Oct 23, 2018

APT report for 2018-10-22

TRANSNATIONAL / UNKNOWN

Nil

CHINA

  1. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  2. Enigmatic cyber espionage campaign revives source code from old foe APT1

INDIA

Nil

NORTH KOREA

Nil

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. A week in security (October 15 – 21)
  2. Safeguarding the Nation’s Critical Infrastructure
  3. New APT GreyEnergy Found to Target EU Critical Systems, Linked to BlackEnergy
  4. .@ESET researchers claim the #GreyEnergy group has taken up the mantle of ICS-targeting #BlackEnergy, but @MalwareJake said the evidence wasn't

SERBIA

Nil

UKRAINE

Nil

Platform report for 2018-10-22

WINDOWS

  1. The boom of fileless malware attacks: How can we fight it?
  2. The latest variant of Satan ransomware is spreading in the wild
  3. Why does Windows 10 have many bugs?

LINUX

Nil

UNIX

Nil

ANDROID

Nil

IOS

  1. Apple Voiceover Exploit Allows Attackers Access to Ios Devices

MACOS

  1. Apple Voiceover Exploit Allows Attackers Access to Ios Devices

Threat report for 2018-10-22

DATA BREACH & DATA LOSS

  1. CMS portal breach exposes 75,000 individuals' records
  2. New Ethics Guidance for Lawyers from the American Bar Association (ABA) Regarding Data Breach and Cyber-attack
  3. According to the report, researchers detected 33,568 email addresses of finance departments that had been exposed by third parties. Can
  4. #NetSpectre leaks data remotely via side-channel attacks. Learn from expert Michael Cobb of @thehairyITdog why data from #microprocessors is not
  5. Criminals Hijacked Records of 75 000 Users from
  6. A #ZeroDay in #jQuery File Upload could affect thousands of projects because the jQuery #plugin vulnerability has existed for eight
  7. Enigmatic cyber espionage campaign revives source code from old foe APT1
  8. 75,000 HealthCare.gov Users Exposed, Personal Information Stolen
  9. US Indicts Another Russian for Role in Info Warfare Campaign
  10. What are DMARC records and can they improve email security?
  11. Anthem in Record $16m HIPAA Settlement
  12. The Hunt - Our new data breach detection video looks like a Mission Impossible trailer. However, the threats are for
  13. #NetSpectre exploits speculative execution to leak data remotely via side-channel attacks. Learn how this #SecurityVulnerability affects the #cloud from expert
  14. The most interesting Internet-connected vehicle hacks on record
  15. Web Hosting Software VestaCP Server Compromised With DDoS Malware
  16. Find out how #TLBleed abuses @Intel's HTT chip feature to leak data via TLB
  17. Are you aware of #Canada's data breach regulations? Get up to speed on the #blog:

DENIAL-OF-SERVICE

  1. NSA Hacking Tools Used Against Nuke, Aerospace Worlds
  2. Web Hosting Software VestaCP Server Compromised With DDoS Malware

MALVERTISING

Nil

PHISHING

  1. Phishing Scheme Leverages Azure Blob Storage and Hurricane Michael
  2. Strict password policy could prevent credential reuse, paper suggests
  3. Natural Disaster Related Phishing Scam Abusing Microsoft Azure to Steal login Credentials & Credit Card Numbers

WEB DEFACEMENT

  1. Saudi Future Investment Initiative website defaced by the hackers
  2. Hackers Deface Website of Saudi Investment Forum

BOTNET

  1. The Russian built #VPNFilter #botnet was taken down by the @FBI after over 500,000 routers were infected. However, VPNFilter is

RANSOMWARE

  1. Gamma ransomware compromises data on 16,000 patients at California hernia institute
  2. Ransomware: A cheat sheet for professionals
  3. The latest variant of Satan ransomware is spreading in the wild

CRYPTOMINING & CRYPTOCURRENCIES

  1. Blockchain Security and Privacy
  2. Rambus Vaultify Trade: Secure transaction and storage of crypto assets on blockchain
  3. .@alienvault researchers recently discovered #MassMiner, a #cryptocurrency mining #malware that has the ability to infect systems across the web. Discover
  4. iCloud Hacker Wants $175,000 Ransom to Be Paid In Bitcoin (BTC)
  5. Trade.io loses $7.5Mil worth of cryptocurrency in mysterious cold wallet hack
  6. Introducing Infura: Connecting DApps With Ethereum Without Setting up Ethereum Nodes
  7. Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them:
  8. India’s First Cryptocurrency ATM To Buy and Sell Cryptocurrencies

MALWARE

  1. How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
  2. US Tops Global Malware C2 Distribution
  3. Signal Upgrade Process Leaves Unencrypted Messages on Disk
  4. .@alienvault researchers recently discovered #MassMiner, a #cryptocurrency mining #malware that has the ability to infect systems across the web. Discover
  5. The boom of fileless malware attacks: How can we fight it?
  6. Octopus Malware
  7. Maker of LuminosityLink RAT gets 30 months in the clink
  8. Web Hosting Software VestaCP Server Compromised With DDoS Malware
  9. Adding the EICAR string to your name as part of the visitor self-registration process is a bit of a faux

EXPLOIT

  1. Apple Voiceover Exploit Allows Attackers Access to Ios Devices

VULNERABILITY

  1. Cisco, F5 Networks Investigate libssh Vulnerability Impact
  2. How to detect hardware-based server bugs
  3. Flaw in Media Library Impacts VLC, Other Software
  4. Libssh CVE-2018-10933 Scanners & Exploits Released - Apply Updates Now
  5. Recent Branch.io Patch Creates New XSS Flaw
  6. Critical Bug Impacts Live555 Media Streaming Libraries
  7. A newly disclosed #libSSH vulnerability could allow an attacker #AdminAccess to a server with little effort. By @MT_Heller
  8. Zero-day jQuery plugin vulnerability exploited for 3 years
  9. CVE-2018-4013: LIVE555 streaming media RTSP Server Remote Code Execution Vulnerability
  10. Popular website plugin harboured a serious 0-day for years
  11. A #ZeroDay in #jQuery File Upload could affect thousands of projects because the jQuery #plugin vulnerability has existed for eight
  12. It's OK, I'm verified - Libssh flaw allows attackers to bypass server authentication
  13. Repairnator bot finds software bugs, successfully submits patches
  14. Drupal Patched Critical RCE Vulnerabilities In Drupal 7 and 8
  15. FreeRTOS flaws expose millions of IoT devices to cyber attacks
  16. The .@iDefense Vulnerability Contributor Program (VCP) bug-bounty initiative continues to attract top contributors. Join them by submitting your 0-day for
  17. Critical vulnerabilities on FreeRTOS expose many systems to attacks
  18. WebLogic Remote Code Execution Vulnerability(CVE-2018-3245) Threat Alert
  19. MPlayer and VLC media player affected by critical flaw CVE-2018-4013
  20. Remote Code Execution Flaws Found in FreeRTOS - Popular OS for Embedded Systems
  21. Why does Windows 10 have many bugs?

Region brief for 2018-10-22

ASIA

  1. Saudi Future Investment Initiative website defaced by the hackers
  2. Hackers Deface Website of Saudi Investment Forum
  3. How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
  4. Rambus Vaultify Trade: Secure transaction and storage of crypto assets on blockchain
  5. A week in security (October 15 – 21)
  6. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  7. Enigmatic cyber espionage campaign revives source code from old foe APT1
  8. WebLogic Remote Code Execution Vulnerability(CVE-2018-3245) Threat Alert
  9. India’s First Cryptocurrency ATM To Buy and Sell Cryptocurrencies

OCEANIA

Nil

NORTH AMERICA

  1. How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
  2. US Tops Global Malware C2 Distribution
  3. A week in security (October 15 – 21)
  4. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  5. Safeguarding the Nation’s Critical Infrastructure
  6. New Ethics Guidance for Lawyers from the American Bar Association (ABA) Regarding Data Breach and Cyber-attack
  7. The boom of fileless malware attacks: How can we fight it?
  8. Criminals Hijacked Records of 75 000 Users from
  9. Enigmatic cyber espionage campaign revives source code from old foe APT1
  10. 75,000 HealthCare.gov Users Exposed, Personal Information Stolen
  11. US Indicts Another Russian for Role in Info Warfare Campaign
  12. Anthem in Record $16m HIPAA Settlement
  13. Are you aware of #Canada's data breach regulations? Get up to speed on the #blog:

SOUTH AMERICA

Nil

EUROPE

  1. A week in security (October 15 – 21)
  2. The Russian built #VPNFilter #botnet was taken down by the @FBI after over 500,000 routers were infected. However, VPNFilter is
  3. iCloud Hacker Wants $175,000 Ransom to Be Paid In Bitcoin (BTC)
  4. Repairnator bot finds software bugs, successfully submits patches
  5. New APT GreyEnergy Found to Target EU Critical Systems, Linked to BlackEnergy
  6. US Indicts Another Russian for Role in Info Warfare Campaign

AFRICA

Nil

Sector brief for 2018-10-22

HEALTHCARE

  1. CMS portal breach exposes 75,000 individuals' records
  2. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  3. Gamma ransomware compromises data on 16,000 patients at California hernia institute
  4. Safeguarding the Nation’s Critical Infrastructure
  5. Criminals Hijacked Records of 75 000 Users from
  6. 75,000 HealthCare.gov Users Exposed, Personal Information Stolen
  7. Critical vulnerabilities on FreeRTOS expose many systems to attacks
  8. Anthem in Record $16m HIPAA Settlement

TRANSPORT

  1. NSA Hacking Tools Used Against Nuke, Aerospace Worlds
  2. Critical vulnerabilities on FreeRTOS expose many systems to attacks

BANKING & FINANCE

  1. Rambus Vaultify Trade: Secure transaction and storage of crypto assets on blockchain
  2. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  3. According to the report, researchers detected 33,568 email addresses of finance departments that had been exposed by third parties. Can
  4. Phishing Scheme Leverages Azure Blob Storage and Hurricane Michael
  5. FreeRTOS flaws expose millions of IoT devices to cyber attacks
  6. Critical vulnerabilities on FreeRTOS expose many systems to attacks
  7. Natural Disaster Related Phishing Scam Abusing Microsoft Azure to Steal login Credentials & Credit Card Numbers
  8. India’s First Cryptocurrency ATM To Buy and Sell Cryptocurrencies

INFORMATION & TELECOMMUNICATION

  1. Saudi Future Investment Initiative website defaced by the hackers
  2. Blockchain Security and Privacy
  3. A week in security (October 15 – 21)
  4. Popular website plugin harboured a serious 0-day for years
  5. The latest variant of Satan ransomware is spreading in the wild

FOOD

Nil

WATER

Nil

ENERGY

  1. Safeguarding the Nation’s Critical Infrastructure
  2. New APT GreyEnergy Found to Target EU Critical Systems, Linked to BlackEnergy

GOVERNMENT & PUBLIC SERVICE

  1. Saudi Future Investment Initiative website defaced by the hackers
  2. How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
  3. CMS portal breach exposes 75,000 individuals' records
  4. Safeguarding the Nation’s Critical Infrastructure
  5. Criminals Hijacked Records of 75 000 Users from
  6. US Indicts Another Russian for Role in Info Warfare Campaign
  7. Anthem in Record $16m HIPAA Settlement

Daily brief for 2018-10-22

ASIA

  1. Saudi Future Investment Initiative website defaced by the hackers
  2. Hackers Deface Website of Saudi Investment Forum
  3. How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
  4. Rambus Vaultify Trade: Secure transaction and storage of crypto assets on blockchain
  5. A week in security (October 15 – 21)
  6. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  7. Enigmatic cyber espionage campaign revives source code from old foe APT1
  8. WebLogic Remote Code Execution Vulnerability(CVE-2018-3245) Threat Alert
  9. India’s First Cryptocurrency ATM To Buy and Sell Cryptocurrencies

WORLD

  1. How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
  2. US Tops Global Malware C2 Distribution
  3. A week in security (October 15 – 21)
  4. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  5. Safeguarding the Nation’s Critical Infrastructure
  6. New Ethics Guidance for Lawyers from the American Bar Association (ABA) Regarding Data Breach and Cyber-attack
  7. The boom of fileless malware attacks: How can we fight it?
  8. Criminals Hijacked Records of 75 000 Users from
  9. The Russian built #VPNFilter #botnet was taken down by the @FBI after over 500,000 routers were infected. However, VPNFilter is
  10. Enigmatic cyber espionage campaign revives source code from old foe APT1
  11. iCloud Hacker Wants $175,000 Ransom to Be Paid In Bitcoin (BTC)
  12. Repairnator bot finds software bugs, successfully submits patches
  13. 75,000 HealthCare.gov Users Exposed, Personal Information Stolen
  14. New APT GreyEnergy Found to Target EU Critical Systems, Linked to BlackEnergy
  15. US Indicts Another Russian for Role in Info Warfare Campaign
  16. Anthem in Record $16m HIPAA Settlement
  17. Are you aware of #Canada's data breach regulations? Get up to speed on the #blog:

ATTACKS

  1. CMS portal breach exposes 75,000 individuals' records
  2. New Ethics Guidance for Lawyers from the American Bar Association (ABA) Regarding Data Breach and Cyber-attack
  3. According to the report, researchers detected 33,568 email addresses of finance departments that had been exposed by third parties. Can
  4. #NetSpectre leaks data remotely via side-channel attacks. Learn from expert Michael Cobb of @thehairyITdog why data from #microprocessors is not
  5. Phishing Scheme Leverages Azure Blob Storage and Hurricane Michael
  6. Criminals Hijacked Records of 75 000 Users from
  7. Strict password policy could prevent credential reuse, paper suggests
  8. A #ZeroDay in #jQuery File Upload could affect thousands of projects because the jQuery #plugin vulnerability has existed for eight
  9. Enigmatic cyber espionage campaign revives source code from old foe APT1
  10. 75,000 HealthCare.gov Users Exposed, Personal Information Stolen
  11. US Indicts Another Russian for Role in Info Warfare Campaign
  12. What are DMARC records and can they improve email security?
  13. Anthem in Record $16m HIPAA Settlement
  14. The Hunt - Our new data breach detection video looks like a Mission Impossible trailer. However, the threats are for
  15. #NetSpectre exploits speculative execution to leak data remotely via side-channel attacks. Learn how this #SecurityVulnerability affects the #cloud from expert
  16. The most interesting Internet-connected vehicle hacks on record
  17. Web Hosting Software VestaCP Server Compromised With DDoS Malware
  18. Find out how #TLBleed abuses @Intel's HTT chip feature to leak data via TLB
  19. Natural Disaster Related Phishing Scam Abusing Microsoft Azure to Steal login Credentials & Credit Card Numbers
  20. Are you aware of #Canada's data breach regulations? Get up to speed on the #blog:

THREATS

  1. Cisco, F5 Networks Investigate libssh Vulnerability Impact
  2. How to detect hardware-based server bugs
  3. Flaw in Media Library Impacts VLC, Other Software
  4. Libssh CVE-2018-10933 Scanners & Exploits Released - Apply Updates Now
  5. How a Canadian permanent resident and Saudi Arabian dissident was targeted with powerful spyware on Canadian soil
  6. Blockchain Security and Privacy
  7. Recent Branch.io Patch Creates New XSS Flaw
  8. Rambus Vaultify Trade: Secure transaction and storage of crypto assets on blockchain
  9. US Tops Global Malware C2 Distribution
  10. Signal Upgrade Process Leaves Unencrypted Messages on Disk
  11. Gamma ransomware compromises data on 16,000 patients at California hernia institute
  12. Critical Bug Impacts Live555 Media Streaming Libraries
  13. A newly disclosed #libSSH vulnerability could allow an attacker #AdminAccess to a server with little effort. By @MT_Heller
  14. Zero-day jQuery plugin vulnerability exploited for 3 years
  15. .@alienvault researchers recently discovered #MassMiner, a #cryptocurrency mining #malware that has the ability to infect systems across the web. Discover
  16. CVE-2018-4013: LIVE555 streaming media RTSP Server Remote Code Execution Vulnerability
  17. The boom of fileless malware attacks: How can we fight it?
  18. Ransomware: A cheat sheet for professionals
  19. Popular website plugin harboured a serious 0-day for years
  20. A #ZeroDay in #jQuery File Upload could affect thousands of projects because the jQuery #plugin vulnerability has existed for eight
  21. It's OK, I'm verified - Libssh flaw allows attackers to bypass server authentication
  22. Octopus Malware
  23. iCloud Hacker Wants $175,000 Ransom to Be Paid In Bitcoin (BTC)
  24. Repairnator bot finds software bugs, successfully submits patches
  25. Drupal Patched Critical RCE Vulnerabilities In Drupal 7 and 8
  26. Trade.io loses $7.5Mil worth of cryptocurrency in mysterious cold wallet hack
  27. FreeRTOS flaws expose millions of IoT devices to cyber attacks
  28. The latest variant of Satan ransomware is spreading in the wild
  29. The .@iDefense Vulnerability Contributor Program (VCP) bug-bounty initiative continues to attract top contributors. Join them by submitting your 0-day for
  30. Maker of LuminosityLink RAT gets 30 months in the clink
  31. Introducing Infura: Connecting DApps With Ethereum Without Setting up Ethereum Nodes
  32. Critical vulnerabilities on FreeRTOS expose many systems to attacks
  33. WebLogic Remote Code Execution Vulnerability(CVE-2018-3245) Threat Alert
  34. MPlayer and VLC media player affected by critical flaw CVE-2018-4013
  35. Web Hosting Software VestaCP Server Compromised With DDoS Malware
  36. Adding the EICAR string to your name as part of the visitor self-registration process is a bit of a faux
  37. Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them:
  38. Remote Code Execution Flaws Found in FreeRTOS - Popular OS for Embedded Systems
  39. India’s First Cryptocurrency ATM To Buy and Sell Cryptocurrencies
  40. Why does Windows 10 have many bugs?

CRIME

  1. Blockchain Security and Privacy
  2. Rambus Vaultify Trade: Secure transaction and storage of crypto assets on blockchain
  3. A week in security (October 15 – 21)
  4. Oceansalt Attacks Infrastructure, Finance, Universities and Telecommunications
  5. The boom of fileless malware attacks: How can we fight it?
  6. Phishing Scheme Leverages Azure Blob Storage and Hurricane Michael
  7. iCloud Hacker Wants $175,000 Ransom to Be Paid In Bitcoin (BTC)
  8. 75,000 HealthCare.gov Users Exposed, Personal Information Stolen
  9. The latest variant of Satan ransomware is spreading in the wild
  10. US Indicts Another Russian for Role in Info Warfare Campaign
  11. Natural Disaster Related Phishing Scam Abusing Microsoft Azure to Steal login Credentials & Credit Card Numbers

POLITICS

  1. Saudi Future Investment Initiative website defaced by the hackers
  2. New Ethics Guidance for Lawyers from the American Bar Association (ABA) Regarding Data Breach and Cyber-attack
  3. Enigmatic cyber espionage campaign revives source code from old foe APT1
  4. Octopus Malware
  5. New APT GreyEnergy Found to Target EU Critical Systems, Linked to BlackEnergy
  6. US Indicts Another Russian for Role in Info Warfare Campaign