Oct 11, 2018

Daily brief for 2018-10-10

ASIA

  1. KeyBoy Abuses Popular Office Exploits for Malware Delivery
  2. The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion
  3. Thieves and Geeks: Russian and Chinese Hacking Communities
  4. WTB: Phishing Attack Uses Azure Blob Storage To Impersonate Microsoft
  5. MuddyWater expands operations
  6. Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks
  7. Leak reveals Google's Chinese search engine is months away from launch

WORLD

  1. Rapidly Evolving Ransomware GandCrab Version 5 Partners With Crypter Service for Obfuscation
  2. Campaign 2018: These hacking groups could target the 2018 midterm elections
  3. Top 5 ThreatConnect Resources for Malware Analysis
  4. Cyber Fraud Ring Used Phishing to Steal $4 Million, Alleged Leader Faces Charges
  5. A Google security audit uncovered a glitch in Google+ that exposed data from nearly 500,000 accounts. Ping CTO West @baber
  6. The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion
  7. Thieves and Geeks: Russian and Chinese Hacking Communities
  8. CVE-2018-8453 Zero-Day flaw exploited by FruityArmor APT in attacks aimed at Middle East
  9. New Threat Insight research: German-language threats span #phishing, BEC, #malware, and more...
  10. Rebound Orthopedics & Neurosurgery hacked; 2,800 records exposed
  11. A @Google #SecurityAudit uncovered privacy flaws and potential exposure of #PersonalData, leading to API changes, the shutdown of #GooglePlus and
  12. Security Vulnerabilities in US Weapons Systems
  13. Don't make us pay compensation for employee data breach, Morrisons begs UK court
  14. WTB: Phishing Attack Uses Azure Blob Storage To Impersonate Microsoft
  15. MuddyWater expands operations
  16. Ubisoft Hit With DDoS Attack During The Launch of Assassin’s Creed: Odyssey
  17. Magecart Hits Popular Customer Review Plugin
  18. A #Google security audit uncovered a glitch in #GooglePlus that exposed data from nearly 500,000 accounts, causing the company to
  19. Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks
  20. '5,000 UK firms' financial details exposed in data breaches' http://www.cityam.com/264491/uk-business-emails-could-represent-major-cyber-security … @CityAM Read the full research report here:
  21. Zero-day exploit (CVE-2018-8453) used in targeted attacks
  22. My Health Record justifications 'kind of lame': Godwin
  23. Shopper Approved, the new victim of the Magecart hacking group
  24. Acorus Network protects enterprises and service providers from DDoS attacks

ATTACKS

  1. Campaign 2018: These hacking groups could target the 2018 midterm elections
  2. 4.5 Billion Records Stolen in Data Breaches in the First Six Months of 2018
  3. “You have 48 hours after reading this letter”– How to Identify the Latest Phishing Scam
  4. Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers
  5. Google Restricts Android Apps From Accessing Your Personal Data
  6. Triangulating Beyond the Hack: Stolen Records Just One Tool in a Comprehensive Kit
  7. Cyber Fraud Ring Used Phishing to Steal $4 Million, Alleged Leader Faces Charges
  8. #NetSpectre exploits leak data remotely via side-channel attacks. Learn how to use #ThreatModeling to stop speculative execution from expert Ed
  9. A Google security audit uncovered a glitch in Google+ that exposed data from nearly 500,000 accounts. Ping CTO West @baber
  10. Innovative Phishing Tactic Makes Inroads Using Azure Blob
  11. Razer Phone 2 leaks hours before announcement: wireless charging and IP67 water resistance
  12. Goodbye Google Plus – Google Plans Google+ Shut Down After Data Breach
  13. The #TLBleed vulnerability uses @Intel's HTT chip feature to leak data. Learn about how hackers could use #malware to launch
  14. New state-backed espionage campaign targets military and government using freely available hacking tools
  15. Follow @PhishingAi to stay up to date on #phishing attacks and trends!
  16. Flaw in Ghostscript sandbox allowed system compromise
  17. Emerging threat: password stuffing explained
  18. New Threat Insight research: German-language threats span #phishing, BEC, #malware, and more...
  19. Leaks suggest Samsung is working on a mid-range smartphone with four cameras
  20. Rebound Orthopedics & Neurosurgery hacked; 2,800 records exposed
  21. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials are openly
  22. The spearphishing email contained a zip folder with a custom-built remote access trojan (RAT). Once executed, it would connect back to
  23. Hackers can compromise your WhatsApp account by tricking you into answering a video call
  24. Google+ API glitch exposed user profile data to developers
  25. 291 records breached per second in first half of 2018
  26. Hackers can use legitimate #AdminTools to compromise networks. Learn more about "living off the land" attacks from expert Michael Cobb
  27. Don't make us pay compensation for employee data breach, Morrisons begs UK court
  28. WTB: Phishing Attack Uses Azure Blob Storage To Impersonate Microsoft
  29. A $12 million case of business email compromise.
  30. Microsoft WindowsCodecs.dll SniffAndConvertToWideString Information Leak Vulnerability
  31. A #Google security audit uncovered a glitch in #GooglePlus that exposed data from nearly 500,000 accounts, causing the company to
  32. California state primaries put spotlight on election campaign vulnerabilities #cybersecurity @5ean5ullivan
  33. '5,000 UK firms' financial details exposed in data breaches' http://www.cityam.com/264491/uk-business-emails-could-represent-major-cyber-security … @CityAM Read the full research report here:
  34. New Phishing Campaign Drops Ursnif into Conversation Threads
  35. October Patch Tuesday: Microsoft Repairs JET Database Engine Bug, Win32K EoP Zero-Day
  36. October Patch Tuesday: Microsoft Repairs JET Database Engine Bug, Win32K EoP Zero-Day
  37. Leak reveals Google's Chinese search engine is months away from launch
  38. PHASE 2 - INITIAL INTRUSION Number One decides it is time to launch a targeted spearphishing campaign. Through the newsletter, he learns
  39. My Health Record justifications 'kind of lame': Godwin
  40. Just Answering A Video Call Could Compromise Your WhatsApp Account
  41. Acorus Network protects enterprises and service providers from DDoS attacks
  42. Zero trust security: 5 reasons it’s not just about passwords
  43. .@Google Firebase #DatabaseSecurity proved insufficient when bypassed by hackers to leak data. Learn more about this #SecurityFlaw from expert Michael

THREATS

  1. Rapidly Evolving Ransomware GandCrab Version 5 Partners With Crypter Service for Obfuscation
  2. Decrypting GandCrab Ransomware
  3. CCSP Domain 4: Cloud Application Security
  4. CCSP Domain 3: Cloud Platform and Infrastructure Security
  5. FruityArmor APT Exploits Yet Another Windows Graphics Kernel Flaw
  6. CCSP Domain 2: Cloud Data Security
  7. CCSP Domain 1: Architectural Concepts & Design Requirements
  8. The CAP Exam: Application Process, Rules and Eligibility, Exam Length and More
  9. #ISC2Congress: The Promise of Blockchain
  10. Top 5 ThreatConnect Resources for Malware Analysis
  11. Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers
  12. WhatsApp Fixes Vulnerability That’s Triggered by Answering a Call.
  13. Cryptomining replaces ransomware as 2018's top cybersecurity threat
  14. WhatsApp fixes video call bug that could have let hackers in, says report
  15. KeyBoy Abuses Popular Office Exploits for Malware Delivery
  16. Microsoft Added Severity Levels to Feedback Hub Bug Reports for Windows 10
  17. Vulnerabilities found in Intel Unified Shader compiler
  18. Malware 101: How Malware Avoids Static Detection Techniques
  19. The #TLBleed vulnerability uses @Intel's HTT chip feature to leak data. Learn about how hackers could use #malware to launch
  20. CSEU 2018: Nato grappling with implications of cyberspace as domain of warfare
  21. Flaw in Ghostscript sandbox allowed system compromise
  22. Four Critical Flaws Patched in Adobe Digital Edition
  23. CVE-2018-8453 Zero-Day flaw exploited by FruityArmor APT in attacks aimed at Middle East
  24. SAP Patches Critical Vulnerability in BusinessObjects
  25. Symantec reveals state-sponsored group that doesn’t care for malware
  26. New Threat Insight research: German-language threats span #phishing, BEC, #malware, and more...
  27. Stegware: How is #malware using #steganography techniques to avoid detection?
  28. A @Google #SecurityAudit uncovered privacy flaws and potential exposure of #PersonalData, leading to API changes, the shutdown of #GooglePlus and
  29. The spearphishing email contained a zip folder with a custom-built remote access trojan (RAT). Once executed, it would connect back to
  30. #Shodan can be a helpful tool for security professionals to locate #ICSsecurity vulnerabilities. Expert Ernie Hayden explains how Shodan works
  31. Security Vulnerabilities in US Weapons Systems
  32. Microsoft Patch Tuesday update covers zero-day, 12 critical issues
  33. Many Siemens Products Affected by Foreshadow Vulnerabilities
  34. A remote access #Trojan -- dubbed #GravityRAT -- was discovered by Cisco Talos (@TalosSecurity) to be checking for #antimalware sandboxes.
  35. Microsoft has fixed the Windows 10 October Update data deletion bug
  36. Gallmaker: New Attack Group Eschews Malware to Live off the Land
  37. It's October 2018, and Exchange can be pwned by an 8 year-old... bug
  38. Adobe security update fixes a handful of critical bugs, ignores Flash Player
  39. .@FBI, @DHSgov call on users to mitigate #RemoteDesktop Protocol vulnerabilities and handle RDP exploits on their own, even as the
  40. October 2018 Patch Tuesday: Microsoft fixes 49 flaws, one APT-wielded zero-day
  41. Microsoft WindowsCodecs.dll SniffAndConvertToWideString Information Leak Vulnerability
  42. Adobe October Security Update fixes 20 security flaws
  43. Apple Released Security Updates for iOS 12.0.1 & iCloud with the Fixes for 21 Vulnerabilities
  44. Google+ to shut down due to lack of adoption and privacy bug
  45. Microsoft Fixes Zero Day and Data Deletion Bugs
  46. Why Apple must be looking into using blockchain
  47. California state primaries put spotlight on election campaign vulnerabilities #cybersecurity @5ean5ullivan
  48. Zero-day exploit (CVE-2018-8453) used in targeted attacks
  49. Windows Zero-Day Exploited in Attacks Aimed at Middle East
  50. Bug bounties not a silver bullet, Katie Moussouris warns
  51. Microsoft Released Security Updates & Fixed 49 Vulnerabilities that Affected Microsoft Products
  52. October Patch Tuesday: Microsoft Repairs JET Database Engine Bug, Win32K EoP Zero-Day
  53. October Patch Tuesday: Microsoft Repairs JET Database Engine Bug, Win32K EoP Zero-Day
  54. Port of San Diego Hit by a Ransomware Attack Affecting its Computer Systems
  55. Old-School Malware Tricks Still Work
  56. "Creation of complex malware and organisation of multi-layered targeted attacks has shifted from financially motivated cyber-criminals to state-sponsored threat actors"
  57. Hacker steals over $30k USD in cryptocurrency of SpankChain
  58. WhatsApp fixes bug that let hackers take over app when answering a video call
  59. At the 2018 @RSAConference, researchers discussed the rise of stegware -- #malware that uses #steganography techniques to avoid detection. Learn

CRIME

  1. Rapidly Evolving Ransomware GandCrab Version 5 Partners With Crypter Service for Obfuscation
  2. #ISC2Congress: The Promise of Blockchain
  3. 4.5 Billion Records Stolen in Data Breaches in the First Six Months of 2018
  4. “You have 48 hours after reading this letter”– How to Identify the Latest Phishing Scam
  5. Threat Actors Prey on Drupalgeddon Vulnerability to Mass-Compromise Websites and Underlying Servers
  6. Triangulating Beyond the Hack: Stolen Records Just One Tool in a Comprehensive Kit
  7. The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion
  8. Thieves and Geeks: Russian and Chinese Hacking Communities
  9. New Threat Insight research: German-language threats span #phishing, BEC, #malware, and more...
  10. Business email compromise made easy for #cybercriminals as 12.5 million company email boxes and 33,000 finance department credentials are openly
  11. Payment-card-skimming Magecart strikes again: Zero out of five for infecting e-retail sites
  12. Don't make us pay compensation for employee data breach, Morrisons begs UK court
  13. WTB: Phishing Attack Uses Azure Blob Storage To Impersonate Microsoft
  14. A $12 million case of business email compromise.
  15. Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks
  16. Old-School Malware Tricks Still Work
  17. "Creation of complex malware and organisation of multi-layered targeted attacks has shifted from financially motivated cyber-criminals to state-sponsored threat actors"
  18. Hacker steals over $30k USD in cryptocurrency of SpankChain
  19. Shopper Approved, the new victim of the Magecart hacking group
  20. Acorus Network protects enterprises and service providers from DDoS attacks

POLITICS

  1. Campaign 2018: These hacking groups could target the 2018 midterm elections
  2. MuddyWater Threat Actor Expands Targets List
  3. New state-backed espionage campaign targets military and government using freely available hacking tools
  4. CSEU 2018: Nato grappling with implications of cyberspace as domain of warfare
  5. The Many Faces of Necurs: How the Botnet Spewed Millions of Spam Emails for Cyber Extortion
  6. Thieves and Geeks: Russian and Chinese Hacking Communities
  7. CVE-2018-8453 Zero-Day flaw exploited by FruityArmor APT in attacks aimed at Middle East
  8. Symantec reveals state-sponsored group that doesn’t care for malware
  9. Hackers can compromise your WhatsApp account by tricking you into answering a video call
  10. Gallmaker: New Attack Group Eschews Malware to Live off the Land
  11. WTB: Phishing Attack Uses Azure Blob Storage To Impersonate Microsoft
  12. MuddyWater expands operations
  13. Group-IB: $49.4 million of damage caused to Russia’s financial sector from cyber attacks
  14. California state primaries put spotlight on election campaign vulnerabilities #cybersecurity @5ean5ullivan

Oct 10, 2018

APT report for 2018-10-09

TRANSNATIONAL / UNKNOWN

  1. Magecart Group Targets Shopper Approved in Latest Attack
  2. The Magecart Seal of Approval: Card-Skimming Group Executes Scaled Supply Chain Attack on Shopper Approved
  3. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  4. New Magecart hack detected at Shopper Approved
  5. Formjacking attacks are on the rise, with the recent #Magecart attacks the most notable examples. @Symantec has blocked almost 250,000
  6. Magecart Group Compromises Plugin Used in Thousands of Stores, Makes Rookie Mistake

CHINA

  1. DHS issued an alert on attacks aimed at Managed Service Providers

INDIA

Nil

NORTH KOREA

  1. Remote robbery, an ‘IT incident’ (not a breach?), and face-off on privacy
  2. Comienza en MoscĂș #CyberCrimeCon —el gran encuentro mundial sobre cibercrimen y ciberterrorismo— y de lo primero que hablan es de

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. APT28 group return to covert intelligence gathering ops in Europe and South America.

SERBIA

Nil

UKRAINE

Nil

Platform report for 2018-10-09

WINDOWS

  1. Microsoft patches 0-day Windows flaw under attack
  2. Microsoft Patches Windows Zero-Day Exploited by 'FruityArmor' Group
  3. Microsoft October 2018 Patch Tuesday Fixes 12 Critical Vulnerabilities
  4. Apple fixes iOS 12 passcode bypass vulnerabilities
  5. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  6. Microsoft October Patch Tuesday Fixes 12 Critical Vulnerabilities
  7. Microsoft Patch Tuesday — October 18: Vulnerability disclosures and Snort coverage
  8. Phishing attacks use Azure Blob storage to simulate Microsoft
  9. TOP 10 PHP Vulnerability Scanners

LINUX

  1. Microsoft Patch Tuesday — October 18: Vulnerability disclosures and Snort coverage
  2. New IoT botnet “hide and seek” variants target Android devices

UNIX

Nil

ANDROID

  1. The end of Google+: Low usage and an API bug that exposed user data
  2. New IoT botnet “hide and seek” variants target Android devices

IOS

  1. Apple fixes iOS 12 passcode bypass vulnerabilities

MACOS

Nil

Threat report for 2018-10-09

DATA BREACH

  1. URSNIF Phishing Campaign Spreads Malware by Replying to Existing E-mail Threads
  2. Heathrow Fined For USB Stick Data Breach
  3. Google+ Users, Upset Over Data Leak, Sue Google
  4. Google+ will shut down after leaking info of 500k accounts
  5. Amazon acknowledges that the company’s employees leaked user information to the seller
  6. Upgrade Your Threat Intelligence Program Part 5: Take Down Fraud Campaigns & Cyber Scams
  7. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  8. Google: We're giving you more control over what personal data apps can use
  9. Garmin's Navionics exposed data belonging to thousands of customers
  10. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  11. Google+ shut down after bug exposed user data
  12. Over 4.5 Billion Records Breached in H1 2018, Finds Report
  13. Google+ Shuts Down Following Undisclosed Data Breach
  14. The end of Google+: Low usage and an API bug that exposed user data
  15. 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy. Read the full blog here:
  16. Magecart Group Compromises Plugin Used in Thousands of Stores, Makes Rookie Mistake
  17. Heathrow Airport fined £120,000 over USB data breach debacle
  18. "Application control bypass techniques are a big thing that is happening right now - - 80% to 85% of compromises
  19. For @5ean5ullivan, a security adviser at cyber firm F-Secure, a campaign’s cyber protections boil down to education — making sure
  20. Google has made the decision to shut down much of its #GooglePlus social network following the disclosure of vulnerable data.
  21. ​Gemalto reports 4.6 billion record breaches in the first half of 2018
  22. Hackers Targeting Instagram Accounts of Influential Profiles for Ransom in a Recent Campaign
  23. Sunsets for Google Plus after Reports of Data Breach
  24. Google Announced Google+ Shut down, Following Security Breach That Exposed 500,000 Users Accounts
  25. Oh no, looks like we can't trust our data with Google either "Google hid major Google+ security flaw that exposed
  26. Cryptojacking campaign targets add-ons for popular streaming app Kodi

DENIAL-OF-SERVICE

  1. New Cloud VPS Provider with Built-In DDoS Protection and Anti-Virus | SkySilk Cloud Services
  2. Over nine million cameras and DVRs open to APTs, botnet herders, and voyeurs
  3. New IoT botnet “hide and seek” variants target Android devices
  4. Hacked #Fortnite accounts and rent-a-botnet being pushed on

MALVERTISING

Nil

PHISHING

  1. How to Evade Expensive Phishing Filters with One Simple Trick
  2. URSNIF Phishing Campaign Spreads Malware by Replying to Existing E-mail Threads
  3. With a few keystrokes, Number One used the admin/admin login to siphon all the email addresses, names and titles of
  4. As a way to inch forward in the battle of default passwords, California has passed a law that will make
  5. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  6. Phishing attacks use Azure Blob storage to simulate Microsoft
  7. Weak IOT passwords outlawed in California
  8. California’s ban on weak default passwords isn’t going to fix IoT security
  9. Police Warned that Phishing Text Messages are Used to Target the Bank Customers
  10. one more reason to not use Facebook login everywhere, no matter how convenient it is.
  11. Using web phishing, criminals have managed to steal $3.7 million (251 million rubles), which is 6% more than in the

WEB DEFACEMENT

Nil

MALWARE

  1. Cryptomining dethrones ransomware as 2018’s top threat - Webroot
  2. Slideshow: Intel from Virus Bulletin 2018
  3. Block puzzle games laced with malware | Avast
  4. How does #FacexWorm #malware use @Facebook Messenger to spread? Learn more about this new malware with expert @lewisnic.
  5. URSNIF Phishing Campaign Spreads Malware by Replying to Existing E-mail Threads
  6. The @USAgov is rolling out #2FA authentication for officers managing .gov domains, but experts say #GoogleAuthenticator might not be the
  7. Panda Banker Trojan becomes part of Emotet threat distribution platform
  8. New Cloud VPS Provider with Built-In DDoS Protection and Anti-Virus | SkySilk Cloud Services
  9. How does #MassMiner #malware infect systems across the web?
  10. Hackers breach customer rating tool used on over 7,000 websites
  11. The government domain registrar -- DotGov -- began rolling out two-factor #authentication for officials managing .gov domains in order to
  12. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  13. Proofpoint: One month out from deadline, half of agency domains are #DMARC compliant http://ow.ly/3SRI50iYi41 via CyberScoopNews
  14. New Domains: A Wide-Open Playing Field for Cybercrime
  15. #Ransomware Survival Guide: 10 things to know before, during, and after an attack:

EXPLOIT

  1. Microsoft Patches Windows Zero-Day Exploited by 'FruityArmor' Group
  2. Microsoft October 2018 Patch Tuesday fixes zero-day exploited by FruityArmor APT
  3. Sophos recently discovered a #Samsam extortion code that performs whole-company attacks through a variety of vulnerability exploits. Discover how this
  4. Active Workload Protection on Amazon EKS and AWS Fargate

VULNERABILITY

  1. Microsoft patches 0-day Windows flaw under attack
  2. Microsoft Patches Zero-Day Under Active Attack by APT
  3. VMware Workstation, Fusion, and ESXi Affected by DoS Vulnerability, No Patch Yet
  4. Microsoft Patches Windows Zero-Day Exploited by 'FruityArmor' Group
  5. Microsoft October 2018 Patch Tuesday fixes zero-day exploited by FruityArmor APT
  6. Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
  7. Microsoft Patch Tuesday — October 18: Vulnerability disclosures and Snort coverage
  8. Vulnerability in the Intel Unified Shader compiler for the Intel Graphics Accelerator
  9. Git Gets Patched for Newly Found Flaw
  10. Microsoft October 2018 Patch Tuesday Fixes 12 Critical Vulnerabilities
  11. Sony Bravia Smart TVs affected by a critical vulnerability
  12. Apple fixes iOS 12 passcode bypass vulnerabilities
  13. Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
  14. Microsoft October Patch Tuesday Fixes 12 Critical Vulnerabilities
  15. Microsoft Patch Tuesday — October 18: Vulnerability disclosures and Snort coverage
  16. Sophos recently discovered a #Samsam extortion code that performs whole-company attacks through a variety of vulnerability exploits. Discover how this
  17. Google+ shut down after bug exposed user data
  18. Vulnerability in the Intel Unified Shader compiler for the Intel Graphics Accelerator
  19. Adobe Releases Security Patch Updates for 11 Vulnerabilities
  20. The end of Google+: Low usage and an API bug that exposed user data
  21. TOP 10 PHP Vulnerability Scanners
  22. RIP Google Plus: Shutdown announced after API bug exposes 500,000 users' details
  23. On our new #CyberSauna podcast: Find out how F-Secure's @nxsolle and Pasi Saarinen discovered a flaw that allows attackers to get
  24. Critical vulnerability in Sony Bravia Smart TV
  25. Oh no, looks like we can't trust our data with Google either "Google hid major Google+ security flaw that exposed

Region brief for 2018-10-09

ASIA

  1. Panda Banker Trojan becomes part of Emotet threat distribution platform
  2. DHS issued an alert on attacks aimed at Managed Service Providers
  3. Police Warned that Phishing Text Messages are Used to Target the Bank Customers

OCEANIA

  1. How to Evade Expensive Phishing Filters with One Simple Trick
  2. ​Gemalto reports 4.6 billion record breaches in the first half of 2018

NORTH AMERICA

  1. Panda Banker Trojan becomes part of Emotet threat distribution platform
  2. APT28 group return to covert intelligence gathering ops in Europe and South America.
  3. Sony Bravia Smart TVs affected by a critical vulnerability
  4. DHS issued an alert on attacks aimed at Managed Service Providers
  5. The Magecart Seal of Approval: Card-Skimming Group Executes Scaled Supply Chain Attack on Shopper Approved
  6. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  7. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  8. Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
  9. Phishing attacks use Azure Blob storage to simulate Microsoft
  10. Weak IOT passwords outlawed in California
  11. ​Gemalto reports 4.6 billion record breaches in the first half of 2018
  12. Sunsets for Google Plus after Reports of Data Breach
  13. Critical vulnerability in Sony Bravia Smart TV

SOUTH AMERICA

Nil

EUROPE

  1. DHS issued an alert on attacks aimed at Managed Service Providers
  2. The Magecart Seal of Approval: Card-Skimming Group Executes Scaled Supply Chain Attack on Shopper Approved
  3. Hackers breach customer rating tool used on over 7,000 websites
  4. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  5. New Magecart hack detected at Shopper Approved
  6. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads

AFRICA

Nil

Sector brief for 2018-10-09

HEALTHCARE

  1. DHS issued an alert on attacks aimed at Managed Service Providers
  2. Sunsets for Google Plus after Reports of Data Breach

TRANSPORT

  1. Heathrow Airport fined £120,000 over USB data breach debacle

BANKING & FINANCE

  1. Panda Banker Trojan becomes part of Emotet threat distribution platform
  2. Amazon acknowledges that the company’s employees leaked user information to the seller
  3. The Magecart Seal of Approval: Card-Skimming Group Executes Scaled Supply Chain Attack on Shopper Approved
  4. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  5. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  6. New Domains: A Wide-Open Playing Field for Cybercrime
  7. Magecart Group Compromises Plugin Used in Thousands of Stores, Makes Rookie Mistake
  8. Active Workload Protection on Amazon EKS and AWS Fargate
  9. Police Warned that Phishing Text Messages are Used to Target the Bank Customers
  10. Sunsets for Google Plus after Reports of Data Breach

INFORMATION & TELECOMMUNICATION

  1. How does #FacexWorm #malware use @Facebook Messenger to spread? Learn more about this new malware with expert @lewisnic.
  2. The Magecart Seal of Approval: Card-Skimming Group Executes Scaled Supply Chain Attack on Shopper Approved
  3. As a way to inch forward in the battle of default passwords, California has passed a law that will make
  4. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  5. Formjacking attacks are on the rise, with the recent #Magecart attacks the most notable examples. @Symantec has blocked almost 250,000
  6. Google+ Shuts Down Following Undisclosed Data Breach
  7. Phishing attacks use Azure Blob storage to simulate Microsoft
  8. The end of Google+: Low usage and an API bug that exposed user data
  9. 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy. Read the full blog here:
  10. For @5ean5ullivan, a security adviser at cyber firm F-Secure, a campaign’s cyber protections boil down to education — making sure
  11. Google has made the decision to shut down much of its #GooglePlus social network following the disclosure of vulnerable data.
  12. On our new #CyberSauna podcast: Find out how F-Secure's @nxsolle and Pasi Saarinen discovered a flaw that allows attackers to get
  13. Hacked #Fortnite accounts and rent-a-botnet being pushed on
  14. Hackers Targeting Instagram Accounts of Influential Profiles for Ransom in a Recent Campaign
  15. one more reason to not use Facebook login everywhere, no matter how convenient it is.
  16. Sunsets for Google Plus after Reports of Data Breach
  17. Using web phishing, criminals have managed to steal $3.7 million (251 million rubles), which is 6% more than in the
  18. Comienza en MoscĂș #CyberCrimeCon —el gran encuentro mundial sobre cibercrimen y ciberterrorismo— y de lo primero que hablan es de
  19. Oh no, looks like we can't trust our data with Google either "Google hid major Google+ security flaw that exposed
  20. #Ransomware Survival Guide: 10 things to know before, during, and after an attack:

FOOD

Nil

WATER

Nil

ENERGY

  1. DHS issued an alert on attacks aimed at Managed Service Providers
  2. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads

GOVERNMENT & PUBLIC SERVICE

  1. APT28 group return to covert intelligence gathering ops in Europe and South America.

Daily brief for 2018-10-09

ASIA

  1. Panda Banker Trojan becomes part of Emotet threat distribution platform
  2. DHS issued an alert on attacks aimed at Managed Service Providers
  3. Police Warned that Phishing Text Messages are Used to Target the Bank Customers

WORLD

  1. How to Evade Expensive Phishing Filters with One Simple Trick
  2. Panda Banker Trojan becomes part of Emotet threat distribution platform
  3. APT28 group return to covert intelligence gathering ops in Europe and South America.
  4. Sony Bravia Smart TVs affected by a critical vulnerability
  5. DHS issued an alert on attacks aimed at Managed Service Providers
  6. The Magecart Seal of Approval: Card-Skimming Group Executes Scaled Supply Chain Attack on Shopper Approved
  7. Hackers breach customer rating tool used on over 7,000 websites
  8. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  9. New Magecart hack detected at Shopper Approved
  10. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  11. Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
  12. Phishing attacks use Azure Blob storage to simulate Microsoft
  13. Weak IOT passwords outlawed in California
  14. ​Gemalto reports 4.6 billion record breaches in the first half of 2018
  15. Sunsets for Google Plus after Reports of Data Breach
  16. Critical vulnerability in Sony Bravia Smart TV

ATTACKS

  1. How to Evade Expensive Phishing Filters with One Simple Trick
  2. URSNIF Phishing Campaign Spreads Malware by Replying to Existing E-mail Threads
  3. Heathrow Fined For USB Stick Data Breach
  4. Google+ Users, Upset Over Data Leak, Sue Google
  5. New Cloud VPS Provider with Built-In DDoS Protection and Anti-Virus | SkySilk Cloud Services
  6. Over nine million cameras and DVRs open to APTs, botnet herders, and voyeurs
  7. Google+ will shut down after leaking info of 500k accounts
  8. Amazon acknowledges that the company’s employees leaked user information to the seller
  9. Upgrade Your Threat Intelligence Program Part 5: Take Down Fraud Campaigns & Cyber Scams
  10. With a few keystrokes, Number One used the admin/admin login to siphon all the email addresses, names and titles of
  11. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  12. Google: We're giving you more control over what personal data apps can use
  13. As a way to inch forward in the battle of default passwords, California has passed a law that will make
  14. Garmin's Navionics exposed data belonging to thousands of customers
  15. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  16. Google+ shut down after bug exposed user data
  17. Over 4.5 Billion Records Breached in H1 2018, Finds Report
  18. Google+ Shuts Down Following Undisclosed Data Breach
  19. Phishing attacks use Azure Blob storage to simulate Microsoft
  20. The end of Google+: Low usage and an API bug that exposed user data
  21. 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy. Read the full blog here:
  22. Weak IOT passwords outlawed in California
  23. California’s ban on weak default passwords isn’t going to fix IoT security
  24. Magecart Group Compromises Plugin Used in Thousands of Stores, Makes Rookie Mistake
  25. Heathrow Airport fined £120,000 over USB data breach debacle
  26. "Application control bypass techniques are a big thing that is happening right now - - 80% to 85% of compromises
  27. New IoT botnet “hide and seek” variants target Android devices
  28. For @5ean5ullivan, a security adviser at cyber firm F-Secure, a campaign’s cyber protections boil down to education — making sure
  29. Google has made the decision to shut down much of its #GooglePlus social network following the disclosure of vulnerable data.
  30. Hacked #Fortnite accounts and rent-a-botnet being pushed on
  31. ​Gemalto reports 4.6 billion record breaches in the first half of 2018
  32. Police Warned that Phishing Text Messages are Used to Target the Bank Customers
  33. Hackers Targeting Instagram Accounts of Influential Profiles for Ransom in a Recent Campaign
  34. one more reason to not use Facebook login everywhere, no matter how convenient it is.
  35. Sunsets for Google Plus after Reports of Data Breach
  36. Google Announced Google+ Shut down, Following Security Breach That Exposed 500,000 Users Accounts
  37. Using web phishing, criminals have managed to steal $3.7 million (251 million rubles), which is 6% more than in the
  38. Oh no, looks like we can't trust our data with Google either "Google hid major Google+ security flaw that exposed
  39. Cryptojacking campaign targets add-ons for popular streaming app Kodi

THREATS

  1. Cryptomining dethrones ransomware as 2018’s top threat - Webroot
  2. Microsoft patches 0-day Windows flaw under attack
  3. Microsoft Patches Zero-Day Under Active Attack by APT
  4. VMware Workstation, Fusion, and ESXi Affected by DoS Vulnerability, No Patch Yet
  5. Microsoft Patches Windows Zero-Day Exploited by 'FruityArmor' Group
  6. Microsoft October 2018 Patch Tuesday fixes zero-day exploited by FruityArmor APT
  7. Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
  8. Microsoft Patch Tuesday — October 18: Vulnerability disclosures and Snort coverage
  9. Slideshow: Intel from Virus Bulletin 2018
  10. Vulnerability in the Intel Unified Shader compiler for the Intel Graphics Accelerator
  11. Git Gets Patched for Newly Found Flaw
  12. Block puzzle games laced with malware | Avast
  13. How does #FacexWorm #malware use @Facebook Messenger to spread? Learn more about this new malware with expert @lewisnic.
  14. URSNIF Phishing Campaign Spreads Malware by Replying to Existing E-mail Threads
  15. The @USAgov is rolling out #2FA authentication for officers managing .gov domains, but experts say #GoogleAuthenticator might not be the
  16. Panda Banker Trojan becomes part of Emotet threat distribution platform
  17. New Cloud VPS Provider with Built-In DDoS Protection and Anti-Virus | SkySilk Cloud Services
  18. Microsoft October 2018 Patch Tuesday Fixes 12 Critical Vulnerabilities
  19. Sony Bravia Smart TVs affected by a critical vulnerability
  20. How does #MassMiner #malware infect systems across the web?
  21. Hackers breach customer rating tool used on over 7,000 websites
  22. The government domain registrar -- DotGov -- began rolling out two-factor #authentication for officials managing .gov domains in order to
  23. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  24. Apple fixes iOS 12 passcode bypass vulnerabilities
  25. Vulnerability Spotlight: VMWare Workstation DoS Vulnerability
  26. Proofpoint: One month out from deadline, half of agency domains are #DMARC compliant http://ow.ly/3SRI50iYi41 via CyberScoopNews
  27. Microsoft October Patch Tuesday Fixes 12 Critical Vulnerabilities
  28. Microsoft Patch Tuesday — October 18: Vulnerability disclosures and Snort coverage
  29. Sophos recently discovered a #Samsam extortion code that performs whole-company attacks through a variety of vulnerability exploits. Discover how this
  30. Google+ shut down after bug exposed user data
  31. Vulnerability in the Intel Unified Shader compiler for the Intel Graphics Accelerator
  32. Adobe Releases Security Patch Updates for 11 Vulnerabilities
  33. New Domains: A Wide-Open Playing Field for Cybercrime
  34. The end of Google+: Low usage and an API bug that exposed user data
  35. TOP 10 PHP Vulnerability Scanners
  36. RIP Google Plus: Shutdown announced after API bug exposes 500,000 users' details
  37. Active Workload Protection on Amazon EKS and AWS Fargate
  38. On our new #CyberSauna podcast: Find out how F-Secure's @nxsolle and Pasi Saarinen discovered a flaw that allows attackers to get
  39. Critical vulnerability in Sony Bravia Smart TV
  40. Oh no, looks like we can't trust our data with Google either "Google hid major Google+ security flaw that exposed
  41. #Ransomware Survival Guide: 10 things to know before, during, and after an attack:

CRIME

  1. Cryptomining dethrones ransomware as 2018’s top threat - Webroot
  2. How to Evade Expensive Phishing Filters with One Simple Trick
  3. DHS issued an alert on attacks aimed at Managed Service Providers
  4. The Magecart Seal of Approval: Card-Skimming Group Executes Scaled Supply Chain Attack on Shopper Approved
  5. Magecart group compromises customer ratings tool, affecting 'hundreds' of online stores
  6. Phishing Campaign uses Hijacked Emails to Deliver URSNIF by Replying to Ongoing Threads
  7. Sophos recently discovered a #Samsam extortion code that performs whole-company attacks through a variety of vulnerability exploits. Discover how this
  8. New Domains: A Wide-Open Playing Field for Cybercrime
  9. 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy. Read the full blog here:
  10. Magecart Group Compromises Plugin Used in Thousands of Stores, Makes Rookie Mistake
  11. Police Warned that Phishing Text Messages are Used to Target the Bank Customers

POLITICS

  1. APT28 group return to covert intelligence gathering ops in Europe and South America.
  2. DHS issued an alert on attacks aimed at Managed Service Providers

Oct 9, 2018

APT report for 2018-10-08

TRANSNATIONAL / UNKNOWN

  1. Fin7 Cybercrime Group Hacked Burgerville and Stolen Payment Card Details

CHINA

  1. Apple tells Congress it was never hacked by Chinese spy chips
  2. Apple to Congress: Chinese spy-chip story is “simply wrong”
  3. Bloomberg’s Chinese Hacking Report Is Wrong, Claims Apple
  4. Apple denies Chinese surveillance claims, Microsoft pulls Windows 10 update video
  5. UK, US Security Agencies Deny Investigating Chinese Spy Chips
  6. Why I don’t believe Bloomberg’s Chinese spy chip report
  7. Department of Homeland Security and GCHQ back Apple and Amazon’s denials they were hacked by China
  8. Apple, Amazon deny servers affected by China microchip plot
  9. China inserts microchips into motherboards used by Apple, CIA, Amazon
  10. China Infiltrated Amazon, Apple, U.S. Companies Using Tiny Chip: Report
  11. DHS, Apple push back on Bloomberg supply chain story
  12. DHS and GCHQ Say There's no Reason to Doubt Apple, Amazon Supermicro Hack Denial
  13. There’s a serious threat to the supply chain, says Pentagon
  14. DHS and GCHQ join Amazon and Apple in denying Bloomberg chip hack story
  15. US and UK Governments Back Denial of Supermicro Story

INDIA

Nil

NORTH KOREA

Nil

PAKISTAN

Nil

VIETNAM

Nil

IRAN

Nil

IRAQ

Nil

LEBANON

Nil

PALESTINE

Nil

SAUDI ARABIA

Nil

SYRIA

Nil

TURKEY

Nil

UNITED ARAB EMIRATES

Nil

YEMEN

Nil

RUSSIA

  1. APT28 Gets the Spotlight, But Turla Remains Russia’s Elite Hacking Unit
  2. APT28 Hacking Group’s New Espionage Operations Targets Military and Government Organizations
  3. Russian Privacy Blunder May Have Outed 300 GRU Agents
  4. Russia dismisses suspected spy actions as routine Dutch trip
  5. Seven Russian cyberspies indicted for hacking, wire fraud, ID theft
  6. Investigation Uncovers 300+ Possible GRU Officers
  7. Researchers: Turla and Zebrocy APT actors shared code, targets in 2018
  8. Kaspersky shed lights on the overlap of operations conducted by Turla and Sofacy
  9. First In-The-Wild UEFI Rootkit Discovered

SERBIA

Nil

UKRAINE

Nil

Platform report for 2018-10-08

WINDOWS

Nil

LINUX

Nil

UNIX

Nil

ANDROID

Nil

IOS

Nil

MACOS

Nil

Threat report for 2018-10-08

DATA BREACH

  1. 10/8/18: Dtex, Insider Threat, Privacy News: Dtex Earns Leadership, Product Awards; Insider Compromises French Law Enforcement Agency; The Big Hack
  2. Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
  3. Google Says Social Network Bug Exposed Private Data
  4. Google+ Is Shutting Down After a Security Bug Exposed User Info
  5. Google chose not to go public about bug that exposed Google Plus users’ data
  6. Google shuts down Google+ after API bug exposed details for over 500,000 users
  7. #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
  8. GitLab API Vulnerability Leaked Confidential Data On Public Projects
  9. Google announces plans to close Google+ for consumers following data breach
  10. Google+ Shutting Down After Bug Leaks Info of 500k Accounts
  11. .@David_Ingram of @NBCNews reports that political #campaigns and parties say they’re sending many more texts this year than in past
  12. Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
  13. Expert presented a new attack technique to compromise MikroTik Routers
  14. With 12,556,810 email archives already exposed across misconfigured online file stores, attackers don’t even need to perform #accounttakeovers to gain
  15. ICO hits Heathrow Airport with £120,000 data breach fine over lost USB stick
  16. MikroTik routers with default credentials can be easily compromised
  17. Project Insecurity (@insecurity) researchers discovered certain #livechatsoftware that were leaking personal details of employee at several high-profile sites. Discover how

DENIAL-OF-SERVICE

  1. Hide and Seek IoT Botnet Now Spreads to New Android Devices Using ADB over Wi-Fi
  2. Assassin’s Creed Odyssey suffers DDoS attack at launch

MALVERTISING

Nil

PHISHING

  1. California to Ban Weak Passwords
  2. Phishing Enables Domestic Violence. Education Can Help Stop It.
  3. Hook, Line and Sinker: After Phish Get Caught
  4. Aspire Health Lost 'Protected Health Information' after Getting Hacked by a Phishing Scheme
  5. "Life is short - passwords are long." - Finnish Communications Regulatory Authority

WEB DEFACEMENT

Nil

MALWARE

  1. GRRCon Augusta 2018, Ankur Tyagi’s ‘Analyzing Multi-Dimensional Malware Dataset’
  2. Malware isn't the only threat to Android apps. Others include copies of popular apps and those that abuse permission requests. Here
  3. Code Execution Bug In Malicious Repositories Resolved By Git Project
  4. #Stegware: it's #Malware that uses #steganography techniques to avoid detection
  5. 2018's Most Active Ransomware: The Ongoing Evolution of GandCrab
  6. Most hosting providers take too long to remove malware distribution sites
  7. .@Trustlook Labs discovered an #Android #Trojan stealing data from messaging apps. Learn what #mobilesecurity programs should look for to detect
  8. .@ThreatFabric researchers uncovered a #malware that uses overlay techniques to avoid detection. Learn from @lewisnic how this new #Androidmalware --
  9. Mikko Hypponen's Picks For the Top 5 Viruses of All Time - F-Secure Blog
  10. US government rolls out 2-step verification for .gov domain owners
  11. Intel’s 9th-Generation Core Processors Unveiled
  12. Code execution bug in malicious repositories resolved by Git Project
  13. #Android #Trojan: How is data being stolen from #messagingapps?
  14. #GoScanSSH: How does this #malware work and differ from others?
  15. How did an organized crime group get a zip file from a reputable malware scanning service? Malware researchers occasionally have ties
  16. Keeping your cloud malware-free: What you need to know
  17. Virus Attack Hampers the Email System of Ulster Town
  18. Beware!! Hackers Now Spreading Dangerous FlawedAmmyy Malware Through PDF & IQY File
  19. First In-The-Wild UEFI Rootkit Discovered
  20. The MITRE ATT&CK Framework: Command and Control
  21. .@TrendMicro researchers discovered #FacexWorm, a #malware that uses a #ChromeExtension and @Facebook Messenger to spread. Learn which users are at

EXPLOIT

  1. Hackers exploit vulnerability in Bitcoin code
  2. #TLBleed exploits abuse Intel's HTT chip feature to leak data. Find out how hackers could launch side-channel attacks to obtain
  3. Websites vulnerable to attack exploiting major framework
  4. "It is no secret that the #RemoteDesktop Protocol has long been a source of exploitable vulnerabilities, and it is well
  5. New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access

VULNERABILITY

  1. Google shutting down Google+ after covering up privacy bug
  2. Hackers exploit vulnerability in Bitcoin code
  3. Google was aware of a flaw that exposed over 500,000 of Google Plus users, but did not disclose it
  4. Google Says Social Network Bug Exposed Private Data
  5. WECON PI Studio HMI software affected by code execution flaws
  6. Mozilla Patched Multiple Vulnerabilities In Thunderbird 60.2.1
  7. Google+ Is Shutting Down After a Security Bug Exposed User Info
  8. Google shuts down Google+ for consumers due to bug found months ago
  9. Google chose not to go public about bug that exposed Google Plus users’ data
  10. iOS 12.0.1 Released with Fixes to Passcode Bypass Bugs
  11. Google+ Shutting Down After Google Discovers API Bug Affecting 500K Users
  12. Google shuts down Google+ after API bug exposed details for over 500,000 users
  13. Code Execution Flaws Found in WECON Industrial Products
  14. GitLab API Vulnerability Leaked Confidential Data On Public Projects
  15. Code Execution Bug In Malicious Repositories Resolved By Git Project
  16. Google+ Shutting Down After Bug Leaks Info of 500k Accounts
  17. Vulnerabilities in RouterOS could enble hackers to take control of routers
  18. #Shodan, a device search engine, can help identify #ICS security vulnerabilities. Learn more about how Shodan works and how it
  19. NEW #CYBERSAUNA EPISODE: Reinventing the Cold Boot Attack: Modern Laptop Version @nxsolle and Pasi Saarinen discuss how they discovered a flaw
  20. Vulnerabilities discovered in electoral counting machines in 23 states
  21. Most routers full of firmware flaws that leave users at risk
  22. Google+ is Shutting Down After a Vulnerability Exposed 500,000 Users' Data
  23. Who's watching your TV? Sony quietly killed three critical Bravia TV bugs
  24. Microsoft says it can recover files lost to the Windows 10 October Update's data deletion bug
  25. Tenable Researcher Reveals Extended MikroTik Router Vulnerability
  26. MikroTik vulnerability climbs up the severity scale, new attack permits root access
  27. Google Criticizes Apple Over Safari Security, Flaw Disclosures
  28. Code execution bug in malicious repositories resolved by Git Project
  29. Users complain of boot loops on Series 4 Apple Watch due to daylight savings bug
  30. "It is no secret that the #RemoteDesktop Protocol has long been a source of exploitable vulnerabilities, and it is well
  31. New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access
  32. The Git Project addresses a critical arbitrary code execution vulnerability in Git
  33. D-Link Security Updates Fixed Multiple Vulnerabilities in WiFiManager Software
  34. Beware!! Hackers Now Spreading Dangerous FlawedAmmyy Malware Through PDF & IQY File
  35. PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’

Region brief for 2018-10-08

ASIA

Nil

OCEANIA

Nil

NORTH AMERICA

Nil

SOUTH AMERICA

Nil

EUROPE

Nil

AFRICA

Nil