as-a-Service

EXPLOIT

  1. Hackers Exploit Drupalgeddon2 to Install Backdoor
  2. PoC Code Available for Microsoft Edge Remote Code Execution Bug

VULNERABILITY

  1. Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
  2. Senate seeks internal memo on Google+ vulnerability
  3. Slow disclosure of Google+ flaw draws attention of senators
  4. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  5. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  6. Network Time Protocol Bugs Sting Juniper Operating System
  7. Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
  8. Audit Finds No Critical Flaws in Firefox Update System
  9. [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
  10. A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
  11. Juniper fixes 30+ vulnerabilities in its routing, switching devices
  12. Adobe patches critical flaws in many of its software offerings
  13. Update now! Microsoft fixes 49 bugs, 12 are critical
  14. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  15. VMware issues advisory for a DoS vulnerability
  16. .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
  17. Juniper Patches Serious Flaws in Junos OS
  18. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  19. Four Critical Flaws Patched In Adobe Digital Edition

Region brief for 2018-10-11

ASIA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. What would happen if an attack interrupted a country’s power supply?
  4. Reaper Group Uses New Malware to Deploy RAT
  5. Threats in the Netherlands

OCEANIA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

NORTH AMERICA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. The Reality of Self-Driving Cars and the Regulatory Hurdles
  3. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  4. The EU and the US have investigated on data breaches on the Google+
  5. Researchers link tools used in NotPetya and Ukraine grid hacks
  6. What would happen if an attack interrupted a country’s power supply?
  7. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  8. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  9. Threats in the Netherlands
  10. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  11. Canada-Based Restaurant Chain Hit with Malware Attack

SOUTH AMERICA

  1. Ghostdns Attack Compromised Over 100K Routers

EUROPE

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  3. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  4. Talos: Android trojan resembling Play Store installs sophisticated spyware
  5. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  6. Researchers link tools used in NotPetya and Ukraine grid hacks
  7. What would happen if an attack interrupted a country’s power supply?
  8. Reaper Group Uses New Malware to Deploy RAT
  9. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  10. Defending Against Business Email Compromise Attacks
  11. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  12. Threats in the Netherlands
  13. New Gallmaker APT group eschews malware in cyber espionage campaigns
  14. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  15. GPlayed Trojan - .Net playing with Google Market

AFRICA

Nil

Sector brief for 2018-10-11

HEALTHCARE

  1. What would happen if an attack interrupted a country’s power supply?

TRANSPORT

  1. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  2. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  3. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  4. A simple videocall could compromise your WhatsApp account

BANKING & FINANCE

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  3. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  4. Talos: Android trojan resembling Play Store installs sophisticated spyware
  5. Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
  6. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  7. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  8. Magecart Card-Stealing Gang Hits 'Shopper Approved' Plug-In
  9. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  10. Threats in the Netherlands
  11. GPlayed Trojan - .Net playing with Google Market
  12. Ghostdns Attack Compromised Over 100K Routers
  13. Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread

INFORMATION & TELECOMMUNICATION

  1. Personal data for coffee. What’s the risk? | Avast
  2. Most Malware Arrives Via Email
  3. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  4. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  5. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  6. A new database with information on every shooting at a school in the last 50 years is now available publicly
  7. Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )
  8. A simple videocall could compromise your WhatsApp account
  9. Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
  10. Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

FOOD

Nil

WATER

Nil

ENERGY

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. Researchers link tools used in NotPetya and Ukraine grid hacks
  4. What would happen if an attack interrupted a country’s power supply?
  5. Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread

GOVERNMENT & PUBLIC SERVICE

Nil

Daily brief for 2018-10-11

ASIA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. What would happen if an attack interrupted a country’s power supply?
  4. Reaper Group Uses New Malware to Deploy RAT
  5. Threats in the Netherlands

WORLD

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  3. The Reality of Self-Driving Cars and the Regulatory Hurdles
  4. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  5. Talos: Android trojan resembling Play Store installs sophisticated spyware
  6. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  7. The EU and the US have investigated on data breaches on the Google+
  8. Researchers link tools used in NotPetya and Ukraine grid hacks
  9. What would happen if an attack interrupted a country’s power supply?
  10. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  11. Reaper Group Uses New Malware to Deploy RAT
  12. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  13. Defending Against Business Email Compromise Attacks
  14. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  15. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  16. Threats in the Netherlands
  17. New Gallmaker APT group eschews malware in cyber espionage campaigns
  18. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  19. GPlayed Trojan - .Net playing with Google Market
  20. Ghostdns Attack Compromised Over 100K Routers
  21. Canada-Based Restaurant Chain Hit with Malware Attack

ATTACKS

  1. The BEC List: Helping Thwart Business Email Compromise through Collaboration
  2. Personal data for coffee. What’s the risk? | Avast
  3. California Bill Increases Default Password Security
  4. The EU and the US have investigated on data breaches on the Google+
  5. FitMetrix user data exposed via passwordless ElasticSearch server cluster
  6. Apple has formed a partnership with lyrics database provider Genius
  7. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  8. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  9. Defending Against Business Email Compromise Attacks
  10. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  11. Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
  12. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  13. A new database with information on every shooting at a school in the last 50 years is now available publicly
  14. New Gallmaker APT group eschews malware in cyber espionage campaigns
  15. Ghostdns Attack Compromised Over 100K Routers
  16. A simple videocall could compromise your WhatsApp account
  17. Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
  18. Mingis on Tech: Data breaches in a world of 'surveillance capitalism'
  19. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  20. AVG 2019 now includes enhanced phishing threat detection

THREATS

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
  3. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  4. Senate seeks internal memo on Google+ vulnerability
  5. XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
  6. Slow disclosure of Google+ flaw draws attention of senators
  7. Hackers Exploit Drupalgeddon2 to Install Backdoor
  8. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  9. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  10. Talos: Android trojan resembling Play Store installs sophisticated spyware
  11. Most Malware Arrives Via Email
  12. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  13. Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
  14. Network Time Protocol Bugs Sting Juniper Operating System
  15. Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
  16. Audit Finds No Critical Flaws in Firefox Update System
  17. Fake Adobe Flash Updates Hide Malicious Crypto Miners
  18. [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
  19. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  20. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  21. GPlayed trojan – .Net playing with Google Market
  22. Cryptomining malware discovered masquerading as Flash updates
  23. This cryptojacking mining malware pretends to be a Flash update
  24. Fake Flash Updaters Push Cryptocurrency Miners
  25. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  26. Reaper Group Uses New Malware to Deploy RAT
  27. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  28. Exaramel Malware Reinforces Link Between Industroyer and NotPetya
  29. A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
  30. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  31. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  32. New Android Trojan Gplayed Adapts to Attacker's Needs
  33. Juniper fixes 30+ vulnerabilities in its routing, switching devices
  34. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  35. Adobe patches critical flaws in many of its software offerings
  36. Update now! Microsoft fixes 49 bugs, 12 are critical
  37. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  38. Qihoo 360’s precise analysis of ransomware for September
  39. Costly cryptojacking overtakes ransomware in the enterprise threat stakes
  40. Crypto-mining malware poses as Flash updates
  41. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  42. Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
  43. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  44. VMware issues advisory for a DoS vulnerability
  45. .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
  46. New Backdoor Ties NotPetya and Industroyer to TeleBots Group
  47. Juniper Patches Serious Flaws in Junos OS
  48. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  49. .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
  50. "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
  51. The attached file promptly infects Peter’s laptop with the RAT, remote access trojan. It only takes about an hour from
  52. New Gallmaker APT group eschews malware in cyber espionage campaigns
  53. GPlayed Trojan - .Net playing with Google Market
  54. Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )
  55. Canada-Based Restaurant Chain Hit with Malware Attack
  56. Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
  57. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
  58. Four Critical Flaws Patched In Adobe Digital Edition
  59. How to Defeat Malicious Everything as-a-Service

CRIME

  1. The BEC List: Helping Thwart Business Email Compromise through Collaboration
  2. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  3. The EU and the US have investigated on data breaches on the Google+
  4. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  5. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  6. Defending Against Business Email Compromise Attacks
  7. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  8. Threats in the Netherlands

POLITICS

  1. What would happen if an attack interrupted a country’s power supply?
  2. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  3. Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
  4. Threats in the Netherlands
  5. New Gallmaker APT group eschews malware in cyber espionage campaigns
  6. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  7. A simple videocall could compromise your WhatsApp account
  8. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  9. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

APT report for 2018-10-11

TRANSNATIONAL / UNKNOWN

  1. Magecart Card-Stealing Gang Hits 'Shopper Approved' Plug-In
  2. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  3. New Gallmaker APT group eschews malware in cyber espionage campaigns

CHINA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. Threats in the Netherlands

INDIA

  1. The Reality of Self-Driving Cars and the Regulatory Hurdles

NORTH KOREA

  1. Reaper Group Uses New Malware to Deploy RAT
  2. Threats in the Netherlands

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

  1. Threats in the Netherlands

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Researchers link tools used in NotPetya and Ukraine grid hacks
  3. What would happen if an attack interrupted a country’s power supply?
  4. Threats in the Netherlands

SERBIA

Nil

UKRAINE

  1. Threats in the Netherlands

Platform report for 2018-10-11

WINDOWS

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  3. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  4. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  5. Researchers link tools used in NotPetya and Ukraine grid hacks
  6. Fake Flash Updaters Push Cryptocurrency Miners
  7. Adobe patches critical flaws in many of its software offerings
  8. Qihoo 360’s precise analysis of ransomware for September
  9. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  10. New Gallmaker APT group eschews malware in cyber espionage campaigns
  11. GPlayed Trojan - .Net playing with Google Market
  12. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  13. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

LINUX

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. Adobe patches critical flaws in many of its software offerings
  4. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript

UNIX

Nil

ANDROID

  1. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  2. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  3. Talos: Android trojan resembling Play Store installs sophisticated spyware
  4. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  5. GPlayed trojan – .Net playing with Google Market
  6. New Android Trojan Gplayed Adapts to Attacker's Needs
  7. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  8. GPlayed Trojan - .Net playing with Google Market
  9. A simple videocall could compromise your WhatsApp account

IOS

  1. Talos: Android trojan resembling Play Store installs sophisticated spyware
  2. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  3. A simple videocall could compromise your WhatsApp account

MACOS

  1. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  2. Adobe patches critical flaws in many of its software offerings

Threat report for 2018-10-11

DATA BREACH & DATA LOSS

  1. The BEC List: Helping Thwart Business Email Compromise through Collaboration
  2. Personal data for coffee. What’s the risk? | Avast
  3. The EU and the US have investigated on data breaches on the Google+
  4. FitMetrix user data exposed via passwordless ElasticSearch server cluster
  5. Apple has formed a partnership with lyrics database provider Genius
  6. Defending Against Business Email Compromise Attacks
  7. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  8. Palo Alto Networks Uncovers Flash Updater Cryptojacking Campaign
  9. Gemalto reports that 4.6 billion record leaked in the first half of 2018
  10. A new database with information on every shooting at a school in the last 50 years is now available publicly
  11. New Gallmaker APT group eschews malware in cyber espionage campaigns
  12. Ghostdns Attack Compromised Over 100K Routers
  13. A simple videocall could compromise your WhatsApp account
  14. Mingis on Tech: Data breaches and the rise of 'surveillance capitalism'
  15. Mingis on Tech: Data breaches in a world of 'surveillance capitalism'

DENIAL-OF-SERVICE

Nil

MALVERTISING

Nil

PHISHING

  1. California Bill Increases Default Password Security
  2. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  3. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  4. Avast 2019: Extends Artificial Intelligence Technology to Block Advanced Phishing Attacks for Enhanced Consumer Security
  5. AVG 2019 now includes enhanced phishing threat detection

WEB DEFACEMENT

  1. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites

BOTNET

Nil

RANSOMWARE

  1. Qihoo 360’s precise analysis of ransomware for September
  2. Costly cryptojacking overtakes ransomware in the enterprise threat stakes

CRYPTOMINING & CRYPTOCURRENCIES

  1. XMRig Cryptocurrency Miner Camouflages Itself as a Flash Updater
  2. Cops Arrest Infamous SIM Swapper Who Stole Crypto Currency
  3. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  4. Cryptomining malware discovered masquerading as Flash updates
  5. Fake Flash Updaters Push Cryptocurrency Miners
  6. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  7. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  8. Crypto-mining malware poses as Flash updates
  9. Dublin Information Sec: Protect your firm from 'Gold Rush' #cryptocurrency scammers: https://www.independent.ie/business/dublin-information-sec/dublin-information-sec-protect-your-firm-from-gold-rush-cryptocurrency-scammers-37286913.html … ( via @jimmychappell )

MALWARE

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. GPlayed Android Trojan Can Wipe Your Device, Steal Data, Make Calls, Send SMS
  3. Hackers Exploit Drupalgeddon2 to Install Backdoor
  4. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  5. Talos: Android trojan resembling Play Store installs sophisticated spyware
  6. Most Malware Arrives Via Email
  7. Fake Adobe Flash Updates Hide Malicious Crypto Miners
  8. .@TrendMicro researchers discovered a malicious #ChromeExtension spreading #malware. Learn more with expert @lewisnic.
  9. GPlayed trojan – .Net playing with Google Market
  10. Cryptomining malware discovered masquerading as Flash updates
  11. This cryptojacking mining malware pretends to be a Flash update
  12. Hackers Abusing Legitimate Googlebot Services to Inject Cryptomining Malware
  13. Reaper Group Uses New Malware to Deploy RAT
  14. Cofense Report Reveals 10 Percent of User-Reported Emails Across Key Industries are Malicious, Over Half Tied to Credential Phishing
  15. Exaramel Malware Reinforces Link Between Industroyer and NotPetya
  16. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  17. New TeleBots backdoor: First evidence linking Industroyer to NotPetya
  18. New Android Trojan Gplayed Adapts to Attacker's Needs
  19. Researchers from @alienvault found a new #cryptocurrency mining malware -- dubbed #MassMiner -- that infects systems across the web. Learn
  20. Hackers launched #phishing attacks against @netflix users via malicious sites with TLS certificates. Learn how hackers mimic popular websites to
  21. Crypto-mining malware poses as Flash updates
  22. Who needs custom malware? 'Govt-backed' Gallmaker spy crew uses off-the-shelf wares
  23. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  24. New Backdoor Ties NotPetya and Industroyer to TeleBots Group
  25. .@FarsightSecInc's @paulvixie says his company's new research into domain name lifespans and causes of death shows the need for new
  26. "Help! I have a #computer worm..oh wait is it a computer #virus?" These terms are often used interchangeably, but have
  27. The attached file promptly infects Peter’s laptop with the RAT, remote access trojan. It only takes about an hour from
  28. New Gallmaker APT group eschews malware in cyber espionage campaigns
  29. GPlayed Trojan - .Net playing with Google Market
  30. Canada-Based Restaurant Chain Hit with Malware Attack
  31. Hackers Use Hijacked Email Address To Send Malware as a Reply to Existing Email Thread
  32. JSRAT – Secret Command and Control Channel Backdoor to Control Victims Machine Using JavaScript
  33. How to Defeat Malicious Everything as-a-Service

EXPLOIT

  1. Hackers Exploit Drupalgeddon2 to Install Backdoor
  2. PoC Code Available for Microsoft Edge Remote Code Execution Bug

VULNERABILITY

  1. Multiple Vulnerabilities Dicovered In RouterOS That Affected MikroTik Routers
  2. Senate seeks internal memo on Google+ vulnerability
  3. Slow disclosure of Google+ flaw draws attention of senators
  4. PoC Code Available for Microsoft Edge Remote Code Execution Bug
  5. .@Google Firebase's lack of #DatabaseSecurity and inadequate #BackendDevelopment led to #DataLeaks and vulnerabilities, including HospitalGown. Learn more about this
  6. Network Time Protocol Bugs Sting Juniper Operating System
  7. Juniper Networks provides dozens of fix for vulnerabilities in Junos OS
  8. Audit Finds No Critical Flaws in Firefox Update System
  9. [SingCERT] Alert on 12 Critical Microsoft Vulnerabilities for October 2018 Patch Tuesday
  10. A patched #MikroTik router vulnerability amps up severity rating as @TenableSecurity researchers find new potential exploits with more critical consequences.
  11. Juniper fixes 30+ vulnerabilities in its routing, switching devices
  12. Adobe patches critical flaws in many of its software offerings
  13. Update now! Microsoft fixes 49 bugs, 12 are critical
  14. All WhatsApp Users Must Update: Zero Day Bug Found in WhatsApp
  15. VMware issues advisory for a DoS vulnerability
  16. .@TenableSecurity found new exploits of an already patched #MikroTik router vulnerability that could enable hackers to launch #RemoteCode execution attacks.
  17. Juniper Patches Serious Flaws in Junos OS
  18. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  19. Four Critical Flaws Patched In Adobe Digital Edition

Region brief for 2018-10-11

ASIA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  3. What would happen if an attack interrupted a country’s power supply?
  4. Reaper Group Uses New Malware to Deploy RAT
  5. Threats in the Netherlands

OCEANIA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

NORTH AMERICA

  1. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  2. The Reality of Self-Driving Cars and the Regulatory Hurdles
  3. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  4. The EU and the US have investigated on data breaches on the Google+
  5. Researchers link tools used in NotPetya and Ukraine grid hacks
  6. What would happen if an attack interrupted a country’s power supply?
  7. Cops Arrest Infamous SIM Swapper Who Allegedly Stole $14 Million in Cryptocurrency
  8. Microsoft October Patch Tuesday fixed Win32k privilege vulnerability that used in targeted attacks
  9. Threats in the Netherlands
  10. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  11. Canada-Based Restaurant Chain Hit with Malware Attack

SOUTH AMERICA

  1. Ghostdns Attack Compromised Over 100K Routers

EUROPE

  1. Exaramel Malware Links Industroyer ICS malware and NotPetya wiper
  2. Cybersecurity Authorities Issue Alert About Publicly Available Hacking Tools
  3. Adaptable, All-in-One Android Trojan Shows the Future of Malware
  4. Talos: Android trojan resembling Play Store installs sophisticated spyware
  5. AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide
  6. Researchers link tools used in NotPetya and Ukraine grid hacks
  7. What would happen if an attack interrupted a country’s power supply?
  8. Reaper Group Uses New Malware to Deploy RAT
  9. Worker perks flinger Sodexo pulls Engage website after malware smackdown
  10. Defending Against Business Email Compromise Attacks
  11. Heathrow Airport, the busiest airport in the United Kingdom, has been fined £120,000 (about $158,173) following a data breach caused
  12. Threats in the Netherlands
  13. New Gallmaker APT group eschews malware in cyber espionage campaigns
  14. Italian Police Finally Identified 25-Year-old Italian Hacker who have Defaced NASA Websites
  15. GPlayed Trojan - .Net playing with Google Market

AFRICA

Nil