Nov 6, 2018

APT report for 2018-11-05

TRANSNATIONAL / UNKNOWN

  1. Magecart Infiltrates U.K. Online Retailer Kitronik POS
  2. Magecart Strikes Again, and Kitronik Is Latest Victim

CHINA

Nil

INDIA

Nil

NORTH KOREA

Nil

PAKISTAN

Nil

VIETNAM

Nil

IRAN

  1. Persian Stalker pillages Iranian users of Instagram and Telegram

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. OPNids Integrates Machine Learning Into Open-Source Suricata IDS

SERBIA

Nil

UKRAINE

  1. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem

Platform report for 2018-11-05

WINDOWS

  1. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  2. Shellbot Botnet Targets Linux, Android Devices
  3. Inception Attackers Target Europe with Year-old Office Vulnerability
  4. Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone

LINUX

  1. Shellbot Botnet Targets Linux, Android Devices
  2. Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone

UNIX

Nil

ANDROID

  1. Shellbot Botnet Targets Linux, Android Devices
  2. Blockhead makes blockchain easy for developers
  3. Persian Stalker pillages Iranian users of Instagram and Telegram
  4. Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone
  5. Video analysis of Android banking Trojan found on Google Play (Red Alert 2)
  6. Recently there have been a lot of packed Android malware around, so I decided to write a blog-post on how

IOS

  1. Persian Stalker pillages Iranian users of Instagram and Telegram
  2. Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS

MACOS

  1. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  2. Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS

Threat report for 2018-11-05

DATA BREACH & DATA LOSS

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  3. Your personal data is widely available to hackers
  4. This Tool Shows Exposed Cameras Around Your Neighborhood
  5. New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
  6. Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
  7. Australian shipbuilder Austal hit by data breach
  8. Equifax Set to Share More PII with Experian
  9. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  10. National biometric database could be on the way (and in private hands)
  11. Over 80,000 Facebook User Accounts Compromised
  12. "If an organization created #DMARC records for the first time, it would encounter syntax and content issues -- one of
  13. Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
  14. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
  15. "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"

DENIAL-OF-SERVICE

  1. What were the DDoS numbers for Q2 & Q3 2018?
  2. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3

MALVERTISING

Nil

PHISHING

  1. Almost 300 Percent Increase in eCommerce Phishing Attacks in Q3 2018
  2. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  3. How to use Firefox Master Password.
  4. Why you should be using a password manager
  5. How did @Google eliminate successful #PhishingAttacks? Learn how employees used U2F authentication and physical #SecurityKeys to defend against phishing from
  6. Password Constraints and Their Unintended Security Consequences
  7. Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
  8. How can U2F authentication end phishing attacks?
  9. Phishing attacks up by 297 percent across eCommerce in Q3 2018

WEB DEFACEMENT

Nil

BOTNET

  1. Shellbot Botnet Targets Linux, Android Devices
  2. Original Mirai botnet creator hit with hefty financial sentence

RANSOMWARE

  1. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  2. Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an

CRYPTOMINING & CRYPTOCURRENCIES

  1. No, blockchain isn't the answer to our voting system woes
  2. Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
  3. Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts
  4. Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
  5. Blockhead makes blockchain easy for developers
  6. The building blocks of blockchain-based digital identity

MALWARE

  1. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  2. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  3. Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm
  4. Why malware attacks should no longer be a problem for businesses
  5. Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone
  6. Scammers Ride on Popular Vote411 Voter Info Site to Push Scareware Alerts
  7. How to Get Rid of Cortana Runtime Broker CPU Miner Virus
  8. Fake malicious @RSAsecurity #SecurID malware in pre-release state on @GooglePlay: - Currently gathering information (profiling) the mobile device it is installed
  9. Video analysis of Android banking Trojan found on Google Play (Red Alert 2)
  10. Recently there have been a lot of packed Android malware around, so I decided to write a blog-post on how

EXPLOIT

  1. PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
  2. Security researchers exploit Intel hyperthreading flaw to break encryption

VULNERABILITY

  1. Apache warns Struts 2.3 is using a library with a two year old critical flaw
  2. Online Radio Stations at Risk from Icecast Flaw
  3. PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
  4. Flaws In Self-Encrypting SSDs Let Attackers Bypass Encryption
  5. New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
  6. Why Are Deserialization Vulnerabilities So Popular?
  7. Flaws in self-encrypting SSDs let attackers bypass disk encryption
  8. [SingCERT] Technical Advisory on Vulnerabilities in Bluetooth Low Energy Chips by Texas Instruments (CVE-2018-16986 and CVE-2018-7080)
  9. Inception Attackers Target Europe with Year-old Office Vulnerability
  10. Kemp Investigates Dems, Not the Reported Vulnerability
  11. Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
  12. Flaw in Icecast streaming media server allows to take off online Radio Stations
  13. Security researchers exploit Intel hyperthreading flaw to break encryption
  14. .@ArmisSecurity researchers discovered two chip-level #Bluetooth vulnerabilities -- dubbed #Bleedingbit -- that could allow pseudo #RemoteCodeExecution on wireless access points.
  15. Vulnerabilities’ CVSS scores soon to be assigned by AI
  16. Cisco Products Affected By A Zero-Day SIP Inspection Vulnerability Exploited In The Wild
  17. High severity XML external entity flaw affects Sauter building automation product
  18. Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
  19. Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
  20. Mozilla Patched Multiple Security Vulnerabilities in Thunderbird 60.3
  21. Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS
  22. Companies implementing DevSecOps address vulnerabilities faster than others
  23. The Ultimate Guide to Bug Bounty Platforms
  24. PortSmash – A New Side Channel Vulnerability in SMT/Hyper-Threading That Allows Attackers To Steal Sensitive Data
  25. Security Think Tank: Three ways to safeguard against application layer vulnerabilities
  26. Security Bug in Icecast Puts Online Radio Stations At Risk
  27. Researchers discover new zero-day vulnerability in EDGE browser

Region brief for 2018-11-05

ASIA

  1. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  2. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  3. Persian Stalker pillages Iranian users of Instagram and Telegram
  4. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3

OCEANIA

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Australian shipbuilder Austal hit by data breach
  3. Persian Stalker pillages Iranian users of Instagram and Telegram
  4. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
  5. "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"

NORTH AMERICA

  1. What were the DDoS numbers for Q2 & Q3 2018?
  2. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  3. Your personal data is widely available to hackers
  4. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  5. Magecart Strikes Again, and Kitronik Is Latest Victim
  6. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  7. Equifax Set to Share More PII with Experian
  8. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  9. Over 80,000 Facebook User Accounts Compromised
  10. Why malware attacks should no longer be a problem for businesses
  11. Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
  12. Persian Stalker pillages Iranian users of Instagram and Telegram
  13. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
  14. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
  15. "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"

SOUTH AMERICA

  1. Over 80,000 Facebook User Accounts Compromised

EUROPE

  1. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  2. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  3. Magecart Infiltrates U.K. Online Retailer Kitronik POS
  4. Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
  5. Magecart Strikes Again, and Kitronik Is Latest Victim
  6. Inception Attackers Target Europe with Year-old Office Vulnerability
  7. Kemp Investigates Dems, Not the Reported Vulnerability
  8. Over 80,000 Facebook User Accounts Compromised
  9. Persian Stalker pillages Iranian users of Instagram and Telegram
  10. Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
  11. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3

AFRICA

  1. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem

Sector brief for 2018-11-05

HEALTHCARE

Nil

TRANSPORT

Nil

BANKING & FINANCE

  1. Original Mirai botnet creator hit with hefty financial sentence
  2. Magecart Strikes Again, and Kitronik Is Latest Victim
  3. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  4. Over 80,000 Facebook User Accounts Compromised
  5. Why malware attacks should no longer be a problem for businesses
  6. Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
  7. Persian Stalker pillages Iranian users of Instagram and Telegram
  8. Phishing attacks up by 297 percent across eCommerce in Q3 2018
  9. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
  10. Video analysis of Android banking Trojan found on Google Play (Red Alert 2)

INFORMATION & TELECOMMUNICATION

  1. PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
  2. Original Mirai botnet creator hit with hefty financial sentence
  3. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  4. Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
  5. Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts
  6. Inception Attackers Target Europe with Year-old Office Vulnerability
  7. Flaw in Icecast streaming media server allows to take off online Radio Stations
  8. Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
  9. Over 80,000 Facebook User Accounts Compromised
  10. Persian Stalker pillages Iranian users of Instagram and Telegram
  11. Phishing attacks up by 297 percent across eCommerce in Q3 2018
  12. The Ultimate Guide to Bug Bounty Platforms
  13. Researchers discover new zero-day vulnerability in EDGE browser
  14. Fake malicious @RSAsecurity #SecurID malware in pre-release state on @GooglePlay: - Currently gathering information (profiling) the mobile device it is installed
  15. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me

FOOD

Nil

WATER

Nil

ENERGY

  1. [SingCERT] Technical Advisory on Vulnerabilities in Bluetooth Low Energy Chips by Texas Instruments (CVE-2018-16986 and CVE-2018-7080)
  2. Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points

GOVERNMENT & PUBLIC SERVICE

  1. No, blockchain isn't the answer to our voting system woes
  2. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  3. Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
  4. Inception Attackers Target Europe with Year-old Office Vulnerability
  5. Kemp Investigates Dems, Not the Reported Vulnerability
  6. Persian Stalker pillages Iranian users of Instagram and Telegram
  7. Phishing attacks up by 297 percent across eCommerce in Q3 2018
  8. Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
  9. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me

Daily brief for 2018-11-05

ASIA

  1. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  2. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  3. Persian Stalker pillages Iranian users of Instagram and Telegram
  4. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3

WORLD

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  3. What were the DDoS numbers for Q2 & Q3 2018?
  4. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  5. Your personal data is widely available to hackers
  6. Magecart Infiltrates U.K. Online Retailer Kitronik POS
  7. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  8. Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
  9. Magecart Strikes Again, and Kitronik Is Latest Victim
  10. Inception Attackers Target Europe with Year-old Office Vulnerability
  11. Kemp Investigates Dems, Not the Reported Vulnerability
  12. Australian shipbuilder Austal hit by data breach
  13. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  14. Equifax Set to Share More PII with Experian
  15. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  16. Over 80,000 Facebook User Accounts Compromised
  17. Why malware attacks should no longer be a problem for businesses
  18. Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
  19. Persian Stalker pillages Iranian users of Instagram and Telegram
  20. Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
  21. A cybersecurity lesson: educational sites suffer rise in DDoS attacks in Q3
  22. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
  23. "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"

ATTACKS

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Almost 300 Percent Increase in eCommerce Phishing Attacks in Q3 2018
  3. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  4. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  5. Your personal data is widely available to hackers
  6. This Tool Shows Exposed Cameras Around Your Neighborhood
  7. New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
  8. How to use Firefox Master Password.
  9. Why you should be using a password manager
  10. Akado Telecom Accidentally Leaks Customers' Names, Phone Numbers, And Addresses
  11. Australian shipbuilder Austal hit by data breach
  12. How did @Google eliminate successful #PhishingAttacks? Learn how employees used U2F authentication and physical #SecurityKeys to defend against phishing from
  13. Password Constraints and Their Unintended Security Consequences
  14. Equifax Set to Share More PII with Experian
  15. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  16. National biometric database could be on the way (and in private hands)
  17. Over 80,000 Facebook User Accounts Compromised
  18. Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
  19. How can U2F authentication end phishing attacks?
  20. Phishing attacks up by 297 percent across eCommerce in Q3 2018
  21. "If an organization created #DMARC records for the first time, it would encounter syntax and content issues -- one of
  22. Kemp Cites Voter Database Hacking Attempt, Gives No Evidence
  23. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me
  24. "Shipbuilder Austal Ltd said on Thursday its Australian business had detected and responded to a data breach"

THREATS

  1. Apache warns Struts 2.3 is using a library with a two year old critical flaw
  2. Inception Group Uses POWERSHOWER Backdoor in Two-Stage Spear Phishing Attacks
  3. Online Radio Stations at Risk from Icecast Flaw
  4. No, blockchain isn't the answer to our voting system woes
  5. PoC Available for Microsoft Edge Zero-Day RCE, Exploit Under Development
  6. Flaws In Self-Encrypting SSDs Let Attackers Bypass Encryption
  7. New Side-Channel Vulnerability Leaks Sensitive Data From Intel Chips
  8. Inside SearchPageInstaller | macOS Malware Deploys a MITM Attack
  9. Why Are Deserialization Vulnerabilities So Popular?
  10. Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
  11. Another wave of Elon Musk bitcoin scams spread by verified Twitter accounts
  12. Flaws in self-encrypting SSDs let attackers bypass disk encryption
  13. [SingCERT] Technical Advisory on Vulnerabilities in Bluetooth Low Energy Chips by Texas Instruments (CVE-2018-16986 and CVE-2018-7080)
  14. Inception Attackers Target Europe with Year-old Office Vulnerability
  15. Malware of the 1980s: Looking back at the Brain Virus and the Morris Worm
  16. Kemp Investigates Dems, Not the Reported Vulnerability
  17. Flaws in Popular SSD Drives Bypass Hardware Disk Encryption
  18. Flaw in Icecast streaming media server allows to take off online Radio Stations
  19. Security researchers exploit Intel hyperthreading flaw to break encryption
  20. .@ArmisSecurity researchers discovered two chip-level #Bluetooth vulnerabilities -- dubbed #Bleedingbit -- that could allow pseudo #RemoteCodeExecution on wireless access points.
  21. Vulnerabilities’ CVSS scores soon to be assigned by AI
  22. Cisco Products Affected By A Zero-Day SIP Inspection Vulnerability Exploited In The Wild
  23. #SamSam #ransomware continues to be a thorn in the side of organizations in the U.S. with targeted ransomware campaigns continuing,
  24. Researchers found #Kraken #ransomware has become more popular after being packaged in the Fallout #ExploitKit and becoming part of an
  25. High severity XML external entity flaw affects Sauter building automation product
  26. Security firm Armis has discovered two vulnerabilities in Bluetooth Chips from several networking industry leaders.
  27. Blockhead makes blockchain easy for developers
  28. Why malware attacks should no longer be a problem for businesses
  29. Critical 'Bleedingbit' flaws found in microcontrollers used by Wi-Fi access points
  30. Mozilla Patched Multiple Security Vulnerabilities in Thunderbird 60.3
  31. Android Rat – TheFatRat to Hack and Gain access to Targeted Android Phone
  32. Apple Patched Multiple XNU Kernel Vulnerabilities In MacOS And iOS
  33. Scammers Ride on Popular Vote411 Voter Info Site to Push Scareware Alerts
  34. The building blocks of blockchain-based digital identity
  35. Companies implementing DevSecOps address vulnerabilities faster than others
  36. How to Get Rid of Cortana Runtime Broker CPU Miner Virus
  37. The Ultimate Guide to Bug Bounty Platforms
  38. PortSmash – A New Side Channel Vulnerability in SMT/Hyper-Threading That Allows Attackers To Steal Sensitive Data
  39. Security Think Tank: Three ways to safeguard against application layer vulnerabilities
  40. Security Bug in Icecast Puts Online Radio Stations At Risk
  41. Researchers discover new zero-day vulnerability in EDGE browser
  42. Fake malicious @RSAsecurity #SecurID malware in pre-release state on @GooglePlay: - Currently gathering information (profiling) the mobile device it is installed
  43. Video analysis of Android banking Trojan found on Google Play (Red Alert 2)
  44. Recently there have been a lot of packed Android malware around, so I decided to write a blog-post on how

CRIME

  1. Week in review: Volume of Australian data breaches continues unabated
  2. Original Mirai botnet creator hit with hefty financial sentence
  3. Fake Elon Musk Twitter Bitcoin Scam Earned 180K in One Day
  4. Australian shipbuilder Austal hit by data breach
  5. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  6. Equifax Set to Share More PII with Experian
  7. Over 80,000 Facebook User Accounts Compromised
  8. Cybercriminals Using SMS Phishing Attack to Rob Cardless ATM
  9. Persian Stalker pillages Iranian users of Instagram and Telegram
  10. Phishing attacks up by 297 percent across eCommerce in Q3 2018
  11. The Ultimate Guide to Bug Bounty Platforms

POLITICS

  1. Google dorks were the root cause of a catastrophic compromise of CIA’s communications
  2. Kemp Investigates Dems, Not the Reported Vulnerability
  3. Cyber-Attacks: How to Stop a Multibillion-Dollar Problem
  4. "A lot of people in Congress are concerned that the Facebook influence campaigns are about the midterms, but to me